magpie.register

Module Contents

Functions

_login_loop(login_url, cookies_file[, data, message])

_request_curl(→ Tuple[int, int])

Executes a request using cURL.

_phoenix_update_services(→ bool)

_phoenix_login(→ bool)

Performs Phoenix login using provided cookies.

_phoenix_login_check(→ bool)

Since Phoenix always return 200, even on invalid login, 'hack' check unauthorized access.

_phoenix_remove_services(→ bool)

Removes the Phoenix services using temporary cookies retrieved from login with defined PHOENIX constants.

_phoenix_register_services(→ Tuple[bool, ...)

_register_services(→ Tuple[bool, ...)

Registers services on desired location using provided configurations and access cookies.

sync_services_phoenix(→ bool)

Syncs Magpie services by pushing updates to Phoenix.

_magpie_add_register_services_perms(→ None)

_magpie_update_services_conflict(...)

Resolve conflicting services by name during registration by updating them only if pointing to different URL.

_magpie_register_services_with_requests(→ bool)

Registers Services of loaded providers configuration using API requests.

_magpie_register_services_with_db_session(→ bool)

Registration procedure of Services from providers section using pre-established database session.

_load_config(→ Union)

Loads a YAML/JSON file path or pre-loaded dictionary configuration.

get_all_configs(→ magpie.typedefs.MultiConfigs)

Loads all matched configurations.

_expand_all(→ magpie.typedefs.JSON)

Applies environment variable expansion recursively to all applicable fields of a configuration definition.

magpie_register_services_from_config(...)

Registers Magpie services from one or many providers.cfg file.

_handle_permission(→ None)

Logs a message related to a 'permission' entry and raises an error if required.

_use_request(cookies_or_session)

_parse_resource_path(→ Tuple[Optional[int], bool])

Parses the resource field of a permission config entry and retrieves the final resource id. Creates missing

_apply_permission_entry(→ None)

Applies the single permission entry retrieved from the permission configuration.

magpie_register_permissions_from_config(→ None)

Applies permissions specified in configuration(s) defined as file, directory with files or literal configuration.

_resolve_config_registry(...)

Converts a list of configurations entries from multiple files into a single resolved mapping.

_process_permissions(→ None)

Processes a single permissions configuration.

pseudo_random_string(→ magpie.typedefs.Str)

Generate a string made of random characters.

Attributes

LOGGER

LOGIN_ATTEMPT

LOGIN_TIMEOUT

CREATE_SERVICE_INTERVAL

GETCAPABILITIES_INTERVAL

GETCAPABILITIES_ATTEMPTS

SERVICES_MAGPIE

SERVICES_PHOENIX

SERVICES_PHOENIX_ALLOWED

CONFIG_KNOWN_EXTENSIONS

magpie.register.LOGGER[source]
magpie.register.LOGIN_ATTEMPT = 5[source]
magpie.register.LOGIN_TIMEOUT = 2[source]
magpie.register.CREATE_SERVICE_INTERVAL = 2[source]
magpie.register.GETCAPABILITIES_INTERVAL = 10[source]
magpie.register.GETCAPABILITIES_ATTEMPTS = 12[source]
magpie.register.SERVICES_MAGPIE = 'MAGPIE'[source]
magpie.register.SERVICES_PHOENIX = 'PHOENIX'[source]
magpie.register.SERVICES_PHOENIX_ALLOWED[source]
exception magpie.register.RegistrationError[source]

Bases: RuntimeError

Generic error during registration operation.

Initialize self. See help(type(self)) for accurate signature.

exception magpie.register.RegistrationValueError[source]

Bases: RegistrationError, ValueError

Registration error caused by an invalid value precondition.

Initialize self. See help(type(self)) for accurate signature.

exception magpie.register.RegistrationLoginError[source]

Bases: RegistrationError

Registration error caused by a failure to complete required login operation.

Initialize self. See help(type(self)) for accurate signature.

exception magpie.register.RegistrationConfigurationError[source]

Bases: RegistrationValueError

Registration error caused by an invalid configuration entry or definition.

Initialize self. See help(type(self)) for accurate signature.

magpie.register._login_loop(login_url, cookies_file, data=None, message='Login response')[source]
magpie.register._request_curl(url: magpie.typedefs.Str, cookie_jar: magpie.typedefs.Str | None = None, cookies: magpie.typedefs.Str | None = None, form_params: magpie.typedefs.Str | None = None, msg: magpie.typedefs.Str | None = 'Response') Tuple[int, int][source]

Executes a request using cURL.

Returns:

tuple of the returned system command code and the response http code

magpie.register._phoenix_update_services(services_dict: magpie.typedefs.JSON) bool[source]
magpie.register._phoenix_login(cookies_file: magpie.typedefs.Str) bool[source]

Performs Phoenix login using provided cookies.

magpie.register._phoenix_login_check(cookies: magpie.typedefs.Str) bool[source]

Since Phoenix always return 200, even on invalid login, ‘hack’ check unauthorized access.

Parameters:

cookies – temporary cookies file storage used for login with _phoenix_login().

Returns:

status indicating if login access was granted with defined credentials.

magpie.register._phoenix_remove_services() bool[source]

Removes the Phoenix services using temporary cookies retrieved from login with defined PHOENIX constants.

Returns:

success status of the procedure.

magpie.register._phoenix_register_services(services_dict: Dict[magpie.typedefs.Str, Dict[magpie.typedefs.Str, Any]], allowed_service_types: List[magpie.typedefs.Str] | None = None) Tuple[bool, Dict[magpie.typedefs.Str, int]][source]
magpie.register._register_services(where: magpie.typedefs.Str | None, services_dict: Dict[magpie.typedefs.Str, Dict[magpie.typedefs.Str, magpie.typedefs.Str]], cookies: magpie.typedefs.Str, message: magpie.typedefs.Str | None = 'Register response') Tuple[bool, Dict[magpie.typedefs.Str, int]][source]

Registers services on desired location using provided configurations and access cookies.

Returns:

tuple of overall success and individual http response of each service registration.

magpie.register.sync_services_phoenix(services: Iterable[magpie.models.Service] | magpie.typedefs.JSON, services_as_dicts: bool = False) bool[source]

Syncs Magpie services by pushing updates to Phoenix.

Services must be one of types specified in magpie.register.SERVICES_PHOENIX_ALLOWED.

Parameters:
  • services

    An iterable of models.Service by default, or a dictionary of {svc-name: {<service-info>}} JSON objects containing each service’s information if services_ad_dicts is True.

    where <service-info> is defined as:

    {"public_url": <url>, "service_name": <name>, "service_type": <type>}
    

  • services_as_dicts – indicate if services must be parsed as JSON definitions.

magpie.register._magpie_add_register_services_perms(services: magpie.typedefs.ServicesSettings, statuses: Dict[magpie.typedefs.Str, int], curl_cookies: str, request_cookies: magpie.typedefs.AnyCookiesType, disable_getcapabilities: bool) None[source]
magpie.register._magpie_update_services_conflict(conflict_services: List[magpie.typedefs.Str], services_dict: magpie.typedefs.ServicesSettings, request_cookies: magpie.typedefs.AnyCookiesType) Dict[magpie.typedefs.Str, int][source]

Resolve conflicting services by name during registration by updating them only if pointing to different URL.

magpie.register._magpie_register_services_with_requests(services_dict: magpie.typedefs.ServicesSettings, push_to_phoenix: bool, username: magpie.typedefs.Str, password: magpie.typedefs.Str, provider: magpie.typedefs.Str, force_update: bool = False, disable_getcapabilities: bool = False) bool[source]

Registers Services of loaded providers configuration using API requests.

Parameters:
  • services_dict – services configuration definition.

  • push_to_phoenix – push registered Magpie services to Phoenix for synced configurations.

  • username – login username to use to obtain permissions for services registration.

  • password – login password to use to obtain permissions for services registration.

  • provider – login provider to use to obtain permissions for services registration.

  • force_update – override existing services matched by name

  • disable_getcapabilities – do not execute ‘GetCapabilities’ validation for applicable services.

Returns:

successful operation status

magpie.register._magpie_register_services_with_db_session(services_dict: magpie.typedefs.ServicesSettings, db_session: sqlalchemy.orm.session.Session, push_to_phoenix: bool = False, force_update: bool = False, update_getcapabilities_permissions: bool = False) bool[source]

Registration procedure of Services from providers section using pre-established database session.

magpie.register._load_config(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Str, allow_missing: bool = False) Union[source]

Loads a YAML/JSON file path or pre-loaded dictionary configuration.

magpie.register.CONFIG_KNOWN_EXTENSIONS[source]
magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Str, allow_missing: bool = False) magpie.typedefs.MultiConfigs[source]

Loads all matched configurations.

Configurations are considered a valid match if they have one of the CONFIG_KNOWN_EXTENSIONS (if path) and that loaded (or passed) configurations contain the specified section name.

If the input is a directory path, loads any number of files contained in it that fulfill matching conditions. If it is a path pointing to a single valid configuration file, loads it by itself. If a dictionary is passed, returns it directly if it fulfills validation.

Parameters:
  • path_or_dict – directory path, file path or literal dictionary.

  • section – section name that must be inside every matched configuration file to be loaded.

  • allow_missing – allow to have no valid configuration after all are resolved, otherwise raises.

Raises:

RegistrationError – when no valid configuration can be found and empty one is not allowed.

Returns:

  • list of configurations loaded if input was a directory path

  • list of single configuration if input was a file path

  • list of single configuration if input was a JSON dict

  • empty list if none of the other cases where matched

Note

Order of file loading will be resolved by alphabetically sorted filename if specifying a directory path.

magpie.register._expand_all(config: magpie.typedefs.JSON) magpie.typedefs.JSON[source]

Applies environment variable expansion recursively to all applicable fields of a configuration definition.

magpie.register.magpie_register_services_from_config(service_config_path: magpie.typedefs.Str, push_to_phoenix: bool = False, skip_registration: bool = False, force_update: bool = False, disable_getcapabilities: bool = False, db_session: sqlalchemy.orm.session.Session | None = None) magpie.typedefs.ServicesSettings[source]

Registers Magpie services from one or many providers.cfg file.

Uses the provided DB session to directly update service definitions, or uses API request routes as admin. Optionally pushes updates to Phoenix.

Parameters:
  • service_config_path – where to look for providers configuration(s). Directory or file path.

  • push_to_phoenix – whether to push loaded service definitions to remote Phoenix service.

  • skip_registration – Load, validate and combine Service configurations, but don’t register them.

  • force_update – override service definitions that conflict by name with registered ones.

  • disable_getcapabilities – Skip GetCapabilities request validation and permission update. By default, any service with type that allows GetCapabilities permissions will be tested to ensure it can be reached on the provided url. Once validated, this permission is applied to anonymous group to make its entrypoint accessible by anyone. Services that cannot have GetCapabilities permission are ignored regardless.

  • db_session – Use a pre-established database connection for registration. Otherwise, API requests are employed.

Returns:

loaded service configurations.

magpie.register._handle_permission(message: magpie.typedefs.Str, permission_index: int, trail: magpie.typedefs.Str = ', skipping...', detail: magpie.typedefs.Str | None = None, permission: magpie.typedefs.Str | None = None, level: magpie.typedefs.Str | int = logging.WARN, raise_errors: bool = False) None[source]

Logs a message related to a ‘permission’ entry and raises an error if required.

Log message format is as follows (detail portion omitted if none provided):

{message} [permission: #{permission_index}] [{permission}]{trail}
Detail: [{detail}]

Such that the following logging entry is generated (omitting any additional logging formatters):

>> log_permission("test", 1, " skip test...", "just a test", "fake")
test [permission: #1] [fake] skip test...
Detail: [just a test]
Parameters:
  • message – base message to log

  • permission_index – index of the permission in the configuration list for traceability

  • trail – trailing message appended after the base message

  • detail – additional details appended after the trailing message after moving to another line.

  • permission – permission name to log just before the trailing message.

  • level – logging level (default: logging.WARN)

  • raise_errors – raises errors related to permissions, instead of just logging the info.

See also

magpie/config/permissions.cfg

magpie.register._use_request(cookies_or_session)[source]
magpie.register._parse_resource_path(permission_config_entry: magpie.typedefs.PermissionConfigItem, entry_index: int, service_info: magpie.typedefs.JSON, cookies_or_session: magpie.typedefs.CookiesOrSessionType = None, magpie_url: magpie.typedefs.Str | None = None, raise_errors: bool = False) Tuple[int | None, bool][source]

Parses the resource field of a permission config entry and retrieves the final resource id. Creates missing resources as necessary if they can be automatically resolved.

If cookies are provided, uses requests to a running Magpie instance (with magpie_url) to apply permission. If session to db is provided, uses direct db connection instead to apply permission.

Returns:

tuple of found id (if any, None otherwise), and success status of the parsing operation (error)

magpie.register._apply_permission_entry(permission_config_entry: magpie.typedefs.PermissionConfigItem, entry_index: int, resource_id: int, cookies_or_session: magpie.typedefs.CookiesOrSessionType, magpie_url: magpie.typedefs.Str, users: magpie.typedefs.UsersSettings, groups: magpie.typedefs.GroupsSettings, raise_errors: bool = False) None[source]

Applies the single permission entry retrieved from the permission configuration.

Assumes that permissions fields where pre-validated. Permission is applied for the user/group/resource using request or db session accordingly to arguments.

magpie.register.magpie_register_permissions_from_config(permissions_config: magpie.typedefs.Str | magpie.typedefs.PermissionsConfig, magpie_url: magpie.typedefs.Str | None = None, db_session: sqlalchemy.orm.session.Session | None = None, raise_errors: bool = False) None[source]

Applies permissions specified in configuration(s) defined as file, directory with files or literal configuration.

Parameters:
  • permissions_config – file/dir path to permissions config or JSON/YAML equivalent pre-loaded.

  • magpie_url – URL to magpie instance (when using requests; default: magpie.url from this app’s config).

  • db_session – db session to use instead of requests to directly create/remove permissions with config.

  • raise_errors – raises errors related to permissions, instead of just logging the info.

See also

magpie/config/permissions.cfg for specific parameters and operational details.

magpie.register._resolve_config_registry(config_files: magpie.typedefs.MultiConfigs | None, key: magpie.typedefs.Str) magpie.typedefs.AnyResolvedSettings[source]

Converts a list of configurations entries from multiple files into a single resolved mapping.

Resolution is accomplished against key to generate the mapping of unique items. First configuration entries have priority over later ones if keys are duplicated.

magpie.register._process_permissions(permissions: magpie.typedefs.PermissionsConfig, magpie_url: magpie.typedefs.Str, cookies_or_session: sqlalchemy.orm.session.Session, users: magpie.typedefs.UsersSettings | None = None, groups: magpie.typedefs.GroupsSettings | None = None, raise_errors: bool = False) None[source]

Processes a single permissions configuration.

magpie.register.pseudo_random_string(length: int = 8, allow_chars: magpie.typedefs.Str = string.ascii_letters + string.digits) magpie.typedefs.Str[source]

Generate a string made of random characters.