diff libervia/pages/_bridge/page_meta.py @ 1509:106bae41f5c8

massive refactoring from camelCase -> snake_case. See backend commit log for more details
author Goffi <goffi@goffi.org>
date Sat, 08 Apr 2023 13:44:11 +0200
parents 7472d5a88006
children
line wrap: on
line diff
--- a/libervia/pages/_bridge/page_meta.py	Fri Apr 07 15:20:40 2023 +0200
+++ b/libervia/pages/_bridge/page_meta.py	Sat Apr 08 13:44:11 2023 +0200
@@ -14,20 +14,20 @@
 on_data_post = "continue"
 
 # bridge method allowed when no profile is connected
-NO_SESSION_ALLOWED = ("getContacts", "identitiesBaseGet", "identitiesGet")
+NO_SESSION_ALLOWED = ("contacts_get", "identities_base_get", "identities_get")
 
 
 def parse_url(self, request):
-    self.getPathArgs(request, ["method_name"], min_args=1)
+    self.get_path_args(request, ["method_name"], min_args=1)
 
 
 async def render(self, request):
     if request.method != b'POST':
         log.warning(f"Bad method used with _bridge endpoint: {request.method.decode()}")
-        return self.pageError(request, C.HTTP_BAD_REQUEST)
-    data = self.getRData(request)
-    profile = self.getProfile(request)
-    self.checkCSRF(request)
+        return self.page_error(request, C.HTTP_BAD_REQUEST)
+    data = self.get_r_data(request)
+    profile = self.get_profile(request)
+    self.check_csrf(request)
     method_name = data["method_name"]
     if profile is None:
         if method_name in NO_SESSION_ALLOWED:
@@ -35,7 +35,7 @@
             profile = C.SERVICE_PROFILE
         else:
             log.warning("_bridge endpoint accessed without authorisation")
-            return self.pageError(request, C.HTTP_UNAUTHORIZED)
+            return self.page_error(request, C.HTTP_UNAUTHORIZED)
     method_data = json.load(request.content)
     try:
         bridge_method = getattr(self.host.restricted_bridge, method_name)
@@ -44,7 +44,7 @@
             "{profile!r} is trying to access a bridge method not implemented in "
             "RestrictedBridge: {method_name}").format(
                 profile=profile, method_name=method_name))
-        return self.pageError(request, C.HTTP_BAD_REQUEST)
+        return self.page_error(request, C.HTTP_BAD_REQUEST)
 
     try:
         args, kwargs = method_data['args'], method_data['kwargs']
@@ -52,14 +52,14 @@
         log.warning(_(
             "{profile!r} has sent a badly formatted method call: {method_data}"
         ).format(profile=profile, method_data=method_data))
-        return self.pageError(request, C.HTTP_BAD_REQUEST)
+        return self.page_error(request, C.HTTP_BAD_REQUEST)
 
     if "profile" in kwargs or "profile_key" in kwargs:
         log.warning(_(
             '"profile" key should not be in method kwargs, hack attempt? '
             "profile={profile}, method_data={method_data}"
         ).format(profile=profile, method_data=method_data))
-        return self.pageError(request, C.HTTP_BAD_REQUEST)
+        return self.page_error(request, C.HTTP_BAD_REQUEST)
 
     try:
         ret = await bridge_method(*args, **kwargs, profile=profile)