mirror of
https://github.com/quay/quay.git
synced 2025-11-19 10:22:20 +03:00
* Convert all Python2 to Python3 syntax. * Removes oauth2lib dependency * Replace mockredis with fakeredis * byte/str conversions * Removes nonexisting __nonzero__ in Python3 * Python3 Dockerfile and related * [PROJQUAY-98] Replace resumablehashlib with rehash * PROJQUAY-123 - replace gpgme with python3-gpg * [PROJQUAY-135] Fix unhashable class error * Update external dependencies for Python 3 - Move github.com/app-registry/appr to github.com/quay/appr - github.com/coderanger/supervisor-stdout - github.com/DevTable/container-cloud-config - Update to latest mockldap with changes applied from coreos/mockldap - Update dependencies in requirements.txt and requirements-dev.txt * Default FLOAT_REPR function to str in json encoder and removes keyword assignment True, False, and str were not keywords in Python2... * [PROJQUAY-165] Replace package `bencode` with `bencode.py` - Bencode is not compatible with Python 3.x and is no longer maintained. Bencode.py appears to be a drop-in replacement/fork that is compatible with Python 3. * Make sure monkey.patch is called before anything else ( * Removes anunidecode dependency and replaces it with text_unidecode * Base64 encode/decode pickle dumps/loads when storing value in DB Base64 encodes/decodes the serialized values when storing them in the DB. Also make sure to return a Python3 string instead of a Bytes when coercing for db, otherwise, Postgres' TEXT field will convert it into a hex representation when storing the value. * Implement __hash__ on Digest class In Python 3, if a class defines __eq__() but not __hash__(), its instances will not be usable as items in hashable collections (e.g sets). * Remove basestring check * Fix expected message in credentials tests * Fix usage of Cryptography.Fernet for Python3 (#219) - Specifically, this addresses the issue where Byte<->String conversions weren't being applied correctly. * Fix utils - tar+stream layer format utils - filelike util * Fix storage tests * Fix endpoint tests * Fix workers tests * Fix docker's empty layer bytes * Fix registry tests * Appr * Enable CI for Python 3.6 * Skip buildman tests Skip buildman tests while it's being rewritten to allow ci to pass. * Install swig for CI * Update expected exception type in redis validation test * Fix gpg signing calls Fix gpg calls for updated gpg wrapper, and add signing tests. * Convert / to // for Python3 integer division * WIP: Update buildman to use asyncio instead of trollius. This dependency is considered deprecated/abandoned and was only used as an implementation/backport of asyncio on Python 2.x This is a work in progress, and is included in the PR just to get the rest of the tests passing. The builder is actually being rewritten. * Target Python 3.8 * Removes unused files - Removes unused files that were added accidentally while rebasing - Small fixes/cleanup - TODO tasks comments * Add TODO to verify rehash backward compat with resumablehashlib * Revert "[PROJQUAY-135] Fix unhashable class error" and implements __hash__ instead. This reverts commit 735e38e3c1d072bf50ea864bc7e119a55d3a8976. Instead, defines __hash__ for encryped fields class, using the parent field's implementation. * Remove some unused files ad imports Co-authored-by: Kenny Lee Sin Cheong <kenny.lee@redhat.com> Co-authored-by: Tom McKay <thomasmckay@redhat.com>
114 lines
3.2 KiB
Python
114 lines
3.2 KiB
Python
import string
|
|
import re
|
|
import json
|
|
|
|
from text_unidecode import unidecode
|
|
|
|
from peewee import OperationalError
|
|
|
|
INVALID_PASSWORD_MESSAGE = (
|
|
"Invalid password, password must be at least " + "8 characters and contain no whitespace."
|
|
)
|
|
VALID_CHARACTERS = string.digits + string.ascii_lowercase
|
|
|
|
MIN_USERNAME_LENGTH = 2
|
|
MAX_USERNAME_LENGTH = 255
|
|
|
|
VALID_LABEL_KEY_REGEX = r"^[a-z0-9](([a-z0-9]|[-.](?![.-]))*[a-z0-9])?$"
|
|
VALID_USERNAME_REGEX = r"^([a-z0-9]+(?:[._-][a-z0-9]+)*)$"
|
|
VALID_SERVICE_KEY_NAME_REGEX = r"^[\s a-zA-Z0-9\-_:/]*$"
|
|
|
|
INVALID_USERNAME_CHARACTERS = r"[^a-z0-9_]"
|
|
|
|
|
|
def validate_label_key(label_key):
|
|
if len(label_key) > 255:
|
|
return False
|
|
|
|
return bool(re.match(VALID_LABEL_KEY_REGEX, label_key))
|
|
|
|
|
|
def validate_email(email_address):
|
|
if not email_address:
|
|
return False
|
|
|
|
return bool(re.match(r"[^@]+@[^@]+\.[^@]+", email_address))
|
|
|
|
|
|
def validate_username(username):
|
|
# Based off the restrictions defined in the Docker Registry API spec
|
|
if not re.match(VALID_USERNAME_REGEX, username):
|
|
return (False, "Namespace must match expression " + VALID_USERNAME_REGEX)
|
|
|
|
length_match = len(username) >= MIN_USERNAME_LENGTH and len(username) <= MAX_USERNAME_LENGTH
|
|
if not length_match:
|
|
return (
|
|
False,
|
|
"Namespace must be between %s and %s characters in length"
|
|
% (MIN_USERNAME_LENGTH, MAX_USERNAME_LENGTH),
|
|
)
|
|
|
|
return (True, "")
|
|
|
|
|
|
def validate_password(password):
|
|
# No whitespace and minimum length of 8
|
|
if re.search(r"\s", password):
|
|
return False
|
|
return len(password) > 7
|
|
|
|
|
|
def _gen_filler_chars(num_filler_chars):
|
|
if num_filler_chars == 0:
|
|
yield ""
|
|
else:
|
|
for char in VALID_CHARACTERS:
|
|
for suffix in _gen_filler_chars(num_filler_chars - 1):
|
|
yield char + suffix
|
|
|
|
|
|
def generate_valid_usernames(input_username):
|
|
normalized = unidecode(input_username).strip().lower()
|
|
prefix = re.sub(INVALID_USERNAME_CHARACTERS, "_", normalized)[:MAX_USERNAME_LENGTH]
|
|
prefix = re.sub(r"_{2,}", "_", prefix)
|
|
|
|
if prefix.endswith("_"):
|
|
prefix = prefix[0 : len(prefix) - 1]
|
|
|
|
while prefix.startswith("_"):
|
|
prefix = prefix[1:]
|
|
|
|
num_filler_chars = max(0, MIN_USERNAME_LENGTH - len(prefix))
|
|
|
|
while num_filler_chars + len(prefix) <= MAX_USERNAME_LENGTH:
|
|
for suffix in _gen_filler_chars(num_filler_chars):
|
|
yield prefix + suffix
|
|
num_filler_chars += 1
|
|
|
|
|
|
def is_json(value):
|
|
if (value.startswith("{") and value.endswith("}")) or (
|
|
value.startswith("[") and value.endswith("]")
|
|
):
|
|
try:
|
|
json.loads(value)
|
|
return True
|
|
except (TypeError, ValueError):
|
|
return False
|
|
return False
|
|
|
|
|
|
def validate_postgres_precondition(driver):
|
|
cursor = driver.execute_sql("SELECT extname FROM pg_extension", ("public",))
|
|
if "pg_trgm" not in [extname for extname, in cursor.fetchall()]:
|
|
raise OperationalError(
|
|
"""
|
|
"pg_trgm" extension does not exists in the database.
|
|
Please run `CREATE EXTENSION IF NOT EXISTS pg_trgm;` as superuser on this database.
|
|
"""
|
|
)
|
|
|
|
|
|
def validate_service_key_name(name):
|
|
return name is None or bool(re.match(VALID_SERVICE_KEY_NAME_REGEX, name))
|