mirror of
https://github.com/ansible/awx.git
synced 2024-11-01 08:21:15 +03:00
Merge pull request #39 from wwitzel3/issue-7260
Fixing cookie settings for CSRF and auth token
This commit is contained in:
commit
6cd0592781
@ -1,16 +1,14 @@
|
|||||||
import json
|
import json
|
||||||
import logging
|
import logging
|
||||||
import urllib
|
|
||||||
|
|
||||||
from channels import Group, channel_layers
|
from channels import Group, channel_layers
|
||||||
from channels.sessions import channel_session
|
from channels.sessions import enforce_ordering, channel_session, channel_and_http_session
|
||||||
from channels.handler import AsgiRequest
|
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.core.serializers.json import DjangoJSONEncoder
|
from django.core.serializers.json import DjangoJSONEncoder
|
||||||
|
|
||||||
from django.contrib.auth.models import User
|
from django.contrib.auth.models import User
|
||||||
from awx.main.models.organization import AuthToken
|
from django.contrib.sessions.models import Session
|
||||||
|
|
||||||
|
|
||||||
logger = logging.getLogger('awx.main.consumers')
|
logger = logging.getLogger('awx.main.consumers')
|
||||||
@ -22,24 +20,21 @@ def discard_groups(message):
|
|||||||
Group(group).discard(message.reply_channel)
|
Group(group).discard(message.reply_channel)
|
||||||
|
|
||||||
|
|
||||||
@channel_session
|
@channel_and_http_session
|
||||||
def ws_connect(message):
|
def ws_connect(message):
|
||||||
connect_text = {'accept':False, 'user':None}
|
if message.http_session.session_key is None:
|
||||||
|
raise ValueError('No valid session key to get auth from')
|
||||||
|
|
||||||
message.content['method'] = 'FAKE'
|
session = Session.objects.get(session_key=message.http_session.session_key)
|
||||||
request = AsgiRequest(message)
|
session_data = session.get_decoded()
|
||||||
token = request.COOKIES.get('token', None)
|
|
||||||
if token is not None:
|
try:
|
||||||
token = urllib.unquote(token).strip('"')
|
user = User.objects.get(pk=session_data['_auth_user_id'])
|
||||||
try:
|
except User.DoesNotExist:
|
||||||
auth_token = AuthToken.objects.get(key=token)
|
raise ValueError('No valid user for the session key')
|
||||||
if auth_token.in_valid_tokens:
|
|
||||||
message.channel_session['user_id'] = auth_token.user_id
|
message.channel_session['user_id'] = user.pk
|
||||||
connect_text['accept'] = True
|
message.reply_channel.send({"text": json.dumps({'accept': True, 'user': user.pk})})
|
||||||
connect_text['user'] = auth_token.user_id
|
|
||||||
except AuthToken.DoesNotExist:
|
|
||||||
logger.error("auth_token provided was invalid.")
|
|
||||||
message.reply_channel.send({"text": json.dumps(connect_text)})
|
|
||||||
|
|
||||||
|
|
||||||
@channel_session
|
@channel_session
|
||||||
@ -47,6 +42,7 @@ def ws_disconnect(message):
|
|||||||
discard_groups(message)
|
discard_groups(message)
|
||||||
|
|
||||||
|
|
||||||
|
@enforce_ordering
|
||||||
@channel_session
|
@channel_session
|
||||||
def ws_receive(message):
|
def ws_receive(message):
|
||||||
from awx.main.access import consumer_access
|
from awx.main.access import consumer_access
|
||||||
|
@ -189,6 +189,9 @@ JOB_EVENT_MAX_QUEUE_SIZE = 10000
|
|||||||
# Disallow sending session cookies over insecure connections
|
# Disallow sending session cookies over insecure connections
|
||||||
SESSION_COOKIE_SECURE = True
|
SESSION_COOKIE_SECURE = True
|
||||||
|
|
||||||
|
# Do not allow non-browser clients to read the CSRF cookie.
|
||||||
|
CSRF_COOKIE_HTTPONLY = True
|
||||||
|
|
||||||
# Disallow sending csrf cookies over insecure connections
|
# Disallow sending csrf cookies over insecure connections
|
||||||
CSRF_COOKIE_SECURE = True
|
CSRF_COOKIE_SECURE = True
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ class CompleteView(BaseRedirectView):
|
|||||||
logger.info(smart_text(u"User {} logged in".format(self.request.user.username)))
|
logger.info(smart_text(u"User {} logged in".format(self.request.user.username)))
|
||||||
request.session['auth_token_key'] = token.key
|
request.session['auth_token_key'] = token.key
|
||||||
token_key = urllib.quote('"%s"' % token.key)
|
token_key = urllib.quote('"%s"' % token.key)
|
||||||
response.set_cookie('token', token_key)
|
response.set_cookie('token', value=token_key, httponly=True)
|
||||||
token_expires = token.expires.astimezone(utc).strftime('%Y-%m-%dT%H:%M:%S')
|
token_expires = token.expires.astimezone(utc).strftime('%Y-%m-%dT%H:%M:%S')
|
||||||
token_expires = '%s.%03dZ' % (token_expires, token.expires.microsecond / 1000)
|
token_expires = '%s.%03dZ' % (token_expires, token.expires.microsecond / 1000)
|
||||||
token_expires = urllib.quote('"%s"' % token_expires)
|
token_expires = urllib.quote('"%s"' % token_expires)
|
||||||
|
Loading…
Reference in New Issue
Block a user