2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2013-04-25 15:47:34 +04:00
|
|
|
Provides an APIView class that is the base of all views in REST framework.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2013-02-05 00:55:35 +04:00
|
|
|
from __future__ import unicode_literals
|
2013-05-19 16:55:46 +04:00
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
from django.core.exceptions import PermissionDenied
|
2013-04-16 17:32:46 +04:00
|
|
|
from django.http import Http404, HttpResponse
|
2012-09-20 16:06:27 +04:00
|
|
|
from django.views.decorators.csrf import csrf_exempt
|
2013-05-19 16:55:46 +04:00
|
|
|
|
2012-09-20 20:44:34 +04:00
|
|
|
from rest_framework import status, exceptions
|
2013-04-05 00:42:26 +04:00
|
|
|
from rest_framework.compat import View
|
2013-05-19 16:55:46 +04:00
|
|
|
from rest_framework.fields import humanize_form_fields
|
2013-05-18 18:21:25 +04:00
|
|
|
from rest_framework.request import clone_request, Request
|
2013-05-19 16:55:46 +04:00
|
|
|
from rest_framework.response import Response
|
2012-09-20 16:06:27 +04:00
|
|
|
from rest_framework.settings import api_settings
|
2013-04-05 00:42:26 +04:00
|
|
|
from rest_framework.utils.formatting import get_view_name, get_view_description
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
|
2012-09-20 20:44:34 +04:00
|
|
|
class APIView(View):
|
2012-09-20 16:06:27 +04:00
|
|
|
settings = api_settings
|
|
|
|
|
2012-10-18 02:09:11 +04:00
|
|
|
renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES
|
|
|
|
parser_classes = api_settings.DEFAULT_PARSER_CLASSES
|
|
|
|
authentication_classes = api_settings.DEFAULT_AUTHENTICATION_CLASSES
|
|
|
|
throttle_classes = api_settings.DEFAULT_THROTTLE_CLASSES
|
|
|
|
permission_classes = api_settings.DEFAULT_PERMISSION_CLASSES
|
|
|
|
content_negotiation_class = api_settings.DEFAULT_CONTENT_NEGOTIATION_CLASS
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def as_view(cls, **initkwargs):
|
|
|
|
"""
|
2013-04-05 00:42:26 +04:00
|
|
|
Store the original class on the view function.
|
|
|
|
|
|
|
|
This allows us to discover information about the view when we do URL
|
|
|
|
reverse lookups. Used for breadcrumb generation.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
view = super(APIView, cls).as_view(**initkwargs)
|
2013-04-05 00:42:26 +04:00
|
|
|
view.cls = cls
|
2012-09-20 16:06:27 +04:00
|
|
|
return view
|
|
|
|
|
|
|
|
@property
|
|
|
|
def allowed_methods(self):
|
|
|
|
"""
|
2013-04-09 21:22:39 +04:00
|
|
|
Wrap Django's private `_allowed_methods` interface in a public property.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2013-04-09 21:22:39 +04:00
|
|
|
return self._allowed_methods()
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
@property
|
|
|
|
def default_response_headers(self):
|
2012-10-10 15:15:18 +04:00
|
|
|
# TODO: deprecate?
|
2012-10-05 17:48:33 +04:00
|
|
|
# TODO: Only vary by accept if multiple renderers
|
2012-09-20 16:06:27 +04:00
|
|
|
return {
|
|
|
|
'Allow': ', '.join(self.allowed_methods),
|
2012-09-20 20:44:34 +04:00
|
|
|
'Vary': 'Accept'
|
2012-09-20 16:06:27 +04:00
|
|
|
}
|
|
|
|
|
2012-10-08 17:13:15 +04:00
|
|
|
def metadata(self, request):
|
2013-05-18 18:21:25 +04:00
|
|
|
content = {
|
2013-04-05 00:42:26 +04:00
|
|
|
'name': get_view_name(self.__class__),
|
|
|
|
'description': get_view_description(self.__class__),
|
2012-10-08 17:13:15 +04:00
|
|
|
'renders': [renderer.media_type for renderer in self.renderer_classes],
|
|
|
|
'parses': [parser.media_type for parser in self.parser_classes],
|
|
|
|
}
|
2013-05-18 18:21:25 +04:00
|
|
|
action_metadata = self._generate_action_metadata(request)
|
|
|
|
if action_metadata is not None:
|
|
|
|
content['actions'] = action_metadata
|
|
|
|
|
|
|
|
return content
|
|
|
|
|
|
|
|
def _generate_action_metadata(self, request):
|
2013-05-19 16:54:16 +04:00
|
|
|
"""
|
2013-05-18 18:21:25 +04:00
|
|
|
Helper for generating the fields metadata for allowed and permitted methods.
|
2013-05-19 16:54:16 +04:00
|
|
|
"""
|
2013-05-18 18:21:25 +04:00
|
|
|
actions = {}
|
|
|
|
for method in self.allowed_methods:
|
2013-05-18 19:38:47 +04:00
|
|
|
# skip HEAD and OPTIONS
|
|
|
|
if method in ('HEAD', 'OPTIONS'):
|
|
|
|
continue
|
|
|
|
|
2013-05-18 18:21:25 +04:00
|
|
|
cloned_request = clone_request(request, method)
|
|
|
|
try:
|
|
|
|
self.check_permissions(cloned_request)
|
|
|
|
|
2013-05-19 13:37:12 +04:00
|
|
|
# TODO: discuss whether and how to expose parameters like e.g. filter or paginate
|
|
|
|
if method in ('GET', 'DELETE'):
|
|
|
|
actions[method] = {}
|
|
|
|
continue
|
|
|
|
|
2013-05-19 13:29:41 +04:00
|
|
|
if not hasattr(self, 'get_serializer'):
|
|
|
|
continue
|
2013-05-18 18:21:25 +04:00
|
|
|
serializer = self.get_serializer()
|
|
|
|
if serializer is not None:
|
2013-05-19 16:55:46 +04:00
|
|
|
actions[method] = humanize_form_fields(serializer)
|
2013-05-18 19:10:13 +04:00
|
|
|
except exceptions.PermissionDenied:
|
|
|
|
# don't add this method
|
|
|
|
pass
|
|
|
|
except exceptions.NotAuthenticated:
|
2013-05-18 18:21:25 +04:00
|
|
|
# don't add this method
|
|
|
|
pass
|
|
|
|
|
|
|
|
return actions if len(actions) > 0 else None
|
2012-10-08 17:13:15 +04:00
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
def http_method_not_allowed(self, request, *args, **kwargs):
|
|
|
|
"""
|
2013-04-09 21:22:39 +04:00
|
|
|
If `request.method` does not correspond to a handler method,
|
|
|
|
determine what kind of exception to raise.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
raise exceptions.MethodNotAllowed(request.method)
|
|
|
|
|
|
|
|
def permission_denied(self, request):
|
|
|
|
"""
|
|
|
|
If request is not permitted, determine what kind of exception to raise.
|
|
|
|
"""
|
2013-01-22 01:29:49 +04:00
|
|
|
if not self.request.successful_authenticator:
|
2012-11-13 15:27:09 +04:00
|
|
|
raise exceptions.NotAuthenticated()
|
2012-09-20 16:06:27 +04:00
|
|
|
raise exceptions.PermissionDenied()
|
|
|
|
|
|
|
|
def throttled(self, request, wait):
|
|
|
|
"""
|
|
|
|
If request is throttled, determine what kind of exception to raise.
|
|
|
|
"""
|
|
|
|
raise exceptions.Throttled(wait)
|
|
|
|
|
2013-01-22 01:29:49 +04:00
|
|
|
def get_authenticate_header(self, request):
|
|
|
|
"""
|
|
|
|
If a request is unauthenticated, determine the WWW-Authenticate
|
|
|
|
header to use for 401 responses, if any.
|
|
|
|
"""
|
|
|
|
authenticators = self.get_authenticators()
|
|
|
|
if authenticators:
|
|
|
|
return authenticators[0].authenticate_header(request)
|
|
|
|
|
2012-10-15 17:03:36 +04:00
|
|
|
def get_parser_context(self, http_request):
|
2012-10-15 16:27:50 +04:00
|
|
|
"""
|
2012-10-18 01:07:56 +04:00
|
|
|
Returns a dict that is passed through to Parser.parse(),
|
2012-10-15 16:27:50 +04:00
|
|
|
as the `parser_context` keyword argument.
|
|
|
|
"""
|
2012-10-18 01:19:59 +04:00
|
|
|
# Note: Additionally `request` will also be added to the context
|
|
|
|
# by the Request object.
|
2012-10-15 16:27:50 +04:00
|
|
|
return {
|
2012-10-18 01:19:59 +04:00
|
|
|
'view': self,
|
|
|
|
'args': getattr(self, 'args', ()),
|
|
|
|
'kwargs': getattr(self, 'kwargs', {})
|
2012-10-15 16:27:50 +04:00
|
|
|
}
|
|
|
|
|
2012-10-10 15:15:18 +04:00
|
|
|
def get_renderer_context(self):
|
|
|
|
"""
|
2012-10-15 16:27:50 +04:00
|
|
|
Returns a dict that is passed through to Renderer.render(),
|
2012-10-10 15:15:18 +04:00
|
|
|
as the `renderer_context` keyword argument.
|
|
|
|
"""
|
2012-10-18 01:19:59 +04:00
|
|
|
# Note: Additionally 'response' will also be added to the context,
|
2012-10-10 15:15:18 +04:00
|
|
|
# by the Response object.
|
|
|
|
return {
|
|
|
|
'view': self,
|
2012-10-18 01:19:59 +04:00
|
|
|
'args': getattr(self, 'args', ()),
|
|
|
|
'kwargs': getattr(self, 'kwargs', {}),
|
|
|
|
'request': getattr(self, 'request', None)
|
2012-10-10 15:15:18 +04:00
|
|
|
}
|
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
# API policy instantiation methods
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
def get_format_suffix(self, **kwargs):
|
|
|
|
"""
|
|
|
|
Determine if the request includes a '.json' style format suffix
|
|
|
|
"""
|
|
|
|
if self.settings.FORMAT_SUFFIX_KWARG:
|
|
|
|
return kwargs.get(self.settings.FORMAT_SUFFIX_KWARG)
|
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
def get_renderers(self):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Instantiates and returns the list of renderers that this view can use.
|
|
|
|
"""
|
2012-10-10 15:15:18 +04:00
|
|
|
return [renderer() for renderer in self.renderer_classes]
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
def get_parsers(self):
|
|
|
|
"""
|
2013-02-20 12:46:00 +04:00
|
|
|
Instantiates and returns the list of parsers that this view can use.
|
2012-10-05 17:48:33 +04:00
|
|
|
"""
|
|
|
|
return [parser() for parser in self.parser_classes]
|
|
|
|
|
|
|
|
def get_authenticators(self):
|
|
|
|
"""
|
2013-02-20 12:46:00 +04:00
|
|
|
Instantiates and returns the list of authenticators that this view can use.
|
2012-10-05 17:48:33 +04:00
|
|
|
"""
|
|
|
|
return [auth() for auth in self.authentication_classes]
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
def get_permissions(self):
|
|
|
|
"""
|
|
|
|
Instantiates and returns the list of permissions that this view requires.
|
|
|
|
"""
|
2012-10-10 13:02:37 +04:00
|
|
|
return [permission() for permission in self.permission_classes]
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
def get_throttles(self):
|
|
|
|
"""
|
2012-10-30 03:30:52 +04:00
|
|
|
Instantiates and returns the list of throttles that this view uses.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2012-10-10 13:02:37 +04:00
|
|
|
return [throttle() for throttle in self.throttle_classes]
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2012-10-05 17:22:02 +04:00
|
|
|
def get_content_negotiator(self):
|
|
|
|
"""
|
|
|
|
Instantiate and return the content negotiation class to use.
|
|
|
|
"""
|
2012-10-05 17:48:33 +04:00
|
|
|
if not getattr(self, '_negotiator', None):
|
|
|
|
self._negotiator = self.content_negotiation_class()
|
|
|
|
return self._negotiator
|
|
|
|
|
|
|
|
# API policy implementation methods
|
2012-10-05 17:22:02 +04:00
|
|
|
|
2012-09-21 16:12:10 +04:00
|
|
|
def perform_content_negotiation(self, request, force=False):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Determine which renderer and media type to use render the response.
|
|
|
|
"""
|
|
|
|
renderers = self.get_renderers()
|
2012-10-05 17:22:02 +04:00
|
|
|
conneg = self.get_content_negotiator()
|
2012-10-18 01:58:18 +04:00
|
|
|
|
|
|
|
try:
|
|
|
|
return conneg.select_renderer(request, renderers, self.format_kwarg)
|
2013-02-06 17:05:17 +04:00
|
|
|
except Exception:
|
2012-10-18 01:58:18 +04:00
|
|
|
if force:
|
|
|
|
return (renderers[0], renderers[0].media_type)
|
|
|
|
raise
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2013-02-28 21:58:58 +04:00
|
|
|
def perform_authentication(self, request):
|
|
|
|
"""
|
|
|
|
Perform authentication on the incoming request.
|
|
|
|
|
|
|
|
Note that if you override this and simply 'pass', then authentication
|
|
|
|
will instead be performed lazily, the first time either
|
|
|
|
`request.user` or `request.auth` is accessed.
|
|
|
|
"""
|
|
|
|
request.user
|
|
|
|
|
2013-02-11 17:02:20 +04:00
|
|
|
def check_permissions(self, request):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2013-02-11 17:02:20 +04:00
|
|
|
Check if the request should be permitted.
|
|
|
|
Raises an appropriate exception if the request is not permitted.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2013-02-11 16:47:56 +04:00
|
|
|
for permission in self.get_permissions():
|
|
|
|
if not permission.has_permission(request, self):
|
2013-02-11 17:02:20 +04:00
|
|
|
self.permission_denied(request)
|
2013-02-11 16:47:56 +04:00
|
|
|
|
2013-02-11 17:02:20 +04:00
|
|
|
def check_object_permissions(self, request, obj):
|
2013-02-11 16:47:56 +04:00
|
|
|
"""
|
2013-02-11 17:02:20 +04:00
|
|
|
Check if the request should be permitted for a given object.
|
|
|
|
Raises an appropriate exception if the request is not permitted.
|
2013-02-11 16:47:56 +04:00
|
|
|
"""
|
2012-09-20 16:06:27 +04:00
|
|
|
for permission in self.get_permissions():
|
2013-02-11 16:47:56 +04:00
|
|
|
if not permission.has_object_permission(request, self, obj):
|
2013-02-11 17:02:20 +04:00
|
|
|
self.permission_denied(request)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
def check_throttles(self, request):
|
|
|
|
"""
|
|
|
|
Check if request should be throttled.
|
2013-02-11 17:02:20 +04:00
|
|
|
Raises an appropriate exception if the request is throttled.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
for throttle in self.get_throttles():
|
2012-10-10 13:02:37 +04:00
|
|
|
if not throttle.allow_request(request, self):
|
2012-09-20 16:06:27 +04:00
|
|
|
self.throttled(request, throttle.wait())
|
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
# Dispatch methods
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
def initialize_request(self, request, *args, **kargs):
|
|
|
|
"""
|
|
|
|
Returns the initial request object.
|
|
|
|
"""
|
2012-10-15 16:27:50 +04:00
|
|
|
parser_context = self.get_parser_context(request)
|
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
return Request(request,
|
|
|
|
parsers=self.get_parsers(),
|
|
|
|
authenticators=self.get_authenticators(),
|
2012-10-15 16:27:50 +04:00
|
|
|
negotiator=self.get_content_negotiator(),
|
|
|
|
parser_context=parser_context)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
def initial(self, request, *args, **kwargs):
|
|
|
|
"""
|
2012-10-05 17:48:33 +04:00
|
|
|
Runs anything that needs to occur prior to calling the method handler.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
2012-10-05 17:22:02 +04:00
|
|
|
self.format_kwarg = self.get_format_suffix(**kwargs)
|
2012-10-05 13:33:44 +04:00
|
|
|
|
2012-10-05 17:48:33 +04:00
|
|
|
# Ensure that the incoming request is permitted
|
2013-02-28 21:58:58 +04:00
|
|
|
self.perform_authentication(request)
|
2013-02-11 17:02:20 +04:00
|
|
|
self.check_permissions(request)
|
2012-09-20 16:06:27 +04:00
|
|
|
self.check_throttles(request)
|
2012-10-05 13:33:44 +04:00
|
|
|
|
|
|
|
# Perform content negotiation and store the accepted info on the request
|
|
|
|
neg = self.perform_content_negotiation(request)
|
|
|
|
request.accepted_renderer, request.accepted_media_type = neg
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
def finalize_response(self, request, response, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
Returns the final response object.
|
|
|
|
"""
|
2013-04-16 17:32:46 +04:00
|
|
|
# Make the error obvious if a proper response is not returned
|
|
|
|
assert isinstance(response, HttpResponse), (
|
|
|
|
'Expected a `Response` to be returned from the view, '
|
|
|
|
'but received a `%s`' % type(response)
|
|
|
|
)
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
if isinstance(response, Response):
|
2012-10-05 13:33:44 +04:00
|
|
|
if not getattr(request, 'accepted_renderer', None):
|
|
|
|
neg = self.perform_content_negotiation(request, force=True)
|
|
|
|
request.accepted_renderer, request.accepted_media_type = neg
|
|
|
|
|
|
|
|
response.accepted_renderer = request.accepted_renderer
|
|
|
|
response.accepted_media_type = request.accepted_media_type
|
2012-10-10 15:15:18 +04:00
|
|
|
response.renderer_context = self.get_renderer_context()
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
for key, value in self.headers.items():
|
|
|
|
response[key] = value
|
|
|
|
|
|
|
|
return response
|
|
|
|
|
|
|
|
def handle_exception(self, exc):
|
|
|
|
"""
|
|
|
|
Handle any exception that occurs, by returning an appropriate response,
|
|
|
|
or re-raising the error.
|
|
|
|
"""
|
|
|
|
if isinstance(exc, exceptions.Throttled):
|
|
|
|
# Throttle wait header
|
|
|
|
self.headers['X-Throttle-Wait-Seconds'] = '%d' % exc.wait
|
|
|
|
|
2013-01-22 01:29:49 +04:00
|
|
|
if isinstance(exc, (exceptions.NotAuthenticated,
|
|
|
|
exceptions.AuthenticationFailed)):
|
|
|
|
# WWW-Authenticate header for 401 responses, else coerce to 403
|
|
|
|
auth_header = self.get_authenticate_header(self.request)
|
|
|
|
|
|
|
|
if auth_header:
|
|
|
|
self.headers['WWW-Authenticate'] = auth_header
|
|
|
|
else:
|
|
|
|
exc.status_code = status.HTTP_403_FORBIDDEN
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
if isinstance(exc, exceptions.APIException):
|
2012-11-06 14:44:19 +04:00
|
|
|
return Response({'detail': exc.detail},
|
|
|
|
status=exc.status_code,
|
|
|
|
exception=True)
|
2012-09-20 16:06:27 +04:00
|
|
|
elif isinstance(exc, Http404):
|
|
|
|
return Response({'detail': 'Not found'},
|
2012-11-06 14:44:19 +04:00
|
|
|
status=status.HTTP_404_NOT_FOUND,
|
|
|
|
exception=True)
|
2012-09-20 16:06:27 +04:00
|
|
|
elif isinstance(exc, PermissionDenied):
|
|
|
|
return Response({'detail': 'Permission denied'},
|
2012-11-06 14:44:19 +04:00
|
|
|
status=status.HTTP_403_FORBIDDEN,
|
|
|
|
exception=True)
|
2012-09-20 16:06:27 +04:00
|
|
|
raise
|
|
|
|
|
|
|
|
# Note: session based authentication is explicitly CSRF validated,
|
|
|
|
# all other authentication is CSRF exempt.
|
|
|
|
@csrf_exempt
|
|
|
|
def dispatch(self, request, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
`.dispatch()` is pretty much the same as Django's regular dispatch,
|
|
|
|
but with extra hooks for startup, finalize, and exception handling.
|
|
|
|
"""
|
|
|
|
request = self.initialize_request(request, *args, **kwargs)
|
|
|
|
self.request = request
|
|
|
|
self.args = args
|
|
|
|
self.kwargs = kwargs
|
2012-10-10 15:15:18 +04:00
|
|
|
self.headers = self.default_response_headers # deprecate?
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
try:
|
|
|
|
self.initial(request, *args, **kwargs)
|
|
|
|
|
|
|
|
# Get the appropriate handler method
|
|
|
|
if request.method.lower() in self.http_method_names:
|
|
|
|
handler = getattr(self, request.method.lower(),
|
|
|
|
self.http_method_not_allowed)
|
|
|
|
else:
|
|
|
|
handler = self.http_method_not_allowed
|
|
|
|
|
|
|
|
response = handler(request, *args, **kwargs)
|
|
|
|
|
|
|
|
except Exception as exc:
|
|
|
|
response = self.handle_exception(exc)
|
|
|
|
|
|
|
|
self.response = self.finalize_response(request, response, *args, **kwargs)
|
|
|
|
return self.response
|
2012-10-08 17:13:15 +04:00
|
|
|
|
|
|
|
def options(self, request, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
Handler method for HTTP 'OPTIONS' request.
|
|
|
|
We may as well implement this as Django will otherwise provide
|
|
|
|
a less useful default implementation.
|
|
|
|
"""
|
|
|
|
return Response(self.metadata(request), status=status.HTTP_200_OK)
|