views.py 3.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. # coding=utf-8
  2. from django.db import transaction, IntegrityError
  3. from django.db.models import F,ProtectedError
  4. from rest_framework.views import APIView
  5. from collections import OrderedDict
  6. from utils import response_ok
  7. from utils.permission import IsTenantUser, permission_required
  8. from utils.custom_modelviewset import CustomModelViewSet
  9. from utils.exceptions import CustomError
  10. from apps.log.models import BizLog
  11. from apps.tenant import tenant_log
  12. from django.contrib.auth.models import Group, Permission
  13. from apps.account.filters import GroupFilter
  14. from .serializers import GroupSerializer, GroupDictSerializer
  15. from .consts import PermissionMenu
  16. class GroupsViewSet(CustomModelViewSet):
  17. permission_classes = [IsTenantUser, ]
  18. queryset = Group.objects.filter()
  19. serializer_class = GroupSerializer
  20. @permission_required('account.browse_group')
  21. def filter_queryset(self, queryset):
  22. queryset = queryset.filter(tenant=self.request.user.employee.tenant)
  23. f = GroupFilter(self.request.GET, queryset=queryset)
  24. return f.qs
  25. @permission_required('account.add_group')
  26. def perform_create(self, serializer):
  27. super(GroupsViewSet, self).perform_create(serializer)
  28. instance = serializer.instance
  29. validated_data = serializer.validated_data
  30. tenant_log(self.request.user.employee, BizLog.INSERT, u'添加权限组[%s],id=%d' % (instance.name, instance.id), validated_data)
  31. @permission_required('account.add_group')
  32. def perform_update(self, serializer):
  33. super(GroupsViewSet, self).perform_update(serializer)
  34. instance = serializer.instance
  35. validated_data = serializer.validated_data
  36. tenant_log(self.request.user.employee, BizLog.UPDATE, u'修改权限组[%s],id=%d' % (instance.name, instance.id), validated_data)
  37. @permission_required('account.delete_group')
  38. def destroy(self, request, *args, **kwargs):
  39. with transaction.atomic():
  40. instance = self.get_object()
  41. if instance.tenant != request.user.employee.tenant:
  42. raise CustomError(u'禁止跨企业操作!')
  43. # user_count = instance.user_set.all().count()
  44. # if user_count:
  45. # raise CustomError(u'该权限组已分配给用户,禁止删除!')
  46. tenant_log(self.request.user.employee, BizLog.DELETE, u'删除权限组[%s],id=%d' % (instance.name, instance.id))
  47. instance.delete()
  48. return response_ok()
  49. class PermissionsListView(APIView):
  50. permission_classes = [IsTenantUser, ]
  51. def get(self, request):
  52. rows = Permission.objects.all().exclude(name__startswith='Can')
  53. perms_menus = PermissionMenu()
  54. rows = perms_menus.sort_perms(rows)
  55. menus = OrderedDict()
  56. for row in rows:
  57. item = {'id': row.id, 'name': row.name}
  58. mn = perms_menus.get_menuname_of_contenttype(row.content_type.app_label, row.content_type.model)
  59. if mn in menus:
  60. permissions = menus[mn]
  61. else:
  62. permissions = menus[mn] = OrderedDict()
  63. if row.content_type.name in permissions:
  64. if not item in permissions[row.content_type.name]:
  65. permissions[row.content_type.name].append(item)
  66. else:
  67. permissions[row.content_type.name] = [item, ]
  68. return response_ok(menus)
  69. class PermissionDictView(APIView):
  70. permission_classes = [IsTenantUser, ]
  71. def get(self, request):
  72. rows = Group.objects.filter(tenant=request.user.employee.tenant)
  73. serializer = GroupDictSerializer(rows, many=True)
  74. return response_ok(serializer.data)