import copy
import functools
import itertools
import os
import pymongo
import re
from bson.objectid import ObjectId
from bson.errors import InvalidId
from pymongo.errors import WriteError
from girder import events, logprint, logger, auditLogger
from girder.constants import AccessType, CoreEventHandler, ACCESS_FLAGS, TEXT_SCORE_SORT_MAX
from girder.models import getDbConnection
from girder.exceptions import AccessException, ValidationException
# pymongo3 complains about extra kwargs to find(), so we must filter them.
_allowedFindArgs = ('cursor_type', 'allow_partial_results', 'oplog_replay',
'modifiers', 'manipulate')
# This list is only used for testing, where we must reconnect() all models after
# the database is dropped between each test case. If we find a cleverer way to do
# that, we don't need to store these here.
_modelSingletons = []
if 'GIRDER_MAX_CURSOR_TIMEOUT_MS' in os.environ:
_MAX_CURSOR_TIMEOUT_MS = int(os.environ['GIRDER_MAX_CURSOR_TIMEOUT_MS'])
else:
_MAX_CURSOR_TIMEOUT_MS = None
def _permissionClauses(user=None, level=None, prefix=''):
"""
Given a user and access level, return a list of clauses that can be used as
part of a Mongo find query or aggregate match step.
:param user: The user to check policies against.
:type user: dict or None
:param level: The access level. Explicitly passing None skips doing
permissions checks.
:type level: AccessType
:param prefix: an optional string to prepend to the keys used in the
clauses.
:type prefix: str
:returns: A query dictionary with an '$or' entry which consists of a list
of match clauses, any one of which implies validation.
"""
permissionClauses = []
if level is None or (user and user['admin']):
# Without a level or with an admin user, match everything.
return {}
if level <= AccessType.READ:
permissionClauses.append({prefix + 'public': True})
elif not user:
# If we have no user and asked for higher than read access, make a
# query that will fail
return {'__matchnothing': 'nothing'}
if user and not user['admin']:
permissionClauses.extend([
{prefix + 'access.users': {'$elemMatch': {
'id': user['_id'],
'level': {'$gte': level}}}},
{prefix + 'access.groups': {'$elemMatch': {
'id': {'$in': user.get('groups', [])},
'level': {'$gte': level}}}},
])
return {'$or': permissionClauses}
class _ModelSingleton(type):
def __init__(cls, name, bases, dict):
super().__init__(name, bases, dict)
cls._instance = None
def __call__(cls, *args, **kwargs):
if cls._instance is None:
cls._instance = super().__call__(*args, **kwargs)
_modelSingletons.append(cls._instance)
# It is not safe to ever set cls._instance back to None in an attempt to force singleton
# recreation, since some models have event bindings that will not be destroyed (so the
# old singletons will still have instance-bound methods that are event-bound to and fire
# on model-related events)
return cls._instance
[docs]class Model(metaclass=_ModelSingleton):
"""
Model base class. Models are responsible for abstracting away the
persistence layer. Each collection in the database should have its own
model. Methods that deal with database interaction belong in the
model layer.
"""
def __init__(self):
self.name = None
self._indices = []
self._connected = False
self._textIndex = None
self._textLanguage = None
self.prefixSearchFields = ('lowerName', 'name')
self._filterKeys = {
AccessType.READ: set(),
AccessType.WRITE: set(),
AccessType.ADMIN: set(),
AccessType.SITE_ADMIN: set()
}
self.initialize()
self.reconnect()
[docs] def reconnect(self):
"""
Reconnect to the database and rebuild indices if necessary. Users should
typically not have to call this method.
"""
db_connection = getDbConnection()
self._dbserver_version = tuple(db_connection.server_info()['versionArray'])
self.database = db_connection.get_database()
self.collection = self.database[self.name]
for index in self._indices:
self._createIndex(index)
if isinstance(self._textIndex, dict):
textIdx = [(k, 'text') for k in self._textIndex.keys()]
try:
self.collection.create_index(
textIdx, weights=self._textIndex,
default_language=self._textLanguage)
except pymongo.errors.OperationFailure:
logprint.warning('WARNING: Text search not enabled.')
self._connected = True
[docs] def exposeFields(self, level, fields):
"""
Expose model fields to users with the given access level. Subclasses
should call this in their initialize method to declare what fields
should be exposed to what access levels if they are using the default
filter implementation in this class. Since filtered fields are sets,
this method is idempotent.
:param level: The required access level for the field.
:type level: AccessType
:param fields: A field or list of fields to expose for that level.
:type fields: `str, list, set, or tuple`
"""
if isinstance(fields, str):
fields = (fields, )
self._filterKeys[level].update(fields)
[docs] def hideFields(self, level, fields):
"""
Hide a field, i.e. make sure it is not exposed via the default
filtering method. Since the filter uses a white list, it is only ever
necessary to call this for fields that were added previously with
exposeFields().
:param level: The access level to remove the fields from.
:type level: AccessType
:param fields: The field or fields to remove from the white list.
:type fields: `str, list, set, or tuple`
"""
if isinstance(fields, str):
fields = (fields, )
self._filterKeys[level].difference_update(fields)
[docs] def filter(self, doc, user=None, additionalKeys=None):
"""
Filter this model for the given user. This is a default implementation
that assumes this model has no notion of access control, and simply
allows all keys under READ access level, and conditionally allows any
keys assigned to SITE_ADMIN level.
:param doc: The document of this model type to be filtered.
:type doc: dict or None
:param user: The current user for whom we are filtering.
:type user: dict or None
:param additionalKeys: Any additional keys that should be included in
the document for this call only.
:type additionalKeys: `list, tuple, set, or None`
:returns: The filtered document (dict).
"""
if doc is None:
return None
keys = set(self._filterKeys[AccessType.READ])
if user and user['admin']:
keys.update(self._filterKeys[AccessType.SITE_ADMIN])
if additionalKeys:
keys.update(additionalKeys)
return self.filterDocument(doc, allow=keys)
def _createIndex(self, index):
if isinstance(index, (list, tuple)):
try:
self.collection.create_index(index[0], **index[1])
except pymongo.errors.OperationFailure:
self.collection.drop_index(index[0])
self.collection.create_index(index[0], **index[1])
else:
self.collection.create_index(index)
[docs] def ensureTextIndex(self, index, language='english'):
"""
Call this during initialize() of the subclass if you want your
model to have a full-text searchable index. Each collection may
have zero or one full-text index.
:param language: The default_language value for the text index,
which is used for stemming and stop words. If the text index
should not use stemming and stop words, set this param to 'none'.
:type language: str
"""
self._textIndex = index
self._textLanguage = language
[docs] def ensureIndices(self, indices):
"""
Subclasses should call this with a list of strings representing
fields that should be indexed in the database if there are any.
Otherwise, it is not necessary to call this method. Elements of the list
may also be a list or tuple, where the second element is a dictionary
that will be passed as kwargs to the pymongo create_index call.
"""
self._indices.extend(indices)
if self._connected:
for index in indices:
self._createIndex(index)
[docs] def ensureIndex(self, index):
"""
Like ensureIndices, but declares just a single index rather than a list
of them.
"""
self._indices.append(index)
if self._connected:
self._createIndex(index)
[docs] def validate(self, doc):
"""
Models should implement this to validate the document before it enters
the database. It must return the document with any necessary filters
applied, or throw a ValidationException if validation of the document
fails.
:param doc: The document to validate before saving to the collection.
:type doc: dict
"""
raise NotImplementedError('Must override validate() in %s model.'
% self.__class__.__name__)
[docs] def validateKeys(self, keys):
"""
Validate a set of keys to make sure they are able to be used in the
database. This enforces MongoDB rules about key names.
@TODO Add recurse=True argument if ``keys`` is a dict.
:param keys: An iterable of keys to validate.
:type keys: iterable
:raises: ValidationException
"""
for k in keys:
if not k:
raise ValidationException('Key names must not be empty.')
if '.' in k:
raise ValidationException(
'Invalid key %s: keys must not contain the "." character.' % k)
if k[0] == '$':
raise ValidationException(
'Invalid key %s: keys must not start with the "$" character.' % k)
[docs] def initialize(self):
"""
Subclasses should override this and set the name of the collection as
self.name. Also, they should set any indexed fields that they require.
"""
raise NotImplementedError('Must override initialize() in %s model'
% self.__class__.__name__)
[docs] def find(self, query=None, offset=0, limit=0, timeout=None,
fields=None, sort=None, **kwargs):
"""
Search the collection by a set of parameters. Passes any extra kwargs
through to the underlying pymongo.collection.find function.
:param query: The search query (see general MongoDB docs for "find()")
:type query: dict
:param offset: The offset into the results
:type offset: int
:param limit: Maximum number of documents to return
:type limit: int
:param timeout: Cursor timeout in ms. Default is no timeout.
:type timeout: int
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:returns: A pymongo database cursor.
"""
query = query or {}
kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs}
timeout = timeout or _MAX_CURSOR_TIMEOUT_MS
cursor = self.collection.find(
filter=query, skip=offset, limit=limit, projection=fields,
no_cursor_timeout=timeout is None, sort=sort, **kwargs)
if timeout:
cursor.max_time_ms(timeout)
return cursor
[docs] def findOne(self, query=None, fields=None, sort=None, **kwargs):
"""
Search the collection by a set of parameters. Passes any kwargs
through to the underlying pymongo.collection.find_one function.
:param query: The search query (see general MongoDB docs for "find()")
:type query: dict
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:returns: the first object that was found, or None if none found.
"""
query = query or {}
kwargs = {k: kwargs[k] for k in kwargs if k in _allowedFindArgs}
return self.collection.find_one(query, projection=fields, sort=sort, **kwargs)
def _textSearchFilters(self, query, filters=None, fields=None):
"""
Return a set of filters and fields used in the text search.
:param query: The text query. Will be stemmed internally.
:type query: str
:param filters: Any additional query operators to apply.
:type filters: dict
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:returns: (filters, fields) to be passed to the query.
"""
filters = filters or {}
fields = fields or {}
fields['_textScore'] = {'$meta': 'textScore'}
filters['$text'] = {'$search': query}
return filters, fields
[docs] def textSearch(self, query, offset=0, limit=0, sort=None, fields=None,
filters=None, **kwargs):
"""
Perform a full-text search against the text index for this collection.
:param query: The text query. Will be stemmed internally.
:type query: str
:param offset: The offset into the results
:type offset: int
:param limit: Maximum number of documents to return
:type limit: int
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param filters: Any additional query operators to apply.
:type filters: dict
:returns: A pymongo cursor. It is left to the caller to build the
results from the cursor.
"""
filters, fields = self._textSearchFilters(query, filters, fields)
cursor = self.find(filters, offset=offset, limit=limit,
sort=sort, fields=fields)
# Sort by meta text score, but only if result count is below a certain
# threshold. The text score is not a real index, so we cannot always
# sort by it if there is a high number of matching documents.
if sort is None and cursor.count() < TEXT_SCORE_SORT_MAX:
cursor.sort([('_textScore', {'$meta': 'textScore'})])
return cursor
def _prefixSearchFilters(self, query, filters=None, prefixSearchFields=None):
"""
Return a set of filters and fields used in the text search.
:param query: The text query. Will be stemmed internally.
:type query: str
:param filters: Any additional query operators to apply.
:type filters: dict
:param prefixSearchFields: To override the model's prefixSearchFields
attribute for this invocation, pass an alternate iterable.
:returns: filters to be passed to the query.
"""
filters = filters or {}
filters['$or'] = filters.get('$or', [])
for field in (prefixSearchFields or self.prefixSearchFields):
if isinstance(field, (list, tuple)):
filters['$or'].append({
field[0]: {
'$regex': '^%s' % re.escape(query),
'$options': field[1]
}
})
else:
filters['$or'].append({
field: {'$regex': '^%s' % re.escape(query)}
})
return filters
[docs] def prefixSearch(self, query, offset=0, limit=0, sort=None, fields=None,
filters=None, prefixSearchFields=None, **kwargs):
"""
Search for documents in this model's collection by a prefix string.
The fields that will be searched based on this prefix must be set as
the ``prefixSearchFields`` attribute of this model, which must be an
iterable. Elements of this iterable must be either a string representing
the field name, or a 2-tuple in which the first element is the field
name, and the second element is a string representing the regex search
options.
:param query: The prefix string to look for
:type query: str
:param offset: The offset into the results
:type offset: int
:param limit: Maximum number of documents to return
:type limit: int
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param filters: Any additional query operators to apply.
:type filters: dict
:param prefixSearchFields: To override the model's prefixSearchFields
attribute for this invocation, pass an alternate iterable.
:returns: A pymongo cursor. It is left to the caller to build the
results from the cursor.
"""
filters = self._prefixSearchFilters(query, filters, prefixSearchFields)
return self.find(
filters, offset=offset, limit=limit, sort=sort, fields=fields)
[docs] def save(self, document, validate=True, triggerEvents=True):
"""
Create or update a document in the collection. This triggers two
events; one prior to validation, and one prior to saving. Either of
these events may have their default action prevented.
:param document: The document to save.
:type document: dict
:param validate: Whether to call the model's validate() before saving.
:type validate: bool
:param triggerEvents: Whether to trigger events for validate and
pre- and post-save hooks.
"""
if validate and triggerEvents:
event = events.trigger('.'.join(('model', self.name, 'validate')),
document)
if event.defaultPrevented:
validate = False
if validate:
document = self.validate(document)
if triggerEvents:
event = events.trigger('model.%s.save' % self.name, document)
if event.defaultPrevented:
return document
isNew = '_id' not in document
try:
if isNew:
document['_id'] = \
self.collection.insert_one(document).inserted_id
else:
self.collection.replace_one(
{'_id': document['_id']}, document, True)
except WriteError as e:
raise ValidationException('Database save failed: %s' % e.details)
if triggerEvents:
if isNew:
auditLogger.info('document.create', extra={
'details': {
'collection': self.name,
'id': document['_id']
}
})
events.trigger('model.%s.save.created' % self.name, document)
events.trigger('model.%s.save.after' % self.name, document)
return document
[docs] def update(self, query, update, multi=True):
"""
This method should be used for updating multiple documents in the
collection. This is useful for things like removing all references in
this collection to a document that is being deleted from another
collection.
For updating a single document, use the save() model method instead.
:param query: The search query for documents to update,
see general MongoDB docs for "find()"
:type query: dict
:param update: The update specifier.
:type update: dict
:param multi: Whether to update a single document, or all matching
documents.
:type multi: bool
:returns: A pymongo UpdateResult object.
"""
if multi:
return self.collection.update_many(query, update)
else:
return self.collection.update_one(query, update)
[docs] def increment(self, query, field, amount, **kwargs):
"""
This is a specialization of the update method that atomically increments
a field by a given amount. Additional kwargs are passed directly through
to update.
:param query: The search query for documents to update,
see general MongoDB docs for "find()"
:type query: dict
:param field: The name of the field in the document to increment.
:type field: str
:param amount: The amount to increment the field by.
:type amount: int or float
"""
self.update(query=query, update={
'$inc': {field: amount}
}, **kwargs)
[docs] def remove(self, document, **kwargs):
"""
Delete an object from the collection; must have its _id set.
:param document: the item to remove.
"""
assert '_id' in document
event = events.trigger('.'.join(('model', self.name, 'remove')),
document)
kwargsEvent = events.trigger(
'.'.join(('model', self.name, 'remove_with_kwargs')), {
'document': document,
'kwargs': kwargs
})
if not event.defaultPrevented and not kwargsEvent.defaultPrevented:
return self.collection.delete_one({'_id': document['_id']})
[docs] def removeWithQuery(self, query):
"""
Remove all documents matching a given query from the collection.
For safety reasons, you may not pass an empty query.
:param query: The search query for documents to delete,
see general MongoDB docs for "find()"
:type query: dict
"""
assert query
return self.collection.delete_many(query)
[docs] def load(self, id, objectId=True, fields=None, exc=False):
"""
Fetch a single object from the database using its _id field.
:param id: The value for searching the _id field.
:type id: string or ObjectId
:param objectId: Whether the id should be coerced to ObjectId type.
:type objectId: bool
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param exc: Whether to raise a ValidationException if there is no
document with the given id.
:type exc: bool
:returns: The matching document, or None.
"""
if not id:
raise ValidationException('Attempt to load null ObjectId: %s' % id)
if objectId and not isinstance(id, ObjectId):
try:
id = ObjectId(id)
except InvalidId:
raise ValidationException('Invalid ObjectId: %s' % id,
field='id')
doc = self.findOne({'_id': id}, fields=fields)
if doc is None and exc is True:
raise ValidationException('No such %s: %s' % (self.name, id),
field='id')
return doc
[docs] def filterDocument(self, doc, allow=None):
"""
This method will filter the given document to make it suitable to
output to the user.
:param doc: The document to filter.
:type doc: dict
:param allow: The whitelist of fields to allow in the output document.
:type allow: List of strings
"""
if not allow:
allow = []
if doc is None:
return None
out = {}
for field in allow:
if field in doc:
out[field] = doc[field]
if '_textScore' in doc:
out['_textScore'] = doc['_textScore']
out['_modelType'] = self.name
return out
[docs] def subtreeCount(self, doc):
"""
Return the size of the subtree rooted at the given document. In
general, if this contains items or folders, it will be the count of the
items and folders in all containers. If it does not, it will be 1.
This returns the absolute size of the subtree, it does not filter by
permissions.
:param doc: The root of the subtree.
:type doc: dict
"""
return 1
@staticmethod
def _isInclusionProjection(fields):
"""
Test whether a projection filter is an inclusion filter (whitelist) or exclusion
projection (blacklist) of fields, as defined by MongoDB find() method `projection` param.
:param fields: A mask for filtering result documents by key, or None to return the full
document, passed to MongoDB find() as the `projection` param.
:type fields: list or dict or None
"""
if fields is None:
return False
if not isinstance(fields, dict):
# If this is a list/tuple/set, that means inclusion
return True
for k, v in fields.items():
if k != '_id':
# We are only allowed either inclusion or exclusion keys in a dict, there can be no
# mixing of these, with the only exception being that the `_id` key can be set as
# an exclusion field in a dict that otherwise holds inclusion fields.
return v
# Empty dict or just _id field
return fields.get('_id', True)
@staticmethod
def _supplementFields(fields, overwrite):
"""
Overwrite the projection filter to either include (in the case of an inclusion filter) or
not exclude (in the case of an exclusion filter) the contents of overwrite.
:param fields: A mask for filtering result documents by key, or None to return the full
document, passed to MongoDB find() as the `projection` param.
:type fields: list or dict or None
:param overwrite: Additional document key(s) to be included or not excluded in fields.
:type overwrite: set
:returns: A copy of fields with the relevant overwrite changes.
"""
if fields is None:
return fields
if Model._isInclusionProjection(fields):
if not isinstance(fields, dict):
# Inclusion projection (str, list, or tuple)
copy = list(set(fields) | overwrite)
else:
# Inclusion projection (dict)
copy = dict(fields)
copy.update(dict.fromkeys(overwrite, True))
else:
# Exclusion projection (dict)
copy = dict(fields)
for entry in overwrite:
copy.pop(entry, None)
return copy
@staticmethod
def _removeSupplementalFields(doc, fields):
"""
Edit the document to be consistent with what the user originally requested, undoing what may
have been overwritten by _supplementFields().
:param doc: A document returned by MongoDB find()
:type doc: dict
:param fields: The original mask for filtering result documents by key, as specified by the
user to be passed to MongoDB find() as the `projection` param.
:type fields: list or dict or None
"""
if fields is None:
return
whitelist = []
if isinstance(fields, dict):
for k, v in fields.items():
if not v:
doc.pop(k, None)
else:
whitelist.append(k)
if whitelist:
for k in list(doc.keys()):
if k not in whitelist and k != '_id':
del doc[k]
else:
for k in list(doc.keys()):
if k not in fields and k != '_id':
del doc[k]
[docs]class AccessControlledModel(Model):
"""
Any model that has access control requirements should inherit from
this class. It enforces permission checking in the load() method
and provides convenient methods for testing and requiring user permissions.
It also provides methods for setting access control policies on the
resource.
"""
def __init__(self):
# Do the bindings before calling __init__(), in case a derived class
# wants to change things in initialize()
events.bind('model.user.remove',
'.'.join((CoreEventHandler.ACCESS_CONTROL_CLEANUP, self.__class__.__name__)),
self._cleanupDeletedEntity)
events.bind('model.group.remove',
'.'.join((CoreEventHandler.ACCESS_CONTROL_CLEANUP, self.__class__.__name__)),
self._cleanupDeletedEntity)
super().__init__()
def _cleanupDeletedEntity(self, event):
"""
This callback removes references to deleted users or groups from all
concrete AccessControlledModel subtypes.
This generally should not be called or overridden directly. This should
not be unregistered, that would allow references to non-existent users
and groups to remain.
"""
entityType = event.name.split('.')[1]
entityDoc = event.info
if entityType == self.name:
# Avoid circular callbacks, since Users and Groups are themselves
# AccessControlledModels
return
if entityType == 'user':
# Remove creator references for this user entity.
creatorQuery = {
'creatorId': entityDoc['_id']
}
creatorUpdate = {
'$set': {'creatorId': None}
}
# If a given access-controlled resource doesn't store creatorId,
# this will simply do nothing
self.update(creatorQuery, creatorUpdate)
# Remove references to this entity from access-controlled resources.
acQuery = {
'access.%ss.id' % entityType: entityDoc['_id']
}
acUpdate = {
'$pull': {
'access.%ss' % entityType: {'id': entityDoc['_id']}
}
}
self.update(acQuery, acUpdate)
[docs] def filter(self, doc, user, additionalKeys=None):
"""
Filter this model for the given user according to the user's access
level. Also adds the special _accessLevel field to the document to
indicate the user's highest access level. This filters a single document
that the user has at least read access to. For filtering a set of
documents, see filterResultsByPermission().
:param doc: The document of this model type to be filtered.
:type doc: dict or None
:param user: The current user for whom we are filtering.
:type user: dict or None
:param additionalKeys: Any additional keys that should be included in
the document for this call only.
:type additionalKeys: `list, tuple, or None`
:returns: The filtered document (dict).
"""
if doc is None:
return None
keys = set(self._filterKeys[AccessType.READ])
level = self.getAccessLevel(doc, user)
if level >= AccessType.WRITE:
keys.update(self._filterKeys[AccessType.WRITE])
if level >= AccessType.ADMIN:
keys.update(self._filterKeys[AccessType.ADMIN])
if user['admin']:
keys.update(self._filterKeys[AccessType.SITE_ADMIN])
if additionalKeys:
keys.update(additionalKeys)
filtered = self.filterDocument(doc, allow=keys)
filtered['_accessLevel'] = level
return filtered
def _hasGroupAccessFlag(self, perms, groupIds, flag):
"""
Helper to test whether a user has a specific access flag via membership in a group.
:param perms: The group access list (stored under doc['access']['groups'])
:type perms: `list`
:param groupIds: The list of groups that the user belongs to.
:type groupIds: `list`
:param flag: The access flag identifier to test.
:type flag: str
"""
for groupAccess in perms:
if groupAccess['id'] in groupIds and flag in groupAccess.get('flags', []):
return True
return False
def _hasUserAccessFlag(self, perms, userId, flag):
"""
Helper to test whether a user has been granted an access flag directly
on a resource.
:param perms: The user access list (stored under doc['access']['users'])
:type perms: `list`
:param userId: The user ID to test.
:type userId: ObjectId
:param flag: The access flag identifier to test.
:type flag: str
"""
for userAccess in perms:
if userAccess['id'] == userId and flag in userAccess.get('flags', []):
return True
return False
def _hasGroupAccess(self, perms, groupIds, level):
"""
Private helper method for checking group access.
"""
for groupAccess in perms:
if groupAccess['id'] in groupIds and groupAccess['level'] >= level:
return True
return False
def _hasUserAccess(self, perms, userId, level):
"""
Private helper method for checking user-specific access.
"""
for userAccess in perms:
if userAccess['id'] == userId and userAccess['level'] >= level:
return True
return False
def _setAccess(self, doc, id, entity, level, save, flags=None, user=None, force=False):
"""
Private helper for setting access on a resource.
"""
if not isinstance(id, ObjectId):
id = ObjectId(id)
if 'access' not in doc:
doc['access'] = {'groups': [], 'users': []}
if entity not in doc['access']:
doc['access'][entity] = []
key = 'access.' + entity
update = {}
# Add in the new level for this entity unless we are removing access.
if level is not None:
entry = {
'id': id,
'level': level,
'flags': flags
}
entry['flags'] = self._validateFlags(doc, user, entity, entry, force)
# because we're iterating this operation is not necessarily atomic
for index, perm in enumerate(doc['access'][entity]):
if perm['id'] == id:
# if the id already exists we want to update with a $set
doc['access'][entity][index] = entry
update['$set'] = {'%s.%s' % (key, index): entry}
break
else:
doc['access'][entity].append(entry)
update['$push'] = {key: entry}
# set remove query
else:
update['$pull'] = {key: {'id': id}}
for perm in doc['access'][entity]:
if perm['id'] == id:
doc['access'][entity].remove(perm)
if save:
doc = self._saveAcl(doc, update)
return doc
def _saveAcl(self, doc, update):
if '_id' not in doc:
return self.save(doc)
# copy all other (potentially updated) fields to the update list,
# and trigger normal save events
if '$set' in update:
for propKey in doc:
if propKey != 'access':
update['$set'][propKey] = doc[propKey]
else:
update['$set'] = {k: v for k, v in doc.items()
if k != 'access'}
event = events.trigger('model.%s.save' % self.name, doc)
if not event.defaultPrevented:
doc = self.collection.find_one_and_update(
{'_id': ObjectId(doc['_id'])}, update,
return_document=pymongo.ReturnDocument.AFTER)
events.trigger('model.%s.save.after' % self.name, doc)
return doc
[docs] def setPublic(self, doc, public, save=False):
"""
Set the flag for public read access on the object.
:param doc: The document to update permissions on.
:type doc: dict
:param public: Flag for public read access.
:type public: bool
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the
document for performance reasons.
:type save: bool
:returns: The updated resource document.
"""
assert isinstance(public, bool)
doc['public'] = public
if save:
doc = self.save(doc)
return doc
[docs] def setPublicFlags(self, doc, flags, user=None, append=False, save=False, force=False):
"""
Set access flags that are granted on this resource to anonymous users.
This means any user, whether anonymous or logged in, will receive all
of the specified permissions. This also validates that the user attempting
to set the flags has permission to do so. Any flags that are invalid or that
the user is not authorized to enable will be discarded from the list.
:param doc: The document to update access flags on.
:type doc: dict
:param flags: Flags or set of flags to add.
:type flags: flag identifier, or a list/set/tuple of them
:param user: The user performing this action.
:type user: dict
:param append: Whether to append to the list or replace it.
:type append: bool
:param save: Whether to save the document to the database afterward.
:type save: bool
:param force: Set this to True to set the flags regardless of the passed in
user's permissions.
:type force: bool
"""
currentFlags = doc.get('publicFlags', [])
if not isinstance(flags, (list, tuple, set)):
flags = {flags}
if append:
flags = currentFlags + list(flags)
flags = set(flags) & set(ACCESS_FLAGS.keys())
if force or user['admin']:
doc['publicFlags'] = list(flags)
else:
allowedFlags = []
for flag in flags:
info = ACCESS_FLAGS[flag]
# If this is an admin-only flag, we only allow it if it's already enabled.
if not info['admin'] or (info['admin'] and flag in currentFlags):
allowedFlags.append(flag)
doc['publicFlags'] = allowedFlags
if save:
doc = self.save(doc)
return doc
def _isFlagEnabled(self, doc, type, entry, flag):
"""
Check whether a specific flag is enabled for a specific ACL entry in the document.
"""
id = entry['id']
perms = doc.get('access', {})
if type == 'group':
return self._hasGroupAccessFlag(perms.get('groups', ()), [id], flag)
else: # 'user'
return self._hasUserAccessFlag(perms.get('users', ()), id, flag)
def _validateFlags(self, doc, user, type, entry, force=False):
"""
Coerces a flag or set/list/tuple of flags into a valid form, returning a list
that only contains the valid flags that the passed in user has permission to set.
"""
flags = entry.get('flags', [])
if not isinstance(flags, (list, tuple, set)):
flags = {flags}
flags = set(flags) & set(ACCESS_FLAGS.keys())
if force or (user and user['admin']):
return list(flags)
allowedFlags = []
for flag in flags:
info = ACCESS_FLAGS[flag]
# If this is an admin-only flag, we only allow it if it's already enabled
# for this specific group or user rule
if info['admin'] and self._isFlagEnabled(doc, type, entry, flag):
allowedFlags.append(flag)
elif not info['admin']:
allowedFlags.append(flag)
return allowedFlags
[docs] def setAccessList(self, doc, access, save=False, user=None, force=False):
"""
Set the entire access control list to the given value. This also saves
the resource in its new state to the database.
:param doc: The resource to update.
:type doc: dict
:param access: The new access control list to set on the object.
:type access: dict
:param save: Whether to save after updating.
:type save: boolean
:param user: The user performing the update. This is used to control
updating of access flags that require admin permission to enable.
:type user: dict
:param force: Set this to True to set the flags regardless of the passed in
user's permissions.
:type force: bool
:returns: The updated resource.
"""
# First coerce the access list value into a valid form.
acList = {
'users': [],
'groups': []
}
allowedLevels = (AccessType.READ, AccessType.WRITE, AccessType.ADMIN)
for userAccess in access.get('users', []):
if 'id' in userAccess and 'level' in userAccess:
if not userAccess['level'] in allowedLevels:
raise ValidationException('Invalid access level', 'access')
acList['users'].append({
'id': ObjectId(userAccess['id']),
'level': userAccess['level'],
'flags': self._validateFlags(doc, user, 'user', userAccess, force)
})
else:
raise ValidationException('Invalid access list', 'access')
for groupAccess in access.get('groups', []):
if 'id' in groupAccess and 'level' in groupAccess:
if not groupAccess['level'] in allowedLevels:
raise ValidationException('Invalid access level', 'access')
acList['groups'].append({
'id': ObjectId(groupAccess['id']),
'level': groupAccess['level'],
'flags': self._validateFlags(doc, user, 'group', groupAccess, force)
})
else:
raise ValidationException('Invalid access list', 'access')
doc['access'] = acList
if save:
doc = self.save(doc)
return doc
[docs] def setGroupAccess(self, doc, group, level, save=False, flags=None, currentUser=None,
force=False):
"""
Set group-level access on the resource.
:param doc: The resource document to set access on.
:type doc: dict
:param group: The group to grant or remove access to.
:type group: dict
:param level: What level of access the group should have. Set to None
to remove all access for this group.
:type level: AccessType or None
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the
document for performance reasons.
:type save: bool
:param flags: List of access flags to grant to the group.
:type flags: specific flag identifier, or a list/tuple/set of them
:param currentUser: The user performing this action. Only required if attempting
to set admin-only flags on the resource.
:type currentUser: dict or None
:returns: The updated resource document.
:param force: Set this to True to set the flags regardless of the passed in
currentUser's permissions (only matters if flags are passed).
:type force: bool
"""
return self._setAccess(doc, group['_id'], 'groups', level, save, flags, currentUser, force)
[docs] def getAccessLevel(self, doc, user):
"""
Return the maximum access level for a given user on a given object.
This can be useful for alerting the user which set of actions they are
able to perform on the object in advance of trying to call them.
:param doc: The object to check access on.
:param user: The user to get the access level for.
:returns: The max AccessType available for the user on the object.
"""
if user is None:
if doc.get('public', False):
return AccessType.READ
else:
return AccessType.NONE
elif user['admin']:
return AccessType.ADMIN
else:
access = doc.get('access', {})
level = AccessType.NONE
for group in access.get('groups', []):
if group['id'] in user.get('groups', []):
level = max(level, group['level'])
if level == AccessType.ADMIN:
return level
for userAccess in access.get('users', []):
if userAccess['id'] == user['_id']:
level = max(level, userAccess['level'])
if level == AccessType.ADMIN:
return level
return level
[docs] def getFullAccessList(self, doc):
"""
Return an object representing the full access list on this document.
This simply includes the names of the users and groups with the ACL.
If the document contains references to users or groups that no longer
exist, they are simply removed from the ACL, and the modified ACL is
persisted at the end of this method if any removals occurred.
:param doc: The document whose ACL to return.
:type doc: dict
:returns: A dict containing `users` and `groups` keys.
"""
from .user import User
from .group import Group
acList = {
'users': doc.get('access', {}).get('users', []),
'groups': doc.get('access', {}).get('groups', [])
}
dirty = False
for user in acList['users'][:]:
userDoc = User().load(user['id'], force=True, fields=['firstName', 'lastName', 'login'])
if not userDoc:
dirty = True
acList['users'].remove(user)
continue
user['login'] = userDoc['login']
user['name'] = ' '.join((userDoc['firstName'], userDoc['lastName']))
for grp in acList['groups'][:]:
grpDoc = Group().load(grp['id'], force=True, fields=['name', 'description'])
if not grpDoc:
dirty = True
acList['groups'].remove(grp)
continue
grp['name'] = grpDoc['name']
grp['description'] = grpDoc['description']
if dirty:
# If we removed invalid entries from the ACL, persist the changes.
self.setAccessList(doc, acList, save=True)
return acList
[docs] def setUserAccess(self, doc, user, level, save=False, flags=None, currentUser=None,
force=False):
"""
Set user-level access on the resource.
:param doc: The resource document to set access on.
:type doc: dict
:param user: The user to grant or remove access to.
:type user: dict
:param level: What level of access the user should have. Set to None
to remove all access for this user.
:type level: AccessType or None
:param save: Whether to save the object to the database afterward.
Set this to False if you want to wait to save the document for performance reasons.
:type save: bool
:param flags: List of access flags to grant to the group.
:type flags: specific flag identifier, or a list/tuple/set of them
:param currentUser: The user performing this action. Only required if attempting
to set admin-only flags on the resource.
:param force: Set this to True to set the flags regardless of the passed in
currentUser's permissions (only matters if flags are passed).
:type force: bool
:returns: The modified resource document.
"""
return self._setAccess(doc, user['_id'], 'users', level, save, flags, currentUser, force)
[docs] def hasAccessFlags(self, doc, user=None, flags=None):
"""
Test whether a specific user has a given set of access flags on
the given resource. Returns True only if the user has all of the
flags by virtue of either group membership, public flags, or
explicit access granted to the user.
:param doc: The resource to test access on.
:type doc: dict
:param user: The user to check against.
:type user: dict or None
:param flags: A flag or set of flags to test.
"""
if user and user['admin']:
# Short-circuit the case of admins
return True
if not flags:
# Special case if no flags are passed
return True
if not isinstance(flags, (list, tuple, set)):
flags = {flags}
if not isinstance(flags, set):
flags = set(flags)
# Remove any publicly allowed flags from the required set
requiredFlags = flags - set(doc.get('publicFlags', ()))
if requiredFlags and user is None:
return False
# Check remaining required flags against user's permissions
perms = doc.get('access', {})
for flag in requiredFlags:
if (not self._hasGroupAccessFlag(perms.get('groups', ()), user.get('groups', ()), flag)
and not self._hasUserAccessFlag(perms.get('users', ()), user['_id'], flag)):
return False
return True
[docs] def hasAccess(self, doc, user=None, level=AccessType.READ):
"""
This method looks through the object's permission set and determines
whether the user has the given permission level on the object.
:param doc: The document to check permission on.
:type doc: dict
:param user: The user to check against.
:type user: dict
:param level: The access level.
:type level: AccessType
:returns: Whether the access is granted.
"""
if level <= AccessType.READ and doc.get('public', False) is True:
# Short-circuit the case of public resources
return True
elif user is None:
# Anonymous users can only see public resources
return False
if user['admin']:
# Short-circuit the case of admins
return True
# If all that fails, descend into real permission checking.
if 'access' in doc:
perms = doc['access']
if self._hasGroupAccess(perms.get('groups', []),
user.get('groups', []), level):
return True
elif self._hasUserAccess(perms.get('users', []),
user['_id'], level):
return True
return False
[docs] def requireAccess(self, doc, user=None, level=AccessType.READ):
"""
This wrapper just provides a standard way of throwing an
access denied exception if the access check fails.
"""
if not self.hasAccess(doc, user, level):
if level == AccessType.READ:
perm = 'Read'
elif level == AccessType.WRITE:
perm = 'Write'
elif level in (AccessType.ADMIN, AccessType.SITE_ADMIN):
perm = 'Admin'
else:
perm = 'Unknown level'
if user:
userid = str(user.get('_id', ''))
else:
userid = None
raise AccessException('%s access denied for %s %s (user %s).' %
(perm, self.name, doc.get('_id', 'unknown'), userid))
[docs] def requireAccessFlags(self, doc, user=None, flags=None):
"""
Provides a standard way of throwing an access exception if
a flag access check fails.
"""
if not self.hasAccessFlags(doc, user, flags):
if user:
uid = str(user.get('_id', ''))
else:
uid = None
raise AccessException('Access denied for %s %s (user %s).' %
(self.name, doc.get('_id', 'unknown'), uid))
[docs] def load(self, id, level=AccessType.ADMIN, user=None, objectId=True,
force=False, fields=None, exc=False):
"""
Override of Model.load to also do permission checking.
:param id: The id of the resource.
:type id: str or ObjectId
:param level: The required access type for the object.
:type level: AccessType
:param user: The user to check access against.
:type user: dict or None
:param objectId: Whether the id should be coerced to ObjectId type.
:type objectId: bool
:param force: If you explicitly want to circumvent access checking on this resource, set
this to True.
:type force: bool
:param fields: A mask for filtering result documents by key, or None to return the full
document, passed to MongoDB find() as the `projection` param.
:type fields: list or dict
:param exc: If not found, throw a ValidationException instead of returning None.
:type exc: bool
:raises ValidationException: If an invalid ObjectId is passed.
:returns: The matching document, or None if no match exists.
"""
# Warn of str type deprecation for `fields` param
if isinstance(fields, str):
logger.warning('String data type for fields param is deprecated, '
'use a list or dict instead.')
fields = [fields]
# Ensure we include access and public, they are needed by requireAccess
loadFields = fields
if not force:
extraFields = {'access', 'public'}
loadFields = self._supplementFields(fields, extraFields)
doc = super().load(id=id, objectId=objectId, fields=loadFields, exc=exc)
if not force and doc is not None:
self.requireAccess(doc, user, level)
self._removeSupplementalFields(doc, fields)
return doc
[docs] def list(self, user=None, limit=0, offset=0, sort=None):
"""
Return a list of documents that are visible to a user.
:param user: The user to filter for
:type user: dict or None
:param limit: Maximum number of documents to return
:type limit: int
:param offset: The offset into the results
:type offset: int
:param sort: The sort order
:type sort: List of (key, order) tuples
"""
return self.findWithPermissions(
{}, sort=sort, user=user, level=AccessType.READ, limit=limit,
offset=offset)
[docs] def copyAccessPolicies(self, src, dest, save=False):
"""
Copies the set of access control policies from one document to another.
:param src: The source document to copy policies from.
:type src: dict
:param dest: The destination document to copy policies onto.
:type dest: dict
:param save: Whether to save the destination document after copying.
:type save: bool
:returns: The modified destination document.
"""
dest['public'] = src.get('public', False)
if 'access' in src:
dest['access'] = copy.deepcopy(src['access'])
if save:
dest = self.save(dest)
return dest
[docs] def filterResultsByPermission(self, cursor, user, level, limit=0, offset=0,
removeKeys=(), flags=None):
"""
Given a database result cursor, this generator will yield only the
results that the user has the given level of access and specified access flags on,
respecting the limit and offset specified.
:param cursor: The database cursor object from "find()".
:param user: The user to check policies against.
:type user: dict or None
:param level: The access level.
:type level: AccessType
:param limit: Maximum number of documents to return
:type limit: int
:param offset: The offset into the results
:type offset: int
:param removeKeys: List of keys that should be removed from each
matching document.
:type removeKeys: `list`
:param flags: A flag or set of flags to test.
:type flags: flag identifier, or a list/set/tuple of them
"""
if flags:
def hasAccess(doc):
return (self.hasAccess(doc, user=user, level=level)
and self.hasAccessFlags(doc, user=user, flags=flags))
else:
hasAccess = functools.partial(self.hasAccess, user=user, level=level)
endIndex = offset + limit if limit else None
filteredCursor = filter(hasAccess, cursor)
for result in itertools.islice(filteredCursor, offset, endIndex):
for key in removeKeys:
if key in result:
del result[key]
yield result
[docs] def textSearch(self, query, user=None, filters=None, limit=0, offset=0,
sort=None, fields=None, level=AccessType.READ):
"""
Custom override of Model.textSearch to also force permission-based
filtering. The parameters are the same as Model.textSearch.
:param query: The text query. Will be stemmed internally.
:type query: str
:param user: The user to apply permission filtering for.
:type user: dict or None
:param filters: Any additional query operators to apply.
:type filters: dict
:param limit: Maximum number of documents to return
:type limit: int
:param offset: The offset into the results
:type offset: int
:param sort: The sort order
:type sort: List of (key, order) tuples
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param level: The access level to require.
:type level: girder.constants.AccessType
"""
filters, fields = self._textSearchFilters(query, filters, fields)
cursor = self.findWithPermissions(
filters, offset=offset, limit=limit, sort=sort, fields=fields,
user=user, level=level)
# Sort by meta text score, but only if result count is below a certain
# threshold. The text score is not a real index, so we cannot always
# sort by it if there is a high number of matching documents.
if sort is None and cursor.count() < TEXT_SCORE_SORT_MAX:
cursor.sort([('_textScore', {'$meta': 'textScore'})])
return cursor
[docs] def prefixSearch(self, query, user=None, filters=None, limit=0, offset=0,
sort=None, fields=None, level=AccessType.READ, prefixSearchFields=None):
"""
Custom override of Model.prefixSearch to also force permission-based
filtering. The parameters are the same as Model.prefixSearch.
:param query: The prefix string to look for
:type query: str
:param user: The user to apply permission filtering for.
:type user: dict or None
:param filters: Any additional query operators to apply.
:type filters: dict
:param limit: Maximum number of documents to return
:type limit: int
:param offset: The offset into the results
:type offset: int
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param level: The access level to require.
:type level: girder.constants.AccessType
:param prefixSearchFields: To override the model's prefixSearchFields
attribute for this invocation, pass an alternate iterable.
:returns: A pymongo cursor. It is left to the caller to build the
results from the cursor.
"""
filters = self._prefixSearchFilters(query, filters, prefixSearchFields)
return self.findWithPermissions(
filters, offset=offset, limit=limit, sort=sort, fields=fields,
user=user, level=level)
def permissionClauses(self, user=None, level=None, prefix=''):
return _permissionClauses(user, level, prefix)
[docs] def findWithPermissions(self, query=None, offset=0, limit=0, timeout=None, fields=None,
sort=None, user=None, level=AccessType.READ, **kwargs):
"""
Search the collection by a set of parameters, only returning results
that the combined user and level have permission to access. Passes any
extra kwargs through to the underlying pymongo.collection.find
function.
:param query: The search query (see general MongoDB docs for "find()")
:type query: dict
:param offset: The offset into the results
:type offset: int
:param limit: Maximum number of documents to return
:type limit: int
:param timeout: Cursor timeout in ms. Default is no timeout.
:type timeout: int
:param fields: A mask for filtering result documents by key, or None to
return the full document, passed to MongoDB find() as the
`projection` param. This is a string or iterable of strings to be
included from the document, or dict for an inclusion or exclusion
projection`.
:type fields: `str, list, set, or tuple`
:param sort: The sort order.
:type sort: List of (key, order) tuples.
:param user: The user to check policies against.
:type user: dict or None
:param level: The access level. Explicitly passing None skips doing
permissions checks.
:type level: AccessType
:returns: A pymongo Cursor or CommandCursor. If a CommandCursor, it
has been augmented with a count function.
"""
if level is not None and (not user or not user['admin']):
query = {'$and': [query or {}, self.permissionClauses(user, level)]}
return self.find(
query=query, offset=offset, limit=limit, timeout=timeout,
fields=fields, sort=sort, **kwargs)