merged master onto senslab2, manually solved conflicts in setup.py
authorThierry Parmentelat <thierry.parmentelat@sophia.inria.fr>
Thu, 3 Nov 2011 14:59:18 +0000 (15:59 +0100)
committerThierry Parmentelat <thierry.parmentelat@sophia.inria.fr>
Thu, 3 Nov 2011 14:59:18 +0000 (15:59 +0100)
(under control) and rspec.py (now in sfa/rspecs), the latter being the
mainstream version as is

1  2 
setup.py
sfa/trust/auth.py

diff --combined setup.py
+++ b/setup.py
@@@ -15,7 -15,7 +15,7 @@@ bins = 
      'sfa/plc/sfa-import-plc.py', 
      'sfa/plc/sfa-nuke-plc.py', 
      'sfa/server/sfa-ca.py', 
-     'sfa/server/sfa-server.py', 
+     'sfa/server/sfa-start.py', 
      'sfa/server/sfa-clean-peer-records.py', 
      'sfa/server/sfa_component_setup.py', 
      'sfa/client/sfi.py', 
  
  package_dirs = [
      'sfa', 
-     'sfa/client',
-     'sfa/methods',
-     'sfa/plc',
-     'sfa/senslab',
-     'sfa/server',
      'sfa/trust',
      'sfa/util', 
+     'sfa/client',
+     'sfa/server',
+     'sfa/methods',
+     'sfa/generic',
      'sfa/managers',
      'sfa/managers/vini',
+     'sfa/plc',
++    'sfa/senslab',
      'sfa/rspecs',
      'sfa/rspecs/elements',
+     'sfa/rspecs/elements/versions',
      'sfa/rspecs/versions',
      'sfatables',
      'sfatables/commands',
@@@ -59,6 -60,7 +61,7 @@@ data_files = [('/etc/sfa/', [ 'config/a
                                'config/registries.xml',
                                'config/default_config.xml',
                                'config/sfi_config',
+                               'config/topology',
                                'sfa/managers/pl/pl.rng',
                                'sfa/trust/credential.xsd',
                                'sfa/trust/top.xsd',
diff --combined sfa/trust/auth.py
@@@ -3,16 -3,20 +3,20 @@@
  #
  import sys
  
+ from sfa.util.faults import InsufficientRights, MissingCallerGID, MissingTrustedRoots, PermissionError, \
+     BadRequestHash, ConnectionKeyGIDMismatch, SfaPermissionDenied
+ from sfa.util.sfalogging import logger
+ from sfa.util.config import Config
+ from sfa.util.xrn import get_authority
+ from sfa.trust.gid import GID
+ from sfa.trust.rights import Rights
  from sfa.trust.certificate import Keypair, Certificate
  from sfa.trust.credential import Credential
  from sfa.trust.trustedroots import TrustedRoots
- from sfa.util.faults import *
  from sfa.trust.hierarchy import Hierarchy
- from sfa.util.config import *
- from sfa.util.xrn import get_authority
- from sfa.util.sfaticket import *
+ from sfa.trust.sfaticket import SfaTicket
  
- from sfa.util.sfalogging import logger
  
  class Auth:
      """
  
      def authenticateCert(self, certStr, requestHash):
          cert = Certificate(string=certStr)
-         self.validateCert(self, cert)   
+         # xxx should be validateCred ??
+         self.validateCred(cert)   
  
      def gidNoop(self, gidStr, value, requestHash):
          self.authenticateGid(gidStr, [gidStr, value], requestHash)
          @param name human readable name to test  
          """
          object_hrn = self.object_gid.get_hrn()
 -        if object_hrn == name:
 +      strname = str(name).strip("['']")
 +      
 +        if object_hrn == strname:
              return
 -        if name.startswith(object_hrn + "."):
 +        if strname.startswith((object_hrn + ".")) is True:
              return
          #if name.startswith(get_authority(name)):
              #return
 -    
 +      print>>sys.stderr, " \r\n \t AUTH.PY  verify_object_permission GROSECHECDELENFER "
          raise PermissionError(name)
  
      def determine_user_rights(self, caller_hrn, record):
          if not isinstance(creds, list):
              creds = [creds]
          creds = []
-         if not isinistance(caller_hrn_list, list):
+         if not isinstance(caller_hrn_list, list):
              caller_hrn_list = [caller_hrn_list]
          for cred in creds:
              try: