permissions.py
194 lines
| 8.0 KiB
| text/x-python
|
PythonLexer
r760 | # -*- coding: utf-8 -*- | |||
r1206 | # This program is free software: you can redistribute it and/or modify | |||
# it under the terms of the GNU General Public License as published by | ||||
# the Free Software Foundation, either version 3 of the License, or | ||||
# (at your option) any later version. | ||||
r1203 | # | |||
r547 | # This program is distributed in the hope that it will be useful, | |||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
r1203 | # | |||
r547 | # You should have received a copy of the GNU General Public License | |||
r1206 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |||
Bradley M. Kuhn
|
r4116 | """ | ||
rhodecode.controllers.admin.permissions | ||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||||
permissions controller for Rhodecode | ||||
:created_on: Apr 27, 2010 | ||||
:author: marcink | ||||
:copyright: (c) 2013 RhodeCode GmbH. | ||||
:license: GPLv3, see LICENSE for more details. | ||||
""" | ||||
r547 | ||||
r1501 | import logging | |||
import traceback | ||||
import formencode | ||||
r547 | from formencode import htmlfill | |||
r1501 | ||||
r547 | from pylons import request, session, tmpl_context as c, url | |||
from pylons.controllers.util import abort, redirect | ||||
from pylons.i18n.translation import _ | ||||
r1501 | ||||
r547 | from rhodecode.lib import helpers as h | |||
r3125 | from rhodecode.lib.auth import LoginRequired, HasPermissionAllDecorator,\ | |||
AuthUser | ||||
r547 | from rhodecode.lib.base import BaseController, render | |||
r1501 | from rhodecode.model.forms import DefaultPermissionsForm | |||
r692 | from rhodecode.model.permission import PermissionModel | |||
r3731 | from rhodecode.model.db import User, UserIpMap, Permission | |||
r1734 | from rhodecode.model.meta import Session | |||
r547 | ||||
log = logging.getLogger(__name__) | ||||
r1245 | ||||
r547 | class PermissionsController(BaseController): | |||
"""REST Controller styled on the Atom Publishing Protocol""" | ||||
# To properly map this controller, ensure your config/routing.py | ||||
# file has a resource setup: | ||||
# map.resource('permission', 'permissions') | ||||
r629 | ||||
r547 | @LoginRequired() | |||
@HasPermissionAllDecorator('hg.admin') | ||||
def __before__(self): | ||||
super(PermissionsController, self).__before__() | ||||
r629 | ||||
Bradley M. Kuhn
|
r4116 | def __load_data(self): | ||
r3734 | c.repo_perms_choices = [('repository.none', _('None'),), | |||
r3052 | ('repository.read', _('Read'),), | |||
('repository.write', _('Write'),), | ||||
('repository.admin', _('Admin'),)] | ||||
r3734 | c.group_perms_choices = [('group.none', _('None'),), | |||
('group.read', _('Read'),), | ||||
('group.write', _('Write'),), | ||||
('group.admin', _('Admin'),)] | ||||
c.user_group_perms_choices = [('usergroup.none', _('None'),), | ||||
('usergroup.read', _('Read'),), | ||||
('usergroup.write', _('Write'),), | ||||
('usergroup.admin', _('Admin'),)] | ||||
c.register_choices = [ | ||||
r673 | ('hg.register.none', | |||
Mads Kiilerich
|
r3654 | _('Disabled')), | ||
r547 | ('hg.register.manual_activate', | |||
Mads Kiilerich
|
r3654 | _('Allowed with manual account activation')), | ||
r547 | ('hg.register.auto_activate', | |||
Mads Kiilerich
|
r3654 | _('Allowed with automatic account activation')), ] | ||
r629 | ||||
r3786 | c.extern_activate_choices = [ | |||
('hg.extern_activate.manual', _('Manual activation of external account')), | ||||
('hg.extern_activate.auto', _('Automatic activation of external account')), | ||||
] | ||||
r3734 | c.repo_create_choices = [('hg.create.none', _('Disabled')), | |||
('hg.create.repository', _('Enabled'))] | ||||
r547 | ||||
Bradley M. Kuhn
|
r4116 | c.repo_create_on_write_choices = [ | ||
('hg.create.write_on_repogroup.true', _('Enabled')), | ||||
('hg.create.write_on_repogroup.false', _('Disabled')), | ||||
] | ||||
r3734 | c.user_group_create_choices = [('hg.usergroup.create.false', _('Disabled')), | |||
('hg.usergroup.create.true', _('Enabled'))] | ||||
r2709 | ||||
r3734 | c.repo_group_create_choices = [('hg.repogroup.create.false', _('Disabled')), | |||
('hg.repogroup.create.true', _('Enabled'))] | ||||
c.fork_choices = [('hg.fork.none', _('Disabled')), | ||||
('hg.fork.repository', _('Enabled'))] | ||||
r2709 | ||||
Bradley M. Kuhn
|
r4116 | def permission_globals(self): | ||
c.active = 'globals' | ||||
self.__load_data() | ||||
if request.POST: | ||||
r3125 | _form = DefaultPermissionsForm( | |||
Bradley M. Kuhn
|
r4116 | [x[0] for x in c.repo_perms_choices], | ||
[x[0] for x in c.group_perms_choices], | ||||
[x[0] for x in c.user_group_perms_choices], | ||||
[x[0] for x in c.repo_create_choices], | ||||
[x[0] for x in c.repo_create_on_write_choices], | ||||
[x[0] for x in c.repo_group_create_choices], | ||||
[x[0] for x in c.user_group_create_choices], | ||||
[x[0] for x in c.fork_choices], | ||||
[x[0] for x in c.register_choices], | ||||
[x[0] for x in c.extern_activate_choices])() | ||||
r629 | ||||
r3125 | try: | |||
form_result = _form.to_python(dict(request.POST)) | ||||
Bradley M. Kuhn
|
r4116 | form_result.update({'perm_user_name': 'default'}) | ||
r3734 | PermissionModel().update(form_result) | |||
r3125 | Session().commit() | |||
Bradley M. Kuhn
|
r4116 | h.flash(_('Global permissions updated successfully'), | ||
r3125 | category='success') | |||
r629 | ||||
r3125 | except formencode.Invalid, errors: | |||
defaults = errors.value | ||||
r629 | ||||
r3125 | return htmlfill.render( | |||
render('admin/permissions/permissions.html'), | ||||
defaults=defaults, | ||||
errors=errors.error_dict or {}, | ||||
prefix_error=False, | ||||
encoding="UTF-8") | ||||
except Exception: | ||||
log.error(traceback.format_exc()) | ||||
Mads Kiilerich
|
r3565 | h.flash(_('Error occurred during update of permissions'), | ||
r3125 | category='error') | |||
r629 | ||||
Bradley M. Kuhn
|
r4116 | return redirect(url('admin_permissions')) | ||
c.user = User.get_default_user() | ||||
defaults = {'anonymous': c.user.active} | ||||
r629 | ||||
Bradley M. Kuhn
|
r4116 | for p in c.user.user_perms: | ||
if p.permission.permission_name.startswith('repository.'): | ||||
defaults['default_repo_perm'] = p.permission.permission_name | ||||
if p.permission.permission_name.startswith('group.'): | ||||
defaults['default_group_perm'] = p.permission.permission_name | ||||
r547 | ||||
Bradley M. Kuhn
|
r4116 | if p.permission.permission_name.startswith('usergroup.'): | ||
defaults['default_user_group_perm'] = p.permission.permission_name | ||||
r547 | ||||
Bradley M. Kuhn
|
r4116 | if p.permission.permission_name.startswith('hg.create.write_on_repogroup'): | ||
defaults['create_on_write'] = p.permission.permission_name | ||||
r629 | ||||
Bradley M. Kuhn
|
r4116 | elif p.permission.permission_name.startswith('hg.create.'): | ||
defaults['default_repo_create'] = p.permission.permission_name | ||||
if p.permission.permission_name.startswith('hg.repogroup.'): | ||||
defaults['default_repo_group_create'] = p.permission.permission_name | ||||
if p.permission.permission_name.startswith('hg.usergroup.'): | ||||
defaults['default_user_group_create'] = p.permission.permission_name | ||||
r3052 | ||||
Bradley M. Kuhn
|
r4116 | if p.permission.permission_name.startswith('hg.register.'): | ||
defaults['default_register'] = p.permission.permission_name | ||||
r3734 | ||||
Bradley M. Kuhn
|
r4116 | if p.permission.permission_name.startswith('hg.extern_activate.'): | ||
defaults['default_extern_activate'] = p.permission.permission_name | ||||
r3734 | ||||
Bradley M. Kuhn
|
r4116 | if p.permission.permission_name.startswith('hg.fork.'): | ||
defaults['default_fork'] = p.permission.permission_name | ||||
r3734 | ||||
Bradley M. Kuhn
|
r4116 | return htmlfill.render( | ||
render('admin/permissions/permissions.html'), | ||||
defaults=defaults, | ||||
encoding="UTF-8", | ||||
force_defaults=False) | ||||
r2709 | ||||
Bradley M. Kuhn
|
r4116 | def permission_ips(self): | ||
c.active = 'ips' | ||||
c.user = User.get_default_user() | ||||
c.user_ip_map = UserIpMap.query()\ | ||||
.filter(UserIpMap.user == c.user).all() | ||||
return render('admin/permissions/permissions.html') | ||||
def permission_perms(self): | ||||
c.active = 'perms' | ||||
c.user = User.get_default_user() | ||||
c.perm_user = c.user.AuthUser | ||||
return render('admin/permissions/permissions.html') | ||||