mirror of
https://github.com/Hopiu/wagtail.git
synced 2026-04-10 10:00:58 +00:00
Implement permission policy modules: BlanketPermissionPolicy, AuthenticationOnlyPermissionPolicy, ModelPermissionPolicy, OwnershipPermissionPolicy
These modules allow all permission logic ('can user X do Y', 'can user X do Y on instance Z', 'who are the users who can do Y on instance Z') to be moved into a single module that can be potentially swapped out to provide new permission rules without changing the rest of the code.
This commit is contained in:
parent
3e5c665014
commit
87b7cbd596
2 changed files with 1725 additions and 0 deletions
351
wagtail/wagtailcore/permission_policies.py
Normal file
351
wagtail/wagtailcore/permission_policies.py
Normal file
|
|
@ -0,0 +1,351 @@
|
|||
from django.contrib.auth import get_user_model
|
||||
from django.contrib.auth.models import Permission
|
||||
from django.contrib.contenttypes.models import ContentType
|
||||
from django.core.exceptions import FieldDoesNotExist, ImproperlyConfigured
|
||||
from django.db.models import Q
|
||||
from django.utils.functional import cached_property
|
||||
|
||||
|
||||
class BasePermissionPolicy(object):
|
||||
"""
|
||||
A 'permission policy' is an object that handles all decisions about the actions
|
||||
users are allowed to perform on a given model. The mechanism by which it does this
|
||||
is arbitrary, and may or may not involve the django.contrib.auth Permission model;
|
||||
it could be as simple as "allow all users to do everything".
|
||||
|
||||
In this way, admin apps can change their permission-handling logic just by swapping
|
||||
to a different policy object, rather than having that logic spread across numerous
|
||||
view functions.
|
||||
|
||||
BasePermissionPolicy is an abstract class that all permission policies inherit from.
|
||||
The only method that subclasses need to implement is users_with_any_permission;
|
||||
all other methods can be derived from that (but in practice, subclasses will probably
|
||||
want to override additional methods, either for efficiency or to implement more
|
||||
fine-grained permission logic).
|
||||
"""
|
||||
|
||||
def __init__(self, model):
|
||||
self.model = model
|
||||
|
||||
# Basic user permission tests. Most policies are expected to override these,
|
||||
# since the default implementation is to query the set of permitted users
|
||||
# (which is pretty inefficient).
|
||||
|
||||
def user_has_permission(self, user, action):
|
||||
"""
|
||||
Return whether the given user has permission to perform the given action
|
||||
on some or all instances of this model
|
||||
"""
|
||||
return (user in self.users_with_permission(action))
|
||||
|
||||
def user_has_any_permission(self, user, actions):
|
||||
"""
|
||||
Return whether the given user has permission to perform any of the given actions
|
||||
on some or all instances of this model
|
||||
"""
|
||||
return any(self.user_has_permission(user, action) for action in actions)
|
||||
|
||||
# Operations for retrieving a list of users matching the permission criteria.
|
||||
# All policies must implement, at minimum, users_with_any_permission.
|
||||
|
||||
def users_with_any_permission(self, actions):
|
||||
"""
|
||||
Return a queryset of users who have permission to perform any of the given actions
|
||||
on some or all instances of this model
|
||||
"""
|
||||
raise NotImplementedError
|
||||
|
||||
def users_with_permission(self, action):
|
||||
"""
|
||||
Return a queryset of users who have permission to perform the given action on
|
||||
some or all instances of this model
|
||||
"""
|
||||
return self.users_with_any_permission([action])
|
||||
|
||||
# Per-instance permission tests. In the simplest cases - corresponding to the
|
||||
# basic Django permission model - permissions are enforced on a per-model basis
|
||||
# and so these methods can simply defer to the per-model tests. Policies that
|
||||
# require per-instance permission logic must override, at minimum:
|
||||
# user_has_permission_for_instance
|
||||
# instances_user_has_any_permission_for
|
||||
# users_with_any_permission_for_instance
|
||||
|
||||
def user_has_permission_for_instance(self, user, action, instance):
|
||||
"""
|
||||
Return whether the given user has permission to perform the given action on the
|
||||
given model instance
|
||||
"""
|
||||
return self.user_has_permission(user, action)
|
||||
|
||||
def user_has_any_permission_for_instance(self, user, actions, instance):
|
||||
"""
|
||||
Return whether the given user has permission to perform any of the given actions
|
||||
on the given model instance
|
||||
"""
|
||||
return any(
|
||||
self.user_has_permission_for_instance(user, action, instance)
|
||||
for action in actions
|
||||
)
|
||||
|
||||
def instances_user_has_any_permission_for(self, user, actions):
|
||||
"""
|
||||
Return a queryset of all instances of this model for which the given user has
|
||||
permission to perform any of the given actions
|
||||
"""
|
||||
if self.user_has_any_permission(user, actions):
|
||||
return self.model.objects.all()
|
||||
else:
|
||||
return self.model.objects.none()
|
||||
|
||||
def instances_user_has_permission_for(self, user, action):
|
||||
"""
|
||||
Return a queryset of all instances of this model for which the given user has
|
||||
permission to perform the given action
|
||||
"""
|
||||
return self.instances_user_has_any_permission_for(user, [action])
|
||||
|
||||
def users_with_any_permission_for_instance(self, actions, instance):
|
||||
"""
|
||||
Return a queryset of all users who have permission to perform any of the given
|
||||
actions on the given model instance
|
||||
"""
|
||||
return self.users_with_any_permission(actions)
|
||||
|
||||
def users_with_permission_for_instance(self, action, instance):
|
||||
return self.users_with_any_permission_for_instance([action], instance)
|
||||
|
||||
|
||||
class BlanketPermissionPolicy(BasePermissionPolicy):
|
||||
"""
|
||||
A permission policy that gives everyone (including anonymous users)
|
||||
full permission over the given model
|
||||
"""
|
||||
def user_has_permission(self, user, action):
|
||||
return True
|
||||
|
||||
def user_has_any_permission(self, user, actions):
|
||||
return True
|
||||
|
||||
def users_with_any_permission(self, actions):
|
||||
# Here we filter out inactive users from the results, even though inactive users
|
||||
# - and for that matter anonymous users - still have permission according to the
|
||||
# user_has_permission method. This is appropriate because, for most applications,
|
||||
# setting is_active=False is equivalent to deleting the user account; you would
|
||||
# not want these accounts to appear in, for example, a dropdown of users to
|
||||
# assign a task to. The result here could never be completely logically correct
|
||||
# (because it will not include anonymous users), so as the next best thing we
|
||||
# return the "least surprise" result.
|
||||
return get_user_model().objects.filter(is_active=True)
|
||||
|
||||
def users_with_permission(self, action):
|
||||
return get_user_model().objects.filter(is_active=True)
|
||||
|
||||
|
||||
class AuthenticationOnlyPermissionPolicy(BasePermissionPolicy):
|
||||
"""
|
||||
A permission policy that gives all active authenticated users
|
||||
full permission over the given model
|
||||
"""
|
||||
def user_has_permission(self, user, action):
|
||||
return user.is_authenticated() and user.is_active
|
||||
|
||||
def user_has_any_permission(self, user, actions):
|
||||
return user.is_authenticated() and user.is_active
|
||||
|
||||
def users_with_any_permission(self, actions):
|
||||
return get_user_model().objects.filter(is_active=True)
|
||||
|
||||
def users_with_permission(self, action):
|
||||
return get_user_model().objects.filter(is_active=True)
|
||||
|
||||
|
||||
class BaseDjangoAuthPermissionPolicy(BasePermissionPolicy):
|
||||
"""
|
||||
Extends BasePermissionPolicy with helper methods useful for policies that need to
|
||||
perform lookups against the django.contrib.auth permission model
|
||||
"""
|
||||
def __init__(self, model):
|
||||
super(BaseDjangoAuthPermissionPolicy, self).__init__(model)
|
||||
self.app_label = self.model._meta.app_label
|
||||
self.model_name = self.model._meta.model_name
|
||||
|
||||
@cached_property
|
||||
def _content_type(self):
|
||||
return ContentType.objects.get_for_model(self.model)
|
||||
|
||||
def _get_permission_name(self, action):
|
||||
"""
|
||||
Get the full app-label-qualified permission name (as required by
|
||||
user.has_perm(...) ) for the given action on this model
|
||||
"""
|
||||
return '%s.%s_%s' % (self.app_label, action, self.model_name)
|
||||
|
||||
def _get_users_with_any_permission_codenames_filter(self, permission_codenames):
|
||||
"""
|
||||
Given a list of permission codenames, return a filter expression which
|
||||
will find all users which have any of those permissions - either
|
||||
through group permissions, user permissions, or implicitly through
|
||||
being a superuser.
|
||||
"""
|
||||
permissions = Permission.objects.filter(
|
||||
content_type=self._content_type,
|
||||
codename__in=permission_codenames
|
||||
)
|
||||
return (
|
||||
Q(is_superuser=True)
|
||||
| Q(user_permissions__in=permissions)
|
||||
| Q(groups__permissions__in=permissions)
|
||||
) & Q(is_active=True)
|
||||
|
||||
def _get_users_with_any_permission_codenames(self, permission_codenames):
|
||||
"""
|
||||
Given a list of permission codenames, return a queryset of users which
|
||||
have any of those permissions - either through group permissions, user
|
||||
permissions, or implicitly through being a superuser.
|
||||
"""
|
||||
filter_expr = self._get_users_with_any_permission_codenames_filter(permission_codenames)
|
||||
return get_user_model().objects.filter(filter_expr).distinct()
|
||||
|
||||
|
||||
class ModelPermissionPolicy(BaseDjangoAuthPermissionPolicy):
|
||||
"""
|
||||
A permission policy that enforces permissions at the model level, by consulting
|
||||
the standard django.contrib.auth permission model directly
|
||||
"""
|
||||
def user_has_permission(self, user, action):
|
||||
return user.has_perm(self._get_permission_name(action))
|
||||
|
||||
def users_with_any_permission(self, actions):
|
||||
permission_codenames = [
|
||||
'%s_%s' % (action, self.model_name)
|
||||
for action in actions
|
||||
]
|
||||
return self._get_users_with_any_permission_codenames(permission_codenames)
|
||||
|
||||
|
||||
class OwnershipPermissionPolicy(BaseDjangoAuthPermissionPolicy):
|
||||
"""
|
||||
A permission policy for objects that support a concept of 'ownership', where
|
||||
the owner is typically the user who created the object.
|
||||
|
||||
This policy piggybacks off 'add' and 'change' permissions defined through the
|
||||
django.contrib.auth Permission model, as follows:
|
||||
|
||||
* any user with 'add' permission can create instances, and ALSO edit instances
|
||||
that they own
|
||||
* any user with 'change' permission can edit instances regardless of ownership
|
||||
* ability to edit also implies ability to delete
|
||||
|
||||
Besides 'add', 'change' and 'delete', no other actions are recognised or permitted
|
||||
(unless the user is an active superuser, in which case they can do everything).
|
||||
"""
|
||||
def __init__(self, model, owner_field_name='owner'):
|
||||
super(OwnershipPermissionPolicy, self).__init__(model)
|
||||
self.owner_field_name = owner_field_name
|
||||
|
||||
# make sure owner_field_name is a field that exists on the model
|
||||
try:
|
||||
self.model._meta.get_field(self.owner_field_name)
|
||||
except FieldDoesNotExist:
|
||||
raise ImproperlyConfigured(
|
||||
"%s has no field named '%s'. To use this model with OwnershipPermissionPolicy, "
|
||||
"you must specify a valid field name as owner_field_name."
|
||||
% (self.model, self.owner_field_name)
|
||||
)
|
||||
|
||||
def user_has_permission(self, user, action):
|
||||
if action == 'add':
|
||||
return user.has_perm(self._get_permission_name('add'))
|
||||
elif action == 'change' or action == 'delete':
|
||||
return (
|
||||
# having 'add' permission means that there are *potentially*
|
||||
# some instances they can edit (namely: ones they own),
|
||||
# which is sufficient for returning True here
|
||||
user.has_perm(self._get_permission_name('add'))
|
||||
or user.has_perm(self._get_permission_name('change'))
|
||||
)
|
||||
else:
|
||||
# unrecognised actions are only allowed for active superusers
|
||||
return user.is_active and user.is_superuser
|
||||
|
||||
def users_with_any_permission(self, actions):
|
||||
if 'change' in actions or 'delete' in actions:
|
||||
# either 'add' or 'change' permission means that there are *potentially*
|
||||
# some instances they can edit
|
||||
permission_codenames = [
|
||||
'add_%s' % self.model_name,
|
||||
'change_%s' % self.model_name
|
||||
]
|
||||
elif 'add' in actions:
|
||||
permission_codenames = [
|
||||
'add_%s' % self.model_name,
|
||||
]
|
||||
else:
|
||||
# none of the actions passed in here are ones that we recognise, so only
|
||||
# allow them for active superusers
|
||||
return get_user_model().objects.filter(is_active=True, is_superuser=True)
|
||||
|
||||
return self._get_users_with_any_permission_codenames(permission_codenames)
|
||||
|
||||
def user_has_permission_for_instance(self, user, action, instance):
|
||||
return self.user_has_any_permission_for_instance(user, [action], instance)
|
||||
|
||||
def user_has_any_permission_for_instance(self, user, actions, instance):
|
||||
if 'change' in actions or 'delete' in actions:
|
||||
if user.has_perm(self._get_permission_name('change')):
|
||||
return True
|
||||
elif (
|
||||
user.has_perm(self._get_permission_name('add'))
|
||||
and getattr(instance, self.owner_field_name) == user
|
||||
):
|
||||
return True
|
||||
else:
|
||||
return False
|
||||
else:
|
||||
# 'change' and 'delete' are the only actions that are well-defined
|
||||
# for specific instances. Other actions are only available to
|
||||
# active superusers.
|
||||
return user.is_active and user.is_superuser
|
||||
|
||||
def instances_user_has_any_permission_for(self, user, actions):
|
||||
if user.is_active and user.is_superuser:
|
||||
# active superusers can perform any action (including unrecognised ones)
|
||||
# on any instance
|
||||
return self.model.objects.all()
|
||||
elif 'change' in actions or 'delete' in actions:
|
||||
if user.has_perm(self._get_permission_name('change')):
|
||||
# user can edit all instances
|
||||
return self.model.objects.all()
|
||||
elif user.has_perm(self._get_permission_name('add')):
|
||||
# user can edit their own instances
|
||||
return self.model.objects.filter(**{self.owner_field_name: user})
|
||||
else:
|
||||
# user has no permissions at all on this model
|
||||
return self.model.objects.none()
|
||||
else:
|
||||
# action is either not recognised, or is the 'add' action which is
|
||||
# not meaningful for existing instances. As such, non-superusers
|
||||
# cannot perform it on any existing instances.
|
||||
return self.model.objects.none()
|
||||
|
||||
def users_with_any_permission_for_instance(self, actions, instance):
|
||||
if 'change' in actions or 'delete' in actions:
|
||||
# get filter expression for users with 'change' permission
|
||||
filter_expr = self._get_users_with_any_permission_codenames_filter([
|
||||
'change_%s' % self.model_name
|
||||
])
|
||||
|
||||
# add on the item's owner, if they still have 'add' permission
|
||||
# (and the owner field isn't blank)
|
||||
owner = getattr(instance, self.owner_field_name)
|
||||
if owner is not None and owner.has_perm(self._get_permission_name('add')):
|
||||
filter_expr = filter_expr | Q(pk=owner.pk)
|
||||
|
||||
# return the filtered queryset
|
||||
return get_user_model().objects.filter(filter_expr).distinct()
|
||||
|
||||
else:
|
||||
# action is either not recognised, or is the 'add' action which is
|
||||
# not meaningful for existing instances. As such, the action is only
|
||||
# available to superusers
|
||||
return get_user_model().objects.filter(is_active=True, is_superuser=True)
|
||||
1374
wagtail/wagtailcore/tests/test_permission_policies.py
Normal file
1374
wagtail/wagtailcore/tests/test_permission_policies.py
Normal file
File diff suppressed because it is too large
Load diff
Loading…
Reference in a new issue