This repository has been archived on 2020-03-24. You can view files and clone it, but cannot push or open issues or pull requests.
quay/endpoints/api/team.py

534 lines
18 KiB
Python
Raw Normal View History

2015-05-14 20:47:38 +00:00
""" Create, list and manage an organization's teams. """
import json
from functools import wraps
2014-03-14 18:20:51 +00:00
from flask import request
import features
from app import avatar, authentication
from auth.permissions import (AdministerOrganizationPermission, ViewTeamPermission,
SuperUserPermission)
2014-03-14 18:20:51 +00:00
from auth.auth_context import get_authenticated_user
from auth import scopes
2014-03-14 18:20:51 +00:00
from data import model
from endpoints.api import (resource, nickname, ApiResource, validate_json_request, request_error,
log_action, internal_only, require_scope, path_param, query_param,
truthy_bool, parse_args, require_user_admin, show_if, format_date,
verify_not_prod, require_fresh_login)
from endpoints.exception import Unauthorized, NotFound, InvalidRequest
from util.useremails import send_org_invite_email
from util.names import parse_robot_username
def permission_view(permission):
return {
'repository': {
'name': permission.repository.name,
'is_public': permission.repository.visibility.name == 'public'
},
'role': permission.role.name
}
2014-09-11 19:45:41 +00:00
def try_accept_invite(code, user):
(team, inviter) = model.team.confirm_team_invite(code, user)
2014-09-11 19:45:41 +00:00
model.notification.delete_matching_notifications(user, 'org_team_invite',
org=team.organization.username)
2014-09-11 19:45:41 +00:00
orgname = team.organization.username
log_action('org_team_member_invite_accepted', orgname, {
'member': user.username,
'team': team.name,
'inviter': inviter.username
})
return team
def handle_addinvite_team(inviter, team, user=None, email=None):
requires_invite = features.MAILING and features.REQUIRE_TEAM_INVITE
invite = model.team.add_or_invite_to_team(inviter, team, user, email,
requires_invite=requires_invite)
if not invite:
# User was added to the team directly.
return
orgname = team.organization.username
if user:
model.notification.create_notification('org_team_invite', user, metadata={
'code': invite.invite_token,
'inviter': inviter.username,
'org': orgname,
'team': team.name
})
send_org_invite_email(user.username if user else email, user.email if user else email,
orgname, team.name, inviter.username, invite.invite_token)
return invite
2014-03-14 18:20:51 +00:00
def team_view(orgname, team):
view_permission = ViewTeamPermission(orgname, team.name)
role = model.team.get_team_org_role(team).name
2014-03-14 18:20:51 +00:00
return {
'name': team.name,
'description': team.description,
'can_view': view_permission.can(),
'role': role,
'avatar': avatar.get_data_for_team(team)
2014-03-14 18:20:51 +00:00
}
def member_view(member, invited=False):
2014-03-14 18:20:51 +00:00
return {
'name': member.username,
'kind': 'user',
'is_robot': member.robot,
'avatar': avatar.get_data_for_user(member),
'invited': invited,
2014-03-14 18:20:51 +00:00
}
def invite_view(invite):
if invite.user:
return member_view(invite.user, invited=True)
else:
return {
'email': invite.email,
'kind': 'invite',
'avatar': avatar.get_data(invite.email, invite.email, 'user'),
'invited': True
}
def disallow_for_synced_team(except_robots=False):
""" Disallows the decorated operation for a team that is marked as being synced from an internal
auth provider such as LDAP. If except_robots is True, then the operation is allowed if the
member specified on the operation is a robot account.
"""
def inner(func):
@wraps(func)
def wrapper(self, *args, **kwargs):
# Team syncing can only be enabled if we have a federated service.
2017-02-23 18:26:47 +00:00
if features.TEAM_SYNCING and authentication.federated_service:
orgname = kwargs['orgname']
teamname = kwargs['teamname']
if model.team.get_team_sync_information(orgname, teamname):
if not except_robots or not parse_robot_username(kwargs.get('membername', '')):
raise InvalidRequest('Cannot call this method on an auth-synced team')
return func(self, *args, **kwargs)
return wrapper
return inner
disallow_nonrobots_for_synced_team = disallow_for_synced_team(except_robots=True)
disallow_all_for_synced_team = disallow_for_synced_team(except_robots=False)
@resource('/v1/organization/<orgname>/team/<teamname>')
@path_param('orgname', 'The name of the organization')
@path_param('teamname', 'The name of the team')
2014-03-14 18:20:51 +00:00
class OrganizationTeam(ApiResource):
""" Resource for manging an organization's teams. """
schemas = {
'TeamDescription': {
'type': 'object',
'description': 'Description of a team',
'required': [
'role',
],
2014-03-14 18:20:51 +00:00
'properties': {
'role': {
'type': 'string',
'description': 'Org wide permissions that should apply to the team',
'enum': [
'member',
'creator',
'admin',
],
},
'description': {
'type': 'string',
'description': 'Markdown description for the team',
},
},
},
}
@require_scope(scopes.ORG_ADMIN)
2014-03-14 18:20:51 +00:00
@nickname('updateOrganizationTeam')
@validate_json_request('TeamDescription')
def put(self, orgname, teamname):
""" Update the org-wide permission for the specified team. """
edit_permission = AdministerOrganizationPermission(orgname)
if edit_permission.can():
team = None
details = request.get_json()
is_existing = False
try:
team = model.team.get_organization_team(orgname, teamname)
2014-03-14 18:20:51 +00:00
is_existing = True
except model.InvalidTeamException:
# Create the new team.
description = details['description'] if 'description' in details else ''
role = details['role'] if 'role' in details else 'member'
org = model.organization.get_organization(orgname)
team = model.team.create_team(teamname, org, role, description)
2014-03-14 18:20:51 +00:00
log_action('org_create_team', orgname, {'team': teamname})
if is_existing:
if ('description' in details and
team.description != details['description']):
team.description = details['description']
team.save()
log_action('org_set_team_description', orgname,
{'team': teamname, 'description': team.description})
if 'role' in details:
role = model.team.get_team_org_role(team).name
2014-03-14 18:20:51 +00:00
if role != details['role']:
team = model.team.set_team_org_permission(team, details['role'],
get_authenticated_user().username)
2014-03-14 18:20:51 +00:00
log_action('org_set_team_role', orgname, {'team': teamname, 'role': details['role']})
2014-11-24 21:07:38 +00:00
return team_view(orgname, team), 200
2014-03-14 18:20:51 +00:00
raise Unauthorized()
2014-03-14 18:20:51 +00:00
@require_scope(scopes.ORG_ADMIN)
2014-03-14 18:20:51 +00:00
@nickname('deleteOrganizationTeam')
def delete(self, orgname, teamname):
""" Delete the specified team. """
permission = AdministerOrganizationPermission(orgname)
if permission.can():
model.team.remove_team(orgname, teamname, get_authenticated_user().username)
2014-03-14 18:20:51 +00:00
log_action('org_delete_team', orgname, {'team': teamname})
return '', 204
2014-03-14 18:20:51 +00:00
raise Unauthorized()
2014-03-14 18:20:51 +00:00
def _syncing_setup_allowed(orgname):
""" Returns whether syncing setup is allowed for the current user over the matching org. """
if not features.NONSUPERUSER_TEAM_SYNCING_SETUP and not SuperUserPermission().can():
return False
return AdministerOrganizationPermission(orgname).can()
@resource('/v1/organization/<orgname>/team/<teamname>/syncing')
@path_param('orgname', 'The name of the organization')
@path_param('teamname', 'The name of the team')
2017-02-23 18:26:47 +00:00
@show_if(features.TEAM_SYNCING)
class OrganizationTeamSyncing(ApiResource):
""" Resource for managing syncing of a team by a backing group. """
@require_scope(scopes.ORG_ADMIN)
@require_scope(scopes.SUPERUSER)
@nickname('enableOrganizationTeamSync')
@verify_not_prod
@require_fresh_login
def post(self, orgname, teamname):
if _syncing_setup_allowed(orgname):
try:
team = model.team.get_organization_team(orgname, teamname)
except model.InvalidTeamException:
raise NotFound()
config = request.get_json()
# Ensure that the specified config points to a valid group.
status, err = authentication.check_group_lookup_args(config)
if not status:
raise InvalidRequest('Could not sync to group: %s' % err)
# Set the team's syncing config.
model.team.set_team_syncing(team, authentication.federated_service, config)
return team_view(orgname, team)
raise Unauthorized()
@require_scope(scopes.ORG_ADMIN)
@require_scope(scopes.SUPERUSER)
@nickname('disableOrganizationTeamSync')
@verify_not_prod
@require_fresh_login
def delete(self, orgname, teamname):
if _syncing_setup_allowed(orgname):
try:
team = model.team.get_organization_team(orgname, teamname)
except model.InvalidTeamException:
raise NotFound()
model.team.remove_team_syncing(orgname, teamname)
return team_view(orgname, team)
raise Unauthorized()
2014-03-14 18:20:51 +00:00
@resource('/v1/organization/<orgname>/team/<teamname>/members')
@path_param('orgname', 'The name of the organization')
@path_param('teamname', 'The name of the team')
2014-03-14 18:20:51 +00:00
class TeamMemberList(ApiResource):
""" Resource for managing the list of members for a team. """
@require_scope(scopes.ORG_ADMIN)
@parse_args()
@query_param('includePending', 'Whether to include pending members', type=truthy_bool,
default=False)
2014-03-14 18:20:51 +00:00
@nickname('getOrganizationTeamMembers')
def get(self, orgname, teamname, parsed_args):
2014-03-14 18:20:51 +00:00
""" Retrieve the list of members for the specified team. """
view_permission = ViewTeamPermission(orgname, teamname)
edit_permission = AdministerOrganizationPermission(orgname)
if view_permission.can():
team = None
try:
team = model.team.get_organization_team(orgname, teamname)
2014-03-14 18:20:51 +00:00
except model.InvalidTeamException:
raise NotFound()
2014-11-24 21:07:38 +00:00
members = model.organization.get_organization_team_members(team.id)
2014-08-16 00:51:31 +00:00
invites = []
2014-03-14 18:20:51 +00:00
if parsed_args['includePending'] and edit_permission.can():
invites = model.team.get_organization_team_member_invites(team.id)
2014-08-16 00:51:31 +00:00
data = {
'name': teamname,
2014-08-16 00:51:31 +00:00
'members': [member_view(m) for m in members] + [invite_view(i) for i in invites],
'can_edit': edit_permission.can(),
2014-08-16 00:51:31 +00:00
}
2017-02-23 18:26:47 +00:00
if features.TEAM_SYNCING and authentication.federated_service:
if _syncing_setup_allowed(orgname):
data['can_sync'] = {
'service': authentication.federated_service,
}
data['can_sync'].update(authentication.service_metadata())
sync_info = model.team.get_team_sync_information(orgname, teamname)
if sync_info is not None:
data['synced'] = {
'service': sync_info.service.name,
}
if SuperUserPermission().can():
data['synced'].update({
'last_updated': format_date(sync_info.last_updated),
'config': json.loads(sync_info.config),
})
return data
raise Unauthorized()
2014-03-14 18:20:51 +00:00
@resource('/v1/organization/<orgname>/team/<teamname>/members/<membername>')
@path_param('orgname', 'The name of the organization')
@path_param('teamname', 'The name of the team')
@path_param('membername', 'The username of the team member')
2014-03-14 18:20:51 +00:00
class TeamMember(ApiResource):
""" Resource for managing individual members of a team. """
@require_scope(scopes.ORG_ADMIN)
2014-03-14 18:20:51 +00:00
@nickname('updateOrganizationTeamMember')
@disallow_nonrobots_for_synced_team
2014-03-14 18:20:51 +00:00
def put(self, orgname, teamname, membername):
""" Adds or invites a member to an existing team. """
2014-03-14 18:20:51 +00:00
permission = AdministerOrganizationPermission(orgname)
if permission.can():
team = None
user = None
# Find the team.
try:
team = model.team.get_organization_team(orgname, teamname)
2014-03-14 18:20:51 +00:00
except model.InvalidTeamException:
raise NotFound()
2014-03-14 18:20:51 +00:00
# Find the user.
user = model.user.get_user(membername)
2014-03-14 18:20:51 +00:00
if not user:
raise request_error(message='Unknown user')
2014-11-24 21:07:38 +00:00
# Add or invite the user to the team.
inviter = get_authenticated_user()
invite = handle_addinvite_team(inviter, team, user=user)
if not invite:
log_action('org_add_team_member', orgname, {'member': membername, 'team': teamname})
return member_view(user, invited=False)
2014-11-24 21:07:38 +00:00
# User was invited.
2014-09-08 21:20:01 +00:00
log_action('org_invite_team_member', orgname, {
'user': membername,
'member': membername,
'team': teamname
})
return member_view(user, invited=True)
2014-03-14 18:20:51 +00:00
raise Unauthorized()
2014-03-14 18:20:51 +00:00
@require_scope(scopes.ORG_ADMIN)
2014-03-14 18:20:51 +00:00
@nickname('deleteOrganizationTeamMember')
@disallow_nonrobots_for_synced_team
2014-03-14 18:20:51 +00:00
def delete(self, orgname, teamname, membername):
2014-09-08 21:20:01 +00:00
""" Delete a member of a team. If the user is merely invited to join
the team, then the invite is removed instead.
"""
2014-03-14 18:20:51 +00:00
permission = AdministerOrganizationPermission(orgname)
if permission.can():
# Remote the user from the team.
invoking_user = get_authenticated_user().username
2014-09-08 21:20:01 +00:00
# Find the team.
try:
team = model.team.get_organization_team(orgname, teamname)
2014-09-08 21:20:01 +00:00
except model.InvalidTeamException:
raise NotFound()
2014-11-24 21:07:38 +00:00
2014-09-08 21:20:01 +00:00
# Find the member.
member = model.user.get_user(membername)
2014-09-08 21:20:01 +00:00
if not member:
raise NotFound()
# First attempt to delete an invite for the user to this team. If none found,
# then we try to remove the user directly.
if model.team.delete_team_user_invite(team, member):
2014-09-08 21:20:01 +00:00
log_action('org_delete_team_member_invite', orgname, {
'user': membername,
'team': teamname,
'member': membername
})
return '', 204
2014-09-08 21:20:01 +00:00
model.team.remove_user_from_team(orgname, teamname, membername, invoking_user)
2014-03-14 18:20:51 +00:00
log_action('org_remove_team_member', orgname, {'member': membername, 'team': teamname})
return '', 204
2014-03-14 18:20:51 +00:00
raise Unauthorized()
2014-08-29 00:49:11 +00:00
@resource('/v1/organization/<orgname>/team/<teamname>/invite/<email>')
@show_if(features.MAILING)
2014-08-29 00:49:11 +00:00
class InviteTeamMember(ApiResource):
""" Resource for inviting a team member via email address. """
@require_scope(scopes.ORG_ADMIN)
@nickname('inviteTeamMemberEmail')
@disallow_all_for_synced_team
2014-08-29 00:49:11 +00:00
def put(self, orgname, teamname, email):
""" Invites an email address to an existing team. """
permission = AdministerOrganizationPermission(orgname)
if permission.can():
team = None
# Find the team.
try:
team = model.team.get_organization_team(orgname, teamname)
2014-08-29 00:49:11 +00:00
except model.InvalidTeamException:
raise NotFound()
2014-11-24 21:07:38 +00:00
2014-08-29 00:49:11 +00:00
# Invite the email to the team.
inviter = get_authenticated_user()
invite = handle_addinvite_team(inviter, team, email=email)
2014-09-08 21:20:01 +00:00
log_action('org_invite_team_member', orgname, {
'email': email,
'team': teamname,
'member': email
})
2014-08-29 00:49:11 +00:00
return invite_view(invite)
raise Unauthorized()
2014-09-08 21:20:01 +00:00
@require_scope(scopes.ORG_ADMIN)
@nickname('deleteTeamMemberEmailInvite')
def delete(self, orgname, teamname, email):
""" Delete an invite of an email address to join a team. """
permission = AdministerOrganizationPermission(orgname)
if permission.can():
team = None
# Find the team.
try:
team = model.team.get_organization_team(orgname, teamname)
2014-09-08 21:20:01 +00:00
except model.InvalidTeamException:
raise NotFound()
2014-11-24 21:07:38 +00:00
2014-09-08 21:20:01 +00:00
# Delete the invite.
if not model.team.delete_team_email_invite(team, email):
raise NotFound()
2014-09-08 21:20:01 +00:00
log_action('org_delete_team_member_invite', orgname, {
'email': email,
'team': teamname,
'member': email
})
return '', 204
2014-09-08 21:20:01 +00:00
raise Unauthorized()
2014-08-29 00:49:11 +00:00
@resource('/v1/organization/<orgname>/team/<teamname>/permissions')
@path_param('orgname', 'The name of the organization')
@path_param('teamname', 'The name of the team')
class TeamPermissions(ApiResource):
""" Resource for listing the permissions an org's team has in the system. """
@nickname('getOrganizationTeamPermissions')
def get(self, orgname, teamname):
""" Returns the list of repository permissions for the org's team. """
permission = AdministerOrganizationPermission(orgname)
if permission.can():
try:
team = model.team.get_organization_team(orgname, teamname)
except model.InvalidTeamException:
raise NotFound()
permissions = model.permission.list_team_permissions(team)
return {
'permissions': [permission_view(permission) for permission in permissions]
}
raise Unauthorized()
@resource('/v1/teaminvite/<code>')
@internal_only
@show_if(features.MAILING)
class TeamMemberInvite(ApiResource):
2016-01-06 20:00:36 +00:00
""" Resource for managing invites to join a team. """
@require_user_admin
@nickname('acceptOrganizationTeamInvite')
def put(self, code):
""" Accepts an invite to join a team in an organization. """
# Accept the invite for the current user.
2014-09-11 19:45:41 +00:00
team = try_accept_invite(code, get_authenticated_user())
if not team:
2014-11-24 21:07:38 +00:00
raise NotFound()
orgname = team.organization.username
return {
'org': orgname,
'team': team.name
}
@nickname('declineOrganizationTeamInvite')
@require_user_admin
def delete(self, code):
""" Delete an existing invitation to join a team. """
(team, inviter) = model.team.delete_team_invite(code, user_obj=get_authenticated_user())
model.notification.delete_matching_notifications(get_authenticated_user(), 'org_team_invite',
code=code)
orgname = team.organization.username
log_action('org_team_member_invite_declined', orgname, {
'member': get_authenticated_user().username,
'team': team.name,
'inviter': inviter.username
})
return '', 204