backends.py 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. import warnings
  2. from django.contrib.auth import get_user_model
  3. from django.contrib.auth.models import Permission
  4. from django.db.models import Exists, OuterRef, Q
  5. from django.utils.deprecation import RemovedInDjango50Warning
  6. from django.utils.inspect import func_supports_parameter
  7. UserModel = get_user_model()
  8. class BaseBackend:
  9. def authenticate(self, request, **kwargs):
  10. return None
  11. def get_user(self, user_id):
  12. return None
  13. def get_user_permissions(self, user_obj, obj=None):
  14. return set()
  15. def get_group_permissions(self, user_obj, obj=None):
  16. return set()
  17. def get_all_permissions(self, user_obj, obj=None):
  18. return {
  19. *self.get_user_permissions(user_obj, obj=obj),
  20. *self.get_group_permissions(user_obj, obj=obj),
  21. }
  22. def has_perm(self, user_obj, perm, obj=None):
  23. return perm in self.get_all_permissions(user_obj, obj=obj)
  24. class ModelBackend(BaseBackend):
  25. """
  26. Authenticates against settings.AUTH_USER_MODEL.
  27. """
  28. def authenticate(self, request, username=None, password=None, **kwargs):
  29. if username is None:
  30. username = kwargs.get(UserModel.USERNAME_FIELD)
  31. if username is None or password is None:
  32. return
  33. try:
  34. user = UserModel._default_manager.get_by_natural_key(username)
  35. except UserModel.DoesNotExist:
  36. # Run the default password hasher once to reduce the timing
  37. # difference between an existing and a nonexistent user (#20760).
  38. UserModel().set_password(password)
  39. else:
  40. if user.check_password(password) and self.user_can_authenticate(user):
  41. return user
  42. def user_can_authenticate(self, user):
  43. """
  44. Reject users with is_active=False. Custom user models that don't have
  45. that attribute are allowed.
  46. """
  47. return getattr(user, "is_active", True)
  48. def _get_user_permissions(self, user_obj):
  49. return user_obj.user_permissions.all()
  50. def _get_group_permissions(self, user_obj):
  51. user_groups_field = get_user_model()._meta.get_field("groups")
  52. user_groups_query = "group__%s" % user_groups_field.related_query_name()
  53. return Permission.objects.filter(**{user_groups_query: user_obj})
  54. def _get_permissions(self, user_obj, obj, from_name):
  55. """
  56. Return the permissions of `user_obj` from `from_name`. `from_name` can
  57. be either "group" or "user" to return permissions from
  58. `_get_group_permissions` or `_get_user_permissions` respectively.
  59. """
  60. if not user_obj.is_active or user_obj.is_anonymous or obj is not None:
  61. return set()
  62. perm_cache_name = "_%s_perm_cache" % from_name
  63. if not hasattr(user_obj, perm_cache_name):
  64. if user_obj.is_superuser:
  65. perms = Permission.objects.all()
  66. else:
  67. perms = getattr(self, "_get_%s_permissions" % from_name)(user_obj)
  68. perms = perms.values_list("content_type__app_label", "codename").order_by()
  69. setattr(
  70. user_obj, perm_cache_name, {"%s.%s" % (ct, name) for ct, name in perms}
  71. )
  72. return getattr(user_obj, perm_cache_name)
  73. def get_user_permissions(self, user_obj, obj=None):
  74. """
  75. Return a set of permission strings the user `user_obj` has from their
  76. `user_permissions`.
  77. """
  78. return self._get_permissions(user_obj, obj, "user")
  79. def get_group_permissions(self, user_obj, obj=None):
  80. """
  81. Return a set of permission strings the user `user_obj` has from the
  82. groups they belong.
  83. """
  84. return self._get_permissions(user_obj, obj, "group")
  85. def get_all_permissions(self, user_obj, obj=None):
  86. if not user_obj.is_active or user_obj.is_anonymous or obj is not None:
  87. return set()
  88. if not hasattr(user_obj, "_perm_cache"):
  89. user_obj._perm_cache = super().get_all_permissions(user_obj)
  90. return user_obj._perm_cache
  91. def has_perm(self, user_obj, perm, obj=None):
  92. return user_obj.is_active and super().has_perm(user_obj, perm, obj=obj)
  93. def has_module_perms(self, user_obj, app_label):
  94. """
  95. Return True if user_obj has any permissions in the given app_label.
  96. """
  97. return user_obj.is_active and any(
  98. perm[: perm.index(".")] == app_label
  99. for perm in self.get_all_permissions(user_obj)
  100. )
  101. def with_perm(self, perm, is_active=True, include_superusers=True, obj=None):
  102. """
  103. Return users that have permission "perm". By default, filter out
  104. inactive users and include superusers.
  105. """
  106. if isinstance(perm, str):
  107. try:
  108. app_label, codename = perm.split(".")
  109. except ValueError:
  110. raise ValueError(
  111. "Permission name should be in the form "
  112. "app_label.permission_codename."
  113. )
  114. elif not isinstance(perm, Permission):
  115. raise TypeError(
  116. "The `perm` argument must be a string or a permission instance."
  117. )
  118. if obj is not None:
  119. return UserModel._default_manager.none()
  120. permission_q = Q(group__user=OuterRef("pk")) | Q(user=OuterRef("pk"))
  121. if isinstance(perm, Permission):
  122. permission_q &= Q(pk=perm.pk)
  123. else:
  124. permission_q &= Q(codename=codename, content_type__app_label=app_label)
  125. user_q = Exists(Permission.objects.filter(permission_q))
  126. if include_superusers:
  127. user_q |= Q(is_superuser=True)
  128. if is_active is not None:
  129. user_q &= Q(is_active=is_active)
  130. return UserModel._default_manager.filter(user_q)
  131. def get_user(self, user_id):
  132. try:
  133. user = UserModel._default_manager.get(pk=user_id)
  134. except UserModel.DoesNotExist:
  135. return None
  136. return user if self.user_can_authenticate(user) else None
  137. class AllowAllUsersModelBackend(ModelBackend):
  138. def user_can_authenticate(self, user):
  139. return True
  140. class RemoteUserBackend(ModelBackend):
  141. """
  142. This backend is to be used in conjunction with the ``RemoteUserMiddleware``
  143. found in the middleware module of this package, and is used when the server
  144. is handling authentication outside of Django.
  145. By default, the ``authenticate`` method creates ``User`` objects for
  146. usernames that don't already exist in the database. Subclasses can disable
  147. this behavior by setting the ``create_unknown_user`` attribute to
  148. ``False``.
  149. """
  150. # Create a User object if not already in the database?
  151. create_unknown_user = True
  152. def authenticate(self, request, remote_user):
  153. """
  154. The username passed as ``remote_user`` is considered trusted. Return
  155. the ``User`` object with the given username. Create a new ``User``
  156. object if ``create_unknown_user`` is ``True``.
  157. Return None if ``create_unknown_user`` is ``False`` and a ``User``
  158. object with the given username is not found in the database.
  159. """
  160. if not remote_user:
  161. return
  162. created = False
  163. user = None
  164. username = self.clean_username(remote_user)
  165. # Note that this could be accomplished in one try-except clause, but
  166. # instead we use get_or_create when creating unknown users since it has
  167. # built-in safeguards for multiple threads.
  168. if self.create_unknown_user:
  169. user, created = UserModel._default_manager.get_or_create(
  170. **{UserModel.USERNAME_FIELD: username}
  171. )
  172. else:
  173. try:
  174. user = UserModel._default_manager.get_by_natural_key(username)
  175. except UserModel.DoesNotExist:
  176. pass
  177. # RemovedInDjango50Warning: When the deprecation ends, replace with:
  178. # user = self.configure_user(request, user, created=created)
  179. if func_supports_parameter(self.configure_user, "created"):
  180. user = self.configure_user(request, user, created=created)
  181. else:
  182. warnings.warn(
  183. f"`created=True` must be added to the signature of "
  184. f"{self.__class__.__qualname__}.configure_user().",
  185. category=RemovedInDjango50Warning,
  186. )
  187. if created:
  188. user = self.configure_user(request, user)
  189. return user if self.user_can_authenticate(user) else None
  190. def clean_username(self, username):
  191. """
  192. Perform any cleaning on the "username" prior to using it to get or
  193. create the user object. Return the cleaned username.
  194. By default, return the username unchanged.
  195. """
  196. return username
  197. def configure_user(self, request, user, created=True):
  198. """
  199. Configure a user and return the updated user.
  200. By default, return the user unmodified.
  201. """
  202. return user
  203. class AllowAllUsersRemoteUserBackend(RemoteUserBackend):
  204. def user_can_authenticate(self, user):
  205. return True