views.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459
  1. # -*- coding: utf-8 -*-
  2. from flask import request, redirect, url_for, abort, \
  3. render_template, flash, json, session, Response, Markup, \
  4. current_app, Blueprint
  5. from flask.ext.babel import gettext as _, get_locale
  6. from flask.ext.mail import Message
  7. import itsdangerous
  8. import docutils.core
  9. import ispformat.specs
  10. from datetime import datetime
  11. import locale
  12. locale.setlocale(locale.LC_ALL, '')
  13. from time import time
  14. import os.path
  15. from . import forms, utils
  16. from .constants import STEPS, STEPS_LABELS, LOCALES_FLAGS
  17. from . import db, cache, mail
  18. from .models import ISP, ISPWhoosh, CoveredArea, RegisteredOffice
  19. from .crawler import WebValidator, PrettyValidator
  20. ispdb = Blueprint('ispdb', __name__)
  21. @ispdb.route('/')
  22. def home():
  23. return render_template('index.html', active_button="home")
  24. @ispdb.route('/isp/')
  25. def project_list():
  26. return render_template('project_list.html', projects=ISP.query.filter_by(is_disabled=False).order_by(ISP.name.asc()))
  27. @ispdb.app_errorhandler(404)
  28. def page_not_found(e):
  29. return render_template('404.html'), 404
  30. @ispdb.app_errorhandler(500)
  31. def internal_error(e):
  32. return render_template('500.html'), 500
  33. # this needs to be cached
  34. @ispdb.route('/isp/map_data.json', methods=['GET'])
  35. def isp_map_data():
  36. isps = ISP.query.filter_by(is_disabled=False)
  37. data = []
  38. for isp in isps:
  39. d = dict(isp.json)
  40. for k in d.keys():
  41. if k not in ('name', 'shortname', 'coordinates'):
  42. del d[k]
  43. d['id'] = isp.id
  44. d['ffdn_member'] = isp.is_ffdn_member
  45. d['popup'] = render_template('map_popup.html', isp=isp)
  46. data.append(d)
  47. return Response(json.dumps(data), mimetype='application/json')
  48. @ispdb.route('/isp/find_near.json', methods=['GET'])
  49. def isp_find_near():
  50. lat = request.args.get('lat')
  51. lon = request.args.get('lon')
  52. try:
  53. lat = float(lat)
  54. lon = float(lon)
  55. except (ValueError, TypeError):
  56. abort(400)
  57. q = CoveredArea.containing((lat, lon))\
  58. .options(db.joinedload('isp'))
  59. res = [[{
  60. 'isp_id': ca.isp_id,
  61. 'area': {
  62. 'id': ca.id,
  63. 'name': ca.name,
  64. }
  65. } for ca in q]]
  66. dst = RegisteredOffice.point.distance(db.func.MakePoint(lon, lat), 1).label('distance')
  67. q = db.session.query(RegisteredOffice, dst)\
  68. .options(db.joinedload('isp'))\
  69. .order_by('distance ASC')\
  70. .limit(2)
  71. res.append([{
  72. 'distance': d,
  73. 'isp_id': r.isp.id,
  74. } for r, d in q])
  75. return Response(json.dumps(res))
  76. @ispdb.route('/isp/<projectid>/covered_areas.json', methods=['GET'])
  77. def isp_covered_areas(projectid):
  78. p = ISP.query.filter_by(id=projectid, is_disabled=False)\
  79. .options(db.joinedload('covered_areas'),
  80. db.defer('covered_areas.area'),
  81. db.undefer('covered_areas.area_geojson'))\
  82. .scalar()
  83. if not p:
  84. abort(404)
  85. cas = []
  86. for ca in p.covered_areas:
  87. cas.append({
  88. 'id': ca.id,
  89. 'name': ca.name,
  90. 'area': json.loads(ca.area_geojson) if ca.area_geojson else None
  91. })
  92. return Response(json.dumps(cas), mimetype='application/json')
  93. @ispdb.route('/isp/<projectid>/')
  94. def project(projectid):
  95. p = ISP.query.filter_by(id=projectid, is_disabled=False).first()
  96. if not p:
  97. abort(404)
  98. return render_template('project_detail.html', project_row=p, project=p.json)
  99. @ispdb.route('/isp/<projectid>/edit', methods=['GET', 'POST'])
  100. def edit_project(projectid):
  101. MAX_TOKEN_AGE = 3600
  102. isp = ISP.query.filter_by(id=projectid, is_disabled=False).first_or_404()
  103. sess_token = session.get('edit_tokens', {}).get(isp.id)
  104. if 'token' in request.args:
  105. s = itsdangerous.URLSafeTimedSerializer(current_app.secret_key, salt='edit')
  106. try:
  107. r = s.loads(request.args['token'], max_age=MAX_TOKEN_AGE,
  108. return_timestamp=True)
  109. except:
  110. abort(403)
  111. if r[0] != isp.id:
  112. abort(403)
  113. tokens = session.setdefault('edit_tokens', {})
  114. session.modified = True # ITS A TARP
  115. tokens[r[0]] = r[1]
  116. # refresh page, without the token in the url
  117. return redirect(url_for('.edit_project', projectid=r[0]))
  118. elif (sess_token is None or (datetime.utcnow() - sess_token).total_seconds() > MAX_TOKEN_AGE):
  119. return redirect(url_for('.gen_edit_token', projectid=isp.id))
  120. if isp.is_local:
  121. form = forms.ProjectForm.edit_json(isp)
  122. if form.validate_on_submit():
  123. isp.name = form.name.data
  124. isp.shortname = form.shortname.data or None
  125. isp.json = form.to_json(isp.json)
  126. isp.tech_email = form.tech_email.data
  127. db.session.add(isp)
  128. db.session.commit()
  129. flash(_(u'Project modified'), 'info')
  130. return redirect(url_for('.project', projectid=isp.id))
  131. return render_template('edit_project_form.html', form=form)
  132. else:
  133. form = forms.ProjectJSONForm(obj=isp)
  134. if form.validate_on_submit():
  135. isp.tech_email = form.tech_email.data
  136. url = utils.make_ispjson_url(form.json_url.data)
  137. isp.json_url = url
  138. db.session.add(isp)
  139. db.session.commit()
  140. flash(_(u'Project modified'), 'info')
  141. return redirect(url_for('.project', projectid=isp.id))
  142. return render_template('edit_project_json_form.html', form=form)
  143. @ispdb.route('/isp/<projectid>/gen_edit_token', methods=['GET', 'POST'])
  144. def gen_edit_token(projectid):
  145. isp = ISP.query.filter_by(id=projectid, is_disabled=False).first_or_404()
  146. form = forms.RequestEditToken()
  147. if form.validate_on_submit(): # validated
  148. if form.tech_email.data == isp.tech_email:
  149. s = itsdangerous.URLSafeTimedSerializer(current_app.secret_key, salt='edit')
  150. token = s.dumps(isp.id)
  151. msg = Message("Edit request of your ISP", sender=current_app.config['EMAIL_SENDER'])
  152. msg.body = """
  153. Hello,
  154. You are receiving this message because your are listed as technical contact for "%s" on the FFDN ISP database.
  155. Someone asked to edit your ISP's data in our database. If it's not you, please ignore this message.
  156. To proceed to the editing form, please click on the following link:
  157. %s?token=%s
  158. Note: the link is only valid for one hour from the moment we send you this email.
  159. Thanks,
  160. The FFDN ISP Database team
  161. https://db.ffdn.org
  162. """.strip() % (isp.complete_name,
  163. url_for('.edit_project', projectid=isp.id, _external=True),
  164. token)
  165. msg.add_recipient(isp.tech_email)
  166. mail.send(msg)
  167. # if the email provided is not the correct one, we still redirect
  168. flash(_(u'If you provided the correct email adress, '
  169. 'you must will receive a message shortly (check your spam folder)'), 'info')
  170. return redirect(url_for('.project', projectid=isp.id))
  171. return render_template('gen_edit_token.html', form=form)
  172. @ispdb.route('/add-a-project', methods=['GET'])
  173. def add_project():
  174. return render_template('add_project.html')
  175. @ispdb.route('/isp/create/form', methods=['GET', 'POST'])
  176. def create_project_form():
  177. form = forms.ProjectForm()
  178. if form.validate_on_submit():
  179. isp = ISP()
  180. isp.name = form.name.data
  181. isp.shortname = form.shortname.data or None
  182. isp.tech_email = form.tech_email.data
  183. isp.json = form.to_json(isp.json)
  184. db.session.add(isp)
  185. db.session.commit()
  186. flash(_(u'Project created'), 'info')
  187. return redirect(url_for('.project', projectid=isp.id))
  188. return render_template('add_project_form.html', form=form)
  189. @ispdb.route('/isp/create/validator', methods=['GET'])
  190. def json_url_validator():
  191. if 'form_json' not in session or \
  192. session['form_json'].get('validated', False):
  193. abort(403)
  194. v = session['form_json'].get('validator')
  195. if v is not None:
  196. if v > time() - 5:
  197. abort(429)
  198. else:
  199. session['form_json']['validator'] = time()
  200. validator = WebValidator(session._get_current_object(), 'form_json')
  201. return Response(utils.stream_with_ctx_and_exc(
  202. validator(session['form_json']['url'])
  203. ), mimetype="text/event-stream")
  204. @ispdb.route('/isp/create', methods=['GET', 'POST'])
  205. def create_project_json():
  206. form = forms.ProjectJSONForm()
  207. if form.validate_on_submit():
  208. url = utils.make_ispjson_url(form.json_url.data)
  209. session['form_json'] = {'url': url, 'tech_email': form.tech_email.data}
  210. return render_template('project_json_validator.html')
  211. return render_template('add_project_json_form.html', form=form)
  212. @ispdb.route('/isp/create/confirm', methods=['POST'])
  213. def create_project_json_confirm():
  214. if 'form_json' in session and session['form_json'].get('validated', False):
  215. if not forms.is_url_unique(session['form_json']['url']):
  216. abort(409)
  217. jdict = session['form_json']['jdict']
  218. isp = ISP()
  219. isp.name = jdict['name']
  220. if 'shortname' in jdict:
  221. isp.shortname = jdict['shortname']
  222. isp.json_url = session['form_json']['url']
  223. isp.json = jdict
  224. isp.tech_email = session['form_json']['tech_email']
  225. isp.last_update_attempt = session['form_json']['last_update']
  226. isp.last_update_success = session['form_json']['last_update']
  227. isp.next_update = session['form_json']['next_update']
  228. isp.cache_info = session['form_json']['cache_info']
  229. del session['form_json']
  230. db.session.add(isp)
  231. db.session.commit()
  232. flash(_(u'Project created'), 'info')
  233. return redirect(url_for('.project', projectid=isp.id))
  234. else:
  235. return redirect(url_for('.create_project_json'))
  236. @ispdb.route('/isp/reactivate-validator', methods=['GET'])
  237. def reactivate_validator():
  238. if 'form_reactivate' not in session or \
  239. session['form_reactivate'].get('validated', False):
  240. abort(403)
  241. p = ISP.query.get(session['form_reactivate']['isp_id'])
  242. if not p:
  243. abort(403)
  244. v = session['form_reactivate'].get('validator')
  245. if v is not None:
  246. if v > time() - 5:
  247. abort(429)
  248. else:
  249. session['form_reactivate']['validator'] = time()
  250. validator = PrettyValidator(session._get_current_object(), 'form_reactivate')
  251. return Response(utils.stream_with_ctx_and_exc(
  252. validator(p.json_url, p.cache_info or {})
  253. ), mimetype="text/event-stream")
  254. @ispdb.route('/isp/<projectid>/reactivate', methods=['GET', 'POST'])
  255. def reactivate_isp(projectid):
  256. """
  257. Allow to reactivate an ISP after it has been disabled
  258. because of problems with the JSON file.
  259. """
  260. p = ISP.query.filter(ISP.id == projectid, ISP.is_disabled == False,
  261. ISP.update_error_strike >= 3).first_or_404()
  262. if request.method == 'GET':
  263. key = request.args.get('key')
  264. try:
  265. s = itsdangerous.URLSafeSerializer(current_app.secret_key,
  266. salt='reactivate')
  267. d = s.loads(key)
  268. except Exception:
  269. abort(403)
  270. if (len(d) != 2 or d[0] != p.id or d[1] != str(p.last_update_attempt)):
  271. abort(403)
  272. session['form_reactivate'] = {'isp_id': p.id}
  273. return render_template('reactivate_validator.html', isp=p)
  274. else:
  275. if 'form_reactivate' not in session or \
  276. not session['form_reactivate'].get('validated', False):
  277. abort(409)
  278. p = ISP.query.get(session['form_reactivate']['isp_id'])
  279. p.json = session['form_reactivate']['jdict']
  280. p.cache_info = session['form_reactivate']['cache_info']
  281. p.last_update_attempt = session['form_reactivate']['last_update']
  282. p.last_update_success = p.last_update_attempt
  283. p.update_error_strike = 0
  284. db.session.add(p)
  285. db.session.commit()
  286. flash(_(u'Automatic updates activated'), 'info')
  287. return redirect(url_for('.project', projectid=p.id))
  288. @ispdb.route('/search', methods=['GET', 'POST'])
  289. def search():
  290. terms = request.args.get('q')
  291. if not terms:
  292. return redirect(url_for('.home'))
  293. res = ISPWhoosh.search(terms)
  294. return render_template('search_results.html', results=res, search_terms=terms)
  295. @ispdb.route('/format', methods=['GET'])
  296. def format():
  297. parts = cache.get('format-spec')
  298. if parts is None:
  299. spec = open(ispformat.specs.versions[0.1]).read()
  300. overrides = {
  301. 'initial_header_level': 3,
  302. }
  303. parts = docutils.core.publish_parts(
  304. spec,
  305. source_path=os.path.dirname(ispformat.specs.versions[0.1]),
  306. destination_path=None, writer_name='html',
  307. settings_overrides=overrides
  308. )
  309. cache.set('format-spec', parts, timeout=60 * 60 * 24)
  310. return render_template('format_spec.html', spec=Markup(parts['html_body']))
  311. @ispdb.route('/api/v1/', methods=['GET'])
  312. def api():
  313. return render_template('api.html')
  314. @ispdb.route('/humans.txt', methods=['GET'])
  315. def humans():
  316. import os.path
  317. authors_file = os.path.join(os.path.dirname(__file__), '../AUTHORS')
  318. return Response(open(authors_file), mimetype='text/plain; charset=utf-8')
  319. @ispdb.route('/site.js', methods=['GET'])
  320. def site_js():
  321. l = get_locale()
  322. js_i18n = cache.get('site_js_%s' % (l,))
  323. if not js_i18n:
  324. js_i18n = render_template('site.js')
  325. cache.set('site_js_%s' % (l,), js_i18n, timeout=60 * 60)
  326. r = Response(js_i18n, headers={
  327. 'Content-type': 'application/javascript',
  328. 'Cache-control': 'private, max-age=3600'
  329. })
  330. r.add_etag()
  331. r.make_conditional(request)
  332. return r
  333. @ispdb.route('/locale_selector', methods=['GET', 'POST'])
  334. def locale_selector():
  335. l = current_app.config['LANGUAGES']
  336. if request.method == 'POST' and request.form.get('locale') in l:
  337. resp = redirect(url_for('.home'))
  338. resp.set_cookie('locale', request.form['locale'])
  339. return resp
  340. return render_template('locale_selector.html', locales=(
  341. (code, LOCALES_FLAGS[code], name) for code, name in l.iteritems()
  342. ))
  343. #------
  344. # Filters
  345. @ispdb.app_template_filter('step_to_label')
  346. def step_to_label(step):
  347. if step:
  348. return u"<a href='#' data-toggle='tooltip' data-placement='right' title='" + STEPS[step] + "'><span class='badge badge-" + STEPS_LABELS[step] + "'>" + str(step) + "</span></a>"
  349. else:
  350. return u'-'
  351. @ispdb.app_template_filter('stepname')
  352. def stepname(step):
  353. return STEPS[step]
  354. @ispdb.app_template_filter('js_str')
  355. def json_filter(v):
  356. return Markup(json.dumps(unicode(v)))
  357. @ispdb.app_template_filter('locale_flag')
  358. def locale_flag(l):
  359. return LOCALES_FLAGS.get(str(l), '_unknown')
  360. @ispdb.app_template_global('current_locale')
  361. def current_locale():
  362. return get_locale()