#!/usr/bin/env python
# -*- coding: utf-8 -*-
###############################################################################
# Copyright 2013 Kitware Inc.
#
# Licensed under the Apache License, Version 2.0 ( the "License" );
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
###############################################################################
import copy
import functools
import itertools
import pymongo
import re
import six
from bson.objectid import ObjectId
from bson.errors import InvalidId
from pymongo.errors import WriteError
from girder import events
from girder.constants import AccessType, CoreEventHandler, TerminalColor, \
TEXT_SCORE_SORT_MAX
from girder.external.mongodb_proxy import MongoProxy
from girder.models import getDbConnection
from girder.utility.model_importer import ModelImporter
# pymongo3 complains about extra kwargs to find(), so we must filter them.
_allowedFindArgs = ('cursor_type', 'allow_partial_results', 'oplog_replay',
'modifiers', 'manipulate')
[docs]class Model(ModelImporter):
"""
Model base class. Models are responsible for abstracting away the
persistence layer. Each collection in the database should have its own
model. Methods that deal with database interaction belong in the
model layer.
"""
def __init__(self):
self.name = None
self._indices = []
self._textIndex = None
self._textLanguage = None
self.prefixSearchFields = ('lowerName', 'name')
self._filterKeys = {
AccessType.READ: set(),
AccessType.WRITE: set(),
AccessType.ADMIN: set(),
AccessType.SITE_ADMIN: set()
}
self.initialize()
self.reconnect()
[docs] def reconnect(self):
"""
Reconnect to the database and rebuild indices if necessary. Users should
typically not have to call this method.
"""
db_connection = getDbConnection()
self.database = db_connection.get_default_database()
self.collection = MongoProxy(self.database[self.name])
for index in self._indices:
if isinstance(index, (list, tuple)):
self.collection.create_index(index[0], **index[1])
else:
self.collection.create_index(index)
if type(self._textIndex) is dict:
textIdx = [(k, 'text') for k in six.viewkeys(self._textIndex)]
try:
self.collection.create_index(
textIdx, weights=self._textIndex,
default_language=self._textLanguage)
except pymongo.errors.OperationFailure:
print(
TerminalColor.warning('WARNING: Text search not enabled.'))
[docs] def exposeFields(self, level, fields):
"""
Expose model fields to users with the given access level. Subclasses
should call this in their initialize method to declare what fields
should be exposed to what access levels if they are using the default
filter implementation in this class. Since filtered fields are sets,
this method is idempotent.
:param level: The required access level for the field.
:type level: AccessType
:param fields: A field or list of fields to expose for that level.
:type fields: str, list, or tuple
"""
if isinstance(fields, six.string_types):
fields = (fields, )
self._filterKeys[level].update(fields)
[docs] def hideFields(self, level, fields):
"""
Hide a field, i.e. make sure it is not exposed via the default
filtering method. Since the filter uses a white list, it is only ever
necessary to call this for fields that were added previously with
exposeFields().
:param level: The access level to remove the fields from.
:type level: AccessType
:param fields: The field or fields to remove from the white list.
:type fields: str, list, or tuple
"""
if isinstance(fields, six.string_types):
fields = (fields, )
self._filterKeys[level].difference_update(fields)
[docs] def filter(self, doc, user=None, additionalKeys=None):
"""
Filter this model for the given user. This is a default implementation
that assumes this model has no notion of access control, and simply
allows all keys under READ access level, and conditionally allows any
keys assigned to SITE_ADMIN level.
:param doc: The document of this model type to be filtered.
:type doc: dict or None
:param user: The current user for whom we are filtering.
:type user: dict or None
:param additionalKeys: Any additional keys that should be included in
the document for this call only.
:type additionalKeys: list, tuple, set, or None
:returns: The filtered document (dict).
"""
if doc is None:
return None
keys = set(self._filterKeys[AccessType.READ])
if user and user.get('admin') is True:
keys.update(self._filterKeys[AccessType.SITE_ADMIN])
if additionalKeys:
keys.update(additionalKeys)
return self.filterDocument(doc, allow=keys)
[docs] def ensureTextIndex(self, index, language='english'):
"""
Call this during initialize() of the subclass if you want your
model to have a full-text searchable index. Each collection may
have zero or one full-text index.
:param language: The default_language value for the text index,
which is used for stemming and stop words. If the text index
should not use stemming and stop words, set this param to 'none'.
:type language: str
"""
self._textIndex = index
self._textLanguage = language
[docs] def ensureIndices(self, indices):
"""
Subclasses should call this with a list of strings representing
fields that should be indexed in the database if there are any.
Otherwise, it is not necessary to call this method. Elements of the list
may also be a list or tuple, where the second element is a dictionary
that will be passed as kwargs to the pymongo create_index call.
"""
self._indices.extend(indices)
[docs] def ensureIndex(self, index):
"""
Like ensureIndices, but declares just a single index rather than a list
of them.
"""
self._indices.append(index)
[docs] def validate(self, doc):
"""
Models should implement this to validate the document before it enters
the database. It must return the document with any necessary filters
applied, or throw a ValidationException if validation of the document
fails.
:param doc: The document to validate before saving to the collection.
:type doc: dict
"""
raise Exception('Must override validate() in %s model.'
% self.__class__.__name__) # pragma: no cover
[docs] def initialize(self):
"""
Subclasses should override this and set the name of the collection as
self.name. Also, they should set any indexed fields that they require.
"""
raise Exception('Must override initialize() in %s model'
% self.__class__.__name__) # pragma: no cover
[docs] def find(self, query=None, offset=0, limit=0, timeout=None,
fields=None, sort=None, **kwargs):
"""
Search the collection by a set of parameters. Passes any extra kwargs
through to the underlying pymongo.collection.find function.
:param query: The search query (see general MongoDB docs for "find()")
:type query: dict
:param offset: The offset into the results
:type offset: int
:param limit: Maximum number of documents to return
:type limit: int
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param fields: A mask for filtering result documents by key.
:type fields: list[str]
:param timeout: Cursor timeout in ms. Default is no timeout.
:type timeout: int
:returns: A pymongo database cursor.
"""
query = query or {}
kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs}
cursor = self.collection.find(
filter=query, skip=offset, limit=limit, projection=fields,
no_cursor_timeout=timeout is None, sort=sort, **kwargs)
if timeout:
cursor.max_time_ms(timeout)
return cursor
[docs] def findOne(self, query=None, fields=None, **kwargs):
"""
Search the collection by a set of parameters. Passes any kwargs
through to the underlying pymongo.collection.find_one function.
:param query: The search query (see general MongoDB docs for "find()")
:type query: dict
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param fields: A mask for filtering result documents by key.
:type fields: List of strings
:returns: the first object that was found, or None if none found.
"""
query = query or {}
kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs}
return self.collection.find_one(query, projection=fields, **kwargs)
[docs] def textSearch(self, query, offset=0, limit=0, sort=None, fields=None,
filters=None):
"""
Perform a full-text search against the text index for this collection.
:param query: The text query. Will be stemmed internally.
:type query: str
:param filters: Any additional query operators to apply.
:type filters: dict
:returns: A pymongo cursor. It is left to the caller to build the
results from the cursor.
"""
filters = filters or {}
fields = fields or {}
fields['_textScore'] = {'$meta': 'textScore'}
filters['$text'] = {'$search': query}
cursor = self.find(filters, offset=offset, limit=limit,
sort=sort, fields=fields)
# Sort by meta text score, but only if result count is below a certain
# threshold. The text score is not a real index, so we cannot always
# sort by it if there is a high number of matching documents.
if cursor.count() < TEXT_SCORE_SORT_MAX and sort is None:
cursor.sort([('_textScore', {'$meta': 'textScore'})])
return cursor
[docs] def prefixSearch(self, query, offset=0, limit=0, sort=None, fields=None,
filters=None, prefixSearchFields=None):
"""
Search for documents in this model's collection by a prefix string.
The fields that will be searched based on this prefix must be set as
the ``prefixSearchFields`` attribute of this model, which must be an
iterable. Elements of this iterable must be either a string representing
the field name, or a 2-tuple in which the first element is the field
name, and the second element is a string representing the regex search
options.
:param query: The prefix string to look for.
:type query: str
:param filters: Any additional query operators to apply.
:type filters: dict
:param prefixSearchFields: To override the model's prefixSearchFields
attribute for this invocation, pass an alternate iterable.
:returns: A pymongo cursor. It is left to the caller to build the
results from the cursor.
"""
filters = filters or {}
filters['$or'] = filters.get('$or', [])
for field in (prefixSearchFields or self.prefixSearchFields):
if isinstance(field, (list, tuple)):
filters['$or'].append({
field[0]: {
'$regex': '^%s' % re.escape(query),
'$options': field[1]
}
})
else:
filters['$or'].append({
field: {'$regex': '^%s' % re.escape(query)}
})
return self.find(
filters, offset=offset, limit=limit, sort=sort, fields=fields)
[docs] def save(self, document, validate=True, triggerEvents=True):
"""
Create or update a document in the collection. This triggers two
events; one prior to validation, and one prior to saving. Either of
these events may have their default action prevented.
:param document: The document to save.
:type document: dict
:param validate: Whether to call the model's validate() before saving.
:type validate: bool
:param triggerEvents: Whether to trigger events for validate and
pre- and post-save hooks.
"""
if validate and triggerEvents:
event = events.trigger('.'.join(('model', self.name, 'validate')),
document)
if event.defaultPrevented:
validate = False
if validate:
document = self.validate(document)
if triggerEvents:
event = events.trigger('model.%s.save' % self.name, document)
if event.defaultPrevented:
return document
isNew = '_id' not in document
try:
if isNew:
document['_id'] = \
self.collection.insert_one(document).inserted_id
else:
self.collection.replace_one(
{'_id': document['_id']}, document, True)
except WriteError as e:
raise ValidationException('Database save failed: %s' % e.details)
if triggerEvents:
if isNew:
events.trigger('model.%s.save.created' % self.name, document)
events.trigger('model.%s.save.after' % self.name, document)
return document
[docs] def update(self, query, update, multi=True):
"""
This method should be used for updating multiple documents in the
collection. This is useful for things like removing all references in
this collection to a document that is being deleted from another
collection.
For updating a single document, use the save() model method instead.
:param query: The query for finding documents to update. It's
the same format as would be passed to find().
:type query: dict
:param update: The update specifier.
:type update: dict
:param multi: Whether to update a single document, or all matching
documents.
:type multi: bool
:returns: A pymongo UpdateResult object.
"""
if multi:
return self.collection.update_many(query, update)
else:
return self.collection.update_one(query, update)
[docs] def increment(self, query, field, amount, **kwargs):
"""
This is a specialization of the update method that atomically increments
a field by a given amount. Additional kwargs are passed directly through
to update.
:param query: The query selector for documents to update.
:type query: dict
:param field: The name of the field in the document to increment.
:type field: str
:param amount: The amount to increment the field by.
:type amount: int or float
"""
self.update(query=query, update={
'$inc': {field: amount}
}, **kwargs)
[docs] def remove(self, document, **kwargs):
"""
Delete an object from the collection; must have its _id set.
:param doc: the item to remove.
"""
assert '_id' in document
event = events.trigger('.'.join(('model', self.name, 'remove')),
document)
kwargsEvent = events.trigger(
'.'.join(('model', self.name, 'remove_with_kwargs')), {
'document': document,
'kwargs': kwargs
})
if not event.defaultPrevented and not kwargsEvent.defaultPrevented:
return self.collection.delete_one({'_id': document['_id']})
[docs] def removeWithQuery(self, query):
"""
Remove all documents matching a given query from the collection.
For safety reasons, you may not pass an empty query.
"""
assert query
return self.collection.delete_many(query)
[docs] def load(self, id, objectId=True, fields=None, exc=False):
"""
Fetch a single object from the database using its _id field.
:param id: The value for searching the _id field.
:type id: string or ObjectId
:param objectId: Whether the id should be coerced to ObjectId type.
:type objectId: bool
:param fields: Fields list to include. Also can be a dict for
exclusion. See pymongo docs for how to use this arg.
:param exc: Whether to raise a ValidationException if there is no
document with the given id.
:type exc: bool
:returns: The matching document, or None.
"""
if not id:
raise ValidationException('Attempt to load null ObjectId: %s' % id)
if objectId and type(id) is not ObjectId:
try:
id = ObjectId(id)
except InvalidId:
raise ValidationException('Invalid ObjectId: %s' % id,
field='id')
doc = self.findOne({'_id': id}, fields=fields)
if doc is None and exc is True:
raise ValidationException('No such %s: %s' % (self.name, id),
field='id')
return doc
[docs] def filterDocument(self, doc, allow=None):
"""
This method will filter the given document to make it suitable to
output to the user.
:param doc: The document to filter.
:type doc: dict
:param allow: The whitelist of fields to allow in the output document.
:type allow: List of strings
"""
if not allow:
allow = []
if doc is None:
return None
out = {}
for field in allow:
if field in doc:
out[field] = doc[field]
if '_textScore' in doc:
out['_textScore'] = doc['_textScore']
out['_modelType'] = self.name
return out
[docs] def subtreeCount(self, doc):
"""
Return the size of the subtree rooted at the given document. In
general, if this contains items or folders, it will be the count of the
items and folders in all containers. If it does not, it will be 1.
This returns the absolute size of the subtree, it does not filter by
permissions.
:param doc: The root of the subtree.
:type doc: dict
"""
return 1
[docs]class AccessControlledModel(Model):
"""
Any model that has access control requirements should inherit from
this class. It enforces permission checking in the load() method
and provides convenient methods for testing and requiring user permissions.
It also provides methods for setting access control policies on the
resource.
"""
def __init__(self):
# Do the bindings before calling __init__(), in case a derived class
# wants to change things in initialize()
events.bind('model.user.remove',
CoreEventHandler.ACCESS_CONTROL_CLEANUP,
self._cleanupDeletedEntity)
events.bind('model.group.remove',
CoreEventHandler.ACCESS_CONTROL_CLEANUP,
self._cleanupDeletedEntity)
super(AccessControlledModel, self).__init__()
def _cleanupDeletedEntity(self, event):
"""
This callback removes references to deleted users or groups from all
concrete AccessControlledModel subtypes.
This generally should not be called or overridden directly. This should
not be unregistered, that would allow references to non-existent users
and groups to remain.
"""
entityType = event.name.split('.')[1]
entityDoc = event.info
if entityType == self.name:
# Avoid circular callbacks, since Users and Groups are themselves
# AccessControlledModels
return
if entityType == 'user':
# Remove creator references for this user entity.
creatorQuery = {
'creatorId': entityDoc['_id']
}
creatorUpdate = {
'$set': {'creatorId': None}
}
# If a given access-controlled resource doesn't store creatorId,
# this will simply do nothing
self.update(creatorQuery, creatorUpdate)
# Remove references to this entity from access-controlled resources.
acQuery = {
'access.%ss.id' % entityType: entityDoc['_id']
}
acUpdate = {
'$pull': {
'access.%ss' % entityType: {'id': entityDoc['_id']}
}
}
self.update(acQuery, acUpdate)
[docs] def filter(self, doc, user, additionalKeys=None):
"""
Filter this model for the given user according to the user's access
level. Also adds the special _accessLevel field to the document to
indicate the user's highest access level. This filters a single document
that the user has at least read access to. For filtering a set of
documents, see filterResultsByPermission().
:param doc: The document of this model type to be filtered.
:type doc: dict or None
:param user: The current user for whom we are filtering.
:type user: dict or None
:param additionalKeys: Any additional keys that should be included in
the document for this call only.
:type additionalKeys: list, tuple, or None
:returns: The filtered document (dict).
"""
if doc is None:
return None
keys = set(self._filterKeys[AccessType.READ])
level = self.getAccessLevel(doc, user)
if level >= AccessType.WRITE:
keys.update(self._filterKeys[AccessType.WRITE])
if level >= AccessType.ADMIN:
keys.update(self._filterKeys[AccessType.ADMIN])
if user.get('admin') is True:
keys.update(self._filterKeys[AccessType.SITE_ADMIN])
if additionalKeys:
keys.update(additionalKeys)
filtered = self.filterDocument(doc, allow=keys)
filtered['_accessLevel'] = level
return filtered
def _hasGroupAccess(self, perms, groupIds, level):
"""
Private helper method for checking group access.
"""
for groupAccess in perms:
if groupAccess['id'] in groupIds and groupAccess['level'] >= level:
return True
return False
def _hasUserAccess(self, perms, userId, level):
"""
Private helper method for checking user-specific access.
"""
for userAccess in perms:
if userAccess['id'] == userId and userAccess['level'] >= level:
return True
return False
def _setAccess(self, doc, id, entity, level, save):
"""
Private helper for setting access on a resource.
"""
assert entity == 'users' or entity == 'groups'
if type(id) is not ObjectId:
id = ObjectId(id)
if 'access' not in doc:
doc['access'] = {'groups': [], 'users': []}
if entity not in doc['access']:
doc['access'][entity] = []
# First remove any existing permission level for this entity.
doc['access'][entity] = [perm for perm in doc['access'][entity]
if perm['id'] != id]
# Add in the new level for this entity unless we are removing access.
if level is not None:
doc['access'][entity].append({
'id': id,
'level': level
})
if save:
doc = self.save(doc, validate=False)
return doc
[docs] def setPublic(self, doc, public, save=False):
"""
Set the flag for public read access on the object.
:param doc: The document to update permissions on.
:type doc: dict
:param public: Flag for public read access.
:type public: bool
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the
document for performance reasons.
:type save: bool
:returns: The updated resource document.
"""
assert type(public) is bool
doc['public'] = public
if save:
doc = self.save(doc, validate=False)
return doc
[docs] def setAccessList(self, doc, access, save=False):
"""
Set the entire access control list to the given value. This also saves
the resource in its new state to the database.
:param doc: The resource to update.
:type doc: dict
:param access: The new access control list to set on the object.
:type access: dict
:param save: Whether to save after updating.
:type save: boolean
:returns: The updated resource.
"""
# First coerce the access list value into a valid form.
acList = {
'users': [],
'groups': []
}
for userAccess in access.get('users', []):
if 'id' in userAccess and 'level' in userAccess:
if not userAccess['level'] in (AccessType.READ,
AccessType.WRITE,
AccessType.ADMIN):
raise ValidationException('Invalid access level', 'access')
acList['users'].append({
'id': ObjectId(userAccess['id']),
'level': userAccess['level']
})
else:
raise ValidationException('Invalid access list', 'access')
for groupAccess in access.get('groups', []):
if 'id' in groupAccess and 'level' in groupAccess:
if not groupAccess['level'] in (AccessType.READ,
AccessType.WRITE,
AccessType.ADMIN):
raise ValidationException('Invalid access level', 'access')
acList['groups'].append({
'id': ObjectId(groupAccess['id']),
'level': groupAccess['level']
})
else:
raise ValidationException('Invalid access list', 'access')
doc['access'] = acList
if save:
doc = self.save(doc, validate=False)
return doc
[docs] def setGroupAccess(self, doc, group, level, save=False):
"""
Set group-level access on the resource.
:param doc: The resource document to set access on.
:type doc: dict
:param group: The group to grant or remove access to.
:type group: dict
:param level: What level of access the group should have. Set to None
to remove all access for this group.
:type level: AccessType or None
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the
document for performance reasons.
:type save: bool
:returns: The updated resource document.
"""
return self._setAccess(doc, group['_id'], 'groups', level, save)
[docs] def getAccessLevel(self, doc, user):
"""
Return the maximum access level for a given user on a given object.
This can be useful for alerting the user which set of actions they are
able to perform on the object in advance of trying to call them.
:param doc: The object to check access on.
:param user: The user to get the access level for.
:returns: The max AccessType available for the user on the object.
"""
if user is None:
if doc.get('public', False):
return AccessType.READ
else:
return AccessType.NONE
elif user.get('admin', False):
return AccessType.ADMIN
else:
access = doc.get('access', {})
level = AccessType.NONE
for group in access.get('groups', []):
if group['id'] in user.get('groups', []):
level = max(level, group['level'])
if level == AccessType.ADMIN:
return level
for userAccess in access.get('users', []):
if userAccess['id'] == user['_id']:
level = max(level, userAccess['level'])
if level == AccessType.ADMIN:
return level
return level
[docs] def getFullAccessList(self, doc):
"""
Return an object representing the full access list on this document.
This simply includes the names of the users and groups with the ACL.
If the document contains references to users or groups that no longer
exist, they are simply removed from the ACL, and the modified ACL is
persisted at the end of this method if any removals occurred.
:param doc: The document whose ACL to return.
:type doc: dict
:returns: A dict containing `users` and `groups` keys.
"""
acList = {
'users': doc.get('access', {}).get('users', []),
'groups': doc.get('access', {}).get('groups', [])
}
dirty = False
for user in acList['users'][:]:
userDoc = self.model('user').load(
user['id'], force=True,
fields=['firstName', 'lastName', 'login'])
if not userDoc:
dirty = True
acList['users'].remove(user)
continue
user['login'] = userDoc['login']
user['name'] = ' '.join((userDoc['firstName'], userDoc['lastName']))
for grp in acList['groups'][:]:
grpDoc = self.model('group').load(
grp['id'], force=True, fields=['name', 'description'])
if not grpDoc:
dirty = True
acList['groups'].remove(grp)
continue
grp['name'] = grpDoc['name']
grp['description'] = grpDoc['description']
if dirty:
# If we removed invalid entries from the ACL, persist the changes.
self.setAccessList(doc, acList, save=True)
return acList
[docs] def setUserAccess(self, doc, user, level, save=False):
"""
Set user-level access on the resource.
:param doc: The resource document to set access on.
:type doc: dict
:param user: The user to grant or remove access to.
:type user: dict
:param level: What level of access the user should have. Set to None
to remove all access for this user.
:type level: AccessType or None
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the
document for performance reasons.
:type save: bool
:returns: The modified resource document.
"""
return self._setAccess(doc, user['_id'], 'users', level, save)
[docs] def hasAccess(self, doc, user=None, level=AccessType.READ):
"""
This method looks through the object's permission set and determines
whether the user has the given permission level on the object.
:param doc: The document to check permission on.
:type doc: dict
:param user: The user to check against.
:type user: dict
:param level: The access level.
:type level: AccessType
:returns: Whether the access is granted.
"""
if level <= AccessType.READ and doc.get('public', False) is True:
# Short-circuit the case of public resources
return True
elif user is None:
# Anonymous users can only see public resources
return False
if user.get('admin', False) is True:
# Short-circuit the case of admins
return True
# If all that fails, descend into real permission checking.
if 'access' in doc:
perms = doc['access']
if self._hasGroupAccess(perms.get('groups', []),
user.get('groups', []), level):
return True
elif self._hasUserAccess(perms.get('users', []),
user['_id'], level):
return True
return False
[docs] def requireAccess(self, doc, user=None, level=AccessType.READ):
"""
This wrapper just provides a standard way of throwing an
access denied exception if the access check fails.
"""
if not self.hasAccess(doc, user, level):
if level == AccessType.READ:
perm = 'Read'
elif level == AccessType.WRITE:
perm = 'Write'
elif level in (AccessType.ADMIN, AccessType.SITE_ADMIN):
perm = 'Admin'
else:
perm = 'Unknown level'
if user:
userid = str(user.get('_id', ''))
else:
userid = None
raise AccessException("%s access denied for %s %s (user %s)." %
(perm, self.name, doc.get('_id', 'unknown'),
userid))
[docs] def load(self, id, level=AccessType.ADMIN, user=None, objectId=True,
force=False, fields=None, exc=False):
"""
Override of Model.load to also do permission checking.
:param id: The id of the resource.
:type id: str or ObjectId
:param user: The user to check access against.
:type user: dict or None
:param level: The required access type for the object.
:type level: AccessType
:param force: If you explicitly want to circumvent access
checking on this resource, set this to True.
:type force: bool
:param objectId: Whether the id should be coerced to ObjectId type.
:type objectId: bool
:param fields: The subset of fields to load from the returned document,
or None to return the full document.
:param exc: If not found, throw a ValidationException instead of
returning None.
:type exc: bool
:raises ValidationException: If an invalid ObjectId is passed.
:returns: The matching document, or None if no match exists.
"""
# Ensure we load access and public, these are needed by requireAccess
loadFields = fields
if not force and fields:
loadFields = list(set(fields) | {'access', 'public'})
doc = Model.load(self, id=id, objectId=objectId, fields=loadFields,
exc=exc)
if not force and doc is not None:
self.requireAccess(doc, user, level)
if fields is not None:
if 'access' not in fields:
del doc['access']
if 'public' not in fields:
del doc['public']
return doc
[docs] def copyAccessPolicies(self, src, dest, save=False):
"""
Copies the set of access control policies from one document to another.
:param src: The source document to copy policies from.
:type src: dict
:param dest: The destination document to copy policies onto.
:type dest: dict
:param save: Whether to save the destination document after copying.
:type save: bool
:returns: The modified destination document.
"""
dest['public'] = src.get('public', False)
if 'access' in src:
dest['access'] = copy.deepcopy(src['access'])
if save:
dest = self.save(dest, validate=False)
return dest
[docs] def filterResultsByPermission(self, cursor, user, level, limit=0, offset=0,
removeKeys=()):
"""
Given a database result cursor, this generator will yield only the
results that the user has the given level of access on, respecting the
limit and offset specified.
:param cursor: The database cursor object from "find()".
:param user: The user to check policies against.
:param level: The access level.
:type level: AccessType
:param limit: The max size of the result set.
:type limit: int
:param offset: The offset into the result set.
:type offset: int
:param removeKeys: List of keys that should be removed from each
matching document.
:type removeKeys: list
"""
hasAccess = functools.partial(self.hasAccess, user=user, level=level)
endIndex = offset + limit if limit else None
filteredCursor = six.moves.filter(hasAccess, cursor)
for result in itertools.islice(filteredCursor, offset, endIndex):
for key in removeKeys:
if key in result:
del result[key]
yield result
[docs] def textSearch(self, query, user=None, filters=None, limit=0, offset=0,
sort=None, fields=None, level=AccessType.READ):
"""
Custom override of Model.textSearch to also force permission-based
filtering. The parameters are the same as Model.textSearch.
:param user: The user to apply permission filtering for.
:type user: dict or None
:param level: The access level to require.
:type level: girder.constants.AccessType
"""
filters = filters or {}
cursor = Model.textSearch(
self, query=query, filters=filters, sort=sort, fields=fields)
return self.filterResultsByPermission(
cursor, user=user, level=level, limit=limit, offset=offset)
[docs] def prefixSearch(self, query, user=None, filters=None, limit=0, offset=0,
sort=None, fields=None, level=AccessType.READ):
"""
Custom override of Model.prefixSearch to also force permission-based
filtering. The parameters are the same as Model.prefixSearch.
:param user: The user to apply permission filtering for.
:type user: dict or None
:param level: The access level to require.
:type level: girder.constants.AccessType
"""
filters = filters or {}
cursor = Model.prefixSearch(
self, query=query, filters=filters, sort=sort, fields=fields)
return self.filterResultsByPermission(
cursor, user=user, level=level, limit=limit, offset=offset)
[docs]class AccessException(Exception):
"""
Represents denial of access to a resource.
"""
def __init__(self, message):
self.message = message
Exception.__init__(self, message)
[docs]class GirderException(Exception):
"""
Represents a general exception that might occur in regular use. From the
user perspective, these are failures, but not catastrophic ones. An
identifier can be passed, which allows receivers to check the exception
without relying on the text of the message. It is recommended that
identifiers are a dot-separated string consisting of the originating
python module and a distinct error. For example,
'girder.model.assetstore.no-current-assetstore'.
"""
def __init__(self, message, identifier=None):
self.identifier = identifier
self.message = message
Exception.__init__(self, message)
[docs]class ValidationException(Exception):
"""
Represents validation failure in the model layer. Raise this with
a message and an optional field property. If one of these is thrown
in the model during a REST request, it will respond as a 400 status.
"""
def __init__(self, message, field=None):
self.field = field
self.message = message
Exception.__init__(self, message)