-
Notifications
You must be signed in to change notification settings - Fork 13
/
policies_folder_status.py
214 lines (171 loc) · 9.68 KB
/
policies_folder_status.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
"""Policy check functions for folder status transitions."""
__copyright__ = 'Copyright (c) 2019-2024, Utrecht University'
__license__ = 'GPLv3, see LICENSE'
import time
import folder
import meta
import notifications
import provenance
from util import *
def pre_status_transition(ctx: rule.Context,
coll: str,
current: constants.research_package_state,
new: constants.research_package_state) -> policy.Succeed | policy.Fail:
"""Action taken before status transition."""
if current != constants.research_package_state.LOCKED \
and new in [constants.research_package_state.LOCKED,
constants.research_package_state.SUBMITTED]:
# Backwards compatibility for folders that hold deprecated SECURED status.
# Clear action log coming from SECURED state.
# SECURED -> LOCKED and SECURED -> SUBMITTED
if current is constants.research_package_state.SECURED:
ctx.iiRemoveAVUs(coll, constants.UUORGMETADATAPREFIX + 'action_log')
# Clear action log coming from FOLDER state.
# FOLDER -> LOCKED and FOLDER -> SUBMITTED
if current is constants.research_package_state.FOLDER:
ctx.iiRemoveAVUs(coll, constants.UUORGMETADATAPREFIX + 'action_log')
# Add locks to folder, descendants and ancestors
x = ctx.iiFolderLockChange(coll, 'lock', '')
if x['arguments'][2] != '0':
return policy.fail('Could not lock folder')
if new in [constants.research_package_state.FOLDER,
constants.research_package_state.REJECTED,
constants.research_package_state.SECURED]:
# Backwards compatibility for folders that hold deprecated SECURED status.
# Clear action log coming from SECURED state.
# SECURED -> FOLDER
if current is constants.research_package_state.SECURED:
ctx.iiRemoveAVUs(coll, constants.UUORGMETADATAPREFIX + 'action_log')
# Remove locks from folder, descendants and ancestors
x = ctx.iiFolderLockChange(coll, 'unlock', '')
if x['arguments'][2] != '0':
return policy.fail('Could not lock folder')
return policy.succeed()
def can_transition_folder_status(ctx: rule.Context,
actor: str,
coll: str,
status_from: str,
status_to: str) -> policy.Succeed | policy.Fail:
transition = (constants.research_package_state(status_from),
constants.research_package_state(status_to))
if transition not in constants.folder_transitions:
return policy.fail('Illegal status transition')
meta_path = '{}/{}'.format(coll, constants.IIJSONMETADATA)
if status_to is constants.research_package_state.SUBMITTED:
if not data_object.exists(ctx, meta_path):
return policy.fail('Metadata missing, unable to submit this folder')
if not meta.is_json_metadata_valid(ctx, meta_path):
return policy.fail('Metadata is not valid, please open the metadata form for more information')
elif status_to in [constants.research_package_state.ACCEPTED,
constants.research_package_state.REJECTED]:
if pathutil.info(coll).space is pathutil.Space.RESEARCH:
grp = pathutil.info(coll).group
cat = group.get_category(ctx, grp)
dmgrp = 'datamanager-' + cat
if group.exists(ctx, dmgrp) and not user.is_member_of(ctx, dmgrp, actor):
return policy.fail('Only a member of {} is allowed to accept or reject a submitted folder'.format(dmgrp))
elif status_from is constants.research_package_state.ACCEPTED and status_to is constants.research_package_state.FOLDER:
actor = user.user_and_zone(ctx)
if not user.is_admin(ctx, actor):
return policy.fail('Only a rodsadmin is allowed to secure a folder to the vault')
return policy.succeed()
def can_set_folder_status_attr(ctx: rule.Context,
actor: str,
coll: str,
status: str) -> policy.Succeed | policy.Fail:
try:
status = "" if status == "FOLDER" else status
new = constants.research_package_state(status)
except ValueError:
return policy.fail('New folder status attribute is invalid')
current = folder.get_status(ctx, coll)
x = can_transition_folder_status(ctx, actor, coll, current, new)
if not x:
return x
else:
return (current, new)
def post_status_transition(ctx: rule.Context,
path: str,
actor: str,
status: str) -> None:
"""Post folder status transition actions."""
status = "" if status == "FOLDER" else status
status = constants.research_package_state(status)
if status is constants.research_package_state.SUBMITTED:
provenance.log_action(ctx, actor, path, "submitted for vault")
# Store actor of submitted for vault.
folder.set_submitter(ctx, path, actor)
if pathutil.info(path).space is pathutil.Space.RESEARCH and folder.datamanager_exists(ctx, path):
# Send notifications to datamanagers
datamanagers = folder.get_datamanagers(ctx, path)
message = "Data package submitted for the vault"
for datamanager in datamanagers:
datamanager = '{}#{}'.format(*datamanager)
notifications.set(ctx, actor, datamanager, path, message)
else:
# Set status to accepted for deposit groups or if research group has no datamanager.
folder.set_status(ctx, path, constants.research_package_state.ACCEPTED)
elif status is constants.research_package_state.ACCEPTED:
# Actor is system for deposit groups or if research group has no datamanager.
if pathutil.info(path).space is pathutil.Space.DEPOSIT or not folder.datamanager_exists(ctx, path):
actor = "system"
# Log action at least one second after previous action, to ensure correct order of provenance log.
time.sleep(1)
provenance.log_action(ctx, actor, path, "accepted for vault")
# Store actor of accepted for vault.
folder.set_accepter(ctx, path, actor)
# Send notifications to submitter.
if pathutil.info(path).space is pathutil.Space.RESEARCH and folder.datamanager_exists(ctx, path):
submitter = folder.get_submitter(ctx, path)
message = "Data package accepted for vault"
notifications.set(ctx, actor, submitter, path, message)
# Set state to secure package in vault space.
attribute = constants.UUORGMETADATAPREFIX + "cronjob_copy_to_vault"
avu.set_on_coll(ctx, path, attribute, constants.CRONJOB_STATE['PENDING'])
ctx.iiScheduleCollCopyToVault(path)
elif status is constants.research_package_state.FOLDER:
# If previous action was submit and new status is FOLDER action is unsubmit.
provenance_log = provenance.get_provenance_log(ctx, path)
if provenance_log[0][1] == "submitted for vault":
provenance.log_action(ctx, actor, path, "unsubmitted for vault")
elif provenance_log[0][1] == "accepted for vault":
actor = "system"
provenance.log_action(ctx, actor, path, "secured in vault")
# Send notifications to submitter and accepter
data_package = folder.get_vault_data_package(ctx, path)
submitter = folder.get_submitter(ctx, path)
accepter = folder.get_accepter(ctx, path)
message = "Data package secured in vault"
notifications.set(ctx, actor, submitter, data_package, message)
notifications.set(ctx, actor, accepter, data_package, message)
# Handle vault packages from deposit module.
if pathutil.info(path).space is pathutil.Space.DEPOSIT:
# Grant submitter (depositor) read access to vault package.
msi.set_acl(ctx, "recursive", "read", submitter, data_package)
# Retrieve Data Access Restriction of vault package.
meta_path = meta.get_collection_metadata_path(ctx, path)
open_package = False
if meta_path is not None:
metadata = jsonutil.read(ctx, meta_path)
data_access_restriction = metadata.get("Data_Access_Restriction", "")
if data_access_restriction == "Open - freely retrievable":
open_package = True
# Revoke read access for research group when data package is not open.
if not open_package:
_, _, group, _ = pathutil.info(path)
msi.set_acl(ctx, "recursive", "null", group, data_package)
# Remove deposit folder after secure in vault.
parent, _ = pathutil.chop(path)
msi.set_acl(ctx, "default", "admin:write", user.full_name(ctx), parent)
msi.set_acl(ctx, "recursive", "admin:own", user.full_name(ctx), path)
collection.remove(ctx, path)
else:
provenance.log_action(ctx, actor, path, "unlocked")
elif status is constants.research_package_state.LOCKED:
provenance.log_action(ctx, actor, path, "locked")
elif status is constants.research_package_state.REJECTED:
provenance.log_action(ctx, actor, path, "rejected for vault")
# Send notifications to submitter
submitter = folder.get_submitter(ctx, path)
message = "Data package rejected for vault"
notifications.set(ctx, actor, submitter, path, message)