Skip to content
Snippets Groups Projects
Commit 39472575 authored by Jörn Künsemöller's avatar Jörn Künsemöller
Browse files

TMSS-2658: enable permission checks for websockets again, with logging, but...

TMSS-2658: enable permission checks for websockets again, with logging, but for now keep sending to everyone.
parent 962c75b8
No related branches found
No related tags found
1 merge request!1144TMSS-2658: enable permission checks for websockets again, with logging, but...
...@@ -55,33 +55,25 @@ class TMSSWebSocket(WebSocket): ...@@ -55,33 +55,25 @@ class TMSSWebSocket(WebSocket):
self.authenticated = False self.authenticated = False
self.user = None self.user = None
# JS 2023-08-11: TODO: fix this! For now we want all users to get updates.
self.authenticated = True
def handleMessage(self): def handleMessage(self):
# JS 2023-08-11: TODO: fix this! For now we want all users to get updates. try:
self._set_flags_to_default() if not self.authenticated: # Not (yet) authenticated
return token_key = JSONloads(self.data).get('token', '')
from rest_framework.authtoken.models import Token
# try: token_obj = Token.objects.filter(key=token_key).first()
# if not self.authenticated: # Not (yet) authenticated if token_obj:
# token_key = JSONloads(self.data).get('token', '') self.user = token_obj.user
# self.authenticated = True
# from rest_framework.authtoken.models import Token logger.info('Client authenticated. User: %s from IP: %s' % (self.user, self.address[0]))
# token_obj = Token.objects.filter(key=token_key).first() else:
# if token_obj: logger.info('Client not authenticated. IP: %s' % (self.address[0]))
# self.user = token_obj.user self.close(1011, u'Please login, so you have a token, and please submit the token in the 1st message after the connection was made.')
# self.authenticated = True else:
# logger.info('Client authenticated. User: %s from IP: %s' % (self.user, self.address[0])) logger.debug('Client already authenticated, ignoring incoming message. User: %s from IP: %s' % (self.user, self.address[0]))
# else: # NOTE: We just ignore incoming messages as we treat the communication as one-way only, except for the auth msg.
# logger.info('Client not authenticated. IP: %s' % (self.address[0])) except Exception as e:
# self.close(1011, u'Please login, so you have a token, and please submit the token in the 1st message after the connection was made.') logger.exception('Error when handling websocket message of User: %s from IP: %s' % (self.user, self.address[0]))
# else: raise
# logger.debug('Client already authenticated, ignoring incoming message. User: %s from IP: %s' % (self.user, self.address[0]))
# # NOTE: We just ignore incoming messages as we treat the communication as one-way only, except for the auth msg.
# except Exception as e:
# logger.exception('Error when handling websocket message of User: %s from IP: %s' % (self.user, self.address[0]))
# raise
def handleConnected(self): def handleConnected(self):
# Enforce to initial values be safe # Enforce to initial values be safe
...@@ -138,49 +130,48 @@ class TMSSEventMessageHandlerForWebsocket(TMSSEventMessageHandler): ...@@ -138,49 +130,48 @@ class TMSSEventMessageHandlerForWebsocket(TMSSEventMessageHandler):
self.t.join() self.t.join()
def _get_authorised_clients_for_object_in_websocket(self, obj): def _get_authorised_clients_for_object_in_websocket(self, obj):
# JS 2023-08-11: TODO: fix this! For now we want all users to get updates. from django.contrib.auth import get_user_model
return list(self._ws_server.connections.values()) User = get_user_model()
# from django.contrib.auth import get_user_model from lofar.sas.tmss.tmss.tmssapp.viewsets.permissions import get_project_roles_for_user, get_project_roles_with_permission
# User = get_user_model() from lofar.sas.tmss.tmss.tmssapp.models import ProjectRole
#
# from lofar.sas.tmss.tmss.tmssapp.viewsets.permissions import get_project_roles_for_user, get_project_roles_with_permission auth_clients = []
# from lofar.sas.tmss.tmss.tmssapp.models import ProjectRole logger.info('Checking which of these users should receive websocket update for obj=%s: %s' % (obj, [ws.user for ws in list(self._ws_server.connections.values())]))
# for ws in list(self._ws_server.connections.values()):
# auth_clients = [] if ws.authenticated: # Check user permissions for the object
# logger.debug('Checking which of these users should receive websocket update for obj=%s: %s' % (obj, [ws.user for ws in list(self._ws_server.connections.values())])) user = User.objects.filter(username=ws.user).first()
# for ws in list(self._ws_server.connections.values()): if user is None:
# if ws.authenticated: # Check user permissions for the object logger.info('User=%s does not exist in TMSS and will not receive websocket update for obj=%s' % (ws.user, obj))
# # JS 2023-08-11: TODO: fix this! For now we want all users to get updates. continue
# auth_clients.append(ws) if user.is_superuser:
# continue logger.info('User=%s is superuser and will receive websocket update for obj=%s' % (user, obj))
# auth_clients.append(ws)
# user = User.objects.filter(username=ws.user).first() elif user.has_perm("tmssapp.view_%s" % type(obj).__name__.lower()):
# if user is None: logger.info('User=%s has permission=%s and will receive websocket update for obj=%s' % (user, "tmssapp.view_%s" % type(obj).__name__.lower(), obj))
# continue auth_clients.append(ws)
# else:
# if user.is_superuser: logger.info('User=%s has no permission=%s, checking for project-based permission to receive websocket update for obj=%s' % (user, "tmssapp.view_%s" % type(obj).__name__.lower(), obj))
# logger.debug('User=%s is superuser and will receive websocket update for obj=%s' % (user, obj)) # project-based permission
# auth_clients.append(ws) permitted_project_roles = get_project_roles_with_permission(type(obj).__name__.lower(), 'GET')
# elif user.has_perm("tmssapp.view_%s" % type(obj).__name__.lower()): user_project_roles = get_project_roles_for_user(user)
# logger.debug('User=%s has permission=%s and will receive websocket update for obj=%s' % (user, "tmssapp.view_%s" % type(obj).__name__.lower(), obj)) related_project = getattr(obj, 'project', None)
# auth_clients.append(ws) for project_role in user_project_roles:
# else: if related_project:
# logger.debug('User=%s has no permission=%s, checking for project-based permission to receive websocket update for obj=%s' % (user, "tmssapp.view_%s" % type(obj).__name__.lower(), obj)) if project_role['project'].lower() == related_project.name.lower() and \
# # project-based permission ProjectRole.objects.get(value=project_role['role']) in permitted_project_roles:
# permitted_project_roles = get_project_roles_with_permission(type(obj).__name__.lower(), 'GET') auth_clients.append(ws)
# user_project_roles = get_project_roles_for_user(user) logger.info("User=%s has project-based permission for project=%s and will receive websocket update for obj=%s" % (user, project_role['project'].lower(), obj))
# related_project = getattr(obj, 'project', None) break
# for project_role in user_project_roles: else:
# if related_project: logger.info("%s websocket is not authenticated and will not receive websocket update for obj=%s" % (ws.user, obj))
# if project_role['project'].lower() == related_project.name.lower() and \
# ProjectRole.objects.get(value=project_role['role']) in permitted_project_roles: # todo: remove this, once the above works as expected. -> TMSS-2658
# auth_clients.append(ws) if ws not in auth_clients:
# logger.debug("User=%s has project-based permission for project=%s and will receive websocket update for obj=%s" % (user, project_role['project'].lower(), obj)) logger.warning('Workaround: %s websocket will receive websocket update for obj=%s despite failed permission check' % (ws.user, obj))
# break auth_clients.append(ws)
# else:
# logger.debug("%s websocket is not authenticated and will not receive websocket update for obj=%s" % (ws.user, obj)) return auth_clients
# return auth_clients
def _broadcast_notify_to_clients_websocket(self, msg, clients): def _broadcast_notify_to_clients_websocket(self, msg, clients):
# Send a broadcast message to all ws clients passed as argument # Send a broadcast message to all ws clients passed as argument
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment