mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
125 lines
4.2 KiB
125 lines
4.2 KiB
# -*- coding: utf-8 -*-
|
|
#
|
|
from django.db.models.signals import m2m_changed, pre_delete, pre_save, post_save
|
|
from django.dispatch import receiver
|
|
|
|
from assets.models import Asset
|
|
from common.const.signals import POST_ADD, POST_REMOVE, POST_CLEAR
|
|
from common.exceptions import M2MReverseNotAllowed
|
|
from common.utils import get_logger, get_object_or_none
|
|
from perms.models import AssetPermission
|
|
from perms.utils import UserPermTreeExpireUtil
|
|
from users.models import User, UserGroup
|
|
|
|
logger = get_logger(__file__)
|
|
|
|
|
|
@receiver(pre_delete, sender=UserGroup)
|
|
def on_user_group_delete(sender, instance: UserGroup, using, **kwargs):
|
|
exists = AssetPermission.user_groups.through.objects.filter(usergroup_id=instance.id).exists()
|
|
if not exists:
|
|
return
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_user_group(instance)
|
|
|
|
|
|
@receiver(m2m_changed, sender=User.groups.through)
|
|
def on_user_groups_change(sender, instance, action, reverse, pk_set, **kwargs):
|
|
if not action.startswith('post'):
|
|
return
|
|
if reverse:
|
|
group_ids = [instance.id]
|
|
user_ids = pk_set
|
|
org_id = instance.org_id
|
|
else:
|
|
group_ids = pk_set
|
|
user_ids = [instance.id]
|
|
group = UserGroup.objects.get(id=list(group_ids)[0])
|
|
org_id = group.org_id
|
|
|
|
has_group_perm = AssetPermission.user_groups.through.objects \
|
|
.filter(usergroup_id__in=group_ids).exists()
|
|
if not has_group_perm:
|
|
return
|
|
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_users_orgs(user_ids, [org_id])
|
|
|
|
|
|
@receiver([pre_delete], sender=AssetPermission)
|
|
def on_asset_perm_pre_delete(sender, instance, **kwargs):
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_perms([instance.id])
|
|
|
|
|
|
@receiver([pre_save], sender=AssetPermission)
|
|
def on_asset_perm_pre_save(sender, instance, **kwargs):
|
|
old = get_object_or_none(AssetPermission, pk=instance.id)
|
|
if not old:
|
|
return
|
|
if old.is_valid == instance.is_valid:
|
|
return
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_perms([instance.id])
|
|
|
|
|
|
@receiver([post_save], sender=AssetPermission)
|
|
def on_asset_perm_post_save(sender, instance, created, **kwargs):
|
|
if not created:
|
|
return
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_perms([instance.id])
|
|
|
|
|
|
def need_rebuild_mapping_node(action):
|
|
return action in (POST_REMOVE, POST_ADD, POST_CLEAR)
|
|
|
|
|
|
@receiver(m2m_changed, sender=AssetPermission.nodes.through)
|
|
def on_permission_nodes_changed(sender, instance, action, reverse, **kwargs):
|
|
if not need_rebuild_mapping_node(action):
|
|
return
|
|
if reverse:
|
|
raise M2MReverseNotAllowed
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_perms([instance.id])
|
|
|
|
|
|
@receiver(m2m_changed, sender=AssetPermission.assets.through)
|
|
def on_permission_assets_changed(sender, instance, action, reverse, pk_set, model, **kwargs):
|
|
if not need_rebuild_mapping_node(action):
|
|
return
|
|
if reverse:
|
|
raise M2MReverseNotAllowed
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_perms([instance.id])
|
|
|
|
|
|
@receiver(m2m_changed, sender=AssetPermission.users.through)
|
|
def on_asset_permission_users_changed(sender, action, reverse, instance, pk_set, **kwargs):
|
|
if reverse:
|
|
raise M2MReverseNotAllowed
|
|
if not need_rebuild_mapping_node(action):
|
|
return
|
|
user_ids = pk_set
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_users_orgs(user_ids, [instance.org.id])
|
|
|
|
|
|
@receiver(m2m_changed, sender=AssetPermission.user_groups.through)
|
|
def on_asset_permission_user_groups_changed(sender, instance, action, pk_set, reverse, **kwargs):
|
|
if not need_rebuild_mapping_node(action):
|
|
return
|
|
if reverse:
|
|
raise M2MReverseNotAllowed
|
|
|
|
group_ids = pk_set
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_user_groups_orgs(group_ids, [instance.org.id])
|
|
|
|
|
|
@receiver(m2m_changed, sender=Asset.nodes.through)
|
|
def on_node_asset_change(action, instance, reverse, pk_set, **kwargs):
|
|
if not need_rebuild_mapping_node(action):
|
|
return
|
|
print("Asset node changed: ", action)
|
|
if reverse:
|
|
asset_ids = pk_set
|
|
node_ids = [instance.id]
|
|
else:
|
|
asset_ids = [instance.id]
|
|
node_ids = pk_set
|
|
|
|
UserPermTreeExpireUtil().expire_perm_tree_for_nodes_assets(node_ids, asset_ids)
|