def view(self, skelType, key, *args, **kwargs): """ Prepares and renders a single entry for viewing. The entry is fetched by its *key* and its *skelType*. The function performs several access control checks on the requested entity before it is rendered. .. seealso:: :func:`canView`, :func:`onView` :returns: The rendered representation of the requested entity. :param skelType: May either be "node" or "leaf". :type skelType: str :param node: URL-safe key of the parent. :type node: str :raises: :exc:`server.errors.NotAcceptable`, when an incorrect *skelType* is provided. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. """ if not self._checkSkelType(skelType): raise errors.NotAcceptable() skel = self.viewSkel(skelType) if not key: raise errors.NotAcceptable() # We return a single entry for viewing if not skel.fromDB(key): raise errors.NotFound() if not self.canView(skelType, skel): raise errors.Unauthorized() self.onView(skel) return self.render.view(skel)
def view(self, *args, **kwargs): """ Prepares and renders a single entry for viewing. The entry is fetched by its entity key, which either is provided via *kwargs["key"]*, or as the first parameter in *args*. The function performs several access control checks on the requested entity before it is rendered. .. seealso:: :func:`viewSkel`, :func:`canView`, :func:`onView` :returns: The rendered representation of the requested entity. :raises: :exc:`viur.core.errors.NotAcceptable`, when no *key* is provided. :raises: :exc:`viur.core.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`viur.core.errors.Unauthorized`, if the current user does not have the required permissions. """ if "key" in kwargs: key = kwargs["key"] elif len(args) >= 1: key = args[0] else: raise errors.NotAcceptable() if not key: raise errors.NotAcceptable() # We return a single entry for viewing skel = self.viewSkel() if not skel.fromDB(key): raise errors.NotFound() if not self.canView(skel): raise errors.Forbidden() self.onView(skel) return self.render.view(skel)
def reparent(self, item, dest, skey, *args, **kwargs): """ Moves an entry *item* (and everything beneath it) to another parent-node *dest*. .. seealso:: :func:`canReparent` :param item: URL-safe key of the item which will be moved. :type item: str :param dest: URL-safe key of the new parent for this item. :type dest: str :returns: A rendered success result generated by the default renderer. :raises: :exc:`server.errors.NotFound`, when no entry with the given *id* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() if not self.canReparent(item, dest): raise errors.Unauthorized() if not self.isValidParent(dest) or item == dest: raise errors.NotAcceptable() ## Test for recursion isValid = False currLevel = db.Get(dest) for x in range(0, 99): if str(currLevel.key()) == item: break if currLevel.key().kind( ) == self.viewSkel().kindName + "_rootNode": # We reached a rootNode isValid = True break currLevel = db.Get(currLevel["parententry"]) if not isValid: raise errors.NotAcceptable() ## Update entry fromItem = db.Get(item) fromItem["parententry"] = dest fromItem["parentrepo"] = str(self.getRootNode(dest).key()) db.Put(fromItem) skel = self.editSkel() assert skel.fromDB(item) self.onItemReparent(skel) self.onItemChanged(skel) return self.render.reparentSuccess(obj=fromItem)
def edit(self, *args, **kwargs): """ Modify an existing entry, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The entry is fetched by its entity key, which either is provided via *kwargs["key"]*, or as the first parameter in *args*. The function performs several access control checks on the requested entity before it is modified. .. seealso:: :func:`editSkel`, :func:`onItemEdited`, :func:`canEdit` :returns: The rendered, edited object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no *key* is provided. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if len(args) == 1: key = args[0] elif "key" in kwargs: key = kwargs["key"] else: raise errors.NotAcceptable() skel = self.editSkel() if not skel.fromDB(key): raise errors.NotAcceptable() if not self.canEdit(skel): raise errors.Unauthorized() if (len(kwargs) == 0 # no data supplied or skey == "" # no security key or not request.current.get(). isPostRequest # failure if not using POST-method or not skel.fromClient( kwargs) # failure on reading into the bones or ("bounce" in kwargs and kwargs["bounce"] == "1" ) # review before changing ): return self.render.edit(skel) if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() skel.toDB() # write it! self.onItemEdited(skel) self.onItemChanged(skel) return self.render.editItemSuccess(skel)
def list(self, skelType, *args, **kwargs): """ Prepares and renders a list of entries. All supplied parameters are interpreted as filters for the elements displayed. Unlike other ViUR BasicApplications, the access control in this function is performed by calling the function :func:`listFilter`, which updates the query-filter to match only elements which the user is allowed to see. .. seealso:: :func:`listFilter`, :func:`server.db.mergeExternalFilter` :returns: The rendered list objects for the matching entries. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. """ if not self._checkSkelType(skelType): raise errors.NotAcceptable() skel = self.viewSkel(skelType) query = self.listFilter( skel.all().mergeExternalFilter(kwargs)) # Access control if query is None: raise errors.Unauthorized() res = query.fetch() return self.render.list(res)
def delete(self, skelType, key, *args, **kwargs): """ Deletes an entry or an directory (including its contents). The function runs several access control checks on the data before it is deleted. .. seealso:: :func:`canDelete`, :func:`onDelete`, :func:`onDeleted` :param skelType: Defines the type of the entry that should be deleted and may either be "node" or "leaf". :type skelType: str :param key: URL-safe key of the item to be deleted. :type key: str :returns: The rendered, deleted object of the entry. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if not (skelType := self._checkSkelType(skelType)): raise errors.NotAcceptable(f"Invalid skelType provided.")
def edit(self, skelType, key, *args, **kwargs): """ Modify an existing entry, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The function performs several access control checks on the requested entity before it is added. .. seealso:: :func:`canEdit`, :func:`onEdit`, :func:`onEdited` :param skelType: Defines the type of the entry that should be modified and may either be "node" or "leaf". :type skelType: str :param key: URL-safe key of the item to be edited. :type key: str :returns: The rendered, modified object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no valid *skelType* was provided. :raises: :exc:`server.errors.NotFound`, when no valid *node* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if not (skelType := self._checkSkelType(skelType)): raise errors.NotAcceptable(f"Invalid skelType provided.")
def add(self, skelType, node, *args, **kwargs): """ Add a new entry with the given parent *node*, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The function performs several access control checks on the requested entity before it is added. .. seealso:: :func:`onItemAdded`, :func:`canAdd` :param skelType: Defines the type of the new entry and may either be "node" or "leaf". :type skelType: str :param node: URL-safe key of the parent. :type node: str :returns: The rendered, added object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no valid *skelType* was provided. :raises: :exc:`server.errors.NotFound`, when no valid *node* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if skelType == "node": skel = self.viewSkel(TreeType.Node) elif skelType == "leaf" and self.hasDistinctLeafs: skel = self.viewSkel(TreeType.Leaf) else: raise errors.NotAcceptable() # FIXME: IsValidParent? #parentNodeSkel = self.editNodeSkel() #if not parentNodeSkel.fromDB(node): # raise errors.NotFound() if not self.canAdd(skelType, node): raise errors.Unauthorized() if (len(kwargs) == 0 # no data supplied or skey == "" # no security key # or not request.current.get().isPostRequest fixme: POST-method check missing? # failure if not using POST-method or not skel.fromClient(kwargs) # failure on reading into the bones or ("bounce" in kwargs and kwargs["bounce"] == "1") # review before adding ): return self.render.add(skel) if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() skel["parentdir"] = str(node) skel["parentrepo"] = parentNodeSkel["parentrepo"] or str(node) skel.toDB() self.onItemAdded(skel) return self.render.addItemSuccess(skel)
def structure(self, skelType: str, *args, **kwargs): """ :returns: Returns the structure of our skeleton as used in list/view. Values are the defaultValues set in each bone. :raises: :exc:`viur.core.errors.NotAcceptable`, when an incorrect *skelType* is provided. :raises: :exc:`viur.core.errors.Unauthorized`, if the current user does not have the required permissions. """ if not (skelType := self._checkSkelType(skelType)): raise errors.NotAcceptable(f"Invalid skelType provided.")
def view(self, *args, **kwargs): """ Prepares and renders a single entry for viewing. The entry is fetched by its entity key, which either is provided via *kwargs["key"]*, or as the first parameter in *args*. The function performs several access control checks on the requested entity before it is rendered. .. seealso:: :func:`viewSkel`, :func:`canView`, :func:`onItemViewed` :returns: The rendered representation of the requested entity. :raises: :exc:`server.errors.NotAcceptable`, when no *key* is provided. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. """ if "key" in kwargs: key = kwargs["key"] elif len(args) >= 1: key = args[0] else: raise errors.NotAcceptable() if not len(key): raise errors.NotAcceptable() skel = self.viewSkel() if key == u"structure": # We dump just the structure of that skeleton, including it's default values if not self.canView(skel): raise errors.Unauthorized() else: # We return a single entry for viewing # We probably have a Database or SEO-Key here #seoKey = "viur.viurActiveSeoKeys =" #skel = self.viewSkel().all().filter(seoKey, args[0]).getSkel() skel = self.viewSkel() if not skel.fromDB(key): raise errors.NotFound() if not self.canView(skel): raise errors.Forbidden() self.onItemViewed(skel) return self.render.view(skel)
def view(self, skelType, key, *args, **kwargs): """ Prepares and renders a single entry for viewing. The entry is fetched by its *key* and its *skelType*. The function performs several access control checks on the requested entity before it is rendered. .. seealso:: :func:`canView`, :func:`onItemViewed` :returns: The rendered representation of the requested entity. :param skelType: May either be "node" or "leaf". :type skelType: str :param node: URL-safe key of the parent. :type node: str :raises: :exc:`server.errors.NotAcceptable`, when an incorrect *skelType* is provided. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. """ if skelType == "node": skel = self.viewSkel(TreeType.Node) elif skelType == "leaf" and self.hasDistinctLeafs: skel = self.viewSkel(TreeType.Leaf) else: raise errors.NotAcceptable() if not key: raise errors.NotAcceptable() if key == u"structure": # We dump just the structure of that skeleton, including it's default values if not self.canView(skelType, None): raise errors.Unauthorized() else: # We return a single entry for viewing if not skel.fromDB(key): raise errors.NotFound() if not self.canView(skelType, skel): raise errors.Unauthorized() self.onItemViewed(skel) return self.render.view(skel)
def add(self, skelType, node, *args, **kwargs): """ Add a new entry with the given parent *node*, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The function performs several access control checks on the requested entity before it is added. .. seealso:: :func:`canAdd`, :func:`onAdd`, , :func:`onAdded` :param skelType: Defines the type of the new entry and may either be "node" or "leaf". :type skelType: str :param node: URL-safe key of the parent. :type node: str :returns: The rendered, added object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no valid *skelType* was provided. :raises: :exc:`server.errors.NotFound`, when no valid *node* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if not self._checkSkelType(skelType): raise errors.NotAcceptable() skel = self.addSkel(skelType) parentNodeSkel = self.editSkel("node") if not parentNodeSkel.fromDB(node): raise errors.NotFound() if not self.canAdd(skelType, parentNodeSkel): raise errors.Unauthorized() if (len(kwargs) == 0 # no data supplied or skey == "" # no security key or not skel.fromClient( kwargs) # failure on reading into the bones or not currentRequest.get().isPostRequest or ("bounce" in kwargs and kwargs["bounce"] == "1" ) # review before adding ): return self.render.add(skel) if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() skel["parententry"] = parentNodeSkel["key"] # parentrepo may not exist of parentNodeSkel as it may be an rootNode skel["parentrepo"] = parentNodeSkel["parentrepo"] or parentNodeSkel[ "key"] self.onAdd(skel) skel.toDB() self.onAdded(skel) return self.render.addSuccess(skel)
def clone(self, fromRepo, toRepo, fromParent=None, toParent=None, *args, **kwargs): """ Clones a hierarchy recursively. This function only initiates the cloning process, which is performed in the background. It states only a successful result when the clone action has been correctly initiated. :param fromRepo: URL-safe key of the key to the repository (=root-node Key) to clone from. :type fromRepo: str :param toRepo: URL-safe key of the key to the repository (=root-node Key) to clone to. :type toRepo: str :param fromParent: URL-safe key of the parent to clone from; for root nodes, this is equal \ to fromRepo, and can be omitted. :type fromParent: str :param toParent: URL-safe key of the parent to clone to; for root nodes, this is equal to \ toRepo, and can be omitted. :type toParent: str :returns: A rendered success result generated by the default renderer. :raises: :exc:`server.errors.NotAcceptable`, when no valid *parent* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if fromParent is None: fromParent = fromRepo if toParent is None: toParent = toRepo if not (self.isValidParent(fromParent) and self.isValidParent(toParent)): # Ensure the parents exists raise errors.NotAcceptable() if not self.canAdd(toParent): raise errors.Unauthorized() if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() self._clone(fromRepo, toRepo, fromParent, toParent) return self.render.cloneSuccess()
def edit(self, skelType, key, *args, **kwargs): """ Modify an existing entry, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The function performs several access control checks on the requested entity before it is added. .. seealso:: :func:`onAdded`, :func:`canEdit` :param skelType: Defines the type of the entry that should be modified and may either be "node" or "leaf". :type skelType: str :param key: URL-safe key of the item to be edited. :type key: str :returns: The rendered, modified object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no valid *skelType* was provided. :raises: :exc:`server.errors.NotFound`, when no valid *node* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if skelType == "node": skelType = TreeType.Node elif skelType == "leaf" and self.leafSkelCls: skelType = TreeType.Leaf else: raise errors.NotAcceptable() skel = self.addSkel(skelType) if not skel.fromDB(key): raise errors.NotFound() if not self.canEdit(skelType, skel): raise errors.Unauthorized() if (len(kwargs) == 0 # no data supplied or skey == "" # no security key or not skel.fromClient( kwargs) # failure on reading into the bones or not currentRequest.get().isPostRequest or ("bounce" in kwargs and kwargs["bounce"] == "1" ) # review before adding ): return self.render.edit(skel) if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() skel.toDB() self.onEdited(skel) return self.render.editSuccess(skel)
def getUploadURL(self, fileName, mimeType, size=None, skey=None, *args, **kwargs): node = kwargs.get("node") authData = kwargs.get("authData") authSig = kwargs.get("authSig") # Validate the the contentType from the client seems legit mimeType = mimeType.lower() assert len(mimeType.split("/")) == 2, "Invalid Mime-Type" assert all([x in string.ascii_letters + string.digits + "/-.+" for x in mimeType]), "Invalid Mime-Type" if authData and authSig: # First, validate the signature, otherwise we don't need to proceed any further if not utils.hmacVerify(authData.encode("ASCII"), authSig): raise errors.Forbidden() authData = json.loads(base64.b64decode(authData.encode("ASCII")).decode("UTF-8")) if datetime.strptime(authData["validUntil"], "%Y%m%d%H%M") < datetime.now(): raise errors.Gone() if authData["validMimeTypes"]: for validMimeType in authData["validMimeTypes"]: if validMimeType == mimeType or ( validMimeType.endswith("*") and mimeType.startswith(validMimeType[:-1])): break else: raise errors.NotAcceptable() node = authData["node"] maxSize = authData["maxSize"] else: if node: rootNode = self.getRootNode(node) if not self.canAdd("leaf", rootNode): raise errors.Forbidden() else: if not self.canAdd("leaf", None): raise errors.Forbidden() maxSize = None # The user has some file/add permissions, don't restrict fileSize if maxSize: try: size = int(size) assert size <= maxSize except: # We have a size-limit set - but no size supplied raise errors.PreconditionFailed() else: size = None if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() targetKey, uploadUrl = self.initializeUpload(fileName, mimeType.lower(), node, size) resDict = { "uploadUrl": uploadUrl, "uploadKey": targetKey, } return self.render.view(resDict)
def continueAuthenticationFlow(self, caller, userKey): currSess = currentSession.get() currSess["_mayBeUserKey"] = str(userKey) currSess["_secondFactorStart"] = datetime.datetime.now() currSess.markChanged() for authProvider, secondFactor in self.validAuthenticationMethods: if isinstance(caller, authProvider): if secondFactor is None: # We allow sign-in without a second factor return self.authenticateUser(userKey) # This Auth-Request was issued from this authenticationProvider secondFactorProvider = self.secondFactorProviderByClass(secondFactor) if secondFactorProvider.canHandle(userKey): # We choose the first second factor provider which claims it can verify that user return secondFactorProvider.startProcessing(userKey) # Whoops.. This user logged in successfully - but we have no second factor provider willing to confirm it raise errors.NotAcceptable("There are no more authentication methods to try") # Sorry...
def add(self, parent, *args, **kwargs): """ Add a new entry with the given parent, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*. The function performs several access control checks on the requested entity before it is added. .. seealso:: :func:`addSkel`, :func:`onItemAdded`, :func:`canAdd` :param parent: URL-safe key of the parent. :type parent: str :returns: The rendered, added object of the entry, eventually with error hints. :raises: :exc:`server.errors.NotAcceptable`, when no valid *parent* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if not self.isValidParent(parent): # Ensure the parent exists raise errors.NotAcceptable() if not self.canAdd(parent): raise errors.Unauthorized() skel = self.addSkel() if (len(kwargs) == 0 or skey == "" or not request.current.get().isPostRequest or not skel.fromClient(kwargs) or ("bounce" in kwargs and kwargs["bounce"] == "1")): return self.render.add(skel) if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() skel["parententry"] = str(parent) skel["parentrepo"] = str(self.getRootNode(parent).key()) key = skel.toDB() self.onItemAdded(skel) self.onItemChanged(skel) return self.render.addItemSuccess(skel)
def delete(self, skelType, key, *args, **kwargs): """ Deletes an entry or an directory (including its contents). The function runs several access control checks on the data before it is deleted. .. seealso:: :func:`canDelete`, :func:`onItemDeleted` :param skelType: Defines the type of the entry that should be deleted and may either be "node" or "leaf". :type skelType: str :param key: URL-safe key of the item to be deleted. :type key: str :returns: The rendered, deleted object of the entry. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`server.errors.PreconditionFailed`, if the *skey* could not be verified. """ if skelType == "node": skel = self.viewSkel(TreeType.Node) elif skelType == "leaf" and self.hasDistinctLeafs: skel = self.viewSkel(TreeType.Leaf) else: raise errors.NotAcceptable() if "skey" in kwargs: skey = kwargs["skey"] else: skey = "" if not skel.fromDB(key): raise errors.NotFound() if not self.canDelete(skelType, skel): raise errors.Unauthorized() if not securitykey.validate(skey, useSessionKey=True): raise errors.PreconditionFailed() if skelType == "node": self.deleteRecursive(key) skel.delete() self.onItemDeleted(skel) return self.render.deleteSuccess(skel, skelType=skelType)
def structure(self, skelType: str, *args, **kwargs): """ :returns: Returns the structure of our skeleton as used in list/view. Values are the defaultValues set in each bone. :raises: :exc:`viur.core.errors.NotAcceptable`, when an incorrect *skelType* is provided. :raises: :exc:`viur.core.errors.Unauthorized`, if the current user does not have the required permissions. """ if not self._checkSkelType(skelType): raise errors.NotAcceptable() skel = self.viewSkel(skelType) if not self.canAdd( skelType, None ): # We can't use canView here as it would require passing a skeletonInstance. # As a fallback, we'll check if the user has the permissions to view at least one entry qry = self.listFilter(skel.all()) if not qry or not qry.getEntry(): raise errors.Unauthorized() return self.render.view(skel)
def move(self, skelType: str, key: str, parentNode: str, *args, **kwargs) -> str: """ Move a node (including its contents) or a leaf to another node. .. seealso:: :func:`canMove` :param skelType: Defines the type of the entry that should be moved and may either be "node" or "leaf". :param key: URL-safe key of the item to be moved. :param parentNode: URL-safe key of the destination node, which must be a node. :returns: The rendered, edited object of the entry. :raises: :exc:`viur.core.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`viur.core.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`viur.core.errors.PreconditionFailed`, if the *skey* could not be verified. """ if not (skelType := self._checkSkelType(skelType)): raise errors.NotAcceptable(f"Invalid skelType provided.")
def findAndCall(self, path: str, *args, **kwargs): """ Does the actual work of sanitizing the parameter, determine which @exposed (or @internalExposed) function to call (and with witch parameters) """ # Prevent Hash-collision attacks kwargs = {} stopCount = conf["viur.maxPostParamsCount"] try: for key, value in self.request.params.iteritems(): key = unicodedata.normalize("NFC", key) value = unicodedata.normalize("NFC", value) if key.startswith( "_" ): # Ignore keys starting with _ (like VI's _unused_time_stamp) continue if key in kwargs: if isinstance(kwargs[key], list): kwargs[key].append(value) else: # Convert that key to a list kwargs[key] = [kwargs[key], value] else: kwargs[key] = value stopCount -= 1 if not stopCount: # We reached zero; maximum PostParamsCount exceeded raise errors.NotAcceptable() except UnicodeError: # We received invalid unicode data (usually happens when someone tries to exploit unicode normalisation bugs) raise errors.BadRequest() if "self" in kwargs or "return" in kwargs: # self or return is reserved for bound methods raise errors.BadRequest() # Parse the URL path = parse.urlparse(path).path self.pathlist = [ unicodedata.normalize("NFC", parse.unquote(x)) for x in path.strip("/").split("/") ] caller = conf["viur.mainResolver"] idx = 0 # Count how may items from *args we'd have consumed (so the rest can go into *args of the called func for currpath in self.pathlist: if "canAccess" in caller and not caller["canAccess"](): # We have a canAccess function guarding that object, # and it returns False... raise (errors.Unauthorized()) idx += 1 currpath = currpath.replace("-", "_").replace(".", "_") if currpath in caller: caller = caller[currpath] if (("exposed" in dir(caller) and caller.exposed) or ("internalExposed" in dir(caller) and caller.internalExposed and self.internalRequest)) and hasattr( caller, '__call__'): args = self.pathlist[idx:] + [ x for x in args ] # Prepend the rest of Path to args break elif "index" in caller: caller = caller["index"] if (("exposed" in dir(caller) and caller.exposed) or ("internalExposed" in dir(caller) and caller.internalExposed and self.internalRequest)) and hasattr( caller, '__call__'): args = self.pathlist[idx - 1:] + [x for x in args] break else: raise (errors.NotFound( "The path %s could not be found" % "/".join([("".join([ y for y in x if y.lower() in "0123456789abcdefghijklmnopqrstuvwxyz" ])) for x in self.pathlist[:idx]]))) else: raise (errors.NotFound( "The path %s could not be found" % "/".join([("".join([ y for y in x if y.lower() in "0123456789abcdefghijklmnopqrstuvwxyz" ])) for x in self.pathlist[:idx]]))) if (not callable(caller) or ((not "exposed" in dir(caller) or not caller.exposed)) and (not "internalExposed" in dir(caller) or not caller.internalExposed or not self.internalRequest)): if "index" in caller \ and (callable(caller["index"]) \ and ("exposed" in dir(caller["index"]) and caller["index"].exposed) \ or ("internalExposed" in dir( caller["index"]) and caller["index"].internalExposed and self.internalRequest)): caller = caller["index"] else: raise (errors.MethodNotAllowed()) # Check for forceSSL flag if not self.internalRequest \ and "forceSSL" in dir(caller) \ and caller.forceSSL \ and not self.request.host_url.lower().startswith("https://") \ and not self.isDevServer: raise (errors.PreconditionFailed( "You must use SSL to access this ressource!")) # Check for forcePost flag if "forcePost" in dir( caller) and caller.forcePost and not self.isPostRequest: raise (errors.MethodNotAllowed( "You must use POST to access this ressource!")) self.args = args self.kwargs = kwargs # Check if this request should bypass the caches if self.request.headers.get("X-Viur-Disable-Cache"): from viur.core import utils # No cache requested, check if the current user is allowed to do so user = utils.getCurrentUser() if user and "root" in user["access"]: logging.debug( "Caching disabled by X-Viur-Disable-Cache header") self.disableCache = True try: annotations = typing.get_type_hints(caller) if annotations and not self.internalRequest: newKwargs = { } # The dict of new **kwargs we'll pass to the caller newArgs = [] # List of new *args we'll pass to the caller argsOrder = list( caller.__code__.co_varnames)[1:caller.__code__.co_argcount] # Map args in for idx in range(0, min(len(self.args), len(argsOrder))): paramKey = argsOrder[idx] if paramKey in annotations: # We have to enforce a type-annotation for this *args parameter _, newTypeValue = self.processTypeHint( annotations[paramKey], self.args[idx], True) newArgs.append(newTypeValue) else: newArgs.append(self.args[idx]) newArgs.extend(self.args[min(len(self.args), len(argsOrder)):]) # Last, we map the kwargs in for k, v in kwargs.items(): if k in annotations: newStrValue, newTypeValue = self.processTypeHint( annotations[k], v, False) self.kwargs[k] = newStrValue newKwargs[k] = newTypeValue else: newKwargs[k] = v else: newArgs = self.args newKwargs = self.kwargs if (conf["viur.debug.traceExternalCallRouting"] and not self.internalRequest ) or conf["viur.debug.traceInternalCallRouting"]: logging.debug("Calling %s with args=%s and kwargs=%s" % (str(caller), str(newArgs), str(newKwargs))) res = caller(*newArgs, **newKwargs) res = str(res).encode("UTF-8") if not isinstance(res, bytes) else res self.response.write(res) except TypeError as e: if self.internalRequest: # We provide that "service" only for requests originating from outside raise if "viur/core/request.py\", line 5" in traceback.format_exc( ).splitlines()[-3]: # Don't raise NotAcceptable for type-errors raised deep somewhere inside caller. # We check if the last line in traceback originates from viur/core/request.py and a line starting with # 5 and only raise NotAcceptable then. Otherwise a "normal" 500 Server error will be raised. # This is kinda hackish, however this is much faster than reevaluating the args and kwargs passed # to caller as we did in ViUR2. raise errors.NotAcceptable() raise
def move(self, skelType: str, key: str, parentNode: str, *args, **kwargs) -> str: """ Move a node (including its contents) or a leaf to another node. .. seealso:: :func:`canMove` :param skelType: Defines the type of the entry that should be moved and may either be "node" or "leaf". :param key: URL-safe key of the item to be moved. :param parentNode: URL-safe key of the destination node, which must be a node. :returns: The rendered, edited object of the entry. :raises: :exc:`viur.core.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`viur.core.errors.Unauthorized`, if the current user does not have the required permissions. :raises: :exc:`viur.core.errors.PreconditionFailed`, if the *skey* could not be verified. """ if not self._checkSkelType(skelType): raise errors.NotAcceptable() skel = self.addSkel(skelType) # srcSkel - the skeleton to be moved parentNodeSkel = self.editSkel( "node") # destSkel - the node it should be moved into if not skel.fromDB(key) or not parentNodeSkel.fromDB(parentNode): # Could not find one of the entities raise errors.NotFound() if not self.canMove(skelType, skel, parentNodeSkel): raise errors.Unauthorized() if skel["key"] == parentNodeSkel["key"]: # Cannot move a node into itself raise errors.NotAcceptable() ## Test for recursion currLevel = db.Get(parentNodeSkel["key"]) for x in range(0, 99): if currLevel.key == skel["key"]: break if "rootNode" in currLevel and currLevel["rootNode"] == 1: # We reached a rootNode, so this is okay break currLevel = db.Get(currLevel["parententry"]) else: # We did not "break" - recursion-level exceeded or loop detected raise errors.NotAcceptable() # Test if we try to move a rootNode tmp = skel.dbEntity if "rootNode" in tmp and tmp["rootNode"] == 1: # Cant move a rootNode away.. raise errors.NotAcceptable() if not securitykey.validate(kwargs.get("skey", ""), useSessionKey=True): raise errors.PreconditionFailed() currentParentRepo = skel["parentrepo"] skel["parententry"] = parentNodeSkel["key"] skel["parentrepo"] = parentNodeSkel[ "parentrepo"] # Fixme: Need to recursive fixing to parentrepo? if "sortindex" in kwargs: try: skel["sortindex"] = float(kwargs["sortindex"]) except: raise errors.PreconditionFailed() skel.toDB() # Ensure a changed parentRepo get's proagated if currentParentRepo != parentNodeSkel["parentrepo"]: self.updateParentRepo(key, parentNodeSkel["parentrepo"]) return self.render.editSuccess( skel ) # new Sig, has no args and kwargs , skelType = skelType, action = "move", destNode = parentNodeSkel )
def findAndCall(self, path, *args, **kwargs): # Do the actual work: process the request # Prevent Hash-collision attacks kwargs = {} stopCount = conf["viur.maxPostParamsCount"] for key, value in self.request.params.iteritems(): if key in kwargs: if isinstance(kwargs[key], list): kwargs[key].append(value) else: kwargs[key] = [kwargs[key], value] else: kwargs[key] = value stopCount -= 1 if not stopCount: # We reached zero; maximum PostParamsCount exceeded raise errors.NotAcceptable() if "self" in kwargs: # self is reserved for bound methods raise errors.BadRequest() # Parse the URL path = parse.urlparse(path).path self.pathlist = [parse.unquote(x) for x in path.strip("/").split("/")] caller = conf["viur.mainResolver"] idx = 0 # Count how may items from *args we'd have consumed (so the rest can go into *args of the called func for currpath in self.pathlist: if "canAccess" in caller and not caller["canAccess"](): # We have a canAccess function guarding that object, # and it returns False... raise (errors.Unauthorized()) idx += 1 currpath = currpath.replace("-", "_").replace(".", "_") if currpath in caller: caller = caller[currpath] if (("exposed" in dir(caller) and caller.exposed) or ("internalExposed" in dir(caller) and caller.internalExposed and self.internalRequest)) and hasattr( caller, '__call__'): args = self.pathlist[idx:] + [ x for x in args ] # Prepend the rest of Path to args break elif "index" in caller: caller = caller["index"] if (("exposed" in dir(caller) and caller.exposed) or ("internalExposed" in dir(caller) and caller.internalExposed and self.internalRequest)) and hasattr( caller, '__call__'): args = self.pathlist[idx - 1:] + [x for x in args] break else: raise (errors.NotFound( "The path %s could not be found" % "/".join([("".join([ y for y in x if y.lower() in "0123456789abcdefghijklmnopqrstuvwxyz" ])) for x in self.pathlist[:idx]]))) else: raise (errors.NotFound( "The path %s could not be found" % "/".join([("".join([ y for y in x if y.lower() in "0123456789abcdefghijklmnopqrstuvwxyz" ])) for x in self.pathlist[:idx]]))) if (not callable(caller) or ((not "exposed" in dir(caller) or not caller.exposed)) and (not "internalExposed" in dir(caller) or not caller.internalExposed or not self.internalRequest)): if "index" in caller \ and (callable(caller["index"]) \ and ("exposed" in dir(caller["index"]) and caller["index"].exposed) \ or ("internalExposed" in dir( caller["index"]) and caller["index"].internalExposed and self.internalRequest)): caller = caller["index"] else: raise (errors.MethodNotAllowed()) # Check for forceSSL flag if not self.internalRequest \ and "forceSSL" in dir(caller) \ and caller.forceSSL \ and not self.request.host_url.lower().startswith("https://") \ and not self.isDevServer: raise (errors.PreconditionFailed( "You must use SSL to access this ressource!")) # Check for forcePost flag if "forcePost" in dir( caller) and caller.forcePost and not self.isPostRequest: raise (errors.MethodNotAllowed( "You must use POST to access this ressource!")) self.args = [] for arg in args: if isinstance(arg, str): self.args.append(arg) else: try: self.args.append(arg.decode("UTF-8")) except: pass self.kwargs = kwargs # Check if this request should bypass the caches if self.request.headers.get("X-Viur-Disable-Cache"): from viur.core import utils # No cache requested, check if the current user is allowed to do so user = utils.getCurrentUser() if user and "root" in user["access"]: logging.debug( "Caching disabled by X-Viur-Disable-Cache header") self.disableCache = True try: if (conf["viur.debug.traceExternalCallRouting"] and not self.internalRequest ) or conf["viur.debug.traceInternalCallRouting"]: logging.debug("Calling %s with args=%s and kwargs=%s" % (str(caller), str(args), str(kwargs))) res = caller(*self.args, **self.kwargs) res = str(res).encode("UTF-8") if not isinstance(res, bytes) else res self.response.write(res) except TypeError as e: if self.internalRequest: # We provide that "service" only for requests originating from outside raise # Check if the function got too few arguments and raise a NotAcceptable error tmpRes = {} argsOrder = list( caller.__code__.co_varnames)[1:caller.__code__.co_argcount] # Map default values in reversedArgsOrder = argsOrder[::-1] for defaultValue in list(caller.__defaults__ or [])[::-1]: tmpRes[reversedArgsOrder.pop(0)] = defaultValue del reversedArgsOrder # Map args in setArgs = [] # Store a list of args already set by *args for idx in range(0, min(len(args), len(argsOrder))): setArgs.append(argsOrder[idx]) tmpRes[argsOrder[idx]] = args[idx] # Last, we map the kwargs in for k, v in kwargs.items(): if k in setArgs: # This key has already been set by *args raise ( errors.NotAcceptable() ) # We reraise that exception as we got duplicate arguments tmpRes[k] = v # Last check, that every parameter is satisfied: if not all([x in tmpRes.keys() for x in argsOrder]): raise (errors.NotAcceptable()) raise
def checkout(self, step=None, key=None, skey=None, *args, **kwargs): """ Performs the checkout process trough the state machine provided by self.steps. :param step: The current step index, None for beginning a new checkout :param key: Key of the current checkout :param skey: Server security key :return: Returns the rendered template or throws redirection exceptions. """ myKindName = self.viewSkel().kindName if step is None: logging.info("Starting new checkout process") billObj = db.Entity(myKindName) billObj["idx"] = "0000000" for state in self.states: billObj["state_%s" % state] = "0" db.Put(billObj) key = str(billObj.key()) # Copy the Cart if "amountSkel" in dir(self): cart = session.current.get("cart_products") or {} s = self.amountSkel() products = [] for prod, atts in cart.items(): for i in range(0, atts["amount"]): products.append(str(prod)) s.fromClient({"product": products}) s.toDB() session.current["order_" + myKindName] = { "key": str(key), "completedSteps": [] } session.current.markChanged() raise errors.Redirect("?step=0&key=%s" % str(key)) elif key: try: orderKey = db.Key(key) step = int(step) assert (step >= 0) assert (step < len(self.steps)) except: raise errors.NotAcceptable() sessionInfo = session.current.get("order_" + myKindName) if not sessionInfo or not sessionInfo.get("key") == str(orderKey): raise errors.Unauthorized() if step in sessionInfo["completedSteps"]: session.current["order_" + myKindName]["completedSteps"] = [ x for x in sessionInfo["completedSteps"] if x < step ] session.current.markChanged() # Make sure that no steps can be skipped if step != 0 and not step - 1 in sessionInfo["completedSteps"]: raise errors.Redirect("?step=0&key=%s" % str(str(orderKey))) currentStep = self.steps[step] if "preHandler" in currentStep.keys(): try: if isinstance(currentStep["preHandler"], list): for handler in currentStep["preHandler"]: handler(self, step, str(orderKey), *args, **kwargs) else: currentStep["preHandler"](self, step, str(orderKey), refkwargs=kwargs, *args, **kwargs) except SkipStepException: session.current["order_" + myKindName]["completedSteps"].append(step) session.current.markChanged() raise errors.Redirect("?step=%s&key=%s" % (str(step + 1), str(orderKey))) except ReturnHtmlException as e: return (e.html) if "requiresSecurityKey" in currentStep and currentStep[ "requiresSecurityKey"]: if not securitykey.validate(skey): raise errors.PreconditionFailed() pass if "mainHandler" in currentStep: if currentStep["mainHandler"]["action"] == "edit": skel = self.getSkelByName( currentStep["mainHandler"]["skeleton"], str(orderKey)) skel.fromDB(str(orderKey)) if not len(kwargs.keys()) or not skel.fromClient(kwargs): return (self.render.edit( skel, tpl=currentStep["mainHandler"]["template"], step=step)) skel.toDB() if currentStep["mainHandler"]["action"] == "view": if not "complete" in kwargs or not kwargs[ "complete"] == u"1": skel = self.getSkelByName( currentStep["mainHandler"]["skeleton"], str(orderKey)) skel.fromDB(str(orderKey)) return (self.render.view( skel, tpl=currentStep["mainHandler"]["template"], step=step)) elif currentStep["mainHandler"]["action"] == "function": res = currentStep["mainHandler"]["function"](self, step, str(orderKey), *args, **kwargs) if res: return res if "postHandler" in currentStep: currentStep["postHandler"](self, step, str(orderKey), *args, **kwargs) session.current["order_" + myKindName]["completedSteps"].append(step) session.current.markChanged() logging.info("next ?step=%s&key=%s" % (str(step + 1), str(orderKey))) raise errors.Redirect("?step=%s&key=%s" % (str(step + 1), str(orderKey)))
:returns: The rendered representation of the requested entity. :param skelType: May either be "node" or "leaf". :type skelType: str :param node: URL-safe key of the parent. :type node: str :raises: :exc:`server.errors.NotAcceptable`, when an incorrect *skelType* is provided. :raises: :exc:`server.errors.NotFound`, when no entry with the given *key* was found. :raises: :exc:`server.errors.Unauthorized`, if the current user does not have the required permissions. """ if not (skelType := self._checkSkelType(skelType)): raise errors.NotAcceptable(f"Invalid skelType provided.") skel = self.viewSkel(skelType) if not key: raise errors.NotAcceptable() # We return a single entry for viewing if not skel.fromDB(key): raise errors.NotFound() if not self.canView(skelType, skel): raise errors.Unauthorized() self.onView(skelType, skel) return self.render.view(skel) @exposed @forceSSL def add(self, skelType, node, *args, **kwargs): """ Add a new entry with the given parent *node*, and render the entry, eventually with error notes on incorrect data. Data is taken by any other arguments in *kwargs*.