Source code for girder.models.model_base

#!/usr/bin/env python
# -*- coding: utf-8 -*-

###############################################################################
#  Copyright 2013 Kitware Inc.
#
#  Licensed under the Apache License, Version 2.0 ( the "License" );
#  you may not use this file except in compliance with the License.
#  You may obtain a copy of the License at
#
#    http://www.apache.org/licenses/LICENSE-2.0
#
#  Unless required by applicable law or agreed to in writing, software
#  distributed under the License is distributed on an "AS IS" BASIS,
#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#  See the License for the specific language governing permissions and
#  limitations under the License.
###############################################################################

import copy
import functools
import itertools
import pymongo
import re
import six

from bson.objectid import ObjectId
from bson.errors import InvalidId
from pymongo.errors import WriteError
from girder import events, logprint, logger, auditLogger
from girder.constants import AccessType, CoreEventHandler, ACCESS_FLAGS, TEXT_SCORE_SORT_MAX
from girder.external.mongodb_proxy import MongoProxy
from girder.models import getDbConnection
from girder.utility.model_importer import ModelImporter
from girder.exceptions import AccessException, ValidationException
# Import the GirderException since it was historically defined here
from girder.exceptions import GirderException  # noqa

# pymongo3 complains about extra kwargs to find(), so we must filter them.
_allowedFindArgs = ('cursor_type', 'allow_partial_results', 'oplog_replay',
                    'modifiers', 'manipulate')
# This list is only used for testing, where we must reconnect() all models after
# the database is dropped between each test case. If we find a cleverer way to do
# that, we don't need to store these here.
_modelSingletons = []


def _permissionClauses(user=None, level=None, prefix=''):
    """
    Given a user and access level, return a list of clauses that can be used as
    part of a Mongo find query or aggregate match step.

    :param user: The user to check policies against.
    :type user: dict or None
    :param level: The access level.  Explicitly passing None skips doing
        permissions checks.
    :type level: AccessType
    :param prefix: an optional string to prepend to the keys used in the
        clauses.
    :type prefix: str
    :returns: A query dictionary with an '$or' entry which consists of a list
        of match clauses, any one of which implies validation.
    """
    permissionClauses = []
    if level is None or (user and user['admin']):
        # Without a level or with an admin user, match everything.
        return {}
    if level <= AccessType.READ:
        permissionClauses.append({prefix + 'public': True})
    elif not user:
        # If we have no user and asked for higher than read access, make a
        # query that will fail
        return {'__matchnothing': 'nothing'}
    if user and not user['admin']:
        permissionClauses.extend([
            {prefix + 'access.users': {'$elemMatch': {
                'id': user['_id'],
                'level': {'$gte': level}}}},
            {prefix + 'access.groups': {'$elemMatch': {
                'id': {'$in': user.get('groups', [])},
                'level': {'$gte': level}}}},
        ])
    return {'$or': permissionClauses}


class _ModelSingleton(type):
    def __init__(cls, name, bases, dict):
        super(_ModelSingleton, cls).__init__(name, bases, dict)
        cls._instance = None

    def __call__(cls, *args, **kwargs):
        if cls._instance is None:
            cls._instance = super(_ModelSingleton, cls).__call__(*args, **kwargs)
            _modelSingletons.append(cls._instance)
            # It is not safe to ever set cls._instance back to None in an attempt to force singleton
            # recreation, since some models have event bindings that will not be destroyed (so the
            # old singletons will still have instance-bound methods that are event-bound to and fire
            # on model-related events)
        return cls._instance


[docs]@six.add_metaclass(_ModelSingleton) class Model(ModelImporter): """ Model base class. Models are responsible for abstracting away the persistence layer. Each collection in the database should have its own model. Methods that deal with database interaction belong in the model layer. """ def __init__(self): self.name = None self._indices = [] self._connected = False self._textIndex = None self._textLanguage = None self.prefixSearchFields = ('lowerName', 'name') self._filterKeys = { AccessType.READ: set(), AccessType.WRITE: set(), AccessType.ADMIN: set(), AccessType.SITE_ADMIN: set() } self.initialize() self.reconnect()
[docs] def reconnect(self): """ Reconnect to the database and rebuild indices if necessary. Users should typically not have to call this method. """ db_connection = getDbConnection() self._dbserver_version = tuple(db_connection.server_info()['versionArray']) self.database = db_connection.get_database() self.collection = MongoProxy(self.database[self.name]) for index in self._indices: self._createIndex(index) if isinstance(self._textIndex, dict): textIdx = [(k, 'text') for k in six.viewkeys(self._textIndex)] try: self.collection.create_index( textIdx, weights=self._textIndex, default_language=self._textLanguage) except pymongo.errors.OperationFailure: logprint.warning('WARNING: Text search not enabled.') self._connected = True
[docs] def exposeFields(self, level, fields): """ Expose model fields to users with the given access level. Subclasses should call this in their initialize method to declare what fields should be exposed to what access levels if they are using the default filter implementation in this class. Since filtered fields are sets, this method is idempotent. :param level: The required access level for the field. :type level: AccessType :param fields: A field or list of fields to expose for that level. :type fields: `str, list, set, or tuple` """ if isinstance(fields, six.string_types): fields = (fields, ) self._filterKeys[level].update(fields)
[docs] def hideFields(self, level, fields): """ Hide a field, i.e. make sure it is not exposed via the default filtering method. Since the filter uses a white list, it is only ever necessary to call this for fields that were added previously with exposeFields(). :param level: The access level to remove the fields from. :type level: AccessType :param fields: The field or fields to remove from the white list. :type fields: `str, list, set, or tuple` """ if isinstance(fields, six.string_types): fields = (fields, ) self._filterKeys[level].difference_update(fields)
[docs] def filter(self, doc, user=None, additionalKeys=None): """ Filter this model for the given user. This is a default implementation that assumes this model has no notion of access control, and simply allows all keys under READ access level, and conditionally allows any keys assigned to SITE_ADMIN level. :param doc: The document of this model type to be filtered. :type doc: dict or None :param user: The current user for whom we are filtering. :type user: dict or None :param additionalKeys: Any additional keys that should be included in the document for this call only. :type additionalKeys: `list, tuple, set, or None` :returns: The filtered document (dict). """ if doc is None: return None keys = set(self._filterKeys[AccessType.READ]) if user and user['admin']: keys.update(self._filterKeys[AccessType.SITE_ADMIN]) if additionalKeys: keys.update(additionalKeys) return self.filterDocument(doc, allow=keys)
def _createIndex(self, index): if isinstance(index, (list, tuple)): self.collection.create_index(index[0], **index[1]) else: self.collection.create_index(index)
[docs] def ensureTextIndex(self, index, language='english'): """ Call this during initialize() of the subclass if you want your model to have a full-text searchable index. Each collection may have zero or one full-text index. :param language: The default_language value for the text index, which is used for stemming and stop words. If the text index should not use stemming and stop words, set this param to 'none'. :type language: str """ self._textIndex = index self._textLanguage = language
[docs] def ensureIndices(self, indices): """ Subclasses should call this with a list of strings representing fields that should be indexed in the database if there are any. Otherwise, it is not necessary to call this method. Elements of the list may also be a list or tuple, where the second element is a dictionary that will be passed as kwargs to the pymongo create_index call. """ self._indices.extend(indices) if self._connected: for index in indices: self._createIndex(index)
[docs] def ensureIndex(self, index): """ Like ensureIndices, but declares just a single index rather than a list of them. """ self._indices.append(index) if self._connected: self._createIndex(index)
[docs] def validate(self, doc): """ Models should implement this to validate the document before it enters the database. It must return the document with any necessary filters applied, or throw a ValidationException if validation of the document fails. :param doc: The document to validate before saving to the collection. :type doc: dict """ raise NotImplementedError('Must override validate() in %s model.' % self.__class__.__name__)
[docs] def validateKeys(self, keys): """ Validate a set of keys to make sure they are able to be used in the database. This enforces MongoDB rules about key names. @TODO Add recurse=True argument if ``keys`` is a dict. :param keys: An iterable of keys to validate. :type keys: iterable :raises: ValidationException """ for k in keys: if not k: raise ValidationException('Key names must not be empty.') if '.' in k: raise ValidationException( 'Invalid key %s: keys must not contain the "." character.' % k) if k[0] == '$': raise ValidationException( 'Invalid key %s: keys must not start with the "$" character.' % k)
[docs] def initialize(self): """ Subclasses should override this and set the name of the collection as self.name. Also, they should set any indexed fields that they require. """ raise NotImplementedError('Must override initialize() in %s model' % self.__class__.__name__)
[docs] def find(self, query=None, offset=0, limit=0, timeout=None, fields=None, sort=None, **kwargs): """ Search the collection by a set of parameters. Passes any extra kwargs through to the underlying pymongo.collection.find function. :param query: The search query (see general MongoDB docs for "find()") :type query: dict :param offset: The offset into the results :type offset: int :param limit: Maximum number of documents to return :type limit: int :param timeout: Cursor timeout in ms. Default is no timeout. :type timeout: int :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param sort: The sort order. :type sort: List of (key, order) tuples. :returns: A pymongo database cursor. """ query = query or {} kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs} cursor = self.collection.find( filter=query, skip=offset, limit=limit, projection=fields, no_cursor_timeout=timeout is None, sort=sort, **kwargs) if timeout: cursor.max_time_ms(timeout) return cursor
[docs] def findOne(self, query=None, fields=None, **kwargs): """ Search the collection by a set of parameters. Passes any kwargs through to the underlying pymongo.collection.find_one function. :param query: The search query (see general MongoDB docs for "find()") :type query: dict :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param sort: The sort order. :type sort: List of (key, order) tuples. :returns: the first object that was found, or None if none found. """ query = query or {} kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs} return self.collection.find_one(query, projection=fields, **kwargs)
def _textSearchFilters(self, query, filters=None, fields=None): """ Return a set of filters and fields used in the text search. :param query: The text query. Will be stemmed internally. :type query: str :param filters: Any additional query operators to apply. :type filters: dict :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :returns: (filters, fields) to be passed to the query. """ filters = filters or {} fields = fields or {} fields['_textScore'] = {'$meta': 'textScore'} filters['$text'] = {'$search': query} return filters, fields
[docs] def textSearch(self, query, offset=0, limit=0, sort=None, fields=None, filters=None, **kwargs): """ Perform a full-text search against the text index for this collection. :param query: The text query. Will be stemmed internally. :type query: str :param offset: The offset into the results :type offset: int :param limit: Maximum number of documents to return :type limit: int :param sort: The sort order. :type sort: List of (key, order) tuples. :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param filters: Any additional query operators to apply. :type filters: dict :returns: A pymongo cursor. It is left to the caller to build the results from the cursor. """ filters, fields = self._textSearchFilters(query, filters, fields) cursor = self.find(filters, offset=offset, limit=limit, sort=sort, fields=fields) # Sort by meta text score, but only if result count is below a certain # threshold. The text score is not a real index, so we cannot always # sort by it if there is a high number of matching documents. if sort is None and cursor.count() < TEXT_SCORE_SORT_MAX: cursor.sort([('_textScore', {'$meta': 'textScore'})]) return cursor
def _prefixSearchFilters(self, query, filters=None, prefixSearchFields=None): """ Return a set of filters and fields used in the text search. :param query: The text query. Will be stemmed internally. :type query: str :param filters: Any additional query operators to apply. :type filters: dict :param prefixSearchFields: To override the model's prefixSearchFields attribute for this invocation, pass an alternate iterable. :returns: filters to be passed to the query. """ filters = filters or {} filters['$or'] = filters.get('$or', []) for field in (prefixSearchFields or self.prefixSearchFields): if isinstance(field, (list, tuple)): filters['$or'].append({ field[0]: { '$regex': '^%s' % re.escape(query), '$options': field[1] } }) else: filters['$or'].append({ field: {'$regex': '^%s' % re.escape(query)} }) return filters
[docs] def prefixSearch(self, query, offset=0, limit=0, sort=None, fields=None, filters=None, prefixSearchFields=None, **kwargs): """ Search for documents in this model's collection by a prefix string. The fields that will be searched based on this prefix must be set as the ``prefixSearchFields`` attribute of this model, which must be an iterable. Elements of this iterable must be either a string representing the field name, or a 2-tuple in which the first element is the field name, and the second element is a string representing the regex search options. :param query: The prefix string to look for :type query: str :param offset: The offset into the results :type offset: int :param limit: Maximum number of documents to return :type limit: int :param sort: The sort order. :type sort: List of (key, order) tuples. :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param filters: Any additional query operators to apply. :type filters: dict :param prefixSearchFields: To override the model's prefixSearchFields attribute for this invocation, pass an alternate iterable. :returns: A pymongo cursor. It is left to the caller to build the results from the cursor. """ filters = self._prefixSearchFilters(query, filters, prefixSearchFields) return self.find( filters, offset=offset, limit=limit, sort=sort, fields=fields)
[docs] def save(self, document, validate=True, triggerEvents=True): """ Create or update a document in the collection. This triggers two events; one prior to validation, and one prior to saving. Either of these events may have their default action prevented. :param document: The document to save. :type document: dict :param validate: Whether to call the model's validate() before saving. :type validate: bool :param triggerEvents: Whether to trigger events for validate and pre- and post-save hooks. """ if validate and triggerEvents: event = events.trigger('.'.join(('model', self.name, 'validate')), document) if event.defaultPrevented: validate = False if validate: document = self.validate(document) if triggerEvents: event = events.trigger('model.%s.save' % self.name, document) if event.defaultPrevented: return document isNew = '_id' not in document try: if isNew: document['_id'] = \ self.collection.insert_one(document).inserted_id else: self.collection.replace_one( {'_id': document['_id']}, document, True) except WriteError as e: raise ValidationException('Database save failed: %s' % e.details) if triggerEvents: if isNew: auditLogger.info('document.create', extra={ 'details': { 'collection': self.name, 'id': document['_id'] } }) events.trigger('model.%s.save.created' % self.name, document) events.trigger('model.%s.save.after' % self.name, document) return document
[docs] def update(self, query, update, multi=True): """ This method should be used for updating multiple documents in the collection. This is useful for things like removing all references in this collection to a document that is being deleted from another collection. For updating a single document, use the save() model method instead. :param query: The search query for documents to update, see general MongoDB docs for "find()" :type query: dict :param update: The update specifier. :type update: dict :param multi: Whether to update a single document, or all matching documents. :type multi: bool :returns: A pymongo UpdateResult object. """ if multi: return self.collection.update_many(query, update) else: return self.collection.update_one(query, update)
[docs] def increment(self, query, field, amount, **kwargs): """ This is a specialization of the update method that atomically increments a field by a given amount. Additional kwargs are passed directly through to update. :param query: The search query for documents to update, see general MongoDB docs for "find()" :type query: dict :param field: The name of the field in the document to increment. :type field: str :param amount: The amount to increment the field by. :type amount: int or float """ self.update(query=query, update={ '$inc': {field: amount} }, **kwargs)
[docs] def remove(self, document, **kwargs): """ Delete an object from the collection; must have its _id set. :param document: the item to remove. """ assert '_id' in document event = events.trigger('.'.join(('model', self.name, 'remove')), document) kwargsEvent = events.trigger( '.'.join(('model', self.name, 'remove_with_kwargs')), { 'document': document, 'kwargs': kwargs }) if not event.defaultPrevented and not kwargsEvent.defaultPrevented: return self.collection.delete_one({'_id': document['_id']})
[docs] def removeWithQuery(self, query): """ Remove all documents matching a given query from the collection. For safety reasons, you may not pass an empty query. :param query: The search query for documents to delete, see general MongoDB docs for "find()" :type query: dict """ assert query return self.collection.delete_many(query)
[docs] def load(self, id, objectId=True, fields=None, exc=False): """ Fetch a single object from the database using its _id field. :param id: The value for searching the _id field. :type id: string or ObjectId :param objectId: Whether the id should be coerced to ObjectId type. :type objectId: bool :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param exc: Whether to raise a ValidationException if there is no document with the given id. :type exc: bool :returns: The matching document, or None. """ if not id: raise ValidationException('Attempt to load null ObjectId: %s' % id) if objectId and not isinstance(id, ObjectId): try: id = ObjectId(id) except InvalidId: raise ValidationException('Invalid ObjectId: %s' % id, field='id') doc = self.findOne({'_id': id}, fields=fields) if doc is None and exc is True: raise ValidationException('No such %s: %s' % (self.name, id), field='id') return doc
[docs] def filterDocument(self, doc, allow=None): """ This method will filter the given document to make it suitable to output to the user. :param doc: The document to filter. :type doc: dict :param allow: The whitelist of fields to allow in the output document. :type allow: List of strings """ if not allow: allow = [] if doc is None: return None out = {} for field in allow: if field in doc: out[field] = doc[field] if '_textScore' in doc: out['_textScore'] = doc['_textScore'] out['_modelType'] = self.name return out
[docs] def subtreeCount(self, doc): """ Return the size of the subtree rooted at the given document. In general, if this contains items or folders, it will be the count of the items and folders in all containers. If it does not, it will be 1. This returns the absolute size of the subtree, it does not filter by permissions. :param doc: The root of the subtree. :type doc: dict """ return 1
@staticmethod def _isInclusionProjection(fields): """ Test whether a projection filter is an inclusion filter (whitelist) or exclusion projection (blacklist) of fields, as defined by MongoDB find() method `projection` param. :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. :type fields: list or dict or None """ if fields is None: return False if not isinstance(fields, dict): # If this is a list/tuple/set, that means inclusion return True for k, v in six.viewitems(fields): if k != '_id': # We are only allowed either inclusion or exclusion keys in a dict, there can be no # mixing of these, with the only exception being that the `_id` key can be set as # an exclusion field in a dict that otherwise holds inclusion fields. return v # Empty dict or just _id field return fields.get('_id', True) @staticmethod def _supplementFields(fields, overwrite): """ Overwrite the projection filter to either include (in the case of an inclusion filter) or not exclude (in the case of an exclusion filter) the contents of overwrite. :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. :type fields: list or dict or None :param overwrite: Additional document key(s) to be included or not excluded in fields. :type overwrite: set :returns: A copy of fields with the relevant overwrite changes. """ if fields is None: return fields if Model._isInclusionProjection(fields): if not isinstance(fields, dict): # Inclusion projection (str, list, or tuple) copy = list(set(fields) | overwrite) else: # Inclusion projection (dict) copy = dict(fields) copy.update(dict.fromkeys(overwrite, True)) else: # Exclusion projection (dict) copy = dict(fields) for entry in overwrite: copy.pop(entry, None) return copy @staticmethod def _removeSupplementalFields(doc, fields): """ Edit the document to be consistent with what the user originally requested, undoing what may have been overwritten by _supplementFields(). :param doc: A document returned by MongoDB find() :type doc: dict :param fields: The original mask for filtering result documents by key, as specified by the user to be passed to MongoDB find() as the `projection` param. :type fields: list or dict or None """ if fields is None: return whitelist = [] if isinstance(fields, dict): for k, v in six.viewitems(fields): if not v: doc.pop(k, None) else: whitelist.append(k) if whitelist: for k in list(six.viewkeys(doc)): if k not in whitelist and k != '_id': del doc[k] else: for k in list(six.viewkeys(doc)): if k not in fields and k != '_id': del doc[k]
[docs]class AccessControlledModel(Model): """ Any model that has access control requirements should inherit from this class. It enforces permission checking in the load() method and provides convenient methods for testing and requiring user permissions. It also provides methods for setting access control policies on the resource. """ def __init__(self): # Do the bindings before calling __init__(), in case a derived class # wants to change things in initialize() events.bind('model.user.remove', CoreEventHandler.ACCESS_CONTROL_CLEANUP, self._cleanupDeletedEntity) events.bind('model.group.remove', CoreEventHandler.ACCESS_CONTROL_CLEANUP, self._cleanupDeletedEntity) super(AccessControlledModel, self).__init__() def _cleanupDeletedEntity(self, event): """ This callback removes references to deleted users or groups from all concrete AccessControlledModel subtypes. This generally should not be called or overridden directly. This should not be unregistered, that would allow references to non-existent users and groups to remain. """ entityType = event.name.split('.')[1] entityDoc = event.info if entityType == self.name: # Avoid circular callbacks, since Users and Groups are themselves # AccessControlledModels return if entityType == 'user': # Remove creator references for this user entity. creatorQuery = { 'creatorId': entityDoc['_id'] } creatorUpdate = { '$set': {'creatorId': None} } # If a given access-controlled resource doesn't store creatorId, # this will simply do nothing self.update(creatorQuery, creatorUpdate) # Remove references to this entity from access-controlled resources. acQuery = { 'access.%ss.id' % entityType: entityDoc['_id'] } acUpdate = { '$pull': { 'access.%ss' % entityType: {'id': entityDoc['_id']} } } self.update(acQuery, acUpdate)
[docs] def filter(self, doc, user, additionalKeys=None): """ Filter this model for the given user according to the user's access level. Also adds the special _accessLevel field to the document to indicate the user's highest access level. This filters a single document that the user has at least read access to. For filtering a set of documents, see filterResultsByPermission(). :param doc: The document of this model type to be filtered. :type doc: dict or None :param user: The current user for whom we are filtering. :type user: dict or None :param additionalKeys: Any additional keys that should be included in the document for this call only. :type additionalKeys: `list, tuple, or None` :returns: The filtered document (dict). """ if doc is None: return None keys = set(self._filterKeys[AccessType.READ]) level = self.getAccessLevel(doc, user) if level >= AccessType.WRITE: keys.update(self._filterKeys[AccessType.WRITE]) if level >= AccessType.ADMIN: keys.update(self._filterKeys[AccessType.ADMIN]) if user['admin']: keys.update(self._filterKeys[AccessType.SITE_ADMIN]) if additionalKeys: keys.update(additionalKeys) filtered = self.filterDocument(doc, allow=keys) filtered['_accessLevel'] = level return filtered
def _hasGroupAccessFlag(self, perms, groupIds, flag): """ Helper to test whether a user has a specific access flag via membership in a group. :param perms: The group access list (stored under doc['access']['groups']) :type perms: `list` :param groupIds: The list of groups that the user belongs to. :type groupIds: `list` :param flag: The access flag identifier to test. :type flag: str """ for groupAccess in perms: if groupAccess['id'] in groupIds and flag in groupAccess.get('flags', []): return True return False def _hasUserAccessFlag(self, perms, userId, flag): """ Helper to test whether a user has been granted an access flag directly on a resource. :param perms: The user access list (stored under doc['access']['users']) :type perms: `list` :param userId: The user ID to test. :type userId: ObjectId :param flag: The access flag identifier to test. :type flag: str """ for userAccess in perms: if userAccess['id'] == userId and flag in userAccess.get('flags', []): return True return False def _hasGroupAccess(self, perms, groupIds, level): """ Private helper method for checking group access. """ for groupAccess in perms: if groupAccess['id'] in groupIds and groupAccess['level'] >= level: return True return False def _hasUserAccess(self, perms, userId, level): """ Private helper method for checking user-specific access. """ for userAccess in perms: if userAccess['id'] == userId and userAccess['level'] >= level: return True return False def _setAccess(self, doc, id, entity, level, save, flags=None, user=None, force=False): """ Private helper for setting access on a resource. """ if not isinstance(id, ObjectId): id = ObjectId(id) if 'access' not in doc: doc['access'] = {'groups': [], 'users': []} if entity not in doc['access']: doc['access'][entity] = [] key = 'access.' + entity update = {} # Add in the new level for this entity unless we are removing access. if level is not None: entry = { 'id': id, 'level': level, 'flags': flags } entry['flags'] = self._validateFlags(doc, user, entity, entry, force) # because we're iterating this operation is not necessarily atomic for index, perm in enumerate(doc['access'][entity]): if perm['id'] == id: # if the id already exists we want to update with a $set doc['access'][entity][index] = entry update['$set'] = {'%s.%s' % (key, index): entry} break else: doc['access'][entity].append(entry) update['$push'] = {key: entry} # set remove query else: update['$pull'] = {key: {'id': id}} for perm in doc['access'][entity]: if perm['id'] == id: doc['access'][entity].remove(perm) if save: doc = self._saveAcl(doc, update) return doc def _saveAcl(self, doc, update): if '_id' not in doc: return self.save(doc) # copy all other (potentially updated) fields to the update list, # and trigger normal save events if '$set' in update: for propKey in doc: if propKey != 'access': update['$set'][propKey] = doc[propKey] else: update['$set'] = {k: v for k, v in six.viewitems(doc) if k != 'access'} event = events.trigger('model.%s.save' % self.name, doc) if not event.defaultPrevented: doc = self.collection.find_one_and_update( {'_id': ObjectId(doc['_id'])}, update, return_document=pymongo.ReturnDocument.AFTER) events.trigger('model.%s.save.after' % self.name, doc) return doc
[docs] def setPublic(self, doc, public, save=False): """ Set the flag for public read access on the object. :param doc: The document to update permissions on. :type doc: dict :param public: Flag for public read access. :type public: bool :param save: Whether to save the object to the database afterward. Set this to False if you want to wait to save the document for performance reasons. :type save: bool :returns: The updated resource document. """ assert isinstance(public, bool) doc['public'] = public if save: doc = self.save(doc) return doc
[docs] def setPublicFlags(self, doc, flags, user=None, append=False, save=False, force=False): """ Set access flags that are granted on this resource to anonymous users. This means any user, whether anonymous or logged in, will receive all of the specified permissions. This also validates that the user attempting to set the flags has permission to do so. Any flags that are invalid or that the user is not authorized to enable will be discarded from the list. :param doc: The document to update access flags on. :type doc: dict :param flags: Flags or set of flags to add. :type flags: flag identifier, or a list/set/tuple of them :param user: The user performing this action. :type user: dict :param append: Whether to append to the list or replace it. :type append: bool :param save: Whether to save the document to the database afterward. :type save: bool :param force: Set this to True to set the flags regardless of the passed in user's permissions. :type force: bool """ currentFlags = doc.get('publicFlags', []) if not isinstance(flags, (list, tuple, set)): flags = {flags} if append: flags = currentFlags + list(flags) flags = set(flags) & set(ACCESS_FLAGS.keys()) if force or user['admin']: doc['publicFlags'] = list(flags) else: allowedFlags = [] for flag in flags: info = ACCESS_FLAGS[flag] # If this is an admin-only flag, we only allow it if it's already enabled. if not info['admin'] or (info['admin'] and flag in currentFlags): allowedFlags.append(flag) doc['publicFlags'] = allowedFlags if save: doc = self.save(doc) return doc
def _isFlagEnabled(self, doc, type, entry, flag): """ Check whether a specific flag is enabled for a specific ACL entry in the document. """ id = entry['id'] perms = doc.get('access', {}) if type == 'group': return self._hasGroupAccessFlag(perms.get('groups', ()), [id], flag) else: # 'user' return self._hasUserAccessFlag(perms.get('users', ()), id, flag) def _validateFlags(self, doc, user, type, entry, force=False): """ Coerces a flag or set/list/tuple of flags into a valid form, returning a list that only contains the valid flags that the passed in user has permission to set. """ flags = entry.get('flags', []) if not isinstance(flags, (list, tuple, set)): flags = {flags} flags = set(flags) & set(ACCESS_FLAGS.keys()) if force or (user and user['admin']): return list(flags) allowedFlags = [] for flag in flags: info = ACCESS_FLAGS[flag] # If this is an admin-only flag, we only allow it if it's already enabled # for this specific group or user rule if info['admin'] and self._isFlagEnabled(doc, type, entry, flag): allowedFlags.append(flag) elif not info['admin']: allowedFlags.append(flag) return allowedFlags
[docs] def setAccessList(self, doc, access, save=False, user=None, force=False): """ Set the entire access control list to the given value. This also saves the resource in its new state to the database. :param doc: The resource to update. :type doc: dict :param access: The new access control list to set on the object. :type access: dict :param save: Whether to save after updating. :type save: boolean :param user: The user performing the update. This is used to control updating of access flags that require admin permission to enable. :type user: dict :param force: Set this to True to set the flags regardless of the passed in user's permissions. :type force: bool :returns: The updated resource. """ # First coerce the access list value into a valid form. acList = { 'users': [], 'groups': [] } allowedLevels = (AccessType.READ, AccessType.WRITE, AccessType.ADMIN) for userAccess in access.get('users', []): if 'id' in userAccess and 'level' in userAccess: if not userAccess['level'] in allowedLevels: raise ValidationException('Invalid access level', 'access') acList['users'].append({ 'id': ObjectId(userAccess['id']), 'level': userAccess['level'], 'flags': self._validateFlags(doc, user, 'user', userAccess, force) }) else: raise ValidationException('Invalid access list', 'access') for groupAccess in access.get('groups', []): if 'id' in groupAccess and 'level' in groupAccess: if not groupAccess['level'] in allowedLevels: raise ValidationException('Invalid access level', 'access') acList['groups'].append({ 'id': ObjectId(groupAccess['id']), 'level': groupAccess['level'], 'flags': self._validateFlags(doc, user, 'group', groupAccess, force) }) else: raise ValidationException('Invalid access list', 'access') doc['access'] = acList if save: doc = self.save(doc) return doc
[docs] def setGroupAccess(self, doc, group, level, save=False, flags=None, currentUser=None, force=False): """ Set group-level access on the resource. :param doc: The resource document to set access on. :type doc: dict :param group: The group to grant or remove access to. :type group: dict :param level: What level of access the group should have. Set to None to remove all access for this group. :type level: AccessType or None :param save: Whether to save the object to the database afterward. Set this to False if you want to wait to save the document for performance reasons. :type save: bool :param flags: List of access flags to grant to the group. :type flags: specific flag identifier, or a list/tuple/set of them :param currentUser: The user performing this action. Only required if attempting to set admin-only flags on the resource. :type currentUser: dict or None :returns: The updated resource document. :param force: Set this to True to set the flags regardless of the passed in currentUser's permissions (only matters if flags are passed). :type force: bool """ return self._setAccess(doc, group['_id'], 'groups', level, save, flags, currentUser, force)
[docs] def getAccessLevel(self, doc, user): """ Return the maximum access level for a given user on a given object. This can be useful for alerting the user which set of actions they are able to perform on the object in advance of trying to call them. :param doc: The object to check access on. :param user: The user to get the access level for. :returns: The max AccessType available for the user on the object. """ if user is None: if doc.get('public', False): return AccessType.READ else: return AccessType.NONE elif user['admin']: return AccessType.ADMIN else: access = doc.get('access', {}) level = AccessType.NONE for group in access.get('groups', []): if group['id'] in user.get('groups', []): level = max(level, group['level']) if level == AccessType.ADMIN: return level for userAccess in access.get('users', []): if userAccess['id'] == user['_id']: level = max(level, userAccess['level']) if level == AccessType.ADMIN: return level return level
[docs] def getFullAccessList(self, doc): """ Return an object representing the full access list on this document. This simply includes the names of the users and groups with the ACL. If the document contains references to users or groups that no longer exist, they are simply removed from the ACL, and the modified ACL is persisted at the end of this method if any removals occurred. :param doc: The document whose ACL to return. :type doc: dict :returns: A dict containing `users` and `groups` keys. """ from .user import User from .group import Group acList = { 'users': doc.get('access', {}).get('users', []), 'groups': doc.get('access', {}).get('groups', []) } dirty = False for user in acList['users'][:]: userDoc = User().load(user['id'], force=True, fields=['firstName', 'lastName', 'login']) if not userDoc: dirty = True acList['users'].remove(user) continue user['login'] = userDoc['login'] user['name'] = ' '.join((userDoc['firstName'], userDoc['lastName'])) for grp in acList['groups'][:]: grpDoc = Group().load(grp['id'], force=True, fields=['name', 'description']) if not grpDoc: dirty = True acList['groups'].remove(grp) continue grp['name'] = grpDoc['name'] grp['description'] = grpDoc['description'] if dirty: # If we removed invalid entries from the ACL, persist the changes. self.setAccessList(doc, acList, save=True) return acList
[docs] def setUserAccess(self, doc, user, level, save=False, flags=None, currentUser=None, force=False): """ Set user-level access on the resource. :param doc: The resource document to set access on. :type doc: dict :param user: The user to grant or remove access to. :type user: dict :param level: What level of access the user should have. Set to None to remove all access for this user. :type level: AccessType or None :param save: Whether to save the object to the database afterward. Set this to False if you want to wait to save the document for performance reasons. :type save: bool :param flags: List of access flags to grant to the group. :type flags: specific flag identifier, or a list/tuple/set of them :param currentUser: The user performing this action. Only required if attempting to set admin-only flags on the resource. :param force: Set this to True to set the flags regardless of the passed in currentUser's permissions (only matters if flags are passed). :type force: bool :returns: The modified resource document. """ return self._setAccess(doc, user['_id'], 'users', level, save, flags, currentUser, force)
[docs] def hasAccessFlags(self, doc, user=None, flags=None): """ Test whether a specific user has a given set of access flags on the given resource. Returns True only if the user has all of the flags by virtue of either group membership, public flags, or explicit access granted to the user. :param doc: The resource to test access on. :type doc: dict :param user: The user to check against. :type user: dict or None :param flags: A flag or set of flags to test. """ if user and user['admin']: # Short-circuit the case of admins return True if not flags: # Special case if no flags are passed return True if not isinstance(flags, (list, tuple, set)): flags = {flags} if not isinstance(flags, set): flags = set(flags) # Remove any publicly allowed flags from the required set requiredFlags = flags - set(doc.get('publicFlags', ())) if requiredFlags and user is None: return False # Check remaining required flags against user's permissions perms = doc.get('access', {}) for flag in requiredFlags: if (not self._hasGroupAccessFlag( perms.get('groups', ()), user.get('groups', ()), flag) and not self._hasUserAccessFlag( perms.get('users', ()), user['_id'], flag)): return False return True
[docs] def hasAccess(self, doc, user=None, level=AccessType.READ): """ This method looks through the object's permission set and determines whether the user has the given permission level on the object. :param doc: The document to check permission on. :type doc: dict :param user: The user to check against. :type user: dict :param level: The access level. :type level: AccessType :returns: Whether the access is granted. """ if level <= AccessType.READ and doc.get('public', False) is True: # Short-circuit the case of public resources return True elif user is None: # Anonymous users can only see public resources return False if user['admin']: # Short-circuit the case of admins return True # If all that fails, descend into real permission checking. if 'access' in doc: perms = doc['access'] if self._hasGroupAccess(perms.get('groups', []), user.get('groups', []), level): return True elif self._hasUserAccess(perms.get('users', []), user['_id'], level): return True return False
[docs] def requireAccess(self, doc, user=None, level=AccessType.READ): """ This wrapper just provides a standard way of throwing an access denied exception if the access check fails. """ if not self.hasAccess(doc, user, level): if level == AccessType.READ: perm = 'Read' elif level == AccessType.WRITE: perm = 'Write' elif level in (AccessType.ADMIN, AccessType.SITE_ADMIN): perm = 'Admin' else: perm = 'Unknown level' if user: userid = str(user.get('_id', '')) else: userid = None raise AccessException('%s access denied for %s %s (user %s).' % (perm, self.name, doc.get('_id', 'unknown'), userid))
[docs] def requireAccessFlags(self, doc, user=None, flags=None): """ Provides a standard way of throwing an access exception if a flag access check fails. """ if not self.hasAccessFlags(doc, user, flags): if user: uid = str(user.get('_id', '')) else: uid = None raise AccessException('Access denied for %s %s (user %s).' % (self.name, doc.get('_id', 'unknown'), uid))
[docs] def load(self, id, level=AccessType.ADMIN, user=None, objectId=True, force=False, fields=None, exc=False): """ Override of Model.load to also do permission checking. :param id: The id of the resource. :type id: str or ObjectId :param level: The required access type for the object. :type level: AccessType :param user: The user to check access against. :type user: dict or None :param objectId: Whether the id should be coerced to ObjectId type. :type objectId: bool :param force: If you explicitly want to circumvent access checking on this resource, set this to True. :type force: bool :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. :type fields: list or dict :param exc: If not found, throw a ValidationException instead of returning None. :type exc: bool :raises ValidationException: If an invalid ObjectId is passed. :returns: The matching document, or None if no match exists. """ # Warn of str type deprecation for `fields` param if isinstance(fields, six.string_types): logger.warning('String data type for fields param is deprecated, \ use a list or dict instead.') fields = [fields] # Ensure we include access and public, they are needed by requireAccess loadFields = fields if not force: extraFields = {'access', 'public'} loadFields = self._supplementFields(fields, extraFields) doc = Model.load(self, id=id, objectId=objectId, fields=loadFields, exc=exc) if not force and doc is not None: self.requireAccess(doc, user, level) self._removeSupplementalFields(doc, fields) return doc
[docs] def list(self, user=None, limit=0, offset=0, sort=None): """ Return a list of documents that are visible to a user. :param user: The user to filter for :type user: dict or None :param limit: Maximum number of documents to return :type limit: int :param offset: The offset into the results :type offset: int :param sort: The sort order :type sort: List of (key, order) tuples """ return self.findWithPermissions( {}, sort=sort, user=user, level=AccessType.READ, limit=limit, offset=offset)
[docs] def copyAccessPolicies(self, src, dest, save=False): """ Copies the set of access control policies from one document to another. :param src: The source document to copy policies from. :type src: dict :param dest: The destination document to copy policies onto. :type dest: dict :param save: Whether to save the destination document after copying. :type save: bool :returns: The modified destination document. """ dest['public'] = src.get('public', False) if 'access' in src: dest['access'] = copy.deepcopy(src['access']) if save: dest = self.save(dest) return dest
[docs] def filterResultsByPermission(self, cursor, user, level, limit=0, offset=0, removeKeys=(), flags=None): """ Given a database result cursor, this generator will yield only the results that the user has the given level of access and specified access flags on, respecting the limit and offset specified. :param cursor: The database cursor object from "find()". :param user: The user to check policies against. :type user: dict or None :param level: The access level. :type level: AccessType :param limit: Maximum number of documents to return :type limit: int :param offset: The offset into the results :type offset: int :param removeKeys: List of keys that should be removed from each matching document. :type removeKeys: `list` :param flags: A flag or set of flags to test. :type flags: flag identifier, or a list/set/tuple of them """ if flags: def hasAccess(doc): return (self.hasAccess(doc, user=user, level=level) and self.hasAccessFlags(doc, user=user, flags=flags)) else: hasAccess = functools.partial(self.hasAccess, user=user, level=level) endIndex = offset + limit if limit else None filteredCursor = six.moves.filter(hasAccess, cursor) for result in itertools.islice(filteredCursor, offset, endIndex): for key in removeKeys: if key in result: del result[key] yield result
[docs] def textSearch(self, query, user=None, filters=None, limit=0, offset=0, sort=None, fields=None, level=AccessType.READ): """ Custom override of Model.textSearch to also force permission-based filtering. The parameters are the same as Model.textSearch. :param query: The text query. Will be stemmed internally. :type query: str :param user: The user to apply permission filtering for. :type user: dict or None :param filters: Any additional query operators to apply. :type filters: dict :param limit: Maximum number of documents to return :type limit: int :param offset: The offset into the results :type offset: int :param sort: The sort order :type sort: List of (key, order) tuples :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param level: The access level to require. :type level: girder.constants.AccessType """ filters, fields = self._textSearchFilters(query, filters, fields) cursor = self.findWithPermissions( filters, offset=offset, limit=limit, sort=sort, fields=fields, user=user, level=level) # Sort by meta text score, but only if result count is below a certain # threshold. The text score is not a real index, so we cannot always # sort by it if there is a high number of matching documents. if sort is None and cursor.count() < TEXT_SCORE_SORT_MAX: cursor.sort([('_textScore', {'$meta': 'textScore'})]) return cursor
[docs] def prefixSearch(self, query, user=None, filters=None, limit=0, offset=0, sort=None, fields=None, level=AccessType.READ, prefixSearchFields=None): """ Custom override of Model.prefixSearch to also force permission-based filtering. The parameters are the same as Model.prefixSearch. :param query: The prefix string to look for :type query: str :param user: The user to apply permission filtering for. :type user: dict or None :param filters: Any additional query operators to apply. :type filters: dict :param limit: Maximum number of documents to return :type limit: int :param offset: The offset into the results :type offset: int :param sort: The sort order. :type sort: List of (key, order) tuples. :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param level: The access level to require. :type level: girder.constants.AccessType :param prefixSearchFields: To override the model's prefixSearchFields attribute for this invocation, pass an alternate iterable. :returns: A pymongo cursor. It is left to the caller to build the results from the cursor. """ filters = self._prefixSearchFilters(query, filters, prefixSearchFields) return self.findWithPermissions( filters, offset=offset, limit=limit, sort=sort, fields=fields, user=user, level=level)
def permissionClauses(self, user=None, level=None, prefix=''): return _permissionClauses(user, level, prefix)
[docs] def findWithPermissions(self, query=None, offset=0, limit=0, timeout=None, fields=None, sort=None, user=None, level=AccessType.READ, **kwargs): """ Search the collection by a set of parameters, only returning results that the combined user and level have permission to access. Passes any extra kwargs through to the underlying pymongo.collection.find function. :param query: The search query (see general MongoDB docs for "find()") :type query: dict :param offset: The offset into the results :type offset: int :param limit: Maximum number of documents to return :type limit: int :param timeout: Cursor timeout in ms. Default is no timeout. :type timeout: int :param fields: A mask for filtering result documents by key, or None to return the full document, passed to MongoDB find() as the `projection` param. This is a string or iterable of strings to be included from the document, or dict for an inclusion or exclusion projection`. :type fields: `str, list, set, or tuple` :param sort: The sort order. :type sort: List of (key, order) tuples. :param user: The user to check policies against. :type user: dict or None :param level: The access level. Explicitly passing None skips doing permissions checks. :type level: AccessType :returns: A pymongo Cursor or CommandCursor. If a CommandCursor, it has been augmented with a count function. """ if level is not None and (not user or not user['admin']): query = {'$and': [query or {}, self.permissionClauses(user, level)]} return self.find( query=query, offset=offset, limit=limit, timeout=timeout, fields=fields, sort=sort, **kwargs)