Warning: file_get_contents(/data/phpspider/zhask/data//catemap/2/cmake/2.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
django rest框架中如何基于用户组允许/拒绝api权限_Django_Django Rest Framework - Fatal编程技术网

django rest框架中如何基于用户组允许/拒绝api权限

django rest框架中如何基于用户组允许/拒绝api权限,django,django-rest-framework,Django,Django Rest Framework,我有两组用户创建者和查看器 创建者可以创建、更新、查看和删除数据,而查看器只能查看数据 我不明白如何轻松地实现它们:稍后,如果Imay必须为不同的型号允许某些crud。我觉得如果组可以有自定义访问权限,我将拥有完全的控制权,可能是一个自定义类 我已经分离了api,现在需要检查组是否匹配,然后允许对api执行操作 序列化程序.py from rest_framework import serializers from trackit_create.models import upload_stat

我有两组用户创建者和查看器 创建者可以创建、更新、查看和删除数据,而查看器只能查看数据

我不明白如何轻松地实现它们:稍后,如果Imay必须为不同的型号允许某些crud。我觉得如果组可以有自定义访问权限,我将拥有完全的控制权,可能是一个自定义类

我已经分离了api,现在需要检查组是否匹配,然后允许对api执行操作

序列化程序.py

from rest_framework import serializers
from trackit_create.models import upload_status_image, track_info
from django.contrib.auth.models import Group



class StatusSerializer(serializers.ModelSerializer):

    class Meta:
        model=track_info
        fields = ('id','description','Manufacture','user','Cost','image')
views.py

 has option to create data 
class AssetCreator(mixins.CreateModelMixin, generics.ListAPIView,mixins.ListModelMixin):
    serializer_class =StatusSerializer
    authentication_classes= [TokenAuthentication]
    permission_classes = [permissions.IsAuthenticated]


    # def get(self, request, *args, **kwags):
    #     return self.get(request, *args, **kwags)

    def get_queryset(self):
        qs= track_info.objects.all()
        query= self.request.GET.get('q')
        if query is not None:
            qs=qs.filter(content__icontains=query)
            return qs

    def get_object(self):
        request = self.request
        passed_id = request.GET.get('id',None)
        queryset =self.get_queryset()

        if passed_id is not None:
            obj = get_object_or_404(queryset, id = passed_id)
            self.check_object_permissions(request, obj)        
        return obj       

    def post(self, request, *args, **kwags):
        return self.create(request, *args, **kwags)


# has permision to edit, delete data based on the 
class StatusAPIDetailView(mixins.UpdateModelMixin, mixins.DestroyModelMixin, generics.RetrieveAPIView):


    serializer_class = StatusSerializer
    authentication_classes= [TokenAuthentication]    
    permission_classes = [permissions.IsAuthenticated]    
    queryset= track_info.objects.all()
    lookup_field ='id'


    def put(self,request,*args,**kwargs):
        return self.update(request, *args, **kwargs)


    def delete(self,request,*args,**kwargs):
        return self.destroy (request, *args, **kwargs)

    def patch(self,request,*args,**kwargs):
        return self.update (request, *args, **kwargs)

    def perform_update(self, serializer):
        serializer.save(updated_by_user= self.request.user)

    def perform_destroy(self,request):
        if instance is not None:
            return instance.delete()        
        return None


class AssetGetlist(APIView):
    permission_classes = [permissions.IsAuthenticated]
    authentication_classes= [TokenAuthentication]
    def get(self,request,format=None):
        qs = track_info.objects.all()
        query_set = Group.objects.filter(user = request.user)
        print ("fgfgf",query_set) # getting the group user is in 
        pm=print(query_set[0])
        #data={'grp':pm}           
        serializer= StatusSerializer(qs, many=True)
        return Response(serializer.data, status =status.HTTP_200_OK)
models.py

class track_info(models.Model):
    user = models.ForeignKey(settings.AUTH_USER_MODEL, on_delete= models.CASCADE)
    Entry_date = models.DateField(auto_now_add=True) 
    description = models.TextField(null=True, blank=True)
    image = models.ImageField(null=True, blank=True)
    Manufacture= models.CharField(max_length=100)
    Cost = models.IntegerField(null=True, blank=True)
我提到过 但是我不能把它和我的代码联系起来

也被判定为堆栈溢出,但无法解决

您可以通过扩展Django Rest Framework BasePermission来创建一个

您需要实现has_permission方法,其中您可以访问请求和视图对象。您可以检查request.user是否在正确的组中,并根据需要返回True/False

大概是这样的:

from rest_framework.permissions import BasePermission

class CreatorOnly(BasePermission):
    def has_permission(self, request, view):
        if request.user.groups.filter(name='your_creator_group').exists() and request.method in YOUR_ALLOWED_METHODS:
           return True
        return False
然后将其添加到您的查看权限列表中:

class AssetCreator(mixins.CreateModelMixin, generics.ListAPIView,mixins.ListModelMixin):
    ...
    permission_classes = [CreatorOnly]

如何提及你的方法。。我曾使用过内置安全方法,但想用我自己的方法对其进行自定义。@SouravRoy您的允许方法只是一组方法名称,如“GET”、“POST”、“HEAD”等。您可以允许创建者发布,而只允许查看者组获取。