admin.py 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. from django import forms
  2. from django.contrib import admin
  3. from django.contrib.auth.admin import UserAdmin as UserAdmin_
  4. from django.contrib.auth.models import Group, User
  5. from django.contrib.contenttypes.models import ContentType
  6. from django.core.exceptions import FieldError, ValidationError
  7. from utilities.forms.fields import ContentTypeMultipleChoiceField
  8. from .constants import *
  9. from .models import ObjectPermission, Token, UserConfig
  10. #
  11. # Inline models
  12. #
  13. class ObjectPermissionInline(admin.TabularInline):
  14. exclude = None
  15. extra = 3
  16. readonly_fields = ['object_types', 'actions', 'constraints']
  17. verbose_name = 'Permission'
  18. verbose_name_plural = 'Permissions'
  19. def get_queryset(self, request):
  20. return super().get_queryset(request).prefetch_related('objectpermission__object_types').nocache()
  21. @staticmethod
  22. def object_types(instance):
  23. # Don't call .values_list() here because we want to reference the pre-fetched object_types
  24. return ', '.join([ot.name for ot in instance.objectpermission.object_types.all()])
  25. @staticmethod
  26. def actions(instance):
  27. return ', '.join(instance.objectpermission.actions)
  28. @staticmethod
  29. def constraints(instance):
  30. return instance.objectpermission.constraints
  31. class GroupObjectPermissionInline(ObjectPermissionInline):
  32. model = Group.object_permissions.through
  33. class UserObjectPermissionInline(ObjectPermissionInline):
  34. model = User.object_permissions.through
  35. class UserConfigInline(admin.TabularInline):
  36. model = UserConfig
  37. readonly_fields = ('data',)
  38. can_delete = False
  39. verbose_name = 'Preferences'
  40. #
  41. # Users & groups
  42. #
  43. # Unregister the built-in GroupAdmin and UserAdmin classes so that we can use our custom admin classes below
  44. admin.site.unregister(Group)
  45. admin.site.unregister(User)
  46. @admin.register(Group)
  47. class GroupAdmin(admin.ModelAdmin):
  48. fields = ('name',)
  49. list_display = ('name', 'user_count')
  50. ordering = ('name',)
  51. search_fields = ('name',)
  52. inlines = [GroupObjectPermissionInline]
  53. @staticmethod
  54. def user_count(obj):
  55. return obj.user_set.count()
  56. @admin.register(User)
  57. class UserAdmin(UserAdmin_):
  58. list_display = [
  59. 'username', 'email', 'first_name', 'last_name', 'is_superuser', 'is_staff', 'is_active'
  60. ]
  61. fieldsets = (
  62. (None, {'fields': ('username', 'password', 'first_name', 'last_name', 'email')}),
  63. ('Groups', {'fields': ('groups',)}),
  64. ('Status', {
  65. 'fields': ('is_active', 'is_staff', 'is_superuser'),
  66. }),
  67. ('Important dates', {'fields': ('last_login', 'date_joined')}),
  68. )
  69. filter_horizontal = ('groups',)
  70. list_filter = ('is_active', 'is_staff', 'is_superuser', 'groups__name')
  71. def get_inlines(self, request, obj):
  72. if obj is not None:
  73. return (UserObjectPermissionInline, UserConfigInline)
  74. return ()
  75. #
  76. # REST API tokens
  77. #
  78. class TokenAdminForm(forms.ModelForm):
  79. key = forms.CharField(
  80. required=False,
  81. help_text="If no key is provided, one will be generated automatically."
  82. )
  83. class Meta:
  84. fields = [
  85. 'user', 'key', 'write_enabled', 'expires', 'description'
  86. ]
  87. model = Token
  88. @admin.register(Token)
  89. class TokenAdmin(admin.ModelAdmin):
  90. form = TokenAdminForm
  91. list_display = [
  92. 'key', 'user', 'created', 'expires', 'write_enabled', 'description'
  93. ]
  94. #
  95. # Permissions
  96. #
  97. class ObjectPermissionForm(forms.ModelForm):
  98. object_types = ContentTypeMultipleChoiceField(
  99. queryset=ContentType.objects.all(),
  100. limit_choices_to=OBJECTPERMISSION_OBJECT_TYPES
  101. )
  102. can_view = forms.BooleanField(required=False)
  103. can_add = forms.BooleanField(required=False)
  104. can_change = forms.BooleanField(required=False)
  105. can_delete = forms.BooleanField(required=False)
  106. class Meta:
  107. model = ObjectPermission
  108. exclude = []
  109. help_texts = {
  110. 'actions': 'Actions granted in addition to those listed above',
  111. 'constraints': 'JSON expression of a queryset filter that will return only permitted objects. Leave null '
  112. 'to match all objects of this type. A list of multiple objects will result in a logical OR '
  113. 'operation.'
  114. }
  115. labels = {
  116. 'actions': 'Additional actions'
  117. }
  118. widgets = {
  119. 'constraints': forms.Textarea(attrs={'class': 'vLargeTextField'})
  120. }
  121. def __init__(self, *args, **kwargs):
  122. super().__init__(*args, **kwargs)
  123. # Make the actions field optional since the admin form uses it only for non-CRUD actions
  124. self.fields['actions'].required = False
  125. # Order group and user fields
  126. self.fields['groups'].queryset = self.fields['groups'].queryset.order_by('name')
  127. self.fields['users'].queryset = self.fields['users'].queryset.order_by('username')
  128. # Check the appropriate checkboxes when editing an existing ObjectPermission
  129. if self.instance.pk:
  130. for action in ['view', 'add', 'change', 'delete']:
  131. if action in self.instance.actions:
  132. self.fields[f'can_{action}'].initial = True
  133. self.instance.actions.remove(action)
  134. def clean(self):
  135. super().clean()
  136. object_types = self.cleaned_data.get('object_types')
  137. constraints = self.cleaned_data.get('constraints')
  138. # Append any of the selected CRUD checkboxes to the actions list
  139. if not self.cleaned_data.get('actions'):
  140. self.cleaned_data['actions'] = list()
  141. for action in ['view', 'add', 'change', 'delete']:
  142. if self.cleaned_data[f'can_{action}'] and action not in self.cleaned_data['actions']:
  143. self.cleaned_data['actions'].append(action)
  144. # At least one action must be specified
  145. if not self.cleaned_data['actions']:
  146. raise ValidationError("At least one action must be selected.")
  147. # Validate the specified model constraints by attempting to execute a query. We don't care whether the query
  148. # returns anything; we just want to make sure the specified constraints are valid.
  149. if object_types and constraints:
  150. # Normalize the constraints to a list of dicts
  151. if type(constraints) is not list:
  152. constraints = [constraints]
  153. for ct in object_types:
  154. model = ct.model_class()
  155. try:
  156. model.objects.filter(*[Q(**c) for c in constraints]).exists()
  157. except FieldError as e:
  158. raise ValidationError({
  159. 'constraints': f'Invalid filter for {model}: {e}'
  160. })
  161. class ActionListFilter(admin.SimpleListFilter):
  162. title = 'action'
  163. parameter_name = 'action'
  164. def lookups(self, request, model_admin):
  165. options = set()
  166. for action_list in ObjectPermission.objects.values_list('actions', flat=True).distinct():
  167. options.update(action_list)
  168. return [
  169. (action, action) for action in sorted(options)
  170. ]
  171. def queryset(self, request, queryset):
  172. if self.value():
  173. return queryset.filter(actions=[self.value()])
  174. class ObjectTypeListFilter(admin.SimpleListFilter):
  175. title = 'object type'
  176. parameter_name = 'object_type'
  177. def lookups(self, request, model_admin):
  178. object_types = ObjectPermission.objects.values_list('object_types__pk', flat=True).distinct()
  179. content_types = ContentType.objects.filter(pk__in=object_types).order_by('app_label', 'model')
  180. return [
  181. (ct.pk, ct) for ct in content_types
  182. ]
  183. def queryset(self, request, queryset):
  184. if self.value():
  185. return queryset.filter(object_types=self.value())
  186. @admin.register(ObjectPermission)
  187. class ObjectPermissionAdmin(admin.ModelAdmin):
  188. actions = ('enable', 'disable')
  189. fieldsets = (
  190. (None, {
  191. 'fields': ('name', 'description', 'enabled')
  192. }),
  193. ('Actions', {
  194. 'fields': (('can_view', 'can_add', 'can_change', 'can_delete'), 'actions')
  195. }),
  196. ('Objects', {
  197. 'fields': ('object_types',)
  198. }),
  199. ('Assignment', {
  200. 'fields': ('groups', 'users')
  201. }),
  202. ('Constraints', {
  203. 'fields': ('constraints',),
  204. 'classes': ('monospace',)
  205. }),
  206. )
  207. filter_horizontal = ('object_types', 'groups', 'users')
  208. form = ObjectPermissionForm
  209. list_display = [
  210. 'name', 'enabled', 'list_models', 'list_users', 'list_groups', 'actions', 'constraints', 'description',
  211. ]
  212. list_filter = [
  213. 'enabled', ActionListFilter, ObjectTypeListFilter, 'groups', 'users'
  214. ]
  215. search_fields = ['actions', 'constraints', 'description', 'name']
  216. def get_queryset(self, request):
  217. return super().get_queryset(request).prefetch_related('object_types', 'users', 'groups')
  218. def list_models(self, obj):
  219. return ', '.join([f"{ct}" for ct in obj.object_types.all()])
  220. list_models.short_description = 'Models'
  221. def list_users(self, obj):
  222. return ', '.join([u.username for u in obj.users.all()])
  223. list_users.short_description = 'Users'
  224. def list_groups(self, obj):
  225. return ', '.join([g.name for g in obj.groups.all()])
  226. list_groups.short_description = 'Groups'
  227. #
  228. # Admin actions
  229. #
  230. def enable(self, request, queryset):
  231. updated = queryset.update(enabled=True)
  232. self.message_user(request, f"Enabled {updated} permissions")
  233. def disable(self, request, queryset):
  234. updated = queryset.update(enabled=False)
  235. self.message_user(request, f"Disabled {updated} permissions")