# # Copyright (c) 2008 Helmut Merz helmutm@cy55.de # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Authentication view. $Id$ """ from zope import component from zope.interface import implements from zope.cachedescriptors.property import Lazy from zope.app.security.interfaces import IPermission from zope.app.securitypolicy.browser.granting import Granting from zope.app.securitypolicy.browser.rolepermissionview import RolePermissionView from zope.app.securitypolicy.interfaces import IPrincipalRoleManager, IRolePermissionMap from zope.app.securitypolicy.interfaces import IPrincipalPermissionManager, \ IPrincipalPermissionMap from zope.app.securitypolicy.zopepolicy import SettingAsBoolean from zope.security.proxy import removeSecurityProxy from zope.traversing.api import getParents class PermissionView(object): """ View for permission editing. """ def __init__(self, context, request): self.context = context # make sure the real view (delegate) updates our context when # talking about the context's parent: self.__parent__ = context self.request = request self.delegate = RolePermissionView() self.delegate.context = self self.delegate.request = request self.permissionId = request.get('permission_to_manage') or 'zope.View' def pagetip(self): return self.delegate.pagetip() def roles(self): return self.delegate.roles() def permissions(self): return self.delegate.permissions() def availableSettings(self, noacquire=False): return self.delegate.availableSettings(noacquire) def permissionRoles(self): return self.delegate.permissionRoles() def permissionForID(self, pid): return self.delegate.permissionForID(pid) @Lazy def permission(self): return self.permissionForID(self.permissionId) def roleForID(self, rid): return self.delegate.roleForID(rid) def update(self, testing=None): return self.delegate.update(testing) def getAcquiredPermissionSetting(self, role, perm): for obj in getParents(self.context): rpm = IRolePermissionMap(obj, None) if rpm is not None: setting = rpm.getSetting(perm, role) setting = SettingAsBoolean[setting] if setting is not None: return setting and '+' or '-' return '' def listUsersForRole(self, rid): result = '' direct = IPrincipalRoleManager(self.context).getPrincipalsForRole(rid) if direct: result = '' + self.renderEntry(direct) + '' acquired = [] for obj in getParents(self.context): prm = IPrincipalRoleManager(obj, None) if prm is not None: entry = prm.getPrincipalsForRole(rid) if entry: acquired.append(self.renderEntry(entry)) if acquired: if result: result += '
' result += '
'.join(acquired) return result def renderEntry(self, entry): result = [] for e in entry: value = SettingAsBoolean[e[1]] value = (value is False and '-') or (value and '+') or '' result.append(value + e[0]) return ', '.join(result) def getPrincipalPermissions(self): result = '' ppm = IPrincipalPermissionMap(self.context) direct = ppm.getPrincipalsForPermission(self.permissionId) if direct: result = '' + self.renderEntry(direct) + '' acquired = [] for obj in getParents(self.context): ppm = IPrincipalPermissionMap(obj, None) if ppm is not None: entry = ppm.getPrincipalsForPermission(self.permissionId) if entry: acquired.append(self.renderEntry(entry)) if acquired: if result: result += '
' result += '
'.join(acquired) return result def getPermissions(self): return sorted(name for name, perm in component.getUtilitiesFor(IPermission))