profiles.py 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. from django.contrib.auth import get_user_model
  2. from django.core.exceptions import PermissionDenied
  3. from django.utils.translation import ugettext_lazy as _
  4. from misago.acl import algebra
  5. from misago.acl.decorators import return_boolean
  6. from misago.acl.models import Role
  7. from misago.core import forms
  8. from .decorators import authenticated_only
  9. """
  10. Admin Permissions Form
  11. """
  12. CAN_BROWSE_USERS_LIST = forms.YesNoSwitch(
  13. label=_("Can browse users list"),
  14. initial=1
  15. )
  16. CAN_SEARCH_USERS = forms.YesNoSwitch(
  17. label=_("Can search user profiles"),
  18. initial=1
  19. )
  20. CAN_SEE_USER_NAME_HISTORY = forms.YesNoSwitch(
  21. label=_("Can see other members name history")
  22. )
  23. CAN_SEE_BAN_DETAILS = forms.YesNoSwitch(
  24. label=_("Can see members bans details"),
  25. help_text=_("Allows users with this permission to see user and staff ban messages.")
  26. )
  27. class LimitedPermissionsForm(forms.Form):
  28. legend = _("User profiles")
  29. can_browse_users_list = CAN_BROWSE_USERS_LIST
  30. can_search_users = CAN_SEARCH_USERS
  31. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  32. can_see_ban_details = CAN_SEE_BAN_DETAILS
  33. class PermissionsForm(LimitedPermissionsForm):
  34. can_browse_users_list = CAN_BROWSE_USERS_LIST
  35. can_search_users = CAN_SEARCH_USERS
  36. can_follow_users = forms.YesNoSwitch(
  37. label=_("Can follow other users"),
  38. initial=1
  39. )
  40. can_be_blocked = forms.YesNoSwitch(
  41. label=_("Can be blocked by other users"),
  42. initial=0
  43. )
  44. can_see_users_name_history = CAN_SEE_USER_NAME_HISTORY
  45. can_see_ban_details = CAN_SEE_BAN_DETAILS
  46. can_see_users_emails = forms.YesNoSwitch(
  47. label=_("Can see members e-mails")
  48. )
  49. can_see_users_ips = forms.YesNoSwitch(
  50. label=_("Can see members IPs")
  51. )
  52. can_see_hidden_users = forms.YesNoSwitch(
  53. label=_("Can see members that hide their presence")
  54. )
  55. def change_permissions_form(role):
  56. if isinstance(role, Role):
  57. if role.special_role == 'anonymous':
  58. return LimitedPermissionsForm
  59. else:
  60. return PermissionsForm
  61. else:
  62. return None
  63. """
  64. ACL Builder
  65. """
  66. def build_acl(acl, roles, key_name):
  67. new_acl = {
  68. 'can_browse_users_list': 0,
  69. 'can_search_users': 0,
  70. 'can_follow_users': 0,
  71. 'can_be_blocked': 1,
  72. 'can_see_users_name_history': 0,
  73. 'can_see_ban_details': 0,
  74. 'can_see_users_emails': 0,
  75. 'can_see_users_ips': 0,
  76. 'can_see_hidden_users': 0,
  77. }
  78. new_acl.update(acl)
  79. return algebra.sum_acls(new_acl, roles=roles, key=key_name,
  80. can_browse_users_list=algebra.greater,
  81. can_search_users=algebra.greater,
  82. can_follow_users=algebra.greater,
  83. can_be_blocked=algebra.lower,
  84. can_see_users_name_history=algebra.greater,
  85. can_see_ban_details=algebra.greater,
  86. can_see_users_emails=algebra.greater,
  87. can_see_users_ips=algebra.greater,
  88. can_see_hidden_users=algebra.greater
  89. )
  90. """
  91. ACL's for targets
  92. """
  93. def add_acl_to_user(user, target):
  94. target_acl = target.acl_
  95. target_acl['can_have_attitude'] = False
  96. target_acl['can_follow'] = can_follow_user(user, target)
  97. target_acl['can_block'] = can_block_user(user, target)
  98. mod_permissions = (
  99. 'can_have_attitude',
  100. 'can_follow',
  101. 'can_block',
  102. )
  103. for permission in mod_permissions:
  104. if target_acl[permission]:
  105. target_acl['can_have_attitude'] = True
  106. break
  107. def register_with(registry):
  108. registry.acl_annotator(get_user_model(), add_acl_to_user)
  109. """
  110. ACL tests
  111. """
  112. def allow_browse_users_list(user):
  113. if not user.acl['can_browse_users_list']:
  114. raise PermissionDenied(_("You can't browse users list."))
  115. can_browse_users_list = return_boolean(allow_browse_users_list)
  116. @authenticated_only
  117. def allow_follow_user(user, target):
  118. if not user.acl['can_follow_users']:
  119. raise PermissionDenied(_("You can't follow other users."))
  120. if user.pk == target.pk:
  121. raise PermissionDenied(_("You can't add yourself to followed."))
  122. can_follow_user = return_boolean(allow_follow_user)
  123. @authenticated_only
  124. def allow_block_user(user, target):
  125. if target.is_staff or target.is_superuser:
  126. raise PermissionDenied(_("You can't block administrators."))
  127. if user.pk == target.pk:
  128. raise PermissionDenied(_("You can't block yourself."))
  129. if not target.acl['can_be_blocked'] or target.is_superuser:
  130. message = _("%(user)s can't be blocked.") % {'user': target.username}
  131. raise PermissionDenied(message)
  132. can_block_user = return_boolean(allow_block_user)
  133. @authenticated_only
  134. def allow_see_ban_details(user, target):
  135. if not user.acl['can_see_ban_details']:
  136. raise PermissionDenied(_("You can't see users bans details."))
  137. can_see_ban_details = return_boolean(allow_see_ban_details)