views.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. # -*- coding: utf-8 -*-
  2. from flask import request, g, redirect, url_for, abort, \
  3. render_template, flash, json, session, Response, Markup, \
  4. stream_with_context, current_app, Blueprint
  5. from flask.ext.babel import gettext as _
  6. from flask.ext.mail import Message
  7. import itsdangerous
  8. import docutils.core
  9. import ispformat.specs
  10. from datetime import date, time, timedelta, datetime
  11. from urlparse import urlunsplit
  12. import locale
  13. locale.setlocale(locale.LC_ALL, '')
  14. from time import time
  15. import os.path
  16. from . import forms
  17. from .constants import *
  18. from . import db, cache, mail
  19. from .models import ISP, ISPWhoosh, CoveredArea, RegisteredOffice
  20. from .crawler import WebValidator, PrettyValidator
  21. ispdb = Blueprint('ispdb', __name__)
  22. @ispdb.route('/')
  23. def home():
  24. return render_template('index.html', active_button="home")
  25. @ispdb.route('/isp/')
  26. def project_list():
  27. return render_template('project_list.html', projects=ISP.query.filter_by(is_disabled=False))
  28. @ispdb.app_errorhandler(404)
  29. def page_not_found(e):
  30. return render_template('404.html'), 404
  31. @ispdb.app_errorhandler(500)
  32. def page_not_found(e):
  33. return render_template('500.html'), 500
  34. # this needs to be cached
  35. @ispdb.route('/isp/map_data.json', methods=['GET'])
  36. def isp_map_data():
  37. isps=ISP.query.filter_by(is_disabled=False)
  38. data=[]
  39. for isp in isps:
  40. d=dict(isp.json)
  41. for k in d.keys():
  42. if k not in ('name', 'shortname', 'coordinates'):
  43. del d[k]
  44. d['id']=isp.id
  45. d['ffdn_member']=isp.is_ffdn_member
  46. d['popup']=render_template('map_popup.html', isp=isp)
  47. data.append(d)
  48. return Response(json.dumps(data), mimetype='application/json')
  49. @ispdb.route('/isp/find_near.json', methods=['GET'])
  50. def isp_find_near():
  51. lat=request.args.get('lat')
  52. lon=request.args.get('lon')
  53. try:
  54. lat=float(lat)
  55. lon=float(lon)
  56. except (ValueError, TypeError):
  57. abort(400)
  58. q=CoveredArea.containing((lat,lon))\
  59. .options(db.joinedload('isp'))
  60. res=[[{
  61. 'isp_id': ca.isp_id,
  62. 'area': {
  63. 'id': ca.id,
  64. 'name': ca.name,
  65. }
  66. } for ca in q]]
  67. d=RegisteredOffice.point.distance(db.func.MakePoint(lon, lat), 1).label('distance')
  68. q=db.session.query(RegisteredOffice, d)\
  69. .options(db.joinedload('isp'))\
  70. .order_by('distance ASC')\
  71. .limit(2)
  72. res.append([{
  73. 'distance': d,
  74. 'isp_id': r.isp.id,
  75. } for r, d in q])
  76. return Response(json.dumps(res))
  77. @ispdb.route('/isp/<projectid>/covered_areas.json', methods=['GET'])
  78. def isp_covered_areas(projectid):
  79. p=ISP.query.filter_by(id=projectid, is_disabled=False)\
  80. .options(db.joinedload('covered_areas'),
  81. db.defer('covered_areas.area'),
  82. db.undefer('covered_areas.area_geojson'))\
  83. .scalar()
  84. if not p:
  85. abort(404)
  86. cas=[]
  87. for ca in p.covered_areas:
  88. cas.append({
  89. 'id': ca.id,
  90. 'name': ca.name,
  91. 'area': json.loads(ca.area_geojson) if ca.area_geojson else None
  92. })
  93. return Response(json.dumps(cas), mimetype='application/json')
  94. @ispdb.route('/isp/<projectid>/')
  95. def project(projectid):
  96. p=ISP.query.filter_by(id=projectid, is_disabled=False).first()
  97. if not p:
  98. abort(404)
  99. return render_template('project_detail.html', project_row=p, project=p.json)
  100. @ispdb.route('/isp/<projectid>/edit', methods=['GET', 'POST'])
  101. def edit_project(projectid):
  102. MAX_TOKEN_AGE=3600
  103. isp=ISP.query.filter_by(id=projectid, is_disabled=False).first_or_404()
  104. sess_token=session.get('edit_tokens', {}).get(isp.id)
  105. if 'token' in request.args:
  106. s = itsdangerous.URLSafeTimedSerializer(current_app.secret_key, salt='edit')
  107. try:
  108. r = s.loads(request.args['token'], max_age=MAX_TOKEN_AGE,
  109. return_timestamp=True)
  110. except:
  111. abort(403)
  112. if r[0] != isp.id:
  113. abort(403)
  114. tokens = session.setdefault('edit_tokens', {})
  115. tokens[r[0]] = r[1]
  116. # refresh page, without the token in the url
  117. return redirect(url_for('.edit_project', projectid=r[0]))
  118. elif (sess_token is None or (datetime.utcnow()-sess_token).total_seconds() > MAX_TOKEN_AGE):
  119. return redirect(url_for('.gen_edit_token', projectid=isp.id))
  120. if isp.is_local:
  121. form = forms.ProjectForm.edit_json(isp)
  122. if form.validate_on_submit():
  123. isp.name = form.name.data
  124. isp.shortname = form.shortname.data or None
  125. isp.json = form.to_json(isp.json)
  126. isp.tech_email = form.tech_email.data
  127. db.session.add(isp)
  128. db.session.commit()
  129. flash(_(u'Project modified'), 'info')
  130. return redirect(url_for('.project', projectid=isp.id))
  131. return render_template('edit_project_form.html', form=form)
  132. else:
  133. form = forms.ProjectJSONForm(obj=isp)
  134. if form.validate_on_submit():
  135. isp.tech_email = form.tech_email.data
  136. u = list(form.json_url.data)
  137. u[2]='/isp.json' # new path
  138. url=urlunsplit(u)
  139. isp.json_url = url
  140. db.session.add(isp)
  141. db.session.commit()
  142. flash(_(u'Project modified'), 'info')
  143. return redirect(url_for('.project', projectid=isp.id))
  144. return render_template('edit_project_json_form.html', form=form)
  145. @ispdb.route('/isp/<projectid>/gen_edit_token', methods=['GET', 'POST'])
  146. def gen_edit_token(projectid):
  147. isp=ISP.query.filter_by(id=projectid, is_disabled=False).first_or_404()
  148. form = forms.RequestEditToken()
  149. if form.validate_on_submit(): # validated
  150. if form.tech_email.data == isp.tech_email:
  151. s = itsdangerous.URLSafeTimedSerializer(app.secret_key, salt='edit')
  152. token = s.dumps(isp.id)
  153. msg = Message("Edit request of your ISP", sender=current_app.config['EMAIL_SENDER'])
  154. msg.body="""
  155. Hello,
  156. You are receiving this message because your are listed as technical contact for "%s" on the FFDN ISP database.
  157. Someone asked to edit your ISP's data in our database. If it's not you, please ignore this message.
  158. To proceed to the editing form, please click on the following link:
  159. %s?token=%s
  160. Note: the link is only valid for one hour from the moment we send you this email.
  161. Thanks,
  162. The FFDN ISP Database team
  163. https://db.ffdn.org
  164. """.strip() % (isp.complete_name,
  165. url_for('.edit_project', projectid=isp.id, _external=True),
  166. token)
  167. msg.add_recipient(isp.tech_email)
  168. mail.send(msg)
  169. # if the email provided is not the correct one, we still redirect
  170. flash(_(u'If you provided the correct email adress, '
  171. 'you must will receive a message shortly (check your spam folder)'), 'info')
  172. return redirect(url_for('.project', projectid=isp.id))
  173. return render_template('gen_edit_token.html', form=form)
  174. @ispdb.route('/add-a-project', methods=['GET'])
  175. def add_project():
  176. return render_template('add_project.html')
  177. @ispdb.route('/isp/create/form', methods=['GET', 'POST'])
  178. def create_project_form():
  179. form = forms.ProjectForm()
  180. if form.validate_on_submit():
  181. isp=ISP()
  182. isp.name = form.name.data
  183. isp.shortname = form.shortname.data or None
  184. isp.tech_email = form.tech_email.data
  185. isp.json=form.to_json(isp.json)
  186. db.session.add(isp)
  187. db.session.commit()
  188. flash(_(u'Project created'), 'info')
  189. return redirect(url_for('.project', projectid=isp.id))
  190. return render_template('add_project_form.html', form=form)
  191. @ispdb.route('/isp/create/validator', methods=['GET'])
  192. def json_url_validator():
  193. if 'form_json' not in session or \
  194. session['form_json'].get('validated', False):
  195. abort(403)
  196. v=session['form_json'].get('validator')
  197. if v is not None:
  198. if v > time()-5:
  199. abort(429)
  200. else:
  201. session['form_json']['validator']=time()
  202. validator=WebValidator(session._get_current_object(), 'form_json')
  203. return Response(stream_with_context(
  204. validator(session['form_json']['url'])
  205. ), mimetype="text/event-stream")
  206. @ispdb.route('/isp/create', methods=['GET', 'POST'])
  207. def create_project_json():
  208. form = forms.ProjectJSONForm()
  209. if form.validate_on_submit():
  210. u=list(form.json_url.data)
  211. u[2]='/isp.json' # new path
  212. url=urlunsplit(u)
  213. session['form_json'] = {'url': url, 'tech_email': form.tech_email.data}
  214. return render_template('project_json_validator.html')
  215. return render_template('add_project_json_form.html', form=form)
  216. @ispdb.route('/isp/create/confirm', methods=['POST'])
  217. def create_project_json_confirm():
  218. if 'form_json' in session and session['form_json'].get('validated', False):
  219. if not forms.is_url_unique(session['form_json']['url']):
  220. abort(409)
  221. jdict=session['form_json']['jdict']
  222. isp=ISP()
  223. isp.name=jdict['name']
  224. if 'shortname' in jdict:
  225. isp.shortname=jdict['shortname']
  226. isp.json_url=session['form_json']['url']
  227. isp.json=jdict
  228. isp.tech_email=session['form_json']['tech_email']
  229. isp.last_update_success=session['form_json']['last_update']
  230. isp.next_update=session['form_json']['next_update']
  231. isp.cache_info=session['form_json']['cache_info']
  232. del session['form_json']
  233. db.session.add(isp)
  234. db.session.commit()
  235. flash(_(u'Project created'), 'info')
  236. return redirect(url_for('.project', projectid=isp.id))
  237. else:
  238. return redirect(url_for('.create_project_json'))
  239. @ispdb.route('/isp/reactivate-validator', methods=['GET'])
  240. def reactivate_validator():
  241. if 'form_reactivate' not in session or \
  242. session['form_reactivate'].get('validated', False):
  243. abort(403)
  244. p=ISP.query.get(session['form_reactivate']['isp_id'])
  245. if not p:
  246. abort(403)
  247. v=session['form_reactivate'].get('validator')
  248. if v is not None:
  249. if v > time()-5:
  250. abort(429)
  251. else:
  252. session['form_reactivate']['validator']=time()
  253. validator=PrettyValidator(session._get_current_object(), 'form_reactivate')
  254. return Response(stream_with_context(
  255. validator(p.json_url, p.cache_info or {})
  256. ), mimetype="text/event-stream")
  257. @ispdb.route('/isp/<projectid>/reactivate', methods=['GET', 'POST'])
  258. def reactivate_isp(projectid):
  259. """
  260. Allow to reactivate an ISP after it has been disabled
  261. because of problems with the JSON file.
  262. """
  263. p=ISP.query.filter(ISP.id==projectid, ISP.is_disabled==False,
  264. ISP.update_error_strike>=3).first_or_404()
  265. if request.method == 'GET':
  266. key = request.args.get('key')
  267. try:
  268. s=itsdangerous.URLSafeSerializer(current_app.secret_key,
  269. salt='reactivate')
  270. d=s.loads(key)
  271. except Exception as e:
  272. abort(403)
  273. if (len(d) != 2 or d[0] != p.id or
  274. d[1] != str(p.last_update_attempt)):
  275. abort(403)
  276. session['form_reactivate'] = {'isp_id': p.id}
  277. return render_template('reactivate_validator.html', isp=p)
  278. else:
  279. if 'form_reactivate' not in session or \
  280. not session['form_reactivate'].get('validated', False):
  281. abort(409)
  282. p=ISP.query.get(session['form_reactivate']['isp_id'])
  283. p.json=session['form_reactivate']['jdict']
  284. p.cache_info=session['form_reactivate']['cache_info']
  285. p.last_update_attempt=session['form_form_reactivate']['last_update']
  286. p.last_update_success=p.last_update_attempt
  287. db.session.add(p)
  288. db.session.commit()
  289. flash(_(u'Automatic updates activated'), 'info')
  290. return redirect(url_for('.project', projectid=p.id))
  291. @ispdb.route('/search', methods=['GET', 'POST'])
  292. def search():
  293. terms=request.args.get('q')
  294. if not terms:
  295. return redirect(url_for('.home'))
  296. res=ISPWhoosh.search(terms)
  297. return render_template('search_results.html', results=res, search_terms=terms)
  298. @ispdb.route('/format', methods=['GET'])
  299. def format():
  300. parts = cache.get('format-spec')
  301. if parts is None:
  302. spec=open(ispformat.specs.versions[0.1]).read()
  303. overrides = {
  304. 'initial_header_level' : 3,
  305. }
  306. parts = docutils.core.publish_parts(spec,
  307. source_path=os.path.dirname(ispformat.specs.versions[0.1]),
  308. destination_path=None, writer_name='html',
  309. settings_overrides=overrides)
  310. cache.set('format-spec', parts, timeout=60*60*24)
  311. return render_template('format_spec.html', spec=Markup(parts['html_body']))
  312. @ispdb.route('/api/v1/', methods=['GET'])
  313. def api():
  314. return render_template('api.html')
  315. @ispdb.route('/humans.txt', methods=['GET'])
  316. def humans():
  317. import os.path
  318. authors_file=os.path.join(os.path.dirname(__file__), '../AUTHORS')
  319. return Response(open(authors_file), mimetype='text/plain; charset=utf-8')
  320. #------
  321. # Filters
  322. @ispdb.app_template_filter('step_to_label')
  323. def step_to_label(step):
  324. if step:
  325. return u"<a href='#' rel='tooltip' data-placement='right' title='" + STEPS[step] + "'><span class='badge badge-" + STEPS_LABELS[step] + "'>" + str(step) + "</span></a>"
  326. else:
  327. return u'-'
  328. @ispdb.app_template_filter('stepname')
  329. def stepname(step):
  330. return STEPS[step]