2018-04-07 16:16:37 +00:00
|
|
|
from collections import defaultdict
|
2019-03-26 11:46:04 +00:00
|
|
|
|
2018-05-31 11:47:57 +00:00
|
|
|
from django.db.models import Q
|
2016-09-16 01:38:07 +00:00
|
|
|
|
2020-08-16 15:08:58 +00:00
|
|
|
from common.utils import get_logger
|
2019-08-21 12:27:21 +00:00
|
|
|
from ..models import AssetPermission
|
2020-08-16 15:08:58 +00:00
|
|
|
from ..hands import Asset, User
|
|
|
|
from users.models import UserGroup
|
|
|
|
from perms.models.base import BasePermissionQuerySet
|
2017-03-09 06:55:33 +00:00
|
|
|
|
|
|
|
logger = get_logger(__file__)
|
2016-09-16 01:38:07 +00:00
|
|
|
|
|
|
|
|
2018-06-01 07:34:08 +00:00
|
|
|
def get_user_permissions(user, include_group=True):
|
|
|
|
if include_group:
|
|
|
|
groups = user.groups.all()
|
2020-02-15 12:49:20 +00:00
|
|
|
arg = Q(users=user) | Q(user_groups__in=groups)
|
|
|
|
else:
|
|
|
|
arg = Q(users=user)
|
|
|
|
return AssetPermission.get_queryset_with_prefetch().filter(arg)
|
2018-05-28 05:20:26 +00:00
|
|
|
|
2018-05-25 09:28:53 +00:00
|
|
|
|
2018-06-01 07:34:08 +00:00
|
|
|
def get_user_group_permissions(user_group):
|
2019-06-30 12:10:34 +00:00
|
|
|
return AssetPermission.get_queryset_with_prefetch().filter(
|
2018-06-01 07:34:08 +00:00
|
|
|
user_groups=user_group
|
|
|
|
)
|
2018-05-25 09:28:53 +00:00
|
|
|
|
|
|
|
|
2018-06-01 07:34:08 +00:00
|
|
|
def get_asset_permissions(asset, include_node=True):
|
|
|
|
if include_node:
|
|
|
|
nodes = asset.get_all_nodes(flat=True)
|
2020-02-15 12:49:20 +00:00
|
|
|
arg = Q(assets=asset) | Q(nodes__in=nodes)
|
|
|
|
else:
|
|
|
|
arg = Q(assets=asset)
|
|
|
|
return AssetPermission.objects.valid().filter(arg)
|
2018-05-25 09:28:53 +00:00
|
|
|
|
2018-04-07 16:16:37 +00:00
|
|
|
|
2018-06-01 07:34:08 +00:00
|
|
|
def get_node_permissions(node):
|
2019-06-28 14:07:22 +00:00
|
|
|
return AssetPermission.objects.valid().filter(nodes=node)
|
2018-04-07 16:16:37 +00:00
|
|
|
|
|
|
|
|
2018-06-01 07:34:08 +00:00
|
|
|
def get_system_user_permissions(system_user):
|
2019-06-28 14:07:22 +00:00
|
|
|
return AssetPermission.objects.valid().filter(
|
2018-06-01 07:34:08 +00:00
|
|
|
system_users=system_user
|
|
|
|
)
|
2018-04-07 16:16:37 +00:00
|
|
|
|
|
|
|
|
2020-08-16 15:08:58 +00:00
|
|
|
def get_asset_system_users_id_with_actions(asset_perm_queryset: BasePermissionQuerySet, asset: Asset):
|
|
|
|
nodes = asset.get_nodes()
|
|
|
|
node_keys = set()
|
|
|
|
for node in nodes:
|
|
|
|
ancestor_keys = node.get_ancestor_keys(with_self=True)
|
|
|
|
node_keys.update(ancestor_keys)
|
2019-09-11 10:52:42 +00:00
|
|
|
|
2020-08-16 15:08:58 +00:00
|
|
|
queryset = asset_perm_queryset.filter(
|
|
|
|
Q(assets=asset) |
|
|
|
|
Q(nodes__key__in=node_keys)
|
2019-07-02 14:08:50 +00:00
|
|
|
)
|
2020-08-16 15:08:58 +00:00
|
|
|
asset_protocols = asset.protocols_as_dict.keys()
|
|
|
|
values = queryset.filter(
|
|
|
|
system_users__protocol__in=asset_protocols
|
|
|
|
).distinct().values_list('system_users', 'actions')
|
|
|
|
system_users_actions = defaultdict(int)
|
|
|
|
|
|
|
|
for system_user_id, actions in values:
|
|
|
|
if None in (system_user_id, actions):
|
|
|
|
continue
|
|
|
|
system_users_actions[system_user_id] |= actions
|
|
|
|
return system_users_actions
|
|
|
|
|
|
|
|
|
|
|
|
def get_asset_system_users_id_with_actions_by_user(user: User, asset: Asset):
|
|
|
|
queryset = AssetPermission.objects.filter(
|
|
|
|
Q(users=user) | Q(user_groups__users=user)
|
2019-07-11 10:12:14 +00:00
|
|
|
)
|
2020-08-16 15:08:58 +00:00
|
|
|
return get_asset_system_users_id_with_actions(queryset, asset)
|
2019-07-11 10:12:14 +00:00
|
|
|
|
|
|
|
|
2020-08-16 15:08:58 +00:00
|
|
|
def get_asset_system_users_id_with_actions_by_group(group: UserGroup, asset: Asset):
|
|
|
|
queryset = AssetPermission.objects.filter(
|
|
|
|
user_groups=group
|
|
|
|
)
|
|
|
|
return get_asset_system_users_id_with_actions(queryset, asset)
|