src/pyams_security/__init__.py
changeset 54 59683c264d94
parent 42 07229ac2497b
child 79 4a31bf48560b
--- a/src/pyams_security/__init__.py	Thu Oct 08 09:30:56 2015 +0200
+++ b/src/pyams_security/__init__.py	Thu Oct 08 09:31:45 2015 +0200
@@ -19,6 +19,9 @@
 from pyramid.i18n import TranslationStringFactory
 _ = TranslationStringFactory('pyams_security')
 
+from pyams_utils.interfaces import PUBLIC_PERMISSION, VIEW_PERMISSION, MANAGE_PERMISSION, VIEW_SYSTEM_PERMISSION, \
+    MANAGE_SYSTEM_PERMISSION, MANAGE_SECURITY_PERMISSION, MANAGE_ROLES_PERMISSION
+
 
 def includeme(config):
     """Pyramid include
@@ -29,25 +32,26 @@
     include_package(config)
 
     # register custom permissions
-    config.register_permission({'id': 'public',
+    config.register_permission({'id': PUBLIC_PERMISSION,
                                 'title': _("View public contents")})
-    config.register_permission({'id': 'view',
+    config.register_permission({'id': VIEW_PERMISSION,
                                 'title': _("View protected contents")})
-    config.register_permission({'id': 'manage',
+    config.register_permission({'id': MANAGE_PERMISSION,
                                 'title': _("Manage contents properties")})
-    config.register_permission({'id': 'system.view',
+    config.register_permission({'id': VIEW_SYSTEM_PERMISSION,
                                 'title': _("View management screens")})
-    config.register_permission({'id': 'system.manage',
+    config.register_permission({'id': MANAGE_SYSTEM_PERMISSION,
                                 'title': _("Manage system properties")})
 
-    config.register_permission({'id': 'security.manage',
+    config.register_permission({'id': MANAGE_SECURITY_PERMISSION,
                                 'title': _("Manage security")})
-    config.register_permission({'id': 'security.manage_roles',
+    config.register_permission({'id': MANAGE_ROLES_PERMISSION,
                                 'title': _("Manage roles")})
 
     # register custom roles
     config.register_role({'id': 'system.Manager',
                           'title': "System manager (role)",
-                          'permissions': {'public', 'view', 'manage', 'system.manage', 'system.view',
-                                          'security.manage', 'security.manage_roles'},
+                          'permissions': {PUBLIC_PERMISSION, VIEW_PERMISSION, MANAGE_PERMISSION,
+                                          MANAGE_SYSTEM_PERMISSION, VIEW_SYSTEM_PERMISSION,
+                                          MANAGE_SECURITY_PERMISSION, MANAGE_ROLES_PERMISSION},
                           'managers': {'system:admin', 'role:system.Manager'}})