8
0
Fork 0
mirror of https://gitlab.federez.net/re2o/re2o synced 2024-06-01 07:22:25 +00:00
re2o/re2o/acl.py

322 lines
12 KiB
Python
Raw Normal View History

# -*- mode: python; coding: utf-8 -*-
# Re2o est un logiciel d'administration développé initiallement au rezometz. Il
# se veut agnostique au réseau considéré, de manière à être installable en
# quelques clics.
#
# Copyright © 2017 Gabriel Détraz
# Copyright © 2017 Goulven Kermarec
# Copyright © 2017 Augustin Lemesle
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
"""Handles ACL for re2o.
Here are defined some decorators that can be used in views to handle ACL.
"""
from __future__ import unicode_literals
import sys
from itertools import chain
from django.db.models import Model
from django.contrib import messages
from django.shortcuts import redirect
from django.urls import reverse
2018-06-23 17:53:10 +00:00
from django.utils.translation import ugettext as _
2019-09-05 23:08:53 +00:00
from re2o.utils import get_group_having_permission
2019-09-06 14:05:45 +00:00
def acl_error_message(msg, permissions):
"""Create an error message for msg and permissions."""
2019-09-09 10:16:37 +00:00
if permissions is None:
return msg
2019-09-06 14:05:45 +00:00
groups = ", ".join([
2019-09-06 13:39:17 +00:00
g.name for g in get_group_having_permission(*permissions)
])
2019-09-06 14:05:45 +00:00
message = msg or _("You don't have the right to edit"
" this option.")
if groups:
return message + _(
" You need to be a member of one of those"
" groups : %s"
) % groups
else:
return message + " No group have the %s permission(s) !" % " or ".join([
",".join(permissions[:-1]),
permissions[-1]]
if len(permissions) > 2 else permissions
)
2019-09-05 23:08:53 +00:00
2018-05-07 18:24:04 +00:00
def acl_base_decorator(method_name, *targets, on_instance=True):
2018-05-07 16:57:08 +00:00
"""Base decorator for acl. It checks if the `request.user` has the
permission by calling model.method_name. If the flag on_instance is True,
tries to get an instance of the model by calling
`model.get_instance(*args, **kwargs)` and runs `instance.mehod_name`
rather than model.method_name.
It is not intended to be used as is. It is a base for others ACL
decorators.
Args:
method_name: The name of the method which is to to be used for ACL.
(ex: 'can_edit') WARNING: if no method called 'method_name' exists,
then no error will be triggered, the decorator will act as if
permission was granted. This is to allow you to run ACL tests on
fields only. If the method exists, it has to return a 2-tuple
2019-09-05 23:08:53 +00:00
`(can, reason, permissions)` with `can` being a boolean stating
2019-09-09 10:16:37 +00:00
whether the access is granted, `reason` an arror message to be
2019-09-05 23:08:53 +00:00
displayed if `can` equals `False` (can be `None`) and `permissions`
2019-09-09 10:16:37 +00:00
a list of permissions needed for access (can be `None`). If can is
True and permission is not `None`, a warning message will be
displayed.
2018-05-07 16:57:08 +00:00
*targets: The targets. Targets are specified like a sequence of models
and fields names. As an example
```
acl_base_decorator('can_edit', ModelA, 'field1', 'field2', \
ModelB, ModelC, 'field3', on_instance=False)
```
will make the following calls (where `user` is the current user,
`*args` and `**kwargs` are the arguments initially passed to the
view):
- `ModelA.can_edit(user, *args, **kwargs)`
- `ModelA.can_change_field1(user, *args, **kwargs)`
- `ModelA.can_change_field2(user, *args, **kwargs)`
- `ModelB.can_edit(user, *args, **kwargs)`
- `ModelC.can_edit(user, *args, **kwargs)`
- `ModelC.can_change_field3(user, *args, **kwargs)`
Note that
```
acl_base_decorator('can_edit', 'field1', ModelA, 'field2', \
on_instance=False)
```
would have the same effect that
```
acl_base_decorator('can_edit', ModelA, 'field1', 'field2', \
on_instance=False)
```
But don't do that, it's silly.
2018-05-07 18:24:04 +00:00
on_instance: When `on_instance` equals `False`, the decorator runs the
ACL method on the model class rather than on an instance. If an
instance need to fetched, it is done calling the assumed existing
method `get_instance` of the model, with the arguments originally
passed to the view.
2018-05-07 16:57:08 +00:00
Returns:
The user is either redirected to their own page with an explanation
message if at least one access is not granted, or to the view. In order
to avoid duplicate DB calls, when the `on_instance` flag equals `True`,
the instances are passed to the view. Example, with this decorator:
```
acl_base_decorator('can_edit', ModelA, 'field1', 'field2', ModelB,\
ModelC)
```
The view will be called like this:
```
view(request, instance_of_A, instance_of_b, *args, **kwargs)
```
where `*args` and `**kwargs` are the original view arguments.
"""
def group_targets():
2018-05-07 16:57:08 +00:00
"""This generator parses the targets of the decorator, yielding
2-tuples of (model, [fields]).
"""
current_target = None
current_fields = []
2018-05-07 16:57:08 +00:00
for target in targets:
2018-05-07 20:01:32 +00:00
if not isinstance(target, str):
if current_target:
yield (current_target, current_fields)
2018-05-07 16:57:08 +00:00
current_target = target
current_fields = []
else:
2018-05-07 16:57:08 +00:00
current_fields.append(target)
yield (current_target, current_fields)
def decorator(view):
2018-04-14 19:29:16 +00:00
"""The decorator to use on a specific view
"""
def wrapper(request, *args, **kwargs):
"""The wrapper used for a specific request"""
instances = []
def process_target(target, fields):
2018-05-07 16:57:08 +00:00
"""This function calls the methods on the target and checks for
the can_change_`field` method with the given fields. It also
stores the instances of models in order to avoid duplicate DB
calls for the view.
"""
if on_instance:
try:
target = target.get_instance(*args, **kwargs)
instances.append(target)
except target.DoesNotExist:
2019-09-05 23:08:53 +00:00
yield False, _("Nonexistent entry."), []
return
if hasattr(target, method_name):
can_fct = getattr(target, method_name)
yield can_fct(request.user, *args, **kwargs)
for field in fields:
can_change_fct = getattr(target, 'can_change_' + field)
yield can_change_fct(request.user, *args, **kwargs)
2018-05-07 20:01:32 +00:00
2019-09-05 23:08:53 +00:00
error_messages = []
2019-09-09 10:16:37 +00:00
warning_messages = []
2019-09-05 23:08:53 +00:00
for target, fields in group_targets():
for can, msg, permissions in process_target(target, fields):
if not can:
2019-09-06 14:05:45 +00:00
error_messages.append(acl_error_message(msg, permissions))
2019-09-09 10:16:37 +00:00
elif msg:
warning_messages.append(acl_error_message(msg, permissions))
if warning_messages:
for msg in warning_messages:
messages.warning(request, msg)
2019-09-06 14:05:45 +00:00
if error_messages:
for msg in error_messages:
messages.error(
2018-06-23 17:53:10 +00:00
request, msg or _("You don't have the right to access"
" this menu."))
if request.user.id is not None:
return redirect(reverse(
'users:profil',
kwargs={'userid': str(request.user.id)}
))
else:
return redirect(reverse(
'index',
))
return view(request, *chain(instances, args), **kwargs)
return wrapper
return decorator
def can_create(*models):
2018-05-07 16:57:08 +00:00
"""Decorator to check if an user can create the given models. It runs
`acl_base_decorator` with the flag `on_instance=False` and the method
'can_create'. See `acl_base_decorator` documentation for further details.
"""
return acl_base_decorator('can_create', *models, on_instance=False)
def can_edit(*targets):
2018-05-07 16:57:08 +00:00
"""Decorator to check if an user can edit the models.
It runs `acl_base_decorator` with the flag `on_instance=True` and the
method 'can_edit'. See `acl_base_decorator` documentation for further
details.
"""
return acl_base_decorator('can_edit', *targets)
def can_change(*targets):
"""Decorator to check if an user can edit a field of a model class.
2018-05-07 16:57:08 +00:00
Difference with can_edit : takes a class and not an instance
It runs `acl_base_decorator` with the flag `on_instance=False` and the
method 'can_change'. See `acl_base_decorator` documentation for further
details.
"""
return acl_base_decorator('can_change', *targets, on_instance=False)
def can_delete(*targets):
"""Decorator to check if an user can delete a model.
2018-05-07 16:57:08 +00:00
It runs `acl_base_decorator` with the flag `on_instance=True` and the
method 'can_edit'. See `acl_base_decorator` documentation for further
details.
"""
return acl_base_decorator('can_delete', *targets)
def can_delete_set(model):
"""Decorator which returns a list of detable models by request user.
If none of them, return an error"""
def decorator(view):
2018-04-14 19:29:16 +00:00
"""The decorator to use on a specific view
"""
def wrapper(request, *args, **kwargs):
2018-04-14 19:29:16 +00:00
"""The wrapper used for a specific request
"""
all_objects = model.objects.all()
instances_id = []
for instance in all_objects:
2018-04-15 13:34:51 +00:00
can, _msg = instance.can_delete(request.user)
if can:
instances_id.append(instance.id)
instances = model.objects.filter(id__in=instances_id)
if not instances:
2018-04-14 19:29:16 +00:00
messages.error(
2018-06-23 17:53:10 +00:00
request, _("You don't have the right to access this menu.")
)
2018-04-14 19:29:16 +00:00
return redirect(reverse(
'users:profil',
kwargs={'userid': str(request.user.id)}
))
return view(request, instances, *args, **kwargs)
return wrapper
return decorator
def can_view(*targets):
"""Decorator to check if an user can view a model.
2018-05-07 16:57:08 +00:00
It runs `acl_base_decorator` with the flag `on_instance=True` and the
method 'can_view'. See `acl_base_decorator` documentation for further
details.
"""
return acl_base_decorator('can_view', *targets)
def can_view_all(*targets):
"""Decorator to check if an user can view a class of model.
2018-05-07 16:57:08 +00:00
It runs `acl_base_decorator` with the flag `on_instance=False` and the
method 'can_view_all'. See `acl_base_decorator` documentation for further
details.
"""
return acl_base_decorator('can_view_all', *targets, on_instance=False)
def can_view_app(*apps_name):
"""Decorator to check if an user can view the applications.
"""
for app_name in apps_name:
assert app_name in sys.modules.keys()
2018-05-07 20:01:32 +00:00
return acl_base_decorator(
'can_view',
*chain(sys.modules[app_name] for app_name in apps_name),
on_instance=False
)
def can_edit_history(view):
"""Decorator to check if an user can edit history."""
def wrapper(request, *args, **kwargs):
2018-04-14 19:29:16 +00:00
"""The wrapper used for a specific request
"""
if request.user.has_perm('admin.change_logentry'):
return view(request, *args, **kwargs)
messages.error(
2018-03-06 15:38:47 +00:00
request,
2018-06-23 17:53:10 +00:00
_("You don't have the right to edit the history.")
)
2018-04-14 19:29:16 +00:00
return redirect(reverse(
'users:profil',
kwargs={'userid': str(request.user.id)}
))
return wrapper
2018-06-23 17:53:10 +00:00