Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
C
caosdb-pylib
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
caosdb
Software
caosdb-pylib
Commits
c7c3bc6c
Commit
c7c3bc6c
authored
5 years ago
by
Quazgar
Committed by
Henrik tom Wörden
5 years ago
Browse files
Options
Downloads
Patches
Plain Diff
ENH DOC: Added example for permissions setting.
parent
cffbda19
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
examples/set_permissions.py
+231
-0
231 additions, 0 deletions
examples/set_permissions.py
with
231 additions
and
0 deletions
examples/set_permissions.py
0 → 100755
+
231
−
0
View file @
c7c3bc6c
#!/usr/bin/env python3
# ** header v3.0
# This file is a part of the CaosDB Project.
#
# Copyright (c) 2019 IndiScale GmbH
# Copyright (c) 2019 Daniel Hornung <d.hornung@indiscale.com>
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as
# published by the Free Software Foundation, either version 3 of the
# License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
#
# ** end header
"""
Creates role and user, then sets the permissions of an entity.
As a result, only a specific user or group may access it.
This script assumes that data similar to the demo server of IndiScale (at
demo.indiscale.com) exists on the server specified in the pycaosdb.ini
configuration.
"""
import
caosdb
as
db
from
caosdb
import
administration
as
admin
import
lxml
def
assert_user_and_role
():
"""
Make sure that users and roles exist.
After calling this function, there will be a user
"
jane
"
with the role
"
human
"
and the user
"
xaxys
"
with the role
"
alien
"
. These users and roles are returned.
Returns
-------
out : tuple
((human_user, human_role), (alien_user, alien_role))
"""
try
:
human_user
=
admin
.
_retrieve_user
(
"
jane
"
)
_activate_user
(
"
jane
"
)
except
db
.
EntityDoesNotExistError
:
human_user
=
admin
.
_insert_user
(
"
jane
"
,
password
=
"
Human_Rememberable_Password_1234
"
,
status
=
"
ACTIVE
"
)
try
:
alien_user
=
admin
.
_retrieve_user
(
"
xaxys
"
)
_activate_user
(
"
xaxys
"
)
except
db
.
EntityDoesNotExistError
:
alien_user
=
admin
.
_insert_user
(
"
xaxys
"
,
password
=
"
4321_Syxax
"
,
status
=
"
ACTIVE
"
)
# At the moment, the return value is only "ok" for successful insertions.
try
:
human_role
=
admin
.
_retrieve_role
(
"
human
"
)
except
db
.
EntityDoesNotExistError
:
human_role
=
admin
.
_insert_role
(
"
human
"
,
"
An Earthling.
"
)
try
:
alien_role
=
admin
.
_retrieve_role
(
"
alien
"
)
except
db
.
EntityDoesNotExistError
:
alien_role
=
admin
.
_insert_role
(
"
alien
"
,
"
An Extra-terrestrial.
"
)
admin
.
_set_roles
(
"
jane
"
,
[
"
human
"
])
admin
.
_set_roles
(
"
xaxys
"
,
[
"
alien
"
])
return
((
"
jane
"
,
list
(
admin
.
_get_roles
(
"
jane
"
))),
(
"
xaxys
"
,
list
(
admin
.
_get_roles
(
"
xaxys
"
))))
def
_activate_user
(
user
):
"""
Set the user state to
"
ACTIVE
"
if necessary.
Parameters
----------
user : str
The user to activate.
Returns
-------
None
"""
user_xml
=
lxml
.
etree
.
fromstring
(
admin
.
_retrieve_user
(
user
))
if
user_xml
.
xpath
(
"
User
"
)[
0
].
attrib
[
"
status
"
]
!=
"
ACTIVE
"
:
admin
.
_update_user
(
user
,
status
=
"
ACTIVE
"
)
def
get_entities
(
count
=
1
):
"""
Retrieve one or more entities.
Parameters
----------
count : int, optional
How many entities to retrieve.
Returns
-------
out : Container
A container of retrieved entities, the length is given by the parameter count.
"""
cont
=
db
.
execute_query
(
"
FIND RECORD Guitar
"
,
flags
=
{
"
P
"
:
"
0L{n}
"
.
format
(
n
=
count
)})
if
len
(
cont
)
!=
count
:
raise
db
.
CaosDBException
(
msg
=
"
Incorrect number of entitities returned.
"
)
return
cont
def
set_permission
(
role_grant
,
role_deny
,
cont
=
None
,
general
=
False
):
"""
Set the permissions of some entities.
Parameters
----------
role_grant : str
Role which is granted permissions.
role_deny : str
Role which is denied permissions.
cont : Container
Entities for which permissions are set.
general : bool, optional
If True, the permissions for the roles will be set. If False (the default),
permissions for the entities in the container will be set.
"""
# Set general permissions
if
general
:
grant
=
admin
.
PermissionRule
(
action
=
"
grant
"
,
permission
=
"
RETRIEVE:OWNER
"
)
deny
=
admin
.
PermissionRule
(
action
=
"
deny
"
,
permission
=
"
RETRIEVE:FILE
"
)
admin
.
_set_permissions
(
role
=
role_grant
,
permission_rules
=
[
grant
])
admin
.
_set_permissions
(
role
=
role_deny
,
permission_rules
=
[
deny
])
return
if
cont
is
None
or
len
(
cont
)
==
0
:
raise
ValueError
(
"
Container not given or empty!
"
)
perm
=
"
RETRIEVE:*
"
for
ent
in
cont
:
ent
.
retrieve_acl
()
ent
.
acl
.
grant
(
role
=
role_grant
,
permission
=
perm
)
ent
.
acl
.
deny
(
role
=
role_deny
,
permission
=
perm
)
cont
.
update
()
print
(
"
Permissions updated.
"
)
def
test_permission
(
granted_user
,
denied_user
,
cont
):
"""
Tests if the permissions are set correctly for two users.
Parameters
----------
granted_user : (str, str)
The user which should have permissions to retrieve the entities in `cont`.
Given as (user, password).
denied_user : (str, str)
The user which should have no permission to retrieve the entities in `cont`.
Given as (user, password).
cont : Container
Entities for which permissions are tested.
Returns
-------
None
"""
# Switch to user with permissions
db
.
configure_connection
(
username
=
granted_user
[
0
],
password
=
granted_user
[
1
],
password_method
=
"
plain
"
)
db
.
connection
.
connection
.
get_connection
().
_login
()
print
(
"
Trying to retrieve entities as {}...
"
.
format
(
granted_user
[
0
]))
try
:
for
ent
in
cont
:
ent
.
retrieve
()
print
(
"
Successfully retrieved all entities.
"
)
except
db
.
AuthorizationException
:
print
(
ent
)
print
(
"
Could not retrieve this entity although it should have been possible!
"
)
# Switch to user without permissions
db
.
configure_connection
(
username
=
denied_user
[
0
],
password
=
denied_user
[
1
],
password_method
=
"
plain
"
)
db
.
connection
.
connection
.
get_connection
().
_login
()
print
(
"
\n
Trying to retrieve entities as {}...
"
.
format
(
denied_user
[
0
]))
denied_all
=
True
for
ent
in
cont
:
try
:
ent
.
retrieve
()
denied_all
=
False
print
(
ent
)
print
(
"
Could retrieve this entity although it should not have been possible!
"
)
except
db
.
AuthorizationException
:
pass
if
denied_all
:
print
(
"
Retrieval of all entities was successfully denied.
"
)
def
main
():
"""
The main function of this script.
"""
db
.
connection
.
connection
.
get_connection
().
_login
()
human
,
alien
=
assert_user_and_role
()
# public, private, undefined entities
entities
=
get_entities
(
count
=
3
)
set_permission
(
human
[
1
][
0
],
alien
[
1
][
0
],
entities
)
test_permission
((
human
[
0
],
"
Human_Rememberable_Password_1234
"
),
(
alien
[
0
],
"
4321_Syxax
"
),
entities
)
if
__name__
==
"
__main__
"
:
main
()
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment