Skip to main content

Ability to create project workspaces with local workflow

Project description

Overview

borg.project adds the ability to create project workspaces with local workflow policies and local roles.

One can use it to create a workspace for projects that only certain members can access and modify and where you can decide to use other workflows for the content than in the rest of the portal. All these settings are configured centrally on the project workspace itself.

Change history

Changelog for borg.project

1.1rc4 (2009-10-31)

  • bugfix, wrong workflow state in transition declaration [jessesnyder]

  • Added i18n structure and german translations [redcor]

  • Added default values for some fields and tests [jcbrand]

  • Fixed a bug with returning local roles [do3cc]

  • Moved code around and added buildout.cfgs for testing against a number of different plone versions [do3cc]

1.1rc3 (13.02.2008)

  • Initial package structure. [zopeskel]

  • Extracted borg.project out of borg [optilude]

  • Added tests and documentation [optilude]

Detailed Documentation

borg.project : Collaborative workspaces for the masses

by Martin Aspeli <optilude@gmx.net>

This product is based on b-org, and only runs on Plone 3. It depends on the borg.localrole package.

Place these packages in your PYTHONPATH or install them into a buildout or a workingenv, and then use Plone’s Add-on product configuration to install.

With borg.project, you can create a folder in the portal with:

  • a number of users assigned as managers, given a local Manager role

  • a number of users assigned as team members, given a local TeamMember role

  • a custom workflow, as specified by a CMFPlacefulWorkflow policy

  • an explicitly managed list of addable content types

The default version of the project workflow contains states for content being published, visible only to team members, or completely private.

Setting up a new project

First, we need to add a few members

>>> from Products.CMFCore.utils import getToolByName
>>> membership = getToolByName(self.portal, 'portal_membership')
>>> membership.addMember('member1', 'secret', ('Member',), ())
>>> membership.addMember('member2', 'secret', ('Member',), ())
>>> membership.addMember('member3', 'secret', ('Member',), ())
>>> membership.addMember('member4', 'secret', ('Member',), ())
>>> membership.addMember('member5', 'secret', ('Member',), ())

and a group, with a single member

>>> groups = getToolByName(self.portal, 'portal_groups')
>>> _ = groups.addGroup('group1')
>>> _ = groups.addPrincipalToGroup('member4', 'group1')

We need to be the a manager to create the project workspace.

>>> self.loginAsPortalOwner()

The UberMultiSelectionWidget in plone/app/form/widgets requires that the addform’s schema.List fields each has a default value that is iterable. (i.e list, tuple, set etc.)

>>> from zope.publisher.browser import TestRequest
>>> from borg.project.browser.project import ProjectAddForm
>>> from borg.project.interfaces import IProject
>>> request = TestRequest()
>>> addform = ProjectAddForm(IProject, request)
>>> addform.form_fields.get('managers').field.default
[]
>>> addform.form_fields.get('members').field.default
[]
>>> addform.form_fields.get('groups').field.default
[]

We can now create the project object. Will simulate what happens in the add form here, by setting the relevant properties on a newly created object, calling _finishConstruction() on its FTI to finalise workflow creation, and send the IObjectCreatedEvent event.

Notice how managers and members are lists of user ids.

>>> from zope.component import createObject
>>> project1 = createObject(u"borg.project.Project")
>>> project1.id = 'project1'
>>> project1.title = "Project 1"
>>> project1.description = "A first project"
>>> project1.managers = ('member1', 'member2',)
>>> project1.members = ('member2', 'member3',)
>>> project1.groups = ('group1',)

Workflow policies are obtained from a vocabulary. The default vocabulary simply returns a particular policy which is installed at setup time.

>>> from zope.schema.interfaces import IVocabularyFactory
>>> from zope.component import getUtility
>>> policies_factory = getUtility(IVocabularyFactory, name=u"borg.project.WorkflowPolicies")
>>> policies_vocabulary = policies_factory(self.portal)
>>> workflow_policy = list(policies_vocabulary)[0]
>>> workflow_policy.value
'borg_project_placeful_workflow'
>>> project1.workflow_policy = workflow_policy.value

Addable types are from another vocabulary, which should include any globally allowed types.

>>> types_factory = getUtility(IVocabularyFactory, name=u"borg.project.AddableTypes")
>>> types_vocabulary = types_factory(self.portal)
>>> 'Document' in [v.value for v in types_vocabulary]
True
>>> 'Topic' in [v.value for v in types_vocabulary]
True

There is also a method to get default values for the addable types field. This gives back all globally allowed types with Owner in the list of roles for their add permissions.

>>> from borg.project.utils import default_addable_types
>>> default_addable = default_addable_types(self.portal)
>>> 'Document' in default_addable
True
>>> 'Large Plone Folder' in default_addable
False
>>> project1.addable_types = ('Document', 'Folder',)

Now let us finish construction and fire those events.

>>> from zope.event import notify
>>> from zope.lifecycleevent import ObjectCreatedEvent
>>> try:
...     from zope.container.contained import ObjectAddedEvent, notifyContainerModified
... except ImportError:
...     pass # We are in Plone3 land
>>> notify(ObjectCreatedEvent(project1))
>>> new_id = self.portal._setObject('project1', project1)
>>> project1 = self.portal._getOb(new_id)
>>> if hasattr(project1.getTypeInfo(), '_finishConstruction'):
...     _ = project1.getTypeInfo()._finishConstruction(project1)

With this, the project is properly constructed. Let us verify that the local policy is in place.

>>> placeful_workflow = getToolByName(self.portal, 'portal_placeful_workflow')
>>> placeful_workflow.getWorkflowPolicyConfig(project1).getPolicyBelowId()
'borg_project_placeful_workflow'

And that our members have the appropriate roles

>>> acl_users = getToolByName(self.portal, 'acl_users')

This user is a manager only.

>>> member1 = acl_users.getUserById('member1')
>>> 'Manager' in member1.getRolesInContext(project1)
True
>>> 'TeamMember' in member1.getRolesInContext(project1)
False

This user is a manager and a member.

>>> member2 = acl_users.getUserById('member2')
>>> 'Manager' in member2.getRolesInContext(project1)
True
>>> 'TeamMember' in member2.getRolesInContext(project1)
True

This user is a member only.

>>> member3 = acl_users.getUserById('member3')
>>> 'Manager' in member3.getRolesInContext(project1)
False
>>> 'TeamMember' in member3.getRolesInContext(project1)
True

This user is associated by way of the group.

>>> member4 = acl_users.getUserById('member4')
>>> 'Manager' in member4.getRolesInContext(project1)
False
>>> 'TeamMember' in member4.getRolesInContext(project1)
True

This user has no association with the group.

>>> member5 = acl_users.getUserById('member5')
>>> 'Manager' in member5.getRolesInContext(project1)
False
>>> 'TeamMember' in member5.getRolesInContext(project1)
False

Finally, let us verify that the permission management has worked. The key here is that users with the TeamMember role should be able to add the types we explicitly defined, but no other types.

The two managers can add other content, though.

>>> self.login('member1')
>>> project1.invokeFactory('Document', 'd1')
'd1'
>>> project1.invokeFactory('Image', 'i1')
'i1'
>>> self.login('member2')
>>> project1.invokeFactory('Document', 'd2')
'd2'
>>> project1.invokeFactory('Image', 'i2')
'i2'
>>> self.login('member3')
>>> project1.invokeFactory('Document', 'd3')
'd3'
>>> project1.invokeFactory('Image', 'i3')
Traceback (most recent call last):
...
Unauthorized: Cannot create Image
>>> self.login('member4')
>>> project1.invokeFactory('Document', 'd4')
'd4'
>>> project1.invokeFactory('Image', 'i4')
Traceback (most recent call last):
...
Unauthorized: Cannot create Image

But of course, a user who is not a team member can’t add anything.

>>> self.login('member5')
>>> project1.invokeFactory('Document', 'd5')
Traceback (most recent call last):
...
Unauthorized: Cannot create Document
>>> project1.invokeFactory('Image', 'i5')
Traceback (most recent call last):
...
Unauthorized: Cannot create Image

Contributors

  • Martin Aspeli [optilude]

  • Patrick Gerken [do3cc]

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

borg.project-1.1rc4dev-r0.tar.gz (7.8 kB view details)

Uploaded Source

File details

Details for the file borg.project-1.1rc4dev-r0.tar.gz.

File metadata

File hashes

Hashes for borg.project-1.1rc4dev-r0.tar.gz
Algorithm Hash digest
SHA256 6ed4d89e1233b0c6ca7f1877b8501e6df40bc93bf898420fdff303630d27167e
MD5 95e4bfb21f97cc5dbe85d9b383c0d4fa
BLAKE2b-256 265aa86cf8d56dc42879b0c05fa27220863c546f3774756edcc43184116d339e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page