comparison env/lib/python3.9/site-packages/boto/gs/acl.py @ 0:4f3585e2f14b draft default tip

"planemo upload commit 60cee0fc7c0cda8592644e1aad72851dec82c959"
author shellac
date Mon, 22 Mar 2021 18:12:50 +0000
parents
children
comparison
equal deleted inserted replaced
-1:000000000000 0:4f3585e2f14b
1 # Copyright 2010 Google Inc.
2 #
3 # Permission is hereby granted, free of charge, to any person obtaining a
4 # copy of this software and associated documentation files (the
5 # "Software"), to deal in the Software without restriction, including
6 # without limitation the rights to use, copy, modify, merge, publish, dis-
7 # tribute, sublicense, and/or sell copies of the Software, and to permit
8 # persons to whom the Software is furnished to do so, subject to the fol-
9 # lowing conditions:
10 #
11 # The above copyright notice and this permission notice shall be included
12 # in all copies or substantial portions of the Software.
13 #
14 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15 # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
16 # ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
17 # SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
18 # WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
19 # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
20 # IN THE SOFTWARE.
21
22 from boto.gs.user import User
23 from boto.exception import InvalidAclError
24
25 ACCESS_CONTROL_LIST = 'AccessControlList'
26 ALL_AUTHENTICATED_USERS = 'AllAuthenticatedUsers'
27 ALL_USERS = 'AllUsers'
28 DISPLAY_NAME = 'DisplayName'
29 DOMAIN = 'Domain'
30 EMAIL_ADDRESS = 'EmailAddress'
31 ENTRY = 'Entry'
32 ENTRIES = 'Entries'
33 GROUP_BY_DOMAIN = 'GroupByDomain'
34 GROUP_BY_EMAIL = 'GroupByEmail'
35 GROUP_BY_ID = 'GroupById'
36 ID = 'ID'
37 NAME = 'Name'
38 OWNER = 'Owner'
39 PERMISSION = 'Permission'
40 SCOPE = 'Scope'
41 TYPE = 'type'
42 USER_BY_EMAIL = 'UserByEmail'
43 USER_BY_ID = 'UserById'
44
45
46 CannedACLStrings = ['private', 'public-read', 'project-private',
47 'public-read-write', 'authenticated-read',
48 'bucket-owner-read', 'bucket-owner-full-control']
49 """A list of Google Cloud Storage predefined (canned) ACL strings."""
50
51 SupportedPermissions = ['READ', 'WRITE', 'FULL_CONTROL']
52 """A list of supported ACL permissions."""
53
54
55 class ACL(object):
56
57 def __init__(self, parent=None):
58 self.parent = parent
59 self.entries = Entries(self)
60
61 @property
62 def acl(self):
63 return self
64
65 def __repr__(self):
66 # Owner is optional in GS ACLs.
67 if hasattr(self, 'owner'):
68 entries_repr = ['Owner:%s' % self.owner.__repr__()]
69 else:
70 entries_repr = ['']
71 acl_entries = self.entries
72 if acl_entries:
73 for e in acl_entries.entry_list:
74 entries_repr.append(e.__repr__())
75 return '<%s>' % ', '.join(entries_repr)
76
77 # Method with same signature as boto.s3.acl.ACL.add_email_grant(), to allow
78 # polymorphic treatment at application layer.
79 def add_email_grant(self, permission, email_address):
80 entry = Entry(type=USER_BY_EMAIL, email_address=email_address,
81 permission=permission)
82 self.entries.entry_list.append(entry)
83
84 # Method with same signature as boto.s3.acl.ACL.add_user_grant(), to allow
85 # polymorphic treatment at application layer.
86 def add_user_grant(self, permission, user_id):
87 entry = Entry(permission=permission, type=USER_BY_ID, id=user_id)
88 self.entries.entry_list.append(entry)
89
90 def add_group_email_grant(self, permission, email_address):
91 entry = Entry(type=GROUP_BY_EMAIL, email_address=email_address,
92 permission=permission)
93 self.entries.entry_list.append(entry)
94
95 def add_group_grant(self, permission, group_id):
96 entry = Entry(type=GROUP_BY_ID, id=group_id, permission=permission)
97 self.entries.entry_list.append(entry)
98
99 def startElement(self, name, attrs, connection):
100 if name.lower() == OWNER.lower():
101 self.owner = User(self)
102 return self.owner
103 elif name.lower() == ENTRIES.lower():
104 self.entries = Entries(self)
105 return self.entries
106 else:
107 return None
108
109 def endElement(self, name, value, connection):
110 if name.lower() == OWNER.lower():
111 pass
112 elif name.lower() == ENTRIES.lower():
113 pass
114 else:
115 setattr(self, name, value)
116
117 def to_xml(self):
118 s = '<%s>' % ACCESS_CONTROL_LIST
119 # Owner is optional in GS ACLs.
120 if hasattr(self, 'owner'):
121 s += self.owner.to_xml()
122 acl_entries = self.entries
123 if acl_entries:
124 s += acl_entries.to_xml()
125 s += '</%s>' % ACCESS_CONTROL_LIST
126 return s
127
128
129 class Entries(object):
130
131 def __init__(self, parent=None):
132 self.parent = parent
133 # Entries is the class that represents the same-named XML
134 # element. entry_list is the list within this class that holds the data.
135 self.entry_list = []
136
137 def __repr__(self):
138 entries_repr = []
139 for e in self.entry_list:
140 entries_repr.append(e.__repr__())
141 return '<Entries: %s>' % ', '.join(entries_repr)
142
143 def startElement(self, name, attrs, connection):
144 if name.lower() == ENTRY.lower():
145 entry = Entry(self)
146 self.entry_list.append(entry)
147 return entry
148 else:
149 return None
150
151 def endElement(self, name, value, connection):
152 if name.lower() == ENTRY.lower():
153 pass
154 else:
155 setattr(self, name, value)
156
157 def to_xml(self):
158 if not self.entry_list:
159 return ''
160 s = '<%s>' % ENTRIES
161 for entry in self.entry_list:
162 s += entry.to_xml()
163 s += '</%s>' % ENTRIES
164 return s
165
166
167 # Class that represents a single (Scope, Permission) entry in an ACL.
168 class Entry(object):
169
170 def __init__(self, scope=None, type=None, id=None, name=None,
171 email_address=None, domain=None, permission=None):
172 if not scope:
173 scope = Scope(self, type, id, name, email_address, domain)
174 self.scope = scope
175 self.permission = permission
176
177 def __repr__(self):
178 return '<%s: %s>' % (self.scope.__repr__(), self.permission.__repr__())
179
180 def startElement(self, name, attrs, connection):
181 if name.lower() == SCOPE.lower():
182 # The following if statement used to look like this:
183 # if not TYPE in attrs:
184 # which caused problems because older versions of the
185 # AttributesImpl class in the xml.sax library neglected to include
186 # a __contains__() method (which Python calls to implement the
187 # 'in' operator). So when you use the in operator, like the if
188 # statement above, Python invokes the __getiter__() method with
189 # index 0, which raises an exception. More recent versions of
190 # xml.sax include the __contains__() method, rendering the in
191 # operator functional. The work-around here is to formulate the
192 # if statement as below, which is the legal way to query
193 # AttributesImpl for containment (and is also how the added
194 # __contains__() method works). At one time gsutil disallowed
195 # xmlplus-based parsers, until this more specific problem was
196 # determined.
197 if TYPE not in attrs:
198 raise InvalidAclError('Missing "%s" in "%s" part of ACL' %
199 (TYPE, SCOPE))
200 self.scope = Scope(self, attrs[TYPE])
201 return self.scope
202 elif name.lower() == PERMISSION.lower():
203 pass
204 else:
205 return None
206
207 def endElement(self, name, value, connection):
208 if name.lower() == SCOPE.lower():
209 pass
210 elif name.lower() == PERMISSION.lower():
211 value = value.strip()
212 if not value in SupportedPermissions:
213 raise InvalidAclError('Invalid Permission "%s"' % value)
214 self.permission = value
215 else:
216 setattr(self, name, value)
217
218 def to_xml(self):
219 s = '<%s>' % ENTRY
220 s += self.scope.to_xml()
221 s += '<%s>%s</%s>' % (PERMISSION, self.permission, PERMISSION)
222 s += '</%s>' % ENTRY
223 return s
224
225
226 class Scope(object):
227
228 # Map from Scope type.lower() to lower-cased list of allowed sub-elems.
229 ALLOWED_SCOPE_TYPE_SUB_ELEMS = {
230 ALL_AUTHENTICATED_USERS.lower() : [],
231 ALL_USERS.lower() : [],
232 GROUP_BY_DOMAIN.lower() : [DOMAIN.lower()],
233 GROUP_BY_EMAIL.lower() : [
234 DISPLAY_NAME.lower(), EMAIL_ADDRESS.lower(), NAME.lower()],
235 GROUP_BY_ID.lower() : [DISPLAY_NAME.lower(), ID.lower(), NAME.lower()],
236 USER_BY_EMAIL.lower() : [
237 DISPLAY_NAME.lower(), EMAIL_ADDRESS.lower(), NAME.lower()],
238 USER_BY_ID.lower() : [DISPLAY_NAME.lower(), ID.lower(), NAME.lower()]
239 }
240
241 def __init__(self, parent, type=None, id=None, name=None,
242 email_address=None, domain=None):
243 self.parent = parent
244 self.type = type
245 self.name = name
246 self.id = id
247 self.domain = domain
248 self.email_address = email_address
249 if self.type.lower() not in self.ALLOWED_SCOPE_TYPE_SUB_ELEMS:
250 raise InvalidAclError('Invalid %s %s "%s" ' %
251 (SCOPE, TYPE, self.type))
252
253 def __repr__(self):
254 named_entity = None
255 if self.id:
256 named_entity = self.id
257 elif self.email_address:
258 named_entity = self.email_address
259 elif self.domain:
260 named_entity = self.domain
261 if named_entity:
262 return '<%s: %s>' % (self.type, named_entity)
263 else:
264 return '<%s>' % self.type
265
266 def startElement(self, name, attrs, connection):
267 if (not name.lower() in
268 self.ALLOWED_SCOPE_TYPE_SUB_ELEMS[self.type.lower()]):
269 raise InvalidAclError('Element "%s" not allowed in %s %s "%s" ' %
270 (name, SCOPE, TYPE, self.type))
271 return None
272
273 def endElement(self, name, value, connection):
274 value = value.strip()
275 if name.lower() == DOMAIN.lower():
276 self.domain = value
277 elif name.lower() == EMAIL_ADDRESS.lower():
278 self.email_address = value
279 elif name.lower() == ID.lower():
280 self.id = value
281 elif name.lower() == NAME.lower():
282 self.name = value
283 else:
284 setattr(self, name, value)
285
286 def to_xml(self):
287 s = '<%s type="%s">' % (SCOPE, self.type)
288 if (self.type.lower() == ALL_AUTHENTICATED_USERS.lower()
289 or self.type.lower() == ALL_USERS.lower()):
290 pass
291 elif self.type.lower() == GROUP_BY_DOMAIN.lower():
292 s += '<%s>%s</%s>' % (DOMAIN, self.domain, DOMAIN)
293 elif (self.type.lower() == GROUP_BY_EMAIL.lower()
294 or self.type.lower() == USER_BY_EMAIL.lower()):
295 s += '<%s>%s</%s>' % (EMAIL_ADDRESS, self.email_address,
296 EMAIL_ADDRESS)
297 if self.name:
298 s += '<%s>%s</%s>' % (NAME, self.name, NAME)
299 elif (self.type.lower() == GROUP_BY_ID.lower()
300 or self.type.lower() == USER_BY_ID.lower()):
301 s += '<%s>%s</%s>' % (ID, self.id, ID)
302 if self.name:
303 s += '<%s>%s</%s>' % (NAME, self.name, NAME)
304 else:
305 raise InvalidAclError('Invalid scope type "%s" ', self.type)
306
307 s += '</%s>' % SCOPE
308 return s