from zope.deprecation import deprecated
from zope.interface import implementer, providedBy
from pyramid.interfaces import (
IAuthenticationPolicy,
IAuthorizationPolicy,
ISecuredView,
ISecurityPolicy,
IView,
IViewClassifier,
)
from pyramid.threadlocal import get_current_registry
NO_PERMISSION_REQUIRED = '__no_permission_required__'
def _get_security_policy(request):
return request.registry.queryUtility(ISecurityPolicy)
[docs]
def remember(request, userid, **kw):
"""
Returns a sequence of header tuples (e.g. ``[('Set-Cookie', 'foo=abc')]``)
on this request's response.
These headers are suitable for 'remembering' a set of credentials
implied by the data passed as ``userid`` and ``*kw`` using the
current :term:`security policy`. Common usage might look
like so within the body of a view function (``response`` is
assumed to be a :term:`WebOb` -style :term:`response` object
computed previously by the view code):
.. code-block:: python
from pyramid.security import remember
headers = remember(request, 'chrism', password='123', max_age='86400')
response = request.response
response.headerlist.extend(headers)
return response
If no :term:`security policy` is in use, this function will
always return an empty sequence. If used, the composition and
meaning of ``**kw`` must be agreed upon by the calling code and
the effective security policy.
.. versionchanged:: 1.6
Deprecated the ``principal`` argument in favor of ``userid`` to clarify
its relationship to the security policy.
.. versionchanged:: 1.10
Removed the deprecated ``principal`` argument.
"""
policy = _get_security_policy(request)
if policy is None:
return []
return policy.remember(request, userid, **kw)
[docs]
def forget(request, **kw):
"""
Return a sequence of header tuples (e.g. ``[('Set-Cookie',
'foo=abc')]``) suitable for 'forgetting' the set of credentials
possessed by the currently authenticated user. A common usage
might look like so within the body of a view function
(``response`` is assumed to be an :term:`WebOb` -style
:term:`response` object computed previously by the view code):
.. code-block:: python
from pyramid.security import forget
headers = forget(request)
response.headerlist.extend(headers)
return response
If no :term:`security policy` is in use, this function will
always return an empty sequence.
"""
policy = _get_security_policy(request)
if policy is None:
return []
return policy.forget(request, **kw)
[docs]
def principals_allowed_by_permission(context, permission):
"""
.. deprecated:: 2.0
The new security policy has removed the concept of principals. See
:ref:`upgrading_auth_20` for more information.
Provided a ``context`` (a resource object), and a ``permission``
string, if an :term:`authorization policy` is
in effect, return a sequence of :term:`principal` ids that possess
the permission in the ``context``. If no authorization policy is
in effect, this will return a sequence with the single value
:mod:`pyramid.authorization.Everyone` (the special principal
identifier representing all principals).
.. note::
Even if an :term:`authorization policy` is in effect,
some (exotic) authorization policies may not implement the
required machinery for this function; those will cause a
:exc:`NotImplementedError` exception to be raised when this
function is invoked.
"""
reg = get_current_registry()
policy = reg.queryUtility(IAuthorizationPolicy)
if policy is None:
from pyramid.authorization import Everyone # noqa: F811
return [Everyone]
return policy.principals_allowed_by_permission(context, permission)
deprecated(
'principals_allowed_by_permission',
'The new security policy has removed the concept of principals. See '
'"Upgrading Authentication/Authorization" in "What\'s New in Pyramid 2.0" '
'of the documentation for more information.',
)
[docs]
def view_execution_permitted(context, request, name=''):
"""If the view specified by ``context`` and ``name`` is protected
by a :term:`permission`, check the permission associated with the
view using the effective authentication/authorization policies and
the ``request``. Return a boolean result. If no
:term:`security policy` is in effect, or if the view is not
protected by a permission, return ``True``. If no view can view found,
an exception will be raised.
.. versionchanged:: 1.4a4
An exception is raised if no view is found.
"""
reg = request.registry
provides = [IViewClassifier] + [providedBy(x) for x in (request, context)]
# XXX not sure what to do here about using _find_views or analogue;
# for now let's just keep it as-is
view = reg.adapters.lookup(provides, ISecuredView, name=name)
if view is None:
view = reg.adapters.lookup(provides, IView, name=name)
if view is None:
raise TypeError(
'No registered view satisfies the constraints. '
'It would not make sense to claim that this view '
'"is" or "is not" permitted.'
)
return Allowed(
'Allowed: view name %r in context %r (no permission defined)'
% (name, context)
)
return view.__permitted__(context, request)
class PermitsResult(int):
def __new__(cls, s, *args):
"""
Create a new instance.
:param fmt: A format string explaining the reason for denial.
:param args: Arguments are stored and used with the format string
to generate the ``msg``.
"""
inst = int.__new__(cls, cls.boolval)
inst.s = s
inst.args = args
return inst
@property
def msg(self):
""" A string indicating why the result was generated."""
return self.s % self.args
def __str__(self):
return self.msg
def __repr__(self):
return '<%s instance at %s with msg %r>' % (
self.__class__.__name__,
id(self),
self.msg,
)
[docs]
class Denied(PermitsResult):
"""
An instance of ``Denied`` is returned when a security-related
API or other :app:`Pyramid` code denies an action unrelated to
an ACL check. It evaluates equal to all boolean false types. It
has an attribute named ``msg`` describing the circumstances for
the deny.
"""
boolval = 0
[docs]
class Allowed(PermitsResult):
"""
An instance of ``Allowed`` is returned when a security-related
API or other :app:`Pyramid` code allows an action unrelated to
an ACL check. It evaluates equal to all boolean true types. It
has an attribute named ``msg`` describing the circumstances for
the allow.
"""
boolval = 1
class SecurityAPIMixin:
""" Mixin for Request class providing auth-related properties. """
@property
def identity(self):
"""
Return an opaque object identifying the current user or ``None`` if no
user is authenticated or there is no :term:`security policy` in effect.
"""
policy = _get_security_policy(self)
if policy is None:
return None
return policy.identity(self)
@property
def authenticated_userid(self):
"""
Return the :term:`userid` of the currently authenticated user or
``None`` if there is no :term:`security policy` in effect or there is
no currently authenticated user.
.. versionchanged:: 2.0
This property delegates to the effective :term:`security policy`,
ignoring old-style :term:`authentication policy`.
"""
policy = _get_security_policy(self)
if policy is None:
return None
return policy.authenticated_userid(self)
@property
def is_authenticated(self):
"""Return ``True`` if a user is authenticated for this request."""
return self.authenticated_userid is not None
def has_permission(self, permission, context=None):
"""Given a permission and an optional context, returns an instance of
:data:`pyramid.security.Allowed` if the permission is granted to this
request with the provided context, or the context already associated
with the request. Otherwise, returns an instance of
:data:`pyramid.security.Denied`. This method delegates to the current
security policy. Returns
:data:`pyramid.security.Allowed` unconditionally if no security
policy has been registered for this request. If ``context`` is not
supplied or is supplied as ``None``, the context used is the
``request.context`` attribute.
:param permission: Does this request have the given permission?
:type permission: str
:param context: A resource object or ``None``
:type context: object
:returns: Either :class:`pyramid.security.Allowed` or
:class:`pyramid.security.Denied`.
"""
if context is None:
context = self.context
policy = _get_security_policy(self)
if policy is None:
return Allowed('No security policy in use.')
return policy.permits(self, context, permission)
class AuthenticationAPIMixin:
""" Mixin for Request class providing compatibility properties. """
@property
def unauthenticated_userid(self):
"""
.. deprecated:: 2.0
``unauthenticated_userid`` does not have an equivalent in the new
security system. Use :attr:`.authenticated_userid` or
:attr:`.identity` instead. See :ref:`upgrading_auth_20` for more
information.
Return an object which represents the *claimed* (not verified) user
id of the credentials present in the request. ``None`` if there is no
:term:`authentication policy` in effect or there is no user data
associated with the current request. This differs from
:attr:`~pyramid.request.Request.authenticated_userid`, because the
effective authentication policy will not ensure that a record
associated with the userid exists in persistent storage.
"""
security = _get_security_policy(self)
if security is None:
return None
if isinstance(security, LegacySecurityPolicy):
authn = security._get_authn_policy(self)
return authn.unauthenticated_userid(self)
return security.authenticated_userid(self)
unauthenticated_userid = deprecated(
unauthenticated_userid,
(
'The new security policy has deprecated unauthenticated_userid. '
'See "Upgrading Authentication/Authorization" in "What\'s New in '
'Pyramid 2.0" of the documentation for more information.'
),
)
@property
def effective_principals(self):
"""
.. deprecated:: 2.0
The new security policy has removed the concept of principals. See
:ref:`upgrading_auth_20` for more information.
Return the list of 'effective' :term:`principal` identifiers
for the ``request``. If no :term:`authentication policy` is in effect,
this will return a one-element list containing the
:data:`pyramid.authorization.Everyone` principal.
"""
from pyramid.authorization import Everyone # noqa: F811
security = _get_security_policy(self)
if security is not None and isinstance(security, LegacySecurityPolicy):
authn = security._get_authn_policy(self)
return authn.effective_principals(self)
return [Everyone]
effective_principals = deprecated(
effective_principals,
(
'The new security policy has deprecated effective_principals. '
'See "Upgrading Authentication/Authorization" in "What\'s New in '
'Pyramid 2.0" of the documentation for more information.'
),
)
@implementer(ISecurityPolicy)
class LegacySecurityPolicy:
"""
A :term:`security policy` which provides a backwards compatibility shim for
the :term:`authentication policy` and the :term:`authorization policy`.
"""
def _get_authn_policy(self, request):
return request.registry.getUtility(IAuthenticationPolicy)
def _get_authz_policy(self, request):
return request.registry.getUtility(IAuthorizationPolicy)
def identity(self, request):
return self.authenticated_userid(request)
def authenticated_userid(self, request):
authn = self._get_authn_policy(request)
return authn.authenticated_userid(request)
def remember(self, request, userid, **kw):
authn = self._get_authn_policy(request)
return authn.remember(request, userid, **kw)
def forget(self, request, **kw):
if kw:
raise ValueError(
'Legacy authentication policies do not support keyword '
'arguments for `forget`'
)
authn = self._get_authn_policy(request)
return authn.forget(request)
def permits(self, request, context, permission):
authn = self._get_authn_policy(request)
authz = self._get_authz_policy(request)
principals = authn.effective_principals(request)
return authz.permits(context, principals, permission)
Everyone = 'system.Everyone'
Authenticated = 'system.Authenticated'
Allow = 'Allow'
Deny = 'Deny'
class AllPermissionsList:
""" Stand in 'permission list' to represent all permissions """
def __iter__(self):
return iter(())
def __contains__(self, other):
return True
def __eq__(self, other):
return isinstance(other, self.__class__)
ALL_PERMISSIONS = AllPermissionsList()
DENY_ALL = (Deny, Everyone, ALL_PERMISSIONS)
class ACLPermitsResult(PermitsResult):
def __new__(cls, ace, acl, permission, principals, context):
"""
Create a new instance.
:param ace: The :term:`ACE` that matched, triggering the result.
:param acl: The :term:`ACL` containing ``ace``.
:param permission: The required :term:`permission`.
:param principals: The list of :term:`principals <principal>` provided.
:param context: The :term:`context` providing the :term:`lineage`
searched.
"""
fmt = (
'%s permission %r via ACE %r in ACL %r on context %r for '
'principals %r'
)
inst = PermitsResult.__new__(
cls, fmt, cls.__name__, permission, ace, acl, context, principals
)
inst.permission = permission
inst.ace = ace
inst.acl = acl
inst.principals = principals
inst.context = context
return inst
[docs]
class ACLDenied(ACLPermitsResult, Denied):
"""
An instance of ``ACLDenied`` is a specialization of
:class:`pyramid.security.Denied` that represents that a security check
made explicitly against ACL was denied. It evaluates equal to all
boolean false types. It also has the following attributes: ``acl``,
``ace``, ``permission``, ``principals``, and ``context``. These
attributes indicate the security values involved in the request. Its
``__str__`` method prints a summary of these attributes for debugging
purposes. The same summary is available as the ``msg`` attribute.
"""
[docs]
class ACLAllowed(ACLPermitsResult, Allowed):
"""
An instance of ``ACLAllowed`` is a specialization of
:class:`pyramid.security.Allowed` that represents that a security check
made explicitly against ACL was allowed. It evaluates equal to all
boolean true types. It also has the following attributes: ``acl``,
``ace``, ``permission``, ``principals``, and ``context``. These
attributes indicate the security values involved in the request. Its
``__str__`` method prints a summary of these attributes for debugging
purposes. The same summary is available as the ``msg`` attribute.
"""
for attr in (
'ALL_PERMISSIONS',
'DENY_ALL',
'ACLAllowed',
'ACLDenied',
'AllPermissionsList',
'Allow',
'Authenticated',
'Deny',
'Everyone',
):
deprecated(
attr,
'"pyramid.security.{attr}" is deprecated in Pyramid 2.0. Adjust your '
'import to "pyramid.authorization.{attr}"'.format(attr=attr),
)