Skip to content

Commit

Permalink
Added back some unexpected dependencies for IAM. This really is a bug…
Browse files Browse the repository at this point in the history
…, there's no way gs/s3 should be required for iam.
  • Loading branch information
apetresc committed Dec 29, 2010
1 parent 3e38533 commit 1721b32
Show file tree
Hide file tree
Showing 34 changed files with 6,151 additions and 0 deletions.
22 changes: 22 additions & 0 deletions boto/gs/__init__.py
@@ -0,0 +1,22 @@
# Copyright 2010 Google Inc.
#
# Permission is hereby granted, free of charge, to any person obtaining a
# copy of this software and associated documentation files (the
# "Software"), to deal in the Software without restriction, including
# without limitation the rights to use, copy, modify, merge, publish, dis-
# tribute, sublicense, and/or sell copies of the Software, and to permit
# persons to whom the Software is furnished to do so, subject to the fol-
# lowing conditions:
#
# The above copyright notice and this permission notice shall be included
# in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
# IN THE SOFTWARE.
#

276 changes: 276 additions & 0 deletions boto/gs/acl.py
@@ -0,0 +1,276 @@
# Copyright 2010 Google Inc.
#
# Permission is hereby granted, free of charge, to any person obtaining a
# copy of this software and associated documentation files (the
# "Software"), to deal in the Software without restriction, including
# without limitation the rights to use, copy, modify, merge, publish, dis-
# tribute, sublicense, and/or sell copies of the Software, and to permit
# persons to whom the Software is furnished to do so, subject to the fol-
# lowing conditions:
#
# The above copyright notice and this permission notice shall be included
# in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
# IN THE SOFTWARE.

from boto.gs.user import User
from boto.exception import InvalidAclError

ACCESS_CONTROL_LIST = 'AccessControlList'
ALL_AUTHENTICATED_USERS = 'AllAuthenticatedUsers'
ALL_USERS = 'AllUsers'
DOMAIN = 'Domain'
EMAIL_ADDRESS = 'EmailAddress'
ENTRY = 'Entry'
ENTRIES = 'Entries'
GROUP_BY_DOMAIN = 'GroupByDomain'
GROUP_BY_EMAIL = 'GroupByEmail'
GROUP_BY_ID = 'GroupById'
ID = 'ID'
NAME = 'Name'
OWNER = 'Owner'
PERMISSION = 'Permission'
SCOPE = 'Scope'
TYPE = 'type'
USER_BY_EMAIL = 'UserByEmail'
USER_BY_ID = 'UserById'


CannedACLStrings = ['private', 'public-read',
'public-read-write', 'authenticated-read',
'bucket-owner-read', 'bucket-owner-full-control']

SupportedPermissions = ['READ', 'WRITE', 'FULL_CONTROL']

class ACL:

def __init__(self, parent=None):
self.parent = parent
self.entries = []

def __repr__(self):
# Owner is optional in GS ACLs.
if hasattr(self, 'owner'):
entries_repr = ['']
else:
entries_repr = ['Owner:%s' % self.owner.__repr__()]
acl_entries = self.entries
if acl_entries:
for e in acl_entries.entry_list:
entries_repr.append(e.__repr__())
return '<%s>' % ', '.join(entries_repr)

# Method with same signature as boto.s3.acl.ACL.add_email_grant(), to allow
# polymorphic treatment at application layer.
def add_email_grant(self, permission, email_address):
entry = Entry(type=USER_BY_EMAIL, email_address=email_address,
permission=permission)
self.entries.entry_list.append(entry)

# Method with same signature as boto.s3.acl.ACL.add_user_grant(), to allow
# polymorphic treatment at application layer.
def add_user_grant(self, permission, user_id):
entry = Entry(permission=permission, type=USER_BY_ID, id=user_id)
self.entries.entry_list.append(entry)

def add_group_email_grant(self, permission, email_address):
entry = Entry(type=GROUP_BY_EMAIL, email_address=email_address,
permission=permission)
self.entries.entry_list.append(entry)

def add_group_grant(self, permission, group_id):
entry = Entry(type=GROUP_BY_ID, id=group_id, permission=permission)
self.entries.entry_list.append(entry)

def startElement(self, name, attrs, connection):
if name == OWNER:
self.owner = User(self)
return self.owner
elif name == ENTRIES:
self.entries = Entries(self)
return self.entries
else:
return None

def endElement(self, name, value, connection):
if name == OWNER:
pass
elif name == ENTRIES:
pass
else:
setattr(self, name, value)

def to_xml(self):
s = '<%s>' % ACCESS_CONTROL_LIST
# Owner is optional in GS ACLs.
if hasattr(self, 'owner'):
s += self.owner.to_xml()
acl_entries = self.entries
if acl_entries:
s += acl_entries.to_xml()
s += '</%s>' % ACCESS_CONTROL_LIST
return s


class Entries:

def __init__(self, parent=None):
self.parent = parent
# Entries is the class that represents the same-named XML
# element. entry_list is the list within this class that holds the data.
self.entry_list = []

def __repr__(self):
entries_repr = []
for e in self.entry_list:
entries_repr.append(e.__repr__())
return '<Entries: %s>' % ', '.join(entries_repr)

def startElement(self, name, attrs, connection):
if name == ENTRY:
entry = Entry(self)
self.entry_list.append(entry)
return entry
else:
return None

def endElement(self, name, value, connection):
if name == ENTRY:
pass
else:
setattr(self, name, value)

def to_xml(self):
s = '<%s>' % ENTRIES
for entry in self.entry_list:
s += entry.to_xml()
s += '</%s>' % ENTRIES
return s


# Class that represents a single (Scope, Permission) entry in an ACL.
class Entry:

def __init__(self, scope=None, type=None, id=None, name=None,
email_address=None, domain=None, permission=None):
if not scope:
scope = Scope(self, type, id, name, email_address, domain)
self.scope = scope
self.permission = permission

def __repr__(self):
return '<%s: %s>' % (self.scope.__repr__(), self.permission.__repr__())

def startElement(self, name, attrs, connection):
if name == SCOPE:
if not TYPE in attrs:
raise InvalidAclError('Missing "%s" in "%s" part of ACL' %
(TYPE, SCOPE))
self.scope = Scope(self, attrs[TYPE])
return self.scope
elif name == PERMISSION:
pass
else:
return None

def endElement(self, name, value, connection):
if name == SCOPE:
pass
elif name == PERMISSION:
value = value.strip()
if not value in SupportedPermissions:
raise InvalidAclError('Invalid Permission "%s"' % value)
self.permission = value
else:
setattr(self, name, value)

def to_xml(self):
s = '<%s>' % ENTRY
s += self.scope.to_xml()
s += '<%s>%s</%s>' % (PERMISSION, self.permission, PERMISSION)
s += '</%s>' % ENTRY
return s

class Scope:

# Map from Scope type to list of allowed sub-elems.
ALLOWED_SCOPE_TYPE_SUB_ELEMS = {
ALL_AUTHENTICATED_USERS : [],
ALL_USERS : [],
GROUP_BY_DOMAIN : [DOMAIN],
GROUP_BY_EMAIL : [EMAIL_ADDRESS, NAME],
GROUP_BY_ID : [ID, NAME],
USER_BY_EMAIL : [EMAIL_ADDRESS, NAME],
USER_BY_ID : [ID, NAME]
}

def __init__(self, parent, type=None, id=None, name=None,
email_address=None, domain=None):
self.parent = parent
self.type = type
self.name = name
self.id = id
self.domain = domain
self.email_address = email_address
if not self.ALLOWED_SCOPE_TYPE_SUB_ELEMS.has_key(self.type):
raise InvalidAclError('Invalid %s %s "%s" ' %
(SCOPE, TYPE, self.type))

def __repr__(self):
named_entity = None
if self.id:
named_entity = self.id
elif self.email_address:
named_entity = self.email_address
elif self.domain:
named_entity = self.domain
if named_entity:
return '<%s: %s>' % (self.type, named_entity)
else:
return '<%s>' % self.type

def startElement(self, name, attrs, connection):
if not name in self.ALLOWED_SCOPE_TYPE_SUB_ELEMS[self.type]:
raise InvalidAclError('Element "%s" not allowed in %s %s "%s" ' %
(name, SCOPE, TYPE, self.type))
return None

def endElement(self, name, value, connection):
value = value.strip()
if name == DOMAIN:
self.domain = value
elif name == EMAIL_ADDRESS:
self.email_address = value
elif name == ID:
self.id = value
elif name == NAME:
self.name = value
else:
setattr(self, name, value)

def to_xml(self):
s = '<%s type="%s">' % (SCOPE, self.type)
if self.type == ALL_AUTHENTICATED_USERS or self.type == ALL_USERS:
pass
elif self.type == GROUP_BY_DOMAIN:
s += '<%s>%s</%s>' % (DOMAIN, self.domain, DOMAIN)
elif self.type == GROUP_BY_EMAIL or self.type == USER_BY_EMAIL:
s += '<%s>%s</%s>' % (EMAIL_ADDRESS, self.email_address,
EMAIL_ADDRESS)
if self.name:
s += '<%s>%s</%s>' % (NAME, self.name, NAME)
elif self.type == GROUP_BY_ID or self.type == USER_BY_ID:
s += '<%s>%s</%s>' % (ID, self.id, ID)
if self.name:
s += '<%s>%s</%s>' % (NAME, self.name, NAME)
else:
raise InvalidAclError('Invalid scope type "%s" ', self.type)

s += '</%s>' % SCOPE
return s

0 comments on commit 1721b32

Please sign in to comment.