mirror of
https://github.com/mealie-recipes/mealie.git
synced 2025-12-31 06:10:31 -05:00
* add dependency injection for get_repositories * convert events api to controller * update generic typing * add abstract controllers * update test naming * migrate admin services to controllers * add additional admin route tests * remove print * add public shared dependencies * add types * fix typo * add static variables for recipe json keys * add coverage gutters config * update controller routers * add generic success response * add category/tag/tool tests * add token refresh test * add coverage utilities * covert comments to controller * add todo * add helper properties * delete old service * update test notes * add unit test for pretty_stats * remove dead code from post_webhooks * update group routes to use controllers * add additional group test coverage * abstract common permission checks * convert ingredient parser to controller * update recipe crud to use controller * remove dead-code * add class lifespan tracker for debugging * convert bulk export to controller * migrate tools router to controller * update recipe share to controller * move customer router to _base * ignore prints in flake8 * convert units and foods to new controllers * migrate user routes to controllers * centralize error handling * fix invalid ref * reorder fields * update routers to share common handling * update tests * remove prints * fix cookbooks delete * fix cookbook get * add controller for mealplanner * cover report routes to controller * remove __future__ imports * remove dead code * remove all base_http children and remove dead code
40 lines
1.0 KiB
Python
40 lines
1.0 KiB
Python
from fastapi import HTTPException, status
|
|
|
|
from mealie.schema.user.user import PrivateUser
|
|
|
|
|
|
class OperationChecks:
|
|
"""
|
|
OperationChecks class is a mixin class that can be used on routers to provide common permission
|
|
checks and raise the appropriate http error as necessary
|
|
"""
|
|
|
|
user: PrivateUser
|
|
|
|
def __init__(self, user: PrivateUser) -> None:
|
|
self.user = user
|
|
|
|
def _raise_unauthorized(self) -> None:
|
|
raise HTTPException(status.HTTP_401_UNAUTHORIZED)
|
|
|
|
def _raise_forbidden(self) -> None:
|
|
raise HTTPException(status.HTTP_403_FORBIDDEN)
|
|
|
|
# =========================================
|
|
# User Permission Checks
|
|
|
|
def can_manage(self) -> bool:
|
|
if not self.user.can_manage:
|
|
self._raise_forbidden()
|
|
return True
|
|
|
|
def can_invite(self) -> bool:
|
|
if not self.user.can_invite:
|
|
self._raise_forbidden()
|
|
return True
|
|
|
|
def can_organize(self) -> bool:
|
|
if not self.user.can_organize:
|
|
self._raise_forbidden()
|
|
return True
|