magpie.register¶
Attributes¶
Exceptions¶
Generic error during registration operation. |
|
Registration error caused by an invalid value precondition. |
|
Registration error caused by a failure to complete required login operation. |
|
Registration error caused by an invalid configuration entry or definition. |
Functions¶
|
|
|
Executes a request using cURL. |
|
|
|
Performs Phoenix login using provided cookies. |
|
Since Phoenix always return 200, even on invalid login, 'hack' check unauthorized access. |
|
Removes the Phoenix services using temporary cookies retrieved from login with defined PHOENIX constants. |
|
|
|
Registers services on desired location using provided configurations and access cookies. |
|
Syncs Magpie services by pushing updates to Phoenix. |
Resolve conflicting services by name during registration by updating them only if pointing to different URL. |
|
Registers Services of loaded |
|
Registration procedure of Services from |
|
|
Loads a YAML/JSON file path or pre-loaded dictionary configuration. |
Loads all matched configurations. |
|
|
Applies environment variable expansion recursively to all applicable fields of a configuration definition. |
Registers Magpie services from one or many providers.cfg file. |
|
|
Logs a message related to a 'permission' entry and raises an error if required. |
|
|
|
Parses the resource field of a permission config entry and retrieves the final resource id. Creates missing |
|
Applies the single permission entry retrieved from the permission configuration. |
Applies permissions specified in configuration(s) defined as file, directory with files or literal configuration. |
|
Converts a list of configurations entries from multiple files into a single resolved mapping. |
|
|
Processes a single permissions configuration. |
|
Generate a string made of random characters. |
Module Contents¶
- exception magpie.register.RegistrationError[source]¶
Bases:
RuntimeError
Generic error during registration operation.
Initialize self. See help(type(self)) for accurate signature.
- exception magpie.register.RegistrationValueError[source]¶
Bases:
RegistrationError
,ValueError
Registration error caused by an invalid value precondition.
Initialize self. See help(type(self)) for accurate signature.
- exception magpie.register.RegistrationLoginError[source]¶
Bases:
RegistrationError
Registration error caused by a failure to complete required login operation.
Initialize self. See help(type(self)) for accurate signature.
- exception magpie.register.RegistrationConfigurationError[source]¶
Bases:
RegistrationValueError
Registration error caused by an invalid configuration entry or definition.
Initialize self. See help(type(self)) for accurate signature.
- magpie.register._request_curl(url: magpie.typedefs.Str, cookie_jar: magpie.typedefs.Str | None = None, cookies: magpie.typedefs.Str | None = None, form_params: magpie.typedefs.Str | None = None, msg: magpie.typedefs.Str | None = 'Response') Tuple[int, int] [source]¶
Executes a request using cURL.
- Returns:
tuple of the returned system command code and the response http code
- magpie.register._phoenix_login(cookies_file: magpie.typedefs.Str) bool [source]¶
Performs Phoenix login using provided cookies.
- magpie.register._phoenix_login_check(cookies: magpie.typedefs.Str) bool [source]¶
Since Phoenix always return 200, even on invalid login, ‘hack’ check unauthorized access.
- Parameters:
cookies – temporary cookies file storage used for login with
_phoenix_login()
.- Returns:
status indicating if login access was granted with defined credentials.
- magpie.register._phoenix_remove_services() bool [source]¶
Removes the Phoenix services using temporary cookies retrieved from login with defined PHOENIX constants.
- Returns:
success status of the procedure.
- magpie.register._phoenix_register_services(services_dict: Dict[magpie.typedefs.Str, Dict[magpie.typedefs.Str, Any]], allowed_service_types: List[magpie.typedefs.Str] | None = None) Tuple[bool, Dict[magpie.typedefs.Str, int]] [source]¶
- magpie.register._register_services(where: magpie.typedefs.Str | None, services_dict: Dict[magpie.typedefs.Str, Dict[magpie.typedefs.Str, magpie.typedefs.Str]], cookies: magpie.typedefs.Str, message: magpie.typedefs.Str | None = 'Register response') Tuple[bool, Dict[magpie.typedefs.Str, int]] [source]¶
Registers services on desired location using provided configurations and access cookies.
- Returns:
tuple of overall success and individual http response of each service registration.
- magpie.register.sync_services_phoenix(services: Iterable[magpie.models.Service] | magpie.typedefs.JSON, services_as_dicts: bool = False) bool [source]¶
Syncs Magpie services by pushing updates to Phoenix.
Services must be one of types specified in
magpie.register.SERVICES_PHOENIX_ALLOWED
.- Parameters:
services –
An iterable of
models.Service
by default, or a dictionary of{svc-name: {<service-info>}}
JSON objects containing each service’s information ifservices_ad_dicts
isTrue
.where
<service-info>
is defined as:{"public_url": <url>, "service_name": <name>, "service_type": <type>}
services_as_dicts – indicate if services must be parsed as JSON definitions.
- magpie.register._magpie_add_register_services_perms(services: magpie.typedefs.ServicesSettings, statuses: Dict[magpie.typedefs.Str, int], curl_cookies: str, request_cookies: magpie.typedefs.AnyCookiesType, disable_getcapabilities: bool) None [source]¶
- magpie.register._magpie_update_services_conflict(conflict_services: List[magpie.typedefs.Str], services_dict: magpie.typedefs.ServicesSettings, request_cookies: magpie.typedefs.AnyCookiesType) Dict[magpie.typedefs.Str, int] [source]¶
Resolve conflicting services by name during registration by updating them only if pointing to different URL.
- magpie.register._magpie_register_services_with_requests(services_dict: magpie.typedefs.ServicesSettings, push_to_phoenix: bool, username: magpie.typedefs.Str, password: magpie.typedefs.Str, provider: magpie.typedefs.Str, force_update: bool = False, disable_getcapabilities: bool = False) bool [source]¶
Registers Services of loaded
providers
configuration using API requests.- Parameters:
services_dict – services configuration definition.
push_to_phoenix – push registered Magpie services to Phoenix for synced configurations.
username – login username to use to obtain permissions for services registration.
password – login password to use to obtain permissions for services registration.
provider – login provider to use to obtain permissions for services registration.
force_update – override existing services matched by name
disable_getcapabilities – do not execute ‘GetCapabilities’ validation for applicable services.
- Returns:
successful operation status
- magpie.register._magpie_register_services_with_db_session(services_dict: magpie.typedefs.ServicesSettings, db_session: sqlalchemy.orm.session.Session, push_to_phoenix: bool = False, force_update: bool = False, update_getcapabilities_permissions: bool = False) bool [source]¶
Registration procedure of Services from
providers
section using pre-established database session.
- magpie.register._load_config(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Str, allow_missing: bool = False) Union [source]¶
Loads a YAML/JSON file path or pre-loaded dictionary configuration.
- magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Literal[groups], allow_missing: bool = False) magpie.typedefs.GroupsConfig [source]¶
- magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Literal[users], allow_missing: bool = False) magpie.typedefs.UsersConfig
- magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Literal[permissions], allow_missing: bool = False) magpie.typedefs.PermissionsConfig
- magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Literal[services], allow_missing: bool = False) magpie.typedefs.ServicesConfig
- magpie.register.get_all_configs(path_or_dict: magpie.typedefs.Str | magpie.typedefs.CombinedConfig, section: magpie.typedefs.Literal[webhooks], allow_missing: bool = False) magpie.typedefs.WebhooksConfig
Loads all matched configurations.
Configurations are considered a valid match if they have one of the
CONFIG_KNOWN_EXTENSIONS
(if path) and that loaded (or passed) configurations contain the specifiedsection
name.If the input is a directory path, loads any number of files contained in it that fulfill matching conditions. If it is a path pointing to a single valid configuration file, loads it by itself. If a dictionary is passed, returns it directly if it fulfills validation.
- Parameters:
path_or_dict – directory path, file path or literal dictionary.
section – section name that must be inside every matched configuration file to be loaded.
allow_missing – allow to have no valid configuration after all are resolved, otherwise raises.
- Raises:
RegistrationError – when no valid configuration can be found and empty one is not allowed.
- Returns:
list of configurations loaded if input was a directory path
list of single configuration if input was a file path
list of single configuration if input was a JSON dict
empty list if none of the other cases where matched
Note
Order of file loading will be resolved by alphabetically sorted filename if specifying a directory path.
- magpie.register._expand_all(config: magpie.typedefs.JSON) magpie.typedefs.JSON [source]¶
Applies environment variable expansion recursively to all applicable fields of a configuration definition.
- magpie.register.magpie_register_services_from_config(service_config_path: magpie.typedefs.Str, push_to_phoenix: bool = False, skip_registration: bool = False, force_update: bool = False, disable_getcapabilities: bool = False, db_session: sqlalchemy.orm.session.Session | None = None) magpie.typedefs.ServicesSettings [source]¶
Registers Magpie services from one or many providers.cfg file.
Uses the provided DB session to directly update service definitions, or uses API request routes as admin. Optionally pushes updates to Phoenix.
- Parameters:
service_config_path – where to look for providers configuration(s). Directory or file path.
push_to_phoenix – whether to push loaded service definitions to remote Phoenix service.
skip_registration – Load, validate and combine Service configurations, but don’t register them.
force_update – override service definitions that conflict by name with registered ones.
disable_getcapabilities – Skip GetCapabilities request validation and permission update. By default, any service with type that allows GetCapabilities permissions will be tested to ensure it can be reached on the provided url. Once validated, this permission is applied to anonymous group to make its entrypoint accessible by anyone. Services that cannot have GetCapabilities permission are ignored regardless.
db_session – Use a pre-established database connection for registration. Otherwise, API requests are employed.
- Returns:
loaded service configurations.
- magpie.register._handle_permission(message: magpie.typedefs.Str, permission_index: int, trail: magpie.typedefs.Str = ', skipping...', detail: magpie.typedefs.Str | None = None, permission: magpie.typedefs.Str | None = None, level: magpie.typedefs.Str | int = logging.WARN, raise_errors: bool = False) None [source]¶
Logs a message related to a ‘permission’ entry and raises an error if required.
Log message format is as follows (detail portion omitted if none provided):
{message} [permission: #{permission_index}] [{permission}]{trail} Detail: [{detail}]
Such that the following logging entry is generated (omitting any additional logging formatters):
>> log_permission("test", 1, " skip test...", "just a test", "fake") test [permission: #1] [fake] skip test... Detail: [just a test]
- Parameters:
message – base message to log
permission_index – index of the permission in the configuration list for traceability
trail – trailing message appended after the base message
detail – additional details appended after the trailing message after moving to another line.
permission – permission name to log just before the trailing message.
level – logging level (default:
logging.WARN
)raise_errors – raises errors related to permissions, instead of just logging the info.
See also
magpie/config/permissions.cfg
- magpie.register._parse_resource_path(permission_config_entry: magpie.typedefs.PermissionConfigItem, entry_index: int, service_info: magpie.typedefs.JSON, cookies_or_session: magpie.typedefs.CookiesOrSessionType = None, magpie_url: magpie.typedefs.Str | None = None, raise_errors: bool = False) Tuple[int | None, bool] [source]¶
Parses the resource field of a permission config entry and retrieves the final resource id. Creates missing resources as necessary if they can be automatically resolved.
If cookies are provided, uses requests to a running Magpie instance (with
magpie_url
) to apply permission. If session to db is provided, uses direct db connection instead to apply permission.- Returns:
tuple of found id (if any,
None
otherwise), and success status of the parsing operation (error)
- magpie.register._apply_permission_entry(permission_config_entry: magpie.typedefs.PermissionConfigItem, entry_index: int, resource_id: int, cookies_or_session: magpie.typedefs.CookiesOrSessionType, magpie_url: magpie.typedefs.Str, users: magpie.typedefs.UsersSettings, groups: magpie.typedefs.GroupsSettings, raise_errors: bool = False) None [source]¶
Applies the single permission entry retrieved from the permission configuration.
Assumes that permissions fields where pre-validated. Permission is applied for the user/group/resource using request or db session accordingly to arguments.
- magpie.register.magpie_register_permissions_from_config(permissions_config: magpie.typedefs.Str | magpie.typedefs.PermissionsConfig, settings: magpie.typedefs.AnySettingsContainer | None = None, db_session: sqlalchemy.orm.session.Session | None = None, raise_errors: bool = False) None [source]¶
Applies permissions specified in configuration(s) defined as file, directory with files or literal configuration.
- Parameters:
permissions_config – file/dir path to permissions config or JSON/YAML equivalent pre-loaded.
settings – Magpie settings to resolve an instance session when using requests instead of DB session. Will look for
magpie.url
,magpie.admin_user
andmagpie.admin_password
by default, or any corresponding environment variable resolution if omitted in the settings.db_session – db session to use instead of requests to directly create/remove permissions with config.
raise_errors – raises errors related to permissions, instead of just logging the info.
See also
magpie/config/permissions.cfg for specific parameters and operational details.
- magpie.register._resolve_config_registry(config_files: magpie.typedefs.MultiConfigs | None, key: magpie.typedefs.Str) magpie.typedefs.AnyResolvedSettings [source]¶
Converts a list of configurations entries from multiple files into a single resolved mapping.
Resolution is accomplished against
key
to generate the mapping of unique items. First configuration entries have priority over later ones if keys are duplicated.
- magpie.register._process_permissions(permissions: magpie.typedefs.PermissionsConfig, magpie_url: magpie.typedefs.Str, cookies_or_session: sqlalchemy.orm.session.Session, users: magpie.typedefs.UsersSettings | None = None, groups: magpie.typedefs.GroupsSettings | None = None, settings: magpie.typedefs.AnySettingsContainer | None = None, raise_errors: bool = False) None [source]¶
Processes a single permissions configuration.