Serialise service, API keys and permissions

By serialising these straight away we can:
- not go back to the database later, potentially closing the connection
  sooner
- potentially cache the serialised data, meaning we don’t touch the
  database at all
This commit is contained in:
Chris Hill-Scott
2020-06-22 11:10:10 +01:00
parent d7b2cc6403
commit 320bca70f7
11 changed files with 113 additions and 24 deletions

View File

@@ -8,7 +8,7 @@ from sqlalchemy.exc import DataError
from sqlalchemy.orm.exc import NoResultFound from sqlalchemy.orm.exc import NoResultFound
from gds_metrics import Histogram from gds_metrics import Histogram
from app.dao.services_dao import dao_fetch_service_by_id_with_api_keys from app.serialised_models import SerialisedService
GENERAL_TOKEN_ERROR_MESSAGE = 'Invalid token: make sure your API token matches the example at https://docs.notifications.service.gov.uk/rest-api.html#authorisation-header' # noqa GENERAL_TOKEN_ERROR_MESSAGE = 'Invalid token: make sure your API token matches the example at https://docs.notifications.service.gov.uk/rest-api.html#authorisation-header' # noqa
@@ -94,7 +94,7 @@ def requires_auth():
try: try:
with AUTH_DB_CONNECTION_DURATION_SECONDS.time(): with AUTH_DB_CONNECTION_DURATION_SECONDS.time():
service = dao_fetch_service_by_id_with_api_keys(issuer) service = SerialisedService.from_id(issuer)
except DataError: except DataError:
raise AuthError("Invalid token: service id is not the right data type", 403) raise AuthError("Invalid token: service id is not the right data type", 403)
except NoResultFound: except NoResultFound:
@@ -129,7 +129,7 @@ def requires_auth():
if api_key.expiry_date: if api_key.expiry_date:
raise AuthError("Invalid token: API key revoked", 403, service_id=service.id, api_key_id=api_key.id) raise AuthError("Invalid token: API key revoked", 403, service_id=service.id, api_key_id=api_key.id)
g.service_id = api_key.service_id g.service_id = service.id
_request_ctx_stack.top.authenticated_service = service _request_ctx_stack.top.authenticated_service = service
_request_ctx_stack.top.api_user = api_key _request_ctx_stack.top.api_user = api_key

View File

@@ -123,7 +123,6 @@ def persist_notification(
template_version=template_version, template_version=template_version,
to=recipient, to=recipient,
service_id=service.id, service_id=service.id,
service=service,
personalisation=personalisation, personalisation=personalisation,
notification_type=notification_type, notification_type=notification_type,
api_key_id=api_key_id, api_key_id=api_key_id,

View File

@@ -90,7 +90,7 @@ def service_can_send_to_recipient(send_to, key_type, service, allow_whitelisted_
def service_has_permission(notify_type, permissions): def service_has_permission(notify_type, permissions):
return notify_type in [p.permission for p in permissions] return notify_type in permissions
def check_service_has_permission(notify_type, permissions): def check_service_has_permission(notify_type, permissions):
@@ -137,7 +137,7 @@ def check_if_service_can_send_to_number(service, number):
if ( if (
# if number is international and not a crown dependency # if number is international and not a crown dependency
international_phone_info.international and not international_phone_info.crown_dependency international_phone_info.international and not international_phone_info.crown_dependency
) and INTERNATIONAL_SMS_TYPE not in [p.permission for p in service.permissions]: ) and INTERNATIONAL_SMS_TYPE not in service.permissions:
raise BadRequestError(message="Cannot send to international mobile numbers") raise BadRequestError(message="Cannot send to international mobile numbers")
else: else:
return international_phone_info return international_phone_info

View File

@@ -5,9 +5,13 @@ from threading import RLock
import cachetools import cachetools
from notifications_utils.clients.redis import RequestCache from notifications_utils.clients.redis import RequestCache
from werkzeug.utils import cached_property
from app import redis_store from app import redis_store
from app.dao import templates_dao from app.dao import templates_dao
from app.dao.api_key_dao import get_model_api_keys
from app.dao.services_dao import dao_fetch_service_by_id
caches = defaultdict(partial(cachetools.TTLCache, maxsize=1024, ttl=2)) caches = defaultdict(partial(cachetools.TTLCache, maxsize=1024, ttl=2))
locks = defaultdict(RLock) locks = defaultdict(RLock)
@@ -53,6 +57,29 @@ class SerialisedModel(ABC):
return super().__dir__() + list(sorted(self.ALLOWED_PROPERTIES)) return super().__dir__() + list(sorted(self.ALLOWED_PROPERTIES))
class SerialisedModelCollection(ABC):
"""
A SerialisedModelCollection takes a list of dictionaries, typically
created by serialising database objects. When iterated over it
returns a SerialisedModel instance for each of the items in the list.
"""
@property
@abstractmethod
def model(self):
pass
def __init__(self, items):
self.items = items
def __bool__(self):
return bool(self.items)
def __getitem__(self, index):
return self.model(self.items[index])
class SerialisedTemplate(SerialisedModel): class SerialisedTemplate(SerialisedModel):
ALLOWED_PROPERTIES = { ALLOWED_PROPERTIES = {
'archived', 'archived',
@@ -84,3 +111,49 @@ class SerialisedTemplate(SerialisedModel):
template_dict = template_schema.dump(fetched_template).data template_dict = template_schema.dump(fetched_template).data
return {'data': template_dict} return {'data': template_dict}
class SerialisedService(SerialisedModel):
ALLOWED_PROPERTIES = {
'id',
'active',
'contact_link',
'email_from',
'permissions',
'research_mode',
'restricted',
}
@classmethod
def from_id(cls, service_id):
return cls(cls.get_dict(service_id))
@staticmethod
def get_dict(service_id):
from app.schemas import service_schema
return service_schema.dump(dao_fetch_service_by_id(service_id)).data
@cached_property
def api_keys(self):
return SerialisedAPIKeyCollection.from_service_id(self.id)
class SerialisedAPIKey(SerialisedModel):
ALLOWED_PROPERTIES = {
'id',
'secret',
'expiry_date',
'key_type',
}
class SerialisedAPIKeyCollection(SerialisedModelCollection):
model = SerialisedAPIKey
@classmethod
def from_service_id(cls, service_id):
return cls([
{k: getattr(key, k) for k in SerialisedAPIKey.ALLOWED_PROPERTIES}
for key in get_model_api_keys(service_id)
])

View File

@@ -137,7 +137,9 @@ def get_reply_to_text(notification_type, sender_id, service, template):
def send_pdf_letter_notification(service_id, post_data): def send_pdf_letter_notification(service_id, post_data):
service = dao_fetch_service_by_id(service_id) service = dao_fetch_service_by_id(service_id)
check_service_has_permission(LETTER_TYPE, service.permissions) check_service_has_permission(LETTER_TYPE, [
p.permission for p in service.permissions
])
check_service_over_daily_message_limit(KEY_TYPE_NORMAL, service) check_service_over_daily_message_limit(KEY_TYPE_NORMAL, service)
validate_created_by(service, post_data['created_by']) validate_created_by(service, post_data['created_by'])
validate_and_format_recipient( validate_and_format_recipient(

View File

@@ -7,6 +7,8 @@ from app.models import (
MOBILE_TYPE, EMAIL_TYPE, MOBILE_TYPE, EMAIL_TYPE,
KEY_TYPE_TEST, KEY_TYPE_TEAM, KEY_TYPE_NORMAL) KEY_TYPE_TEST, KEY_TYPE_TEAM, KEY_TYPE_NORMAL)
from app.dao.services_dao import dao_fetch_service_by_id
def get_recipients_from_request(request_json, key, type): def get_recipients_from_request(request_json, key, type):
return [(type, recipient) for recipient in request_json.get(key)] return [(type, recipient) for recipient in request_json.get(key)]
@@ -33,6 +35,10 @@ def service_allowed_to_send_to(recipient, service, key_type, allow_whitelisted_r
if key_type == KEY_TYPE_NORMAL and not service.restricted: if key_type == KEY_TYPE_NORMAL and not service.restricted:
return True return True
# Revert back to the ORM model here so we can get some things which
# arent in the serialised model
service = dao_fetch_service_by_id(service.id)
team_members = itertools.chain.from_iterable( team_members = itertools.chain.from_iterable(
[user.mobile_number, user.email_address] for user in service.users [user.mobile_number, user.email_address] for user in service.users
) )

View File

@@ -69,7 +69,9 @@ def validate_parent_folder(template_json):
def create_template(service_id): def create_template(service_id):
fetched_service = dao_fetch_service_by_id(service_id=service_id) fetched_service = dao_fetch_service_by_id(service_id=service_id)
# permissions needs to be placed here otherwise marshmallow will interfere with versioning # permissions needs to be placed here otherwise marshmallow will interfere with versioning
permissions = fetched_service.permissions permissions = [
p.permission for p in fetched_service.permissions
]
template_json = validate(request.get_json(), post_create_template_schema) template_json = validate(request.get_json(), post_create_template_schema)
folder = validate_parent_folder(template_json=template_json) folder = validate_parent_folder(template_json=template_json)
new_template = Template.from_json(template_json, folder) new_template = Template.from_json(template_json, folder)
@@ -102,7 +104,12 @@ def create_template(service_id):
def update_template(service_id, template_id): def update_template(service_id, template_id):
fetched_template = dao_get_template_by_id_and_service_id(template_id=template_id, service_id=service_id) fetched_template = dao_get_template_by_id_and_service_id(template_id=template_id, service_id=service_id)
if not service_has_permission(fetched_template.template_type, fetched_template.service.permissions): if not service_has_permission(
fetched_template.template_type,
[
p.permission for p in fetched_template.service.permissions
]
):
message = "Updating {} templates is not allowed".format( message = "Updating {} templates is not allowed".format(
get_public_notify_type_text(fetched_template.template_type)) get_public_notify_type_text(fetched_template.template_type))
errors = {'template_type': [message]} errors = {'template_type': [message]}

View File

@@ -342,7 +342,7 @@ def process_letter_notification(
if api_key.key_type == KEY_TYPE_TEAM: if api_key.key_type == KEY_TYPE_TEAM:
raise BadRequestError(message='Cannot send letters with a team api key', status_code=403) raise BadRequestError(message='Cannot send letters with a team api key', status_code=403)
if not api_key.service.research_mode and api_key.service.restricted and api_key.key_type != KEY_TYPE_TEST: if not service.research_mode and service.restricted and api_key.key_type != KEY_TYPE_TEST:
raise BadRequestError(message='Cannot send letters when service is in trial mode', status_code=403) raise BadRequestError(message='Cannot send letters when service is in trial mode', status_code=403)
if precompiled: if precompiled:
@@ -352,7 +352,7 @@ def process_letter_notification(
template=template, template=template,
reply_to_text=reply_to_text) reply_to_text=reply_to_text)
validate_address(api_key, letter_data) validate_address(service, letter_data)
test_key = api_key.key_type == KEY_TYPE_TEST test_key = api_key.key_type == KEY_TYPE_TEST
@@ -402,10 +402,10 @@ def process_letter_notification(
return resp return resp
def validate_address(api_key, letter_data): def validate_address(service, letter_data):
address = PostalAddress.from_personalisation( address = PostalAddress.from_personalisation(
letter_data['personalisation'], letter_data['personalisation'],
allow_international_letters=api_key.service.has_permission(INTERNATIONAL_LETTERS), allow_international_letters=(INTERNATIONAL_LETTERS in service.permissions),
) )
if not address.has_enough_lines: if not address.has_enough_lines:
raise ValidationError( raise ValidationError(

View File

@@ -300,7 +300,7 @@ def test_authentication_returns_token_expired_when_service_uses_expired_key_and_
with pytest.raises(AuthError) as exc: with pytest.raises(AuthError) as exc:
requires_auth() requires_auth()
assert exc.value.short_message == 'Invalid token: API key revoked' assert exc.value.short_message == 'Invalid token: API key revoked'
assert exc.value.service_id == expired_api_key.service_id assert exc.value.service_id == str(expired_api_key.service_id)
assert exc.value.api_key_id == expired_api_key.id assert exc.value.api_key_id == expired_api_key.id
@@ -376,7 +376,7 @@ def test_authentication_returns_error_when_service_has_no_secrets(client,
with pytest.raises(AuthError) as exc: with pytest.raises(AuthError) as exc:
requires_auth() requires_auth()
assert exc.value.short_message == 'Invalid token: service has no API keys' assert exc.value.short_message == 'Invalid token: service has no API keys'
assert exc.value.service_id == sample_service.id assert exc.value.service_id == str(sample_service.id)
def test_should_attach_the_current_api_key_to_current_app(notify_api, sample_service, sample_api_key): def test_should_attach_the_current_api_key_to_current_app(notify_api, sample_service, sample_api_key):
@@ -387,7 +387,7 @@ def test_should_attach_the_current_api_key_to_current_app(notify_api, sample_ser
headers={'Authorization': 'Bearer {}'.format(token)} headers={'Authorization': 'Bearer {}'.format(token)}
) )
assert response.status_code == 200 assert response.status_code == 200
assert api_user == sample_api_key assert str(api_user.id) == str(sample_api_key.id)
def test_should_return_403_when_token_is_expired(client, def test_should_return_403_when_token_is_expired(client,
@@ -399,8 +399,8 @@ def test_should_return_403_when_token_is_expired(client,
request.headers = {'Authorization': 'Bearer {}'.format(token)} request.headers = {'Authorization': 'Bearer {}'.format(token)}
requires_auth() requires_auth()
assert exc.value.short_message == 'Error: Your system clock must be accurate to within 30 seconds' assert exc.value.short_message == 'Error: Your system clock must be accurate to within 30 seconds'
assert exc.value.service_id == sample_api_key.service_id assert exc.value.service_id == str(sample_api_key.service_id)
assert exc.value.api_key_id == sample_api_key.id assert str(exc.value.api_key_id) == str(sample_api_key.id)
def __create_token(service_id): def __create_token(service_id):

View File

@@ -23,7 +23,7 @@ from app.notifications.validators import (
validate_and_format_recipient, validate_and_format_recipient,
validate_template, validate_template,
) )
from app.serialised_models import SerialisedTemplate from app.serialised_models import SerialisedService, SerialisedTemplate
from app.utils import get_template_instance from app.utils import get_template_instance
from app.v2.errors import ( from app.v2.errors import (
@@ -439,8 +439,9 @@ def test_rejects_api_calls_with_international_numbers_if_service_does_not_allow_
notify_db_session, notify_db_session,
): ):
service = create_service(service_permissions=[SMS_TYPE]) service = create_service(service_permissions=[SMS_TYPE])
service_model = SerialisedService.from_id(service.id)
with pytest.raises(BadRequestError) as e: with pytest.raises(BadRequestError) as e:
validate_and_format_recipient('20-12-1234-1234', key_type, service, SMS_TYPE) validate_and_format_recipient('20-12-1234-1234', key_type, service_model, SMS_TYPE)
assert e.value.status_code == 400 assert e.value.status_code == 400
assert e.value.message == 'Cannot send to international mobile numbers' assert e.value.message == 'Cannot send to international mobile numbers'
assert e.value.fields == [] assert e.value.fields == []
@@ -449,7 +450,8 @@ def test_rejects_api_calls_with_international_numbers_if_service_does_not_allow_
@pytest.mark.parametrize('key_type', ['test', 'normal']) @pytest.mark.parametrize('key_type', ['test', 'normal'])
def test_allows_api_calls_with_international_numbers_if_service_does_allow_int_sms( def test_allows_api_calls_with_international_numbers_if_service_does_allow_int_sms(
key_type, sample_service_full_permissions): key_type, sample_service_full_permissions):
result = validate_and_format_recipient('20-12-1234-1234', key_type, sample_service_full_permissions, SMS_TYPE) service_model = SerialisedService.from_id(sample_service_full_permissions.id)
result = validate_and_format_recipient('20-12-1234-1234', key_type, service_model, SMS_TYPE)
assert result == '201212341234' assert result == '201212341234'

View File

@@ -235,7 +235,7 @@ def test_should_cache_template_lookups_in_memory(mocker, client, sample_template
assert mock_get_template.call_count == 1 assert mock_get_template.call_count == 1
assert mock_get_template.call_args_list == [ assert mock_get_template.call_args_list == [
call(service_id=sample_template.service_id, template_id=str(sample_template.id)) call(service_id=str(sample_template.service_id), template_id=str(sample_template.id))
] ]
assert Notification.query.count() == 5 assert Notification.query.count() == 5
@@ -920,8 +920,8 @@ def test_post_notification_with_document_upload(client, notify_db_session, mocke
assert validate(resp_json, post_email_response) == resp_json assert validate(resp_json, post_email_response) == resp_json
assert document_download_mock.upload_document.call_args_list == [ assert document_download_mock.upload_document.call_args_list == [
call(service.id, 'abababab', csv_param.get('is_csv')), call(str(service.id), 'abababab', csv_param.get('is_csv')),
call(service.id, 'cdcdcdcd', csv_param.get('is_csv')) call(str(service.id), 'cdcdcdcd', csv_param.get('is_csv'))
] ]
notification = Notification.query.one() notification = Notification.query.one()