[14603] | 1 | # $Id: permissions.py 17860 2024-07-27 06:15:39Z henrik $ |
---|
| 2 | # |
---|
| 3 | # Copyright (C) 2011 Uli Fouquet & Henrik Bettermann |
---|
| 4 | # This program is free software; you can redistribute it and/or modify |
---|
| 5 | # it under the terms of the GNU General Public License as published by |
---|
| 6 | # the Free Software Foundation; either version 2 of the License, or |
---|
| 7 | # (at your option) any later version. |
---|
| 8 | # |
---|
| 9 | # This program is distributed in the hope that it will be useful, |
---|
| 10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
| 12 | # GNU General Public License for more details. |
---|
| 13 | # |
---|
| 14 | # You should have received a copy of the GNU General Public License |
---|
| 15 | # along with this program; if not, write to the Free Software |
---|
| 16 | # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
---|
| 17 | # |
---|
[3521] | 18 | import grok |
---|
[6157] | 19 | from zope.component import getUtilitiesFor |
---|
[6144] | 20 | from zope.interface import Interface |
---|
[6163] | 21 | from zope.securitypolicy.interfaces import IRole, IPrincipalRoleMap |
---|
[7811] | 22 | from waeup.kofa.interfaces import ILocalRolesAssignable |
---|
[3521] | 23 | |
---|
[14603] | 24 | |
---|
[4789] | 25 | class Public(grok.Permission): |
---|
[12844] | 26 | """The Public or everyone-can-do-this-permission is being applied |
---|
| 27 | to views/pages that are used by everyone. |
---|
[4789] | 28 | """ |
---|
| 29 | grok.name('waeup.Public') |
---|
[6142] | 30 | |
---|
[14603] | 31 | |
---|
[5433] | 32 | class Anonymous(grok.Permission): |
---|
[12843] | 33 | """The Anonymous permission is applied to |
---|
[12844] | 34 | views/pages which are dedicated to anonymous users only. |
---|
| 35 | Logged-in users can't access these views. |
---|
[5433] | 36 | """ |
---|
[6142] | 37 | grok.name('waeup.Anonymous') |
---|
[4789] | 38 | |
---|
[14603] | 39 | |
---|
[7184] | 40 | class Authenticated(grok.Permission): |
---|
[12843] | 41 | """The Authenticated permission is applied to pages |
---|
[12835] | 42 | which can only be used by logged-in users and not by anonymous users. |
---|
[7184] | 43 | """ |
---|
| 44 | grok.name('waeup.Authenticated') |
---|
[4789] | 45 | |
---|
[14603] | 46 | |
---|
[12835] | 47 | class ViewAcademics(grok.Permission): |
---|
[12843] | 48 | """The ViewAcademics permission is applied to all |
---|
[12835] | 49 | views of the Academic Section. Users with this permission can view but |
---|
| 50 | not edit content in the Academic Section. |
---|
| 51 | """ |
---|
[7184] | 52 | grok.name('waeup.viewAcademics') |
---|
| 53 | |
---|
[14603] | 54 | |
---|
[12835] | 55 | class ManageAcademics(grok.Permission): |
---|
[12844] | 56 | """The ManageAcademics permission is applied to all edit/manage |
---|
[12835] | 57 | pages in the Academic Section. Users who have this permission |
---|
| 58 | can change/edit context objects. |
---|
| 59 | """ |
---|
[8367] | 60 | grok.name('waeup.manageAcademics') |
---|
[4789] | 61 | |
---|
[14603] | 62 | |
---|
[8367] | 63 | class ManagePortal(grok.Permission): |
---|
[12843] | 64 | """The ManagePortal permission is used for very few pages |
---|
[14603] | 65 | (e.g. the DatacenterSettings page). Only PortalManagers have this |
---|
[12844] | 66 | permission. It is furthermore used to control delete methods of container |
---|
[12843] | 67 | pages in the Academic Section. The ManageAcademics permission, |
---|
[12835] | 68 | described above, does enable users to edit content but not to |
---|
| 69 | remove sub-containers, like faculties, departments or certificates. |
---|
[12843] | 70 | Users must have the ManagePortal permission too to remove |
---|
[12835] | 71 | entire containers. |
---|
| 72 | """ |
---|
[8367] | 73 | grok.name('waeup.managePortal') |
---|
| 74 | |
---|
[14603] | 75 | |
---|
[4789] | 76 | class ManageUsers(grok.Permission): |
---|
[12843] | 77 | """The ManageUsers permission is a real superuser permission |
---|
[12835] | 78 | and therefore very 'dangerous'. It allows to add, remove or edit |
---|
| 79 | user accounts. Editing a user account includes the option to assign |
---|
| 80 | or remove roles. That means that a user with this permission can lock out |
---|
[14603] | 81 | other users by either removing their account or by removing |
---|
[12844] | 82 | permissions. |
---|
[12835] | 83 | """ |
---|
[4789] | 84 | grok.name('waeup.manageUsers') |
---|
[6142] | 85 | |
---|
[14603] | 86 | |
---|
[7205] | 87 | class ShowStudents(grok.Permission): |
---|
[12843] | 88 | """Users with this permission do not neccessarily see the 'Students' tab |
---|
| 89 | but they can search for students at department, certificate or course |
---|
| 90 | level. If they additionally have the ExportData permission they can |
---|
| 91 | export the data as csv files. |
---|
[12835] | 92 | |
---|
[12844] | 93 | Bursary or Department Officers don't have the ExportData |
---|
[12835] | 94 | permission (see Roles section) and are only allowed to export bursary |
---|
| 95 | or payments overview data respectively. |
---|
| 96 | """ |
---|
[7205] | 97 | grok.name('waeup.showStudents') |
---|
| 98 | |
---|
[14603] | 99 | |
---|
[11862] | 100 | class ClearAllStudents(grok.Permission): |
---|
[12843] | 101 | """The ClearAllStudents permission allows to clear all students |
---|
[12844] | 102 | in a department at one sweep. |
---|
[12835] | 103 | """ |
---|
[11862] | 104 | grok.name('waeup.clearAllStudents') |
---|
| 105 | |
---|
[14603] | 106 | |
---|
[10632] | 107 | class EditScores(grok.Permission): |
---|
[12843] | 108 | """The EditScores permission allows to edit scores in course tickets. |
---|
[12835] | 109 | """ |
---|
[10632] | 110 | grok.name('waeup.editScores') |
---|
| 111 | |
---|
[14603] | 112 | |
---|
[12843] | 113 | class TriggerTransition(grok.Permission): |
---|
| 114 | """The TriggerTransition permission allows to trigger workflow transitions |
---|
| 115 | of student and document objects. |
---|
| 116 | """ |
---|
| 117 | grok.name('waeup.triggerTransition') |
---|
| 118 | |
---|
[14603] | 119 | |
---|
[7163] | 120 | class EditUser(grok.Permission): |
---|
[12843] | 121 | """The EditUser permission is required for editing |
---|
[12835] | 122 | single user accounts. |
---|
| 123 | """ |
---|
[7163] | 124 | grok.name('waeup.editUser') |
---|
| 125 | |
---|
[14603] | 126 | |
---|
[6127] | 127 | class ManageDataCenter(grok.Permission): |
---|
[12843] | 128 | """The ManageDataCenter permission allows to access all pages |
---|
[12844] | 129 | in the Data Center and to upload files. It does not automatically |
---|
[12847] | 130 | allow to process uploaded data files. |
---|
[12835] | 131 | """ |
---|
[6127] | 132 | grok.name('waeup.manageDataCenter') |
---|
[6142] | 133 | |
---|
[14603] | 134 | |
---|
[8367] | 135 | class ImportData(grok.Permission): |
---|
[14603] | 136 | """The ImportData permission allows to batch process (import) any kind of |
---|
[12847] | 137 | portal data except for user data. The User Data processor |
---|
[12844] | 138 | requires also the ManageUsers permission. |
---|
[12835] | 139 | """ |
---|
[8367] | 140 | grok.name('waeup.importData') |
---|
| 141 | |
---|
[14603] | 142 | |
---|
[10177] | 143 | class ExportData(grok.Permission): |
---|
[12844] | 144 | """The ExportData permission allows to export any kind of portal data. |
---|
[12835] | 145 | """ |
---|
[10177] | 146 | grok.name('waeup.exportData') |
---|
| 147 | |
---|
[14603] | 148 | |
---|
[10279] | 149 | class ExportPaymentsOverview(grok.Permission): |
---|
[15277] | 150 | """Department Officers don't have the general exportData |
---|
| 151 | permission and are only allowed to export payments overviews. |
---|
| 152 | The ExportPaymentsOverview permission is only used to filter the |
---|
| 153 | respective exporters in the ExportJobContainerJobConfig view. |
---|
| 154 | """ |
---|
[10279] | 155 | grok.name('waeup.exportPaymentsOverview') |
---|
| 156 | |
---|
[14603] | 157 | |
---|
[10279] | 158 | class ExportBursaryData(grok.Permission): |
---|
[15277] | 159 | """Bursary Officers don't have the general exportData |
---|
| 160 | permission and are only allowed to export bursary data. |
---|
| 161 | The ExportBursaryData permission is only used to filter the |
---|
| 162 | respective exporter in the ExportJobContainerJobConfig view. |
---|
| 163 | """ |
---|
[10279] | 164 | grok.name('waeup.exportBursaryData') |
---|
| 165 | |
---|
[14603] | 166 | |
---|
[6907] | 167 | class ManagePortalConfiguration(grok.Permission): |
---|
[12843] | 168 | """The ManagePortalConfiguration permission allows to |
---|
[12835] | 169 | edit global and sessional portal configuration data. |
---|
| 170 | """ |
---|
[6907] | 171 | grok.name('waeup.managePortalConfiguration') |
---|
[6155] | 172 | |
---|
[14603] | 173 | |
---|
[7181] | 174 | class ManageACBatches(grok.Permission): |
---|
[12843] | 175 | """The ManageACBatches permission allows to view and |
---|
[12835] | 176 | manage accesscodes. |
---|
| 177 | """ |
---|
[7181] | 178 | grok.name('waeup.manageACBatches') |
---|
| 179 | |
---|
[14603] | 180 | |
---|
[11673] | 181 | class PutBiometricDataPermission(grok.Permission): |
---|
[12835] | 182 | """This permission allows to upload/change biometric data. |
---|
[11673] | 183 | """ |
---|
| 184 | grok.name('waeup.putBiometricData') |
---|
| 185 | |
---|
[14603] | 186 | |
---|
[11665] | 187 | class GetBiometricDataPermission(grok.Permission): |
---|
[12835] | 188 | """This permission allows to read biometric data. |
---|
[11665] | 189 | """ |
---|
| 190 | grok.name('waeup.getBiometricData') |
---|
| 191 | |
---|
| 192 | |
---|
[6125] | 193 | # Local Roles |
---|
[12847] | 194 | |
---|
[10226] | 195 | class ApplicationsManager(grok.Role): |
---|
[13570] | 196 | """The local ApplicationsManager role can be assigned at applicants |
---|
[14603] | 197 | container and at department level. At department level an Applications |
---|
| 198 | Manager can manage all applicants which desire to study a programme |
---|
[13570] | 199 | offered by the department (1st Choice Course of Study). |
---|
| 200 | |
---|
[14603] | 201 | At container level (local) Applications Managers gain permissions which |
---|
| 202 | allow to manage the container and all applicants inside the container. At |
---|
| 203 | container level the permission set of this local role corresonds with the |
---|
| 204 | permission set of the same-named global role. |
---|
[12843] | 205 | """ |
---|
[10226] | 206 | grok.name('waeup.local.ApplicationsManager') |
---|
| 207 | grok.title(u'Applications Manager') |
---|
[13570] | 208 | grok.permissions('waeup.viewAcademics', |
---|
| 209 | 'waeup.manageApplication', 'waeup.viewApplication', |
---|
| 210 | 'waeup.payApplicant') |
---|
[10226] | 211 | |
---|
[14603] | 212 | |
---|
[14992] | 213 | class DepartmentOfficer(grok.Role): |
---|
| 214 | """The local DepartmentOfficer role can be assigned at faculty or |
---|
| 215 | department level. The role allows to list all student data within the |
---|
[15277] | 216 | faculty/department the local role is assigned. And it allows to export |
---|
| 217 | payment data overviews. |
---|
[14992] | 218 | """ |
---|
| 219 | grok.name('waeup.local.DepartmentOfficer') |
---|
| 220 | grok.title(u'Department Officer') |
---|
| 221 | grok.permissions('waeup.showStudents', |
---|
| 222 | 'waeup.viewAcademics', |
---|
| 223 | 'waeup.exportPaymentsOverview') |
---|
| 224 | |
---|
| 225 | |
---|
[7185] | 226 | class DepartmentManager(grok.Role): |
---|
[12847] | 227 | """The local DepartmentManager role can be assigned at faculty or |
---|
| 228 | department level. The role allows to edit all data within this container. |
---|
| 229 | It does not automatically allow to remove sub-containers. |
---|
| 230 | |
---|
| 231 | Department Managers (Dean of Faculty or Head of Department respectively) |
---|
| 232 | can also list student data but not access student pages. |
---|
[12843] | 233 | """ |
---|
[7185] | 234 | grok.name('waeup.local.DepartmentManager') |
---|
| 235 | grok.title(u'Department Manager') |
---|
[10248] | 236 | grok.permissions('waeup.manageAcademics', |
---|
| 237 | 'waeup.showStudents', |
---|
| 238 | 'waeup.exportData') |
---|
[6142] | 239 | |
---|
[14603] | 240 | |
---|
[6655] | 241 | class ClearanceOfficer(grok.Role): |
---|
[12847] | 242 | """The local ClearanceOfficer role can be assigned at faculty or |
---|
| 243 | department level. The role allows to list or export all student |
---|
| 244 | data within the faculty/department the local role is assigned. |
---|
| 245 | |
---|
| 246 | Clearance Officers can furthermore clear all students or reject clearance |
---|
| 247 | of all students in their faculty/department. They get the |
---|
| 248 | StudentsClearanceOfficer role for this subset of students. |
---|
[7168] | 249 | """ |
---|
[6655] | 250 | grok.name('waeup.local.ClearanceOfficer') |
---|
| 251 | grok.title(u'Clearance Officer') |
---|
[10248] | 252 | grok.permissions('waeup.showStudents', |
---|
| 253 | 'waeup.viewAcademics', |
---|
[11862] | 254 | 'waeup.exportData', |
---|
| 255 | 'waeup.clearAllStudents') |
---|
[6655] | 256 | |
---|
[14603] | 257 | |
---|
[10639] | 258 | class LocalStudentsManager(grok.Role): |
---|
[12847] | 259 | """The local LocalStudentsManager role can be assigned at faculty or |
---|
| 260 | department level. The role allows to view all data and to view or export |
---|
| 261 | all student data within the faculty/department the local role is assigned. |
---|
| 262 | |
---|
| 263 | Local Students Managers can furthermore manage data of students |
---|
| 264 | in their faculty/department. They get the StudentsManager role for |
---|
| 265 | this subset of students. |
---|
[10639] | 266 | """ |
---|
| 267 | grok.name('waeup.local.LocalStudentsManager') |
---|
| 268 | grok.title(u'Students Manager') |
---|
| 269 | grok.permissions('waeup.showStudents', |
---|
| 270 | 'waeup.viewAcademics', |
---|
| 271 | 'waeup.exportData') |
---|
| 272 | |
---|
[14603] | 273 | |
---|
[10639] | 274 | class LocalWorkflowManager(grok.Role): |
---|
[12847] | 275 | """The local LocalWorkflowManager role can be assigned at faculty level. |
---|
| 276 | The role allows to view all data and to list or export |
---|
| 277 | all student data within the faculty the local role is assigned. |
---|
| 278 | |
---|
| 279 | Local Workflow Managers can trigger transition of students in their |
---|
| 280 | faculty/department. They get the WorkflowManager role for |
---|
| 281 | this subset of students. |
---|
[10639] | 282 | """ |
---|
| 283 | grok.name('waeup.local.LocalWorkflowManager') |
---|
| 284 | grok.title(u'Student Workflow Manager') |
---|
| 285 | grok.permissions('waeup.showStudents', |
---|
| 286 | 'waeup.viewAcademics', |
---|
| 287 | 'waeup.exportData') |
---|
| 288 | |
---|
[15968] | 289 | class LocalReportsOfficer(grok.Role): |
---|
| 290 | """The local ReportsOfficer role can be assigned at department level. |
---|
| 291 | The role allows to view all data and to list or export |
---|
| 292 | all student data within the department the local role is assigned. |
---|
[14603] | 293 | |
---|
[15968] | 294 | The LocalReportsOfficer requires the assignment of the global |
---|
| 295 | ReportsOfficer role to access the reports section. If set, it reduces |
---|
[15970] | 296 | the number of available report generators and selectable certificates. |
---|
| 297 | Local Reports Officers can create only reports for their department. |
---|
[15968] | 298 | """ |
---|
| 299 | grok.name('waeup.local.ReportsOfficer') |
---|
| 300 | grok.title(u'Student Reports Officer') |
---|
| 301 | grok.permissions('waeup.showStudents', |
---|
| 302 | 'waeup.viewAcademics', |
---|
| 303 | 'waeup.exportData') |
---|
| 304 | |
---|
[8962] | 305 | class UGClearanceOfficer(grok.Role): |
---|
[12847] | 306 | """UG Clearance Officers are regular Clearance Officers with restricted |
---|
| 307 | dynamic permission assignment. They can only access undergraduate |
---|
| 308 | students. |
---|
[8962] | 309 | """ |
---|
| 310 | grok.name('waeup.local.UGClearanceOfficer') |
---|
| 311 | grok.title(u'UG Clearance Officer') |
---|
[10248] | 312 | grok.permissions('waeup.showStudents', |
---|
| 313 | 'waeup.viewAcademics', |
---|
[11862] | 314 | 'waeup.exportData', |
---|
| 315 | 'waeup.clearAllStudents') |
---|
[8962] | 316 | |
---|
[14603] | 317 | |
---|
[8962] | 318 | class PGClearanceOfficer(grok.Role): |
---|
[12847] | 319 | """PG Clearance Officers are regular Clearance Officers with restricted |
---|
| 320 | dynamic permission assignment. They can only access postgraduate |
---|
| 321 | students. |
---|
[8962] | 322 | """ |
---|
| 323 | grok.name('waeup.local.PGClearanceOfficer') |
---|
| 324 | grok.title(u'PG Clearance Officer') |
---|
[10248] | 325 | grok.permissions('waeup.showStudents', |
---|
| 326 | 'waeup.viewAcademics', |
---|
[11862] | 327 | 'waeup.exportData', |
---|
| 328 | 'waeup.clearAllStudents') |
---|
[8962] | 329 | |
---|
[14603] | 330 | |
---|
[7334] | 331 | class CourseAdviser100(grok.Role): |
---|
[12847] | 332 | """The local CourseAdviser100 role can be assigned at faculty, |
---|
[14603] | 333 | department or certificate level. The role allows to view all data and |
---|
| 334 | to list or export all student data within the faculty, department |
---|
[12847] | 335 | or certificate the local role is assigned. |
---|
| 336 | |
---|
| 337 | Local Course Advisers can validate or reject course lists of students |
---|
| 338 | in ther faculty/department/certificate at level 100. |
---|
| 339 | They get the StudentsCourseAdviser role for this subset of students. |
---|
[7168] | 340 | """ |
---|
[7334] | 341 | grok.name('waeup.local.CourseAdviser100') |
---|
| 342 | grok.title(u'Course Adviser 100L') |
---|
[10248] | 343 | grok.permissions('waeup.showStudents', |
---|
| 344 | 'waeup.viewAcademics', |
---|
| 345 | 'waeup.exportData') |
---|
[6655] | 346 | |
---|
[14603] | 347 | |
---|
[7334] | 348 | class CourseAdviser200(grok.Role): |
---|
[12847] | 349 | """Same as CourseAdviser100 but for level 200. |
---|
[7334] | 350 | """ |
---|
| 351 | grok.name('waeup.local.CourseAdviser200') |
---|
| 352 | grok.title(u'Course Adviser 200L') |
---|
[10248] | 353 | grok.permissions('waeup.showStudents', |
---|
| 354 | 'waeup.viewAcademics', |
---|
| 355 | 'waeup.exportData') |
---|
[7334] | 356 | |
---|
[14603] | 357 | |
---|
[7334] | 358 | class CourseAdviser300(grok.Role): |
---|
[12847] | 359 | """Same as CourseAdviser100 but for level 300. |
---|
[7334] | 360 | """ |
---|
| 361 | grok.name('waeup.local.CourseAdviser300') |
---|
| 362 | grok.title(u'Course Adviser 300L') |
---|
[10248] | 363 | grok.permissions('waeup.showStudents', |
---|
| 364 | 'waeup.viewAcademics', |
---|
| 365 | 'waeup.exportData') |
---|
[7334] | 366 | |
---|
[14603] | 367 | |
---|
[7334] | 368 | class CourseAdviser400(grok.Role): |
---|
[12847] | 369 | """Same as CourseAdviser100 but for level 400. |
---|
[7334] | 370 | """ |
---|
| 371 | grok.name('waeup.local.CourseAdviser400') |
---|
| 372 | grok.title(u'Course Adviser 400L') |
---|
[10248] | 373 | grok.permissions('waeup.showStudents', |
---|
| 374 | 'waeup.viewAcademics', |
---|
| 375 | 'waeup.exportData') |
---|
[7334] | 376 | |
---|
[14603] | 377 | |
---|
[7334] | 378 | class CourseAdviser500(grok.Role): |
---|
[12847] | 379 | """Same as CourseAdviser100 but for level 500. |
---|
[7334] | 380 | """ |
---|
| 381 | grok.name('waeup.local.CourseAdviser500') |
---|
| 382 | grok.title(u'Course Adviser 500L') |
---|
[10248] | 383 | grok.permissions('waeup.showStudents', |
---|
| 384 | 'waeup.viewAcademics', |
---|
| 385 | 'waeup.exportData') |
---|
[7334] | 386 | |
---|
[14603] | 387 | |
---|
[7334] | 388 | class CourseAdviser600(grok.Role): |
---|
[12847] | 389 | """Same as CourseAdviser100 but for level 600. |
---|
[7334] | 390 | """ |
---|
| 391 | grok.name('waeup.local.CourseAdviser600') |
---|
| 392 | grok.title(u'Course Adviser 600L') |
---|
[10248] | 393 | grok.permissions('waeup.showStudents', |
---|
| 394 | 'waeup.viewAcademics', |
---|
| 395 | 'waeup.exportData') |
---|
[7334] | 396 | |
---|
[14603] | 397 | |
---|
[10064] | 398 | class CourseAdviser700(grok.Role): |
---|
[12847] | 399 | """Same as CourseAdviser100 but for level 700. |
---|
[10064] | 400 | """ |
---|
| 401 | grok.name('waeup.local.CourseAdviser700') |
---|
| 402 | grok.title(u'Course Adviser 700L') |
---|
[10248] | 403 | grok.permissions('waeup.showStudents', |
---|
| 404 | 'waeup.viewAcademics', |
---|
| 405 | 'waeup.exportData') |
---|
[10064] | 406 | |
---|
[14603] | 407 | |
---|
[10064] | 408 | class CourseAdviser800(grok.Role): |
---|
[12847] | 409 | """Same as CourseAdviser100 but for level 800. |
---|
[10064] | 410 | """ |
---|
| 411 | grok.name('waeup.local.CourseAdviser800') |
---|
| 412 | grok.title(u'Course Adviser 800L') |
---|
[10248] | 413 | grok.permissions('waeup.showStudents', |
---|
| 414 | 'waeup.viewAcademics', |
---|
| 415 | 'waeup.exportData') |
---|
[10064] | 416 | |
---|
[14603] | 417 | |
---|
[15163] | 418 | class LocalTranscriptOfficer(grok.Role): |
---|
| 419 | """The LocalTranscriptOfficer role can be assigned at faculty |
---|
| 420 | level. The role allows to view, to validate and to |
---|
| 421 | release student transcripts at faculty level. |
---|
| 422 | Local Transcript Officers get the TranscriptOfficer role |
---|
| 423 | for this subset of students. |
---|
| 424 | """ |
---|
| 425 | grok.name('waeup.local.TranscriptOfficer') |
---|
| 426 | grok.title(u'Transcript Officer') |
---|
| 427 | grok.permissions('waeup.viewAcademics',) |
---|
| 428 | |
---|
| 429 | |
---|
| 430 | class LocalTranscriptSignee(grok.Role): |
---|
| 431 | """The LocalTranscriptSignee role can be assigned at faculty |
---|
| 432 | level. The role allows to view and to sign student transcripts |
---|
| 433 | at faculty level. Local Transcript Signees get the TranscriptSignee role |
---|
| 434 | for this subset of students. |
---|
| 435 | """ |
---|
| 436 | grok.name('waeup.local.TranscriptSignee') |
---|
| 437 | grok.title(u'Transcript Signee') |
---|
| 438 | grok.permissions('waeup.viewAcademics',) |
---|
| 439 | |
---|
| 440 | |
---|
[9002] | 441 | class Lecturer(grok.Role): |
---|
[12847] | 442 | """The local Lecturer role can be assigned at course level. |
---|
[13894] | 443 | The role allows to export some student |
---|
[13046] | 444 | data within the course the local role is assigned. Lecturers can't access |
---|
[12847] | 445 | student data directly but they can edit the scores in course tickets. |
---|
[9002] | 446 | """ |
---|
| 447 | grok.name('waeup.local.Lecturer') |
---|
| 448 | grok.title(u'Lecturer') |
---|
[13894] | 449 | grok.permissions('waeup.editScores', |
---|
[15422] | 450 | 'waeup.showStudents', |
---|
[10248] | 451 | 'waeup.viewAcademics', |
---|
| 452 | 'waeup.exportData') |
---|
[9002] | 453 | |
---|
[14603] | 454 | |
---|
[7163] | 455 | class Owner(grok.Role): |
---|
[12847] | 456 | """Each user 'owns' her/his user object and gains permission to edit |
---|
| 457 | some of the user attributes. |
---|
| 458 | """ |
---|
[7163] | 459 | grok.name('waeup.local.Owner') |
---|
| 460 | grok.title(u'Owner') |
---|
| 461 | grok.permissions('waeup.editUser') |
---|
| 462 | |
---|
[14603] | 463 | |
---|
[7178] | 464 | # Site Roles |
---|
[7185] | 465 | class AcademicsOfficer(grok.Role): |
---|
[12844] | 466 | """An Academics Officer can view but not edit data in the |
---|
[12862] | 467 | academic section. |
---|
[12843] | 468 | |
---|
| 469 | This is the default role which is automatically assigned to all |
---|
| 470 | officers of the portal. A user with this role can access all display pages |
---|
| 471 | at faculty, department, course, certificate and certificate course level. |
---|
| 472 | """ |
---|
[7185] | 473 | grok.name('waeup.AcademicsOfficer') |
---|
[7188] | 474 | grok.title(u'Academics Officer (view only)') |
---|
[7184] | 475 | grok.permissions('waeup.viewAcademics') |
---|
[3521] | 476 | |
---|
[14603] | 477 | |
---|
[8367] | 478 | class AcademicsManager(grok.Role): |
---|
[12843] | 479 | """An Academics Manager can view and edit all data in the |
---|
[12862] | 480 | scademic section, i.e. access all manage pages |
---|
[12843] | 481 | at faculty, department, course, certificate and certificate course level. |
---|
| 482 | """ |
---|
[8367] | 483 | grok.name('waeup.AcademicsManager') |
---|
| 484 | grok.title(u'Academics Manager') |
---|
[12835] | 485 | title = u'Academics Manager' |
---|
[8367] | 486 | grok.permissions('waeup.viewAcademics', |
---|
| 487 | 'waeup.manageAcademics') |
---|
| 488 | |
---|
[14603] | 489 | |
---|
[7181] | 490 | class ACManager(grok.Role): |
---|
[12843] | 491 | """This is the role for Access Code Managers. |
---|
[12847] | 492 | An AC Manager can view and manage the Accesscodes Section, see |
---|
[12844] | 493 | ManageACBatches permission above. |
---|
[12843] | 494 | """ |
---|
[7181] | 495 | grok.name('waeup.ACManager') |
---|
| 496 | grok.title(u'Access Code Manager') |
---|
| 497 | grok.permissions('waeup.manageACBatches') |
---|
| 498 | |
---|
[14603] | 499 | |
---|
[8367] | 500 | class DataCenterManager(grok.Role): |
---|
[12843] | 501 | """This single-permission role is dedicated to those users |
---|
| 502 | who are charged with batch processing of portal data. |
---|
[12847] | 503 | A Data Center Manager can access all pages in the Data Center, |
---|
[12844] | 504 | see ManageDataCenter permission above. |
---|
[12843] | 505 | """ |
---|
[8367] | 506 | grok.name('waeup.DataCenterManager') |
---|
| 507 | grok.title(u'Datacenter Manager') |
---|
| 508 | grok.permissions('waeup.manageDataCenter') |
---|
| 509 | |
---|
[14603] | 510 | |
---|
[8367] | 511 | class ImportManager(grok.Role): |
---|
[12847] | 512 | """An Import Manager is a Data Center Manager who is also allowed |
---|
[14603] | 513 | to batch process (import) data. All batch processors (importers) are |
---|
[12843] | 514 | available except for the User Processor. This processor requires the |
---|
[12847] | 515 | Users Manager role too. The ImportManager role includes the |
---|
[12844] | 516 | DataCenterManager role but not vice versa. |
---|
[12843] | 517 | """ |
---|
[8367] | 518 | grok.name('waeup.ImportManager') |
---|
| 519 | grok.title(u'Import Manager') |
---|
| 520 | grok.permissions('waeup.manageDataCenter', |
---|
| 521 | 'waeup.importData') |
---|
| 522 | |
---|
[14603] | 523 | |
---|
[10177] | 524 | class ExportManager(grok.Role): |
---|
[12847] | 525 | """An Export Manager is a Data Center Manager who is also allowed |
---|
[12843] | 526 | to export all kind of portal data. The ExportManager role includes the |
---|
[12844] | 527 | DataCenterManager role but not vice versa. |
---|
[12843] | 528 | """ |
---|
[10177] | 529 | grok.name('waeup.ExportManager') |
---|
| 530 | grok.title(u'Export Manager') |
---|
| 531 | grok.permissions('waeup.manageDataCenter', |
---|
[14734] | 532 | 'waeup.exportData', |
---|
| 533 | 'waeup.showStudents') |
---|
[10177] | 534 | |
---|
[14603] | 535 | |
---|
[10246] | 536 | class BursaryOfficer(grok.Role): |
---|
[15539] | 537 | """Bursary Officers can export bursary and payments data. They can't |
---|
| 538 | access the Data Center but see student data export buttons in the |
---|
[17850] | 539 | Academic Section. Meanwhile they can also view the application section |
---|
| 540 | and export application data. |
---|
[12843] | 541 | """ |
---|
[10246] | 542 | grok.name('waeup.BursaryOfficer') |
---|
| 543 | grok.title(u'Bursary Officer') |
---|
[10279] | 544 | grok.permissions('waeup.showStudents', |
---|
| 545 | 'waeup.viewAcademics', |
---|
[15501] | 546 | 'waeup.exportBursaryData', |
---|
[15539] | 547 | 'waeup.exportPaymentsOverview', |
---|
[17850] | 548 | 'waeup.viewApplicantsTab', |
---|
| 549 | 'waeup.viewApplication', |
---|
| 550 | 'waeup.exportApplication') |
---|
[10246] | 551 | |
---|
[14603] | 552 | |
---|
[8367] | 553 | class UsersManager(grok.Role): |
---|
[12847] | 554 | """A Users Manager can add, remove or edit |
---|
[12844] | 555 | user accounts, see ManageUsers permission for further information. |
---|
| 556 | Be very careful with this role. |
---|
[12843] | 557 | """ |
---|
[8367] | 558 | grok.name('waeup.UsersManager') |
---|
| 559 | grok.title(u'Users Manager') |
---|
[9259] | 560 | grok.permissions('waeup.manageUsers', |
---|
| 561 | 'waeup.editUser') |
---|
[8367] | 562 | |
---|
[14603] | 563 | |
---|
[9300] | 564 | class WorkflowManager(grok.Role): |
---|
[12847] | 565 | """The Workflow Manager can trigger workflow transitions |
---|
[12844] | 566 | of student and document objects, see TriggerTransition permission |
---|
| 567 | for further information. |
---|
[12843] | 568 | """ |
---|
[9300] | 569 | grok.name('waeup.WorkflowManager') |
---|
| 570 | grok.title(u'Workflow Manager') |
---|
[9299] | 571 | grok.permissions('waeup.triggerTransition') |
---|
| 572 | |
---|
[14602] | 573 | |
---|
| 574 | class FingerprintReaderDeviceRole(grok.Role): |
---|
| 575 | """Fingerprint Reader Devices. |
---|
| 576 | |
---|
| 577 | Fingerprint readers are remote devices that can store and retrieve |
---|
[14634] | 578 | fingerprint data. |
---|
[14602] | 579 | """ |
---|
| 580 | grok.name('waeup.FingerprintDevice') |
---|
| 581 | grok.title(u'Fingerprint Reader') |
---|
| 582 | grok.permissions( |
---|
[14633] | 583 | 'waeup.getBiometricData', |
---|
| 584 | 'waeup.putBiometricData', |
---|
| 585 | ) |
---|
[14602] | 586 | |
---|
| 587 | |
---|
[4789] | 588 | class PortalManager(grok.Role): |
---|
[12847] | 589 | """The PortalManager role is the maximum set of Kofa permissions |
---|
[12835] | 590 | which are needed to manage the entire portal. This set must not |
---|
[12844] | 591 | be customized. It is recommended to assign this role only |
---|
| 592 | to a few certified Kofa administrators. |
---|
| 593 | A less dangerous manager role is the CCOfficer role described below. |
---|
| 594 | For the most tasks the CCOfficer role is sufficient. |
---|
[12835] | 595 | """ |
---|
[4789] | 596 | grok.name('waeup.PortalManager') |
---|
[6159] | 597 | grok.title(u'Portal Manager') |
---|
[9259] | 598 | grok.permissions('waeup.managePortal', |
---|
| 599 | 'waeup.manageUsers', |
---|
[8374] | 600 | 'waeup.viewAcademics', 'waeup.manageAcademics', |
---|
[8367] | 601 | 'waeup.manageACBatches', |
---|
[9259] | 602 | 'waeup.manageDataCenter', |
---|
| 603 | 'waeup.importData', |
---|
[10177] | 604 | 'waeup.exportData', |
---|
[10278] | 605 | 'waeup.viewTranscript', |
---|
[16172] | 606 | 'waeup.downloadTranscript', |
---|
[15163] | 607 | 'waeup.processTranscript', |
---|
[12440] | 608 | 'waeup.viewDocuments', 'waeup.manageDocuments', |
---|
[14603] | 609 | 'waeup.managePortalConfiguration', |
---|
| 610 | 'waeup.viewApplication', |
---|
[7184] | 611 | 'waeup.manageApplication', 'waeup.handleApplication', |
---|
[7250] | 612 | 'waeup.viewApplicantsTab', 'waeup.payApplicant', |
---|
[8565] | 613 | 'waeup.viewApplicationStatistics', |
---|
[7250] | 614 | 'waeup.viewStudent', 'waeup.manageStudent', |
---|
| 615 | 'waeup.clearStudent', 'waeup.payStudent', |
---|
[14603] | 616 | 'waeup.clearStudentFinancially', # not used in base pkg |
---|
[7250] | 617 | 'waeup.uploadStudentFile', 'waeup.showStudents', |
---|
[14949] | 618 | 'waeup.clearAllStudents', |
---|
| 619 | 'waeup.createStudents', |
---|
[10632] | 620 | 'waeup.editScores', |
---|
[9273] | 621 | 'waeup.triggerTransition', |
---|
[14166] | 622 | 'waeup.validateStudent', |
---|
[12843] | 623 | 'waeup.viewStudentsContainer', |
---|
[9186] | 624 | 'waeup.handleAccommodation', |
---|
[7205] | 625 | 'waeup.viewHostels', 'waeup.manageHostels', |
---|
[9335] | 626 | 'waeup.editUser', |
---|
[9637] | 627 | 'waeup.loginAsStudent', |
---|
[12900] | 628 | 'waeup.handleReports', |
---|
[9637] | 629 | 'waeup.manageReports', |
---|
[9645] | 630 | 'waeup.manageJobs', |
---|
[17860] | 631 | 'waeup.exportApplication', |
---|
[7240] | 632 | ) |
---|
[4789] | 633 | |
---|
[14603] | 634 | |
---|
[9259] | 635 | class CCOfficer(grok.Role): |
---|
[12843] | 636 | """The role of the Computer Center Officer is basically a copy |
---|
[12835] | 637 | of the the PortalManager role. Some 'dangerous' permissions are excluded |
---|
| 638 | by commenting them out (see source code). If officers need to gain more |
---|
| 639 | access rights than defined in this role, do not hastily switch to the |
---|
[12843] | 640 | PortalManager role but add further manager roles instead. Additional |
---|
[12835] | 641 | roles could be: UsersManager, ACManager, ImportManager, WorkflowManager |
---|
| 642 | or StudentImpersonator. |
---|
[12843] | 643 | |
---|
[12844] | 644 | CCOfficer is a base class which means that this role is subject to |
---|
| 645 | customization. It is not used in the ``waeup.kofa`` base package. |
---|
[9259] | 646 | """ |
---|
[10346] | 647 | grok.baseclass() |
---|
[9259] | 648 | grok.name('waeup.CCOfficer') |
---|
| 649 | grok.title(u'Computer Center Officer') |
---|
[14603] | 650 | grok.permissions( |
---|
| 651 | # 'waeup.managePortal', |
---|
| 652 | # 'waeup.manageUsers', |
---|
| 653 | 'waeup.viewAcademics', |
---|
| 654 | 'waeup.manageAcademics', |
---|
| 655 | # 'waeup.manageACBatches', |
---|
| 656 | 'waeup.manageDataCenter', |
---|
| 657 | # 'waeup.importData', |
---|
| 658 | 'waeup.exportData', |
---|
| 659 | 'waeup.viewTranscript', |
---|
[16170] | 660 | 'waeup.downloadTranscript', |
---|
[15163] | 661 | 'waeup.processTranscript', |
---|
[14603] | 662 | 'waeup.viewDocuments', 'waeup.manageDocuments', |
---|
| 663 | 'waeup.managePortalConfiguration', 'waeup.viewApplication', |
---|
| 664 | 'waeup.manageApplication', 'waeup.handleApplication', |
---|
| 665 | 'waeup.viewApplicantsTab', 'waeup.payApplicant', |
---|
| 666 | 'waeup.viewApplicationStatistics', |
---|
| 667 | 'waeup.viewStudent', 'waeup.manageStudent', |
---|
| 668 | 'waeup.clearStudent', 'waeup.payStudent', |
---|
| 669 | 'waeup.uploadStudentFile', 'waeup.showStudents', |
---|
[14949] | 670 | 'waeup.clearAllStudents', |
---|
| 671 | # 'waeup.createStudents', |
---|
[14603] | 672 | 'waeup.editScores', |
---|
| 673 | # 'waeup.triggerTransition', |
---|
| 674 | 'waeup.validateStudent', |
---|
| 675 | 'waeup.viewStudentsContainer', |
---|
| 676 | 'waeup.handleAccommodation', |
---|
| 677 | 'waeup.viewHostels', 'waeup.manageHostels', |
---|
| 678 | # 'waeup.editUser', |
---|
| 679 | # 'waeup.loginAsStudent', |
---|
| 680 | 'waeup.handleReports', |
---|
| 681 | 'waeup.manageReports', |
---|
| 682 | # 'waeup.manageJobs', |
---|
[17860] | 683 | 'waeup.exportApplication', |
---|
[14603] | 684 | ) |
---|
[9259] | 685 | |
---|
[14603] | 686 | |
---|
[7186] | 687 | def get_all_roles(): |
---|
[6157] | 688 | """Return a list of tuples ``<ROLE-NAME>, <ROLE>``. |
---|
| 689 | """ |
---|
| 690 | return getUtilitiesFor(IRole) |
---|
| 691 | |
---|
[14603] | 692 | |
---|
[7186] | 693 | def get_waeup_roles(also_local=False): |
---|
[7819] | 694 | """Get all Kofa roles. |
---|
[6157] | 695 | |
---|
[7819] | 696 | Kofa roles are ordinary roles whose id by convention starts with |
---|
[6157] | 697 | a ``waeup.`` prefix. |
---|
| 698 | |
---|
| 699 | If `also_local` is ``True`` (``False`` by default), also local |
---|
[7819] | 700 | roles are returned. Local Kofa roles are such whose id starts |
---|
[6157] | 701 | with ``waeup.local.`` prefix (this is also a convention). |
---|
| 702 | |
---|
| 703 | Returns a generator of the found roles. |
---|
| 704 | """ |
---|
[7186] | 705 | for name, item in get_all_roles(): |
---|
[6157] | 706 | if not name.startswith('waeup.'): |
---|
[7819] | 707 | # Ignore non-Kofa roles... |
---|
[4789] | 708 | continue |
---|
[6157] | 709 | if not also_local and name.startswith('waeup.local.'): |
---|
| 710 | # Ignore local roles... |
---|
[6045] | 711 | continue |
---|
[6157] | 712 | yield item |
---|
[4789] | 713 | |
---|
[14603] | 714 | |
---|
[7186] | 715 | def get_waeup_role_names(): |
---|
[7819] | 716 | """Get the ids of all Kofa roles. |
---|
[6157] | 717 | |
---|
[7819] | 718 | See :func:`get_waeup_roles` for what a 'KofaRole' is. |
---|
[6157] | 719 | |
---|
[7819] | 720 | This function returns a sorted list of Kofa role names. |
---|
[6157] | 721 | """ |
---|
[7186] | 722 | return sorted([x.id for x in get_waeup_roles()]) |
---|
[6157] | 723 | |
---|
[14603] | 724 | |
---|
[6144] | 725 | class LocalRolesAssignable(grok.Adapter): |
---|
| 726 | """Default implementation for `ILocalRolesAssignable`. |
---|
| 727 | |
---|
| 728 | This adapter returns a list for dictionaries for objects for which |
---|
| 729 | we want to know the roles assignable to them locally. |
---|
| 730 | |
---|
| 731 | The returned dicts contain a ``name`` and a ``title`` entry which |
---|
| 732 | give a role (``name``) and a description, for which kind of users |
---|
| 733 | the permission is meant to be used (``title``). |
---|
| 734 | |
---|
| 735 | Having this adapter registered we make sure, that for each normal |
---|
| 736 | object we get a valid `ILocalRolesAssignable` adapter. |
---|
| 737 | |
---|
| 738 | Objects that want to offer certain local roles, can do so by |
---|
[6162] | 739 | setting a (preferably class-) attribute to a list of role ids. |
---|
[6144] | 740 | |
---|
| 741 | You can also define different adapters for different contexts to |
---|
| 742 | have different role lookup mechanisms become available. But in |
---|
| 743 | normal cases it should be sufficient to use this basic adapter. |
---|
| 744 | """ |
---|
| 745 | grok.context(Interface) |
---|
| 746 | grok.provides(ILocalRolesAssignable) |
---|
| 747 | |
---|
| 748 | _roles = [] |
---|
| 749 | |
---|
| 750 | def __init__(self, context): |
---|
| 751 | self.context = context |
---|
[6162] | 752 | role_ids = getattr(context, 'local_roles', self._roles) |
---|
[7186] | 753 | self._roles = [(name, role) for name, role in get_all_roles() |
---|
[6162] | 754 | if name in role_ids] |
---|
[6144] | 755 | return |
---|
| 756 | |
---|
| 757 | def __call__(self): |
---|
| 758 | """Get a list of dictionaries containing ``names`` (the roles to |
---|
| 759 | assign) and ``titles`` (some description of the type of user |
---|
| 760 | to assign each role to). |
---|
| 761 | """ |
---|
[7334] | 762 | list_of_dict = [dict( |
---|
[6162] | 763 | name=name, |
---|
| 764 | title=role.title, |
---|
[6163] | 765 | description=role.description) |
---|
[7334] | 766 | for name, role in self._roles] |
---|
| 767 | return sorted(list_of_dict, key=lambda x: x['name']) |
---|
[6144] | 768 | |
---|
[14603] | 769 | |
---|
[6163] | 770 | def get_users_with_local_roles(context): |
---|
| 771 | """Get a list of dicts representing the local roles set for `context`. |
---|
| 772 | |
---|
| 773 | Each dict returns `user_name`, `user_title`, `local_role`, |
---|
| 774 | `local_role_title`, and `setting` for each entry in the local |
---|
| 775 | roles map of the `context` object. |
---|
| 776 | """ |
---|
[6202] | 777 | try: |
---|
| 778 | role_map = IPrincipalRoleMap(context) |
---|
| 779 | except TypeError: |
---|
| 780 | # no map no roles. |
---|
| 781 | raise StopIteration |
---|
[6163] | 782 | for local_role, user_name, setting in role_map.getPrincipalsAndRoles(): |
---|
[14603] | 783 | user = grok.getSite()['users'].get(user_name, None) |
---|
[7213] | 784 | user_title = getattr(user, 'title', user_name) |
---|
[16529] | 785 | public_name = getattr(user, 'public_name', None) |
---|
| 786 | if not public_name: |
---|
| 787 | public_name = user_title |
---|
[10227] | 788 | local_role_title = getattr( |
---|
| 789 | dict(get_all_roles()).get(local_role, None), 'title', None) |
---|
[16529] | 790 | yield dict(user=user, |
---|
| 791 | user_name=user_name, |
---|
[14603] | 792 | user_title=user_title, |
---|
[16529] | 793 | public_name=public_name, |
---|
[14603] | 794 | local_role=local_role, |
---|
| 795 | local_role_title=local_role_title, |
---|
[16529] | 796 | setting=setting, |
---|
| 797 | ) |
---|
[9309] | 798 | |
---|
[14603] | 799 | |
---|
[9309] | 800 | def get_users_with_role(role, context): |
---|
| 801 | """Get a list of dicts representing the usres who have been granted |
---|
| 802 | a role for `context`. |
---|
| 803 | """ |
---|
| 804 | try: |
---|
| 805 | role_map = IPrincipalRoleMap(context) |
---|
| 806 | except TypeError: |
---|
| 807 | # no map no roles. |
---|
| 808 | raise StopIteration |
---|
| 809 | for user_name, setting in role_map.getPrincipalsForRole(role): |
---|
[14603] | 810 | user = grok.getSite()['users'].get(user_name, None) |
---|
[9309] | 811 | user_title = getattr(user, 'title', user_name) |
---|
| 812 | user_email = getattr(user, 'email', None) |
---|
[14603] | 813 | yield dict(user_name=user_name, |
---|
| 814 | user_title=user_title, |
---|
| 815 | user_email=user_email, |
---|
| 816 | setting=setting) |
---|