Home  >  Article  >  Backend Development  >  Python views folder permission groups and uses OS modules to operate folders

Python views folder permission groups and uses OS modules to operate folders

高洛峰
高洛峰Original
2017-03-27 16:26:312224browse

@It is recommended to map the network drive when operating the server server folder

import win32security
import ntsecuritycon as con

FILENAME = r'D:\tmp\acc_test' #File Folder path

sd = win32security.GetFileSecurity(FILENAME, win32security.DACL_SECURITY_INFORMATION)
dacl = sd.GetSecurityDescriptorDacl()

ace_count = dacl.GetAceCount() #Show users with folder permissions (Group) quantity
print('Ace count:', ace_count)

for i in range(0, ace_count):
rev, access, usersid = dacl.GetAce(i)
user, group, type = win32security.LookupAccountSid('', usersid)
print('User: {}/{}'.format(group, user), rev, access)
User: user (0 , 0) 1179817 #Only this folder, viewing permissions
User: admin (0, 0) 1245631 #Only this folder, modifying permissions
User: administrator (0, 3) 2032127 #This folder, sub Folder All permissions

#Delete folder permissions
Now you are able to read old ACEs and deleting old ones is quite simple:
for i in range(0, ace_count):
dacl.DeleteAce(0)

#Add privileges using add
And after that you can just add privileges by calling AddAccessAllowedAceEx() [MSDN]:
userx, domain, type = win32security.LookupAccountName ("", "your.user")
usery, domain, type = win32security.LookupAccountName ("", "other.user")

dacl.AddAccessAllowedAceEx(win32security. ACL_REVISION, 3, 2032127, userx) #Full control@middle 3 means that the permissions will be inherited by subsequent folders 0: No
dacl.AddAccessAllowedAceEx(win32security.ACL_REVISION, 3, 1179785, usery) #Read-only permissions

sd.SetSecurityDescriptorDacl(1, dacl, 0) #May not be necessary
win32security.SetFileSecurity(FILENAME, win32security.DACL_SECURITY_INFORMATION, sd)
I've taken numbers 3, 2032127 and 1179785 from the listing in first half of the script (before running the script I've set up privileges in Explorer->Right Click->Properties->Security->Advanced):


# #Example
# try:
# permit = '1179817'
# acegroup = 'Users'
# folder = 'Z:\\50.Test Folder\\01.2'
# sd = win32security.GetFileSecurity(folder, win32security.DACL_SECURITY_INFORMATION)
# dacl = sd.GetSecurityDescriptorDacl()
# user1, domain, type = win32security.LookupAccountName('', acegroup)

## permisson = int(permit)
# dacl.AddAccessAllowedAceEx(win32security.ACL_REVISION, 0, permisson, user1) #The 0 in the middle means that only the folder 3 represents this folder, the sub-file
# sd.SetSecurityDescriptorDacl(1 , dacl, 0) # may not be necessary
# win32security.SetFileSecurity(folder, win32security.DACL_SECURITY_INFORMATION, sd)
# except Exception as e:
# print(e)

# python's os module controls the folder
#import os
#import shutil

# try:
# os.mkdir(r'Z:\50.test folder\01.2') #New folder
# except Exception as e:
# print(e)

# try:
# os.rename(r'Z:\50.Test folder\01.2 ',r'Z:\50.Test Folder\01.3') #Rename the folder
# except Exception as e:
# print(e)

# try:
# shutil.rmtree(r'Z:/50.Test folder/01.3') ##Delete the named folder
# except Exception as e:
# Print(e)
PS. Call cmd control Folder
http://jingyan.baidu.com/article/d3b74d64c853081f77e60929.html Download and install pywin32
#Create folder
def createfolder(request):
folder=r'Z:/50 .Test folder/01.3'
result={}
try:
#Connect to the remote server using wmi
pythoncom.CoInitialize()
conn = wmi.WMI(computer='192.168 .0.1', user='user', password='user')
cmd_callbat=r"cmd.exe /c mkdir %s" % folder
conn.Win32_Process.Create(CommandLine=cmd_callbat) #Execute bat File
result['isSuccess']=True
result['message']=' Added successfully'
except Exception as e:
print(e)
result['isSuccess'] = False
result['message'] = 'Add failed'+e
response = HttpResponse()
response['Content-Type'] = "text/javascript"
response.write(json .dumps(result))
return response

 

The above is the detailed content of Python views folder permission groups and uses OS modules to operate folders. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn