text
stringlengths
0
1.05M
meta
dict
from functools import wraps from django.http import Http404 from django.contrib.auth.models import User from repository.models import Repository from git.repo import Repo def require_existing_repo(func): """ Checks to see if requested repository is available on user's deposit. Raises 404 if not. """ @wraps(func) def _decorator(request, *args, **kwargs): try: user = User.objects.get(username=kwargs['username']) repo = Repository.objects.get(owner=user, name=kwargs['repository']) return func(request, *args, **kwargs) except: raise Http404() return _decorator def require_existing_rev(func): """ Checks to see if requested revision exists in repository. Raises 404 if not. """ @wraps(func) def _decorator(request, *args, **kwargs): try: repo = Repo(Repo.get_repository_location(kwargs['username'], kwargs['repository'])) branches = repo.get_branches() if 'rev' not in kwargs or kwargs['rev'] in branches + ['HEAD']: return func(request, *args, **kwargs) else: raise Http404() except: raise Http404() return _decorator def require_access(func): """ Checks to see if requesting user has access to repository. If repository is private then only it's owner has access to it. If not, then everyone can see or clone this repository. Raises 404 if not. """ @wraps(func) def _decorator(request, *args, **kwargs): try: user = User.objects.get(username=kwargs['username']) repo = Repository.objects.get(owner=user, name=kwargs['repository']) if repo.private and request.user.id != user.id: raise Http404() else: return func(request, *args, **kwargs) except: raise Http404() return _decorator def require_owner_access(func): """ Only allows actions on repository if requesting user is repository owner. For example for getting access to repository settings. Raises 404 if not. """ @wraps(func) def _decorator(request, *args, **kwargs): if request.user.username != kwargs['username']: raise Http404() else: return func(request, *args, **kwargs) return _decorator def require_valid_readme(func): """ Checks to see if requested README is a valid text README file. Raises 404 if not. """ @wraps(func) def _decorator(request, *args, **kwargs): if request.path_info.endswith('README.md') or request.path_info.endswith('README.rst'): return func(request, *args, **kwargs) else: raise Http404() return _decorator
{ "repo_name": "Djacket/djacket", "path": "core/backend/repository/decorators.py", "copies": "1", "size": "2902", "license": "mit", "hash": 3152629704294879000, "line_mean": 28.9175257732, "line_max": 95, "alpha_frac": 0.5920055134, "autogenerated": false, "ratio": 4.403641881638847, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5495647395038846, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import Http404 from django.shortcuts import redirect, reverse from applications.models import Event, Period, EventApplication from userprofile.models import User def study_group_application(func): @wraps(func) def decorated(req, **kwargs): try: group_id = kwargs.get('group_id') username = kwargs.get('username') if username is None: user = req.user else: try: user = User.objects.get(username=username) except User.DoesNotExist: raise Http404 if group_id is None: period_id = kwargs.get('period_id') period = Period.objects.get(id=period_id) else: group = Event.objects.get(id=group_id) period = group.period f = EventApplication.objects.filter(user=user, event__type=Event.CLASS_GROUP, event__period=period) if f.exists(): return redirect(reverse('applications_group_application', args=[f.get().id])) except: pass return func(req, **kwargs) return decorated
{ "repo_name": "CSchool/SchoolSite", "path": "CSchoolSite/applications/decorators.py", "copies": "1", "size": "1220", "license": "apache-2.0", "hash": 5019149937220498000, "line_mean": 33.8857142857, "line_max": 111, "alpha_frac": 0.5745901639, "autogenerated": false, "ratio": 4.552238805970149, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5626828969870149, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import Http404 from django.utils.decorators import available_attrs from django.core.urlresolvers import reverse, NoReverseMatch from django.shortcuts import redirect from waffle import flag_is_active, switch_is_active def waffle_flag(flag_name, redirect_to=None): def decorator(view): @wraps(view, assigned=available_attrs(view)) def _wrapped_view(request, *args, **kwargs): if flag_name.startswith('!'): active = not flag_is_active(request, flag_name[1:]) else: active = flag_is_active(request, flag_name) if not active: response_to_redirect_to = get_response_to_redirect(redirect_to) if response_to_redirect_to: return response_to_redirect_to else: raise Http404 return view(request, *args, **kwargs) return _wrapped_view return decorator def waffle_switch(switch_name, redirect_to=None): def decorator(view): @wraps(view, assigned=available_attrs(view)) def _wrapped_view(request, *args, **kwargs): if switch_name.startswith('!'): active = not switch_is_active(switch_name[1:]) else: active = switch_is_active(switch_name) if not active: response_to_redirect_to = get_response_to_redirect(redirect_to) if response_to_redirect_to: return response_to_redirect_to else: raise Http404 return view(request, *args, **kwargs) return _wrapped_view return decorator def get_response_to_redirect(view): try: return redirect(reverse(view)) if view else None except NoReverseMatch: return None
{ "repo_name": "crccheck/django-waffle", "path": "waffle/decorators.py", "copies": "1", "size": "1867", "license": "bsd-3-clause", "hash": -6211141240905511000, "line_mean": 31.1896551724, "line_max": 79, "alpha_frac": 0.5977504017, "autogenerated": false, "ratio": 4.282110091743119, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5379860493443119, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import Http404 from django.utils.decorators import available_attrs from waffle import flag_is_active, switch_is_active def waffle_flag(flag_name): def decorator(view): @wraps(view, assigned=available_attrs(view)) def _wrapped_view(request, *args, **kwargs): if flag_name.startswith('!'): active = not flag_is_active(request, flag_name[1:]) else: active = flag_is_active(request, flag_name) if not active: raise Http404 return view(request, *args, **kwargs) return _wrapped_view return decorator def waffle_switch(switch_name): def decorator(view): @wraps(view, assigned=available_attrs(view)) def _wrapped_view(request, *args, **kwargs): if switch_name.startswith('!'): active = not switch_is_active(request, switch_name[1:]) else: active = switch_is_active(request, switch_name) if not active: raise Http404 return view(request, *args, **kwargs) return _wrapped_view return decorator
{ "repo_name": "ilanbm/django-waffle", "path": "waffle/decorators.py", "copies": "2", "size": "1194", "license": "bsd-3-clause", "hash": 6143908819002699000, "line_mean": 30.4210526316, "line_max": 71, "alpha_frac": 0.594639866, "autogenerated": false, "ratio": 4.131487889273356, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5726127755273356, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpRequest from django.middleware.cache import CacheMiddleware from django.utils.cache import add_never_cache_headers, patch_cache_control from django.utils.decorators import decorator_from_middleware_with_args def cache_page(timeout, *, cache=None, key_prefix=None): """ Decorator for views that tries getting the page from the cache and populates the cache if the page isn't in the cache yet. The cache is keyed by the URL and some data from the headers. Additionally there is the key prefix that is used to distinguish different cache areas in a multi-site setup. You could use the get_current_site().domain, for example, as that is unique across a Django project. Additionally, all headers from the response's Vary header will be taken into account on caching -- just like the middleware does. """ return decorator_from_middleware_with_args(CacheMiddleware)( page_timeout=timeout, cache_alias=cache, key_prefix=key_prefix, ) def cache_control(**kwargs): def _cache_controller(viewfunc): @wraps(viewfunc) def _cache_controlled(request, *args, **kw): if not isinstance(request, HttpRequest): raise TypeError( "cache_control didn't receive an HttpRequest. If you are " "decorating a classmethod, be sure to use " "@method_decorator." ) response = viewfunc(request, *args, **kw) patch_cache_control(response, **kwargs) return response return _cache_controlled return _cache_controller def never_cache(view_func): """ Decorator that adds headers to a response so that it will never be cached. """ @wraps(view_func) def _wrapped_view_func(request, *args, **kwargs): if not isinstance(request, HttpRequest): raise TypeError( "never_cache didn't receive an HttpRequest. If you are " "decorating a classmethod, be sure to use @method_decorator." ) response = view_func(request, *args, **kwargs) add_never_cache_headers(response) return response return _wrapped_view_func
{ "repo_name": "freakboy3742/django", "path": "django/views/decorators/cache.py", "copies": "15", "size": "2272", "license": "bsd-3-clause", "hash": -1093650366277413000, "line_mean": 37.5084745763, "line_max": 78, "alpha_frac": 0.6593309859, "autogenerated": false, "ratio": 4.42023346303502, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 59 }
from functools import wraps from django.http import HttpResponseForbidden from django.core.exceptions import ImproperlyConfigured from .endpoints import Server from .oauth2_validators import OAuth2Validator from .oauth2_backends import OAuthLibCore from .settings import oauth2_settings def protected_resource(scopes=None, validator_cls=OAuth2Validator, server_cls=Server): """ Decorator to protect views by providing OAuth2 authentication out of the box, optionally with scope handling. @protected_resource() def my_view(request): # An access token is required to get here... # ... pass """ _scopes = scopes or [] def decorator(view_func): @wraps(view_func) def _validate(request, *args, **kwargs): validator = validator_cls() core = OAuthLibCore(server_cls(validator)) valid, oauthlib_req = core.verify_request(request, scopes=_scopes) if valid: request.resource_owner = oauthlib_req.user return view_func(request, *args, **kwargs) return HttpResponseForbidden() return _validate return decorator def rw_protected_resource(scopes=None, validator_cls=OAuth2Validator, server_cls=Server): """ Decorator to protect views by providing OAuth2 authentication and read/write scopes out of the box. GET, HEAD, OPTIONS http methods require "read" scope. Otherwise "write" scope is required. @rw_protected_resource() def my_view(request): # If this is a POST, you have to provide 'write' scope to get here... # ... pass """ _scopes = scopes or [] def decorator(view_func): @wraps(view_func) def _validate(request, *args, **kwargs): # Check if provided scopes are acceptable provided_scopes = oauth2_settings._SCOPES read_write_scopes = [oauth2_settings.READ_SCOPE, oauth2_settings.WRITE_SCOPE] if not set(read_write_scopes).issubset(set(provided_scopes)): raise ImproperlyConfigured( "rw_protected_resource decorator requires following scopes {0}" " to be in OAUTH2_PROVIDER['SCOPES'] list in settings".format( read_write_scopes) ) # Check if method is safe if request.method.upper() in ['GET', 'HEAD', 'OPTIONS']: _scopes.append(oauth2_settings.READ_SCOPE) else: _scopes.append(oauth2_settings.WRITE_SCOPE) # proceed with validation validator = validator_cls() core = OAuthLibCore(server_cls(validator)) valid, oauthlib_req = core.verify_request(request, scopes=_scopes) if valid: request.resource_owner = oauthlib_req.user return view_func(request, *args, **kwargs) return HttpResponseForbidden() return _validate return decorator
{ "repo_name": "vmalavolta/django-oauth-toolkit", "path": "oauth2_provider/decorators.py", "copies": "1", "size": "3060", "license": "bsd-2-clause", "hash": -835289865141208300, "line_mean": 35.4285714286, "line_max": 98, "alpha_frac": 0.6160130719, "autogenerated": false, "ratio": 4.553571428571429, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.566958450047143, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpResponseForbidden from ratelimit.backends.cachebe import CacheBackend def _method_match(request, method=None): if method is None: method = ['GET', 'POST', 'PUT', 'DELETE', 'HEAD'] if not isinstance(method, list): method = [method] return request.method in method _PERIODS = { 's': 1, 'm': 60, 'h': 60 * 60, 'd': 24 * 60 * 60, } def _split_rate(rate): count, period = rate.split('/') count = int(count) return count, _PERIODS[period.lower()] _backend = CacheBackend() def ratelimit(ip=True, block=False, method=None, field=None, rate='5/m'): def decorator(fn): count, period = _split_rate(rate) @wraps(fn) def _wrapped(request, *args, **kw): if _method_match(request, method): _backend.count(request, ip, field, period) if _backend.limit(request, ip, field, count): if block: return HttpResponseForbidden() request.limited = True return fn(request, *args, **kw) return _wrapped return decorator
{ "repo_name": "haoqili/MozSecWorld", "path": "vendor-local/packages/django-ratelimit/ratelimit/decorators.py", "copies": "1", "size": "1178", "license": "bsd-3-clause", "hash": 6072709293204948000, "line_mean": 24.6086956522, "line_max": 73, "alpha_frac": 0.5772495756, "autogenerated": false, "ratio": 3.763578274760383, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9835107026561756, "avg_score": 0.0011441647597254005, "num_lines": 46 }
from functools import wraps from django.http import HttpResponse, HttpResponseRedirect, HttpResponseBadRequest from django.shortcuts import render_to_response from django.template import RequestContext from django.core.urlresolvers import reverse, resolve from django.views.decorators.csrf import csrf_exempt from atlas.utils import locate from atlas.forms import SelectLocationForm def location_required(func=None, override_old=False): ''' This decorator tries to geolocate the client and adds the location to the session data. If the client cannot be geolocated it redirects to a 'select-location' page. ''' def decorator(func): def inner_decorator(request, *args, **kwargs): if 'location' in request.session and not override_old: return func(request, *args, **kwargs) else: locate(request) if 'location' in request.session: return func(request, *args, **kwargs) origin = getattr(resolve(request.get_full_path()), 'url_name', None) return HttpResponseRedirect("%s%s" % (reverse('select-location'), ('?view=%s' % origin) if origin else '')) return wraps(func)(inner_decorator) if func: return decorator(func) return decorator @csrf_exempt def set_location(request): # force the location to be overridden if 'location' in request.session: del request.session['location'] locate(request) if 'location' in request.session: return HttpResponse(str(request.session['location']['city'])) if 'REMOTE_ADDR' in request.META: if 'atlas_id' in request.COOKIES: return HttpResponseBadRequest('Client cannot be located using IP %s and location %s' % (request.META['REMOTE_ADDR'], request.COOKIES['atlas_id'])) return HttpResponseBadRequest('Client cannot be located using IP %s' % request.META['REMOTE_ADDR']) elif 'atlas_id' in request.COOKIES: return HttpResponseBadRequest('Client cannot be located using location %s' % request.COOKIES['atlas_id']) return HttpResponseBadRequest('Client cannot be located without IP or location cookie') def select_location(request, form_class=SelectLocationForm): if request.method == 'POST': form = form_class(request.POST, request=request) if form.is_valid(): form.save() redirect_to = form.cleaned_data['origin'] if redirect_to != '/': redirect_to = reverse(redirect_to) return HttpResponseRedirect(redirect_to) else: form = form_class(request=request) extra = {'form': form} return render_to_response("atlas/select_location.html", extra, context_instance=RequestContext(request))
{ "repo_name": "praekelt/django-atlas", "path": "atlas/views.py", "copies": "1", "size": "2949", "license": "bsd-3-clause", "hash": 1577780980751388200, "line_mean": 38.8513513514, "line_max": 108, "alpha_frac": 0.6358087487, "autogenerated": false, "ratio": 4.6078125, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5743621248699999, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpResponse from django.core.exceptions import ValidationError import django.views.decorators.csrf import yaml from django.conf import settings from canvas import url_util from canvas.util import ArgSpec, simple_decorator, loads, client_dumps, JSONDecodeError from canvas.exceptions import ServiceError, DeactivatedUserError api_functions = set() def ServiceResponse(request, response, **kwargs): """ Serializes the response to primarily JSON, but you can force it to produce YAML by sending a format=yaml request variable. """ formatted_response = client_dumps(response) if request.POST.get("format") == "yaml": formatted_response = yaml.safe_dump(loads(formatted_response), default_flow_style=False) # Allows us to force a mimetype in a request arg. mimetype = request.POST.get("force_mimetype", 'application/json') return HttpResponse(formatted_response, mimetype, **kwargs) def JSONPResponse(request, response, **kwargs): callback = request.GET.get('callback', "callback") if not callback.replace('_', '').isalnum(): raise ServiceError() return HttpResponse('%s(%s);' % (callback, client_dumps(response)), mimetype="application/javascript", **kwargs) def json_response(view): @wraps(view) def view_wrapper(request, *args, **kwargs): return _handle_json_response(view, ServiceResponse, request, *args, **kwargs) return view_wrapper def _handle_json_response(view, json_response_processor, request, *args, **kwargs): status_code = None try: response = view(request, *args, **kwargs) except (ServiceError, ValidationError, DeactivatedUserError,), se: response = se.to_json() status_code = getattr(se, 'status_code', None) else: if response is None: response = {} if isinstance(response, dict): response['success'] = True # If the response is not a dict, we're not going to serialize it as JSON since our JSON # services expect a "success" key. # # This is primarily so that we can handle returning an HTTP response from the view, for # redirects and the like. if isinstance(response, dict): response_kwargs = {} if status_code: response_kwargs['status_code'] = status_code return json_response_processor(request, response, **response_kwargs) return response def _bad_json_view(*args, **kwargs): raise ServiceError("malformed json") def _json_service_wrapper(json_response_processor, view): def view_wrapper(request, *args, **kwargs): try: request.JSON = loads(request.raw_post_data) if request.raw_post_data else {} except JSONDecodeError: temp_view = _bad_json_view else: temp_view = view return _handle_json_response(temp_view, json_response_processor, request, *args, **kwargs) return view_wrapper #TODO use functools.wraps instead of simple_decorator @simple_decorator def json_service(view): return _json_service_wrapper(ServiceResponse, view) #TODO use functools.wraps def public_jsonp_service(view): """ More explicitly named to call attention to the extra little p """ return _json_service_wrapper(JSONPResponse, view) def is_api(view): return getattr(view, 'is_api', False) def api_response_wrapper(public_jsonp=False, csrf_exempt=False): serializer = public_jsonp_service if public_jsonp else json_service csrf_wrapper = django.views.decorators.csrf.csrf_exempt if (csrf_exempt or settings.API_CSRF_EXEMPT) else lambda f: f return csrf_wrapper(serializer) def inner_api(url_decorator, force_csrf_exempt=False): def api(url, public_jsonp=False, skip_javascript=False, async=True, csrf_exempt=False): """ `url` is a static URL endpoint, not a regex pattern. Requires JSON payloads in the request's raw POST data (which doesn't need to be used by the view, but the POST headers can't be used for anything else.) `request.GET` is still usable (for when it makes XSS easier), but this decorator doesn't help with that by generating anything in canvas_api.js for it, as it does for the JSON parameters. This also doesn't support *args or **kwargs inside the API view's arguments yet (i.e. it won't generate anything in the JS API for these.) It does support explicitly named args and kwargs though. The kwargs are used to provide default values to optional params (or simply to make them optional without a default). The order of args in an API view's arg list doesn't actually matter (besides `request` being first), since the JS API sends everything as a JSON dictionary of arg name, value pairs (which is unordered.) If `public_jsonp` is True, this will return a JSONP response, and will work with GET. This is False by default -- the response is serialized into JSON, not JSONP, and POST is required. NOTE: This *must* be the first (outermost) decorator on the view. """ response_wrapper = api_response_wrapper(public_jsonp=public_jsonp, csrf_exempt=(csrf_exempt or force_csrf_exempt)) def decorator(func): try: func.url_name = u'api-{0}-{1}'.format(func.__module__, func.__name__) except AttributeError: func.url_name = None # We assume the function's arg specs don't change at runtime. Seems to be a reasonable assumption. If we # couldn't assume that, then our JS API could diverge from the actual function signatures. We can't have # that happening. So we just precompute it here. if not getattr(func, 'arg_spec', None): func.arg_spec = ArgSpec(func) if not public_jsonp: from canvas.view_guards import require_POST func = require_POST(func) # Mark it as an API. func.is_api = True func.async = async if not skip_javascript: api_functions.add((func.__name__, func)) @url_decorator(r'^' + url + r'$', name=func.url_name) @response_wrapper @wraps(func) def wrapped_view(request): # JSON or REQUEST. The latter is to support the API console. payload = request.JSON if not payload: try: payload = request.REQUEST except AttributeError: pass args, kwargs = [], {} # Skip the `request` arg. for arg_name in func.arg_spec.args[1:]: try: args.append(payload[arg_name]) except KeyError: raise ServiceError("Request payload is missing a required parameter: " + arg_name) for kwarg_name in func.arg_spec.kwargs.iterkeys(): if kwarg_name in payload: kwargs[kwarg_name] = payload[kwarg_name] return func(request, *args, **kwargs) return wrapped_view return decorator return api def api_decorator(urls): """ Returns an API decorator for the given URL space. """ url_decorator = url_util.url_decorator(urls) return inner_api(url_decorator)
{ "repo_name": "canvasnetworks/canvas", "path": "website/canvas/api_decorators.py", "copies": "1", "size": "7487", "license": "bsd-3-clause", "hash": -7852641585767367000, "line_mean": 40.5944444444, "line_max": 122, "alpha_frac": 0.6415119541, "autogenerated": false, "ratio": 4.251561612720045, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5393073566820045, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpResponse from django.core.urlresolvers import reverse from django.core.handlers.wsgi import WSGIRequest from fandjango.utils import get_post_authorization_redirect_url from fandjango.views import authorize_application from fandjango.settings import FACEBOOK_APPLICATION_DOMAIN from fandjango.settings import FACEBOOK_APPLICATION_NAMESPACE from fandjango.settings import FACEBOOK_APPLICATION_INITIAL_PERMISSIONS from fandjango.settings import FACEBOOK_AUTHORIZATION_REDIRECT_URL def facebook_authorization_required(redirect_uri=FACEBOOK_AUTHORIZATION_REDIRECT_URL, permissions=None): """ Require the user to authorize the application. :param redirect_uri: A string describing an URL to redirect to after authorization is complete. If ``None``, redirects to the current URL in the Facebook canvas (e.g. ``http://apps.facebook.com/myapp/current/path``). Defaults to ``FACEBOOK_AUTHORIZATION_REDIRECT_URL`` (which, in turn, defaults to ``None``). :param permissions: A list of strings describing Facebook permissions. """ def decorator(function): @wraps(function) def wrapper(request, *args, **kwargs): # We know the user has been authenticated via a canvas page if a signed request is set. canvas = request.facebook is not False and hasattr(request.facebook, "signed_request") # The user has already authorized the application, but the given view requires # permissions besides the defaults listed in ``FACEBOOK_APPLICATION_DEFAULT_PERMISSIONS``. # # Derive a list of outstanding permissions and prompt the user to grant them. if request.facebook and request.facebook.user and permissions: outstanding_permissions = [p for p in permissions if p not in request.facebook.user.permissions] if outstanding_permissions: return authorize_application( request = request, redirect_uri = redirect_uri or get_post_authorization_redirect_url(request, canvas=canvas), permissions = outstanding_permissions ) # The user has not authorized the application yet. # # Concatenate the default permissions with permissions required for this particular view. if not request.facebook or not request.facebook.user: return authorize_application( request = request, redirect_uri = redirect_uri or get_post_authorization_redirect_url(request, canvas=canvas), permissions = (FACEBOOK_APPLICATION_INITIAL_PERMISSIONS or []) + (permissions or []) ) return function(request, *args, **kwargs) return wrapper if callable(redirect_uri): function = redirect_uri redirect_uri = None return decorator(function) else: return decorator
{ "repo_name": "jgorset/fandjango", "path": "fandjango/decorators.py", "copies": "1", "size": "3107", "license": "mit", "hash": 4698214394024866000, "line_mean": 46.8, "line_max": 115, "alpha_frac": 0.663984551, "autogenerated": false, "ratio": 5.003220611916264, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.005265685115974785, "num_lines": 65 }
from functools import wraps from django.http import HttpResponse from django.shortcuts import render_to_response from django.utils import simplejson from django.template import RequestContext def render_to(template=None): def renderer(function): @wraps(function) def wrapper(request, *args, **kwargs): output = function(request, *args, **kwargs) if not isinstance(output, dict): return output tmpl = output.pop('TEMPLATE', template) return render_to_response(tmpl, output, context_instance=RequestContext(request)) return wrapper return renderer class JsonResponse(HttpResponse): def __init__(self, data): super(JsonResponse, self).__init__(content=simplejson.dumps(data), mimetype='application/json') def ajax_request(func): @wraps(func) def wrapper(request, *args, **kwargs): response = func(request, *args, **kwargs) if isinstance(response, dict): return JsonResponse(response) else: return response return wrapper
{ "repo_name": "dbreen/mazerunjs", "path": "mazerun/utils/decorators.py", "copies": "1", "size": "1093", "license": "mit", "hash": -798625285044599300, "line_mean": 30.2285714286, "line_max": 103, "alpha_frac": 0.6605672461, "autogenerated": false, "ratio": 4.573221757322176, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0005786766425064298, "num_lines": 35 }
from functools import wraps from django.http import HttpResponse from django.template.loader import render_to_string, get_template from django.template import RequestContext from slimmer import slimmer from paucore.utils.data import is_seq_not_string from paucore.stats.statsd_client import graphite_timer def minify(html): "Convenience method." if isinstance(html, unicode): html = html.encode('utf-8') return slimmer.html_slimmer(html) def render_template_string(request, ctx, template, minify_html=None, extra_ctx=None): with graphite_timer('jinja2.render_template_string'): if minify_html is None: minify_html = template.endswith('.html') if extra_ctx: if not is_seq_not_string(extra_ctx): extra_ctx = [extra_ctx] new_ctx = {} page_load_hooks = ctx.get('__js_page_load_hooks', []) for ctx_callable in extra_ctx: ctx_item = ctx_callable(request) if ctx_item: if '__js_page_load_hooks' in ctx_item: page_load_hooks.extend(ctx_item['__js_page_load_hooks']) del ctx_item['__js_page_load_hooks'] new_ctx.update(ctx_item) new_ctx.update(ctx) new_ctx['__js_page_load_hooks'] = page_load_hooks ctx = new_ctx with graphite_timer('jinja2.render_to_string'): output = render_to_string(template, ctx, context_instance=RequestContext(request)) if isinstance(output, unicode): output = output.encode('utf-8') if ctx and ctx.get('__no_minify'): minify_html = False if minify_html: with graphite_timer('jinja2.minify_html'): output = slimmer.html_slimmer(output) return output def get_macro_module(request, ctx, template): """Fetch a module that represents a template for the purpose of rendering individual macros as snippets.""" ctx = ctx or {} t = get_template(template) if hasattr(t, 'make_module'): context_instance = RequestContext(request) context_instance.update(ctx) flat_dict = {} for d in context_instance.dicts: flat_dict.update(d) return t.make_module(t.new_context(flat_dict)) else: raise Exception('get_macro_module only works for Jinja2 templates') def render_template_response(request, ctx, template, no_cache=False, minify_html=None, extra_ctx=None, status_code=200): response = HttpResponse(render_template_string(request, ctx, template, minify_html, extra_ctx), status=status_code) if no_cache: response['Pragma'] = 'no-cache' response['Cache-Control'] = 'no-cache, must-revalidate' return response def template_response(template, no_cache=False, minify_html=None, extra_ctx=None): def render_template_decorator(view): @wraps(view) def inner(request, *a, **kw): ctx = view(request, *a, **kw) if isinstance(ctx, HttpResponse): return ctx else: return render_template_response(request, ctx, template, no_cache=no_cache, minify_html=minify_html, extra_ctx=extra_ctx) return inner return render_template_decorator
{ "repo_name": "appdotnet/alpha", "path": "paucore/web/template.py", "copies": "3", "size": "3387", "license": "mit", "hash": -3479823916990917600, "line_mean": 31.2571428571, "line_max": 120, "alpha_frac": 0.6111603189, "autogenerated": false, "ratio": 3.902073732718894, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.6013234051618894, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpResponse def _action_renderer(renderer, **renderer_kwargs): def decorator(function): @wraps(function) def _wrapped_action(self, *args, **kwargs): """Wrapper for the function called by the url.""" response = function(self, *args, **kwargs) if issubclass(response.__class__, HttpResponse): return response return getattr(self,renderer)(response, **renderer_kwargs) return _wrapped_action return decorator def json_action(json_encoder=None): """ Decorator that ensures any data returned from this function is encoded into JSON. """ return _action_renderer(json_encoder=json_encoder, renderer="_as_json") def yaml_action(default_flow_style=None): return _action_renderer(default_flow_style=default_flow_style, renderer="_as_yaml") def auto(json_encoder=None, yaml_default_flow_style=None): """ Decorator that determines the returned data renderer based on the Accept header. Be careful, if used incorrectly this can expose your data to an attacker. Example: You request data with Accept:application/json, this means any data returned from your action function will be encoded into JSON as is. So if you return a dictionary with sensitive data, that normally would be processed inside a server-side template, and someone sends Accept:application/json, your function will actually return the dictionary that was meant for a server-side template to the client. Supported `auto` rendering types are json, yaml, template and plain text. """ return _action_renderer(renderer="_as_auto_response", json_encoder=json_encoder, default_flow_style=yaml_default_flow_style)
{ "repo_name": "zeraien/django-url-framework", "path": "django_url_framework/decorators/render.py", "copies": "1", "size": "1816", "license": "mit", "hash": -4807058447792839000, "line_mean": 41.2325581395, "line_max": 128, "alpha_frac": 0.7004405286, "autogenerated": false, "ratio": 4.4950495049504955, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5695490033550495, "avg_score": null, "num_lines": null }
from functools import wraps from django.http import HttpResponseRedirect from .utils import get_dropbox_auth_flow from .views import DROPBOX_ACCESS_TOKEN def require_dropbox_session(next_url=None): """ Any view that is wrapped with this will redirect to the dropbox authorization site if the user does not have an access_token in their session. @params next_url - The next_url to go to after redirect. Can be a function or string. If it's a function it will receive the same parameters as the view """ def decorator(view_func): @wraps(view_func) def inner(request, *args, **kwargs): if not request.session.get(DROPBOX_ACCESS_TOKEN, None): url = '/' if hasattr(next_url, '__call__'): url = next_url(request, *args, **kwargs) elif next_url: url = next_url request.session['dropbox_next_url'] = url authorize_url = get_dropbox_auth_flow(request.session).start() return HttpResponseRedirect(authorize_url) return view_func(request, *args, **kwargs) return inner return decorator
{ "repo_name": "qedsoftware/commcare-hq", "path": "corehq/apps/dropbox/decorators.py", "copies": "2", "size": "1200", "license": "bsd-3-clause", "hash": -5184034912629061000, "line_mean": 36.5, "line_max": 108, "alpha_frac": 0.6216666667, "autogenerated": false, "ratio": 4.363636363636363, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0005760490995582739, "num_lines": 32 }
from functools import wraps from django.http import * from django.shortcuts import render_to_response from django.template.context import RequestContext from merlin.wizards import MissingStepException, MissingSlugException from merlin.wizards.utils import * def modifies_session(func): @wraps(func) def wrapper(self, request, *args, **kwargs): result = func(self, request, *args, **kwargs) request.session.modified = True return result return wrapper class SessionWizard(object): """ This class allows for the ability to chop up a long form into sizable steps and process each step in sequence. It also provides the ability to go back to a previous step or move on to the next step in the sequence. When the wizard runs out of steps it calls a final function that finishes the form process. This class should be subclassed and the subclass should at a minimum override the ``done`` method. .. versionadded:: 0.1 :param steps: Provides a list of :class:`Step` objects in the order in which the wizard should display them to the user. This list can be manipulated to add or remove steps as needed. """ def __init__(self, steps): if not isinstance(steps, list): raise TypeError('steps must be an instance of or subclass of list') if [step for step in steps if not isinstance(step, Step)]: raise TypeError('All steps must be an instance of Step') slugs = set([step.slug for step in steps]) # By putting the slugs into a set the duplicates will be filtered out. # If the slug list length does not equal the steps length then there # must have been duplicates. if len(slugs) != len(steps): raise ValueError('Step slugs must be unique.') clazz = self.__class__ self.id = '%s.%s' % (clazz.__module__, clazz.__name__,) self.base_steps = steps def __call__(self, request, *args, **kwargs): """ Initialize the step list for the session if needed and call the proper HTTP method handler. """ self._init_wizard(request) slug = kwargs.get('slug', None) if not slug: raise MissingSlugException("Slug not found.") step = self.get_step(request, slug) if not step: if slug == 'cancel': self.cancel(request) redirect = request.REQUEST.get('rd', '/') return HttpResponseRedirect(redirect) raise MissingStepException("Step for slug %s not found." % slug) method_name = 'process_%s' % request.method method = getattr(self, method_name) return method(request, step) def _init_wizard(self, request): """ Since the SessionWizard can be used as the callable for the urlconf there will be only one instance of the class created. We need to make sure each session has its own copy of the step list to manipulate. This way multiple connections will not trample on each others steps. """ if self.id not in request.session: request.session[self.id] = WizardState( steps=self.base_steps[:], # Copies the list current_step=self.base_steps[0], form_data={}) self.initialize(request, request.session[self.id]) def _get_state(self, request): """ Returns the :class:`WizardState` object used to manage this wizards internal state. """ return request.session[self.id] def _show_form(self, request, step, form): """ Render the provided form for the provided step to the response stream. """ context = self.process_show_form(request, step, form) return self.render_form(request, step, form, { 'current_step': step, 'form': form, 'previous_step': self.get_before(request, step), 'next_step': self.get_after(request, step), 'url_base': self._get_URL_base(request, step), 'extra_context': context }) def _set_current_step(self, request, step): """ Sets the currenlty executing step. """ self._get_state(request).current_step = step return step def _get_URL_base(self, request, step): """ Returns the base URL of the wizard. """ index = request.path.rfind(step.slug) return request.path[:index] def process_GET(self, request, step): """ Renders the ``Form`` for the requested :class:`Step` """ form_data = self.get_cleaned_data(request, step) if form_data: form = step.form(form_data) else: form = step.form() return self._show_form(request, step, form) def process_POST(self, request, step): """ Processes the current :class:`Step` and either send a redirect to the next :class:`Step` in the sequence or finished the wizard process by calling ``self.done`` """ form = step.form(request.POST) if not form.is_valid(): return self._show_form(request, step, form) self.set_cleaned_data(request, step, form.cleaned_data) self.process_step(request, step, form) next_step = self.get_after(request, step) if next_step: url_base = self._get_URL_base(request, step) return HttpResponseRedirect(urljoin(url_base, next_step.slug)) else: return self.done(request) def get_steps(self, request): """ Returns the list of :class:`Step`s used in this wizard sequence. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. """ return self._get_state(request).steps def get_step(self, request, slug): """ Returns the :class:`Step` that matches the provided slug. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param slug: The unique identifier for a particular :class:`Step` in the sequence. """ steps = self.get_steps(request) try: return [step for step in steps if step.slug == slug][0] except IndexError: return None def get_before(self, request, step): """ Returns the previous :class:`Step` in the sequence after the provided :class:`Step`. This function will return ``None`` if there is no previous step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The :class:`Step` to use as an index for finding the next :class:`Step` """ steps = self.get_steps(request) index = steps.index(step) if index > 0: return steps[index - 1] else: return None def get_after(self, request, step): """ Returns the next :class:`Step` in the sequence after the provided :class:`Step`. This function will return ``None`` if there is no next step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The :class:`Step` to use as an index for finding the next :class:`Step` """ steps = self.get_steps(request) index = steps.index(step) try: return steps[index + 1] except IndexError: return None @modifies_session def remove_step(self, request, step): """ Removes step from the wizard sequence. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The :class:`Step` to remove. """ steps = self.get_steps(request) if step in steps: steps.remove(step) @modifies_session def insert_before(self, request, current_step, step): """ Inserts a new step into the wizard sequence before the provided step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param current_step: The :class:`Step` to use as an index for inserting a new step :param step: The new :class:`Step` to insert. """ steps = self.get_steps(request) if step not in steps: index = steps.index(current_step) steps.insert(index, step) @modifies_session def insert_after(self, request, current_step, step): """ Inserts a new step into the wizard sequence after the provided step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param current_step: The :class:`Step` to use as an index for inserting a new step :param step: The new :class:`Step` to insert. """ steps = self.get_steps(request) if step not in steps: index = steps.index(current_step) + 1 steps.insert(index, step) def get_cleaned_data(self, request, step): """ Returns the cleaned form data for the provided step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The :class:`Step` to use to pull the cleaned form data. """ return self._get_state(request).form_data.get(step.slug, None) @modifies_session def set_cleaned_data(self, request, step, data): """ Sets the cleaned form data for the provided step. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The :class:`Step` to use to store the cleaned form data. :param data: The cleaned ``Form`` data to store. """ self._get_state(request).form_data[step.slug] = data def get_form_data(self, request): """ This will return the form_data dictionary that has been saved in the session. This will mainly be used in the done to query for the form_data that has been saved throughout the wizard process. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. """ return request.session[self.id]['form_data'] def clear(self, request): """ Removes the internal wizard state from the session. This should be called right be for the return from a successful :meth:`~SessionWizard.done()` call. """ del request.session[self.id] # METHODS SUBCLASSES MIGHT OVERRIDE IF APPROPRIATE ######################## def initialize(self, request, wizard_state): """ Hook used to initialize the wizard subclass. This will be called for every request to the wizard before it processes the GET or POST. :param request: A ``HttpRequest`` object for this request. :param wizard_state: The :class:`WizardState` object representing the current state of the wizard. Extra information can be appended to the state so it can be available to :class:`Step`'s of the wizard. For example:: if 'profile' not in wizard_state: wizard_state.profile = request.user.get_profile() """ pass def cancel(self, request): """ Hook used to cancel a wizard. This will be called when slug is passed that matches "cancel". By default the method will clear the session data. :param request: A ``HttpRequest`` object for this request. """ self.clear(request) def process_show_form(self, request, step, form): """ Hook used for providing extra context that can be used in the template used to render the current form. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The current :class:`Step` that is being processed. :param form: The Django ``Form`` object that is being processed. """ pass def process_step(self, request, step, form): """ Hook for modifying the ``SessionWizard``'s internal state, given a fully validated ``Form`` object. The ``Form`` is guaranteed to have clean, valid data. This method should *not* modify any of that data. Rather, it might want dynamically alter the step list, based on previously submitted forms. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The current :class:`Step` that is being processed. :param form: The Django ``Form`` object that is being processed. """ pass def get_template(self, request, step, form): """ Responsible for return the path to the template that should be used to render this current form. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The current :class:`Step` that is being processed. :param form: The Django ``Form`` object that is being processed. """ return 'forms/wizard.html' def render_form(self, request, step, form, context): """ Renders a form with the provided context and returns a ``HttpResponse`` object. This can be overridden to provide custom rendering to the client or using a different template engine. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. :param step: The current :class:`Step` that is being processed. :param form: The Django ``Form`` object that is being processed. :param context: The default context that templates can use which also contains any extra context created in the ``process_show_form`` hook. """ return render_to_response(self.get_template(request, step, form), context, RequestContext(request)) def done(self, request): """ Responsible for processing the validated form data that the wizard collects from the user. This function should be overridden by the implementing subclass. This function needs to return a ``HttpResponse`` object. :param request: A ``HttpRequest`` object that carries along with it the session used to access the wizard state. """ raise NotImplementedError("Your %s class has not defined a done() " \ "method, which is required." \ % self.__class__.__name__)
{ "repo_name": "supercodepoet/django-merlin", "path": "src/merlin/wizards/session.py", "copies": "1", "size": "15866", "license": "bsd-3-clause", "hash": 4313827826305920500, "line_mean": 31.7809917355, "line_max": 81, "alpha_frac": 0.5914534224, "autogenerated": false, "ratio": 4.5855491329479765, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5677002555347976, "avg_score": null, "num_lines": null }
from functools import wraps from django.http.response import HttpResponse from atlassian_jwt_auth.frameworks.django.decorators import with_asap def validate_asap(issuers=None, subjects=None, required=True): """Decorator to allow endpoint-specific ASAP authorization, assuming ASAP authentication has already occurred. :param list issuers: A list of issuers that are allowed to use the endpoint. :param list subjects: A list of subjects that are allowed to use the endpoint. :param boolean required: Whether or not to require ASAP on this endpoint. Note that requirements will be still be verified if claims are present. """ def validate_asap_decorator(func): @wraps(func) def validate_asap_wrapper(request, *args, **kwargs): asap_claims = getattr(request, 'asap_claims', None) if required and not asap_claims: message = 'Unauthorized: Invalid or missing token' response = HttpResponse(message, status=401) response['WWW-Authenticate'] = 'Bearer' return response if asap_claims: iss = asap_claims['iss'] if issuers and iss not in issuers: message = 'Forbidden: Invalid token issuer' return HttpResponse(message, status=403) sub = asap_claims.get('sub') if subjects and sub not in subjects: message = 'Forbidden: Invalid token subject' return HttpResponse(message, status=403) return func(request, *args, **kwargs) return validate_asap_wrapper return validate_asap_decorator def requires_asap(issuers=None, subject_should_match_issuer=None, func=None): """Decorator for Django endpoints to require ASAP :param list issuers: *required The 'iss' claims that this endpoint is from. """ return with_asap(func=func, required=True, issuers=issuers, subject_should_match_issuer=subject_should_match_issuer)
{ "repo_name": "atlassian/asap-authentication-python", "path": "atlassian_jwt_auth/contrib/django/decorators.py", "copies": "1", "size": "2125", "license": "mit", "hash": 689121540848075000, "line_mean": 38.3518518519, "line_max": 79, "alpha_frac": 0.6310588235, "autogenerated": false, "ratio": 4.363449691991787, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5494508515491786, "avg_score": null, "num_lines": null }
from functools import wraps from django import http from django.conf import settings from django.http import Http404 from amo.urlresolvers import reverse def locale_switcher(f): """Decorator redirecting clicks on the locale switcher dropdown.""" @wraps(f) def decorated(request, *args, **kwargs): new_userlang = request.GET.get('userlang') if new_userlang in settings.AMO_LANGUAGES + settings.HIDDEN_LANGUAGES: kwargs['locale_code'] = new_userlang to = reverse(decorated, args=args, kwargs=kwargs) return http.HttpResponseRedirect(to) else: return f(request, *args, **kwargs) return decorated def valid_locale(f): """Decorator validating locale code for per-language pages.""" @wraps(f) def decorated(request, locale_code, *args, **kwargs): if locale_code not in (settings.AMO_LANGUAGES + settings.HIDDEN_LANGUAGES): raise Http404 return f(request, locale_code, *args, **kwargs) return decorated
{ "repo_name": "beni55/olympia", "path": "apps/localizers/decorators.py", "copies": "21", "size": "1065", "license": "bsd-3-clause", "hash": 6118670073586490000, "line_mean": 32.28125, "line_max": 78, "alpha_frac": 0.6535211268, "autogenerated": false, "ratio": 4.143968871595331, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": null, "num_lines": null }
from functools import wraps #from django import http from django.utils import simplejson from django.conf import settings from django.http import HttpResponseRedirect, HttpResponse from django.contrib.auth.decorators import login_required from django.utils.decorators import available_attrs def verify_required(view_func): """Handle non-verfied users.""" @wraps(view_func, assigned=available_attrs(view_func)) def _wrapped_view(request, *args, **kwargs): if request.user.is_authenticated(): if request.user.profile.email_verified: return view_func(request, *args, **kwargs) else: return HttpResponseRedirect('/verify_email/') else: return view_func(request, *args, **kwargs) # return login_required(view_func)(request, *args, **kwargs) return _wrapped_view def ajax_login_required(view_func): """Handle non-authenticated users differently if it is an AJAX request.""" @wraps(view_func, assigned=available_attrs(view_func)) def _wrapped_view(request, *args, **kwargs): if request.is_ajax(): if request.user.is_authenticated(): return view_func(request, *args, **kwargs) else: content = simplejson.dumps({'not_authenticated': True, 'login_url': settings.LOGIN_URL}) return HttpResponse(content, content_type='application/json') else: return login_required(view_func)(request, *args, **kwargs) return _wrapped_view def ajax_verify_required(view_func): """Handle non-verfied users differently if it is an AJAX request.""" @wraps(view_func, assigned=available_attrs(view_func)) def _wrapped_view(request, *args, **kwargs): if request.is_ajax(): if request.user.profile.email_verified: return view_func(request, *args, **kwargs) else: content = simplejson.dumps({'not_verified': True, 'login_url': '/verify_email/'}) return HttpResponse(content, content_type='application/json') else: return verify_required(view_func)(request, *args, **kwargs) return _wrapped_view
{ "repo_name": "shawiz/idlebook", "path": "idlebook/account/decorators.py", "copies": "1", "size": "2226", "license": "mit", "hash": -5298969003886104000, "line_mean": 38.0526315789, "line_max": 104, "alpha_frac": 0.641509434, "autogenerated": false, "ratio": 4.192090395480226, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5333599829480226, "avg_score": null, "num_lines": null }
from functools import wraps from django.middleware.cache import CacheMiddleware from django.utils.cache import add_never_cache_headers, patch_cache_control from django.utils.decorators import decorator_from_middleware_with_args def cache_page(*args, **kwargs): """ Decorator for views that tries getting the page from the cache and populates the cache if the page isn't in the cache yet. The cache is keyed by the URL and some data from the headers. Additionally there is the key prefix that is used to distinguish different cache areas in a multi-site setup. You could use the get_current_site().domain, for example, as that is unique across a Django project. Additionally, all headers from the response's Vary header will be taken into account on caching -- just like the middleware does. """ # We also add some asserts to give better error messages in case people are # using other ways to call cache_page that no longer work. if len(args) != 1 or callable(args[0]): raise TypeError("cache_page has a single mandatory positional argument: timeout") cache_timeout = args[0] cache_alias = kwargs.pop('cache', None) key_prefix = kwargs.pop('key_prefix', None) if kwargs: raise TypeError("cache_page has two optional keyword arguments: cache and key_prefix") return decorator_from_middleware_with_args(CacheMiddleware)( cache_timeout=cache_timeout, cache_alias=cache_alias, key_prefix=key_prefix ) def cache_control(**kwargs): def _cache_controller(viewfunc): @wraps(viewfunc) def _cache_controlled(request, *args, **kw): response = viewfunc(request, *args, **kw) patch_cache_control(response, **kwargs) return response return _cache_controlled return _cache_controller def never_cache(view_func): """ Decorator that adds headers to a response so that it will never be cached. """ @wraps(view_func) def _wrapped_view_func(request, *args, **kwargs): response = view_func(request, *args, **kwargs) add_never_cache_headers(response) return response return _wrapped_view_func
{ "repo_name": "twz915/django", "path": "django/views/decorators/cache.py", "copies": "2", "size": "2205", "license": "bsd-3-clause", "hash": 7355844347681191000, "line_mean": 37.0172413793, "line_max": 94, "alpha_frac": 0.6947845805, "autogenerated": false, "ratio": 4.144736842105263, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5839521422605263, "avg_score": null, "num_lines": null }
from functools import wraps from django.middleware.cache import CacheMiddleware from django.utils.cache import add_never_cache_headers, patch_cache_control from django.utils.decorators import ( available_attrs, decorator_from_middleware_with_args, ) def cache_page(*args, **kwargs): """ Decorator for views that tries getting the page from the cache and populates the cache if the page isn't in the cache yet. The cache is keyed by the URL and some data from the headers. Additionally there is the key prefix that is used to distinguish different cache areas in a multi-site setup. You could use the get_current_site().domain, for example, as that is unique across a Django project. Additionally, all headers from the response's Vary header will be taken into account on caching -- just like the middleware does. """ # We also add some asserts to give better error messages in case people are # using other ways to call cache_page that no longer work. if len(args) != 1 or callable(args[0]): raise TypeError("cache_page has a single mandatory positional argument: timeout") cache_timeout = args[0] cache_alias = kwargs.pop('cache', None) key_prefix = kwargs.pop('key_prefix', None) if kwargs: raise TypeError("cache_page has two optional keyword arguments: cache and key_prefix") return decorator_from_middleware_with_args(CacheMiddleware)( cache_timeout=cache_timeout, cache_alias=cache_alias, key_prefix=key_prefix ) def cache_control(**kwargs): def _cache_controller(viewfunc): @wraps(viewfunc, assigned=available_attrs(viewfunc)) def _cache_controlled(request, *args, **kw): response = viewfunc(request, *args, **kw) patch_cache_control(response, **kwargs) return response return _cache_controlled return _cache_controller def never_cache(view_func): """ Decorator that adds headers to a response so that it will never be cached. """ @wraps(view_func, assigned=available_attrs(view_func)) def _wrapped_view_func(request, *args, **kwargs): response = view_func(request, *args, **kwargs) add_never_cache_headers(response) return response return _wrapped_view_func
{ "repo_name": "craynot/django", "path": "django/views/decorators/cache.py", "copies": "586", "size": "2304", "license": "bsd-3-clause", "hash": -6313222406767750000, "line_mean": 37.4, "line_max": 94, "alpha_frac": 0.6970486111, "autogenerated": false, "ratio": 4.114285714285714, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0005590364800891116, "num_lines": 60 }
from functools import wraps from django.middleware.csrf import CsrfViewMiddleware, get_token from django.utils.decorators import available_attrs, decorator_from_middleware csrf_protect = decorator_from_middleware(CsrfViewMiddleware) csrf_protect.__name__ = "csrf_protect" csrf_protect.__doc__ = """ This decorator adds CSRF protection in exactly the same way as CsrfViewMiddleware, but it can be used on a per view basis. Using both, or using the decorator multiple times, is harmless and efficient. """ class _EnsureCsrfToken(CsrfViewMiddleware): # We need this to behave just like the CsrfViewMiddleware, but not reject # requests or log warnings. def _reject(self, request, reason): return None requires_csrf_token = decorator_from_middleware(_EnsureCsrfToken) requires_csrf_token.__name__ = 'requires_csrf_token' requires_csrf_token.__doc__ = """ Use this decorator on views that need a correct csrf_token available to RequestContext, but without the CSRF protection that csrf_protect enforces. """ class _EnsureCsrfCookie(CsrfViewMiddleware): def _reject(self, request, reason): return None def process_view(self, request, callback, callback_args, callback_kwargs): retval = super(_EnsureCsrfCookie, self).process_view(request, callback, callback_args, callback_kwargs) # Forces process_response to send the cookie get_token(request) return retval ensure_csrf_cookie = decorator_from_middleware(_EnsureCsrfCookie) ensure_csrf_cookie.__name__ = 'ensure_csrf_cookie' ensure_csrf_cookie.__doc__ = """ Use this decorator to ensure that a view sets a CSRF cookie, whether or not it uses the csrf_token template tag, or the CsrfViewMiddleware is used. """ def csrf_exempt(view_func): """ Marks a view function as being exempt from the CSRF view protection. """ # We could just do view_func.csrf_exempt = True, but decorators # are nicer if they don't have side-effects, so we return a new # function. def wrapped_view(*args, **kwargs): return view_func(*args, **kwargs) wrapped_view.csrf_exempt = True return wraps(view_func, assigned=available_attrs(view_func))(wrapped_view)
{ "repo_name": "zhoulingjun/django", "path": "django/views/decorators/csrf.py", "copies": "586", "size": "2202", "license": "bsd-3-clause", "hash": 4937777100078680000, "line_mean": 35.7, "line_max": 111, "alpha_frac": 0.7325158946, "autogenerated": false, "ratio": 3.960431654676259, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0001488095238095238, "num_lines": 60 }
from functools import wraps from django.middleware.csrf import CsrfViewMiddleware, get_token from django.utils.decorators import decorator_from_middleware csrf_protect = decorator_from_middleware(CsrfViewMiddleware) csrf_protect.__name__ = "csrf_protect" csrf_protect.__doc__ = """ This decorator adds CSRF protection in exactly the same way as CsrfViewMiddleware, but it can be used on a per view basis. Using both, or using the decorator multiple times, is harmless and efficient. """ class _EnsureCsrfToken(CsrfViewMiddleware): # Behave like CsrfViewMiddleware but don't reject requests or log warnings. def _reject(self, request, reason): return None requires_csrf_token = decorator_from_middleware(_EnsureCsrfToken) requires_csrf_token.__name__ = 'requires_csrf_token' requires_csrf_token.__doc__ = """ Use this decorator on views that need a correct csrf_token available to RequestContext, but without the CSRF protection that csrf_protect enforces. """ class _EnsureCsrfCookie(CsrfViewMiddleware): def _reject(self, request, reason): return None def process_view(self, request, callback, callback_args, callback_kwargs): retval = super().process_view(request, callback, callback_args, callback_kwargs) # Force process_response to send the cookie get_token(request) return retval ensure_csrf_cookie = decorator_from_middleware(_EnsureCsrfCookie) ensure_csrf_cookie.__name__ = 'ensure_csrf_cookie' ensure_csrf_cookie.__doc__ = """ Use this decorator to ensure that a view sets a CSRF cookie, whether or not it uses the csrf_token template tag, or the CsrfViewMiddleware is used. """ def csrf_exempt(view_func): """Mark a view function as being exempt from the CSRF view protection.""" # view_func.csrf_exempt = True would also work, but decorators are nicer # if they don't have side effects, so return a new function. def wrapped_view(*args, **kwargs): return view_func(*args, **kwargs) wrapped_view.csrf_exempt = True return wraps(view_func)(wrapped_view)
{ "repo_name": "Beauhurst/django", "path": "django/views/decorators/csrf.py", "copies": "124", "size": "2073", "license": "bsd-3-clause", "hash": 445920326283582900, "line_mean": 36.0178571429, "line_max": 88, "alpha_frac": 0.7366136035, "autogenerated": false, "ratio": 4.009671179883946, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import get_object_or_404 from django.utils import timezone from rest_framework import status from rest_framework.views import APIView from rest_framework.response import Response from core.models.machine_request import MachineRequest as CoreMachineRequest from core.models.cloud_admin import CloudAdministrator from core.models.provider import Provider, ProviderInstanceAction from core.models.group import IdentityMembership from service.driver import get_account_driver from service.tasks.machine import start_machine_imaging from api.permissions import ApiAuthRequired, CloudAdminRequired,\ InMaintenance from api.v1.serializers import MachineRequestSerializer,\ IdentitySerializer, AccountSerializer,\ PATCH_ProviderInstanceActionSerializer,\ POST_ProviderInstanceActionSerializer,\ ProviderInstanceActionSerializer def _get_administrator_accounts(user): return CloudAdministrator.objects.filter(user=user) def _get_administrator_account(user, admin_uuid): try: return CloudAdministrator.objects.get(uuid=admin_uuid, user=user) except CloudAdministrator.DoesNotExist: return None class CloudAdminImagingRequestList(APIView): """ Cloud Administration API for handling Imaging Requests """ permission_classes = (ApiAuthRequired, InMaintenance, CloudAdminRequired,) def get(self, request): user = request.user machine_reqs = CoreMachineRequest.objects.filter( instance__source__provider__cloudadministrator__user=user ).order_by('-start_date') serializer = MachineRequestSerializer(machine_reqs, many=True) return Response(serializer.data) class CloudAdminImagingRequest(APIView): """ This is the staff portal for machine requests A staff member can view any machine request by its ID """ permission_classes = (ApiAuthRequired, InMaintenance, CloudAdminRequired,) def get(self, request, machine_request_id, action=None): """ OPT 1 for approval: via GET with /approve or /deny This is a convenient way to approve requests remotely """ user = request.user try: machine_request = CoreMachineRequest.objects.get( instance__source__provider__cloudadministrator__user=user, id=machine_request_id) except CoreMachineRequest.DoesNotExist: return Response('No machine request with id %s' % machine_request_id, status=status.HTTP_404_NOT_FOUND) if not action: serializer = MachineRequestSerializer(machine_request) return Response(serializer.data, status=status.HTTP_200_OK) # Don't update the request unless its pending or error # Otherwise use the existing status to 'start machine imaging' if machine_request.old_status in ['error', 'pending']: machine_request.old_status = action machine_request.save() # Only run task if status is 'approve' if machine_request.old_status == 'approve': start_machine_imaging(machine_request) serializer = MachineRequestSerializer(machine_request) return Response(serializer.data, status=status.HTTP_200_OK) def patch(self, request, cloud_admin_uuid, machine_request_id, action=None): """ OPT2 for approval: sending a PATCH to the machine request with {"status":"approve/deny"} Modfiy attributes on a machine request """ user = request.user try: machine_request = CoreMachineRequest.objects.get( instance__source__provider__cloudadministrator__user=user, id=machine_request_id) except CoreMachineRequest.DoesNotExist: return Response('No machine request with id %s' % machine_request_id, status=status.HTTP_404_NOT_FOUND) data = request.data # Behavior will remove 'status' if its being updated. # Status should only be updated if denied or skipped. # Status of 'approve','continue' will use the machine_request.status # to allow restarting the request at the correct point in time. start_request = False if 'status' in data: _status = data['status'].lower() if machine_request.old_status == 'completed': return Response( "Cannot update status of 'completed' request", status=status.HTTP_409_conflict) elif _status in ['approve', 'continue']: data.pop('status') start_request = True elif _status not in ['deny', 'skip']: return Response( "Bad Status Value: %s. " "Available choices for a status update are: " "approve, continue, deny, skip") serializer = MachineRequestSerializer( machine_request, data=data, partial=True) if not serializer.is_valid(): return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST) # Only run task if status is 'approve' machine_request = serializer.save() mr_data = serializer.data if start_request: start_machine_imaging(machine_request) return Response(mr_data, status=status.HTTP_200_OK) class CloudAdminAccountList(APIView): """ This API is used to provide account management. provider_uuid -- The id of the provider whose account you want to manage. """ permission_classes = (ApiAuthRequired, InMaintenance, CloudAdminRequired,) def get(self, request): """ Return a list of ALL IdentityMemberships found on provider_uuid """ user = request.user memberships = IdentityMembership.objects.filter( identity__provider__cloudadministrator__user=user ).order_by('member__name') serializer = AccountSerializer(memberships, many=True) return Response(serializer.data, status=status.HTTP_200_OK) def post(self, request, cloud_admin_uuid): """ Passes in: Username (To apply the identity to) Credentials (Nested, will be applied to new identity) """ user = request.user data = request.data try: provider_uuid = data['provider'] provider = Provider.objects.get( cloudadministrator__user=user, uuid=provider_uuid) except KeyError: return Response( "Missing 'provider' key, Expected UUID. Received no value.", status=status.HTTP_409_conflict) except Exception: return Response( "Provider with UUID %s does not exist" % provider_uuid, status=status.HTTP_409_conflict) raise Exception driver = get_account_driver(provider) missing_args = driver.clean_credentials(data) if missing_args: raise Exception("Cannot create account. Missing credentials: %s" % missing_args) identity = driver.create_account(**data) serializer = IdentitySerializer(identity) # TODO: Account creation SHOULD return IdentityMembership NOT identity. return Response(serializer.data) class CloudAdminAccount(APIView): """ This API is used to Enable/Disable a specific identity on your Cloud Provider. """ permission_classes = (ApiAuthRequired, InMaintenance, CloudAdminRequired,) def get(self, request, username): """ Detailed view of all identities for provider,user combination. username -- The username to match identities """ user = request.user memberships = IdentityMembership.objects.filter( identity__provider__cloudadministrator__user=user, identity__created_by__username=username).order_by('member__name') serializer = AccountSerializer(memberships, many=True) return Response(serializer.data, status=status.HTTP_200_OK) class CloudAdminInstanceActionList(APIView): """ This API is used to provide account management. provider_uuid -- The id of the provider whose account you want to manage. """ def get(self, request): """ Return a list of ALL users found on provider_uuid """ p_instance_actions = ProviderInstanceAction.objects.filter( provider__cloudadministrator__user=request.user, ) serializer = ProviderInstanceActionSerializer( p_instance_actions, many=True) return Response(serializer.data, status=status.HTTP_200_OK) def post(self, request): """ Create a new "ProviderInstanceAction" """ data = request.data serializer = POST_ProviderInstanceActionSerializer(data=data) if serializer.is_valid(): new_action = serializer.save() return Response(serializer.data, status=status.HTTP_200_OK) return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST) class CloudAdminInstanceAction(APIView): """ This API is used to provide account management. provider_uuid -- The id of the provider whose account you want to manage. """ permission_classes = (ApiAuthRequired, InMaintenance, CloudAdminRequired,) def get(self, request, provider_instance_action_id): """ Return a list of ALL users found on provider_uuid """ try: p_instance_action = ProviderInstanceAction.objects.get( id=provider_instance_action_id) except ProviderInstanceAction.DoesNotExist: return Response("Bad ID", status=status.HTTP_400_BAD_REQUEST) serializer = ProviderInstanceActionSerializer(p_instance_action) return Response(serializer.data, status=status.HTTP_200_OK) def patch(self, request, provider_instance_action_id): """ Return a list of ALL users found on provider_uuid """ data = request.data try: p_instance_action = ProviderInstanceAction.objects.get( id=provider_instance_action_id) except ProviderInstanceAction.DoesNotExist: return Response("Bad ID", status=status.HTTP_400_BAD_REQUEST) serializer = PATCH_ProviderInstanceActionSerializer( p_instance_action, data=data, partial=True) if serializer.is_valid(): p_instance_action = serializer.save() return Response(serializer.data, status=status.HTTP_200_OK) return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST)
{ "repo_name": "CCI-MOC/GUI-Backend", "path": "api/v1/views/cloud_admin.py", "copies": "1", "size": "11208", "license": "apache-2.0", "hash": 661885502406507300, "line_mean": 36.2358803987, "line_max": 79, "alpha_frac": 0.6302640971, "autogenerated": false, "ratio": 4.7271193589202865, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5857383456020286, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import redirect from django.conf import settings from django.http import JsonResponse from django.utils.translation import ugettext as _ from django.contrib import messages from .models import GameControl def registration_open_required(view): """ View decorator which prohibits access to the decorated view if registration is closed from the GameControl object. """ @wraps(view) def func(request, *args, **kwargs): if not GameControl.get_instance().registration_open: messages.error(request, _('Sorry, registration is currently closed.')) return redirect(settings.HOME_URL) return view(request, *args, **kwargs) return func def registration_closed_required(view): """ View decorator which only allows access to the decorated view if registration is closed from the GameControl object. Format of the response is currently always JSON. """ @wraps(view) def func(request, *args, **kwargs): if GameControl.get_instance().registration_open: return JsonResponse({'error': 'Not available yet'}, status=404) return view(request, *args, **kwargs) return func def before_competition_required(view): """ View decorator which prohibits access to the decorated view if the competition has already begun (i.e. running or over). """ @wraps(view) def func(request, *args, **kwargs): if GameControl.get_instance().competition_started(): messages.error(request, _('Sorry, that is only possible before the competition.')) return redirect(settings.HOME_URL) return view(request, *args, **kwargs) return func def services_public_required(resp_format): """ View decorator which prohibits access to the decorated view if information about the services is not public yet. Args: resp_format: Format of the response when the competition has not yet started. Supported options are 'html' and 'json'. """ def decorator(view): @wraps(view) def func(request, *args, **kwargs): game_control = GameControl.get_instance() if game_control.are_services_public(): return view(request, *args, **kwargs) if resp_format == 'json': return JsonResponse({'error': 'Not available yet'}, status=404) else: messages.error(request, _('Sorry, the page you requested is not available yet.')) return redirect(settings.HOME_URL) return func return decorator
{ "repo_name": "fausecteam/ctf-gameserver", "path": "src/ctf_gameserver/web/scoring/decorators.py", "copies": "1", "size": "2671", "license": "isc", "hash": -905953403768192400, "line_mean": 29.3522727273, "line_max": 107, "alpha_frac": 0.6548109322, "autogenerated": false, "ratio": 4.511824324324325, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5666635256524324, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import redirect from django.contrib.auth import get_user_model from .models import Blog def create_or_edit_blog(view_func): """ The sole purpose of this decorator is to redirect bloggers/readers to appropriate view depending upon their origin of request. """ def _create_or_edit_blog_check(request, *args, **kwargs): def _response_decider(url_name): """ url_name: url_name to redirect if condition match fails. How it works: 1. Finds current url_name. 2. checks if it is okay to visit from that url 3. If okay, goes to the view_func 4. If not, redirects to appropriate view_func. """ resolved_name = request.resolver_match.url_name if resolved_name == url_name: return view_func(request, *args, **kwargs) else: return redirect('blog:' + url_name) UserModel = get_user_model() user_id = request.user.id user = UserModel.objects.select_related().get(pk=user_id) # update user instance on request with related objects to save queries. request.user = user if user.profile.is_blogger(): # only access to create/edit views when user is a blogger. try: if user.blog: # this will be always true # if user already has a blog: # user should only be able to access blog_update view. return _response_decider('blog_update') except Blog.DoesNotExist: # if user doesnt have a blog, # user should only be able to access blog_create view. return _response_decider('blog_create') else: return redirect('blog:user_blog', username=user.username) return wraps(view_func)(_create_or_edit_blog_check) def blogger_required(view_func): """ Only lets bloggers to access the supplied view and redirects readers. """ def _check_blogger_or_reader(request, *args, **kwargs): UserModel = get_user_model() user_id = request.user.id user = UserModel.objects.select_related( 'profile', 'blog').prefetch_related().get(pk=user_id) # update user instance on request with related objects to save queries. request.user = user if user.profile.is_blogger(): try: if user.blog: return view_func(request, *args, **kwargs) except Blog.DoesNotExist: return redirect('blog:blog_create') else: return redirect('blog:user_blog', username=request.user.username) return wraps(view_func)(_check_blogger_or_reader)
{ "repo_name": "v1k45/blogghar", "path": "blog/decorators.py", "copies": "1", "size": "2846", "license": "mit", "hash": 7214531260371839000, "line_mean": 35.4871794872, "line_max": 79, "alpha_frac": 0.5906535488, "autogenerated": false, "ratio": 4.2990936555891235, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 78 }
from functools import wraps from django.shortcuts import redirect from django.template.response import TemplateResponse from ...discount.forms import CheckoutDiscountForm def add_voucher_form(view): @wraps(view) def func(request, checkout): prefix = 'discount' data = {k: v for k, v in request.POST.items() if k.startswith(prefix)} voucher_form = CheckoutDiscountForm( data or None, checkout=checkout, prefix=prefix) if voucher_form.is_bound: if voucher_form.is_valid(): voucher_form.apply_discount() next_url = request.GET.get( 'next', request.META['HTTP_REFERER']) return redirect(next_url) else: del checkout.discount del checkout.voucher_code # if only discount form was used we clear post for other forms request.POST = {} else: checkout.recalculate_discount() response = view(request, checkout) if isinstance(response, TemplateResponse): voucher = voucher_form.initial.get('voucher') response.context_data['voucher_form'] = voucher_form response.context_data['voucher'] = voucher return response return func def remove_voucher_view(request, checkout): next_url = request.GET.get('next', request.META['HTTP_REFERER']) del checkout.discount del checkout.voucher_code return redirect(next_url)
{ "repo_name": "laosunhust/saleor", "path": "saleor/checkout/views/discount.py", "copies": "4", "size": "1511", "license": "bsd-3-clause", "hash": 327912338459951600, "line_mean": 34.9761904762, "line_max": 78, "alpha_frac": 0.6201191264, "autogenerated": false, "ratio": 4.457227138643068, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.707734626504307, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import render from django.http import HttpResponse from django.http.response import HttpResponseBase import weasyprint def pdf_response(template_name): """Returns either an HTML or PDF representation of the data that decorated function generates. Decision on format is based on "format" param in the query string, default is "html". For PDF print CSS is used""" def pdf_decorator(func): @wraps(func) def func_wrapper(request, *args, **kwargs): context = func(request, *args, **kwargs) if isinstance(context, HttpResponseBase): return context if request.GET.get('format', 'html') == 'pdf': context["disable_css"] = True html = render(request, template_name, context).content base_url = request.build_absolute_uri("/") pdf = weasyprint.HTML( string=html, base_url=base_url).write_pdf() response = HttpResponse(content=pdf, content_type='application/pdf') if "filename" in context: response['Content-Disposition'] = ( 'attachment; filename=%s.pdf' % context["filename"]) else: response['Content-Disposition'] = 'attachment' return response else: return render(request, template_name, context) return func_wrapper return pdf_decorator
{ "repo_name": "dchaplinsky/pep.org.ua", "path": "pepdb/core/pdf.py", "copies": "1", "size": "1568", "license": "mit", "hash": -133460144495013970, "line_mean": 34.6363636364, "line_max": 79, "alpha_frac": 0.5797193878, "autogenerated": false, "ratio": 4.930817610062893, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.6010536997862893, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import render from django.shortcuts import render_to_response from django.views.generic.base import View from django.shortcuts import HttpResponseRedirect from models import * from forms import * # Create your views here. def check_login(func): @wraps(func) def decorate(self, request, *args, **kwargs): if not request.session.get('account', None): return HttpResponseRedirect('/') else: return func(self, request, *args, **kwargs) return decorate class BaseView(View): pass class IndexView(BaseView): def get(self, request): return render_to_response('index.html') class StartView(BaseView): def get(self, request): return render(request, 'choose.html') def post(self, request): return HttpResponseRedirect('/resume/%s' % request.session['account']) class LoginView(BaseView): def get(self, request): ''' before qq login finished this method just for test. :param request: :return: ''' account = "9527" request.session["account"] = account IDMap.objects.update_or_create(openid=account, name="") return HttpResponseRedirect('/resume/%s' % account) class LogoutView(BaseView): def get(self, request): request.session["account"] = None return HttpResponseRedirect('/') class ListView(BaseView): @check_login def get(self, request, pageid): return render_to_response('list.html') class SorryView(BaseView): @check_login def get(self, request): return render_to_response('sorry.html') class UserView(BaseView): @check_login def get(self, request, id): return render(request, 'user.html') @check_login def post(self, request, id): form = UserForm(request.POST, request.FILES) if form.is_valid(): IDMap.objects.update(openid=id, name=form.cleaned_data['name']) account = IDMap.objects.get(openid=id) User.objects.update_or_create( account=account, password=form.cleaned_data['password'], photo=request.FILES['photo']) return render(request, 'user.html') class ResumeView(BaseView): @check_login def get(self, request, id): return render(request, 'edit.html') @check_login def post(self, request, id): form = ResumeForm(request.POST) if form.is_valid(): user = IDMap.objects.get(openid=id) style = Style.objects.get(id=form.cleaned_data['style']) resume = Resume(user=user, title=form.cleaned_data['title'], language=form.cleaned_data['language'], style=style, is_open=form.cleaned_data['is_open'], content=form.cleaned_data['content']) resume.save() return render(request, 'edit.html') @check_login def delete(self, request, id): pass class ExportView(BaseView): @check_login def post(self, request): pass class Preview(BaseView): @check_login def get(self, request, id): return render_to_response('show.html')
{ "repo_name": "xsank/aijianli", "path": "matrix/views.py", "copies": "1", "size": "3341", "license": "mit", "hash": -6948940851726694000, "line_mean": 23.7481481481, "line_max": 78, "alpha_frac": 0.6040107752, "autogenerated": false, "ratio": 4.059538274605103, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5163549049805103, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import render def render_to(template=None, content_type=None): """ Decorator for Django views that sends returned dict to render_to_response function. Template name can be decorator parameter or TEMPLATE item in returned dictionary. If view doesn't return dict then decorator simply returns output. Parameters: - template: template name to use - content_type: content type to send in response headers Examples: # 1. Template name in decorator parameters @render_to('template.html') def foo(request): bar = Bar.object.all() return {'bar': bar} # equals to def foo(request): bar = Bar.object.all() return render_to_response('template.html', {'bar': bar}) # 2. Template name as TEMPLATE item value in return dictionary. if TEMPLATE is given then its value will have higher priority than render_to argument. @render_to() def foo(request, category): template_name = '%s.html' % category return {'bar': bar, 'TEMPLATE': template_name} #equals to def foo(request, category): template_name = '%s.html' % category return render_to_response(template_name, {'bar': bar}) """ def renderer(function): @wraps(function) def wrapper(request, *args, **kwargs): output = function(request, *args, **kwargs) if output and not isinstance(output, dict): return output else: return render(request, output and output.get('TEMPLATE') or template, output, content_type=content_type ) return wrapper return renderer
{ "repo_name": "michaelmior/pylinks", "path": "pylinks/main/decorators.py", "copies": "1", "size": "1796", "license": "mit", "hash": -4070738289071998000, "line_mean": 28.4426229508, "line_max": 77, "alpha_frac": 0.609688196, "autogenerated": false, "ratio": 4.616966580976864, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5726654776976864, "avg_score": null, "num_lines": null }
from functools import wraps from django.shortcuts import render_to_response from django.http import HttpResponse def render_to(template=None, mobile_template=None, mimetype=None): """ Based upon django-annoying: https://bitbucket.org/offline/django-annoying/ Decorator for Django views that sends returned dict to render_to_response function. Template name can be decorator parameter or TEMPLATE item in returned dictionary. RequestContext always added as context instance. If view doesn't return dict then decorator simply returns output. Parameters: - template: template name to use - mobile_template: template used when device is mobile device - mimetype: content type to send in response headers """ def renderer(function): @wraps(function) def wrapper(request, *args, **kwargs): output = function(request, *args, **kwargs) if not isinstance(output, dict): return output if request.browser_info.get('ismobiledevice') and not request.session.get('force_desktop_version'): template = mobile_template tmpl = output.pop('TEMPLATE', template) return render_to_response(tmpl, output, \ context_instance=RequestContext(request), mimetype=mimetype) return wrapper return renderer
{ "repo_name": "jamespacileo/django-smartagent", "path": "smartagent/decorators.py", "copies": "1", "size": "1382", "license": "mit", "hash": 1948195469947212300, "line_mean": 39.6764705882, "line_max": 111, "alpha_frac": 0.6808972504, "autogenerated": false, "ratio": 4.866197183098592, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.004250735734556682, "num_lines": 34 }
from functools import wraps from django.shortcuts import render_to_response from django.template import RequestContext from django.conf import settings from django.template import Context, Template from django.utils.encoding import smart_unicode from django import http from django.template.context import get_standard_processors from turbion.bits.utils.title import gen_title __all__ = ["status", "paged", "templated", "titled", "special_titled"] class LocalRequestContext(Context): def __init__(self, request, dict=None, processors=None): Context.__init__(self, dict) if processors is None: processors = () else: processors = tuple(processors) for processor in get_standard_processors(): self.update(processor(request)) for processor in processors: self.update(processor(request, self)) class PageMeta(object): def __init__(self, request, context, template=None): self.request = request self.context = context self.template = template self.processors = [] self.status_code = 200 def __getitem__(self, name): return self.context[name] def add_processor(self, processor): self.processors.append(processor) def __setitem__(self, name, value): self.context[name] = value def get(self, name, default=None): return self.context.get(name, default) def update(self, data): self.content.update(data) def render_to_response(self, template=None): context = LocalRequestContext(self.request, self.context, self.processors ) if not template: template = self.template response = render_to_response(template, context_instance=context ) response.status_code = self.status_code return response def ensure_meta(request, response): if isinstance(response, (tuple, list)): return PageMeta( request=request, context =response[0], template=response[1]) elif isinstance(response, dict): return PageMeta(request=request, context=response) return response def status(code=200): def _wrapper(func): @wraps(func) def _decor(request, *args, **kwargs): meta = ensure_meta(request, func(request, *args, **kwargs)) if isinstance(meta, PageMeta): meta.status_code = code return meta return _decor return _wrapper def templated(template=None): def _wrapper(func): @wraps(func) def _decor(request, *args, **kwargs): meta = ensure_meta(request, func(request, *args, **kwargs)) if isinstance(meta, PageMeta): return meta.render_to_response(template) return meta return _decor return _wrapper def titled(**bits): def _wrapper(func): @wraps(func) def _decor(request, *args, **kwargs): def _title_processor(request, context): defaults = {"site" : request.META['SERVER_NAME']} defaults.update(bits) pattern = gen_title(defaults) template = Template(pattern) title = template.render(context) return {"page_title": title} meta = ensure_meta(request, func(request, *args, **kwargs)) if isinstance(meta, PageMeta): meta.add_processor(_title_processor) return meta return _decor return _wrapper def special_titled(**default): def another_wrapper(**bits): my_default = default.copy() my_default.update(bits) return titled(**my_default) return another_wrapper def paged(view_func): @wraps(view_func) def _decor(request, *args, **kwargs): request.page = request.GET.get('page', 1) return view_func(request, *args, **kwargs) return _decor
{ "repo_name": "strogo/turbion", "path": "turbion/bits/utils/decorators.py", "copies": "1", "size": "4135", "license": "bsd-3-clause", "hash": 3978545124414290000, "line_mean": 31.0542635659, "line_max": 71, "alpha_frac": 0.5888754534, "autogenerated": false, "ratio": 4.413020277481324, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.00426861199521943, "num_lines": 129 }
from functools import wraps from django.template.loader import render_to_string from django.core.mail import send_mail as django_send_mail from django.conf import settings from django.contrib.auth import get_user_model from django.db.models import Q from django.shortcuts import redirect from django.utils.translation import ugettext as _ from modelcluster.fields import ParentalKey from wagtail.wagtailcore.models import Page, PageRevision, GroupPagePermission from wagtail.wagtailusers.models import UserProfile from wagtail.utils.compat import get_related_model def get_object_usage(obj): "Returns a queryset of pages that link to a particular object" pages = Page.objects.none() # get all the relation objects for obj relations = type(obj)._meta.get_all_related_objects( include_hidden=True, include_proxy_eq=True ) for relation in relations: related_model = get_related_model(relation) # if the relation is between obj and a page, get the page if issubclass(related_model, Page): pages |= Page.objects.filter( id__in=related_model._base_manager.filter(**{ relation.field.name: obj.id }).values_list('id', flat=True) ) else: # if the relation is between obj and an object that has a page as a # property, return the page for f in related_model._meta.fields: if isinstance(f, ParentalKey) and issubclass(f.rel.to, Page): pages |= Page.objects.filter( id__in=related_model._base_manager.filter( **{ relation.field.name: obj.id }).values_list(f.attname, flat=True) ) return pages def users_with_page_permission(page, permission_type, include_superusers=True): # Get user model User = get_user_model() # Find GroupPagePermission records of the given type that apply to this page or an ancestor ancestors_and_self = list(page.get_ancestors()) + [page] perm = GroupPagePermission.objects.filter(permission_type=permission_type, page__in=ancestors_and_self) q = Q(groups__page_permissions=perm) # Include superusers if include_superusers: q |= Q(is_superuser=True) return User.objects.filter(is_active=True).filter(q).distinct() def permission_denied(request): """Return a standard 'permission denied' response""" from wagtail.wagtailadmin import messages messages.error(request, _('Sorry, you do not have permission to access this area.')) return redirect('wagtailadmin_home') def permission_required(permission_name): """ Replacement for django.contrib.auth.decorators.permission_required which returns a more meaningful 'permission denied' response than just redirecting to the login page. (The latter doesn't work anyway because Wagtail doesn't define LOGIN_URL...) """ # Construct and return a decorator function specific to the permission name # that has been passed in def decorator(view_func): # decorator takes the view function, and returns the view wrapped in # a permission check @wraps(view_func) def wrapped_view_func(request, *args, **kwargs): if request.user.has_perm(permission_name): # permission check succeeds; run the view function as normal return view_func(request, *args, **kwargs) else: # permission check failed return permission_denied(request) return wrapped_view_func return decorator def any_permission_required(*perms): """ Decorator that accepts a list of permission names, and allows the user to pass if they have *any* of the permissions in the list """ # Construct and return a decorator function specific to the permission list # that has been passed in def decorator(view_func): # decorator takes the view function, and returns the view wrapped in # a permission check @wraps(view_func) def wrapped_view_func(request, *args, **kwargs): for perm in perms: if request.user.has_perm(perm): # permission check succeeds; run the view function as normal return view_func(request, *args, **kwargs) # if we get here, none of the permission checks have passed return permission_denied(request) return wrapped_view_func return decorator def send_mail(subject, message, recipient_list, from_email=None, **kwargs): if not from_email: if hasattr(settings, 'WAGTAILADMIN_NOTIFICATION_FROM_EMAIL'): from_email = settings.WAGTAILADMIN_NOTIFICATION_FROM_EMAIL elif hasattr(settings, 'DEFAULT_FROM_EMAIL'): from_email = settings.DEFAULT_FROM_EMAIL else: from_email = 'webmaster@localhost' return django_send_mail(subject, message, from_email, recipient_list, **kwargs) def send_notification(page_revision_id, notification, excluded_user_id): # Get revision revision = PageRevision.objects.get(id=page_revision_id) # Get list of recipients if notification == 'submitted': # Get list of publishers recipients = users_with_page_permission(revision.page, 'publish') elif notification in ['rejected', 'approved']: # Get submitter recipients = [revision.user] else: return # Get list of email addresses email_addresses = [ recipient.email for recipient in recipients if recipient.email and recipient.id != excluded_user_id and getattr( UserProfile.get_for_user(recipient), notification + '_notifications' ) ] # Return if there are no email addresses if not email_addresses: return # Get email subject and content template = 'wagtailadmin/notifications/' + notification + '.html' rendered_template = render_to_string(template, dict(revision=revision, settings=settings)).split('\n') email_subject = rendered_template[0] email_content = '\n'.join(rendered_template[1:]) # Send email send_mail(email_subject, email_content, email_addresses)
{ "repo_name": "serzans/wagtail", "path": "wagtail/wagtailadmin/utils.py", "copies": "1", "size": "6366", "license": "bsd-3-clause", "hash": -421064001848345200, "line_mean": 35.3771428571, "line_max": 107, "alpha_frac": 0.6564561734, "autogenerated": false, "ratio": 4.402489626556017, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5558945799956017, "avg_score": null, "num_lines": null }
from functools import wraps from django.test import SimpleTestCase from django.test.utils import override_settings from .. import config __all__ = ('override_config',) class override_config(override_settings): """ Decorator to modify constance setting for TestCase. Based on django.test.utils.override_settings. """ def __init__(self, **kwargs): super().__init__(**kwargs) self.original_values = {} def __call__(self, test_func): """ Modify the decorated function to override config values. """ if isinstance(test_func, type): if not issubclass(test_func, SimpleTestCase): raise Exception( "Only subclasses of Django SimpleTestCase can be " "decorated with override_config") return self.modify_test_case(test_func) else: @wraps(test_func) def inner(*args, **kwargs): with self: return test_func(*args, **kwargs) return inner def modify_test_case(self, test_case): """ Override the config by modifying TestCase methods. This method follows the Django <= 1.6 method of overriding the _pre_setup and _post_teardown hooks rather than modifying the TestCase itself. """ original_pre_setup = test_case._pre_setup original_post_teardown = test_case._post_teardown def _pre_setup(inner_self): self.enable() original_pre_setup(inner_self) def _post_teardown(inner_self): original_post_teardown(inner_self) self.disable() test_case._pre_setup = _pre_setup test_case._post_teardown = _post_teardown return test_case def enable(self): """ Store original config values and set overridden values. """ # Store the original values to an instance variable for config_key in self.options: self.original_values[config_key] = getattr(config, config_key) # Update config with the overriden values self.unpack_values(self.options) def disable(self): """ Set original values to the config. """ self.unpack_values(self.original_values) @staticmethod def unpack_values(options): """ Unpack values from the given dict to config. """ for name, value in options.items(): setattr(config, name, value)
{ "repo_name": "jazzband/django-constance", "path": "constance/test/unittest.py", "copies": "1", "size": "2533", "license": "bsd-3-clause", "hash": -6346062528089096000, "line_mean": 28.8, "line_max": 78, "alpha_frac": 0.5906040268, "autogenerated": false, "ratio": 4.588768115942029, "config_test": true, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 85 }
from functools import wraps from django.test import TestCase from django.test.utils import override_settings from django.core.urlresolvers import reverse from profiles.models import AgdaUser from mdr.models import MDRScanJob fake_slug = 'asdfasdfasdfasdfasdf' def with_two_jobs(orig): @wraps(orig) def wrapper(self): self._job1 = MDRScanJob.objects.create(name='Egg number one', status=10, scheduler_id=12) self._job2 = MDRScanJob.objects.create(name='Egg number two') self._job2.user = self.user self._job2.save() orig(self) # Cleanup for job in self._job1, self._job2: if MDRScanJob.objects.filter(pk=job.id).exists: job.delete() return wrapper @override_settings(LOGGING={'handlers': {'development': {'level': 'ERROR'}}}) class TestJobViews(TestCase): def setUp(self): self.user = AgdaUser.objects.create_user('test@example.com', password='asdf') def login(self): self.client.login(username='test@example.com', password='asdf') @property def job1(self): if MDRScanJob.objects.filter(pk=self._job1.id).exists: return MDRScanJob.objects.get(pk=self._job1.id) return None @property def job2(self): if MDRScanJob.objects.filter(pk=self._job2.id).exists: return MDRScanJob.objects.get(pk=self._job2.id) return None def test_list_jobs_when_not_logged_in(self): url = reverse("jobs.views.list_jobs") response = self.client.get(url) self.assertEquals(response.status_code, 302) @with_two_jobs def test_list_jobs_when_logged_in(self): self.login() response = self.client.get(reverse("jobs.views.list_jobs")) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Egg number two') @with_two_jobs def test_view_job_when_not_logged_in(self): url = reverse("jobs.views.show_results", args=[self.job1.slug]) response = self.client.get(url) self.assertContains(response, 'Egg number one') url = reverse("jobs.views.show_results", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Egg number two') self.assertNotContains(response, 'Take') @with_two_jobs def test_view_job_when_logged_in(self): self.login() url = reverse("jobs.views.show_results", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Egg number one') self.assertContains(response, 'Take') url = reverse("jobs.views.show_results", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Egg number two') self.assertNotContains(response, 'Take') @with_two_jobs def test_get_unexisting_job(self): url = reverse("jobs.views.show_results", args=[fake_slug]) response = self.client.get(url) self.assertEquals(response.status_code, 404) @with_two_jobs def test_delete_job_when_not_logged_in(self): url = reverse("jobs.views.delete_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Confirm job deletion') response = self.client.post(url) self.assertEquals(response.status_code, 302) url = reverse("jobs.views.delete_job", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'This job is not yours') response = self.client.post(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'This job is not yours') @with_two_jobs def test_delete_job_when_logged_in(self): self.login() url = reverse("jobs.views.delete_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Confirm job deletion') response = self.client.post(url) self.assertEquals(response.status_code, 302) url = reverse("jobs.views.delete_job", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Confirm job deletion') response = self.client.post(url) self.assertEquals(response.status_code, 302) @with_two_jobs def test_show_deleted_job(self): url = reverse("jobs.views.delete_job", args=[self.job1.slug]) url_show = reverse("jobs.views.show_results", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Confirm job deletion') self.assertEquals(self.job1.is_alive, True) response = self.client.post(url) self.assertEquals(response.status_code, 302) self.assertEquals(self.job1.is_alive, False) response = self.client.get(url_show) self.assertEquals(response.status_code, 404) @with_two_jobs def test_delete_deleted_job(self): url = reverse("jobs.views.delete_job", args=[self.job1.slug]) response = self.client.post(url) self.assertEquals(response.status_code, 302) self.assertEquals(self.job1.is_alive, False) response = self.client.get(url) self.assertEquals(response.status_code, 404) response = self.client.post(url) self.assertEquals(response.status_code, 404) @with_two_jobs def test_take_job(self): self.login() url = reverse("jobs.views.take_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, 'Take ownership of job') self.assertEquals(self.job1.user, None) response = self.client.post(url) self.assertEquals(response.status_code, 302) self.assertEquals(self.job1.user, self.user) @with_two_jobs def test_take_deleted_job(self): self.login() url = reverse("jobs.views.delete_job", args=[self.job1.slug]) response = self.client.post(url) self.assertEquals(response.status_code, 302) self.assertEquals(self.job1.is_alive, False) url = reverse("jobs.views.take_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 404) response = self.client.post(url) self.assertEquals(response.status_code, 404) @with_two_jobs def test_rename_job_anonymous(self): url = reverse("jobs.views.rename_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, "This job is not yours.") response = self.client.post(url, {'name': 'Egg number 88'}) self.assertEquals(response.status_code, 200) self.assertContains(response, "This job is not yours.") self.assertEquals(self.job1.name, 'Egg number one') url = reverse("jobs.views.rename_job", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, "This job is not yours.") response = self.client.post(url, {'name': 'Egg number 88'}) self.assertEquals(response.status_code, 200) self.assertContains(response, "This job is not yours.") self.assertEquals(self.job2.name, 'Egg number two') @with_two_jobs def test_rename_job_logged_in(self): self.login() url = reverse("jobs.views.rename_job", args=[self.job1.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertContains(response, "This job is not yours.") url = reverse("jobs.views.rename_job", args=[self.job2.slug]) response = self.client.get(url) self.assertEquals(response.status_code, 200) self.assertNotContains(response, "This job is not yours.") response = self.client.post(url, {'name': 'Egg number 3'}) self.assertEquals(response.status_code, 302) self.assertEquals(self.job2.name, 'Egg number 3') @with_two_jobs def test_delete_jobs_anonymous(self): url = reverse("jobs.views.delete_jobs") response = self.client.get(url) self.assertEquals(response.status_code, 302) response = self.client.post(url, {'slug': [self.job1.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'The jobs have been deleted') response = self.client.post(url, {'slug': [self.job2.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'You cannot delete jobs that belong to someone else.') response = self.client.post(url, {'slug': [self.job1.slug, self.job2.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'You cannot delete jobs that belong to someone else.') response = self.client.post(url, {'slug': [self.job1.slug, self.job2.slug, fake_slug]}) self.assertEquals(response.status_code, 404) @with_two_jobs def test_delete_jobs_logged_in(self): self.login() url = reverse("jobs.views.delete_jobs") response = self.client.get(url) self.assertEquals(response.status_code, 302) response = self.client.post(url, {'slug': [self.job1.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'The jobs have been deleted') response = self.client.post(url, {'slug': [self.job2.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'The jobs have been deleted') response = self.client.post(url, {'slug': [self.job1.slug, self.job2.slug]}) self.assertEquals(response.status_code, 302) response = self.client.get('/') self.assertContains(response, 'The jobs have been deleted') response = self.client.post(url, {'slug': [self.job1.slug, self.job2.slug, fake_slug]}) self.assertEquals(response.status_code, 404)
{ "repo_name": "BILS/agda", "path": "agda/jobs/test_views.py", "copies": "1", "size": "10813", "license": "mit", "hash": 1680457305987761200, "line_mean": 37.4804270463, "line_max": 97, "alpha_frac": 0.6492185332, "autogenerated": false, "ratio": 3.654275092936803, "config_test": true, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.980193312595795, "avg_score": 0.0003121000357705426, "num_lines": 281 }
from functools import wraps from django.urls import reverse def get_urlname(obj): app_label, model_name = obj._meta.app_label, obj._meta.model_name return u'admin:{}_{}_change'.format(app_label, model_name) def link_list(urlname=None, short_description=None): """ Decorates a modeladmin method to display a list of related links. :param urlname: optional, by default it will take the related objects change url :param short_description: text to use as column header, optional Usage: >>> class MyAdmin(admin.ModelAdmin): list_display = ('related_objects',) @link_list('admin:myapp_relatedobject_change', short_description='my related objects') def related_objects(self, obj): return obj.relatedobject_set.all() The ModelAdmin method then returns a comma-separated list of clickable links. """ def decorator(method): method.allow_tags = True if short_description: method.short_description = short_description @wraps(method) def f(*args, **kwargs): related_qs = method(*args, **kwargs) return u', '.join( [u'<a href="{}">{}</a>'.format( reverse(urlname or get_urlname(rel), args=[rel.pk]), rel ) for rel in related_qs]) return f return decorator
{ "repo_name": "Clarity-89/clarityv2", "path": "src/clarityv2/utils/admin/decorators.py", "copies": "1", "size": "1418", "license": "mit", "hash": 4271953238066841000, "line_mean": 31.976744186, "line_max": 98, "alpha_frac": 0.6057827927, "autogenerated": false, "ratio": 4.220238095238095, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5326020887938094, "avg_score": null, "num_lines": null }
from functools import wraps from django.utils.decorators import available_attrs from django.template.loader import render_to_string from django.template.response import RequestContext, SimpleTemplateResponse class BasicWidget(object): render_template = 'filters/widget.html' def __init__(self, extra={}, template=None): self.template = template if template else self.render_template self.extra = extra def render(self, request): return render_to_string(self.template, self.extra, context_instance=RequestContext(request)) def modify_queryset(self, request, queryset, data): return queryset class ContainerWidget(BasicWidget): def __init__(self, widgets, extra={}, template=None): super(ContainerWidget, self).__init__(extra, template) self.widgets = widgets def render(self, request): rendered = [] for widget in self.widgets: rendered.append((widget, widget.render(request))) self.extra['widgets'] = rendered return super(ContainerWidget, self).render(request) def modify_queryset(self, request, queryset, data): for widget in self.widgets: queryset = widget.modify_queryset(request, queryset, data) return queryset class SortWidget(BasicWidget): render_template = 'filters/sort_widget.html' sort_variable = 'sort' def __init__(self, params, default, extra={}, template=None, sort_variable=None): super(SortWidget, self).__init__(extra, template) self.sort_var = sort_variable if sort_variable else self.sort_variable self.params = params self.default = default self.extra['sort_params'] = self.params self.extra['sort_default'] = self.default def modify_queryset(self, request, queryset, data): sort = data.get(self.sort_var, self.default) if sort not in self.params: sort = self.default self.extra['sort_current'] = sort ordering = self.params[sort][0] if callable(ordering): return ordering(queryset) return queryset.order_by(ordering).distinct() class BaseFilterWidget(BasicWidget): render_template = 'filters/filter_widget.html' def __init__(self, name, default, extra={}, template=None): super(BaseFilterWidget, self).__init__(extra, template) self.name = name self.default = default self.extra['name'] = self.name self.extra['default'] = default def get_current_state(self, request, data): return data.get(self.name, self.default) def filter_queryset(self, request, queryset, state): return queryset def modify_queryset(self, request, queryset, data): state = self.get_current_state(request, data) return self.filter_queryset(request, queryset, state) class FieldFilterWidget(BaseFilterWidget): render_template = 'filters/field_filter.html' def __init__(self, name, default, field_name, field_id, extra={}, template=None): super(FieldFilterWidget, self).__init__(name, default, extra, template) self.field_name = field_name self.field_id = field_id def filter_queryset(self, request, queryset, state): # TODO: This stuff is temprorary, while I'll figure out how it should be field = queryset.model.__dict__[self.field_name].field parent_model = field.related.parent_model self.extra['choices'] = parent_model.objects.filter(**{field.related_query_name() + '__in': queryset}).distinct() self.extra['current'] = state if state: return queryset.filter(**{self.field_name + '__' + self.field_id: state}) return queryset class OneChooseFilterWidget(BasicWidget): render_template = 'filters/one_choose_filter.html' class ManyChooseFilterWidget(BasicWidget): render_template = 'filters/many_choose_filter.html' class AnyFilterWidget(BasicWidget): render_template = 'filters/any_filter.html' def __init__(self, params, extra={}, template=None): super(AnyFilterWidget, self).__init__(extra, template) self.params = params self.extra['filter_params'] = self.params def modify_queryset(self, request, queryset, data): return queryset class FilterContainerWidget(ContainerWidget): render_template = 'filters/filter_container.html' FILTER_TYPES = { 'field': FieldFilterWidget, 'one_choose': OneChooseFilterWidget, 'simple': OneChooseFilterWidget, 'many_choose': ManyChooseFilterWidget, 'any': AnyFilterWidget, } def generate_filter(conf): filter_type = conf.pop('type', 'simple') if filter_type in FILTER_TYPES: return FILTER_TYPES[filter_type](**conf) return None def generate_modifiers(conf): result = {} if 'sort' in conf: result['sort'] = SortWidget(**conf['sort']) if 'filter' in conf: result['filters'] = generate_filter(conf['filter']) if 'filters' in conf: filters = [] for filter in conf['filters']: filters.append(generate_filter(filter)) result['filters'] = FilterContainerWidget(filters) return result
{ "repo_name": "ProstoKSI/django-filters", "path": "filters/widgets.py", "copies": "1", "size": "5199", "license": "mit", "hash": -6724157195555631000, "line_mean": 32.3269230769, "line_max": 121, "alpha_frac": 0.662819773, "autogenerated": false, "ratio": 4.080847723704866, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.007507041565574997, "num_lines": 156 }
from functools import wraps from django.utils.decorators import available_attrs from django.template.response import SimpleTemplateResponse from filters.widgets import generate_modifiers def modify_queryset(conf, var_name='list'): """ Example of usage: @to_template('template.html') @modify_queryset({ 'sort': { 'list': { 'var1': ('var1', _('Var 1 up')), 'var1_rev': ('-var1', _('Var 1 down')), }, 'default': 'var1', 'template': 'filters/sort_widget.html', }, 'filters': {}, }) def my_view(request): return {'list': MyModel.objects.all()} Better usage: @modify_queryset(settings.MYVIEW_CHANGE_VIEW) def my_view(request): return TemplateRender('template.html', {'list': MyModel.objects.all()}) And somewhere in settings: MYVIEW_CHANGE_VIEW = { 'sort': { 'var_dict': {}, 'default': 'var1', 'extra': { 'wtf': '1', }, 'template': 'filters/sort_widget.html', }, 'filters': {} } """ modifiers = generate_modifiers(conf) def decorator(view_func): def _wrapped_view(request, *args, **kwargs): result = view_func(request, *args, **kwargs) if isinstance(result, dict) or isinstance(result, SimpleTemplateResponse): data = request.GET.copy() data.update(request.POST) rendered = {} context = result if isinstance(result, dict) else result.context_data for name, modifier in modifiers.items(): context[var_name] = modifier.modify_queryset(request, context[var_name], data) for name, modifier in modifiers.items(): rendered[name] = modifier.render(request) context['modifiers'] = rendered return result return wraps(view_func, assigned=available_attrs(view_func))(_wrapped_view) return decorator
{ "repo_name": "ProstoKSI/django-filters", "path": "filters/decorators.py", "copies": "1", "size": "2201", "license": "mit", "hash": 8780411374258164000, "line_mean": 35.0819672131, "line_max": 98, "alpha_frac": 0.5197637438, "autogenerated": false, "ratio": 4.556935817805383, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.018247431144613892, "num_lines": 61 }
from functools import wraps from django.utils.decorators import available_attrs from cacheback.function import FunctionJob def cacheback(lifetime=None, fetch_on_miss=None, job_class=None, task_options=None, **job_class_kwargs): """ Decorate function to cache its return value. :lifetime: How long to cache items for :fetch_on_miss: Whether to perform a synchronous fetch when no cached result is found :job_class: The class to use for running the cache refresh job. Defaults using the FunctionJob. :job_class_kwargs: Any extra kwargs to pass to job_class constructor. Useful with custom job_class implementations. """ if job_class is None: job_class = FunctionJob job = job_class(lifetime=lifetime, fetch_on_miss=fetch_on_miss, task_options=task_options, **job_class_kwargs) def _wrapper(fn): # using available_attrs to work around http://bugs.python.org/issue3445 @wraps(fn, assigned=available_attrs(fn)) def __wrapper(*args, **kwargs): return job.get(fn, *args, **kwargs) # Assign reference to unwrapped function so that we can access it # later without descending into infinite regress. __wrapper.fn = fn # Assign reference to job so we can use the full Job API __wrapper.job = job return __wrapper return _wrapper
{ "repo_name": "jayfk/django-cacheback", "path": "cacheback/decorators.py", "copies": "5", "size": "1455", "license": "mit", "hash": 7580465361136172000, "line_mean": 37.2894736842, "line_max": 79, "alpha_frac": 0.6487972509, "autogenerated": false, "ratio": 4.24198250728863, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 38 }
from functools import wraps from django.utils.decorators import available_attrs from .jobs import FunctionJob def cacheback(lifetime=None, fetch_on_miss=None, cache_alias=None, job_class=None, task_options=None, **job_class_kwargs): """ Decorate function to cache its return value. :lifetime: How long to cache items for :fetch_on_miss: Whether to perform a synchronous fetch when no cached result is found :cache_alias: The Django cache alias to store the result into. :job_class: The class to use for running the cache refresh job. Defaults using the FunctionJob. :job_class_kwargs: Any extra kwargs to pass to job_class constructor. Useful with custom job_class implementations. """ if job_class is None: job_class = FunctionJob job = job_class(lifetime=lifetime, fetch_on_miss=fetch_on_miss, cache_alias=cache_alias, task_options=task_options, **job_class_kwargs) def _wrapper(fn): # using available_attrs to work around http://bugs.python.org/issue3445 @wraps(fn, assigned=available_attrs(fn)) def __wrapper(*args, **kwargs): return job.get(fn, *args, **kwargs) # Assign reference to unwrapped function so that we can access it # later without descending into infinite regress. __wrapper.fn = fn # Assign reference to job so we can use the full Job API __wrapper.job = job return __wrapper return _wrapper
{ "repo_name": "mitchelljkotler/django-cacheback", "path": "cacheback/decorators.py", "copies": "1", "size": "1572", "license": "mit", "hash": 8640025893309128000, "line_mean": 38.3, "line_max": 79, "alpha_frac": 0.6450381679, "autogenerated": false, "ratio": 4.225806451612903, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5370844619512902, "avg_score": null, "num_lines": null }
from functools import wraps from django.utils.decorators import available_attrs from rtime.utils import add_frame_data def request_wrapper(meth): @wraps(meth, assigned=available_attrs(meth)) def process_request(request): res = meth(request) if res is not None: m_class = meth.__self__.__class__ request.view = '{}.{}.process_request'.format( m_class.__module__, m_class.__name__ ) return res return process_request def view_wrapper(meth): @wraps(meth, assigned=available_attrs(meth)) def process_view(request, *args, **kwargs): res = meth(request, *args, **kwargs) if res is not None: m_class = meth.__self__.__class__ request.view = '{}.{}.process_view'.format( m_class.__module__, m_class.__name__ ) return res return process_view def exception_wrapper(meth): @wraps(meth, assigned=available_attrs(meth)) def process_exception(request, exception): res = meth(request, exception) if res is not None: m_class = meth.__self__.__class__ request.view = '{}.{}.process_exception'.format( m_class.__module__, m_class.__name__ ) return res return process_exception def template_response_wrapper(meth): @wraps(meth, assigned=available_attrs(meth)) def process_template_response(request, response): current_status = response.status_code res = meth(request, response) if res is not None: if current_status != res.status_code: m_class = meth.__self__.__class__ request.view = '{}.{}.process_template_response'.format( m_class.__module__, m_class.__name__ ) return res return process_template_response def response_wrapper(meth): @wraps(meth, assigned=available_attrs(meth)) def process_response(request, response): current_status = response.status_code res = meth(request, response) if res is not None: if current_status != res.status_code: m_class = meth.__self__.__class__ request.view = '{}.{}.process_response'.format( m_class.__module__, m_class.__name__ ) return res return process_response def execute(self, sql, params=None): add_frame_data(query=sql, query_params=params) return self._execute(sql, params)
{ "repo_name": "amitu/rtime", "path": "src/djrtime/djrtime/wrappers.py", "copies": "1", "size": "2539", "license": "bsd-3-clause", "hash": 5993170580413778000, "line_mean": 31.1392405063, "line_max": 72, "alpha_frac": 0.5750295392, "autogenerated": false, "ratio": 4.155482815057283, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5230512354257283, "avg_score": null, "num_lines": null }
from functools import wraps from django.utils.decorators import available_attrs from .toolbox import auth_handler_response def oauth_required(scope: str = None, scope_auto: bool = False): """Views decorator checking user oauth token. :param scope: scope identifier string to check token has access to the scope. :param scope_auto: if *True* scope identifier will be built automatically using the following format: '<application_name>:<decorated_view_name>'. E.g.: for application named *polls* and having *detail* view scope would be *polls:detail*. """ def decorated_view(view_function): @wraps(view_function, assigned=available_attrs(view_function)) def wrapper(request, *args, **kwargs): target_scope = scope if scope_auto: target_scope = '%(app_name)s:%(view_name)s' % { 'app_name': view_function.__module__.split('.')[0], 'view_name': view_function.__name__} return auth_handler_response(request, scope=target_scope) or view_function(request, *args, **kwargs) return wrapper return decorated_view
{ "repo_name": "idlesign/django-oauthost", "path": "oauthost/decorators.py", "copies": "1", "size": "1176", "license": "bsd-3-clause", "hash": -7751082107735652000, "line_mean": 35.75, "line_max": 112, "alpha_frac": 0.6445578231, "autogenerated": false, "ratio": 4.21505376344086, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0006576462335419814, "num_lines": 32 }
from functools import wraps from django.utils.decorators import available_attrs def header(name, value): # View decorator that sets a response header. # # Example: # @header('X-Powered-By', 'Django') # def view(request, ...): # .... # # For class-based views use: # @method_decorator(header('X-Powered-By', 'Django')) # def get(self, request, ...) # ... def decorator(func): @wraps(func, assigned=available_attrs(func)) def inner(request, *args, **kwargs): response = func(request, *args, **kwargs) response[name] = value return response return inner return decorator def headers(header_map): # View decorator that sets multiple response headers. # # Example: # @headers({'Connection': 'close', 'X-Powered-By': 'Django'}) # def view(request, ...): # .... # # For class-based views use: # @method_decorator(headers({'Connection': 'close', # 'X-Powered-By': 'Django'}) # def get(self, request, ...) # ... def decorator(func): @wraps(func, assigned=available_attrs(func)) def inner(request, *args, **kwargs): response = func(request, *args, **kwargs) for k in header_map: response[k] = header_map[k] return response return inner return decorator allow_origin = lambda origin: header('Access-Control-Allow-Origin', origin) allow_origin_all = allow_origin('*')
{ "repo_name": "alexhayes/django-toolkit", "path": "django_toolkit/view_decorators.py", "copies": "1", "size": "1551", "license": "mit", "hash": -2935130970452081000, "line_mean": 28.2830188679, "line_max": 75, "alpha_frac": 0.5667311412, "autogenerated": false, "ratio": 3.946564885496183, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9982479992901003, "avg_score": 0.006163206759035954, "num_lines": 53 }
from functools import wraps from django.utils.decorators import available_attrs def xframe_options_deny(view_func): """ Modifies a view function so its response has the X-Frame-Options HTTP header set to 'DENY' as long as the response doesn't already have that header set. e.g. @xframe_options_deny def some_view(request): ... """ def wrapped_view(*args, **kwargs): resp = view_func(*args, **kwargs) if resp.get('X-Frame-Options') is None: resp['X-Frame-Options'] = 'DENY' return resp return wraps(view_func, assigned=available_attrs(view_func))(wrapped_view) def xframe_options_sameorigin(view_func): """ Modifies a view function so its response has the X-Frame-Options HTTP header set to 'SAMEORIGIN' as long as the response doesn't already have that header set. e.g. @xframe_options_sameorigin def some_view(request): ... """ def wrapped_view(*args, **kwargs): resp = view_func(*args, **kwargs) if resp.get('X-Frame-Options') is None: resp['X-Frame-Options'] = 'SAMEORIGIN' return resp return wraps(view_func, assigned=available_attrs(view_func))(wrapped_view) def xframe_options_exempt(view_func): """ Modifies a view function by setting a response variable that instructs XFrameOptionsMiddleware to NOT set the X-Frame-Options HTTP header. e.g. @xframe_options_exempt def some_view(request): ... """ def wrapped_view(*args, **kwargs): resp = view_func(*args, **kwargs) resp.xframe_options_exempt = True return resp return wraps(view_func, assigned=available_attrs(view_func))(wrapped_view)
{ "repo_name": "jnovinger/django", "path": "django/views/decorators/clickjacking.py", "copies": "145", "size": "1747", "license": "bsd-3-clause", "hash": -339757166711882900, "line_mean": 26.296875, "line_max": 78, "alpha_frac": 0.6433886663, "autogenerated": false, "ratio": 3.740899357601713, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 64 }
from functools import wraps from django.utils.decorators import available_attrs def xframe_sameorigin(view_fn): @wraps(view_fn, assigned=available_attrs(view_fn)) def _wrapped_view(request, *args, **kwargs): response = view_fn(request, *args, **kwargs) response['X-Frame-Options'] = 'SAMEORIGIN' return response return _wrapped_view def xframe_allow(view_fn): @wraps(view_fn, assigned=available_attrs(view_fn)) def _wrapped_view(request, *args, **kwargs): response = view_fn(request, *args, **kwargs) response.no_frame_options = True return response return _wrapped_view def xframe_deny(view_fn): @wraps(view_fn, assigned=available_attrs(view_fn)) def _wrapped_view(request, *args, **kwargs): response = view_fn(request, *args, **kwargs) response['X-Frame-Options'] = 'DENY' return response return _wrapped_view def xrobots_exempt(view_fn): @wraps(view_fn, assigned=available_attrs(view_fn)) def _wrapped_view(request, *args, **kwargs): response = view_fn(request, *args, **kwargs) response.no_robots_tag = True return response return _wrapped_view def xrobots_tag(rule='noindex'): def decorator(view_fn): @wraps(view_fn, assigned=available_attrs(view_fn)) def _wrapped_view(request, *args, **kwargs): response = view_fn(request, *args, **kwargs) response['X-Robots-Tag'] = rule return response return _wrapped_view return decorator
{ "repo_name": "mozilla/captain", "path": "vendor/lib/python/commonware/response/decorators.py", "copies": "1", "size": "1556", "license": "mpl-2.0", "hash": 3051555463055548400, "line_mean": 30.12, "line_max": 58, "alpha_frac": 0.6420308483, "autogenerated": false, "ratio": 3.5688073394495414, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9710838187749541, "avg_score": 0, "num_lines": 50 }
from functools import wraps from django.utils.six.moves.urllib import parse from django.contrib.auth import REDIRECT_FIELD_NAME from django.contrib.auth.decorators import user_passes_test from django.shortcuts import render from django.contrib import messages from django.contrib.auth.views import redirect_to_login from django.core.exceptions import PermissionDenied from django.core.urlresolvers import reverse_lazy from django.utils.translation import ugettext_lazy as _ def staff_member_required(view_func, login_url=None): """ Ensure that the user is a logged-in staff member. * If not authenticated, redirect to a specified login URL. * If not staff, show a 403 page This decorator is based on the decorator with the same name from django.contrib.admin.views.decorators. This one is superior as it allows a redirect URL to be specified. """ if login_url is None: login_url = reverse_lazy('account_login') @wraps(view_func) def _checklogin(request, *args, **kwargs): if request.user.is_active and request.user.is_staff: return view_func(request, *args, **kwargs) # If user is not logged in, redirect to login page if not request.user.is_authenticated(): # If the login url is the same scheme and net location then just # use the path as the "next" url. path = request.build_absolute_uri() login_scheme, login_netloc = parse.urlparse(login_url)[:2] current_scheme, current_netloc = parse.urlparse(path)[:2] if ((not login_scheme or login_scheme == current_scheme) and (not login_netloc or login_netloc == current_netloc)): path = request.get_full_path() messages.warning(request, _("You must log in to access this page")) return redirect_to_login(path, login_url, REDIRECT_FIELD_NAME) else: # User does not have permission to view this page raise PermissionDenied return _checklogin def check_permissions(user, permissions): """ Permissions can be a list or a tuple of lists. If it is a tuple, every permission list will be evaluated and the outcome will be checked for truthiness. Each item of the list(s) must be either a valid Django permission name (model.codename) or a property or method on the User model (e.g. 'is_active', 'is_superuser'). Example usage: - permissions_required(['is_staff', ]) would replace staff_member_required - permissions_required(['is_anonymous', ]) would replace login_forbidden - permissions_required((['is_staff',], ['partner.dashboard_access'])) allows both staff users and users with the above permission """ def _check_one_permission_list(perms): regular_permissions = [perm for perm in perms if '.' in perm] conditions = [perm for perm in perms if '.' not in perm] # always check for is_active if not checking for is_anonymous if (conditions and 'is_anonymous' not in conditions and 'is_active' not in conditions): conditions.append('is_active') attributes = [getattr(user, perm) for perm in conditions] # evaluates methods, explicitly casts properties to booleans passes_conditions = all([ attr() if callable(attr) else bool(attr) for attr in attributes]) return passes_conditions and user.has_perms(regular_permissions) if not permissions: return True elif isinstance(permissions, list): return _check_one_permission_list(permissions) else: return any(_check_one_permission_list(perm) for perm in permissions) def permissions_required(permissions, login_url=None): """ Decorator that checks if a user has the given permissions. Accepts a list or tuple of lists of permissions (see check_permissions documentation). If the user is not logged in and the test fails, she is redirected to a login page. If the user is logged in, she gets a HTTP 403 Permission Denied message, analogous to Django's permission_required decorator. """ if login_url is None: login_url = reverse_lazy('account_login') def _check_permissions(user): outcome = check_permissions(user, permissions) if not outcome and user.is_authenticated(): raise PermissionDenied else: return outcome return user_passes_test(_check_permissions, login_url=login_url) def login_forbidden(view_func, template_name='login_forbidden.html', status=403): """ Only allow anonymous users to access this view. """ @wraps(view_func) def _checklogin(request, *args, **kwargs): if not request.user.is_authenticated(): return view_func(request, *args, **kwargs) return render(request, template_name, status=status) return _checklogin
{ "repo_name": "lyoniionly/django-cobra", "path": "src/cobra/views/decorators.py", "copies": "1", "size": "4997", "license": "apache-2.0", "hash": -6817898100129555000, "line_mean": 38.6587301587, "line_max": 79, "alpha_frac": 0.6704022413, "autogenerated": false, "ratio": 4.3189282627484875, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5489330504048487, "avg_score": null, "num_lines": null }
from functools import wraps from django.utils.translation import ugettext from .constants import SOURCE_MAP from .formatter import Format from .util import country_code_map, specific_location_timeframe from accounts.models import Network from pinecast.helpers import get_object_or_404, json_response def requires_network(view): @wraps(view) def wrapper(req, *args, **kwargs): if req.user.is_staff: net = get_object_or_404(Network, id=req.GET.get('network')) else: net = get_object_or_404(Network, id=req.GET.get('network'), members__in=[req.user]) return view(req, *args, net=net, **kwargs) return json_response(safe=False)(wrapper) @requires_network def network_listen_history(req, net): pods = net.podcast_set.all() f = (Format(req, 'listen') .select(episode='count') .last_thirty() .interval() .group('podcast') .where(podcast=[str(p.id) for p in pods])) return f.driver.format_intervals( labels_map={str(p.id): p.name for p in pods}, extra_data={str(p.id): {'slug': p.slug} for p in pods}) @requires_network def network_listen_platform_breakdown(req, net): pods = net.podcast_set.all() f = (Format(req, 'listen-platform') .select(podcast='count') .group('browser') .last_thirty() .where(podcast=[str(p.id) for p in pods])) return f.driver.format_breakdown({}) @requires_network def network_growth(req, net): pods = net.podcast_set.all() f = (Format(req, 'listen') .select(episode='count') .during('all', force=True) .interval() .group('podcast') .where(podcast=[str(p.id) for p in pods])) return f.driver.format_growth( labels_map={str(p.id): p.name for p in pods}, extra_data={str(p.id): {'slug': p.slug} for p in pods}) @requires_network def network_subscriber_history(req, net): pods = net.podcast_set.all() f = (Format(req, 'subscription') .select(podcast='count') .last_thirty() .interval() .group('podcast') .where(podcast=[str(p.id) for p in pods]) .no_timezones()) return f.driver.format_intervals( labels_map={str(p.id): p.name for p in pods}, extra_data={str(p.id): {'slug': p.slug} for p in pods}) @requires_network def network_listen_breakdown(req, net): pods = net.podcast_set.all() f = (Format(req, 'listen') .select(podcast='count') .group('source') .last_thirty() .where(podcast=[str(p.id) for p in pods])) return f.driver.format_intervals(SOURCE_MAP) @requires_network def network_subscriber_locations(req, net): f = (Format(req, 'subscription-country') .select(podcast='count') .where(podcast=[str(pod.id) for pod in net.podcast_set.all()]) .during('yesterday') .group('country')) return f.driver.format_country_subscribers(label=ugettext('Subscribers')) @requires_network def network_subscriber_locations_specific_source(req, net): return [ {'label': country_code_map[x], 'value': x} for x in Format(req, 'subscription-country') .select(v='count') .where(podcast=[str(pod.id) for pod in net.podcast_set.all()]) .during('yesterday', force=True) .group('country') .driver.get_resulting_groups() if x != 'XX' and x is not None and x in country_code_map] @requires_network @specific_location_timeframe def network_subscriber_locations_specific(req, net, iso_code): f = (Format(req, 'subscription-country') .select(ip=True) .where( podcast=[str(pod.id) for pod in net.podcast_set.all()], country=iso_code, ) .during('yesterday', force=True)) return f.driver.format_ip_list('city', key_filter=('code', iso_code)) @requires_network def network_listener_locations(req, net): f = (Format(req, 'listen-country') .select(podcast='count') .where(podcast=[str(pod.id) for pod in net.podcast_set.all()]) .last_thirty() .group('country')) return f.driver.format_country(label=ugettext('Listens')) @requires_network def network_listener_locations_specific_source(req, net): return [ {'label': country_code_map[x], 'value': x} for x in Format(req, 'listen-country') .select(v='count') .where(podcast=[str(pod.id) for pod in net.podcast_set.all()]) .during('sixmonth') .group('country') .driver.get_resulting_groups() if x != 'XX' and x is not None and x in country_code_map] @requires_network @specific_location_timeframe def network_listener_locations_specific(req, net, iso_code): f = (Format(req, 'listen-country') .select(ip=True) .where( podcast=[str(pod.id) for pod in net.podcast_set.all()], country=iso_code, ) .during('yesterday')) return f.driver.format_ip_list('city', key_filter=('code', iso_code))
{ "repo_name": "AlmostBetterNetwork/pinecast", "path": "analytics/views_network.py", "copies": "3", "size": "5288", "license": "apache-2.0", "hash": -8920225955085831000, "line_mean": 31.6419753086, "line_max": 95, "alpha_frac": 0.5898260212, "autogenerated": false, "ratio": 3.4427083333333335, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5532534354533334, "avg_score": null, "num_lines": null }
from functools import wraps from django.utils.translation import ugettext import accounts.payment_plans as plans from .constants import SOURCE_MAP from .formatter import Format from .util import country_code_map, restrict, specific_location_timeframe from pinecast.helpers import get_object_or_404 from podcasts.models import PodcastEpisode def requires_episode(view): @wraps(view) def wrapper(req, pod, *args, **kwargs): ep = get_object_or_404(PodcastEpisode, podcast=pod, id=req.GET.get('episode')) return view(req, pod, *args, ep=ep, **kwargs) return wrapper @restrict(plans.FEATURE_MIN_GEOANALYTICS_EP) @requires_episode def episode_listener_locations(req, pod, ep): f = (Format(req, 'listen-country') .select(podcast='count') .where(episode=str(ep.id)) .group('country')) return f.driver.format_country(label=ugettext('Listens')) @restrict(plans.PLAN_STARTER) @requires_episode def episode_listen_platform_breakdown(req, pod, ep): f = (Format(req, 'listen-platform') .select(podcast='count') .group('browser') .last_thirty() .where(episode=str(ep.id))) return f.driver.format_breakdown({}) @restrict(plans.PLAN_PRO) @requires_episode def episode_growth(req, pod, ep): f = (Format(req, 'listen') .select(episode='count') .during('all', force=True) .interval() .group('episode') .where(episode=str(ep.id))) return f.driver.format_growth(labels_map={str(ep.id): ep.title}) @restrict(plans.PLAN_PRO) @requires_episode def episode_listener_locations_specific_source(req, pod, ep): return [ {'label': country_code_map[x], 'value': x} for x in Format(req, 'listen-country') .select(v='count') .where(episode=str(ep.id)) .during('sixmonth') .group('country') .driver.get_resulting_groups() if x != 'XX' and x is not None and x in country_code_map] @restrict(plans.PLAN_PRO) @specific_location_timeframe @requires_episode def episode_listener_locations_specific(req, pod, ep, iso_code): f = (Format(req, 'listen-country') .select(ip=True) .where(episode=str(ep.id), country=iso_code) .during('yesterday')) return f.driver.format_ip_list('city', key_filter=('code', iso_code)) @restrict(plans.PLAN_DEMO) @requires_episode def episode_listen_history(req, pod, ep): f = (Format(req, 'listen') .select(episode='count') .last_thirty() .where(episode=str(ep.id))) return f.driver.format_interval(label=ugettext('Listens')) @restrict(plans.PLAN_DEMO) @requires_episode def episode_listen_breakdown(req, pod, ep): f = (Format(req, 'listen') .select(episode='count') .group('source') .last_thirty() .where(episode=str(ep.id))) return f.driver.format_intervals(SOURCE_MAP)
{ "repo_name": "AlmostBetterNetwork/podmaster-host", "path": "analytics/views_episode.py", "copies": "3", "size": "3009", "license": "apache-2.0", "hash": 1894689289248177700, "line_mean": 28.7920792079, "line_max": 86, "alpha_frac": 0.6321036889, "autogenerated": false, "ratio": 3.3507795100222717, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5482883198922271, "avg_score": null, "num_lines": null }
from functools import wraps from django.views.decorators.cache import cache_page as django_cache_page import memcache import simplejson from canvas import util from configuration import Config from django.conf import settings cache = memcache.Client(settings.MEMCACHE_HOSTS) class DoesNotExist(object): pass class InProcessCache(object): def __init__(self): self.flush() def flush(self): self.cache = {} def get(self, key): return self.cache.get(key, DoesNotExist) def set(self, key, value): self.cache[key] = value def delete(self, key): try: del self.cache[key] except KeyError: pass def __contains__(self, key): return key in self.cache def _call_if_not_instance_of(key, cls, *args, **kwargs): """ If key is not an instance of cls, call it with *args and **kwargs, otherwise just return it. """ return key(*args, **kwargs) if not isinstance(key, cls) else key def memoize(key, time=24*60*60): """ A cache decorator that returns a CachedCall. Takes a key or a function that returns a key. """ def decorator(fxn): def wrapper(*args, **kwargs): cache_key = _call_if_not_instance_of(key, str, *args, **kwargs) return CachedCall(cache_key, lambda: fxn(*args, **kwargs), time) return wrapper return decorator def invalidates_cache(cc): """ Invalidates the cache after the function executes. Takes a CachedCall or a function that returns a CachedCall. """ def decorator(fxn): def wrapper(*args, **kwargs): # Invalidate the cache, given a CachedCall cache_call = _call_if_not_instance_of(cc, CachedCall, *args, **kwargs) # Execute and return the wrapped function try: return fxn(*args, **kwargs) finally: cache_call.invalidate() return wrapper return decorator class CachedCall(object): # Note that inprocess_cache is a CLASS variable. It is instantiated the first time # this class is parsed. It is then shared by all instances of CachedCall. inprocess_cache = InProcessCache() default_timeout = 24 * 60 * 60 def __init__(self, key, function, timeout=default_timeout, decorator=lambda x: x, promoter=lambda x: x): #TODO `promoter` is a temporary hack until we can instantiate Details objs based on the cached data. self.key = key.encode('ascii') self.timeout = timeout self.function = function self.cache_decorator = decorator self.promoter = promoter def __eq__(self, other): return hasattr(other, 'key') and other.key == self.key def __hash__(self): return hash(self.key) def __call__(self, *args, **kwargs): return self._get(*args, **kwargs) def _get(self, force=False, skip_decorator=False): raw_value = self._fetch(force) value = self.promoter(raw_value) if not skip_decorator: return self.cache_decorator(value) else: return value def get_local_only(self): return self.inprocess_cache.get(self.key) def value_from_cache_data(self, cache_data): try: value = util.loads(cache_data) except: return DoesNotExist return value def invalidate(self): """ Just unsets the cache without re-caching. """ # Remove from remote cache.delete(self.key) # Remove from class_variable/local cache. CachedCall.inprocess_cache.delete(self.key) def generate_cache_data(self): """ Sets the cache. """ value = self.function() cache_data = self.remote_set(value) self.local_set(value) return cache_data def remote_set(self, value): """ Sets the remote cache. """ cache_data = util.dumps(value) cache.set(self.key, cache_data, self.timeout) return cache_data def local_set(self, value): """ Sets the local cache. """ self.inprocess_cache.set(self.key, value) def _fetch(self, force): if not force: # Can we find it in the local cache? value = self.get_local_only() if not value == DoesNotExist: return value # Is it in the remote cache? value = self.value_from_cache_data(cache.get(self.key)) if not value == DoesNotExist: return value cache_data = self.generate_cache_data() return self.value_from_cache_data(cache_data) def force(self, *args, **kwargs): return self._get(force=True, *args, **kwargs) @classmethod def multicall(cls, calls, skip_decorator=False): if not calls: return [] results = {} fetch_calls = [] for call in set(calls): value = call.get_local_only() if value == DoesNotExist: fetch_calls.append(call) else: results[call] = value results[call] = call.promoter(results[call]) todo = [] multicall_results = cache.get_multi([call.key for call in fetch_calls]) for call in fetch_calls: cache_data = multicall_results.get(call.key, DoesNotExist) value = call.value_from_cache_data(cache_data) if cache_data != DoesNotExist else DoesNotExist if value == DoesNotExist: todo.append(call) else: results[call] = value results[call] = call.promoter(results[call]) for call in todo: results[call] = call.value_from_cache_data(call.generate_cache_data()) if results[call]: results[call] = call.promoter(results[call]) if not skip_decorator: for call, value in results.items(): results[call] = call.cache_decorator(value) return [results[call] for call in calls] @classmethod def many_multicall(cls, *call_lists, **kwargs): concat = sum(call_lists, []) concat_results = cls.multicall(concat, **kwargs) start = 0 results = [] for call_list in call_lists: length = len(call_list) results.append(concat_results[start:start + length]) start += length return results @classmethod def queryset_details(cls, queryset, promoter=None, **kwargs): try: ids = queryset.values_list('id', flat=True) model = queryset.model except AttributeError: ids = [obj.id for obj in queryset] try: model = queryset[0].__class__ except IndexError: return [] return cls.multicall([model.details_by_id(id_, promoter=promoter) for id_ in ids], **kwargs) @classmethod def many_queryset_details(cls, *querysets, **kwargs): promoter = kwargs.pop('promoter', None) id_sets = [] for queryset in querysets: id_sets.append(queryset.values_list('id', flat=True)) return cls.many_multicall(*[[queryset.model.details_by_id(id_, promoter=promoter) for id_ in ids] for queryset, ids in zip(querysets, id_sets)], **kwargs) def cacheable(key): def decorator(func): #TODO Category.get_top = CachedCall('category:top_v2', Category._get_top) @wraps(func) def wrapper(*args, **kwargs): return CachedCall(key, lambda: func(*args, **kwargs))() return wrapper return decorator def cache_page(timeout): return django_cache_page(timeout, key_prefix=settings.CACHE_KEY_PREFIX + 'page_cache')
{ "repo_name": "drawquest/drawquest-web", "path": "website/canvas/cache_patterns.py", "copies": "1", "size": "7757", "license": "bsd-3-clause", "hash": 2160291420709356500, "line_mean": 31.3208333333, "line_max": 162, "alpha_frac": 0.5962356581, "autogenerated": false, "ratio": 3.9355657026889905, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.503180136078899, "avg_score": null, "num_lines": null }
from functools import wraps from elasticsearch_dsl.response import Response from elasticsearch_dsl.utils import AttrDict, AttrList, ObjectBase from django.http import JsonResponse from django.http.response import HttpResponseBase from django.shortcuts import render from .translator import Translator, NoOpTranslator from .rss import Atom1FeedResponse, RssFeedResponse def serialize_for_api(data, new_api=False, sections=None): """Transform complex types that we use into simple ones recursively. Note: recursion isn't followed when we know that transformed types aren't supposed to contain any more complex types. TODO: this is rather ugly, would look better if views/models defined transformations explicitly. This is hard to achieve with function-based views, so it's pending a CBV move.""" if hasattr(data, 'to_api'): return serialize_for_api(data.to_api(), new_api=new_api, sections=sections) elif isinstance(data, Response): return serialize_for_api(data.hits._l_, new_api=new_api, sections=sections) elif isinstance(data, (AttrDict, ObjectBase)): if new_api and hasattr(data, "api_response"): return data.api_response(fields=sections) else: res = data.to_dict() if "translator" in res: del(res["translator"]) if hasattr(data, 'meta'): res['id'] = data.meta.id return res elif isinstance(data, AttrList): return data._l_ elif isinstance(data, dict): return { k: serialize_for_api(v, new_api=new_api, sections=sections) for k, v in data.items() if not isinstance(v, (Translator, NoOpTranslator)) } elif isinstance(data, (list, tuple, set)): return list(map(lambda x: serialize_for_api( x, new_api=new_api, sections=sections), data) ) return data def hybrid_response(template_name): """Returns either an HTML or JSON representation of the data that decorated function generates. Decision on format is based on "format" param in the query string, default is "html". For JSON serialization the data is passed through a recursive transformation into simple types. TODO: This would look better as a mixin for CBVs.""" def hybrid_decorator(func): @wraps(func) def func_wrapper(request, *args, **kwargs): context = func(request, *args, **kwargs) if isinstance(context, HttpResponseBase): return context fmt = request.GET.get('format', 'html') sections = request.GET.getlist('section', None) if not sections: sections = None if fmt == 'json': return JsonResponse(serialize_for_api(context), safe=False) elif fmt == 'atom': return Atom1FeedResponse(request, serialize_for_api(context)) elif fmt == 'rss': return RssFeedResponse(request, serialize_for_api(context)) elif fmt == 'opendata': return JsonResponse( serialize_for_api(context, new_api=True, sections=sections), safe=False ) else: return render(request, template_name, context) return func_wrapper return hybrid_decorator
{ "repo_name": "dchaplinsky/declarations.com.ua", "path": "declarations_site/catalog/api.py", "copies": "1", "size": "3382", "license": "mit", "hash": -1329382229409496000, "line_mean": 38.7882352941, "line_max": 87, "alpha_frac": 0.6363098758, "autogenerated": false, "ratio": 4.341463414634147, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0005590451668883042, "num_lines": 85 }
from functools import wraps from elasticsearch_dsl.result import Response from elasticsearch_dsl.utils import AttrDict, AttrList, ObjectBase from django.http import JsonResponse from django.shortcuts import render def serialize_for_api(data): """Transform complex types that we use into simple ones recursively. Note: recursion isn't followed when we know that transformed types aren't supposed to contain any more complex types. TODO: this is rather ugly, would look better if views/models defined transformations explicitly. This is hard to achieve with function-based views, so it's pending a CBV move.""" if hasattr(data, 'to_api'): return serialize_for_api(data.to_api()) elif isinstance(data, Response): return serialize_for_api(data.hits._l_) elif isinstance(data, (AttrDict, ObjectBase)): res = data.to_dict() res["id"] = data._id return res elif isinstance(data, AttrList): return data._l_ elif isinstance(data, dict): return {k: serialize_for_api(v) for k, v in data.items()} elif isinstance(data, (list, tuple)): return list(map(serialize_for_api, data)) return data def hybrid_response(template_name): """Returns either an HTML or JSON representation of the data that decorated function generates. Decision on format is based on "format" param in the query string, default is "html". For JSON serialization the data is passed through a recursive transformation into simple types. TODO: This would look better as a mixin for CBVs.""" def hybrid_decorator(func): @wraps(func) def func_wrapper(request, *args, **kwargs): context = func(request, *args, **kwargs) if request.GET.get('format', 'html') == 'json': return JsonResponse(serialize_for_api(context), safe=False) else: return render(request, template_name, context) return func_wrapper return hybrid_decorator
{ "repo_name": "devrand/declarations.com.ua", "path": "declarations_site/catalog/api.py", "copies": "1", "size": "2021", "license": "mit", "hash": -4038673898076230000, "line_mean": 37.8653846154, "line_max": 79, "alpha_frac": 0.6813458684, "autogenerated": false, "ratio": 4.2280334728033475, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5409379341203348, "avg_score": null, "num_lines": null }
from functools import wraps from elasticsearch import Elasticsearch _monkeypatched_es = False def monkeypatch_es(): """Monkey patch for elasticsearch-py 1.0+ to make it work with ES 0.90 1. tweaks elasticsearch.client.bulk to normalize return status codes .. Note:: We can nix this whe we drop support for ES 0.90. """ if _monkeypatched_es: return def normalize_bulk_return(fun): """Set's "ok" based on "status" if "status" exists""" @wraps(fun) def _fixed_bulk(self, *args, **kwargs): def fix_item(item): # Go through all the possible sections of item looking # for 'ok' and adding an additional 'status'. for key, val in item.items(): if 'ok' in val: val['status'] = 201 return item ret = fun(self, *args, **kwargs) if 'items' in ret: ret['items'] = [fix_item(item) for item in ret['items']] return ret return _fixed_bulk Elasticsearch.bulk = normalize_bulk_return(Elasticsearch.bulk)
{ "repo_name": "mozilla/elasticutils", "path": "elasticutils/monkeypatch.py", "copies": "2", "size": "1146", "license": "bsd-3-clause", "hash": -7957798773254024000, "line_mean": 27.65, "line_max": 74, "alpha_frac": 0.5645724258, "autogenerated": false, "ratio": 4.1521739130434785, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5716746338843478, "avg_score": null, "num_lines": null }
from functools import wraps from endless_pagination.settings import PAGE_LABEL, TEMPLATE_VARNAME def page_template(template, key=PAGE_LABEL): """ Decorate a view that takes a *template* and *extra_context* keyword arguments (like generic views). The template is switched to *page_template* if request is ajax and if *querystring_key* variable passed by the request equals to *key*. This allows multiple ajax paginations in the same page. The name of the page template is given as *page_template* in the extra context. """ def decorator(view): # decorator with arguments wrap @wraps(view) def decorated(request, *args, **kwargs): # trust the developer: he wrote context.update(extra_context) in his view extra_context = kwargs.setdefault("extra_context", {}) extra_context['page_template'] = template # switch template on ajax requests querystring_key = request.REQUEST.get("querystring_key", PAGE_LABEL) if request.is_ajax() and querystring_key == key: kwargs[TEMPLATE_VARNAME] = template return view(request, *args, **kwargs) return decorated return decorator def page_templates(mapping): """ Like the *page_template* decorator but manage multiple paginations. You can map multiple templates to querystring_keys using the *mapping* dict, e.g.:: @page_templates({"page_contents1.html": None, "page_contents2.html": "go_to_page"}) def myview(request): ... When the value of the dict is None then the default querystring_key (defined in settings) is used. You can use this decorator instead of chaining multiple *page_template* calls. """ templates = dict((v or PAGE_LABEL, k) for k, v in mapping.items()) def decorator(view): # decorator with arguments wrap @wraps(view) def decorated(request, *args, **kwargs): # trust the developer: he wrote context.update(extra_context) in his view extra_context = kwargs.setdefault("extra_context", {}) querystring_key = request.REQUEST.get("querystring_key", PAGE_LABEL) template = templates.get(querystring_key) extra_context['page_template'] = template # switch template on ajax requests if request.is_ajax() and template: kwargs[TEMPLATE_VARNAME] = template return view(request, *args, **kwargs) return decorated return decorator
{ "repo_name": "unicefuganda/edtrac", "path": "edtrac_project/endless/endless_pagination/decorators.py", "copies": "5", "size": "2609", "license": "bsd-3-clause", "hash": 3492999232462531000, "line_mean": 41.7704918033, "line_max": 85, "alpha_frac": 0.6385588348, "autogenerated": false, "ratio": 4.348333333333334, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.7486892168133334, "avg_score": null, "num_lines": null }
from functools import wraps from .err import Err def signature(*types, **kwtypes): """Type annotations and conversions for methods. Ignores first parameter. """ conversions = [(t if isinstance(t, tuple) else (t, t)) for t in types] kwconversions = {k: (t if isinstance(t, tuple) else (t, t)) for k, t in kwtypes.items()} def decorator(fn): @wraps(fn) def wrapped(self, *args, **kwargs): args = [(arg if isinstance(arg, t) else conv(arg)) for (t, conv), arg in zip(conversions, args)] kwargs = {k: (v if isinstance(v, t) else conv(v)) for k, (t, conv), v in ((k, kwconversions[k], v) for k, v in kwargs.items())} return fn(self, *args, **kwargs) return wrapped return decorator def schemes(*schemes): """URL scheme validation. This validator when supplied with a list of schemes ensures that first argument of the decorated function is a URL with one of those schemes. """ msg = 'The accepted schemes for %s (which are: %s) do not include: %s' def decorator(fn): @wraps(fn) def wrapped(self, url, *args, **kwargs): if url.scheme not in schemes: raise InvalidScheme(msg % (type(self).__name__, ', '.join(schemes), str(url.scheme))) return fn(self, url, *args, **kwargs) return wrapped return decorator class InvalidScheme(Err): pass
{ "repo_name": "drcloud/arx", "path": "arx/decorators.py", "copies": "1", "size": "1628", "license": "mit", "hash": 2935184282238328300, "line_mean": 28.6, "line_max": 74, "alpha_frac": 0.5343980344, "autogenerated": false, "ratio": 4.20671834625323, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 55 }
from functools import wraps from ..error import Invalid from ..util import varargs2kwargs, getArgSpec, getParameterNames import logging log = logging.getLogger(__name__) def validateDecorator( validator, method, include, exclude, onInvalid, createContext ): if include and exclude: raise SyntaxError("'include' and 'exclude' cannot be used at the same time") spec = getArgSpec( method ) hasVarargs = spec.varargs is not None varargs = spec.varargs or '*varargs' keywords = spec.keywords or False createContext = createContext or (lambda _validator, _data, **kwargs: _validator.context(_data)) methodParameterNames = getParameterNames( method, skipSelf=False ) skip = () if exclude: skip = exclude if include: skip = set(methodParameterNames) - set(include) varargs = varargs hasVarargs = spec.varargs not in skip and hasVarargs keywords = keywords not in skip and keywords @wraps(method) def __wrap( *fargs, **fkwargs): (fargs, fkwargs, shifted ) = varargs2kwargs( method, fargs, fkwargs, skipSelf=False ) origKwargs = dict(fkwargs) if keywords is not False: restKwargs = dict(\ ( key, fkwargs.pop(key))\ for key in list(fkwargs.keys()) if key not in methodParameterNames ) fkwargs[ keywords ] = restKwargs if fargs or hasVarargs: fkwargs[ varargs ] = list(fargs) try: resultKwargs = createContext\ ( validator , dict( ( key, fkwargs[ key] ) for key in fkwargs if key not in skip ) , **fkwargs ).result except Invalid as e: if onInvalid is not None: return onInvalid( e ) else: raise origKwargs.update( resultKwargs ) resultArgs = origKwargs.pop( varargs, fargs ) resultArgs = [ origKwargs.pop(key) for key in shifted ] + resultArgs if keywords is not False: origKwargs.update( origKwargs.pop( keywords ) ) return method( *resultArgs, **origKwargs ) return __wrap def validate( validator, include=None, exclude=None, onInvalid=None, createContext=None ): def __createDecorator( method ): return validateDecorator( validator, method, include, exclude, onInvalid, createContext) return __createDecorator
{ "repo_name": "doncatnip/kanone", "path": "src/kanone/adapter/native.py", "copies": "1", "size": "2441", "license": "unlicense", "hash": 8253111066359218000, "line_mean": 29.8987341772, "line_max": 100, "alpha_frac": 0.6255632937, "autogenerated": false, "ratio": 4.245217391304347, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5370780685004347, "avg_score": null, "num_lines": null }
from functools import wraps from .exceptions import PreconditionViolationError, PostconditionViolationError def pre(condition): """ Execute a precondition function before the decorated function. The `condition` must be a callable that receives the same keyword arguments as the function it's being applied to. """ def decorator(func, *args, **kwargs): @wraps(func) def wrapper(*args, **kwargs): try: check_result = condition(*args, **kwargs) except AssertionError as e: raise PreconditionViolationError("Precondition check failed.") from e if check_result != None and not check_result: raise PreconditionViolationError("Precondition check failed") return func(*args, **kwargs) return wrapper return decorator def post(condition): """ Execute a postcondition function before the decorated function. The `condition` must be a callable that receives the return value of the function it's being applied to as its first parameter, and the keyword arguments of the function it's applied to as its remaining parameters. """ def decorator(func, *args, **kwargs): @wraps(func) def wrapper(*args, **kwargs): result = func(*args, **kwargs) try: check_result = condition(result, *args, **kwargs) except AssertionError as e: raise PostconditionViolationError("Precondition check failed.") from e if check_result != None and not check_result: raise PostconditionViolationError("Postcondition check failed") return result return wrapper return decorator
{ "repo_name": "Chiel92/fate", "path": "fate/contract.py", "copies": "1", "size": "1763", "license": "mit", "hash": -7841796553145705000, "line_mean": 32.9038461538, "line_max": 86, "alpha_frac": 0.643788996, "autogenerated": false, "ratio": 5.022792022792022, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0011077868936730203, "num_lines": 52 }
from functools import wraps from fabric.api import env from woven.environment import server_state, set_server_state from woven.environment import version_state, set_version_state def run_once_per_node(func): """ Decorator preventing wrapped function from running more than once per host (not just interpreter session). Using env.patch = True will allow the wrapped function to be run if it has been previously executed, but not otherwise Stores the result of a function as server state """ @wraps(func) def decorated(*args, **kwargs): if not hasattr(env,'patch'): env.patch = False state = version_state(func.__name__) if not env.patch and state: verbose = " ".join([env.host,func.__name__,"completed. Skipping..."]) elif env.patch and not state: verbose = " ".join([env.host,func.__name__,"not previously completed. Skipping..."]) else: results = func(*args, **kwargs) verbose ='' if results: set_version_state(func.__name__,object=results) else: set_version_state(func.__name__) return results if env.verbosity and verbose: print verbose return return decorated def run_once_per_version(func): """ Decorator preventing wrapped function from running more than once per host and env.project_fullname (not just interpreter session). Using env.patch = True will allow the function to be run Stores the result of a function as server state """ @wraps(func) def decorated(*args, **kwargs): if not hasattr(env,'patch'): env.patch = False state = version_state(func.__name__) if not env.patch and state: verbose = " ".join([env.host,func.__name__,"completed. Skipping..."]) elif env.patch and not state: verbose = " ".join([env.host,func.__name__,"not previously completed. Skipping..."]) else: results = func(*args, **kwargs) verbose ='' if results: set_version_state(func.__name__,object=results) else: set_version_state(func.__name__) return results if env.verbosity and verbose: print verbose return return decorated
{ "repo_name": "bretth/woven", "path": "woven/decorators.py", "copies": "1", "size": "2333", "license": "bsd-3-clause", "hash": -5339528897823658000, "line_mean": 36.6451612903, "line_max": 96, "alpha_frac": 0.6099442778, "autogenerated": false, "ratio": 4.40188679245283, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.019246762903710687, "num_lines": 62 }
from functools import wraps from fabric import api def multisite(func): """ Mark a task as being multisite. Multisite tasks allow you to define a global configuration for multiple sites and specify the site to use when you run your command. All the dictionary keys of the given site will then be made available in the `env` variable. The structure is `env.sites[site_name][env_name][configuration_key] = configuration_value`, where `env_name` is the name of the decorated function. Also the decorated function must take a parameter `site`. Here's an example with sites A and B, both having prod and staging environments:: env.sites = { 'site_a': { 'prod': { 'project_root': '/var/www/site_a/prod/' }, 'staging': { 'project_root': '/var/www/site_a/staging/' } }, 'site_b': { 'prod': { 'project_root': '/var/www/site_b/prod/' }, 'staging': { 'project_root': '/var/www/site_b/staging/' } } } @task @multisite def prod(site): # You could also define hosts in the `env.sites` dictionary if # they're different from one site to another # If the site is set to `site_a`, the decorator will take the # contents from env.sites['site_a']['prod'] and make it available # in the `env` variable env.hosts = ['www.my_host.com'] @task @multisite def staging(site): # You could also define hosts in the `env.sites` dictionary if # they're different from one site to another env.hosts = ['staging.my_host.com'] """ if 'sites' not in api.env: raise RuntimeError("To use the multisite decorator you need to set the" " `env.sites` variable.") @wraps(func) def wrapper(*args, **kwargs): if args: site = args[0] elif func.__defaults__: site = func.__defaults__[0] else: site = None selected_environment = func.__name__ if site is not None: if site not in api.env.sites: raise Exception( "Site {site} is not part of the possible sites ({sites})" .format(site=site, sites=api.env.sites.keys()) ) if selected_environment not in api.env.sites[site]: raise Exception( "Site {site} has no {env} environment" .format(site=site, env=selected_environment) ) for setting, value in api.env.sites[site][selected_environment].iteritems(): api.env[setting] = value api.env.site = site return func(*args, **kwargs) return wrapper
{ "repo_name": "liip/fabliip", "path": "fabliip/decorators.py", "copies": "2", "size": "3028", "license": "mit", "hash": -1923773055763521000, "line_mean": 31.9130434783, "line_max": 88, "alpha_frac": 0.5231175694, "autogenerated": false, "ratio": 4.492581602373887, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.6015699171773887, "avg_score": null, "num_lines": null }
from functools import wraps from flask import abort, flash from flask_security import current_user from .models import db def access_required(func): """ This decorator ensures that the current user is logged in before calling the actual view. Calls the unauthorized_view_function() when the user is not logged in.""" @wraps(func) def decorated_view(*args, **kwargs): # User must be authenticated if not current_user.has_role('ADMIN'): if not current_user.is_user(kwargs.get('id')): # Redirect to unauthenticated page abort(401) # Call the actual view return func(*args, **kwargs) return decorated_view def admin_required(func): """ This decorator ensures that the current user is logged in before calling the actual view. Calls the unauthorized_view_function() when the user is not logged in.""" @wraps(func) def decorated_view(*args, **kwargs): # User must be authenticated if not current_user.is_admin(kwargs.get('id')): # Redirect to unauthenticated page abort(401) # Call the actual view return func(*args, **kwargs) return decorated_view class Bracket: def __init__(self, players): self.players = players @property def bracket(self): rounds = self.players//2 round_pairings = [[n+1, self.players-(n)] for n in range(rounds)] while rounds > 2: rounds //= 2 prev_round = round_pairings round_pairings = [[prev_round[n], prev_round.pop()] for n in range(rounds)] return round_pairings
{ "repo_name": "ianzimmerman/gifoff", "path": "gifoff/helpers.py", "copies": "1", "size": "1698", "license": "mit", "hash": 5487742283059357000, "line_mean": 28.8070175439, "line_max": 97, "alpha_frac": 0.6142520612, "autogenerated": false, "ratio": 4.365038560411311, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5479290621611311, "avg_score": null, "num_lines": null }
# from functools import wraps # from flask import (abort, flash, redirect, render_template, request, session, # url_for) # from flask.ext.login import (current_user, login_required, login_user, # logout_user) # from flask.ext.simon import get_or_404 # import when # from . import app # from .forms import LoginForm, ProfileForm, RegisterForm # from .models import Event, User, login_manager # def guest_required(f): # @wraps(f) # def _inner(*args, **kwargs): # if current_user.is_authenticated(): # return redirect(url_for('.index')) # return f(*args, **kwargs) # return _inner # @app.route('/event/<string:slug>') # @login_required # def event(slug): # event = get_or_404(Event, slug=slug) # if current_user.id not in event.users: # abort(403) # if 'events' in current_user: # takers = current_user.events.get(str(event.id))['takers'] # recipients = [User.get(id=id) for id in takers] # return render_template('events/index.html', event=event, # recipients=recipients) # @app.route('/') # @login_required # def index(): # now = when.now(utc=True) # events = Event.find(users=current_user.id, active=True, # begins__lte=now, ends__gt=now) # if len(events) == 1: # return redirect(url_for('.event', slug=events[0].slug)) # return render_template('index.html', events=events) # @app.route('/login/', methods=('GET', 'POST')) # @guest_required # def login(): # form = LoginForm(request.form) # if form.validate_on_submit(): # login_user(form.user) # return redirect(request.args.get('next') or url_for('.index')) # return render_template('login.html', form=form) # @app.route('/logout') # @login_required # def logout(): # logout_user() # return redirect(url_for('.index')) # @app.route('/profile', methods=('GET', 'POST')) # @login_required # def profile(): # form = ProfileForm(request.form, **current_user._document) # if form.validate_on_submit(): # current_user.update(**form.data) # flash('Your profile has been updated.', 'success') # return redirect(url_for('.profile')) # return render_template('profile.html', form=form) # @app.route('/register', methods=('GET', 'POST')) # @guest_required # def register(): # form = RegisterForm(request.form) # if form.validate_on_submit(): # user = User(**form.data) # user.set_password(str(form.password.data)) # user.save() # login_user(user) # flash('Thank you for signing up.') # return redirect(request.args.get('next') or url_for('.index')) # return render_template('register.html', form=form) # @app.route('/event/<string:slug>/wishlist') # @login_required # def wishlist(slug): # event = get_or_404(Event, slug=slug) # if current_user.id not in event.users: # abort(403) # return render_template('events/wishlist.html', event=event) # @login_manager.unauthorized_handler # def login_prompt(): # session['login_redirect'] = request.path # return redirect(url_for('.login')) # from .admin import *
{ "repo_name": "dirn/Secret-Santa", "path": "xmas/views.py", "copies": "1", "size": "3241", "license": "bsd-3-clause", "hash": -4442660427337287000, "line_mean": 27.4298245614, "line_max": 79, "alpha_frac": 0.6096883678, "autogenerated": false, "ratio": 3.231306081754736, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.4340994449554736, "avg_score": null, "num_lines": null }
from functools import wraps from flask import abort, g, request, Response from twilio.util import RequestValidator from calloncongress.helpers import read_context from calloncongress import settings def twilioify(validate=True): """ Decorator that validates Twilio calls and creates the call context in the request. """ def decorator(func): @wraps(func) def decorated(*args, **kwargs): print request.values if 'CallSid' not in request.values: return abort(401, 'Request must be a signed Twilio request.') if validate and False: validator = RequestValidator(settings.TWILIO_AUTH_TOKEN) sig_header = request.headers.get('X-Twilio-Signature', '') if request.method == 'POST': vparams = request.form vurl = request.url else: vparams = {} vurl = request.url # validator params are called URL, POST vars, and signature if not validator.validate(vurl, vparams, sig_header): return abort(401, 'Request signature could not be validated') # load the call from Mongo or create if one does not exist g.call = load_call(request.values['CallSid'], request.values) g.zipcode = read_context('zipcode', None) g.legislator = read_context('legislator', None) twilio_response = func(*args, **kwargs) return Response(str(twilio_response), mimetype='application/xml') return decorated return decorator def validate_before(*args): """ Decorator that makes sure required callbacks have been run and appropriate values provided. """ dependencies = args def decorator(func): @wraps(func) def decorated(*args, **kwargs): for dep in dependencies: valid = dep() if valid is not True: return str(valid) return func(*args, **kwargs) return decorated return decorator def load_call(sid, params): """ Loads a call from the datastore or creates a new one if one does not exist. Appends the current call status to the list of requests involved in this call. sid: the unique call ID from Twilio params: the POSTed request parameters """ # find existing call doc = g.db.calls.find_one({'call_sid': sid}) if doc is None: # create new call if call does not exist doc = { 'call_sid': sid, 'from': params['From'], 'to': params['To'], 'caller_name': params.get('CallerName', None), 'context': { 'zipcode': None, 'legislator': None, }, 'language': '', } g.db.calls.insert(doc) # create array for requests list if 'requests' not in doc: doc['requests'] = [] # append current request information and update current status doc['requests'].append({ 'timestamp': g.now, 'call_status': params['CallStatus'] }) doc['current_status'] = params['CallStatus'] return doc
{ "repo_name": "sunlightlabs/calloncongress", "path": "calloncongress/decorators.py", "copies": "1", "size": "3283", "license": "bsd-3-clause", "hash": 4814583191028089000, "line_mean": 29.119266055, "line_max": 95, "alpha_frac": 0.5735607676, "autogenerated": false, "ratio": 4.553398058252427, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5626958825852427, "avg_score": null, "num_lines": null }
from functools import wraps from flask import abort, request, redirect from flask_login import current_user, login_url from sqlalchemy.orm.exc import NoResultFound from app import login_manager, sentry from app.constants import permission from app.models import ( Users, Responses, Files, Notes, Letters, Links, Instructions, Determinations, Envelopes ) def has_permission(permission: int): """ Checks to see if the current_user has the appropriate permission for this endpoint. :param f: View function that is being wrapped. :param permissions: List of permission values. :return: """ def decorator(f): @wraps(f) def decorated_function(request_id, *args, **kwargs): if not current_user.is_authenticated or current_user.is_anonymous: return redirect(login_url(login_manager.login_view, next_url=request.url)) return f(request_id) if is_allowed(user=current_user, request_id=request_id, permission=permission) else abort(403) return decorated_function return decorator def has_super(): """ Checks to see if the current_user is a super user. :param f: Function that is being wrapped. :return: """ def decorator(f): @wraps(f) def decorated_function(*args, **kwargs): if not getattr(current_user, 'is_super', False): return abort(403) return f(*args, **kwargs) return decorated_function return decorator def is_allowed(user: Users, request_id: str, permission: int): """ :param user: :param request_id: :param permissions: :return: """ try: user_request = user.user_requests.filter_by(request_id=request_id).one() return True if user_request.has_permission(permission) else False except NoResultFound: sentry.captureException() return False except AttributeError: sentry.captureException() return False def get_permission(permission_type: str, response_type: Responses): """ :param permission_type: :param response_type: :return: """ if response_type not in [Determinations, Envelopes, Letters]: if permission_type == 'edit': permission_for_edit_type = { Files: permission.EDIT_FILE, Notes: permission.EDIT_NOTE, Instructions: permission.EDIT_OFFLINE_INSTRUCTIONS, Links: permission.EDIT_LINK, } return permission_for_edit_type[response_type] if permission_type == 'privacy': permission_for_edit_type_privacy = { Files: permission.EDIT_FILE_PRIVACY, Notes: permission.EDIT_NOTE_PRIVACY, Instructions: permission.EDIT_OFFLINE_INSTRUCTIONS_PRIVACY, Links: permission.EDIT_LINK_PRIVACY } return permission_for_edit_type_privacy[response_type] if permission_type == 'delete': permission_for_delete_type = { Files: permission.DELETE_FILE, Notes: permission.DELETE_NOTE, Instructions: permission.DELETE_OFFLINE_INSTRUCTIONS, Links: permission.DELETE_LINK } return permission_for_delete_type[response_type] return 0
{ "repo_name": "CityOfNewYork/NYCOpenRecords", "path": "app/lib/permission_utils.py", "copies": "1", "size": "3480", "license": "apache-2.0", "hash": -5540344306193414000, "line_mean": 27.5245901639, "line_max": 88, "alpha_frac": 0.6077586207, "autogenerated": false, "ratio": 4.339152119700748, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0003817473558107049, "num_lines": 122 }
from functools import wraps from flask import Blueprint, current_app, render_template, redirect, request, url_for, flash, session, abort, jsonify from flask_login import current_user, login_required from sqlalchemy import or_, and_ from preston.xmlapi import Preston as XMLAPI from auth.shared import db, eveapi from auth.models import User from .models import Member from .reddit_oauth import RedditOAuth # Create and configure app app = Blueprint('hr', __name__, template_folder='templates/hr', static_folder='static') # Reddit OAuth connection reddit_oauth = None # Storage for API calls new_apps = [] @app.record_once def _record(setup_state): app.config = setup_state.app.config global reddit_oauth reddit_oauth = RedditOAuth( app.config['REDDIT_OAUTH_CLIENT_ID'], app.config['REDDIT_OAUTH_SECRET'], app.config['REDDIT_OAUTH_CALLBACK'] ) @app.context_processor def _prerender(): if current_user.is_authenticated: return { 'member': Member.query.filter_by(character_name=current_user.name).first() } return {} @app.before_request def _preprocess(): member = get_member_for(current_user) if not current_user.is_anonymous: if not member: id = get_id_for_name(current_user.name) db.session.add(Member(current_user.name, id, get_corp_for_id(id))) db.session.commit() elif not member.character_id: member.character_id = get_id_for_name(member.character_name) db.session.commit() @app.route('/', methods=['GET', 'POST']) @login_required def index(): """ Member page. This is for logged in members to view their personal data. They can edit the API keys. Methods: GET POST Args: None Returns: rendered template 'personal.html' """ if get_member_for(current_user).status in ['Guest', 'New', 'Ready to be interviewed', 'Ready to be accepted']: return redirect(url_for('.join')) if request.method == 'POST': current_app.logger.debug('POST on index by {}'.format(current_user.name)) key_id = request.form['key_id'] v_code = request.form['v_code'] validate_key(key_id, v_code, get_member_for(current_user)) return redirect(url_for('.index')) reddit_link = reddit_oauth.get_authorize_url() return render_template('hr/personal.html', reddit_link=reddit_link) def validate_key(key_id, v_code, member): """ This method validates a single- or multi-line string of API keys and codes separated by ' - ' against the EVE API to verify that they have the correct access mask. Args: key_id (str) - EVE API key keyID v_code (str) - EVE API key vCode member (hr.models.Member) - Member to update if the keys are valid Returns: value (bool) if all keys were valid """ errors = [] try: auth = XMLAPI(key=key_id, code=v_code, user_agent=eveapi['user_agent']) result = auth.account.APIKeyInfo() if not int(result['key']['@accessMask']) == app.config['API_KEY_MASK']: errors.append('The key with ID "{}" has the wrong access mask. Has: {}, needs: {}'.format( key_id, result['key']['@accessMask'], app.config['API_KEY_MASK'] )) except Exception as e: errors.append('An error occurred with keyID "{}"'.format(key_id)) errors.append('An error occurred with keyID "{}": {}'.format(key_id, str(e))) if not errors and member: member.key_id = key_id member.v_code = v_code db.session.commit() flash('API key information saved', 'success') else: flash('; '.join(errors), 'error') return not errors @app.route('/members') @login_required def membership(): """ Recruiter page. This page shows recruiters the total list of members of the corporation and the applications to join the corporation. Args: None Returns: rendered template 'membership.html' """ if not current_user.recruiter and not current_user.mentor and not current_user.admin: return redirect(url_for('.index')) show_hidden = request.args.get('show_hidden', 0, type=bool) show_applications = request.args.get('show_applications', 0, type=bool) members = Member.query.filter_by(hidden=show_hidden).all() if show_applications: members = [member for member in members if member.status in ['New', 'Ready to be interviewed', 'Ready to be accepted']] members = sorted(members, key=lambda x: x.character_name.lower()) return render_template('hr/membership.html', members=members, show_hidden=show_hidden, show_applications=show_applications) @app.route('/members/add', methods=['GET', 'POST']) @login_required def add_member(): """ This page allows recruiters to manually add an applicant. Methods: GET POST Args: None Returns: rendered template 'add_applicant.html' """ if not current_user.recruiter and not current_user.admin: return redirect(url_for('.index')) if request.method == 'POST': name = request.form.get('name') reddit = request.form.get('reddit') status = request.form.get('status') apikey = request.form.get('apikey') apicode = request.form.get('apicode') main = request.form.get('main') if main == '*': main = name notes = request.form.get('notes') current_app.logger.debug('POST on add_member by {}: name = {}, reddit = {}, status = {}, main = {}'.format( current_user.name, name, reddit, status, main )) if not validate_key(apikey, apicode, None): current_app.logger.info('POST on add_member didn\'t have a valid key') flash('Invalid key for user', 'danger') return redirect(url_for('.add_member')) id = get_id_for_name(name) member = Member(name, id, get_corp_for_id(id), status, reddit, main, notes, apikey, apicode) current_app.logger.info('New member added through add_member: ' + str(name)) db.session.add(member) db.session.commit() db.session.commit() flash('Character added', 'success') return render_template('hr/add_member.html', all_members=get_all_member_names()) @app.route('/admin', methods=['GET', 'POSt']) @login_required def admin(): """ This is the admin control page, where admins can add and remove recruiters and pull all corp members from the EVE API to update the database. Methods: GET POST Args: None Returns: rendered template 'admin.html' """ if not current_user.admin: current_app.logger.debug('Admin access denied to {}'.format(current_user.name)) return redirect(url_for('.index')) if request.method == 'POST': current_app.logger.debug('POST on admin by {}'.format(current_user.name)) name = request.form['name'] member = Member.query.filter_by(character_name=name).first() if not member: flash('Unknown member', 'error') return redirect(url_for('.admin')) member.status = 'Accepted' if request.form['role'] == 'Recruiter': member.user.recruiter = True if request.form['role'] == 'Mentor': member.user.mentor = True db.session.commit() flash(member.character_name + ' promoted to ' + request.form['role'], 'success') return redirect(url_for('.admin')) admins = ', '.join([user.name for user in User.query.filter_by(admin=True).all()]) recruiters = [get_member_for(user) for user in User.query.filter(or_(User.recruiter, User.admin)).all()] mentors = [get_member_for(user) for user in User.query.filter(or_(User.mentor, User.admin)).all()] recruiters = sorted(set(recruiters), key=lambda x: x.character_name) mentors = sorted(set(mentors), key=lambda x: x.character_name) return render_template('hr/admin.html', admins=admins, recruiters=recruiters, mentors=mentors, all_members=get_all_member_names()) @app.route('/admin/set_status', methods=['POST']) @login_required def admin_set_status(): """ This transient endpoint allows an admin to set the status of a member. Methods: POST Args: None Returns: redirect to the admin endpoint """ if not current_user.admin: return redirect(url_for('.index')) if not request.method == 'POST': return redirect(url_for('.admin')) name = request.form.get('name', None) status = request.form.get('status', 'New') if not name or not status: flash('Missing name or status', 'error') return redirect(url_for('.admin')) member = Member.query.filter_by(character_name=name).first() if not member: flash('Unknown member name', 'error') return redirect(url_for('.admin')) member.status = status db.session.commit() flash('User status changed for ' + name + ' to ' + status, 'success') return redirect(url_for('.admin')) @app.route('/admin/revoke/<name>/<role>') @login_required def revoke_access(name, role): """ This transient endpoint allows an admin to revoke the recruiter status of a member. Args: name (str) - name of the recruiter to revoke Returns: redirect to the admin endpoint """ if not current_user.admin: return redirect(url_for('.index')) member = Member.query.filter_by(character_name=name).first() if not member: flash('Unknown member name', 'error') return redirect(url_for('.admin')) member.status = 'Accepted' if role == 'Recruiter': member.user.recruiter = False elif role == 'Mentor': member.user.mentor = False db.session.commit() flash('User access revoked for ' + name, 'success') return redirect(url_for('.admin')) @app.route('/details/<int:id>', methods=['GET', 'POST']) @login_required def details(id): """ This page allows recruiters to view and edit a member's details. Methods: GET POST Args: id (int) - id of the member to examine Returns: rendered template 'details.html' """ if not current_user.recruiter and not current_user.mentor and not current_user.admin: current_app.logger.debug('Details access denied to {}'.format(current_user.name)) return redirect(url_for('.index')) member = Member.query.get(id) if not member: flash('Unknown id', 'error') current_app.logger.error('Unknown id on details for id {} by {}'.format(id, current_user.name)) return redirect(url_for('.membership')) if request.method == 'POST': if request.form['section'] == 'keys': current_app.logger.info('POST on details - keys by {} for {}'.format( current_user.name, member.character_name )) validate_key(request.form['key_id'], request.form['v_code'], member) elif request.form['section'] == 'status': current_app.logger.info('POST on details - status by {} for {}: {}'.format( current_user.name, member.character_name, request.form['status'] )) member.status = request.form['status'] if member.status == 'Denied': member.hidden = True db.session.commit() flash('Status changed', 'success') elif request.form['section'] == 'main': current_app.logger.info('POST on details - main by {} for {}: {}'.format( current_user.name, member.character_name, request.form['main'] )) main = request.form['main'] member.main = main if not main == '*' else member.character_name db.session.commit() flash('Main character changed', 'success') elif request.form['section'] == 'notes': current_app.logger.info('POST on details - notes by {} for {}: {}'.format( current_user.name, member.character_name, request.form['notes'] )) member.notes = request.form['notes'] db.session.commit() flash('Notes changed', 'success') elif request.form['section'] == 'training': current_app.logger.info('POST on details - training by {} for {}'.format( current_user.name, member.character_name )) member.know_good_fits = 'know_good_fits' in request.form member.know_scan = 'know_scan' in request.form member.know_mass_and_time = 'know_mass_and_time' in request.form member.know_organize_gank = 'know_organize_gank' in request.form member.know_when_to_pve = 'know_when_to_pve' in request.form member.know_comms = 'know_comms' in request.form member.know_appropriate_ships = 'know_appropriate_ships' in request.form member.know_intel = 'know_intel' in request.form member.know_pvp = 'know_pvp' in request.form member.know_doctrine = 'know_doctrine' in request.form for alt in member.get_alts(): alt.know_good_fits = member.know_good_fits alt.know_scan = member.know_scan alt.know_mass_and_time = member.know_mass_and_time alt.know_organize_gank = member.know_organize_gank alt.know_when_to_pve = member.know_when_to_pve alt.know_comms = member.know_comms alt.know_appropriate_ships = member.know_appropriate_ships alt.know_intel = member.know_intel alt.know_pvp = member.know_pvp alt.know_doctrine = member.know_doctrine db.session.commit() else: flash('Unknown form submission', 'error') return redirect(url_for('.details', id=id)) return render_template('hr/details.html', member=member, all_members=get_all_member_names()) @app.route('/visibility/<int:id>/<action>') @login_required def visibility(id, action): """ This transient endpoint allows a recruiter to set the visiblity of a member on the membership page (to be used to hide people who have left the corp). Args: id (int) - id of the member to modify action (str) - whether to hide or show the member Returns: redirect to the member's details endpoint """ if not current_user.recruiter and not current_user.admin: current_app.logger.debug('Visibility access denied to {}'.format(current_user.name)) return redirect(url_for('.index')) member = Member.query.get(id) if not member: flash('Unknown id', 'error') current_app.logger.error('Unknown id on details for id {} by {}'.format(id, current_user.name)) return redirect(url_for('.membership')) member.hidden = action == 'hide' db.session.commit() flash('"{}" {}'.format(member.character_name, 'hidden' if member.hidden else 'made visible'), 'success') return redirect(url_for('.details', id=id)) @app.route('/delete/<int:id>') @login_required def delete(id): """ This transient endpoint allows an admin to permanently delete a member from the database. Args: id (int) - id of the member to delete Returns: redirect to the membership endpoint """ if not current_user.admin: current_app.logger.debug('Delete access denied to {}'.format(current_user.name)) return redirect(url_for('.details', id=id)) Member.query.filter_by(id=id).delete() db.session.commit() flash('Member deleted', 'success') return redirect(url_for('.membership')) @app.route('/join', methods=['GET', 'POST']) @login_required def join(): """ This page allows a user to submit an application to join the corporation by supplying an API key and optional reddit account and main character. Methods: GET POST Args: None Returns: rendered template 'join.html' """ member = get_member_for(current_user) if member.status == 'Accepted': return redirect(url_for('.index')) character_name = session.get('character_name') or current_user.name if not current_user.is_anonymous else None if not character_name: flash('Well, something went wrong. Try again?', 'error') return redirect(url_for('.login')) if request.method == 'POST': current_app.logger.debug('POST on join by {}'.format(current_user.name)) try: key = request.form['key'] code = request.form['code'] auth = XMLAPI(key=key, code=code, user_agent=eveapi['user_agent']) main = request.form.get('main') reddit = None if main == '*': main = get_member_for(current_user).character_name else: try: reddit = Member.query.filter_by(character_name=main).first().reddit except Exception: current_app.logger.warning('{} tried to set {} as their main, but that Member object wasn\'t found'.format( current_user.name, main )) result = auth.account.APIKeyInfo() if not int(result['key']['@accessMask']) == app.config['API_KEY_MASK']: flash('Wrong key mask - you need {}'.format(app.config['API_KEY_MASK']), 'error') return redirect(url_for('.join')) member = get_member_for(current_user) member.status = 'New' member.main = main member.key_id = key member.v_code = code member.reddit = reddit db.session.commit() new_apps.append(current_user.name) flash('Your application is in - someone will take a look soon', 'success') except Exception: flash('An error occurred when parsing your API key. Are you sure you entered it right?', 'error') return redirect(url_for('.join')) reddit_link = reddit_oauth.get_authorize_url() return render_template('hr/join.html', character_name=character_name, reddit_link=reddit_link, all_members=get_all_member_names(), discord_link=app.config['DISCORD_LINK']) @app.route('/sync') @login_required def sync(): """ This transient endpoint calls the sync_members method. Args: None Returns: redirect to the admin endpoint """ if not current_user.admin: current_app.logger.debug('Admin access denied to {}'.format(current_user.name)) return redirect(url_for('.index')) sync_members() return redirect(url_for('.admin')) def sync_members(): """ This method allows an admin to import a list of corporation members from the EVE API, updating any missing models from the database and marking characters that have left (or been kicked from) the corporation as being gone. Args: None Returns: value (dict) of membership changes """ current_app.logger.info('-- Starting member sync') auth = XMLAPI( key=app.config['CORP_MEMBER_API_KEY'], code=app.config['CORP_MEMBER_API_CODE'], user_agent=eveapi['user_agent'] ) api_members = [] existing_members, new_members, left_members = [], [], [] for member in auth.corp.MemberTracking()['rowset']['row']: name = member['@name'] db_model = Member.query.filter_by(character_name=name).first() if not db_model: current_app.logger.info('-- Added {} to the corporation'.format(name)) existing_members.append(name) db_model = Member(name, member['@characterID'], app.config['CORPORATION'], 'Accepted') db.session.add(db_model) db_model.corporation = app.config['CORPORATION'] if db_model.status not in ['Accepted', 'Recruiter']: db_model.status = 'Accepted' new_members.append(name) current_app.logger.info('-- {} has been accepted into the corporation'.format(name)) api_members.append(name) current_app.logger.debug('Full corp roster: ' + ', '.join(api_members)) for member in Member.query.filter_by(status='Accepted').all(): if member.character_name not in api_members: current_app.logger.warning('-- ' + member.character_name + ' is not in the corporation') left_members.append(member.character_name) if member.user: db.session.delete(member.user) db.session.delete(member) try: db.session.commit() current_app.logger.info('-- Database saved after member sync') except Exception as e: current_app.logger.error('-- An error occurred when syncing members: ' + str(e)) flash('Members imported', 'success') return { 'existing_members': existing_members, 'new_members': new_members, 'left_members': left_members } @app.route('/reports') @login_required def reports(): """ This page shows reports to the recruiters for the purpose of validation and security. Args: None Returns: Rendered template 'reports.html' """ if not current_user.recruiter and not current_user.admin: current_app.logger.debug('Visibility access denied to {}'.format(current_user.name)) return redirect(url_for('.index')) members = Member.query.filter(and_(Member.status != 'Left', Member.status != 'Guest')).all() member_names = get_all_member_names() defunct_alts = [] invalid_mains = [] missing_api_keys = [] for member in members: if member.character_name != member.main: if member.main not in member_names: invalid_mains.append(member) else: main = [m for m in members if m.character_name == member.main] if (len(main) > 0 and main[0].status == 'Left') or not main: defunct_alts.append(member) if not member.key_id or not member.v_code: missing_api_keys.append(member) return render_template('hr/reports.html', defunct_alts=defunct_alts, invalid_mains=invalid_mains, missing_api_keys=missing_api_keys) @app.route('/reddit/callback') @login_required def reddit_oauth_callback(): """ This transient endpoint completes the reddit OAuth verification process and sets the current user's reddit account in the database. Args: None Returns: redirect to the index endpoint """ if current_user.is_anonymous: return redirect(url_for('.login')) current_app.logger.debug('Reddit callback by {}'.format(current_user.name)) username = reddit_oauth.get_token(request.args['code']) user_member = get_member_for(current_user) user_member.reddit = username current_app.logger.info('{} updated their reddit account to {}'.format(current_user.name, username)) for member in Member.query.filter_by(main=user_member.character_name).all(): member.reddit = username current_app.logger.info('{} updated their alt {} reddit account to {}'.format( current_user.name, member.character_name, username )) db.session.commit() return redirect(url_for('.index')) def api_key_required(f): @wraps(f) def inner(*args, **kwargs): """ Endpoint decorator for REST interactions - the request header must contain the secret from the config. Args: args (tuple) - args kwargs (dict) - kwargs Returns: call of the wrapped method if the header was valid, a error 403 response otherwise """ token = request.headers.get('REST-SECRET') if not token or not token == app.config['REST_SECRET']: current_app.logger.warning('Access denied to API endpoint ' + str(request.endpoint) + ', token = ' + str(token)) abort(403) return f(*args, **kwargs) return inner @app.route('/api/sync') @api_key_required def api_sync(): """ Syncs the corporation membership with the EVE XML API and returns the result of doing so. Args: None Returns: response (JSON) """ current_app.logger.info('API endpoint sync accessed') return jsonify(sync_members()) @app.route('/api/apps') @api_key_required def api_apps(): """ Returns a list of all new apps since the last poll. Args: None Returns: response (JSON) """ current_app.logger.info('API endpoint apps accessed') apps = new_apps new_apps.clear() return jsonify(apps) @app.route('/api/keys') @api_key_required def api_keys(): """ Iterates through all API keys in the database and checks that they're still valid. Since API keys are validated when entered and cannot be removed from the system without being switched for another valid pair, the only way that a user can block access to their data through the EVE XML API is deleting the key from their account. There's no notification for this, so keys have to be checked periodically. To reduce the amount of API calls, members who've already left the corporation are not checked. Args: None Returns: response (JSON) """ current_app.logger.info('API endpoint keys accessed') invalid_keys = [] for member in Member.query.filter(Member.status != 'Left').all(): try: auth = XMLAPI(key=member.key_id, code=member.v_code, user_agent=eveapi['user_agent']) result = auth.account.APIKeyInfo() if not int(result['key']['@accessMask']) == app.config['API_KEY_MASK']: invalid_keys.append(member.character_name) current_app.logger.warning('-- ' + member.character_name + ' has an invalid API key!') else: current_app.logger.debug('-- ' + member.character_name + ' has a valid API key') except Exception: invalid_keys.append(member.character_name) current_app.logger.warning('-- ' + member.character_name + ' has an invalid API key!') return jsonify(invalid_keys) def get_all_member_names(): """ Returns a list of all member names in the corporation. Args: None Returns: value (list) of string names """ return sorted([m.character_name for m in Member.query.all()], key=lambda x: x.lower()) def get_id_for_name(name): """ This helper method takes a character's name and returns their EVE character ID. Args: name (str): character name Returns: int: character id """ return eveapi['xml'].eve.CharacterId(names=name)['rowset']['row']['@characterID'] def get_corp_for_name(name): """ This helper method takes a character's name and returns their corporation. Args: name (str) - full character name Returns: value (int) of their EVE character ID """ return get_corp_for_id(get_id_for_name(name)) def get_corp_for_id(id): """ This helper method takes a character's id and returns their corporation name. Args: name (str) - full character name Returns: value (str) of their corporation's name """ return eveapi['xml'].eve.CharacterAffiliation(ids=id)['rowset']['row']['@corporationName'] def get_member_for(user): """ This helper method returns the corresponding Member object for the user. Args: user (User): the user Returns: Member: member object if there's a user logged in, otherwise None """ if current_user.is_anonymous: return None return Member.query.filter_by(character_name=user.name).first()
{ "repo_name": "Celeo/GETIN-Auth", "path": "auth/hr/app.py", "copies": "1", "size": "28095", "license": "mit", "hash": -6048206060843003000, "line_mean": 33.9440298507, "line_max": 127, "alpha_frac": 0.6168001424, "autogenerated": false, "ratio": 3.8666391412056154, "config_test": true, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9978276465403346, "avg_score": 0.0010325636404537612, "num_lines": 804 }
from functools import wraps from flask import Blueprint from flask import current_app as app # noqa from flask import redirect, render_template, request, url_for from flask_login import LoginManager, current_user, login_user, logout_user from flask_wtf import Form from sqlalchemy import func from wtforms import PasswordField, TextField from wtforms.validators import DataRequired from .database import db_session from .models import User auth = Blueprint("auth", __name__) login_manager = LoginManager() class LoginForm(Form): email = TextField("email", validators=[DataRequired()]) password = PasswordField("password", validators=[DataRequired()]) def __init__(self, *args, **kwargs): Form.__init__(self, *args, **kwargs) self.user = None def validate(self): rv = Form.validate(self) if not rv: return False user = ( db_session.query(User) .filter( func.lower(User.email) == func.lower(self.email.data), User.role.in_(["admin", "callcenter"]), ) .first() ) if user is None: self.email.errors.append("Email address is not registered") return False if not user.check_password(user.email, self.password.data): self.password.errors.append("Password is not valid") return False self.user = user return True @login_manager.user_loader def load_user(userid): return db_session.query(User).get(userid) @login_manager.unauthorized_handler def handle_needs_login(): return redirect(url_for("auth.login", next=request.path)) @auth.route("/login/", methods=["GET", "POST"]) def login(): form = LoginForm() if form.validate_on_submit(): user = form.user login_user(user) redirect_next = url_for("views.index") if request.args.get("next"): redirect_next = request.args.get("next") return redirect(redirect_next) email = form.email.data return render_template("login.html", form=form, email=email) @auth.route("/logout/") def logout(): logout_user() return redirect(url_for("auth.login")) def admin_required(f): """Restrict view to users with 'admin' role""" @wraps(f) def decorated_function(*args, **kwargs): if current_user is None or current_user.role != "admin": return redirect(url_for("auth.login", next=request.url)) return f(*args, **kwargs) return decorated_function
{ "repo_name": "MetroTenants/squared_away_reporter", "path": "reporter/auth.py", "copies": "1", "size": "2552", "license": "mit", "hash": -3032293216430010400, "line_mean": 26.7391304348, "line_max": 75, "alpha_frac": 0.6347962382, "autogenerated": false, "ratio": 3.9261538461538463, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 92 }
from functools import wraps from flask import Blueprint, render_template, request from flask.ext.restful import abort, fields, reqparse, marshal_with, Resource from flask.ext.security import current_user from .core import api, db from .models import Actor, Character, Series from .utils import fields_from_model bp = Blueprint('index', __name__) @bp.route('/') def index(): return render_template('index/index.html') actor_fields = fields_from_model(Actor) series_fields = fields_from_model(Series) character_fields = fields_from_model(Character) character_fields['actor'] = fields.Nested(actor_fields) character_fields['series'] = fields.Nested(series_fields) actor_parser = reqparse.RequestParser() actor_parser.add_argument('name', type=str, required=True) series_parser = reqparse.RequestParser() series_parser.add_argument('name', type=str, required=True) series_parser.add_argument('debut_year', type=int, required=True) character_parser = reqparse.RequestParser() character_parser.add_argument('name', type=str, required=True) character_parser.add_argument('actor_id', type=int, required=True) character_parser.add_argument('series_id', type=int, required=True) def auth_to_modify(func): @wraps(func) def wrapper(*args, **kwargs): if (request.method in ('POST', 'PUT', 'DELETE') and not current_user.is_authenticated()): abort(401) return func(*args, **kwargs) return wrapper class ActorDetailResource(Resource): method_decorators = [marshal_with(actor_fields), auth_to_modify] def get(self, actor_id): return Actor.query.get_or_404(actor_id) def delete(self, actor_id): actor = Actor.query.get(actor_id) if actor: db.session.delete(actor) db.session.commit() return '', 204 def put(self, actor_id): args = actor_parser.parse_args() actor = Actor.query.get(actor_id) if not actor: actor = Actor(id=actor_id) db.session.add(actor) actor.name = args['name'] db.session.commit() return actor class ActorListResource(Resource): method_decorators = [marshal_with(actor_fields), auth_to_modify] def get(self): return Actor.query.all() def post(self): args = actor_parser.parse_args() actor = Actor(**args) db.session.add(actor) db.session.commit() return actor class SeriesDetailResource(Resource): method_decorators = [marshal_with(series_fields), auth_to_modify] def get(self, series_id): return Series.query.get_or_404(series_id) def delete(self, series_id): series = Series.query.get(series_id) if series: db.session.delete(series) db.session.commit() return '', 204 def put(self, series_id): args = series_parser.parse_args() series = Series.query.get(series_id) if not series: series = Series(id=series_id) db.session.add(series) series.name = args['name'] series.debut_year = args['debut_year'] db.session.commit() return series class SeriesListResource(Resource): method_decorators = [marshal_with(series_fields), auth_to_modify] def get(self): return Series.query.all() def post(self): args = series_parser.parse_args() series = Series(**args) db.session.add(series) db.session.commit() return series class CharacterDetailResource(Resource): method_decorators = [marshal_with(character_fields), auth_to_modify] def get(self, character_id): return Character.query.get_or_404(character_id) def delete(self, character_id): character = Character.query.get(character_id) if character: db.session.delete(character) db.session.commit() return '', 204 def put(self, character_id): args = character_parser.parse_args() character = Character.query.get(character_id) if not character: character = Character(id=character_id) db.session.add(character) character.name = args['name'] character.actor_id = args['actor_id'] character.series_id = args['series_id'] db.session.commit() return character class CharacterListResource(Resource): method_decorators = [marshal_with(character_fields), auth_to_modify] def get(self): return Character.query.all() def post(self): args = character_parser.parse_args() character = Character(**args) db.session.add(character) db.session.commit() return character api.add_resource(ActorListResource, '/actors/') api.add_resource(ActorDetailResource, '/actors/<int:actor_id>/') api.add_resource(SeriesListResource, '/series/') api.add_resource(SeriesDetailResource, '/series/<int:series_id>/') api.add_resource(CharacterListResource, '/characters/') api.add_resource(CharacterDetailResource, '/characters/<int:character_id>/')
{ "repo_name": "jonafato/ivadb", "path": "ivadb/views.py", "copies": "1", "size": "5092", "license": "bsd-3-clause", "hash": -6778747540117080000, "line_mean": 28.7777777778, "line_max": 77, "alpha_frac": 0.6535742341, "autogenerated": false, "ratio": 3.7249451353328458, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.48785193694328455, "avg_score": null, "num_lines": null }
from functools import wraps from flask import Blueprint, url_for, request from uchan.lib import roles from uchan.lib.action_authorizer import NoPermissionError from uchan.lib.moderator_request import request_has_role, get_authed mod = Blueprint('mod', __name__, url_prefix='/mod', template_folder='templates', static_folder='static') def mod_role_restrict(role): def decorator(f): @wraps(f) def decorated_function(*args, **kwargs): if not request_has_role(role): raise NoPermissionError() return f(*args, **kwargs) return decorated_function return decorator @mod.context_processor def inject_variables(): if get_authed(): mod_links = [ ('boards', ['mod.mod_boards', 'mod.mod_board_log']), ('reports', ['mod.mod_report']) ] if request_has_role(roles.ROLE_ADMIN): mod_links += [ ('bans', ['mod.mod_bans']), ('moderators', ['mod.mod_moderators']), ('pages', ['mod.mod_pages']), ('site', ['mod.mod_site']), ] mod_links += [ ('account', ['mod.mod_self']), ('logout', ['mod.mod_auth']) ] with_current_and_url = [] for mod_link in mod_links: current = any(i.startswith(request.endpoint) for i in mod_link[1]) with_current_and_url.append((mod_link[0], url_for(mod_link[1][0]), current)) return dict( mod_links=with_current_and_url, is_authed=True ) else: return {} import uchan.view.mod.mod_auth import uchan.view.mod.mod_report import uchan.view.mod.mod_self import uchan.view.mod.mod_board import uchan.view.mod.mod_moderator import uchan.view.mod.mod_site import uchan.view.mod.mod_bans import uchan.view.mod.mod_page
{ "repo_name": "Floens/uchan", "path": "uchan/view/mod/__init__.py", "copies": "1", "size": "1873", "license": "mit", "hash": -4358888981313848000, "line_mean": 26.9552238806, "line_max": 104, "alpha_frac": 0.5851575013, "autogenerated": false, "ratio": 3.5608365019011408, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.46459940032011404, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, abort, request def requires_debug(view): @wraps(view) def _(*args, **kwargs): strict = not current_app.config.get('FLASK_DEBUG_DISABLE_STRICT', False) if not current_app.debug: if strict: abort(404) # don't even show we have flask-debug installed abort(403, 'This function is only available if the application ' 'has been started in debug mode.') msg = [] if strict: # extra security checks msg = [] strict_env = { 'SERVER_NAME': '127.0.0.1', 'REMOTE_ADDR': '127.0.0.1', 'SERVER_PORT': '5000', } for env, val in strict_env.items(): if request.environ.get(env, None) != val: msg.append('{} is not {!r}.' .format(env, val)) if not request.environ.get('SERVER_SOFTWARE', '').startswith( 'Werkzeug/' ): msg.append('Not running on Werkzeug-Server.') if 'X-Forwarded-For' in request.headers: msg.append('Request has a X-Forwarded-For header.') if msg: msg.append('Strict security checks are enabled, to prevent ' 'security issues in case you have forgotten to ' 'disable debugging on a production system. You ' 'can disable these by setting ' 'FLASK_DEBUG_DISABLE_STRICT to True ' 'in your applications configuration.') if msg: abort(403, '\n\n'.join(msg)) return view(*args, **kwargs) return _
{ "repo_name": "mbr/Flask-Debug", "path": "flask_debug/security.py", "copies": "1", "size": "1860", "license": "mit", "hash": 4075692500568659000, "line_mean": 34.7692307692, "line_max": 76, "alpha_frac": 0.4822580645, "autogenerated": false, "ratio": 4.685138539042821, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 52 }
from functools import wraps from flask import current_app, g, session as cookie_session from flask_login import current_user from flask_themes2 import render_theme_template from structlog import get_logger from app.globals import get_metadata, get_session_timeout_in_seconds from app.templating.metadata_context import build_metadata_context from app.templating.template_renderer import TemplateRenderer from app.authentication.no_token_exception import NoTokenException logger = get_logger() def with_session_timeout(func): @wraps(func) def session_wrapper(*args, **kwargs): session_timeout = get_session_timeout_in_seconds(g.schema) return func( *args, session_timeout=session_timeout, **kwargs ) return session_wrapper def with_metadata_context(func): @wraps(wraps) def metadata_context_wrapper(*args, **kwargs): metadata = get_metadata(current_user) if not metadata: raise NoTokenException(401) metadata_context = build_metadata_context(metadata) return func(*args, metadata_context=metadata_context, **kwargs) return metadata_context_wrapper def with_analytics(func): @wraps(func) def analytics_wrapper(*args, **kwargs): return func( *args, analytics_gtm_id=current_app.config['EQ_GTM_ID'], analytics_gtm_env_id=current_app.config['EQ_GTM_ENV_ID'], **kwargs) return analytics_wrapper def with_questionnaire_url_prefix(func): @wraps(func) def url_prefix_wrapper(*args, **kwargs): metadata = get_metadata(current_user) metadata_context = build_metadata_context(metadata) url_prefix = '/questionnaire/{}/{}/{}'.format( metadata_context['eq_id'], metadata_context['form_type'], metadata_context['collection_id'], ) return func(*args, url_prefix=url_prefix, **kwargs) return url_prefix_wrapper def with_legal_basis(func): @wraps(func) def legal_basis_wrapper(*args, **kwargs): legal_basis = g.schema.json.get('legal_basis') return func(*args, legal_basis=legal_basis, **kwargs) return legal_basis_wrapper def render_template(template, **kwargs): theme = g.schema.json.get('theme') template = '{}.html'.format(template).lower() return render_theme_template( theme, template, survey_title=TemplateRenderer.safe_content(g.schema.json['title']), account_service_url=cookie_session.get('account_service_url'), account_service_log_out_url=cookie_session.get('account_service_log_out_url'), survey_id=g.schema.json['survey_id'], survey_guidance_url=g.schema.json.get('survey_guidance_url'), **kwargs )
{ "repo_name": "ONSdigital/eq-survey-runner", "path": "app/helpers/template_helper.py", "copies": "1", "size": "2812", "license": "mit", "hash": 1052785185171291300, "line_mean": 28.914893617, "line_max": 86, "alpha_frac": 0.6614509246, "autogenerated": false, "ratio": 3.846785225718194, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5008236150318194, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, jsonify from flask_jwt import ( _jwt_required, _default_request_handler, current_identity, JWTError) from qlutter_todo.extensions import bcrypt from qlutter_todo.models.user import User def authenticate(email, password): user = User.get_by_email(email) if user and bcrypt.check_password_hash(user.password.encode('utf-8'), password.encode('utf-8')): return user def identity(payload): user_id = payload['identity'] return User.get_by_id(user_id) def auth_response_handler(access_token, user): access_token = access_token.decode('utf-8') user.add_token(access_token) return jsonify({'access_token': access_token}) def auth_required(fn): @wraps(fn) def decorator(*args, **kwargs): _jwt_required(current_app.config['JWT_DEFAULT_REALM']) token = _default_request_handler() user = current_identity if not user.verify_token(token): raise JWTError('Bad request', 'Invalid token') return fn(*args, **kwargs) return decorator def logout(user): token = _default_request_handler() user.remove_token(token)
{ "repo_name": "pkolios/qlutter-todo", "path": "qlutter_todo/auth/utils.py", "copies": "1", "size": "1221", "license": "mit", "hash": -8176238634338875000, "line_mean": 27.3953488372, "line_max": 73, "alpha_frac": 0.6617526618, "autogenerated": false, "ratio": 3.688821752265861, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.48505744140658613, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, redirect, request, session from oic import rndstr from oic.oic.message import EndSessionRequest from werkzeug.exceptions import BadRequest def authenticate(view_fn): @wraps(view_fn) def wrapper(*args, **kwargs): if _reauthentication_necessary(): current_app.logger.info( 'Redirecting to {idp} for authentication'.format( idp=current_app.config['OIDC_CLIENT']['issuer'])) return _authenticate() return view_fn(*args, **kwargs) return wrapper def _reauthentication_necessary(): return session.get('id_token') is None def _authenticate(): session.update({ 'destination': request.url, 'state': rndstr(), 'nonce': rndstr() }) return redirect(_authentication_request()) def _authentication_request(): client = current_app.extensions['oidc_client'].client auth_req = client.construct_AuthorizationRequest( request_args={ 'client_id': client.client_id, 'response_type': 'code', 'scope': ['openid', 'profile'], 'redirect_uri': client.registration_response['redirect_uris'][0], 'state': session['state'], 'nonce': session['nonce'], 'kc_idp_hint': session.get( 'idp_hint', request.args.get('idp_hint')), 'login_hint': session.get('email_address'), 'claims': { 'id_token': { 'email': None, 'name': None }, 'userinfo': { 'email': {'essential': True}, 'name': {'essential': True} } } } ) return auth_req.request(client.authorization_endpoint) def logout(view_fn): current_app.extensions['oidc_client'].logout_view = view_fn @wraps(view_fn) def wrapper(*args, **kwargs): id_token_jwt = session['id_token_jwt'] if not _is_logout_redirect_callback(): current_app.logger.info('Clearing session') session.clear() url = _provider_logout_url(id_token_jwt) if url: current_app.logger.info('Logging out of IDP') return redirect(url, 303) return view_fn(*args, **kwargs) return wrapper def _is_logout_redirect_callback(): state = request.args.get('state') is_redirect = state is not None if is_redirect and state != session.pop('end_session_state'): raise BadRequest('Mismatched state') return is_redirect def _provider_logout_url(id_token_jwt): client = current_app.extensions['oidc_client'] endpoint = client.client.provider_info.get('end_session_endpoint') logout_urls = client.client_registration_info['post_logout_redirect_uris'] if not endpoint: return None session['end_session_state'] = rndstr() end_session_request = EndSessionRequest( id_token_hint=id_token_jwt, post_logout_redirect_uri=logout_urls[0], state=session['end_session_state']) return end_session_request.request(endpoint)
{ "repo_name": "crossgovernmentservices/sue-my-brother", "path": "app/oidc_client/decorators.py", "copies": "1", "size": "3209", "license": "mit", "hash": -799577294563918800, "line_mean": 26.4273504274, "line_max": 78, "alpha_frac": 0.5864755376, "autogenerated": false, "ratio": 4.056890012642225, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5143365550242225, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, request from itsdangerous import URLSafeSerializer from app.mod_api.errors import InvalidUsage def valid_facility(f): """A decorator to return a 404 if the facilitry is not there. :param f: Function to decorate. :type f: function :return: Decorated function. :rtype: function """ @wraps(f) def decorated_function(*args, **kwargs): if 'facility' in kwargs.keys(): if kwargs['facility'] not in current_app.facilities.keys(): raise InvalidUsage('facility not found', status_code=404) return f(*args, **kwargs) return decorated_function def valid_token(f): """A decorator to check if there is a token and if its valid. :param f: Function to decorate. :type f: function :return: Decorated function. :rtype: function """ @wraps(f) def decorated_function(*args, **kwargs): s = URLSafeSerializer(current_app.config['SECRET_KEY'], salt=kwargs['facility']) if 'token' not in request.args: raise InvalidUsage('no token', status_code=401) try: s.loads(request.args.get('token')) except: raise InvalidUsage('bad token', status_code=401) return f(*args, **kwargs) return decorated_function
{ "repo_name": "xsteadfastx/bib-api", "path": "app/mod_api/decorators.py", "copies": "1", "size": "1372", "license": "mit", "hash": 6815000623235580000, "line_mean": 25.3846153846, "line_max": 73, "alpha_frac": 0.6253644315, "autogenerated": false, "ratio": 4.083333333333333, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.001201923076923077, "num_lines": 52 }
from functools import wraps from flask import current_app, request from .allows import allows __all__ = ("requires", "exempt_from_requirements", "guard_entire") def _get_executing_handler(): return current_app.view_functions[request.endpoint] def _should_run_requirements(): if request.routing_exception is not None: return False return not getattr(_get_executing_handler(), "__allows_exempt__", False) def requires(*requirements, **opts): """ Standalone decorator to apply requirements to routes, either function handlers or class based views:: @requires(MyRequirement()) def a_view(): pass class AView(View): decorators = [requires(MyRequirement())] :param requirements: The requirements to apply to this route :param throws: Optional. Exception or exception instance to throw if authorization fails. :param on_fail: Optional. Value or function to use when authorization fails. :param identity: Optional. An identity to use in place of the currently loaded identity. """ identity = opts.get("identity") on_fail = opts.get("on_fail") throws = opts.get("throws") def decorator(f): @wraps(f) def allower(*args, **kwargs): result = allows.run( requirements, identity=identity, on_fail=on_fail, throws=throws, f_args=args, f_kwargs=kwargs, ) # authorization failed if result is not None: return result return f(*args, **kwargs) return allower return decorator def exempt_from_requirements(f): """ Used to exempt a route handler from ambient requirement handling unless it is explicitly decorated with a requirement runner:: @bp.route('/') @exempt_from_requirements def greeting_area(): return "Hello!" To use with a class based view, apply it to the class level decorators attribute:: class SomeCBV(View): decorators = [exempt_from_requirements] def get(self): return "Hello!" .. note:: You cannot exempt individual methods of a class based view with this decorator, e.g. the follow will not work:: class SomeCBV(MethodView): @exempt_from_requirements def get(self): return "Hello!" Any permissioning applied at the blueprint level would still affect this route. :param f: The route handler to be decorated. .. versionadded:: 0.7.0 """ f.__allows_exempt__ = True return f def guard_entire(requirements, identity=None, throws=None, on_fail=None): """ Used to protect an entire blueprint with a set of requirements. If a route handler inside the blueprint should be exempt, then it may be decorated with the :func:`~flask_allows.views.exempt_from_requirements` decorator. This function should be registered as a before_request handler on the blueprint and provided with the requirements to guard the blueprint with:: my_bp = Blueprint(__name__, 'namespace') my_bp.before_request(guard_entire(MustBeLoggedIn())) ``identity``, ``on_fail`` and ``throws`` may also be provided but are optional. If on_fails returns a non-None result, that will be considered the return value of the routing:: from flask import flash, redirect def flash_and_redirect(message, level, endpoint): def _(*a, **k): flash(message, level) return redirect(endpoint) return _ bp = Blueprint(__name__, 'namespace') bp.before_request( guard_entire( [MustBeLoggedIn()], on_fail=flash_and_redirect( "Please login in first", "warning", "login" ) ) ) ``on_fail`` will also receive anything found in ``flask.request.view_args`` as keyword arguments. If needed, this guard may be applied multiple times. This may be useful if different conditions should result in different `on_fail` mechanisms being invoked:: bp = Blueprint(__name__, "admin_panel") bp.before_request( guard_entire( [MustBeLoggedIn()], on_fail=flash_and_redirect( "Please login in first", "warning", "login" ) ) ) bp.before_request( guard_entire( [MustBeAdmin()], on_fail=flash_and_redirect( "You are not an admin.", "danger", "index" ) ) ) :param requirements: An iterable of requirements to apply to every request routed to the blueprint. :param identity: Optional. The identity that should be used for fulfilling requirements on the blueprint level. :param throws: Optional. Exception or exception type to be thrown if authorization fails. :param on_fail: Optional. Value or function to use if authorization fails. .. versionadded: 0.7.0 """ def guarder(): if _should_run_requirements(): return allows.run( requirements, identity=identity, on_fail=on_fail, throws=throws, f_kwargs=request.view_args, ) return None return guarder
{ "repo_name": "justanr/flask-allows", "path": "src/flask_allows/views.py", "copies": "1", "size": "5753", "license": "mit", "hash": -5603187767303640000, "line_mean": 27.3399014778, "line_max": 83, "alpha_frac": 0.5758734573, "autogenerated": false, "ratio": 4.719442165709598, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.00005864414731409805, "num_lines": 203 }
from functools import wraps from flask import current_app, request from itsdangerous import BadSignature, SignatureExpired, TimestampSigner from trexmo.core.db.models import User from trexmo.core.exc import ExpiredTokenError, InvalidTokenError, PrivilegeError def parse_auth(): """Parse the authentication token attached to the request. This function tries to retrieve the authentication token attached to the request by. It first looks for `X-Auth-Token` in the request headers. If no such header could be found, it checks for `Auth-Token` in the request cookies. The function returns the owner UID associated with the token attached to the request, or raises an exception if none of these locations contains a valid one. :raises ~trexmo.core.exc.InvalidTokenError: if the given token is missing or invalid. :raises ~trexmo.core.exc.ExpiredTokenError: if the given token expired. """ auth_token = request.headers.get('X-Auth-Token', request.cookies.get('Auth-Token')) if auth_token is None: raise InvalidTokenError() signer = TimestampSigner(current_app.secret_key) try: auth = signer.unsign(auth_token, max_age=current_app.config['AUTH_TOKEN_DURATION']) except BadSignature: raise InvalidTokenError() except SignatureExpired: raise ExpiredTokenError() return auth.decode() def require_auth(f): """A decorator that is used on views to ensure that a valid authentication token was attached to the request. The decorated function is called with the user UID obtained from the token as an additional argument. .. note:: The decorator raises a token exception if the authentication token is either missing or invalid, without calling the decorated function. """ @wraps(f) def wrapper(*args, **kwargs): # Get and validate the auth token. auth = parse_auth() # Append the owner UID to the function arguments and call it. kwargs['auth'] = auth return f(*args, **kwargs) return wrapper def require_root_auth(f): """A decorator that is used on views to ensure that a valid authentication token was attached to the request, and that it is associated with a root user. .. seealso:: func:`require_auth` """ @wraps(f) def wrapper(*args, **kwargs): # Get and validate the auth token. auth = parse_auth() # Make sure the associated user is a root. user = User.query.filter(User.uid == auth).first() if (user is None) or (not user.root): raise PrivilegeError() # Append the owner UID to the function arguments and call it. kwargs['auth'] = auth return f(*args, **kwargs) return wrapper def make_auth_token(auth_user): """Generates an authentication token for the given user.""" signer = TimestampSigner(current_app.secret_key) return signer.sign(str(auth_user.uid)).decode()
{ "repo_name": "kyouko-taiga/trexmo", "path": "trexmo/core/utils/auth.py", "copies": "1", "size": "3013", "license": "apache-2.0", "hash": -3344817518674191000, "line_mean": 31.3978494624, "line_max": 91, "alpha_frac": 0.68503153, "autogenerated": false, "ratio": 4.243661971830986, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5428693501830986, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, url_for, g, request from social.utils import module_member, setting_name from social.strategies.utils import get_strategy DEFAULTS = { 'STORAGE': 'social.apps.flask_me_app.models.FlaskStorage', 'STRATEGY': 'social.strategies.flask_strategy.FlaskStrategy' } def get_helper(name, do_import=False): config = current_app.config.get(setting_name(name), DEFAULTS.get(name, None)) return do_import and module_member(config) or config def load_strategy(*args, **kwargs): backends = get_helper('AUTHENTICATION_BACKENDS') strategy = get_helper('STRATEGY') storage = get_helper('STORAGE') return get_strategy(backends, strategy, storage, *args, **kwargs) def strategy(redirect_uri=None): def decorator(func): @wraps(func) def wrapper(backend, *args, **kwargs): uri = redirect_uri if uri and not uri.startswith('/'): uri = url_for(uri, backend=backend) g.strategy = load_strategy(request=request, backend=backend, redirect_uri=uri, *args, **kwargs) return func(backend, *args, **kwargs) return wrapper return decorator
{ "repo_name": "duoduo369/python-social-auth", "path": "social/apps/flask_me_app/utils.py", "copies": "2", "size": "1279", "license": "bsd-3-clause", "hash": 5814834186077399000, "line_mean": 31.7948717949, "line_max": 73, "alpha_frac": 0.6372165754, "autogenerated": false, "ratio": 3.984423676012461, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5621640251412462, "avg_score": null, "num_lines": null }
from functools import wraps from flask import current_app, url_for, g, request, redirect from social.utils import module_member, setting_name from social.strategies.utils import get_strategy DEFAULTS = { 'STORAGE': 'social.apps.flask_app.models.FlaskStorage', 'STRATEGY': 'social.strategies.flask_strategy.FlaskStrategy' } def get_helper(name, do_import=False): config = current_app.config.get(setting_name(name), DEFAULTS.get(name, None)) return do_import and module_member(config) or config def load_strategy(*args, **kwargs): backends = get_helper('AUTHENTICATION_BACKENDS') strategy = get_helper('STRATEGY') storage = get_helper('STORAGE') return get_strategy(backends, strategy, storage, *args, **kwargs) def strategy(redirect_uri=None): def decorator(func): @wraps(func) def wrapper(backend, *args, **kwargs): uri = redirect_uri if uri and not uri.startswith('/'): uri = url_for(uri, backend=backend) g.strategy = load_strategy(request=request, backend=backend, redirect_uri=uri, *args, **kwargs) return func(backend, *args, **kwargs) return wrapper return decorator def login_required(fn): @wraps(fn) def decorated_view(*args, **kwargs): if not g.user.is_authenticated: return redirect('/') return fn(*args, **kwargs) return decorated_view
{ "repo_name": "dongweiming/flask_reveal", "path": "social/apps/flask_app/utils.py", "copies": "1", "size": "1501", "license": "bsd-3-clause", "hash": -748781485152460700, "line_mean": 30.9361702128, "line_max": 73, "alpha_frac": 0.6315789474, "autogenerated": false, "ratio": 3.992021276595745, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5123600223995745, "avg_score": null, "num_lines": null }
from functools import wraps from flask import Flask from flask import jsonify from flask_jwt_extended import create_access_token from flask_jwt_extended import get_jwt from flask_jwt_extended import JWTManager from flask_jwt_extended import verify_jwt_in_request app = Flask(__name__) app.config["JWT_SECRET_KEY"] = "super-secret" # Change this! jwt = JWTManager(app) # Here is a custom decorator that verifies the JWT is present in the request, # as well as insuring that the JWT has a claim indicating that this user is # an administrator def admin_required(): def wrapper(fn): @wraps(fn) def decorator(*args, **kwargs): verify_jwt_in_request() claims = get_jwt() if claims["is_administrator"]: return fn(*args, **kwargs) else: return jsonify(msg="Admins only!"), 403 return decorator return wrapper @app.route("/login", methods=["POST"]) def login(): access_token = create_access_token( "admin_user", additional_claims={"is_administrator": True} ) return jsonify(access_token=access_token) @app.route("/protected", methods=["GET"]) @admin_required() def protected(): return jsonify(foo="bar") if __name__ == "__main__": app.run()
{ "repo_name": "vimalloc/flask-jwt-extended", "path": "examples/custom_decorators.py", "copies": "1", "size": "1288", "license": "mit", "hash": -6676005405439362000, "line_mean": 24.2549019608, "line_max": 77, "alpha_frac": 0.6529503106, "autogenerated": false, "ratio": 3.788235294117647, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9941185604717646, "avg_score": 0, "num_lines": 51 }
from functools import wraps from flask import Flask, render_template, redirect, request from google.appengine.api import users from models import Person def render_login_template(template, **kwargs): user = users.get_current_user() if user: login_url = users.create_logout_url(request.url) url_linktext = 'logout' else: login_url = users.create_login_url(request.url) url_linktext = 'login' return render_template(template, login_url=login_url, url_linktext=url_linktext, **kwargs) def with_person(func): @wraps(func) def decorated_view(*args, **kwargs): google_user = users.get_current_user() if google_user is not None: google_id = google_user.user_id() person = Person.with_google_id(google_id) if person is None: return redirect("/") else: return func(*args, person=person, **kwargs) else: raise Exception("no google user in new_person") return decorated_view
{ "repo_name": "augment00/a00_registry", "path": "src/shared.py", "copies": "1", "size": "1047", "license": "mit", "hash": 6025024351126661000, "line_mean": 29.7941176471, "line_max": 94, "alpha_frac": 0.629417383, "autogenerated": false, "ratio": 3.906716417910448, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5036133800910448, "avg_score": null, "num_lines": null }
from functools import wraps from flask import (Flask, render_template, request, redirect, url_for, flash, make_response, jsonify) from flask import session as login_session from sqlalchemy import create_engine, asc from sqlalchemy.orm import sessionmaker from database_setup import (Base, User, Catalog, Category, Record, Field, RecordTemplate, FieldTemplate, Option) from oauth2client.client import flow_from_clientsecrets from oauth2client.client import FlowExchangeError import random, string, httplib2, json, requests app = Flask(__name__) APPLICATION_NAME = "Catalogizer" # client id for google openID CLIENT_ID = json.loads(open( 'client_secrets.json', 'r').read())['web']['client_id'] engine = create_engine('sqlite:///catalogizer.db') Base.metadata.bind = engine DBSession = sessionmaker(bind=engine) session = DBSession() def login_required(f): # Needed for decoraters to update __name__ and __module__ @wraps(f) def decorated_function(*args, **kwargs): if 'user_id' not in login_session: return redirect('/login') return f(*args, **kwargs) return decorated_function @app.route('/login/') def show_login(): state = ''.join(random.choice( string.ascii_uppercase + string.digits) for x in xrange(32)) login_session['state'] = state if 'gplus_id' in login_session: flash('You are already logged in.', 'error') return redirect('/') if 'facebook_id' in login_session: flash('You are already logged in.', 'error') return redirect('/') return render_template('login.html', STATE=state) @app.route('/gconnect', methods=['Post']) def gconnect(): if request.args.get('state') != login_session.get('state'): response = make_response(json.dumps('Invalid state parameter'), 401) response.headers['Content-Type'] = 'application/json' return response code = request.data try: # Upgrade the authorization code into a credentials object that can be # used to authorize requests. oauth_flow = flow_from_clientsecrets('client_secrets.json', scope='') oauth_flow.redirect_uri = 'postmessage' credentials = oauth_flow.step2_exchange(code) except FlowExchangeError: response = make_response(json.dumps( 'Failed to upgrade the authorization code.'), 401) response.headers['Content-Type'] = 'application/json' return response # Check that the access token is valid. access_token = credentials.access_token url = ('https://www.googleapis.com/oauth2/v1/tokeninfo?access_token=%s' % access_token) h = httplib2.Http() result = json.loads(h.request(url, 'GET')[1]) # If there was an error in the access token info, abort. if result.get('error') is not None: response = make_response(json.dumps(result.get('error')), 500) response.headers['Content-Type'] = 'application/json' # Verify that the acces token is used for the intendend user. gplus_id = credentials.id_token['sub'] if result['user_id'] != gplus_id: response = make_response(json.dumps( "Token's user ID doesn't match given user ID."), 401) response.headers['Content-Type'] = 'application/json' return response # Verify that the access token is valid for this app. if result['issued_to'] != CLIENT_ID: response = make_response(json.dumps( "Token's client ID does not match app's"), 401) response.headers['Content-Type'] = 'application/json' return response # Check to see if user is already logged in. stored_access_token = login_session.get('access_token') stored_gplus_id = login_session.get('gplus_id') if stored_access_token is not None and gplus_id == stored_gplus_id: response = make_response(json.dumps( "Current user is already connected."), 200) response.headers['Content-Type'] = 'application/json' return response # Store the access token in the session for later use. login_session['access_token'] = access_token login_session['gplus_id'] = gplus_id # Get user info userinfo_url = "https://www.googleapis.com/oauth2/v1/userinfo" params = {'access_token': access_token, 'alt': 'json'} answer = requests.get(userinfo_url, params=params) data = answer.json() login_session['username'] = data['name'] login_session['picture'] = data['picture'] login_session['email'] = data['email'] # See if user exists and get ID assigned in database. user_id = getUserID(login_session['email']) if not user_id: user_id = createUser(login_session) login_session['user_id'] = user_id updateUser(login_session['user_id'], login_session['picture'], login_session['username']) output = '' output += '<h1>Welcome, ' output += login_session['username'] output += '!</h1>' output += '<img src="' output += login_session['picture'] output += (' " style = "width: 300px; height: 300px;' 'border-radius: 150px;-webkit-border-radius: 150px' ';-moz-border-radius: 150px;"> ') flash("Now logged in as %s" % login_session['username']) print login_session return output @app.route('/fbconnect', methods=['POST']) def fbconnect(): if request.args.get('state') != login_session['state']: response = make_response(json.dumps('Invalid state parameter.'), 401) response.headers['Content-Type'] = 'application/json' return response access_token = request.data app_id = json.loads(open( 'fb_client_secrets.json', 'r').read())['web']['app_id'] app_secret = json.loads(open( 'fb_client_secrets.json', 'r').read())['web']['app_secret'] url = ('https://graph.facebook.com/oauth/access_token?' 'grant_type=fb_exchange_token&client_id=%s&client_secret=%s&' 'fb_exchange_token=%s' % (app_id, app_secret, access_token)) h = httplib2.Http() result = h.request(url, 'GET')[1] # Use token to get user info from API userinfo_url = "https://graph.facebook.com/v2.4/me" # Strip expire tag from access token token = result.split("&")[0] url = userinfo_url + '?%s&fields=name,id,email' % token h = httplib2.Http() result = h.request(url, 'GET')[1] data = json.loads(result) login_session['username'] = data["name"] login_session['email'] = data["email"] login_session['facebook_id'] = data["id"] # The token must be stored in the login_session in order to properly logout # strip out the information before the equals sign in the token stored_token = token.split("=")[1] login_session['access_token'] = stored_token # Get user picture url = ('https://graph.facebook.com/v2.4/me/picture?' '%s&redirect=0&height=200&width=200' % token) h = httplib2.Http() result = h.request(url, 'GET')[1] data = json.loads(result) login_session['picture'] = data["data"]["url"] # see if user exists, create user if they don't, and get assigned id user_id = getUserID(login_session['email']) if not user_id: user_id = createUser(login_session) login_session['user_id'] = user_id updateUser(login_session['user_id'], login_session['picture'], login_session['username']) output = '' output += '<h1>Welcome, ' output += login_session['username'] output += '!</h1>' output += '<img src="' output += login_session['picture'] output += (' " style = "width: 300px; height: 300px;' 'border-radius: 150px;-webkit-border-radius: 150px' ';-moz-border-radius: 150px;"> ') flash("Now logged in as %s" % login_session['username']) return output # DISCONNECT - Revoke a current user's token and reset their login_session. def gdisconnect(): access_token = login_session['access_token'] url = 'https://accounts.google.com/o/oauth2/revoke?token=%s' % access_token h = httplib2.Http() result = h.request(url, 'GET')[0] if result['status'] == '200': del login_session['access_token'] del login_session['gplus_id'] del login_session['username'] del login_session['email'] del login_session['picture'] del login_session['user_id'] flash('You have been sucessfully logged out') return redirect(url_for('viewCatalogs')) else: response = make_response(json.dumps( 'Failed to revoke token for given user.', 400)) response.headers['Content-Type'] = 'application/json' return response def fbdisconnect(): access_token = login_session['access_token'] facebook_id = login_session['facebook_id'] url = 'https://graph.facebook.com/%s/\ permissions?access_token=%s' % (facebook_id, access_token) h = httplib2.Http() result = h.request(url, 'DELETE')[1] print 'result is ' print result if 'success' in result: del login_session['access_token'] del login_session['facebook_id'] del login_session['username'] del login_session['email'] del login_session['picture'] del login_session['user_id'] flash('You have been sucessfully logged out') return redirect(url_for('viewCatalogs')) else: response = make_response(json.dumps( 'Failed to revoke token for given user.', 400)) response.headers['Content-Type'] = 'application/json' return response @app.route("/disconnect/") def disconnect(): if not login_session: return redirect('/login') access_token = login_session.get('access_token') if access_token is None: flash('You are not logged in', 'error') return redirect(url_for('show_login')) if 'gplus_id' in login_session: return gdisconnect() elif 'facebook_id' in login_session: return fbdisconnect() else: return redirect('/login') @app.route('/') @app.route('/catalog/') def viewCatalogs(): # print login_session catalogs = getCatalogs() return render_template('viewCatalogs.html', catalogs=catalogs, current_user=login_session.get('user_id')) @app.route('/catalog/new/', methods=['GET', 'POST']) @login_required def newCatalog(): if request.method == 'POST': catalogName = request.form['catalog-name'] newCatalogEntry = Catalog(name=catalogName, user_id=login_session.get('user_id')) try: session.add(newCatalogEntry) session.commit() flash('%s successfully created!' % catalogName) except: session.rollback() raise return redirect(url_for('viewCatalogs')) else: return render_template('newCatalog.html') @app.route('/catalog/<int:catalog_id>/edit/', methods=['GET', 'POST']) @login_required def editCatalog(catalog_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can edit this catalog.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': newCatalogName = request.form['new-catalog-name'] catalog.name = newCatalogName try: session.commit() flash('%s successfully edited!' % newCatalogName) except: session.rollback() raise return redirect(url_for('viewCatalogs')) else: return render_template('editCatalog.html', catalog=catalog) @app.route('/catalog/<int:catalog_id>/delete/', methods=['GET', 'POST']) @login_required def deleteCatalog(catalog_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can delete this catalog.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': delCatalog(catalog_id) return redirect(url_for('viewCatalogs')) else: return render_template('deleteCatalog.html', catalog=catalog) @app.route('/catalog/<int:catalog_id>/category/') def viewCategories(catalog_id): catalog = getCatalog(catalog_id) categories = getCategories(catalog_id) return render_template('viewCategories.html', catalog=catalog, categories=categories, current_user=login_session.get('user_id')) @app.route('/catalog/<int:catalog_id>/category/new', methods=['GET', 'POST']) @login_required def newCategory(catalog_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can add a category to it.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': categoryName = request.form['category-name'] categoryEntry = Category(name=categoryName, catalog_id=catalog.id) try: session.add(categoryEntry) session.commit() flash('%s successfully created!' % categoryName) except: session.rollback() raise return redirect(url_for('viewCategories', catalog_id=catalog.id)) else: return render_template('newCategory.html', catalog=catalog) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/edit/', methods=['GET', 'POST']) @login_required def editCategory(catalog_id, category_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can edit this category.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) category = getCategory(category_id) if request.method == 'POST': newCategoryName = request.form['new-category-name'] category.name = newCategoryName try: session.commit() except: session.rollback() raise flash('%s successfully edited!' % newCategoryName) return redirect(url_for('viewCategories', catalog_id=catalog_id)) else: return render_template('editCategory.html', catalog=catalog, category=category) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/delete/', methods=['GET', 'POST']) @login_required def deleteCategory(catalog_id, category_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can delete this category.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': delCategory(category_id) return redirect(url_for('viewCategories', catalog_id=catalog_id)) else: category = getCategory(category_id) return render_template('deleteCategory.html', catalog=catalog, category=category) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/') def viewRecords(catalog_id, category_id): catalog = getCatalog(catalog_id) category = getCategory(category_id) records = getRecordsByCategoryId(category_id) return render_template('viewRecords.html', catalog=catalog, category=category, records=records, current_user=login_session.get('user_id')) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/add/') @login_required def addRecord(catalog_id, category_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can add a new record to it.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) category = getCategory(category_id) recordTemplates = getRecordTemplates(category_id) return render_template('addRecord.html', catalog=catalog, category=category, rTemplates=recordTemplates, current_user=login_session.get('user_id')) # Over 80 characters, however URL Routes break if they go to new line. @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/add/<int:record_template_id>/new/', methods=['GET', 'POST']) @login_required def newRecord(catalog_id, category_id, record_template_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can add a new record to it.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': recordName = request.form['record-name'] addNewRecord(category_id, record_template_id) flash('%s successfully created!' % recordName) return redirect(url_for('viewRecords', catalog_id=catalog_id, category_id=category_id)) else: category = getCategory(category_id) recordTemplate = getRecordTemplate(record_template_id) fieldTemplatesWithOptions = getFormattedFieldTemplatesWithOptions( record_template_id) return render_template('newRecord.html', catalog=catalog, category=category, rTemplate=recordTemplate, fTemplates=fieldTemplatesWithOptions) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/<int:record_id>/edit/', methods=['GET', 'POST']) @login_required def editRecord(catalog_id, category_id, record_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can edit this record.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) record = getRecord(record_id) if request.method == 'POST': newName = request.form['record-name'] record_template_id = record.record_template_id delRecord(record_id) addNewRecord(category_id, record_template_id) flash('%s successfully edited!' % newName) return redirect(url_for('viewRecords', catalog_id=catalog_id, category_id=category_id)) else: category = getCategory(category_id) fieldTemplatesWithValues = getFieldTemplatesWithValues(record_id) return render_template('editRecord.html', catalog=catalog, category=category, record=record, fTemplates=fieldTemplatesWithValues) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/<int:record_id>/delete/', methods=['GET', 'POST']) @login_required def deleteRecord(catalog_id, category_id, record_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can delete this record.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': record = getRecord(record_id) flash('%s successfully deleted!' % record.name) delRecord(record_id) return redirect(url_for('viewRecords', catalog_id=catalog_id, category_id=category_id)) else: category = getCategory(category_id) record = getRecord(record_id) return render_template('deleteRecord.html', catalog=catalog, category=category, record=record) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/<int:record_id>/view/') def showRecord(catalog_id, category_id, record_id): catalog = getCatalog(catalog_id) category = getCategory(category_id) record = getRecord(record_id) fields = getFormattedFields(record_id) return render_template('showRecord.html', catalog=catalog, category=category, record=record, fields=fields) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/add/template/', methods=['GET', 'POST']) @login_required def newRecordTemplate(catalog_id, category_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can add a record template for it.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': # werkzeug returns an immutable object. Using .copy() creates a mutable # copy. formData = request.form.copy() # Pop recordTemplateName as it has a different format than the other # values, and goes in a seperate table. recordTemplateName = formData.pop('template-name') recordTemplateEntry = RecordTemplate(name=recordTemplateName, category_id=category_id) try: session.add(recordTemplateEntry) session.commit() except: session.rollback() raise # Iterate over form inputs, placing labels and field kind inside the # FieldTemplate table, and options within the Option table. for keyValue in formData.lists(): # Each field template has a 'label' and a field 'kind', # which may or may not have 'options' assigned to it. # They are grouped together by a group identifier number at # the beginning of the field name (before the first hyphen). groupIdentifier = keyValue[0][0:keyValue[0].find("-")] inputType = keyValue[0][keyValue[0].find("-") + 1:] # For each of the inputs with the name "field-kind", # find their label and options using the group identifier and # add them to their respective tables. if inputType == "field-kind": fieldTemplateLabel = formData.get( groupIdentifier + "-field-label") fieldTemplateKind = formData.get( groupIdentifier + "-field-kind") fieldTemplateOptions = formData.getlist( groupIdentifier + "-option") fieldTemplateEntry = FieldTemplate( label=fieldTemplateLabel, kind=fieldTemplateKind, order=groupIdentifier, record_template_id=recordTemplateEntry.id) try: session.add(fieldTemplateEntry) session.commit() except: session.rollback() raise while len(fieldTemplateOptions) > 0: optionEntry = Option( name=fieldTemplateOptions.pop(0), field_template_id=fieldTemplateEntry.id) try: session.add(optionEntry) session.commit() except: session.rollback() raise flash('%s successfully created!' % recordTemplateName) return redirect(url_for('addRecord', catalog_id=catalog_id, category_id=category_id)) else: category = getCategory(category_id) return render_template('recordTemplate.html', catalog=catalog, category=category) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/add/template/<int:record_template_id>/edit/', methods=['GET', 'POST']) @login_required def editRecordTemplate(catalog_id, category_id, record_template_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can edit this record template.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) rTemplate = getRecordTemplate(record_template_id) if request.method == 'POST': newRecordTemplateName = request.form['new-rt-name'] rTemplate.name = newRecordTemplateName try: session.commit() flash('%s successfully edited!' % newRecordTemplateName) except: session.rollback() raise return redirect(url_for('addRecord', catalog_id=catalog_id, category_id=category_id)) else: catalog = getCatalog(catalog_id) category = getCategory(category_id) return render_template('editRecordTemplate.html', catalog=catalog, category=category, rTemplate=rTemplate) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/add/template/<int:record_template_id>/delete/', methods=['GET', 'POST']) @login_required def deleteRecordTemplate(catalog_id, category_id, record_template_id): catalog = getCatalog(catalog_id) if catalog.user_id != login_session.get('user_id'): flash('Only the owner of %s can delete this record template.' % catalog.name, 'error') return redirect(url_for('viewCatalogs')) if request.method == 'POST': delRecord_Template(record_template_id) return redirect(url_for('addRecord', catalog_id=catalog_id, category_id=category_id)) else: category = getCategory(category_id) rTemplate = getRecordTemplate(record_template_id) return render_template('deleteRecordTemplate.html', catalog=catalog, category=category, rTemplate=rTemplate) # JSON API Endpoints @app.route('/catalog/json/') def catalogListJSON(): catalogs = getCatalogs() return jsonify(Catalogs=[c.serialize for c in catalogs]) @app.route('/catalog/<int:catalog_id>/category/json/') def categoryListJSON(catalog_id): categories = getCategories(catalog_id) return jsonify(Categories=[c.serialize for c in categories]) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/json/') def recordListJSON(catalog_id, category_id): records = getRecordsByCategoryId(category_id) return jsonify(Records=[r.serialize for r in records]) @app.route('/catalog/<int:catalog_id>/category/<int:category_id>/record/<int:record_id>/view/json/') def fieldListJSON(catalog_id, category_id, record_id): fields = getFields(record_id) return jsonify(Fields=[r.serialize for r in fields]) # Helper functions for adding new entries or updating entries def createUser(login_session): newUser = User(name=login_session['username'], email=login_session['email'], picture=login_session['picture']) try: session.add(newUser) session.commit() except: session.rollback() raise # user = session.query(User).filter_by(email=login_session['email']).one() # return user.id return newUser.id def updateUser(user_id, picture, name): user = session.query(User).filter_by(id=user_id).one() change = False if user.picture != picture: user.picture = picture change = True if user.name != name: user.name = name change = True if change is True: try: session.commit() except: session.rollback() raise def addNewRecord(category_id, record_template_id): # The request object is a Werkzeug data structure called # ImmutableMultiDict, which has a copy method that returns a # mutable Wekzeug MultiDict. formData = request.form.copy() # Pop the first item (the record name) for a list on the dict, and remove # the key from the dict. recordName = formData.pop('record-name') newRecordEntry = Record(name=recordName, record_template_id=record_template_id, category_id=category_id) try: session.add(newRecordEntry) session.commit() except: session.rollback() raise # Call lists method on the formData multiDict, to get a list of # tupples of keys and a list of all values corresponding to each # unique key. for keyValues in formData.lists(): fieldTemplateId = int(keyValues[0]) fieldValues = keyValues[1] for fieldValue in fieldValues: # After calling session.commit() on the newRecordEntry, # SQLAlchemy automatically reloads the object from the database, # allowing access to its assigned primary key. newFieldEntry = Field(value=fieldValue, field_template_id=fieldTemplateId, record_id=newRecordEntry.id) session.add(newFieldEntry) try: session.commit() except: session.rollback() raise # Helper functions to filter through and get database elements def getUserID(email): try: user = session.query(User).filter_by(email=email).one() return user.id except: return None def getCatalogs(): return session.query(Catalog).all() def getCatalog(catalog_id): return session.query(Catalog).filter_by(id=catalog_id).one() def getCategories(catalog_id): return session.query(Category).filter_by(catalog_id=catalog_id).all() def getCategory(category_id): return session.query(Category).filter_by(id=category_id).one() def getRecord(record_id): return session.query(Record).filter_by(id=record_id).one() def getRecordsByCategoryId(category_id): return session.query(Record).filter_by(category_id=category_id).all() def getRecordsByRecordTemplateId(record_template_id): return session.query(Record).filter_by( record_template_id=record_template_id).all() def getFields(record_id): return session.query(Field).filter_by(record_id=record_id).all() def getRecordTemplate(record_template_id): return session.query(RecordTemplate).filter_by(id=record_template_id).one() def getRecordTemplates(category_id): return session.query(RecordTemplate).filter_by( category_id=category_id).all() def getFieldTemplates(record_template_id): return session.query(FieldTemplate).filter_by( record_template_id=record_template_id).order_by( asc(FieldTemplate.order)) def getOptions(field_template_id): return session.query(Option).filter_by( field_template_id=field_template_id).order_by( asc(Option.id)) def getFormattedFields(record_id): """Returns field labels and values in the form of an array of tupples of the field label and an array of the field values. E.g. [ ( field label, [field value1, field value2] ) ]""" record = getRecord(record_id) fieldTemplates = getFieldTemplates(record.record_template_id) fields = [] for fieldTemplate in fieldTemplates: fieldLabel = fieldTemplate.label valueList = session.query(Field).filter_by( field_template_id=fieldTemplate.id, record_id=record.id).order_by( asc(Field.id)) fieldValues = [] for v in valueList: fieldValues.append(v.value) fields.append((fieldLabel, fieldValues)) return fields def getFormattedFieldTemplatesWithOptions(record_template_id): """Returns a list of dictionaries containing field template id, label, kind, and a list of options for that field template.""" fieldTemplates = getFieldTemplates(record_template_id) fieldsWithOptions = [] for fieldTemplate in fieldTemplates: fieldTemplateDict = { 'id': fieldTemplate.id, 'label': fieldTemplate.label, 'kind': fieldTemplate.kind, 'options': [] } options = getOptions(fieldTemplate.id) for option in options: fieldTemplateDict['options'].append((option.name, option.id)) fieldsWithOptions.append(fieldTemplateDict) return fieldsWithOptions def getFieldTemplatesWithValues(record_id): """Returns a list of dictionaries containing field template id, label, kind, a list of options for that field template, and the value(s) for that field. Field Templates of the kind 'checkbox' may have more than one of the options selected as s value""" record = getRecord(record_id) ftDictList = getFormattedFieldTemplatesWithOptions( record.record_template_id) for ftDict in ftDictList: ftDict['values'] = [] ftId = ftDict['id'] fields = session.query(Field).filter_by(field_template_id=ftId).all() for field in fields: value = field.value ftDict['values'].append(value) return ftDictList # Helper functions to delete database items def delRecord(record_id): record = getRecord(record_id) fields = getFields(record_id) for field in fields: try: session.delete(field) session.commit() except: session.rollback() raise try: session.delete(record) session.commit() except: session.rollback() raise def delRecord_Template(record_template_id): recordTemplate = getRecordTemplate(record_template_id) fieldTemplates = getFieldTemplates(record_template_id) records = getRecordsByRecordTemplateId(record_template_id) flash('%s successfully deleted!' % recordTemplate.name) for record in records: delRecord(record.id) for fieldTemplate in fieldTemplates: options = getOptions(fieldTemplate.id) for option in options: try: session.delete(option) session.commit() except: session.rollback() raise try: session.delete(fieldTemplate) session.commit() except: session.rollback() raise try: session.delete(recordTemplate) session.commit() except: session.rollback() raise def delCategory(category_id): category = getCategory(category_id) recordTemplates = getRecordTemplates(category_id) flash('%s successfully deleted!' % category.name) for recordTemplate in recordTemplates: delRecord_Template(recordTemplate.id) try: session.delete(category) session.commit() except: session.rollback() raise def delCatalog(catalog_id): catalog = getCatalog(catalog_id) categories = getCategories(catalog_id) flash('%s successfully deleted!' % catalog.name) for category in categories: delCategory(category.id) try: session.delete(catalog) session.commit() except: session.rollback() raise if __name__ == '__main__': app.secret_key = 'super_secret_key' app.debug = True app.run(host='0.0.0.0', port=5000)
{ "repo_name": "gnodar01/catalog", "path": "catalogizer.py", "copies": "1", "size": "36589", "license": "mit", "hash": -471585458241064700, "line_mean": 34.6965853659, "line_max": 144, "alpha_frac": 0.6042799749, "autogenerated": false, "ratio": 4.166837490035303, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.001520911170991458, "num_lines": 1025 }
from functools import wraps from flask import Flask, render_template, request, Response app = Flask(__name__) from pymongo import MongoClient from bson.objectid import ObjectId import os import json import re from utils.ara2man import ara2man # SETTINGS regexp = r'([\d同一二三四五六七八九十]+年[、同某\d一二三四五六七八九十零]*月[初間某\d卅廿一二三四五六七八九十零]+日?)' keywords = [ {'text':'竊', 'prev': 30, 'color': 'light'}, {'text':'引用', 'prev': 0, 'color': 'important'} ] uri = os.environ['MONGODB_URI'] client = MongoClient(uri, connectTimeoutMS=30000, socketTimeoutMS=None, socketKeepAlive=True) db = client.get_default_database() judgements = db.judgements users = db.users def check_auth(username, password): user = users.find_one({ 'username': username }) if user is None: return False and False else: return username == user['username'] and password == user['password'] def authenticate(): """Sends a 401 response that enables basic auth""" return Response( 'Could not verify your access level for that URL.\n' 'You have to login with proper credentials', 401, {'WWW-Authenticate': 'Basic realm="Login Required"'}) def requires_auth(f): @wraps(f) def decorated(*args, **kwargs): auth = request.authorization if not auth or not check_auth(auth.username, auth.password): return authenticate() return f(*args, **kwargs) return decorated @app.route('/') @requires_auth def index(): user = request.authorization.username u = users.find({}, {'_id': 0, 'username': 1})[:] finish = {} finish.update(map(lambda e: (e['username'], judgements.find({'editor': e['username']}).count()), u)) pagination_len = 40 per_page = 80 page_num = int(request.args.get('p', 1)) query_conds = [] query_show = '' show = request.args.get('show', 'false') if show == 'false': query_conds.append({'state': False}) query_show += '' elif show == 'true': query_conds.append({'state': True}) query_show += '&show=true' else: query_conds.append({}) query_show += '&show=both' query_date = '' year_ara = request.args.get('syr', '').strip() month_ara = request.args.get('smth', '').strip() day_ara = request.args.get('sd', '').strip() if year_ara != '' and month_ara != '' and day_ara != '': year_man = ara2man(year_ara) month_man = ara2man(month_ara) day_man = ara2man(day_ara) query_date += '&syr={year}&smth={month}&sd={day}'.format(year=year_ara, month=month_ara, day=day_ara) # Rules of date including abbreviations search = [ re.compile('{year}年{month}月{day}日'.format(year=year_ara, month=month_ara, day=day_ara)), re.compile('{year}年{month}月{day}日'.format(year=year_man, month=month_man, day=day_man)), re.compile('{year}年.*同年{month}月{day}日'.format(year=year_ara, month=month_ara, day=day_ara)), re.compile('{year}年.*同年{month}月{day}日'.format(year=year_man, month=month_man, day=day_man)), re.compile('{year}年.*{month}月.*同月{day}日'.format(year=year_ara, month=month_ara, day=day_ara)), re.compile('{year}年.*{month}月.*同月{day}日'.format(year=year_man, month=month_man, day=day_man)), ] query_conds.append({'$or': [{'事實理由': {'$regex': reg}} for reg in search]}) query = judgements.find({'$and': query_conds}) part = query.skip((page_num - 1) * per_page).limit(per_page) all_page_num = int(query.count() / per_page) + 1 if all_page_num < pagination_len: lb = 1 ub = all_page_num elif page_num < pagination_len: lb = 1 ub = min(all_page_num, pagination_len) elif page_num > all_page_num - pagination_len: lb = all_page_num - pagination_len ub = all_page_num else: lb = page_num - int(pagination_len / 2) ub = page_num + int(pagination_len / 2) return render_template('index.html', judgements=list(part), per_page=per_page, current_page_num=page_num, all_page_num=all_page_num, search={'year': year_ara, 'month': month_ara, 'day': day_ara}, lb=lb, ub=ub, query_show=query_show, query_date=query_date, username=user, finish=finish) @app.route('/j/<jid>') @requires_auth def judgement(jid=None): j = judgements.find_one({'_id': ObjectId(jid)}) raw = j['事實理由'] process = list(({'idx': idx, 'char': char, 'highlight': False, 'color': ''} for idx, char in enumerate(raw))) # Search for highlight for keyword in keywords: highlights = re.finditer(re.compile(keyword['text']), raw) for m in highlights: start = max(m.start() - keyword['prev'], 0) end = m.end() for d in process[start:end]: d['highlight'] = True d['color'] = keyword['color'] split = re.split(regexp, raw) content = [] count_of_date = 0 for text in split: start = raw.index(text) end = start + len(text) if re.match(regexp, text) is not None: count_of_date += 1 if text in j['dates']: content.append({ 'text': ''.join([p['char'] for p in process[start:end]]), 'chars': list(process[start:end]), 'is_date': True, 'select': True }) else: content.append({ 'text': ''.join([p['char'] for p in process[start:end]]), 'chars': list(process[start:end]), 'is_date': True, 'select': False }) else: content.append({ 'text': ''.join([p['char'] for p in process[start:end]]), 'chars': list(process[start:end]), 'is_date': False, 'select': False }) count_of_identity = judgements.find({'identity': j['identity']}).count() return render_template('judgement.html', content=content, judgement=j, count_of_date=count_of_date, count_of_identity=count_of_identity, ) @app.route('/j/<jid>/save', methods=['POST']) @requires_auth def save(jid=None): try: user = request.authorization.username j = judgements.find({'_id': ObjectId(jid)}).sort("_id").limit(1) dates = request.form.getlist('chosen-date') judgements.update_one({'_id': ObjectId(jid)}, {'$set': {'dates': dates, 'state': True, 'editor': user}}, upsert=False) n = judgements.find({'_id': {'$gt': ObjectId(jid) }, 'state': False}).sort('_id').limit(1) if n.count() > 0: return 'Successfully saved! Go to <a href="/j/{jid}">the next document</a>.'.format(jid=n[0]['_id']) else: return 'Successfully saved! Go back to <a href="/?show=both">the list</a>.' except: return 'Something went wrong. <a href="/j/{jid}">Go back</a> and try again.'.format(jid=jid) @app.route('/j/<jid>/pass') @requires_auth def pass_over(jid=None): try: user = request.authorization.username j = judgements.find_one({'_id': ObjectId(jid)}) judgements.update_one({'_id': ObjectId(jid)}, {'$set': {'dates': [], 'state': True, 'editor': user}}, upsert=False) n = judgements.find({'_id': {'$gt': ObjectId(jid) }, 'state': False}).sort('_id').limit(1) if n.count() > 0: return 'Successfully saved! Go to <a href="/j/{jid}">the next document</a>.'.format(jid=n[0]['_id']) else: return 'Successfully saved! Go back to <a href="/?show=both">the list</a>.' except: return 'Something went wrong. <a href="/j/{jid}">Go back</a> and try again.'.format(jid=jid) @app.route('/j/<jid>/skip') @requires_auth def skip(jid=None): try: user = request.authorization.username j = judgements.find_one({'_id': ObjectId(jid)}) judgements.update_one({'_id': ObjectId(jid)}, {'$set': {'tag': True, 'editor': user}}, upsert=False) n = judgements.find({'_id': {'$gt': ObjectId(jid) }, 'state': False}).sort('_id').limit(1) if n.count() > 0: return 'Temporarily skipped! Go to <a href="/j/{jid}">the next document</a>.'.format(jid=n[0]['_id']) else: return 'Temporarily skipped! Go back to <a href="/?show=both">the list</a>.' except: return 'Something went wrong. <a href="/j/{jid}">Go back</a> and try again.'.format(jid=jid) if __name__ == "__main__": app.run()
{ "repo_name": "katrina376/wenizit", "path": "application.py", "copies": "1", "size": "9448", "license": "mit", "hash": -4865900255987709000, "line_mean": 36.4435483871, "line_max": 113, "alpha_frac": 0.5264914926, "autogenerated": false, "ratio": 3.498869630746044, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9490516036105019, "avg_score": 0.006969017448204939, "num_lines": 248 }
from functools import wraps from flask import Flask, request, Response from flask import redirect, jsonify from flask import g from flask_jwt import verify_jwt from flask.ext.jwt import current_user from server import app, jwt, session from server.models import * # routing for basic page # @app.route('/') def basic_pages(**kwargs): return app.send_static_file('index.html') @app.errorhandler(404) def page_not_found(e): return jsonify(response="Invalid Request"), 404 class UserObj(object): def __init__(self, **kwargs): for k, v in kwargs.items(): setattr(self, k, v) @jwt.authentication_handler def authenticate(username, password): user = session.query(User).filter_by(username = username).first() if user and user.verify_password(password): return UserObj(id=user.id, username=user.username) @jwt.user_handler def load_user(payload): user = session.query(User).filter_by(id = payload['user_id']).first() if user: return UserObj(id=user.id, username=user.username) def protected(func): @wraps(func) def decorated_function(*args, **kwargs): verify_jwt() g.user = session.query(User).get(current_user.id) return func(*args, **kwargs) return decorated_function #******* API v1 ********# # user # @app.route('/api/v1/user/', methods=['POST']) def add_user(): # parse the json json = request.get_json() # extract data username = json.get('username') email = json.get('email') password = json.get('password') # sanity checks if not username: return jsonify(response="Could not create User, username is required"), 400 if not email: return jsonify(response="Could not create User, email is required"), 400 if not password: return jsonify(response="Could not create User, password is required"), 400 # create user and commit new_user = User(username=username, email=email, password=password) session.add(new_user) session.commit() # make sure db xact occured if not new_user.id: return jsonify(response="Could not create User"), 404 # Return user_id on success return jsonify(user_id=new_user.id), 201 @app.route('/api/v1/user/', methods=['GET']) @protected def get_user(): # grab authenticated user user = g.user # return user params return user.to_JSON(), 200 @app.route('/api/v1/user/', methods=['PUT']) @protected def update_user(): # grab authenticated user user = g.user # parse the json json = request.get_json() # update changed fields if json.get('username'): user.username = json.get('username') if json.get('email'): user.email = json.get('email') if json.get('password'): user.email = json.get('password') # commit changes session.commit() # Return an auth token on success token = user.generate_token() return jsonify({ 'token': token.decode('ascii') }), 200 @app.route('/api/v1/user/', methods=['DELETE']) @protected def delete_user(): # grab authenticated user user = g.user # delete user from db session.delete(user) # commit changes session.commit() # return return jsonify(response="User deleted."), 200 # constellations # @app.route('/api/v1/constellations/', methods=['POST']) @protected def add_constellation(): # grab authenticated user user = g.user # parse the json json = request.get_json() # extract data name = json.get('name') vectors = json.get('vectors') # sanity checks if not name: return jsonify(response="Could not create Constellation, name is required"), 400 if not vectors: return jsonify(response="Could not create Constellations, one or more vectors are required"), 400 # create new constellation for authenticated user new_constellation = Constellation(user_id=user.id, name=name) session.add(new_constellation) session.commit() # create vectors for constellation for vector in vectors: new_vector = Vector(constellation_id=new_constellation.id, a=vector[0], b=vector[1]) session.add(new_vector) session.commit() # return constellation id return jsonify(constellation_id=new_constellation.id), 201 @app.route('/api/v1/constellations/', methods=['GET']) @protected def get_constellations(): # grab authenticated user user = g.user # look up all the constellations associated with the user constellations = session.query(Constellation).filter_by(user_id=user.id).all() # sanity check if not constellations: return jsonify(response="No constellations found for user: {}".format(user.id)), 404 # compose each constellation return_list = [] for constellation in constellations: vectors = session.query(Vector).filter_by(constellation_id=constellation.id).all() return_list.append({"info":constellation.to_obj(), "vectors":[vector.to_array() for vector in vectors]}) # return return jsonify(constellations=return_list), 200 @app.route('/api/v1/constellations/<int:constellation_id>', methods=['GET']) @protected def get_constellation(constellation_id): # grab authenticated user user = g.user # get the constellation constellation = session.query(Constellation).get(constellation_id) # sanity check if not constellation: return jsonify(response="Constellation {} not found for user: ".format(constellation_id, user.id)), 404 # grab vectors for constellation vectors = session.query(Vector).filter_by(constellation_id=constellation_id).all() # compose response and return return jsonify(info=constellation.to_obj(), vectors=[vector.to_array() for vector in vectors]), 200 @app.route('/api/v1/constellations/<int:constellation_id>', methods=['PUT']) @protected def update_constellation(constellation_id): # grab authenticated user user = g.user # get the constellation constellation = session.query(Constellation)\ .filter((Constellation.id==constellation_id) & (Constellation.user_id==user.id))\ .first() if not constellation: return jsonify(response="Constellation not found for authenticated user."), 404 # parse the json json = request.get_json() # extract constellation data name = json.get('name') vectors = json.get('vectors') # update the constellation information if name: constellation.name = name session.commit() # if we got new vectors if vectors: # delete all vectors associated with the constellation session.query(Vector) # associate new vectors with constellation for vector in vectors: new_vector = Vector(constellation_id=constellation.id, a=vector[0], b=vector[1]) session.add(new_vector) session.commit() return jsonify(response="Constellation Added"), 200 @app.route('/api/v1/constellations/star/<int:star_id>', methods=['GET']) @protected def get_constellations_with_star(star_id): # grab authenticated user user = g.user # grab all constellation ids with given star_id constellation_ids = session.query(Vector.constellation_id).filter((Vector.a == star_id) | (Vector.b == star_id)).all() if not constellation_ids: return jsonify(response="That star is not in any constellations for this user."), 404 # reformat to something that doesn't suck constellation_ids = [constellation_id[0] for constellation_id in constellation_ids] # grab constellations from ids constellations = session.query(Constellation).filter(Constellation.id.in_(constellation_ids)) # grab all vectors for each constellation constellation_data = [] for constellation in constellations: # grab vectors for constellation vectors = session.query(Vector).filter_by(constellation_id=constellation.id).all() # compile into response array constellation_data.append({ 'info':constellation.to_obj(), 'vectors':[vector.to_array() for vector in vectors] }) # return compiled constellation data return jsonify(constellations=constellation_data), 200 @app.route('/api/v1/constellations/<int:constellation_id>', methods=['DELETE']) @protected def delete_constellation(constellation_id): # grab authenticated user user = g.user # get the constellation constellation = session.query(Constellation).get(constellation_id) # sanity check if not constellation: return jsonify(response="Constellation {} not found for user: ".format(constellation_id, user.id)), 404 # delete constellation from db session.delete(constellation) # commit changes session.commit() # return return jsonify(response="Constellation deleted."), 200
{ "repo_name": "meggers/constellate-server", "path": "server/controllers.py", "copies": "1", "size": "8917", "license": "mit", "hash": -2896941065076943400, "line_mean": 28.7233333333, "line_max": 122, "alpha_frac": 0.675787821, "autogenerated": false, "ratio": 3.768808114961961, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9904954169353233, "avg_score": 0.007928353321745598, "num_lines": 300 }
from functools import wraps from flask import Flask, session, redirect, url_for, render_template, request, flash from flask.ext.sqlalchemy import SQLAlchemy import bcrypt app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///auth.db' db = SQLAlchemy(app) app.secret_key = "This is supposed to be a secret" class User(db.Model): """ User database model """ id = db.Column(db.Integer, primary_key=True) username = db.Column(db.String(50), unique=True) password = db.Column(db.String(256)) def __init__(self, username, password): self.username = username self.password = self.hash(password) @staticmethod def hash(password): return bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()) def verify(self, password): if bcrypt.hashpw(password.encode('utf-8'), self.password.encode('utf-8')) == self.password: return True return False def __repr__(self): return '<User %r>' % self.username def authenticated(f): """ Decorator to enforce authentication on routed methods """ @wraps(f) def wrapper(*args, **kwargs): if 'username' in session: return f(*args, **kwargs) else: flash('You must be logged in') return redirect(url_for('index')) return wrapper @app.route('/') def index(): return render_template('index.html') @app.route('/register', methods=['GET','POST']) def register(): """ Checks database to verify user doesn't exist, then creates and logs on new user Any error is flashed """ if request.method == 'POST': result = User.query.filter_by(username=request.form['username']).first() if result is None: new_user = User(request.form['username'],request.form['password']) session['username'] = new_user.username db.session.add(new_user) db.session.commit() flash('registered and logged in') else: flash('user already exists') return redirect(url_for('index')) @app.route('/login', methods=['GET','POST']) def login(): """ Verifies user exists and compares password Any error is flashed """ if request.method == 'POST': result = User.query.filter_by(username=request.form['username']).first() if result and result.verify(request.form['password']): session['username'] = result.username else: flash('wrong user or password') return redirect(url_for('index')) @app.route('/logout') def logout(): """ Destroys any active session """ session.pop('username', None) flash('Logged out') return redirect(url_for('index')) @app.route('/secret') @authenticated def secret(): """ Authenticated only route @authenticated will flash a message if not authed """ return render_template('secret.html') if __name__ == "__main__": app.run(debug=True, host='0.0.0.0')
{ "repo_name": "kryptn/FlaskBareAuth", "path": "app.py", "copies": "1", "size": "3035", "license": "mit", "hash": -720827180377481000, "line_mean": 24.7203389831, "line_max": 99, "alpha_frac": 0.6131795717, "autogenerated": false, "ratio": 3.936446173800259, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5049625745500259, "avg_score": null, "num_lines": null }
from functools import wraps from flask import g from app.constants import ( ask_to_register_answer, student_required_answer, educator_required_answer ) from app.models import User from tg_bot import bot def login_required_message(func): @wraps(func) def wrapper(message): user = User.query.filter_by(tg_id=message.chat.id).first() if user: g.current_tbot_user = user func(message) else: bot.reply_to(message, ask_to_register_answer) return wrapper def login_required_callback(func): @wraps(func) def wrapper(call_back): user = User.query.filter_by(tg_id=call_back.message.chat.id).first() if user: g.current_tbot_user = user func(call_back) else: bot.edit_message_text( text=ask_to_register_answer, chat_id=call_back.message.chat.id, message_id=call_back.message.message_id, parse_mode="HTML" ) return wrapper def login_required_inline(func): @wraps(func) def wrapper(inline_query): user = User.query.filter_by(tg_id=inline_query.from_user.id).first() if user: g.current_tbot_user = user func(inline_query) else: bot.answer_inline_query( inline_query_id=inline_query.id, results=[], switch_pm_text=ask_to_register_answer, switch_pm_parameter="new_from_inline", cache_time=1, is_personal=True ) return wrapper def student_required_message(func): @wraps(func) def wrapper(message): if not g.current_tbot_user.is_educator: func(message) else: bot.reply_to(message, student_required_answer) return wrapper def student_required_callback(func): @wraps(func) def wrapper(call_back): if not g.current_tbot_user.is_educator: func(call_back) else: bot.edit_message_text( text=student_required_answer, chat_id=g.current_tbot_user.tg_id, message_id=call_back.message.message_id, parse_mode="HTML" ) return wrapper def student_required_inline(func): @wraps(func) def wrapper(inline_query): if not g.current_tbot_user.is_educator: func(inline_query) else: bot.answer_inline_query( inline_query_id=inline_query.id, results=[], switch_pm_text=student_required_answer, switch_pm_parameter="educator_from_inline", cache_time=10, is_personal=True ) return wrapper def educator_required_message(func): @wraps(func) def wrapper(message): if g.current_tbot_user.is_educator: func(message) else: bot.reply_to(message, educator_required_answer) return wrapper def educator_required_callback(func): @wraps(func) def wrapper(call_back): if g.current_tbot_user.is_educator: func(call_back) else: bot.edit_message_text( text=educator_required_answer, chat_id=g.current_tbot_user.tg_id, message_id=call_back.message.message_id, parse_mode="HTML" ) return wrapper def educator_required_inline(func): @wraps(func) def wrapper(inline_query): if g.current_tbot_user.is_educator: func(inline_query) else: bot.answer_inline_query( inline_query_id=inline_query.id, results=[], switch_pm_text=educator_required_answer, switch_pm_parameter="student_from_inline", cache_time=10, is_personal=True ) return wrapper from telebot_login import help_decorators
{ "repo_name": "EeOneDown/spbu4u", "path": "telebot_login/__init__.py", "copies": "1", "size": "4022", "license": "apache-2.0", "hash": -7583553841568528000, "line_mean": 26.9305555556, "line_max": 77, "alpha_frac": 0.5626553953, "autogenerated": false, "ratio": 3.7765258215962443, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9838354497319525, "avg_score": 0.00016534391534391533, "num_lines": 144 }
from functools import wraps from flask import g, request from flask.ext.restful import abort from app.auth.models import User def login_required(f): @wraps(f) def decorated_function(*args, **kwargs): auth_header = request.headers.get('Authorization', 'Token Null') token = [item.encode('ascii') for item in auth_header.split(' ')] if len(token) == 2 and token[0] == 'Token': user = User.verify_auth_token(token[1]) if user: g.user = user return f(*args, **kwargs) abort(401, message='Invalid Token - Authorization Required') return decorated_function def has_permissions(perms=[]): def decorator(f): @wraps(f) def decorated_function(*args, **kwargs): user = g.user for p in perms: if not user.has_permission(p): abort(401, message='Operation not permitted') return f(*args, **kwargs) return decorated_function return decorator
{ "repo_name": "bmbove/flask-api-boilerplate", "path": "app/base/decorators.py", "copies": "1", "size": "1039", "license": "mit", "hash": -8979283358412634000, "line_mean": 30.4848484848, "line_max": 73, "alpha_frac": 0.5890279115, "autogenerated": false, "ratio": 4.156, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.52450279115, "avg_score": null, "num_lines": null }
from functools import wraps from flask import jsonify, request, g, abort import rethinkdb as r from app import app from models.Error import Error def login_required(function_to_wrap): @wraps(function_to_wrap) def wrap(*args, **kwargs): try: if request.method == 'GET': data = r.table("user_token").filter( {"user_id": request.args.get('user_id'), "auth_token": request.args.get('auth_token')}).run( g.rdb_conn) else: data = r.table("user_token").filter( {"user_id": request.json.get('user_id'), "auth_token": request.json.get('auth_token')}).run( g.rdb_conn) if data.next(): print("cool you are authorized man!") return function_to_wrap(*args, **kwargs) else: abort(400) except Exception as e: abort(403) return wrap @app.route("/page/", methods=['GET']) @login_required def get_next_page(): data = r.table('page').filter({'completed': False}).run(g.rdb_conn) try: result_json = data.next() return jsonify({"restaurant_id": result_json['restaurant_id'], "page_id": result_json['id'], "page_url": result_json['url']}) except Exception as e: print(e) return jsonify({"status": "No urls left"}) @app.route("/menu/", methods=['POST']) @login_required def create_menu(): if ('restaurant_id' and 'type' and 'user_id' and 'page_id' and 'description') in request.json: data = request.get_json() try: page_data = r.table('page').get(data['page_id']).run(g.rdb_conn) data['page_url'] = page_data['url'] except Exception as e: print(e) return Error(code=8, message='invalid_page_id').to_json() try: restaurant_data = r.table('restaurant').get(data['restaurant_id']).run(g.rdb_conn) data['restaurant_name'] = restaurant_data['name'] data['restaurant_address'] = restaurant_data['address'] data['restaurant_zip'] = restaurant_data['zip'] except Exception as e: print(e) return Error(code=9, message='invalid_restaurant_id').to_json() menu = r.table('menu').insert(data).run(g.rdb_conn) if menu['inserted'] == 1: return jsonify({"status": "okay", "restaurant_id": data['restaurant_id'], "page_id": data['page_id'], "menu_id": menu['generated_keys'][0]}) else: abort(400) else: return Error(code=10, message='missing_parameters').to_json() @app.route("/menu/category/", methods=['POST']) @login_required def create_category(): if ('menu_id' and 'name' and 'user_id' and 'description') in request.json: data = request.get_json() try: menu_data = r.table('menu').get(data['menu_id']).run(g.rdb_conn) data['restaurant_id'] = menu_data['restaurant_id'] data['restaurant_name'] = menu_data['restaurant_name'] data['restaurant_address'] = menu_data['restaurant_address'] data['restaurant_zip'] = menu_data['restaurant_zip'] data['page_id'] = menu_data['page_id'] data['page_url'] = menu_data['page_url'] data['menu_type'] = menu_data['type'] data['menu_description'] = menu_data['description'] except Exception as e: print(e) return Error(code=11, message='invalid_menu_id').to_json() menu_category = r.table('menu_category').insert(data).run(g.rdb_conn) if menu_category['inserted'] == 1: return jsonify({"status": "okay", "restaurant_id": data['restaurant_id'], "page_id": data['page_id'], "menu_id": data['menu_id'], "menu_category_id": menu_category['generated_keys'][0]}) else: abort(400) else: return Error(code=10, message='missing_parameters').to_json() @app.route("/menu/item/", methods=['POST']) @login_required def create_item(): if ('menu_category_id' and 'name' and 'user_id' and 'description' and 'price' and 'extras') in request.json: data = request.get_json() try: menu_category_data = r.table('menu_category').get(data['menu_category_id']).run(g.rdb_conn) data['restaurant_id'] = menu_category_data['restaurant_id'] data['restaurant_name'] = menu_category_data['restaurant_name'] data['restaurant_address'] = menu_category_data['restaurant_address'] data['restaurant_zip'] = menu_category_data['restaurant_zip'] data['page_id'] = menu_category_data['page_id'] data['page_url'] = menu_category_data['page_url'] data['menu_id'] = menu_category_data['menu_id'] data['menu_type'] = menu_category_data['menu_type'] data['menu_description'] = menu_category_data['menu_description'] data['menu_category_id'] = menu_category_data['id'] data['menu_category_name'] = menu_category_data['name'] data['menu_category_description'] = menu_category_data['description'] except Exception as e: print(e) return Error(code=12, message='invalid_menu_category_id').to_json() menu_item = r.table('menu_item').insert(data).run(g.rdb_conn) if menu_item['inserted'] == 1: return jsonify({"status": "okay", "restaurant_id": data['restaurant_id'], "page_id": data['page_id'], "menu_id": data['menu_id'], "menu_category_id": data['menu_category_id'], "menu_item_id": menu_item['generated_keys'][0]}) else: abort(400) else: return Error(code=10, message='missing_parameters').to_json() def load(): pass
{ "repo_name": "suparngp/letswikit", "path": "ui/controllers/menu.py", "copies": "1", "size": "5941", "license": "apache-2.0", "hash": -1478312903554988800, "line_mean": 38.8724832215, "line_max": 113, "alpha_frac": 0.561858273, "autogenerated": false, "ratio": 3.703865336658354, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.4765723609658354, "avg_score": null, "num_lines": null }
from functools import wraps from flask import json from config import atom_feeds def multiline_to_list(data, whitespace_separator=True, unique_only=True, filter_empty=True): if not data: return [] if whitespace_separator: data = data.replace(' ', '\n') data_list = data.replace('\r', '').split('\n') if unique_only: data_list = list_uniquify(data_list) if filter_empty: data_list = list(filter(lambda e: len(e) > 0, data_list)) return data_list def list_uniquify(data): used = set() return [e for e in data if e not in used and (used.add(e) or True)] def cmp_to_key(cmp_func, getter=None): class K(object): def __init__(self, obj, *args): self.obj = obj def extract(self, obj): if getter: return getter(obj) return obj def __lt__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) < 0 def __gt__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) > 0 def __eq__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) == 0 def __le__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) <= 0 def __ge__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) >= 0 def __ne__(self, other): return cmp_func(self.extract(self.obj), self.extract(other.obj)) != 0 return K def chunks(l, n): """Yield successive n-sized chunks from l.""" for i in range(0, len(l), n): yield l[i:i + n] def json_response(func): @wraps(func) def wrapped(*args, **kwargs): response = func(*args, **kwargs) code = 200 if isinstance(response, tuple): response, code = response dump = json.dumps(response, indent=2, sort_keys=False) return dump, code, {'Content-Type': 'application/json; charset=utf-8'} return wrapped def atom_feed(title): def decorator(func): atom_feeds.append({'func': 'tracker.{}'.format(func.__name__), 'title': title}) @wraps(func) def wrapped(*args, **kwargs): return func(*args, **kwargs) return wrapped return decorator def issue_to_numeric(issue_label): self_parts = issue_label.split('-') return int(self_parts[1] + self_parts[2].rjust(7, '0'))
{ "repo_name": "anthraxx/arch-security-tracker", "path": "tracker/util.py", "copies": "2", "size": "2496", "license": "mit", "hash": -5436432959109468000, "line_mean": 27.6896551724, "line_max": 92, "alpha_frac": 0.5821314103, "autogenerated": false, "ratio": 3.5404255319148934, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5122556942214893, "avg_score": null, "num_lines": null }
from functools import wraps from flask import make_response from flask import Flask from flask import request, Response from OpenSSL import SSL app = Flask(__name__) users = {'admin': 'secret', 'user': 'user'} @app.before_request def before_request(): print request.headers def check_auth(username, password): """This function is called to check if a username / password combination is valid. """ passwd = users[username] return passwd == password #return username == 'admin' and password == 'secret' def authenticate(): """Sends a 401 response that enables basic auth""" return Response( 'Could not verify your access level for that URL.\n' 'You have to login with proper credentials', 401, {'WWW-Authenticate': 'Basic realm="Login Required"'}) def requires_auth(f): @wraps(f) def decorated(*args, **kwargs): auth = request.authorization if not auth or not check_auth(auth.username, auth.password): return authenticate() return f(*args, **kwargs) return decorated @app.route("/") def hello(): return "Hello World!" @app.route("/api/secure") @requires_auth def secure(): return "Secured resource" @app.route("/api/admin") @requires_auth def admin(): if request.authorization and request.authorization.username == 'admin': response = make_response("Secured resource", 200) response.cache_control.private = True return response else: return make_response("Verboten!", 403) @app.route("/api/same") def same(): return "I always return hello world!" @app.route("/api/user") def user(): if request.authorization and request.authorization.username: response = make_response(request.authorization.username, 200) response.cache_control.private = True return response else: return "No user" if __name__ == "__main__": context = SSL.Context(SSL.SSLv23_METHOD) context.use_privatekey_file('/etc/ssl/localhost/server.key') context.use_certificate_file('/etc/ssl/localhost/server.cert') app.run("127.0.0.1", 8080, debug=True, ssl_context=context)
{ "repo_name": "srmelody/cachetools", "path": "traffic.py", "copies": "1", "size": "2177", "license": "apache-2.0", "hash": 2623375436654067000, "line_mean": 22.9230769231, "line_max": 75, "alpha_frac": 0.6628387689, "autogenerated": false, "ratio": 3.9509981851179674, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.011181800655484866, "num_lines": 91 }
from functools import wraps from flask import make_response, render_template, request from flask_login import current_user from .utils import patch_http_cache_headers def templated(template=None): """ Taken from http://flask.pocoo.org/docs/0.10/patterns/viewdecorators/ """ def decorator(f): @wraps(f) def decorated_function(*args, **kwargs): template_name = template if template_name is None: template_name = request.endpoint.replace(".", "/") + ".html" ctx = f(*args, **kwargs) if ctx is None: ctx = {} elif not isinstance(ctx, dict): return ctx return render_template(template_name, **ctx) return decorated_function return decorator def http_cache(timeout=None): """ Add Flask cache response headers based on timeout in seconds. If timeout is None, caching will be disabled. Otherwise, caching headers are set to expire in now + timeout seconds Example usage: @app.route('/map') @http_cache(timeout=60) def index(): return render_template('index.html') Originally from https://gist.github.com/glenrobertson/954da3acec84606885f5 """ def decorator(f): @wraps(f) def decorated_function(*args, **kwargs): response = make_response(f(*args, **kwargs)) if current_user.is_authenticated: return response else: return patch_http_cache_headers(response, timeout) return decorated_function return decorator
{ "repo_name": "jazzband/website", "path": "jazzband/decorators.py", "copies": "2", "size": "1625", "license": "mit", "hash": 3002294419196657700, "line_mean": 26.0833333333, "line_max": 78, "alpha_frac": 0.6116923077, "autogenerated": false, "ratio": 4.310344827586207, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0, "num_lines": 60 }
from functools import wraps from flask import ( Blueprint, render_template, request, session, flash, abort, redirect, ) from PyPaste.utils import pypaste_url_for as url_for from PyPaste.forms import LoginForm, LogoutForm, DeletePasteForm from PyPaste.models.users import User from PyPaste.models.pastes import Paste admin = Blueprint( 'admin', __name__, url_prefix='/a', template_folder='templates' ) def login_required(func): """ Decorator that ensures a user is logged in before accessing a view, else throws up a 401 """ @wraps(func) def wrapper(*a, **kw): if not session.get('logged_in'): abort(401) return func(*a, **kw) return wrapper @admin.route('/in', methods=['GET', 'POST']) def login(): form = LoginForm() if form.validate_on_submit(): username = form.username.data password = form.password.data if User.password_match(username, password): session['username'] = username session['logged_in'] = True return redirect(url_for('pastes.index')) else: flash('Incorrect username/password', 'error') return render_template('login.html', form=form) @admin.route('/out', methods=['GET', 'POST']) @login_required def logout(): form = LogoutForm() if request.method == 'POST' and form.validate_on_submit(): if session.get('username') == form.username.data: session.pop('username') session.pop('logged_in') session.modified = True return redirect(url_for('pastes.index')) return render_template('logout.html', form=form) @admin.route('/del/<hash>', methods=['GET', 'POST']) @login_required def delete_paste(hash): form = DeletePasteForm() if form.validate_on_submit(): if not Paste.delete(form.paste_hash.data): flash('Deletion failed', 'error') return redirect(request.url) return redirect(url_for('pastes.recent')) return render_template('delete.html', form=form, hash=hash)
{ "repo_name": "joealcorn/PyPaste", "path": "PyPaste/views/admin/__init__.py", "copies": "1", "size": "2108", "license": "mit", "hash": -1523774362370896100, "line_mean": 24.7073170732, "line_max": 64, "alpha_frac": 0.6228652751, "autogenerated": false, "ratio": 3.79136690647482, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.991423218157482, "avg_score": 0, "num_lines": 82 }
from functools import wraps from flask import redirect, request, session, url_for from app.models.user import User from app.utils.time import is_less_than_days_ago def redirect_to_sign_in(f): @wraps(f) def wrapped(*args, **kwargs): if 'user_details' not in session: return redirect(url_for('main.sign_in')) else: return f(*args, **kwargs) return wrapped def log_in_user(user_id): try: user = User.from_id(user_id) # the user will have a new current_session_id set by the API - store it in the cookie for future requests session['current_session_id'] = user.current_session_id # Check if coming from new password page if 'password' in session.get('user_details', {}): user.update_password(session['user_details']['password'], validated_email_access=True) user.activate() user.login() finally: # get rid of anything in the session that we don't expect to have been set during register/sign in flow session.pop("user_details", None) session.pop("file_uploads", None) return redirect_when_logged_in(platform_admin=user.platform_admin) def redirect_when_logged_in(platform_admin): next_url = request.args.get('next') if next_url and _is_safe_redirect_url(next_url): return redirect(next_url) return redirect(url_for('main.show_accounts_or_dashboard')) def email_needs_revalidating(user): return not is_less_than_days_ago(user.email_access_validated_at, 90) # see http://flask.pocoo.org/snippets/62/ def _is_safe_redirect_url(target): from urllib.parse import urljoin, urlparse host_url = urlparse(request.host_url) redirect_url = urlparse(urljoin(request.host_url, target)) return redirect_url.scheme in ('http', 'https') and \ host_url.netloc == redirect_url.netloc
{ "repo_name": "alphagov/notifications-admin", "path": "app/utils/login.py", "copies": "1", "size": "1880", "license": "mit", "hash": -7922210204723726000, "line_mean": 33.1818181818, "line_max": 113, "alpha_frac": 0.6718085106, "autogenerated": false, "ratio": 3.6084452975047983, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9777726397981694, "avg_score": 0.0005054820246207806, "num_lines": 55 }
from functools import wraps from flask import render_template, flash, request, redirect, url_for, session from passlib.hash import sha256_crypt from config import app, db from forms import RegisterForm, VideoForm, CommentForm from models import Users, Videos, Comments from werkzeug.contrib.fixers import ProxyFix app = app db.init_app(app) db.create_all() # TODO: Decorator login required def login_required(f): @wraps(f) def decorated_function(*args, **kwargs): if session['logged_in'] == False: return redirect(url_for('login', next=request.url)) return f(*args, **kwargs) return decorated_function # TODO: HomePage @app.route('/') def index(): data = Videos.query.all() if len(data) > 0: return render_template('home.html', videos=data) else: msg = 'No Videos Found' return render_template('home.html', msg=msg) # TODO: About @app.route('/about') def about(): return render_template('about.html') # TODO: Register @app.route('/register', methods=['GET', 'POST']) def register(): form = RegisterForm(request.form) if request.method == 'POST' and form.validate(): name = form.name.data username = form.username.data email = form.email.data password = sha256_crypt.encrypt(str(form.password.data)) user = Users(name=name, username=username, email=email, password=password) try: db.session.add(user) db.session.commit() except: flash("Something went wrong with DB") flash('You are now registered and can login!', 'success') return redirect(url_for('login')) return render_template('register.html', form=form) # TODO: Login @app.route('/login', methods=['GET', 'POST']) def login(): if request.method == 'POST': username = request.form['username'] password_candidate = request.form['password'] result = Users.query.filter_by(username=username).first() if result is not None: password = result.password if sha256_crypt.verify(password_candidate, password): session['logged_in'] = True session['username'] = username flash('You are now logged in', 'success') return redirect(url_for('dashboard')) else: error = 'Invalid login' return render_template('login_html', error=error) else: error = 'Username not found' return render_template('login.html', error=error) return render_template('login.html') # TODO: Logout @app.route('/logout') @login_required def logout(): session.clear() flash('You are now logged out', 'success') return redirect(url_for('login')) # TODO: Videos @app.route('/videos') def videos(): data = Videos.query.all() if len(data) > 0: return render_template('videos.html', videos=data) else: msg = 'No Videos Found' return render_template('videos.html', msg=msg) # TODO: Video Details @app.route('/video/<int:id>/', methods=['GET', 'POST']) def video(id): data = Videos.query.get(id) form = CommentForm(request.form) if request.method == 'POST' and form.validate(): user = Users.query.filter_by(username=data.author).first() comment_candidate = form.comment.data comment = Comments(body=comment_candidate, video_id=data.id, user_id=user.id) db.session.add(comment) db.session.commit() msg = "Comment added!" return render_template('video.html', video=data, form=form, msg=msg) if data: return render_template('video.html', video=data, form=form) else: msg = "No video found!" return render_template('video.html', msg=msg) # TODO: Add Video @app.route('/add_video', methods=["GET", "POST"]) @login_required def add_video(): form = VideoForm(request.form) if request.method == "POST" and form.validate(): title = form.title.data link = form.link.data author = session['username'] video = Videos(title, link, author) db.session.add(video) db.session.commit() flash("Video created", "success") return redirect(url_for('dashboard')) else: error = form.errors return render_template('add_video.html', form=form, error=error) return render_template('add_video.html', form=form) # TODO: Dashboard @app.route('/dashboard') @login_required def dashboard(): data = Videos.query.all() if len(data) > 0: return render_template('dashboard.html', videos=data) else: msg = 'No Videos Found' return render_template('dashboard.html', msg=msg) # TODO: Edit Video @app.route('/edit_video/<int:id>/', methods=['GET', 'POST']) @login_required def edit_video(id): data = Videos.query.get(id) form = VideoForm(request.form) form.title.data = data.title form.link.data = data.link if request.method == 'POST' and form.validate(): data.title = request.form["title"] data.link = request.form["link"] db.session.commit() flash("Video updated!", "success") return redirect(url_for('dashboard')) return render_template('edit_video.html', form=form) # TODO: Delete Video @app.route('/delete_video/<int:id>', methods=['GET', 'POST']) @login_required def delete_video(id): data = Videos.query.get(id) if data: db.session.delete(data) db.session.commit() msg = "Video deleted!" return render_template('dashboard.html', msg=msg) else: error = "Video was not deleted!" return render_template('dashboard.html', error=error) app.wsgi_app = ProxyFix(app.wsgi_app) if __name__ == '__main__': app.run(host='0.0.0.0', debug=True)
{ "repo_name": "alaturqua/my_flask_app", "path": "app.py", "copies": "1", "size": "5848", "license": "apache-2.0", "hash": -6992586259058810000, "line_mean": 28.9897435897, "line_max": 85, "alpha_frac": 0.6241450068, "autogenerated": false, "ratio": 3.657285803627267, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9777935902400829, "avg_score": 0.0006989816052873669, "num_lines": 195 }
from functools import wraps from flask import request, Blueprint, render_template, jsonify, flash, \ redirect, url_for from sqlalchemy.orm.util import join from my_app import db, app from my_app.catalog.models import Product, Category catalog = Blueprint('catalog', __name__) def template_or_json(template=None): """"Return a dict from your view and this will either pass it to a template or render json. Use like: @template_or_json('template.html') """ def decorated(f): @wraps(f) def decorated_fn(*args, **kwargs): ctx = f(*args, **kwargs) if request.is_xhr or not template: return jsonify(ctx) else: return render_template(template, **ctx) return decorated_fn return decorated @app.errorhandler(404) def page_not_found(e): return render_template('404.html'), 404 @catalog.route('/') @catalog.route('/home') @template_or_json('home.html') def home(): products = Product.query.all() return {'count': len(products)} @catalog.route('/product/<id>') def product(id): product = Product.query.get_or_404(id) return render_template('product.html', product=product) @catalog.route('/products') @catalog.route('/products/<int:page>') def products(page=1): products = Product.query.paginate(page, 10) return render_template('products.html', products=products) @catalog.route('/product-create', methods=['GET', 'POST']) def create_product(): if request.method == 'POST': name = request.form.get('name') price = request.form.get('price') categ_name = request.form.get('category') category = Category.query.filter_by(name=categ_name).first() if not category: category = Category(categ_name) product = Product(name, price, category) db.session.add(product) db.session.commit() flash('The product %s has been created' % name, 'success') return redirect(url_for('catalog.product', id=product.id)) return render_template('product-create.html') @catalog.route('/product-search') @catalog.route('/product-search/<int:page>') def product_search(page=1): name = request.args.get('name') price = request.args.get('price') company = request.args.get('company') category = request.args.get('category') products = Product.query if name: products = products.filter(Product.name.like('%' + name + '%')) if price: products = products.filter(Product.price == price) if company: products = products.filter(Product.company.like('%' + company + '%')) if category: products = products.select_from(join(Product, Category)).filter( Category.name.like('%' + category + '%') ) return render_template( 'products.html', products=products.paginate(page, 10) ) @catalog.route('/category-create', methods=['POST', ]) def create_category(): name = request.form.get('name') category = Category(name) db.session.add(category) db.session.commit() return render_template('category.html', category=category) @catalog.route('/category/<id>') def category(id): category = Category.query.get_or_404(id) return render_template('category.html', category=category) @catalog.route('/categories') def categories(): categories = Category.query.all() return render_template('categories.html', categories=categories)
{ "repo_name": "abacuspix/NFV_project", "path": "Flask_Framework_Cookbook/Chapter-4-master/my_app/catalog/views.py", "copies": "1", "size": "3475", "license": "mit", "hash": -548645942632864800, "line_mean": 28.4491525424, "line_max": 77, "alpha_frac": 0.6509352518, "autogenerated": false, "ratio": 3.7895310796074155, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.9940466331407416, "avg_score": 0, "num_lines": 118 }
from functools import wraps from flask import request, g from itsdangerous import TimedJSONWebSignatureSerializer as Serializer from itsdangerous import SignatureExpired, BadSignature from app import app from app.utils.errors import UNAUTHORIZED, FORBIDDEN TWO_WEEKS = 1209600 def generate_token(user, expiration=TWO_WEEKS): s = Serializer(app.config['SECRET_KEY'], expires_in=expiration) return s.dumps({ 'id': user.id, 'email': user.email, 'is_admin': user.is_admin }) def verify_token(token): s = Serializer(app.config['SECRET_KEY']) try: data = s.loads(token) except (SignatureExpired, BadSignature): return None return data def auth_required(func): @wraps(func) def wrapper(*args, **kwargs): token = request.headers.get('Authorization', '') if token: user = verify_token(token) if user: g.current_user = user return func(*args, **kwargs) return UNAUTHORIZED return wrapper def admin_required(func): @wraps(func) def wrapper(*args, **kwargs): token = request.headers.get('Authorization', '') if token: user = verify_token(token) if user and user['is_admin']: g.current_user = user return func(*args, **kwargs) return FORBIDDEN return wrapper
{ "repo_name": "projectweekend/Flask-PostgreSQL-API-Seed", "path": "app/utils/auth.py", "copies": "1", "size": "1410", "license": "mit", "hash": 677453778476030100, "line_mean": 24.6363636364, "line_max": 70, "alpha_frac": 0.619858156, "autogenerated": false, "ratio": 4.0285714285714285, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5148429584571429, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request, g from time import time from app import app, redis from app.utils.errors import TOO_MANY_REQUESTS def rate_limit(limit=100, window=60): def decorator(func): @wraps(func) def wrapper(*args, **kwargs): key = "{0}: {1}".format(request.remote_addr, request.path) try: remaining = limit - int(redis.get(key)) except (ValueError, TypeError): remaining = limit redis.set(key, 0) expires_in = redis.ttl(key) if not expires_in: redis.expire(key, window) expires_in = window g.rate_limits = (limit, remaining-1, time()+expires_in) if remaining > 0: redis.incr(key, 1) return func(*args, **kwargs) return TOO_MANY_REQUESTS return wrapper return decorator @app.after_request def add_rate_limit_headers(response): try: limit, remaining, expires = map(int, g.rate_limits) except (AttributeError, ValueError): return response else: response.headers.add('X-RateLimit-Remaining', remaining) response.headers.add('X-RateLimit-Limit', limit) response.headers.add('X-RateLimit-Reset', expires) return response
{ "repo_name": "projectweekend/Flask-PostgreSQL-API-Seed", "path": "app/utils/rate_limit.py", "copies": "1", "size": "1355", "license": "mit", "hash": -3914606792959529500, "line_mean": 27.829787234, "line_max": 70, "alpha_frac": 0.5852398524, "autogenerated": false, "ratio": 4.081325301204819, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5166565153604818, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request, make_response, jsonify from plato.api.models import User def authenticate(f): @wraps(f) def decorated_function(*args, **kwargs): response_object = { 'status': 'error', 'message': 'Something went wrong. Please contact us.' } code = 401 auth_header = request.headers.get('Authorization') if not auth_header: response_object['message'] = 'Provide a valid auth token' code = 403 return make_response(jsonify(response_object)), code auth_token = auth_header.split(' ')[1] resp = User.decode_auth_token(auth_token) if isinstance(resp, str): response_object['message'] = resp return make_response(jsonify(response_object)), code user = User.query.filter_by(id=resp).first() if not user or not user.active: return make_response(jsonify(response_object)), code return f(resp, *args, **kwargs) return decorated_function def is_admin(user_id): user = User.query.filter_by(id=user_id).first() if user.admin: return True return False
{ "repo_name": "zhlooking/flask-microservices-users", "path": "plato/api/utils.py", "copies": "1", "size": "1198", "license": "mit", "hash": -7523335296702650000, "line_mean": 31.3783783784, "line_max": 69, "alpha_frac": 0.612687813, "autogenerated": false, "ratio": 4.033670033670034, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5146357846670033, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request, make_response from .exceptions import ApiError from .schemas import create_schema, ma_version_lt_300b7 def request_schema(schema_or_dict, extends=None, many=None, cache_schema=True, pass_data=False): schema_ = create_schema(schema_or_dict, extends) def decorator(func): @wraps(func) def wrapper(*args, **kwargs): schema = cache_schema and schema_ or create_schema(schema_or_dict, extends) if request.json is None: # NOTE: this should be fixed with marshmallow 3 (and 2.16?) raise ApiError('JSON data required') data = schema.load(request.json, many=many) if ma_version_lt_300b7: data = data.data if pass_data: kwargs.update({'data' if pass_data is True else pass_data: data}) else: kwargs.update(data) return func(*args, **kwargs) return wrapper return decorator def request_args_schema(schema_or_dict, extends=None, cache_schema=True, pass_data=False): schema_ = create_schema(schema_or_dict, extends) def decorator(func): @wraps(func) def wrapper(*args, **kwargs): schema = cache_schema and schema_ or create_schema(schema_or_dict, extends) data = schema.load(request.args) if ma_version_lt_300b7: data = data.data if pass_data: kwargs.update({'data' if pass_data is True else pass_data: data}) else: kwargs.update(data) return func(*args, **kwargs) return wrapper return decorator def response_schema(schema_or_dict, extends=None, many=None, cache_schema=True): schema_ = create_schema(schema_or_dict, extends) def decorator(func): @wraps(func) def wrapper(*args, **kwargs): schema = cache_schema and schema_ or create_schema(schema_or_dict, extends) result = func(*args, **kwargs) if isinstance(result, (list, tuple)) and (schema.many or many): data = schema.dump(result, many=many) else: data = schema.dump(result, many=many) if ma_version_lt_300b7: data = data.data return data return wrapper return decorator def response_headers(headers={}): """ This decorator adds the headers passed in to the response """ # http://flask.pocoo.org/snippets/100/ def decorator(func): @wraps(func) def wrapper(*args, **kwargs): resp = make_response(func(*args, **kwargs)) h = resp.headers for header, value in headers.items(): h[header] = value return resp return wrapper return decorator def response_headers_no_cache(func): @wraps(func) @response_headers({ 'Cache-Control': 'no-store', 'Pragma': 'no-cache', }) def wrapper(*args, **kwargs): return func(*args, **kwargs) return wrapper
{ "repo_name": "vgavro/flask-vgavro-utils", "path": "flask_vgavro_utils/decorators.py", "copies": "1", "size": "3120", "license": "bsd-2-clause", "hash": -3681102236099659300, "line_mean": 30.8367346939, "line_max": 96, "alpha_frac": 0.583974359, "autogenerated": false, "ratio": 4.0519480519480515, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.0009400522586246963, "num_lines": 98 }
from functools import wraps from flask import request from pydantic import ValidationError, create_model ARG_LOCATIONS = { "query": lambda: request.args, "json": lambda: request.get_json(), "form": lambda: request.form, "headers": lambda: request.headers, "cookies": lambda: request.cookies, } def validate_args(spec, location): """ A rough implementation of webargs using pydantic schemas. You can pass a pydantic schema as spec or create it on the fly as follows: @validate_args({"name": (str, None), "id": (int, None)}, location="query") """ if isinstance(spec, dict): spec = create_model("", **spec) schema = spec.schema() props = schema.get("properties", {}) required = schema.get("required", []) for k in props: if k in required: props[k]["required"] = True props[k]["in"] = location def decorator(func): # Inject parameters information into the Flask-Restx apidoc attribute. # Not really a good solution. See https://github.com/CTFd/CTFd/issues/1504 apidoc = getattr(func, "__apidoc__", {"params": {}}) apidoc["params"].update(props) func.__apidoc__ = apidoc @wraps(func) def wrapper(*args, **kwargs): data = ARG_LOCATIONS[location]() try: # Try to load data according to pydantic spec loaded = spec(**data).dict(exclude_unset=True) except ValidationError as e: # Handle reporting errors when invalid resp = {} errors = e.errors() for err in errors: loc = err["loc"][0] msg = err["msg"] resp[loc] = msg return {"success": False, "errors": resp}, 400 return func(*args, loaded, **kwargs) return wrapper return decorator
{ "repo_name": "ajvpot/CTFd", "path": "CTFd/api/v1/helpers/request.py", "copies": "4", "size": "1925", "license": "apache-2.0", "hash": -2452650351252771300, "line_mean": 31.0833333333, "line_max": 82, "alpha_frac": 0.5667532468, "autogenerated": false, "ratio": 4.203056768558952, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 1, "avg_score": 0.00020080321285140563, "num_lines": 60 }
from functools import wraps from flask import request from sqlalchemy import or_ from sqlalchemy.orm import joinedload, contains_eager, attributes from sqlalchemy.orm.exc import NoResultFound from sqlalchemy.util import KeyedTuple from .model import session_scope, Track, TrackInfo, Album, Artist, Cover def limitoffset(query, skip, limit): if skip is not None: query = query.offset(skip) if limit is not None: query = query.limit(limit) return query class Typed: types_whitelist = ['tags', 'folder'] def __init__(self, stype='tags'): self.chosen_type = stype if self.chosen_type not in Typed.types_whitelist: self.chosen_type = Typed.types_whitelist[0] def session_scope(self): return session_scope(self.chosen_type) def getartist(self, artist_id): with self.session_scope() as session: obj = session.query(Artist).get(artist_id) session.expunge_all() return obj def getalbum(self, album_id=None, ffilter=None): with self.session_scope() as session: if album_id is not None: obj = session.query(Album).get(album_id) session.expunge_all() return obj elif ffilter is not None: query = session.query(Album).join(Album.artist).options(contains_eager(Album.artist)) query = ffilter(query) obj = query.one() session.expunge_all() return obj return None def getcoverbyalbumid(self, album_id): with self.session_scope() as session: try: obj = session.query(Cover).join(Cover.albums).filter(Album.id == album_id).one() session.expunge_all() return obj except NoResultFound: return None def gettrackinfo(self, trackinfo_id=None, ffilter=None): with self.session_scope() as session: if trackinfo_id is not None: obj = session.query(TrackInfo).get(trackinfo_id) session.expunge_all() return obj elif ffilter is not None: query = session.query(TrackInfo).join(TrackInfo.album).join(Album.artist).options( joinedload(TrackInfo.genre), contains_eager(TrackInfo.artist), contains_eager(TrackInfo.album, Album.artist)) query = ffilter(query) obj = query.one() session.expunge_all() return obj return None def gettrack(self, track_id=None, trackinfo_id=None): with self.session_scope() as session: if track_id is not None: obj = session.query(Track).get(track_id) session.expunge_all() return obj elif trackinfo_id is not None: try: obj = session.query(Track).join(Track.infos).filter(TrackInfo.id == trackinfo_id).one() session.expunge_all() return obj except NoResultFound: pass return None def gettrackfull(self, track_id): with self.session_scope() as session: try: obj = session.query(TrackInfo).join(TrackInfo.album).join(Album.artist).options( joinedload(TrackInfo.genre), contains_eager(TrackInfo.artist), contains_eager(TrackInfo.album, Album.artist) ).filter(TrackInfo.id == track_id).one() session.expunge_all() return obj except NoResultFound: return None def listartists(self, ffilter=None, skip=None, limit=None): with self.session_scope() as session: query = session.query(Artist) if ffilter is not None: query = ffilter(query) query = limitoffset(query.order_by(Artist.name), skip, limit) qall = query.all() session.expunge_all() return qall def listalbums(self, ffilter=None, skip=None, limit=None, order_by=(Artist.name, Album.year.desc())): with self.session_scope() as session: query = session.query(Album).join(Album.artist).options(contains_eager(Album.artist)) if ffilter is not None: query = ffilter(query) if order_by is not None: query = limitoffset(query.order_by(*order_by), skip, limit) else: query = limitoffset(query, skip, limit) qall = query.all() session.expunge_all() if len(qall) > 0 and isinstance(qall[0], KeyedTuple): for i, item in enumerate(qall): qall[i] = item[0] return qall def listalbumsbyartists(self, ffilter=None, skip=None, limit=None): with self.session_scope() as session: query = session.query(Artist).join(Artist.albums).options(contains_eager(Artist.albums, Album.artist)) if ffilter is not None: query = ffilter(query) query = limitoffset(query.order_by(Artist.name, Album.year.desc()), skip, limit) qall = query.all() session.expunge_all() return qall def listtracks(self, ffilter=None, skip=None, limit=None): with self.session_scope() as session: query = session.query(TrackInfo).join(TrackInfo.album).join(Album.artist).options( contains_eager(TrackInfo.artist), contains_eager(TrackInfo.album, Album.artist)) if ffilter is not None: query = ffilter(query) query = limitoffset(query.order_by(TrackInfo.trackno), skip, limit) qall = query.all() session.expunge_all() return qall def counttracks(self, ffilter=None): with self.session_scope() as session: query = session.query(TrackInfo) if ffilter is not None: query = ffilter(query) return query.count() def countalbums(self, ffilter=None): with self.session_scope() as session: query = session.query(Album) if ffilter is not None: query = ffilter(query) return query.count() def listtracksbyalbums(self, ffilter=None, skip=None, limit=None): with self.session_scope() as session: query = session.query(Album).join(Album.tracks).outerjoin(TrackInfo.genre).options( contains_eager(Album.tracks, TrackInfo.album, Album.artist), joinedload(Album.tracks, TrackInfo.genre)) if ffilter is not None: query = ffilter(query) query = limitoffset(query.order_by(Album.year.desc(), TrackInfo.trackno), skip, limit) qall = query.all() # Force artist population for x in qall: for y in x.tracks: attributes.set_committed_value(y, 'album', x) attributes.set_committed_value(y, 'artist', x.artist) session.expunge_all() return qall def listtracksbyalbumsbyartists(self, ffilter=None, skip=None, limit=None, order_by=(Artist.name, Album.year.desc(), TrackInfo.trackno, TrackInfo.name)): with self.session_scope() as session: query = session.query(Artist).join(Artist.albums).join(Album.tracks).join(TrackInfo.track).options( contains_eager(Artist.albums, Album.tracks)) if ffilter is not None: query = ffilter(query) query = limitoffset(query.order_by(*order_by), skip, limit) qall = query.all() # Force artist population for x in qall: for y in x.albums: attributes.set_committed_value(y, 'artist', x) for z in y.tracks: attributes.set_committed_value(z, 'album', y) attributes.set_committed_value(z, 'artist', x) session.expunge_all() return qall def searchartists(self, term, skip=None, limit=None): ffilter = lambda query: query.filter(Artist.name.contains(term)) return self.listartists(ffilter, skip, limit) def searchalbums(self, term, skip=None, limit=None): ffilter = lambda query: query.filter(Album.name.contains(term)) return self.listalbums(ffilter, skip, limit) def search(self, term, artists=True, albums=True, tracks=True, skip=None, limit=None): def ffilter(query): filters = [] if artists: filters.append(Artist.name.contains(term)) if albums: filters.append(Album.name.contains(term)) if tracks: filters.append(TrackInfo.name.contains(term)) if len(filters) > 0: query = query.filter(or_(*filters)) return query return self.listtracksbyalbumsbyartists(ffilter, skip, limit) def typed_fct(func): @wraps(func) def wrapper(*arg, **kwargs): stype = request.args.get('type', 'tags') return func(Typed(stype), *arg, **kwargs) return wrapper
{ "repo_name": "magne4000/festival", "path": "festivallib/request.py", "copies": "1", "size": "9383", "license": "mit", "hash": -5717507041790010000, "line_mean": 39.7956521739, "line_max": 119, "alpha_frac": 0.5738036875, "autogenerated": false, "ratio": 4.118964003511852, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5192767691011853, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request from app.main.service.auth_helper import Auth def token_required(f): @wraps(f) def decorated(*args, **kwargs): data, status = Auth.get_logged_in_user(request) token = data.get('data') if not token: return data, status return f(*args, **kwargs) return decorated def admin_token_required(f): @wraps(f) def decorated(*args, **kwargs): data, status = Auth.get_logged_in_user(request) token = data.get('data') if not token: return data, status admin = token.get('permission_level') if not admin: response_object = { 'status': 'fail', 'message': 'admin token required' } return response_object, 401 if admin == 2 or admin == 3: return f(*args, **kwargs) else: response_object = { 'status': 'fail', 'message': 'admin token required' } return response_object, 401 return decorated def superuser_token_required(f): @wraps(f) def decorated(*args, **kwargs): data, status = Auth.get_logged_in_user(request) token = data.get('data') if not token: return data, status admin = token.get('permission_level') if not admin: response_object = { 'status': 'fail', 'message': 'superuser token required' } return response_object, 401 if admin == 3: return f(*args, **kwargs) else: response_object = { 'status': 'fail', 'message': 'superuser token required' } return response_object, 401 return decorated
{ "repo_name": "i-am-dev/DojoManager", "path": "app/main/util/decorator.py", "copies": "1", "size": "1871", "license": "mit", "hash": 4084493352168170500, "line_mean": 22.3875, "line_max": 55, "alpha_frac": 0.5168359166, "autogenerated": false, "ratio": 4.423167848699763, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5440003765299763, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request from community_share.authorization import get_requesting_user from community_share.routes import base_routes def api_path(path, query_args): query = '&'.join(['{}={}'.format(name, query_args[name]) for name in query_args]) return '{base_url}rest/{path}/{query}'.format( base_url=request.url_root, path=path, query='?{}'.format(query) if query is not '' else '' ) def needs_auth(auth_level='user'): def needs_auth_decorator(f): @wraps(f) def auth_check(*args, **kwargs): user = get_requesting_user() if user is None: return base_routes.make_not_authorized_response() if 'admin' == auth_level and not user.is_administrator: return base_routes.make_not_authorized_response() return f(*args, requester=user, **kwargs) return auth_check return needs_auth_decorator def needs_admin_auth(): return needs_auth('admin')
{ "repo_name": "seanastephens/communityshare", "path": "community_share/flask_helpers.py", "copies": "1", "size": "1031", "license": "mpl-2.0", "hash": -2090685932945497600, "line_mean": 25.4358974359, "line_max": 85, "alpha_frac": 0.6236663434, "autogenerated": false, "ratio": 3.8185185185185184, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.4942184861918518, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request from flask.ext.restful import Api from flask.ext.restful.reqparse import RequestParser def patched_to_marshallable_type(obj): """adds __marshallable__ support; see https://github.com/twilio/flask-restful/pull/32""" if obj is None: return None # make it idempotent for None if hasattr(obj, '__getitem__'): return obj # it is indexable it is ok if hasattr(obj, '__marshallable__'): return obj.__marshallable__() return dict(obj.__dict__) class BetterErrorHandlingApi(Api): # HACK: see https://github.com/twilio/flask-restful/issues/8 # and https://github.com/twilio/flask-restful/pull/29 def __init__(self, app, prefix='', default_mediatype='application/json', decorators=None): self.saved_handle_exception = app.handle_exception self.saved_handle_user_exception = app.handle_user_exception super(BetterErrorHandlingApi, self).__init__(app, prefix, default_mediatype, decorators) app.handle_exception = self.handle_exception app.handle_user_exception = self.handle_user_exception self.endpoints = set() def add_resource(self, resource, *urls, **kwargs): endpoint = kwargs.setdefault('endpoint', resource.__name__.lower()) self.endpoints.add(endpoint) return super(BetterErrorHandlingApi, self).add_resource(resource, *urls, **kwargs) def handle_exception(self, e): return self.handle_error(self.saved_handle_exception, e) def handle_user_exception(self, e): return self.handle_error(self.saved_handle_user_exception, e) def handle_error(self, original, e): rv = original(e) # call original error handler, so any side-effect causing handling (sentry, etc) will happen if not request.url_rule or request.url_rule.endpoint not in self.endpoints: return rv return super(BetterErrorHandlingApi, self).handle_error(e) def parse_with(*arguments, **kwargs): """This decorator allows you to easily augment any method (typically a view method) to access reqparse based arguments, i.e.: class Users(Resource): @parse_with(Argument('profession')) def post(self, params, username): create_new_user(username, params.profession) return 'CREATED', 201 api.add_resource(Users, '/<username>', endpoint='users') """ parser = kwargs.pop('parser', RequestParser()) if kwargs: # mimic py3k style named-arguments after *args, i.e., def f(a, *b, c=1) raise TypeError("unexpected keyword argument '%s'" % (kwargs.popitem()[0],)) for argument in arguments: parser.args.append(argument) def decor(func): @wraps(func) def inner(self, *args, **kwargs): return func(self, parser.parse_args(), *args, **kwargs) return inner return decor
{ "repo_name": "paulvisen/flask-todo", "path": "utils/flaskutils/restful.py", "copies": "2", "size": "2942", "license": "mit", "hash": 6990349651556561000, "line_mean": 42.2647058824, "line_max": 117, "alpha_frac": 0.6597552685, "autogenerated": false, "ratio": 3.8863936591809773, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.5546148927680977, "avg_score": null, "num_lines": null }
from functools import wraps from flask import request, session from conditional.util.ldap import ldap_is_active, ldap_is_alumni, \ ldap_is_eboard, ldap_is_eval_director, \ ldap_is_financial_director, ldap_get_member, ldap_is_current_student def webauth_request(func): @wraps(func) def wrapped_func(*args, **kwargs): user_name = request.headers.get('x-webauth-user') account = ldap_get_member(user_name) is_active = ldap_is_active(account) is_alumni = ldap_is_alumni(account) is_eboard = ldap_is_eboard(account) is_financial = ldap_is_financial_director(account) is_eval = ldap_is_eval_director(account) return func({"user_name": user_name, "is_active": is_active, "is_alumni": is_alumni, "is_eboard": is_eboard, "is_financial": is_financial, "is_eval": is_eval}, *args, **kwargs) return wrapped_func def get_user(func): @wraps(func) def wrapped_function(*args, **kwargs): username = str(session["userinfo"].get("preferred_username", "")) account = ldap_get_member(username) current_student = ldap_is_current_student(account) user_dict = { 'username': username, 'account': account, 'student': current_student } kwargs["user_dict"] = user_dict return func(*args, **kwargs) return wrapped_function
{ "repo_name": "ComputerScienceHouse/conditional", "path": "conditional/util/auth.py", "copies": "1", "size": "1499", "license": "mit", "hash": 1636267782973045800, "line_mean": 30.8936170213, "line_max": 73, "alpha_frac": 0.5917278185, "autogenerated": false, "ratio": 3.6207729468599035, "config_test": false, "has_no_keywords": false, "few_assignments": false, "quality_score": 0.4712500765359904, "avg_score": null, "num_lines": null }