profiles.py 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. from django.contrib.auth import get_user_model
  2. from django.core.exceptions import PermissionDenied
  3. from django.utils.translation import ugettext_lazy as _
  4. from misago.acl import algebra
  5. from misago.acl.decorators import return_boolean
  6. from misago.acl.models import Role
  7. from misago.core import forms
  8. from misago.users.permissions.decorators import authenticated_only
  9. """
  10. Admin Permissions Form
  11. """
  12. CAN_BROWSE_USERS_LIST = forms.YesNoSwitch(
  13. label=_("Can browse users list"),
  14. initial=1)
  15. CAN_SEARCH_USERS = forms.YesNoSwitch(
  16. label=_("Can search user profiles"),
  17. initial=1)
  18. CAN_SEE_USER_NAME_HISTORY = forms.YesNoSwitch(
  19. label=_("Can see other members name history"))
  20. CAN_SEE_BAN_DETAILS = forms.YesNoSwitch(
  21. label=_("Can see members bans details"),
  22. help_text=_("Allows users with this permission to see user and "
  23. "staff ban messages."))
  24. class LimitedPermissionsForm(forms.Form):
  25. legend = _("User profiles")
  26. can_browse_users_list = CAN_BROWSE_USERS_LIST
  27. can_search_users = CAN_SEARCH_USERS
  28. can_search_users = CAN_SEARCH_USERS
  29. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  30. can_see_ban_details = CAN_SEE_BAN_DETAILS
  31. class PermissionsForm(LimitedPermissionsForm):
  32. can_browse_users_list = CAN_BROWSE_USERS_LIST
  33. can_search_users = CAN_SEARCH_USERS
  34. can_follow_users = forms.YesNoSwitch(
  35. label=_("Can follow other users"),
  36. initial=1)
  37. can_be_blocked = forms.YesNoSwitch(
  38. label=_("Can be blocked by other users"),
  39. initial=0)
  40. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  41. can_see_ban_details = CAN_SEE_BAN_DETAILS
  42. can_see_users_emails = forms.YesNoSwitch(
  43. label=_("Can see members e-mails"))
  44. can_see_users_ips = forms.YesNoSwitch(
  45. label=_("Can see members IPs"))
  46. can_see_hidden_users = forms.YesNoSwitch(
  47. label=_("Can see members that hide their presence"))
  48. def change_permissions_form(role):
  49. if isinstance(role, Role):
  50. if role.special_role == 'anonymous':
  51. return LimitedPermissionsForm
  52. else:
  53. return PermissionsForm
  54. else:
  55. return None
  56. """
  57. ACL Builder
  58. """
  59. def build_acl(acl, roles, key_name):
  60. new_acl = {
  61. 'can_browse_users_list': 0,
  62. 'can_search_users': 0,
  63. 'can_follow_users': 0,
  64. 'can_be_blocked': 1,
  65. 'can_see_users_name_history': 0,
  66. 'can_see_ban_details': 0,
  67. 'can_see_users_emails': 0,
  68. 'can_see_users_ips': 0,
  69. 'can_see_hidden_users': 0,
  70. }
  71. new_acl.update(acl)
  72. return algebra.sum_acls(new_acl, roles=roles, key=key_name,
  73. can_browse_users_list=algebra.greater,
  74. can_search_users=algebra.greater,
  75. can_follow_users=algebra.greater,
  76. can_be_blocked=algebra.lower,
  77. can_see_users_name_history=algebra.greater,
  78. can_see_ban_details=algebra.greater,
  79. can_see_users_emails=algebra.greater,
  80. can_see_users_ips=algebra.greater,
  81. can_see_hidden_users=algebra.greater
  82. )
  83. """
  84. ACL's for targets
  85. """
  86. def add_acl_to_user(user, target):
  87. target_acl = target.acl_
  88. target_acl['can_have_attitude'] = False
  89. target_acl['can_follow'] = can_follow_user(user, target)
  90. target_acl['can_block'] = can_block_user(user, target)
  91. mod_permissions = (
  92. 'can_have_attitude',
  93. 'can_follow',
  94. 'can_block',
  95. )
  96. for permission in mod_permissions:
  97. if target_acl[permission]:
  98. target_acl['can_have_attitude'] = True
  99. break
  100. def register_with(registry):
  101. registry.acl_annotator(get_user_model(), add_acl_to_user)
  102. """
  103. ACL tests
  104. """
  105. def allow_browse_users_list(user):
  106. if not user.acl['can_browse_users_list']:
  107. raise PermissionDenied(_("You can't browse users list."))
  108. can_browse_users_list = return_boolean(allow_browse_users_list)
  109. @authenticated_only
  110. def allow_follow_user(user, target):
  111. if not user.acl['can_follow_users']:
  112. raise PermissionDenied(_("You can't follow other users."))
  113. if user.pk == target.pk:
  114. raise PermissionDenied(_("You can't add yourself to followed."))
  115. can_follow_user = return_boolean(allow_follow_user)
  116. @authenticated_only
  117. def allow_block_user(user, target):
  118. if target.is_staff or target.is_superuser:
  119. raise PermissionDenied(_("You can't block administrators."))
  120. if user.pk == target.pk:
  121. raise PermissionDenied(_("You can't block yourself."))
  122. if not target.acl['can_be_blocked'] or target.is_superuser:
  123. message = _("%(user)s can't be blocked.") % {'user': target.username}
  124. raise PermissionDenied(message)
  125. can_block_user = return_boolean(allow_block_user)
  126. @authenticated_only
  127. def allow_see_ban_details(user, target):
  128. if not user.acl['can_see_ban_details']:
  129. raise PermissionDenied(_("You can't see users bans details."))
  130. can_see_ban_details = return_boolean(allow_see_ban_details)