ScoDoc/app/auth/models.py

703 lines
25 KiB
Python
Raw Permalink Normal View History

2021-05-29 18:22:51 +02:00
# -*- coding: UTF-8 -*
"""Users and Roles models for ScoDoc
"""
import base64
from datetime import datetime, timedelta
import os
2021-07-03 16:19:42 +02:00
import re
2021-05-29 18:22:51 +02:00
from time import time
2021-08-11 00:36:07 +02:00
from typing import Optional
2021-05-29 18:22:51 +02:00
import cracklib # pylint: disable=import-error
2022-01-03 12:33:27 +01:00
from flask import current_app, g
2021-05-29 18:22:51 +02:00
from flask_login import UserMixin, AnonymousUserMixin
2021-07-04 12:32:13 +02:00
2021-05-29 18:22:51 +02:00
from werkzeug.security import generate_password_hash, check_password_hash
import jwt
from app import db, email, log, login
2023-11-21 22:28:50 +01:00
from app.models import Departement, ScoDocModel
from app.models import SHORT_STR_LEN, USERNAME_STR_LEN
from app.models.config import ScoDocSiteConfig
2021-07-03 16:19:42 +02:00
from app.scodoc.sco_exceptions import ScoValueError
2021-05-29 18:22:51 +02:00
from app.scodoc.sco_permissions import Permission
from app.scodoc.sco_roles_default import SCO_ROLES_DEFAULTS
2021-06-28 10:45:00 +02:00
import app.scodoc.sco_utils as scu
2021-05-29 18:22:51 +02:00
2021-09-25 22:42:44 +02:00
VALID_LOGIN_EXP = re.compile(r"^[a-zA-Z0-9@\\\-_\.]+$")
2021-05-29 18:22:51 +02:00
def is_valid_password(cleartxt) -> bool:
"""Check password.
returns True if OK.
"""
if (
hasattr(scu.CONFIG, "MIN_PASSWORD_LENGTH")
and scu.CONFIG.MIN_PASSWORD_LENGTH > 0
and len(cleartxt) < scu.CONFIG.MIN_PASSWORD_LENGTH
):
return False # invalid: too short
try:
_ = cracklib.FascistCheck(cleartxt)
return True
except ValueError:
return False
def invalid_user_name(user_name: str) -> bool:
"Check that user_name (aka login) is invalid"
return (
2023-11-22 17:55:15 +01:00
not user_name
or (len(user_name) < 2)
or (len(user_name) >= USERNAME_STR_LEN)
or not VALID_LOGIN_EXP.match(user_name)
)
2023-12-22 15:21:07 +01:00
class User(UserMixin, ScoDocModel):
2021-05-29 18:22:51 +02:00
"""ScoDoc users, handled by Flask / SQLAlchemy"""
id = db.Column(db.Integer, primary_key=True)
user_name = db.Column(db.String(USERNAME_STR_LEN), index=True, unique=True)
2023-02-26 21:24:07 +01:00
"le login"
email = db.Column(db.String(120))
2023-03-14 16:30:27 +01:00
"email à utiliser par ScoDoc"
email_institutionnel = db.Column(db.String(120))
"email dans l'établissement, facultatif"
nom = db.Column(db.String(USERNAME_STR_LEN))
prenom = db.Column(db.String(USERNAME_STR_LEN))
dept = db.Column(db.String(SHORT_STR_LEN), index=True)
2023-02-26 21:24:07 +01:00
"acronyme du département de l'utilisateur"
2021-06-27 12:11:39 +02:00
active = db.Column(db.Boolean, default=True, index=True)
2023-02-26 21:24:07 +01:00
"si faux, compte utilisateur désactivé"
cas_id = db.Column(db.Text(), index=True, unique=True, nullable=True)
2023-03-14 16:30:27 +01:00
"uid sur le CAS (id, mail ou autre attribut, selon config.cas_attribute_id)"
2023-02-26 21:24:07 +01:00
cas_allow_login = db.Column(
db.Boolean, default=False, server_default="false", nullable=False
)
"Peut-on se logguer via le CAS ?"
cas_allow_scodoc_login = db.Column(
db.Boolean, default=False, server_default="false", nullable=False
2023-02-26 21:24:07 +01:00
)
"""Si CAS forcé (cas_force), peut-on se logguer sur ScoDoc directement ?
(le rôle ScoSuperAdmin peut toujours, mettre à True pour les utilisateur API)
2023-02-26 21:24:07 +01:00
"""
cas_last_login = db.Column(db.DateTime, nullable=True)
"""date du dernier login via CAS"""
edt_id = db.Column(db.Text(), index=True, nullable=True)
"identifiant emplois du temps (unicité non imposée)"
password_hash = db.Column(db.Text()) # les hashs modernes peuvent être très longs
2021-07-05 00:07:17 +02:00
password_scodoc7 = db.Column(db.String(42))
2021-05-29 18:22:51 +02:00
last_seen = db.Column(db.DateTime, default=datetime.utcnow)
date_modif_passwd = db.Column(db.DateTime, default=datetime.utcnow)
date_created = db.Column(db.DateTime, default=datetime.utcnow)
date_expiration = db.Column(db.DateTime, default=None)
passwd_temp = db.Column(db.Boolean, default=False)
"""champ obsolete. Si connexion alors que passwd_temp est vrai,
efface mot de passe et redirige vers accueil."""
2021-12-20 22:50:14 +01:00
token = db.Column(db.Text(), index=True, unique=True)
2021-05-29 18:22:51 +02:00
token_expiration = db.Column(db.DateTime)
2021-05-29 18:22:51 +02:00
roles = db.relationship("Role", secondary="user_role", viewonly=True)
Permission = Permission
_departement = db.relationship(
"Departement",
foreign_keys=[Departement.acronym],
primaryjoin=(dept == Departement.acronym),
2022-02-13 15:19:39 +01:00
lazy="select",
passive_deletes="all",
uselist=False,
)
2021-05-29 18:22:51 +02:00
def __init__(self, **kwargs):
2023-11-22 17:55:15 +01:00
"user_name:str is mandatory"
2021-05-29 18:22:51 +02:00
self.roles = []
2021-06-27 12:11:39 +02:00
self.user_roles = []
# check login:
2023-11-22 17:55:15 +01:00
if not "user_name" in kwargs:
raise ValueError("missing user_name argument")
if invalid_user_name(kwargs["user_name"]):
raise ValueError(f"invalid user_name: {kwargs['user_name']}")
2023-11-22 17:55:15 +01:00
kwargs["nom"] = kwargs.get("nom", "") or ""
kwargs["prenom"] = kwargs.get("prenom", "") or ""
2023-11-21 22:28:50 +01:00
super().__init__(**kwargs)
2021-07-04 12:32:13 +02:00
# Ajoute roles:
2021-05-29 18:22:51 +02:00
if (
not self.roles
and self.email
and self.email == current_app.config["SCODOC_ADMIN_MAIL"]
):
# super-admin
2021-07-03 16:19:42 +02:00
admin_role = Role.query.filter_by(name="SuperAdmin").first()
2021-05-29 18:22:51 +02:00
assert admin_role
self.add_role(admin_role, None)
db.session.commit()
2021-07-27 16:07:03 +02:00
# current_app.logger.info("creating user with roles={}".format(self.roles))
2021-05-29 18:22:51 +02:00
def __repr__(self):
return f"""<User {self.user_name} id={self.id} dept={self.dept}{
' (inactive)' if not self.active else ''}>"""
2021-05-29 18:22:51 +02:00
def __str__(self):
return self.user_name
2021-05-29 18:22:51 +02:00
def set_password(self, password):
"Set password"
2021-07-27 16:07:03 +02:00
current_app.logger.info(f"set_password({self})")
2021-05-29 18:22:51 +02:00
if password:
self.password_hash = generate_password_hash(password)
else:
self.password_hash = None
# La création d'un mot de passe efface l'éventuel mot de passe historique
self.password_scodoc7 = None
self.passwd_temp = False
2021-05-29 18:22:51 +02:00
def check_password(self, password: str) -> bool:
2021-05-29 18:22:51 +02:00
"""Check given password vs current one.
Returns `True` if the password matched, `False` otherwise.
"""
2021-06-27 12:11:39 +02:00
if not self.active: # inactived users can't login
current_app.logger.warning(
f"auth: login attempt from inactive account {self}"
)
return False
if self.passwd_temp:
# Anciens comptes ScoDoc 7 non migrés
# désactive le compte par sécurité.
current_app.logger.warning(f"auth: desactivating legacy account {self}")
self.active = False
self.passwd_temp = True
db.session.add(self)
db.session.commit()
send_notif_desactivation_user(self)
2021-06-27 12:11:39 +02:00
return False
# if CAS activated and forced, allow only super-user and users with cas_allow_scodoc_login
cas_enabled = ScoDocSiteConfig.is_cas_enabled()
if cas_enabled and ScoDocSiteConfig.get("cas_force"):
if (not self.is_administrator()) and not self.cas_allow_scodoc_login:
return False
2021-05-29 18:22:51 +02:00
if not self.password_hash: # user without password can't login
if self.password_scodoc7:
# Special case: user freshly migrated from ScoDoc7
return self._migrate_scodoc7_password(password)
2021-05-29 18:22:51 +02:00
return False
return check_password_hash(self.password_hash, password)
2021-05-29 18:22:51 +02:00
def _migrate_scodoc7_password(self, password) -> bool:
"""After migration, rehash password."""
if scu.check_scodoc7_password(self.password_scodoc7, password):
current_app.logger.warning(
f"auth: migrating legacy ScoDoc7 password for {self}"
)
self.set_password(password)
self.password_scodoc7 = None
db.session.add(self)
db.session.commit()
return True
return False
2021-05-29 18:22:51 +02:00
def get_reset_password_token(self, expires_in=600):
2022-01-03 12:33:27 +01:00
"Un token pour réinitialiser son mot de passe"
2021-05-29 18:22:51 +02:00
return jwt.encode(
{"reset_password": self.id, "exp": time() + expires_in},
current_app.config["SECRET_KEY"],
algorithm="HS256",
)
2021-05-29 18:22:51 +02:00
@staticmethod
def verify_reset_password_token(token):
"Vérification du token de ré-initialisation du mot de passe"
2021-05-29 18:22:51 +02:00
try:
2022-05-03 13:35:17 +02:00
token = jwt.decode(
2021-05-29 18:22:51 +02:00
token, current_app.config["SECRET_KEY"], algorithms=["HS256"]
2022-05-03 13:35:17 +02:00
)
except jwt.exceptions.ExpiredSignatureError:
log("verify_reset_password_token: token expired")
2021-05-29 18:22:51 +02:00
except:
2022-05-03 13:35:17 +02:00
return None
try:
user_id = token["reset_password"]
# double check en principe inutile car déjà fait dans decode()
expire = float(token["exp"])
if time() > expire:
log(f"verify_reset_password_token: token expired for uid={user_id}")
return None
except (TypeError, KeyError):
return None
return db.session.get(User, user_id)
2021-05-29 18:22:51 +02:00
def sort_key(self) -> tuple:
"sort key"
return (
(self.nom or "").upper(),
(self.prenom or "").upper(),
(self.user_name or "").upper(),
)
2021-06-27 12:11:39 +02:00
def to_dict(self, include_email=True):
2022-01-03 12:33:27 +01:00
"""l'utilisateur comme un dict, avec des champs supplémentaires"""
2021-05-29 18:22:51 +02:00
data = {
"date_expiration": self.date_expiration.isoformat() + "Z"
if self.date_expiration
else None,
"date_modif_passwd": self.date_modif_passwd.isoformat() + "Z"
if self.date_modif_passwd
else None,
"date_created": self.date_created.isoformat() + "Z"
if self.date_created
else None,
"dept": self.dept,
2021-05-29 18:22:51 +02:00
"id": self.id,
2021-06-27 12:11:39 +02:00
"active": self.active,
2023-02-26 21:24:07 +01:00
"cas_id": self.cas_id,
"cas_allow_login": self.cas_allow_login,
"cas_allow_scodoc_login": self.cas_allow_scodoc_login,
"cas_last_login": self.cas_last_login.isoformat() + "Z"
if self.cas_last_login
else None,
2023-11-21 22:28:50 +01:00
"edt_id": self.edt_id,
2021-06-27 12:11:39 +02:00
"status_txt": "actif" if self.active else "fermé",
"last_seen": self.last_seen.isoformat() + "Z" if self.last_seen else None,
2023-11-21 22:28:50 +01:00
"nom": self.nom or "",
"prenom": self.prenom or "",
2021-07-03 16:19:42 +02:00
"roles_string": self.get_roles_string(), # eg "Ens_RT, Ens_Info"
2023-11-21 22:28:50 +01:00
"user_name": self.user_name,
2021-07-04 12:32:13 +02:00
# Les champs calculés:
"nom_fmt": self.get_nom_fmt(),
"prenom_fmt": self.get_prenom_fmt(),
"nomprenom": self.get_nomprenom(),
"prenomnom": self.get_prenomnom(),
"nomplogin": self.get_nomplogin(),
"nomcomplet": self.get_nomcomplet(),
2021-05-29 18:22:51 +02:00
}
if include_email:
2021-06-27 12:11:39 +02:00
data["email"] = self.email or ""
2023-03-14 16:30:27 +01:00
data["email_institutionnel"] = self.email_institutionnel or ""
2021-05-29 18:22:51 +02:00
return data
2023-11-21 22:28:50 +01:00
@classmethod
def convert_dict_fields(cls, args: dict) -> dict:
"""Convert fields in the given dict. No other side effect.
args: dict with args in application.
returns: dict to store in model's db.
Convert boolean values to bools.
"""
args_dict = args
2023-11-22 17:55:15 +01:00
# Dates
2023-11-21 22:28:50 +01:00
if "date_expiration" in args:
date_expiration = args.get("date_expiration")
if isinstance(date_expiration, str):
args["date_expiration"] = (
datetime.datetime.fromisoformat(date_expiration)
if date_expiration
else None
)
2023-11-22 17:55:15 +01:00
# booléens:
2023-11-21 22:28:50 +01:00
for field in ("active", "cas_allow_login", "cas_allow_scodoc_login"):
if field in args:
args_dict[field] = scu.to_bool(args.get(field))
2023-11-22 17:55:15 +01:00
# chaines ne devant pas être NULLs
for field in ("nom", "prenom"):
if field in args:
args[field] = args[field] or ""
2023-12-12 19:59:50 +01:00
# chaines ne devant pas être vides mais au contraire null (unicité)
if "cas_id" in args:
args["cas_id"] = args["cas_id"] or None
2023-11-21 22:28:50 +01:00
return args_dict
def from_dict(self, data: dict, new_user=False):
2021-07-03 16:19:42 +02:00
"""Set users' attributes from given dict values.
2023-11-22 17:55:15 +01:00
- roles_string : roles, encoded like "Ens_RT, Secr_CJ"
- date_expiration is a dateime object.
2023-11-21 22:28:50 +01:00
Does not check permissions here.
2021-07-03 16:19:42 +02:00
"""
if new_user:
if "user_name" in data:
# never change name of existing users
2023-11-22 17:55:15 +01:00
if invalid_user_name(data["user_name"]):
raise ValueError(f"invalid user_name: {data['user_name']}")
2021-07-03 16:19:42 +02:00
self.user_name = data["user_name"]
if "password" in data:
self.set_password(data["password"])
2023-11-22 17:55:15 +01:00
2021-07-03 16:19:42 +02:00
# Roles: roles_string is "Ens_RT, Secr_RT, ..."
if "roles_string" in data:
self.user_roles = []
for r_d in data["roles_string"].split(","):
2021-09-29 10:27:49 +02:00
if r_d:
role, dept = UserRole.role_dept_from_string(r_d)
self.add_role(role, dept)
2021-05-29 18:22:51 +02:00
2023-11-22 17:55:15 +01:00
super().from_dict(data, excluded={"user_name", "roles_string", "roles"})
# Set cas_id using regexp if configured:
exp = ScoDocSiteConfig.get("cas_uid_from_mail_regexp")
if exp and self.email_institutionnel:
cas_id = ScoDocSiteConfig.extract_cas_id(self.email_institutionnel)
2023-12-12 19:59:50 +01:00
if cas_id:
self.cas_id = cas_id
2021-05-29 18:22:51 +02:00
def get_token(self, expires_in=3600):
2022-05-03 13:35:17 +02:00
"Un jeton pour cet user. Stocké en base, non commité."
2021-05-29 18:22:51 +02:00
now = datetime.utcnow()
if self.token and self.token_expiration > now + timedelta(seconds=60):
return self.token
self.token = base64.b64encode(os.urandom(24)).decode("utf-8")
self.token_expiration = now + timedelta(seconds=expires_in)
db.session.add(self)
return self.token
def revoke_token(self):
2022-05-03 13:35:17 +02:00
"Révoque le jeton de cet utilisateur"
2021-05-29 18:22:51 +02:00
self.token_expiration = datetime.utcnow() - timedelta(seconds=1)
@staticmethod
def check_token(token):
2023-03-09 14:24:12 +01:00
"""Retreive user for given token, check token's validity
and returns the user object.
"""
2021-05-29 18:22:51 +02:00
user = User.query.filter_by(token=token).first()
if user is None or user.token_expiration < datetime.utcnow():
return None
return user
def get_dept_id(self) -> int:
"returns user's department id, or None"
if self.dept:
2022-02-13 15:19:39 +01:00
return self._departement.id
return None
2023-03-14 16:30:27 +01:00
def get_emails(self):
"List mail adresses to contact this user"
mails = []
if self.email:
mails.append(self.email)
if self.email_institutionnel:
mails.append(self.email_institutionnel)
return mails
2021-05-29 18:22:51 +02:00
# Permissions management:
def has_permission(self, perm: int, dept: str = False):
"""Check if user has permission `perm` in given `dept` (acronym).
2021-06-27 12:11:39 +02:00
Similar to Zope ScoDoc7 `has_permission``
2021-05-29 18:22:51 +02:00
Args:
perm: integer, one of the value defined in Permission class.
2021-07-03 16:19:42 +02:00
dept: dept id (eg 'RT'), default to current departement.
2021-05-29 18:22:51 +02:00
"""
2021-06-27 12:11:39 +02:00
if not self.active:
return False
2021-06-15 15:38:38 +02:00
if dept is False:
dept = g.scodoc_dept
2021-05-29 18:22:51 +02:00
# les role liés à ce département, et les roles avec dept=None (super-admin)
roles_in_dept = (
UserRole.query.filter_by(user_id=self.id)
.filter((UserRole.dept == dept) | (UserRole.dept == None))
.all()
)
for user_role in roles_in_dept:
if user_role.role.has_permission(perm):
return True
return False
# Role management
2022-07-24 07:14:31 +02:00
def add_role(self, role: "Role", dept: str):
2021-05-29 18:22:51 +02:00
"""Add a role to this user.
:param role: Role to add.
"""
2022-03-14 10:55:39 +01:00
if not isinstance(role, Role):
raise ScoValueError("add_role: rôle invalide")
user_role = UserRole(user=self, role=role, dept=dept)
db.session.add(user_role)
self.user_roles.append(user_role)
2021-05-29 18:22:51 +02:00
2022-07-24 07:14:31 +02:00
def add_roles(self, roles: "list[Role]", dept: str):
2021-05-29 18:22:51 +02:00
"""Add roles to this user.
:param roles: Roles to add.
"""
for role in roles:
self.add_role(role, dept)
def set_roles(self, roles, dept):
2021-07-03 16:19:42 +02:00
"set roles in the given dept"
2022-03-14 10:55:39 +01:00
self.user_roles = [
UserRole(user=self, role=r, dept=dept) for r in roles if isinstance(r, Role)
]
2021-05-29 18:22:51 +02:00
def get_roles(self):
2021-07-03 16:19:42 +02:00
"iterator on my roles"
2021-05-29 18:22:51 +02:00
for role in self.roles:
yield role
def get_roles_string(self):
"""string repr. of user's roles (with depts)
2021-07-03 16:19:42 +02:00
e.g. "Ens_RT, Ens_Info, Secr_CJ"
"""
2023-02-26 22:18:37 +01:00
return ", ".join(
2022-03-14 10:55:39 +01:00
f"{r.role.name or ''}_{r.dept or ''}"
for r in self.user_roles
if r is not None
)
def get_depts_with_permission(self, permission: int) -> list[str]:
"""Liste des acronymes de département dans lesquels cet utilisateur
possède la permission indiquée.
L'"acronyme" None signifie "tous les départements".
Si plusieurs permissions (plusieurs bits) sont indiquées, c'est un "ou":
les départements dans lesquels l'utilisateur a l'une des permissions.
"""
return [
user_role.dept
for user_role in UserRole.query.filter_by(user=self)
.join(Role)
.filter(Role.permissions.op("&")(permission) != 0)
]
2021-05-29 18:22:51 +02:00
def is_administrator(self):
2021-07-03 16:19:42 +02:00
"True if i'm an active SuperAdmin"
return self.active and self.has_permission(Permission.ScoSuperAdmin, dept=None)
2021-05-29 18:22:51 +02:00
2021-06-28 10:45:00 +02:00
# Some useful strings:
def get_nomplogin(self):
"""nomplogin est le nom en majuscules suivi du prénom et du login
e.g. Dupont Pierre (dupont)
"""
nom = scu.format_nom(self.nom) if self.nom else self.user_name.upper()
return f"{nom} {scu.format_prenom(self.prenom)} ({self.user_name})"
2021-06-28 10:45:00 +02:00
@staticmethod
2021-08-11 00:36:07 +02:00
def get_user_id_from_nomplogin(nomplogin: str) -> Optional[int]:
"""Returns id from the string "Dupont Pierre (dupont)"
or None if user does not exist
"""
match = re.match(r".*\((.*)\)", nomplogin.strip())
if match:
user_name = match.group(1)
2021-08-11 00:36:07 +02:00
u = User.query.filter_by(user_name=user_name).first()
if u:
return u.id
return None
2021-07-04 12:32:13 +02:00
def get_nom_fmt(self):
2022-05-10 20:32:25 +02:00
"""Nom formaté: "Martin" """
2021-07-04 12:32:13 +02:00
if self.nom:
return scu.format_nom(self.nom, uppercase=False)
2021-07-04 12:32:13 +02:00
else:
return self.user_name
def get_prenom_fmt(self):
"""Prénom formaté (minuscule capitalisées)"""
return scu.format_prenom(self.prenom)
2021-07-04 12:32:13 +02:00
def get_nomprenom(self):
"""Nom capitalisé suivi de l'initiale du prénom:
Viennet E.
"""
prenom_abbrv = scu.abbrev_prenom(scu.format_prenom(self.prenom))
2021-07-04 12:32:13 +02:00
return (self.get_nom_fmt() + " " + prenom_abbrv).strip()
def get_prenomnom(self):
"""L'initiale du prénom suivie du nom: "J.-C. Dupont" """
prenom_abbrv = scu.abbrev_prenom(scu.format_prenom(self.prenom))
2021-07-04 12:32:13 +02:00
return (prenom_abbrv + " " + self.get_nom_fmt()).strip()
def get_nomcomplet(self):
"Prénom et nom complets"
return scu.format_prenom(self.prenom) + " " + self.get_nom_fmt()
2021-07-04 12:32:13 +02:00
# nomnoacc était le nom en minuscules sans accents (inutile)
2021-05-29 18:22:51 +02:00
class AnonymousUser(AnonymousUserMixin):
"Notre utilisateur anonyme"
2021-05-29 18:22:51 +02:00
def has_permission(self, perm, dept=None):
return False
def is_administrator(self):
return False
login.anonymous_user = AnonymousUser
class Role(db.Model):
"""Roles for ScoDoc"""
id = db.Column(db.Integer, primary_key=True)
2022-08-07 11:08:12 +02:00
name = db.Column(db.String(64), unique=True, nullable=False, index=True)
2021-05-29 18:22:51 +02:00
default = db.Column(db.Boolean, default=False, index=True)
permissions = db.Column(db.BigInteger) # 64 bits
users = db.relationship("User", secondary="user_role", viewonly=True)
def __init__(self, **kwargs):
super(Role, self).__init__(**kwargs)
if self.permissions is None:
self.permissions = 0
def __repr__(self):
return "<Role {} perm={:0{w}b}>".format(
self.name,
self.permissions & ((1 << Permission.NBITS) - 1),
w=Permission.NBITS,
)
2022-07-24 07:14:31 +02:00
def __str__(self):
return f"{self.name}: perm={', '.join(Permission.permissions_names(self.permissions))}"
2022-08-06 22:31:41 +02:00
def to_dict(self) -> dict:
"As dict. Convert permissions to names."
return {
"id": self.id,
2022-08-07 11:08:12 +02:00
"role_name": self.name, # pour être cohérent avec partion_name, etc.
2022-08-06 22:31:41 +02:00
"permissions": Permission.permissions_names(self.permissions),
}
2022-08-07 11:08:12 +02:00
def add_permission(self, perm: int):
"Add permission to role"
2021-05-29 18:22:51 +02:00
self.permissions |= perm
2022-08-07 11:08:12 +02:00
def remove_permission(self, perm: int):
"Remove permission from role"
2021-05-29 18:22:51 +02:00
self.permissions = self.permissions & ~perm
def reset_permissions(self):
2022-08-07 11:08:12 +02:00
"Remove all permissions from role"
2021-05-29 18:22:51 +02:00
self.permissions = 0
def get_named_permissions(self) -> list[str]:
"List of the names of the permissions associated to this rôle"
return Permission.permissions_names(self.permissions)
2022-08-07 11:08:12 +02:00
def set_named_permissions(self, permission_names: list[str]):
"""Set permissions, given as a list of permissions names.
Raises ScoValueError if invalid permission."""
self.permissions = 0
for permission_name in permission_names:
permission = Permission.get_by_name(permission_name)
if permission is None:
raise ScoValueError("set_named_permissions: invalid permission name")
self.permissions |= permission
def has_permission(self, perm: int) -> bool:
"True if role as this permission"
2021-05-29 18:22:51 +02:00
return self.permissions & perm == perm
@staticmethod
def reset_standard_roles_permissions(reset_permissions=True):
"""Create default roles if missing, then, if reset_permissions,
reset their permissions to default values.
"""
2021-05-29 18:22:51 +02:00
default_role = "Observateur"
2021-07-05 00:07:17 +02:00
for role_name, permissions in SCO_ROLES_DEFAULTS.items():
role = Role.query.filter_by(name=role_name).first()
2021-05-29 18:22:51 +02:00
if role is None:
2021-07-05 00:07:17 +02:00
role = Role(name=role_name)
role.default = role.name == default_role
db.session.add(role)
if reset_permissions:
role.reset_permissions()
for perm in permissions:
role.add_permission(perm)
db.session.add(role)
2021-05-29 18:22:51 +02:00
db.session.commit()
@staticmethod
def ensure_standard_roles():
"""Create default roles if missing"""
Role.reset_standard_roles_permissions(reset_permissions=False)
2021-05-29 18:22:51 +02:00
@staticmethod
def get_named_role(name):
"""Returns existing role with given name, or None."""
return Role.query.filter_by(name=name).first()
class UserRole(db.Model):
"""Associate user to role, in a dept.
If dept is None, the role applies to all departments (eg super admin).
"""
id = db.Column(db.Integer, primary_key=True)
user_id = db.Column(db.Integer, db.ForeignKey("user.id"))
role_id = db.Column(db.Integer, db.ForeignKey("role.id"))
2021-09-28 16:20:15 +02:00
dept = db.Column(db.String(64)) # dept acronym ou NULL
2021-05-29 18:22:51 +02:00
user = db.relationship(
User, backref=db.backref("user_roles", cascade="all, delete-orphan")
)
role = db.relationship(
Role, backref=db.backref("user_roles", cascade="all, delete-orphan")
)
def __repr__(self):
return f"<UserRole u={self.user} r={self.role} dept={self.dept}>"
2021-05-29 18:22:51 +02:00
2021-07-03 16:19:42 +02:00
@staticmethod
2021-08-30 16:55:07 +02:00
def role_dept_from_string(role_dept: str):
2021-07-03 16:19:42 +02:00
"""Return tuple (role, dept) from the string
role_dept, of the forme "Role_Dept".
2021-08-30 16:55:07 +02:00
role is a Role instance, dept is a string, or None.
2021-07-03 16:19:42 +02:00
"""
2023-02-27 12:01:26 +01:00
fields = role_dept.strip().split("_", 1)
# maxsplit=1, le dept peut contenir un "_"
2021-07-03 16:19:42 +02:00
if len(fields) != 2:
2021-09-29 10:27:49 +02:00
current_app.logger.warning(
f"auth: role_dept_from_string: Invalid role_dept '{role_dept}'"
2021-09-29 10:27:49 +02:00
)
2021-07-03 16:19:42 +02:00
raise ScoValueError("Invalid role_dept")
role_name, dept = fields
2023-02-27 12:01:26 +01:00
dept = dept.strip() if dept else ""
2021-08-30 16:55:07 +02:00
if dept == "":
dept = None
2023-02-27 12:01:26 +01:00
2021-07-03 16:19:42 +02:00
role = Role.query.filter_by(name=role_name).first()
if role is None:
2023-02-27 12:01:26 +01:00
raise ScoValueError(f"role {role_name} does not exists")
2021-07-03 16:19:42 +02:00
return (role, dept)
2021-05-29 18:22:51 +02:00
def get_super_admin():
2021-09-29 14:15:12 +02:00
"""L'utilisateur admin (ou le premier, s'il y en a plusieurs).
Utilisé par les tests unitaires et le script de migration.
"""
admin_role = Role.query.filter_by(name="SuperAdmin").first()
assert admin_role
admin_user = (
User.query.join(UserRole)
.filter((UserRole.user_id == User.id) & (UserRole.role_id == admin_role.id))
.first()
)
assert admin_user
return admin_user
def send_notif_desactivation_user(user: User):
"""Envoi un message mail de notification à l'admin et à l'adresse du compte désactivé"""
2023-03-14 16:30:27 +01:00
recipients = user.get_emails() + [current_app.config.get("SCODOC_ADMIN_MAIL")]
txt = [
f"""Le compte ScoDoc '{user.user_name}' associé à votre adresse <{user.email}>""",
"""a été désactivé par le système car son mot de passe n'était pas valide.\n""",
"""Contactez votre responsable pour le ré-activer.\n""",
"""Ceci est un message automatique, ne pas répondre.""",
]
txt = "\n".join(txt)
email.send_email(
f"ScoDoc: désactivation automatique du compte {user.user_name}",
email.get_from_addr(),
2023-03-14 16:30:27 +01:00
recipients,
txt,
)
return txt