Projet

Général

Profil

Télécharger (4,85 ko) Statistiques
| Branche: | Tag: | Révision:

organization_api / ckanext / ozwillo_organization_api / plugin.py @ 74d08116

1
from hashlib import sha1
2
import hmac
3
import requests
4
import logging
5

    
6
import ckan.plugins as plugins
7
import ckan.plugins.toolkit as toolkit
8

    
9
import ckan.logic as logic
10

    
11
from pylons import config
12
from ckan.common import request, _
13
from ckan.logic.action.create import _group_or_org_create as group_or_org_create
14
from ckan.logic.action.create import user_create
15
from ckan.logic.action.delete import _group_or_org_purge
16

    
17
plugin_config_prefix = 'ckanext.ozwillo_organization_api.'
18

    
19
log = logging.getLogger(__name__)
20

    
21
def valid_signature_required(func):
22

    
23
    signature_header_name = config.get(plugin_config_prefix + 'signature_header_name',
24
                                       'X-Hub-Signature')
25
    instantiated_secret = config.get(plugin_config_prefix + 'instantiation_secret',
26
                                     'secret')
27

    
28
    def wrapper(context, data):
29
        if signature_header_name in request.headers:
30
            if request.headers[signature_header_name].startswith('sha1='):
31
                algo, received_hmac = request.headers[signature_header_name].rsplit('=')
32
                computed_hmac = hmac.new(instantiated_secret, request.body, sha1).hexdigest()
33
                # the received hmac is uppercase according to
34
                # http://doc.ozwillo.com/#ref-3-2-1
35
                if received_hmac != computed_hmac.upper():
36
                    raise logic.NotAuthorized(_('Invalid HMAC'))
37
            else:
38
                raise logic.ValidationError(_('Invalid HMAC algo'))
39
        else:
40
            raise logic.NotAuthorized(_("No HMAC in the header"))
41
        return func(context, data)
42
    return wrapper
43

    
44
@valid_signature_required
45
def create_organization(context, data_dict):
46
    context['ignore_auth'] = True
47
    model = context['model']
48

    
49
    destruction_secret = config.get(plugin_config_prefix + 'destruction_secret',
50
                                       'changeme')
51

    
52
    client_id = data_dict.pop('client_id')
53
    client_secret = data_dict.pop('client_secret')
54
    instance_id = data_dict.pop('instance_id')
55

    
56
    # re-mapping received dict
57
    registration_uri = data_dict.pop('instance_registration_uri')
58
    organization = data_dict['organization']
59
    user = data_dict['user']
60
    org_dict = {
61
        'type': 'organization',
62
        'name': organization['name'].lower(),
63
        'id': instance_id,
64
        'title': organization['name'],
65
        'description': organization['type'],
66
        'user': user['name']
67
    }
68

    
69
    user_dict = {
70
        'name': user['name'],
71
        'email': user['email_address'],
72
        'password': user['id']
73
    }
74
    user_obj = model.User.get(user_dict['name'])
75
    if not user_obj:
76
        user_create(context, user_dict)
77

    
78
    context['user'] = user_dict['name']
79

    
80
    try:
81
        delete_uri = toolkit.url_for(controller='api', action='action',
82
                                     logic_function="delete-organization",
83
                                     ver=context['api_version'],
84
                                     qualified=True)
85
        organization_uri = toolkit.url_for(host=request.host,
86
                                           controller='organization',
87
                                           action='read',
88
                                           id=org_dict['name'],
89
                                           qualified=True)
90

    
91

    
92
        group_or_org_create(context, org_dict, is_org=True)
93

    
94
        # setting organization as active explicitely
95
        group = model.Group.get(org_dict['name'])
96
        group.state = 'active'
97
        group.save()
98

    
99
        # notify about organization creation
100
        services = {'services': [{
101
            'local_id': 'organization',
102
            'name': 'Organization ' + org_dict['name'] + ' on CKAN',
103
            'service_uri': organization_uri,
104
            'visible': True}],
105
            'instance_id': instance_id,
106
            'destruction_uri': delete_uri,
107
            'destruction_secret': destruction_secret,
108
            'needed_scopes': [{
109
                'scope_id': 'profile',
110
                'motivation': 'Used to link user to the organization'
111
            }]
112
        }
113
        requests.post(registration_uri,
114
                      data = services,
115
                      auth=(client_id, client_secret)
116
                  )
117
    except Exception, e:
118
        log.debug('Exception "%s" occured while creating organization' % e)
119
        requests.delete(registration_uri)
120

    
121

    
122
@valid_signature_required
123
def delete_organization(context, data_dict):
124
    data_dict['id'] = data_dict.pop('instance_id')
125
    context['ignore_auth'] = True
126
    _group_or_org_purge(context, data_dict, is_org=True)
127

    
128

    
129
class OzwilloOrganizationApiPlugin(plugins.SingletonPlugin):
130
    """
131
    API for OASIS to create and delete an organization
132
    """
133
    plugins.implements(plugins.IActions)
134

    
135
    def get_actions(self):
136
        return {
137
            'create-ozwillo-organization': create_organization,
138
            'delete-ozwillo-organization': delete_organization
139
        }
(2-2/2)