generated from nighthawkcoders/flask_portfolio
-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathmain.py
275 lines (220 loc) · 9.11 KB
/
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
# imports from flask
from datetime import datetime
from urllib.parse import urljoin, urlparse
from flask import abort, redirect, render_template, request, send_from_directory, url_for, jsonify, current_app, g # import render_template from "public" flask libraries
from flask_login import current_user, login_user, logout_user
from flask.cli import AppGroup
from flask_login import current_user, login_required
from flask import current_app
from werkzeug.security import generate_password_hash
from dotenv import load_dotenv
from api.jwt_authorize import token_required
# import "objects" from "this" project
from __init__ import app, db, login_manager # Key Flask objects
# API endpoints
from api.user import user_api
from api.section import section_api
from api.pfp import pfp_api
from api.stock import stock_api
from api.analytics import analytics_api
from api.student import student_api
# database Initialization functions
from model.user import User, initUsers
from model.github import GitHubUser
from api.analytics import get_date_range
# server only Views
import os
import requests
# Load environment variables
load_dotenv()
app.config['KASM_SERVER'] = os.getenv('KASM_SERVER')
app.config['KASM_API_KEY'] = os.getenv('KASM_API_KEY')
app.config['KASM_API_KEY_SECRET'] = os.getenv('KASM_API_KEY_SECRET')
# register URIs for api endpoints
app.register_blueprint(user_api)
app.register_blueprint(section_api)
app.register_blueprint(pfp_api)
app.register_blueprint(stock_api)
app.register_blueprint(analytics_api)
app.register_blueprint(student_api)
# Tell Flask-Login the view function name of your login route
login_manager.login_view = "login"
@login_manager.unauthorized_handler
def unauthorized_callback():
return redirect(url_for('login', next=request.path))
# register URIs for server pages
@login_manager.user_loader
def load_user(user_id):
return User.query.get(int(user_id))
@app.context_processor
def inject_user():
return dict(current_user=current_user)
# Helper function to check if the URL is safe for redirects
def is_safe_url(target):
ref_url = urlparse(request.host_url)
test_url = urlparse(urljoin(request.host_url, target))
return test_url.scheme in ('http', 'https') and ref_url.netloc == test_url.netloc
@app.route('/#', methods=['GET', 'POST'])
def login():
error = None
next_page = request.args.get('next', '') or request.form.get('next', '')
if request.method == 'POST':
user = User.query.filter_by(_uid=request.form['username']).first()
if user and user.is_password(request.form['password']):
login_user(user)
if not is_safe_url(next_page):
return abort(400)
return redirect(next_page or url_for('index'))
else:
error = 'Invalid username or password.'
return render_template("login.html", error=error, next=next_page)
@app.route('/logout')
def logout():
logout_user()
return redirect(url_for('index'))
@app.errorhandler(404) # catch for URL not found
def page_not_found(e):
# note that we set the 404 status explicitly
return render_template('404.html'), 404
@app.route('/') # connects default URL to index() function
def index():
print("Home:", current_user)
return render_template("index.html")
@app.route('/users/table')
@login_required
def utable():
users = User.query.all()
return render_template("utable.html", user_data=users)
@app.route('/users/table2')
@login_required
def u2table():
users = User.query.all()
return render_template("u2table.html", user_data=users)
# Helper function to extract uploads for a user (ie PFP image)
@app.route('/uploads/<path:filename>')
def uploaded_file(filename):
return send_from_directory(current_app.config['UPLOAD_FOLDER'], filename)
@app.route('/users/delete/<int:user_id>', methods=['DELETE'])
@login_required
def delete_user(user_id):
user = User.query.get(user_id)
if user:
user.delete()
return jsonify({'message': 'User deleted successfully'}), 200
return jsonify({'error': 'User not found'}), 404
@app.route('/users/reset_password/<int:user_id>', methods=['POST'])
@login_required
def reset_password(user_id):
if current_user.role != 'Admin':
return jsonify({'error': 'Unauthorized'}), 403
user = User.query.get(user_id)
if not user:
return jsonify({'error': 'User not found'}), 404
# Set the new password
if user.update({"password": app.config['DEFAULT_PASSWORD']}):
return jsonify({'message': 'Password reset successfully'}), 200
return jsonify({'error': 'Password reset failed'}), 500
@app.route('/kasm_users')
def kasm_users():
# Fetch configuration details from environment or app config
SERVER = current_app.config.get('KASM_SERVER')
API_KEY = current_app.config.get('KASM_API_KEY')
API_KEY_SECRET = current_app.config.get('KASM_API_KEY_SECRET')
# Validate required configurations
if not SERVER or not API_KEY or not API_KEY_SECRET:
return render_template('error.html', message='KASM keys are missing'), 400
try:
# Prepare API request details
url = f"{SERVER}/api/public/get_users"
data = {
"api_key": API_KEY,
"api_key_secret": API_KEY_SECRET
}
# Perform the POST request
response = requests.post(url, json=data, timeout=10) # Added timeout for reliability
# Validate the API response
if response.status_code != 200:
return render_template(
'error.html',
message='Failed to get users',
code=response.status_code
), response.status_code
# Parse the users list from the response
users = response.json().get('users', [])
# Process `last_session` and handle potential parsing issues
for user in users:
last_session = user.get('last_session')
try:
user['last_session'] = datetime.fromisoformat(last_session) if last_session else None
except ValueError:
user['last_session'] = None # Fallback for invalid date formats
# Sort users by `last_session`, treating `None` as the oldest date
sorted_users = sorted(
users,
key=lambda x: x['last_session'] or datetime.min,
reverse=True
)
# Render the sorted users in the template
return render_template('kasm_users.html', users=sorted_users)
except requests.RequestException as e:
# Handle connection errors or other request exceptions
return render_template(
'error.html',
message=f"Error connecting to KASM API: {str(e)}"
), 500
@app.route('/delete_user/<user_id>', methods=['DELETE'])
def delete_user_kasm(user_id):
if current_user.role != 'Admin':
return jsonify({'error': 'Unauthorized'}), 403
SERVER = current_app.config.get('KASM_SERVER')
API_KEY = current_app.config.get('KASM_API_KEY')
API_KEY_SECRET = current_app.config.get('KASM_API_KEY_SECRET')
if not SERVER or not API_KEY or not API_KEY_SECRET:
return {'message': 'KASM keys are missing'}, 400
try:
# Kasm API to delete a user
url = f"{SERVER}/api/public/delete_user"
data = {
"api_key": API_KEY,
"api_key_secret": API_KEY_SECRET,
"target_user": {"user_id": user_id},
"force": False
}
response = requests.post(url, json=data)
if response.status_code == 200:
return {'message': 'User deleted successfully'}, 200
else:
return {'message': 'Failed to delete user'}, response.status_code
except requests.RequestException as e:
return {'message': 'Error connecting to KASM API', 'error': str(e)}, 500
@app.route('/update_user/<string:uid>', methods=['PUT'])
def update_user(uid):
# Authorization check
if current_user.role != 'Admin':
return jsonify({'error': 'Unauthorized'}), 403
# Get the JSON data from the request
data = request.get_json()
print(f"Request Data: {data}") # Log the incoming data
# Find the user in the database
user = User.query.filter_by(_uid=uid).first()
if user:
print(f"Found user: {user.uid}") # Log the found user's UID
# Update the user using the provided data
user.update(data) # Assuming `user.update(data)` is a method on your User model
# Save changes to the database
return jsonify({"message": "User updated successfully."}), 200
else:
print("User not found.") # Log when user is not found
return jsonify({"message": "User not found."}), 404
# Create an AppGroup for custom commands
custom_cli = AppGroup('custom', help='Custom commands')
# Define a command to run the data generation functions
@custom_cli.command('generate_data')
def generate_data():
initUsers()
# Register the custom command group with the Flask application
app.cli.add_command(custom_cli)
# this runs the flask application on the development server
if __name__ == "__main__":
# change name for testing
app.run(debug=True, host="0.0.0.0", port="8087")