admin.py 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291
  1. from django import forms
  2. from django.contrib import admin
  3. from django.contrib.auth.admin import UserAdmin as UserAdmin_
  4. from django.contrib.auth.models import Group, User
  5. from django.contrib.contenttypes.models import ContentType
  6. from django.core.exceptions import FieldError, ValidationError
  7. from django.db.models import Q
  8. from extras.admin import order_content_types
  9. from .models import AdminGroup, AdminUser, ObjectPermission, Token, UserConfig
  10. #
  11. # Inline models
  12. #
  13. class ObjectPermissionInline(admin.TabularInline):
  14. exclude = None
  15. extra = 3
  16. readonly_fields = ['object_types', 'actions', 'constraints']
  17. verbose_name = 'Permission'
  18. verbose_name_plural = 'Permissions'
  19. def get_queryset(self, request):
  20. return super().get_queryset(request).prefetch_related('objectpermission__object_types').nocache()
  21. @staticmethod
  22. def object_types(instance):
  23. # Don't call .values_list() here because we want to reference the pre-fetched object_types
  24. return ', '.join([ot.name for ot in instance.objectpermission.object_types.all()])
  25. @staticmethod
  26. def actions(instance):
  27. return ', '.join(instance.objectpermission.actions)
  28. @staticmethod
  29. def constraints(instance):
  30. return instance.objectpermission.constraints
  31. class GroupObjectPermissionInline(ObjectPermissionInline):
  32. model = AdminGroup.object_permissions.through
  33. class UserObjectPermissionInline(ObjectPermissionInline):
  34. model = AdminUser.object_permissions.through
  35. class UserConfigInline(admin.TabularInline):
  36. model = UserConfig
  37. readonly_fields = ('data',)
  38. can_delete = False
  39. verbose_name = 'Preferences'
  40. #
  41. # Users & groups
  42. #
  43. # Unregister the built-in GroupAdmin and UserAdmin classes so that we can use our custom admin classes below
  44. admin.site.unregister(Group)
  45. admin.site.unregister(User)
  46. @admin.register(AdminGroup)
  47. class GroupAdmin(admin.ModelAdmin):
  48. fields = ('name',)
  49. list_display = ('name', 'user_count')
  50. ordering = ('name',)
  51. search_fields = ('name',)
  52. inlines = [GroupObjectPermissionInline]
  53. @staticmethod
  54. def user_count(obj):
  55. return obj.user_set.count()
  56. @admin.register(AdminUser)
  57. class UserAdmin(UserAdmin_):
  58. list_display = [
  59. 'username', 'email', 'first_name', 'last_name', 'is_superuser', 'is_staff', 'is_active'
  60. ]
  61. fieldsets = (
  62. (None, {'fields': ('username', 'password', 'first_name', 'last_name', 'email')}),
  63. ('Groups', {'fields': ('groups',)}),
  64. ('Status', {
  65. 'fields': ('is_active', 'is_staff', 'is_superuser'),
  66. }),
  67. ('Important dates', {'fields': ('last_login', 'date_joined')}),
  68. )
  69. filter_horizontal = ('groups',)
  70. def get_inlines(self, request, obj):
  71. if obj is not None:
  72. return (UserObjectPermissionInline, UserConfigInline)
  73. return ()
  74. #
  75. # REST API tokens
  76. #
  77. class TokenAdminForm(forms.ModelForm):
  78. key = forms.CharField(
  79. required=False,
  80. help_text="If no key is provided, one will be generated automatically."
  81. )
  82. class Meta:
  83. fields = [
  84. 'user', 'key', 'write_enabled', 'expires', 'description'
  85. ]
  86. model = Token
  87. @admin.register(Token)
  88. class TokenAdmin(admin.ModelAdmin):
  89. form = TokenAdminForm
  90. list_display = [
  91. 'key', 'user', 'created', 'expires', 'write_enabled', 'description'
  92. ]
  93. #
  94. # Permissions
  95. #
  96. class ObjectPermissionForm(forms.ModelForm):
  97. can_view = forms.BooleanField(required=False)
  98. can_add = forms.BooleanField(required=False)
  99. can_change = forms.BooleanField(required=False)
  100. can_delete = forms.BooleanField(required=False)
  101. class Meta:
  102. model = ObjectPermission
  103. exclude = []
  104. help_texts = {
  105. 'actions': 'Actions granted in addition to those listed above',
  106. 'constraints': 'JSON expression of a queryset filter that will return only permitted objects. Leave null '
  107. 'to match all objects of this type. A list of multiple objects will result in a logical OR '
  108. 'operation.'
  109. }
  110. labels = {
  111. 'actions': 'Additional actions'
  112. }
  113. widgets = {
  114. 'constraints': forms.Textarea(attrs={'class': 'vLargeTextField'})
  115. }
  116. def __init__(self, *args, **kwargs):
  117. super().__init__(*args, **kwargs)
  118. # Make the actions field optional since the admin form uses it only for non-CRUD actions
  119. self.fields['actions'].required = False
  120. # Format ContentType choices
  121. order_content_types(self.fields['object_types'])
  122. self.fields['object_types'].choices.insert(0, ('', '---------'))
  123. # Order group and user fields
  124. self.fields['groups'].queryset = self.fields['groups'].queryset.order_by('name')
  125. self.fields['users'].queryset = self.fields['users'].queryset.order_by('username')
  126. # Check the appropriate checkboxes when editing an existing ObjectPermission
  127. if self.instance.pk:
  128. for action in ['view', 'add', 'change', 'delete']:
  129. if action in self.instance.actions:
  130. self.fields[f'can_{action}'].initial = True
  131. self.instance.actions.remove(action)
  132. def clean(self):
  133. object_types = self.cleaned_data.get('object_types')
  134. constraints = self.cleaned_data.get('constraints')
  135. # Append any of the selected CRUD checkboxes to the actions list
  136. if not self.cleaned_data.get('actions'):
  137. self.cleaned_data['actions'] = list()
  138. for action in ['view', 'add', 'change', 'delete']:
  139. if self.cleaned_data[f'can_{action}'] and action not in self.cleaned_data['actions']:
  140. self.cleaned_data['actions'].append(action)
  141. # At least one action must be specified
  142. if not self.cleaned_data['actions']:
  143. raise ValidationError("At least one action must be selected.")
  144. # Validate the specified model constraints by attempting to execute a query. We don't care whether the query
  145. # returns anything; we just want to make sure the specified constraints are valid.
  146. if object_types and constraints:
  147. # Normalize the constraints to a list of dicts
  148. if type(constraints) is not list:
  149. constraints = [constraints]
  150. for ct in object_types:
  151. model = ct.model_class()
  152. try:
  153. model.objects.filter(*[Q(**c) for c in constraints]).exists()
  154. except FieldError as e:
  155. raise ValidationError({
  156. 'constraints': f'Invalid filter for {model}: {e}'
  157. })
  158. class ActionListFilter(admin.SimpleListFilter):
  159. title = 'action'
  160. parameter_name = 'action'
  161. def lookups(self, request, model_admin):
  162. options = set()
  163. for action_list in ObjectPermission.objects.values_list('actions', flat=True).distinct():
  164. options.update(action_list)
  165. return [
  166. (action, action) for action in sorted(options)
  167. ]
  168. def queryset(self, request, queryset):
  169. if self.value():
  170. return queryset.filter(actions=[self.value()])
  171. class ObjectTypeListFilter(admin.SimpleListFilter):
  172. title = 'object type'
  173. parameter_name = 'object_type'
  174. def lookups(self, request, model_admin):
  175. object_types = ObjectPermission.objects.values_list('id', flat=True).distinct()
  176. content_types = ContentType.objects.filter(pk__in=object_types).order_by('app_label', 'model')
  177. return [
  178. (ct.pk, ct) for ct in content_types
  179. ]
  180. def queryset(self, request, queryset):
  181. if self.value():
  182. return queryset.filter(object_types=self.value())
  183. @admin.register(ObjectPermission)
  184. class ObjectPermissionAdmin(admin.ModelAdmin):
  185. actions = ('enable', 'disable')
  186. fieldsets = (
  187. (None, {
  188. 'fields': ('name', 'description', 'enabled')
  189. }),
  190. ('Actions', {
  191. 'fields': (('can_view', 'can_add', 'can_change', 'can_delete'), 'actions')
  192. }),
  193. ('Objects', {
  194. 'fields': ('object_types',)
  195. }),
  196. ('Assignment', {
  197. 'fields': ('groups', 'users')
  198. }),
  199. ('Constraints', {
  200. 'fields': ('constraints',),
  201. 'classes': ('monospace',)
  202. }),
  203. )
  204. filter_horizontal = ('object_types', 'groups', 'users')
  205. form = ObjectPermissionForm
  206. list_display = [
  207. 'name', 'enabled', 'list_models', 'list_users', 'list_groups', 'actions', 'constraints', 'description',
  208. ]
  209. list_filter = [
  210. 'enabled', ActionListFilter, ObjectTypeListFilter, 'groups', 'users'
  211. ]
  212. search_fields = ['actions', 'constraints', 'description', 'name']
  213. def get_queryset(self, request):
  214. return super().get_queryset(request).prefetch_related('object_types', 'users', 'groups')
  215. def list_models(self, obj):
  216. return ', '.join([f"{ct}" for ct in obj.object_types.all()])
  217. list_models.short_description = 'Models'
  218. def list_users(self, obj):
  219. return ', '.join([u.username for u in obj.users.all()])
  220. list_users.short_description = 'Users'
  221. def list_groups(self, obj):
  222. return ', '.join([g.name for g in obj.groups.all()])
  223. list_groups.short_description = 'Groups'
  224. #
  225. # Admin actions
  226. #
  227. def enable(self, request, queryset):
  228. updated = queryset.update(enabled=True)
  229. self.message_user(request, f"Enabled {updated} permissions")
  230. def disable(self, request, queryset):
  231. updated = queryset.update(enabled=False)
  232. self.message_user(request, f"Disabled {updated} permissions")