airflow.providers.fab.www.auth

Attributes

T

log

Functions

get_access_denied_message()

has_access_with_pk(f)

Check permissions on views.

has_access_configuration(method)

has_access_connection(method)

has_access_dag(method[, access_entity])

has_access_dag_entities(method, access_entity)

has_access_asset(method)

Check current user's permissions against required permissions for assets.

has_access_pool(method)

has_access_variable(method)

has_access_view([access_view])

Check current user's permissions to access the website.

Module Contents

airflow.providers.fab.www.auth.T[source]
airflow.providers.fab.www.auth.log[source]
airflow.providers.fab.www.auth.get_access_denied_message()[source]
airflow.providers.fab.www.auth.has_access_with_pk(f)[source]

Check permissions on views.

The implementation is very similar from https://github.com/dpgaspar/Flask-AppBuilder/blob/c6fecdc551629e15467fde5d06b4437379d90592/flask_appbuilder/security/decorators.py#L134

The difference is that this decorator will pass the resource ID to check permissions. It allows fined-grained access control using resource IDs.

airflow.providers.fab.www.auth.has_access_configuration(method)[source]
airflow.providers.fab.www.auth.has_access_connection(method)[source]
airflow.providers.fab.www.auth.has_access_dag(method, access_entity=None)[source]
airflow.providers.fab.www.auth.has_access_dag_entities(method, access_entity)[source]
airflow.providers.fab.www.auth.has_access_asset(method)[source]

Check current user’s permissions against required permissions for assets.

airflow.providers.fab.www.auth.has_access_pool(method)[source]
airflow.providers.fab.www.auth.has_access_variable(method)[source]
airflow.providers.fab.www.auth.has_access_view(access_view=AccessView.WEBSITE)[source]

Check current user’s permissions to access the website.

Was this entry helpful?