Merge pull request #90 from Gallore/f_swupdate_bitbucket

F swupdate bitbucket
This commit is contained in:
Andy Werner 2017-05-02 11:30:45 +02:00 committed by GitHub
commit 2df4da2af0
25 changed files with 355 additions and 209 deletions

View file

@ -74,6 +74,7 @@ date of first contribution):
* [Mathias Rangel Wulff](https://github.com/mathiasrw)
* [Clemens Niemeyer](https://github.com/clemniem)
* ["I-am-me"](https://github.com/I-am-me)
* [J-J Heinonen](https://github.com/jammi)
* [Noah Martin](https://github.com/noahsmartin)
* [Eyal Soha](https://github.com/eyal0)
* [Greg Hulands](https://github.com/ghulands)

View file

@ -14,34 +14,31 @@ import octoprint_setuptools
# Requirements for our application
INSTALL_REQUIRES = [
"flask>=0.9,<0.11",
"flask>=0.12,<0.13",
"werkzeug>=0.11.1,<0.12",
"tornado>=4.4.2,<4.5",
"Jinja2>=2.8,<2.9", # Jinja 2.9 has breaking changes WRT template scope - we can't
# guarantee backwards compatibility for plugins and such with that
# version, hence we need to pin to a lower version for now. See #1697
"werkzeug>=0.8.3,<0.9",
"tornado==4.0.2", # pinned for now, we need to migrate to a newer tornado, but due
# to some voodoo needed to get large streamed uploads and downloads
# to work that is probably not completely straightforward and therefore
# something for post-1.3.0-stable release
"sockjs-tornado>=1.0.2,<1.1",
"PyYAML>=3.10,<3.11",
"Flask-Login>=0.2.2,<0.3",
"Flask-Principal>=0.3.5,<0.4",
"Flask-Babel>=0.9,<0.10",
"Flask-Assets>=0.10,<0.11",
"PyYAML>=3.12,<3.13",
"Flask-Login>=0.4,<0.5",
"Flask-Principal>=0.4,<0.5",
"Flask-Babel>=0.11,<0.12",
"Flask-Assets>=0.12,<0.13",
"markdown>=2.6.4,<2.7",
"pyserial>=2.7,<2.8",
"pyserial>=3.2.1,<3.3",
"netaddr>=0.7.17,<0.8",
"watchdog>=0.8.3,<0.9",
"sarge>=0.1.4,<0.2",
"netifaces>=0.10,<0.11",
"pylru>=1.0.9,<1.1",
"rsa>=3.2,<3.3",
"pkginfo>=1.2.1,<1.3",
"requests>=2.7,<2.8",
"semantic_version>=2.4.2,<2.5",
"psutil>=3.2.1,<3.3",
"Click>=6.2,<6.3",
"rsa>=3.4,<3.5",
"pkginfo>=1.4.1,<1.5",
"requests>=2.13.0,<2.14",
"semantic_version>=2.6.0,<2.7",
"psutil>=5.1.3,<5.2",
"Click>=6.7,<6.8",
"awesome-slugify>=1.6.5,<1.7",
"feedparser>=5.2.1,<5.3",
"chainmap>=1.0.2,<1.1",
@ -58,7 +55,7 @@ EXTRA_REQUIRES = dict(
# Dependencies for developing OctoPrint
develop=[
# Testing dependencies
"mock>=1.0.1,<1.1",
"mock>=2.0,<2.1",
"nose>=1.3.0,<1.4",
"ddt",
@ -73,7 +70,7 @@ EXTRA_REQUIRES = dict(
# Dependencies for developing OctoPrint plugins
plugins=[
"cookiecutter>=1.4,<1.5"
"cookiecutter>=1.5,<1.6"
]
)

View file

@ -1409,7 +1409,7 @@ class SettingsPlugin(OctoPrintPlugin):
:return: the current settings of the plugin, as a dictionary
"""
from flask.ext.login import current_user
from flask_login import current_user
import copy
data = copy.deepcopy(self._settings.get_all_data(merged=True))
@ -1454,8 +1454,8 @@ class SettingsPlugin(OctoPrintPlugin):
else:
node[key] = None
conditions = dict(user=lambda: current_user is not None and not current_user.is_anonymous(),
admin=lambda: current_user is not None and not current_user.is_anonymous() and current_user.is_admin(),
conditions = dict(user=lambda: current_user is not None and not current_user.is_anonymous,
admin=lambda: current_user is not None and not current_user.is_anonymous and current_user.is_admin,
never=lambda: False)
for level, condition in conditions.items():

View file

@ -20,7 +20,7 @@ import flask
from octoprint.server import admin_permission
from octoprint.server.util.flask import restricted_access, with_revalidation_checking, check_etag
from flask.ext.babel import gettext
from flask_babel import gettext
class AnnouncementPlugin(octoprint.plugin.AssetPlugin,
octoprint.plugin.SettingsPlugin,

View file

@ -9,7 +9,7 @@ __copyright__ = "Copyright (C) 2015 The OctoPrint Project - Released under terms
import octoprint.plugin
from flask.ext.babel import gettext
from flask_babel import gettext
class CoreWizardPlugin(octoprint.plugin.AssetPlugin,
@ -87,9 +87,9 @@ class CoreWizardPlugin(octoprint.plugin.AssetPlugin,
from flask import request
from octoprint.server.api import valid_boolean_trues, NO_CONTENT
data = request.values
if hasattr(request, "json") and request.json:
data = request.json
data = request.get_json()
if data is None:
data = request.values
if "ac" in data and data["ac"] in valid_boolean_trues and \
"user" in data.keys() and "pass1" in data.keys() and \

View file

@ -15,7 +15,7 @@ from octoprint.server import admin_permission, VERSION
from octoprint.util.pip import LocalPipCaller, UnknownPip
from flask import jsonify, make_response
from flask.ext.babel import gettext
from flask_babel import gettext
import logging
import sarge

View file

@ -501,7 +501,9 @@ class SoftwareUpdatePlugin(octoprint.plugin.BlueprintPlugin,
if not "application/json" in flask.request.headers["Content-Type"]:
return flask.make_response("Expected content-type JSON", 400)
json_data = flask.request.json
json_data = flask.request.get_json(silent=True)
if json_data is None:
return flask.make_response("Invalid JSON", 400)
if "check" in json_data:
check_targets = map(lambda x: x.strip(), json_data["check"])
@ -528,7 +530,7 @@ class SoftwareUpdatePlugin(octoprint.plugin.BlueprintPlugin,
##~~ TemplatePlugin API
def get_template_configs(self):
from flask.ext.babel import gettext
from flask_babel import gettext
return [
dict(type="settings", name=gettext("Software Update"))
]
@ -861,7 +863,7 @@ class SoftwareUpdatePlugin(octoprint.plugin.BlueprintPlugin,
result = dict(check)
if target == "octoprint":
from flask.ext.babel import gettext
from flask_babel import gettext
result["displayName"] = to_unicode(check.get("displayName"), errors="replace")
if result["displayName"] is None:

View file

@ -10,7 +10,7 @@ import logging
from ..exceptions import ConfigurationInvalid
BRANCH_HEAD_URL = "https://api.bitbucket.org/2.0/repositories/{user}/{repo}/commits/{branch}?pagelen=1"
BRANCH_HEAD_URL = "https://api.bitbucket.org/2.0/repositories/{user}/{repo}/commit/{branch}"
logger = logging.getLogger("octoprint.plugins.softwareupdate.version_checks.bitbucket_commit")
@ -22,12 +22,11 @@ def _get_latest_commit(user, repo, branch):
return None
reference = r.json()
if not "values" in reference \
or len(reference["values"]) < 1 \
or not 'hash' in reference["values"][0]:
if not "hash" in reference:
return None
return reference["values"][0]['hash']
return reference["hash"]
def get_latest(target, check):

View file

@ -8,10 +8,10 @@ __copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms
import uuid
from sockjs.tornado import SockJSRouter
from flask import Flask, g, request, session, Blueprint, Request, Response
from flask.ext.login import LoginManager, current_user
from flask.ext.principal import Principal, Permission, RoleNeed, identity_loaded, UserNeed
from flask.ext.babel import Babel, gettext, ngettext
from flask.ext.assets import Environment, Bundle
from flask_login import LoginManager, current_user
from flask_principal import Principal, Permission, RoleNeed, identity_loaded, UserNeed
from flask_babel import Babel, gettext, ngettext
from flask_assets import Environment, Bundle
from babel import Locale
from watchdog.observers import Observer
from watchdog.observers.polling import PollingObserver
@ -89,9 +89,9 @@ def on_identity_loaded(sender, identity):
return
identity.provides.add(UserNeed(user.get_id()))
if user.is_user():
if user.is_user:
identity.provides.add(RoleNeed("user"))
if user.is_admin():
if user.is_admin:
identity.provides.add(RoleNeed("admin"))
def load_user(id):
@ -170,8 +170,7 @@ class Server(object):
self._logger = logging.getLogger(__name__)
pluginManager = self._plugin_manager
# monkey patch a bunch of stuff
util.tornado.fix_ioloop_scheduling()
# monkey patch some stuff
util.flask.enable_additional_translations(additional_folders=[self._settings.getBaseFolder("translations")])
# setup app
@ -337,6 +336,7 @@ class Server(object):
loginManager = LoginManager()
loginManager.session_protection = "strong"
loginManager.user_callback = load_user
loginManager.anonymous_user = users.AnonymousUser # TODO: remove in 1.5.0
if not userManager.enabled:
loginManager.anonymous_user = users.DummyUser
principals.identity_loaders.appendleft(users.dummy_identity_loader)
@ -610,11 +610,14 @@ class Server(object):
return Locale.parse(request.accept_languages.best_match(LANGUAGES))
def _setup_app(self, app):
from octoprint.server.util.flask import ReverseProxiedEnvironment, OctoPrintFlaskRequest, OctoPrintFlaskResponse
from octoprint.server.util.flask import ReverseProxiedEnvironment, OctoPrintFlaskRequest, OctoPrintFlaskResponse, deprecate_flaskext
deprecate_flaskext() # TODO: remove in OctoPrint 1.5.0
s = settings()
app.debug = self._debug
app.config["TEMPLATES_AUTO_RELOAD"] = True
secret_key = s.get(["server", "secretKey"])
if not secret_key:

View file

@ -10,8 +10,8 @@ import netaddr
import sarge
from flask import Blueprint, request, jsonify, abort, current_app, session, make_response, g
from flask.ext.login import login_user, logout_user, current_user
from flask.ext.principal import Identity, identity_changed, AnonymousIdentity
from flask_login import login_user, logout_user, current_user
from flask_principal import Identity, identity_changed, AnonymousIdentity
import octoprint.util as util
import octoprint.users
@ -62,7 +62,7 @@ def pluginData(name):
return make_response("More than one api provider registered for {name}, can't proceed".format(name=name), 500)
api_plugin = api_plugins[0]
if api_plugin.is_api_adminonly() and not current_user.is_admin():
if api_plugin.is_api_adminonly() and not current_user.is_admin:
return make_response("Forbidden", 403)
response = api_plugin.on_api_get(request)
@ -89,7 +89,7 @@ def pluginCommand(name):
if valid_commands is None:
return make_response("Method not allowed", 405)
if api_plugin.is_api_adminonly() and not current_user.is_admin():
if api_plugin.is_api_adminonly() and not current_user.is_admin:
return make_response("Forbidden", 403)
command, data, response = get_json_command_from_request(request, valid_commands)
@ -134,10 +134,13 @@ def wizardFinish():
data = dict()
try:
data = request.json
data = request.get_json()
except:
abort(400)
if data is None:
abort(400)
if not "handled" in data:
abort(400)
handled = data["handled"]
@ -186,9 +189,9 @@ def apiVersion():
@api.route("/login", methods=["POST"])
def login():
data = request.values
if hasattr(request, "json") and request.json:
data = request.json
data = request.get_json()
if data is None:
data = request.values
if octoprint.server.userManager.enabled and "user" in data and "pass" in data:
username = data["user"]

View file

@ -26,7 +26,7 @@ from octoprint.server.util.flask import restricted_access
from octoprint.plugin import plugin_manager
from flask.ext.babel import Locale
from flask_babel import Locale
@api.route("/languages", methods=["GET"])
@restricted_access

View file

@ -326,10 +326,13 @@ def printerCommand():
return make_response("Expected content type JSON", 400)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
if "command" in data and "commands" in data:
return make_response("'command' and 'commands' are mutually exclusive", 400)
elif ("command" in data or "commands" in data) and "script" in data:

View file

@ -50,10 +50,13 @@ def printerProfilesAdd():
return make_response("Expected content-type JSON", 400)
try:
json_data = request.json
json_data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if json_data is None:
return make_response("Malformed JSON body in request", 400)
if not "profile" in json_data:
return make_response("No profile included in request", 400)
@ -117,10 +120,13 @@ def printerProfilesUpdate(identifier):
return make_response("Expected content-type JSON", 400)
try:
json_data = request.json
json_data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if json_data is None:
return make_response("Malformed JSON body in request", 400)
if not "profile" in json_data:
return make_response("No profile included in request", 400)

View file

@ -8,7 +8,7 @@ __copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms
import logging
from flask import request, jsonify, make_response
from flask.ext.login import current_user
from flask_login import current_user
from werkzeug.exceptions import BadRequest
from octoprint.events import eventManager, Events
@ -39,7 +39,7 @@ def _etag(lm=None):
for key in sorted(plugin_settings.keys()):
sorted_plugin_settings[key] = plugin_settings.get(key, dict())
if current_user is not None and not current_user.is_anonymous():
if current_user is not None and not current_user.is_anonymous:
roles = sorted(current_user.roles)
else:
roles = []
@ -251,10 +251,13 @@ def setSettings():
return make_response("Expected content-type JSON", 400)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
_saveSettings(data)
return getSettings()

View file

@ -120,10 +120,13 @@ def slicingAddSlicerProfile(slicer, name):
return make_response("Expected content-type JSON", 400)
try:
json_data = request.json
json_data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if json_data is None:
return make_response("Malformed JSON body in request", 400)
data = dict()
display_name = None
description = None
@ -159,10 +162,13 @@ def slicingPatchSlicerProfile(slicer, name):
return make_response("Profile {name} for slicer {slicer} not found".format(**locals()), 404)
try:
json_data = request.json
json_data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if json_data is None:
return make_response("Malformed JSON body in request", 400)
data = dict()
display_name = None
description = None

View file

@ -9,7 +9,7 @@ import logging
import sarge
from flask import request, make_response, jsonify, url_for
from flask.ext.babel import gettext
from flask_babel import gettext
from octoprint.settings import settings as s
@ -24,9 +24,9 @@ from octoprint.server.util.flask import restricted_access, get_remote_address
def performSystemAction():
logging.getLogger(__name__).warn("Deprecated API call to /api/system made by {}, should be migrated to use /system/commands/custom/<action>".format(get_remote_address(request)))
data = request.values
if hasattr(request, "json") and request.json:
data = request.json
data = request.get_json(silent=True)
if data is None:
data = request.values
if not "action" in data:
return make_response("action to perform is not defined", 400)

View file

@ -162,9 +162,9 @@ def processUnrenderedTimelapseCommand(name):
@api.route("/timelapse", methods=["POST"])
@restricted_access
def setTimelapseConfig():
data = request.values
if hasattr(request, "json") and request.json:
data = request.json
data = request.get_json(silent=True)
if data is None:
data = request.values
if "type" in data:
config = {

View file

@ -7,7 +7,7 @@ __copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms
from flask import request, jsonify, abort, make_response
from werkzeug.exceptions import BadRequest
from flask.ext.login import current_user
from flask_login import current_user
import octoprint.users as users
@ -40,10 +40,13 @@ def addUser():
return make_response("Expected content-type JSON", 400)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
if not "name" in data:
return make_response("Missing mandatory name field", 400)
if not "password" in data:
@ -72,7 +75,7 @@ def getUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is not None and not current_user.is_anonymous() and (current_user.get_name() == username or current_user.is_admin()):
if current_user is not None and not current_user.is_anonymous and (current_user.get_name() == username or current_user.is_admin):
user = userManager.findUser(username)
if user is not None:
return jsonify(user.asDict())
@ -95,10 +98,13 @@ def updateUser(username):
return make_response("Expected content-type JSON", 400)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
# change roles
roles = ["user"]
if "admin" in data and data["admin"] in valid_boolean_trues:
@ -133,15 +139,18 @@ def changePasswordForUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is not None and not current_user.is_anonymous() and (current_user.get_name() == username or current_user.is_admin()):
if current_user is not None and not current_user.is_anonymous and (current_user.get_name() == username or current_user.is_admin):
if not "application/json" in request.headers["Content-Type"]:
return make_response("Expected content-type JSON", 400)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
if not "password" in data or not data["password"]:
return make_response("password is missing from request", 400)
@ -161,7 +170,7 @@ def getSettingsForUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is None or current_user.is_anonymous() or (current_user.get_name() != username and not current_user.is_admin()):
if current_user is None or current_user.is_anonymous or (current_user.get_name() != username and not current_user.is_admin):
return make_response("Forbidden", 403)
try:
@ -175,14 +184,17 @@ def changeSettingsForUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is None or current_user.is_anonymous() or (current_user.get_name() != username and not current_user.is_admin()):
if current_user is None or current_user.is_anonymous or (current_user.get_name() != username and not current_user.is_admin):
return make_response("Forbidden", 403)
try:
data = request.json
data = request.get_json()
except BadRequest:
return make_response("Malformed JSON body in request", 400)
if data is None:
return make_response("Malformed JSON body in request", 400)
try:
userManager.changeUserSettings(username, data)
return jsonify(SUCCESS)
@ -195,7 +207,7 @@ def deleteApikeyForUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is not None and not current_user.is_anonymous() and (current_user.get_name() == username or current_user.is_admin()):
if current_user is not None and not current_user.is_anonymous and (current_user.get_name() == username or current_user.is_admin):
try:
userManager.deleteApikey(username)
except users.UnknownUser:
@ -211,7 +223,7 @@ def generateApikeyForUser(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if current_user is not None and not current_user.is_anonymous() and (current_user.get_name() == username or current_user.is_admin()):
if current_user is not None and not current_user.is_anonymous and (current_user.get_name() == username or current_user.is_admin):
try:
apikey = userManager.generateApiKey(username)
except users.UnknownUser:

View file

@ -29,7 +29,10 @@ def verifySessionKey():
if not "application/json" in request.headers["Content-Type"]:
return None, None, make_response("Expected content-type JSON", 400)
data = request.json
data = request.get_json()
if data is None:
return make_response("Malformed JSON body in request", 400)
for key in ("appid", "key", "_sig"):
if not key in data:
return make_response("Missing argument: {key}".format(key=key), 400)

View file

@ -13,6 +13,8 @@ from octoprint.users import ApiUser
from octoprint.util import deprecated
import flask as _flask
import flask_login
import flask_principal
from . import flask
from . import sockjs
@ -58,9 +60,9 @@ def loginFromApiKeyRequestHandler():
if apikey and apikey != octoprint.server.UI_API_KEY and not octoprint.server.appSessionManager.validate(apikey):
user = get_user_for_apikey(apikey)
if user is not None and _flask.ext.login.login_user(user, remember=False):
_flask.ext.principal.identity_changed.send(_flask.current_app._get_current_object(),
identity=_flask.ext.principal.Identity(user.get_id()))
if user is not None and not user.is_anonymous and flask_login.login_user(user, remember=False):
flask_principal.identity_changed.send(_flask.current_app._get_current_object(),
identity=flask_principal.Identity(user.get_id()))
else:
return _flask.make_response("Invalid API key", 401)

View file

@ -8,9 +8,9 @@ __copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms
import tornado.web
import flask
import flask.ext.login
import flask.ext.principal
import flask.ext.assets
import flask_login
import flask_principal
import flask_assets
import webassets.updater
import webassets.utils
import functools
@ -40,7 +40,7 @@ def enable_additional_translations(default_locale="en", additional_folders=None)
import os
from flask import _request_ctx_stack
from babel import support, Locale
import flask.ext.babel
import flask_babel
if additional_folders is None:
additional_folders = []
@ -91,7 +91,7 @@ def enable_additional_translations(default_locale="en", additional_folders=None)
return None
translations = getattr(ctx, 'babel_translations', None)
if translations is None:
locale = flask.ext.babel.get_locale()
locale = flask_babel.get_locale()
translations = support.Translations()
if str(locale) != default_locale:
@ -129,8 +129,8 @@ def enable_additional_translations(default_locale="en", additional_folders=None)
ctx.babel_translations = translations
return translations
flask.ext.babel.Babel.list_translations = fixed_list_translations
flask.ext.babel.get_translations = fixed_get_translations
flask_babel.Babel.list_translations = fixed_list_translations
flask_babel.get_translations = fixed_get_translations
def fix_webassets_cache():
from webassets import cache
@ -229,6 +229,27 @@ def fix_webassets_filtertool():
FilterTool._wrap_cache = fixed_wrap_cache
# TODO: Remove compatibility layer in OctoPrint 1.5.0
def deprecate_flaskext():
import flask
import importlib
class FlaskExtDeprecator(object):
def __getattr__(self, item):
old_name = "flask.ext.{}".format(item)
new_name = "flask_{}".format(item)
module = importlib.import_module(new_name)
from warnings import warn
message = "The {old} import is deprecated in Flask versions >= 0.11, which OctoPrint now uses. " + \
"Import {new} instead. This compatibility layer will be removed in OctoPrint 1.5.0."
warn(DeprecationWarning(message.format(old=old_name, new=new_name)), stacklevel=2)
return module
flask.ext = FlaskExtDeprecator()
#~~ WSGI environment wrapper for reverse proxying
class ReverseProxiedEnvironment(object):
@ -478,12 +499,12 @@ class OctoPrintFlaskResponse(flask.Response):
def passive_login():
if octoprint.server.userManager.enabled:
user = octoprint.server.userManager.login_user(flask.ext.login.current_user)
user = octoprint.server.userManager.login_user(flask_login.current_user)
else:
user = flask.ext.login.current_user
user = flask_login.current_user
if user is not None and not user.is_anonymous():
flask.ext.principal.identity_changed.send(flask.current_app._get_current_object(), identity=flask.ext.principal.Identity(user.get_id()))
if user is not None and not user.is_anonymous:
flask_principal.identity_changed.send(flask.current_app._get_current_object(), identity=flask_principal.Identity(user.get_id()))
if hasattr(user, "get_session"):
flask.session["usersession.id"] = user.get_session()
flask.g.user = user
@ -505,8 +526,8 @@ def passive_login():
user = octoprint.server.userManager.login_user(user)
flask.session["usersession.id"] = user.get_session()
flask.g.user = user
flask.ext.login.login_user(user)
flask.ext.principal.identity_changed.send(flask.current_app._get_current_object(), identity=flask.ext.principal.Identity(user.get_id()))
flask_login.login_user(user)
flask_principal.identity_changed.send(flask.current_app._get_current_object(), identity=flask_principal.Identity(user.get_id()))
return flask.jsonify(user.asDict())
except:
logger = logging.getLogger(__name__)
@ -1023,7 +1044,7 @@ def admin_validator(request):
"""
user = _get_flask_user_from_request(request)
if user is None or not user.is_authenticated() or not user.is_admin():
if user is None or not user.is_authenticated or not user.is_admin:
raise tornado.web.HTTPError(403)
@ -1038,7 +1059,7 @@ def user_validator(request):
"""
user = _get_flask_user_from_request(request)
if user is None or not user.is_authenticated():
if user is None or not user.is_authenticated:
raise tornado.web.HTTPError(403)
@ -1051,14 +1072,14 @@ def _get_flask_user_from_request(request):
:return: the user or None if no user could be determined
"""
import octoprint.server.util
import flask.ext.login
import flask_login
from octoprint.settings import settings
apikey = octoprint.server.util.get_api_key(request)
if settings().getBoolean(["api", "enabled"]) and apikey is not None:
user = octoprint.server.util.get_user_for_apikey(apikey)
else:
user = flask.ext.login.current_user
user = flask_login.current_user
return user
@ -1103,7 +1124,7 @@ def restricted_access(func):
if settings().getBoolean(["server", "firstRun"]) and settings().getBoolean(["accessControl", "enabled"]) and (octoprint.server.userManager is None or not octoprint.server.userManager.hasBeenCustomized()):
return flask.make_response("OctoPrint isn't setup yet", 403)
return flask.ext.login.login_required(func)(*args, **kwargs)
return flask_login.login_required(func)(*args, **kwargs)
return decorated_view
@ -1188,7 +1209,10 @@ def get_json_command_from_request(request, valid_commands):
if content_type is None or not "application/json" in content_type:
return None, None, make_response("Expected content-type JSON", 400)
data = request.json
data = request.get_json()
if data is None:
return make_response("Malformed JSON body in request", 400)
if not "command" in data.keys() or not data["command"] in valid_commands.keys():
return None, None, make_response("Expected valid command", 400)
@ -1201,7 +1225,7 @@ def get_json_command_from_request(request, valid_commands):
##~~ Flask-Assets resolver with plugin asset support
class PluginAssetResolver(flask.ext.assets.FlaskResolver):
class PluginAssetResolver(flask_assets.FlaskResolver):
def split_prefix(self, ctx, item):
app = ctx.environment._app
@ -1210,14 +1234,14 @@ class PluginAssetResolver(flask.ext.assets.FlaskResolver):
prefix, plugin, name = item.split("/", 2)
blueprint = prefix + "." + plugin
directory = flask.ext.assets.get_static_folder(app.blueprints[blueprint])
directory = flask_assets.get_static_folder(app.blueprints[blueprint])
item = name
endpoint = blueprint + ".static"
return directory, item, endpoint
except (ValueError, KeyError):
pass
return flask.ext.assets.FlaskResolver.split_prefix(self, ctx, item)
return flask_assets.FlaskResolver.split_prefix(self, ctx, item)
def resolve_output_to_path(self, ctx, target, bundle):
import os

View file

@ -7,11 +7,7 @@ __copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms
import logging
import os
import datetime
import stat
import mimetypes
import email
import time
import re
import tornado
@ -29,36 +25,6 @@ import tornado.util
import octoprint.util
#~~ Monkey patching
def fix_ioloop_scheduling():
"""
This monkey patches tornado's :meth:``tornado.ioloop.PeriodicCallback._schedule_next`` method so it no longer
blocks for long times on slow machines (RPi) when the system time happens to change by a large amount (e.g. due to
the first ever contact to an NTP server).
Patch by @nosyjoe on Github. See this PR against tornado: https://github.com/tornadoweb/tornado/pull/1290
"""
import math
# patched implementation taken from PR
def _schedule_next(self):
if self._running:
current_time = self.io_loop.time()
if self._next_timeout <= current_time:
callback_time_sec = self.callback_time / 1000.0
self._next_timeout += (math.floor((current_time - self._next_timeout) / callback_time_sec) + 1) * callback_time_sec
self._timeout = self.io_loop.add_timeout(self._next_timeout, self._run)
# replace original implementation with patched version
import tornado.ioloop
tornado.ioloop.PeriodicCallback._schedule_next = _schedule_next
#~~ WSGI middleware
@ -560,7 +526,8 @@ class WsgiInputContainer(object):
if not data:
raise Exception("WSGI app did not call start_response")
status_code = int(data["status"].split()[0])
status_code, reason = data["status"].split(" ", 1)
status_code = int(status_code)
headers = data["headers"]
header_set = set(k.lower() for (k, v) in headers)
body = tornado.escape.utf8(body)
@ -572,13 +539,12 @@ class WsgiInputContainer(object):
if "server" not in header_set:
headers.append(("Server", "TornadoServer/%s" % tornado.version))
parts = [tornado.escape.utf8("HTTP/1.1 " + data["status"] + "\r\n")]
start_line = tornado.httputil.ResponseStartLine("HTTP/1.1", status_code, reason)
header_obj = tornado.httputil.HTTPHeaders()
for key, value in headers:
parts.append(tornado.escape.utf8(key) + b": " + tornado.escape.utf8(value) + b"\r\n")
parts.append(b"\r\n")
parts.append(body)
request.write(b"".join(parts))
request.finish()
header_obj.add(key, value)
request.connection.write_headers(start_line, header_obj, chunk=body)
request.connection.finish()
self._log(status_code, request)
@staticmethod
@ -613,22 +579,22 @@ class WsgiInputContainer(object):
host = request.host
port = 443 if request.protocol == "https" else 80
environ = {
"REQUEST_METHOD": request.method,
"SCRIPT_NAME": "",
"PATH_INFO": to_wsgi_str(tornado.escape.url_unescape(
request.path, encoding=None, plus=False)),
"QUERY_STRING": request.query,
"REMOTE_ADDR": request.remote_ip,
"SERVER_NAME": host,
"SERVER_PORT": str(port),
"SERVER_PROTOCOL": request.version,
"wsgi.version": (1, 0),
"wsgi.url_scheme": request.protocol,
"wsgi.input": request_body,
"wsgi.errors": sys.stderr,
"wsgi.multithread": False,
"wsgi.multiprocess": True,
"wsgi.run_once": False,
"REQUEST_METHOD": request.method,
"SCRIPT_NAME": "",
"PATH_INFO": to_wsgi_str(tornado.escape.url_unescape(
request.path, encoding=None, plus=False)),
"QUERY_STRING": request.query,
"REMOTE_ADDR": request.remote_ip,
"SERVER_NAME": host,
"SERVER_PORT": str(port),
"SERVER_PROTOCOL": request.version,
"wsgi.version": (1, 0),
"wsgi.url_scheme": request.protocol,
"wsgi.input": request_body,
"wsgi.errors": sys.stderr,
"wsgi.multithread": False,
"wsgi.multiprocess": True,
"wsgi.run_once": False,
}
if "Content-Type" in request.headers:
environ["CONTENT_TYPE"] = request.headers.pop("Content-Type")
@ -649,7 +615,7 @@ class WsgiInputContainer(object):
log_method = access_log.error
request_time = 1000.0 * request.request_time()
summary = request.method + " " + request.uri + " (" + \
request.remote_ip + ")"
request.remote_ip + ")"
log_method("%d %s %.2fms", status_code, summary, request_time)
@ -672,36 +638,24 @@ class CustomHTTPServer(tornado.httpserver.HTTPServer):
``default_max_body_size`` is the default maximum body size to apply if no specific one from ``max_body_sizes`` matches.
"""
def __init__(self, *args, **kwargs):
pass
def __init__(self, request_callback, no_keep_alive=False, io_loop=None,
xheaders=False, ssl_options=None, protocol=None,
decompress_request=False,
chunk_size=None, max_header_size=None,
idle_connection_timeout=None, body_timeout=None,
max_body_sizes=None, default_max_body_size=None, max_buffer_size=None):
self.request_callback = request_callback
self.no_keep_alive = no_keep_alive
self.xheaders = xheaders
self.protocol = protocol
self.conn_params = CustomHTTP1ConnectionParameters(
decompress=decompress_request,
chunk_size=chunk_size,
max_header_size=max_header_size,
header_timeout=idle_connection_timeout or 3600,
max_body_sizes=max_body_sizes,
default_max_body_size=default_max_body_size,
body_timeout=body_timeout)
tornado.tcpserver.TCPServer.__init__(self, io_loop=io_loop, ssl_options=ssl_options,
max_buffer_size=max_buffer_size,
read_chunk_size=chunk_size)
self._connections = set()
def initialize(self, *args, **kwargs):
default_max_body_size = kwargs.pop("default_max_body_size", None)
max_body_sizes = kwargs.pop("max_body_sizes", None)
tornado.httpserver.HTTPServer.initialize(self, *args, **kwargs)
additional = dict(default_max_body_size=default_max_body_size,
max_body_sizes=max_body_sizes)
self.conn_params = CustomHTTP1ConnectionParameters.from_stock_params(self.conn_params, **additional)
def handle_stream(self, stream, address):
context = tornado.httpserver._HTTPRequestContext(stream, address,
self.protocol)
conn = CustomHTTP1ServerConnection(
stream, self.conn_params, context)
self.protocol)
conn = CustomHTTP1ServerConnection(stream, self.conn_params, context)
self._connections.add(conn)
conn.start_serving(self)
@ -718,7 +672,7 @@ class CustomHTTP1ServerConnection(tornado.http1connection.HTTP1ServerConnection)
try:
while True:
conn = CustomHTTP1Connection(self.stream, False,
self.params, self.context)
self.params, self.context)
request_delegate = delegate.start_request(self, conn)
try:
ret = yield conn.read_response(request_delegate)
@ -762,8 +716,13 @@ class CustomHTTP1Connection(tornado.http1connection.HTTP1Connection):
current request exceeds the individual max content length, the request processing is aborted and an
``HTTPInputError`` is raised.
"""
content_length = headers.get("Content-Length")
if "Content-Length" in headers:
if "Transfer-Encoding" in headers:
# Response cannot contain both Content-Length and
# Transfer-Encoding headers.
# http://tools.ietf.org/html/rfc7230#section-3.3.3
raise tornado.httputil.HTTPInputError(
"Response with both Transfer-Encoding and Content-Length")
if "," in headers["Content-Length"]:
# Proxies sometimes cause Content-Length headers to get
# duplicated. If all the values are identical then we can
@ -774,9 +733,14 @@ class CustomHTTP1Connection(tornado.http1connection.HTTP1Connection):
"Multiple unequal Content-Lengths: %r" %
headers["Content-Length"])
headers["Content-Length"] = pieces[0]
content_length = int(headers["Content-Length"])
content_length = int(content_length)
try:
content_length = int(headers["Content-Length"])
except ValueError:
# Handles non-integer Content-Length value.
raise tornado.httputil.HTTPInputError(
"Only integer Content-Length is allowed: %s" % headers["Content-Length"])
max_content_length = self._get_max_content_length(self._request_start_line.method, self._request_start_line.path)
if max_content_length is not None and 0 <= max_content_length < content_length:
raise tornado.httputil.HTTPInputError("Content-Length too long")
@ -828,9 +792,20 @@ class CustomHTTP1ConnectionParameters(tornado.http1connection.HTTP1ConnectionPar
"""
def __init__(self, *args, **kwargs):
tornado.http1connection.HTTP1ConnectionParameters.__init__(self, args, kwargs)
self.max_body_sizes = kwargs["max_body_sizes"] if "max_body_sizes" in kwargs else list()
self.default_max_body_size = kwargs["default_max_body_size"] if "default_max_body_size" in kwargs else None
max_body_sizes = kwargs.pop("max_body_sizes", list())
default_max_body_size = kwargs.pop("default_max_body_size", None)
tornado.http1connection.HTTP1ConnectionParameters.__init__(self, *args, **kwargs)
self.max_body_sizes = max_body_sizes
self.default_max_body_size = default_max_body_size
@classmethod
def from_stock_params(cls, other, **additional):
kwargs = dict(other.__dict__)
for key, value in additional.items():
kwargs[key] = value
return cls(**kwargs)
#~~ customized large response handler

View file

@ -482,6 +482,17 @@ $(function() {
// reload overlay
$("#reloadui_overlay_reload").click(function() { location.reload(); });
var changeTab = function()
{
var hashtag = window.location.hash;
var tab = $('#tabs a[href="' + hashtag + '"]');
if (tab.length)
{
tab.tab("show");
onTabChange(hashtag);
}
}
//~~ view model binding
var bindViewModels = function() {
@ -570,6 +581,15 @@ $(function() {
callViewModels(allViewModels, "onBrowserTabVisibilityChange", [status]);
});
$(window).on("hashchange", function() {
changeTab();
});
if (window.location.hash != "")
{
changeTab();
}
log.info("Application startup complete");
};

View file

@ -5,8 +5,8 @@ __author__ = "Gina Häußge <osd@foosel.net>"
__license__ = 'GNU Affero General Public License http://www.gnu.org/licenses/agpl.html'
__copyright__ = "Copyright (C) 2014 The OctoPrint Project - Released under terms of the AGPLv3 License"
from flask.ext.login import UserMixin
from flask.ext.principal import Identity
from flask_login import UserMixin, AnonymousUserMixin
from flask_principal import Identity
from werkzeug.local import LocalProxy
import hashlib
import os
@ -416,6 +416,65 @@ class UnknownRole(Exception):
##~~ User object
class MethodReplacedByBooleanProperty(object):
def __init__(self, name, message, getter):
self._name = name
self._message = message
self._getter = getter
@property
def _attr(self):
return self._getter()
def __call__(self):
from warnings import warn
warn(DeprecationWarning(self._message.format(name=self._name)), stacklevel=2)
return self._attr
def __eq__(self, other):
return self._attr == other
def __ne__(self, other):
return self._attr != other
def __bool__(self):
# Python 3
return self._attr
def __nonzero__(self):
# Python 2
return self._attr
def __hash__(self):
return hash(self._attr)
def __repr__(self):
return "MethodReplacedByProperty({}, {}, {})".format(self._name, self._message, self._getter)
def __str__(self):
return str(self._attr)
# TODO: Remove compatibility layer in OctoPrint 1.5.0
class FlaskLoginMethodReplacedByBooleanProperty(MethodReplacedByBooleanProperty):
def __init__(self, name, getter):
message = "{name} is now a property in Flask-Login versions >= 0.3.0, which OctoPrint now uses. " + \
"Use {name} instead of {name}(). This compatibility layer will be removed in OctoPrint 1.5.0."
MethodReplacedByBooleanProperty.__init__(self, name, message, getter)
# TODO: Remove compatibility layer in OctoPrint 1.5.0
class OctoPrintUserMethodReplacedByBooleanProperty(MethodReplacedByBooleanProperty):
def __init__(self, name, getter):
message = "{name} is now a property for consistency reasons with Flask-Login versions >= 0.3.0, which " + \
"OctoPrint now uses. Use {name} instead of {name}(). This compatibility layer will be removed " + \
"in OctoPrint 1.5.0."
MethodReplacedByBooleanProperty.__init__(self, name, message, getter)
class User(UserMixin):
def __init__(self, username, passwordHash, active, roles, apikey=None, settings=None):
self._username = username
@ -431,9 +490,9 @@ class User(UserMixin):
def asDict(self):
return {
"name": self._username,
"active": self.is_active(),
"admin": self.is_admin(),
"user": self.is_user(),
"active": bool(self.is_active),
"admin": bool(self.is_admin),
"user": bool(self.is_user),
"apikey": self._apikey,
"settings": self._settings
}
@ -447,14 +506,25 @@ class User(UserMixin):
def get_name(self):
return self._username
@property
def is_anonymous(self):
return FlaskLoginMethodReplacedByBooleanProperty("is_anonymous", lambda: False)
@property
def is_authenticated(self):
return FlaskLoginMethodReplacedByBooleanProperty("is_authenticated", lambda: True)
@property
def is_active(self):
return self._active
return FlaskLoginMethodReplacedByBooleanProperty("is_active", lambda: self._active)
@property
def is_user(self):
return "user" in self._roles
return OctoPrintUserMethodReplacedByBooleanProperty("is_user", lambda: "user" in self._roles)
@property
def is_admin(self):
return "admin" in self._roles
return OctoPrintUserMethodReplacedByBooleanProperty("is_admin", lambda: "admin" in self._roles)
def get_all_settings(self):
return self._settings
@ -503,7 +573,23 @@ class User(UserMixin):
return True
def __repr__(self):
return "User(id=%s,name=%s,active=%r,user=%r,admin=%r)" % (self.get_id(), self.get_name(), self.is_active(), self.is_user(), self.is_admin())
return "User(id=%s,name=%s,active=%r,user=%r,admin=%r)" % (self.get_id(), self.get_name(), bool(self.is_active), bool(self.is_user), bool(self.is_admin))
class AnonymousUser(AnonymousUserMixin):
@property
def is_anonymous(self):
return FlaskLoginMethodReplacedByBooleanProperty("is_anonymous", lambda: True)
@property
def is_authenticated(self):
return FlaskLoginMethodReplacedByBooleanProperty("is_authenticated", lambda: False)
@property
def is_active(self):
return FlaskLoginMethodReplacedByBooleanProperty("is_active", lambda: False)
class SessionUser(User):
def __init__(self, user):
@ -535,7 +621,7 @@ class SessionUser(User):
self._user = user
def __repr__(self):
return "SessionUser(id=%s,name=%s,active=%r,user=%r,admin=%r,session=%s,created=%s)" % (self.get_id(), self.get_name(), self.is_active(), self.is_user(), self.is_admin(), self._session, self._created)
return "SessionUser(id=%s,name=%s,active=%r,user=%r,admin=%r,session=%s,created=%s)" % (self.get_id(), self.get_name(), bool(self.is_active), bool(self.is_user), bool(self.is_admin), self._session, self._created)
##~~ DummyUser object to use when accessControl is disabled

View file

@ -147,6 +147,7 @@ def serialList():
+ glob.glob("/dev/tty.usb*") \
+ glob.glob("/dev/cu.*") \
+ glob.glob("/dev/cuaU*") \
+ glob.glob("/dev/ttyS*") \
+ glob.glob("/dev/rfcomm*")
additionalPorts = settings().get(["serial", "additionalPorts"])
@ -1569,7 +1570,7 @@ class MachineCom(object):
def _poll_temperature(self):
"""
Polls the temperature after the temperature timeout, re-enqueues itself.
Polls the temperature.
If the printer is not operational, closing the connection, not printing from sd, busy with a long running
command or heating, no poll will be done.
@ -1580,7 +1581,7 @@ class MachineCom(object):
def _poll_sd_status(self):
"""
Polls the sd printing status after the sd status timeout, re-enqueues itself.
Polls the sd printing status.
If the printer is not operational, closing the connection, not printing from sd, busy with a long running
command or heating, no poll will be done.