An open API service indexing awesome lists of open source software.

https://github.com/nnseva/django-access

Django-Access - the application introducing dynamic evaluation-based instance-level (row-level) access rights control for Django
https://github.com/nnseva/django-access

access authority django django-access dynamic evaluation evaluation-based guard instance-level permissions rights rights-management row-level runtime

Last synced: 5 months ago
JSON representation

Django-Access - the application introducing dynamic evaluation-based instance-level (row-level) access rights control for Django

Awesome Lists containing this project

README

        

[![Tests](https://github.com/nnseva/django-access/actions/workflows/test.yml/badge.svg)](https://github.com/nnseva/django-access/actions/workflows/test.yml)

# Django-Access

## Installation

*Stable version* from the PyPi package repository
```bash
pip install django-access
```

*Last development version* from the GitHub source version control system
```
pip install git+git://github.com/nnseva/django-access.git
```

## Configuration

Include the `access` application into the `INSTALLED_APPS` list, like:

```python
INSTALLED_APPS = [
'django.contrib.admin',
'django.contrib.auth',
...
'access',
...
]
```
Use the following available settings to tune the access application:

- `ACCESS_STRONG_DELETION_CONTROL` settings value (default backward compatible value is False) controls, whether the restriction to delete is controlled for models not having a separate (not Inline) Admin. See below the [Backward compatible deletion control](#backward-compatible-deletion-control) section.

- `ACCESS_DEFAULT_PLUGIN` settings value (`"access.plugins.DjangoAccessPlugin"` by default) controls, what the plugin is used as a default plugin. Value is a string referring to the plugin class appropriate to import using the `import_module` call. See below the [Default Plugin](#default-plugin) section.

## Introduction

### Inspiration

The standard Django access control system allows controlling access "vertically", basing on the instance types only.

Sometimes the Django-controlled application may be big enough to spread the access to it among the several administrator staff. Every user then should have its own zone of control including some subset of instances of every model in the database. We can say, that in this case, we need to have some kind of per-instance, row-level "horizontal" access control.

### Prototypes

We have some number of instance-level (row-level, row-based) access control systems for Django, such as [Django-Guardian](http://django-guardian.readthedocs.io/), or [Django-Authority](http://django-authority.readthedocs.io/en/latest/) which assume that the database always has an explicit, instantiated, sometimes direct link between the user and the accessing instance. The [Django-Guardian](http://django-guardian.readthedocs.io/) uses general-purpose relations, while [Django-Authority](http://django-authority.readthedocs.io/en/latest/) prefers some kind of common tags.

Such a way, in these packages, we should explicitly, or in the code, assign an access link for every pair of the instance and the user. It is a bit hard work in case of multiple models and lots of users.

The [Django-Rules](https://github.com/dfunckt/django-rules) package introduces an access rules model free to evaluation in runtime, similar to our package. Unfortunately the model of the rules in the package allows to apply rules only to the particular instance of the model, not to the instance set. Such a restriction makes the package principally inefficient when we should apply rules to the arbitrary set of the model instances, as for the visibility calculation.

### The core package functions

The *Django-Access* package introduces a dynamic evaluation-based instance-level (row-level) access control model. It means, that you can define any custom dynamic, evaluated in the code, rules to control, whether the particular user can access to the particular instance. It is your choice, whether the rule is based on general-purpose relations, common tags, having a direct or indirect relation to some special objects in the database, field values, timing conditions, or anything else.

The plugin-based system allows registering any custom plugin assigning access control rules for any particular, or abstract model in your project.

The predefined set of plugin classes contains standard model-level *DjangoAccessPlugin* taking in account the former Django permission system like the Django itself does it.

Any combination of plugins may be registered together for one model using predefined *CompoundPlugin*, which checks the access rules per every plugin in the registered combination.

The standalone *AccessModelAdmin*, as well as inline *AccessTabularInline* and *AccessStackedInline* model admin classes, introduced by the package, are based on the standard Django admin classes and take into account the both, model-wide and instance-level access rules registered in your project.

You can create a custom Model Admin class basing on one of model admin classes introduced by the package, for your own model, or redefine any standard Django, or third-party Model Admin, or even your own former Model Admin class in the existent project, using a special *AccessControlMixin* introduced by the package.

Access control customization for Tastypie is [already implemented](https://github.com/nnseva/django-access-tastypie). Other packages support is coming soon.

## Using the *Django-Access* package in the admin

In order to use custom access rules in the admin view, you should tell admin classes to take custom access rules into account. You are doing it using modified admin classes.

For the backward compatibility purposes, if no any rules are customized, the modified admin classes use the default access rules near to former Django model-based access rules controlled by the Django *Permission* system.

### Creating your own admin classes

If you are creating a new project, you can use any of *AccessModelAdmin*, *AccessTabularInline*, and *AccessStackedInline* exactly as you were using *ModelAdmin*, *TabularInline*, and *StackedInline* standard Django model admins. For example:

```python
from django.contrib import admin
from access.admin import *

from someapp.models import *

class ChildAdmin(AccessTabularInline):
model = SomeChild

# Register your models here.
class ObjectAdmin(AccessModelAdmin):
inlines = [
ChildAdmin,
]

admin.site.register(SomeObject,ObjectAdmin)
```

### Modifying existent admin classes

If you are using standard Django models with their admins, or third-party packages with their admins, you can modify existent Django admin classes using *AccessControlMixin*, and re-register the admin classes for the correspondent models. For example:

```python
from django.contrib import admin
from django.contrib.auth import models
from django.contrib.auth.admin import UserAdmin, GroupAdmin
from access.admin import *

# Register your models here.
class AccessUserAdmin(AccessControlMixin,UserAdmin):
pass

class AccessGroupAdmin(AccessControlMixin,GroupAdmin):
pass

admin.site.unregister(models.User)
admin.site.register(models.User,AccessUserAdmin)
admin.site.unregister(models.Group)
admin.site.register(models.Group,AccessGroupAdmin)
```

Sometimes you need to tune external admin classes to restrict access to some fields etc. You always can do it using
such a technique.

## Using the *Django-Access* package for your purposes

You are free to check access to models and instances exactly the same as the *Django-Access* application does it.

Use lightweight `AccessManager` object instances to control access to the particular model and proper call to the plugin registry.

For example:

```python
...
from access.managers import AccessManager
...

...
def has_add_permission(self, request):
r = AccessManager(self.model).appendable(request) is not False
return r

def has_delete_permission(self, request, obj=None):
manager = AccessManager(self.model)
if manager.check_deleteable(self.model, request) is False:
return False
if obj:
return bool(manager.apply_deleteable(obj.__class__.objects.filter(id=obj.id), request))
return True

def has_view_permission(self, request, obj=None):
manager = AccessManager(self.model)
if manager.check_visible(self.model, request) is False:
return False
if obj:
return bool(manager.apply_visible(obj.__class__.objects.filter(id=obj.id), request))
return True
```

Don't forget to check the return value of the `check_` method against False value explicitly:

```python
if not manager.check_visible(self.model, request): # BAD
...
if manager.check_visible(self.model, request) is False: # GOOD
...
```

To check access to the particular instances or their groups determined
by the filtering expression, the simplified code returning querysets may be used instead, f.e.:

```python
...
from access.managers import AccessManager
...

...
def has_delete_permission(self, request, obj):
manager = AccessManager(self.model)
return manager.deleteable(request).filter(id=obj.id)

def has_view_permission(self, request, obj):
manager = AccessManager(self.model)
return manager.visible(request).filter(id=obj.id)
```

### Permissions which can be checked by the manager

The manager provides a set of methods controlling access to the model class as a whole, as well as to separate instances of the model.

All manager methods controlling the access are having names started from `check_` and `apply_` prefixes.

A method whose name is starting from the `check_` prefix controls access to the model as a whole,
while method whose name is starting from the `apply_` prefix controls access to separate instances of the model.

The second part of the access control method name defines a particular type of the access.
The programmer customizing the access control is free to define any types of the access,
but the Model Admin classes of the package itself use the only following access types:

- `appendable`
- `changeable`
- `deleteable`
- `visible`

The `appendable` access type is used only with `check_` prefix, while others - with both prefixes.

### Check access to the model as a whole

Manager method controlling access to the whole model is named using a `check_` prefix.
The second part of the name determines an access type to be checked.

Parameters of the method are the `model` - a Django Model class to be checked,
and `request` - a Django Request object determining an access context to be controlled.

The return value of the `check_` access control method can be of two kinds.
The False value forbids access, while a dictionary (even empty) means access allowed.

The non-empty dictionary returned from the `check_appendable` method of the manager will
be used to fill the initial values for fields when constructing a new instance of the model.
The dictionary keys will be correspondent to instance property names.
When the instance property refers to the instance set (reverse part of the foreign key) and value is iterable,
values returned from the iterable will be `add`-ed to the property.

### Check access to model instances

Manager method controlling access to separate model instances is named using an `apply_` prefix.
The second part of the name determines an access type to be checked.

Parameters of the method are the `queryset` - a Django `QuerySet` object to be filtered,
and `request` - a Django Request object determining an access context to be controlled.

The return value of the `apply_` access control method is a `QuerySet` filtered
to only allowed instances accordingly to the granted access.

### Standard set of the manager methods

The manager provides the following standard set of methods to check access:

- `check_appendable(model, request)`
- `check_changeable(model, request)`
- `check_deleteable(model, request)`
- `check_visible(model, request)`
- `apply_changeable(queryset, request)`
- `apply_deleteable(queryset, request)`
- `apply_visible(queryset, request)`

### Check permissions for the custom access type

The programmer can declare any new access type using access plugins (see below). The manager allows to check these types
using the same name convention. For example, if some plugin declares `pushable` access type on the instance level,
you can always call `manager.apply_pushable(queryset, request)` method to get the queryset returning only `pushable` instances.
For those models where this access type is not determined, the method just returns the original queryset.

You can call `apply_` or `check_` method of the manager for the access type even if it was not yet declared. The
manager just returns values meaning no restrictions in this case. It allows to create access
control rules and develop other types of your project independently.

## Customising access rules using plugins

When the admin is ready to use custom access rules, you can define your own access rules using predefined or your own plugins.

### Registering a plugin

The *Django-Access* package uses a global access control plugin registry. Every plugin instance is registered in the registry using the model class where it should be applied as a registry key. Registering plugins can be made using `AccessManager.register_plugin`, or `AccessManager.register_plugins` static methods. The `AccessManager.register_plugin` method takes a model class, and plugin instance as two parameters, while `AccessManager.register_plugins` takes one dictionary parameter with model classes as keys, and plugin instances as values.

You can register plugins for any model classes, either standard, or from third-party packages, or your own. *Note* that you can register the only one plugin instance for the model. Registering another plugin instance for the same model unregisters the previous one. In order to combine several plugins, you can use a provided *CompoundPlugin* as described below.

You can register a plugin for any `Model` class, even an *abstract* one. This `Model` and *all its successors* (except those for which the own plugin is registered) will be controlled by this plugin instance.

We recommend register plugins in the models.py module of the separate django application without its own models. Put this application after the all others in the `INSTALLED_APPS` section of the settings module.

For example:

```python
from __future__ import unicode_literals

from django.db import models
from django.db.models.query import Q
from django.contrib.auth.models import User, Group, Permission

from access.plugins import CompoundPlugin, ApplyAblePlugin, CheckAblePlugin, DjangoAccessPlugin
from access.managers import AccessManager

from someapp.models import SomeObject, SomeChild

AccessManager.register_plugins({
Permission:ApplyAblePlugin(visible=lambda queryset, request: queryset.filter(
Q(user=request.user) |
Q(group__in=request.user.groups.all())
)),
User:CompoundPlugin(
DjangoAccessPlugin(),
ApplyAblePlugin(
changeable=lambda queryset, request: queryset.filter(Q(id=request.user.id)),
deleteable=lambda queryset, request: queryset.filter(Q(id=request.user.id)),
)
),
Group:CompoundPlugin(
DjangoAccessPlugin(),
CheckAblePlugin(
appendable=lambda model, request: {'user_set':[request.user]}
),
ApplyAblePlugin(
visible=lambda queryset, request: queryset.filter(user=request.user),
changeable=lambda queryset, request: queryset.filter(user=request.user),
deleteable=lambda queryset, request: queryset.filter(user=request.user),
),
)
})

AccessManager.register_plugins({
SomeObject: CompoundPlugin(
DjangoAccessPlugin(),
ApplyAblePlugin(
visible=lambda queryset, request: queryset.filter(Q(editor_group__in=request.user.groups.all())|Q(viewer_groups__in=request.user.groups.all())),
changeable=lambda queryset, request: queryset.filter(Q(editor_group__in=request.user.groups.all())),
#deleteable=lambda queryset, request: queryset.filter(Q(editor_group__in=request.user.groups.all())).exclude(Q(children__is_archived=False)),
deleteable=lambda queryset, request: queryset.filter(Q(editor_group__in=request.user.groups.all())),
)
),
SomeChild: CompoundPlugin(
DjangoAccessPlugin(),
ApplyAblePlugin(
visible=lambda queryset, request: queryset.filter(Q(is_archived=False)&(Q(parent__editor_group__in=request.user.groups.all())|Q(parent__viewer_groups__in=request.user.groups.all()))),
changeable=lambda queryset, request: queryset.filter(Q(parent__editor_group__in=request.user.groups.all())),
deleteable=lambda queryset, request: queryset.filter(Q(is_archived=True) & Q(parent__editor_group__in=request.user.groups.all())),
)
)
})
```

```python
INSTALLED_APPS = [
# Django applications
'django.contrib.admin',
'django.contrib.auth',
'django.contrib.contenttypes',
'django.contrib.sessions',
'django.contrib.messages',
'django.contrib.staticfiles',

# Access package
'access',

# Project own models
'someapp',

# Here the special application to register all access rules
'accessprofile',
]

```

### Default plugin

When no any plugin is found for the model, the default plugin is used instead. The static method `AccessManager.get_default_plugin` returns a just constructed default plugin instance. The constructor takes no parameters.

The `ACCESS_DEFAULT_PLUGIN` settings value determines a ***string*** referring default plugin class appropriate to import using import_module standard python function.

### Plugin interface

Every plugin provides a set of methods controlling access to the model class as a whole, as well as to separate instances of the model. The *Django-Access* package controls, which methods are defined by the plugin instance and use it to check whether the particular user can have access to the particular instance by the particular way.

All plugin methods controlling the access are having names started from `check_` and `apply_` prefixes. A method whose name is starting from the `check_` prefix controls access to the model as a whole, while method whose name is starting from the `apply_` prefix controls access to separate instances of the model.

The second part of the access control method name defines a particular type of the access. The programmer is free to define any types of the access, but the Model Admin classes of the package itself use the only following access types:

- `appendable`
- `changeable`
- `deleteable`
- `visible`

The `appendable` access type is used only with `check_` prefix, while others - with both prefixes.

### Check access to the model as a whole

Plugin method controlling access to the whole model is named using a `check_` prefix. The second part of the name determines an access type to be checked.

Parameters of the method are the `model` - a Django Model class to be checked, and `request` - a Django Request object determining an access context to be controlled. The plugin instance is free to verify, what parts of the request access context are important and should be verified against a model. Plugins provided by the *Django-Access* package assume that the request contains a `user` property referring a current user, and user instance has an `is_superuser` flag.

The return value of the `check_` access control method can be of two kinds. The False value forbids access, while a dictionary (even empty) means access allowed. Other value types mean access allowed and may be used also, but are not compatible with CompoundPlugin.

The non-empty dictionary returned from the `check_appendable` method of the plugin will be used to fill the initial values for fields when constructing a new instance of the model. The dictionary keys will be correspondent to instance property names. When the instance property refers to the instance set (reverse part of the foreign key) and value is iterable, values returned from the iterable will be `add`-ed to the property.

### Check access to model instances

Plugin method controlling access to separate model instances is named using an `apply_` prefix. The second part of the name determines an access type to be checked.

Parameters of the method are the `queryset` - a Django `QuerySet` object to be filtered, and `request` - a Django Request object determining an access context to be controlled. The plugin instance is free to verify, what parts of the request access context are important and should be verified against model instances in the passed `QuerySet`. Plugins provided by the *Django-Access* package assume that the request contains a `user` field referring a current user, and user instance has an `is_superuser` flag.

The return value of the `apply_` access control method is a `QuerySet` filtered to only allowed instances accordingly to the granted access.

### Base and custom access types

The Model Admin classes defined in the *Django-Access* package control the only four base access types:

- `appendable`
- `changeable`
- `deleteable`
- `visible`

The `appendable` access type is checked only against a model, using `check_` prefix, because the instance-level access of such kind has no sense.

The programmer can use any other access type in the same manner as the base ones.

### Combining access rules using the *CompoundPlugin*

The *CompoundPlugin* can be used to combine access rules determined by several plugins using `and` logic. Model or instance is accessible for the user *only* if all plugins allow such an access. Just pass plugin instances into *CompoundPlugin* instance constructor.

For example:
```python
AccessManager.register_plugins({
User:CompoundPlugin(
DjangoAccessPlugin(),
ApplyAblePlugin(
changeable=lambda queryset, request: queryset.filter(Q(id=request.user.id)),
deleteable=lambda queryset, request: queryset.filter(Q(id=request.user.id)),
)
),
})
```

Dictionaries returning by `check_` methods for the same access type of combined plugins are united and returned to the system by the *CompoundPlugin*.

If any of combined plugins `check_` method returns False, the correspondent *CompoundPlugin* method returns False, and other dictionaries returned by combined plugins `check_` method for the same access type are ignored.

`QuerySet` objects are filtered sequentially by all `apply_` methods of combined plugins for the same access type and the resulting filtered `QuerySet` object is returned by the correspondent method of the *CompoundPlugin*

### Creating dynamic access rules using the *CheckAblePlugin* or the *ApplyAblePlugin*

These plugins use keyword parameters of the constructor, correspondent to access types to take a callable determining the result of the correspondent access rule method. The *CheckAblePlugin* describes model-wide access rules, while *ApplyAblePlugin* determines instance-level access rules.

```python
Group:CompoundPlugin(
DjangoAccessPlugin(),
CheckAblePlugin(
appendable=lambda model, request: {'user_set':[request.user]}
),
ApplyAblePlugin(
visible=lambda queryset, request: queryset.filter(user=request.user),
changeable=lambda queryset, request: queryset.filter(user=request.user),
deleteable=lambda queryset, request: queryset.filter(user=request.user),
),
)
```

### Simplified model-wide access rules using the *SimpleCheckPlugin*

This plugin simplifies checking for model-wide rules as in the *CheckAblePlugin* reducing it to return values of False and True instead of False and dictionary.

For example:

```python
SimpleCheckPlugin(
appendable=lambda model, request: model._meta.app_label == "custom"
)
```

## Backward compatibility

### Backward compatible access rules with *DjangoAccessPlugin*

This plugin defines access rules near to the former Django *Permission* access control system provided in the `auth` Django contributed application.
It checks the permissions set against the current user as it stored in the database.

For example:

```python
Group:CompoundPlugin(
DjangoAccessPlugin(),
CheckAblePlugin(
appendable=lambda model, request: {'user_set':[request.user]}
),
ApplyAblePlugin(
visible=lambda queryset, request: queryset.filter(user=request.user),
changeable=lambda queryset, request: queryset.filter(user=request.user),
deleteable=lambda queryset, request: queryset.filter(user=request.user),
),
)
```

### Backward compatible deletion control

The `ACCESS_STRONG_DELETION_CONTROL` settings variable (default, backward compatible value is False) controls,
whether the restriction to delete is controlled for models not having a separate (not Inline) Admin.
If yes, the forbidden instances are included in the set of protected instances when trying to delete from the Admin.

### Backward compatible authorization backend

You always can redefine third-party package admin classes as described above. It totally avoids using Django authorization
subsystem by the admin classes. It's enough for the most such packages.

But sometimes the third-party package can use direct calls to the `User` methods checking authorization (`has_perm` most probable).
Such calls are redirected to the Django authorization subsystem. For such a case use the following settings:

```python
AUTHENTICATION_BACKENDS = ['access.auth.backends.ModelBackend']
```

This backend is inherited from the standard Django authentication backend and provides modified methods
to **authorize** user actions accordingly to custom access rules defined in the project.

***Note*** that the provided backward compatible authentication/authorization backend prevents using advanced features
of the *Django-Access* package, such as whole request authorization context and instance filtering controlled by access rules.
Newer use direct `User.has_perm` calls in your own code, use `AccessManager` calls instead.

***Note*** that the Django authorization subsystem checks permissions for the user only, while the *Django-Access* package
allows checking permissions in the whole request context. So, in case of using this authentication backend,
your custom access rules should be ready to take a fake request object as a callback parameter instead of real one. The fake
request object is constructed and passed to the rule with the only `user` property compatible with a real Django request.

## Compatibility issues

The package has been developed and tested against:

- Python 2.7
- Django v.1.10
- Django v.1.11
- Python 3.6
- Django v.1.10
- Django v.1.11
- Django v.2.0
- Django v.2.1
- Django v.2.2
- Django v.3.0
- Python 3.7
- Django v.2.0
- Django v.2.1
- Django v.2.2
- Django v.3.0
- Python 3.8
- Django v.2.0
- Django v.2.1
- Django v.2.2
- Django v.3.0
- Django v.3.1
- Django v.3.2
- Django v.4.0
- Django v.4.1
- Django v.4.2
- Python 3.9
- Django v.2.0
- Django v.2.1
- Django v.2.2
- Django v.3.0
- Django v.3.1
- Django v.3.2
- Django v.4.0
- Django v.4.1
- Django v.4.2
- Python 3.10
- Django v.3.2
- Django v.4.0
- Django v.4.1
- Django v.4.2
- Python 3.11
- Django v.3.2
- Django v.4.0
- Django v.4.1
- Django v.4.2

It also can be compatible with other versions and combinations, but not obviously

## Examples

Just look into the *example* folder.

The example project uses `django.contrib.auth` models and also has an own application `someapp` introducing two models:
- `SomeObject` controlled by the separate `ModelAdmin` having a foreign key to the `Group` of editors, and many-to-many relation to `Group`s of viewers
- `SomeChild` which has a foreign key to the `SomeObject` and controlled by the `InlineAdmin`

The example is oriented to the following access scheme:
- The superuser can anything
- Django Permissions are applied except User
- The other User record is accessible for reading except e-mail and password
- The other User record is accessible for writing (except `is_superuser` flag and timestamp fields) and deleting if it is not a superuser and Django permissions granted
- The own User record is accessible for writing (except `is_superuser` flag and timestamp fields)

- Groups and Permissions are visible only for those Users who have relations to them
- SomeObject is visible for viewers, and changeable for editors, defined by the related `Group` instances

When the `Group` is created, the creator is included into this `Group`.

Code from the example is used in this file to illustrate different details of the package. You can see the original example on the GitHub repository.

## See also

The [Django-Access-Tastypie](https://github.com/nnseva/django-access-tastypie) package introduces an authorization backend for the [Django-Tastypie package](https://django-tastypie.readthedocs.io/en/latest/) to use access rules defined here.

The [Django-REST-Access](https://github.com/nnseva/django-rest-access) package introduces a permission control and filtering backend for the [Django REST Framework](https://www.django-rest-framework.org) to use access rules defined here.

The [Django-Access-Select2](https://github.com/nnseva/django-access-select2) package provides a filtering for the [Django-Select2](http://django-select2.readthedocs.io/en/latest/) package (obsoletted for now) to use access rules defined here.