2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. module: lemur.authorities.views
|
|
|
|
:platform: Unix
|
|
|
|
:copyright: (c) 2015 by Netflix Inc., see AUTHORS for more
|
|
|
|
:license: Apache, see LICENSE for more details.
|
|
|
|
.. moduleauthor:: Kevin Glisson <kglisson@netflix.com>
|
|
|
|
"""
|
2016-11-18 20:27:46 +01:00
|
|
|
from flask import Blueprint, g
|
2016-11-23 06:11:20 +01:00
|
|
|
from flask_restful import reqparse, Api
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.common.utils import paginated_parser
|
|
|
|
from lemur.common.schema import validate_schema
|
2015-06-22 22:47:27 +02:00
|
|
|
from lemur.auth.service import AuthenticatedResource
|
|
|
|
from lemur.auth.permissions import AuthorityPermission
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.certificates import service as certificate_service
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.authorities import service
|
2016-05-16 18:23:48 +02:00
|
|
|
from lemur.authorities.schemas import authority_input_schema, authority_output_schema, authorities_output_schema, authority_update_schema
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
mod = Blueprint('authorities', __name__)
|
|
|
|
api = Api(mod)
|
|
|
|
|
|
|
|
|
|
|
|
class AuthoritiesList(AuthenticatedResource):
|
|
|
|
""" Defines the 'authorities' endpoint """
|
|
|
|
def __init__(self):
|
|
|
|
self.reqparse = reqparse.RequestParser()
|
|
|
|
super(AuthoritiesList, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authorities_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self):
|
|
|
|
"""
|
|
|
|
.. http:get:: /authorities
|
|
|
|
|
|
|
|
The current list of authorities
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /authorities HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"items": [{
|
|
|
|
"name": "TestAuthority",
|
|
|
|
"roles": [{
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}, {
|
|
|
|
"id": 564,
|
|
|
|
"name": "TestAuthority_admin"
|
|
|
|
}, {
|
|
|
|
"id": 565,
|
|
|
|
"name": "TestAuthority_operator"
|
|
|
|
}],
|
|
|
|
"options": null,
|
|
|
|
"active": true,
|
|
|
|
"authorityCertificate": {
|
|
|
|
"body": "-----BEGIN CERTIFICATE-----IyMzU5MTVaMHk...",
|
|
|
|
"status": true,
|
|
|
|
"cn": "AcommonName",
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority.",
|
|
|
|
"chain": "",
|
|
|
|
"notBefore": "2016-06-02T00:00:15+00:00",
|
|
|
|
"notAfter": "2023-06-02T23:59:15+00:00",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"user": {
|
|
|
|
"username": "joe@example.com",
|
|
|
|
"active": true,
|
|
|
|
"email": "joe@example.com",
|
|
|
|
"id": 3
|
|
|
|
},
|
|
|
|
"active": true,
|
|
|
|
"bits": 2048,
|
|
|
|
"id": 2235,
|
|
|
|
"name": "TestAuthority"
|
|
|
|
},
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 43,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority."
|
|
|
|
}
|
2015-06-22 22:47:27 +02:00
|
|
|
"total": 1
|
|
|
|
}
|
|
|
|
|
|
|
|
:query sortBy: field to sort on
|
|
|
|
:query sortDir: acs or desc
|
2016-01-29 20:47:16 +01:00
|
|
|
:query page: int default is 1
|
|
|
|
:query filter: key value pair. format is k;v
|
2016-06-03 17:28:09 +02:00
|
|
|
:query count: count number default is 10
|
2015-06-22 22:47:27 +02:00
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
|
|
|
|
:note: this will only show certificates that the current user is authorized to use
|
|
|
|
"""
|
|
|
|
parser = paginated_parser.copy()
|
|
|
|
args = parser.parse_args()
|
2016-11-18 20:27:46 +01:00
|
|
|
args['user'] = g.current_user
|
2015-06-22 22:47:27 +02:00
|
|
|
return service.render(args)
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(authority_input_schema, authority_output_schema)
|
|
|
|
def post(self, data=None):
|
2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. http:post:: /authorities
|
|
|
|
|
|
|
|
Create an authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
POST /authorities HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
2016-06-03 17:28:09 +02:00
|
|
|
{
|
|
|
|
"country": "US",
|
|
|
|
"state": "California",
|
|
|
|
"location": "Los Gatos",
|
|
|
|
"organization": "Netflix",
|
|
|
|
"organizationalUnit": "Operations",
|
|
|
|
"type": "root",
|
|
|
|
"signingAlgorithm": "sha256WithRSA",
|
|
|
|
"sensitivity": "medium",
|
2015-06-22 22:47:27 +02:00
|
|
|
"keyType": "RSA2048",
|
2016-06-03 17:28:09 +02:00
|
|
|
"plugin": {
|
|
|
|
"slug": "cloudca-issuer",
|
2015-06-22 22:47:27 +02:00
|
|
|
},
|
2016-06-03 17:28:09 +02:00
|
|
|
"name": "TimeTestAuthority5",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"description": "test",
|
|
|
|
"commonName": "AcommonName",
|
|
|
|
"validityYears": "20",
|
|
|
|
"extensions": {
|
|
|
|
"subAltNames": {
|
|
|
|
"names": []
|
|
|
|
},
|
|
|
|
"custom": []
|
|
|
|
}
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"name": "TestAuthority",
|
|
|
|
"roles": [{
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}, {
|
|
|
|
"id": 564,
|
|
|
|
"name": "TestAuthority_admin"
|
|
|
|
}, {
|
|
|
|
"id": 565,
|
|
|
|
"name": "TestAuthority_operator"
|
|
|
|
}],
|
|
|
|
"options": null,
|
2015-06-22 22:47:27 +02:00
|
|
|
"active": true,
|
2016-06-03 17:28:09 +02:00
|
|
|
"authorityCertificate": {
|
|
|
|
"body": "-----BEGIN CERTIFICATE-----IyMzU5MTVaMHk...",
|
|
|
|
"status": true,
|
|
|
|
"cn": "AcommonName",
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority.",
|
|
|
|
"chain": "",
|
|
|
|
"notBefore": "2016-06-02T00:00:15+00:00",
|
|
|
|
"notAfter": "2023-06-02T23:59:15+00:00",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"user": {
|
|
|
|
"username": "joe@example.com",
|
|
|
|
"active": true,
|
|
|
|
"email": "joe@example.com",
|
|
|
|
"id": 3
|
|
|
|
},
|
|
|
|
"active": true,
|
|
|
|
"bits": 2048,
|
|
|
|
"id": 2235,
|
|
|
|
"name": "TestAuthority"
|
|
|
|
},
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 43,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority."
|
2015-06-22 22:47:27 +02:00
|
|
|
}
|
|
|
|
|
2016-06-03 17:28:09 +02:00
|
|
|
|
|
|
|
:arg name: authority's name
|
|
|
|
:arg description: a sensible description about what the CA with be used for
|
|
|
|
:arg owner: the team or person who 'owns' this authority
|
2015-06-22 22:47:27 +02:00
|
|
|
:arg validityStart: when this authority should start issuing certificates
|
|
|
|
:arg validityEnd: when this authority should stop issuing certificates
|
2016-06-03 17:28:09 +02:00
|
|
|
:arg validityYears: starting from `now` how many years into the future the authority should be valid
|
2015-06-22 22:47:27 +02:00
|
|
|
:arg extensions: certificate extensions
|
2016-06-03 17:28:09 +02:00
|
|
|
:arg plugin: name of the plugin to create the authority
|
|
|
|
:arg type: the type of authority (root/subca)
|
|
|
|
:arg parent: the parent authority if this is to be a subca
|
|
|
|
:arg signingAlgorithm: algorithm used to sign the authority
|
2015-06-22 22:47:27 +02:00
|
|
|
:arg keyType: key type
|
2016-06-03 17:28:09 +02:00
|
|
|
:arg sensitivity: the sensitivity of the root key, for CloudCA this determines if the root keys are stored
|
2015-06-22 22:47:27 +02:00
|
|
|
in an HSM
|
2016-06-03 17:28:09 +02:00
|
|
|
:arg keyName: name of the key to store in the HSM (CloudCA)
|
|
|
|
:arg serialNumber: serial number of the authority
|
|
|
|
:arg firstSerial: specifies the starting serial number for certificates issued off of this authority
|
2015-06-22 22:47:27 +02:00
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
:statuscode 200: no error
|
|
|
|
"""
|
2016-11-30 02:15:39 +01:00
|
|
|
data['creator'] = g.current_user
|
2016-05-23 20:28:25 +02:00
|
|
|
return service.create(**data)
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
class Authorities(AuthenticatedResource):
|
|
|
|
def __init__(self):
|
|
|
|
self.reqparse = reqparse.RequestParser()
|
|
|
|
super(Authorities, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authority_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self, authority_id):
|
|
|
|
"""
|
|
|
|
.. http:get:: /authorities/1
|
|
|
|
|
|
|
|
One authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /authorities/1 HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"roles": [{
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}, {
|
|
|
|
"id": 564,
|
|
|
|
"name": "TestAuthority_admin"
|
|
|
|
}, {
|
|
|
|
"id": 565,
|
|
|
|
"name": "TestAuthority_operator"
|
|
|
|
}],
|
2015-06-22 22:47:27 +02:00
|
|
|
"active": true,
|
2016-06-03 17:28:09 +02:00
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 43,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority."
|
2015-06-22 22:47:27 +02:00
|
|
|
}
|
|
|
|
|
2016-06-03 17:28:09 +02:00
|
|
|
:arg description: a sensible description about what the CA with be used for
|
|
|
|
:arg owner: the team or person who 'owns' this authority
|
|
|
|
:arg active: set whether this authoritity is currently in use
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
:statuscode 200: no error
|
2015-06-22 22:47:27 +02:00
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
|
|
|
return service.get(authority_id)
|
|
|
|
|
2016-05-16 18:23:48 +02:00
|
|
|
@validate_schema(authority_update_schema, authority_output_schema)
|
2016-05-09 20:00:16 +02:00
|
|
|
def put(self, authority_id, data=None):
|
2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. http:put:: /authorities/1
|
|
|
|
|
|
|
|
Update a authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
PUT /authorities/1 HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"name": "TestAuthority5",
|
|
|
|
"roles": [{
|
|
|
|
"id": 566,
|
|
|
|
"name": "TestAuthority5_admin"
|
|
|
|
}, {
|
|
|
|
"id": 567,
|
|
|
|
"name": "TestAuthority5_operator"
|
|
|
|
}, {
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}],
|
|
|
|
"active": true,
|
|
|
|
"authorityCertificate": {
|
|
|
|
"body": "-----BEGIN CERTIFICATE-----",
|
|
|
|
"status": null,
|
|
|
|
"cn": "AcommonName",
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority5 certificate authority.",
|
|
|
|
"chain": "",
|
|
|
|
"notBefore": "2016-06-03T00:00:51+00:00",
|
|
|
|
"notAfter": "2036-06-03T23:59:51+00:00",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"user": {
|
|
|
|
"username": "joe@example.com",
|
|
|
|
"active": true,
|
|
|
|
"email": "joe@example.com",
|
|
|
|
"id": 3
|
|
|
|
},
|
|
|
|
"active": true,
|
|
|
|
"bits": 2048,
|
|
|
|
"id": 2280,
|
|
|
|
"name": "TestAuthority5"
|
|
|
|
},
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 44,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority5 certificate authority."
|
|
|
|
}
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"name": "TestAuthority",
|
|
|
|
"roles": [{
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}, {
|
|
|
|
"id": 564,
|
|
|
|
"name": "TestAuthority_admin"
|
|
|
|
}, {
|
|
|
|
"id": 565,
|
|
|
|
"name": "TestAuthority_operator"
|
|
|
|
}],
|
|
|
|
"options": null,
|
|
|
|
"active": true,
|
|
|
|
"authorityCertificate": {
|
|
|
|
"body": "-----BEGIN CERTIFICATE-----IyMzU5MTVaMHk...",
|
|
|
|
"status": true,
|
|
|
|
"cn": "AcommonName",
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority.",
|
|
|
|
"chain": "",
|
|
|
|
"notBefore": "2016-06-02T00:00:15+00:00",
|
|
|
|
"notAfter": "2023-06-02T23:59:15+00:00",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"user": {
|
|
|
|
"username": "joe@example.com",
|
|
|
|
"active": true,
|
|
|
|
"email": "joe@example.com",
|
|
|
|
"id": 3
|
|
|
|
},
|
|
|
|
"active": true,
|
|
|
|
"bits": 2048,
|
|
|
|
"id": 2235,
|
|
|
|
"name": "TestAuthority"
|
|
|
|
},
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 43,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority."
|
2015-06-22 22:47:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
|
|
|
authority = service.get(authority_id)
|
2016-05-16 18:23:48 +02:00
|
|
|
|
|
|
|
if not authority:
|
|
|
|
return dict(message='Not Found'), 404
|
|
|
|
|
2015-06-22 22:47:27 +02:00
|
|
|
# all the authority role members should be allowed
|
|
|
|
roles = [x.name for x in authority.roles]
|
|
|
|
permission = AuthorityPermission(authority_id, roles)
|
|
|
|
|
2016-05-19 22:37:05 +02:00
|
|
|
if permission.can():
|
2015-09-01 23:05:32 +02:00
|
|
|
return service.update(
|
|
|
|
authority_id,
|
2016-05-09 20:00:16 +02:00
|
|
|
owner=data['owner'],
|
|
|
|
description=data['description'],
|
|
|
|
active=data['active'],
|
|
|
|
roles=data['roles']
|
2015-09-01 23:05:32 +02:00
|
|
|
)
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-19 22:37:05 +02:00
|
|
|
return dict(message="You are not authorized to update this authority."), 403
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
class CertificateAuthority(AuthenticatedResource):
|
|
|
|
def __init__(self):
|
|
|
|
super(CertificateAuthority, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authority_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self, certificate_id):
|
|
|
|
"""
|
|
|
|
.. http:get:: /certificates/1/authority
|
|
|
|
|
|
|
|
One authority for given certificate
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /certificates/1/authority HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
2016-06-03 17:28:09 +02:00
|
|
|
"name": "TestAuthority",
|
|
|
|
"roles": [{
|
|
|
|
"id": 123,
|
|
|
|
"name": "secure@example.com"
|
|
|
|
}, {
|
|
|
|
"id": 564,
|
|
|
|
"name": "TestAuthority_admin"
|
|
|
|
}, {
|
|
|
|
"id": 565,
|
|
|
|
"name": "TestAuthority_operator"
|
|
|
|
}],
|
|
|
|
"options": null,
|
2015-06-22 22:47:27 +02:00
|
|
|
"active": true,
|
2016-06-03 17:28:09 +02:00
|
|
|
"authorityCertificate": {
|
|
|
|
"body": "-----BEGIN CERTIFICATE-----IyMzU5MTVaMHk...",
|
|
|
|
"status": true,
|
|
|
|
"cn": "AcommonName",
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority.",
|
|
|
|
"chain": "",
|
|
|
|
"notBefore": "2016-06-02T00:00:15+00:00",
|
|
|
|
"notAfter": "2023-06-02T23:59:15+00:00",
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"user": {
|
|
|
|
"username": "joe@example.com",
|
|
|
|
"active": true,
|
|
|
|
"email": "joe@example.com",
|
|
|
|
"id": 3
|
|
|
|
},
|
|
|
|
"active": true,
|
|
|
|
"bits": 2048,
|
|
|
|
"id": 2235,
|
|
|
|
"name": "TestAuthority"
|
|
|
|
},
|
|
|
|
"owner": "secure@example.com",
|
|
|
|
"id": 43,
|
|
|
|
"description": "This is the ROOT certificate for the TestAuthority certificate authority."
|
2015-06-22 22:47:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
2015-06-29 21:36:27 +02:00
|
|
|
cert = certificate_service.get(certificate_id)
|
|
|
|
if not cert:
|
2016-05-19 22:37:05 +02:00
|
|
|
return dict(message="Certificate not found."), 404
|
2015-06-29 21:36:27 +02:00
|
|
|
|
|
|
|
return cert.authority
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-31 06:52:34 +02:00
|
|
|
|
|
|
|
class AuthorityVisualizations(AuthenticatedResource):
|
|
|
|
def get(self, authority_id):
|
|
|
|
"""
|
|
|
|
{"name": "flare",
|
|
|
|
"children": [
|
|
|
|
{
|
|
|
|
"name": "analytics",
|
|
|
|
"children": [
|
|
|
|
{
|
|
|
|
"name": "cluster",
|
|
|
|
"children": [
|
|
|
|
{"name": "AgglomerativeCluster", "size": 3938},
|
|
|
|
{"name": "CommunityStructure", "size": 3812},
|
|
|
|
{"name": "HierarchicalCluster", "size": 6714},
|
|
|
|
{"name": "MergeEdge", "size": 743}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]}
|
|
|
|
"""
|
|
|
|
authority = service.get(authority_id)
|
|
|
|
return dict(name=authority.name, children=[{"name": c.name} for c in authority.certificates])
|
|
|
|
|
2016-11-21 23:29:20 +01:00
|
|
|
|
2015-06-22 22:47:27 +02:00
|
|
|
api.add_resource(AuthoritiesList, '/authorities', endpoint='authorities')
|
|
|
|
api.add_resource(Authorities, '/authorities/<int:authority_id>', endpoint='authority')
|
2016-05-31 06:52:34 +02:00
|
|
|
api.add_resource(AuthorityVisualizations, '/authorities/<int:authority_id>/visualize', endpoint='authority_visualizations')
|
2015-06-22 22:47:27 +02:00
|
|
|
api.add_resource(CertificateAuthority, '/certificates/<int:certificate_id>/authority', endpoint='certificateAuthority')
|