1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
Files
peeringdb-peeringdb/peeringdb_server/org_admin_views.py
Matt Griswold ea55c4dc38 July updates (#762)
* Change label from primary ASN to ASN

* Raise validation error when trying to update ASN

* first steps for dotf importer procotol (#697)

* migrations (#697)

* Add translation to error meessage

* Make ASN readonly in table

* Add test now that ASN should not be able to update

* Set fac.rencode to '' for all entries and make it readonly in serializer

* Add unique constraints to network ixlan ip addresses

* Add migration to null out duplicate ipaddresses for deleted netixlans

* Add unique constraints to network ixlan ip addresses

* Add migration to null out duplicate ipaddresses for deleted netixlans

* remove old migrations (#697)

* fix netixlan ipaddr dedupe migration (#268)
add netixlan ipaddr unique constraint migration (#268)

* ixf_member_data migrations (#697)

* fix table name (#697)

* importer protocol (#697)

* fix netixlan ipaddr dedupe migration (#268)
add netixlan ipaddr unique constraint migration (#268)

* ixf proposed changes notifications (#697)

* Delete repeated query

* Add a test to show rencode is readonly

* Blank out rencode when mocking data

* Remove validator now that constraint exists

* Add back unique field validator w Check Deleted true

* conflict resolving (#697)

* UniqueFieldValidator raise error with code "unique" (#268)

* conflict resolution (#697)

* Add fixme comment to tests

* conflict resolution (#697)

* Remove now invalid undelete tests

* UniqueFieldValidator raise error with code "unique" (#268)

* delete admin tools for duplicate ip addresses

* Make migration to delete duplicateipnetworkixlan

* Add ixlan-ixpfx status matching validation, add corresponding test

* delete redundant checking in test

* resolve conflict ui (#697)

* fix migrations hierarchy

* squash migrations for ixf member data

* clean up preview and post-mortem tools

* remove non-sensical permission check when undeleting soft-deleted objects through unique integrity error handling

* only include the ix-f data url in notifications to admincom (#697)

* resolve on --skip-import (#697)

* ac conflict resolution (#697)

* Define more accurately the incompatible statuses for ixlan and ixpfx

* Add another status test

* Preventing disrupting changes (#697)

* fix tests (#697)

* Stop allow_ixp_update from being write only and add a global stat for automated networks

* Add tests for global stats that appear in footer

* Change how timezone is called with datetime, to get test_stats.py/test_generate_for_current_date to pass

* test for protected entities (#697)

* admincom conflict resolution refine readonly fields (#697)
network notifications only if the problem is actually actionable by the network (#697)

* ixp / ac notifcation when ix-f source cannot be parsed (#697)
fix issue with ixlan prefix protection (#697)

* migrations (#697)

* code documentation (#697)

* ux tweaks (#697)

* UX tweaks (#697)

* Fix typo

* fix netixlan returned in IXFMemberData.apply when adding a new one (#697)

* fix import log incosistencies (#697)

* Add IXFMemberData to test

* Update test data

* Add protocol tests

* Add tests for views

* always persist changes to remote data on set_conflict (#697)

* More tests

* always persist changes to remote data on set_conflict (#697)

* suggest-add test

* net_present_at_ix should check status (#697)

* Add more protocol tests

* Edit language of some tests

* django-peeringdb to 2.1.1
relock pipfile, pin django-ratelimit to <3 as it breaks stuff

* Add net_count_ixf field to ix object (#683)

* Add the IX-F Member Export URL to the ixlan API endpoint (#249)

* Lock some objects from being deleted by the owner (#696)

* regenerate api docs (#249)

* always persist changes to remote data on set_add and set_update (#697)

* IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field

* always persist changes to remote data on set_add and set_update (#697)

* Fix suggest-add tests

* IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field

* IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field

* fix issue with deletion when ixfmemberdata for entry existed previously (#697)

* fix test_suggest_delete_local_ixf_no_flag (#697 tests)

* fix issue with deletion when ixfmemberdata for entry existed previously (#697)

* invalid ips get logged and notified to the ix via notify_error (#697)

* Fix more tests

* issue with previous_data when running without save (#697)
properly track speed errors (#697)

* reset errors on ixfmemberdata that go into pending_save (#697)

* add remote_data to admin view (#697)

* fix error reset inconsistency (#697)

* Refine invalid data tests

* remove debug output

* for notifications to ac include contact points for net and ix in the message (#697)

* settings to toggle ix-f tickets / emails (#697)

* allow turning off ix-f notifications for net and ix separately (#697)

* add jsonschema test

* Add idempotent tests to updater

* remove old ixf member tests

* Invalid data tests when ixp_updates are enabled

* fix speed error validation (#697)

* fix issue with rollback (#697)

* fix migration hierarchy

* fix ixfmemberdata _email

* django-peeringdb to 2.2 and relock

* add ixf rollback tests

* ixf email notifications off by default

* black formatted

* pyupgrade

Co-authored-by: egfrank <egfrank@20c.com>
Co-authored-by: Stefan Pratter <stefan@20c.com>
2020-07-15 07:07:01 +00:00

543 lines
15 KiB
Python

"""
Views for organization administrative actions
"""
from django.contrib.auth.decorators import login_required
from django.views.decorators.csrf import csrf_protect
from django.http import JsonResponse
from django.template import loader
from django.conf import settings
from .forms import OrgAdminUserPermissionForm
from peeringdb_server.models import (
User,
Organization,
Network,
NetworkContact,
InternetExchange,
Facility,
UserOrgAffiliationRequest,
)
import django_namespace_perms.util as nsp
from django_namespace_perms.constants import *
from django_namespace_perms.models import UserPermission
from django_handleref.models import HandleRefModel
from django.utils.translation import ugettext_lazy as _
from django.utils.translation import override
def save_user_permissions(org, user, perms):
"""
Save user permissions for the specified org and user
perms should be a dict of permissioning ids and permission levels
"""
# wipe all the user's perms for the targeted org
user.userpermission_set.filter(namespace__startswith=org.nsp_namespace).delete()
# collect permissioning namespaces from the provided permissioning ids
nsp_perms = {}
for id, permissions in list(perms.items()):
if not permissions & PERM_READ:
permissions = permissions | PERM_READ
if id == "org.%d" % org.id:
nsp_perms[org.nsp_namespace] = permissions
nsp_perms[
NetworkContact.nsp_namespace_from_id(org.id, "*", "private")
] = permissions
elif id == "net":
nsp_perms[
Network.nsp_namespace_from_id(org.id, "*").strip(".*")
] = permissions
nsp_perms[
NetworkContact.nsp_namespace_from_id(org.id, "*", "private")
] = permissions
elif id == "ix":
nsp_perms[
InternetExchange.nsp_namespace_from_id(org.id, "*").strip(".*")
] = permissions
elif id == "fac":
nsp_perms[
Facility.nsp_namespace_from_id(org.id, "*").strip(".*")
] = permissions
elif id.find(".") > -1:
id = id.split(".")
if id[0] == "net":
nsp_perms[Network.nsp_namespace_from_id(org.id, id[1])] = permissions
nsp_perms[
NetworkContact.nsp_namespace_from_id(org.id, id[1], "private")
] = permissions
elif id[0] == "ix":
nsp_perms[
InternetExchange.nsp_namespace_from_id(org.id, id[1])
] = permissions
elif id[0] == "fac":
nsp_perms[Facility.nsp_namespace_from_id(org.id, id[1])] = permissions
# save
for ns, p in list(nsp_perms.items()):
UserPermission.objects.create(namespace=ns, permissions=p, user=user)
return nsp_perms
def load_all_user_permissions(org):
"""
Returns dict of all users with all their permissions for
the given org
"""
rv = {}
for user in org.usergroup.user_set.all():
uperms, perms = load_user_permissions(org, user)
rv[user.id] = {
"id": user.id,
"perms": perms,
"name": f"{user.full_name} <{user.email}> {user.username}",
}
return rv
def load_user_permissions(org, user):
"""
Returns user's permissions for the specified org
"""
# load all of the user's permissions related to this org
uperms = {
p.namespace: p.permissions
for p in user.userpermission_set.filter(
namespace__startswith=org.nsp_namespace
)
}
perms = {}
extract_permission_id(uperms, perms, org, org)
# extract user's permissioning ids from nsp_namespaces targeting
# organization's entities
for model in [Network, InternetExchange, Facility]:
extract_permission_id(uperms, perms, model, org)
# extract user's permissioning ids from nsp_namespaces targeting
# organization's entities by their id (eg user has perms only
# to THAT specific network)
for net in org.net_set_active:
extract_permission_id(uperms, perms, net, org)
for net in org.ix_set_active:
extract_permission_id(uperms, perms, net, org)
for net in org.fac_set_active:
extract_permission_id(uperms, perms, net, org)
return uperms, perms
def permission_ids(org):
"""
returns a dict of a valid permissioning ids for
the specified organization
"""
perms = {
"org.%d" % org.id: _("Organization and all Entities it owns"),
"net": _("Any Network"),
"fac": _("Any Facility"),
"ix": _("Any Exchange"),
}
perms.update(
{
"net.%d" % net.id:
_("Network - %(net_name)s") % {"net_name": net.name}
for net in org.net_set_active
}
)
perms.update(
{
"ix.%d" % ix.id: _("Exchange - %(ix_name)s") % {"ix_name": ix.name}
for ix in org.ix_set_active
}
)
perms.update(
{
"fac.%d" % fac.id:
_("Facility - %(fac_name)s") % {"fac_name": fac.name}
for fac in org.fac_set_active
}
)
return perms
def extract_permission_id(source, dest, entity, org):
"""
extract a user's permissioning id for the specified
entity from source <dict> and store it in dest <dict>
source should be a dict containing django-namespace-perms
(namespace, level) items
dest should be a dict where permission ids are to be
exracted to
entity can either be a HandleRef instance or clas
org needs to be an Organization instance that owns the
entity
"""
if isinstance(entity, HandleRefModel):
# instance
k = entity.nsp_namespace
j = "%s.%d" % (entity.ref_tag, entity.id)
else:
# class
k = entity.nsp_namespace_from_id(org.id, "*").strip(".*")
j = entity.handleref.tag
if k in source:
dest[j] = source[k]
def org_admin_required(fnc):
"""
Decorator function that ensures that the requesting user
has administrative rights to the targeted organization
Also sets "org" in kwargs
"""
def callback(request, **kwargs):
org_id = request.POST.get("org_id", request.GET.get("org_id"))
if not org_id:
return JsonResponse({}, status=400)
try:
org = Organization.objects.get(id=org_id)
if not nsp.has_perms(request.user, org.nsp_namespace_manage, "update"):
return JsonResponse({}, status=403)
kwargs["org"] = org
return fnc(request, **kwargs)
except Organization.DoesNotExist:
return JsonResponse(
{"non_field_errors": [_("Invalid organization specified")]}, status=400
)
return callback
def target_user_validate(fnc):
"""
Decorator function that ensures that the targeted user
is a member of the targeted organization
Should be below org_admin_required
Also sets "user" in kwargs
"""
def callback(request, **kwargs):
user_id = request.POST.get("user_id", request.GET.get("user_id"))
org = kwargs.get("org")
if not user_id:
return JsonResponse({}, status=400)
try:
user = User.objects.get(id=user_id)
except User.DoesNotExist:
return JsonResponse({}, status=400)
if not user.is_org_member(org) and not user.is_org_admin(org):
return JsonResponse({}, status=403)
kwargs["user"] = user
return fnc(request, **kwargs)
return callback
@login_required
@org_admin_required
def users(request, **kwargs):
"""
Returns JsonResponse with a list of all users in the specified org
"""
org = kwargs.get("org")
rv = {
"users": [
{
"id": user.id,
"name": f"{user.full_name} <{user.email}, {user.username}>",
}
for user in org.usergroup.user_set.all()
]
}
rv.update({"status": "ok"})
return JsonResponse(rv)
@login_required
@org_admin_required
@target_user_validate
def manage_user_delete(request, **kwargs):
"""
remove user from org
"""
org = kwargs.get("org")
user = kwargs.get("user")
save_user_permissions(org, user, {})
org.usergroup.user_set.remove(user)
org.admin_usergroup.user_set.remove(user)
return JsonResponse({"status": "ok"})
@login_required
@org_admin_required
@target_user_validate
def manage_user_update(request, **kwargs):
"""
udpate a user in the org
right now this only allows for moving the user either
to admin or member group
"""
org = kwargs.get("org")
user = kwargs.get("user")
group = request.POST.get("group")
if group not in ["member", "admin"]:
return JsonResponse({"group": _("Needs to be member or admin")}, status=400)
if group == "admin":
org.usergroup.user_set.remove(user)
org.admin_usergroup.user_set.add(user)
elif group == "member":
org.usergroup.user_set.add(user)
org.admin_usergroup.user_set.remove(user)
return JsonResponse({"status": "ok"})
@login_required
@org_admin_required
def user_permissions(request, **kwargs):
"""
Returns JsonRespone with list of user's permissions for the targeted
org an entities under it
Permisions are returned as a dict of permissioning ids and permission
levels.
Permissioning ids serve as a wrapper for actual permissioning namespaces
so we can expose them to the organization admins for changes without allowing
them to set permissioning namespaces directly.
"""
org = kwargs.get("org")
perms_rv = {}
for user in org.usergroup.user_set.all():
uperms, perms = load_user_permissions(org, user)
perms_rv[user.id] = perms
return JsonResponse({"status": "ok", "user_permissions": perms_rv})
@login_required
@csrf_protect
@org_admin_required
@target_user_validate
def user_permission_update(request, **kwargs):
"""
Update/Add a user's permission
perms = permission level
entity = permission id
"""
org = kwargs.get("org")
user = kwargs.get("user")
uperms, perms = load_user_permissions(org, user)
form = OrgAdminUserPermissionForm(request.POST)
if not form.is_valid():
return JsonResponse(form.errors, status=400)
level = form.cleaned_data.get("perms")
entity = form.cleaned_data.get("entity")
perms[entity] = level
save_user_permissions(org, user, perms)
return JsonResponse({"status": "ok"})
@login_required
@csrf_protect
@org_admin_required
@target_user_validate
def user_permission_remove(request, **kwargs):
"""
Remove a user's permission
entity = permission id
"""
org = kwargs.get("org")
user = kwargs.get("user")
entity = request.POST.get("entity")
uperms, perms = load_user_permissions(org, user)
if entity in perms:
del perms[entity]
save_user_permissions(org, user, perms)
return JsonResponse({"status": "ok"})
@login_required
@org_admin_required
def permissions(request, **kwargs):
"""
Returns list of permissioning ids with labels that
are valid to be permissioned out to regular org users
Permissioning ids serve as a wrapper for actual permissioning namespaces
so we can expose them to the organization admins for changes without allowing
them to set permissioning namespaces directly.
"""
org = kwargs.get("org")
perms = [{"id": id, "name": name} for id, name in list(permission_ids(org).items())]
perms = sorted(perms, key=lambda x: x.get("name"))
return JsonResponse({"status": "ok", "permissions": perms})
@login_required
@csrf_protect
@org_admin_required
def uoar_approve(request, **kwargs):
"""
Approve a user request to affiliate with the organization
"""
org = kwargs.get("org")
try:
uoar = UserOrgAffiliationRequest.objects.get(id=request.POST.get("id"))
if uoar.org != org:
return JsonResponse({}, status=403)
try:
user = uoar.user
except User.DoesNotExist:
uoar.delete()
return JsonResponse({"status": "ok"})
uoar.approve()
# notify rest of org admins that the affiliation request has been
# approved
for admin_user in org.admin_usergroup.user_set.all():
if admin_user != request.user:
with override(admin_user.locale):
admin_user.email_user(
_("%(user_name)s's afilliation request has been approved")
% {"user_name": uoar.user.full_name},
loader.get_template(
"email/notify-org-admin-user-affil-approved.txt"
).render(
{
"user": request.user,
"uoar": uoar,
"org_management_url": "%s/org/%d#users"
% (settings.BASE_URL, org.id),
}
),
)
return JsonResponse(
{
"status": "ok",
"full_name": user.full_name,
"id": user.id,
"email": user.email,
}
)
except UserOrgAffiliationRequest.DoesNotExist:
return JsonResponse({"status": "ok"})
return JsonResponse({"status": "ok"})
@login_required
@csrf_protect
@org_admin_required
def uoar_deny(request, **kwargs):
"""
Approve a user request to affiliate with the organization
"""
org = kwargs.get("org")
try:
uoar = UserOrgAffiliationRequest.objects.get(id=request.POST.get("id"))
if uoar.org != org:
return JsonResponse({}, status=403)
try:
user = uoar.user
uoar.deny()
except User.DoesNotExist:
uoar.delete()
return JsonResponse({"status": "ok"})
# notify rest of org admins that the affiliation request has been
# approved
for user in org.admin_usergroup.user_set.all():
if user != request.user:
with override(user.locale):
user.email_user(
_("%(user_name)s's afilliation request has been denied")
% {"user_name": uoar.user.full_name},
loader.get_template(
"email/notify-org-admin-user-affil-denied.txt"
).render(
{
"user": request.user,
"uoar": uoar,
"org_management_url": "%s/org/%d#users"
% (settings.BASE_URL, org.id),
}
),
)
except UserOrgAffiliationRequest.DoesNotExist:
return JsonResponse({"status": "ok"})
return JsonResponse({"status": "ok"})