mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-04-19 00:45:16 +00:00
User level check implementation
This commit is contained in:
parent
19d5e665ec
commit
cac0c9f280
19
templates/access_denied.html
Normal file
19
templates/access_denied.html
Normal file
@ -0,0 +1,19 @@
|
||||
{% extends "base.html" %}
|
||||
|
||||
{% block content %}
|
||||
|
||||
<div class='row'>
|
||||
<div class='col-lg-6'>
|
||||
<div class="card card-primary card-outline">
|
||||
<div class="card-header">
|
||||
<h3 class="card-title">Access Denied</h3>
|
||||
</div>
|
||||
<div class="card-body">
|
||||
<p>Sorry, you do not have permission to access this page. <br>Please contact your system administrator if you believe this is an error.</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
{% endblock %}
|
@ -8,6 +8,8 @@ from django.contrib.sessions.models import Session
|
||||
|
||||
@login_required
|
||||
def view_user_list(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=50).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
page_title = 'User Manager'
|
||||
user_acl_list = UserAcl.objects.all().order_by('user__username')
|
||||
context = {'page_title': page_title, 'user_acl_list': user_acl_list}
|
||||
@ -16,6 +18,8 @@ def view_user_list(request):
|
||||
|
||||
@login_required
|
||||
def view_manage_user(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=50).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
user_acl = None
|
||||
user = None
|
||||
if 'uuid' in request.GET:
|
||||
|
@ -1,4 +1,5 @@
|
||||
from django.shortcuts import render, get_object_or_404, redirect
|
||||
from user_manager.models import UserAcl
|
||||
|
||||
from wireguard.forms import WireGuardInstanceForm
|
||||
from .models import WireGuardInstance
|
||||
@ -80,6 +81,8 @@ def view_wireguard_status(request):
|
||||
|
||||
@login_required
|
||||
def view_wireguard_manage_instance(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=50).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
wireguard_instances = WireGuardInstance.objects.all().order_by('instance_id')
|
||||
if request.GET.get('uuid'):
|
||||
current_instance = get_object_or_404(WireGuardInstance, uuid=request.GET.get('uuid'))
|
||||
|
@ -1,5 +1,6 @@
|
||||
from django.shortcuts import render, get_object_or_404, redirect
|
||||
from django.contrib.auth.decorators import login_required
|
||||
from user_manager.models import UserAcl
|
||||
from wireguard.models import WireGuardInstance, Peer, PeerAllowedIP
|
||||
from django.contrib import messages
|
||||
from django.db.models import Max
|
||||
@ -60,6 +61,13 @@ def view_wireguard_peer_list(request):
|
||||
|
||||
@login_required
|
||||
def view_wireguard_peer_manage(request):
|
||||
if request.method == 'POST':
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=30).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
else:
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=20).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
|
||||
if request.GET.get('instance'):
|
||||
current_instance = get_object_or_404(WireGuardInstance, uuid=request.GET.get('instance'))
|
||||
current_peer = None
|
||||
@ -122,6 +130,8 @@ def view_wireguard_peer_manage(request):
|
||||
|
||||
|
||||
def view_manage_ip_address(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=30).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
if request.GET.get('peer'):
|
||||
current_peer = get_object_or_404(Peer, uuid=request.GET.get('peer'))
|
||||
page_title = 'Add new IP address for Peer '
|
||||
|
Loading…
x
Reference in New Issue
Block a user