|
@@ -8,115 +8,89 @@ from django.db.models import Q
|
|
|
from users.models import ObjectPermission
|
|
from users.models import ObjectPermission
|
|
|
|
|
|
|
|
|
|
|
|
|
-class ViewExemptModelBackend(ModelBackend):
|
|
|
|
|
- """
|
|
|
|
|
- Custom implementation of Django's stock ModelBackend which allows for the exemption of arbitrary models from view
|
|
|
|
|
- permission enforcement.
|
|
|
|
|
- """
|
|
|
|
|
- def _get_user_permissions(self, user_obj):
|
|
|
|
|
-
|
|
|
|
|
- if not settings.EXEMPT_VIEW_PERMISSIONS:
|
|
|
|
|
- # No view permissions have been exempted from enforcement, so fall back to the built-in logic.
|
|
|
|
|
- return super()._get_user_permissions(user_obj)
|
|
|
|
|
-
|
|
|
|
|
- if '*' in settings.EXEMPT_VIEW_PERMISSIONS:
|
|
|
|
|
- # All view permissions have been exempted from enforcement, so include all view permissions when fetching
|
|
|
|
|
- # User permissions.
|
|
|
|
|
- return Permission.objects.filter(
|
|
|
|
|
- Q(user=user_obj) | Q(codename__startswith='view_')
|
|
|
|
|
- )
|
|
|
|
|
-
|
|
|
|
|
- # Return all Permissions that are either assigned to the user or that are view permissions listed in
|
|
|
|
|
- # EXEMPT_VIEW_PERMISSIONS.
|
|
|
|
|
- qs_filter = Q(user=user_obj)
|
|
|
|
|
- for model in settings.EXEMPT_VIEW_PERMISSIONS:
|
|
|
|
|
- app, name = model.split('.')
|
|
|
|
|
- qs_filter |= Q(content_type__app_label=app, codename=f'view_{name}')
|
|
|
|
|
- return Permission.objects.filter(qs_filter)
|
|
|
|
|
-
|
|
|
|
|
- def has_perm(self, user_obj, perm, obj=None):
|
|
|
|
|
-
|
|
|
|
|
- # Authenticated users need to have the view permissions cached for assessment
|
|
|
|
|
- if user_obj.is_authenticated:
|
|
|
|
|
- return super().has_perm(user_obj, perm, obj)
|
|
|
|
|
-
|
|
|
|
|
- # If this is a view permission, check whether the model has been exempted from enforcement
|
|
|
|
|
- try:
|
|
|
|
|
- app, codename = perm.split('.')
|
|
|
|
|
- action, model = codename.split('_')
|
|
|
|
|
- if action == 'view':
|
|
|
|
|
- if (
|
|
|
|
|
- # All models are exempt from view permission enforcement
|
|
|
|
|
- '*' in settings.EXEMPT_VIEW_PERMISSIONS
|
|
|
|
|
- ) or (
|
|
|
|
|
- # This specific model is exempt from view permission enforcement
|
|
|
|
|
- '{}.{}'.format(app, model) in settings.EXEMPT_VIEW_PERMISSIONS
|
|
|
|
|
- ):
|
|
|
|
|
- return True
|
|
|
|
|
- except ValueError:
|
|
|
|
|
- pass
|
|
|
|
|
-
|
|
|
|
|
-
|
|
|
|
|
class ObjectPermissionBackend(ModelBackend):
|
|
class ObjectPermissionBackend(ModelBackend):
|
|
|
- """
|
|
|
|
|
- Evaluates permission of a user to access or modify a specific object based on the assignment of ObjectPermissions
|
|
|
|
|
- either to the user directly or to a group of which the user is a member. Model-level permissions supersede this
|
|
|
|
|
- check: For example, if a user has the dcim.view_site model-level permission assigned, the ViewExemptModelBackend
|
|
|
|
|
- will grant permission before this backend is evaluated for permission to view a specific site.
|
|
|
|
|
- """
|
|
|
|
|
- def _get_all_permissions(self, user_obj):
|
|
|
|
|
|
|
+
|
|
|
|
|
+ def get_object_permissions(self, user_obj):
|
|
|
"""
|
|
"""
|
|
|
- Retrieve all ObjectPermissions assigned to this User (either directly or through a Group) and return the model-
|
|
|
|
|
- level equivalent codenames.
|
|
|
|
|
|
|
+ Return all model-level permissions granted to the user by an ObjectPermission.
|
|
|
"""
|
|
"""
|
|
|
- perm_names = set()
|
|
|
|
|
- for obj_perm in ObjectPermission.objects.filter(
|
|
|
|
|
- Q(users=user_obj) | Q(groups__user=user_obj)
|
|
|
|
|
- ).prefetch_related('model'):
|
|
|
|
|
- for action in ['view', 'add', 'change', 'delete']:
|
|
|
|
|
- if getattr(obj_perm, f"can_{action}"):
|
|
|
|
|
- perm_names.add(f"{obj_perm.model.app_label}.{action}_{obj_perm.model.model}")
|
|
|
|
|
- return perm_names
|
|
|
|
|
|
|
+ if not hasattr(user_obj, '_object_perm_cache'):
|
|
|
|
|
+
|
|
|
|
|
+ # Cache all assigned ObjectPermissions on the User instance
|
|
|
|
|
+ perms = set()
|
|
|
|
|
+ for obj_perm in ObjectPermission.objects.filter(
|
|
|
|
|
+ Q(users=user_obj) |
|
|
|
|
|
+ Q(groups__user=user_obj)
|
|
|
|
|
+ ).prefetch_related('model'):
|
|
|
|
|
+ for action in ['view', 'add', 'change', 'delete']:
|
|
|
|
|
+ if getattr(obj_perm, f"can_{action}"):
|
|
|
|
|
+ perms.add(f"{obj_perm.model.app_label}.{action}_{obj_perm.model.model}")
|
|
|
|
|
+ setattr(user_obj, '_object_perm_cache', perms)
|
|
|
|
|
+
|
|
|
|
|
+ return user_obj._object_perm_cache
|
|
|
|
|
|
|
|
def get_all_permissions(self, user_obj, obj=None):
|
|
def get_all_permissions(self, user_obj, obj=None):
|
|
|
- """
|
|
|
|
|
- Get all model-level permissions assigned by this backend. Permissions are cached on the User instance.
|
|
|
|
|
- """
|
|
|
|
|
|
|
+
|
|
|
|
|
+ # Handle inactive/anonymous users
|
|
|
if not user_obj.is_active or user_obj.is_anonymous:
|
|
if not user_obj.is_active or user_obj.is_anonymous:
|
|
|
return set()
|
|
return set()
|
|
|
- if not hasattr(user_obj, '_obj_perm_cache'):
|
|
|
|
|
- user_obj._obj_perm_cache = self._get_all_permissions(user_obj)
|
|
|
|
|
- return user_obj._obj_perm_cache
|
|
|
|
|
|
|
+
|
|
|
|
|
+ # Cache model-level permissions on the User instance
|
|
|
|
|
+ if not hasattr(user_obj, '_perm_cache'):
|
|
|
|
|
+ user_obj._perm_cache = {
|
|
|
|
|
+ *self.get_user_permissions(user_obj, obj=obj),
|
|
|
|
|
+ *self.get_group_permissions(user_obj, obj=obj),
|
|
|
|
|
+ *self.get_object_permissions(user_obj)
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ return user_obj._perm_cache
|
|
|
|
|
|
|
|
def has_perm(self, user_obj, perm, obj=None):
|
|
def has_perm(self, user_obj, perm, obj=None):
|
|
|
|
|
+ app_label, codename = perm.split('.')
|
|
|
|
|
+ action, model_name = codename.split('_')
|
|
|
|
|
|
|
|
- # If no object is specified, look for any matching ObjectPermissions. If one or more are found, this indicates
|
|
|
|
|
- # that the user has permission to perform the requested action on at least *some* objects, but not necessarily
|
|
|
|
|
- # on all of them.
|
|
|
|
|
|
|
+ # If this is a view permission, check whether the model has been exempted from enforcement
|
|
|
|
|
+ if action == 'view':
|
|
|
|
|
+ if (
|
|
|
|
|
+ # All models are exempt from view permission enforcement
|
|
|
|
|
+ '*' in settings.EXEMPT_VIEW_PERMISSIONS
|
|
|
|
|
+ ) or (
|
|
|
|
|
+ # This specific model is exempt from view permission enforcement
|
|
|
|
|
+ '{}.{}'.format(app_label, model_name) in settings.EXEMPT_VIEW_PERMISSIONS
|
|
|
|
|
+ ):
|
|
|
|
|
+ return True
|
|
|
|
|
+
|
|
|
|
|
+ # If no object is specified, evaluate model-level permissions. The presence of a permission in this set tells
|
|
|
|
|
+ # us that the user has permission for *some* objects, but not necessarily a specific object.
|
|
|
if obj is None:
|
|
if obj is None:
|
|
|
return perm in self.get_all_permissions(user_obj)
|
|
return perm in self.get_all_permissions(user_obj)
|
|
|
|
|
|
|
|
- attrs = ObjectPermission.objects.get_attr_constraints(user_obj, perm)
|
|
|
|
|
-
|
|
|
|
|
- # No ObjectPermissions found for this combination of user, model, and action
|
|
|
|
|
- if not attrs:
|
|
|
|
|
- return
|
|
|
|
|
-
|
|
|
|
|
|
|
+ # Sanity check: Ensure that the requested permission applies to the specified object
|
|
|
model = obj._meta.model
|
|
model = obj._meta.model
|
|
|
-
|
|
|
|
|
- # Check that the requested permission applies to the specified object
|
|
|
|
|
- app_label, codename = perm.split('.')
|
|
|
|
|
- action, model_name = codename.split('_')
|
|
|
|
|
if model._meta.label_lower != '.'.join((app_label, model_name)):
|
|
if model._meta.label_lower != '.'.join((app_label, model_name)):
|
|
|
raise ValueError(f"Invalid permission {perm} for model {model}")
|
|
raise ValueError(f"Invalid permission {perm} for model {model}")
|
|
|
|
|
|
|
|
- # Attempt to retrieve the model from the database using the attributes defined in the
|
|
|
|
|
- # ObjectPermission. If we have a match, assert that the user has permission.
|
|
|
|
|
- if model.objects.filter(attrs, pk=obj.pk).exists():
|
|
|
|
|
|
|
+ # If the user has been granted model-level permission for the object, return True
|
|
|
|
|
+ model_perms = {
|
|
|
|
|
+ *self.get_user_permissions(user_obj),
|
|
|
|
|
+ *self.get_group_permissions(user_obj),
|
|
|
|
|
+ }
|
|
|
|
|
+ if perm in model_perms:
|
|
|
return True
|
|
return True
|
|
|
|
|
|
|
|
|
|
+ # Gather all ObjectPermissions pertinent to the requested permission. If none are found, the User has no
|
|
|
|
|
+ # applicable permissions.
|
|
|
|
|
+ attrs = ObjectPermission.objects.get_attr_constraints(user_obj, perm)
|
|
|
|
|
+ if not attrs:
|
|
|
|
|
+ return False
|
|
|
|
|
+
|
|
|
|
|
+ # Permission to perform the requested action on the object depends on whether the specified object matches
|
|
|
|
|
+ # the specified attributes. Note that this check is made against the *database* record representing the object,
|
|
|
|
|
+ # not the instance itself.
|
|
|
|
|
+ return model.objects.filter(attrs, pk=obj.pk).exists()
|
|
|
|
|
+
|
|
|
|
|
|
|
|
-class RemoteUserBackend(ViewExemptModelBackend, RemoteUserBackend_):
|
|
|
|
|
|
|
+class RemoteUserBackend(RemoteUserBackend_):
|
|
|
"""
|
|
"""
|
|
|
Custom implementation of Django's RemoteUserBackend which provides configuration hooks for basic customization.
|
|
Custom implementation of Django's RemoteUserBackend which provides configuration hooks for basic customization.
|
|
|
"""
|
|
"""
|