mirror of
https://github.com/pretix/pretix.git
synced 2026-05-04 15:04:03 +00:00
* Upgrade django and stuff * Update to Django 2.2 and recent versions of similar packages * Provide explicit orderings to all models used in paginated queries * Resolve naive datetime warnings in test suite * Deal with deprecation warnings * Fix sqlparse version
169 lines
7.4 KiB
Python
169 lines
7.4 KiB
Python
import time
|
|
from urllib.parse import urlparse
|
|
|
|
from django.conf import settings
|
|
from django.contrib.sessions.middleware import (
|
|
SessionMiddleware as BaseSessionMiddleware,
|
|
)
|
|
from django.core.cache import cache
|
|
from django.core.exceptions import DisallowedHost
|
|
from django.http.request import split_domain_port
|
|
from django.middleware.csrf import CsrfViewMiddleware as BaseCsrfMiddleware
|
|
from django.urls import set_urlconf
|
|
from django.utils.cache import patch_vary_headers
|
|
from django.utils.deprecation import MiddlewareMixin
|
|
from django.utils.http import http_date
|
|
|
|
from pretix.base.models import Organizer
|
|
from pretix.multidomain.models import KnownDomain
|
|
|
|
LOCAL_HOST_NAMES = ('testserver', 'localhost')
|
|
|
|
|
|
class MultiDomainMiddleware(MiddlewareMixin):
|
|
def process_request(self, request):
|
|
# We try three options, in order of decreasing preference.
|
|
if settings.USE_X_FORWARDED_HOST and ('X-Forwarded-Host' in request.headers):
|
|
host = request.headers['X-Forwarded-Host']
|
|
elif 'Host' in request.headers:
|
|
host = request.headers['Host']
|
|
else:
|
|
# Reconstruct the host using the algorithm from PEP 333.
|
|
host = request.META['SERVER_NAME']
|
|
server_port = str(request.META['SERVER_PORT'])
|
|
if server_port != ('443' if request.is_secure() else '80'):
|
|
host = '%s:%s' % (host, server_port)
|
|
|
|
domain, port = split_domain_port(host)
|
|
default_domain, default_port = split_domain_port(urlparse(settings.SITE_URL).netloc)
|
|
if domain:
|
|
request.host = domain
|
|
request.port = int(port) if port else None
|
|
|
|
orga = cache.get('pretix_multidomain_organizer_instance_{}'.format(domain))
|
|
if orga is None:
|
|
try:
|
|
kd = KnownDomain.objects.select_related('organizer').get(domainname=domain) # noqa
|
|
orga = kd.organizer
|
|
except KnownDomain.DoesNotExist:
|
|
orga = False
|
|
cache.set('pretix_multidomain_organizer_instance_{}'.format(domain), orga, 3600)
|
|
|
|
if orga:
|
|
request.organizer_domain = True
|
|
request.organizer = orga if isinstance(orga, Organizer) else Organizer.objects.get(pk=orga)
|
|
request.urlconf = "pretix.multidomain.subdomain_urlconf"
|
|
else:
|
|
if settings.DEBUG or domain in LOCAL_HOST_NAMES or domain == default_domain:
|
|
request.urlconf = "pretix.multidomain.maindomain_urlconf"
|
|
else:
|
|
raise DisallowedHost("Unknown host: %r" % host)
|
|
|
|
else:
|
|
raise DisallowedHost("Invalid HTTP_HOST header: %r." % host)
|
|
|
|
# We need to manually set the urlconf for the whole thread. Normally, Django's basic request
|
|
# would do this for us, but we already need it in place for the other middlewares.
|
|
set_urlconf(request.urlconf)
|
|
|
|
def process_response(self, request, response):
|
|
if getattr(request, "urlconf", None):
|
|
patch_vary_headers(response, ('Host',))
|
|
return response
|
|
|
|
|
|
class SessionMiddleware(BaseSessionMiddleware):
|
|
"""
|
|
We override the default implementation from django because we need to handle
|
|
cookie domains differently depending on whether we are on the main domain or
|
|
a custom domain.
|
|
"""
|
|
|
|
def process_response(self, request, response):
|
|
try:
|
|
accessed = request.session.accessed
|
|
modified = request.session.modified
|
|
empty = request.session.is_empty()
|
|
except AttributeError:
|
|
pass
|
|
else:
|
|
# First check if we need to delete this cookie.
|
|
# The session should be deleted only if the session is entirely empty
|
|
if settings.SESSION_COOKIE_NAME in request.COOKIES and empty:
|
|
response.delete_cookie(settings.SESSION_COOKIE_NAME)
|
|
else:
|
|
if accessed:
|
|
patch_vary_headers(response, ('Cookie',))
|
|
if modified or settings.SESSION_SAVE_EVERY_REQUEST:
|
|
if request.session.get_expire_at_browser_close():
|
|
max_age = None
|
|
expires = None
|
|
else:
|
|
max_age = request.session.get_expiry_age()
|
|
expires_time = time.time() + max_age
|
|
expires = http_date(expires_time)
|
|
# Save the session data and refresh the client cookie.
|
|
# Skip session save for 500 responses, refs #3881.
|
|
if response.status_code != 500:
|
|
request.session.save()
|
|
response.set_cookie(settings.SESSION_COOKIE_NAME,
|
|
request.session.session_key, max_age=max_age,
|
|
expires=expires,
|
|
domain=get_cookie_domain(request),
|
|
path=settings.SESSION_COOKIE_PATH,
|
|
secure=request.scheme == 'https',
|
|
httponly=settings.SESSION_COOKIE_HTTPONLY or None)
|
|
return response
|
|
|
|
|
|
class CsrfViewMiddleware(BaseCsrfMiddleware):
|
|
"""
|
|
We override the default implementation from django because we need to handle
|
|
cookie domains differently depending on whether we are on the main domain or
|
|
a custom domain.
|
|
"""
|
|
|
|
def process_response(self, request, response):
|
|
if getattr(response, 'csrf_processing_done', False):
|
|
return response
|
|
|
|
# If CSRF_COOKIE is unset, then CsrfViewMiddleware.process_view was
|
|
# never called, probably because a request middleware returned a response
|
|
# (for example, contrib.auth redirecting to a login page).
|
|
if request.META.get("CSRF_COOKIE") is None:
|
|
return response
|
|
|
|
if not request.META.get("CSRF_COOKIE_USED", False):
|
|
return response
|
|
|
|
# Set the CSRF cookie even if it's already set, so we renew
|
|
# the expiry timer.
|
|
response.set_cookie(settings.CSRF_COOKIE_NAME,
|
|
request.META["CSRF_COOKIE"],
|
|
max_age=settings.CSRF_COOKIE_AGE,
|
|
domain=get_cookie_domain(request),
|
|
path=settings.CSRF_COOKIE_PATH,
|
|
secure=request.scheme == 'https',
|
|
httponly=settings.CSRF_COOKIE_HTTPONLY
|
|
)
|
|
# Content varies with the CSRF cookie, so set the Vary header.
|
|
patch_vary_headers(response, ('Cookie',))
|
|
response.csrf_processing_done = True
|
|
return response
|
|
|
|
|
|
def get_cookie_domain(request):
|
|
if '.' not in request.host:
|
|
# As per spec, browsers do not accept cookie domains without dots in it,
|
|
# e.g. "localhost", see http://curl.haxx.se/rfc/cookie_spec.html
|
|
return None
|
|
default_domain, default_port = split_domain_port(urlparse(settings.SITE_URL).netloc)
|
|
if request.host == default_domain:
|
|
# We are on our main domain, set the cookie domain the user has chosen
|
|
return settings.SESSION_COOKIE_DOMAIN
|
|
else:
|
|
# We are on an organizer's custom domain, set no cookie domain, as we do not want
|
|
# the cookies to be present on any other domain. Setting an explicit value can be
|
|
# dangerous, see http://erik.io/blog/2014/03/04/definitive-guide-to-cookie-domains/
|
|
return None
|