2024-02-07 01:26:49 +00:00
|
|
|
# Copyright (C) 2018-2024 by BDE ENS Paris-Saclay
|
2020-03-31 02:16:30 +00:00
|
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
2021-06-15 22:01:35 +00:00
|
|
|
from collections import OrderedDict
|
2020-04-25 23:20:46 +00:00
|
|
|
from datetime import date
|
2020-03-31 02:16:30 +00:00
|
|
|
|
2020-08-15 21:27:58 +00:00
|
|
|
from django.contrib.auth.mixins import LoginRequiredMixin
|
2020-08-31 19:11:00 +00:00
|
|
|
from django.contrib.auth.models import User
|
2020-08-13 13:20:15 +00:00
|
|
|
from django.core.exceptions import PermissionDenied
|
2020-09-11 20:52:16 +00:00
|
|
|
from django.db import transaction
|
2020-08-05 19:07:31 +00:00
|
|
|
from django.db.models import Q
|
2020-04-18 01:27:12 +00:00
|
|
|
from django.forms import HiddenInput
|
2020-09-07 19:33:23 +00:00
|
|
|
from django.http import Http404
|
2020-04-25 23:20:46 +00:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
2020-08-13 13:20:15 +00:00
|
|
|
from django.views.generic import UpdateView, TemplateView, CreateView
|
2020-07-25 17:40:30 +00:00
|
|
|
from member.models import Membership
|
2020-04-18 01:27:12 +00:00
|
|
|
|
|
|
|
from .backends import PermissionBackend
|
2020-07-25 17:40:30 +00:00
|
|
|
from .models import Role
|
2020-08-31 19:11:00 +00:00
|
|
|
from .tables import RightsTable, SuperuserTable
|
2020-03-31 02:16:30 +00:00
|
|
|
|
|
|
|
|
|
|
|
class ProtectQuerysetMixin:
|
2020-04-18 01:27:12 +00:00
|
|
|
"""
|
2020-04-25 23:20:46 +00:00
|
|
|
This is a View class decorator and not a proper View class.
|
2020-04-18 01:27:12 +00:00
|
|
|
Ensure that the user has the right to see or update objects.
|
|
|
|
Display 404 error if the user can't see an object, remove the fields the user can't
|
|
|
|
update on an update form (useful if the user can't change only specified fields).
|
|
|
|
"""
|
2020-09-07 19:33:23 +00:00
|
|
|
def get_queryset(self, filter_permissions=True, **kwargs):
|
2020-03-31 02:16:30 +00:00
|
|
|
qs = super().get_queryset(**kwargs)
|
2021-06-15 12:40:32 +00:00
|
|
|
return qs.filter(PermissionBackend.filter_queryset(self.request, qs.model, "view")).distinct()\
|
2020-09-07 19:33:23 +00:00
|
|
|
if filter_permissions else qs
|
|
|
|
|
|
|
|
def get_object(self, queryset=None):
|
|
|
|
try:
|
|
|
|
return super().get_object(queryset)
|
|
|
|
except Http404 as e:
|
2024-08-04 19:58:57 +00:00
|
|
|
if self.get_queryset(filter_permissions=False).count() == self.get_queryset().count():
|
2020-09-07 19:33:23 +00:00
|
|
|
raise e
|
2024-08-04 19:58:57 +00:00
|
|
|
raise PermissionDenied()
|
2020-04-18 01:27:12 +00:00
|
|
|
|
|
|
|
def get_form(self, form_class=None):
|
|
|
|
form = super().get_form(form_class)
|
|
|
|
|
|
|
|
if not isinstance(self, UpdateView):
|
|
|
|
return form
|
|
|
|
|
|
|
|
# If we are in an UpdateView, we display only the fields the user has right to see.
|
|
|
|
# No worry if the user change the hidden fields: a 403 error will be performed if the user tries to make
|
|
|
|
# a custom request.
|
|
|
|
# We could also delete the field, but some views might be affected.
|
2020-10-25 20:49:16 +00:00
|
|
|
meta = form.instance._meta
|
2020-04-18 01:27:12 +00:00
|
|
|
for key in form.base_fields:
|
2021-06-15 12:40:32 +00:00
|
|
|
if not PermissionBackend.check_perm(self.request,
|
2020-10-25 20:49:16 +00:00
|
|
|
f"{meta.app_label}.change_{meta.model_name}_" + key, self.object):
|
2020-04-18 01:27:12 +00:00
|
|
|
form.fields[key].widget = HiddenInput()
|
|
|
|
|
|
|
|
return form
|
2020-04-25 23:20:46 +00:00
|
|
|
|
2020-09-11 20:52:16 +00:00
|
|
|
@transaction.atomic
|
2020-08-30 14:23:55 +00:00
|
|
|
def form_valid(self, form):
|
|
|
|
"""
|
|
|
|
Submit the form, if the page is a FormView.
|
|
|
|
If a PermissionDenied exception is raised, catch the error and display it at the top of the form.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
return super().form_valid(form)
|
|
|
|
except PermissionDenied:
|
|
|
|
if isinstance(self, UpdateView):
|
|
|
|
form.add_error(None, _("You don't have the permission to update this instance of the model \"{model}\""
|
|
|
|
" with these parameters. Please correct your data and retry.")
|
|
|
|
.format(model=self.model._meta.verbose_name))
|
|
|
|
else:
|
|
|
|
form.add_error(None, _("You don't have the permission to create an instance of the model \"{model}\""
|
|
|
|
" with these parameters. Please correct your data and retry.")
|
|
|
|
.format(model=self.model._meta.verbose_name))
|
|
|
|
return self.form_invalid(form)
|
|
|
|
|
2020-04-25 23:20:46 +00:00
|
|
|
|
2020-08-15 21:27:58 +00:00
|
|
|
class ProtectedCreateView(LoginRequiredMixin, CreateView):
|
2020-08-13 13:20:15 +00:00
|
|
|
"""
|
|
|
|
Extends a CreateView to check is the user has the right to create a sample instance of the given Model.
|
|
|
|
If not, a 403 error is displayed.
|
|
|
|
"""
|
|
|
|
|
2020-12-23 17:45:05 +00:00
|
|
|
def get_sample_object(self): # pragma: no cover
|
2020-08-13 13:20:15 +00:00
|
|
|
"""
|
|
|
|
return a sample instance of the Model.
|
|
|
|
It should be valid (can be stored properly in database), but must not collide with existing data.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def dispatch(self, request, *args, **kwargs):
|
2020-08-15 21:27:58 +00:00
|
|
|
# Check that the user is authenticated before that he/she has the permission to access here
|
|
|
|
if not request.user.is_authenticated:
|
|
|
|
return self.handle_no_permission()
|
|
|
|
|
2020-08-13 13:20:15 +00:00
|
|
|
model_class = self.model
|
|
|
|
# noinspection PyProtectedMember
|
|
|
|
app_label, model_name = model_class._meta.app_label, model_class._meta.model_name.lower()
|
|
|
|
perm = app_label + ".add_" + model_name
|
2021-06-15 12:40:32 +00:00
|
|
|
if not PermissionBackend.check_perm(request, perm, self.get_sample_object()):
|
2020-08-13 13:20:15 +00:00
|
|
|
raise PermissionDenied(_("You don't have the permission to add an instance of model "
|
|
|
|
"{app_label}.{model_name}.").format(app_label=app_label, model_name=model_name))
|
|
|
|
return super().dispatch(request, *args, **kwargs)
|
|
|
|
|
|
|
|
|
2020-04-25 23:20:46 +00:00
|
|
|
class RightsView(TemplateView):
|
|
|
|
template_name = "permission/all_rights.html"
|
2020-07-30 15:30:21 +00:00
|
|
|
extra_context = {"title": _("Rights")}
|
2020-04-25 23:20:46 +00:00
|
|
|
|
|
|
|
def get_context_data(self, **kwargs):
|
|
|
|
context = super().get_context_data(**kwargs)
|
|
|
|
|
|
|
|
context["title"] = _("All rights")
|
|
|
|
roles = Role.objects.all()
|
|
|
|
context["roles"] = roles
|
|
|
|
if self.request.user.is_authenticated:
|
|
|
|
active_memberships = Membership.objects.filter(user=self.request.user,
|
|
|
|
date_start__lte=date.today(),
|
|
|
|
date_end__gte=date.today()).all()
|
|
|
|
else:
|
|
|
|
active_memberships = Membership.objects.none()
|
|
|
|
|
|
|
|
for role in roles:
|
|
|
|
role.clubs = [membership.club for membership in active_memberships if role in membership.roles.all()]
|
|
|
|
|
2020-08-05 19:07:31 +00:00
|
|
|
if self.request.user.is_authenticated:
|
|
|
|
special_memberships = Membership.objects.filter(
|
2020-08-15 22:35:13 +00:00
|
|
|
date_start__lte=date.today(),
|
|
|
|
date_end__gte=date.today(),
|
2022-08-29 11:19:19 +00:00
|
|
|
).filter(roles__in=Role.objects.filter((~(Q(name="Adhérent⋅e BDE")
|
|
|
|
| Q(name="Adhérent⋅e Kfet")
|
2020-08-31 19:11:00 +00:00
|
|
|
| Q(name="Membre de club")
|
|
|
|
| Q(name="Bureau de club"))
|
2020-08-31 19:15:09 +00:00
|
|
|
& Q(weirole__isnull=True))))\
|
|
|
|
.order_by("club__name", "user__last_name")\
|
2020-08-05 19:07:31 +00:00
|
|
|
.distinct().all()
|
2020-08-31 19:11:00 +00:00
|
|
|
context["special_memberships_table"] = RightsTable(special_memberships, prefix="clubs-")
|
2020-08-31 19:15:09 +00:00
|
|
|
context["superusers"] = SuperuserTable(User.objects.filter(is_superuser=True).order_by("last_name").all(),
|
|
|
|
prefix="superusers-")
|
2020-08-05 19:07:31 +00:00
|
|
|
|
2020-04-25 23:20:46 +00:00
|
|
|
return context
|
2021-06-15 22:01:35 +00:00
|
|
|
|
|
|
|
|
|
|
|
class ScopesView(LoginRequiredMixin, TemplateView):
|
|
|
|
template_name = "permission/scopes.html"
|
|
|
|
|
|
|
|
def get_context_data(self, **kwargs):
|
|
|
|
context = super().get_context_data(**kwargs)
|
|
|
|
|
|
|
|
from oauth2_provider.models import Application
|
|
|
|
from .scopes import PermissionScopes
|
|
|
|
|
|
|
|
scopes = PermissionScopes()
|
|
|
|
context["scopes"] = {}
|
|
|
|
all_scopes = scopes.get_all_scopes()
|
2021-06-17 18:56:59 +00:00
|
|
|
for app in Application.objects.filter(user=self.request.user).all():
|
2021-06-15 22:01:35 +00:00
|
|
|
available_scopes = scopes.get_available_scopes(app)
|
|
|
|
context["scopes"][app] = OrderedDict()
|
|
|
|
items = [(k, v) for (k, v) in all_scopes.items() if k in available_scopes]
|
|
|
|
items.sort(key=lambda x: (int(x[0].split("_")[1]), int(x[0].split("_")[0])))
|
|
|
|
for k, v in items:
|
|
|
|
context["scopes"][app][k] = v
|
|
|
|
|
|
|
|
return context
|