[Zope-Checkins] CVS: Zope/lib/python/AccessControl - cAccessControl.c:1.9.2.1 cPermissionRole.py:1.1.2.1 cZopeSecurityPolicy.py:1.1.2.1 pPermissionRole.py:1.1.2.1 pZopeSecurityPolicy.py:1.1.2.1 Owned.py:1.11.20.1 PermissionRole.py:1.9.84.1 SecurityManagement.py:1.3.94.1 SecurityManager.py:1.4.36.1 Setup:1.7.190.1 User.py:1.152.8.1 ZopeGuards.py:1.4.6.1 ZopeSecurityPolicy.py:1.11.8.1

Shane Hathaway shane@digicool.com
Thu, 9 Aug 2001 13:34:02 -0400


Update of /cvs-repository/Zope/lib/python/AccessControl
In directory cvs.zope.org:/tmp/cvs-serv29115/lib/python/AccessControl

Modified Files:
      Tag: NR-branch
	Owned.py PermissionRole.py SecurityManagement.py 
	SecurityManager.py Setup User.py ZopeGuards.py 
	ZopeSecurityPolicy.py 
Added Files:
      Tag: NR-branch
	cAccessControl.c cPermissionRole.py cZopeSecurityPolicy.py 
	pPermissionRole.py pZopeSecurityPolicy.py 
Log Message:
Sync NR-branch with trunk.  Sorry about so many checkin messages...


=== Added File Zope/lib/python/AccessControl/cAccessControl.c ===
  <Binary-ish file>

=== Added File Zope/lib/python/AccessControl/cPermissionRole.py ===
##############################################################################
# 
# Zope Public License (ZPL) Version 1.0
# -------------------------------------
# 
# Copyright (c) Digital Creations.  All rights reserved.
# 
# This license has been certified as Open Source(tm).
# 
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# 
# 1. Redistributions in source code must retain the above copyright
#    notice, this list of conditions, and the following disclaimer.
# 
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions, and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
# 
# 3. Digital Creations requests that attribution be given to Zope
#    in any manner possible. Zope includes a "Powered by Zope"
#    button that is installed by default. While it is not a license
#    violation to remove this button, it is requested that the
#    attribution remain. A significant investment has been put
#    into Zope, and this effort will continue if the Zope community
#    continues to grow. This is one way to assure that growth.
# 
# 4. All advertising materials and documentation mentioning
#    features derived from or use of this software must display
#    the following acknowledgement:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    In the event that the product being advertised includes an
#    intact Zope distribution (with copyright and license included)
#    then this clause is waived.
# 
# 5. Names associated with Zope or Digital Creations must not be used to
#    endorse or promote products derived from this software without
#    prior written permission from Digital Creations.
# 
# 6. Modified redistributions of any form whatsoever must retain
#    the following acknowledgment:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    Intact (re-)distributions of any official Zope release do not
#    require an external acknowledgement.
# 
# 7. Modifications are encouraged but must be packaged separately as
#    patches to official Zope releases.  Distributions that do not
#    clearly separate the patches from the original work must be clearly
#    labeled as unofficial distributions.  Modifications which do not
#    carry the name Zope may be packaged in any form, as long as they
#    conform to all of the clauses above.
# 
# 
# Disclaimer
# 
#   THIS SOFTWARE IS PROVIDED BY DIGITAL CREATIONS ``AS IS'' AND ANY
#   EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
#   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
#   PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL DIGITAL CREATIONS OR ITS
#   CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
#   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
#   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
#   USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
#   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
#   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
#   OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
#   SUCH DAMAGE.
# 
# 
# This software consists of contributions made by Digital Creations and
# many individuals on behalf of Digital Creations.  Specific
# attributions are listed in the accompanying credits file.
# 
##############################################################################
__doc__='''Objects that implement Permission-based roles.


$Id: cPermissionRole.py,v 1.1.2.1 2001/08/09 17:33:29 shane Exp $'''
__version__='$Revision: 1.1.2.1 $'[11:-2]

import cAccessControl
rolesForPermissionOn=cAccessControl.rolesForPermissionOn
PermissionRole=cAccessControl.PermissionRole
imPermisionRole=cAccessControl.imPermissionRole
_what_not_even_god_should_do= cAccessControl._what_not_even_god_should_do

############################################################################## 
# Test functions:
#

def main():
    # The "main" program for this module

    import sys
    sys.path.append('/projects/_/ExtensionClass')

    from Acquisition import Implicit
    class I(Implicit):
        x__roles__=PermissionRole('x')
        y__roles__=PermissionRole('y')
        z__roles__=PermissionRole('z')
        def x(self): pass
        def y(self): pass
        def z(self): pass



    a=I()
    a.b=I()
    a.b.c=I()
    a.q=I()
    a.q._x_Permission=('foo',)
    a._y_Permission=('bar',)
    a._z_Permission=('zee',)
    a.b.c._y_Permission=('Manage',)
    a.b._z_Permission=['also']
    
    print a.x.__roles__, list(a.x.__roles__)
    print a.b.x.__roles__
    print a.b.c.x.__roles__
    print a.q.x.__roles__
    print a.b.q.x.__roles__
    print a.b.c.q.x.__roles__
    print
    
    print a.y.__roles__, list(a.y.__roles__)
    print a.b.y.__roles__
    print a.b.c.y.__roles__
    print a.q.y.__roles__
    print a.b.q.y.__roles__
    print a.b.c.q.y.__roles__
    print
    
    print a.z.__roles__, list(a.z.__roles__)
    print a.b.z.__roles__
    print a.b.c.z.__roles__
    print a.q.z.__roles__
    print a.b.q.z.__roles__
    print a.b.c.q.z.__roles__
    print


=== Added File Zope/lib/python/AccessControl/cZopeSecurityPolicy.py ===
#

from SimpleObjectPolicies import _noroles

import cAccessControl

ZopeSecurityPolicy = cAccessControl.ZopeSecurityPolicy




=== Added File Zope/lib/python/AccessControl/pPermissionRole.py ===
##############################################################################
# 
# Zope Public License (ZPL) Version 1.0
# -------------------------------------
# 
# Copyright (c) Digital Creations.  All rights reserved.
# 
# This license has been certified as Open Source(tm).
# 
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# 
# 1. Redistributions in source code must retain the above copyright
#    notice, this list of conditions, and the following disclaimer.
# 
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions, and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
# 
# 3. Digital Creations requests that attribution be given to Zope
#    in any manner possible. Zope includes a "Powered by Zope"
#    button that is installed by default. While it is not a license
#    violation to remove this button, it is requested that the
#    attribution remain. A significant investment has been put
#    into Zope, and this effort will continue if the Zope community
#    continues to grow. This is one way to assure that growth.
# 
# 4. All advertising materials and documentation mentioning
#    features derived from or use of this software must display
#    the following acknowledgement:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    In the event that the product being advertised includes an
#    intact Zope distribution (with copyright and license included)
#    then this clause is waived.
# 
# 5. Names associated with Zope or Digital Creations must not be used to
#    endorse or promote products derived from this software without
#    prior written permission from Digital Creations.
# 
# 6. Modified redistributions of any form whatsoever must retain
#    the following acknowledgment:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    Intact (re-)distributions of any official Zope release do not
#    require an external acknowledgement.
# 
# 7. Modifications are encouraged but must be packaged separately as
#    patches to official Zope releases.  Distributions that do not
#    clearly separate the patches from the original work must be clearly
#    labeled as unofficial distributions.  Modifications which do not
#    carry the name Zope may be packaged in any form, as long as they
#    conform to all of the clauses above.
# 
# 
# Disclaimer
# 
#   THIS SOFTWARE IS PROVIDED BY DIGITAL CREATIONS ``AS IS'' AND ANY
#   EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
#   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
#   PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL DIGITAL CREATIONS OR ITS
#   CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
#   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
#   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
#   USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
#   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
#   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
#   OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
#   SUCH DAMAGE.
# 
# 
# This software consists of contributions made by Digital Creations and
# many individuals on behalf of Digital Creations.  Specific
# attributions are listed in the accompanying credits file.
# 
##############################################################################
__doc__='''Objects that implement Permission-based roles.


$Id: pPermissionRole.py,v 1.1.2.1 2001/08/09 17:33:29 shane Exp $'''
__version__='$Revision: 1.1.2.1 $'[11:-2]

import sys

from ExtensionClass import Base

import string

name_trans=filter(lambda c, an=string.letters+string.digits+'_': c not in an,
                  map(chr,range(256)))
name_trans=string.maketrans(string.join(name_trans,''), '_'*len(name_trans))

def rolesForPermissionOn(perm, object, default=('Manager',)):
    """Return the roles that have the given permission on the given object
    """
    im=imPermissionRole()
    im._p='_'+string.translate(perm, name_trans)+"_Permission"
    im._d=default
    return im.__of__(object)
    

class PermissionRole(Base):
    """Implement permission-based roles.

    Under normal circumstances, our __of__ method will be
    called with an unwrapped object.  The result will then be called
    with a wrapped object, if the original object was wrapped.
    To deal with this, we have to create an intermediate object.
    
    """

    def __init__(self, name, default=('Manager',)):
        self.__name__=name
        self._p='_'+string.translate(name,name_trans)+"_Permission"
        self._d=default

    def __of__(self, parent, None=None, getattr=getattr):
        r=imPermissionRole()
        r._p=self._p
        r._pa=parent
        r._d=self._d
        p=getattr(parent, 'aq_inner', None)
        if p is not None:
            return r.__of__(p)
        else:
            return r


# This is used when a permission maps explicitly to no permission.
_what_not_even_god_should_do=[]

class imPermissionRole(Base):
    """Implement permission-based roles
    """
    
    def __of__(self, parent,tt=type(()),st=type(''),getattr=getattr,None=None):
        obj=parent
        n=self._p
        r=None
        while 1:
            if hasattr(obj,n):
                roles=getattr(obj, n)
                
                if roles is None: return 'Anonymous',
                
                t=type(roles)

                if t is tt:
                    # If we get a tuple, then we don't acquire
                    if r is None: return roles
                    return r+list(roles)

                if t is st:
                    # We found roles set to a name.  Start over
                    # with the new permission name.  If the permission
                    # name is '', then treat as private!
                    if roles:
                        if roles != n:
                            n=roles
                        # If we find a name that is the same as the
                        # current name, we just ignore it.
                        roles=None
                    else:
                        return _what_not_even_god_should_do

                elif roles:
                    if r is None: r=list(roles)
                    else: r=r+list(roles)

            obj=getattr(obj, 'aq_inner', None)
            if obj is None: break
            obj=obj.aq_parent

        if r is None: r=self._d
            
        return r
            
    # The following methods are needed in the unlikely case that an unwrapped
    # object is accessed:
    def __getitem__(self, i):
        try:
            v=self._v
        except: 
            v=self._v=self.__of__(self._pa)
            del self._pa
            
        return v[i]
        
    def __len__(self):
        try:
            v=self._v
        except: 
            v=self._v=self.__of__(self._pa)
            del self._pa

        return len(v)

############################################################################## 
# Test functions:
#

def main():
    # The "main" program for this module

    import sys
    sys.path.append('/projects/_/ExtensionClass')

    from Acquisition import Implicit
    class I(Implicit):
        x__roles__=PermissionRole('x')
        y__roles__=PermissionRole('y')
        z__roles__=PermissionRole('z')
        def x(self): pass
        def y(self): pass
        def z(self): pass



    a=I()
    a.b=I()
    a.b.c=I()
    a.q=I()
    a.q._x_Permission=('foo',)
    a._y_Permission=('bar',)
    a._z_Permission=('zee',)
    a.b.c._y_Permission=('Manage',)
    a.b._z_Permission=['also']
    
    print a.x.__roles__, list(a.x.__roles__)
    print a.b.x.__roles__
    print a.b.c.x.__roles__
    print a.q.x.__roles__
    print a.b.q.x.__roles__
    print a.b.c.q.x.__roles__
    print
    
    print a.y.__roles__, list(a.y.__roles__)
    print a.b.y.__roles__
    print a.b.c.y.__roles__
    print a.q.y.__roles__
    print a.b.q.y.__roles__
    print a.b.c.q.y.__roles__
    print
    
    print a.z.__roles__, list(a.z.__roles__)
    print a.b.z.__roles__
    print a.b.c.z.__roles__
    print a.q.z.__roles__
    print a.b.q.z.__roles__
    print a.b.c.q.z.__roles__
    print


=== Added File Zope/lib/python/AccessControl/pZopeSecurityPolicy.py ===
##############################################################################
# 
# Zope Public License (ZPL) Version 1.0
# -------------------------------------
# 
# Copyright (c) Digital Creations.  All rights reserved.
# 
# This license has been certified as Open Source(tm).
# 
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# 
# 1. Redistributions in source code must retain the above copyright
#    notice, this list of conditions, and the following disclaimer.
# 
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions, and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
# 
# 3. Digital Creations requests that attribution be given to Zope
#    in any manner possible. Zope includes a "Powered by Zope"
#    button that is installed by default. While it is not a license
#    violation to remove this button, it is requested that the
#    attribution remain. A significant investment has been put
#    into Zope, and this effort will continue if the Zope community
#    continues to grow. This is one way to assure that growth.
# 
# 4. All advertising materials and documentation mentioning
#    features derived from or use of this software must display
#    the following acknowledgement:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    In the event that the product being advertised includes an
#    intact Zope distribution (with copyright and license included)
#    then this clause is waived.
# 
# 5. Names associated with Zope or Digital Creations must not be used to
#    endorse or promote products derived from this software without
#    prior written permission from Digital Creations.
# 
# 6. Modified redistributions of any form whatsoever must retain
#    the following acknowledgment:
# 
#      "This product includes software developed by Digital Creations
#      for use in the Z Object Publishing Environment
#      (http://www.zope.org/)."
# 
#    Intact (re-)distributions of any official Zope release do not
#    require an external acknowledgement.
# 
# 7. Modifications are encouraged but must be packaged separately as
#    patches to official Zope releases.  Distributions that do not
#    clearly separate the patches from the original work must be clearly
#    labeled as unofficial distributions.  Modifications which do not
#    carry the name Zope may be packaged in any form, as long as they
#    conform to all of the clauses above.
# 
# 
# Disclaimer
# 
#   THIS SOFTWARE IS PROVIDED BY DIGITAL CREATIONS ``AS IS'' AND ANY
#   EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
#   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
#   PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL DIGITAL CREATIONS OR ITS
#   CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
#   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
#   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
#   USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
#   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
#   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
#   OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
#   SUCH DAMAGE.
# 
# 
# This software consists of contributions made by Digital Creations and
# many individuals on behalf of Digital Creations.  Specific
# attributions are listed in the accompanying credits file.
# 
##############################################################################
__doc__='''Define Zope\'s default security policy


$Id: pZopeSecurityPolicy.py,v 1.1.2.1 2001/08/09 17:33:29 shane Exp $'''
__version__='$Revision: 1.1.2.1 $'[11:-2]

from types import StringType

import SimpleObjectPolicies
from AccessControl import Unauthorized
_noroles=SimpleObjectPolicies._noroles
from zLOG import LOG, PROBLEM
from Acquisition import aq_base

from PermissionRole import _what_not_even_god_should_do, rolesForPermissionOn


class ZopeSecurityPolicy:
    
    def validate(self, accessed, container, name, value, context,
                 roles=_noroles, None=None, type=type, IntType=type(0),
                 DictType=type({}), getattr=getattr, _noroles=_noroles,
                 StringType=type(''),
                 Containers=SimpleObjectPolicies.Containers,
                 valid_aq_=('aq_parent','aq_explicit')):


        ############################################################
        # Provide special rules for the acquisition attributes
        if type(name) is StringType:
            if name[:3]=='aq_' and name not in valid_aq_:
                return 0

        containerbase = aq_base(container)
        accessedbase=getattr(accessed, 'aq_base', container)

        ############################################################
        # If roles weren't passed in, we'll try to get them from the object

        if roles is _noroles:
            roles=getattr(value, '__roles__', _noroles)

        ############################################################
        # We still might not have any roles

        if roles is _noroles:

            ############################################################
            # We have an object without roles and we didn't get a list
            # of roles passed in. Presumably, the value is some simple
            # object like a string or a list.  We'll try to get roles
            # from its container.
            if container is None: return 0 # Bail if no container

            roles=getattr(container, '__roles__', _noroles)
            if roles is _noroles:
                aq=getattr(container, 'aq_acquire', None)
                if aq is None:
                    roles=_noroles
                    if containerbase is not accessedbase: return 0
                else:
                    # Try to acquire roles
                    try: roles=aq('__roles__')
                    except AttributeError:
                        roles=_noroles
                        if containerbase is not accessedbase: return 0

            # We need to make sure that we are allowed to
            # get unprotected attributes from the container. We are
            # allowed for certain simple containers and if the
            # container says we can. Simple containers
            # may also impose name restrictions.
            p=Containers(type(container), None)
            if p is None:
                p=getattr(container,
                          '__allow_access_to_unprotected_subobjects__', None)

            if p is not None:
                tp=type(p)
                if tp is not IntType:
                    if tp is DictType:
                        p=p.get(name, None)
                    else:
                        p=p(name, value)

            if not p:
                if (containerbase is accessedbase):
                    raise Unauthorized, cleanupName(name, value)
                else:
                    return 0
                        
            if roles is _noroles: return 1

            # We are going to need a security-aware object to pass
            # to allowed(). We'll use the container.
            value=container

        # Short-circuit tests if we can:
        try:
            if roles is None or 'Anonymous' in roles: return 1
        except TypeError:
            # 'roles' isn't a sequence
            LOG('Zope Security Policy', PROBLEM, "'%s' passed as roles"
                " during validation of '%s' is not a sequence." % (
                `roles`, name))
            raise

        # Check executable security
        stack=context.stack
        if stack:
            eo=stack[-1]

            # If the executable had an owner, can it execute?
            owner=eo.getOwner()
            if (owner is not None) and not owner.allowed(value, roles):
                # We don't want someone to acquire if they can't
                # get an unacquired!
                if accessedbase is containerbase:
                    raise Unauthorized, (
                        'You are not authorized to access <em>%s</em>.' \
                        % cleanupName(name, value))
                return 0

            # Proxy roles, which are a lot safer now.
            proxy_roles=getattr(eo, '_proxy_roles', None)
            if proxy_roles:
                for r in proxy_roles:
                    if r in roles: return 1
                    
                # Proxy roles actually limit access!
                if accessedbase is containerbase:
                    raise Unauthorized, (
                        'You are not authorized to access <em>%s</em>.' \
                        % cleanupName(name, value))
                
                return 0
                

        try:
            if context.user.allowed(value, roles): return 1
        except AttributeError: pass

        # We don't want someone to acquire if they can't get an unacquired!
        if accessedbase is containerbase:
            raise Unauthorized, (
                'You are not authorized to access <em>%s</em>.' \
                % cleanupName(name, value))

        return 0

    def checkPermission(self, permission, object, context):
        roles=rolesForPermissionOn(permission, object)
        if type(roles) is StringType:
            roles=[roles]
        return context.user.allowed(object, roles)
    

def cleanupName(name, value):
    # If name is not available, tries to get it from the value.
    _name = name
    if _name is None and value is not None:
        try: _name = value.id
        except:
            try: _name = value.__name__
            except: pass
        if callable(_name):
            try: _name = _name()
            except: pass
    return _name


=== Zope/lib/python/AccessControl/Owned.py 1.11 => 1.11.20.1 ===
     getOwner__roles__=()
     def getOwner(self, info=0,
-                 aq_get=aq_get, None=None, UnownableOwner=UnownableOwner,
+                 aq_get=aq_get, None=None,
+                 UnownableOwner=UnownableOwner,
+                 getSecurityManager=getSecurityManager,
                  ):
         """Get the owner
 
@@ -143,19 +145,25 @@
         returned. Otherwise, the owner object is returned.
         """
         owner=aq_get(self, '_owner', None, 1)
-        if owner is None: return owner
+        if info or (owner is None): return owner
 
-        if info: return owner
-            
         if owner is UnownableOwner: return None
 
         udb, oid = owner
+        upath = ('',) + tuple(udb) + (oid,)
+        objectCache = getSecurityManager()._context.objectCache
+        if objectCache.has_key(upath):
+            return objectCache[upath]
+
         root=self.getPhysicalRoot()
         udb=root.unrestrictedTraverse(udb, None)
-        if udb is None: return SpecialUsers.nobody
-        owner = udb.getUserById(oid, None)
-        if owner is None: return SpecialUsers.nobody
-        return owner
+        if udb is None:
+            user = SpecialUsers.nobody
+        else:
+            user = udb.getUserById(oid, None)
+            if user is None: user = SpecialUsers.nobody
+        objectCache[upath] = user
+        return user
 
     changeOwnership__roles__=()
     def changeOwnership(self, user, recursive=0,


=== Zope/lib/python/AccessControl/PermissionRole.py 1.9 => 1.9.84.1 ===
 __version__='$Revision$'[11:-2]
 
-import sys
-
-from ExtensionClass import Base
-
-import string
-
-name_trans=filter(lambda c, an=string.letters+string.digits+'_': c not in an,
-                  map(chr,range(256)))
-name_trans=string.maketrans(string.join(name_trans,''), '_'*len(name_trans))
-
-def rolesForPermissionOn(perm, object, default=('Manager',)):
-    """Return the roles that have the given permission on the given object
-    """
-    im=imPermissionRole()
-    im._p='_'+string.translate(perm, name_trans)+"_Permission"
-    im._d=default
-    return im.__of__(object)
-    
-
-class PermissionRole(Base):
-    """Implement permission-based roles.
-
-    Under normal circumstances, our __of__ method will be
-    called with an unwrapped object.  The result will then be called
-    with a wrapped object, if the original object was wrapped.
-    To deal with this, we have to create an intermediate object.
-    
-    """
-
-    def __init__(self, name, default=('Manager',)):
-        self.__name__=name
-        self._p='_'+string.translate(name,name_trans)+"_Permission"
-        self._d=default
-
-    def __of__(self, parent, None=None, getattr=getattr):
-        r=imPermissionRole()
-        r._p=self._p
-        r._pa=parent
-        r._d=self._d
-        p=getattr(parent, 'aq_inner', None)
-        if p is not None:
-            return r.__of__(p)
-        else:
-            return r
-
-
-# This is used when a permission maps explicitly to no permission.
-_what_not_even_god_should_do=[]
-
-class imPermissionRole(Base):
-    """Implement permission-based roles
-    """
-    
-    def __of__(self, parent,tt=type(()),st=type(''),getattr=getattr,None=None):
-        obj=parent
-        n=self._p
-        r=None
-        while 1:
-            if hasattr(obj,n):
-                roles=getattr(obj, n)
-                
-                if roles is None: return 'Anonymous',
-                
-                t=type(roles)
-
-                if t is tt:
-                    # If we get a tuple, then we don't acquire
-                    if r is None: return roles
-                    return r+list(roles)
-
-                if t is st:
-                    # We found roles set to a name.  Start over
-                    # with the new permission name.  If the permission
-                    # name is '', then treat as private!
-                    if roles:
-                        if roles != n:
-                            n=roles
-                        # If we find a name that is the same as the
-                        # current name, we just ignore it.
-                        roles=None
-                    else:
-                        return _what_not_even_god_should_do
-
-                elif roles:
-                    if r is None: r=list(roles)
-                    else: r=r+list(roles)
-
-            obj=getattr(obj, 'aq_inner', None)
-            if obj is None: break
-            obj=obj.aq_parent
-
-        if r is None: r=self._d
-            
-        return r
-            
-    # The following methods are needed in the unlikely case that an unwrapped
-    # object is accessed:
-    def __getitem__(self, i):
-        try:
-            v=self._v
-        except: 
-            v=self._v=self.__of__(self._pa)
-            del self._pa
-            
-        return v[i]
-        
-    def __len__(self):
-        try:
-            v=self._v
-        except: 
-            v=self._v=self.__of__(self._pa)
-            del self._pa
-
-        return len(v)
+import cAccessControl
+rolesForPermissionOn=cAccessControl.rolesForPermissionOn
+PermissionRole=cAccessControl.PermissionRole
+imPermisionRole=cAccessControl.imPermissionRole
+_what_not_even_god_should_do= cAccessControl._what_not_even_god_should_do
 
 ############################################################################## 
 # Test functions:


=== Zope/lib/python/AccessControl/SecurityManagement.py 1.3 => 1.3.94.1 ===
         self.stack=[]
         self.user=user
-
+        self.objectCache = {}
 
     


=== Zope/lib/python/AccessControl/SecurityManager.py 1.4 => 1.4.36.1 ===
 
     def getUser(self):
-        """Gen the current authenticated user"""
+        """Get the current authenticated user"""
         return self._context.user
 
     def calledByExecutable(self):


=== Zope/lib/python/AccessControl/Setup 1.7 => 1.7.190.1 ===
 # install permissionEdit.dtml
 # install roleEdit.dtml
+
+*shared*
+
+cAccessControl cAccessControl.c -I../../Components/ExtensionClass/src


=== Zope/lib/python/AccessControl/User.py 1.152 => 1.152.8.1 ===
                     # Object is not wrapped, so return false.
                     return 0
-            if object.aq_inContextOf(context, 1):
-                return 1
+            return object.aq_inContextOf(context, 1)
+
         # This is lame, but required to keep existing behavior.
         return 1
 
@@ -753,8 +753,15 @@
     def domainSpecValidate(self, spec):
         for ob in spec:
             sz=len(ob)
-            if not ((addr_match(ob) == sz) or (host_match(ob) == sz)):
-                return 0
+            am = addr_match(ob)
+            hm = host_match(ob)
+            if am or hm:
+                if am: am = am.end()
+                else: am = -1
+                if hm: hm = hm.end()
+                else: hm = -1
+                if not ( (am == sz) or (hm == sz) ):
+                    return 0
         return 1
 
     def _addUser(self,name,password,confirm,roles,domains,REQUEST=None):
@@ -911,8 +918,9 @@
         v = self._domain_auth_mode = domain_auth_mode and 1 or 0
         return 'Domain authentication mode set to %d' % v
 
-
-
+    def domainAuthModeEnabled(self):
+        """ returns true if domain auth mode is set to true"""
+        return getattr(self, '_domain_auth_mode', None)
 
 class UserFolder(BasicUserFolder):
     """Standard UserFolder object


=== Zope/lib/python/AccessControl/ZopeGuards.py 1.4 => 1.4.6.1 ===
         return v
     v = object[index]
-    if Containers(type(object)):
+    if Containers(type(object)) and Containers(type(v)):
         # Simple type.  Short circuit.
         return v
     if getSecurityManager().validate(object, object, index, v):
@@ -178,8 +178,8 @@
 
 def guarded_map(f, *seqs):
     safe_seqs = []
-    for seqno in len(seqs):
-        seq = guarded_getitem(f, seqno)
+    for seqno in range(len(seqs)):
+        seq = guarded_getitem(seqs, seqno)
         safe_seqs.append(seq)
     return map(f, *safe_seqs)
 safe_builtins['map'] = guarded_map


=== Zope/lib/python/AccessControl/ZopeSecurityPolicy.py 1.11 => 1.11.8.1 ===
-# 
-# Zope Public License (ZPL) Version 1.0
-# -------------------------------------
-# 
-# Copyright (c) Digital Creations.  All rights reserved.
-# 
-# This license has been certified as Open Source(tm).
-# 
-# Redistribution and use in source and binary forms, with or without
-# modification, are permitted provided that the following conditions are
-# met:
-# 
-# 1. Redistributions in source code must retain the above copyright
-#    notice, this list of conditions, and the following disclaimer.
-# 
-# 2. Redistributions in binary form must reproduce the above copyright
-#    notice, this list of conditions, and the following disclaimer in
-#    the documentation and/or other materials provided with the
-#    distribution.
-# 
-# 3. Digital Creations requests that attribution be given to Zope
-#    in any manner possible. Zope includes a "Powered by Zope"
-#    button that is installed by default. While it is not a license
-#    violation to remove this button, it is requested that the
-#    attribution remain. A significant investment has been put
-#    into Zope, and this effort will continue if the Zope community
-#    continues to grow. This is one way to assure that growth.
-# 
-# 4. All advertising materials and documentation mentioning
-#    features derived from or use of this software must display
-#    the following acknowledgement:
-# 
-#      "This product includes software developed by Digital Creations
-#      for use in the Z Object Publishing Environment
-#      (http://www.zope.org/)."
-# 
-#    In the event that the product being advertised includes an
-#    intact Zope distribution (with copyright and license included)
-#    then this clause is waived.
-# 
-# 5. Names associated with Zope or Digital Creations must not be used to
-#    endorse or promote products derived from this software without
-#    prior written permission from Digital Creations.
-# 
-# 6. Modified redistributions of any form whatsoever must retain
-#    the following acknowledgment:
-# 
-#      "This product includes software developed by Digital Creations
-#      for use in the Z Object Publishing Environment
-#      (http://www.zope.org/)."
-# 
-#    Intact (re-)distributions of any official Zope release do not
-#    require an external acknowledgement.
-# 
-# 7. Modifications are encouraged but must be packaged separately as
-#    patches to official Zope releases.  Distributions that do not
-#    clearly separate the patches from the original work must be clearly
-#    labeled as unofficial distributions.  Modifications which do not
-#    carry the name Zope may be packaged in any form, as long as they
-#    conform to all of the clauses above.
-# 
-# 
-# Disclaimer
-# 
-#   THIS SOFTWARE IS PROVIDED BY DIGITAL CREATIONS ``AS IS'' AND ANY
-#   EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-#   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-#   PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL DIGITAL CREATIONS OR ITS
-#   CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
-#   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
-#   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
-#   USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
-#   ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
-#   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
-#   OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-#   SUCH DAMAGE.
-# 
-# 
-# This software consists of contributions made by Digital Creations and
-# many individuals on behalf of Digital Creations.  Specific
-# attributions are listed in the accompanying credits file.
-# 
-##############################################################################
-__doc__='''Define Zope\'s default security policy
+#
 
+from SimpleObjectPolicies import _noroles
 
-$Id$'''
-__version__='$Revision$'[11:-2]
+import cAccessControl
 
-from types import StringType
+ZopeSecurityPolicy = cAccessControl.ZopeSecurityPolicy
 
-import SimpleObjectPolicies
-from AccessControl import Unauthorized
-_noroles=SimpleObjectPolicies._noroles
-from zLOG import LOG, PROBLEM
-from Acquisition import aq_base
 
-from PermissionRole import _what_not_even_god_should_do, rolesForPermissionOn
-
-
-class ZopeSecurityPolicy:
-    
-    def validate(self, accessed, container, name, value, context,
-                 roles=_noroles, None=None, type=type, IntType=type(0),
-                 DictType=type({}), getattr=getattr, _noroles=_noroles,
-                 StringType=type(''),
-                 Containers=SimpleObjectPolicies.Containers,
-                 valid_aq_=('aq_parent','aq_explicit')):
-
-
-        ############################################################
-        # Provide special rules for the acquisition attributes
-        if type(name) is StringType:
-            if name[:3]=='aq_' and name not in valid_aq_:
-                return 0
-
-        containerbase = aq_base(container)
-        accessedbase=getattr(accessed, 'aq_base', container)
-
-        ############################################################
-        # If roles weren't passed in, we'll try to get them from the object
-
-        if roles is _noroles:
-            roles=getattr(value, '__roles__', _noroles)
-
-        ############################################################
-        # We still might not have any roles
-
-        if roles is _noroles:
-
-            ############################################################
-            # We have an object without roles and we didn't get a list
-            # of roles passed in. Presumably, the value is some simple
-            # object like a string or a list.  We'll try to get roles
-            # from its container.
-            if container is None: return 0 # Bail if no container
-
-            roles=getattr(container, '__roles__', _noroles)
-            if roles is _noroles:
-                aq=getattr(container, 'aq_acquire', None)
-                if aq is None:
-                    roles=_noroles
-                    if containerbase is not accessedbase: return 0
-                else:
-                    # Try to acquire roles
-                    try: roles=aq('__roles__')
-                    except AttributeError:
-                        roles=_noroles
-                        if containerbase is not accessedbase: return 0
-
-            # We need to make sure that we are allowed to
-            # get unprotected attributes from the container. We are
-            # allowed for certain simple containers and if the
-            # container says we can. Simple containers
-            # may also impose name restrictions.
-            p=Containers(type(container), None)
-            if p is None:
-                p=getattr(container,
-                          '__allow_access_to_unprotected_subobjects__', None)
-
-            if p is not None:
-                tp=type(p)
-                if tp is not IntType:
-                    if tp is DictType:
-                        p=p.get(name, None)
-                    else:
-                        p=p(name, value)
-
-            if not p:
-                if (containerbase is accessedbase):
-                    raise Unauthorized, cleanupName(name, value)
-                else:
-                    return 0
-                        
-            if roles is _noroles: return 1
-
-            # We are going to need a security-aware object to pass
-            # to allowed(). We'll use the container.
-            value=container
-
-        # Short-circuit tests if we can:
-        try:
-            if roles is None or 'Anonymous' in roles: return 1
-        except TypeError:
-            # 'roles' isn't a sequence
-            LOG('Zope Security Policy', PROBLEM, "'%s' passed as roles"
-                " during validation of '%s' is not a sequence." % (
-                `roles`, name))
-            raise
-
-        # Check executable security
-        stack=context.stack
-        if stack:
-            eo=stack[-1]
-
-            # If the executable had an owner, can it execute?
-            owner=eo.getOwner()
-            if (owner is not None) and not owner.allowed(value, roles):
-                # We don't want someone to acquire if they can't
-                # get an unacquired!
-                if accessedbase is containerbase:
-                    raise Unauthorized, (
-                        'You are not authorized to access <em>%s</em>.' \
-                        % cleanupName(name, value))
-                return 0
-
-            # Proxy roles, which are a lot safer now.
-            proxy_roles=getattr(eo, '_proxy_roles', None)
-            if proxy_roles:
-                for r in proxy_roles:
-                    if r in roles: return 1
-                    
-                # Proxy roles actually limit access!
-                if accessedbase is containerbase:
-                    raise Unauthorized, (
-                        'You are not authorized to access <em>%s</em>.' \
-                        % cleanupName(name, value))
-                
-                return 0
-                
-
-        try:
-            if context.user.allowed(value, roles): return 1
-        except AttributeError: pass
-
-        # We don't want someone to acquire if they can't get an unacquired!
-        if accessedbase is containerbase:
-            raise Unauthorized, (
-                'You are not authorized to access <em>%s</em>.' \
-                % cleanupName(name, value))
-
-        return 0
-
-    def checkPermission(self, permission, object, context):
-        roles=rolesForPermissionOn(permission, object)
-        if type(roles) is StringType:
-            roles=[roles]
-        return context.user.allowed(object, roles)
-    
-
-def cleanupName(name, value):
-    # If name is not available, tries to get it from the value.
-    _name = name
-    if _name is None and value is not None:
-        try: _name = value.id
-        except:
-            try: _name = value.__name__
-            except: pass
-        if callable(_name):
-            try: _name = _name()
-            except: pass
-    return _name