def handle(): """ Handler for `/helpdesk` methods ### Examples: `/helpdesk/method/{methodname}` will call a whitelisted method """ try: validate_request() return handler.handle() except Exception, e: import traceback print traceback.format_exc() return get_response(0, str(e))
def handle(): """ Handler for `/helpdesk` methods ### Examples: `/helpdesk/method/{methodname}` will call a whitelisted method """ try: validate_request() return handler.handle() except Exception, e: import traceback print traceback.format_exc() return get_response(message=str(e))
def process_translation(): """ Get the words being sent from the application and send to Google Translate """ request_data = request.get_json() print(request_data) valid_content = validate_request(request_data) if not valid_content: return make_response('Missing content', 400) words_list = request_data.get('wordsList') # if not words_list: # return make_response('Missing words list', 400) target_language = request_data['targetLanguage'] authenticated = validate_authentication() if not authenticated: return make_response('Unable to authenticate with GOOGLE', 401) if request_data['sourceLanguage']=='en': return translate_words(words_list, target_language) translated_source_words = translate_words(words_list, request_data['sourceLanguage'], isHttpResponse=False) source_words = [y for (x, y) in translated_source_words] return translate_words(source_words, request_data['targetLanguage'])
def webhook_listener(): logging.info(request) if not validate_request(request, SCALR_SIGNING_KEY): abort(403) out = json.load(open(SCALR_JSONFILE)) logging.info(out) return jsonify(out)
def handle(): """ Handler for `/api_name` methods **api_name = configured in api_hander hooks ### Examples: `/api_name/{methodname}` will call a whitelisted method """ print "in handle" error_code = "02" error_desc = "Success" try: validate_request() pkg = get_user_package_in_json_format(frappe.local.form_dict.data) if not update_user_package(pkg): raise Exception("Error while updating package") except Exception, e: import traceback print traceback.format_exc() error_code = "01" error_desc = cstr(e)
def webhook_listener(): if not validate_request(request, SCALR_SIGNING_KEY): abort(403) mydb = mysql.connector.connect(host=SCALR_MYSQL_SERVER, user=SCALR_MYSQL_USER, passwd=SCALR_MYSQL_PASS, database=SCALR_MYSQL_DB) var = mydb.cursor() var.execute(SCALR_QUERY) json_data = [] for (name) in var: if name[1] == None: json_data.append({"value": name[0]}) else: json_data.append({"value": name[0], "label": name[1]}) out = {"list": json_data, "ttl": SCALR_TTL} logging.info(out) return jsonify(out)
def webhook_listener(): if not validate_request(request, SCALR_SIGNING_KEY): abort(403) data = json.loads(request.data) event = data['eventName'] requestid = data['requestId'] owneremail = data['data']['SCALR_FARM_OWNER_EMAIL'] farmname = data['data']['SCALR_FARM_NAME'] operation = data['operation'] logging.info(requestid) # log pending state and requirest ID to sqlitedb (called from util.py) dbupdate(requestid, 'pending', farmname, owneremail, operation) # set approval state to pending resp = make_response( json.dumps({ "approval_status": "pending", "message": "pending" }), 202) # redis (called from util.py) status = redisqueue(approval, requestid, SCALR_SIGNING_KEY, SCALR_URL) logging.info(status) return resp
def login(): if request.method == 'GET': return render_template('login.html', form_type="") else: if 'button' in request.form: return render_template('login.html', form_type=request.form['button'], default_username="") else: message = validate.validate_request(request.form) if message != "": return render_template('login.html', form_type="", specmessage=message) else: if request.form['task'] == "login": userdata = queries.get_user_by_name( request.form['username']) if not userdata: message = "Wrong username or password" return render_template( 'login.html', form_type='login', default_username=request.form['username'], message=message) password_hash = userdata[0]['password'] if bcrypt.checkpw(request.form['password'].encode('utf-8'), password_hash.encode('utf-8')): session['account_id'] = userdata[0]['id'] session['username'] = userdata[0]['username'] return redirect('/account') else: message = "Wrong username or password" return render_template( 'login.html', form_type='login', default_username=request.form['username'], message=message) else: userdata = queries.get_user_by_name( request.form['username']) if len(userdata) == 0: message = validate.validate_password( request.form['password']) if message != "": return render_template( 'login.html', form_type='register', default_username=request.form['username'], message=message) else: password_hash = bcrypt.hashpw( request.form['password'].encode('utf-8'), bcrypt.gensalt()).decode('utf-8') queries.add_user_account(request.form['username'], password_hash) return redirect('/login') else: message = "Username already taken." return render_template( 'login.html', form_type='register', default_username=request.form['username'], message=message)