[Zope-Checkins] CVS: Zope3/lib/python/Zope/App/Security/tests - testProtectClass.py:1.1.2.10.6.1 testSecurityDirectives.py:1.1.2.13.6.1 testZSP.py:1.1.2.11.2.1 RolePermissionManager.py:NONE testAttributePrincipalPermissionManager.py:NONE testAttributePrincipalRoleManager.py:NONE testAttributeRolePermissionManager.py:NONE testPrincipalPermissionManager.py:NONE testPrincipalPermissionView.py:NONE testPrincipalRoleManager.py:NONE testPrincipalRoleView.py:NONE testRolePermissionManager.py:NONE testRolePermissionView.py:NONE testSettings.py:NONE
Casey Duncan
casey@zope.com
Tue, 9 Apr 2002 12:37:15 -0400
Update of /cvs-repository/Zope3/lib/python/Zope/App/Security/tests
In directory cvs.zope.org:/tmp/cvs-serv11768/Zope/App/Security/tests
Modified Files:
Tag: casey-security-reorg-branch
testProtectClass.py testSecurityDirectives.py testZSP.py
Removed Files:
Tag: casey-security-reorg-branch
RolePermissionManager.py
testAttributePrincipalPermissionManager.py
testAttributePrincipalRoleManager.py
testAttributeRolePermissionManager.py
testPrincipalPermissionManager.py
testPrincipalPermissionView.py testPrincipalRoleManager.py
testPrincipalRoleView.py testRolePermissionManager.py
testRolePermissionView.py testSettings.py
Log Message:
Mass checkin for security reorganization branch. I will retest this and merge
upon BDFL approval...
=== Zope3/lib/python/Zope/App/Security/tests/testProtectClass.py 1.1.2.10 => 1.1.2.10.6.1 ===
def defineDirectives():
xmlconfig(StringIO("""
- <zopeConfigure xmlns='http://namespaces.zope.org/zope'
- xmlns:security='http://namespaces.zope.org/security'>
+ <zopeConfigure xmlns="http://namespaces.zope.org/zope"
+ xmlns:security="http://namespaces.zope.org/security">
<directive namespace="http://namespaces.zope.org/security"
name="permission"
attributes="permission_id, title, description"
=== Zope3/lib/python/Zope/App/Security/tests/testSecurityDirectives.py 1.1.2.13 => 1.1.2.13.6.1 ===
from Zope.App.Security.PrincipalRegistry import principalRegistry
from Zope.App.Security.PermissionRegistry \
- import permissionRegistry as pregistry
+ import permissionRegistry as pregistry
from Zope.App.Security.RoleRegistry import roleRegistry as rregistry
-from Zope.App.Security.RolePermissionManager \
- import rolePermissionManager as role_perm_mgr
-from Zope.App.Security.PrincipalPermissionManager \
- import principalPermissionManager as principal_perm_mgr
-from Zope.App.Security.PrincipalRoleManager \
- import principalRoleManager as principal_role_mgr
-from Zope.App.Security.Settings import Allow, Deny, Unset, Remove, Assign
+from Zope.App.Security.Management.GlobalRolePermissions \
+ import rolePermissionsManager as role_perm_mgr
+from Zope.App.Security.Management.GlobalPrincipalPermissions \
+ import principalPermissionsManager as principal_perm_mgr
+from Zope.App.Security.Management.GlobalPrincipalRoles \
+ import principalRolesManager as principal_role_mgr
+from Zope.App.Security.Management.Settings import Allow, Deny, Unset, Remove, Assign
def configfile(s):
return StringIO("""<zopeConfigure
=== Zope3/lib/python/Zope/App/Security/tests/testZSP.py 1.1.2.11 => 1.1.2.11.2.1 ===
from Zope.ContextWrapper import Wrapper
from Zope.ComponentArchitecture import provideAdapter
-from Zope.App.Security.IRolePermissionManager import IRolePermissionManager
+from Zope.App.Security.Management.IRolePermissions \
+ import IRolePermissionsManager
from Zope.App.Security.PermissionRegistry import permissionRegistry
from Zope.App.Security.PrincipalRegistry import principalRegistry
from Zope.App.Security.RoleRegistry import roleRegistry
-from Zope.App.Security.PrincipalPermissionManager \
- import principalPermissionManager
-from Zope.App.Security.RolePermissionManager import rolePermissionManager
-from Zope.App.Security.PrincipalRoleManager import principalRoleManager
-from Zope.App.Security.AttributePrincipalPermissionManager \
- import AttributePrincipalPermissionManager
-from Zope.App.Security.PrincipalPermissionManager \
- import PrincipalPermissionManager
-from Zope.App.Security.IPrincipalPermissionManager \
- import IPrincipalPermissionManager
-from Zope.App.Security.AttributePrincipalRoleManager \
- import AttributePrincipalRoleManager
-from Zope.App.Security.PrincipalRoleManager \
- import PrincipalRoleManager
-from Zope.App.Security.AttributeRolePermissionManager \
- import AttributeRolePermissionManager
-from Zope.App.Security.IPrincipalRoleManager import IPrincipalRoleManager
+from Zope.App.Security.Management.GlobalPrincipalPermissions \
+ import principalPermissionsManager
+from Zope.App.Security.Management.GlobalRolePermissions \
+ import rolePermissionsManager
+from Zope.App.Security.Management.GlobalPrincipalRoles \
+ import principalRolesManager
+from Zope.App.Security.Management.MementoPrincipalPermissions \
+ import MementoPrincipalPermissionsManager
+from Zope.App.Security.Management.GlobalPrincipalPermissions \
+ import principalPermissionsManager
+from Zope.App.Security.Management.IPrincipalPermissions \
+ import IPrincipalPermissionsManager
+from Zope.App.Security.Management.MementoPrincipalRoles \
+ import MementoPrincipalRolesManager
+from Zope.App.Security.Management.MementoRolePermissions \
+ import MementoRolePermissionsManager
+from Zope.App.Security.Management.IPrincipalRoles \
+ import IPrincipalRolesManager
from Zope.Exceptions import Unauthorized, Forbidden
from Zope.App.OFS.Memento.IAttributeMementoStorable \
import IAttributeMementoStorable
@@ -95,13 +97,13 @@
arole = roleRegistry.defineRole('Another', 'Another Role')
self.arole = arole.getId()
- rolePermissionManager.grantPermissionToRole(self.read, self.peon)
+ rolePermissionsManager.grantPermissionToRole(self.read, self.peon)
- rolePermissionManager.grantPermissionToRole(self.read, self.manager)
- rolePermissionManager.grantPermissionToRole(self.write, self.manager)
+ rolePermissionsManager.grantPermissionToRole(self.read, self.manager)
+ rolePermissionsManager.grantPermissionToRole(self.write, self.manager)
- principalRoleManager.assignRoleToPrincipal(self.peon, self.jim)
- principalRoleManager.assignRoleToPrincipal(self.manager, self.tim)
+ principalRolesManager.assignRoleToPrincipal(self.peon, self.jim)
+ principalRolesManager.assignRoleToPrincipal(self.manager, self.tim)
self.policy = self._makePolicy()
@@ -131,21 +133,21 @@
self.policy.checkPermission(
self.read, None, Context(self.unknown)))
- rolePermissionManager.grantPermissionToRole(self.read, 'Anonymous')
+ rolePermissionsManager.grantPermissionToRole(self.read, 'Anonymous')
self.failUnless(
self.policy.checkPermission(
self.read, None, Context(self.unknown)))
- principalPermissionManager.grantPermissionToPrincipal(
+ principalPermissionsManager.grantPermissionToPrincipal(
self.write, self.jim)
self.failUnless(
self.policy.checkPermission(self.write, None, Context(self.jim)))
def testPlayfulRolePermissions(self):
- ARPM = AttributeRolePermissionManager
- provideAdapter(ITest, IRolePermissionManager, ARPM)
+ ARPM = MementoRolePermissionsManager
+ provideAdapter(ITest, IRolePermissionsManager, ARPM)
test = permissionRegistry.definePermission('test', 'Test', '')
test = test.getId()
@@ -165,11 +167,11 @@
self.failUnless(self.policy.checkPermission(
test, ob, Context(self.jim)))
# Make sure global principal permissions override placeful role perms
- principalPermissionManager.denyPermissionToPrincipal(
+ principalPermissionsManager.denyPermissionToPrincipal(
test, self.jim)
self.failIf(self.policy.checkPermission(
test, ob, Context(self.jim)))
- principalPermissionManager.unsetPermissionForPrincipal(
+ principalPermissionsManager.unsetPermissionForPrincipal(
test, self.jim)
# Make sure multiple conflicting role permissions resolve correctly
ARPM(ob2).grantPermissionToRole(test, 'Anonymous')
@@ -179,14 +181,14 @@
new = principalRegistry.definePrincipal('new', 'Newbie',
'Newbie User', 'new', '098')
new = new.getId()
- principalRoleManager.assignRoleToPrincipal(self.arole, new)
+ principalRolesManager.assignRoleToPrincipal(self.arole, new)
self.failUnless(self.policy.checkPermission(test, ob, Context(new)))
- principalRoleManager.assignRoleToPrincipal(self.peon, new)
+ principalRolesManager.assignRoleToPrincipal(self.peon, new)
self.failIf(self.policy.checkPermission(test, ob, Context(new)))
def testPlayfulPrinciplePermissions(self):
- APPM = AttributePrincipalPermissionManager
- provideAdapter(ITest, IPrincipalPermissionManager, APPM)
+ APPM = MementoPrincipalPermissionsManager
+ provideAdapter(ITest, IPrincipalPermissionsManager, APPM)
ob1 = TestClass()
ob2 = TestClass()
@@ -212,11 +214,11 @@
Context(self.jim)))
# make sure placeful principal permissions override global ones
APPM(ob).grantPermissionToPrincipal(test, self.tim)
- principalPermissionManager.denyPermissionToPrincipal(
+ principalPermissionsManager.denyPermissionToPrincipal(
test, self.tim)
self.failUnless(self.policy.checkPermission(test, ob,
Context(self.tim)))
- principalPermissionManager.unsetPermissionForPrincipal(
+ principalPermissionsManager.unsetPermissionForPrincipal(
test, self.tim)
@@ -234,11 +236,11 @@
self.policy.validate,
'x', Protected(self.write), Context(self.unknown))
- rolePermissionManager.grantPermissionToRole(self.read, 'Anonymous')
+ rolePermissionsManager.grantPermissionToRole(self.read, 'Anonymous')
self.policy.validate('_', Protected(self.read), Context(self.unknown))
- principalPermissionManager.grantPermissionToPrincipal(self.write,
+ principalPermissionsManager.grantPermissionToPrincipal(self.write,
self.jim)
self.policy.validate('_', Protected(self.write), Context(self.jim))
=== Removed File Zope3/lib/python/Zope/App/Security/tests/RolePermissionManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testAttributePrincipalPermissionManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testAttributePrincipalRoleManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testAttributeRolePermissionManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testPrincipalPermissionManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testPrincipalPermissionView.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testPrincipalRoleManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testPrincipalRoleView.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testRolePermissionManager.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testRolePermissionView.py ===
=== Removed File Zope3/lib/python/Zope/App/Security/tests/testSettings.py ===