diff --git a/awx/api/permissions.py b/awx/api/permissions.py index b534fbf824..8ec26a2cc8 100644 --- a/awx/api/permissions.py +++ b/awx/api/permissions.py @@ -16,8 +16,7 @@ from awx.main.utils import get_object_or_400 logger = logging.getLogger('awx.api.permissions') __all__ = ['ModelAccessPermission', 'JobTemplateCallbackPermission', - 'TaskPermission', 'ProjectUpdatePermission', 'UserPermission', - 'HostPermission',] + 'TaskPermission', 'ProjectUpdatePermission', 'UserPermission',] class ModelAccessPermission(permissions.BasePermission): @@ -209,23 +208,3 @@ class UserPermission(ModelAccessPermission): raise PermissionDenied() -class HostPermission(ModelAccessPermission): - ''' - Allow super super for all operations that don't add or update data. - Allow the request to flow through access.py so that even a super-user can't - violate the license host count restriction. - ''' - - def check_options_permissions(self, request, view, obj=None): - view.always_allow_superuser = True - return super(HostPermission, self).check_options_permissions(request, view, obj) - - def check_head_permissions(self, request, view, obj=None): - view.always_allow_superuser = True - return super(HostPermission, self).check_head_permissions(request, view, obj) - - def check_get_permissions(self, request, view, obj=None): - view.always_allow_superuser = True - return super(HostPermission, self).check_get_permissions(request, view, obj) - - diff --git a/awx/api/views.py b/awx/api/views.py index da9a2df2fa..e5afdcb65d 100644 --- a/awx/api/views.py +++ b/awx/api/views.py @@ -1687,7 +1687,6 @@ class HostDetail(RetrieveUpdateDestroyAPIView): always_allow_superuser = False model = Host serializer_class = HostSerializer - permission_classes = (HostPermission,) class InventoryHostsList(SubListCreateAttachDetachAPIView):