##// END OF EJS Templates
utils: added get_es_info function
r159:61d79e6b
Show More
predicates.py
135 lines | 4.0 KiB | text/x-python | PythonLexer
# -*- coding: utf-8 -*-
# Copyright 2010 - 2017 RhodeCode GmbH and the AppEnlight project authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import logging
from appenlight.forms import CSRFException
log = logging.getLogger(__name__)
from pyramid.interfaces import IDefaultCSRFOptions
from pyramid.session import check_csrf_origin, check_csrf_token
# taken directly from pyramid 1.7
# pyramid/viewderivers.py
# the difference is this deriver will ignore csrf_check when auth token
# policy is in effect
def csrf_view(view, info):
explicit_val = info.options.get("require_csrf")
defaults = info.registry.queryUtility(IDefaultCSRFOptions)
if defaults is None:
default_val = False
token = "csrf_token"
header = "X-CSRF-Token"
safe_methods = frozenset(["GET", "HEAD", "OPTIONS", "TRACE"])
else:
default_val = defaults.require_csrf
token = defaults.token
header = defaults.header
safe_methods = defaults.safe_methods
enabled = explicit_val is True or (explicit_val is not False and default_val)
# disable if both header and token are disabled
enabled = enabled and (token or header)
wrapped_view = view
if enabled:
def csrf_view(context, request):
is_from_auth_token = "auth:auth_token" in request.effective_principals
if is_from_auth_token:
log.debug("ignoring CSRF check, auth token used")
elif request.method not in safe_methods and (
# skip exception views unless value is explicitly defined
getattr(request, "exception", None) is None
or explicit_val is not None
):
check_csrf_origin(request, raises=True)
check_csrf_token(request, token, header, raises=True)
return view(context, request)
wrapped_view = csrf_view
return wrapped_view
csrf_view.options = ("require_csrf",)
class PublicReportGroup(object):
def __init__(self, val, config):
self.val = val
def text(self):
return "public_report_group = %s" % (self.val,)
phash = text
def __call__(self, context, request):
report_group = getattr(context, "report_group", None)
if report_group:
return context.report_group.public == self.val
class contextTypeClass(object):
def __init__(self, context_property, config):
self.context_property = context_property[0]
self.cls = context_property[1]
def text(self):
return "context_type_class = %s, %s" % (self.context_property, self.cls)
phash = text
def __call__(self, context, request):
to_check = getattr(context, self.context_property, None)
return isinstance(to_check, self.cls)
def unauthed_report_predicate(context, request):
"""
This allows the user to access the view if context object public
flag is True
"""
if context.public:
return True
def unauthed_report_predicate_inv(context, request):
"""
This allows the user to access the view if context object public
flag is NOT True
"""
if context.public:
return False
return True
def unauthed_report_predicate(context, request):
"""
This allows the user to access the view if context object public
flag is True
"""
if context.public:
return True
def unauthed_report_predicate_inv(context, request):
"""
This allows the user to access the view if context object public
flag is NOT True
"""
if context.public:
return False
return True