Skip to content

Instantly share code, notes, and snippets.

@svx
Created July 14, 2015 09:22
Show Gist options
  • Save svx/7ced29e3dded6fe893c9 to your computer and use it in GitHub Desktop.
Save svx/7ced29e3dded6fe893c9 to your computer and use it in GitHub Desktop.
PlonePAS MemberData class
from App.class_init import InitializeClass
from Acquisition import aq_base
from AccessControl import ClassSecurityInfo
from zope.interface import implements
from Products.BTreeFolder2.BTreeFolder2 import BTreeFolder2
from Products.CMFCore.permissions import ManagePortal
from Products.CMFCore.utils import getToolByName
from Products.CMFCore.MemberDataTool import MemberData as BaseMemberData
from Products.CMFCore.MemberDataTool import MemberDataTool as BaseTool
from Products.PluggableAuthService.interfaces.authservice import IPluggableAuthService
from Products.PluggableAuthService.interfaces.plugins import IPropertiesPlugin, IRoleAssignerPlugin
from Products.PlonePAS.interfaces.plugins import IUserManagement
from Products.PlonePAS.interfaces.group import IGroupManagement
from Products.PlonePAS.interfaces.propertysheets import IMutablePropertySheet
from Products.PlonePAS.interfaces.capabilities import IDeleteCapability, IPasswordSetCapability
from Products.PlonePAS.interfaces.capabilities import IGroupCapability, IAssignRoleCapability
from Products.PlonePAS.interfaces.capabilities import IManageCapabilities
from Products.PlonePAS.utils import getCharset
from AccessControl.requestmethod import postonly
_marker = object()
class MemberDataTool(BaseTool):
"""PAS-specific implementation of memberdata tool.
"""
meta_type = "PlonePAS MemberData Tool"
security = ClassSecurityInfo()
toolicon = 'tool.gif'
def __init__(self):
BaseTool.__init__(self)
self.portraits=BTreeFolder2(id='portraits')
def _getPortrait(self, member_id):
"return member_id's portrait if you can "
return self.portraits.get(member_id, None)
def _setPortrait(self, portrait, member_id):
" store portrait which must be a raw image in _portrais "
if member_id in self.portraits:
self.portraits._delObject(member_id)
self.portraits._setObject(id= member_id, object=portrait)
def _deletePortrait(self, member_id):
" remove member_id's portrait "
if member_id in self.portraits:
self.portraits._delObject(member_id)
security.declarePrivate('pruneMemberDataContents')
def pruneMemberDataContents(self):
'''
Compare the user IDs stored in the member data
tool with the list in the actual underlying acl_users
and delete anything not in acl_users
'''
BaseTool.pruneMemberDataContents(self)
membertool= getToolByName(self, 'portal_membership')
portraits = self.portraits
user_list = membertool.listMemberIds()
for tuple in portraits.items():
member_id = tuple[0]
if member_id not in user_list:
self.portraits._delObject(member_id)
security.declareProtected(ManagePortal, 'purgeMemberDataContents')
def purgeMemberDataContents(self):
'''
Delete ALL MemberData information. This is required for us as we change the
MemberData class.
'''
members = self._members
for tuple in members.items():
member_name = tuple[0]
del members[member_name]
return "Done."
security.declarePrivate("updateMemberDataContents")
def updateMemberDataContents(self,):
"""Update former MemberData objects to new MemberData objects
"""
count = 0
members = self._members
properties = self.propertyIds()
# Scan members for old MemberData
for member_name, member_obj in members.items():
values = {}
if getattr(member_obj, "_is_new_kind", None):
continue # Do not have to upgrade that object
# Have to upgrade. Create the values mapping.
for pty_name in properties:
user_value = getattr( member_obj, pty_name, _marker )
if user_value is not _marker:
values[pty_name] = user_value
# Wrap a new user object of the RIGHT class
u = self.acl_users.getUserById(member_name, None)
if not u:
continue # User is not in main acl_users anymore
self.wrapUser(u)
# Set its properties
mbr = self._members.get(member_name, None)
if not mbr:
raise RuntimeError, "Error while upgrading user '%s'." % (member_name, )
mbr.setProperties(values, force_local = 1)
count += 1
return count
security.declarePrivate( 'searchMemberDataContents' )
def searchMemberDataContents( self, search_param, search_term ):
"""
Search members.
This is the same as CMFCore except that it doesn't check term case.
"""
res = []
search_term = search_term.strip().lower()
if search_param == 'username':
search_param = 'id'
mtool = getToolByName(self, 'portal_membership')
for member_id in self._members.keys():
user_wrapper = mtool.getMemberById( member_id )
if user_wrapper is not None:
memberProperty = user_wrapper.getProperty
searched = memberProperty( search_param, None )
if searched is not None:
if searched.strip().lower().find(search_term) != -1:
res.append( { 'username': memberProperty( 'id' )
, 'email' : memberProperty( 'email', '' )
}
)
return res
security.declarePublic( 'searchFulltextForMembers' )
def searchFulltextForMembers(self, s):
"""search for members which do have string 's' in name, email or full name (if defined)
this is mainly used for the localrole form
"""
s=s.strip().lower()
mu = getToolByName(self, 'portal_membership')
res = []
for member in mu.listMembers():
u = member.getUser()
if u.getUserName().lower().find(s) != -1 \
or member.getProperty('fullname').lower().find(s) != -1 \
or member.getProperty('email').lower().find(s) != -1:
res.append(member)
return res
#### an exact copy from the base, so that we pick up the new MemberData.
#### wrapUser should have a MemberData factory method to over-ride (or even
#### set at run-time!) so that we don't have to do this.
def wrapUser(self, u):
'''
If possible, returns the Member object that corresponds
to the given User object.
We override this to ensure OUR MemberData class is used
'''
id = u.getId()
members = self._members
if not members.has_key(id):
base = aq_base(self)
members[id] = MemberData(base, id)
# Return a wrapper with self as containment and
# the user as context.
return members[id].__of__(self).__of__(u)
@postonly
def deleteMemberData(self, member_id, REQUEST=None):
""" Delete member data of specified member.
"""
if IPluggableAuthService.providedBy(self.acl_users):
# It's a PAS! Whee!
# XXX: can we safely assume that user name == member_id
plugins = self._getPlugins()
prop_managers = plugins.listPlugins(IPropertiesPlugin)
for mid, prop_manager in prop_managers:
# Not all PropertiesPlugins support user deletion
try:
prop_manager.deleteUser(member_id)
except AttributeError:
pass
# we won't always have PlonePAS users, due to acquisition,
# nor are guaranteed property sheets
members = self._members
if members.has_key(member_id):
del members[member_id]
return 1
else:
return 0
## plugin getter
def _getPlugins(self):
return self.acl_users.plugins
InitializeClass(MemberDataTool)
class MemberData(BaseMemberData):
security = ClassSecurityInfo()
implements(IManageCapabilities)
## setProperties uses setMemberProperties. no need to override.
def setMemberProperties(self, mapping, force_local = 0):
"""PAS-specific method to set the properties of a
member. Ignores 'force_local', which is not reliably present.
"""
sheets = None
# We could pay attention to force_local here...
if not IPluggableAuthService.providedBy(self.acl_users):
# Defer to base impl in absence of PAS, a PAS user, or
# property sheets
return BaseMemberData.setMemberProperties(self, mapping)
else:
# It's a PAS! Whee!
user = self.getUser()
sheets = getattr(user, 'getOrderedPropertySheets', lambda: None)()
# We won't always have PlonePAS users, due to acquisition,
# nor are guaranteed property sheets
if not sheets:
# Defer to base impl if we have a PAS but no property
# sheets.
return BaseMemberData.setMemberProperties(self, mapping)
# If we got this far, we have a PAS and some property sheets.
# XXX track values set to defer to default impl
# property routing?
modified = False
for k, v in mapping.items():
if v == None:
continue
for sheet in sheets:
if not sheet.hasProperty(k):
continue
if IMutablePropertySheet.providedBy(sheet):
sheet.setProperty(user, k, v)
modified = True
else:
break
#raise RuntimeError, ("Mutable property provider "
# "shadowed by read only provider")
if modified:
self.notifyModified()
def getProperty(self, id, default=_marker):
"""PAS-specific method to fetch a user's properties. Looks
through the ordered property sheets.
"""
sheets = None
if not IPluggableAuthService.providedBy(self.acl_users):
return BaseMemberData.getProperty(self, id)
else:
# It's a PAS! Whee!
user = self.getUser()
sheets = getattr(user, 'getOrderedPropertySheets', lambda: None)()
# we won't always have PlonePAS users, due to acquisition,
# nor are guaranteed property sheets
if not sheets:
return BaseMemberData.getProperty(self, id, default)
charset = getCharset(self)
# If we made this far, we found a PAS and some property sheets.
for sheet in sheets:
if sheet.hasProperty(id):
# Return the first one that has the property.
value = sheet.getProperty(id)
if isinstance(value, unicode):
# XXX Temporarily work around the fact that
# property sheets blindly store and return
# unicode. This is sub-optimal and should be
# dealed with at the property sheets level by
# using Zope's converters.
return value.encode(charset)
return value
# Couldn't find the property in the property sheets. Try to
# delegate back to the base implementation.
return BaseMemberData.getProperty(self, id, default)
def getPassword(self):
"""Returns None. Present to avoid NotImplementedError."""
return None
## IManageCapabilities methods
def canDelete(self):
"""True iff user can be removed from the Plone UI."""
# IUserManagement provides doDeleteUser
plugins = self._getPlugins()
managers = plugins.listPlugins(IUserManagement)
for mid, manager in managers:
if (IDeleteCapability.providedBy(manager) and
manager.allowDeletePrincipal(self.getId())):
return True
return False
def canPasswordSet(self):
"""True iff user can change password."""
# IUserManagement provides doChangeUser
plugins = self._getPlugins()
managers = plugins.listPlugins(IUserManagement)
for mid, manager in managers:
if (IPasswordSetCapability.providedBy(manager) and
manager.allowPasswordSet(self.getId())):
return True
return False
def passwordInClear(self):
"""True iff password can be retrieved in the clear (not hashed.)
False for PAS. It provides no API for getting passwords,
though it would be possible to add one in the future.
"""
return 0
def _memberdataHasProperty(self, prop_name):
mdata = getToolByName(self, 'portal_memberdata', None)
if mdata:
return mdata.hasProperty(prop_name)
return 0
def canWriteProperty(self, prop_name):
"""True iff the member/group property named in 'prop_name'
can be changed.
"""
if not IPluggableAuthService.providedBy(self.acl_users):
# not PAS; Memberdata is writable
return self._memberdataHasProperty(prop_name)
else:
# it's PAS
user = self.getUser()
sheets = getattr(user, 'getOrderedPropertySheets', lambda: None)()
if not sheets:
return self._memberdataHasProperty(prop_name)
for sheet in sheets:
if not sheet.hasProperty(prop_name):
continue
if IMutablePropertySheet.providedBy(sheet):
# BBB for plugins implementing an older version of IMutablePropertySheet
if hasattr(sheet, 'canWriteProperty'):
return sheet.canWriteProperty(user, prop_name)
return True
else:
break # shadowed by read-only
return False
def canAddToGroup(self, group_id):
"""True iff member can be added to group."""
# IGroupManagement provides IGroupCapability
plugins = self._getPlugins()
managers = plugins.listPlugins(IGroupManagement)
for mid, manager in managers:
if (IGroupCapability.providedBy(manager) and
manager.allowGroupAdd(self.getId(), group_id)):
return True
return False
def canRemoveFromGroup(self, group_id):
"""True iff member can be removed from group."""
# IGroupManagement provides IGroupCapability
plugins = self._getPlugins()
managers = plugins.listPlugins(IGroupManagement)
for mid, manager in managers:
if (IGroupCapability.providedBy(manager) and
manager.allowGroupRemove(self.getId(), group_id)):
return True
return False
def canAssignRole(self, role_id):
"""True iff member can be assigned role. Role id is string."""
# IRoleAssignerPlugin provides IAssignRoleCapability
plugins = self._getPlugins()
managers = plugins.listPlugins(IRoleAssignerPlugin)
for mid, manager in managers:
if (IAssignRoleCapability.providedBy(manager) and
manager.allowRoleAssign(self.getId(), role_id)):
return True
return False
## plugin getters
security.declarePrivate('_getPlugins')
def _getPlugins(self):
return self.acl_users.plugins
InitializeClass(MemberData)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment