admin.py 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. from django import forms
  2. from django.contrib import admin
  3. from django.contrib.auth.admin import UserAdmin as UserAdmin_
  4. from django.contrib.auth.models import Group, User
  5. from django.contrib.contenttypes.models import ContentType
  6. from django.core.exceptions import FieldError, ValidationError
  7. from utilities.forms.fields import ContentTypeMultipleChoiceField
  8. from .constants import *
  9. from .models import AdminGroup, AdminUser, ObjectPermission, Token, UserConfig
  10. #
  11. # Inline models
  12. #
  13. class ObjectPermissionInline(admin.TabularInline):
  14. exclude = None
  15. extra = 3
  16. readonly_fields = ['object_types', 'actions', 'constraints']
  17. verbose_name = 'Permission'
  18. verbose_name_plural = 'Permissions'
  19. def get_queryset(self, request):
  20. return super().get_queryset(request).prefetch_related('objectpermission__object_types').nocache()
  21. @staticmethod
  22. def object_types(instance):
  23. # Don't call .values_list() here because we want to reference the pre-fetched object_types
  24. return ', '.join([ot.name for ot in instance.objectpermission.object_types.all()])
  25. @staticmethod
  26. def actions(instance):
  27. return ', '.join(instance.objectpermission.actions)
  28. @staticmethod
  29. def constraints(instance):
  30. return instance.objectpermission.constraints
  31. class GroupObjectPermissionInline(ObjectPermissionInline):
  32. model = AdminGroup.object_permissions.through
  33. class UserObjectPermissionInline(ObjectPermissionInline):
  34. model = AdminUser.object_permissions.through
  35. class UserConfigInline(admin.TabularInline):
  36. model = UserConfig
  37. readonly_fields = ('data',)
  38. can_delete = False
  39. verbose_name = 'Preferences'
  40. #
  41. # Users & groups
  42. #
  43. # Unregister the built-in GroupAdmin and UserAdmin classes so that we can use our custom admin classes below
  44. admin.site.unregister(Group)
  45. admin.site.unregister(User)
  46. @admin.register(AdminGroup)
  47. class GroupAdmin(admin.ModelAdmin):
  48. fields = ('name',)
  49. list_display = ('name', 'user_count')
  50. ordering = ('name',)
  51. search_fields = ('name',)
  52. inlines = [GroupObjectPermissionInline]
  53. @staticmethod
  54. def user_count(obj):
  55. return obj.user_set.count()
  56. @admin.register(AdminUser)
  57. class UserAdmin(UserAdmin_):
  58. list_display = [
  59. 'username', 'email', 'first_name', 'last_name', 'is_superuser', 'is_staff', 'is_active'
  60. ]
  61. fieldsets = (
  62. (None, {'fields': ('username', 'password', 'first_name', 'last_name', 'email')}),
  63. ('Groups', {'fields': ('groups',)}),
  64. ('Status', {
  65. 'fields': ('is_active', 'is_staff', 'is_superuser'),
  66. }),
  67. ('Important dates', {'fields': ('last_login', 'date_joined')}),
  68. )
  69. filter_horizontal = ('groups',)
  70. def get_inlines(self, request, obj):
  71. if obj is not None:
  72. return (UserObjectPermissionInline, UserConfigInline)
  73. return ()
  74. #
  75. # REST API tokens
  76. #
  77. class TokenAdminForm(forms.ModelForm):
  78. key = forms.CharField(
  79. required=False,
  80. help_text="If no key is provided, one will be generated automatically."
  81. )
  82. class Meta:
  83. fields = [
  84. 'user', 'key', 'write_enabled', 'expires', 'description'
  85. ]
  86. model = Token
  87. @admin.register(Token)
  88. class TokenAdmin(admin.ModelAdmin):
  89. form = TokenAdminForm
  90. list_display = [
  91. 'key', 'user', 'created', 'expires', 'write_enabled', 'description'
  92. ]
  93. #
  94. # Permissions
  95. #
  96. class ObjectPermissionForm(forms.ModelForm):
  97. object_types = ContentTypeMultipleChoiceField(
  98. queryset=ContentType.objects.all(),
  99. limit_choices_to=OBJECTPERMISSION_OBJECT_TYPES
  100. )
  101. can_view = forms.BooleanField(required=False)
  102. can_add = forms.BooleanField(required=False)
  103. can_change = forms.BooleanField(required=False)
  104. can_delete = forms.BooleanField(required=False)
  105. class Meta:
  106. model = ObjectPermission
  107. exclude = []
  108. help_texts = {
  109. 'actions': 'Actions granted in addition to those listed above',
  110. 'constraints': 'JSON expression of a queryset filter that will return only permitted objects. Leave null '
  111. 'to match all objects of this type. A list of multiple objects will result in a logical OR '
  112. 'operation.'
  113. }
  114. labels = {
  115. 'actions': 'Additional actions'
  116. }
  117. widgets = {
  118. 'constraints': forms.Textarea(attrs={'class': 'vLargeTextField'})
  119. }
  120. def __init__(self, *args, **kwargs):
  121. super().__init__(*args, **kwargs)
  122. # Make the actions field optional since the admin form uses it only for non-CRUD actions
  123. self.fields['actions'].required = False
  124. # Order group and user fields
  125. self.fields['groups'].queryset = self.fields['groups'].queryset.order_by('name')
  126. self.fields['users'].queryset = self.fields['users'].queryset.order_by('username')
  127. # Check the appropriate checkboxes when editing an existing ObjectPermission
  128. if self.instance.pk:
  129. for action in ['view', 'add', 'change', 'delete']:
  130. if action in self.instance.actions:
  131. self.fields[f'can_{action}'].initial = True
  132. self.instance.actions.remove(action)
  133. def clean(self):
  134. super().clean()
  135. object_types = self.cleaned_data.get('object_types')
  136. constraints = self.cleaned_data.get('constraints')
  137. # Append any of the selected CRUD checkboxes to the actions list
  138. if not self.cleaned_data.get('actions'):
  139. self.cleaned_data['actions'] = list()
  140. for action in ['view', 'add', 'change', 'delete']:
  141. if self.cleaned_data[f'can_{action}'] and action not in self.cleaned_data['actions']:
  142. self.cleaned_data['actions'].append(action)
  143. # At least one action must be specified
  144. if not self.cleaned_data['actions']:
  145. raise ValidationError("At least one action must be selected.")
  146. # Validate the specified model constraints by attempting to execute a query. We don't care whether the query
  147. # returns anything; we just want to make sure the specified constraints are valid.
  148. if object_types and constraints:
  149. # Normalize the constraints to a list of dicts
  150. if type(constraints) is not list:
  151. constraints = [constraints]
  152. for ct in object_types:
  153. model = ct.model_class()
  154. try:
  155. model.objects.filter(*[Q(**c) for c in constraints]).exists()
  156. except FieldError as e:
  157. raise ValidationError({
  158. 'constraints': f'Invalid filter for {model}: {e}'
  159. })
  160. class ActionListFilter(admin.SimpleListFilter):
  161. title = 'action'
  162. parameter_name = 'action'
  163. def lookups(self, request, model_admin):
  164. options = set()
  165. for action_list in ObjectPermission.objects.values_list('actions', flat=True).distinct():
  166. options.update(action_list)
  167. return [
  168. (action, action) for action in sorted(options)
  169. ]
  170. def queryset(self, request, queryset):
  171. if self.value():
  172. return queryset.filter(actions=[self.value()])
  173. class ObjectTypeListFilter(admin.SimpleListFilter):
  174. title = 'object type'
  175. parameter_name = 'object_type'
  176. def lookups(self, request, model_admin):
  177. object_types = ObjectPermission.objects.values_list('object_types__pk', flat=True).distinct()
  178. content_types = ContentType.objects.filter(pk__in=object_types).order_by('app_label', 'model')
  179. return [
  180. (ct.pk, ct) for ct in content_types
  181. ]
  182. def queryset(self, request, queryset):
  183. if self.value():
  184. return queryset.filter(object_types=self.value())
  185. @admin.register(ObjectPermission)
  186. class ObjectPermissionAdmin(admin.ModelAdmin):
  187. actions = ('enable', 'disable')
  188. fieldsets = (
  189. (None, {
  190. 'fields': ('name', 'description', 'enabled')
  191. }),
  192. ('Actions', {
  193. 'fields': (('can_view', 'can_add', 'can_change', 'can_delete'), 'actions')
  194. }),
  195. ('Objects', {
  196. 'fields': ('object_types',)
  197. }),
  198. ('Assignment', {
  199. 'fields': ('groups', 'users')
  200. }),
  201. ('Constraints', {
  202. 'fields': ('constraints',),
  203. 'classes': ('monospace',)
  204. }),
  205. )
  206. filter_horizontal = ('object_types', 'groups', 'users')
  207. form = ObjectPermissionForm
  208. list_display = [
  209. 'name', 'enabled', 'list_models', 'list_users', 'list_groups', 'actions', 'constraints', 'description',
  210. ]
  211. list_filter = [
  212. 'enabled', ActionListFilter, ObjectTypeListFilter, 'groups', 'users'
  213. ]
  214. search_fields = ['actions', 'constraints', 'description', 'name']
  215. def get_queryset(self, request):
  216. return super().get_queryset(request).prefetch_related('object_types', 'users', 'groups')
  217. def list_models(self, obj):
  218. return ', '.join([f"{ct}" for ct in obj.object_types.all()])
  219. list_models.short_description = 'Models'
  220. def list_users(self, obj):
  221. return ', '.join([u.username for u in obj.users.all()])
  222. list_users.short_description = 'Users'
  223. def list_groups(self, obj):
  224. return ', '.join([g.name for g in obj.groups.all()])
  225. list_groups.short_description = 'Groups'
  226. #
  227. # Admin actions
  228. #
  229. def enable(self, request, queryset):
  230. updated = queryset.update(enabled=True)
  231. self.message_user(request, f"Enabled {updated} permissions")
  232. def disable(self, request, queryset):
  233. updated = queryset.update(enabled=False)
  234. self.message_user(request, f"Disabled {updated} permissions")