|
2 | 2 | Admin service for handling administrative operations. |
3 | 3 | """ |
4 | 4 | import logging |
5 | | -from typing import Optional, List |
| 5 | +from typing import List |
6 | 6 |
|
7 | | -from fastapi import Request |
| 7 | +from fastapi import Depends, Request |
| 8 | +from web.core.config import get_settings, Settings |
8 | 9 |
|
9 | | -from core.config import get_settings |
10 | 10 |
|
11 | 11 | logger = logging.getLogger(__name__) |
12 | 12 |
|
13 | 13 |
|
14 | 14 | class AdminService: |
15 | 15 | """Service for managing administrative operations.""" |
16 | 16 |
|
17 | | - def __init__(self, versions_fetcher=None): |
| 17 | + def __init__(self, remote_reload_token: str, versions_fetcher=None): |
18 | 18 | """ |
19 | 19 | Initialize the admin service. |
20 | 20 |
|
21 | 21 | Args: |
| 22 | + remote_reload_token: Remote reload authentication token |
22 | 23 | versions_fetcher: VersionsFetcher instance for managing remotes |
23 | 24 | """ |
| 25 | + self.remote_reload_token = remote_reload_token |
24 | 26 | self.versions_fetcher = versions_fetcher |
25 | | - self.settings = get_settings() |
26 | 27 |
|
27 | | - def get_auth_token(self) -> Optional[str]: |
| 28 | + async def verify_remote_reload_token(self, token: str) -> bool: |
28 | 29 | """ |
29 | | - Retrieve the authorization token from file or environment. |
30 | | -
|
31 | | - Returns: |
32 | | - The authorization token if found, None otherwise |
33 | | - """ |
34 | | - try: |
35 | | - # Try to read the secret token from the file |
36 | | - token_file_path = self.settings.admin_token_file_path |
37 | | - with open(token_file_path, 'r') as file: |
38 | | - token = file.read().strip() |
39 | | - return token |
40 | | - except (FileNotFoundError, PermissionError) as e: |
41 | | - logger.error( |
42 | | - f"Couldn't open token file at " |
43 | | - f"{self.settings.admin_token_file_path}: {e}. " |
44 | | - "Checking environment for token." |
45 | | - ) |
46 | | - # If the file does not exist or no permission, check environment |
47 | | - return self.settings.admin_token_env |
48 | | - except Exception as e: |
49 | | - logger.error( |
50 | | - f"Unexpected error reading token file at " |
51 | | - f"{self.settings.admin_token_file_path}: {e}. " |
52 | | - "Checking environment for token." |
53 | | - ) |
54 | | - # For any other error, fall back to environment variable |
55 | | - return self.settings.admin_token_env |
56 | | - |
57 | | - async def verify_token(self, token: str) -> bool: |
58 | | - """ |
59 | | - Verify that the provided token matches the expected admin token. |
| 30 | + Verify that the provided token matches the expected remote reload token. |
60 | 31 |
|
61 | 32 | Args: |
62 | 33 | token: The token to verify |
63 | 34 |
|
64 | 35 | Returns: |
65 | 36 | True if token is valid, False otherwise |
66 | | -
|
67 | | - Raises: |
68 | | - RuntimeError: If admin token is not configured on server |
69 | 37 | """ |
70 | | - expected_token = self.get_auth_token() |
71 | | - |
72 | | - if expected_token is None: |
73 | | - logger.error("No admin token configured") |
74 | | - raise RuntimeError("Admin token not configured on server") |
| 38 | + if not token: |
| 39 | + return False |
75 | 40 |
|
76 | | - return token == expected_token |
| 41 | + return token == self.remote_reload_token |
77 | 42 |
|
78 | 43 | async def refresh_remotes(self) -> List[str]: |
79 | 44 | """ |
@@ -102,14 +67,29 @@ async def refresh_remotes(self) -> List[str]: |
102 | 67 | return remotes_refreshed |
103 | 68 |
|
104 | 69 |
|
105 | | -def get_admin_service(request: Request) -> AdminService: |
| 70 | +def get_admin_service( |
| 71 | + request: Request, |
| 72 | + settings: Settings = Depends(get_settings) |
| 73 | +) -> AdminService: |
106 | 74 | """ |
107 | 75 | Get AdminService instance with dependencies from app state. |
108 | 76 |
|
109 | 77 | Args: |
110 | 78 | request: FastAPI Request object |
| 79 | + settings: Application settings |
111 | 80 |
|
112 | 81 | Returns: |
113 | 82 | AdminService instance initialized with app state dependencies |
| 83 | +
|
| 84 | + Raises: |
| 85 | + RuntimeError: If remote reload token is not configured |
114 | 86 | """ |
115 | | - return AdminService(versions_fetcher=request.app.state.versions_fetcher) |
| 87 | + remote_reload_token = settings.remote_reload_token |
| 88 | + |
| 89 | + if remote_reload_token is None: |
| 90 | + raise RuntimeError("Remote reload token not configured on server") |
| 91 | + |
| 92 | + return AdminService( |
| 93 | + remote_reload_token=remote_reload_token, |
| 94 | + versions_fetcher=request.app.state.versions_fetcher |
| 95 | + ) |
0 commit comments