/
get.py
264 lines (191 loc) · 8.13 KB
/
get.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
import ckan.logic as logic
import ckan.new_authz as new_authz
from ckan.lib.base import _
from ckan.logic.auth import (get_package_object, get_group_object,
get_resource_object, get_related_object)
def sysadmin(context, data_dict):
''' This is a pseudo check if we are a sysadmin all checks are true '''
return {'success': False, 'msg': _('Not authorized')}
def site_read(context, data_dict):
"""\
This function should be deprecated. It is only here because we couldn't
get hold of Friedrich to ask what it was for.
./ckan/controllers/api.py
"""
# FIXME we need to remove this for now we allow site read
return {'success': True}
def package_search(context, data_dict):
# Everyone can search by default
return {'success': True}
def package_list(context, data_dict):
# List of all active packages are visible by default
return {'success': True}
def current_package_list_with_resources(context, data_dict):
return package_list(context, data_dict)
def revision_list(context, data_dict):
# In our new model everyone can read the revison list
return {'success': True}
def group_revision_list(context, data_dict):
return group_show(context, data_dict)
def package_revision_list(context, data_dict):
return package_show(context, data_dict)
def group_list(context, data_dict):
# List of all active groups is visible by default
return {'success': True}
def group_list_authz(context, data_dict):
return group_list(context, data_dict)
def group_list_available(context, data_dict):
return group_list(context, data_dict)
def organization_list(context, data_dict):
# List of all active organizations are visible by default
return {'success': True}
def organization_list_for_user(context, data_dict):
return {'success': True}
def licence_list(context, data_dict):
# Licences list is visible by default
return {'success': True}
def tag_list(context, data_dict):
# Tags list is visible by default
return {'success': True}
def user_list(context, data_dict):
# Users list is visible by default
return {'success': True}
def package_relationships_list(context, data_dict):
user = context.get('user')
id = data_dict['id']
id2 = data_dict.get('id2')
# If we can see each package we can see the relationships
authorized1 = new_authz.is_authorized_boolean(
'package_show', context, {'id': id})
if id2:
authorized2 = new_authz.is_authorized_boolean(
'package_show', context, {'id': id2})
else:
authorized2 = True
if not (authorized1 and authorized2):
return {'success': False, 'msg': _('User %s not authorized to read these packages') % user}
else:
return {'success': True}
def package_show(context, data_dict):
user = context.get('user')
package = get_package_object(context, data_dict)
# draft state indicates package is still in the creation process
# so we need to check we have creation rights.
if package.state.startswith('draft'):
auth = new_authz.is_authorized('package_update',
context, data_dict)
authorized = auth.get('success')
else:
# anyone can see a public package
if not package.private and package.state == 'active':
return {'success': True}
authorized = new_authz.has_user_permission_for_group_or_org(
package.owner_org, user, 'read')
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read package %s') % (user, package.id)}
else:
return {'success': True}
def related_show(context, data_dict=None):
return {'success': True}
def resource_show(context, data_dict):
model = context['model']
user = context.get('user')
resource = get_resource_object(context, data_dict)
# check authentication against package
query = model.Session.query(model.Package)\
.join(model.ResourceGroup)\
.join(model.Resource)\
.filter(model.ResourceGroup.id == resource.resource_group_id)
pkg = query.first()
if not pkg:
raise logic.NotFound(_('No package found for this resource, cannot check auth.'))
pkg_dict = {'id': pkg.id}
authorized = package_show(context, pkg_dict).get('success')
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read resource %s') % (str(user), resource.id)}
else:
return {'success': True}
def revision_show(context, data_dict):
# No authz check in the logic function
return {'success': True}
def group_show(context, data_dict):
# anyone can see a group
return {'success': True}
def organization_show(context, data_dict):
# anyone can see a organization
return {'success': True}
def tag_show(context, data_dict):
# No authz check in the logic function
return {'success': True}
def user_show(context, data_dict):
# By default, user details can be read by anyone, but some properties like
# the API key are stripped at the action level if not not logged in.
return {'success': True}
def package_autocomplete(context, data_dict):
return package_list(context, data_dict)
def group_autocomplete(context, data_dict):
return group_list(context, data_dict)
def tag_autocomplete(context, data_dict):
return tag_list(context, data_dict)
def user_autocomplete(context, data_dict):
return user_list(context, data_dict)
def format_autocomplete(context, data_dict):
return {'success': True}
def task_status_show(context, data_dict):
return {'success': True}
def resource_status_show(context, data_dict):
return {'success': True}
## Modifications for rest api
def package_show_rest(context, data_dict):
return package_show(context, data_dict)
def group_show_rest(context, data_dict):
return group_show(context, data_dict)
def tag_show_rest(context, data_dict):
return tag_show(context, data_dict)
def get_site_user(context, data_dict):
# FIXME this is available to sysadmins currently till
# @auth_sysadmins_check decorator is added
return {'success': False,
'msg': 'Only internal services allowed to use this action'}
def member_roles_list(context, data_dict):
return {'success': True}
def dashboard_activity_list(context, data_dict):
# FIXME: context['user'] could be an IP address but that case is not
# handled here. Maybe add an auth helper function like is_logged_in().
if context.get('user'):
return {'success': True}
else:
return {'success': False,
'msg': _("You must be logged in to access your dashboard.")}
def dashboard_new_activities_count(context, data_dict):
# FIXME: This should go through check_access() not call is_authorized()
# directly, but wait until 2939-orgs is merged before fixing this.
# This is so a better not authourized message can be sent.
return new_authz.is_authorized('dashboard_activity_list',
context, data_dict)
def user_follower_list(context, data_dict):
return sysadmin(context, data_dict)
def dataset_follower_list(context, data_dict):
return sysadmin(context, data_dict)
def group_follower_list(context, data_dict):
return sysadmin(context, data_dict)
def _followee_list(context, data_dict):
model = context['model']
# Visitors cannot see what users are following.
authorized_user = model.User.get(context.get('user'))
if not authorized_user:
return {'success': False, 'msg': _('Not authorized')}
# Any user is authorized to see what she herself is following.
requested_user = model.User.get(data_dict.get('id'))
if authorized_user == requested_user:
return {'success': True}
# Sysadmins are authorized to see what anyone is following.
return sysadmin(context, data_dict)
def followee_list(context, data_dict):
return _followee_list(context, data_dict)
def user_followee_list(context, data_dict):
return _followee_list(context, data_dict)
def dataset_followee_list(context, data_dict):
return _followee_list(context, data_dict)
def group_followee_list(context, data_dict):
return _followee_list(context, data_dict)