2024-07-01 18:10:40 +02:00
|
|
|
"""Permission handlers for the Meet core app."""
|
2024-07-30 16:48:26 +02:00
|
|
|
|
2024-01-09 15:30:36 +01:00
|
|
|
from rest_framework import permissions
|
|
|
|
|
|
2024-06-25 00:21:36 +02:00
|
|
|
from ..models import RoleChoices
|
|
|
|
|
|
2024-01-09 15:30:36 +01:00
|
|
|
ACTION_FOR_METHOD_TO_PERMISSION = {
|
|
|
|
|
"versions_detail": {"DELETE": "versions_destroy", "GET": "versions_retrieve"}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class IsAuthenticated(permissions.BasePermission):
|
|
|
|
|
"""
|
|
|
|
|
Allows access only to authenticated users. Alternative method checking the presence
|
|
|
|
|
of the auth token to avoid hitting the database.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
def has_permission(self, request, view):
|
|
|
|
|
return bool(request.auth) or request.user.is_authenticated
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class IsAuthenticatedOrSafe(IsAuthenticated):
|
|
|
|
|
"""Allows access to authenticated users (or anonymous users but only on safe methods)."""
|
|
|
|
|
|
|
|
|
|
def has_permission(self, request, view):
|
|
|
|
|
if request.method in permissions.SAFE_METHODS:
|
|
|
|
|
return True
|
|
|
|
|
return super().has_permission(request, view)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class IsSelf(IsAuthenticated):
|
|
|
|
|
"""
|
|
|
|
|
Allows access only to authenticated users. Alternative method checking the presence
|
|
|
|
|
of the auth token to avoid hitting the database.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
def has_object_permission(self, request, view, obj):
|
|
|
|
|
"""Write permissions are only allowed to the user itself."""
|
|
|
|
|
return obj == request.user
|
2024-06-25 00:21:36 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class RoomPermissions(permissions.BasePermission):
|
|
|
|
|
"""
|
|
|
|
|
Permissions applying to the room API endpoint.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
def has_permission(self, request, view):
|
|
|
|
|
"""Only allow authenticated users for unsafe methods."""
|
|
|
|
|
if request.method in permissions.SAFE_METHODS:
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
return request.user.is_authenticated
|
|
|
|
|
|
|
|
|
|
def has_object_permission(self, request, view, obj):
|
|
|
|
|
"""Object permissions are only given to administrators of the room."""
|
|
|
|
|
|
|
|
|
|
if request.method in permissions.SAFE_METHODS:
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
user = request.user
|
|
|
|
|
|
|
|
|
|
if request.method == "DELETE":
|
|
|
|
|
return obj.is_owner(user)
|
|
|
|
|
|
|
|
|
|
return obj.is_administrator(user)
|
|
|
|
|
|
|
|
|
|
|
2024-11-06 17:00:23 +01:00
|
|
|
class ResourceAccessPermission(IsAuthenticated):
|
2024-06-25 00:21:36 +02:00
|
|
|
"""
|
|
|
|
|
Permissions for a room that can only be updated by room administrators.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
def has_object_permission(self, request, view, obj):
|
|
|
|
|
"""
|
|
|
|
|
Check that the logged-in user is administrator of the linked room.
|
|
|
|
|
"""
|
|
|
|
|
user = request.user
|
|
|
|
|
if request.method == "DELETE" and obj.role == RoleChoices.OWNER:
|
|
|
|
|
return obj.user == user
|
|
|
|
|
|
|
|
|
|
return obj.resource.is_administrator(user)
|
2024-11-06 17:00:23 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class HasAbilityPermission(IsAuthenticated):
|
|
|
|
|
"""Permission class for access objects."""
|
|
|
|
|
|
|
|
|
|
def has_object_permission(self, request, view, obj):
|
|
|
|
|
"""Check permission for a given object."""
|
|
|
|
|
return obj.get_abilities(request.user).get(view.action, False)
|