source: main/waeup.sirp/trunk/src/waeup/sirp/permissions.py @ 7273

Last change on this file since 7273 was 7250, checked in by Henrik Bettermann, 13 years ago

First part of acceptance fee payment integration (under construction).

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 7.8 KB
RevLine 
[7193]1## $Id: permissions.py 7250 2011-12-02 12:46:36Z henrik $
2##
3## Copyright (C) 2011 Uli Fouquet & Henrik Bettermann
4## This program is free software; you can redistribute it and/or modify
5## it under the terms of the GNU General Public License as published by
6## the Free Software Foundation; either version 2 of the License, or
7## (at your option) any later version.
8##
9## This program is distributed in the hope that it will be useful,
10## but WITHOUT ANY WARRANTY; without even the implied warranty of
11## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12## GNU General Public License for more details.
13##
14## You should have received a copy of the GNU General Public License
15## along with this program; if not, write to the Free Software
16## Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17##
[3521]18import grok
[6157]19from zope.component import getUtilitiesFor
[6144]20from zope.interface import Interface
[6163]21from zope.securitypolicy.interfaces import IRole, IPrincipalRoleMap
[6144]22from waeup.sirp.interfaces import ILocalRolesAssignable
[3521]23
[4789]24class Public(grok.Permission):
25    """Everyone-can-do-this-permission.
26
27    This permission is meant to be applied to objects/views/pages
28    etc., that should be usable/readable by everyone.
29
30    We need this to be able to tune default permissions more
31    restrictive and open up some dedicated objects like the front
32    page.
33    """
34    grok.name('waeup.Public')
[6142]35
[5433]36class Anonymous(grok.Permission):
37    """Only-anonymous-can-do-this-permission.
38    """
[6142]39    grok.name('waeup.Anonymous')
[4789]40
[7184]41class Authenticated(grok.Permission):
42    """Only-logged-in-users-can-do-this-permission.
43    """
44    grok.name('waeup.Authenticated')
[4789]45
[7184]46class ViewAcademicsPermission(grok.Permission):
47    grok.name('waeup.viewAcademics')
48
[4789]49class ManageUniversity(grok.Permission):
50    grok.name('waeup.manageUniversity')
51
52class ManageUsers(grok.Permission):
53    grok.name('waeup.manageUsers')
[6142]54
[7205]55class ShowStudents(grok.Permission):
56    grok.name('waeup.showStudents')
57
[7163]58class EditUser(grok.Permission):
59    grok.name('waeup.editUser')
60
[6127]61class ManageDataCenter(grok.Permission):
62    grok.name('waeup.manageDataCenter')
[6142]63
[6907]64class ManagePortalConfiguration(grok.Permission):
65    grok.name('waeup.managePortalConfiguration')
[6155]66
[7181]67class ManageACBatches(grok.Permission):
68    grok.name('waeup.manageACBatches')
69
[6125]70# Local Roles
[7185]71class DepartmentManager(grok.Role):
72    grok.name('waeup.local.DepartmentManager')
73    grok.title(u'Department Manager')
[7205]74    grok.permissions('waeup.manageUniversity','waeup.showStudents')
[6142]75
[6655]76class ClearanceOfficer(grok.Role):
[7168]77    """The clearance officer role is meant for the
78    assignment of dynamic roles only.
79    """
[6655]80    grok.name('waeup.local.ClearanceOfficer')
81    grok.title(u'Clearance Officer')
[7217]82    grok.permissions('waeup.showStudents', 'waeup.viewAcademics')
[6655]83
84class CourseAdviser(grok.Role):
[7168]85    """The course adviser role is meant for the
86    assignment of dynamic roles only.
87    """
[6655]88    grok.name('waeup.local.CourseAdviser')
89    grok.title(u'Course Adviser')
[7205]90    grok.permissions('waeup.showStudents')
[6655]91
[7163]92class Owner(grok.Role):
93    grok.name('waeup.local.Owner')
94    grok.title(u'Owner')
95    grok.permissions('waeup.editUser')
96
[7178]97# Site Roles
[7185]98class AcademicsOfficer(grok.Role):
99    grok.name('waeup.AcademicsOfficer')
[7188]100    grok.title(u'Academics Officer (view only)')
[7184]101    grok.permissions('waeup.viewAcademics')
[3521]102
[7181]103class ACManager(grok.Role):
104    grok.name('waeup.ACManager')
105    grok.title(u'Access Code Manager')
106    grok.permissions('waeup.manageACBatches')
107
[4789]108class PortalManager(grok.Role):
109    grok.name('waeup.PortalManager')
[6159]110    grok.title(u'Portal Manager')
[4789]111    grok.permissions('waeup.manageUniversity', 'waeup.manageUsers',
[7184]112                     'waeup.viewAcademics', 'waeup.manageACBatches',
[6198]113                     'waeup.manageDataCenter','waeup.managePortalSettings',
[7184]114                     'waeup.managePortalConfiguration', 'waeup.viewApplication',
115                     'waeup.manageApplication', 'waeup.handleApplication',
[7250]116                     'waeup.viewApplicantsTab', 'waeup.payApplicant',
117                     'waeup.viewStudent', 'waeup.manageStudent',
118                     'waeup.clearStudent', 'waeup.payStudent',
119                     'waeup.uploadStudentFile', 'waeup.showStudents',
120                     'waeup.viewStudentsContainer','waeup.viewStudentsTab',
[7205]121                     'waeup.viewHostels', 'waeup.manageHostels',
[7240]122                     )
[4789]123
[7186]124def get_all_roles():
[6157]125    """Return a list of tuples ``<ROLE-NAME>, <ROLE>``.
126    """
127    return getUtilitiesFor(IRole)
128
[7186]129def get_waeup_roles(also_local=False):
[6157]130    """Get all WAeUP roles.
131
132    WAeUP roles are ordinary roles whose id by convention starts with
133    a ``waeup.`` prefix.
134
135    If `also_local` is ``True`` (``False`` by default), also local
136    roles are returned. Local WAeUP roles are such whose id starts
137    with ``waeup.local.`` prefix (this is also a convention).
138
139    Returns a generator of the found roles.
140    """
[7186]141    for name, item in get_all_roles():
[6157]142        if not name.startswith('waeup.'):
[4789]143            # Ignore non-WAeUP roles...
144            continue
[6157]145        if not also_local and name.startswith('waeup.local.'):
146            # Ignore local roles...
[6045]147            continue
[6157]148        yield item
[4789]149
[7186]150def get_waeup_role_names():
[6157]151    """Get the ids of all WAeUP roles.
152
[7186]153    See :func:`get_waeup_roles` for what a 'WAeUPRole' is.
[6157]154
155    This function returns a sorted list of WAeUP role names.
156    """
[7186]157    return sorted([x.id for x in get_waeup_roles()])
[6157]158
[6144]159class LocalRolesAssignable(grok.Adapter):
160    """Default implementation for `ILocalRolesAssignable`.
161
162    This adapter returns a list for dictionaries for objects for which
163    we want to know the roles assignable to them locally.
164
165    The returned dicts contain a ``name`` and a ``title`` entry which
166    give a role (``name``) and a description, for which kind of users
167    the permission is meant to be used (``title``).
168
169    Having this adapter registered we make sure, that for each normal
170    object we get a valid `ILocalRolesAssignable` adapter.
171
172    Objects that want to offer certain local roles, can do so by
[6162]173    setting a (preferably class-) attribute to a list of role ids.
[6144]174
175    You can also define different adapters for different contexts to
176    have different role lookup mechanisms become available. But in
177    normal cases it should be sufficient to use this basic adapter.
178    """
179    grok.context(Interface)
180    grok.provides(ILocalRolesAssignable)
181
182    _roles = []
183
184    def __init__(self, context):
185        self.context = context
[6162]186        role_ids = getattr(context, 'local_roles', self._roles)
[7186]187        self._roles = [(name, role) for name, role in get_all_roles()
[6162]188                       if name in role_ids]
[6144]189        return
190
191    def __call__(self):
192        """Get a list of dictionaries containing ``names`` (the roles to
193        assign) and ``titles`` (some description of the type of user
194        to assign each role to).
195        """
[6162]196        return [
197            dict(
198                name=name,
199                title=role.title,
[6163]200                description=role.description)
[6162]201            for name, role in self._roles]
[6144]202
[6163]203def get_users_with_local_roles(context):
204    """Get a list of dicts representing the local roles set for `context`.
205
206    Each dict returns `user_name`, `user_title`, `local_role`,
207    `local_role_title`, and `setting` for each entry in the local
208    roles map of the `context` object.
209    """
[6202]210    try:
211        role_map = IPrincipalRoleMap(context)
212    except TypeError:
213        # no map no roles.
214        raise StopIteration
[6163]215    for local_role, user_name, setting in role_map.getPrincipalsAndRoles():
216        user = grok.getSite()['users'].get(user_name,None)
[7213]217        user_title = getattr(user, 'title', user_name)
[7186]218        local_role_title = dict(get_all_roles())[local_role].title
[6163]219        yield dict(user_name = user_name,
220                   user_title = user_title,
221                   local_role = local_role,
222                   local_role_title = local_role_title,
223                   setting = setting)
Note: See TracBrowser for help on using the repository browser.