delete.py 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. from datetime import timedelta
  2. from django import forms
  3. from django.contrib.auth import get_user_model
  4. from django.core.exceptions import PermissionDenied
  5. from django.utils import timezone
  6. from django.utils.translation import gettext_lazy as _
  7. from django.utils.translation import ngettext
  8. from ...acl import algebra
  9. from ...acl.decorators import return_boolean
  10. from ...acl.models import Role
  11. __all__ = [
  12. "allow_delete_user",
  13. "can_delete_user",
  14. "allow_delete_own_account",
  15. "can_delete_own_account",
  16. ]
  17. class PermissionsForm(forms.Form):
  18. legend = _("Deleting users")
  19. can_delete_users_newer_than = forms.IntegerField(
  20. label=_("Maximum age of deleted account (in days)"),
  21. help_text=_("Enter zero to disable this check."),
  22. min_value=0,
  23. initial=0,
  24. )
  25. can_delete_users_with_less_posts_than = forms.IntegerField(
  26. label=_("Maximum number of posts on deleted account"),
  27. help_text=_("Enter zero to disable this check."),
  28. min_value=0,
  29. initial=0,
  30. )
  31. def change_permissions_form(role):
  32. if isinstance(role, Role) and role.special_role != "anonymous":
  33. return PermissionsForm
  34. def build_acl(acl, roles, key_name):
  35. new_acl = {
  36. "can_delete_users_newer_than": 0,
  37. "can_delete_users_with_less_posts_than": 0,
  38. }
  39. new_acl.update(acl)
  40. return algebra.sum_acls(
  41. new_acl,
  42. roles=roles,
  43. key=key_name,
  44. can_delete_users_newer_than=algebra.greater,
  45. can_delete_users_with_less_posts_than=algebra.greater,
  46. )
  47. def add_acl_to_user(user_acl, target):
  48. target.acl["can_delete"] = can_delete_user(user_acl, target)
  49. if target.acl["can_delete"]:
  50. target.acl["can_moderate"] = True
  51. def register_with(registry):
  52. registry.acl_annotator(get_user_model(), add_acl_to_user)
  53. def allow_delete_user(user_acl, target):
  54. newer_than = user_acl["can_delete_users_newer_than"]
  55. less_posts_than = user_acl["can_delete_users_with_less_posts_than"]
  56. if not newer_than and not less_posts_than:
  57. raise PermissionDenied(_("You can't delete users."))
  58. if user_acl["user_id"] == target.id:
  59. raise PermissionDenied(_("You can't delete your account."))
  60. if target.is_staff or target.is_superuser:
  61. raise PermissionDenied(_("You can't delete administrators."))
  62. if newer_than:
  63. if target.joined_on < timezone.now() - timedelta(days=newer_than):
  64. message = ngettext(
  65. "You can't delete users that are members for more than %(days)s day.",
  66. "You can't delete users that are members for more than %(days)s days.",
  67. newer_than,
  68. )
  69. raise PermissionDenied(message % {"days": newer_than})
  70. if less_posts_than:
  71. if target.posts > less_posts_than:
  72. message = ngettext(
  73. "You can't delete users that made more than %(posts)s post.",
  74. "You can't delete users that made more than %(posts)s posts.",
  75. less_posts_than,
  76. )
  77. raise PermissionDenied(message % {"posts": less_posts_than})
  78. can_delete_user = return_boolean(allow_delete_user)
  79. def allow_delete_own_account(settings, user, target):
  80. if user.id != target.id:
  81. raise PermissionDenied(_("You can't delete other users accounts."))
  82. if not settings.allow_delete_own_account and not user.is_deleting_account:
  83. raise PermissionDenied(_("You can't delete your account."))
  84. if user.is_staff or user.is_superuser:
  85. raise PermissionDenied(
  86. _("You can't delete your account because you are an administrator.")
  87. )
  88. can_delete_own_account = return_boolean(allow_delete_own_account)