Skip to main content

Plone PAS patch for dropping roles for editors and managers

Project description

collective.droproles

This is a monkey patch for PAS (PluggableAuthService). It drops roles like Manager or Editor on Plone Sites. An Editor can still login, but only has the Member and Authenticated roles.

It differs from collective.denyroles which completely denies access to someone with one of these roles: they cannot login. This login failure may be confusing. I want to move the sites where I used this, over to the newer collective.droproles.

Features

  • A patch for methods getRoles, getRolesInContext, and allowed on various user classes, returning the original list, but with the following roles removed: Manager, Site Administrator, Editor, Reviewer, Contributor. This is temporary: no database changes are made.

  • Configuration via environment variable DROP_ROLES. By default we do not drop roles, but with DROP_ROLES=1, we do drop them.

Use case

You have a Plone Site on two domains:

  • edit.example.local is for editing. Users with the Editor or Manager role login here to edit and manage the site. This is a local domain that can only be reached within your local network or a VPN.

  • www.example.org is for anonymous users and maybe also for standard Members without extra roles. This domain is protected by a special firewall to prevent common web attacks like dubious form submissions, request flooding, spammers, cross site scripting attacks, etcetera.

Problems:

  • Editors sometimes login to the public domain, and get errors during editing because the firewall is too protective.

  • The system administrator complains that he has setup a special domain for editing and managing, so that no changes can come in from the public site, and yet unexpectedly the editors can login and make changes via the public site anyway.

This package gives you the option to treat all users as having at most the Member or Authenticated roles. A Manager can login, but cannot go to the Plone overview controlpanel.

User classes

The following classes are patched:

AccessControl.users.BasicUser
AccessControl.users.SimpleUser
Products.PlonePAS.plugins.ufactory.PloneUser
Products.PluggableAuthService.PropertiedUser.PropertiedUser

This covers standard Plone.

I have not tested with users coming from other sources, like LDAP. It might work out of the box though. If it does not work, and your LDAP users have a special class, try calling patch_class(your_ldap_class).

Dropped roles

The following roles are dropped:

Manager
Site Administrator
Editor
Reviewer
Contributor

If you have other roles that you want to drop, you may need to add it to the set of USER_CLASSES via a monkey patch.

See also the Dropping all roles section.

Installation

Install collective.droproles by adding it to your buildout:

[buildout]

...

eggs =
    collective.droproles

[instance]
recipe = plone.recipe.zope2instance
environment-vars =
    DROP_ROLES 1

and then running bin/buildout.

Without the environment variable, it does nothing.

Configuration

You can set an environment variable to drop the roles:

export DROP_ROLES=1

Set this to 1 (or another positive integer) for yes, and 0 for no. Any other values will be ignored.

Note that the OS environment can be different when you manually start your Plone instance or start it in a cronjob. So it is better to set this in your Plone buildout.cfg:

[instance]
recipe = plone.recipe.zope2instance
environment-vars =
    DROP_ROLES 1

Run the buildout and it will be set in the Plone config, in this case in parts/instance/etc/zope.conf.

If you have a ZEO setup with two zeoclients, where one zeoclient gets all traffic from editors, and another gets the anonymous visitors, you can do this:

  • zeoclient for editors: DROP_ROLES 0

  • zeoclient for anonymous: DROP_ROLES 1

Now editors can edit normally in their edit environment. And when they accidentally login on the anonymous environment, they will be treated as simple Members without extra roles.

Technically, DROP_ROLES 0 does nothing, because it is the default. But it may be good to be specific.

Dropping all roles

If you want to drop all roles, you can use the environment variable DROP_ALL_ROLES:

[instance]
recipe = plone.recipe.zope2instance
environment-vars =
    DROP_ALL_ROLES 1

In this case the DROP_ROLES environment variable is no longer checked.

With DROP_ALL_ROLES we change the patches:

  • getRoles and getRolesInContext always return a list with a single entry: Anonymous.

  • The allowed method returns True when the required object roles are None or contain Anonymous, otherwise it returns False.

You can still login, and the pages will show your name, but you basically cannot make any changes. Probably you can fill in a form with collective.easyform, but that should be about the only thing you can do that makes a change to the database.

That would be the use case: prevent all (or most) changes to the database.

Suggested buildout usage

This is a suggestion on how to properly add this in a buildout. Note that this focuses on configuring collective.droproles, and ignores lots of other useful settings:

[zeoclient]
# Configuration for public zeoclient.
recipe = plone.recipe.zope2instance
http-address = 8080
zeo-client = on
eggs =
    Plone
    collective.droproles
# Environment variables shared by all zeoclients:
base-environment-vars =
    zope_i18n_compile_mo_files true
environment-vars =
    ${:base-environment-vars}
# In the public zeoclient, we drop roles:
    DROP_ROLES 1

[zeoclient-cms]
# Second Plone zeoclient, only used for CMS, so for editors.
# The next weird line means: inherit all settings from the [zeoclient] section:
<= zeoclient
# Use a different port:
http-address = 8090
environment-vars =
    ${:base-environment-vars}
# In the CMS zeoclient, we do not want to drop roles:
    DROP_ROLES 0

[instance]
# Standalone Plone instance without ZEO setup, for local development.
<= zeoclient
zeo-client = off
environment-vars =
    ${:base-environment-vars}
# With single instance, we do not want to drop roles:
    DROP_ROLES 0

ftw.upgrade

If you use the bin/upgrade script from ftw.upgrade, you are automatically authenticated and have the Manager role. But if this script attaches itself to the public zeoclient above, the Manager role would be dropped, making the script useless. We have a patch for this that is active when our other patches are active. So: bin/upgrade should work just fine.

Note: it will not work when you have enabled DROP_ALL_ROLES.

Support

If you are having issues, please let us know. Contact Maurits van Rees at Zest Software, m.van.rees@zestsoftware.nl. Or open an issue in GitHub.

License

The project is licensed under the GPLv2.

Contributors

Changelog

1.0.0 (2021-08-24)

  • Seems to work well, so make a final release. [maurits]

1.0.0b1 (2021-06-15)

  • Initial release. [maurits]

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

collective.droproles-1.0.0.tar.gz (22.4 kB view hashes)

Uploaded Source

Built Distribution

collective.droproles-1.0.0-py2.py3-none-any.whl (19.7 kB view hashes)

Uploaded Python 2 Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page