| Index: tools/telemetry/third_party/gsutilz/third_party/boto/boto/gs/acl.py
|
| diff --git a/tools/telemetry/third_party/gsutilz/third_party/boto/boto/gs/acl.py b/tools/telemetry/third_party/gsutilz/third_party/boto/boto/gs/acl.py
|
| deleted file mode 100644
|
| index 57bdce1cbc36af46b2a147d3c3901f501c4f2ae2..0000000000000000000000000000000000000000
|
| --- a/tools/telemetry/third_party/gsutilz/third_party/boto/boto/gs/acl.py
|
| +++ /dev/null
|
| @@ -1,308 +0,0 @@
|
| -# Copyright 2010 Google Inc.
|
| -#
|
| -# Permission is hereby granted, free of charge, to any person obtaining a
|
| -# copy of this software and associated documentation files (the
|
| -# "Software"), to deal in the Software without restriction, including
|
| -# without limitation the rights to use, copy, modify, merge, publish, dis-
|
| -# tribute, sublicense, and/or sell copies of the Software, and to permit
|
| -# persons to whom the Software is furnished to do so, subject to the fol-
|
| -# lowing conditions:
|
| -#
|
| -# The above copyright notice and this permission notice shall be included
|
| -# in all copies or substantial portions of the Software.
|
| -#
|
| -# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
| -# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
|
| -# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
|
| -# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
| -# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
| -# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
| -# IN THE SOFTWARE.
|
| -
|
| -from boto.gs.user import User
|
| -from boto.exception import InvalidAclError
|
| -
|
| -ACCESS_CONTROL_LIST = 'AccessControlList'
|
| -ALL_AUTHENTICATED_USERS = 'AllAuthenticatedUsers'
|
| -ALL_USERS = 'AllUsers'
|
| -DISPLAY_NAME = 'DisplayName'
|
| -DOMAIN = 'Domain'
|
| -EMAIL_ADDRESS = 'EmailAddress'
|
| -ENTRY = 'Entry'
|
| -ENTRIES = 'Entries'
|
| -GROUP_BY_DOMAIN = 'GroupByDomain'
|
| -GROUP_BY_EMAIL = 'GroupByEmail'
|
| -GROUP_BY_ID = 'GroupById'
|
| -ID = 'ID'
|
| -NAME = 'Name'
|
| -OWNER = 'Owner'
|
| -PERMISSION = 'Permission'
|
| -SCOPE = 'Scope'
|
| -TYPE = 'type'
|
| -USER_BY_EMAIL = 'UserByEmail'
|
| -USER_BY_ID = 'UserById'
|
| -
|
| -
|
| -CannedACLStrings = ['private', 'public-read', 'project-private',
|
| - 'public-read-write', 'authenticated-read',
|
| - 'bucket-owner-read', 'bucket-owner-full-control']
|
| -"""A list of Google Cloud Storage predefined (canned) ACL strings."""
|
| -
|
| -SupportedPermissions = ['READ', 'WRITE', 'FULL_CONTROL']
|
| -"""A list of supported ACL permissions."""
|
| -
|
| -
|
| -class ACL(object):
|
| -
|
| - def __init__(self, parent=None):
|
| - self.parent = parent
|
| - self.entries = Entries(self)
|
| -
|
| - @property
|
| - def acl(self):
|
| - return self
|
| -
|
| - def __repr__(self):
|
| - # Owner is optional in GS ACLs.
|
| - if hasattr(self, 'owner'):
|
| - entries_repr = ['Owner:%s' % self.owner.__repr__()]
|
| - else:
|
| - entries_repr = ['']
|
| - acl_entries = self.entries
|
| - if acl_entries:
|
| - for e in acl_entries.entry_list:
|
| - entries_repr.append(e.__repr__())
|
| - return '<%s>' % ', '.join(entries_repr)
|
| -
|
| - # Method with same signature as boto.s3.acl.ACL.add_email_grant(), to allow
|
| - # polymorphic treatment at application layer.
|
| - def add_email_grant(self, permission, email_address):
|
| - entry = Entry(type=USER_BY_EMAIL, email_address=email_address,
|
| - permission=permission)
|
| - self.entries.entry_list.append(entry)
|
| -
|
| - # Method with same signature as boto.s3.acl.ACL.add_user_grant(), to allow
|
| - # polymorphic treatment at application layer.
|
| - def add_user_grant(self, permission, user_id):
|
| - entry = Entry(permission=permission, type=USER_BY_ID, id=user_id)
|
| - self.entries.entry_list.append(entry)
|
| -
|
| - def add_group_email_grant(self, permission, email_address):
|
| - entry = Entry(type=GROUP_BY_EMAIL, email_address=email_address,
|
| - permission=permission)
|
| - self.entries.entry_list.append(entry)
|
| -
|
| - def add_group_grant(self, permission, group_id):
|
| - entry = Entry(type=GROUP_BY_ID, id=group_id, permission=permission)
|
| - self.entries.entry_list.append(entry)
|
| -
|
| - def startElement(self, name, attrs, connection):
|
| - if name.lower() == OWNER.lower():
|
| - self.owner = User(self)
|
| - return self.owner
|
| - elif name.lower() == ENTRIES.lower():
|
| - self.entries = Entries(self)
|
| - return self.entries
|
| - else:
|
| - return None
|
| -
|
| - def endElement(self, name, value, connection):
|
| - if name.lower() == OWNER.lower():
|
| - pass
|
| - elif name.lower() == ENTRIES.lower():
|
| - pass
|
| - else:
|
| - setattr(self, name, value)
|
| -
|
| - def to_xml(self):
|
| - s = '<%s>' % ACCESS_CONTROL_LIST
|
| - # Owner is optional in GS ACLs.
|
| - if hasattr(self, 'owner'):
|
| - s += self.owner.to_xml()
|
| - acl_entries = self.entries
|
| - if acl_entries:
|
| - s += acl_entries.to_xml()
|
| - s += '</%s>' % ACCESS_CONTROL_LIST
|
| - return s
|
| -
|
| -
|
| -class Entries(object):
|
| -
|
| - def __init__(self, parent=None):
|
| - self.parent = parent
|
| - # Entries is the class that represents the same-named XML
|
| - # element. entry_list is the list within this class that holds the data.
|
| - self.entry_list = []
|
| -
|
| - def __repr__(self):
|
| - entries_repr = []
|
| - for e in self.entry_list:
|
| - entries_repr.append(e.__repr__())
|
| - return '<Entries: %s>' % ', '.join(entries_repr)
|
| -
|
| - def startElement(self, name, attrs, connection):
|
| - if name.lower() == ENTRY.lower():
|
| - entry = Entry(self)
|
| - self.entry_list.append(entry)
|
| - return entry
|
| - else:
|
| - return None
|
| -
|
| - def endElement(self, name, value, connection):
|
| - if name.lower() == ENTRY.lower():
|
| - pass
|
| - else:
|
| - setattr(self, name, value)
|
| -
|
| - def to_xml(self):
|
| - if not self.entry_list:
|
| - return ''
|
| - s = '<%s>' % ENTRIES
|
| - for entry in self.entry_list:
|
| - s += entry.to_xml()
|
| - s += '</%s>' % ENTRIES
|
| - return s
|
| -
|
| -
|
| -# Class that represents a single (Scope, Permission) entry in an ACL.
|
| -class Entry(object):
|
| -
|
| - def __init__(self, scope=None, type=None, id=None, name=None,
|
| - email_address=None, domain=None, permission=None):
|
| - if not scope:
|
| - scope = Scope(self, type, id, name, email_address, domain)
|
| - self.scope = scope
|
| - self.permission = permission
|
| -
|
| - def __repr__(self):
|
| - return '<%s: %s>' % (self.scope.__repr__(), self.permission.__repr__())
|
| -
|
| - def startElement(self, name, attrs, connection):
|
| - if name.lower() == SCOPE.lower():
|
| - # The following if statement used to look like this:
|
| - # if not TYPE in attrs:
|
| - # which caused problems because older versions of the
|
| - # AttributesImpl class in the xml.sax library neglected to include
|
| - # a __contains__() method (which Python calls to implement the
|
| - # 'in' operator). So when you use the in operator, like the if
|
| - # statement above, Python invokes the __getiter__() method with
|
| - # index 0, which raises an exception. More recent versions of
|
| - # xml.sax include the __contains__() method, rendering the in
|
| - # operator functional. The work-around here is to formulate the
|
| - # if statement as below, which is the legal way to query
|
| - # AttributesImpl for containment (and is also how the added
|
| - # __contains__() method works). At one time gsutil disallowed
|
| - # xmlplus-based parsers, until this more specific problem was
|
| - # determined.
|
| - if TYPE not in attrs:
|
| - raise InvalidAclError('Missing "%s" in "%s" part of ACL' %
|
| - (TYPE, SCOPE))
|
| - self.scope = Scope(self, attrs[TYPE])
|
| - return self.scope
|
| - elif name.lower() == PERMISSION.lower():
|
| - pass
|
| - else:
|
| - return None
|
| -
|
| - def endElement(self, name, value, connection):
|
| - if name.lower() == SCOPE.lower():
|
| - pass
|
| - elif name.lower() == PERMISSION.lower():
|
| - value = value.strip()
|
| - if not value in SupportedPermissions:
|
| - raise InvalidAclError('Invalid Permission "%s"' % value)
|
| - self.permission = value
|
| - else:
|
| - setattr(self, name, value)
|
| -
|
| - def to_xml(self):
|
| - s = '<%s>' % ENTRY
|
| - s += self.scope.to_xml()
|
| - s += '<%s>%s</%s>' % (PERMISSION, self.permission, PERMISSION)
|
| - s += '</%s>' % ENTRY
|
| - return s
|
| -
|
| -
|
| -class Scope(object):
|
| -
|
| - # Map from Scope type.lower() to lower-cased list of allowed sub-elems.
|
| - ALLOWED_SCOPE_TYPE_SUB_ELEMS = {
|
| - ALL_AUTHENTICATED_USERS.lower() : [],
|
| - ALL_USERS.lower() : [],
|
| - GROUP_BY_DOMAIN.lower() : [DOMAIN.lower()],
|
| - GROUP_BY_EMAIL.lower() : [
|
| - DISPLAY_NAME.lower(), EMAIL_ADDRESS.lower(), NAME.lower()],
|
| - GROUP_BY_ID.lower() : [DISPLAY_NAME.lower(), ID.lower(), NAME.lower()],
|
| - USER_BY_EMAIL.lower() : [
|
| - DISPLAY_NAME.lower(), EMAIL_ADDRESS.lower(), NAME.lower()],
|
| - USER_BY_ID.lower() : [DISPLAY_NAME.lower(), ID.lower(), NAME.lower()]
|
| - }
|
| -
|
| - def __init__(self, parent, type=None, id=None, name=None,
|
| - email_address=None, domain=None):
|
| - self.parent = parent
|
| - self.type = type
|
| - self.name = name
|
| - self.id = id
|
| - self.domain = domain
|
| - self.email_address = email_address
|
| - if self.type.lower() not in self.ALLOWED_SCOPE_TYPE_SUB_ELEMS:
|
| - raise InvalidAclError('Invalid %s %s "%s" ' %
|
| - (SCOPE, TYPE, self.type))
|
| -
|
| - def __repr__(self):
|
| - named_entity = None
|
| - if self.id:
|
| - named_entity = self.id
|
| - elif self.email_address:
|
| - named_entity = self.email_address
|
| - elif self.domain:
|
| - named_entity = self.domain
|
| - if named_entity:
|
| - return '<%s: %s>' % (self.type, named_entity)
|
| - else:
|
| - return '<%s>' % self.type
|
| -
|
| - def startElement(self, name, attrs, connection):
|
| - if (not name.lower() in
|
| - self.ALLOWED_SCOPE_TYPE_SUB_ELEMS[self.type.lower()]):
|
| - raise InvalidAclError('Element "%s" not allowed in %s %s "%s" ' %
|
| - (name, SCOPE, TYPE, self.type))
|
| - return None
|
| -
|
| - def endElement(self, name, value, connection):
|
| - value = value.strip()
|
| - if name.lower() == DOMAIN.lower():
|
| - self.domain = value
|
| - elif name.lower() == EMAIL_ADDRESS.lower():
|
| - self.email_address = value
|
| - elif name.lower() == ID.lower():
|
| - self.id = value
|
| - elif name.lower() == NAME.lower():
|
| - self.name = value
|
| - else:
|
| - setattr(self, name, value)
|
| -
|
| - def to_xml(self):
|
| - s = '<%s type="%s">' % (SCOPE, self.type)
|
| - if (self.type.lower() == ALL_AUTHENTICATED_USERS.lower()
|
| - or self.type.lower() == ALL_USERS.lower()):
|
| - pass
|
| - elif self.type.lower() == GROUP_BY_DOMAIN.lower():
|
| - s += '<%s>%s</%s>' % (DOMAIN, self.domain, DOMAIN)
|
| - elif (self.type.lower() == GROUP_BY_EMAIL.lower()
|
| - or self.type.lower() == USER_BY_EMAIL.lower()):
|
| - s += '<%s>%s</%s>' % (EMAIL_ADDRESS, self.email_address,
|
| - EMAIL_ADDRESS)
|
| - if self.name:
|
| - s += '<%s>%s</%s>' % (NAME, self.name, NAME)
|
| - elif (self.type.lower() == GROUP_BY_ID.lower()
|
| - or self.type.lower() == USER_BY_ID.lower()):
|
| - s += '<%s>%s</%s>' % (ID, self.id, ID)
|
| - if self.name:
|
| - s += '<%s>%s</%s>' % (NAME, self.name, NAME)
|
| - else:
|
| - raise InvalidAclError('Invalid scope type "%s" ', self.type)
|
| -
|
| - s += '</%s>' % SCOPE
|
| - return s
|
|
|