pyramid.authentication
¶
Helper Classes¶
- class SessionAuthenticationHelper(prefix='auth.')[source]¶
A helper for use with a security policy which stores user data in the configured session.
Constructor Arguments
prefix
A prefix used when storing the authentication parameters in the session. Defaults to 'auth.'. Optional.
- class AuthTktCookieHelper(secret, cookie_name='auth_tkt', secure=False, include_ip=False, timeout=None, reissue_time=None, max_age=None, http_only=False, path='/', wild_domain=True, hashalg='sha512', parent_domain=False, domain=None, samesite='Lax')[source]¶
A helper class for security policies that obtains data from an "auth ticket" cookie.
Constructor Arguments
secret
The secret (a string) used for auth_tkt cookie signing. This value should be unique across all values provided to Pyramid for various subsystem secrets (see Admonishment Against Secret-Sharing). Required.
cookie_name
Default:
auth_tkt
. The cookie name used (string). Optional.secure
Default:
False
. Only send the cookie back over a secure conn. Optional.include_ip
Default:
False
. Make the requesting IP address part of the authentication data in the cookie. Optional.For IPv6 this option is not recommended. The
mod_auth_tkt
specification does not specify how to handle IPv6 addresses, so using this option in combination with IPv6 addresses may cause an incompatible cookie. It ties the authentication ticket to that individual's IPv6 address.timeout
Default:
None
. Maximum number of seconds which a newly issued ticket will be considered valid. After this amount of time, the ticket will expire (effectively logging the user out). If this value isNone
, the ticket never expires. Optional.reissue_time
Default:
None
. If this parameter is set, it represents the number of seconds that must pass before an authentication token cookie is automatically reissued as the result of a request which requires authentication. The duration is measured as the number of seconds since the last auth_tkt cookie was issued and 'now'. If this value is0
, a new ticket cookie will be reissued on every request which requires authentication.A good rule of thumb: if you want auto-expired cookies based on inactivity: set the
timeout
value to 1200 (20 mins) and set thereissue_time
value to perhaps a tenth of thetimeout
value (120 or 2 mins). It's nonsensical to set thetimeout
value lower than thereissue_time
value, as the ticket will never be reissued if so. However, such a configuration is not explicitly prevented.Optional.
max_age
Default:
None
. The max age of the auth_tkt cookie, in seconds. This differs fromtimeout
inasmuch astimeout
represents the lifetime of the ticket contained in the cookie, while this value represents the lifetime of the cookie itself. When this value is set, the cookie'sMax-Age
andExpires
settings will be set, allowing the auth_tkt cookie to last between browser sessions. It is typically nonsensical to set this to a value that is lower thantimeout
orreissue_time
, although it is not explicitly prevented. Optional.path
Default:
/
. The path for which the auth_tkt cookie is valid. May be desirable if the application only serves part of a domain. Optional.http_only
Default:
False
. Hide cookie from JavaScript by setting the HttpOnly flag. Not honored by all browsers. Optional.wild_domain
Default:
True
. An auth_tkt cookie will be generated for the wildcard domain. If your site is hosted asexample.com
this will make the cookie available for sites underneathexample.com
such aswww.example.com
. Optional.parent_domain
Default:
False
. An auth_tkt cookie will be generated for the parent domain of the current site. For example if your site is hosted underwww.example.com
a cookie will be generated for.example.com
. This can be useful if you have multiple sites sharing the same domain. This option supercedes thewild_domain
option. Optional.domain
Default:
None
. If provided the auth_tkt cookie will only be set for this domain. This option is not compatible withwild_domain
andparent_domain
. Optional.hashalg
Default:
sha512
(the literal string).Any hash algorithm supported by Python's
hashlib.new()
function can be used as thehashalg
.Cookies generated by different instances of AuthTktAuthenticationPolicy using different
hashalg
options are not compatible. Switching thehashalg
will imply that all existing users with a valid cookie will be required to re-login.Optional.
debug
Default:
False
. Ifdebug
isTrue
, log messages to the Pyramid debug logger about the results of various authentication steps. The output from debugging is useful for reporting to maillist or IRC channels when asking for support. Optional.samesite
Default:
'Lax'
. The 'samesite' option of the session cookie. Set the value toNone
to turn off the samesite option. Optional.Changed in version 2.0: The default
hashalg
was changed frommd5
tosha512
.- class AuthTicket(secret, userid, ip, tokens=(), user_data='', time=None, cookie_name='auth_tkt', secure=False, hashalg='md5')¶
This class represents an authentication token. You must pass in the shared secret, the userid, and the IP address. Optionally you can include tokens (a list of strings, representing role names), 'user_data', which is arbitrary data available for your own use in later scripts. Lastly, you can override the cookie name and timestamp.
Once you provide all the arguments, use .cookie_value() to generate the appropriate authentication ticket.
Usage:
token = AuthTicket('sharedsecret', 'username', os.environ['REMOTE_ADDR'], tokens=['admin']) val = token.cookie_value()
- exception BadTicket(msg, expected=None)¶
Exception raised when a ticket can't be parsed. If we get far enough to determine what the expected digest should have been, expected is set. This should not be shown by default, but can be useful for debugging.
- forget(request)[source]¶
Return a set of expires Set-Cookie headers, which will destroy any existing auth_tkt cookie when attached to a response
- identify(request)[source]¶
Return a dictionary with authentication information, or
None
if no valid auth_tkt is attached torequest
- static parse_ticket(secret, ticket, ip, hashalg='md5')¶
Parse the ticket, returning (timestamp, userid, tokens, user_data).
If the ticket cannot be parsed, a
BadTicket
exception will be raised with an explanation.
- remember(request, userid, max_age=None, tokens=())[source]¶
Return a set of Set-Cookie headers; when set into a response, these headers will represent a valid authentication ticket.
max_age
The max age of the auth_tkt cookie, in seconds. When this value is set, the cookie's
Max-Age
andExpires
settings will be set, allowing the auth_tkt cookie to last between browser sessions. If this value isNone
, themax_age
value provided to the helper itself will be used as themax_age
value. Default:None
.tokens
A sequence of strings that will be placed into the auth_tkt tokens field. Each string in the sequence must be of the Python
str
type and must match the regex^[A-Za-z][A-Za-z0-9+_-]*$
. Tokens are available in the returned identity when an auth_tkt is found in the request and unpacked. Default:()
.
Helper Functions¶
- extract_http_basic_credentials(request)[source]¶
A helper function for extraction of HTTP Basic credentials from a given request.
Returns a
HTTPBasicCredentials
2-tuple withusername
andpassword
attributes orNone
if no credentials could be found.
Authentication Policies¶
Authentication policies have been deprecated by the new security system. See Upgrading Authentication/Authorization for more information.
- class AuthTktAuthenticationPolicy(secret, callback=None, cookie_name='auth_tkt', secure=False, include_ip=False, timeout=None, reissue_time=None, max_age=None, path='/', http_only=False, wild_domain=True, debug=False, hashalg='sha512', parent_domain=False, domain=None, samesite='Lax')[source]¶
A Pyramid authentication policy which obtains data from a Pyramid "auth ticket" cookie.
Constructor Arguments
secret
The secret (a string) used for auth_tkt cookie signing. This value should be unique across all values provided to Pyramid for various subsystem secrets (see Admonishment Against Secret-Sharing). Required.
callback
Default:
None
. A callback passed the userid and the request, expected to returnNone
if the userid doesn't exist or a sequence of principal identifiers (possibly empty) if the user does exist. Ifcallback
isNone
, the userid will be assumed to exist with no principals. Optional.
cookie_name
Default:
auth_tkt
. The cookie name used (string). Optional.
secure
Default:
False
. Only send the cookie back over a secure conn. Optional.
include_ip
Default:
False
. Make the requesting IP address part of the authentication data in the cookie. Optional.For IPv6 this option is not recommended. The
mod_auth_tkt
specification does not specify how to handle IPv6 addresses, so using this option in combination with IPv6 addresses may cause an incompatible cookie. It ties the authentication ticket to that individual's IPv6 address.
timeout
Default:
None
. Maximum number of seconds which a newly issued ticket will be considered valid. After this amount of time, the ticket will expire (effectively logging the user out). If this value isNone
, the ticket never expires. Optional.
reissue_time
Default:
None
. If this parameter is set, it represents the number of seconds that must pass before an authentication token cookie is automatically reissued as the result of a request which requires authentication. The duration is measured as the number of seconds since the last auth_tkt cookie was issued and 'now'. If this value is0
, a new ticket cookie will be reissued on every request which requires authentication.A good rule of thumb: if you want auto-expired cookies based on inactivity: set the
timeout
value to 1200 (20 mins) and set thereissue_time
value to perhaps a tenth of thetimeout
value (120 or 2 mins). It's nonsensical to set thetimeout
value lower than thereissue_time
value, as the ticket will never be reissued if so. However, such a configuration is not explicitly prevented.Optional.
max_age
Default:
None
. The max age of the auth_tkt cookie, in seconds. This differs fromtimeout
inasmuch astimeout
represents the lifetime of the ticket contained in the cookie, while this value represents the lifetime of the cookie itself. When this value is set, the cookie'sMax-Age
andExpires
settings will be set, allowing the auth_tkt cookie to last between browser sessions. It is typically nonsensical to set this to a value that is lower thantimeout
orreissue_time
, although it is not explicitly prevented. Optional.
path
Default:
/
. The path for which the auth_tkt cookie is valid. May be desirable if the application only serves part of a domain. Optional.
http_only
Default:
False
. Hide cookie from JavaScript by setting the HttpOnly flag. Not honored by all browsers. Optional.
wild_domain
Default:
True
. An auth_tkt cookie will be generated for the wildcard domain. If your site is hosted asexample.com
this will make the cookie available for sites underneathexample.com
such aswww.example.com
. Optional.
parent_domain
Default:
False
. An auth_tkt cookie will be generated for the parent domain of the current site. For example if your site is hosted underwww.example.com
a cookie will be generated for.example.com
. This can be useful if you have multiple sites sharing the same domain. This option supercedes thewild_domain
option. Optional.
domain
Default:
None
. If provided the auth_tkt cookie will only be set for this domain. This option is not compatible withwild_domain
andparent_domain
. Optional.
hashalg
Default:
sha512
(the literal string).Any hash algorithm supported by Python's
hashlib.new()
function can be used as thehashalg
.Cookies generated by different instances of AuthTktAuthenticationPolicy using different
hashalg
options are not compatible. Switching thehashalg
will imply that all existing users with a valid cookie will be required to re-login.Optional.
debug
Default:
False
. Ifdebug
isTrue
, log messages to the Pyramid debug logger about the results of various authentication steps. The output from debugging is useful for reporting to maillist or IRC channels when asking for support.
samesite
Default:
'Lax'
. The 'samesite' option of the session cookie. Set the value to the string'None'
to turn off the samesite option.Changed in version 1.4: Added the
hashalg
option, defaulting tosha512
.Changed in version 1.5: Added the
domain
option.Added the
parent_domain
option.Changed in version 1.10: Added the
samesite
option and made the default'Lax'
.Objects of this class implement the interface described by
pyramid.interfaces.IAuthenticationPolicy
.
- authenticated_userid(request)¶
Return the authenticated userid or
None
.If no callback is registered, this will be the same as
unauthenticated_userid
.If a
callback
is registered, this will return the userid if and only if the callback returns a value that is notNone
.
- effective_principals(request)¶
A list of effective principals derived from request.
This will return a list of principals including, at least,
pyramid.authorization.Everyone
. If there is no authenticated userid, or thecallback
returnsNone
, this will be the only principal:return [Everyone]If the
callback
does not returnNone
and an authenticated userid is found, then the principals will includepyramid.authorization.Authenticated
, theauthenticated_userid
and the list of principals returned by thecallback
:extra_principals = callback(userid, request) return [Everyone, Authenticated, userid] + extra_principals
- class RemoteUserAuthenticationPolicy(environ_key='REMOTE_USER', callback=None, debug=False)[source]¶
A Pyramid authentication policy which obtains data from the
REMOTE_USER
WSGI environment variable.Constructor Arguments
environ_key
Default:
REMOTE_USER
. The key in the WSGI environ which provides the userid.
callback
Default:
None
. A callback passed the userid and the request, expected to return None if the userid doesn't exist or a sequence of principal identifiers (possibly empty) representing groups if the user does exist. Ifcallback
is None, the userid will be assumed to exist with no group principals.
debug
Default:
False
. Ifdebug
isTrue
, log messages to the Pyramid debug logger about the results of various authentication steps. The output from debugging is useful for reporting to maillist or IRC channels when asking for support.Objects of this class implement the interface described by
pyramid.interfaces.IAuthenticationPolicy
.
- authenticated_userid(request)¶
Return the authenticated userid or
None
.If no callback is registered, this will be the same as
unauthenticated_userid
.If a
callback
is registered, this will return the userid if and only if the callback returns a value that is notNone
.
- effective_principals(request)¶
A list of effective principals derived from request.
This will return a list of principals including, at least,
pyramid.authorization.Everyone
. If there is no authenticated userid, or thecallback
returnsNone
, this will be the only principal:return [Everyone]If the
callback
does not returnNone
and an authenticated userid is found, then the principals will includepyramid.authorization.Authenticated
, theauthenticated_userid
and the list of principals returned by thecallback
:extra_principals = callback(userid, request) return [Everyone, Authenticated, userid] + extra_principals
- forget(request)[source]¶
A no-op. The
REMOTE_USER
does not provide a protocol for forgetting the user. This will be application-specific and can be done somewhere else or in a subclass.
- class SessionAuthenticationPolicy(prefix='auth.', callback=None, debug=False)[source]¶
A Pyramid authentication policy which gets its data from the configured session. For this authentication policy to work, you will have to follow the instructions in the Sessions to configure a session factory.
Constructor Arguments
prefix
A prefix used when storing the authentication parameters in the session. Defaults to 'auth.'. Optional.
callback
Default:
None
. A callback passed the userid and the request, expected to returnNone
if the userid doesn't exist or a sequence of principal identifiers (possibly empty) if the user does exist. Ifcallback
isNone
, the userid will be assumed to exist with no principals. Optional.
debug
Default:
False
. Ifdebug
isTrue
, log messages to the Pyramid debug logger about the results of various authentication steps. The output from debugging is useful for reporting to maillist or IRC channels when asking for support.
- authenticated_userid(request)¶
Return the authenticated userid or
None
.If no callback is registered, this will be the same as
unauthenticated_userid
.If a
callback
is registered, this will return the userid if and only if the callback returns a value that is notNone
.
- effective_principals(request)¶
A list of effective principals derived from request.
This will return a list of principals including, at least,
pyramid.authorization.Everyone
. If there is no authenticated userid, or thecallback
returnsNone
, this will be the only principal:return [Everyone]If the
callback
does not returnNone
and an authenticated userid is found, then the principals will includepyramid.authorization.Authenticated
, theauthenticated_userid
and the list of principals returned by thecallback
:extra_principals = callback(userid, request) return [Everyone, Authenticated, userid] + extra_principals
- class BasicAuthAuthenticationPolicy(check, realm='Realm', debug=False)[source]¶
A Pyramid authentication policy which uses HTTP standard basic authentication protocol to authenticate users. To use this policy you will need to provide a callback which checks the supplied user credentials against your source of login data.
Constructor Arguments
check
A callback function passed a username, password and request, in that order as positional arguments. Expected to return
None
if the userid doesn't exist or a sequence of principal identifiers (possibly empty) if the user does exist.
realm
Default:
"Realm"
. The Basic Auth Realm string. Usually displayed to the user by the browser in the login dialog.
debug
Default:
False
. Ifdebug
isTrue
, log messages to the Pyramid debug logger about the results of various authentication steps. The output from debugging is useful for reporting to maillist or IRC channels when asking for support.Issuing a challenge
Regular browsers will not send username/password credentials unless they first receive a challenge from the server. The following recipe will register a view that will send a Basic Auth challenge to the user whenever there is an attempt to call a view which results in a Forbidden response:
from pyramid.httpexceptions import HTTPUnauthorized from pyramid.security import forget from pyramid.view import forbidden_view_config @forbidden_view_config() def forbidden_view(request): if request.authenticated_userid is None: response = HTTPUnauthorized() response.headers.update(forget(request)) return response return HTTPForbidden()
- authenticated_userid(request)¶
Return the authenticated userid or
None
.If no callback is registered, this will be the same as
unauthenticated_userid
.If a
callback
is registered, this will return the userid if and only if the callback returns a value that is notNone
.
- effective_principals(request)¶
A list of effective principals derived from request.
This will return a list of principals including, at least,
pyramid.authorization.Everyone
. If there is no authenticated userid, or thecallback
returnsNone
, this will be the only principal:return [Everyone]If the
callback
does not returnNone
and an authenticated userid is found, then the principals will includepyramid.authorization.Authenticated
, theauthenticated_userid
and the list of principals returned by thecallback
:extra_principals = callback(userid, request) return [Everyone, Authenticated, userid] + extra_principals
- forget(request)[source]¶
Returns challenge headers. This should be attached to a response to indicate that credentials are required.
- class RepozeWho1AuthenticationPolicy(identifier_name='auth_tkt', callback=None)[source]¶
A Pyramid authentication policy which obtains data from the
repoze.who
1.X WSGI 'API' (therepoze.who.identity
key in the WSGI environment).Constructor Arguments
identifier_name
Default:
auth_tkt
. Therepoze.who
plugin name that performs remember/forget. Optional.
callback
Default:
None
. A callback passed therepoze.who
identity and the request, expected to returnNone
if the user represented by the identity doesn't exist or a sequence of principal identifiers (possibly empty) representing groups if the user does exist. Ifcallback
is None, the userid will be assumed to exist with no group principals.Objects of this class implement the interface described by
pyramid.interfaces.IAuthenticationPolicy
.
- authenticated_userid(request)[source]¶
Return the authenticated userid or
None
.If no callback is registered, this will be the same as
unauthenticated_userid
.If a
callback
is registered, this will return the userid if and only if the callback returns a value that is notNone
.
- effective_principals(request)[source]¶
A list of effective principals derived from the identity.
This will return a list of principals including, at least,
pyramid.authorization.Everyone
. If there is no identity, or thecallback
returnsNone
, this will be the only principal.If the
callback
does not returnNone
and an identity is found, then the principals will includepyramid.authorization.Authenticated
, theauthenticated_userid
and the list of principals returned by thecallback
.
- forget(request)[source]¶
Forget the current authenticated user.
Return headers that, if included in a response, will delete the cookie responsible for tracking the current user.