-
Notifications
You must be signed in to change notification settings - Fork 2k
/
get.py
215 lines (163 loc) · 7.06 KB
/
get.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
import ckan.logic as logic
from ckan.authz import Authorizer
import ckan.new_authz
from ckan.lib.base import _
from ckan.logic.auth import (get_package_object, get_group_object,
get_resource_object, get_related_object)
def site_read(context, data_dict):
"""\
This function should be deprecated. It is only here because we couldn't
get hold of Friedrich to ask what it was for.
./ckan/controllers/api.py
"""
model = context['model']
user = context.get('user')
if not Authorizer().is_authorized(user, model.Action.SITE_READ, model.System):
return {'success': False, 'msg': _('Not authorized to see this page')}
return {'success': True}
def package_search(context, data_dict):
# Everyone can search by default
return {'success': True}
def package_list(context, data_dict):
# List of all active packages are visible by default
return {'success': True}
def current_package_list_with_resources(context, data_dict):
return package_list(context, data_dict)
def revision_list(context, data_dict):
# In our new model everyone can read the revison list
return {'success': True}
def group_revision_list(context, data_dict):
return group_show(context, data_dict)
def package_revision_list(context, data_dict):
return package_show(context, data_dict)
def group_list(context, data_dict):
# List of all active groups is visible by default
return {'success': True}
def group_list_authz(context, data_dict):
return group_list(context, data_dict)
def group_list_available(context, data_dict):
return group_list(context, data_dict)
def licence_list(context, data_dict):
# Licences list is visible by default
return {'success': True}
def tag_list(context, data_dict):
# Tags list is visible by default
return {'success': True}
def user_list(context, data_dict):
# Users list is visible by default
return {'success': True}
def package_relationships_list(context, data_dict):
model = context['model']
user = context.get('user')
id = data_dict['id']
id2 = data_dict.get('id2')
pkg1 = model.Package.get(id)
pkg2 = model.Package.get(id2)
authorized = Authorizer().\
authorized_package_relationship(\
user, pkg1, pkg2, action=model.Action.READ)
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read these packages') % str(user)}
else:
return {'success': True}
def package_show(context, data_dict):
model = context['model']
user = context.get('user')
package = get_package_object(context, data_dict)
authorized = logic.check_access_old(package, model.Action.READ, context)
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read package %s') % (str(user),package.id)}
else:
# draft state indicates package is still in the creation process
# so we need to check we have creation rights.
if package.state.startswith('draft'):
auth = ckan.new_authz.is_authorized('package_update',
context, data_dict)
if not auth.get('success'):
msg = _('User %s not authorized to read package %s') \
% (str(user),package.id)
return {'success': False, 'msg': msg}
return {'success': True}
def related_show(context, data_dict=None):
return {'success': True}
def resource_show(context, data_dict):
model = context['model']
user = context.get('user')
resource = get_resource_object(context, data_dict)
# check authentication against package
query = model.Session.query(model.Package)\
.join(model.ResourceGroup)\
.join(model.Resource)\
.filter(model.ResourceGroup.id == resource.resource_group_id)
pkg = query.first()
if not pkg:
raise logic.NotFound(_('No package found for this resource, cannot check auth.'))
pkg_dict = {'id': pkg.id}
authorized = package_show(context, pkg_dict).get('success')
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read resource %s') % (str(user), resource.id)}
else:
return {'success': True}
def revision_show(context, data_dict):
# No authz check in the logic function
return {'success': True}
def group_show(context, data_dict):
model = context['model']
user = context.get('user')
group = get_group_object(context, data_dict)
authorized = logic.check_access_old(group, model.Action.READ, context)
if not authorized:
return {'success': False, 'msg': _('User %s not authorized to read group %s') % (str(user),group.id)}
else:
return {'success': True}
def tag_show(context, data_dict):
# No authz check in the logic function
return {'success': True}
def user_show(context, data_dict):
# By default, user details can be read by anyone, but some properties like
# the API key are stripped at the action level if not not logged in.
return {'success': True}
def package_autocomplete(context, data_dict):
return package_list(context, data_dict)
def group_autocomplete(context, data_dict):
return group_list(context, data_dict)
def tag_autocomplete(context, data_dict):
return tag_list(context, data_dict)
def user_autocomplete(context, data_dict):
return user_list(context, data_dict)
def format_autocomplete(context, data_dict):
return {'success': True}
def task_status_show(context, data_dict):
return {'success': True}
def resource_status_show(context, data_dict):
return {'success': True}
## Modifications for rest api
def package_show_rest(context, data_dict):
return package_show(context, data_dict)
def group_show_rest(context, data_dict):
return group_show(context, data_dict)
def tag_show_rest(context, data_dict):
return tag_show(context, data_dict)
def get_site_user(context, data_dict):
if not context.get('ignore_auth'):
return {'success': False, 'msg': 'Only internal services allowed to use this action'}
else:
return {'success': True}
def dashboard_activity_list(context, data_dict):
# FIXME: context['user'] could be an IP address but that case is not
# handled here. Maybe add an auth helper function like is_logged_in().
if context.get('user'):
return {'success': True}
else:
return {'success': False,
'msg': _("You must be logged in to access your dashboard.")}
def dashboard_new_activities_count(context, data_dict):
# FIXME: This should go through check_access() not call is_authorized()
# directly, but wait until 2939-orgs is merged before fixing this.
return ckan.new_authz.is_authorized('dashboard_activity_list',
context, data_dict)
def dashboard_mark_all_new_activities_as_old(context, data_dict):
# FIXME: This should go through check_access() not call is_authorized()
# directly, but wait until 2939-orgs is merged before fixing this.
return ckan.new_authz.is_authorized('dashboard_activity_list',
context, data_dict)