open-law/app/controllers/require_permission.py

130 lines
3.9 KiB
Python
Raw Normal View History

from flask_login import current_user
from flask import flash, redirect, url_for, request, make_response
import functools
from app import models as m, db
2023-06-01 05:29:27 +00:00
from app.logger import log
def check_permissions(
entity_type: m.Permission.Entity,
access: list[m.Permission.Access],
entities: list[dict],
):
if not current_user.is_authenticated:
flash("You do not have permission", "danger")
return make_response(redirect(url_for("home.get_all")))
request_args = (
{**request.view_args, **request.args} if request.view_args else {**request.args}
)
2023-05-29 14:37:51 +00:00
entity = None
for model in entities:
entity_id_field = (model.__name__ + "_id").lower()
2023-05-29 14:37:51 +00:00
entity_id = request_args.get(entity_id_field)
2023-06-01 05:29:27 +00:00
entity: m.Book | m.Collection | m.Section | m.Interpretation | m.Comment = (
db.session.get(model, entity_id)
2023-05-29 14:37:51 +00:00
)
if entity is None:
2023-06-01 05:29:27 +00:00
log(log.INFO, "No entity [%s] found", entities)
flash("You do not have permission", "danger")
return make_response(redirect(url_for("home.get_all")))
book_id = request_args.get("book_id")
2023-06-01 05:29:27 +00:00
if book_id:
book: m.Book = db.session.get(m.Book, book_id)
if book and book.user_id == current_user.id:
# user has access because he is book owner
log(log.INFO, "User [%s] is book owner [%s]", current_user, book)
return None
if type(entity) == m.Comment:
log(log.INFO, "Entity is Comment. Replace it by entity.interpretation")
entity = entity.interpretation
if not entity or not entity.access_groups:
2023-06-01 05:29:27 +00:00
log(
log.INFO,
"User [%s] dont have permission to [%s] [%s]",
access.name,
current_user,
entity,
)
flash("You do not have permission", "warning")
return make_response(redirect(url_for("home.get_all")))
# check if user is not owner of book
2023-06-01 05:29:27 +00:00
if not book_id and entity.access_groups[0].book.user_id == current_user.id:
# user has access because he is book owner
2023-06-01 05:29:27 +00:00
log(
log.INFO,
"User [%s] is book owner [%s]",
current_user,
entity.access_groups[0].book,
)
return None
access_group_query = (
m.AccessGroup.query.join(
m.PermissionAccessGroups,
m.PermissionAccessGroups.access_group_id == m.AccessGroup.id,
)
.join(m.Permission, m.PermissionAccessGroups.permission_id == m.Permission.id)
.filter(
m.AccessGroup.id.in_(
[access_group.id for access_group in entity.access_groups]
)
)
.filter(m.AccessGroup.users.any(id=current_user.id))
.filter(m.Permission.entity_type == entity_type)
)
for access in access:
access_group_query = access_group_query.filter(
m.Permission.access.op("&")(access) > 0
)
access_groups = access_group_query.all()
if access_groups:
2023-06-01 05:29:27 +00:00
log(
log.INFO,
"User [%s] has permission to [%s] [%s]",
access.name,
current_user,
entity,
)
return
2023-06-01 05:29:27 +00:00
log(
log.INFO,
"User [%s] dont have permission to [%s] [%s]",
access.name,
current_user,
entity,
)
flash("You do not have permission", "danger")
return make_response(redirect(url_for("home.get_all")))
def require_permission(
entity_type: m.Permission.Entity,
access: list[m.Permission.Access],
entities: list[dict],
):
def decorator(f):
@functools.wraps(f)
def permission_checker(*args, **kwargs):
if response := check_permissions(
entity_type=entity_type,
access=access,
entities=entities,
):
return response
return f(*args, **kwargs)
return permission_checker
return decorator