11eb4e9d3e
W503 line break before binary operator Looking at the code base, it sounds okay to follow this check. Change-Id: Id511e0104dc6de5b204021661d4a8776ca6d3658
254 lines
8.2 KiB
Python
254 lines
8.2 KiB
Python
# Copyright 2013 Hewlett-Packard Development Company, L.P.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import logging
|
|
|
|
from django.template import defaultfilters
|
|
from django.urls import reverse
|
|
from django.utils.translation import ugettext_lazy as _
|
|
from django.utils.translation import ungettext_lazy
|
|
|
|
from horizon import tables
|
|
|
|
from openstack_dashboard import api
|
|
|
|
from openstack_dashboard.dashboards.identity.groups import constants
|
|
from openstack_dashboard import policy
|
|
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
LOGOUT_URL = 'logout'
|
|
STATUS_CHOICES = (
|
|
("true", True),
|
|
("false", False)
|
|
)
|
|
|
|
|
|
class CreateGroupLink(tables.LinkAction):
|
|
name = "create"
|
|
verbose_name = _("Create Group")
|
|
url = constants.GROUPS_CREATE_URL
|
|
classes = ("ajax-modal",)
|
|
icon = "plus"
|
|
policy_rules = (("identity", "identity:create_group"),)
|
|
|
|
def allowed(self, request, group):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
|
|
class EditGroupLink(policy.PolicyTargetMixin, tables.LinkAction):
|
|
name = "edit"
|
|
verbose_name = _("Edit Group")
|
|
url = constants.GROUPS_UPDATE_URL
|
|
classes = ("ajax-modal",)
|
|
icon = "pencil"
|
|
policy_rules = (("identity", "identity:update_group"),)
|
|
|
|
def allowed(self, request, group):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
|
|
class DeleteGroupsAction(policy.PolicyTargetMixin, tables.DeleteAction):
|
|
@staticmethod
|
|
def action_present(count):
|
|
return ungettext_lazy(
|
|
u"Delete Group",
|
|
u"Delete Groups",
|
|
count
|
|
)
|
|
|
|
@staticmethod
|
|
def action_past(count):
|
|
return ungettext_lazy(
|
|
u"Deleted Group",
|
|
u"Deleted Groups",
|
|
count
|
|
)
|
|
|
|
policy_rules = (("identity", "identity:delete_group"),)
|
|
|
|
def allowed(self, request, datum):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
def delete(self, request, obj_id):
|
|
LOG.info('Deleting group "%s".', obj_id)
|
|
api.keystone.group_delete(request, obj_id)
|
|
|
|
|
|
class ManageUsersLink(tables.LinkAction):
|
|
name = "users"
|
|
verbose_name = _("Manage Members")
|
|
url = constants.GROUPS_MANAGE_URL
|
|
icon = "pencil"
|
|
policy_rules = (("identity", "identity:get_group"),
|
|
("identity", "identity:list_users"),)
|
|
|
|
def allowed(self, request, datum):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
|
|
class GroupFilterAction(tables.FilterAction):
|
|
filter_type = "server"
|
|
filter_choices = (("name", _("Group Name ="), True),
|
|
("id", _("Group ID ="), True))
|
|
|
|
|
|
class GroupsTable(tables.DataTable):
|
|
name = tables.Column('name', verbose_name=_('Name'))
|
|
description = tables.Column(lambda obj: getattr(obj, 'description', None),
|
|
verbose_name=_('Description'))
|
|
id = tables.Column('id', verbose_name=_('Group ID'))
|
|
|
|
class Meta(object):
|
|
name = "groups"
|
|
verbose_name = _("Groups")
|
|
row_actions = (ManageUsersLink, EditGroupLink, DeleteGroupsAction)
|
|
table_actions = (GroupFilterAction, CreateGroupLink,
|
|
DeleteGroupsAction)
|
|
|
|
|
|
class UserFilterAction(tables.FilterAction):
|
|
def filter(self, table, users, filter_string):
|
|
"""Naive case-insensitive search."""
|
|
q = filter_string.lower()
|
|
return [user for user in users
|
|
if (q in user.name.lower() or
|
|
q in (getattr(user, 'email', None) or '').lower())]
|
|
|
|
|
|
class RemoveMembers(tables.DeleteAction):
|
|
@staticmethod
|
|
def action_present(count):
|
|
return ungettext_lazy(
|
|
u"Remove User",
|
|
u"Remove Users",
|
|
count
|
|
)
|
|
|
|
@staticmethod
|
|
def action_past(count):
|
|
return ungettext_lazy(
|
|
u"Removed User",
|
|
u"Removed Users",
|
|
count
|
|
)
|
|
|
|
name = "removeGroupMember"
|
|
policy_rules = (("identity", "identity:remove_user_from_group"),)
|
|
|
|
def allowed(self, request, user=None):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
def action(self, request, obj_id):
|
|
user_obj = self.table.get_object_by_id(obj_id)
|
|
group_id = self.table.kwargs['group_id']
|
|
LOG.info('Removing user %(user)s from group %(group)s.',
|
|
{'user': user_obj.id, 'group': group_id})
|
|
api.keystone.remove_group_user(request,
|
|
group_id=group_id,
|
|
user_id=user_obj.id)
|
|
# TODO(lin-hua-cheng): Fix the bug when removing current user
|
|
# Keystone revokes the token of the user removed from the group.
|
|
# If the logon user was removed, redirect the user to logout.
|
|
|
|
|
|
class AddMembersLink(tables.LinkAction):
|
|
name = "add_user_link"
|
|
verbose_name = _("Add Users")
|
|
classes = ("ajax-modal",)
|
|
icon = "plus"
|
|
url = constants.GROUPS_ADD_MEMBER_URL
|
|
policy_rules = (("identity", "identity:list_users"),
|
|
("identity", "identity:add_user_to_group"),)
|
|
|
|
def allowed(self, request, user=None):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
def get_link_url(self, datum=None):
|
|
return reverse(self.url, kwargs=self.table.kwargs)
|
|
|
|
|
|
class UsersTable(tables.DataTable):
|
|
name = tables.WrappingColumn('name', verbose_name=_('User Name'))
|
|
email = tables.Column(lambda obj: getattr(obj, 'email', None),
|
|
verbose_name=_('Email'),
|
|
filters=(lambda v: defaultfilters
|
|
.default_if_none(v, ""),
|
|
defaultfilters.escape,
|
|
defaultfilters.urlize))
|
|
id = tables.Column('id', verbose_name=_('User ID'))
|
|
enabled = tables.Column('enabled', verbose_name=_('Enabled'),
|
|
status=True,
|
|
status_choices=STATUS_CHOICES,
|
|
filters=(defaultfilters.yesno,
|
|
defaultfilters.capfirst),
|
|
empty_value=_('False'))
|
|
|
|
|
|
class GroupMembersTable(UsersTable):
|
|
class Meta(object):
|
|
name = "group_members"
|
|
verbose_name = _("Group Members")
|
|
table_actions = (UserFilterAction, AddMembersLink, RemoveMembers)
|
|
|
|
|
|
class AddMembers(tables.BatchAction):
|
|
@staticmethod
|
|
def action_present(count):
|
|
return ungettext_lazy(
|
|
u"Add User",
|
|
u"Add Users",
|
|
count
|
|
)
|
|
|
|
@staticmethod
|
|
def action_past(count):
|
|
return ungettext_lazy(
|
|
u"Added User",
|
|
u"Added Users",
|
|
count
|
|
)
|
|
|
|
name = "add"
|
|
icon = "plus"
|
|
requires_input = True
|
|
success_url = constants.GROUPS_MANAGE_URL
|
|
policy_rules = (("identity", "identity:add_user_to_group"),)
|
|
|
|
def allowed(self, request, user=None):
|
|
return api.keystone.keystone_can_edit_group()
|
|
|
|
def action(self, request, obj_id):
|
|
user_obj = self.table.get_object_by_id(obj_id)
|
|
group_id = self.table.kwargs['group_id']
|
|
LOG.info('Adding user %(user)s to group %(group)s.',
|
|
{'user': user_obj.id, 'group': group_id})
|
|
api.keystone.add_group_user(request,
|
|
group_id=group_id,
|
|
user_id=user_obj.id)
|
|
# TODO(lin-hua-cheng): Fix the bug when adding current user
|
|
# Keystone revokes the token of the user added to the group.
|
|
# If the logon user was added, redirect the user to logout.
|
|
|
|
def get_success_url(self, request=None):
|
|
group_id = self.table.kwargs.get('group_id', None)
|
|
return reverse(self.success_url, args=[group_id])
|
|
|
|
|
|
class GroupNonMembersTable(UsersTable):
|
|
class Meta(object):
|
|
name = "group_non_members"
|
|
verbose_name = _("Non-Members")
|
|
table_actions = (UserFilterAction, AddMembers)
|