mirror of
https://github.com/pretix/pretix.git
synced 2026-05-06 15:24:02 +00:00
97 lines
4.5 KiB
Python
97 lines
4.5 KiB
Python
import time
|
|
from urllib.parse import quote, urljoin, urlparse
|
|
|
|
from django.conf import settings
|
|
from django.contrib.auth import REDIRECT_FIELD_NAME, logout
|
|
from django.core.urlresolvers import get_script_prefix, resolve, reverse
|
|
from django.http import Http404
|
|
from django.shortcuts import redirect, resolve_url
|
|
from django.utils.deprecation import MiddlewareMixin
|
|
from django.utils.encoding import force_str
|
|
from django.utils.translation import ugettext as _
|
|
|
|
from pretix.base.models import Event, Organizer
|
|
|
|
|
|
class PermissionMiddleware(MiddlewareMixin):
|
|
"""
|
|
This middleware enforces all requests to the control app to require login.
|
|
Additionally, it enforces all requests to "control:event." URLs
|
|
to be for an event the user has basic access to.
|
|
"""
|
|
|
|
EXCEPTIONS = (
|
|
"auth.login",
|
|
"auth.login.2fa",
|
|
"auth.register",
|
|
"auth.forgot",
|
|
"auth.forgot.recover",
|
|
"auth.invite",
|
|
)
|
|
|
|
def _login_redirect(self, request):
|
|
# Taken from django/contrib/auth/decorators.py
|
|
path = request.build_absolute_uri()
|
|
# urlparse chokes on lazy objects in Python 3, force to str
|
|
resolved_login_url = force_str(
|
|
resolve_url(settings.LOGIN_URL_CONTROL))
|
|
# If the login url is the same scheme and net location then just
|
|
# use the path as the "next" url.
|
|
login_scheme, login_netloc = urlparse(resolved_login_url)[:2]
|
|
current_scheme, current_netloc = urlparse(path)[:2]
|
|
if ((not login_scheme or login_scheme == current_scheme) and
|
|
(not login_netloc or login_netloc == current_netloc)):
|
|
path = request.get_full_path()
|
|
from django.contrib.auth.views import redirect_to_login
|
|
|
|
return redirect_to_login(
|
|
path, resolved_login_url, REDIRECT_FIELD_NAME)
|
|
|
|
def process_request(self, request):
|
|
url = resolve(request.path_info)
|
|
url_name = url.url_name
|
|
|
|
if not request.path.startswith(get_script_prefix() + 'control'):
|
|
# This middleware should only touch the /control subpath
|
|
return
|
|
|
|
if hasattr(request, 'organizer'):
|
|
# If the user is on a organizer's subdomain, he should be redirected to pretix
|
|
return redirect(urljoin(settings.SITE_URL, request.get_full_path()))
|
|
if url_name in self.EXCEPTIONS:
|
|
return
|
|
if not request.user.is_authenticated:
|
|
return self._login_redirect(request)
|
|
|
|
if not settings.PRETIX_LONG_SESSIONS or not request.session.get('pretix_auth_long_session', False):
|
|
# If this logic is updated, make sure to also update the logic in pretix/api/auth/permission.py
|
|
last_used = request.session.get('pretix_auth_last_used', time.time())
|
|
if time.time() - request.session.get('pretix_auth_login_time', time.time()) > settings.PRETIX_SESSION_TIMEOUT_ABSOLUTE:
|
|
logout(request)
|
|
request.session['pretix_auth_login_time'] = 0
|
|
return self._login_redirect(request)
|
|
if url_name != 'user.reauth':
|
|
if time.time() - last_used > settings.PRETIX_SESSION_TIMEOUT_RELATIVE:
|
|
return redirect(reverse('control:user.reauth') + '?next=' + quote(request.get_full_path()))
|
|
|
|
request.session['pretix_auth_last_used'] = int(time.time())
|
|
|
|
if 'event' in url.kwargs and 'organizer' in url.kwargs:
|
|
request.event = Event.objects.filter(
|
|
slug=url.kwargs['event'],
|
|
organizer__slug=url.kwargs['organizer'],
|
|
).select_related('organizer').first()
|
|
if not request.event or not request.user.has_event_permission(request.event.organizer, request.event):
|
|
raise Http404(_("The selected event was not found or you "
|
|
"have no permission to administrate it."))
|
|
request.organizer = request.event.organizer
|
|
request.eventpermset = request.user.get_event_permission_set(request.organizer, request.event)
|
|
elif 'organizer' in url.kwargs:
|
|
request.organizer = Organizer.objects.filter(
|
|
slug=url.kwargs['organizer'],
|
|
).first()
|
|
if not request.organizer or not request.user.has_organizer_permission(request.organizer):
|
|
raise Http404(_("The selected organizer was not found or you "
|
|
"have no permission to administrate it."))
|
|
request.orgapermset = request.user.get_organizer_permission_set(request.organizer)
|