mirror of
https://github.com/paperless-ngx/paperless-ngx.git
synced 2026-01-30 23:08:59 -06:00
Compare commits
5 Commits
feature-pe
...
release/v2
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
17275933ca | ||
|
|
3e41d99a82 | ||
|
|
5cc3c087d9 | ||
|
|
c8c4c7c749 | ||
|
|
836c81e037 |
1
.github/workflows/ci.yml
vendored
1
.github/workflows/ci.yml
vendored
@@ -617,7 +617,6 @@ jobs:
|
|||||||
version: ${{ steps.get_version.outputs.version }}
|
version: ${{ steps.get_version.outputs.version }}
|
||||||
prerelease: ${{ steps.get_version.outputs.prerelease }}
|
prerelease: ${{ steps.get_version.outputs.prerelease }}
|
||||||
publish: true # ensures release is not marked as draft
|
publish: true # ensures release is not marked as draft
|
||||||
commitish: ${{ github.sha }}
|
|
||||||
env:
|
env:
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Upload release archive
|
- name: Upload release archive
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
[project]
|
[project]
|
||||||
name = "paperless-ngx"
|
name = "paperless-ngx"
|
||||||
version = "2.20.5"
|
version = "2.20.6"
|
||||||
description = "A community-supported supercharged document management system: scan, index and archive all your physical documents"
|
description = "A community-supported supercharged document management system: scan, index and archive all your physical documents"
|
||||||
readme = "README.md"
|
readme = "README.md"
|
||||||
requires-python = ">=3.10"
|
requires-python = ">=3.10"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "paperless-ngx-ui",
|
"name": "paperless-ngx-ui",
|
||||||
"version": "2.20.5",
|
"version": "2.20.6",
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"preinstall": "npx only-allow pnpm",
|
"preinstall": "npx only-allow pnpm",
|
||||||
"ng": "ng",
|
"ng": "ng",
|
||||||
|
|||||||
@@ -51,6 +51,7 @@
|
|||||||
@if (displayFields) {
|
@if (displayFields) {
|
||||||
<pngx-input-drag-drop-select i18n-title title="Show" i18n-emptyText emptyText="Default" [items]="displayFields" formControlName="display_fields"></pngx-input-drag-drop-select>
|
<pngx-input-drag-drop-select i18n-title title="Show" i18n-emptyText emptyText="Default" [items]="displayFields" formControlName="display_fields"></pngx-input-drag-drop-select>
|
||||||
}
|
}
|
||||||
|
<span class="small text-muted fst-italic" i18n>Note: ordering is not preserved</span>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ export const environment = {
|
|||||||
apiVersion: '9', // match src/paperless/settings.py
|
apiVersion: '9', // match src/paperless/settings.py
|
||||||
appTitle: 'Paperless-ngx',
|
appTitle: 'Paperless-ngx',
|
||||||
tag: 'prod',
|
tag: 'prod',
|
||||||
version: '2.20.5',
|
version: '2.20.6',
|
||||||
webSocketHost: window.location.host,
|
webSocketHost: window.location.host,
|
||||||
webSocketProtocol: window.location.protocol == 'https:' ? 'wss:' : 'ws:',
|
webSocketProtocol: window.location.protocol == 'https:' ? 'wss:' : 'ws:',
|
||||||
webSocketBaseUrl: base_url.pathname + 'ws/',
|
webSocketBaseUrl: base_url.pathname + 'ws/',
|
||||||
|
|||||||
@@ -2,17 +2,10 @@ from django.contrib.auth.models import Group
|
|||||||
from django.contrib.auth.models import Permission
|
from django.contrib.auth.models import Permission
|
||||||
from django.contrib.auth.models import User
|
from django.contrib.auth.models import User
|
||||||
from django.contrib.contenttypes.models import ContentType
|
from django.contrib.contenttypes.models import ContentType
|
||||||
from django.db.models import Count
|
|
||||||
from django.db.models import IntegerField
|
|
||||||
from django.db.models import OuterRef
|
|
||||||
from django.db.models import Q
|
from django.db.models import Q
|
||||||
from django.db.models import QuerySet
|
from django.db.models import QuerySet
|
||||||
from django.db.models import Subquery
|
|
||||||
from django.db.models.functions import Cast
|
|
||||||
from django.db.models.functions import Coalesce
|
|
||||||
from guardian.core import ObjectPermissionChecker
|
from guardian.core import ObjectPermissionChecker
|
||||||
from guardian.models import GroupObjectPermission
|
from guardian.models import GroupObjectPermission
|
||||||
from guardian.models import UserObjectPermission
|
|
||||||
from guardian.shortcuts import assign_perm
|
from guardian.shortcuts import assign_perm
|
||||||
from guardian.shortcuts import get_objects_for_user
|
from guardian.shortcuts import get_objects_for_user
|
||||||
from guardian.shortcuts import get_users_with_perms
|
from guardian.shortcuts import get_users_with_perms
|
||||||
@@ -136,93 +129,23 @@ def set_permissions_for_object(permissions: dict, object, *, merge: bool = False
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def _permitted_document_ids(user):
|
|
||||||
"""
|
|
||||||
Return a queryset of document IDs the user may view, limited to non-deleted
|
|
||||||
documents. This intentionally avoids ``get_objects_for_user`` to keep the
|
|
||||||
subquery small and index-friendly.
|
|
||||||
"""
|
|
||||||
|
|
||||||
base_docs = Document.objects.filter(deleted_at__isnull=True).only("id", "owner")
|
|
||||||
|
|
||||||
if user is None or not getattr(user, "is_authenticated", False):
|
|
||||||
# Just Anonymous user e.g. for drf-spectacular
|
|
||||||
return base_docs.filter(owner__isnull=True).values_list("id", flat=True)
|
|
||||||
|
|
||||||
if getattr(user, "is_superuser", False):
|
|
||||||
return base_docs.values_list("id", flat=True)
|
|
||||||
|
|
||||||
document_ct = ContentType.objects.get_for_model(Document)
|
|
||||||
perm_filter = {
|
|
||||||
"permission__codename": "view_document",
|
|
||||||
"permission__content_type": document_ct,
|
|
||||||
}
|
|
||||||
|
|
||||||
user_perm_docs = (
|
|
||||||
UserObjectPermission.objects.filter(user=user, **perm_filter)
|
|
||||||
.annotate(object_pk_int=Cast("object_pk", IntegerField()))
|
|
||||||
.values_list("object_pk_int", flat=True)
|
|
||||||
)
|
|
||||||
|
|
||||||
group_perm_docs = (
|
|
||||||
GroupObjectPermission.objects.filter(group__user=user, **perm_filter)
|
|
||||||
.annotate(object_pk_int=Cast("object_pk", IntegerField()))
|
|
||||||
.values_list("object_pk_int", flat=True)
|
|
||||||
)
|
|
||||||
|
|
||||||
permitted_documents = user_perm_docs.union(group_perm_docs)
|
|
||||||
|
|
||||||
return base_docs.filter(
|
|
||||||
Q(owner=user) | Q(owner__isnull=True) | Q(id__in=permitted_documents),
|
|
||||||
).values_list("id", flat=True)
|
|
||||||
|
|
||||||
|
|
||||||
def get_document_count_filter_for_user(user):
|
def get_document_count_filter_for_user(user):
|
||||||
"""
|
"""
|
||||||
Return the Q object used to filter document counts for the given user.
|
Return the Q object used to filter document counts for the given user.
|
||||||
|
|
||||||
The filter is expressed as an ``id__in`` against a small subquery of permitted
|
|
||||||
document IDs to keep the generated SQL simple and avoid large OR clauses.
|
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
if user is None or not getattr(user, "is_authenticated", False):
|
||||||
|
return Q(documents__deleted_at__isnull=True, documents__owner__isnull=True)
|
||||||
if getattr(user, "is_superuser", False):
|
if getattr(user, "is_superuser", False):
|
||||||
# Superuser: no permission filtering needed
|
|
||||||
return Q(documents__deleted_at__isnull=True)
|
return Q(documents__deleted_at__isnull=True)
|
||||||
|
return Q(
|
||||||
permitted_ids = _permitted_document_ids(user)
|
documents__deleted_at__isnull=True,
|
||||||
return Q(documents__id__in=permitted_ids)
|
documents__id__in=get_objects_for_user_owner_aware(
|
||||||
|
user,
|
||||||
|
"documents.view_document",
|
||||||
def annotate_document_count_for_related_queryset(
|
Document,
|
||||||
queryset,
|
).values_list("id", flat=True),
|
||||||
through_model,
|
|
||||||
source_field: str,
|
|
||||||
target_field: str = "document_id",
|
|
||||||
user=None,
|
|
||||||
):
|
|
||||||
"""
|
|
||||||
Annotate a queryset with permissions-aware document counts using a subquery
|
|
||||||
against a relation table.
|
|
||||||
|
|
||||||
Args:
|
|
||||||
queryset: base queryset to annotate (must contain pk)
|
|
||||||
through_model: model representing the relation (e.g., Document.tags.through
|
|
||||||
or CustomFieldInstance)
|
|
||||||
source_field: field on the relation pointing back to queryset pk
|
|
||||||
target_field: field on the relation pointing to Document id
|
|
||||||
user: the user for whom to filter permitted document ids
|
|
||||||
"""
|
|
||||||
|
|
||||||
permitted_ids = _permitted_document_ids(user)
|
|
||||||
counts = (
|
|
||||||
through_model.objects.filter(
|
|
||||||
**{source_field: OuterRef("pk"), f"{target_field}__in": permitted_ids},
|
|
||||||
)
|
)
|
||||||
.values(source_field)
|
|
||||||
.annotate(c=Count(target_field))
|
|
||||||
.values("c")
|
|
||||||
)
|
|
||||||
return queryset.annotate(document_count=Coalesce(Subquery(counts[:1]), 0))
|
|
||||||
|
|
||||||
|
|
||||||
def get_objects_for_user_owner_aware(user, perms, Model) -> QuerySet:
|
def get_objects_for_user_owner_aware(user, perms, Model) -> QuerySet:
|
||||||
|
|||||||
@@ -40,6 +40,7 @@ from guardian.utils import get_group_obj_perms_model
|
|||||||
from guardian.utils import get_user_obj_perms_model
|
from guardian.utils import get_user_obj_perms_model
|
||||||
from rest_framework import fields
|
from rest_framework import fields
|
||||||
from rest_framework import serializers
|
from rest_framework import serializers
|
||||||
|
from rest_framework.exceptions import PermissionDenied
|
||||||
from rest_framework.fields import SerializerMethodField
|
from rest_framework.fields import SerializerMethodField
|
||||||
from rest_framework.filters import OrderingFilter
|
from rest_framework.filters import OrderingFilter
|
||||||
|
|
||||||
@@ -436,6 +437,19 @@ class OwnedObjectSerializer(
|
|||||||
return instance
|
return instance
|
||||||
|
|
||||||
def update(self, instance, validated_data):
|
def update(self, instance, validated_data):
|
||||||
|
user = getattr(self, "user", None)
|
||||||
|
is_superuser = user.is_superuser if user is not None else False
|
||||||
|
is_owner = instance.owner == user if user is not None else False
|
||||||
|
is_unowned = instance.owner is None
|
||||||
|
|
||||||
|
if (
|
||||||
|
("owner" in validated_data and validated_data["owner"] != instance.owner)
|
||||||
|
or "set_permissions" in validated_data
|
||||||
|
) and not (is_superuser or is_owner or is_unowned):
|
||||||
|
raise PermissionDenied(
|
||||||
|
_("Insufficient permissions."),
|
||||||
|
)
|
||||||
|
|
||||||
if "set_permissions" in validated_data:
|
if "set_permissions" in validated_data:
|
||||||
self._set_permissions(validated_data["set_permissions"], instance)
|
self._set_permissions(validated_data["set_permissions"], instance)
|
||||||
self.validate_unique_together(validated_data, instance)
|
self.validate_unique_together(validated_data, instance)
|
||||||
@@ -699,9 +713,6 @@ class StoragePathField(serializers.PrimaryKeyRelatedField):
|
|||||||
|
|
||||||
class CustomFieldSerializer(serializers.ModelSerializer):
|
class CustomFieldSerializer(serializers.ModelSerializer):
|
||||||
def __init__(self, *args, **kwargs):
|
def __init__(self, *args, **kwargs):
|
||||||
# Ignore args passed by permissions mixin
|
|
||||||
kwargs.pop("user", None)
|
|
||||||
kwargs.pop("full_perms", None)
|
|
||||||
context = kwargs.get("context")
|
context = kwargs.get("context")
|
||||||
self.api_version = int(
|
self.api_version = int(
|
||||||
context.get("request").version
|
context.get("request").version
|
||||||
|
|||||||
@@ -1216,6 +1216,17 @@ class TestDocumentApi(DirectoriesMixin, DocumentConsumeDelayMixin, APITestCase):
|
|||||||
|
|
||||||
self.assertEqual(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
|
self.assertEqual(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
|
||||||
|
|
||||||
|
def test_upload_insufficient_permissions(self):
|
||||||
|
self.client.force_authenticate(user=User.objects.create_user("testuser2"))
|
||||||
|
|
||||||
|
with (Path(__file__).parent / "samples" / "simple.pdf").open("rb") as f:
|
||||||
|
response = self.client.post(
|
||||||
|
"/api/documents/post_document/",
|
||||||
|
{"document": f},
|
||||||
|
)
|
||||||
|
|
||||||
|
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
|
||||||
|
|
||||||
def test_upload_empty_metadata(self):
|
def test_upload_empty_metadata(self):
|
||||||
self.consume_file_mock.return_value = celery.result.AsyncResult(
|
self.consume_file_mock.return_value = celery.result.AsyncResult(
|
||||||
id=str(uuid.uuid4()),
|
id=str(uuid.uuid4()),
|
||||||
|
|||||||
@@ -441,6 +441,59 @@ class TestApiAuth(DirectoriesMixin, APITestCase):
|
|||||||
self.assertTrue(checker.has_perm("change_document", doc))
|
self.assertTrue(checker.has_perm("change_document", doc))
|
||||||
self.assertIn("change_document", get_perms(group1, doc))
|
self.assertIn("change_document", get_perms(group1, doc))
|
||||||
|
|
||||||
|
def test_document_permissions_change_requires_owner(self):
|
||||||
|
owner = User.objects.create_user(username="owner")
|
||||||
|
editor = User.objects.create_user(username="editor")
|
||||||
|
editor.user_permissions.add(
|
||||||
|
*Permission.objects.all(),
|
||||||
|
)
|
||||||
|
|
||||||
|
doc = Document.objects.create(
|
||||||
|
title="Ownered doc",
|
||||||
|
content="sensitive",
|
||||||
|
checksum="abc123",
|
||||||
|
mime_type="application/pdf",
|
||||||
|
owner=owner,
|
||||||
|
)
|
||||||
|
|
||||||
|
assign_perm("view_document", editor, doc)
|
||||||
|
assign_perm("change_document", editor, doc)
|
||||||
|
|
||||||
|
self.client.force_authenticate(editor)
|
||||||
|
response = self.client.patch(
|
||||||
|
f"/api/documents/{doc.pk}/",
|
||||||
|
json.dumps(
|
||||||
|
{
|
||||||
|
"set_permissions": {
|
||||||
|
"view": {
|
||||||
|
"users": [editor.id],
|
||||||
|
"groups": [],
|
||||||
|
},
|
||||||
|
"change": {
|
||||||
|
"users": None,
|
||||||
|
"groups": None,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
content_type="application/json",
|
||||||
|
)
|
||||||
|
|
||||||
|
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
|
||||||
|
|
||||||
|
self.client.force_authenticate(editor)
|
||||||
|
response = self.client.patch(
|
||||||
|
f"/api/documents/{doc.pk}/",
|
||||||
|
json.dumps(
|
||||||
|
{
|
||||||
|
"owner": editor.id,
|
||||||
|
},
|
||||||
|
),
|
||||||
|
content_type="application/json",
|
||||||
|
)
|
||||||
|
|
||||||
|
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
|
||||||
|
|
||||||
def test_dynamic_permissions_fields(self):
|
def test_dynamic_permissions_fields(self):
|
||||||
user1 = User.objects.create_user(username="user1")
|
user1 = User.objects.create_user(username="user1")
|
||||||
user1.user_permissions.add(*Permission.objects.filter(codename="view_document"))
|
user1.user_permissions.add(*Permission.objects.filter(codename="view_document"))
|
||||||
|
|||||||
@@ -32,6 +32,7 @@ from django.db.models import Count
|
|||||||
from django.db.models import IntegerField
|
from django.db.models import IntegerField
|
||||||
from django.db.models import Max
|
from django.db.models import Max
|
||||||
from django.db.models import Model
|
from django.db.models import Model
|
||||||
|
from django.db.models import Q
|
||||||
from django.db.models import Sum
|
from django.db.models import Sum
|
||||||
from django.db.models import When
|
from django.db.models import When
|
||||||
from django.db.models.functions import Length
|
from django.db.models.functions import Length
|
||||||
@@ -127,7 +128,6 @@ from documents.matching import match_storage_paths
|
|||||||
from documents.matching import match_tags
|
from documents.matching import match_tags
|
||||||
from documents.models import Correspondent
|
from documents.models import Correspondent
|
||||||
from documents.models import CustomField
|
from documents.models import CustomField
|
||||||
from documents.models import CustomFieldInstance
|
|
||||||
from documents.models import Document
|
from documents.models import Document
|
||||||
from documents.models import DocumentType
|
from documents.models import DocumentType
|
||||||
from documents.models import Note
|
from documents.models import Note
|
||||||
@@ -147,7 +147,6 @@ from documents.permissions import PaperlessAdminPermissions
|
|||||||
from documents.permissions import PaperlessNotePermissions
|
from documents.permissions import PaperlessNotePermissions
|
||||||
from documents.permissions import PaperlessObjectPermissions
|
from documents.permissions import PaperlessObjectPermissions
|
||||||
from documents.permissions import ViewDocumentsPermissions
|
from documents.permissions import ViewDocumentsPermissions
|
||||||
from documents.permissions import annotate_document_count_for_related_queryset
|
|
||||||
from documents.permissions import get_document_count_filter_for_user
|
from documents.permissions import get_document_count_filter_for_user
|
||||||
from documents.permissions import get_objects_for_user_owner_aware
|
from documents.permissions import get_objects_for_user_owner_aware
|
||||||
from documents.permissions import has_perms_owner_aware
|
from documents.permissions import has_perms_owner_aware
|
||||||
@@ -371,37 +370,22 @@ class PermissionsAwareDocumentCountMixin(BulkPermissionMixin, PassUserMixin):
|
|||||||
Mixin to add document count to queryset, permissions-aware if needed
|
Mixin to add document count to queryset, permissions-aware if needed
|
||||||
"""
|
"""
|
||||||
|
|
||||||
# Default is simple relation path, override for through-table/count specialization.
|
|
||||||
document_count_through = None
|
|
||||||
document_count_source_field = None
|
|
||||||
|
|
||||||
def get_document_count_filter(self):
|
def get_document_count_filter(self):
|
||||||
request = getattr(self, "request", None)
|
request = getattr(self, "request", None)
|
||||||
user = getattr(request, "user", None) if request else None
|
user = getattr(request, "user", None) if request else None
|
||||||
return get_document_count_filter_for_user(user)
|
return get_document_count_filter_for_user(user)
|
||||||
|
|
||||||
def get_queryset(self):
|
def get_queryset(self):
|
||||||
base_qs = super().get_queryset()
|
|
||||||
|
|
||||||
# Use optimized through-table counting when configured.
|
|
||||||
if self.document_count_through:
|
|
||||||
user = getattr(getattr(self, "request", None), "user", None)
|
|
||||||
return annotate_document_count_for_related_queryset(
|
|
||||||
base_qs,
|
|
||||||
through_model=self.document_count_through,
|
|
||||||
source_field=self.document_count_source_field,
|
|
||||||
user=user,
|
|
||||||
)
|
|
||||||
|
|
||||||
# Fallback: simple Count on relation with permission filter.
|
|
||||||
filter = self.get_document_count_filter()
|
filter = self.get_document_count_filter()
|
||||||
return base_qs.annotate(
|
return (
|
||||||
document_count=Count("documents", filter=filter),
|
super()
|
||||||
|
.get_queryset()
|
||||||
|
.annotate(document_count=Count("documents", filter=filter))
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@extend_schema_view(**generate_object_with_permissions_schema(CorrespondentSerializer))
|
@extend_schema_view(**generate_object_with_permissions_schema(CorrespondentSerializer))
|
||||||
class CorrespondentViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
class CorrespondentViewSet(ModelViewSet, PermissionsAwareDocumentCountMixin):
|
||||||
model = Correspondent
|
model = Correspondent
|
||||||
|
|
||||||
queryset = Correspondent.objects.select_related("owner").order_by(Lower("name"))
|
queryset = Correspondent.objects.select_related("owner").order_by(Lower("name"))
|
||||||
@@ -438,10 +422,8 @@ class CorrespondentViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
|||||||
|
|
||||||
|
|
||||||
@extend_schema_view(**generate_object_with_permissions_schema(TagSerializer))
|
@extend_schema_view(**generate_object_with_permissions_schema(TagSerializer))
|
||||||
class TagViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
class TagViewSet(ModelViewSet, PermissionsAwareDocumentCountMixin):
|
||||||
model = Tag
|
model = Tag
|
||||||
document_count_through = Document.tags.through
|
|
||||||
document_count_source_field = "tag_id"
|
|
||||||
|
|
||||||
queryset = Tag.objects.select_related("owner").order_by(
|
queryset = Tag.objects.select_related("owner").order_by(
|
||||||
Lower("name"),
|
Lower("name"),
|
||||||
@@ -484,16 +466,12 @@ class TagViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
|||||||
descendant_pks = {pk for tag in all_tags for pk in tag.get_descendants_pks()}
|
descendant_pks = {pk for tag in all_tags for pk in tag.get_descendants_pks()}
|
||||||
|
|
||||||
if descendant_pks:
|
if descendant_pks:
|
||||||
user = getattr(getattr(self, "request", None), "user", None)
|
filter_q = self.get_document_count_filter()
|
||||||
children_source = list(
|
children_source = list(
|
||||||
annotate_document_count_for_related_queryset(
|
|
||||||
Tag.objects.filter(pk__in=descendant_pks | {t.pk for t in all_tags})
|
Tag.objects.filter(pk__in=descendant_pks | {t.pk for t in all_tags})
|
||||||
.select_related("owner")
|
.select_related("owner")
|
||||||
|
.annotate(document_count=Count("documents", filter=filter_q))
|
||||||
.order_by(*ordering),
|
.order_by(*ordering),
|
||||||
through_model=self.document_count_through,
|
|
||||||
source_field=self.document_count_source_field,
|
|
||||||
user=user,
|
|
||||||
),
|
|
||||||
)
|
)
|
||||||
else:
|
else:
|
||||||
children_source = all_tags
|
children_source = all_tags
|
||||||
@@ -520,7 +498,7 @@ class TagViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
|||||||
|
|
||||||
|
|
||||||
@extend_schema_view(**generate_object_with_permissions_schema(DocumentTypeSerializer))
|
@extend_schema_view(**generate_object_with_permissions_schema(DocumentTypeSerializer))
|
||||||
class DocumentTypeViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
class DocumentTypeViewSet(ModelViewSet, PermissionsAwareDocumentCountMixin):
|
||||||
model = DocumentType
|
model = DocumentType
|
||||||
|
|
||||||
queryset = DocumentType.objects.select_related("owner").order_by(Lower("name"))
|
queryset = DocumentType.objects.select_related("owner").order_by(Lower("name"))
|
||||||
@@ -1725,6 +1703,8 @@ class PostDocumentView(GenericAPIView):
|
|||||||
parser_classes = (parsers.MultiPartParser,)
|
parser_classes = (parsers.MultiPartParser,)
|
||||||
|
|
||||||
def post(self, request, *args, **kwargs):
|
def post(self, request, *args, **kwargs):
|
||||||
|
if not request.user.has_perm("documents.add_document"):
|
||||||
|
return HttpResponseForbidden("Insufficient permissions")
|
||||||
serializer = self.get_serializer(data=request.data)
|
serializer = self.get_serializer(data=request.data)
|
||||||
serializer.is_valid(raise_exception=True)
|
serializer.is_valid(raise_exception=True)
|
||||||
|
|
||||||
@@ -2364,7 +2344,7 @@ class BulkDownloadView(GenericAPIView):
|
|||||||
|
|
||||||
|
|
||||||
@extend_schema_view(**generate_object_with_permissions_schema(StoragePathSerializer))
|
@extend_schema_view(**generate_object_with_permissions_schema(StoragePathSerializer))
|
||||||
class StoragePathViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
class StoragePathViewSet(ModelViewSet, PermissionsAwareDocumentCountMixin):
|
||||||
model = StoragePath
|
model = StoragePath
|
||||||
|
|
||||||
queryset = StoragePath.objects.select_related("owner").order_by(
|
queryset = StoragePath.objects.select_related("owner").order_by(
|
||||||
@@ -2881,7 +2861,7 @@ class WorkflowViewSet(ModelViewSet):
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
class CustomFieldViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
class CustomFieldViewSet(ModelViewSet):
|
||||||
permission_classes = (IsAuthenticated, PaperlessObjectPermissions)
|
permission_classes = (IsAuthenticated, PaperlessObjectPermissions)
|
||||||
|
|
||||||
serializer_class = CustomFieldSerializer
|
serializer_class = CustomFieldSerializer
|
||||||
@@ -2893,11 +2873,35 @@ class CustomFieldViewSet(PermissionsAwareDocumentCountMixin, ModelViewSet):
|
|||||||
filterset_class = CustomFieldFilterSet
|
filterset_class = CustomFieldFilterSet
|
||||||
|
|
||||||
model = CustomField
|
model = CustomField
|
||||||
document_count_through = CustomFieldInstance
|
|
||||||
document_count_source_field = "field_id"
|
|
||||||
|
|
||||||
queryset = CustomField.objects.all().order_by("-created")
|
queryset = CustomField.objects.all().order_by("-created")
|
||||||
|
|
||||||
|
def get_queryset(self):
|
||||||
|
filter = (
|
||||||
|
Q(fields__document__deleted_at__isnull=True)
|
||||||
|
if self.request.user is None or self.request.user.is_superuser
|
||||||
|
else (
|
||||||
|
Q(
|
||||||
|
fields__document__deleted_at__isnull=True,
|
||||||
|
fields__document__id__in=get_objects_for_user_owner_aware(
|
||||||
|
self.request.user,
|
||||||
|
"documents.view_document",
|
||||||
|
Document,
|
||||||
|
).values_list("id", flat=True),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return (
|
||||||
|
super()
|
||||||
|
.get_queryset()
|
||||||
|
.annotate(
|
||||||
|
document_count=Count(
|
||||||
|
"fields",
|
||||||
|
filter=filter,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
@extend_schema_view(
|
@extend_schema_view(
|
||||||
get=extend_schema(
|
get=extend_schema(
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
from typing import Final
|
from typing import Final
|
||||||
|
|
||||||
__version__: Final[tuple[int, int, int]] = (2, 20, 5)
|
__version__: Final[tuple[int, int, int]] = (2, 20, 6)
|
||||||
# Version string like X.Y.Z
|
# Version string like X.Y.Z
|
||||||
__full_version_str__: Final[str] = ".".join(map(str, __version__))
|
__full_version_str__: Final[str] = ".".join(map(str, __version__))
|
||||||
# Version string like X.Y
|
# Version string like X.Y
|
||||||
|
|||||||
2
uv.lock
generated
2
uv.lock
generated
@@ -2115,7 +2115,7 @@ wheels = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "paperless-ngx"
|
name = "paperless-ngx"
|
||||||
version = "2.20.5"
|
version = "2.20.6"
|
||||||
source = { virtual = "." }
|
source = { virtual = "." }
|
||||||
dependencies = [
|
dependencies = [
|
||||||
{ name = "babel", marker = "sys_platform == 'darwin' or sys_platform == 'linux'" },
|
{ name = "babel", marker = "sys_platform == 'darwin' or sys_platform == 'linux'" },
|
||||||
|
|||||||
Reference in New Issue
Block a user