Commit d888bbc5 authored by Shane Hathaway's avatar Shane Hathaway

Folded in the functionality of the VerboseSecurity product.

This was also done on Zope-2_8-branch.

- Added the "verbose-security" option in zope.conf.

- Changed the Python security policy implementation to emit verbose
Unauthorized errors when verbose-security is enabled.

- Also, when verbose-security is enabled, computed roles include the
name of the permission from which the roles were derived, allowing the
security policy to reliably discover what permission is missing.

- Fixed tests that didn't pass when verbose security was enabled.

- Moved SimpleItem.__repr__ to a more basic class, where it should have
been all along.

See also:

http://mail.zope.org/pipermail/zope-dev/2005-June/025019.html
parent 9b99dbc5
...@@ -21,7 +21,7 @@ from Acquisition import aq_parent ...@@ -21,7 +21,7 @@ from Acquisition import aq_parent
from Acquisition import aq_inner from Acquisition import aq_inner
from Acquisition import aq_acquire from Acquisition import aq_acquire
from ExtensionClass import Base from ExtensionClass import Base
from zLOG import LOG, PROBLEM from zLOG import LOG, BLATHER, PROBLEM
# This is used when a permission maps explicitly to no permission. We # This is used when a permission maps explicitly to no permission. We
# try and get this from cAccessControl first to make sure that if both # try and get this from cAccessControl first to make sure that if both
...@@ -47,6 +47,13 @@ name_trans = string.maketrans(''.join(name_trans), '_' * len(name_trans)) ...@@ -47,6 +47,13 @@ name_trans = string.maketrans(''.join(name_trans), '_' * len(name_trans))
_default_roles = ('Manager',) _default_roles = ('Manager',)
# If _embed_permission_in_roles is enabled, computed __roles__
# attributes will often include a special role that encodes the name
# of the permission from which the roles were derived. This is useful
# for verbose security exceptions.
_embed_permission_in_roles = 0
def rolesForPermissionOn(perm, object, default=_default_roles, n=None): def rolesForPermissionOn(perm, object, default=_default_roles, n=None):
"""Return the roles that have the given permission on the given object """Return the roles that have the given permission on the given object
""" """
...@@ -57,14 +64,20 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None): ...@@ -57,14 +64,20 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None):
if hasattr(object, n): if hasattr(object, n):
roles = getattr(object, n) roles = getattr(object, n)
if roles is None: if roles is None:
if _embed_permission_in_roles:
return ('Anonymous', n)
return 'Anonymous', return 'Anonymous',
t = type(roles) t = type(roles)
if t is tuple: if t is tuple:
# If we get a tuple, then we don't acquire # If we get a tuple, then we don't acquire
if r is None: if r is None:
if _embed_permission_in_roles:
return roles + (n,)
return roles return roles
return r+list(roles) if _embed_permission_in_roles:
return r + list(roles) + [n]
return r + list(roles)
if t is str: if t is str:
# We found roles set to a name. Start over # We found roles set to a name. Start over
...@@ -78,7 +91,8 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None): ...@@ -78,7 +91,8 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None):
elif roles: elif roles:
if r is None: if r is None:
r = list(roles) r = list(roles)
else: r = r + list(roles) else:
r = r + list(roles)
object = getattr(object, 'aq_inner', None) object = getattr(object, 'aq_inner', None)
if object is None: if object is None:
...@@ -86,8 +100,18 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None): ...@@ -86,8 +100,18 @@ def rolesForPermissionOn(perm, object, default=_default_roles, n=None):
object = object.aq_parent object = object.aq_parent
if r is None: if r is None:
if _embed_permission_in_roles:
if default:
if isinstance(default, tuple):
return default + (n,)
else:
return default + [n]
else:
return [n]
return default return default
if _embed_permission_in_roles:
return r + [n]
return r return r
...@@ -173,10 +197,10 @@ from AccessControl.ZopeSecurityPolicy import getRoles # XXX ...@@ -173,10 +197,10 @@ from AccessControl.ZopeSecurityPolicy import getRoles # XXX
class ZopeSecurityPolicy: class ZopeSecurityPolicy:
def __init__(self, ownerous=1, authenticated=1): def __init__(self, ownerous=1, authenticated=1, verbose=0):
"""Create a Zope security policy. """Create a Zope security policy.
Two optional keyword arguments may be provided: Optional arguments may be provided:
ownerous -- Untrusted users can create code ownerous -- Untrusted users can create code
(e.g. Python scripts or templates), (e.g. Python scripts or templates),
...@@ -195,20 +219,28 @@ class ZopeSecurityPolicy: ...@@ -195,20 +219,28 @@ class ZopeSecurityPolicy:
scenario is a ZEO configuration in which some scenario is a ZEO configuration in which some
clients allow only public access and other clients allow only public access and other
clients allow full management. clients allow full management.
verbose -- Include debugging information in Unauthorized
exceptions. Not suitable for public sites.
""" """
self._ownerous = ownerous self._ownerous = ownerous
self._authenticated = authenticated self._authenticated = authenticated
self._verbose = verbose
def validate(self, accessed, container, name, value, context, def validate(self, accessed, container, name, value, context,
roles=_noroles, getattr=getattr, _noroles=_noroles, roles=_noroles, getattr=getattr, _noroles=_noroles,
valid_aq_=('aq_parent','aq_inner', 'aq_explicit')): valid_aq_=('aq_parent','aq_inner', 'aq_explicit')):
# Note: accessed is not used.
############################################################ ############################################################
# Provide special rules for the acquisition attributes # Provide special rules for the acquisition attributes
if isinstance(name, str): if isinstance(name, str):
if name.startswith('aq_') and name not in valid_aq_: if name.startswith('aq_') and name not in valid_aq_:
if self._verbose:
raiseVerbose(
'aq_* names (other than %s) are not allowed'
% ', '.join(valid_aq_),
accessed, container, name, value, context
)
raise Unauthorized(name, value) raise Unauthorized(name, value)
containerbase = aq_base(container) containerbase = aq_base(container)
...@@ -238,6 +270,10 @@ class ZopeSecurityPolicy: ...@@ -238,6 +270,10 @@ class ZopeSecurityPolicy:
# Either container or a list of roles is required # Either container or a list of roles is required
# for ZopeSecurityPolicy to know whether access is # for ZopeSecurityPolicy to know whether access is
# allowable. # allowable.
if self._verbose:
raiseVerbose(
'No container provided',
accessed, container, name, value, context)
raise Unauthorized(name, value) raise Unauthorized(name, value)
roles = getattr(container, '__roles__', roles) roles = getattr(container, '__roles__', roles)
...@@ -245,12 +281,22 @@ class ZopeSecurityPolicy: ...@@ -245,12 +281,22 @@ class ZopeSecurityPolicy:
if containerbase is container: if containerbase is container:
# Container is not wrapped. # Container is not wrapped.
if containerbase is not accessedbase: if containerbase is not accessedbase:
if self._verbose:
raiseVerbose(
'Unable to find __roles__ in the container '
'and the container is not wrapped',
accessed, container, name, value, context)
raise Unauthorized(name, value) raise Unauthorized(name, value)
else: else:
# Try to acquire roles # Try to acquire roles
try: roles = container.aq_acquire('__roles__') try: roles = container.aq_acquire('__roles__')
except AttributeError: except AttributeError:
if containerbase is not accessedbase: if containerbase is not accessedbase:
if self._verbose:
raiseVerbose(
'Unable to find or acquire __roles__ '
'from the container',
accessed, container, name, value, context)
raise Unauthorized(name, value) raise Unauthorized(name, value)
# We need to make sure that we are allowed to # We need to make sure that we are allowed to
...@@ -276,6 +322,10 @@ class ZopeSecurityPolicy: ...@@ -276,6 +322,10 @@ class ZopeSecurityPolicy:
p = p(name, value) p = p(name, value)
if not p: if not p:
if self._verbose:
raiseVerbose(
'The container has no security assertions',
accessed, container, name, value, context)
raise Unauthorized(name, value) raise Unauthorized(name, value)
if roles is _noroles: if roles is _noroles:
...@@ -307,6 +357,26 @@ class ZopeSecurityPolicy: ...@@ -307,6 +357,26 @@ class ZopeSecurityPolicy:
if (owner is not None) and not owner.allowed(value, roles): if (owner is not None) and not owner.allowed(value, roles):
# We don't want someone to acquire if they can't # We don't want someone to acquire if they can't
# get an unacquired! # get an unacquired!
if self._verbose:
if len(roles) < 1:
raiseVerbose(
"The object is marked as private",
accessed, container, name, value, context)
elif userHasRolesButNotInContext(owner, value, roles):
raiseVerbose(
"The owner of the executing script is defined "
"outside the context of the object being "
"accessed",
accessed, container, name, value, context,
required_roles=roles, eo_owner=owner, eo=eo)
else:
raiseVerbose(
"The owner of the executing script does not "
"have the required permission",
accessed, container, name, value, context,
required_roles=roles, eo_owner=owner, eo=eo,
eo_owner_roles=getUserRolesInContext(
owner, value))
raise Unauthorized(name, value) raise Unauthorized(name, value)
# Proxy roles, which are a lot safer now. # Proxy roles, which are a lot safer now.
...@@ -324,6 +394,16 @@ class ZopeSecurityPolicy: ...@@ -324,6 +394,16 @@ class ZopeSecurityPolicy:
if not owner._check_context(container): if not owner._check_context(container):
# container is higher up than the owner, # container is higher up than the owner,
# deny access # deny access
if self._verbose:
raiseVerbose(
"The owner of the executing script is "
"defined outside the context of the "
"object being accessed. The script has "
"proxy roles, but they do not apply in "
"this context.",
accessed, container, name, value, context,
required_roles=roles, eo_owner=owner,
eo=eo)
raise Unauthorized(name, value) raise Unauthorized(name, value)
for r in proxy_roles: for r in proxy_roles:
...@@ -331,6 +411,18 @@ class ZopeSecurityPolicy: ...@@ -331,6 +411,18 @@ class ZopeSecurityPolicy:
return 1 return 1
# Proxy roles actually limit access! # Proxy roles actually limit access!
if self._verbose:
if len(roles) < 1:
raiseVerbose(
"The object is marked as private",
accessed, container, name, value, context)
else:
raiseVerbose(
"The proxy roles set on the executing script "
"do not allow access",
accessed, container, name, value, context,
eo=eo, eo_proxy_roles=proxy_roles,
required_roles=roles)
raise Unauthorized(name, value) raise Unauthorized(name, value)
try: try:
...@@ -339,6 +431,29 @@ class ZopeSecurityPolicy: ...@@ -339,6 +431,29 @@ class ZopeSecurityPolicy:
except AttributeError: except AttributeError:
pass pass
if self._verbose:
if len(roles) < 1:
raiseVerbose(
"The object is marked as private",
accessed, container, name, value, context)
elif not self._authenticated:
raiseVerbose(
"Authenticated access is not allowed by this "
"security policy",
accessed, container, name, value, context)
elif userHasRolesButNotInContext(context.user, value, roles):
raiseVerbose(
"Your user account is defined outside "
"the context of the object being accessed",
accessed, container, name, value, context,
required_roles=roles, user=context.user)
else:
raiseVerbose(
"Your user account does not "
"have the required permission",
accessed, container, name, value, context,
required_roles=roles, user=context.user,
user_roles=getUserRolesInContext(context.user, value))
raise Unauthorized(name, value) raise Unauthorized(name, value)
def checkPermission(self, permission, object, context): def checkPermission(self, permission, object, context):
...@@ -360,13 +475,16 @@ class ZopeSecurityPolicy: ...@@ -360,13 +475,16 @@ class ZopeSecurityPolicy:
try: max_stack_size = int(os.environ.get('Z_MAX_STACK_SIZE','100')) try: max_stack_size = int(os.environ.get('Z_MAX_STACK_SIZE','100'))
except: max_stack_size = 100 except: max_stack_size = 100
def setDefaultBehaviors(ownerous, authenticated): def setDefaultBehaviors(ownerous, authenticated, verbose):
global _defaultPolicy global _defaultPolicy
global _embed_permission_in_roles
_defaultPolicy = ZopeSecurityPolicy( _defaultPolicy = ZopeSecurityPolicy(
ownerous=ownerous, ownerous=ownerous,
authenticated=authenticated) authenticated=authenticated,
verbose=verbose)
_embed_permission_in_roles = verbose
setDefaultBehaviors(True, True) setDefaultBehaviors(True, True, False)
class SecurityManager: class SecurityManager:
...@@ -575,3 +693,139 @@ def guarded_getattr(inst, name, default=_marker): ...@@ -575,3 +693,139 @@ def guarded_getattr(inst, name, default=_marker):
aq_acquire(inst, name, aq_validate, validate) aq_acquire(inst, name, aq_validate, validate)
return v return v
# Helpers for verbose authorization exceptions
# --------------------------------------------
def item_repr(ob):
"""Generates a repr without angle brackets (to avoid HTML quoting)"""
return repr(ob).replace('<', '(').replace('>', ')')
def simplifyRoles(roles):
"""Sorts and removes duplicates from a role list."""
d = {}
for r in roles:
d[r] = 1
lst = d.keys()
lst.sort()
return lst
def raiseVerbose(msg, accessed, container, name, value, context,
required_roles=None,
user_roles=None,
user=None,
eo=None,
eo_owner=None,
eo_owner_roles=None,
eo_proxy_roles=None,
):
"""Raises an Unauthorized error with a verbose explanation."""
s = '%s. Access to %s of %s' % (
msg, repr(name), item_repr(container))
if aq_base(container) is not aq_base(accessed):
s += ', acquired through %s,' % item_repr(accessed)
info = [s + ' denied.']
if user is not None:
try:
ufolder = '/'.join(aq_parent(aq_inner(user)).getPhysicalPath())
except:
ufolder = '(unknown)'
info.append('Your user account, %s, exists at %s.' % (
str(user), ufolder))
if required_roles is not None:
p = None
required_roles = list(required_roles)
for r in required_roles:
if r.startswith('_') and r.endswith('_Permission'):
p = r[1:]
required_roles.remove(r)
break
sr = simplifyRoles(required_roles)
if p:
# got a permission name
info.append('Access requires %s, '
'granted to the following roles: %s.' %
(p, sr))
else:
# permission name unknown
info.append('Access requires one of the following roles: %s.'
% sr)
if user_roles is not None:
info.append(
'Your roles in this context are %s.' % simplifyRoles(user_roles))
if eo is not None:
s = 'The executing script is %s' % item_repr(eo)
if eo_proxy_roles is not None:
s += ', with proxy roles: %s' % simplifyRoles(eo_proxy_roles)
if eo_owner is not None:
s += ', owned by %s' % repr(eo_owner)
if eo_owner_roles is not None:
s += ', who has the roles %s' % simplifyRoles(eo_owner_roles)
info.append(s + '.')
text = ' '.join(info)
LOG('Zope Security Policy', BLATHER, 'Unauthorized: %s' % text)
raise Unauthorized(text)
def getUserRolesInContext(user, context):
"""Returns user roles for a context."""
if hasattr(aq_base(user), 'getRolesInContext'):
return user.getRolesInContext(context)
else:
return ()
def userHasRolesButNotInContext(user, object, object_roles):
'''Returns 1 if the user has any of the listed roles but
is not defined in a context which is not an ancestor of object.
'''
if object_roles is None or 'Anonymous' in object_roles:
return 0
usr_roles = getUserRolesInContext(user, object)
for role in object_roles:
if role in usr_roles:
# User has the roles.
return (not verifyAcquisitionContext(
user, object, object_roles))
return 0
def verifyAcquisitionContext(user, object, object_roles=None):
"""Mimics the relevant section of User.allowed().
Returns true if the object is in the context of the user's user folder.
"""
ufolder = aq_parent(user)
ucontext = aq_parent(ufolder)
if ucontext is not None:
if object is None:
# This is a strange rule, though
# it doesn't cause any security holes. SDH
return 1
if not hasattr(object, 'aq_inContextOf'):
if hasattr(object, 'im_self'):
# This is a method. Grab its self.
object=object.im_self
if not hasattr(object, 'aq_inContextOf'):
# object is not wrapped, therefore we
# can't determine context.
# Fail the access attempt. Otherwise
# this would be a security hole.
return None
if not object.aq_inContextOf(ucontext, 1):
if 'Shared' in object_roles:
# Old role setting. Waaa
object_roles=user._shared_roles(object)
if 'Anonymous' in object_roles:
return 1
return None
# Note that if the user were not wrapped, it would
# not be possible to determine the user's context
# and this method would return 1.
# However, as long as user folders always return
# wrapped user objects, this is safe.
return 1
...@@ -2254,9 +2254,18 @@ static PyObject * ...@@ -2254,9 +2254,18 @@ static PyObject *
module_setDefaultBehaviors(PyObject *ignored, PyObject *args) module_setDefaultBehaviors(PyObject *ignored, PyObject *args)
{ {
PyObject *result = NULL; PyObject *result = NULL;
int own, auth; int own, auth, verbose;
if (PyArg_ParseTuple(args, "ii:setDefaultBehaviors", &own, &auth)) { if (PyArg_ParseTuple(args, "iii:setDefaultBehaviors", &own, &auth,
&verbose)) {
if (verbose) {
PyErr_SetString(PyExc_NotImplementedError,
"This security policy implementation does not implement "
"the verbose option. To enable verbose security "
"exceptions, add 'security-policy-implementation "
"python' to etc/zope.conf.");
return NULL;
}
ownerous = own; ownerous = own;
authenticated = authenticated; authenticated = authenticated;
result = Py_None; result = Py_None;
......
...@@ -61,7 +61,8 @@ class ClassSecurityInfoTests(unittest.TestCase): ...@@ -61,7 +61,8 @@ class ClassSecurityInfoTests(unittest.TestCase):
# correctly. Note that this uses carnal knowledge of the internal # correctly. Note that this uses carnal knowledge of the internal
# structures used to store this information! # structures used to store this information!
object = Test() object = Test()
imPermissionRole = object.foo__roles__ imPermissionRole = [r for r in object.foo__roles__
if not r.endswith('_Permission')]
self.failUnless(len(imPermissionRole) == 4) self.failUnless(len(imPermissionRole) == 4)
for item in ('Manager', 'Role A', 'Role B', 'Role C'): for item in ('Manager', 'Role A', 'Role B', 'Role C'):
......
...@@ -63,6 +63,11 @@ def assertPRoles(ob, permission, expect): ...@@ -63,6 +63,11 @@ def assertPRoles(ob, permission, expect):
assert roles == roles2 or tuple(roles) == tuple(roles2), ( assert roles == roles2 or tuple(roles) == tuple(roles2), (
'Different methods of checking roles computed unequal results') 'Different methods of checking roles computed unequal results')
same = 0 same = 0
if roles:
# When verbose security is enabled, permission names are
# embedded in the computed roles. Remove the permission
# names.
roles = [r for r in roles if not r.endswith('_Permission')]
if roles is None or expect is None: if roles is None or expect is None:
if (roles is None or tuple(roles) == ('Anonymous',)) and ( if (roles is None or tuple(roles) == ('Anonymous',)) and (
expect is None or tuple(expect) == ('Anonymous',)): expect is None or tuple(expect) == ('Anonymous',)):
......
...@@ -316,6 +316,28 @@ class Item(Base, Resource, CopySource, App.Management.Tabs, Traversable, ...@@ -316,6 +316,28 @@ class Item(Base, Resource, CopySource, App.Management.Tabs, Traversable,
def __len__(self): def __len__(self):
return 1 return 1
def __repr__(self):
"""Show the physical path of the object and its context if available.
"""
try:
path = '/'.join(self.getPhysicalPath())
except:
return Base.__repr__(self)
context_path = None
context = aq_parent(self)
container = aq_parent(aq_inner(self))
if aq_base(context) is not aq_base(container):
try:
context_path = '/'.join(context.getPhysicalPath())
except:
context_path = None
res = '<%s' % self.__class__.__name__
res += ' at %s' % path
if context_path:
res += ' used for %s' % context_path
res += '>'
return res
Globals.default__class_init__(Item) Globals.default__class_init__(Item)
...@@ -383,27 +405,3 @@ class SimpleItem(Item, Globals.Persistent, ...@@ -383,27 +405,3 @@ class SimpleItem(Item, Globals.Persistent,
__ac_permissions__=(('View', ()),) __ac_permissions__=(('View', ()),)
def __repr__(self):
"""Show the physical path of the object and its context if available.
"""
try:
path = '/'.join(self.getPhysicalPath())
except:
path = None
context_path = None
context = aq_parent(self)
container = aq_parent(aq_inner(self))
if aq_base(context) is not aq_base(container):
try:
context_path = '/'.join(context.getPhysicalPath())
except:
context_path = None
res = '<%s' % self.__class__.__name__
if path:
res += ' at %s' % path
else:
res += ' at 0x%x' % id(self)
if context_path:
res += ' used for %s' % context_path
res += '>'
return res
...@@ -30,6 +30,19 @@ from Products.Five.tests.dummy import Dummy1, Dummy2 ...@@ -30,6 +30,19 @@ from Products.Five.tests.dummy import Dummy1, Dummy2
from Globals import InitializeClass from Globals import InitializeClass
def assertRolesEqual(actual, expect):
if actual:
# filter out embedded permissions, which appear when
# verbose security is enabled
filtered = [r for r in actual if not r.endswith('_Permission')]
if isinstance(actual, tuple):
actual = tuple(filtered)
else:
actual = filtered
if actual != expect:
raise AssertionError('%s != %s' % (repr(actual), repr(expect)))
class PageSecurityTest(FiveTestCase): class PageSecurityTest(FiveTestCase):
def test_page_security(self): def test_page_security(self):
...@@ -65,7 +78,7 @@ class PageSecurityTest(FiveTestCase): ...@@ -65,7 +78,7 @@ class PageSecurityTest(FiveTestCase):
view_roles = getattr(view, '__roles__', None) view_roles = getattr(view, '__roles__', None)
self.failIf(view_roles is None) self.failIf(view_roles is None)
self.failIf(view_roles == ()) self.failIf(view_roles == ())
self.assertEquals(view_roles, ('Manager',)) assertRolesEqual(view_roles, ('Manager',))
class SecurityEquivalenceTest(FiveTestCase): class SecurityEquivalenceTest(FiveTestCase):
...@@ -109,29 +122,29 @@ class SecurityEquivalenceTest(FiveTestCase): ...@@ -109,29 +122,29 @@ class SecurityEquivalenceTest(FiveTestCase):
self.assertEquals(ac1, ac2) self.assertEquals(ac1, ac2)
bar_roles1 = getattr(self.dummy1, 'bar__roles__').__of__(self.dummy1) bar_roles1 = getattr(self.dummy1, 'bar__roles__').__of__(self.dummy1)
self.assertEquals(bar_roles1.__of__(self.dummy1), ('Manager',)) assertRolesEqual(bar_roles1.__of__(self.dummy1), ('Manager',))
keg_roles1 = getattr(self.dummy1, 'keg__roles__').__of__(self.dummy1) keg_roles1 = getattr(self.dummy1, 'keg__roles__').__of__(self.dummy1)
self.assertEquals(keg_roles1.__of__(self.dummy1), ('Manager',)) assertRolesEqual(keg_roles1.__of__(self.dummy1), ('Manager',))
foo_roles1 = getattr(self.dummy1, 'foo__roles__') foo_roles1 = getattr(self.dummy1, 'foo__roles__')
self.assertEquals(foo_roles1, None) assertRolesEqual(foo_roles1, None)
# XXX Not yet supported. # XXX Not yet supported.
# baz_roles1 = getattr(self.dummy1, 'baz__roles__') # baz_roles1 = getattr(self.dummy1, 'baz__roles__')
# self.assertEquals(baz_roles1, ()) # self.assertEquals(baz_roles1, ())
bar_roles2 = getattr(self.dummy2, 'bar__roles__').__of__(self.dummy2) bar_roles2 = getattr(self.dummy2, 'bar__roles__').__of__(self.dummy2)
self.assertEquals(bar_roles2.__of__(self.dummy2), ('Manager',)) assertRolesEqual(bar_roles2.__of__(self.dummy2), ('Manager',))
keg_roles2 = getattr(self.dummy2, 'keg__roles__').__of__(self.dummy2) keg_roles2 = getattr(self.dummy2, 'keg__roles__').__of__(self.dummy2)
self.assertEquals(keg_roles2.__of__(self.dummy2), ('Manager',)) assertRolesEqual(keg_roles2.__of__(self.dummy2), ('Manager',))
foo_roles2 = getattr(self.dummy2, 'foo__roles__') foo_roles2 = getattr(self.dummy2, 'foo__roles__')
self.assertEquals(foo_roles2, None) assertRolesEqual(foo_roles2, None)
baz_roles2 = getattr(self.dummy2, 'baz__roles__') baz_roles2 = getattr(self.dummy2, 'baz__roles__')
self.assertEquals(baz_roles2, ()) assertRolesEqual(baz_roles2, ())
class CheckPermissionTest(FiveTestCase): class CheckPermissionTest(FiveTestCase):
......
...@@ -83,10 +83,12 @@ Anonymous users are usually not allowed to create new content: ...@@ -83,10 +83,12 @@ Anonymous users are usually not allowed to create new content:
Now simulate a browser request to add a 'C' instance with id 'z': Now simulate a browser request to add a 'C' instance with id 'z':
>>> request = {'id': 'z'} >>> request = {'id': 'z'}
>>> sandbox.manage_addProduct['test'].C_factory.index_html(request) >>> from zExceptions.unauthorized import Unauthorized
Traceback (most recent call last): >>> try:
... ... sandbox.manage_addProduct['test'].C_factory.index_html(request)
Unauthorized: You are not allowed to access 'C' in this context ... except Unauthorized:
... print 'not authorized'
not authorized
All right, allow the admin user to 'Add Cs': All right, allow the admin user to 'Add Cs':
......
...@@ -151,7 +151,8 @@ class ZopeStarter: ...@@ -151,7 +151,8 @@ class ZopeStarter:
self.cfg.security_policy_implementation) self.cfg.security_policy_implementation)
AccessControl.setDefaultBehaviors( AccessControl.setDefaultBehaviors(
not self.cfg.skip_ownership_checking, not self.cfg.skip_ownership_checking,
not self.cfg.skip_authentication_checking) not self.cfg.skip_authentication_checking,
self.cfg.verbose_security)
def setupLocale(self): def setupLocale(self):
# set a locale if one has been specified in the config # set a locale if one has been specified in the config
......
...@@ -621,6 +621,18 @@ ...@@ -621,6 +621,18 @@
<metadefault>off</metadefault> <metadefault>off</metadefault>
</key> </key>
<key name="verbose-security" datatype="boolean"
default="off">
<description>
Set this directive to 'on' to enable verbose security exceptions.
This can help you track down the reason for Unauthorized exceptions,
but it is not suitable for public sites because it may reveal
unnecessary information about the structure of your site. Only
works if security-policy-implementation is set to 'PYTHON'.
</description>
<metadefault>off</metadefault>
</key>
<key name="maximum-number-of-session-objects" datatype="integer" <key name="maximum-number-of-session-objects" datatype="integer"
default="1000" handler="maximum_number_of_session_objects"> default="1000" handler="maximum_number_of_session_objects">
<description> <description>
......
...@@ -500,12 +500,11 @@ instancehome $INSTANCE ...@@ -500,12 +500,11 @@ instancehome $INSTANCE
# Directive: security-policy-implementation # Directive: security-policy-implementation
# #
# Description: # Description:
# The default Zope security machinery is implemented in C. # The default Zope security machinery is implemented in C. Change
# Change this to "python" to use the Python version of the # this to "python" to use the Python version of the Zope security
# Zope security machinery. This impacts performance but # machinery. This setting may impact performance but is useful
# is useful for debugging purposes and required by Products such as # for debugging purposes. See also the "verbose-security" option
# VerboseSecurity, which need to "monkey-patch" the security # below.
# machinery.
# #
# Default: C # Default: C
# #
...@@ -543,6 +542,24 @@ instancehome $INSTANCE ...@@ -543,6 +542,24 @@ instancehome $INSTANCE
# skip-ownership-checking on # skip-ownership-checking on
# Directive: verbose-security
#
# Description:
# By default, Zope reports authorization failures in a terse manner in
# order to avoid revealing unnecessary information. This option
# modifies the Zope security policy to report more information about
# the reason for authorization failures. It's designed for debugging.
# If you enable this option, you must also set the
# 'security-policy-implementation' to 'python'.
#
# Default: off
#
# Example:
#
# security-policy-implementation python
# verbose-security on
# Directive: maximum-number-of-session-objects # Directive: maximum-number-of-session-objects
# #
# Description: # Description:
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment