def GET(self, name=None): try: logging.info("[LayMan][GET] %s" % name) params = repr(web.input()) logging.info("[LayMan][GET] Parameters: %s ... %s" % (str(params)[:500], str(params)[-500:])) if not self.auth.authorised: logging.error("[LayMan][GET] Unauthorised") raise AuthError(401, "Authorisation failed. Are you logged-in?") code = None # 200, 404... retval = None # success: returned value. failure: error message. origName = name path = [d for d in name.split(os.path.sep) if d] # GET "http://localhost:8080/layman/fileman/" if path[0] == "fileman": from fileman import FileMan fm = FileMan() # /fileman if len(path) == 1: logging.info("[LayMan][GET /fileman]") (code, retval) = fm.getFiles(self.auth.getFSUserDir()) # /fileman/<file> elif len(path) == 2: (code, retval) = fm.getFile(self._getTargetFile(path[1])) # /fileman/detail/<file> elif len(path) == 3 and\ path[1] == "detail": (code, retval) = fm.getFileDetails(self._getTargetFile(path[2])) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif path[0] == 'publish': from layed import LayEd le = LayEd() roles = self.auth.getRoles() (code,retval) = le.getLayers(roles) # Get the list of tables in db (or other data) elif path[0] == 'data': # /data if len(path) == 1: from layed import LayEd le = LayEd() roles = self.auth.getRoles() (code,retval) = le.getData(roles) elif len(path) == 2: # /layed/groups if path[1] == "groups": (code, retval) = self.auth.getRolesStr() # /layed/allgroups elif path[1] == "allgroups": (code, retval) = self.auth.getAllRolesStr() else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif path[0] == 'layed': from layed import LayEd le = LayEd() # /layed[?usergroup=FireBrigade] if len(path) == 1: """ Get the json of the layers. If usergroup parameter is specified, only the layers of the corresponding workspace are returned. Otherwise, the layers of all groups allowed are returned in proprietary json, ordered by group (i.e. workspace) """ logging.info("[LayMan][GET /layed]") inpt = web.input(usergroup=None) if inpt.usergroup == None: # workspace not given, go for all roles = self.auth.getRoles() else: # workspace given, go for one role = self.auth.getRole(inpt.usergroup) roles = [role] (code,retval) = le.getLayers(roles) elif len(path) == 2: # /layed/workspaces if path[1] == "workspaces": (code, retval) = le.getWorkspaces() # /layed/groups elif path[1] == "groups": (code, retval) = self.auth.getRolesStr() # /layed/allgroups elif path[1] == "allgroups": (code, retval) = self.auth.getAllRolesStr() else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif len(path) == 3: # /layed/config/<layer>?usergroup=FireBrigade if path[1] == "config": layerName = path[2] inpt = web.input(usergroup=None) gsWorkspace = self.auth.getGSWorkspace(inpt.usergroup) (code, retval) = le.getLayerConfig(gsWorkspace, layerName) # /layed/workspaces/<ws> elif path[1] == "workspaces": (code, retval) = le.getWorkspace(path[2]) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif path[0] == "geoserver": ws = None g = None from layed.gsconfig import GsConfig code = 200 if path[1] == "style" and len(path) >= 3: #if len(path) > 3: # ws = path[-2] g = GsConfig() retval = g.getStyle(path[-1]) web.header("Content-type", "text/xml") else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) success = self._setReturnCode(code) if not success: retval = self._jsonReply(code, message=retval, success=success) # else: we return the returned value directly return retval except LaymanError as le: return self._handleLaymanError(le) except Exception as e: return self._handleException(e)
def GET(self, name=None): try: logging.info("[LayMan][GET] %s" % name) params = repr(web.input()) logging.info("[LayMan][GET] Parameters: %s ... %s" % (str(params)[:500], str(params)[-500:])) if not self.auth.authorised: logging.error("[LayMan][GET] Unauthorised") raise AuthError(401, "Authorisation failed. Are you logged-in?") code = None # 200, 404... retval = None # success: returned value. failure: error message. origName = name path = [d for d in name.split(os.path.sep) if d] # GET "http://localhost:8080/layman/files/<user>" if path[0] == "files" and len(path) >= 2: from fileman import FileMan fm = FileMan() # Everyone can get only his/her own files userName = self.auth.getUserName() if userName != path[1]: logging.error("[LayMan][GET] %s is not authorized to get files of %s"% (userName, path[1])) raise AuthError(401, "Sorry, you are not authorized to get files of %s"% path[1]) # /files/<user> # was /fileman if len(path) == 2: (code, retval) = fm.getFiles(self.auth.getFSUserDir()) # /files/<user>/<file> # was /fileman/<file> elif len(path) == 3: (code, retval) = fm.getFile(self._getTargetFile(path[2])) # /files/<user>/<file>/details # was /fileman/detail/<file> elif len(path) == 4 and\ path[3] == "details": (code, retval) = fm.getFileDetails(self._getTargetFile(path[2])) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) # Get the list of tables in db (or other data) elif path[0] == 'data': # /data if len(path) == 1: from layed import LayEd le = LayEd() userName = self.auth.getUserName() roles = self.auth.getRoles() (code,retval) = le.getData(roles, userName) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) # /sync elif path[0] == "sync" and len(path) == 2: # /sync/data if path[1] == "data": from layed import LayEd le = LayEd() roles = self.auth.getRoles() (code, retval) = le.syncDataPad(roles) # /sync/layers elif path[1] == "layers": from layed import LayEd le = LayEd() roles = self.auth.getRoles() (code, retval) = le.syncLayerPad(roles) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) # /groups elif path[0] == "groups" and len(path) == 2: # /groups/mine if path[1] == "mine": (code, retval) = self.auth.getRolesStr() # /groups/all elif path[1] == "all": (code, retval) = self.auth.getAllRolesStr() else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) # Get the list of ckan packages elif path[0] == 'ckan': # /ckan if len(path) == 1: from layed import LayEd le = LayEd() inpt = web.input(limit="20", start="0", ckanUrl=None) userName = self.auth.getUserName() roles = self.auth.getRoles() (code,retval) = le.getCkanResources(inpt.limit, inpt.start, inpt.ckanUrl) #(code,retval) = le.getCkanPackages(roles, userName, inpt.limit, inpt.start, inpt.ckanUrl) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif path[0] == 'layers': from layed import LayEd le = LayEd() # /layers # was /layed[?usergroup=FireBrigade] if len(path) == 1: """ Get the json of the layers. The layers of all groups allowed are returned in json, ordered by group (i.e. workspace) """ roles = self.auth.getRoles() userName = self.auth.getUserName() (code,retval) = le.getLayers(roles, userName) # /layers/<group> # was /layed[?usergroup=FireBrigade] elif len(path) == 2: role = self.auth.getRole(path[1]) if role != path[1]: logging.error("[LayMan][GET] Not authorized to get layers of %s group"% path[1]) raise AuthError(401, "Sorry, you are not authorized to get the layers of %s group"% path[1]) roles = [role] userName = self.auth.getUserName() (code,retval) = le.getLayers(roles, userName) # /layers/<group>/<layer> # was /layed/config/<layer>?usergroup=FireBrigade elif len(path) == 3: gsWorkspace = self.auth.getGSWorkspace(path[1]) if gsWorkspace != path[1]: logging.error("[LayMan][GET] Not authorized to get layer of %s group"% path[1]) raise AuthError(401, "Sorry, you are not authorized to get the details of a layer from the %s group"% path[1]) layerName = path[2] (code, retval) = le.getLayerDetails(gsWorkspace, layerName) else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) elif path[0] == "geoserver": ws = None g = None from layed.gsconfig import GsConfig code = 200 if path[1] == "style" and len(path) >= 3: #if len(path) > 3: # ws = path[-2] g = GsConfig() retval = g.getStyle(path[-1]) web.header("Content-type", "text/xml") else: (code, retval) = self._callNotSupported(restMethod="GET", call=origName) success = self._setReturnCode(code) if not success: retval = self._jsonReply(code, message=retval, success=success) # else: we return the returned value directly return retval except LaymanError as le: return self._handleLaymanError(le) except Exception as e: return self._handleException(e)
def PUT(self, name=None): try: logging.info("[LayMan][PUT] %s"% name) params = repr(web.input()) logging.info("[LayMan][PUT] Parameters: %s ... %s"%\ (str(params)[:500], str(params)[-500:])) global config if not self.auth.authorised: logging.error("[LayMan][PUT] Unauthorised") raise AuthError(401, "Authorisation failed. Are you logged-in?") code = 404 # 200, 404... message = "Call not supported: PUT "+name+" Please check the API doc or report a bug if appropriate." path = [d for d in name.split(os.path.sep) if d] # PUT "http://localhost:8080/layman/fileman/file.shp" if path[0] == "fileman": from fileman import FileMan fm = FileMan() fileName = path[-1] data = web.data() (code, message) = fm.putFile(self._getTargetFile( fileName), data) # PUT /layman/user/ # data: {screenName: "user", roles: [{roleTitle, roleName}, {roleTitle, roleName}]} elif path[0] == "user": from userprefs import UserPrefs up = UserPrefs(config) data = web.data() logging.debug(data) (code, message) = up.updateUser(userJsonStr=data) elif path[0] == "geoserver": from layed.gsconfig import GsConfig # /geoserver/style/style_name if path[1] == "style": #ws = None #if len(path) > 3: # ws = path[-2] gsc = GsConfig() # If PUT Style fails, gsconfig throws an exception try: gsc.putStyle(path[-1], web.data()) (code, message) = (200, "PUT Style OK") except Exception as e: code = 500 message = "PUT Style failed: " + str(e) # /layed/config/<layer>?usergroup=FireBrigade elif path[0] == "layed" and len(path) == 2: from layed import LayEd le = LayEd() layerName = path[1] inpt = web.input(usergroup=None) gsWorkspace = self.auth.getGSWorkspace(inpt.usergroup) data = web.data() data = json.loads(data) # string -> json usergroup = inpt.usergroup if (not usergroup) and ("usergroup" in data.keys()): logging.debug("[LayMan][PUT] Usergroup not provided in params, but given in data: %s"% data["usergroup"]) usergroup = data["usergroup"] fsUserDir = self.auth.getFSUserDir() fsGroupDir = self.auth.getFSGroupDir(usergroup) dbSchema = self.auth.getDBSchema(usergroup) gsWorkspace = self.auth.getGSWorkspace(usergroup) (code, message) = le.putLayerConfig(gsWorkspace, layerName, data, fsUserDir, fsGroupDir, dbSchema) success = self._setReturnCode(code) retval = self._jsonReply(code, message, success) return retval except LaymanError as le: return self._handleLaymanError(le) except Exception as e: return self._handleException(e)
def PUT(self, name=None): try: logging.info("[LayMan][PUT] %s"% name) params = repr(web.input()) logging.info("[LayMan][PUT] Parameters: %s ... %s"%\ (str(params)[:500], str(params)[-500:])) global config if not self.auth.authorised: logging.error("[LayMan][PUT] Unauthorised") raise AuthError(401, "Authorisation failed. Are you logged-in?") code = 404 # 200, 404... message = "Call not supported: PUT "+name+" Please check the API doc or report a bug if appropriate." path = [d for d in name.split(os.path.sep) if d] # PUT /files/<user>/file.shp" if path[0] == "files" and len(path) == 3: from fileman import FileMan fm = FileMan() # Everyone can PUT only his/her own files userName = self.auth.getUserName() if userName != path[1]: logging.error("[LayMan][PUT] %s is not authorized to put files of %s"% (userName, path[1])) raise AuthError(401, "Sorry, you are not authorized to update files of %s"% path[1]) fileName = path[-1] data = web.data() (code, message) = fm.putFile(self._getTargetFile( fileName), data) # PUT /data/<group>/{table|view|file}/<data>?fileName=Rivers.shp elif path[0] == "data" and len(path) == 4: from layed import LayEd le = LayEd() # Check authorization for the given group checkRole = self.auth.getRole(path[1]) if checkRole["roleName"] != path[1]: logging.error("[LayMan][PUT] Not authorized to PUT data for %s group"% path[1]) raise AuthError(401, "Sorry, you are not authorized to put data in %s group"% path[1]) # fileName must be given inpt = web.input() if not inpt.fileName: raise LaymanError(400, "'fileName' parameter must be given") # Note: currently all vectors are stored in database and all rasters are stored in filesystem. # If some vector is to be stored in the fs or some raster in the db, # LayEd.updateData() must be adjusted and receive path[2] as a parameter fsUserDir = self.auth.getFSUserDir() fsGroupDir = self.auth.getFSGroupDir(path[1]) dbSchema = self.auth.getDBSchema(path[1]) gsWorkspace = self.auth.getGSWorkspace(path[1]) (code, message) = le.updateData(path[3], gsWorkspace, fsUserDir, fsGroupDir, dbSchema, inpt.fileName) # PUT /layman/user/ # data: {screenName: "user", roles: [{roleTitle, roleName}, {roleTitle, roleName}]} elif path[0] == "user": from userprefs import UserPrefs up = UserPrefs(config) data = web.data() logging.debug(data) (code, message) = up.updateUser(userJsonStr=data) elif path[0] == "geoserver": from layed.gsconfig import GsConfig # /geoserver/style/style_name if path[1] == "style": #ws = None #if len(path) > 3: # ws = path[-2] gsc = GsConfig() # If PUT Style fails, gsconfig throws an exception try: gsc.putStyle(path[-1], web.data()) (code, message) = (200, "PUT Style OK") except Exception as e: code = 500 message = "PUT Style failed: " + str(e) # PUT /layers/<group>/<layer> # was /layed/config/<layer>?usergroup=FireBrigade elif path[0] == "layers" and len(path) == 3: from layed import LayEd le = LayEd() # Check authorization for the given group checkRole = self.auth.getRole(path[1]) if checkRole["roleName"] != path[1]: logging.error("[LayMan][PUT] Not authorized to PUT layer for %s group"% path[1]) raise AuthError(401, "Sorry, you are not authorized to put layer in %s group"% path[1]) data = web.data() data = json.loads(data) # string -> json fsUserDir = self.auth.getFSUserDir() fsGroupDir = self.auth.getFSGroupDir(path[1]) dbSchema = self.auth.getDBSchema(path[1]) gsWorkspace = self.auth.getGSWorkspace(path[1]) (code, message) = le.putLayerConfig(gsWorkspace, path[2], data, fsUserDir, fsGroupDir, dbSchema) success = self._setReturnCode(code) retval = self._jsonReply(code, message, success) return retval except LaymanError as le: return self._handleLaymanError(le) except Exception as e: return self._handleException(e)