[Checkins] SVN: AccessControl/trunk/src/AccessControl/SecurityInfo.py whitespace
Hano Schlichting
cvs-admin at zope.org
Sun May 20 14:38:02 UTC 2012
Log message for revision 126397:
whitespace
Changed:
U AccessControl/trunk/src/AccessControl/SecurityInfo.py
-=-
Modified: AccessControl/trunk/src/AccessControl/SecurityInfo.py
===================================================================
--- AccessControl/trunk/src/AccessControl/SecurityInfo.py 2012-05-19 21:03:39 UTC (rev 126396)
+++ AccessControl/trunk/src/AccessControl/SecurityInfo.py 2012-05-20 14:37:58 UTC (rev 126397)
@@ -51,16 +51,16 @@
LOG = getLogger('SecurityInfo')
-
# Security constants - these are imported into the AccessControl
# namespace and can be referenced as AccessControl.PUBLIC etc.
-ACCESS_NONE = _what_not_even_god_should_do
+ACCESS_NONE = _what_not_even_god_should_do
ACCESS_PRIVATE = ()
-ACCESS_PUBLIC = None
+ACCESS_PUBLIC = None
_marker = []
+
class SecurityInfo(Implicit):
"""Encapsulate security information."""
@@ -80,49 +80,49 @@
self._warnings = 1
self.names[name] = access
- declarePublic__roles__=ACCESS_PRIVATE
+ declarePublic__roles__ = ACCESS_PRIVATE
def declarePublic(self, name, *names):
"""Declare names to be publicly accessible."""
self._setaccess((name,) + names, ACCESS_PUBLIC)
- declarePrivate__roles__=ACCESS_PRIVATE
+ declarePrivate__roles__ = ACCESS_PRIVATE
def declarePrivate(self, name, *names):
"""Declare names to be inaccessible to restricted code."""
self._setaccess((name,) + names, ACCESS_PRIVATE)
- declareProtected__roles__=ACCESS_PRIVATE
+ declareProtected__roles__ = ACCESS_PRIVATE
def declareProtected(self, permission_name, name, *names):
"""Declare names to be associated with a permission."""
self._setaccess((name,) + names, permission_name)
- declareObjectPublic__roles__=ACCESS_PRIVATE
+ declareObjectPublic__roles__ = ACCESS_PRIVATE
def declareObjectPublic(self):
"""Declare the object to be publicly accessible."""
self._setaccess(('',), ACCESS_PUBLIC)
- declareObjectPrivate__roles__=ACCESS_PRIVATE
+ declareObjectPrivate__roles__ = ACCESS_PRIVATE
def declareObjectPrivate(self):
"""Declare the object to be inaccessible to restricted code."""
self._setaccess(('',), ACCESS_PRIVATE)
- declareObjectProtected__roles__=ACCESS_PRIVATE
+ declareObjectProtected__roles__ = ACCESS_PRIVATE
def declareObjectProtected(self, permission_name):
"""Declare the object to be associated with a permission."""
self._setaccess(('',), permission_name)
- public__roles__=ACCESS_PRIVATE
+ public__roles__ = ACCESS_PRIVATE
def public(self, func):
"""Decorate a function to be publicly accessible."""
self.declarePublic(self, func.__name__)
return func
- private__roles__=ACCESS_PRIVATE
+ private__roles__ = ACCESS_PRIVATE
def private(self, func):
"""Decorate a function to be inaccessible to restricted code."""
self.declarePrivate(self, func.__name__)
return func
- protected__roles__=ACCESS_PRIVATE
+ protected__roles__ = ACCESS_PRIVATE
def protected(self, permission_name):
"""Return a decorator to associate a function with a permission."""
# the decorator returned is remembered in a set and will
@@ -139,7 +139,7 @@
self._unused_protected_decorators.add(key)
return decor
- setPermissionDefault__roles__=ACCESS_PRIVATE
+ setPermissionDefault__roles__ = ACCESS_PRIVATE
def setPermissionDefault(self, permission_name, roles):
"""Declare default roles for a permission"""
rdict = {}
@@ -151,7 +151,7 @@
self._warnings = 1
self.roles[permission_name] = rdict
- setDefaultAccess__roles__=ACCESS_PRIVATE
+ setDefaultAccess__roles__ = ACCESS_PRIVATE
def setDefaultAccess(self, access):
"""Declare default attribute access policy.
@@ -237,6 +237,7 @@
LOG.warn('Class "%s" had conflicting '
'security declarations' % classobj.__name__)
+
class ClassSecurityInformation(ClassSecurityInfo):
# Default policy is disallow
access = 0
@@ -244,6 +245,7 @@
_moduleSecurity = {}
_appliedModuleSecurity = {}
+
def secureModule(mname, *imp):
modsec = _moduleSecurity.get(mname, None)
if modsec is None:
@@ -257,6 +259,7 @@
_appliedModuleSecurity[mname] = modsec
return module
+
def ModuleSecurityInfo(module_name=None):
if module_name is not None:
modsec = _moduleSecurity.get(module_name, None)
@@ -284,6 +287,7 @@
pmodsec.declarePublic(modname)
return _ModuleSecurityInfo(module_name)
+
class _ModuleSecurityInfo(SecurityInfo):
"""Encapsulate security information for modules."""
@@ -317,23 +321,24 @@
LOG.warn('Module "%s" had conflicting '
'security declarations' % dict['__name__'])
- declareProtected__roles__=ACCESS_PRIVATE
+ declareProtected__roles__ = ACCESS_PRIVATE
def declareProtected(self, permission_name, *names):
"""Cannot declare module names protected."""
pass
- declareObjectProtected__roles__=ACCESS_PRIVATE
+ declareObjectProtected__roles__ = ACCESS_PRIVATE
def declareObjectProtected(self, permission_name):
"""Cannot declare module protected."""
pass
- setDefaultRoles__roles__=ACCESS_PRIVATE
+ setDefaultRoles__roles__ = ACCESS_PRIVATE
def setDefaultRoles(self, permission_name, roles):
"""Cannot set default roles for permissions in a module."""
pass
# Handy little utility functions
+
def allow_module(module_name):
"""Allow a module and all its contents to be used from a
restricted Script. The argument module_name may be a simple
@@ -345,6 +350,7 @@
ModuleSecurityInfo(module_name[:dot]).setDefaultAccess(1)
dot = module_name.find('.', dot + 1)
+
def allow_class(Class):
"""Allow a class and all of its methods to be used from a
restricted Script. The argument Class must be a class."""
More information about the checkins
mailing list