abs-auth-rbac-core 0.1.9__py3-none-any.whl → 0.1.11__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of abs-auth-rbac-core might be problematic. Click here for more details.

@@ -819,6 +819,8 @@ class RBACService:
819
819
  # Try with module first
820
820
  if self.enforcer.enforce(role.uuid, resource, action, module):
821
821
  return True
822
+ if self.enforcer.enforce(role.name, resource, action, module):
823
+ return True
822
824
  return False
823
825
 
824
826
  def check_permission_by_role(
@@ -99,6 +99,25 @@ class PermissionAction(str, Enum):
99
99
  ACCESS_AZURE_STORAGE = "ACCESS_AZURE_STORAGE"
100
100
  ASSIGN = "ASSIGN"
101
101
  ADD_NOTE = "ADD_NOTE"
102
+ VIEW_ALL_MESSAGES="VIEW_ALL_MESSAGES"
103
+ VIEW_DEPARTMENT_MESSAGES="VIEW_DEPARTMENT_MESSAGES"
104
+ VIEW_OWN_MESSAGES="VIEW_OWN_MESSAGES"
105
+ VIEW_ALL_DEPARTMENT_DATA="VIEW_ALL_DEPARTMENT_DATA"
106
+ VIEW_OWN_DEPARTMENT_DATA="VIEW_OWN_DEPARTMENT_DATA"
107
+ CONFIGURE_EMAIL_SETTINGS="CONFIGURE_EMAIL_SETTINGS"
108
+ ADD_KNOWLEDGE="ADD_KNOWLEDGE"
109
+ CHANGE_DEPARTMENT_SETTINGS="CHANGE_DEPARTMENT_SETTINGS"
110
+ ASSIGN_USERS_TO_DEPARTMENTS="ASSIGN_USERS_TO_DEPARTMENTS"
111
+ ASSIGN_USERS_WITHIN_DEPARTMENT="ASSIGN_USERS_WITHIN_DEPARTMENT"
112
+ LOGIN_ACCESS="LOGIN_ACCESS"
113
+ FORM_ONLY_ACCESS="FORM_ONLY_ACCESS"
114
+ TRACK_USER_ACTIONS="TRACK_USER_ACTIONS"
115
+ GENERATE_ALL_REPORTS="GENERATE_ALL_REPORTS"
116
+ GENERATE_DEPARTMENT_REPORTS="GENERATE_DEPARTMENT_REPORTS"
117
+ VIEW_ALL_ANALYTICS="VIEW_ALL_ANALYTICS"
118
+ VIEW_DEPARTMENT_ANALYTICS="VIEW_DEPARTMENT_ANALYTICS"
119
+ MANAGE_DEPARTMENT_ROUTING="MANAGE_DEPARTMENT_ROUTING"
120
+
102
121
 
103
122
 
104
123
  class PermissionModule(str, Enum):
@@ -111,6 +130,8 @@ class PermissionModule(str, Enum):
111
130
  REPORTING = "REPORTING"
112
131
  USER_MANAGEMENT = "USER_MANAGEMENT"
113
132
  AI_EMS="AI_EMS"
133
+ ENTITY_MANAGER="ENTITY_MANAGER"
134
+
114
135
 
115
136
 
116
137
  class PermissionResource(str, Enum):
@@ -161,6 +182,9 @@ class PermissionResource(str, Enum):
161
182
  REPORTING = "REPORTING"
162
183
  SETTINGS = "SETTINGS"
163
184
  CONSTITUENT_COMPLAINTS = "CONSTITUENT_COMPLAINTS"
185
+ MESSAGE_MANAGEMENT_PERMISSIONS="MESSAGE_MANAGEMENT_PERMISSIONS"
186
+ DEPARTMENT_MANAGEMENT_PERMISSIONS="DEPARTMENT_MANAGEMENT_PERMISSIONS"
187
+ CHANNEL_SPECIFIC_PERMISSIONS="CHANNEL_SPECIFIC_PERMISSIONS"
164
188
  LEGAL_ASSISTANT = "LEGAL_ASSISTANT"
165
189
  KNOWLEDGE_SOURCE = "KNOWLEDGE_SOURCE"
166
190
  AGENT_CONFIG = "AGENT_CONFIG"
@@ -174,6 +198,8 @@ class PermissionResource(str, Enum):
174
198
  CALLS_AND_SMS = "CALLS_AND_SMS"
175
199
  ANALYTICS = "ANALYTICS"
176
200
  HELP = "HELP"
201
+ SYSTEM_ACCESS_TRACKING_PERMISSIONS="SYSTEM_ACCESS_TRACKING_PERMISSIONS"
202
+ ENTITY_MANAGER="ENTITY_MANAGER"
177
203
 
178
204
 
179
205
  class PermissionData(NamedTuple):
@@ -1757,6 +1783,174 @@ class PermissionConstants:
1757
1783
  action=PermissionAction.VIEW,
1758
1784
  )
1759
1785
 
1786
+ # Message Management Permissions
1787
+ MESSAGE_MANAGEMENT_VIEW_ALL = PermissionData(
1788
+ name="View All Messages",
1789
+ description="Permission to view all messages across departments",
1790
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1791
+ resource=PermissionResource.MESSAGE_MANAGEMENT_PERMISSIONS,
1792
+ action=PermissionAction.VIEW_ALL_MESSAGES,
1793
+ )
1794
+ MESSAGE_MANAGEMENT_VIEW_DEPARTMENT = PermissionData(
1795
+ name="View Department Messages",
1796
+ description="Permission to view messages within own department",
1797
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1798
+ resource=PermissionResource.MESSAGE_MANAGEMENT_PERMISSIONS,
1799
+ action=PermissionAction.VIEW_DEPARTMENT_MESSAGES,
1800
+ )
1801
+ MESSAGE_MANAGEMENT_VIEW_OWN = PermissionData(
1802
+ name="View Own Messages",
1803
+ description="Permission to view own messages",
1804
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1805
+ resource=PermissionResource.MESSAGE_MANAGEMENT_PERMISSIONS,
1806
+ action=PermissionAction.VIEW_OWN_MESSAGES,
1807
+ )
1808
+
1809
+ # Department Management Permissions
1810
+ DEPARTMENT_MANAGEMENT_VIEW_ALL = PermissionData(
1811
+ name="View All Department Data",
1812
+ description="Permission to view data from all departments",
1813
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1814
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1815
+ action=PermissionAction.VIEW_ALL_DEPARTMENT_DATA,
1816
+ )
1817
+ DEPARTMENT_MANAGEMENT_VIEW_OWN = PermissionData(
1818
+ name="View Own Department Data",
1819
+ description="Permission to view data from own department",
1820
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1821
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1822
+ action=PermissionAction.VIEW_OWN_DEPARTMENT_DATA,
1823
+ )
1824
+
1825
+ # Channel Specific Permissions
1826
+ CHANNEL_SPECIFIC_CONFIGURE_EMAIL = PermissionData(
1827
+ name="Configure Email Settings",
1828
+ description="Permission to configure email channel settings",
1829
+ module=PermissionModule.CONSTITUENT_COMPLAINTS,
1830
+ resource=PermissionResource.CHANNEL_SPECIFIC_PERMISSIONS,
1831
+ action=PermissionAction.CONFIGURE_EMAIL_SETTINGS,
1832
+ )
1833
+
1834
+ ADD_KNOWLEDGE_EMAIL_PROCESS = PermissionData(
1835
+ name="Add Knowledge",
1836
+ description="Permission to add knowledge in department",
1837
+ module=PermissionModule.EMAIL_PROCESS,
1838
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1839
+ action=PermissionAction.ADD_KNOWLEDGE
1840
+ )
1841
+
1842
+ CHANGE_DEPARTMENT_SETTINGS_EMAIL_PROCESS = PermissionData(
1843
+ name="Change Department Settings",
1844
+ description="Permission to change department settings",
1845
+ module=PermissionModule.EMAIL_PROCESS,
1846
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1847
+ action=PermissionAction.CHANGE_DEPARTMENT_SETTINGS
1848
+ )
1849
+
1850
+ ASSIGN_USERS_TO_DEPARTMENTS_EMAIL_PROCESS = PermissionData(
1851
+ name="Assign Users to Departments",
1852
+ description="Permission to assign users to departments",
1853
+ module=PermissionModule.EMAIL_PROCESS,
1854
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1855
+ action=PermissionAction.ASSIGN_USERS_TO_DEPARTMENTS
1856
+ )
1857
+
1858
+ ASSIGN_USERS_WITHIN_DEPARTMENT_EMAIL_PROCESS = PermissionData(
1859
+ name="Assign Users Within Department",
1860
+ description="Permission to assign users within their own department",
1861
+ module=PermissionModule.EMAIL_PROCESS,
1862
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1863
+ action=PermissionAction.ASSIGN_USERS_WITHIN_DEPARTMENT
1864
+ )
1865
+
1866
+ VIEW_ALL_DEPARTMENT_DATA_EMAIL_PROCESS = PermissionData(
1867
+ name="View All Department Data",
1868
+ description="Permission to view all department data",
1869
+ module=PermissionModule.EMAIL_PROCESS,
1870
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1871
+ action=PermissionAction.VIEW_ALL_DEPARTMENT_DATA
1872
+ )
1873
+
1874
+ VIEW_OWN_DEPARTMENT_DATA_EMAIL_PROCESS = PermissionData(
1875
+ name="View Own Department Data",
1876
+ description="Permission to view own department's data",
1877
+ module=PermissionModule.EMAIL_PROCESS,
1878
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1879
+ action=PermissionAction.VIEW_OWN_DEPARTMENT_DATA
1880
+ )
1881
+
1882
+ MANAGE_DEPARTMENT_ROUTING_EMAIL_PROCESS = PermissionData(
1883
+ name="Manage Department Routing",
1884
+ description="Permission to manage routing settings for departments",
1885
+ module=PermissionModule.EMAIL_PROCESS,
1886
+ resource=PermissionResource.DEPARTMENT_MANAGEMENT_PERMISSIONS,
1887
+ action=PermissionAction.MANAGE_DEPARTMENT_ROUTING
1888
+ )
1889
+
1890
+ # System Access Tracking Permissions
1891
+ LOGIN_ACCESS_EMAIL_PROCESS = PermissionData(
1892
+ name="Login Access",
1893
+ description="Permission for login access",
1894
+ module=PermissionModule.EMAIL_PROCESS,
1895
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1896
+ action=PermissionAction.LOGIN_ACCESS
1897
+ )
1898
+
1899
+ FORM_ONLY_ACCESS_EMAIL_PROCESS = PermissionData(
1900
+ name="Form Only Access",
1901
+ description="Permission to access only forms",
1902
+ module=PermissionModule.EMAIL_PROCESS,
1903
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1904
+ action=PermissionAction.FORM_ONLY_ACCESS
1905
+ )
1906
+
1907
+ TRACK_USER_ACTIONS_EMAIL_PROCESS = PermissionData(
1908
+ name="Track User Actions",
1909
+ description="Permission to track user actions",
1910
+ module=PermissionModule.EMAIL_PROCESS,
1911
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1912
+ action=PermissionAction.TRACK_USER_ACTIONS
1913
+ )
1914
+
1915
+ GENERATE_ALL_REPORTS_EMAIL_PROCESS = PermissionData(
1916
+ name="Generate All Reports",
1917
+ description="Permission to generate all reports",
1918
+ module=PermissionModule.EMAIL_PROCESS,
1919
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1920
+ action=PermissionAction.GENERATE_ALL_REPORTS
1921
+ )
1922
+
1923
+ GENERATE_DEPARTMENT_REPORTS_EMAIL_PROCESS = PermissionData(
1924
+ name="Generate Department Reports",
1925
+ description="Permission to generate department-specific reports",
1926
+ module=PermissionModule.EMAIL_PROCESS,
1927
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1928
+ action=PermissionAction.GENERATE_DEPARTMENT_REPORTS
1929
+ )
1930
+
1931
+ VIEW_ALL_ANALYTICS_EMAIL_PROCESS = PermissionData(
1932
+ name="View All Analytics",
1933
+ description="Permission to view analytics across the system",
1934
+ module=PermissionModule.EMAIL_PROCESS,
1935
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1936
+ action=PermissionAction.VIEW_ALL_ANALYTICS
1937
+ )
1938
+
1939
+ VIEW_DEPARTMENT_ANALYTICS_EMAIL_PROCESS = PermissionData(
1940
+ name="View Department Analytics",
1941
+ description="Permission to view department-specific analytics",
1942
+ module=PermissionModule.EMAIL_PROCESS,
1943
+ resource=PermissionResource.SYSTEM_ACCESS_TRACKING_PERMISSIONS,
1944
+ action=PermissionAction.VIEW_DEPARTMENT_ANALYTICS
1945
+ )
1946
+ VIEW_ENTITY_MANAGER_ENTITY_MANAGER = PermissionData(
1947
+ name="View Entity Manager Apps",
1948
+ description="Permission to view entity manager apps",
1949
+ module=PermissionModule.ENTITY_MANAGER,
1950
+ resource=PermissionResource.ENTITY_MANAGER,
1951
+ action=PermissionAction.VIEW
1952
+ )
1953
+
1760
1954
  @classmethod
1761
1955
  def get_all_permissions(cls) -> List[PermissionData]:
1762
1956
  """Get all defined permissions"""
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.3
2
2
  Name: abs-auth-rbac-core
3
- Version: 0.1.9
3
+ Version: 0.1.11
4
4
  Summary: RBAC and Auth core utilities including JWT token management.
5
5
  License: MIT
6
6
  Author: AutoBridgeSystems
@@ -17,11 +17,11 @@ abs_auth_rbac_core/models/user_role.py,sha256=20pqmtJPzlUrI9ulHGouk8XlFgrGG7I6ik
17
17
  abs_auth_rbac_core/rbac/__init__.py,sha256=oYjtpmfrkEbwWCBAWuRoU1fM4fCpBxkF_lwQrelK1As,79
18
18
  abs_auth_rbac_core/rbac/decorator.py,sha256=pEFAW0Nn2iE4KBctPhNOmO_VLeJFDX2V9v2LsCu6kHY,1824
19
19
  abs_auth_rbac_core/rbac/policy.conf,sha256=wghhhKxgZH0rPhh1QFrIpq9nevJT3s7OxxvXiU3zzuI,305
20
- abs_auth_rbac_core/rbac/service.py,sha256=Wb2U5O1ci-UEINYJea-430JevpT3NT7FjEB19vkiQg0,32598
20
+ abs_auth_rbac_core/rbac/service.py,sha256=q7-N7n4d0zOKvsZsNFQ_6Isl233AnlDcdEkJet_6p1E,32709
21
21
  abs_auth_rbac_core/schema/__init__.py,sha256=v9xibJ8Wr9k0u6PEYNK0LCGUJD71SB5vxu9BZG0S7tM,46
22
22
  abs_auth_rbac_core/schema/permission.py,sha256=XvxPU68FY0PFgkF4GR2bSrzNvFB8c8OgY_d0JOJvMc8,203
23
23
  abs_auth_rbac_core/util/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
24
- abs_auth_rbac_core/util/permission_constants.py,sha256=ZADzQ31HQgLPS8oJXMbuSbm-2M30BERPWZppgvvg8Yg,70785
25
- abs_auth_rbac_core-0.1.9.dist-info/METADATA,sha256=QxtDuNjXi-1_l4NuAYYvxLa56KPneakZwgpskB-aTeI,6635
26
- abs_auth_rbac_core-0.1.9.dist-info/WHEEL,sha256=fGIA9gx4Qxk2KDKeNJCbOEwSrmLtjWCwzBz351GyrPQ,88
27
- abs_auth_rbac_core-0.1.9.dist-info/RECORD,,
24
+ abs_auth_rbac_core/util/permission_constants.py,sha256=yctZhJgOyuRv2hoAG5ADSErKbPdt2t4xd2qBzrfgx54,79394
25
+ abs_auth_rbac_core-0.1.11.dist-info/METADATA,sha256=448zjSdZHvzDWZMhl2iJY7BqNKD2bPdCjk2fYJ0g_Sg,6636
26
+ abs_auth_rbac_core-0.1.11.dist-info/WHEEL,sha256=fGIA9gx4Qxk2KDKeNJCbOEwSrmLtjWCwzBz351GyrPQ,88
27
+ abs_auth_rbac_core-0.1.11.dist-info/RECORD,,