Merge pull request #2344 from macneiln/master
Add hash_extension functionality to URLs
This commit is contained in:
@@ -190,7 +190,8 @@ def URL(a=None,
|
||||
port=None,
|
||||
encode_embedded_slash=False,
|
||||
url_encode=True,
|
||||
language=None
|
||||
language=None,
|
||||
hash_extension=True
|
||||
):
|
||||
"""
|
||||
generates a url '/a/c/f' corresponding to application a, controller c
|
||||
@@ -339,7 +340,8 @@ def URL(a=None,
|
||||
if '.' in function:
|
||||
function, extension = function.rsplit('.', 1)
|
||||
|
||||
function2 = '%s.%s' % (function, extension or 'html')
|
||||
# only include the extension as part of the variables for the hash if requested
|
||||
function2 = '%s.%s' % (function, extension or 'html') if hash_extension else function
|
||||
|
||||
if not (application and controller and function):
|
||||
raise SyntaxError('not enough information to build the url (%s %s %s)' % (application, controller, function))
|
||||
@@ -416,7 +418,7 @@ def URL(a=None,
|
||||
return url
|
||||
|
||||
|
||||
def verifyURL(request, hmac_key=None, hash_vars=True, salt=None, user_signature=None):
|
||||
def verifyURL(request, hmac_key=None, hash_vars=True, salt=None, user_signature=None, hash_extension=True):
|
||||
"""
|
||||
Verifies that a request's args & vars have not been tampered with by the user
|
||||
|
||||
@@ -477,10 +479,19 @@ def verifyURL(request, hmac_key=None, hash_vars=True, salt=None, user_signature=
|
||||
|
||||
# always include all of the args
|
||||
other = args and urllib_quote('/' + '/'.join([str(x) for x in args])) or ''
|
||||
h_args = '/%s/%s/%s.%s%s' % (request.application,
|
||||
|
||||
# decide whether the extension should be part of the hash verification
|
||||
h_extension = request.extension if hash_extension else ''
|
||||
|
||||
# only add a period to the extension when it exists otherwise empty
|
||||
# extensions will fail to validate
|
||||
if h_extension:
|
||||
h_extension = '.%s' % (h_extension)
|
||||
|
||||
h_args = '/%s/%s/%s%s%s' % (request.application,
|
||||
request.controller,
|
||||
request.function,
|
||||
request.extension,
|
||||
h_extension,
|
||||
other)
|
||||
|
||||
# but only include those vars specified (allows more flexibility for use with
|
||||
|
||||
@@ -3930,7 +3930,7 @@ class Auth(AuthAPI):
|
||||
return self.has_permission(name, table_name, record_id)
|
||||
return self.requires(has_permission, otherwise=otherwise)
|
||||
|
||||
def requires_signature(self, otherwise=None, hash_vars=True):
|
||||
def requires_signature(self, otherwise=None, hash_vars=True, hash_extension=True):
|
||||
"""
|
||||
Decorator that prevents access to action if not logged in or
|
||||
if user logged in is not a member of group_id.
|
||||
@@ -3938,7 +3938,7 @@ class Auth(AuthAPI):
|
||||
group_id is calculated.
|
||||
"""
|
||||
def verify():
|
||||
return URL.verify(current.request, user_signature=True, hash_vars=hash_vars)
|
||||
return URL.verify(current.request, user_signature=True, hash_vars=hash_vars, hash_extension=True)
|
||||
return self.requires(verify, otherwise)
|
||||
|
||||
def accessible_query(self, name, table, user_id=None):
|
||||
|
||||
Reference in New Issue
Block a user