# # Copyright (c) 2011 Helmut Merz helmutm@cy55.de # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Common functions and other stuff for working with permissions and roles. $Id$ """ from persistent import Persistent from zope import component from zope.annotation.interfaces import IAttributeAnnotatable from zope.app.container.interfaces import IObjectAddedEvent from zope.app.security.settings import Allow, Deny, Unset from zope.cachedescriptors.property import Lazy from zope.interface import implements from zope.lifecycleevent import IObjectCreatedEvent, IObjectModifiedEvent from zope.security import canAccess, canWrite from zope.security import checkPermission as baseCheckPermission from zope.security.management import getInteraction from zope.securitypolicy.interfaces import IPrincipalRoleManager from zope.securitypolicy.interfaces import IRolePermissionManager from zope.traversing.api import getName from zope.traversing.interfaces import IPhysicallyLocatable from loops.common import adapted from loops.interfaces import ILoopsObject, IConcept from loops.interfaces import IAssignmentEvent, IDeassignmentEvent from loops.security.interfaces import ISecuritySetter, IWorkspaceInformation allRolesExceptOwner = ( #'zope.SiteManager' - no, not this one... 'zope.Anonymous', 'zope.Member', 'zope.ContentManager', 'loops.Staff', 'loops.xmlrpc.ConceptManager', # relevant for local security? #'loops.SiteManager', 'loops.Member', 'loops.Master',) allRolesExceptOwnerAndMaster = tuple(allRolesExceptOwner[:-1]) minorPrivilegedRoles = ('zope.Anonymous', 'zope.Member',) localRoles = ('zope.Anonymous', 'zope.Member', 'zope.ContentManager', 'loops.SiteManager', 'loops.Staff', 'loops.Member', 'loops.Master', 'loops.Owner') localPermissions = ('zope.ManageContent', 'zope.View', 'loops.ManageWorkspaces', 'loops.ViewRestricted', 'loops.EditRestricted', 'loops.AssignAsParent',) acquiringPredicateNames = ('hasType', 'standard', 'ownedby', 'ispartof') allocationPredicateNames = ('isowner', 'ismaster', 'ismember',) workspaceGroupsFolderName = 'gloops_ws' # checking and querying functions def canAccessObject(obj): return canAccess(obj, 'title') def canListObject(obj, noCheck=False): if noCheck: return True return canAccess(obj, 'title') def canWriteObject(obj): return canWrite(obj, 'title') def canEditRestricted(obj): return checkPermission('loops.EditRestricted', obj) def canAssignAsParent(obj): return checkPermission('loops.AssignAsParent', obj) def checkPermission(permission, obj): return baseCheckPermission(permission, obj) def getCurrentPrincipal(): interaction = getInteraction() if interaction is not None: parts = interaction.participations if parts: return parts[0].principal return None # functions for checking and setting security properties def overrides(s1, s2): settings = [Allow, Deny, Unset] return settings.index(s1) < settings.index(s2) def setRolePermission(rpm, p, r, setting): if setting == Allow: rpm.grantPermissionToRole(p, r) elif setting == Deny: rpm.denyPermissionToRole(p, r) else: rpm.unsetPermissionFromRole(p, r) def setPrincipalRole(prm, r, p, setting): if setting == Allow: prm.assignRoleToPrincipal(r, p) elif setting == Deny: prm.removeRoleFromPrincipal(r, p) else: prm.unsetRoleForPrincipal(r, p) def assignOwner(obj, principalId): prm = IPrincipalRoleManager(obj) prm.assignRoleToPrincipal('loops.Owner', principalId) def removeOwner(obj, principalId): prm = IPrincipalRoleManager(obj) prm.removeRoleFromPrincipal('loops.Owner', principalId) def allowEditingForOwner(obj, deny=allRolesExceptOwner, revert=False): rpm = IRolePermissionManager(obj) if revert: for role in deny: rpm.unsetPermissionFromRole('zope.ManageContent', role) rpm.unsetPermissionFromRole('zope.ManageContent', 'loops.Owner') else: for role in deny: rpm.denyPermissionToRole('zope.ManageContent', role) rpm.grantPermissionToRole('zope.ManageContent', 'loops.Owner') def restrictView(obj, roles=allRolesExceptOwnerAndMaster, revert=False): rpm = IRolePermissionManager(obj) if revert: for role in roles: rpm.unsetPermissionFromRole('zope.View', role) else: for role in roles: rpm.denyPermissionToRole('zope.View', role) # event handlers #@component.adapter(ILoopsObject, IObjectAddedEvent) #@component.adapter(ILoopsObject, IObjectModifiedEvent) @component.adapter(ILoopsObject, IObjectCreatedEvent) def setDefaultSecurity(obj, event): aObj = adapted(obj) setter = ISecuritySetter(aObj) setter.setDefaultSecurity() @component.adapter(IConcept, IAssignmentEvent) def grantAcquiredSecurity(obj, event): aObj = adapted(obj) setter = ISecuritySetter(aObj) setter.setAcquiredSecurity(event.relation) @component.adapter(IConcept, IDeassignmentEvent) def revokeAcquiredSecurity(obj, event): aObj = adapted(obj) setter = ISecuritySetter(aObj) setter.setAcquiredSecurity(event.relation, revert=True) # workspace handling class WorkspaceInformation(Persistent): """ For storing security-related stuff pertaining to children and resources of the context (=parent) object. """ implements(IPhysicallyLocatable, IWorkspaceInformation) __name__ = u'workspace_information' #propagateRolePermissions = 'object' # or 'none' propagateRolePermissions = 'workspace' propagateParentSecurity = True # False #propagateParentSecurity = False allocationPredicateNames = allocationPredicateNames workspaceGroupsFolderName = workspaceGroupsFolderName def __init__(self, parent): self.__parent__ = parent self.workspaceGroupNames = {} def getName(self): return self.__name__ def getParent(self): return self.__parent__ def getWorkspaceGroup(obj, predicate): wsi = obj.workspaceInformation if wsi is None: return None pn = getName(predicate) if pn in wsi.allocationPredicateNames: gn = wsi.workspaceGroupNames if not isinstance(gn, dict): # backwards compatibility return None groupName = gn.get(pn) if groupName: gfName = wsi.workspaceGroupsFolderName if gfName: from loops.organize.util import getGroupsFolder gf = getGroupsFolder(wsi, gfName) if gf is not None: return gf.get(groupName) return None @component.adapter(ILoopsObject, IAssignmentEvent) def addGroupMembershipOnAssignment(obj, event): group = getWorkspaceGroup(obj, event.relation.predicate) if group is not None: person = adapted(event.relation.second) from loops.organize.interfaces import IPerson if IPerson.providedBy(person): userId = person.getUserId() if userId: members = list(group.principals) if userId not in members: members.append(userId) group.principals = tuple(members) #print '*** assign', group.__name__, userId, group.principals @component.adapter(ILoopsObject, IDeassignmentEvent) def removeGroupMembershipOnDeassignment(obj, event): group = getWorkspaceGroup(obj, event.relation.predicate) if group is not None: person = adapted(event.relation.second) from loops.organize.interfaces import IPerson if IPerson.providedBy(person): userId = person.getUserId() if userId: members = list(group.principals) if userId in members: members.remove(userId) group.principals = tuple(members) #print '*** remove', group.__name__, userId, group.principals