发布于 2015-09-02 08:27:55 | 178 次阅读 | 评论: 0 | 来源: 网络整理
该部分文档涵盖了 Flask-WTF 的全部接口。
flask_wtf.
Form
(formdata=<class flask_wtf.form._Auto at 0x1060a0db8>, obj=None, prefix='', csrf_context=None, secret_key=None, csrf_enabled=None, *args, **kwargs)¶Flask-specific subclass of WTForms SecureForm class.
If formdata is not specified, this will use flask.request.form. Explicitly pass formdata = None to prevent this.
Parameters: |
|
---|
Wraps hidden fields in a hidden DIV tag, in order to keep XHTML compliance.
New in version 0.3.
Parameters: | fields – list of hidden field names. If not provided will render all hidden fields, including the CSRF field. |
---|
is_submitted
()¶Checks if form has been submitted. The default case is if the HTTP method is PUT or POST.
validate_csrf_data
(data)¶Check if the csrf data is valid.
Parameters: | data – the csrf string to be validated. |
---|
validate_on_submit
()¶Checks if form has been submitted and if so runs validate. This is
a shortcut, equivalent to form.is_submitted() and form.validate()
flask_wtf.
RecaptchaField
(label='', validators=None, **kwargs)¶flask_wtf.
Recaptcha
(message=None)¶Validates a ReCaptcha.
flask_wtf.
RecaptchaWidget
¶flask_wtf.file.
FileField
(label=None, validators=None, filters=(), description=u'', id=None, default=None, widget=None, _form=None, _name=None, _prefix=u'', _translations=None, _meta=None)¶Werkzeug-aware subclass of wtforms.FileField
Provides a has_file() method to check if its data is a FileStorage instance with an actual file.
has_file
()¶Return True iff self.data is a FileStorage with file data
flask_wtf.file.
FileAllowed
(upload_set, message=None)¶Validates that the uploaded file is allowed by the given Flask-Uploads UploadSet.
Parameters: |
|
---|
You can also use the synonym file_allowed.
flask_wtf.file.
FileRequired
(message=None)¶Validates that field has a file.
Parameters: | message – error message |
---|
You can also use the synonym file_required.
flask_wtf.html5.
SearchInput
(input_type=None)¶Renders an input with type “search”.
flask_wtf.html5.
SearchField
(label=None, validators=None, filters=(), description=u'', id=None, default=None, widget=None, _form=None, _name=None, _prefix=u'', _translations=None, _meta=None)¶Represents an <input type="search">
.
flask_wtf.html5.
URLInput
(input_type=None)¶Renders an input with type “url”.
flask_wtf.html5.
URLField
(label=None, validators=None, filters=(), description=u'', id=None, default=None, widget=None, _form=None, _name=None, _prefix=u'', _translations=None, _meta=None)¶Represents an <input type="url">
.
flask_wtf.html5.
EmailInput
(input_type=None)¶Renders an input with type “email”.
flask_wtf.html5.
EmailField
(label=None, validators=None, filters=(), description=u'', id=None, default=None, widget=None, _form=None, _name=None, _prefix=u'', _translations=None, _meta=None)¶Represents an <input type="email">
.
flask_wtf.html5.
TelInput
(input_type=None)¶Renders an input with type “tel”.
flask_wtf.html5.
TelField
(label=None, validators=None, filters=(), description=u'', id=None, default=None, widget=None, _form=None, _name=None, _prefix=u'', _translations=None, _meta=None)¶Represents an <input type="tel">
.
flask_wtf.html5.
NumberInput
(step=None)¶Renders an input with type “number”.
flask_wtf.html5.
IntegerField
(label=None, validators=None, **kwargs)¶Represents an <input type="number">
.
flask_wtf.html5.
DecimalField
(label=None, validators=None, places=<unset value>, rounding=None, **kwargs)¶Represents an <input type="number">
.
flask_wtf.html5.
RangeInput
(step=None)¶Renders an input with type “range”.
flask_wtf.html5.
IntegerRangeField
(label=None, validators=None, **kwargs)¶Represents an <input type="range">
.
flask_wtf.html5.
DecimalRangeField
(label=None, validators=None, places=<unset value>, rounding=None, **kwargs)¶Represents an <input type="range">
.
flask_wtf.csrf.
CsrfProtect
(app=None)¶Enable csrf protect for Flask.
Register it with:
app = Flask(__name__)
CsrfProtect(app)
And in the templates, add the token input:
<input type="hidden" name="csrf_token" value="{{ csrf_token() }}"/>
If you need to send the token via AJAX, and there is no form:
<meta name="csrf_token" content="{{ csrf_token() }}" />
You can grab the csrf token with JavaScript, and send the token together.
error_handler
(view)¶A decorator that set the error response handler.
It accepts one parameter reason:
@csrf.error_handler
def csrf_error(reason):
return render_template('error.html', reason=reason)
By default, it will return a 400 response.
exempt
(view)¶A decorator that can exclude a view from csrf protection.
Remember to put the decorator above the route:
csrf = CsrfProtect(app)
@csrf.exempt
@app.route('/some-view', methods=['POST'])
def some_view():
return
flask_wtf.csrf.
generate_csrf
(secret_key=None, time_limit=None)¶Generate csrf token code.
Parameters: |
|
---|
flask_wtf.csrf.
validate_csrf
(data, secret_key=None, time_limit=None)¶Check if the given data is a valid csrf token.
Parameters: |
|
---|