admin.py 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. from django import forms
  2. from django.contrib import admin
  3. from django.contrib.auth.admin import UserAdmin as UserAdmin_
  4. from django.contrib.auth.models import Group, User
  5. from django.contrib.contenttypes.models import ContentType
  6. from django.core.exceptions import FieldError, ValidationError
  7. from django.db.models import Q
  8. from extras.admin import order_content_types
  9. from .models import AdminGroup, AdminUser, ObjectPermission, Token, UserConfig
  10. #
  11. # Inline models
  12. #
  13. class ObjectPermissionInline(admin.TabularInline):
  14. exclude = None
  15. extra = 3
  16. readonly_fields = ['object_types', 'actions', 'constraints']
  17. verbose_name = 'Permission'
  18. verbose_name_plural = 'Permissions'
  19. def get_queryset(self, request):
  20. return super().get_queryset(request).prefetch_related('objectpermission__object_types').nocache()
  21. @staticmethod
  22. def object_types(instance):
  23. # Don't call .values_list() here because we want to reference the pre-fetched object_types
  24. return ', '.join([ot.name for ot in instance.objectpermission.object_types.all()])
  25. @staticmethod
  26. def actions(instance):
  27. return ', '.join(instance.objectpermission.actions)
  28. @staticmethod
  29. def constraints(instance):
  30. return instance.objectpermission.constraints
  31. class GroupObjectPermissionInline(ObjectPermissionInline):
  32. model = AdminGroup.object_permissions.through
  33. class UserObjectPermissionInline(ObjectPermissionInline):
  34. model = AdminUser.object_permissions.through
  35. class UserConfigInline(admin.TabularInline):
  36. model = UserConfig
  37. readonly_fields = ('data',)
  38. can_delete = False
  39. verbose_name = 'Preferences'
  40. #
  41. # Users & groups
  42. #
  43. # Unregister the built-in GroupAdmin and UserAdmin classes so that we can use our custom admin classes below
  44. admin.site.unregister(Group)
  45. admin.site.unregister(User)
  46. @admin.register(AdminGroup)
  47. class GroupAdmin(admin.ModelAdmin):
  48. fields = ('name',)
  49. list_display = ('name', 'user_count')
  50. ordering = ('name',)
  51. search_fields = ('name',)
  52. inlines = [GroupObjectPermissionInline]
  53. @staticmethod
  54. def user_count(obj):
  55. return obj.user_set.count()
  56. @admin.register(AdminUser)
  57. class UserAdmin(UserAdmin_):
  58. list_display = [
  59. 'username', 'email', 'first_name', 'last_name', 'is_superuser', 'is_staff', 'is_active'
  60. ]
  61. fieldsets = (
  62. (None, {'fields': ('username', 'password', 'first_name', 'last_name', 'email')}),
  63. ('Groups', {'fields': ('groups',)}),
  64. ('Status', {
  65. 'fields': ('is_active', 'is_staff', 'is_superuser'),
  66. }),
  67. ('Important dates', {'fields': ('last_login', 'date_joined')}),
  68. )
  69. filter_horizontal = ('groups',)
  70. def get_inlines(self, request, obj):
  71. if obj is not None:
  72. return (UserObjectPermissionInline, UserConfigInline)
  73. return ()
  74. #
  75. # REST API tokens
  76. #
  77. class TokenAdminForm(forms.ModelForm):
  78. key = forms.CharField(
  79. required=False,
  80. help_text="If no key is provided, one will be generated automatically."
  81. )
  82. class Meta:
  83. fields = [
  84. 'user', 'key', 'write_enabled', 'expires', 'description'
  85. ]
  86. model = Token
  87. @admin.register(Token)
  88. class TokenAdmin(admin.ModelAdmin):
  89. form = TokenAdminForm
  90. list_display = [
  91. 'key', 'user', 'created', 'expires', 'write_enabled', 'description'
  92. ]
  93. #
  94. # Permissions
  95. #
  96. class ObjectPermissionForm(forms.ModelForm):
  97. can_view = forms.BooleanField(required=False)
  98. can_add = forms.BooleanField(required=False)
  99. can_change = forms.BooleanField(required=False)
  100. can_delete = forms.BooleanField(required=False)
  101. class Meta:
  102. model = ObjectPermission
  103. exclude = []
  104. help_texts = {
  105. 'actions': 'Actions granted in addition to those listed above',
  106. 'constraints': 'JSON expression of a queryset filter that will return only permitted objects. Leave null '
  107. 'to match all objects of this type. A list of multiple objects will result in a logical OR '
  108. 'operation.'
  109. }
  110. labels = {
  111. 'actions': 'Additional actions'
  112. }
  113. widgets = {
  114. 'constraints': forms.Textarea(attrs={'class': 'vLargeTextField'})
  115. }
  116. def __init__(self, *args, **kwargs):
  117. super().__init__(*args, **kwargs)
  118. # Make the actions field optional since the admin form uses it only for non-CRUD actions
  119. self.fields['actions'].required = False
  120. # Format ContentType choices
  121. order_content_types(self.fields['object_types'])
  122. self.fields['object_types'].choices.insert(0, ('', '---------'))
  123. # Order group and user fields
  124. self.fields['groups'].queryset = self.fields['groups'].queryset.order_by('name')
  125. self.fields['users'].queryset = self.fields['users'].queryset.order_by('username')
  126. # Check the appropriate checkboxes when editing an existing ObjectPermission
  127. if self.instance.pk:
  128. for action in ['view', 'add', 'change', 'delete']:
  129. if action in self.instance.actions:
  130. self.fields[f'can_{action}'].initial = True
  131. self.instance.actions.remove(action)
  132. def clean(self):
  133. super().clean()
  134. object_types = self.cleaned_data.get('object_types')
  135. constraints = self.cleaned_data.get('constraints')
  136. # Append any of the selected CRUD checkboxes to the actions list
  137. if not self.cleaned_data.get('actions'):
  138. self.cleaned_data['actions'] = list()
  139. for action in ['view', 'add', 'change', 'delete']:
  140. if self.cleaned_data[f'can_{action}'] and action not in self.cleaned_data['actions']:
  141. self.cleaned_data['actions'].append(action)
  142. # At least one action must be specified
  143. if not self.cleaned_data['actions']:
  144. raise ValidationError("At least one action must be selected.")
  145. # Validate the specified model constraints by attempting to execute a query. We don't care whether the query
  146. # returns anything; we just want to make sure the specified constraints are valid.
  147. if object_types and constraints:
  148. # Normalize the constraints to a list of dicts
  149. if type(constraints) is not list:
  150. constraints = [constraints]
  151. for ct in object_types:
  152. model = ct.model_class()
  153. try:
  154. model.objects.filter(*[Q(**c) for c in constraints]).exists()
  155. except FieldError as e:
  156. raise ValidationError({
  157. 'constraints': f'Invalid filter for {model}: {e}'
  158. })
  159. class ActionListFilter(admin.SimpleListFilter):
  160. title = 'action'
  161. parameter_name = 'action'
  162. def lookups(self, request, model_admin):
  163. options = set()
  164. for action_list in ObjectPermission.objects.values_list('actions', flat=True).distinct():
  165. options.update(action_list)
  166. return [
  167. (action, action) for action in sorted(options)
  168. ]
  169. def queryset(self, request, queryset):
  170. if self.value():
  171. return queryset.filter(actions=[self.value()])
  172. class ObjectTypeListFilter(admin.SimpleListFilter):
  173. title = 'object type'
  174. parameter_name = 'object_type'
  175. def lookups(self, request, model_admin):
  176. object_types = ObjectPermission.objects.values_list('object_types__pk', flat=True).distinct()
  177. content_types = ContentType.objects.filter(pk__in=object_types).order_by('app_label', 'model')
  178. return [
  179. (ct.pk, ct) for ct in content_types
  180. ]
  181. def queryset(self, request, queryset):
  182. if self.value():
  183. return queryset.filter(object_types=self.value())
  184. @admin.register(ObjectPermission)
  185. class ObjectPermissionAdmin(admin.ModelAdmin):
  186. actions = ('enable', 'disable')
  187. fieldsets = (
  188. (None, {
  189. 'fields': ('name', 'description', 'enabled')
  190. }),
  191. ('Actions', {
  192. 'fields': (('can_view', 'can_add', 'can_change', 'can_delete'), 'actions')
  193. }),
  194. ('Objects', {
  195. 'fields': ('object_types',)
  196. }),
  197. ('Assignment', {
  198. 'fields': ('groups', 'users')
  199. }),
  200. ('Constraints', {
  201. 'fields': ('constraints',),
  202. 'classes': ('monospace',)
  203. }),
  204. )
  205. filter_horizontal = ('object_types', 'groups', 'users')
  206. form = ObjectPermissionForm
  207. list_display = [
  208. 'name', 'enabled', 'list_models', 'list_users', 'list_groups', 'actions', 'constraints', 'description',
  209. ]
  210. list_filter = [
  211. 'enabled', ActionListFilter, ObjectTypeListFilter, 'groups', 'users'
  212. ]
  213. search_fields = ['actions', 'constraints', 'description', 'name']
  214. def get_queryset(self, request):
  215. return super().get_queryset(request).prefetch_related('object_types', 'users', 'groups')
  216. def list_models(self, obj):
  217. return ', '.join([f"{ct}" for ct in obj.object_types.all()])
  218. list_models.short_description = 'Models'
  219. def list_users(self, obj):
  220. return ', '.join([u.username for u in obj.users.all()])
  221. list_users.short_description = 'Users'
  222. def list_groups(self, obj):
  223. return ', '.join([g.name for g in obj.groups.all()])
  224. list_groups.short_description = 'Groups'
  225. #
  226. # Admin actions
  227. #
  228. def enable(self, request, queryset):
  229. updated = queryset.update(enabled=True)
  230. self.message_user(request, f"Enabled {updated} permissions")
  231. def disable(self, request, queryset):
  232. updated = queryset.update(enabled=False)
  233. self.message_user(request, f"Disabled {updated} permissions")