profiles.py 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. from django import forms
  2. from django.contrib.auth import get_user_model
  3. from django.core.exceptions import PermissionDenied
  4. from django.utils.translation import ugettext_lazy as _
  5. from misago.acl import algebra
  6. from misago.acl.decorators import return_boolean
  7. from misago.acl.models import Role
  8. from misago.core.forms import YesNoSwitch
  9. from .decorators import authenticated_only
  10. __all__ = [
  11. 'allow_browse_users_list',
  12. 'can_browse_users_list',
  13. 'allow_follow_user',
  14. 'can_follow_user',
  15. 'allow_block_user',
  16. 'can_block_user',
  17. 'allow_see_ban_details',
  18. 'can_see_ban_details',
  19. ]
  20. """
  21. Admin Permissions Form
  22. """
  23. CAN_BROWSE_USERS_LIST = YesNoSwitch(label=_("Can browse users list"), initial=1)
  24. CAN_SEARCH_USERS = YesNoSwitch(label=_("Can search user profiles"), initial=1)
  25. CAN_SEE_USER_NAME_HISTORY = YesNoSwitch(label=_("Can see other members name history"))
  26. CAN_SEE_DETAILS = YesNoSwitch(
  27. label=_("Can see members bans details"),
  28. help_text=_("Allows users with this permission to see user and staff ban messages.")
  29. )
  30. class LimitedPermissionsForm(forms.Form):
  31. legend = _("User profiles")
  32. can_browse_users_list = CAN_BROWSE_USERS_LIST
  33. can_search_users = CAN_SEARCH_USERS
  34. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  35. can_see_ban_details = CAN_SEE_DETAILS
  36. class PermissionsForm(LimitedPermissionsForm):
  37. can_browse_users_list = CAN_BROWSE_USERS_LIST
  38. can_search_users = CAN_SEARCH_USERS
  39. can_follow_users = YesNoSwitch(label=_("Can follow other users"), initial=1)
  40. can_be_blocked = YesNoSwitch(label=_("Can be blocked by other users"), initial=0)
  41. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  42. can_see_ban_details = CAN_SEE_DETAILS
  43. can_see_users_emails = YesNoSwitch(label=_("Can see members e-mails"))
  44. can_see_users_ips = YesNoSwitch(label=_("Can see members IPs"))
  45. can_see_hidden_users = YesNoSwitch(label=_("Can see members that hide their presence"))
  46. def change_permissions_form(role):
  47. if isinstance(role, Role):
  48. if role.special_role == 'anonymous':
  49. return LimitedPermissionsForm
  50. else:
  51. return PermissionsForm
  52. else:
  53. return None
  54. """
  55. ACL Builder
  56. """
  57. def build_acl(acl, roles, key_name):
  58. new_acl = {
  59. 'can_browse_users_list': 0,
  60. 'can_search_users': 0,
  61. 'can_follow_users': 0,
  62. 'can_be_blocked': 1,
  63. 'can_see_users_name_history': 0,
  64. 'can_see_ban_details': 0,
  65. 'can_see_users_emails': 0,
  66. 'can_see_users_ips': 0,
  67. 'can_see_hidden_users': 0,
  68. }
  69. new_acl.update(acl)
  70. return algebra.sum_acls(
  71. new_acl,
  72. roles=roles,
  73. key=key_name,
  74. can_browse_users_list=algebra.greater,
  75. can_search_users=algebra.greater,
  76. can_follow_users=algebra.greater,
  77. can_be_blocked=algebra.lower,
  78. can_see_users_name_history=algebra.greater,
  79. can_see_ban_details=algebra.greater,
  80. can_see_users_emails=algebra.greater,
  81. can_see_users_ips=algebra.greater,
  82. can_see_hidden_users=algebra.greater,
  83. )
  84. """
  85. ACL's for targets
  86. """
  87. def add_acl_to_user(user, target):
  88. target.acl['can_have_attitude'] = False
  89. target.acl['can_follow'] = can_follow_user(user, target)
  90. target.acl['can_block'] = can_block_user(user, target)
  91. mod_permissions = ('can_have_attitude', 'can_follow', 'can_block', )
  92. for permission in mod_permissions:
  93. if target.acl[permission]:
  94. target.acl['can_have_attitude'] = True
  95. break
  96. def register_with(registry):
  97. registry.acl_annotator(get_user_model(), add_acl_to_user)
  98. """
  99. ACL tests
  100. """
  101. def allow_browse_users_list(user):
  102. if not user.acl_cache['can_browse_users_list']:
  103. raise PermissionDenied(_("You can't browse users list."))
  104. can_browse_users_list = return_boolean(allow_browse_users_list)
  105. @authenticated_only
  106. def allow_follow_user(user, target):
  107. if not user.acl_cache['can_follow_users']:
  108. raise PermissionDenied(_("You can't follow other users."))
  109. if user.pk == target.pk:
  110. raise PermissionDenied(_("You can't add yourself to followed."))
  111. can_follow_user = return_boolean(allow_follow_user)
  112. @authenticated_only
  113. def allow_block_user(user, target):
  114. if target.is_staff or target.is_superuser:
  115. raise PermissionDenied(_("You can't block administrators."))
  116. if user.pk == target.pk:
  117. raise PermissionDenied(_("You can't block yourself."))
  118. if not target.acl_cache['can_be_blocked'] or target.is_superuser:
  119. message = _("%(user)s can't be blocked.") % {'user': target.username}
  120. raise PermissionDenied(message)
  121. can_block_user = return_boolean(allow_block_user)
  122. @authenticated_only
  123. def allow_see_ban_details(user, target):
  124. if not user.acl_cache['can_see_ban_details']:
  125. raise PermissionDenied(_("You can't see users bans details."))
  126. can_see_ban_details = return_boolean(allow_see_ban_details)