core/homeassistant/auth/permissions/util.py

111 lines
3.3 KiB
Python
Raw Normal View History

2019-03-11 18:02:37 +00:00
"""Helpers to deal with permissions."""
from functools import wraps
from typing import Callable, Dict, List, Optional, cast # noqa: F401
2019-03-11 18:02:37 +00:00
2019-04-23 10:46:23 +00:00
from .const import SUBCAT_ALL
2019-03-11 18:02:37 +00:00
from .models import PermissionLookup
from .types import CategoryType, SubCategoryDict, ValueType
2019-07-31 19:25:30 +00:00
LookupFunc = Callable[[PermissionLookup, SubCategoryDict, str], Optional[ValueType]]
2019-03-11 18:02:37 +00:00
SubCatLookupType = Dict[str, LookupFunc]
2019-07-31 19:25:30 +00:00
def lookup_all(
perm_lookup: PermissionLookup, lookup_dict: SubCategoryDict, object_id: str
) -> ValueType:
2019-03-11 18:02:37 +00:00
"""Look up permission for all."""
# In case of ALL category, lookup_dict IS the schema.
return cast(ValueType, lookup_dict)
def compile_policy(
2019-07-31 19:25:30 +00:00
policy: CategoryType, subcategories: SubCatLookupType, perm_lookup: PermissionLookup
) -> Callable[[str, str], bool]: # noqa
2019-03-11 18:02:37 +00:00
"""Compile policy into a function that tests policy.
Subcategories are mapping key -> lookup function, ordered by highest
priority first.
"""
# None, False, empty dict
if not policy:
2019-07-31 19:25:30 +00:00
2019-03-11 18:02:37 +00:00
def apply_policy_deny_all(entity_id: str, key: str) -> bool:
"""Decline all."""
return False
return apply_policy_deny_all
if policy is True:
2019-07-31 19:25:30 +00:00
2019-03-11 18:02:37 +00:00
def apply_policy_allow_all(entity_id: str, key: str) -> bool:
"""Approve all."""
return True
return apply_policy_allow_all
assert isinstance(policy, dict)
funcs = [] # type: List[Callable[[str, str], Optional[bool]]]
2019-03-11 18:02:37 +00:00
for key, lookup_func in subcategories.items():
lookup_value = policy.get(key)
# If any lookup value is `True`, it will always be positive
if isinstance(lookup_value, bool):
return lambda object_id, key: True
if lookup_value is not None:
2019-07-31 19:25:30 +00:00
funcs.append(_gen_dict_test_func(perm_lookup, lookup_func, lookup_value))
2019-03-11 18:02:37 +00:00
if len(funcs) == 1:
func = funcs[0]
@wraps(func)
def apply_policy_func(object_id: str, key: str) -> bool:
"""Apply a single policy function."""
return func(object_id, key) is True
return apply_policy_func
def apply_policy_funcs(object_id: str, key: str) -> bool:
"""Apply several policy functions."""
for func in funcs:
result = func(object_id, key)
if result is not None:
return result
return False
return apply_policy_funcs
def _gen_dict_test_func(
2019-07-31 19:25:30 +00:00
perm_lookup: PermissionLookup, lookup_func: LookupFunc, lookup_dict: SubCategoryDict
) -> Callable[[str, str], Optional[bool]]: # noqa
2019-03-11 18:02:37 +00:00
"""Generate a lookup function."""
2019-07-31 19:25:30 +00:00
2019-03-11 18:02:37 +00:00
def test_value(object_id: str, key: str) -> Optional[bool]:
"""Test if permission is allowed based on the keys."""
2019-07-31 19:25:30 +00:00
schema = lookup_func(perm_lookup, lookup_dict, object_id) # type: ValueType
2019-03-11 18:02:37 +00:00
if schema is None or isinstance(schema, bool):
return schema
assert isinstance(schema, dict)
return schema.get(key)
return test_value
2019-04-23 10:46:23 +00:00
def test_all(policy: CategoryType, key: str) -> bool:
"""Test if a policy has an ALL access for a specific key."""
if not isinstance(policy, dict):
return bool(policy)
all_policy = policy.get(SUBCAT_ALL)
if not isinstance(all_policy, dict):
return bool(all_policy)
return all_policy.get(key, False)