Update apps for new ACLs refactor.

This commit is contained in:
Roberto Rosario
2015-07-01 16:36:20 -04:00
parent 8a501c2c27
commit ace76fc69c
28 changed files with 137 additions and 134 deletions

View File

@@ -8,7 +8,7 @@ from django.shortcuts import get_object_or_404
from rest_framework import generics, status from rest_framework import generics, status
from rest_framework.response import Response from rest_framework.response import Response
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from documents.permissions import permission_document_view from documents.permissions import permission_document_view
from permissions import Permission from permissions import Permission
@@ -31,7 +31,7 @@ class APICheckedoutDocumentListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_view]) Permission.check_permissions(self.request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
filtered_documents = AccessEntry.objects.filter_objects_by_access([permission_document_view], self.request.user, documents) filtered_documents = AccessControlList.objects.filter_by_access([permission_document_view], self.request.user, documents)
else: else:
filtered_documents = documents filtered_documents = documents
@@ -54,7 +54,7 @@ class APICheckedoutDocumentListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(request.user, [permission_document_checkout]) Permission.check_permissions(request.user, [permission_document_checkout])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkout, request.user, document) AccessControlList.objects.check_access(permission_document_checkout, request.user, document)
timezone = pytz.utc timezone = pytz.utc
@@ -83,7 +83,7 @@ class APICheckedoutDocumentView(generics.RetrieveDestroyAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_view]) Permission.check_permissions(self.request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
filtered_documents = AccessEntry.objects.filter_objects_by_access([permission_document_view], self.request.user, documents) filtered_documents = AccessControlList.objects.filter_by_access([permission_document_view], self.request.user, documents)
else: else:
filtered_documents = documents filtered_documents = documents
@@ -109,11 +109,11 @@ class APICheckedoutDocumentView(generics.RetrieveDestroyAPIView):
try: try:
Permission.check_permissions(request.user, [permission_document_checkin]) Permission.check_permissions(request.user, [permission_document_checkin])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkin, request.user, document) AccessControlList.objects.check_access(permission_document_checkin, request.user, document)
else: else:
try: try:
Permission.check_permissions(request.user, [permission_document_checkin_override]) Permission.check_permissions(request.user, [permission_document_checkin_override])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkin_override, request.user, document) AccessControlList.objects.check_access(permission_document_checkin_override, request.user, document)
return super(APICheckedoutDocumentView, self).delete(request, *args, **kwargs) return super(APICheckedoutDocumentView, self).delete(request, *args, **kwargs)

View File

@@ -12,7 +12,7 @@ from django.utils.translation import ugettext_lazy as _
from documents.models import Document from documents.models import Document
from documents.views import DocumentListView from documents.views import DocumentListView
from acls.models import AccessEntry from acls.models import AccessControlList
from common.utils import encapsulate, get_object_name from common.utils import encapsulate, get_object_name
from permissions import Permission from permissions import Permission
@@ -45,7 +45,7 @@ def checkout_info(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_checkout, permission_document_checkin]) Permission.check_permissions(request.user, [permission_document_checkout, permission_document_checkin])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_accesses([permission_document_checkout, permission_document_checkin], request.user, document) AccessControlList.objects.check_access([permission_document_checkout, permission_document_checkin], request.user, document)
paragraphs = [_('Document status: %s') % STATE_LABELS[document.checkout_state()]] paragraphs = [_('Document status: %s') % STATE_LABELS[document.checkout_state()]]
@@ -68,7 +68,7 @@ def checkout_document(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_checkout]) Permission.check_permissions(request.user, [permission_document_checkout])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkout, request.user, document) AccessControlList.objects.check_access(permission_document_checkout, request.user, document)
if request.method == 'POST': if request.method == 'POST':
form = DocumentCheckoutForm(data=request.POST, initial={'document': document}) form = DocumentCheckoutForm(data=request.POST, initial={'document': document})
@@ -116,12 +116,12 @@ def checkin_document(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_checkin]) Permission.check_permissions(request.user, [permission_document_checkin])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkin, request.user, document) AccessControlList.objects.check_access(permission_document_checkin, request.user, document)
else: else:
try: try:
Permission.check_permissions(request.user, [permission_document_checkin_override]) Permission.check_permissions(request.user, [permission_document_checkin_override])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_checkin_override, request.user, document) AccessControlList.objects.check_access(permission_document_checkin_override, request.user, document)
if request.method == 'POST': if request.method == 'POST':
try: try:

View File

@@ -4,7 +4,7 @@ from django.conf import settings
from django.core.exceptions import PermissionDenied from django.core.exceptions import PermissionDenied
from django.core.urlresolvers import reverse from django.core.urlresolvers import reverse
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
@@ -32,7 +32,7 @@ class ObjectListPermissionFilterMixin(object):
Permission.check_permissions(self.request.user, (self.object_permission,)) Permission.check_permissions(self.request.user, (self.object_permission,))
except PermissionDenied: except PermissionDenied:
# No global permission, filter ther queryset per object + permission # No global permission, filter ther queryset per object + permission
return AccessEntry.objects.filter_objects_by_access(self.object_permission, self.request.user, queryset) return AccessControlList.objects.filter_by_access(self.object_permission, self.request.user, queryset)
else: else:
# Has the permission globally, return all results # Has the permission globally, return all results
return queryset return queryset
@@ -52,7 +52,7 @@ class ObjectPermissionCheckMixin(object):
try: try:
Permission.check_permissions(request.user, (self.object_permission,)) Permission.check_permissions(request.user, (self.object_permission,))
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(self.object_permission, request.user, self.get_permission_object()) AccessControlList.objects.check_access(self.object_permission, request.user, self.get_permission_object())
return super(ObjectPermissionCheckMixin, self).dispatch(request, *args, **kwargs) return super(ObjectPermissionCheckMixin, self).dispatch(request, *args, **kwargs)

View File

@@ -11,7 +11,7 @@ from django.shortcuts import get_object_or_404, render_to_response
from django.template import RequestContext from django.template import RequestContext
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from common.utils import encapsulate from common.utils import encapsulate
from permissions import Permission from permissions import Permission
@@ -36,7 +36,7 @@ def transformation_list(request, app_label, model, object_id):
try: try:
Permission.check_permissions(request.user, [permission_transformation_view]) Permission.check_permissions(request.user, [permission_transformation_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_transformation_view, request.user, content_object) AccessControlList.objects.check_access(permission_transformation_view, request.user, content_object)
context = { context = {
'object_list': Transformation.objects.get_for_model(content_object), 'object_list': Transformation.objects.get_for_model(content_object),
@@ -67,7 +67,7 @@ def transformation_create(request, app_label, model, object_id):
try: try:
Permission.check_permissions(request.user, [permission_transformation_create]) Permission.check_permissions(request.user, [permission_transformation_create])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_transformation_create, request.user, content_object) AccessControlList.objects.check_access(permission_transformation_create, request.user, content_object)
if request.method == 'POST': if request.method == 'POST':
form = TransformationForm(request.POST, initial={'content_object': content_object}) form = TransformationForm(request.POST, initial={'content_object': content_object})
@@ -94,7 +94,7 @@ def transformation_delete(request, object_id):
try: try:
Permission.check_permissions(request.user, [permission_transformation_delete]) Permission.check_permissions(request.user, [permission_transformation_delete])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_transformation_delete, request.user, transformation.content_object) AccessControlList.objects.check_access(permission_transformation_delete, request.user, transformation.content_object)
if request.method == 'POST': if request.method == 'POST':
transformation.delete() transformation.delete()
@@ -119,7 +119,7 @@ def transformation_edit(request, object_id):
try: try:
Permission.check_permissions(request.user, [permission_transformation_edit]) Permission.check_permissions(request.user, [permission_transformation_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_transformation_edit, request.user, transformation.content_object) AccessControlList.objects.check_access(permission_transformation_edit, request.user, transformation.content_object)
if request.method == 'POST': if request.method == 'POST':
form = TransformationForm(request.POST, instance=transformation) form = TransformationForm(request.POST, instance=transformation)

View File

@@ -12,7 +12,7 @@ from django.shortcuts import render_to_response, get_object_or_404
from django.template import RequestContext from django.template import RequestContext
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from permissions import Permission from permissions import Permission
@@ -34,7 +34,7 @@ def comment_delete(request, comment_id=None, comment_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_comment_delete]) Permission.check_permissions(request.user, [permission_comment_delete])
except PermissionDenied: except PermissionDenied:
comments = AccessEntry.objects.filter_objects_by_access(permission_comment_delete, request.user, comments, related='content_object') comments = AccessControlList.objects.filter_by_access(permission_comment_delete, request.user, comments, related='content_object')
if not comments: if not comments:
messages.error(request, _('Must provide at least one comment.')) messages.error(request, _('Must provide at least one comment.'))
@@ -82,7 +82,7 @@ def comment_add(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_comment_create]) Permission.check_permissions(request.user, [permission_comment_create])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_comment_create, request.user, document) AccessControlList.objects.check_access(permission_comment_create, request.user, document)
post_action_redirect = None post_action_redirect = None
@@ -120,7 +120,7 @@ def comments_for_document(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_comment_view]) Permission.check_permissions(request.user, [permission_comment_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_comment_view, request.user, document) AccessControlList.objects.check_access(permission_comment_view, request.user, document)
return render_to_response('appearance/generic_list.html', { return render_to_response('appearance/generic_list.html', {
'object': document, 'object': document,

View File

@@ -5,7 +5,7 @@ from django.shortcuts import get_object_or_404
from rest_framework import generics from rest_framework import generics
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from documents.permissions import permission_document_view from documents.permissions import permission_document_view
from permissions import Permission from permissions import Permission
@@ -84,7 +84,7 @@ class APIIndexNodeInstanceDocumentListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_indexing_view]) Permission.check_permissions(self.request.user, [permission_document_indexing_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_view, self.request.user, index_node_instance.index) AccessControlList.objects.check_access(permission_document_indexing_view, self.request.user, index_node_instance.index)
return index_node_instance.documents.all() return index_node_instance.documents.all()
@@ -144,6 +144,6 @@ class APIDocumentIndexListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_view]) Permission.check_permissions(self.request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, self.request.user, document) AccessControlList.objects.check_access(permission_document_view, self.request.user, document)
return document.node_instances.all() return document.node_instances.all()

View File

@@ -10,7 +10,7 @@ from django.template import RequestContext
from django.utils.html import mark_safe from django.utils.html import mark_safe
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from common.utils import encapsulate from common.utils import encapsulate
from common.views import AssignRemoveView from common.views import AssignRemoveView
from common.widgets import two_state_template from common.widgets import two_state_template
@@ -49,7 +49,7 @@ def index_setup_list(request):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_setup]) Permission.check_permissions(request.user, [permission_document_indexing_setup])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_document_indexing_setup, request.user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_document_indexing_setup, request.user, queryset)
context['object_list'] = queryset context['object_list'] = queryset
@@ -81,7 +81,7 @@ def index_setup_edit(request, index_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_edit]) Permission.check_permissions(request.user, [permission_document_indexing_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_create, request.user, index) AccessControlList.objects.check_access(permission_document_indexing_create, request.user, index)
if request.method == 'POST': if request.method == 'POST':
form = IndexForm(request.POST, instance=index) form = IndexForm(request.POST, instance=index)
@@ -106,7 +106,7 @@ def index_setup_delete(request, index_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_delete]) Permission.check_permissions(request.user, [permission_document_indexing_delete])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_delete, request.user, index) AccessControlList.objects.check_access(permission_document_indexing_delete, request.user, index)
post_action_redirect = reverse('indexing:index_setup_list') post_action_redirect = reverse('indexing:index_setup_list')
@@ -142,7 +142,7 @@ def index_setup_view(request, index_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_setup]) Permission.check_permissions(request.user, [permission_document_indexing_setup])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_setup, request.user, index) AccessControlList.objects.check_access(permission_document_indexing_setup, request.user, index)
object_list = index.template_root.get_descendants(include_self=True) object_list = index.template_root.get_descendants(include_self=True)
@@ -201,7 +201,7 @@ def template_node_create(request, parent_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_edit]) Permission.check_permissions(request.user, [permission_document_indexing_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_edit, request.user, parent_node.index) AccessControlList.objects.check_access(permission_document_indexing_edit, request.user, parent_node.index)
if request.method == 'POST': if request.method == 'POST':
form = IndexTemplateNodeForm(request.POST) form = IndexTemplateNodeForm(request.POST)
@@ -226,7 +226,7 @@ def template_node_edit(request, node_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_edit]) Permission.check_permissions(request.user, [permission_document_indexing_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_edit, request.user, node.index) AccessControlList.objects.check_access(permission_document_indexing_edit, request.user, node.index)
if request.method == 'POST': if request.method == 'POST':
form = IndexTemplateNodeForm(request.POST, instance=node) form = IndexTemplateNodeForm(request.POST, instance=node)
@@ -252,7 +252,7 @@ def template_node_delete(request, node_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_edit]) Permission.check_permissions(request.user, [permission_document_indexing_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_edit, request.user, node.index) AccessControlList.objects.check_access(permission_document_indexing_edit, request.user, node.index)
post_action_redirect = reverse('indexing:index_setup_view', args=[node.index.pk]) post_action_redirect = reverse('indexing:index_setup_view', args=[node.index.pk])
@@ -302,7 +302,7 @@ def index_list(request):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_view]) Permission.check_permissions(request.user, [permission_document_indexing_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_document_indexing_view, request.user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_document_indexing_view, request.user, queryset)
context['object_list'] = queryset context['object_list'] = queryset
@@ -322,7 +322,7 @@ def index_instance_node_view(request, index_instance_node_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_indexing_view]) Permission.check_permissions(request.user, [permission_document_indexing_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_indexing_view, request.user, index_instance.index) AccessControlList.objects.check_access(permission_document_indexing_view, request.user, index_instance.index)
title = mark_safe(_('Contents for index: %s') % breadcrumbs) title = mark_safe(_('Contents for index: %s') % breadcrumbs)
@@ -392,7 +392,7 @@ def document_index_list(request, document_id):
# TODO: should be AND not OR # TODO: should be AND not OR
Permission.check_permissions(request.user, [permission_document_view, permission_document_indexing_view]) Permission.check_permissions(request.user, [permission_document_view, permission_document_indexing_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_document_indexing_view, request.user, queryset, related='index') queryset = AccessControlList.objects.filter_by_access(permission_document_indexing_view, request.user, queryset, related='index')
for index_instance in queryset: for index_instance in queryset:
object_list.append(get_breadcrumbs(index_instance, single_link=True, include_count=True)) object_list.append(get_breadcrumbs(index_instance, single_link=True, include_count=True))

View File

@@ -13,7 +13,7 @@ from django.template import RequestContext
from django.template.defaultfilters import force_escape from django.template.defaultfilters import force_escape
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from django_gpg.literals import SIGNATURE_STATE_NONE, SIGNATURE_STATES from django_gpg.literals import SIGNATURE_STATE_NONE, SIGNATURE_STATES
from documents.models import Document from documents.models import Document
from filetransfers.api import serve_file from filetransfers.api import serve_file
@@ -35,7 +35,7 @@ def document_verify(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_verify]) Permission.check_permissions(request.user, [permission_document_verify])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_verify, request.user, document) AccessControlList.objects.check_access(permission_document_verify, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -82,7 +82,7 @@ def document_signature_upload(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_signature_upload]) Permission.check_permissions(request.user, [permission_signature_upload])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_signature_upload, request.user, document) AccessControlList.objects.check_access(permission_signature_upload, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -118,7 +118,7 @@ def document_signature_download(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_signature_download]) Permission.check_permissions(request.user, [permission_signature_download])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_signature_download, request.user, document) AccessControlList.objects.check_access(permission_signature_download, request.user, document)
try: try:
if DocumentVersionSignature.objects.has_detached_signature(document.latest_version): if DocumentVersionSignature.objects.has_detached_signature(document.latest_version):
@@ -142,7 +142,7 @@ def document_signature_delete(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_signature_delete]) Permission.check_permissions(request.user, [permission_signature_delete])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_signature_delete, request.user, document) AccessControlList.objects.check_access(permission_signature_delete, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)

View File

@@ -9,7 +9,7 @@ from django.shortcuts import get_object_or_404
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from django.views.generic import FormView from django.views.generic import FormView
from acls.models import AccessEntry from acls.models import AccessControlList
from common.views import ( from common.views import (
AssignRemoveView, SingleObjectCreateView, SingleObjectDeleteView, AssignRemoveView, SingleObjectCreateView, SingleObjectDeleteView,
SingleObjectEditView, SingleObjectListView SingleObjectEditView, SingleObjectListView
@@ -34,7 +34,7 @@ class DocumentWorkflowInstanceListView(SingleObjectListView):
try: try:
Permission.check_permissions(request.user, [permission_document_workflow_view]) Permission.check_permissions(request.user, [permission_document_workflow_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_workflow_view, request.user, self.get_document()) AccessControlList.objects.check_access(permission_document_workflow_view, request.user, self.get_document())
return super(DocumentWorkflowInstanceListView, self).dispatch(request, *args, **kwargs) return super(DocumentWorkflowInstanceListView, self).dispatch(request, *args, **kwargs)
@@ -62,7 +62,7 @@ class WorkflowInstanceDetailView(SingleObjectListView):
try: try:
Permission.check_permissions(request.user, [permission_document_workflow_view]) Permission.check_permissions(request.user, [permission_document_workflow_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_workflow_view, request.user, self.get_workflow_instance().document) AccessControlList.objects.check_access(permission_document_workflow_view, request.user, self.get_workflow_instance().document)
return super(WorkflowInstanceDetailView, self).dispatch(request, *args, **kwargs) return super(WorkflowInstanceDetailView, self).dispatch(request, *args, **kwargs)
@@ -96,7 +96,7 @@ class WorkflowInstanceTransitionView(FormView):
try: try:
Permission.check_permissions(request.user, [permission_document_workflow_transition]) Permission.check_permissions(request.user, [permission_document_workflow_transition])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_workflow_transition, request.user, self.get_workflow_instance().document) AccessControlList.objects.check_access(permission_document_workflow_transition, request.user, self.get_workflow_instance().document)
return super(WorkflowInstanceTransitionView, self).dispatch(request, *args, **kwargs) return super(WorkflowInstanceTransitionView, self).dispatch(request, *args, **kwargs)
@@ -203,7 +203,7 @@ class SetupWorkflowStateListView(SingleObjectListView):
try: try:
Permission.check_permissions(request.user, [permission_workflow_edit]) Permission.check_permissions(request.user, [permission_workflow_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_workflow_edit, request.user, self.get_workflow()) AccessControlList.objects.check_access(permission_workflow_edit, request.user, self.get_workflow())
return super(SetupWorkflowStateListView, self).dispatch(request, *args, **kwargs) return super(SetupWorkflowStateListView, self).dispatch(request, *args, **kwargs)
@@ -233,7 +233,7 @@ class SetupWorkflowStateCreateView(SingleObjectCreateView):
try: try:
Permission.check_permissions(request.user, [permission_workflow_edit]) Permission.check_permissions(request.user, [permission_workflow_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_workflow_edit, request.user, self.get_workflow()) AccessControlList.objects.check_access(permission_workflow_edit, request.user, self.get_workflow())
return super(SetupWorkflowStateCreateView, self).dispatch(request, *args, **kwargs) return super(SetupWorkflowStateCreateView, self).dispatch(request, *args, **kwargs)
@@ -314,7 +314,7 @@ class SetupWorkflowTransitionListView(SingleObjectListView):
try: try:
Permission.check_permissions(request.user, [permission_workflow_edit]) Permission.check_permissions(request.user, [permission_workflow_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_workflow_edit, request.user, self.get_workflow()) AccessControlList.objects.check_access(permission_workflow_edit, request.user, self.get_workflow())
return super(SetupWorkflowTransitionListView, self).dispatch(request, *args, **kwargs) return super(SetupWorkflowTransitionListView, self).dispatch(request, *args, **kwargs)
@@ -344,7 +344,7 @@ class SetupWorkflowTransitionCreateView(SingleObjectCreateView):
try: try:
Permission.check_permissions(request.user, [permission_workflow_edit]) Permission.check_permissions(request.user, [permission_workflow_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_workflow_edit, request.user, self.get_workflow()) AccessControlList.objects.check_access(permission_workflow_edit, request.user, self.get_workflow())
return super(SetupWorkflowTransitionCreateView, self).dispatch(request, *args, **kwargs) return super(SetupWorkflowTransitionCreateView, self).dispatch(request, *args, **kwargs)

View File

@@ -9,7 +9,7 @@ from rest_framework import generics, status
from rest_framework.response import Response from rest_framework.response import Response
from rest_framework.settings import api_settings from rest_framework.settings import api_settings
from acls.models import AccessEntry from acls.models import AccessControlList
from common.models import SharedUploadedFile from common.models import SharedUploadedFile
from converter.exceptions import UnkownConvertError, UnknownFileFormat from converter.exceptions import UnkownConvertError, UnknownFileFormat
from converter.literals import ( from converter.literals import (
@@ -186,7 +186,7 @@ class APIDocumentImageView(generics.GenericAPIView):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
size = request.GET.get('size', setting_display_size.value) size = request.GET.get('size', setting_display_size.value)
@@ -317,7 +317,7 @@ class APIDocumentTypeDocumentListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_type_view]) Permission.check_permissions(self.request.user, [permission_document_type_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_type_view, self.request.user, document_type) AccessControlList.objects.check_access(permission_document_type_view, self.request.user, document_type)
return document_type.documents.all() return document_type.documents.all()

View File

@@ -14,6 +14,7 @@ from django.template import RequestContext
from django.utils.http import urlencode from django.utils.http import urlencode
from django.utils.translation import ugettext_lazy as _, ungettext from django.utils.translation import ugettext_lazy as _, ungettext
from acls.models import AccessControlList
from common.compressed_files import CompressedFile from common.compressed_files import CompressedFile
from common.utils import encapsulate, pretty_size from common.utils import encapsulate, pretty_size
from common.views import ParentChildListView, SingleObjectListView from common.views import ParentChildListView, SingleObjectListView
@@ -108,7 +109,7 @@ def document_list(request, object_list=None, title=None, extra_context=None):
# If user doesn't have global permission, get a list of document # If user doesn't have global permission, get a list of document
# for which he/she does hace access use it to filter the # for which he/she does hace access use it to filter the
# provided object_list # provided object_list
final_object_list = AccessEntry.objects.filter_objects_by_access( final_object_list = AccessControlList.objects.filter_by_access(
permission_document_view, request.user, pre_object_list) permission_document_view, request.user, pre_object_list)
else: else:
final_object_list = pre_object_list final_object_list = pre_object_list
@@ -131,7 +132,7 @@ def document_properties(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -168,7 +169,7 @@ def document_preview(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -199,7 +200,7 @@ def document_delete(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_document_delete]) Permission.check_permissions(request.user, [permission_document_delete])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_document_delete, request.user, documents, exception_on_empty=True) documents = AccessControlList.objects.filter_by_access(permission_document_delete, request.user, documents, exception_on_empty=True)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -245,7 +246,7 @@ def document_edit(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_properties_edit]) Permission.check_permissions(request.user, [permission_document_properties_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_properties_edit, request.user, document) AccessControlList.objects.check_access(permission_document_properties_edit, request.user, document)
if request.method == 'POST': if request.method == 'POST':
form = DocumentForm(request.POST, instance=document) form = DocumentForm(request.POST, instance=document)
@@ -290,7 +291,7 @@ def document_document_type_edit(request, document_id=None, document_id_list=None
try: try:
Permission.check_permissions(request.user, [permission_document_properties_edit]) Permission.check_permissions(request.user, [permission_document_properties_edit])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_document_properties_edit, request.user, documents, exception_on_empty=True) documents = AccessControlList.objects.filter_by_access(permission_document_properties_edit, request.user, documents, exception_on_empty=True)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -340,7 +341,7 @@ def get_document_image(request, document_id, size=setting_preview_size.value):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
page = int(request.GET.get('page', DEFAULT_PAGE_NUMBER)) page = int(request.GET.get('page', DEFAULT_PAGE_NUMBER))
@@ -376,7 +377,7 @@ def document_download(request, document_id=None, document_id_list=None, document
try: try:
Permission.check_permissions(request.user, [permission_document_download]) Permission.check_permissions(request.user, [permission_document_download])
except PermissionDenied: except PermissionDenied:
document_versions = AccessEntry.objects.filter_objects_by_access(permission_document_download, request.user, document_versions, related='document', exception_on_empty=True) document_versions = AccessControlList.objects.filter_by_access(permission_document_download, request.user, document_versions, related='document', exception_on_empty=True)
subtemplates_list = [] subtemplates_list = []
subtemplates_list.append( subtemplates_list.append(
@@ -484,7 +485,7 @@ def document_update_page_count(request, document_id=None, document_id_list=None)
try: try:
Permission.check_permissions(request.user, [permission_document_tools]) Permission.check_permissions(request.user, [permission_document_tools])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_document_tools, request.user, documents, exception_on_empty=True) documents = AccessControlList.objects.filter_by_access(permission_document_tools, request.user, documents, exception_on_empty=True)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -536,7 +537,7 @@ def document_clear_transformations(request, document_id=None, document_id_list=N
try: try:
Permission.check_permissions(request.user, [permission_transformation_delete]) Permission.check_permissions(request.user, [permission_transformation_delete])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_transformation_delete, request.user, documents, exception_on_empty=True) documents = AccessControlList.objects.filter_by_access(permission_transformation_delete, request.user, documents, exception_on_empty=True)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', post_redirect or reverse('documents:document_list')))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', post_redirect or reverse('documents:document_list'))))
next = request.POST.get('next', request.GET.get('next', request.META.get('HTTP_REFERER', post_redirect or reverse('documents:document_list')))) next = request.POST.get('next', request.GET.get('next', request.META.get('HTTP_REFERER', post_redirect or reverse('documents:document_list'))))
@@ -582,7 +583,7 @@ def document_page_view(request, document_page_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
zoom = int(request.GET.get('zoom', DEFAULT_ZOOM_LEVEL)) zoom = int(request.GET.get('zoom', DEFAULT_ZOOM_LEVEL))
rotation = int(request.GET.get('rotation', DEFAULT_ROTATION)) rotation = int(request.GET.get('rotation', DEFAULT_ROTATION))
@@ -617,7 +618,7 @@ def document_page_navigation_next(request, document_page_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name
@@ -635,7 +636,7 @@ def document_page_navigation_previous(request, document_page_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name
@@ -654,7 +655,7 @@ def document_page_navigation_first(request, document_page_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name
@@ -668,7 +669,7 @@ def document_page_navigation_last(request, document_page_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name
@@ -681,7 +682,7 @@ def transform_page(request, document_page_id, zoom_function=None, rotation_funct
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document_page.document) AccessControlList.objects.check_access(permission_document_view, request.user, document_page.document)
view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name view = resolve(urlparse.urlparse(request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))).path).view_name
@@ -744,7 +745,7 @@ def document_print(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_print]) Permission.check_permissions(request.user, [permission_document_print])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_print, request.user, document) AccessControlList.objects.check_access(permission_document_print, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -1022,7 +1023,7 @@ def document_version_list(request, document_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)
@@ -1062,7 +1063,7 @@ def document_version_revert(request, document_version_pk):
try: try:
Permission.check_permissions(request.user, [permission_document_version_revert]) Permission.check_permissions(request.user, [permission_document_version_revert])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_version_revert, request.user, document_version.document) AccessControlList.objects.check_access(permission_document_version_revert, request.user, document_version.document)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))

View File

@@ -9,7 +9,7 @@ from django.db.models import Q
from django.db.models.loading import get_model from django.db.models.loading import get_model
from django.utils.module_loading import import_string from django.utils.module_loading import import_string
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
from .models import RecentSearch from .models import RecentSearch
@@ -167,13 +167,14 @@ class SearchModel(object):
elapsed_time = unicode(datetime.datetime.now() - start_time).split(':')[2] elapsed_time = unicode(datetime.datetime.now() - start_time).split(':')[2]
queryset = self.model.objects.in_bulk(list(result_set)[: setting_limit.value]).values() #queryset = self.model.objects.in_bulk(list(result_set)[:setting_limit.value]).values()
queryset = self.model.objects.filter(pk__in=list(result_set)[:setting_limit.value])
if self.permission: if self.permission:
try: try:
Permission.check_permissions(user, [self.permission]) Permission.check_permissions(user, [self.permission])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(self.permission, user, queryset) queryset = AccessControlList.objects.filter_by_access(self.permission, user, queryset)
RecentSearch.objects.add_query_for_user(user, query_string, len(result_set)) RecentSearch.objects.add_query_for_user(user, query_string, len(result_set))

View File

@@ -9,7 +9,7 @@ from django.utils.translation import ugettext_lazy as _
from actstream.models import Action, any_stream from actstream.models import Action, any_stream
from acls.models import AccessEntry from acls.models import AccessControlList
from common.utils import encapsulate from common.utils import encapsulate
from permissions import Permission from permissions import Permission
@@ -35,7 +35,7 @@ def events_list(request, app_label=None, module_name=None, object_id=None, verb=
try: try:
Permission.check_permissions(request.user, [permission_events_view]) Permission.check_permissions(request.user, [permission_events_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_events_view, request.user, content_object) AccessControlList.objects.check_access(permission_events_view, request.user, content_object)
context.update({ context.update({
'object_list': any_stream(content_object), 'object_list': any_stream(content_object),
@@ -51,7 +51,7 @@ def events_list(request, app_label=None, module_name=None, object_id=None, verb=
# If user doesn't have global permission, get a list of document # If user doesn't have global permission, get a list of document
# for which he/she does hace access use it to filter the # for which he/she does hace access use it to filter the
# provided object_list # provided object_list
object_list = AccessEntry.objects.filter_objects_by_access(permission_events_view, request.user, pre_object_list, related='content_object') object_list = AccessControlList.objects.filter_by_access(permission_events_view, request.user, pre_object_list, related='content_object')
else: else:
object_list = pre_object_list object_list = pre_object_list
@@ -68,7 +68,7 @@ def events_list(request, app_label=None, module_name=None, object_id=None, verb=
# If user doesn't have global permission, get a list of document # If user doesn't have global permission, get a list of document
# for which he/she does hace access use it to filter the # for which he/she does hace access use it to filter the
# provided object_list # provided object_list
object_list = AccessEntry.objects.filter_objects_by_access(permission_events_view, request.user, pre_object_list, related='content_object') object_list = AccessControlList.objects.filter_by_access(permission_events_view, request.user, pre_object_list, related='content_object')
else: else:
object_list = pre_object_list object_list = pre_object_list

View File

@@ -6,7 +6,7 @@ from django.shortcuts import get_object_or_404
from rest_framework import generics, status, views from rest_framework import generics, status, views
from rest_framework.response import Response from rest_framework.response import Response
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from documents.permissions import permission_document_view from documents.permissions import permission_document_view
from permissions import Permission from permissions import Permission
@@ -98,7 +98,7 @@ class APIFolderDocumentListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_folder_view]) Permission.check_permissions(self.request.user, [permission_folder_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_view, self.request.user, folder) AccessControlList.objects.check_access(permission_folder_view, self.request.user, folder)
return folder.documents.all() return folder.documents.all()
@@ -116,7 +116,7 @@ class APIDocumentFolderListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_view]) Permission.check_permissions(self.request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, self.request.user, document) AccessControlList.objects.check_access(permission_document_view, self.request.user, document)
queryset = document.folders.all() queryset = document.folders.all()
return queryset return queryset
@@ -131,7 +131,7 @@ class APIFolderDocumentView(views.APIView):
try: try:
Permission.check_permissions(request.user, [permission_folder_remove_document]) Permission.check_permissions(request.user, [permission_folder_remove_document])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_remove_document, request.user, folder) AccessControlList.objects.check_access(permission_folder_remove_document, request.user, folder)
document = get_object_or_404(Document, pk=self.kwargs['document_pk']) document = get_object_or_404(Document, pk=self.kwargs['document_pk'])
folder.documents.remove(document) folder.documents.remove(document)
@@ -145,7 +145,7 @@ class APIFolderDocumentView(views.APIView):
try: try:
Permission.check_permissions(request.user, [permission_folder_add_document]) Permission.check_permissions(request.user, [permission_folder_add_document])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_add_document, request.user, folder) AccessControlList.objects.check_access(permission_folder_add_document, request.user, folder)
document = get_object_or_404(Document, pk=self.kwargs['document_pk']) document = get_object_or_404(Document, pk=self.kwargs['document_pk'])
folder.documents.add(document) folder.documents.add(document)

View File

@@ -6,7 +6,7 @@ from django import forms
from django.core.exceptions import PermissionDenied from django.core.exceptions import PermissionDenied
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
from .models import Folder from .models import Folder
@@ -31,7 +31,7 @@ class FolderListForm(forms.Form):
try: try:
Permission.check_permissions(user, [permission_folder_view]) Permission.check_permissions(user, [permission_folder_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_folder_view, user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_folder_view, user, queryset)
self.fields['folder'] = forms.ModelChoiceField( self.fields['folder'] = forms.ModelChoiceField(
queryset=queryset, queryset=queryset,

View File

@@ -11,6 +11,7 @@ from django.shortcuts import get_object_or_404, render_to_response
from django.template import RequestContext from django.template import RequestContext
from django.utils.translation import ugettext_lazy as _, ungettext from django.utils.translation import ugettext_lazy as _, ungettext
from acls.models import AccessControlList
from common.views import SingleObjectListView from common.views import SingleObjectListView
from documents.permissions import permission_document_view from documents.permissions import permission_document_view
from documents.models import Document from documents.models import Document
@@ -66,7 +67,7 @@ def folder_edit(request, folder_id):
try: try:
Permission.check_permissions(request.user, [permission_folder_edit]) Permission.check_permissions(request.user, [permission_folder_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_edit, request.user, folder) AccessControlList.objects.check_access(permission_folder_edit, request.user, folder)
if request.method == 'POST': if request.method == 'POST':
form = FolderForm(data=request.POST, instance=folder) form = FolderForm(data=request.POST, instance=folder)
@@ -93,7 +94,7 @@ def folder_delete(request, folder_id):
try: try:
Permission.check_permissions(request.user, [permission_folder_delete]) Permission.check_permissions(request.user, [permission_folder_delete])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_delete, request.user, folder) AccessControlList.objects.check_access(permission_folder_delete, request.user, folder)
post_action_redirect = reverse('folders:folder_list') post_action_redirect = reverse('folders:folder_list')
@@ -129,7 +130,7 @@ class FolderDetailView(DocumentListView):
try: try:
Permission.check_permissions(self.request.user, [permission_folder_view]) Permission.check_permissions(self.request.user, [permission_folder_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_folder_view, self.request.user, folder) AccessControlList.objects.check_access(permission_folder_view, self.request.user, folder)
return folder return folder
@@ -157,7 +158,7 @@ def folder_add_document(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_folder_add_document]) Permission.check_permissions(request.user, [permission_folder_add_document])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_folder_add_document, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission_folder_add_document, request.user, documents)
post_action_redirect = None post_action_redirect = None
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -205,7 +206,7 @@ def document_folder_list(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
context = { context = {
'hide_link': True, 'hide_link': True,
@@ -218,7 +219,7 @@ def document_folder_list(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_folder_view]) Permission.check_permissions(request.user, [permission_folder_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_folder_view, request.user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_folder_view, request.user, queryset)
context['object_list'] = queryset context['object_list'] = queryset
@@ -243,7 +244,7 @@ def folder_document_remove(request, folder_id, document_id=None, document_id_lis
try: try:
Permission.check_permissions(request.user, [permission_folder_remove_document]) Permission.check_permissions(request.user, [permission_folder_remove_document])
except PermissionDenied: except PermissionDenied:
folder_documents = AccessEntry.objects.filter_objects_by_access(permission_folder_remove_document, request.user, folder_documents, exception_on_empty=True) folder_documents = AccessControlList.objects.filter_by_access(permission_folder_remove_document, request.user, folder_documents, exception_on_empty=True)
logger.debug('folder_documents (post permission check): %s', folder_documents) logger.debug('folder_documents (post permission check): %s', folder_documents)

View File

@@ -11,7 +11,7 @@ from django.template import Context, RequestContext, Template
from django.utils.html import strip_tags from django.utils.html import strip_tags
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from permissions import Permission from permissions import Permission
@@ -36,7 +36,7 @@ def send_document_link(request, document_id=None, document_id_list=None, as_atta
try: try:
Permission.check_permissions(request.user, [permission]) Permission.check_permissions(request.user, [permission])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission, request.user, documents)
if not documents: if not documents:
messages.error(request, _('Must provide at least one document.')) messages.error(request, _('Must provide at least one document.'))

View File

@@ -6,7 +6,7 @@ from django.shortcuts import get_object_or_404
from rest_framework import generics, status, views from rest_framework import generics, status, views
from rest_framework.response import Response from rest_framework.response import Response
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document, DocumentType from documents.models import Document, DocumentType
from documents.permissions import ( from documents.permissions import (
permission_document_type_view, permission_document_type_edit permission_document_type_view, permission_document_type_edit
@@ -90,7 +90,7 @@ class APIDocumentMetadataListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_metadata_document_view]) Permission.check_permissions(self.request.user, [permission_metadata_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_metadata_document_view, self.request.user, document) AccessControlList.objects.check_access(permission_metadata_document_view, self.request.user, document)
else: else:
return document.metadata.all() return document.metadata.all()
elif self.request == 'POST': elif self.request == 'POST':
@@ -98,7 +98,7 @@ class APIDocumentMetadataListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_metadata_document_add]) Permission.check_permissions(self.request.user, [permission_metadata_document_add])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_metadata_document_add, self.request.user, document) AccessControlList.objects.check_access(permission_metadata_document_add, self.request.user, document)
else: else:
return document.metadata.all() return document.metadata.all()
@@ -164,7 +164,7 @@ class APIDocumentTypeMetadataTypeOptionalListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_type_view]) Permission.check_permissions(self.request.user, [permission_document_type_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_type_view, self.request.user, document_type) AccessControlList.objects.check_access(permission_document_type_view, self.request.user, document_type)
return document_type.metadata.filter(required=self.required_metadata) return document_type.metadata.filter(required=self.required_metadata)
@@ -187,7 +187,7 @@ class APIDocumentTypeMetadataTypeOptionalListView(generics.ListCreateAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_type_edit]) Permission.check_permissions(self.request.user, [permission_document_type_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_type_edit, self.request.user, document_type) AccessControlList.objects.check_access(permission_document_type_edit, self.request.user, document_type)
serializer = self.get_serializer(data=self.request.POST) serializer = self.get_serializer(data=self.request.POST)
@@ -223,7 +223,7 @@ class APIDocumentTypeMetadataTypeRequiredView(views.APIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_type_edit]) Permission.check_permissions(self.request.user, [permission_document_type_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_type_edit, self.request.user, document_type) AccessControlList.objects.check_access(permission_document_type_edit, self.request.user, document_type)
metadata_type = get_object_or_404(MetadataType, pk=self.kwargs['metadata_type_pk']) metadata_type = get_object_or_404(MetadataType, pk=self.kwargs['metadata_type_pk'])
document_type.metadata_type.remove(metadata_type) document_type.metadata_type.remove(metadata_type)

View File

@@ -10,7 +10,7 @@ from django.template import RequestContext
from django.utils.http import urlencode from django.utils.http import urlencode
from django.utils.translation import ugettext_lazy as _, ungettext from django.utils.translation import ugettext_lazy as _, ungettext
from acls.models import AccessEntry from acls.models import AccessControlList
from common.utils import encapsulate from common.utils import encapsulate
from common.views import AssignRemoveView from common.views import AssignRemoveView
from documents.models import Document, DocumentType from documents.models import Document, DocumentType
@@ -50,7 +50,7 @@ def metadata_edit(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_metadata_document_edit]) Permission.check_permissions(request.user, [permission_metadata_document_edit])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_metadata_document_edit, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission_metadata_document_edit, request.user, documents)
if not documents: if not documents:
if document_id: if document_id:
@@ -158,7 +158,7 @@ def metadata_add(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_metadata_document_add]) Permission.check_permissions(request.user, [permission_metadata_document_add])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_metadata_document_add, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission_metadata_document_add, request.user, documents)
if not documents: if not documents:
messages.error(request, _('Must provide at least one document.')) messages.error(request, _('Must provide at least one document.'))
@@ -237,7 +237,7 @@ def metadata_remove(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_metadata_document_remove]) Permission.check_permissions(request.user, [permission_metadata_document_remove])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_metadata_document_remove, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission_metadata_document_remove, request.user, documents)
if not documents: if not documents:
if document_id: if document_id:
@@ -331,7 +331,7 @@ def metadata_view(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_metadata_document_view]) Permission.check_permissions(request.user, [permission_metadata_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_metadata_document_view, request.user, document) AccessControlList.objects.check_access(permission_metadata_document_view, request.user, document)
return render_to_response('appearance/generic_list.html', { return render_to_response('appearance/generic_list.html', {
'title': _('Metadata for document: %s') % document, 'title': _('Metadata for document: %s') % document,

View File

@@ -14,7 +14,7 @@ from django.utils.encoding import smart_str, smart_unicode
from django.utils.http import urlencode, urlquote from django.utils.http import urlencode, urlquote
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
logger = logging.getLogger(__name__) logger = logging.getLogger(__name__)
@@ -96,7 +96,7 @@ class Menu(object):
resolved_link = link.resolve(context=context, resolved_object=resolved_navigation_object) resolved_link = link.resolve(context=context, resolved_object=resolved_navigation_object)
if resolved_link: if resolved_link:
resolved_links.append(resolved_link) resolved_links.append(resolved_link)
break # No need for further content object match testing #break # No need for further content object match testing
except TypeError: except TypeError:
# When source is a dictionary # When source is a dictionary
pass pass
@@ -164,7 +164,7 @@ class Link(object):
# access to the instance. # access to the instance.
if resolved_object: if resolved_object:
try: try:
AccessEntry.objects.check_access(self.permissions, request.user, resolved_object) AccessControlList.objects.check_access(self.permissions, request.user, resolved_object)
except PermissionDenied: except PermissionDenied:
return None return None
else: else:

View File

@@ -7,7 +7,7 @@ from rest_framework import generics, status
from rest_framework.response import Response from rest_framework.response import Response
from rest_framework.settings import api_settings from rest_framework.settings import api_settings
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import DocumentVersion from documents.models import DocumentVersion
from permissions import Permission from permissions import Permission
from rest_api.permissions import MayanPermission from rest_api.permissions import MayanPermission
@@ -32,7 +32,7 @@ class DocumentVersionOCRView(generics.GenericAPIView):
try: try:
Permission.check_permissions(request.user, [permission_ocr_document]) Permission.check_permissions(request.user, [permission_ocr_document])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_ocr_document, request.user, document_version.document) AccessControlList.objects.check_access(permission_ocr_document, request.user, document_version.document)
document_version.submit_for_ocr() document_version.submit_for_ocr()

View File

@@ -9,7 +9,7 @@ from django.shortcuts import get_object_or_404, render_to_response
from django.template import RequestContext from django.template import RequestContext
from django.utils.translation import ugettext_lazy as _, ungettext from django.utils.translation import ugettext_lazy as _, ungettext
from acls.models import AccessEntry from acls.models import AccessControlList
from common.views import ConfirmView, SingleObjectEditView from common.views import ConfirmView, SingleObjectEditView
from documents.models import Document, DocumentType, DocumentVersion from documents.models import Document, DocumentType, DocumentVersion
from permissions import Permission from permissions import Permission
@@ -40,7 +40,7 @@ class DocumentSubmitView(ConfirmView):
try: try:
Permission.check_permissions(request.user, [permission_ocr_document]) Permission.check_permissions(request.user, [permission_ocr_document])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_ocr_document, request.user, document) AccessControlList.objects.check_access(permission_ocr_document, request.user, document)
document.submit_for_ocr() document.submit_for_ocr()
messages.success(request, _('Document: %(document)s was added to the OCR queue.') % { messages.success(request, _('Document: %(document)s was added to the OCR queue.') % {
@@ -104,7 +104,7 @@ def document_content(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_ocr_content_view]) Permission.check_permissions(request.user, [permission_ocr_content_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_ocr_content_view, request.user, document) AccessControlList.objects.check_access(permission_ocr_content_view, request.user, document)
document.add_as_recent_document_for_user(request.user) document.add_as_recent_document_for_user(request.user)

View File

@@ -4,7 +4,7 @@ from django.core.exceptions import PermissionDenied
from rest_framework.filters import BaseFilterBackend from rest_framework.filters import BaseFilterBackend
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
@@ -16,7 +16,7 @@ class MayanObjectPermissionsFilter(BaseFilterBackend):
try: try:
Permission.check_permissions(request.user, required_permission) Permission.check_permissions(request.user, required_permission)
except PermissionDenied: except PermissionDenied:
return AccessEntry.objects.filter_objects_by_access(required_permission[0], request.user, queryset) return AccessControlList.objects.filter_by_access(required_permission[0], request.user, queryset)
else: else:
return queryset return queryset
else: else:

View File

@@ -6,7 +6,7 @@ from django.core.exceptions import PermissionDenied
from rest_framework.permissions import BasePermission from rest_framework.permissions import BasePermission
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
@@ -33,9 +33,9 @@ class MayanPermission(BasePermission):
except PermissionDenied: except PermissionDenied:
try: try:
if hasattr(view, 'mayan_permission_attribute_check'): if hasattr(view, 'mayan_permission_attribute_check'):
AccessEntry.objects.check_accesses(required_permission, request.user, getattr(obj, view.mayan_permission_attribute_check)) AccessControlList.objects.check_access(required_permission, request.user, getattr(obj, view.mayan_permission_attribute_check))
else: else:
AccessEntry.objects.check_accesses(required_permission, request.user, obj) AccessControlList.objects.check_access(required_permission, request.user, obj)
except PermissionDenied: except PermissionDenied:
return False return False
else: else:

View File

@@ -10,7 +10,7 @@ from django.template import RequestContext
from django.utils.http import urlencode from django.utils.http import urlencode
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from common import menu_facet from common import menu_facet
from common.models import SharedUploadedFile from common.models import SharedUploadedFile
from common.utils import encapsulate from common.utils import encapsulate
@@ -279,7 +279,7 @@ class UploadInteractiveVersionView(UploadBaseView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_new_version]) Permission.check_permissions(self.request.user, [permission_document_new_version])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_new_version, self.request.user, self.document) AccessControlList.objects.check_access(permission_document_new_version, self.request.user, self.document)
self.tab_links = get_active_tab_links(self.document) self.tab_links = get_active_tab_links(self.document)

View File

@@ -6,7 +6,7 @@ from django.shortcuts import get_object_or_404
from rest_framework import generics, status, views from rest_framework import generics, status, views
from rest_framework.response import Response from rest_framework.response import Response
from acls.models import AccessEntry from acls.models import AccessControlList
from documents.models import Document from documents.models import Document
from documents.permissions import permission_document_view from documents.permissions import permission_document_view
from permissions import Permission from permissions import Permission
@@ -77,7 +77,7 @@ class APITagDocumentListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_tag_view]) Permission.check_permissions(self.request.user, [permission_tag_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_tag_view, self.request.user, tag) AccessControlList.objects.check_access(permission_tag_view, self.request.user, tag)
queryset = tag.documents.all() queryset = tag.documents.all()
return queryset return queryset
@@ -98,7 +98,7 @@ class APIDocumentTagListView(generics.ListAPIView):
try: try:
Permission.check_permissions(self.request.user, [permission_document_view]) Permission.check_permissions(self.request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, self.request.user, document) AccessControlList.objects.check_access(permission_document_view, self.request.user, document)
queryset = document.tags.all() queryset = document.tags.all()
return queryset return queryset
@@ -114,7 +114,7 @@ class APIDocumentTagView(views.APIView):
try: try:
Permission.check_permissions(request.user, [permission_tag_remove]) Permission.check_permissions(request.user, [permission_tag_remove])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_tag_remove, request.user, document) AccessControlList.objects.check_access(permission_tag_remove, request.user, document)
tag = get_object_or_404(Tag, pk=self.kwargs['pk']) tag = get_object_or_404(Tag, pk=self.kwargs['pk'])
tag.documents.remove(document) tag.documents.remove(document)
@@ -129,7 +129,7 @@ class APIDocumentTagView(views.APIView):
try: try:
Permission.check_permissions(request.user, [permission_tag_attach]) Permission.check_permissions(request.user, [permission_tag_attach])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_tag_attach, request.user, document) AccessControlList.objects.check_access(permission_tag_attach, request.user, document)
tag = get_object_or_404(Tag, pk=self.kwargs['pk']) tag = get_object_or_404(Tag, pk=self.kwargs['pk'])
tag.documents.add(document) tag.documents.add(document)

View File

@@ -6,7 +6,7 @@ from django import forms
from django.core.exceptions import PermissionDenied from django.core.exceptions import PermissionDenied
from django.utils.translation import ugettext_lazy as _ from django.utils.translation import ugettext_lazy as _
from acls.models import AccessEntry from acls.models import AccessControlList
from permissions import Permission from permissions import Permission
from .models import Tag from .models import Tag
@@ -35,7 +35,7 @@ class TagListForm(forms.Form):
try: try:
Permission.check_permissions(user, [permission_tag_view]) Permission.check_permissions(user, [permission_tag_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_tag_view, user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_tag_view, user, queryset)
self.fields['tag'] = forms.ModelChoiceField( self.fields['tag'] = forms.ModelChoiceField(
queryset=queryset, queryset=queryset,

View File

@@ -59,7 +59,7 @@ def tag_attach(request, document_id=None, document_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_tag_attach]) Permission.check_permissions(request.user, [permission_tag_attach])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_tag_attach, request.user, documents) documents = AccessControlList.objects.filter_by_access(permission_tag_attach, request.user, documents)
post_action_redirect = None post_action_redirect = None
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -121,7 +121,7 @@ def tag_list(request, queryset=None, extra_context=None):
try: try:
Permission.check_permissions(request.user, [permission_tag_view]) Permission.check_permissions(request.user, [permission_tag_view])
except PermissionDenied: except PermissionDenied:
queryset = AccessEntry.objects.filter_objects_by_access(permission_tag_view, request.user, queryset) queryset = AccessControlList.objects.filter_by_access(permission_tag_view, request.user, queryset)
context['object_list'] = queryset context['object_list'] = queryset
@@ -144,7 +144,7 @@ def tag_delete(request, tag_id=None, tag_id_list=None):
try: try:
Permission.check_permissions(request.user, [permission_tag_delete]) Permission.check_permissions(request.user, [permission_tag_delete])
except PermissionDenied: except PermissionDenied:
tags = AccessEntry.objects.filter_objects_by_access(permission_tag_delete, request.user, tags) tags = AccessControlList.objects.filter_by_access(permission_tag_delete, request.user, tags)
previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) previous = request.POST.get('previous', request.GET.get('previous', request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL)))) next = request.POST.get('next', request.GET.get('next', post_action_redirect if post_action_redirect else request.META.get('HTTP_REFERER', reverse(settings.LOGIN_REDIRECT_URL))))
@@ -192,7 +192,7 @@ def tag_edit(request, tag_id):
try: try:
Permission.check_permissions(request.user, [permission_tag_edit]) Permission.check_permissions(request.user, [permission_tag_edit])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_tag_edit, request.user, tag) AccessControlList.objects.check_access(permission_tag_edit, request.user, tag)
if request.method == 'POST': if request.method == 'POST':
form = TagForm(data=request.POST, instance=tag) form = TagForm(data=request.POST, instance=tag)
@@ -231,7 +231,7 @@ def document_tags(request, document_id):
try: try:
Permission.check_permissions(request.user, [permission_document_view]) Permission.check_permissions(request.user, [permission_document_view])
except PermissionDenied: except PermissionDenied:
AccessEntry.objects.check_access(permission_document_view, request.user, document) AccessControlList.objects.check_access(permission_document_view, request.user, document)
context = { context = {
'object': document, 'object': document,
@@ -254,7 +254,7 @@ def tag_remove(request, document_id=None, document_id_list=None, tag_id=None, ta
try: try:
Permission.check_permissions(request.user, [permission_tag_remove]) Permission.check_permissions(request.user, [permission_tag_remove])
except PermissionDenied: except PermissionDenied:
documents = AccessEntry.objects.filter_objects_by_access(permission_tag_remove, request.user, documents, exception_on_empty=True) documents = AccessControlList.objects.filter_by_access(permission_tag_remove, request.user, documents, exception_on_empty=True)
post_action_redirect = None post_action_redirect = None