X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=manifoldapi%2Fmanifoldapi.py;h=aab968b407d7f29364a7225d71c1681f7f72beba;hb=5157e8e19cbfd0a8b31fab00e75de248a7bc59e2;hp=c215b6c171de84d4bef8bba15b34adf81c5259b1;hpb=2d87b060d44dd87c762e104dd232524736ee683e;p=myslice.git diff --git a/manifoldapi/manifoldapi.py b/manifoldapi/manifoldapi.py index c215b6c1..aab968b4 100644 --- a/manifoldapi/manifoldapi.py +++ b/manifoldapi/manifoldapi.py @@ -1,37 +1,43 @@ # Manifold API Python interface import copy -import xmlrpclib import ssl +# for python3 +try: import xmlrpclib +except: import xmlrpc.client as xmlrpclib + from django.contrib import messages from django.shortcuts import redirect from manifold.core.result_value import ResultValue from manifoldresult import ManifoldResult, ManifoldCode, ManifoldException, truncate_result -from unfold.sessioncache import SessionCache - -from myslice.settings import config, logger +# being available from the outside (r2lab django web site) +try: + from myslice.settings import logger +except: + import logging + logger = logging.getLogger('manifoldapi') + class ManifoldAPI: - def __init__(self, auth=None, cainfo=None): + def __init__(self, url, auth=None, cainfo=None): + self.url = url self.auth = auth self.cainfo = cainfo self.errors = [] self.trace = [] self.calls = {} self.multicall = False - self.url = config.manifold_url() # Manifold uses a self signed certificate # https://www.python.org/dev/peps/pep-0476/ - if hasattr(ssl, '_create_unverified_context'): - self.server = xmlrpclib.Server(self.url, verbose=False, allow_none=True, - context=ssl._create_unverified_context()) - else : - self.server = xmlrpclib.Server(self.url, verbose=False, allow_none=True) + try: turn_off_server_verify = { 'context' : ssl._create_unverified_context() } + except: turn_off_server_verify = {} + self.server = xmlrpclib.Server(self.url, verbose=False, allow_none=True, + **turn_off_server_verify) # xxx temporary code for scaffolding a ManifolResult on top of an API that does not expose error info # as of march 2013 we work with an API that essentially either returns the value, or raises @@ -81,9 +87,9 @@ class ManifoldAPI: return func -def _execute_query(request, query, manifold_api_session_auth): +def _execute_query(url, request, query, manifold_api_session_auth): - manifold_api = ManifoldAPI(auth = manifold_api_session_auth) + manifold_api = ManifoldAPI(url, auth = manifold_api_session_auth) logger.debug("MANIFOLD -> QUERY : {}".format(" ".join(str(query).split()))) result = manifold_api.forward(query.to_dict()) @@ -92,8 +98,10 @@ def _execute_query(request, query, manifold_api_session_auth): # but most importantly there is a need to refine that test, since # code==2 does not necessarily mean an expired session # XXX only if we know it is the issue - SessionCache().end_session(request) + #SessionCache().end_session(request) # Flush django session + del request.session['manifold'] + request.session.flush() #raise Exception, 'Error running query: {}'.format(result) @@ -107,19 +115,31 @@ def _execute_query(request, query, manifold_api_session_auth): def execute_query(request, query): - manifold_api_session_auth = SessionCache().get_auth(request) - if not manifold_api_session_auth: + #logger.debug("EXECUTE QUERY: request - {}".format(request.session.items())) + + if not 'manifold' in request.session or not 'auth' in request.session['manifold']: + #manifold_api_session_auth = SessionCache().get_auth(request) + #if not manifold_api_session_auth: request.session.flush() #raise Exception, "User not authenticated" host = request.get_host() return redirect('/') - return _execute_query(request, query, manifold_api_session_auth) + manifold_api_session_auth = request.session['manifold']['auth'] + + from myslice.settings import config + url = config.manifold_url() + return _execute_query(url, request, query, manifold_api_session_auth) def execute_admin_query(request, query): + # xxx config + from myslice.settings import config + url = config.manifold_url() + admin_user, admin_password = config.manifold_admin_user_password() if not admin_user or not admin_password: logger.error("""CONFIG: you need to setup admin_user and admin_password in myslice.ini Some functions won't work properly until you do so""") admin_auth = {'AuthMethod': 'password', 'Username': admin_user, 'AuthString': admin_password} - return _execute_query(request, query, admin_auth) + + return _execute_query(url, request, query, admin_auth)