summaryrefslogtreecommitdiff
path: root/opendc/api/v1/simulations/simulationId/authorizations
diff options
context:
space:
mode:
authorGeorgios Andreadis <info@gandreadis.com>2020-06-23 18:08:28 +0200
committerGeorgios Andreadis <info@gandreadis.com>2020-06-23 18:08:28 +0200
commit565ede0dc50c3b2df09c066ea3a28a4901cce547 (patch)
treee81a1bbed43d2eaf7e2be0bc61007963f807b62d /opendc/api/v1/simulations/simulationId/authorizations
parent6f41be7d9c244b67bfa5ff72f1e90d18fa45b590 (diff)
Add DB handlers and rename to v2
Diffstat (limited to 'opendc/api/v1/simulations/simulationId/authorizations')
-rw-r--r--opendc/api/v1/simulations/simulationId/authorizations/__init__.py0
-rw-r--r--opendc/api/v1/simulations/simulationId/authorizations/endpoint.py44
-rw-r--r--opendc/api/v1/simulations/simulationId/authorizations/userId/__init__.py0
-rw-r--r--opendc/api/v1/simulations/simulationId/authorizations/userId/endpoint.py212
4 files changed, 0 insertions, 256 deletions
diff --git a/opendc/api/v1/simulations/simulationId/authorizations/__init__.py b/opendc/api/v1/simulations/simulationId/authorizations/__init__.py
deleted file mode 100644
index e69de29b..00000000
--- a/opendc/api/v1/simulations/simulationId/authorizations/__init__.py
+++ /dev/null
diff --git a/opendc/api/v1/simulations/simulationId/authorizations/endpoint.py b/opendc/api/v1/simulations/simulationId/authorizations/endpoint.py
deleted file mode 100644
index 1d6b494e..00000000
--- a/opendc/api/v1/simulations/simulationId/authorizations/endpoint.py
+++ /dev/null
@@ -1,44 +0,0 @@
-from opendc.models.authorization import Authorization
-from opendc.models.simulation import Simulation
-from opendc.util import exceptions
-from opendc.util.rest import Response
-
-
-def GET(request):
- """Find all authorizations for a Simulation."""
-
- # Make sure required parameters are there
-
- try:
- request.check_required_parameters(
- path={
- 'simulationId': 'int'
- }
- )
-
- except exceptions.ParameterError as e:
- return Response(400, e.message)
-
- # Instantiate a Simulation and make sure it exists
-
- simulation = Simulation.from_primary_key((request.params_path['simulationId'],))
-
- if not simulation.exists():
- return Response(404, '{} not found.'.format(simulation))
-
- # Make sure this User is allowed to view this Simulation's Authorizations
-
- if not simulation.google_id_has_at_least(request.google_id, 'VIEW'):
- return Response(403, 'Forbidden from retrieving Authorizations for {}.'.format(simulation))
-
- # Get the Authorizations
-
- authorizations = Authorization.query('simulation_id', request.params_path['simulationId'])
-
- # Return the Authorizations
-
- return Response(
- 200,
- 'Successfully retrieved Authorizations for {}.'.format(simulation),
- [x.to_JSON() for x in authorizations]
- )
diff --git a/opendc/api/v1/simulations/simulationId/authorizations/userId/__init__.py b/opendc/api/v1/simulations/simulationId/authorizations/userId/__init__.py
deleted file mode 100644
index e69de29b..00000000
--- a/opendc/api/v1/simulations/simulationId/authorizations/userId/__init__.py
+++ /dev/null
diff --git a/opendc/api/v1/simulations/simulationId/authorizations/userId/endpoint.py b/opendc/api/v1/simulations/simulationId/authorizations/userId/endpoint.py
deleted file mode 100644
index 46458ffc..00000000
--- a/opendc/api/v1/simulations/simulationId/authorizations/userId/endpoint.py
+++ /dev/null
@@ -1,212 +0,0 @@
-from opendc.models.authorization import Authorization
-from opendc.models.simulation import Simulation
-from opendc.models.user import User
-from opendc.util import exceptions
-from opendc.util.rest import Response
-
-
-def DELETE(request):
- """Delete a user's authorization level over a simulation."""
-
- # Make sure required parameters are there
-
- try:
- request.check_required_parameters(
- path={
- 'simulationId': 'int',
- 'userId': 'int'
- }
- )
-
- except exceptions.ParameterError as e:
- return Response(400, e.message)
-
- # Instantiate an Authorization
-
- authorization = Authorization.from_primary_key((
- request.params_path['userId'],
- request.params_path['simulationId']
- ))
-
- # Make sure this Authorization exists in the database
-
- if not authorization.exists():
- return Response(404, '{} not found.'.format(authorization))
-
- # Make sure this User is allowed to delete this Authorization
-
- if not authorization.google_id_has_at_least(request.google_id, 'OWN'):
- return Response(403, 'Forbidden from deleting {}.'.format(authorization))
-
- # Delete this Authorization
-
- authorization.delete()
-
- return Response(
- 200,
- 'Successfully deleted {}.'.format(authorization),
- authorization.to_JSON()
- )
-
-
-def GET(request):
- """Get this User's Authorization over this Simulation."""
-
- # Make sure required parameters are there
-
- try:
- request.check_required_parameters(
- path={
- 'simulationId': 'int',
- 'userId': 'int'
- }
- )
-
- except exceptions.ParameterError as e:
- return Response(400, e.message)
-
- # Instantiate an Authorization
-
- authorization = Authorization.from_primary_key((
- request.params_path['userId'],
- request.params_path['simulationId']
- ))
-
- # Make sure this Authorization exists in the database
-
- if not authorization.exists():
- return Response(404, '{} not found.'.format(authorization))
-
- # Read this Authorization from the database
-
- authorization.read()
-
- # Return this Authorization
-
- return Response(
- 200,
- 'Successfully retrieved {}'.format(authorization),
- authorization.to_JSON()
- )
-
-
-def POST(request):
- """Add an authorization for a user's access to a simulation."""
-
- # Make sure required parameters are there
-
- try:
- request.check_required_parameters(
- path={
- 'userId': 'int',
- 'simulationId': 'int'
- },
- body={
- 'authorization': {
- 'authorizationLevel': 'string'
- }
- }
- )
-
- except exceptions.ParameterError as e:
- return Response(400, e.message)
-
- # Instantiate an Authorization
-
- authorization = Authorization.from_JSON({
- 'userId': request.params_path['userId'],
- 'simulationId': request.params_path['simulationId'],
- 'authorizationLevel': request.params_body['authorization']['authorizationLevel']
- })
-
- # Make sure the Simulation and User exist
-
- user = User.from_primary_key((authorization.user_id,))
- if not user.exists():
- return Response(404, '{} not found.'.format(user))
-
- simulation = Simulation.from_primary_key((authorization.simulation_id,))
- if not simulation.exists():
- return Response(404, '{} not found.'.format(simulation))
-
- # Make sure this User is allowed to add this Authorization
-
- if not simulation.google_id_has_at_least(request.google_id, 'OWN'):
- return Response(403, 'Forbidden from creating {}.'.format(authorization))
-
- # Make sure this Authorization does not already exist
-
- if authorization.exists():
- return Response(409, '{} already exists.'.format(authorization))
-
- # Try to insert this Authorization into the database
-
- try:
- authorization.insert()
-
- except exceptions.ForeignKeyError:
- return Response(400, 'Invalid authorizationLevel')
-
- # Return this Authorization
-
- return Response(
- 200,
- 'Successfully added {}'.format(authorization),
- authorization.to_JSON()
- )
-
-
-def PUT(request):
- """Change a user's authorization level over a simulation."""
-
- # Make sure required parameters are there
-
- try:
- request.check_required_parameters(
- path={
- 'simulationId': 'int',
- 'userId': 'int'
- },
- body={
- 'authorization': {
- 'authorizationLevel': 'string'
- }
- }
- )
-
- except exceptions.ParameterError as e:
- return Response(400, e.message)
-
- # Instantiate and Authorization
-
- authorization = Authorization.from_JSON({
- 'userId': request.params_path['userId'],
- 'simulationId': request.params_path['simulationId'],
- 'authorizationLevel': request.params_body['authorization']['authorizationLevel']
- })
-
- # Make sure this Authorization exists
-
- if not authorization.exists():
- return Response(404, '{} not found.'.format(authorization))
-
- # Make sure this User is allowed to edit this Authorization
-
- if not authorization.google_id_has_at_least(request.google_id, 'OWN'):
- return Response(403, 'Forbidden from updating {}.'.format(authorization))
-
- # Try to update this Authorization
-
- try:
- authorization.update()
-
- except exceptions.ForeignKeyError as e:
- return Response(400, 'Invalid authorization level.')
-
- # Return this Authorization
-
- return Response(
- 200,
- 'Successfully updated {}.'.format(authorization),
- authorization.to_JSON()
- )