admin.py 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184
  1. from django.db import transaction
  2. from django.conf import settings
  3. from django.contrib import admin
  4. from django.contrib.admin.options import IS_POPUP_VAR
  5. from django.contrib.auth import update_session_auth_hash
  6. from django.contrib.auth.forms import (UserCreationForm, UserChangeForm,
  7. AdminPasswordChangeForm)
  8. from django.contrib.auth.models import User, Group
  9. from django.contrib import messages
  10. from django.core.exceptions import PermissionDenied
  11. from django.http import HttpResponseRedirect, Http404
  12. from django.shortcuts import get_object_or_404
  13. from django.template.response import TemplateResponse
  14. from django.utils.html import escape
  15. from django.utils.decorators import method_decorator
  16. from django.utils.translation import ugettext, ugettext_lazy as _
  17. from django.views.decorators.csrf import csrf_protect
  18. from django.views.decorators.debug import sensitive_post_parameters
  19. csrf_protect_m = method_decorator(csrf_protect)
  20. sensitive_post_parameters_m = method_decorator(sensitive_post_parameters())
  21. class GroupAdmin(admin.ModelAdmin):
  22. search_fields = ('name',)
  23. ordering = ('name',)
  24. filter_horizontal = ('permissions',)
  25. def formfield_for_manytomany(self, db_field, request=None, **kwargs):
  26. if db_field.name == 'permissions':
  27. qs = kwargs.get('queryset', db_field.rel.to.objects)
  28. # Avoid a major performance hit resolving permission names which
  29. # triggers a content_type load:
  30. kwargs['queryset'] = qs.select_related('content_type')
  31. return super(GroupAdmin, self).formfield_for_manytomany(
  32. db_field, request=request, **kwargs)
  33. class UserAdmin(admin.ModelAdmin):
  34. add_form_template = 'admin/auth/user/add_form.html'
  35. change_user_password_template = None
  36. fieldsets = (
  37. (None, {'fields': ('username', 'password')}),
  38. (_('Personal info'), {'fields': ('first_name', 'last_name', 'email')}),
  39. (_('Permissions'), {'fields': ('is_active', 'is_staff', 'is_superuser',
  40. 'groups', 'user_permissions')}),
  41. (_('Important dates'), {'fields': ('last_login', 'date_joined')}),
  42. )
  43. add_fieldsets = (
  44. (None, {
  45. 'classes': ('wide',),
  46. 'fields': ('username', 'password1', 'password2'),
  47. }),
  48. )
  49. form = UserChangeForm
  50. add_form = UserCreationForm
  51. change_password_form = AdminPasswordChangeForm
  52. list_display = ('username', 'email', 'first_name', 'last_name', 'is_staff')
  53. list_filter = ('is_staff', 'is_superuser', 'is_active', 'groups')
  54. search_fields = ('username', 'first_name', 'last_name', 'email')
  55. ordering = ('username',)
  56. filter_horizontal = ('groups', 'user_permissions',)
  57. def get_fieldsets(self, request, obj=None):
  58. if not obj:
  59. return self.add_fieldsets
  60. return super(UserAdmin, self).get_fieldsets(request, obj)
  61. def get_form(self, request, obj=None, **kwargs):
  62. """
  63. Use special form during user creation
  64. """
  65. defaults = {}
  66. if obj is None:
  67. defaults['form'] = self.add_form
  68. defaults.update(kwargs)
  69. return super(UserAdmin, self).get_form(request, obj, **defaults)
  70. def get_urls(self):
  71. from django.conf.urls import patterns
  72. return patterns('',
  73. (r'^(\d+)/password/$',
  74. self.admin_site.admin_view(self.user_change_password))
  75. ) + super(UserAdmin, self).get_urls()
  76. def lookup_allowed(self, lookup, value):
  77. # See #20078: we don't want to allow any lookups involving passwords.
  78. if lookup.startswith('password'):
  79. return False
  80. return super(UserAdmin, self).lookup_allowed(lookup, value)
  81. @sensitive_post_parameters_m
  82. @csrf_protect_m
  83. @transaction.atomic
  84. def add_view(self, request, form_url='', extra_context=None):
  85. # It's an error for a user to have add permission but NOT change
  86. # permission for users. If we allowed such users to add users, they
  87. # could create superusers, which would mean they would essentially have
  88. # the permission to change users. To avoid the problem entirely, we
  89. # disallow users from adding users if they don't have change
  90. # permission.
  91. if not self.has_change_permission(request):
  92. if self.has_add_permission(request) and settings.DEBUG:
  93. # Raise Http404 in debug mode so that the user gets a helpful
  94. # error message.
  95. raise Http404(
  96. 'Your user does not have the "Change user" permission. In '
  97. 'order to add users, Django requires that your user '
  98. 'account have both the "Add user" and "Change user" '
  99. 'permissions set.')
  100. raise PermissionDenied
  101. if extra_context is None:
  102. extra_context = {}
  103. username_field = self.model._meta.get_field(self.model.USERNAME_FIELD)
  104. defaults = {
  105. 'auto_populated_fields': (),
  106. 'username_help_text': username_field.help_text,
  107. }
  108. extra_context.update(defaults)
  109. return super(UserAdmin, self).add_view(request, form_url,
  110. extra_context)
  111. @sensitive_post_parameters_m
  112. def user_change_password(self, request, id, form_url=''):
  113. if not self.has_change_permission(request):
  114. raise PermissionDenied
  115. user = get_object_or_404(self.get_queryset(request), pk=id)
  116. if request.method == 'POST':
  117. form = self.change_password_form(user, request.POST)
  118. if form.is_valid():
  119. form.save()
  120. change_message = self.construct_change_message(request, form, None)
  121. self.log_change(request, user, change_message)
  122. msg = ugettext('Password changed successfully.')
  123. messages.success(request, msg)
  124. update_session_auth_hash(request, form.user)
  125. return HttpResponseRedirect('..')
  126. else:
  127. form = self.change_password_form(user)
  128. fieldsets = [(None, {'fields': list(form.base_fields)})]
  129. adminForm = admin.helpers.AdminForm(form, fieldsets, {})
  130. context = {
  131. 'title': _('Change password: %s') % escape(user.get_username()),
  132. 'adminForm': adminForm,
  133. 'form_url': form_url,
  134. 'form': form,
  135. 'is_popup': (IS_POPUP_VAR in request.POST or
  136. IS_POPUP_VAR in request.GET),
  137. 'add': True,
  138. 'change': False,
  139. 'has_delete_permission': False,
  140. 'has_change_permission': True,
  141. 'has_absolute_url': False,
  142. 'opts': self.model._meta,
  143. 'original': user,
  144. 'save_as': False,
  145. 'show_save': True,
  146. }
  147. context.update(admin.site.each_context())
  148. return TemplateResponse(request,
  149. self.change_user_password_template or
  150. 'admin/auth/user/change_password.html',
  151. context, current_app=self.admin_site.name)
  152. def response_add(self, request, obj, post_url_continue=None):
  153. """
  154. Determines the HttpResponse for the add_view stage. It mostly defers to
  155. its superclass implementation but is customized because the User model
  156. has a slightly different workflow.
  157. """
  158. # We should allow further modification of the user just added i.e. the
  159. # 'Save' button should behave like the 'Save and continue editing'
  160. # button except in two scenarios:
  161. # * The user has pressed the 'Save and add another' button
  162. # * We are adding a user in a popup
  163. if '_addanother' not in request.POST and IS_POPUP_VAR not in request.POST:
  164. request.POST['_continue'] = 1
  165. return super(UserAdmin, self).response_add(request, obj,
  166. post_url_continue)
  167. admin.site.register(Group, GroupAdmin)
  168. admin.site.register(User, UserAdmin)