OpenSlides/server/openslides/users/access_permissions.py

140 lines
5.3 KiB
Python
Raw Normal View History

from typing import Any, Dict, List, Set
2017-08-24 12:26:55 +02:00
from ..utils.access_permissions import BaseAccessPermissions, required_user
from ..utils.auth import async_has_perm
from ..utils.utils import get_model_from_collection_string
class UserAccessPermissions(BaseAccessPermissions):
"""
Access permissions container for User and UserViewSet.
"""
async def get_restricted_data(
2019-01-06 16:22:33 +01:00
self, full_data: List[Dict[str, Any]], user_id: int
) -> List[Dict[str, Any]]:
"""
Returns the restricted serialized data for the instance prepared
for the user. Removes several fields for non admins so that they do
not get the fields they should not get.
"""
2019-01-06 16:22:33 +01:00
from .serializers import (
USERCANSEEEXTRASERIALIZER_FIELDS,
USERCANSEESERIALIZER_FIELDS,
2019-01-06 16:22:33 +01:00
)
2019-08-20 12:00:54 +02:00
def filtered_data(full_data, whitelist, whitelist_operator=None):
"""
Returns a new dict like full_data but only with whitelisted keys.
2019-08-20 12:00:54 +02:00
If the whitelist_operator is given and the full_data-user is the
oeperator (the user with user_id), the whitelist_operator will
be used instead of the whitelist.
"""
2019-08-20 12:00:54 +02:00
if whitelist_operator is not None and full_data["id"] == user_id:
return {key: full_data[key] for key in whitelist_operator}
else:
return {key: full_data[key] for key in whitelist}
2019-08-20 12:00:54 +02:00
# We have some sets of data to be sent:
# * full data i. e. all fields (including session_auth_hash),
# * all data i. e. all fields but not session_auth_hash,
# * many data i. e. all fields but not the default password and session_auth_hash,
2019-01-18 17:58:45 +01:00
# * little data i. e. all fields but not the default password, session_auth_hash,
2019-08-20 12:00:54 +02:00
# comments, gender, email, last_email_send, active status and auth_type
# * own data i. e. all little data fields plus email and gender. This is applied
# to the own user, if he just can see little or no data.
# * no data.
# Prepare field set for users with "all" data, "many" data and with "little" data.
all_data_fields = set(USERCANSEEEXTRASERIALIZER_FIELDS)
2019-01-06 16:22:33 +01:00
all_data_fields.add("groups_id")
all_data_fields.discard("groups")
all_data_fields.add("default_password")
many_data_fields = all_data_fields.copy()
2019-01-06 16:22:33 +01:00
many_data_fields.discard("default_password")
2019-08-20 12:00:54 +02:00
little_data_fields = set(USERCANSEESERIALIZER_FIELDS)
little_data_fields.add("groups_id")
little_data_fields.discard("groups")
own_data_fields = set(little_data_fields)
own_data_fields.add("email")
own_data_fields.add("gender")
# Check user permissions.
2019-01-06 16:22:33 +01:00
if await async_has_perm(user_id, "users.can_see_name"):
if await async_has_perm(user_id, "users.can_see_extra_data"):
if await async_has_perm(user_id, "users.can_manage"):
data = [filtered_data(full, all_data_fields) for full in full_data]
else:
data = [filtered_data(full, many_data_fields) for full in full_data]
else:
2019-08-20 12:00:54 +02:00
data = [
filtered_data(full, little_data_fields, own_data_fields)
for full in full_data
]
else:
# Build a list of users, that can be seen without any permissions (with little fields).
# Everybody can see himself. Also everybody can see every user
# that is required e. g. as speaker, motion submitter or
# assignment candidate.
can_see_collection_strings: Set[str] = set()
for collection_string in required_user.get_collection_strings():
2019-01-06 16:22:33 +01:00
if await async_has_perm(
user_id,
get_model_from_collection_string(
collection_string
).can_see_permission,
):
can_see_collection_strings.add(collection_string)
2019-01-06 16:22:33 +01:00
user_ids = await required_user.get_required_users(
can_see_collection_strings
)
# Add oneself.
if user_id:
user_ids.add(user_id)
# Parse data.
data = [
2019-08-20 12:00:54 +02:00
filtered_data(full, little_data_fields, own_data_fields)
2019-01-06 16:22:33 +01:00
for full in full_data
if full["id"] in user_ids
]
return data
class GroupAccessPermissions(BaseAccessPermissions):
"""
Access permissions container for Groups. Everyone can see them
"""
2017-05-23 14:07:06 +02:00
class PersonalNoteAccessPermissions(BaseAccessPermissions):
"""
Access permissions container for personal notes. Every authenticated user
can handle personal notes.
"""
async def get_restricted_data(
2019-01-06 16:22:33 +01:00
self, full_data: List[Dict[str, Any]], user_id: int
) -> List[Dict[str, Any]]:
2017-05-23 14:07:06 +02:00
"""
Returns the restricted serialized data for the instance prepared
for the user. Everybody gets only his own personal notes.
"""
# Parse data.
if not user_id:
2018-08-22 22:00:08 +02:00
data: List[Dict[str, Any]] = []
else:
for full in full_data:
2019-01-06 16:22:33 +01:00
if full["user_id"] == user_id:
data = [full]
break
else:
data = []
2017-05-23 14:07:06 +02:00
return data