mirror of
https://github.com/netbox-community/netbox.git
synced 2024-05-10 07:54:54 +00:00
Merge branch 'api2' into v2-develop
This commit is contained in:
@ -24,7 +24,7 @@ $ curl -H "Accept: application/json; indent=4" http://localhost/api/dcim/sites/
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
However, if the `[LOGIN_REQUIRED](../configuration/optional-settings/#login_required)` configuration setting has been set to `True`, all requests must be authenticated.
|
However, if the [`LOGIN_REQUIRED`](../configuration/optional-settings/#login_required) configuration setting has been set to `True`, all requests must be authenticated.
|
||||||
|
|
||||||
```
|
```
|
||||||
$ curl -H "Accept: application/json; indent=4" http://localhost/api/dcim/sites/
|
$ curl -H "Accept: application/json; indent=4" http://localhost/api/dcim/sites/
|
||||||
|
@ -120,7 +120,7 @@ Vary: Accept
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
The default page size derives from the `[PAGINATE_COUNT](../configuration/optional-settings/#paginate_count)` configuration setting, which defaults to 50. However, this can be overridden per request by specifying the desired `offset` and `limit` query parameters. For example, if you wish to retrieve a hundred devices at a time, you would make a request for:
|
The default page size derives from the [`PAGINATE_COUNT`](../configuration/optional-settings/#paginate_count) configuration setting, which defaults to 50. However, this can be overridden per request by specifying the desired `offset` and `limit` query parameters. For example, if you wish to retrieve a hundred devices at a time, you would make a request for:
|
||||||
|
|
||||||
```
|
```
|
||||||
http://localhost:8000/api/dcim/devices/?limit=100
|
http://localhost:8000/api/dcim/devices/?limit=100
|
||||||
|
@ -64,8 +64,10 @@ class SecretViewSet(WritableSerializerMixin, ModelViewSet):
|
|||||||
|
|
||||||
super(SecretViewSet, self).initial(request, *args, **kwargs)
|
super(SecretViewSet, self).initial(request, *args, **kwargs)
|
||||||
|
|
||||||
# Read session key from HTTP cookie or header if it has been provided. The session key must be provided in order
|
if request.user.is_authenticated():
|
||||||
# to encrypt/decrypt secrets.
|
|
||||||
|
# Read session key from HTTP cookie or header if it has been provided. The session key must be provided in
|
||||||
|
# order to encrypt/decrypt secrets.
|
||||||
if 'session_key' in request.COOKIES:
|
if 'session_key' in request.COOKIES:
|
||||||
session_key = base64.b64decode(request.COOKIES['session_key'])
|
session_key = base64.b64decode(request.COOKIES['session_key'])
|
||||||
elif 'HTTP_X_SESSION_KEY' in request.META:
|
elif 'HTTP_X_SESSION_KEY' in request.META:
|
||||||
@ -74,7 +76,6 @@ class SecretViewSet(WritableSerializerMixin, ModelViewSet):
|
|||||||
session_key = None
|
session_key = None
|
||||||
|
|
||||||
# We can't encrypt secret plaintext without a session key.
|
# We can't encrypt secret plaintext without a session key.
|
||||||
# assert False, self.action
|
|
||||||
if self.action in ['create', 'update'] and session_key is None:
|
if self.action in ['create', 'update'] and session_key is None:
|
||||||
raise ValidationError("A session key must be provided when creating or updating secrets.")
|
raise ValidationError("A session key must be provided when creating or updating secrets.")
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user