def retrieve_public_key(): device_id = request.form.get("device_id", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (device_id, DEVICE_ID_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check if not User.can_use_device(user, device_id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) user_device = db.session.query(UserDevice) \ .filter(and_(UserDevice.device_id == device_id, UserDevice.user_id == user.id)).first() public_key = user_device.device_public_session_key if public_key: user_device.device_public_session_key = None user_device.added = None db.session.add(user_device) db.session.commit() return http_json_response(**{'device_public_key': public_key}) return http_json_response(False, 400, **{"error": NO_PUBLIC_KEY_ERROR_MSG})
def trigger_action(): device_name_bi = request.args.get("device_name_bi", None) name_bi = request.args.get("name_bi", None) additional_data = request.args.get("additional_data", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (device_name_bi, DEVICE_NAME_BI_MISSING_ERROR_MSG), (additional_data, ADDITIONAL_DATA_MISSING_ERROR_MSG), (name_bi, ACTION_NAME_BI_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check dv = Device.get_by_name_bi(device_name_bi) if dv is None or not User.can_use_device(user, dv.id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) topic = format_topic(user.mqtt_creds.username, dv.mqtt_creds.username) ac = Device.get_action_by_bi(dv.id, name_bi) if ac is None: return http_json_response(False, 400, **{"error": ACTION_BI_INVALID_ERROR_MSG}) payload = create_payload(user.mqtt_creds.username, { "action": ac.name.decode("utf-8"), "additional_data": additional_data }) client.publish(topic, payload) return http_json_response()
def get_device_data(): device_name_bi = request.args.get("device_name_bi", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (device_name_bi, DEVICE_NAME_BI_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check device = Device.get_by_name_bi(device_name_bi) if device is None: return http_json_response( False, 400, **{"error": DEVICE_NAME_BI_INVALID_ERROR_MSG}) if not User.can_use_device(user, device.id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) result = [] for row in device.data: r = row.as_dict() for k, v in r.items(): if isinstance(v, bytes): r[k] = v.decode() result.append(r) return http_json_response(**{'device_data': result})
def set_device_action(): device_id = request.form.get("device_id", None) correctness_hash = request.form.get("correctness_hash", None) name = request.form.get("name", None) name_bi = request.form.get("name_bi", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (device_id, DEVICE_ID_MISSING_ERROR_MSG), (correctness_hash, CORRECTNESS_HASH_MISSING_ERROR_MSG), (name, ACTION_NAME_MISSING_ERROR_MSG), (name_bi, ACTION_NAME_BI_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check if not user.is_registered_with_broker: return http_json_response( False, 400, **{"error": NOT_REGISTERED_WITH_BROKER_ERROR_MSG}) if not User.can_use_device(user, device_id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) dv = Device.get_by_id(device_id) with db.session.no_autoflush: dv.add_action(name.encode(), name_bi, correctness_hash) db.session.add(dv) db.session.commit() return http_json_response()
def add_scene_action(): scene_name_bi = request.form.get("scene_name_bi", None) action_name_bi = request.form.get("action_name_bi", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (scene_name_bi, SCENE_NAME_BI_MISSING_ERROR_MSG), (action_name_bi, ACTION_NAME_BI_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check sc = Scene.get_by_name_bi(scene_name_bi) ac = Action.get_by_name_bi(action_name_bi) if sc is None or ac is None: return http_json_response( False, 400, **{"error": INVALID_SCENE_OR_ACTION_BI_ERROR_MSG}) if not User.can_use_device(user, ac.device_id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) if sc.owner is not None and sc.owner != user: return http_json_response( False, 400, **{"error": UNAUTHORIZED_USER_SCENE_ERROR_MSG}) if sc.already_present(ac): return http_json_response( False, 400, **{"error": ACTION_ALREADY_PRESENT_ERROR_MSG}) sc.actions.append(ac) db.session.add(sc) db.session.commit() return http_json_response()
def test_can_use_device(app_and_ctx, access_token, access_token_two): app, ctx = app_and_ctx device_id = 23 with app.app_context(): user = User.get_by_id(1) assert not User.can_use_device(user, "non a number") assert not User.can_use_device(user, 45) assert User.can_use_device(user, device_id) user_2 = User.get_by_id(2) assert not User.can_use_device(user_2, device_id) ud = UserDevice() dv = Device.get_by_id(device_id) ud.device = dv with db.session.no_autoflush: ud.user = user_2 db.session.add(ud) db.session.commit() assert User.can_use_device(user_2, device_id) ud = UserDevice.get_by_ids(device_id, user_2.id) # Clean-up dv.users.remove(ud) db.session.add(dv) db.session.commit() assert not User.can_use_device(user_2, device_id)
def exchange_session_keys(): user_public_key_bytes = request.form.get("public_key", None) device_id = request.form.get("device_id", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (user_public_key_bytes, PUBLIC_KEY_MISSING_ERROR_MSG), (device_id, DEVICE_ID_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check if not User.can_use_device(user, device_id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) payload_bytes = bytes( Payload(user_public_key=user_public_key_bytes, user_id=user.id)) client.publish(f'server/d:{device_id}/', f'"{payload_bytes.decode("utf-8")}"'.encode()) return http_json_response()
def authorize_user(): device_name_bi = request.form.get("device_name_bi", None) auth_user_id = request.form.get("auth_user_id", None) # ID of user to be authorized user = User.get_using_jwt_token(request.headers.get("Authorization", "")) auth_user = User.get_by_id(auth_user_id) arg_check = check_missing_request_argument( (device_name_bi, DEVICE_NAME_BI_MISSING_ERROR_MSG), (auth_user_id, AUTH_USER_ID_MISSING_ERROR_MSG), (None if auth_user is None or auth_user.id == user.id else auth_user, AUTH_USER_ID_INVALID_ERROR_MSG)) if arg_check is not True: return arg_check device = Device.get_by_name_bi(device_name_bi) if device is None or not User.can_use_device(user, device.id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) if not auth_user.is_registered_with_broker: return http_json_response( False, 400, **{"error": NOT_REGISTERED_WITH_BROKER_ERROR_MSG}) if next((ud for ud in device.users if ud.user_id == auth_user.id), None) is not None: return http_json_response( False, 400, **{"error": AUTH_USER_ALREADY_AUTHORIZED_ERROR_MSG}) ud = UserDevice() ud.device = device ud.user = auth_user db.session.add(ud) auth_user.add_acls_for_device(device.id) device.add_acls_for_user(auth_user_id) db.session.add(auth_user) db.session.add(device) db.session.commit() return http_json_response()
def revoke_user(): device_name_bi = request.form.get("device_name_bi", None) revoke_user_id = request.form.get("revoke_user_id", None) # ID of user to be revoked user = User.get_using_jwt_token(request.headers.get("Authorization", "")) user_to_revoke = User.get_by_id(revoke_user_id) arg_check = check_missing_request_argument( (device_name_bi, DEVICE_NAME_BI_MISSING_ERROR_MSG), (revoke_user_id, REVOKE_USER_ID_MISSING_ERROR_MSG), (None if user_to_revoke is None or user_to_revoke.id == user.id else user_to_revoke, REVOKE_USER_ID_INVALID_ERROR_MSG)) if arg_check is not True: return arg_check device = Device.get_by_name_bi(device_name_bi) if device is None or not User.can_use_device(user, device.id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) device = Device.get_by_id(device.id) if next((ud for ud in device.users if ud.user_id == user_to_revoke.id), None) is None: return http_json_response( False, 400, **{"error": REVOKE_USER_NOT_AUTHORIZED_ERROR_MSG}) ud_to_remove = UserDevice.get_by_ids(int(device.id), user_to_revoke.id) device.users.remove(ud_to_remove) db.session.add(device) user_to_revoke.remove_acls_for_device(device.id) device.remove_acls_for_user(revoke_user_id) db.session.add(device) db.session.add(user_to_revoke) db.session.commit() return http_json_response()
def get_data_by_num_range(): lower_bound = request.args.get("lower", "") upper_bound = request.args.get("upper", "") device_name_bi = request.args.get("device_name_bi", None) user = User.get_using_jwt_token(request.headers.get("Authorization", "")) arg_check = check_missing_request_argument( (device_name_bi, DEVICE_NAME_BI_MISSING_ERROR_MSG)) if arg_check is not True: return arg_check device = Device.get_by_name_bi(device_name_bi) if device is None: return http_json_response( False, 400, **{"error": DEVICE_NAME_BI_INVALID_ERROR_MSG}) if not User.can_use_device(user, device.id): return http_json_response(False, 400, **{"error": UNAUTHORIZED_USER_ERROR_MSG}) if not is_number(lower_bound) and not is_number(upper_bound): return http_json_response(False, 400, **{"error": DATA_RANGE_MISSING_ERROR_MSG}) with suppress(ValueError): lower_bound = int(lower_bound) with suppress(ValueError): upper_bound = int(upper_bound) data = [] if isinstance(lower_bound, int) and isinstance(upper_bound, int): if -214748364800 <= lower_bound < upper_bound <= 214748364700: data = db.session.query(DeviceData).join(Device).filter( and_(DeviceData.num_data > lower_bound, DeviceData.num_data < upper_bound, Device.name_bi == device_name_bi)).all() else: return http_json_response( False, 400, **{"error": DATA_OUT_OF_OUTPUT_RANGE_ERROR_MSG}) elif not isinstance(upper_bound, int) and isinstance(lower_bound, int): if -214748364800 <= lower_bound <= 214748364700: data = db.session.query(DeviceData).join(Device).filter( and_(DeviceData.num_data > lower_bound, Device.name_bi == device_name_bi)).all() else: return http_json_response( False, 400, **{"error": DATA_OUT_OF_OUTPUT_RANGE_ERROR_MSG}) elif not isinstance(lower_bound, int) and isinstance(upper_bound, int): if -214748364800 <= upper_bound <= 214748364700: data = db.session.query(DeviceData).join(Device).filter( and_(DeviceData.num_data < upper_bound, Device.name_bi == device_name_bi)).all() else: return http_json_response( False, 400, **{"error": DATA_OUT_OF_OUTPUT_RANGE_ERROR_MSG}) result = [] for row in data: r = row.as_dict() for k, v in r.items(): if isinstance(v, bytes): r[k] = v.decode() result.append(r) return http_json_response(**{'device_data': result})