magpie.services

Module Contents

Classes

ServiceMeta

ServiceInterface

ServiceOWS

Generic request-to-permission interpretation method of various OGC Web Service (OWS) implementations.

ServiceWPS

Service that represents a Web Processing Service endpoint.

ServiceBaseWMS

Service that represents basic capabilities of a Web Map Service endpoint.

ServiceNCWMS2

Service that represents a Web Map Service endpoint with functionalities specific to ncWMS2 .

ServiceGeoserverWMS

Service that represents a Web Map Service endpoint with functionalities specific to GeoServer.

ServiceAccess

ServiceAPI

Service that provides resources per individual request path segments.

ServiceWFS

Service that represents a Web Feature Service endpoint.

ServiceTHREDDS

Service that represents a THREDDS Data Server endpoint.

Functions

service_factory(service: magpie.models.Service, request: pyramid.request.Request) → magpie.services.ServiceInterface

Retrieve the specific service class from the provided database service entry.

class magpie.services.ServiceMeta[source]

Bases: type

property resource_types(cls: Type[ServiceInterface]) → List[models.Resource][source]

Allowed resources type classes under the service.

property resource_type_names(cls: Type[ServiceInterface]) → List[Str][source]

Allowed resources type names under the service.

property child_resource_allowed(cls: Type[ServiceInterface]) → bool[source]
class magpie.services.ServiceInterface(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: object

service_type :Str[source]
params_expected :List[Str] = [][source]
permissions :List[Permission] = [][source]
resource_types_permissions :Dict[models.Resource, List[Permission]][source]
abstract permission_requested(self) → Optional[Union[Permission, Collection[Permission]]][source]

Defines how to interpret the incoming request into Permission definitions for the given service.

Each service must implement its own definition. The method must specifically define how to convert generic request path, query, etc. elements into permissions that match the service and its children resources.

If None is returned, the ACL will effectively be resolved to denied access. Otherwise, one or more returned Permission will indicate which permissions should be looked for to resolve the ACL of the authenticated user and its groups.

abstract resource_requested(self) → Optional[Tuple[ServiceOrResourceType, bool]][source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

user_requested(self)[source]
property __acl__(self) → magpie.typedefs.AccessControlListType[source]

Access Control List (ACL) formed of ACE defining combinations rules to grant or refuse access.

Each ACE is defined as (outcome, user/group, permission) tuples. Called by the configured Pyramid pyramid.authorization.ACLAuthorizationPolicy.

Caching is automatically handled according to configured application settings and whether the specific ACL combination being requested was already processed recently.

_get_acl_cached(self: magpie.typedefs.Str, request_method: magpie.typedefs.Str, request_path: Optional[int], user_id) → magpie.typedefs.AccessControlListType[source]

Cache this method with beaker based on the provided caching key parameters.

If the cache is not hit (expired timeout or new key entry), calls ServiceInterface.get_acl() to retrieve effective permissions of the requested resource and specific permission for the applicable service and user executing the request.

_get_acl(self: magpie.models.User, user: magpie.typedefs.ServiceOrResourceType, resource: Collection[Permission], permissions: bool, allow_match=True) → magpie.typedefs.AccessControlListType[source]

Resolves the resource-tree and the user/group inherited permissions into a simplified ACL for this resource.

_get_request_path_parts(self) → Optional[List[Str]][source]

Obtain the request path parts striped of anything prior to the referenced service name.

get_config(self) → magpie.typedefs.ConfigDict[source]

Obtains the custom configuration of the registered service.

classmethod get_resource_permissions(cls: magpie.typedefs.Str, resource_type_name) → List[Permission][source]

Obtains the allowed permissions of the service’s child resource fetched by resource type name.

allowed_permissions(self: magpie.typedefs.ServiceOrResourceType, resource) → List[Permission][source]

Obtains the allowed permissions for or under the service according to provided service or resource.

effective_permissions(self: magpie.models.User, user: magpie.typedefs.ServiceOrResourceType, resource: Optional[Collection[Permission]], permissions: bool = None, allow_match=True) → List[PermissionSet][source]

Obtains the effective permissions the user has over the specified resource.

Recursively rewinds the resource tree from the specified resource up to the top-most parent service the resource resides under (or directly if the resource is the service) and retrieve permissions along the way that should be applied to children when using scoped-resource inheritance. Rewinding of the tree can terminate earlier when permissions can be immediately resolved such as when more restrictive conditions enforce denied access.

Both user and group permission inheritance is resolved simultaneously to tree hierarchy with corresponding allow and deny conditions. User Direct Permissions have priority over all its groups Inherited Permissions, and denied permissions have priority over allowed access ones.

All applicable permissions on the resource (as defined by allowed_permissions()) will have their resolution (Allow/Deny) provided as output, unless a specific subset of permissions is requested using permissions. Other permissions are ignored in this case to only resolve requested ones. For example, this parameter can be used to request only ACL resolution from specific permissions applicable for a given request, as obtained by permission_requested().

Permissions scoped as match can be ignored using allow_match, such as when the targeted resource does not exist.

class magpie.services.ServiceOWS(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceInterface

Generic request-to-permission interpretation method of various OGC Web Service (OWS) implementations.

abstract resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

permission_requested(self)magpie.permissions.Permission[source]

Defines how to interpret the incoming request into Permission definitions for the given service.

Each service must implement its own definition. The method must specifically define how to convert generic request path, query, etc. elements into permissions that match the service and its children resources.

If None is returned, the ACL will effectively be resolved to denied access. Otherwise, one or more returned Permission will indicate which permissions should be looked for to resolve the ACL of the authenticated user and its groups.

class magpie.services.ServiceWPS(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceOWS

Service that represents a Web Processing Service endpoint.

service_type = wps[source]
permissions[source]
params_expected = ['service', 'request', 'version', 'identifier'][source]
resource_types_permissions[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

class magpie.services.ServiceBaseWMS(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceOWS

Service that represents basic capabilities of a Web Map Service endpoint.

permissions[source]
params_expected = ['service', 'request', 'version', 'layers', 'layername', 'dataset'][source]
abstract resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

class magpie.services.ServiceNCWMS2(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceBaseWMS

Service that represents a Web Map Service endpoint with functionalities specific to ncWMS2 .

service_type = ncwms[source]
resource_types_permissions[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

class magpie.services.ServiceGeoserverWMS(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceBaseWMS

Service that represents a Web Map Service endpoint with functionalities specific to GeoServer.

service_type = geoserverwms[source]
resource_types_permissions[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

class magpie.services.ServiceAccess(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceInterface

service_type = access[source]
permissions[source]
params_expected = [][source]
resource_types_permissions[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

permission_requested(self)[source]

Defines how to interpret the incoming request into Permission definitions for the given service.

Each service must implement its own definition. The method must specifically define how to convert generic request path, query, etc. elements into permissions that match the service and its children resources.

If None is returned, the ACL will effectively be resolved to denied access. Otherwise, one or more returned Permission will indicate which permissions should be looked for to resolve the ACL of the authenticated user and its groups.

class magpie.services.ServiceAPI(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceInterface

Service that provides resources per individual request path segments.

service_type = api[source]
permissions[source]
params_expected = [][source]
resource_types_permissions[source]
resource_requested(self) → Optional[Tuple[ServiceOrResourceType, bool]][source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

permission_requested(self)[source]

Defines how to interpret the incoming request into Permission definitions for the given service.

Each service must implement its own definition. The method must specifically define how to convert generic request path, query, etc. elements into permissions that match the service and its children resources.

If None is returned, the ACL will effectively be resolved to denied access. Otherwise, one or more returned Permission will indicate which permissions should be looked for to resolve the ACL of the authenticated user and its groups.

class magpie.services.ServiceWFS(: magpie.models.Service, service: pyramid.request.Request, request)[source]

Bases: magpie.services.ServiceOWS

Service that represents a Web Feature Service endpoint.

service_type = wfs[source]
permissions[source]
params_expected = ['service', 'request', 'version', 'typenames'][source]
resource_types_permissions[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

class magpie.services.ServiceTHREDDS(*_, **__)[source]

Bases: magpie.services.ServiceInterface

Service that represents a THREDDS Data Server endpoint.

service_type = thredds[source]
permissions[source]
params_expected = ['request'][source]
resource_types_permissions[source]
get_config(self) → magpie.typedefs.ConfigDict[source]

Obtains the custom configuration of the registered service.

get_path_parts(self)[source]
resource_requested(self)[source]

Defines how to interpret the incoming request into the targeted model.Resource for the given service.

Each service must implement its own definition.

The expected return value must be either of the following:

- (target-resource, True)     when the exact resource is found
- (parent-resource, False)    when any parent of the resource is found
- None                        when invalid request or not found resource

The parent-resource indicates the closest higher-level resource in the hierarchy that would nest the otherwise desired target-resource. The idea behind this is that Magpie will be able to resolve the effective recursive permission even if not all corresponding resources were explicitly defined in the database.

For example, if the request would be interpreted with the following hierarchy after service-specific resolution:

ServiceA
    Resource1         <== closest *existing* parent resource
        [Resource2]   <== target (according to service/request resolution), but not existing in database

A permission defined as Allow/Recursive on Resource1 should normally allow access to Resource2. If Resource2 is not present in the database though, it cannot be looked for, and the corresponding ACL cannot be generated. Because the (real) protected service using Magpie can have a large and dynamic hierarchy, it is not convenient to enforce perpetual sync between it and its resource representation in Magpie. Using the (parent-resource, False) will allow resolution of permission from the closest available parent.

Note

In case of parent-resource returned, only recursive-scoped permissions will be considered, since the missing target-resource is the only one that should be checked for match-scoped permissions. For this reason, the service-specific implementation should preferably return the explicit target resource whenever possible.

If the returned resource is None, the ACL will effectively be resolved to denied access. This can be used to indicate failure to retrieve the expected resource or that corresponding resource does not exist. Otherwise, this method implementation should convert any request path, query parameters, etc. into an existing resource.

Returns

tuple of reference resource (target/parent), and enabled status of match permissions (True/False)

permission_requested(self)[source]

Defines how to interpret the incoming request into Permission definitions for the given service.

Each service must implement its own definition. The method must specifically define how to convert generic request path, query, etc. elements into permissions that match the service and its children resources.

If None is returned, the ACL will effectively be resolved to denied access. Otherwise, one or more returned Permission will indicate which permissions should be looked for to resolve the ACL of the authenticated user and its groups.

magpie.services.SERVICE_TYPE_DICT[source]
magpie.services.service_factory(service: magpie.models.Service, request: pyramid.request.Request)magpie.services.ServiceInterface[source]

Retrieve the specific service class from the provided database service entry.