Enable many-to-many model assignment for ObjectPermissions

This commit is contained in:
Jeremy Stretch 2020-05-28 15:04:46 -04:00
parent bdfc0364d5
commit f65b2278f0
6 changed files with 122 additions and 94 deletions

View File

@ -201,11 +201,13 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Retrieve permitted object # Retrieve permitted object
response = self.client.get(self.prefixes[0].get_absolute_url()) response = self.client.get(self.prefixes[0].get_absolute_url())
@ -223,11 +225,13 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Retrieve all objects. Only permitted objects should be returned. # Retrieve all objects. Only permitted objects should be returned.
response = self.client.get(reverse('ipam:prefix_list')) response = self.client.get(reverse('ipam:prefix_list'))
@ -255,12 +259,14 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertEqual(initial_count, Prefix.objects.count()) self.assertEqual(initial_count, Prefix.objects.count())
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True, can_view=True,
can_add=True can_add=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to create a non-permitted object # Attempt to create a non-permitted object
request = { request = {
@ -301,12 +307,14 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True, can_view=True,
can_change=True can_change=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to edit a non-permitted object # Attempt to edit a non-permitted object
request = { request = {
@ -343,12 +351,14 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True, can_view=True,
can_delete=True can_delete=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Delete permitted object # Delete permitted object
request = { request = {
@ -390,11 +400,13 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertEqual(initial_count, Prefix.objects.count()) self.assertEqual(initial_count, Prefix.objects.count())
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_add=True can_add=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to create non-permitted objects # Attempt to create non-permitted objects
request = { request = {
@ -437,11 +449,13 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_change=True can_change=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to edit non-permitted objects # Attempt to edit non-permitted objects
request = { request = {
@ -479,12 +493,14 @@ class ObjectPermissionViewTestCase(TestCase):
self.assertHttpStatus(response, 403) self.assertHttpStatus(response, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True, can_view=True,
can_delete=True can_delete=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to delete non-permitted object # Attempt to delete non-permitted object
request = { request = {
@ -549,11 +565,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
self.assertEqual(response.status_code, 403) self.assertEqual(response.status_code, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Retrieve permitted object # Retrieve permitted object
url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk}) url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
@ -574,11 +592,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
self.assertEqual(response.status_code, 403) self.assertEqual(response.status_code, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Retrieve all objects. Only permitted objects should be returned. # Retrieve all objects. Only permitted objects should be returned.
response = self.client.get(url, **self.header) response = self.client.get(url, **self.header)
@ -599,11 +619,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
self.assertEqual(response.status_code, 403) self.assertEqual(response.status_code, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_add=True can_add=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to create a non-permitted object # Attempt to create a non-permitted object
response = self.client.post(url, data, format='json', **self.header) response = self.client.post(url, data, format='json', **self.header)
@ -626,11 +648,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
self.assertEqual(response.status_code, 403) self.assertEqual(response.status_code, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_change=True can_change=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to edit a non-permitted object # Attempt to edit a non-permitted object
data = {'site': self.sites[0].pk} data = {'site': self.sites[0].pk}
@ -659,11 +683,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
self.assertEqual(response.status_code, 403) self.assertEqual(response.status_code, 403)
# Assign object permission # Assign object permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(Prefix),
attrs={'site__name': 'Site 1'}, attrs={'site__name': 'Site 1'},
can_delete=True can_delete=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(Prefix))
# Attempt to delete a non-permitted object # Attempt to delete a non-permitted object
url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[3].pk}) url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[3].pk})

View File

@ -89,8 +89,8 @@ class ObjectPermissionForm(forms.ModelForm):
super().__init__(*args, **kwargs) super().__init__(*args, **kwargs)
# Format ContentType choices # Format ContentType choices
order_content_types(self.fields['model']) order_content_types(self.fields['content_types'])
self.fields['model'].choices.insert(0, ('', '---------')) self.fields['content_types'].choices.insert(0, ('', '---------'))
@admin.register(ObjectPermission) @admin.register(ObjectPermission)

View File

@ -1,9 +1,8 @@
# Generated by Django 3.0.6 on 2020-05-27 14:17 # Generated by Django 3.0.6 on 2020-05-28 18:24
from django.conf import settings from django.conf import settings
import django.contrib.postgres.fields.jsonb import django.contrib.postgres.fields.jsonb
from django.db import migrations, models from django.db import migrations, models
import django.db.models.deletion
class Migration(migrations.Migration): class Migration(migrations.Migration):
@ -25,12 +24,9 @@ class Migration(migrations.Migration):
('can_add', models.BooleanField(default=False)), ('can_add', models.BooleanField(default=False)),
('can_change', models.BooleanField(default=False)), ('can_change', models.BooleanField(default=False)),
('can_delete', models.BooleanField(default=False)), ('can_delete', models.BooleanField(default=False)),
('content_types', models.ManyToManyField(limit_choices_to={'app_label__in': ['circuits', 'dcim', 'extras', 'ipam', 'secrets', 'tenancy', 'virtualization']}, related_name='object_permissions', to='contenttypes.ContentType')),
('groups', models.ManyToManyField(blank=True, related_name='object_permissions', to='auth.Group')), ('groups', models.ManyToManyField(blank=True, related_name='object_permissions', to='auth.Group')),
('model', models.ForeignKey(limit_choices_to={'app_label__in': ['circuits', 'dcim', 'extras', 'ipam', 'secrets', 'tenancy', 'virtualization']}, on_delete=django.db.models.deletion.CASCADE, to='contenttypes.ContentType')),
('users', models.ManyToManyField(blank=True, related_name='object_permissions', to=settings.AUTH_USER_MODEL)), ('users', models.ManyToManyField(blank=True, related_name='object_permissions', to=settings.AUTH_USER_MODEL)),
], ],
options={
'unique_together': {('model', 'attrs')},
},
), ),
] ]

View File

@ -212,14 +212,14 @@ class ObjectPermission(models.Model):
blank=True, blank=True,
related_name='object_permissions' related_name='object_permissions'
) )
model = models.ForeignKey( content_types = models.ManyToManyField(
to=ContentType, to=ContentType,
limit_choices_to={ limit_choices_to={
'app_label__in': [ 'app_label__in': [
'circuits', 'dcim', 'extras', 'ipam', 'secrets', 'tenancy', 'virtualization', 'circuits', 'dcim', 'extras', 'ipam', 'secrets', 'tenancy', 'virtualization',
], ],
}, },
on_delete=models.CASCADE related_name='object_permissions'
) )
attrs = JSONField( attrs = JSONField(
blank=True, blank=True,
@ -239,8 +239,8 @@ class ObjectPermission(models.Model):
default=False default=False
) )
class Meta: def __str__(self):
unique_together = ('model', 'attrs') return "Object permission"
def clean(self): def clean(self):

View File

@ -26,18 +26,19 @@ class ObjectPermissionBackend(ModelBackend):
object_permissions = ObjectPermission.objects.filter( object_permissions = ObjectPermission.objects.filter(
Q(users=user_obj) | Q(users=user_obj) |
Q(groups__user=user_obj) Q(groups__user=user_obj)
).prefetch_related('model') ).prefetch_related('content_types')
# Create a dictionary mapping permissions to their attributes # Create a dictionary mapping permissions to their attributes
perms = dict() perms = dict()
for obj_perm in object_permissions: for obj_perm in object_permissions:
for action in ['view', 'add', 'change', 'delete']: for content_type in obj_perm.content_types.all():
if getattr(obj_perm, f"can_{action}"): for action in ['view', 'add', 'change', 'delete']:
perm_name = f"{obj_perm.model.app_label}.{action}_{obj_perm.model.model}" if getattr(obj_perm, f"can_{action}"):
if perm_name in perms: perm_name = f"{content_type.app_label}.{action}_{content_type.model}"
perms[perm_name].append(obj_perm.attrs) if perm_name in perms:
else: perms[perm_name].append(obj_perm.attrs)
perms[perm_name] = [obj_perm.attrs] else:
perms[perm_name] = [obj_perm.attrs]
return perms return perms
@ -122,10 +123,10 @@ class RemoteUserBackend(_RemoteUserBackend):
for permission_name in settings.REMOTE_AUTH_DEFAULT_PERMISSIONS: for permission_name in settings.REMOTE_AUTH_DEFAULT_PERMISSIONS:
try: try:
content_type, action = resolve_permission(permission_name) content_type, action = resolve_permission(permission_name)
user.object_permissions.create(**{ obj_perm = ObjectPermission(**{f'can_{action}': True})
'model': content_type, obj_perm.save()
f'can_{action}': True obj_perm.users.add(user)
}) obj_perm.content_types.add(content_type)
permissions_list.append(permission_name) permissions_list.append(permission_name)
except ValueError: except ValueError:
logging.error( logging.error(

View File

@ -34,21 +34,10 @@ class TestCase(_TestCase):
""" """
for name in names: for name in names:
ct, action = resolve_permission(name) ct, action = resolve_permission(name)
self.user.object_permissions.create(**{ obj_perm = ObjectPermission(**{f'can_{action}': True})
'model': ct, obj_perm.save()
f'can_{action}': True obj_perm.users.add(self.user)
}) obj_perm.content_types.add(ct)
def remove_permissions(self, *names):
"""
Remove a set of permissions from the test user, if assigned.
"""
for name in names:
ct, action = resolve_permission(name)
self.user.object_permissions.filter(**{
'model': ct,
f'can_{action}': True
}).delete()
# #
# Convenience methods # Convenience methods
@ -175,10 +164,12 @@ class ViewTestCases:
instance = self.model.objects.first() instance = self.model.objects.first()
# Add model-level permission # Add model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(instance.get_absolute_url()), 200) self.assertHttpStatus(self.client.get(instance.get_absolute_url()), 200)
@ -188,11 +179,13 @@ class ViewTestCases:
instance1, instance2 = self.model.objects.all()[:2] instance1, instance2 = self.model.objects.all()[:2]
# Add object-level permission # Add object-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk': instance1.pk}, attrs={'pk': instance1.pk},
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET to permitted object # Try GET to permitted object
self.assertHttpStatus(self.client.get(instance1.get_absolute_url()), 200) self.assertHttpStatus(self.client.get(instance1.get_absolute_url()), 200)
@ -227,10 +220,12 @@ class ViewTestCases:
initial_count = self.model.objects.count() initial_count = self.model.objects.count()
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_add=True can_add=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(self._get_url('add')), 200) self.assertHttpStatus(self.client.get(self._get_url('add')), 200)
@ -250,12 +245,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk__gt': 0}, # Dummy permission to allow all attrs={'pk__gt': 0}, # Dummy permission to allow all
can_add=True can_add=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with object-level permission # Try GET with object-level permission
self.assertHttpStatus(self.client.get(self._get_url('add')), 200) self.assertHttpStatus(self.client.get(self._get_url('add')), 200)
@ -309,10 +304,12 @@ class ViewTestCases:
instance = self.model.objects.first() instance = self.model.objects.first()
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_change=True can_change=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(self._get_url('edit', instance)), 200) self.assertHttpStatus(self.client.get(self._get_url('edit', instance)), 200)
@ -331,12 +328,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk': instance1.pk}, attrs={'pk': instance1.pk},
can_change=True can_change=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with a permitted object # Try GET with a permitted object
self.assertHttpStatus(self.client.get(self._get_url('edit', instance1)), 200) self.assertHttpStatus(self.client.get(self._get_url('edit', instance1)), 200)
@ -384,10 +381,12 @@ class ViewTestCases:
instance = self.model.objects.first() instance = self.model.objects.first()
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_delete=True can_delete=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(self._get_url('delete', instance)), 200) self.assertHttpStatus(self.client.get(self._get_url('delete', instance)), 200)
@ -407,12 +406,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk': instance1.pk}, attrs={'pk': instance1.pk},
can_delete=True can_delete=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with a permitted object # Try GET with a permitted object
self.assertHttpStatus(self.client.get(self._get_url('delete', instance1)), 200) self.assertHttpStatus(self.client.get(self._get_url('delete', instance1)), 200)
@ -459,10 +458,12 @@ class ViewTestCases:
def test_list_objects_with_model_permission(self): def test_list_objects_with_model_permission(self):
# Add model-level permission # Add model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_view=True can_view=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(self._get_url('list')), 200) self.assertHttpStatus(self.client.get(self._get_url('list')), 200)
@ -479,12 +480,12 @@ class ViewTestCases:
# Add object-level permission # Add object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk': instance1.pk}, attrs={'pk': instance1.pk},
can_view=True can_view=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with object-level permission # Try GET with object-level permission
self.assertHttpStatus(self.client.get(self._get_url('list')), 200) self.assertHttpStatus(self.client.get(self._get_url('list')), 200)
@ -511,12 +512,10 @@ class ViewTestCases:
self.assertHttpStatus(self.client.post(**request), 403) self.assertHttpStatus(self.client.post(**request), 403)
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(can_add=True)
model=ContentType.objects.get_for_model(self.model),
can_add=True
)
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
response = self.client.post(**request) response = self.client.post(**request)
self.assertHttpStatus(response, 302) self.assertHttpStatus(response, 302)
@ -557,10 +556,12 @@ class ViewTestCases:
} }
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_add=True can_add=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try GET with model-level permission # Try GET with model-level permission
self.assertHttpStatus(self.client.get(self._get_url('import')), 200) self.assertHttpStatus(self.client.get(self._get_url('import')), 200)
@ -578,12 +579,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk__gt': 0}, # Dummy permission to allow all attrs={'pk__gt': 0}, # Dummy permission to allow all
can_add=True can_add=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Test import with object-level permission # Test import with object-level permission
self.assertHttpStatus(self.client.post(self._get_url('import'), data), 200) self.assertHttpStatus(self.client.post(self._get_url('import'), data), 200)
@ -625,10 +626,12 @@ class ViewTestCases:
data.update(post_data(self.bulk_edit_data)) data.update(post_data(self.bulk_edit_data))
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_change=True can_change=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try POST with model-level permission # Try POST with model-level permission
self.assertHttpStatus(self.client.post(self._get_url('bulk_edit'), data), 302) self.assertHttpStatus(self.client.post(self._get_url('bulk_edit'), data), 302)
@ -648,12 +651,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk__in': list(pk_list)}, attrs={'pk__in': list(pk_list)},
can_change=True can_change=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try POST with model-level permission # Try POST with model-level permission
self.assertHttpStatus(self.client.post(self._get_url('bulk_edit'), data), 302) self.assertHttpStatus(self.client.post(self._get_url('bulk_edit'), data), 302)
@ -693,10 +696,12 @@ class ViewTestCases:
} }
# Assign model-level permission # Assign model-level permission
self.user.object_permissions.create( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
can_delete=True can_delete=True
) )
obj_perm.save()
obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try POST with model-level permission # Try POST with model-level permission
self.assertHttpStatus(self.client.post(self._get_url('bulk_delete'), data), 302) self.assertHttpStatus(self.client.post(self._get_url('bulk_delete'), data), 302)
@ -713,12 +718,12 @@ class ViewTestCases:
# Assign object-level permission # Assign object-level permission
obj_perm = ObjectPermission( obj_perm = ObjectPermission(
model=ContentType.objects.get_for_model(self.model),
attrs={'pk__in': list(pk_list)}, attrs={'pk__in': list(pk_list)},
can_delete=True can_delete=True
) )
obj_perm.save() obj_perm.save()
obj_perm.users.add(self.user) obj_perm.users.add(self.user)
obj_perm.content_types.add(ContentType.objects.get_for_model(self.model))
# Try POST with object-level permission # Try POST with object-level permission
self.assertHttpStatus(self.client.post(self._get_url('bulk_delete'), data), 302) self.assertHttpStatus(self.client.post(self._get_url('bulk_delete'), data), 302)