Fixed #25187 -- Made request available in authentication backends.
This commit is contained in:
parent
32c0d823e5
commit
4b9330ccc0
|
@ -1,11 +1,13 @@
|
||||||
import inspect
|
import inspect
|
||||||
import re
|
import re
|
||||||
|
import warnings
|
||||||
|
|
||||||
from django.apps import apps as django_apps
|
from django.apps import apps as django_apps
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.core.exceptions import ImproperlyConfigured, PermissionDenied
|
from django.core.exceptions import ImproperlyConfigured, PermissionDenied
|
||||||
from django.middleware.csrf import rotate_token
|
from django.middleware.csrf import rotate_token
|
||||||
from django.utils.crypto import constant_time_compare
|
from django.utils.crypto import constant_time_compare
|
||||||
|
from django.utils.deprecation import RemovedInDjango21Warning
|
||||||
from django.utils.module_loading import import_string
|
from django.utils.module_loading import import_string
|
||||||
from django.utils.translation import LANGUAGE_SESSION_KEY
|
from django.utils.translation import LANGUAGE_SESSION_KEY
|
||||||
|
|
||||||
|
@ -59,19 +61,29 @@ def _get_user_session_key(request):
|
||||||
return get_user_model()._meta.pk.to_python(request.session[SESSION_KEY])
|
return get_user_model()._meta.pk.to_python(request.session[SESSION_KEY])
|
||||||
|
|
||||||
|
|
||||||
def authenticate(**credentials):
|
def authenticate(request=None, **credentials):
|
||||||
"""
|
"""
|
||||||
If the given credentials are valid, return a User object.
|
If the given credentials are valid, return a User object.
|
||||||
"""
|
"""
|
||||||
for backend, backend_path in _get_backends(return_tuples=True):
|
for backend, backend_path in _get_backends(return_tuples=True):
|
||||||
|
args = (request,)
|
||||||
try:
|
try:
|
||||||
inspect.getcallargs(backend.authenticate, **credentials)
|
inspect.getcallargs(backend.authenticate, request, **credentials)
|
||||||
except TypeError:
|
except TypeError:
|
||||||
# This backend doesn't accept these credentials as arguments. Try the next one.
|
try:
|
||||||
continue
|
inspect.getcallargs(backend.authenticate, **credentials)
|
||||||
|
except TypeError:
|
||||||
|
# This backend doesn't accept these credentials as arguments. Try the next one.
|
||||||
|
continue
|
||||||
|
else:
|
||||||
|
args = ()
|
||||||
|
warnings.warn(
|
||||||
|
"Update authentication backend %s to accept a "
|
||||||
|
"positional `request` argument." % backend_path,
|
||||||
|
RemovedInDjango21Warning
|
||||||
|
)
|
||||||
try:
|
try:
|
||||||
user = backend.authenticate(**credentials)
|
user = backend.authenticate(*args, **credentials)
|
||||||
except PermissionDenied:
|
except PermissionDenied:
|
||||||
# This backend says to stop in our tracks - this user should not be allowed in at all.
|
# This backend says to stop in our tracks - this user should not be allowed in at all.
|
||||||
break
|
break
|
||||||
|
|
|
@ -9,7 +9,7 @@ class ModelBackend(object):
|
||||||
Authenticates against settings.AUTH_USER_MODEL.
|
Authenticates against settings.AUTH_USER_MODEL.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def authenticate(self, username=None, password=None, **kwargs):
|
def authenticate(self, request, username=None, password=None, **kwargs):
|
||||||
UserModel = get_user_model()
|
UserModel = get_user_model()
|
||||||
if username is None:
|
if username is None:
|
||||||
username = kwargs.get(UserModel.USERNAME_FIELD)
|
username = kwargs.get(UserModel.USERNAME_FIELD)
|
||||||
|
@ -125,7 +125,7 @@ class RemoteUserBackend(ModelBackend):
|
||||||
# Create a User object if not already in the database?
|
# Create a User object if not already in the database?
|
||||||
create_unknown_user = True
|
create_unknown_user = True
|
||||||
|
|
||||||
def authenticate(self, remote_user):
|
def authenticate(self, request, remote_user):
|
||||||
"""
|
"""
|
||||||
The username passed as ``remote_user`` is considered trusted. This
|
The username passed as ``remote_user`` is considered trusted. This
|
||||||
method simply returns the ``User`` object with the given username,
|
method simply returns the ``User`` object with the given username,
|
||||||
|
|
|
@ -189,7 +189,7 @@ class AuthenticationForm(forms.Form):
|
||||||
password = self.cleaned_data.get('password')
|
password = self.cleaned_data.get('password')
|
||||||
|
|
||||||
if username is not None and password:
|
if username is not None and password:
|
||||||
self.user_cache = authenticate(username=username, password=password)
|
self.user_cache = authenticate(self.request, username=username, password=password)
|
||||||
if self.user_cache is None:
|
if self.user_cache is None:
|
||||||
raise forms.ValidationError(
|
raise forms.ValidationError(
|
||||||
self.error_messages['invalid_login'],
|
self.error_messages['invalid_login'],
|
||||||
|
|
|
@ -88,7 +88,7 @@ class RemoteUserMiddleware(MiddlewareMixin):
|
||||||
|
|
||||||
# We are seeing this user for the first time in this session, attempt
|
# We are seeing this user for the first time in this session, attempt
|
||||||
# to authenticate the user.
|
# to authenticate the user.
|
||||||
user = auth.authenticate(remote_user=username)
|
user = auth.authenticate(request, remote_user=username)
|
||||||
if user:
|
if user:
|
||||||
# User is valid. Set request.user and persist user in the session
|
# User is valid. Set request.user and persist user in the session
|
||||||
# by logging the user in.
|
# by logging the user in.
|
||||||
|
|
|
@ -38,6 +38,9 @@ details on these changes.
|
||||||
|
|
||||||
* ``DatabaseIntrospection.get_indexes()`` will be removed.
|
* ``DatabaseIntrospection.get_indexes()`` will be removed.
|
||||||
|
|
||||||
|
* The ``authenticate()`` method of authentication backends will require a
|
||||||
|
``request`` argument.
|
||||||
|
|
||||||
.. _deprecation-removed-in-2.0:
|
.. _deprecation-removed-in-2.0:
|
||||||
|
|
||||||
2.0
|
2.0
|
||||||
|
|
|
@ -518,7 +518,7 @@ The following backends are available in :mod:`django.contrib.auth.backends`:
|
||||||
implement them other than returning an empty set of permissions if
|
implement them other than returning an empty set of permissions if
|
||||||
``obj is not None``.
|
``obj is not None``.
|
||||||
|
|
||||||
.. method:: authenticate(username=None, password=None, **kwargs)
|
.. method:: authenticate(request, username=None, password=None, **kwargs)
|
||||||
|
|
||||||
Tries to authenticate ``username`` with ``password`` by calling
|
Tries to authenticate ``username`` with ``password`` by calling
|
||||||
:meth:`User.check_password
|
:meth:`User.check_password
|
||||||
|
@ -528,6 +528,14 @@ The following backends are available in :mod:`django.contrib.auth.backends`:
|
||||||
<django.contrib.auth.models.CustomUser.USERNAME_FIELD>`. Returns an
|
<django.contrib.auth.models.CustomUser.USERNAME_FIELD>`. Returns an
|
||||||
authenticated user or ``None``.
|
authenticated user or ``None``.
|
||||||
|
|
||||||
|
``request`` is an :class:`~django.http.HttpRequest` and may be ``None``
|
||||||
|
if it wasn't provided to :func:`~django.contrib.auth.authenticate`
|
||||||
|
(which passes it on to the backend).
|
||||||
|
|
||||||
|
.. versionchanged:: 1.11
|
||||||
|
|
||||||
|
The ``request`` argument was added.
|
||||||
|
|
||||||
.. method:: get_user_permissions(user_obj, obj=None)
|
.. method:: get_user_permissions(user_obj, obj=None)
|
||||||
|
|
||||||
Returns the set of permission strings the ``user_obj`` has from their
|
Returns the set of permission strings the ``user_obj`` has from their
|
||||||
|
@ -603,7 +611,7 @@ The following backends are available in :mod:`django.contrib.auth.backends`:
|
||||||
:class:`~django.contrib.auth.models.User` object is created if not already
|
:class:`~django.contrib.auth.models.User` object is created if not already
|
||||||
in the database. Defaults to ``True``.
|
in the database. Defaults to ``True``.
|
||||||
|
|
||||||
.. method:: RemoteUserBackend.authenticate(remote_user)
|
.. method:: RemoteUserBackend.authenticate(request, remote_user)
|
||||||
|
|
||||||
The username passed as ``remote_user`` is considered trusted. This method
|
The username passed as ``remote_user`` is considered trusted. This method
|
||||||
simply returns the ``User`` object with the given username, creating a new
|
simply returns the ``User`` object with the given username, creating a new
|
||||||
|
@ -614,6 +622,10 @@ The following backends are available in :mod:`django.contrib.auth.backends`:
|
||||||
``False`` and a ``User`` object with the given username is not found in the
|
``False`` and a ``User`` object with the given username is not found in the
|
||||||
database.
|
database.
|
||||||
|
|
||||||
|
``request`` is an :class:`~django.http.HttpRequest` and may be ``None`` if
|
||||||
|
it wasn't provided to :func:`~django.contrib.auth.authenticate` (which
|
||||||
|
passes it on to the backend).
|
||||||
|
|
||||||
.. method:: RemoteUserBackend.clean_username(username)
|
.. method:: RemoteUserBackend.clean_username(username)
|
||||||
|
|
||||||
Performs any cleaning on the ``username`` (e.g. stripping LDAP DN
|
Performs any cleaning on the ``username`` (e.g. stripping LDAP DN
|
||||||
|
|
|
@ -113,6 +113,10 @@ Minor features
|
||||||
allows using the authentication system :ref:`without any of the built-in
|
allows using the authentication system :ref:`without any of the built-in
|
||||||
models <using-auth-without-models>`.
|
models <using-auth-without-models>`.
|
||||||
|
|
||||||
|
* The ``HttpRequest`` is now passed to :func:`~django.contrib.auth.authenticate`
|
||||||
|
which in turn passes it to the authentication backend if it accepts a
|
||||||
|
``request`` argument.
|
||||||
|
|
||||||
:mod:`django.contrib.contenttypes`
|
:mod:`django.contrib.contenttypes`
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
@ -556,3 +560,7 @@ Miscellaneous
|
||||||
|
|
||||||
* ``DatabaseIntrospection.get_indexes()`` is deprecated in favor of
|
* ``DatabaseIntrospection.get_indexes()`` is deprecated in favor of
|
||||||
``DatabaseIntrospection.get_constraints()``.
|
``DatabaseIntrospection.get_constraints()``.
|
||||||
|
|
||||||
|
* :func:`~django.contrib.auth.authenticate` now passes a ``request`` argument
|
||||||
|
to the ``authenticate()`` method of authentication backends. Support for
|
||||||
|
methods that don't accept ``request`` will be removed in Django 2.1.
|
||||||
|
|
|
@ -89,25 +89,26 @@ Writing an authentication backend
|
||||||
---------------------------------
|
---------------------------------
|
||||||
|
|
||||||
An authentication backend is a class that implements two required methods:
|
An authentication backend is a class that implements two required methods:
|
||||||
``get_user(user_id)`` and ``authenticate(**credentials)``, as well as a set of
|
``get_user(user_id)`` and ``authenticate(request, **credentials)``, as well as
|
||||||
optional permission related :ref:`authorization methods <authorization_methods>`.
|
a set of optional permission related :ref:`authorization methods
|
||||||
|
<authorization_methods>`.
|
||||||
|
|
||||||
The ``get_user`` method takes a ``user_id`` -- which could be a username,
|
The ``get_user`` method takes a ``user_id`` -- which could be a username,
|
||||||
database ID or whatever, but has to be the primary key of your ``User`` object
|
database ID or whatever, but has to be the primary key of your ``User`` object
|
||||||
-- and returns a ``User`` object.
|
-- and returns a ``User`` object.
|
||||||
|
|
||||||
The ``authenticate`` method takes credentials as keyword arguments. Most of
|
The ``authenticate`` method takes a ``request`` argument and credentials as
|
||||||
the time, it'll just look like this::
|
keyword arguments. Most of the time, it'll just look like this::
|
||||||
|
|
||||||
class MyBackend(object):
|
class MyBackend(object):
|
||||||
def authenticate(self, username=None, password=None):
|
def authenticate(self, request, username=None, password=None):
|
||||||
# Check the username/password and return a User.
|
# Check the username/password and return a User.
|
||||||
...
|
...
|
||||||
|
|
||||||
But it could also authenticate a token, like so::
|
But it could also authenticate a token, like so::
|
||||||
|
|
||||||
class MyBackend(object):
|
class MyBackend(object):
|
||||||
def authenticate(self, token=None):
|
def authenticate(self, request, token=None):
|
||||||
# Check the token and return a User.
|
# Check the token and return a User.
|
||||||
...
|
...
|
||||||
|
|
||||||
|
@ -115,6 +116,10 @@ Either way, ``authenticate`` should check the credentials it gets, and it
|
||||||
should return a ``User`` object that matches those credentials, if the
|
should return a ``User`` object that matches those credentials, if the
|
||||||
credentials are valid. If they're not valid, it should return ``None``.
|
credentials are valid. If they're not valid, it should return ``None``.
|
||||||
|
|
||||||
|
``request`` is an :class:`~django.http.HttpRequest` and may be ``None`` if it
|
||||||
|
wasn't provided to :func:`~django.contrib.auth.authenticate` (which passes it
|
||||||
|
on to the backend).
|
||||||
|
|
||||||
The Django admin is tightly coupled to the Django :ref:`User object
|
The Django admin is tightly coupled to the Django :ref:`User object
|
||||||
<user-objects>`. The best way to deal with this is to create a Django ``User``
|
<user-objects>`. The best way to deal with this is to create a Django ``User``
|
||||||
object for each user that exists for your backend (e.g., in your LDAP
|
object for each user that exists for your backend (e.g., in your LDAP
|
||||||
|
@ -140,7 +145,7 @@ object the first time a user authenticates::
|
||||||
ADMIN_PASSWORD = 'pbkdf2_sha256$30000$Vo0VlMnkR4Bk$qEvtdyZRWTcOsCnI/oQ7fVOu1XAURIZYoOZ3iq8Dr4M='
|
ADMIN_PASSWORD = 'pbkdf2_sha256$30000$Vo0VlMnkR4Bk$qEvtdyZRWTcOsCnI/oQ7fVOu1XAURIZYoOZ3iq8Dr4M='
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def authenticate(self, username=None, password=None):
|
def authenticate(self, request, username=None, password=None):
|
||||||
login_valid = (settings.ADMIN_LOGIN == username)
|
login_valid = (settings.ADMIN_LOGIN == username)
|
||||||
pwd_valid = check_password(password, settings.ADMIN_PASSWORD)
|
pwd_valid = check_password(password, settings.ADMIN_PASSWORD)
|
||||||
if login_valid and pwd_valid:
|
if login_valid and pwd_valid:
|
||||||
|
@ -163,6 +168,11 @@ object the first time a user authenticates::
|
||||||
except User.DoesNotExist:
|
except User.DoesNotExist:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
.. versionchanged:: 1.11
|
||||||
|
|
||||||
|
The ``request`` parameter was added to ``authenticate()`` and support for
|
||||||
|
backends that don't accept it will be removed in Django 2.1.
|
||||||
|
|
||||||
.. _authorization_methods:
|
.. _authorization_methods:
|
||||||
|
|
||||||
Handling authorization in custom backends
|
Handling authorization in custom backends
|
||||||
|
|
|
@ -115,7 +115,7 @@ Changing a user's password will log out all their sessions. See
|
||||||
Authenticating users
|
Authenticating users
|
||||||
--------------------
|
--------------------
|
||||||
|
|
||||||
.. function:: authenticate(\**credentials)
|
.. function:: authenticate(request=None, \**credentials)
|
||||||
|
|
||||||
Use :func:`~django.contrib.auth.authenticate()` to verify a set of
|
Use :func:`~django.contrib.auth.authenticate()` to verify a set of
|
||||||
credentials. It takes credentials as keyword arguments, ``username`` and
|
credentials. It takes credentials as keyword arguments, ``username`` and
|
||||||
|
@ -133,6 +133,13 @@ Authenticating users
|
||||||
else:
|
else:
|
||||||
# No backend authenticated the credentials
|
# No backend authenticated the credentials
|
||||||
|
|
||||||
|
``request`` is an optional :class:`~django.http.HttpRequest` which is
|
||||||
|
passed on the ``authenticate()`` method of the authentication backends.
|
||||||
|
|
||||||
|
.. versionchanged:: 1.11
|
||||||
|
|
||||||
|
The optional ``request`` argument was added.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
This is a low level way to authenticate a set of credentials; for
|
This is a low level way to authenticate a set of credentials; for
|
||||||
|
@ -342,7 +349,7 @@ If you have an authenticated user you want to attach to the current session
|
||||||
def my_view(request):
|
def my_view(request):
|
||||||
username = request.POST['username']
|
username = request.POST['username']
|
||||||
password = request.POST['password']
|
password = request.POST['password']
|
||||||
user = authenticate(username=username, password=password)
|
user = authenticate(request, username=username, password=password)
|
||||||
if user is not None:
|
if user is not None:
|
||||||
login(request, user)
|
login(request, user)
|
||||||
# Redirect to a success page.
|
# Redirect to a success page.
|
||||||
|
|
|
@ -475,7 +475,7 @@ class PermissionDeniedBackend(object):
|
||||||
Always raises PermissionDenied in `authenticate`, `has_perm` and `has_module_perms`.
|
Always raises PermissionDenied in `authenticate`, `has_perm` and `has_module_perms`.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def authenticate(self, username=None, password=None):
|
def authenticate(self, request, username=None, password=None):
|
||||||
raise PermissionDenied
|
raise PermissionDenied
|
||||||
|
|
||||||
def has_perm(self, user_obj, perm, obj=None):
|
def has_perm(self, user_obj, perm, obj=None):
|
||||||
|
@ -585,7 +585,7 @@ class TypeErrorBackend(object):
|
||||||
Always raises TypeError.
|
Always raises TypeError.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def authenticate(self, username=None, password=None):
|
def authenticate(self, request, username=None, password=None):
|
||||||
raise TypeError
|
raise TypeError
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,30 @@
|
||||||
|
import warnings
|
||||||
|
|
||||||
|
from django.contrib.auth import authenticate
|
||||||
|
from django.test import SimpleTestCase, override_settings
|
||||||
|
|
||||||
|
|
||||||
|
class NoRequestBackend(object):
|
||||||
|
def authenticate(self, username=None, password=None):
|
||||||
|
# Doesn't accept a request parameter.
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class AcceptsRequestBackendTest(SimpleTestCase):
|
||||||
|
"""
|
||||||
|
A deprecation warning is shown for backends that have an authenticate()
|
||||||
|
method without a request parameter.
|
||||||
|
"""
|
||||||
|
no_request_backend = '%s.NoRequestBackend' % __name__
|
||||||
|
|
||||||
|
@override_settings(AUTHENTICATION_BACKENDS=[no_request_backend])
|
||||||
|
def test_no_request_deprecation_warning(self):
|
||||||
|
with warnings.catch_warnings(record=True) as warns:
|
||||||
|
warnings.simplefilter('always')
|
||||||
|
authenticate(username='test', password='test')
|
||||||
|
self.assertEqual(len(warns), 1)
|
||||||
|
self.assertEqual(
|
||||||
|
str(warns[0].message),
|
||||||
|
"Update authentication backend %s to accept a positional `request` "
|
||||||
|
"argument." % self.no_request_backend
|
||||||
|
)
|
|
@ -5,7 +5,7 @@ from .models import CustomUser
|
||||||
|
|
||||||
class CustomUserBackend(ModelBackend):
|
class CustomUserBackend(ModelBackend):
|
||||||
|
|
||||||
def authenticate(self, username=None, password=None):
|
def authenticate(self, request, username=None, password=None):
|
||||||
try:
|
try:
|
||||||
user = CustomUser.custom_objects.get_by_natural_key(username)
|
user = CustomUser.custom_objects.get_by_natural_key(username)
|
||||||
if user.check_password(password):
|
if user.check_password(password):
|
||||||
|
|
Loading…
Reference in New Issue