Miracle is an ACL for Python that was designed to be well-structuted, simple yet exhaustive. It uses permissions defined on resources, and roles are granted with the access to them.
To be a universal tool, it does not include any special cases, does not force you to persist and does not insist on any formats or conventions.
Maximum flexibility and total control. Enjoy! :)
Highlights:
- Inspired by miracle for NodeJS ;
- Simple core
- No restrictions on authorization entities
- Unit-tested
- Define The Structure
- Acl
- Create
- add_role(role)
- add_roles(roles)
- add_resource(resource)
- add_permission(resource, permission)
- add(structure)
- Remove
- remove_role(role)
- remove_resource(resource)
- remove_permission(resource, permission)
- clear()
- Get
- get_roles()
- get_resources()
- get_permissions(resource)
- get()
- Export and Import
- Authorize
- Grant Permissions
- grant(role, resource, permission)
- grants(grants)
- revoke(role, resource, permission)
- revoke_all(role[, resource])
- Check Permissions
- check(role, resource, permission)
- check_any(roles, resource, permission)
- check_all(roles, resource, permission)
- Show Grants
- which_permissions(role, resource)
- which_permissions_any(roles, resource)
- which_permissions_all(roles, resource)
- which(role)
- which_any(roles)
- which_all(roles)
- show()
- Grant Permissions
To start using miracle, instantiate the Acl
object:
from miracle import Acl
acl = Acl()
The Acl
object keeps track of your resources and permissions
defined on them, handles grants over roles and provides utilities to
manage them. When configured, you can check the access against the
defined state.
Methods from this section allow you to build the structure: list of roles, resources and permissions.
It’s not required that you have the structure defined before you start
granting the access: the grant()
method implicitly creates all
resources and permissions that were not previously defined.
Start with defining the resources and permissions on them, then you can grant a role with the access to some permissions on a resource.
For roles, resources & permissions, any hashable objects will do.
Define a role.
role
: the role to define.
The role will have no permissions granted, but will appear in
get_roles()
.
acl.add_role('admin')
acl.get_roles() # -> {'admin'}
Define multiple roles
roles
: An iterable of roles
acl.add_roles(['admin', 'root'])
acl.get_roles() # -> {'admin', 'root'}
Define a resource.
resources
: the resource to define.
The resource will have no permissions defined but will appear in
get_resources()
.
acl.add_resource('blog')
acl.get_resources() # -> {'blog'}
Define a permission on a resource.
resource
: the resource to define the permission on. Is created if was not previously defined.permission
: the permission to define.
The defined permission is not granted to anyone, but will appear in
get_permissions(resource)
.
acl.add_permission('blog', 'post')
acl.get_permissions('blog') # -> {'post'}
Define the whole resource/permission structure with a single dict.
structure
: a dict that maps resources to an iterable of permissions.
acl.add({
'blog': ['post'],
'page': {'create', 'read', 'update', 'delete'},
})
Remove the role and its grants.
role
: the role to remove.
acl.remove_role('admin')
Remove the resource along with its grants and permissions.
resource
: the resource to remove.
acl.remove_resource('blog')
Remove the permission from a resource.
resource
: the resource to remove the permission from.permission
: the permission to remove.
The resource is not implicitly removed: it remains with an empty set of permissions.
acl.remove_permission('blog', 'post')
Remove all roles, resources, permissions and grants.
Get the set of defined roles.
acl.get_roles() # -> {'admin', 'anonymous', 'registered'}
Get the set of defined resources, including those with empty permissions set.
acl.get_resources() # -> {'blog', 'page', 'article'}
Get the set of permissions for a resource.
resource
: the resource to get the permissions for.
acl.get_permissions('page') # -> {'create', 'read', 'update', 'delete'}
Get the structure: hash of all resources mapped to their permissions.
Returns a dict: { resource: set(permission,...), ... }
.
acl.get() # -> { blog: {'post'}, page: {'create', ...} }
The Acl
class is picklable:
acl = miracle.Acl()
save = acl.__getstate__()
#...
acl = miracle.Acl()
acl.__setstate__(save)
Grant a permission over resource to the specified role.
role
: The role to grant the access toresource
: The resource to grant the access overpermission
: The permission to grant with
Roles, resources and permissions are implicitly created if missing.
acl.grant('admin', 'blog', 'delete')
acl.grant('anonymous', 'page', 'view')
Add a structure of grants to the Acl.
grants
: A hash in the following form:{ role: { resource: set(permission) } }
.
acl.grants({
'admin': {
'blog': ['post'],
},
'anonymous': {
'page': ['view']
}
})
Revoke a permission over a resource from the specified role.
acl.revoke('anonymous', 'page', 'view')
acl.revoke('user', 'account', 'delete')
Revoke all permissions from the specified role for all resources. If the
optional resource
argument is provided - removes all permissions
from the specified resource.
acl.revoke_all('anonymous', 'page') # revoke all permissions from a single resource
acl.revoke_all('anonymous') # revoke permissions from all resources
Test whether the given role has access to the resource with the specified permission.
role
: The role to checkresource
: The protected resourcepermission
: The required permission
Returns a boolean.
acl.check('admin', 'blog') # True
acl.check('anonymous', 'page', 'delete') # -> False
Test whether any of the given roles have access to the resource with the specified permission.
roles
: An iterable of roles.
When no roles are provided, returns False.
Test whether all of the given roles have access to the resource with the specified permission.
roles
: An iterable of roles.
When no roles are provided, returns False.
List permissions that the provided role has over the resource:
acl.which_permissions('admin', 'blog') # -> {'post'}
List permissions that any of the provided roles have over the resource:
acl.which_permissions_any(['anonymous', 'registered'], 'page') # -> {'view'}
List permissions that all of the provided roles have over the resource:
acl.which_permissions_all(['anonymous', 'registered'], 'page') # -> {'view'}
Collect grants that the provided role has:
acl.which('admin') # -> { blog: {'post'} }
Collect grants that any of the provided roles have (union).
acl.which(['anonymous', 'registered']) # -> { page: ['view'] }
Collect grants that all of the provided roles have (intersection):
acl.which(['anonymous', 'registered']) # -> { page: ['view'] }
Get all current grants.
Returns a dict { role: { resource: set(permission) } }
.
acl.show() # -> { admin: { blog: ['post'] } }