16db58faba
This patch adds a decorator and function to all horizon components so that the results of calls to can_access are cached in the session. This should prevent large numbers of calls to APIs when can_access functions need to get information from services. The cache is stored in session['allowed'] using self.__class__ as the key, this ensures each key is human readable and can be easily mocked out in future tests. Change-Id: Ic65e4cb6499ecae4b09dd525416656a6f41853f5 Closes-Bug: 1367716
40 lines
1.3 KiB
Python
40 lines
1.3 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
import horizon
|
|
|
|
from openstack_dashboard.api import neutron
|
|
from openstack_dashboard.dashboards.project import dashboard
|
|
|
|
|
|
class Firewall(horizon.Panel):
|
|
name = _("Firewalls")
|
|
slug = "firewalls"
|
|
permissions = ('openstack.services.network',)
|
|
|
|
def allowed(self, context):
|
|
request = context['request']
|
|
if not request.user.has_perms(self.permissions):
|
|
return False
|
|
if not neutron.is_service_enabled(request,
|
|
config_name='enable_firewall',
|
|
ext_name='fwaas'):
|
|
return False
|
|
if not super(Firewall, self).allowed(context):
|
|
return False
|
|
return True
|
|
|
|
|
|
dashboard.Project.register(Firewall)
|