WIP: Adding World, Owner group, GET POST DELETE

This commit is contained in:
Eibriel 2015-05-18 11:42:17 -03:00
parent 65ce04cac4
commit 1872e8bd0b
3 changed files with 373 additions and 31 deletions

View File

@ -4,6 +4,7 @@ from eve import Eve
# import random # import random
# import string # import string
import json
from eve.auth import TokenAuth from eve.auth import TokenAuth
from eve.auth import BasicAuth from eve.auth import BasicAuth
@ -11,6 +12,10 @@ from eve.io.mongo import Validator
from eve.methods.post import post_internal from eve.methods.post import post_internal
from bson import ObjectId from bson import ObjectId
from flask import g
from flask import abort
from flask import request
from datetime import datetime from datetime import datetime
from datetime import timedelta from datetime import timedelta
@ -31,6 +36,8 @@ class SystemUtility():
def validate(token): def validate(token):
"""Validate a Token against Blender ID server
"""
import requests import requests
payload = dict( payload = dict(
token=token) token=token)
@ -51,41 +58,241 @@ def validate(token):
return dict(valid=valid, message=message, user=user) return dict(valid=valid, message=message, user=user)
def validate_token():
token = request.authorization.username
tokens = app.data.driver.db['tokens']
users = app.data.driver.db['users']
lookup = {'token': token, 'expire_time': {"$gt": datetime.now()}}
dbtoken = tokens.find_one(lookup)
if not dbtoken:
validation = validate(token)
if validation['valid']:
email = validation['user']['email']
dbuser = users.find_one({'email': email})
tmpname = email.split('@')[0]
if not dbuser:
user_data = {
'first_name': tmpname,
'last_name': tmpname,
'email': email,
'role': ['admin'],
}
r = post_internal('users', user_data)
user_id = r[0]["_id"]
else:
user_id = dbuser['_id']
token_data = {
'user': user_id,
'token': token,
'expire_time': datetime.now() + timedelta(hours=1)
}
post_internal('tokens', token_data)
return token_data
else:
return None
else:
token_data = {
'user': dbtoken['user'],
'token': dbtoken['token'],
'expire_time': dbtoken['expire_time']
}
return token_data
def global_validation():
setattr(g, 'token_data', validate_token())
setattr(g, 'validate', validate(g.get('token_data')['token']))
check_permissions(g.get('token_data')['user'])
def permissions_lookup(action, lookup):
type_world_permissions = g.get('type_world_permissions')
type_owner_permissions = g.get('type_owner_permissions')
node_types = []
# Get all node_types allowed by world:
for per in type_world_permissions:
if action in type_world_permissions[per]:
node_types.append(str(per))
# Get all nodes with node_type allowed by owner if user == owner
owner_lookup = []
for per in type_owner_permissions:
if action in type_owner_permissions[per]:
if action not in type_world_permissions[per]:
# If one of the following is true
# If node_type==node_type and user==user
owner_lookup.append(
{'$and': [{'node_type': str(per)},
{'user': str(g.get('token_data')['user'])}]})
lookup['$or'] = [{'node_type': {'$in': node_types}}]
if len(owner_lookup) > 0:
lookup['$or'].append({'$or': owner_lookup})
return lookup
def pre_GET(request, lookup):
# Only get allowed documents
global_validation()
# print ("Get")
# print ("Owner: {0}".format(g.get('owner_permissions')))
# print ("World: {0}".format(g.get('world_permissions')))
action = 'GET'
if 'token_type' not in lookup and '_id' not in request.view_args:
# Is quering for all nodes (mixed types)
lookup = permissions_lookup(action, lookup)
else:
# Is quering for one specific node
if action not in g.get('world_permissions'):
lookup['user'] = g.get('token_data')['user']
# token_data = validate_token()
# validate(token_data['token'])
# lookup["userr"] = "user"
# print ("Lookup")
# print (lookup)
def pre_PUT(request, lookup):
# Only Update allowed documents
global_validation()
# print ("Put")
# print ("Owner: {0}".format(g.get('owner_permissions')))
# print ("World: {0}".format(g.get('world_permissions')))
action = 'UPDATE'
if 'token_type' not in lookup and '_id' not in request.view_args:
# Is updating all nodes (mixed types)
lookup = permissions_lookup(action, lookup)
else:
# Is updating one specific node
if action not in g.get('world_permissions'):
lookup['user'] = g.get('token_data')['user']
# print ("Lookup")
# print (lookup)
def pre_PATCH(request, lookup):
print ("Patch")
def pre_POST(request):
# Only Post allowed documents
global_validation()
# print ("Post")
# print ("World: {0}".format(g.get('world_permissions')))
action = 'POST'
# Is quering for one specific node
if action not in g.get('world_permissions'):
abort(403)
def pre_DELETE(request, lookup):
# Only Delete allowed documents
global_validation()
type_world_permissions = g.get('type_world_permissions')
type_owner_permissions = g.get('type_owner_permissions')
print ("Delete")
# print ("Owner: {0}".format(type_owner_permissions))
# print ("World: {0}".format(type_world_permissions))
action = 'DELETE'
if '_id' in lookup:
nodes = app.data.driver.db['nodes']
dbnode = nodes.find_one({'_id': ObjectId(lookup['_id'])})
# print (dbnode.count())
node_type = dbnode['node_type']
if g.get('token_data')['user'] == dbnode['user']:
owner = True
else:
owner = False
if action not in type_world_permissions[node_type]:
if action not in type_owner_permissions[node_type]:
print ("Abort1")
abort(403)
else:
if not owner:
print ("Abort2")
abort(403)
else:
print ("Abort3")
abort(403)
def check_permissions(user):
node_type = None
dbnode = None
owner_permissions = []
world_permissions = []
groups = app.data.driver.db['groups']
owner_group = groups.find_one({'name': 'owner'})
world_group = groups.find_one({'name': 'world'})
# Entry point should be nodes
entry_point = request.path.split("/")[1]
if entry_point != 'nodes':
return
# If is requesting a specific node
try:
uuid = request.path.split("/")[2]
nodes = app.data.driver.db['nodes']
lookup = {'_id': ObjectId(uuid)}
dbnode = nodes.find_one(lookup)
except IndexError:
pass
if dbnode:
node_type = str(dbnode['node_type'])
json_data = json.loads(request.data)
if not node_type and json_data:
if 'node_type' in json_data:
node_type = json_data['node_type']
# Extract query lookup
# which node_type is asking for?
for arg in request.args:
if arg == 'where':
try:
where = json.loads(request.args[arg])
except ValueError:
raise
if where.get('node_type'):
node_type = where.get('node_type')
break
# Get and store permissions for that node_type
type_owner_permissions = {}
type_world_permissions = {}
for per in owner_group['permissions']:
type_owner_permissions[per['node_type']] = per['permissions']
if str(per['node_type']) == node_type:
owner_permissions = per['permissions']
for per in world_group['permissions']:
type_world_permissions[per['node_type']] = per['permissions']
if str(per['node_type']) == node_type:
world_permissions = per['permissions']
# Store permission properties on global
setattr(g, 'owner_permissions', owner_permissions)
setattr(g, 'world_permissions', world_permissions)
setattr(g, 'type_world_permissions', type_world_permissions)
setattr(g, 'type_owner_permissions', type_owner_permissions)
class TokensAuth(TokenAuth): class TokensAuth(TokenAuth):
def check_auth(self, token, allowed_roles, resource, method): def check_auth(self, token, allowed_roles, resource, method):
if not token: if not token:
return False return False
tokens = app.data.driver.db['tokens']
users = app.data.driver.db['users']
lookup = {'token': token, 'expire_time': {"$gt": datetime.now()}}
dbtoken = tokens.find_one(lookup)
if not dbtoken:
validation = validate(token)
if validation['valid']:
email = validation['user']['email']
dbuser = users.find_one({'email': email})
tmpname = email.split('@')[0]
if not dbuser:
user_data = {
'first_name': tmpname,
'last_name': tmpname,
'email': email,
'role': ['admin'],
}
r = post_internal('users', user_data)
user_id = r[0]["_id"]
else:
user_id = dbuser['_id']
token_data = { validate_token()
'user': user_id,
'token': token, # if dbtoken:
'expire_time': datetime.now() + timedelta(hours=1) # check_permissions(dbtoken['user'])
} # return True
post_internal('tokens', token_data)
else: # return validation['valid']
return True return True
return validation['valid']
""" """
users = app.data.driver.db['users'] users = app.data.driver.db['users']
lookup = {'first_name': token['username']} lookup = {'first_name': token['username']}
@ -147,9 +354,9 @@ def convert_properties(properties, node_schema):
elif prop_type == 'objectid': elif prop_type == 'objectid':
prop_val = properties[prop] prop_val = properties[prop]
properties[prop] = ObjectId(prop_val) properties[prop] = ObjectId(prop_val)
return properties return properties
class ValidateCustomFields(Validator): class ValidateCustomFields(Validator):
def _validate_valid_properties(self, valid_properties, field, value): def _validate_valid_properties(self, valid_properties, field, value):
node_types = app.data.driver.db['node_types'] node_types = app.data.driver.db['node_types']
@ -182,6 +389,11 @@ def post_item(entry, data):
app = Eve(validator=ValidateCustomFields, auth=CustomTokenAuth) app = Eve(validator=ValidateCustomFields, auth=CustomTokenAuth)
app.on_pre_GET_nodes += pre_GET
app.on_pre_POST_nodes += pre_POST
app.on_pre_PATCH_nodes += pre_PATCH
app.on_pre_PUT_nodes += pre_PUT
app.on_pre_DELETE_nodes += pre_DELETE
# The file_server module needs app to be defined # The file_server module needs app to be defined
from file_server import file_server from file_server import file_server

View File

@ -61,6 +61,88 @@ def upgrade_node_types():
populate_node_types(old_ids) populate_node_types(old_ids)
def get_id(collection, name):
"""Returns the _id of the given collection
and name."""
from pymongo import MongoClient
client = MongoClient()
db = client.eve
node = db[collection].find({'name': name})
print (node[0]['_id'])
return node[0]['_id']
@manager.command
def add_groups():
"""Add permisions
"""
admin_group = {
'name': 'admin',
'permissions': [
{'node_type': get_id('node_types', 'shot'),
'permissions': ['GET', 'POST', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'task'),
'permissions': ['GET', 'POST', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'scene'),
'permissions': ['GET', 'POST', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'act'),
'permissions': ['GET', 'POST', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'comment'),
'permissions': ['GET', 'POST', 'UPDATE', 'DELETE']
},
]
}
post_item('groups', admin_group)
owner_group = {
'name': 'owner',
'permissions': [
{'node_type': get_id('node_types', 'shot'),
'permissions': ['GET', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'task'),
'permissions': ['GET', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'scene'),
'permissions': ['GET', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'act'),
'permissions': ['GET', 'UPDATE', 'DELETE']
},
{'node_type': get_id('node_types', 'comment'),
'permissions': ['GET', 'UPDATE', 'DELETE']
},
]
}
post_item('groups', owner_group)
world_group = {
'name': 'world',
'permissions': [
{'node_type': get_id('node_types', 'shot'),
'permissions': ['GET']
},
{'node_type': get_id('node_types', 'task'),
'permissions': ['GET']
},
{'node_type': get_id('node_types', 'scene'),
'permissions': ['GET']
},
{'node_type': get_id('node_types', 'act'),
'permissions': ['GET']
},
{'node_type': get_id('node_types', 'comment'),
'permissions': ['GET', 'POST']
},
]
}
post_item('groups', world_group)
@manager.command @manager.command
def populate_db_test(): def populate_db_test():
"""Populate the db with sample data """Populate the db with sample data

View File

@ -34,6 +34,18 @@ users_schema = {
'type': 'list', 'type': 'list',
'allowed': ["admin"], 'allowed': ["admin"],
'required': True, 'required': True,
},
'groups': {
'type': 'list',
'default': [],
'items': {
'type': 'objectid',
'data_relation': {
'resource': 'groups',
'field': '_id',
'embeddable': True
}
}
} }
} }
@ -211,7 +223,37 @@ files_schema = {
binary_files_schema = { binary_files_schema = {
'data': { 'data': {
'type': 'media', 'type': 'media',
'required': True
}
}
groups_schema = {
'name': {
'type': 'string',
'required': True
},
'permissions': {
'type': 'list',
'required': True, 'required': True,
'schema': {
'type': 'dict',
'schema': {
'node_type': {
'type': 'objectid',
'required': True,
'data_relation': {
'resource': 'node_types',
'field': '_id',
'embeddable': True
}
},
'permissions': {
'type': 'list',
'required': True,
'allowed': ['GET', 'POST', 'UPDATE', 'DELETE']
}
}
}
} }
} }
@ -259,6 +301,11 @@ binary_files = {
'schema': binary_files_schema, 'schema': binary_files_schema,
} }
groups = {
'resource_methods': ['GET', 'POST'],
'schema': groups_schema,
}
DOMAIN = { DOMAIN = {
'users': users, 'users': users,
'nodes': nodes, 'nodes': nodes,
@ -266,6 +313,7 @@ DOMAIN = {
'tokens': tokens, 'tokens': tokens,
'files': files, 'files': files,
'binary_files': binary_files, 'binary_files': binary_files,
'groups': groups
} }
try: try: