
* rename consent permission Signed-off-by: Jens Langhammer <jens@goauthentik.io> * the user version Signed-off-by: Jens Langhammer <jens@goauthentik.io> t Signed-off-by: Jens Langhammer <jens@goauthentik.io> * initial role Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start form Signed-off-by: Jens Langhammer <jens@goauthentik.io> * some minor table refactoring Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix user, add assign Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add roles ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix backend Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add assign API for roles Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start adding toggle buttons Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start view page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude add_ permission for per-object perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * small cleanup Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permission list for roles Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make sidebar update Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix page header not re-rendering? Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fixup Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add search Signed-off-by: Jens Langhammer <jens@goauthentik.io> * show first category in table groupBy except when its empty Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make model and object PK optional but required together Signed-off-by: Jens Langhammer <jens@goauthentik.io> * allow for setting global perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude non-authentik permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude models which aren't allowed (base models etc) Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ensure all models have verbose_name set, exclude some more internal objects Signed-off-by: Jens Langhammer <jens@goauthentik.io> * lint fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role perm assign Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add unasign for global perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add meta changes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * clear modal state after submit Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add roles to our group Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix duplicate url names Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make recursive group query more usable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add name field to role itself and move group creation to signal Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start sync Signed-off-by: Jens Langhammer <jens@goauthentik.io> * move rbac stuff to separate django app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix lint and such Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start API changes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more API tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make admin interface not require superuser for now, improve error handling Signed-off-by: Jens Langhammer <jens@goauthentik.io> * replace some IsAdminUser where applicable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * migrate flow inspector perms to actual permission Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix license not being a serializermodel Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permission modal to models without view page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add additional permissions to assign/unassign permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add action to unassign user permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permissions tab to remaining view pages Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix flow inspector permission check Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix codecov config? Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more API tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ensure viewsets have an order set Signed-off-by: Jens Langhammer <jens@goauthentik.io> * hopefully the last api name change Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make perm modal less confusing Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start user view permission page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only make delete bulk form expandable if usedBy is set Signed-off-by: Jens Langhammer <jens@goauthentik.io> * expand permission tables Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more things Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add user global permission table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix lint Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tests' url names Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add tests for assign perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add unassign tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rebuild permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * prevent assigning/unassigning permissions to internal service accounts Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only enable default api browser in debug Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role object permissions showing duplicate Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role link on role object permissions table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix object permission modal having duplicate close buttons Signed-off-by: Jens Langhammer <jens@goauthentik.io> * return error if user has no global perm and no object perms also improve error display on table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * small optimisation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * optimise even more Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update locale Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add system permission for non-object permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * allow access to admin interface based on perm Signed-off-by: Jens Langhammer <jens@goauthentik.io> * clean Signed-off-by: Jens Langhammer <jens@goauthentik.io> * don't exclude base models Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
130 lines
5.4 KiB
Python
130 lines
5.4 KiB
Python
"""common RBAC serializers"""
|
|
from django.db.models import Q, QuerySet
|
|
from django.db.transaction import atomic
|
|
from django_filters.filters import CharFilter, ChoiceFilter
|
|
from django_filters.filterset import FilterSet
|
|
from drf_spectacular.utils import OpenApiResponse, extend_schema
|
|
from guardian.models import UserObjectPermission
|
|
from guardian.shortcuts import assign_perm, remove_perm
|
|
from rest_framework.decorators import action
|
|
from rest_framework.exceptions import ValidationError
|
|
from rest_framework.fields import BooleanField, ReadOnlyField
|
|
from rest_framework.mixins import ListModelMixin
|
|
from rest_framework.request import Request
|
|
from rest_framework.response import Response
|
|
from rest_framework.serializers import ModelSerializer
|
|
from rest_framework.viewsets import GenericViewSet
|
|
|
|
from authentik.api.decorators import permission_required
|
|
from authentik.core.api.groups import GroupMemberSerializer
|
|
from authentik.core.models import User, UserTypes
|
|
from authentik.policies.event_matcher.models import model_choices
|
|
from authentik.rbac.api.rbac import PermissionAssignSerializer
|
|
|
|
|
|
class UserObjectPermissionSerializer(ModelSerializer):
|
|
"""User-bound object level permission"""
|
|
|
|
app_label = ReadOnlyField(source="content_type.app_label")
|
|
model = ReadOnlyField(source="content_type.model")
|
|
codename = ReadOnlyField(source="permission.codename")
|
|
name = ReadOnlyField(source="permission.name")
|
|
object_pk = ReadOnlyField()
|
|
|
|
class Meta:
|
|
model = UserObjectPermission
|
|
fields = ["id", "codename", "model", "app_label", "object_pk", "name"]
|
|
|
|
|
|
class UserAssignedObjectPermissionSerializer(GroupMemberSerializer):
|
|
"""Users assigned object permission serializer"""
|
|
|
|
permissions = UserObjectPermissionSerializer(many=True, source="userobjectpermission_set")
|
|
is_superuser = BooleanField()
|
|
|
|
class Meta:
|
|
model = GroupMemberSerializer.Meta.model
|
|
fields = GroupMemberSerializer.Meta.fields + ["permissions", "is_superuser"]
|
|
|
|
|
|
class UserAssignedPermissionFilter(FilterSet):
|
|
"""Assigned permission filter"""
|
|
|
|
model = ChoiceFilter(choices=model_choices(), method="filter_model", required=True)
|
|
object_pk = CharFilter(method="filter_object_pk")
|
|
|
|
def filter_model(self, queryset: QuerySet, name, value: str) -> QuerySet:
|
|
"""Filter by object type"""
|
|
app, _, model = value.partition(".")
|
|
return queryset.filter(
|
|
Q(
|
|
user_permissions__content_type__app_label=app,
|
|
user_permissions__content_type__model=model,
|
|
)
|
|
| Q(
|
|
userobjectpermission__permission__content_type__app_label=app,
|
|
userobjectpermission__permission__content_type__model=model,
|
|
)
|
|
| Q(ak_groups__is_superuser=True)
|
|
).distinct()
|
|
|
|
def filter_object_pk(self, queryset: QuerySet, name, value: str) -> QuerySet:
|
|
"""Filter by object primary key"""
|
|
return queryset.filter(
|
|
Q(userobjectpermission__object_pk=value) | Q(ak_groups__is_superuser=True),
|
|
).distinct()
|
|
|
|
|
|
class UserAssignedPermissionViewSet(ListModelMixin, GenericViewSet):
|
|
"""Get assigned object permissions for a single object"""
|
|
|
|
serializer_class = UserAssignedObjectPermissionSerializer
|
|
ordering = ["username"]
|
|
# The filtering is done in the filterset,
|
|
# which has a required filter that does the heavy lifting
|
|
queryset = User.objects.all()
|
|
filterset_class = UserAssignedPermissionFilter
|
|
|
|
@permission_required("authentik_core.assign_user_permissions")
|
|
@extend_schema(
|
|
request=PermissionAssignSerializer(),
|
|
responses={
|
|
204: OpenApiResponse(description="Successfully assigned"),
|
|
},
|
|
)
|
|
@action(methods=["POST"], detail=True, pagination_class=None, filter_backends=[])
|
|
def assign(self, request: Request, *args, **kwargs) -> Response:
|
|
"""Assign permission(s) to user"""
|
|
user: User = self.get_object()
|
|
if user.type == UserTypes.INTERNAL_SERVICE_ACCOUNT:
|
|
raise ValidationError("Permissions cannot be assigned to an internal service account.")
|
|
data = PermissionAssignSerializer(data=request.data)
|
|
data.is_valid(raise_exception=True)
|
|
with atomic():
|
|
for perm in data.validated_data["permissions"]:
|
|
assign_perm(perm, user, data.validated_data["model_instance"])
|
|
return Response(status=204)
|
|
|
|
@permission_required("authentik_core.unassign_user_permissions")
|
|
@extend_schema(
|
|
request=PermissionAssignSerializer(),
|
|
responses={
|
|
204: OpenApiResponse(description="Successfully unassigned"),
|
|
},
|
|
)
|
|
@action(methods=["PATCH"], detail=True, pagination_class=None, filter_backends=[])
|
|
def unassign(self, request: Request, *args, **kwargs) -> Response:
|
|
"""Unassign permission(s) to user. When `object_pk` is set, the permissions
|
|
are only assigned to the specific object, otherwise they are assigned globally."""
|
|
user: User = self.get_object()
|
|
if user.type == UserTypes.INTERNAL_SERVICE_ACCOUNT:
|
|
raise ValidationError(
|
|
"Permissions cannot be unassigned from an internal service account."
|
|
)
|
|
data = PermissionAssignSerializer(data=request.data)
|
|
data.is_valid(raise_exception=True)
|
|
with atomic():
|
|
for perm in data.validated_data["permissions"]:
|
|
remove_perm(perm, user, data.validated_data["model_instance"])
|
|
return Response(status=204)
|