auth_backends.py 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. import logging
  2. from django.conf import settings
  3. from django.contrib.auth.backends import ModelBackend, RemoteUserBackend as RemoteUserBackend_
  4. from django.contrib.auth.models import Group, Permission
  5. from django.db.models import Q
  6. from users.models import ObjectPermission
  7. class ObjectPermissionBackend(ModelBackend):
  8. def get_object_permissions(self, user_obj):
  9. """
  10. Return all model-level permissions granted to the user by an ObjectPermission.
  11. """
  12. if not hasattr(user_obj, '_object_perm_cache'):
  13. # Cache all assigned ObjectPermissions on the User instance
  14. perms = set()
  15. for obj_perm in ObjectPermission.objects.filter(
  16. Q(users=user_obj) |
  17. Q(groups__user=user_obj)
  18. ).prefetch_related('model'):
  19. for action in ['view', 'add', 'change', 'delete']:
  20. if getattr(obj_perm, f"can_{action}"):
  21. perms.add(f"{obj_perm.model.app_label}.{action}_{obj_perm.model.model}")
  22. setattr(user_obj, '_object_perm_cache', perms)
  23. return user_obj._object_perm_cache
  24. def get_all_permissions(self, user_obj, obj=None):
  25. # Handle inactive/anonymous users
  26. if not user_obj.is_active or user_obj.is_anonymous:
  27. return set()
  28. # Cache model-level permissions on the User instance
  29. if not hasattr(user_obj, '_perm_cache'):
  30. user_obj._perm_cache = {
  31. *self.get_user_permissions(user_obj, obj=obj),
  32. *self.get_group_permissions(user_obj, obj=obj),
  33. *self.get_object_permissions(user_obj)
  34. }
  35. return user_obj._perm_cache
  36. def has_perm(self, user_obj, perm, obj=None):
  37. app_label, codename = perm.split('.')
  38. action, model_name = codename.split('_')
  39. # If this is a view permission, check whether the model has been exempted from enforcement
  40. if action == 'view':
  41. if (
  42. # All models are exempt from view permission enforcement
  43. '*' in settings.EXEMPT_VIEW_PERMISSIONS
  44. ) or (
  45. # This specific model is exempt from view permission enforcement
  46. '{}.{}'.format(app_label, model_name) in settings.EXEMPT_VIEW_PERMISSIONS
  47. ):
  48. return True
  49. # If no object is specified, evaluate model-level permissions. The presence of a permission in this set tells
  50. # us that the user has permission for *some* objects, but not necessarily a specific object.
  51. if obj is None:
  52. return perm in self.get_all_permissions(user_obj)
  53. # Sanity check: Ensure that the requested permission applies to the specified object
  54. model = obj._meta.model
  55. if model._meta.label_lower != '.'.join((app_label, model_name)):
  56. raise ValueError(f"Invalid permission {perm} for model {model}")
  57. # If the user has been granted model-level permission for the object, return True
  58. model_perms = {
  59. *self.get_user_permissions(user_obj),
  60. *self.get_group_permissions(user_obj),
  61. }
  62. if perm in model_perms:
  63. return True
  64. # Gather all ObjectPermissions pertinent to the requested permission. If none are found, the User has no
  65. # applicable permissions.
  66. attrs = ObjectPermission.objects.get_attr_constraints(user_obj, perm)
  67. if not attrs:
  68. return False
  69. # Permission to perform the requested action on the object depends on whether the specified object matches
  70. # the specified attributes. Note that this check is made against the *database* record representing the object,
  71. # not the instance itself.
  72. return model.objects.filter(attrs, pk=obj.pk).exists()
  73. class RemoteUserBackend(RemoteUserBackend_):
  74. """
  75. Custom implementation of Django's RemoteUserBackend which provides configuration hooks for basic customization.
  76. """
  77. @property
  78. def create_unknown_user(self):
  79. return settings.REMOTE_AUTH_AUTO_CREATE_USER
  80. def configure_user(self, request, user):
  81. logger = logging.getLogger('netbox.authentication.RemoteUserBackend')
  82. # Assign default groups to the user
  83. group_list = []
  84. for name in settings.REMOTE_AUTH_DEFAULT_GROUPS:
  85. try:
  86. group_list.append(Group.objects.get(name=name))
  87. except Group.DoesNotExist:
  88. logging.error(f"Could not assign group {name} to remotely-authenticated user {user}: Group not found")
  89. if group_list:
  90. user.groups.add(*group_list)
  91. logger.debug(f"Assigned groups to remotely-authenticated user {user}: {group_list}")
  92. # Assign default permissions to the user
  93. permissions_list = []
  94. for permission_name in settings.REMOTE_AUTH_DEFAULT_PERMISSIONS:
  95. try:
  96. app_label, codename = permission_name.split('.')
  97. permissions_list.append(
  98. Permission.objects.get(content_type__app_label=app_label, codename=codename)
  99. )
  100. except (ValueError, Permission.DoesNotExist):
  101. logging.error(
  102. "Invalid permission name: '{permission_name}'. Permissions must be in the form "
  103. "<app>.<action>_<model>. (Example: dcim.add_site)"
  104. )
  105. if permissions_list:
  106. user.user_permissions.add(*permissions_list)
  107. logger.debug(f"Assigned permissions to remotely-authenticated user {user}: {permissions_list}")
  108. return user