repo_group_permissions.py
104 lines
| 3.9 KiB
| text/x-python
|
PythonLexer
r5053 | ||||
r2175 | ||||
r4306 | # Copyright (C) 2011-2020 RhodeCode GmbH | |||
r2175 | # | |||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
import logging | ||||
r4610 | ||||
r2175 | from pyramid.httpexceptions import HTTPFound | |||
from rhodecode.apps._base import RepoGroupAppView | ||||
from rhodecode.lib import helpers as h | ||||
from rhodecode.lib import audit_logger | ||||
from rhodecode.lib.auth import ( | ||||
LoginRequired, HasRepoGroupPermissionAnyDecorator, CSRFRequired) | ||||
r4187 | from rhodecode.model.db import User | |||
r3824 | from rhodecode.model.permission import PermissionModel | |||
r2175 | from rhodecode.model.repo_group import RepoGroupModel | |||
from rhodecode.model.forms import RepoGroupPermsForm | ||||
from rhodecode.model.meta import Session | ||||
log = logging.getLogger(__name__) | ||||
class RepoGroupPermissionsView(RepoGroupAppView): | ||||
def load_default_context(self): | ||||
c = self._get_local_tmpl_context() | ||||
r2351 | ||||
r2175 | return c | |||
@LoginRequired() | ||||
@HasRepoGroupPermissionAnyDecorator('group.admin') | ||||
def edit_repo_group_permissions(self): | ||||
c = self.load_default_context() | ||||
c.active = 'permissions' | ||||
c.repo_group = self.db_repo_group | ||||
return self._get_template_context(c) | ||||
@LoginRequired() | ||||
@HasRepoGroupPermissionAnyDecorator('group.admin') | ||||
@CSRFRequired() | ||||
def edit_repo_groups_permissions_update(self): | ||||
_ = self.request.translate | ||||
c = self.load_default_context() | ||||
c.active = 'perms' | ||||
c.repo_group = self.db_repo_group | ||||
valid_recursive_choices = ['none', 'repos', 'groups', 'all'] | ||||
r2351 | form = RepoGroupPermsForm(self.request.translate, valid_recursive_choices)()\ | |||
r2175 | .to_python(self.request.POST) | |||
if not c.rhodecode_user.is_admin: | ||||
if self._revoke_perms_on_yourself(form): | ||||
msg = _('Cannot change permission for yourself as admin') | ||||
h.flash(msg, category='warning') | ||||
raise HTTPFound( | ||||
h.route_path('edit_repo_group_perms', | ||||
r2248 | repo_group_name=self.db_repo_group_name)) | |||
r2175 | ||||
# iterate over all members(if in recursive mode) of this groups and | ||||
# set the permissions ! | ||||
# this can be potentially heavy operation | ||||
changes = RepoGroupModel().update_permissions( | ||||
c.repo_group, | ||||
form['perm_additions'], form['perm_updates'], form['perm_deletions'], | ||||
form['recursive']) | ||||
action_data = { | ||||
'added': changes['added'], | ||||
'updated': changes['updated'], | ||||
'deleted': changes['deleted'], | ||||
} | ||||
audit_logger.store_web( | ||||
'repo_group.edit.permissions', action_data=action_data, | ||||
user=c.rhodecode_user) | ||||
Session().commit() | ||||
h.flash(_('Repository Group permissions updated'), category='success') | ||||
r4187 | ||||
affected_user_ids = None | ||||
if changes.get('default_user_changed', False): | ||||
# if we change the default user, we need to flush everyone permissions | ||||
r4190 | affected_user_ids = User.get_all_user_ids() | |||
r4187 | PermissionModel().flush_user_permission_caches( | |||
changes, affected_user_ids=affected_user_ids) | ||||
r2849 | ||||
r2175 | raise HTTPFound( | |||
h.route_path('edit_repo_group_perms', | ||||
repo_group_name=self.db_repo_group_name)) | ||||