Generated: Thu 2012-03-01 14:22 CST
Source file: /home/alisue/Dropbox/Codes/django-permission/permission/backends/role_backend.py
Stats: 35 executed, 22 missed, 4 excluded, 50 ignored
# vim: set fileencoding=utf-8 :"""Authentication backends for role systemAUTHOR: lambdalisue[Ali su ae] (lambdalisue@hashnote.net)License: The MIT License (MIT) Copyright (c) 2012 Alisue allright reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."""from __future__ import with_statementfrom permission.models import Role__all__ = ('RoleBackend',)class RoleBackend(object): """Authentication backend for role system""" supports_object_permissions = False supports_anonymous_user = False supports_inactive_user = True def authenticate(self, username, password): """This backend is only for checking permission""" return None def get_all_roles(self, user_obj): return Role.objects.filter_by_user(user_obj) def get_all_permissions(self, user_obj, obj=None): if obj is not None: # do not return any permission for obj return set() return Role.objects.get_all_permissions_of_user(user_obj) def has_role(self, user_obj, role): if user_obj.is_anonymous() or not user_obj.is_active: return False return self.get_all_roles(user_obj).filter(codename=role).exists() def has_perm(self, user_obj, perm, obj=None): if user_obj.is_anonymous() or not user_obj.is_active: return False permissions = self.get_all_permissions(user_obj, obj) permissions = set(["%s.%s" % (p.content_type.app_label, p.codename) for p in permissions]) if perm in permissions: return True # do not touch this permission return False def has_module_perms(self, user_obj, app_label): if not user_obj.is_active: return False permissions = self.get_all_permissions(user_obj) permissions = set(["%s.%s" % (p.content_type.app_label, p.codename) for p in permissions]) for perm in permissions: if perm[:perm.index('.')] == app_label: return True return False## Extend User class#from django.contrib import authfrom django.contrib.auth.models import Userdef _user_has_role(user, role, obj): anon = user.is_anonymous() active = user.is_active for backend in auth.get_backends(): if anon or active or backend.supports_inactive_user: if hasattr(backend, 'has_role'): if obj is not None: if backend.has_role(user, role, obj): return True else: if backend.has_role(user, role): return True return Falsedef _user_get_all_roles(user): anon = user.is_anonymous() active = user.is_active for backend in auth.get_backends(): if anon or active or backend.supports_inactive_user: if hasattr(backend, 'get_all_roles'): return backend.get_all_roles(user) return NoneUser.has_role = _user_has_roleUser.roles = property(_user_get_all_roles)