mirror of
https://github.com/pacnpal/thrillwiki_django_no_react.git
synced 2025-12-21 23:11:08 -05:00
okay fine
This commit is contained in:
190
.venv/lib/python3.12/site-packages/channels/auth.py
Normal file
190
.venv/lib/python3.12/site-packages/channels/auth.py
Normal file
@@ -0,0 +1,190 @@
|
||||
from django.conf import settings
|
||||
from django.contrib.auth import (
|
||||
BACKEND_SESSION_KEY,
|
||||
HASH_SESSION_KEY,
|
||||
SESSION_KEY,
|
||||
_get_backends,
|
||||
get_user_model,
|
||||
load_backend,
|
||||
user_logged_in,
|
||||
user_logged_out,
|
||||
)
|
||||
from django.utils.crypto import constant_time_compare
|
||||
from django.utils.functional import LazyObject
|
||||
|
||||
from channels.db import database_sync_to_async
|
||||
from channels.middleware import BaseMiddleware
|
||||
from channels.sessions import CookieMiddleware, SessionMiddleware
|
||||
|
||||
|
||||
@database_sync_to_async
|
||||
def get_user(scope):
|
||||
"""
|
||||
Return the user model instance associated with the given scope.
|
||||
If no user is retrieved, return an instance of `AnonymousUser`.
|
||||
"""
|
||||
# postpone model import to avoid ImproperlyConfigured error before Django
|
||||
# setup is complete.
|
||||
from django.contrib.auth.models import AnonymousUser
|
||||
|
||||
if "session" not in scope:
|
||||
raise ValueError(
|
||||
"Cannot find session in scope. You should wrap your consumer in "
|
||||
"SessionMiddleware."
|
||||
)
|
||||
session = scope["session"]
|
||||
user = None
|
||||
try:
|
||||
user_id = _get_user_session_key(session)
|
||||
backend_path = session[BACKEND_SESSION_KEY]
|
||||
except KeyError:
|
||||
pass
|
||||
else:
|
||||
if backend_path in settings.AUTHENTICATION_BACKENDS:
|
||||
backend = load_backend(backend_path)
|
||||
user = backend.get_user(user_id)
|
||||
# Verify the session
|
||||
if hasattr(user, "get_session_auth_hash"):
|
||||
session_hash = session.get(HASH_SESSION_KEY)
|
||||
session_hash_verified = session_hash and constant_time_compare(
|
||||
session_hash, user.get_session_auth_hash()
|
||||
)
|
||||
if not session_hash_verified:
|
||||
session.flush()
|
||||
user = None
|
||||
return user or AnonymousUser()
|
||||
|
||||
|
||||
@database_sync_to_async
|
||||
def login(scope, user, backend=None):
|
||||
"""
|
||||
Persist a user id and a backend in the request.
|
||||
This way a user doesn't have to re-authenticate on every request.
|
||||
Note that data set during the anonymous session is retained when the user
|
||||
logs in.
|
||||
"""
|
||||
if "session" not in scope:
|
||||
raise ValueError(
|
||||
"Cannot find session in scope. You should wrap your consumer in "
|
||||
"SessionMiddleware."
|
||||
)
|
||||
session = scope["session"]
|
||||
session_auth_hash = ""
|
||||
if user is None:
|
||||
user = scope.get("user", None)
|
||||
if user is None:
|
||||
raise ValueError(
|
||||
"User must be passed as an argument or must be present in the scope."
|
||||
)
|
||||
if hasattr(user, "get_session_auth_hash"):
|
||||
session_auth_hash = user.get_session_auth_hash()
|
||||
if SESSION_KEY in session:
|
||||
if _get_user_session_key(session) != user.pk or (
|
||||
session_auth_hash
|
||||
and not constant_time_compare(
|
||||
session.get(HASH_SESSION_KEY, ""), session_auth_hash
|
||||
)
|
||||
):
|
||||
# To avoid reusing another user's session, create a new, empty
|
||||
# session if the existing session corresponds to a different
|
||||
# authenticated user.
|
||||
session.flush()
|
||||
else:
|
||||
session.cycle_key()
|
||||
try:
|
||||
backend = backend or user.backend
|
||||
except AttributeError:
|
||||
backends = _get_backends(return_tuples=True)
|
||||
if len(backends) == 1:
|
||||
_, backend = backends[0]
|
||||
else:
|
||||
raise ValueError(
|
||||
"You have multiple authentication backends configured and "
|
||||
"therefore must provide the `backend` "
|
||||
"argument or set the `backend` attribute on the user."
|
||||
)
|
||||
session[SESSION_KEY] = user._meta.pk.value_to_string(user)
|
||||
session[BACKEND_SESSION_KEY] = backend
|
||||
session[HASH_SESSION_KEY] = session_auth_hash
|
||||
scope["user"] = user
|
||||
# note this does not reset the CSRF_COOKIE/Token
|
||||
user_logged_in.send(sender=user.__class__, request=None, user=user)
|
||||
|
||||
|
||||
@database_sync_to_async
|
||||
def logout(scope):
|
||||
"""
|
||||
Remove the authenticated user's ID from the request and flush their session
|
||||
data.
|
||||
"""
|
||||
# postpone model import to avoid ImproperlyConfigured error before Django
|
||||
# setup is complete.
|
||||
from django.contrib.auth.models import AnonymousUser
|
||||
|
||||
if "session" not in scope:
|
||||
raise ValueError(
|
||||
"Login cannot find session in scope. You should wrap your "
|
||||
"consumer in SessionMiddleware."
|
||||
)
|
||||
session = scope["session"]
|
||||
# Dispatch the signal before the user is logged out so the receivers have a
|
||||
# chance to find out *who* logged out.
|
||||
user = scope.get("user", None)
|
||||
if hasattr(user, "is_authenticated") and not user.is_authenticated:
|
||||
user = None
|
||||
if user is not None:
|
||||
user_logged_out.send(sender=user.__class__, request=None, user=user)
|
||||
session.flush()
|
||||
if "user" in scope:
|
||||
scope["user"] = AnonymousUser()
|
||||
|
||||
|
||||
def _get_user_session_key(session):
|
||||
# This value in the session is always serialized to a string, so we need
|
||||
# to convert it back to Python whenever we access it.
|
||||
return get_user_model()._meta.pk.to_python(session[SESSION_KEY])
|
||||
|
||||
|
||||
class UserLazyObject(LazyObject):
|
||||
"""
|
||||
Throw a more useful error message when scope['user'] is accessed before
|
||||
it's resolved
|
||||
"""
|
||||
|
||||
def _setup(self):
|
||||
raise ValueError("Accessing scope user before it is ready.")
|
||||
|
||||
|
||||
class AuthMiddleware(BaseMiddleware):
|
||||
"""
|
||||
Middleware which populates scope["user"] from a Django session.
|
||||
Requires SessionMiddleware to function.
|
||||
"""
|
||||
|
||||
def populate_scope(self, scope):
|
||||
# Make sure we have a session
|
||||
if "session" not in scope:
|
||||
raise ValueError(
|
||||
"AuthMiddleware cannot find session in scope. "
|
||||
"SessionMiddleware must be above it."
|
||||
)
|
||||
# Add it to the scope if it's not there already
|
||||
if "user" not in scope:
|
||||
scope["user"] = UserLazyObject()
|
||||
|
||||
async def resolve_scope(self, scope):
|
||||
scope["user"]._wrapped = await get_user(scope)
|
||||
|
||||
async def __call__(self, scope, receive, send):
|
||||
scope = dict(scope)
|
||||
# Scope injection/mutation per this middleware's needs.
|
||||
self.populate_scope(scope)
|
||||
# Grab the finalized/resolved scope
|
||||
await self.resolve_scope(scope)
|
||||
|
||||
return await super().__call__(scope, receive, send)
|
||||
|
||||
|
||||
# Handy shortcut for applying all three layers at once
|
||||
def AuthMiddlewareStack(inner):
|
||||
return CookieMiddleware(SessionMiddleware(AuthMiddleware(inner)))
|
||||
Reference in New Issue
Block a user