This repository has been archived on 2020-03-24. You can view files and clone it, but cannot push or open issues or pull requests.
quay/endpoints/api.py

435 lines
12 KiB
Python
Raw Normal View History

2013-09-23 16:37:40 +00:00
import logging
2013-10-02 04:48:03 +00:00
import stripe
2013-09-23 16:37:40 +00:00
from flask import request, make_response, jsonify, abort
from flask.ext.login import login_required, current_user
from functools import wraps
from data import model
2013-09-23 16:37:40 +00:00
from app import app
from util.email import send_confirmation_email
from util.names import parse_repository_name
2013-09-27 22:15:31 +00:00
from util.gravatar import compute_hash
2013-09-26 21:59:20 +00:00
from auth.permissions import (ReadRepositoryPermission,
2013-09-27 17:24:07 +00:00
ModifyRepositoryPermission,
AdministerRepositoryPermission)
2013-10-01 18:46:44 +00:00
from endpoints import registry
import re
2013-09-23 16:37:40 +00:00
logger = logging.getLogger(__name__)
def api_login_required(f):
@wraps(f)
def decorated_view(*args, **kwargs):
if not current_user.is_authenticated():
abort(401)
return f(*args, **kwargs)
return decorated_view
@app.errorhandler(model.DataModelException)
def handle_dme(ex):
return make_response(ex.message, 400)
2013-09-23 16:37:40 +00:00
@app.route('/api/')
def welcome():
return make_response('welcome', 200)
@app.route('/api/user/', methods=['GET'])
def get_logged_in_user():
2013-09-30 21:32:03 +00:00
if current_user.is_anonymous():
return jsonify({'anonymous': True})
user = current_user.db_user
return jsonify({
'verified': user.verified,
'anonymous': False,
'username': user.username,
'email': user.email,
2013-09-27 22:15:31 +00:00
'gravatar': compute_hash(user.email),
})
@app.route('/api/user/', methods=['POST'])
def create_user_api():
user_data = request.get_json()
existing_user = model.get_user(user_data['username'])
if existing_user:
error_resp = jsonify({
'message': 'The username already exists'
})
error_resp.status_code = 400
return error_resp
try:
new_user = model.create_user(user_data['username'], user_data['password'],
user_data['email'])
code = model.create_confirm_email_code(new_user)
send_confirmation_email(new_user.username, new_user.email, code.code)
return make_response('Created', 201)
except model.DataModelException as ex:
message = ex.message
m = re.search('column ([a-zA-Z]+) is not unique', message)
if m and m.group(1):
message = m.group(1) + ' already exists'
error_resp = jsonify({
'message': message,
})
error_resp.status_code = 400
return error_resp
2013-09-27 23:21:54 +00:00
@app.route('/api/users/<prefix>', methods=['GET'])
@api_login_required
2013-09-27 23:21:54 +00:00
def get_matching_users(prefix):
users = model.get_matching_users(prefix)
return jsonify({
'users': [user.username for user in users]
})
2013-09-23 16:37:40 +00:00
@app.route('/api/repository/', methods=['POST'])
@api_login_required
2013-09-23 16:37:40 +00:00
def create_repo_api():
pass
@app.route('/api/find/repository', methods=['GET'])
def match_repos_api():
prefix = request.args.get('query', '')
2013-10-08 15:29:42 +00:00
2013-09-27 23:21:54 +00:00
def repo_view(repo):
return {
'namespace': repo.namespace,
'name': repo.name,
'description': repo.description
2013-09-27 23:21:54 +00:00
}
2013-10-08 15:29:42 +00:00
username = None
if current_user.is_authenticated():
username = current_user.db_user.username
2013-09-28 03:25:57 +00:00
matching = model.get_matching_repositories(prefix, username)
2013-09-27 23:21:54 +00:00
response = {
2013-09-28 03:25:57 +00:00
'repositories': [repo_view(repo) for repo in matching]
2013-09-27 23:21:54 +00:00
}
return jsonify(response)
2013-09-26 21:59:20 +00:00
2013-09-23 16:37:40 +00:00
@app.route('/api/repository/', methods=['GET'])
def list_repos_api():
2013-09-28 04:05:32 +00:00
def repo_view(repo_obj):
2013-09-23 16:37:40 +00:00
return {
2013-09-28 04:05:32 +00:00
'namespace': repo_obj.namespace,
'name': repo_obj.name,
'description': repo_obj.description,
2013-09-23 16:37:40 +00:00
}
2013-10-08 15:29:42 +00:00
limit = request.args.get('limit', None)
include_public = request.args.get('public', 'true')
include_private = request.args.get('private', 'true')
sort = request.args.get('sort', 'false')
2013-09-23 16:37:40 +00:00
try:
limit = int(limit) if limit else None
except:
limit = None
include_public = include_public == 'true'
include_private = include_private == 'true'
sort = sort == 'true'
2013-10-08 15:29:42 +00:00
username = None
if current_user.is_authenticated() and include_private:
username = current_user.db_user.username
repo_query = model.get_visible_repositories(username, limit=limit,
include_public=include_public,
sort=sort)
repos = [repo_view(repo) for repo in repo_query]
2013-09-23 16:37:40 +00:00
response = {
'repositories': repos
}
return jsonify(response)
@app.route('/api/repository/<path:repository>', methods=['PUT'])
@api_login_required
2013-09-23 16:37:40 +00:00
@parse_repository_name
def update_repo_api(namespace, repository):
2013-09-26 21:59:20 +00:00
permission = ModifyRepositoryPermission(namespace, repository)
2013-09-28 00:03:07 +00:00
if permission.can():
2013-09-26 21:59:20 +00:00
repo = model.get_repository(namespace, repository)
if repo:
values = request.get_json()
repo.description = values['description']
repo.save()
return jsonify({
'success': True
})
2013-09-28 00:03:07 +00:00
2013-09-26 21:59:20 +00:00
abort(404)
2013-09-23 16:37:40 +00:00
2013-10-08 15:29:42 +00:00
@app.route('/api/repository/<path:repository>/changevisibility',
methods=['POST'])
@api_login_required
@parse_repository_name
def change_repo_visibility_api(namespace, repository):
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
repo = model.get_repository(namespace, repository)
if repo:
values = request.get_json()
model.set_repository_visibility(repo, values['visibility'])
return jsonify({
'success': True
})
abort(404)
@app.route('/api/repository/<path:repository>', methods=['DELETE'])
@api_login_required
@parse_repository_name
def delete_repository(namespace, repository):
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
model.purge_repository(namespace, repository)
2013-10-01 18:46:44 +00:00
registry.delete_repository_storage(namespace, repository)
return make_response('Deleted', 204)
abort(404)
def image_view(image):
return {
'id': image.docker_image_id,
'created': image.created,
'comment': image.comment,
}
2013-09-23 16:37:40 +00:00
@app.route('/api/repository/<path:repository>', methods=['GET'])
@parse_repository_name
def get_repo_api(namespace, repository):
logger.debug('Get repo: %s/%s' % (namespace, repository))
2013-09-28 00:03:07 +00:00
2013-09-26 21:59:20 +00:00
def tag_view(tag):
image = model.get_tag_image(namespace, repository, tag.name)
if not image:
return {}
return {
'name': tag.name,
2013-09-27 17:24:07 +00:00
'image': image_view(image),
2013-09-26 21:59:20 +00:00
}
permission = ReadRepositoryPermission(namespace, repository)
is_public = model.repository_is_public(namespace, repository)
if permission.can() or is_public:
2013-09-26 21:59:20 +00:00
repo = model.get_repository(namespace, repository)
if repo:
tags = model.list_repository_tags(namespace, repository)
2013-09-27 17:24:07 +00:00
tag_dict = {tag.name: tag_view(tag) for tag in tags}
can_write = ModifyRepositoryPermission(namespace, repository).can()
can_admin = AdministerRepositoryPermission(namespace, repository).can()
2013-09-27 17:24:07 +00:00
return jsonify({
'namespace': namespace,
'name': repository,
'description': repo.description,
'tags': tag_dict,
'can_write': can_write,
'can_admin': can_admin,
'is_public': is_public
2013-09-27 17:24:07 +00:00
})
2013-09-26 21:59:20 +00:00
2013-09-27 17:24:07 +00:00
abort(404) # Not fount
abort(403) # Permission denied
def role_view(repo_perm_obj):
return {
'role': repo_perm_obj.role.name
}
2013-09-28 00:03:07 +00:00
@app.route('/api/repository/<path:repository>/tag/<tag>/images',
methods=['GET'])
@parse_repository_name
def list_tag_images(namespace, repository, tag):
permission = ReadRepositoryPermission(namespace, repository)
2013-09-28 04:05:32 +00:00
if permission.can() or model.repository_is_public(namespace, repository):
tag_image = model.get_tag_image(namespace, repository, tag)
parent_images = model.get_parent_images(tag_image)
parents = list(parent_images)
parents.reverse()
all_images = [tag_image] + parents
2013-09-28 00:03:07 +00:00
return jsonify({
'images': [image_view(image) for image in all_images]
})
abort(403) # Permission denied
2013-09-27 17:24:07 +00:00
@app.route('/api/repository/<path:repository>/permissions/', methods=['GET'])
@api_login_required
2013-09-27 17:24:07 +00:00
@parse_repository_name
def list_repo_permissions(namespace, repository):
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
repo_perms = model.get_all_repo_users(namespace, repository)
return jsonify({
2013-09-28 00:03:07 +00:00
'permissions': {repo_perm.user.username: role_view(repo_perm)
2013-09-27 17:24:07 +00:00
for repo_perm in repo_perms}
})
abort(403) # Permission denied
@app.route('/api/repository/<path:repository>/permissions/<username>',
methods=['GET'])
@api_login_required
@parse_repository_name
def get_permissions(namespace, repository, username):
logger.debug('Get repo: %s/%s permissions for user %s' %
(namespace, repository, username))
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
perm = model.get_user_reponame_permission(username, namespace, repository)
return jsonify(role_view(perm))
abort(403) # Permission denied
2013-09-27 17:24:07 +00:00
@app.route('/api/repository/<path:repository>/permissions/<username>',
methods=['PUT', 'POST'])
@api_login_required
2013-09-27 17:24:07 +00:00
@parse_repository_name
def change_permissions(namespace, repository, username):
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
new_permission = request.get_json()
logger.debug('Setting permission to: %s for user %s' %
(new_permission['role'], username))
try:
perm = model.set_user_repo_permission(username, namespace, repository,
new_permission['role'])
except model.DataModelException:
logger.warning('User tried to remove themselves as admin.')
abort(409)
resp = jsonify(role_view(perm))
if request.method == 'POST':
resp.status_code = 201
return resp
abort(403) # Permission denied
2013-09-28 00:03:07 +00:00
@app.route('/api/repository/<path:repository>/permissions/<username>',
methods=['DELETE'])
@api_login_required
@parse_repository_name
def delete_permissions(namespace, repository, username):
permission = AdministerRepositoryPermission(namespace, repository)
if permission.can():
try:
model.delete_user_permission(username, namespace, repository)
except model.DataModelException:
logger.warning('User tried to remove themselves as admin.')
abort(409)
return make_response('Deleted', 204)
2013-09-27 17:24:07 +00:00
abort(403) # Permission denied
2013-10-02 04:48:03 +00:00
2013-10-08 15:29:42 +00:00
def subscription_view(stripe_subscription, used_repos):
2013-10-02 04:48:03 +00:00
return {
'currentPeriodStart': stripe_subscription.current_period_start,
'currentPeriodEnd': stripe_subscription.current_period_end,
2013-10-02 04:48:03 +00:00
'plan': stripe_subscription.plan.id,
'usedPrivateRepos': used_repos,
2013-10-02 04:48:03 +00:00
}
@app.route('/api/user/plan', methods=['PUT'])
@api_login_required
def subscribe():
# Amount in cents
amount = 500
request_data = request.get_json()
plan = request_data['plan']
user = current_user.db_user
private_repos = model.get_private_repo_count(user.username)
2013-10-02 04:48:03 +00:00
if not user.stripe_id:
# Create the customer and plan simultaneously
card = request_data['token']
2013-10-02 04:48:03 +00:00
cus = stripe.Customer.create(email=user.email, plan=plan, card=card)
user.stripe_id = cus.id
user.save()
2013-10-08 15:29:42 +00:00
resp = jsonify(subscription_view(cus.subscription, private_repos))
2013-10-02 04:48:03 +00:00
resp.status_code = 201
return resp
else:
# Change the plan
cus = stripe.Customer.retrieve(user.stripe_id)
if plan == 'free':
cus.cancel_subscription()
cus.save()
response_json = {
'plan': 'free',
'usedPrivateRepos': private_repos,
}
2013-10-02 04:48:03 +00:00
else:
cus.plan = plan
2013-10-02 04:48:03 +00:00
# User may have been a previous customer who is resubscribing
if 'token' in request_data:
cus.card = request_data['token']
cus.save()
2013-10-02 04:48:03 +00:00
response_json = subscription_view(cus.subscription, private_repos)
return jsonify(response_json)
@app.route('/api/user/plan', methods=['GET'])
@api_login_required
def get_subscription():
user = current_user.db_user
private_repos = model.get_private_repo_count(user.username)
if user.stripe_id:
cus = stripe.Customer.retrieve(user.stripe_id)
if cus.subscription:
return jsonify(subscription_view(cus.subscription, private_repos))
return jsonify({
'plan': 'free',
'usedPrivateRepos': private_repos,
2013-10-08 15:29:42 +00:00
})