# -*- coding: utf-8 -*- # Copyright (C) 2011-2019 RhodeCode GmbH # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Affero General Public License, version 3 # (only), as published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see . # # This program is dual-licensed. If you wish to learn more about the # RhodeCode Enterprise Edition, including its added features, Support services, # and proprietary license terms, please see https://rhodecode.com/licenses/ import logging from pyramid.view import view_config from pyramid.httpexceptions import HTTPFound from rhodecode import events from rhodecode.apps._base import RepoGroupAppView from rhodecode.lib import helpers as h from rhodecode.lib import audit_logger from rhodecode.lib.auth import ( LoginRequired, HasRepoGroupPermissionAnyDecorator, CSRFRequired) from rhodecode.lib.utils2 import safe_int from rhodecode.model.db import UserGroup from rhodecode.model.repo_group import RepoGroupModel from rhodecode.model.forms import RepoGroupPermsForm from rhodecode.model.meta import Session log = logging.getLogger(__name__) class RepoGroupPermissionsView(RepoGroupAppView): def load_default_context(self): c = self._get_local_tmpl_context() return c @LoginRequired() @HasRepoGroupPermissionAnyDecorator('group.admin') @view_config( route_name='edit_repo_group_perms', request_method='GET', renderer='rhodecode:templates/admin/repo_groups/repo_group_edit.mako') def edit_repo_group_permissions(self): c = self.load_default_context() c.active = 'permissions' c.repo_group = self.db_repo_group return self._get_template_context(c) @LoginRequired() @HasRepoGroupPermissionAnyDecorator('group.admin') @CSRFRequired() @view_config( route_name='edit_repo_group_perms_update', request_method='POST', renderer='rhodecode:templates/admin/repo_groups/repo_group_edit.mako') def edit_repo_groups_permissions_update(self): _ = self.request.translate c = self.load_default_context() c.active = 'perms' c.repo_group = self.db_repo_group valid_recursive_choices = ['none', 'repos', 'groups', 'all'] form = RepoGroupPermsForm(self.request.translate, valid_recursive_choices)()\ .to_python(self.request.POST) if not c.rhodecode_user.is_admin: if self._revoke_perms_on_yourself(form): msg = _('Cannot change permission for yourself as admin') h.flash(msg, category='warning') raise HTTPFound( h.route_path('edit_repo_group_perms', repo_group_name=self.db_repo_group_name)) # iterate over all members(if in recursive mode) of this groups and # set the permissions ! # this can be potentially heavy operation changes = RepoGroupModel().update_permissions( c.repo_group, form['perm_additions'], form['perm_updates'], form['perm_deletions'], form['recursive']) action_data = { 'added': changes['added'], 'updated': changes['updated'], 'deleted': changes['deleted'], } audit_logger.store_web( 'repo_group.edit.permissions', action_data=action_data, user=c.rhodecode_user) Session().commit() h.flash(_('Repository Group permissions updated'), category='success') affected_user_ids = [] for change in changes['added'] + changes['updated'] + changes['deleted']: if change['type'] == 'user': affected_user_ids.append(change['id']) if change['type'] == 'user_group': user_group = UserGroup.get(safe_int(change['id'])) if user_group: group_members_ids = [x.user_id for x in user_group.members] affected_user_ids.extend(group_members_ids) events.trigger(events.UserPermissionsChange(affected_user_ids)) raise HTTPFound( h.route_path('edit_repo_group_perms', repo_group_name=self.db_repo_group_name))