|
@@ -264,7 +264,7 @@ class User(DeclarativeBase):
|
264
|
264
|
roles.append(role)
|
265
|
265
|
return roles
|
266
|
266
|
|
267
|
|
- def ensure_auth_token(self, validity_seconds, dbsession) -> None:
|
|
267
|
+ def ensure_auth_token(self, validity_seconds, session) -> None:
|
268
|
268
|
"""
|
269
|
269
|
Create auth_token if None, regenerate auth_token if too much old.
|
270
|
270
|
|
|
@@ -275,7 +275,7 @@ class User(DeclarativeBase):
|
275
|
275
|
if not self.auth_token or not self.auth_token_created:
|
276
|
276
|
self.auth_token = str(uuid.uuid4())
|
277
|
277
|
self.auth_token_created = datetime.utcnow()
|
278
|
|
- dbsession.flush()
|
|
278
|
+ session.flush()
|
279
|
279
|
return
|
280
|
280
|
|
281
|
281
|
now_seconds = time.mktime(datetime.utcnow().timetuple())
|
|
@@ -285,7 +285,7 @@ class User(DeclarativeBase):
|
285
|
285
|
if difference > validity_seconds:
|
286
|
286
|
self.auth_token = str(uuid.uuid4())
|
287
|
287
|
self.auth_token_created = datetime.utcnow()
|
288
|
|
- DBSession.flush()
|
|
288
|
+ session.flush()
|
289
|
289
|
|
290
|
290
|
|
291
|
291
|
class Permission(DeclarativeBase):
|
|
@@ -298,7 +298,12 @@ class Permission(DeclarativeBase):
|
298
|
298
|
|
299
|
299
|
__tablename__ = 'permissions'
|
300
|
300
|
|
301
|
|
- permission_id = Column(Integer, Sequence('seq__permissions__permission_id'), autoincrement=True, primary_key=True)
|
|
301
|
+ permission_id = Column(
|
|
302
|
+ Integer,
|
|
303
|
+ Sequence('seq__permissions__permission_id'),
|
|
304
|
+ autoincrement=True,
|
|
305
|
+ primary_key=True
|
|
306
|
+ )
|
302
|
307
|
permission_name = Column(Unicode(63), unique=True, nullable=False)
|
303
|
308
|
description = Column(Unicode(255))
|
304
|
309
|
|