Index: appengine/monorail/services/user_svc.py |
diff --git a/appengine/monorail/services/user_svc.py b/appengine/monorail/services/user_svc.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8439268c24f0516c58a16a411db4ff2c9fd158e2 |
--- /dev/null |
+++ b/appengine/monorail/services/user_svc.py |
@@ -0,0 +1,503 @@ |
+# Copyright 2016 The Chromium Authors. All rights reserved. |
+# Use of this source code is govered by a BSD-style |
+# license that can be found in the LICENSE file or at |
+# https://developers.google.com/open-source/licenses/bsd |
+ |
+"""A set of functions that provide persistence for users. |
+ |
+Business objects are described in user_pb2.py. |
+""" |
+ |
+import logging |
+ |
+import settings |
+from framework import actionlimit |
+from framework import framework_bizobj |
+from framework import framework_constants |
+from framework import framework_helpers |
+from framework import sql |
+from framework import validate |
+from proto import user_pb2 |
+from services import caches |
+ |
+ |
+USER_TABLE_NAME = 'User' |
+ACTIONLIMIT_TABLE_NAME = 'ActionLimit' |
+DISMISSEDCUES_TABLE_NAME = 'DismissedCues' |
+ |
+USER_COLS = [ |
+ 'user_id', 'email', 'is_site_admin', 'notify_issue_change', |
+ 'notify_starred_issue_change', 'banned', 'after_issue_update', |
+ 'keep_people_perms_open', 'preview_on_hover', 'ignore_action_limits', |
+ 'obscure_email'] |
+ACTIONLIMIT_COLS = [ |
+ 'user_id', 'action_kind', 'recent_count', 'reset_timestamp', |
+ 'lifetime_count', 'lifetime_limit', 'period_soft_limit', |
+ 'period_hard_limit'] |
+DISMISSEDCUES_COLS = ['user_id', 'cue'] |
+ |
+ |
+class UserTwoLevelCache(caches.AbstractTwoLevelCache): |
+ """Class to manage RAM and memcache for User PBs.""" |
+ |
+ def __init__(self, cache_manager, user_service): |
+ super(UserTwoLevelCache, self).__init__( |
+ cache_manager, 'user', 'user:', user_pb2.User, |
+ max_size=settings.user_cache_max_size) |
+ self.user_service = user_service |
+ |
+ def _DeserializeUsersByID( |
+ self, user_rows, actionlimit_rows, dismissedcue_rows): |
+ """Convert database row tuples into User PBs. |
+ |
+ Args: |
+ user_rows: rows from the User DB table. |
+ actionlimit_rows: rows from the ActionLimit DB table. |
+ dismissedcue_rows: rows from the DismissedCues DB table. |
+ |
+ Returns: |
+ A dict {user_id: user_pb} for all the users referenced in user_rows. |
+ """ |
+ result_dict = {} |
+ |
+ # Make one User PB for each row in user_rows. |
+ for row in user_rows: |
+ (user_id, email, is_site_admin, |
+ notify_issue_change, notify_starred_issue_change, banned, |
+ after_issue_update, keep_people_perms_open, preview_on_hover, |
+ ignore_action_limits, obscure_email) = row |
+ user = user_pb2.MakeUser() |
+ user.email = email |
+ user.is_site_admin = bool(is_site_admin) |
+ user.notify_issue_change = bool(notify_issue_change) |
+ user.notify_starred_issue_change = bool(notify_starred_issue_change) |
+ user.obscure_email = bool(obscure_email) |
+ if banned: |
+ user.banned = banned |
+ if after_issue_update: |
+ user.after_issue_update = user_pb2.IssueUpdateNav( |
+ after_issue_update.upper()) |
+ user.keep_people_perms_open = bool(keep_people_perms_open) |
+ user.preview_on_hover = bool(preview_on_hover) |
+ user.ignore_action_limits = bool(ignore_action_limits) |
+ result_dict[user_id] = user |
+ |
+ # Make an ActionLimit for each actionlimit row and attach it to a User PB. |
+ for row in actionlimit_rows: |
+ (user_id, action_type_name, recent_count, reset_timestamp, |
+ lifetime_count, lifetime_limit, period_soft_limit, |
+ period_hard_limit) = row |
+ if user_id not in result_dict: |
+ logging.error('Found action limits for missing user %r', user_id) |
+ continue |
+ user = result_dict[user_id] |
+ action_type = actionlimit.ACTION_TYPE_NAMES[action_type_name] |
+ al = actionlimit.GetLimitPB(user, action_type) |
+ al.recent_count = recent_count |
+ al.reset_timestamp = reset_timestamp |
+ al.lifetime_count = lifetime_count |
+ al.lifetime_limit = lifetime_limit |
+ al.period_soft_limit = period_soft_limit |
+ al.period_hard_limit = period_hard_limit |
+ |
+ # Build up a list of dismissed "cue card" help items for the users. |
+ for user_id, cue in dismissedcue_rows: |
+ if user_id not in result_dict: |
+ logging.error('Found dismissed cues for missing user %r', user_id) |
+ continue |
+ result_dict[user_id].dismissed_cues.append(cue) |
+ |
+ return result_dict |
+ |
+ def FetchItems(self, cnxn, keys): |
+ """On RAM and memcache miss, retrieve User objects from the database. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ keys: list of user IDs to retrieve. |
+ |
+ Returns: |
+ A dict {user_id: user_pb} for each user that satisfies the conditions. |
+ """ |
+ user_rows = self.user_service.user_tbl.Select( |
+ cnxn, cols=USER_COLS, user_id=keys) |
+ actionlimit_rows = self.user_service.actionlimit_tbl.Select( |
+ cnxn, cols=ACTIONLIMIT_COLS, user_id=keys) |
+ dismissedcues_rows = self.user_service.dismissedcues_tbl.Select( |
+ cnxn, cols=DISMISSEDCUES_COLS, user_id=keys) |
+ return self._DeserializeUsersByID( |
+ user_rows, actionlimit_rows, dismissedcues_rows) |
+ |
+ |
+class UserService(object): |
+ """The persistence layer for all user data.""" |
+ |
+ def __init__(self, cache_manager): |
+ """Constructor. |
+ |
+ Args: |
+ cache_manager: local cache with distributed invalidation. |
+ """ |
+ self.user_tbl = sql.SQLTableManager(USER_TABLE_NAME) |
+ self.actionlimit_tbl = sql.SQLTableManager(ACTIONLIMIT_TABLE_NAME) |
+ self.dismissedcues_tbl = sql.SQLTableManager(DISMISSEDCUES_TABLE_NAME) |
+ |
+ # Like a dictionary {user_id: email} |
+ self.email_cache = cache_manager.MakeCache('user', max_size=50000) |
+ |
+ # Like a dictionary {email: user_id}. |
+ # This will never invaidate, and it doesn't need to. |
+ self.user_id_cache = cache_manager.MakeCache('user', max_size=50000) |
+ |
+ # Like a dictionary {user_id: user_pb} |
+ self.user_2lc = UserTwoLevelCache(cache_manager, self) |
+ |
+ ### Creating users |
+ |
+ def _CreateUsers(self, cnxn, emails): |
+ """Create many users in the database.""" |
+ emails = [email.lower() for email in emails] |
+ ids = [framework_helpers.MurmurHash3_x86_32(email) for email in emails] |
+ row_values = [ |
+ (user_id, email, not framework_bizobj.IsPriviledgedDomainUser(email)) |
+ for (user_id, email) in zip(ids, emails)] |
+ self.user_tbl.InsertRows( |
+ cnxn, ['user_id', 'email', 'obscure_email'], row_values) |
+ self.user_2lc.InvalidateKeys(cnxn, ids) |
+ |
+ ### Lookup of user ID and email address |
+ |
+ def LookupUserEmails(self, cnxn, user_ids): |
+ """Return a dict of email addresses for the given user IDs. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ user_ids: list of int user IDs to look up. |
+ |
+ Returns: |
+ A dict {user_id: email_addr} for all the requested IDs. |
+ |
+ Raises: |
+ NoSuchUserException: if any requested user cannot be found. |
+ """ |
+ self.email_cache.CacheItem(framework_constants.NO_USER_SPECIFIED, '') |
+ emails_dict, missed_ids = self.email_cache.GetAll(user_ids) |
+ if missed_ids: |
+ logging.info('got %d user emails from cache', len(emails_dict)) |
+ rows = self.user_tbl.Select( |
+ cnxn, cols=['user_id', 'email'], user_id=missed_ids) |
+ retrieved_dict = dict(rows) |
+ logging.info('looked up users %r', retrieved_dict) |
+ self.email_cache.CacheAll(retrieved_dict) |
+ emails_dict.update(retrieved_dict) |
+ |
+ # Check if there are any that we could not find. ID 0 means "no user". |
+ nonexist_ids = [user_id for user_id in user_ids |
+ if user_id and user_id not in emails_dict] |
+ if nonexist_ids: |
+ raise NoSuchUserException( |
+ 'No email addresses found for users %r' % nonexist_ids) |
+ |
+ return emails_dict |
+ |
+ def LookupUserEmail(self, cnxn, user_id): |
+ """Get the email address of the given user. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ user_id: int user ID of the user whose email address is needed. |
+ |
+ Returns: |
+ String email address of that user or None if user_id is invalid. |
+ |
+ Raises: |
+ NoSuchUserException: if no email address was found for that user. |
+ """ |
+ if not user_id: |
+ return None |
+ emails_dict = self.LookupUserEmails(cnxn, [user_id]) |
+ return emails_dict[user_id] |
+ |
+ def LookupExistingUserIDs(self, cnxn, emails): |
+ """Return a dict of user IDs for the given emails for users that exist. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ emails: list of string email addresses. |
+ |
+ Returns: |
+ A dict {email_addr: user_id} for the requested emails. |
+ """ |
+ # Look up these users in the RAM cache |
+ user_id_dict, missed_emails = self.user_id_cache.GetAll(emails) |
+ logging.info('hit %d emails, missed %r', len(user_id_dict), missed_emails) |
+ |
+ # Hit the DB to lookup any user IDs that were not cached. |
+ if missed_emails: |
+ rows = self.user_tbl.Select( |
+ cnxn, cols=['email', 'user_id'], email=missed_emails) |
+ retrieved_dict = dict(rows) |
+ # Cache all the user IDs that we retrieved to make later requests faster. |
+ self.user_id_cache.CacheAll(retrieved_dict) |
+ user_id_dict.update(retrieved_dict) |
+ |
+ logging.info('looked up User IDs %r', user_id_dict) |
+ return user_id_dict |
+ |
+ def LookupUserIDs(self, cnxn, emails, autocreate=False, |
+ allowgroups=False): |
+ """Return a dict of user IDs for the given emails. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ emails: list of string email addresses. |
+ autocreate: set to True to create users that were not found. |
+ allowgroups: set to True to allow non-email user name for group |
+ creation. |
+ |
+ Returns: |
+ A dict {email_addr: user_id} for the requested emails. |
+ |
+ Raises: |
+ NoSuchUserException: if some users were not found and autocreate is |
+ False. |
+ """ |
+ # Skip any addresses that look like "--", because that means "no user". |
+ # Also, make sure all email addresses are lower case. |
+ needed_emails = [email.lower() for email in emails |
+ if not framework_constants.NO_VALUE_RE.match(email)] |
+ |
+ # Look up these users in the RAM cache |
+ user_id_dict = self.LookupExistingUserIDs(cnxn, needed_emails) |
+ if len(needed_emails) == len(user_id_dict): |
+ logging.info('found all %d emails', len(user_id_dict)) |
+ return user_id_dict |
+ |
+ # If any were not found in the DB, create them or raise an exception. |
+ nonexist_emails = [email for email in needed_emails |
+ if email not in user_id_dict] |
+ logging.info('nonexist_emails: %r, autocreate is %r', |
+ nonexist_emails, autocreate) |
+ if not autocreate: |
+ raise NoSuchUserException('%r' % nonexist_emails) |
+ |
+ if not allowgroups: |
+ # Only create accounts for valid email addresses. |
+ nonexist_emails = [email for email in nonexist_emails |
+ if validate.IsValidEmail(email)] |
+ if not nonexist_emails: |
+ return user_id_dict |
+ |
+ self._CreateUsers(cnxn, nonexist_emails) |
+ created_rows = self.user_tbl.Select( |
+ cnxn, cols=['email', 'user_id'], email=nonexist_emails) |
+ created_dict = dict(created_rows) |
+ # Cache all the user IDs that we retrieved to make later requests faster. |
+ self.user_id_cache.CacheAll(created_dict) |
+ user_id_dict.update(created_dict) |
+ |
+ logging.info('looked up User IDs %r', user_id_dict) |
+ return user_id_dict |
+ |
+ def LookupUserID(self, cnxn, email, autocreate=False, allowgroups=False): |
+ """Get one user ID for the given email address. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ email: string email address of the user to look up. |
+ autocreate: set to True to create users that were not found. |
+ allowgroups: set to True to allow non-email user name for group |
+ creation. |
+ |
+ Returns: |
+ The int user ID of the specified user. |
+ |
+ Raises: |
+ NoSuchUserException if the user was not found and autocreate is False. |
+ """ |
+ email = email.lower() |
+ email_dict = self.LookupUserIDs( |
+ cnxn, [email], autocreate=autocreate, allowgroups=allowgroups) |
+ if email not in email_dict: |
+ raise NoSuchUserException('%r not found' % email) |
+ return email_dict[email] |
+ |
+ ### Retrieval of user objects: with preferences, action limits, and cues |
+ |
+ def GetUsersByIDs(self, cnxn, user_ids, use_cache=True): |
+ """Return a dictionary of retrieved User PBs. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ user_ids: list of user IDs to fetch. |
+ use_cache: set to False to ignore cache and force DB lookup. |
+ |
+ Returns: |
+ A dict {user_id: user_pb} for each specified user ID. For any user ID |
+ that is not fount in the DB, a default User PB is created on-the-fly. |
+ """ |
+ # Check the RAM cache and memcache, as appropriate. |
+ result_dict, missed_ids = self.user_2lc.GetAll( |
+ cnxn, user_ids, use_cache=use_cache) |
+ |
+ # Provide default values for any user ID that was not found. |
+ result_dict.update( |
+ (user_id, user_pb2.MakeUser()) for user_id in missed_ids) |
+ |
+ return result_dict |
+ |
+ def GetUser(self, cnxn, user_id): |
+ """Load the specified user from the user details table.""" |
+ return self.GetUsersByIDs(cnxn, [user_id])[user_id] |
+ |
+ ### Updating user objects |
+ |
+ def UpdateUser(self, cnxn, user_id, user): |
+ """Store a user PB in the database. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ user_id: int user ID of the user to update. |
+ user: User PB to store. |
+ |
+ Returns: |
+ Nothing. |
+ """ |
+ delta = { |
+ 'is_site_admin': user.is_site_admin, |
+ 'notify_issue_change': user.notify_issue_change, |
+ 'notify_starred_issue_change': user.notify_starred_issue_change, |
+ 'banned': user.banned, |
+ 'after_issue_update': str(user.after_issue_update or 'UP_TO_LIST'), |
+ 'keep_people_perms_open': user.keep_people_perms_open, |
+ 'preview_on_hover': user.preview_on_hover, |
+ 'ignore_action_limits': user.ignore_action_limits, |
+ 'obscure_email': user.obscure_email, |
+ } |
+ # Start sending UPDATE statements, but don't COMMIT until the end. |
+ self.user_tbl.Update(cnxn, delta, user_id=user_id, commit=False) |
+ |
+ # Add rows for any ActionLimits that are defined for this user. |
+ al_rows = [] |
+ if user.get_assigned_value('project_creation_limit'): |
+ al_rows.append(_ActionLimitToRow( |
+ user_id, 'project_creation', user.project_creation_limit)) |
+ if user.get_assigned_value('issue_comment_limit'): |
+ al_rows.append(_ActionLimitToRow( |
+ user_id, 'issue_comment', user.issue_comment_limit)) |
+ if user.get_assigned_value('issue_attachment_limit'): |
+ al_rows.append(_ActionLimitToRow( |
+ user_id, 'issue_attachment', user.issue_attachment_limit)) |
+ if user.get_assigned_value('issue_bulk_edit_limit'): |
+ al_rows.append(_ActionLimitToRow( |
+ user_id, 'issue_bulk_edit', user.issue_bulk_edit_limit)) |
+ if user.get_assigned_value('api_request_limit'): |
+ al_rows.append(_ActionLimitToRow( |
+ user_id, 'api_request', user.api_request_limit)) |
+ |
+ self.actionlimit_tbl.Delete(cnxn, user_id=user_id, commit=False) |
+ self.actionlimit_tbl.InsertRows( |
+ cnxn, ACTIONLIMIT_COLS, al_rows, commit=False) |
+ |
+ # Rewrite all the DismissedCues rows. |
+ cues_rows = [(user_id, cue) for cue in user.dismissed_cues] |
+ self.dismissedcues_tbl.Delete(cnxn, user_id=user_id, commit=False) |
+ self.dismissedcues_tbl.InsertRows( |
+ cnxn, DISMISSEDCUES_COLS, cues_rows, commit=False) |
+ |
+ cnxn.Commit() |
+ self.user_2lc.InvalidateKeys(cnxn, [user_id]) |
+ |
+ def UpdateUserSettings( |
+ self, cnxn, user_id, user, notify=None, notify_starred=None, |
+ obscure_email=None, after_issue_update=None, |
+ is_site_admin=None, ignore_action_limits=None, |
+ is_banned=None, banned_reason=None, action_limit_updates=None, |
+ dismissed_cues=None, keep_people_perms_open=None, preview_on_hover=None): |
+ """Update the preferences of the specified user. |
+ |
+ Args: |
+ cnxn: connection to SQL database. |
+ user_id: int user ID of the user whose settings we are updating. |
+ user: User PB of user before changes are applied. |
+ keyword args: dictionary of setting names mapped to new values. |
+ |
+ Returns: |
+ The user's new User PB. |
+ """ |
+ # notifications |
+ if notify is not None: |
+ user.notify_issue_change = notify |
+ if notify_starred is not None: |
+ user.notify_starred_issue_change = notify_starred |
+ |
+ # display options |
+ if after_issue_update is not None: |
+ user.after_issue_update = user_pb2.IssueUpdateNav(after_issue_update) |
+ if preview_on_hover is not None: |
+ user.preview_on_hover = preview_on_hover |
+ if dismissed_cues: # Note, we never set it back to []. |
+ user.dismissed_cues = dismissed_cues |
+ if keep_people_perms_open is not None: |
+ user.keep_people_perms_open = keep_people_perms_open |
+ |
+ # misc |
+ if obscure_email is not None: |
+ user.obscure_email = obscure_email |
+ |
+ # admin |
+ if is_site_admin is not None: |
+ user.is_site_admin = is_site_admin |
+ if ignore_action_limits is not None: |
+ user.ignore_action_limits = ignore_action_limits |
+ if is_banned is not None: |
+ if is_banned: |
+ user.banned = banned_reason or 'No reason given' |
+ else: |
+ user.reset('banned') |
+ |
+ # action limits |
+ if action_limit_updates: |
+ self._UpdateActionLimits(user, action_limit_updates) |
+ |
+ # Write the user settings to the database. |
+ self.UpdateUser(cnxn, user_id, user) |
+ |
+ def _UpdateActionLimits(self, user, action_limit_updates): |
+ """Apply action limit updates to a user's account.""" |
+ for action, new_limit_tuple in action_limit_updates.iteritems(): |
+ if action in actionlimit.ACTION_TYPE_NAMES: |
+ action_type = actionlimit.ACTION_TYPE_NAMES[action] |
+ if new_limit_tuple is None: |
+ actionlimit.ResetRecentActions(user, action_type) |
+ else: |
+ new_soft_limit, new_hard_limit, new_lifetime_limit = new_limit_tuple |
+ |
+ pb_getter = action + '_limit' |
+ old_lifetime_limit = getattr(user, pb_getter).lifetime_limit |
+ old_soft_limit = getattr(user, pb_getter).period_soft_limit |
+ old_hard_limit = getattr(user, pb_getter).period_hard_limit |
+ |
+ if ((new_lifetime_limit >= 0 and |
+ new_lifetime_limit != old_lifetime_limit) or |
+ (new_soft_limit >= 0 and new_soft_limit != old_soft_limit) or |
+ (new_hard_limit >= 0 and new_hard_limit != old_hard_limit)): |
+ actionlimit.CustomizeLimit(user, action_type, new_soft_limit, |
+ new_hard_limit, new_lifetime_limit) |
+ |
+ |
+def _ActionLimitToRow(user_id, action_kind, al): |
+ """Return a tuple for an SQL table row for an action limit.""" |
+ return (user_id, action_kind, al.recent_count, al.reset_timestamp, |
+ al.lifetime_count, al.lifetime_limit, al.period_soft_limit, |
+ al.period_hard_limit) |
+ |
+ |
+class Error(Exception): |
+ """Base class for errors from this module.""" |
+ pass |
+ |
+ |
+class NoSuchUserException(Error): |
+ """No user with the specified name exists.""" |
+ pass |