admin.py 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. from django.conf import settings
  2. from django.contrib import admin, messages
  3. from django.contrib.admin.options import IS_POPUP_VAR
  4. from django.contrib.admin.utils import unquote
  5. from django.contrib.auth import update_session_auth_hash
  6. from django.contrib.auth.forms import (
  7. AdminPasswordChangeForm,
  8. UserChangeForm,
  9. UserCreationForm,
  10. )
  11. from django.contrib.auth.models import Group, User
  12. from django.core.exceptions import PermissionDenied
  13. from django.db import router, transaction
  14. from django.http import Http404, HttpResponseRedirect
  15. from django.template.response import TemplateResponse
  16. from django.urls import path, reverse
  17. from django.utils.decorators import method_decorator
  18. from django.utils.html import escape
  19. from django.utils.translation import gettext
  20. from django.utils.translation import gettext_lazy as _
  21. from django.views.decorators.csrf import csrf_protect
  22. from django.views.decorators.debug import sensitive_post_parameters
  23. csrf_protect_m = method_decorator(csrf_protect)
  24. sensitive_post_parameters_m = method_decorator(sensitive_post_parameters())
  25. @admin.register(Group)
  26. class GroupAdmin(admin.ModelAdmin):
  27. search_fields = ("name",)
  28. ordering = ("name",)
  29. filter_horizontal = ("permissions",)
  30. def formfield_for_manytomany(self, db_field, request=None, **kwargs):
  31. if db_field.name == "permissions":
  32. qs = kwargs.get("queryset", db_field.remote_field.model.objects)
  33. # Avoid a major performance hit resolving permission names which
  34. # triggers a content_type load:
  35. kwargs["queryset"] = qs.select_related("content_type")
  36. return super().formfield_for_manytomany(db_field, request=request, **kwargs)
  37. @admin.register(User)
  38. class UserAdmin(admin.ModelAdmin):
  39. add_form_template = "admin/auth/user/add_form.html"
  40. change_user_password_template = None
  41. fieldsets = (
  42. (None, {"fields": ("username", "password")}),
  43. (_("Personal info"), {"fields": ("first_name", "last_name", "email")}),
  44. (
  45. _("Permissions"),
  46. {
  47. "fields": (
  48. "is_active",
  49. "is_staff",
  50. "is_superuser",
  51. "groups",
  52. "user_permissions",
  53. ),
  54. },
  55. ),
  56. (_("Important dates"), {"fields": ("last_login", "date_joined")}),
  57. )
  58. add_fieldsets = (
  59. (
  60. None,
  61. {
  62. "classes": ("wide",),
  63. "fields": ("username", "usable_password", "password1", "password2"),
  64. },
  65. ),
  66. )
  67. form = UserChangeForm
  68. add_form = UserCreationForm
  69. change_password_form = AdminPasswordChangeForm
  70. list_display = ("username", "email", "first_name", "last_name", "is_staff")
  71. list_filter = ("is_staff", "is_superuser", "is_active", "groups")
  72. search_fields = ("username", "first_name", "last_name", "email")
  73. ordering = ("username",)
  74. filter_horizontal = (
  75. "groups",
  76. "user_permissions",
  77. )
  78. def get_fieldsets(self, request, obj=None):
  79. if not obj:
  80. return self.add_fieldsets
  81. return super().get_fieldsets(request, obj)
  82. def get_form(self, request, obj=None, **kwargs):
  83. """
  84. Use special form during user creation
  85. """
  86. defaults = {}
  87. if obj is None:
  88. defaults["form"] = self.add_form
  89. defaults.update(kwargs)
  90. return super().get_form(request, obj, **defaults)
  91. def get_urls(self):
  92. return [
  93. path(
  94. "<id>/password/",
  95. self.admin_site.admin_view(self.user_change_password),
  96. name="auth_user_password_change",
  97. ),
  98. ] + super().get_urls()
  99. # RemovedInDjango60Warning: when the deprecation ends, replace with:
  100. # def lookup_allowed(self, lookup, value, request):
  101. def lookup_allowed(self, lookup, value, request=None):
  102. # Don't allow lookups involving passwords.
  103. return not lookup.startswith("password") and super().lookup_allowed(
  104. lookup, value, request
  105. )
  106. @sensitive_post_parameters_m
  107. @csrf_protect_m
  108. def add_view(self, request, form_url="", extra_context=None):
  109. with transaction.atomic(using=router.db_for_write(self.model)):
  110. return self._add_view(request, form_url, extra_context)
  111. def _add_view(self, request, form_url="", extra_context=None):
  112. # It's an error for a user to have add permission but NOT change
  113. # permission for users. If we allowed such users to add users, they
  114. # could create superusers, which would mean they would essentially have
  115. # the permission to change users. To avoid the problem entirely, we
  116. # disallow users from adding users if they don't have change
  117. # permission.
  118. if not self.has_change_permission(request):
  119. if self.has_add_permission(request) and settings.DEBUG:
  120. # Raise Http404 in debug mode so that the user gets a helpful
  121. # error message.
  122. raise Http404(
  123. 'Your user does not have the "Change user" permission. In '
  124. "order to add users, Django requires that your user "
  125. 'account have both the "Add user" and "Change user" '
  126. "permissions set."
  127. )
  128. raise PermissionDenied
  129. if extra_context is None:
  130. extra_context = {}
  131. username_field = self.opts.get_field(self.model.USERNAME_FIELD)
  132. defaults = {
  133. "auto_populated_fields": (),
  134. "username_help_text": username_field.help_text,
  135. }
  136. extra_context.update(defaults)
  137. return super().add_view(request, form_url, extra_context)
  138. @sensitive_post_parameters_m
  139. def user_change_password(self, request, id, form_url=""):
  140. user = self.get_object(request, unquote(id))
  141. if not self.has_change_permission(request, user):
  142. raise PermissionDenied
  143. if user is None:
  144. raise Http404(
  145. _("%(name)s object with primary key %(key)r does not exist.")
  146. % {
  147. "name": self.opts.verbose_name,
  148. "key": escape(id),
  149. }
  150. )
  151. if request.method == "POST":
  152. form = self.change_password_form(user, request.POST)
  153. if form.is_valid():
  154. # If disabling password-based authentication was requested
  155. # (via the form field `usable_password`), the submit action
  156. # must be "unset-password". This check is most relevant when
  157. # the admin user has two submit buttons available (for example
  158. # when Javascript is disabled).
  159. valid_submission = (
  160. form.cleaned_data["set_usable_password"]
  161. or "unset-password" in request.POST
  162. )
  163. if not valid_submission:
  164. msg = gettext("Conflicting form data submitted. Please try again.")
  165. messages.error(request, msg)
  166. return HttpResponseRedirect(request.get_full_path())
  167. user = form.save()
  168. change_message = self.construct_change_message(request, form, None)
  169. self.log_change(request, user, change_message)
  170. if user.has_usable_password():
  171. msg = gettext("Password changed successfully.")
  172. else:
  173. msg = gettext("Password-based authentication was disabled.")
  174. messages.success(request, msg)
  175. update_session_auth_hash(request, form.user)
  176. return HttpResponseRedirect(
  177. reverse(
  178. "%s:%s_%s_change"
  179. % (
  180. self.admin_site.name,
  181. user._meta.app_label,
  182. user._meta.model_name,
  183. ),
  184. args=(user.pk,),
  185. )
  186. )
  187. else:
  188. form = self.change_password_form(user)
  189. fieldsets = [(None, {"fields": list(form.base_fields)})]
  190. admin_form = admin.helpers.AdminForm(form, fieldsets, {})
  191. if user.has_usable_password():
  192. title = _("Change password: %s")
  193. else:
  194. title = _("Set password: %s")
  195. context = {
  196. "title": title % escape(user.get_username()),
  197. "adminForm": admin_form,
  198. "form_url": form_url,
  199. "form": form,
  200. "is_popup": (IS_POPUP_VAR in request.POST or IS_POPUP_VAR in request.GET),
  201. "is_popup_var": IS_POPUP_VAR,
  202. "add": True,
  203. "change": False,
  204. "has_delete_permission": False,
  205. "has_change_permission": True,
  206. "has_absolute_url": False,
  207. "opts": self.opts,
  208. "original": user,
  209. "save_as": False,
  210. "show_save": True,
  211. **self.admin_site.each_context(request),
  212. }
  213. request.current_app = self.admin_site.name
  214. return TemplateResponse(
  215. request,
  216. self.change_user_password_template
  217. or "admin/auth/user/change_password.html",
  218. context,
  219. )
  220. def response_add(self, request, obj, post_url_continue=None):
  221. """
  222. Determine the HttpResponse for the add_view stage. It mostly defers to
  223. its superclass implementation but is customized because the User model
  224. has a slightly different workflow.
  225. """
  226. # We should allow further modification of the user just added i.e. the
  227. # 'Save' button should behave like the 'Save and continue editing'
  228. # button except in two scenarios:
  229. # * The user has pressed the 'Save and add another' button
  230. # * We are adding a user in a popup
  231. if "_addanother" not in request.POST and IS_POPUP_VAR not in request.POST:
  232. request.POST = request.POST.copy()
  233. request.POST["_continue"] = 1
  234. return super().response_add(request, obj, post_url_continue)