users.py
141 lines
| 5.1 KiB
| text/x-python
|
PythonLexer
r1518 | # -*- coding: utf-8 -*- | |||
# Copyright (C) 2016-2017 RhodeCode GmbH | ||||
# | ||||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
import logging | ||||
from pyramid.httpexceptions import HTTPFound | ||||
from pyramid.view import view_config | ||||
from rhodecode.apps._base import BaseAppView | ||||
from rhodecode.lib.auth import ( | ||||
LoginRequired, HasPermissionAllDecorator, CSRFRequired) | ||||
from rhodecode.lib import helpers as h | ||||
from rhodecode.lib.utils import PartialRenderer | ||||
from rhodecode.lib.utils2 import safe_int | ||||
from rhodecode.model.auth_token import AuthTokenModel | ||||
from rhodecode.model.db import User | ||||
from rhodecode.model.meta import Session | ||||
log = logging.getLogger(__name__) | ||||
class AdminUsersView(BaseAppView): | ||||
ALLOW_SCOPED_TOKENS = False | ||||
""" | ||||
This view has alternative version inside EE, if modified please take a look | ||||
in there as well. | ||||
""" | ||||
def load_default_context(self): | ||||
c = self._get_local_tmpl_context() | ||||
c.auth_user = self.request.user | ||||
c.allow_scoped_tokens = self.ALLOW_SCOPED_TOKENS | ||||
self._register_global_c(c) | ||||
return c | ||||
def _redirect_for_default_user(self, username): | ||||
_ = self.request.translate | ||||
if username == User.DEFAULT_USER: | ||||
h.flash(_("You can't edit this user"), category='warning') | ||||
# TODO(marcink): redirect to 'users' admin panel once this | ||||
# is a pyramid view | ||||
raise HTTPFound('/') | ||||
@LoginRequired() | ||||
@HasPermissionAllDecorator('hg.admin') | ||||
@view_config( | ||||
route_name='edit_user_auth_tokens', request_method='GET', | ||||
renderer='rhodecode:templates/admin/users/user_edit.mako') | ||||
def auth_tokens(self): | ||||
_ = self.request.translate | ||||
c = self.load_default_context() | ||||
user_id = self.request.matchdict.get('user_id') | ||||
c.user = User.get_or_404(user_id, pyramid_exc=True) | ||||
self._redirect_for_default_user(c.user.username) | ||||
c.active = 'auth_tokens' | ||||
c.lifetime_values = [ | ||||
(str(-1), _('forever')), | ||||
(str(5), _('5 minutes')), | ||||
(str(60), _('1 hour')), | ||||
(str(60 * 24), _('1 day')), | ||||
(str(60 * 24 * 30), _('1 month')), | ||||
] | ||||
c.lifetime_options = [(c.lifetime_values, _("Lifetime"))] | ||||
c.role_values = [ | ||||
(x, AuthTokenModel.cls._get_role_name(x)) | ||||
for x in AuthTokenModel.cls.ROLES] | ||||
c.role_options = [(c.role_values, _("Role"))] | ||||
c.user_auth_tokens = AuthTokenModel().get_auth_tokens( | ||||
c.user.user_id, show_expired=True) | ||||
return self._get_template_context(c) | ||||
def maybe_attach_token_scope(self, token): | ||||
# implemented in EE edition | ||||
pass | ||||
@LoginRequired() | ||||
@HasPermissionAllDecorator('hg.admin') | ||||
@CSRFRequired() | ||||
@view_config( | ||||
route_name='edit_user_auth_tokens_add', request_method='POST') | ||||
def auth_tokens_add(self): | ||||
_ = self.request.translate | ||||
c = self.load_default_context() | ||||
user_id = self.request.matchdict.get('user_id') | ||||
c.user = User.get_or_404(user_id, pyramid_exc=True) | ||||
self._redirect_for_default_user(c.user.username) | ||||
lifetime = safe_int(self.request.POST.get('lifetime'), -1) | ||||
description = self.request.POST.get('description') | ||||
role = self.request.POST.get('role') | ||||
token = AuthTokenModel().create( | ||||
c.user.user_id, description, lifetime, role) | ||||
self.maybe_attach_token_scope(token) | ||||
Session().commit() | ||||
h.flash(_("Auth token successfully created"), category='success') | ||||
return HTTPFound(h.route_path('edit_user_auth_tokens', user_id=user_id)) | ||||
@LoginRequired() | ||||
@HasPermissionAllDecorator('hg.admin') | ||||
@CSRFRequired() | ||||
@view_config( | ||||
route_name='edit_user_auth_tokens_delete', request_method='POST') | ||||
def auth_tokens_delete(self): | ||||
_ = self.request.translate | ||||
c = self.load_default_context() | ||||
user_id = self.request.matchdict.get('user_id') | ||||
c.user = User.get_or_404(user_id, pyramid_exc=True) | ||||
self._redirect_for_default_user(c.user.username) | ||||
del_auth_token = self.request.POST.get('del_auth_token') | ||||
if del_auth_token: | ||||
AuthTokenModel().delete(del_auth_token, c.user.user_id) | ||||
Session().commit() | ||||
h.flash(_("Auth token successfully deleted"), category='success') | ||||
return HTTPFound(h.route_path('edit_user_auth_tokens', user_id=user_id)) | ||||