????
Current Path : C:/opt/pgsql/pgAdmin 4/python/Lib/site-packages/flask_security/ |
Current File : C:/opt/pgsql/pgAdmin 4/python/Lib/site-packages/flask_security/datastore.py |
""" flask_security.datastore ~~~~~~~~~~~~~~~~~~~~~~~~ This module contains an user datastore classes. :copyright: (c) 2012 by Matt Wright. :copyright: (c) 2019-2024 by J. Christopher Wagner (jwag). :license: MIT, see LICENSE for more details. """ from __future__ import annotations from datetime import datetime import json import typing as t import uuid from copy import copy from .utils import config_value as cv if t.TYPE_CHECKING: # pragma: no cover import flask_sqlalchemy import mongoengine import sqlalchemy.orm.scoping class Datastore: def __init__(self, db): self.db = db def commit(self): pass def put(self, model): raise NotImplementedError def delete(self, model): raise NotImplementedError try: import sqlalchemy.types as types class AsaList(types.TypeDecorator): """ SQL-like DBs don't have a List type - so do that here by converting to a comma separate string. For SQLAlchemy-based datastores, this can be used as:: Column(MutableList.as_mutable(AsaList()), nullable=True) """ impl = types.UnicodeText def process_bind_param(self, value, dialect): # produce a string from an iterable try: return ",".join(value) except TypeError: return value def process_result_value(self, value, dialect): if value: return value.split(",") return [] except ImportError: # pragma: no cover class AsaList: # type: ignore """ SQL-like DBs don't have a List type - so do that here by converting to a comma separate string. For SQLAlchemy-based datastores, this can be used as:: Column(MutableList.as_mutable(AsaList()), nullable=True) """ pass class SQLAlchemyDatastore(Datastore): def commit(self): self.db.session.commit() def put(self, model): self.db.session.add(model) return model def delete(self, model): self.db.session.delete(model) class MongoEngineDatastore(Datastore): def put(self, model): model.save() return model def delete(self, model): model.delete() class PeeweeDatastore(Datastore): def put(self, model): model.save() return model def delete(self, model): model.delete_instance(recursive=True) def with_pony_session(f): from functools import wraps @wraps(f) def decorator(*args, **kwargs): from pony.orm import db_session from pony.orm.core import local from flask import ( after_this_request, current_app, has_app_context, has_request_context, ) from flask.signals import appcontext_popped register = local.db_context_counter == 0 if register and (has_app_context() or has_request_context()): db_session.__enter__() result = f(*args, **kwargs) if register: if has_request_context(): @after_this_request def pop(request): db_session.__exit__() return request elif has_app_context(): @appcontext_popped.connect_via(current_app._get_current_object()) def pop(sender, *args, **kwargs): while local.db_context_counter: db_session.__exit__() else: raise RuntimeError("Needs app or request context") return result return decorator class PonyDatastore(Datastore): def commit(self): self.db.commit() @with_pony_session def put(self, model): return model @with_pony_session def delete(self, model): model.delete() class UserDatastore: """Abstracted user datastore. :param user_model: A user model class definition :param role_model: A role model class definition :param webauthn_model: A model used to store webauthn registrations .. important:: For mutating operations, the user/role will be added to the datastore (by calling self.put(<object>). If the datastore is session based (such as for SQLAlchemyDatastore) it is up to caller to actually commit the transaction by calling datastore.commit(). .. note:: You must implement get_user_mapping in your WebAuthn model if your User model doesn't have a primary key Column called 'id' """ def __init__( self, user_model: t.Type[User], role_model: t.Type[Role], webauthn_model: t.Type[WebAuthn] | None = None, ): self.user_model = user_model self.role_model = role_model self.webauthn_model = webauthn_model if t.TYPE_CHECKING: # pragma: no cover # These are available from a DataStore implementation def delete(self, model): pass def put(self, model): pass def _prepare_role_modify_args(self, role: str | Role) -> Role | None: if isinstance(role, str): return self.find_role(role) return role def _prepare_create_user_args(self, **kwargs): kwargs.setdefault("active", True) roles = copy(kwargs.get("roles", [])) for i, role in enumerate(roles): rn = role.name if isinstance(role, self.role_model) else role # see if the role exists roles[i] = self.find_role(rn) kwargs["roles"] = roles kwargs.setdefault("fs_uniquifier", uuid.uuid4().hex) if hasattr(self.user_model, "fs_token_uniquifier"): kwargs.setdefault("fs_token_uniquifier", uuid.uuid4().hex) if hasattr(self.user_model, "fs_webauthn_user_handle"): kwargs.setdefault("fs_webauthn_user_handle", uuid.uuid4().hex) return kwargs def find_user(self, **kwargs: t.Any) -> User | None: """Returns a user matching the provided parameters. Besides keyword arguments used to filter the results, 'case_insensitive' can be passed (defaults to False) """ raise NotImplementedError def find_role(self, role: str) -> Role | None: """Returns a role matching the provided name.""" raise NotImplementedError def add_role_to_user(self, user: User, role: Role | str) -> bool: """Adds a role to a user. :param user: The user to manipulate. :param role: The role to add to the user. Can be a Role object or string role name :return: True is role was added, False if role already existed. """ if not (role_obj := self._prepare_role_modify_args(role)): raise ValueError(f"Role: {role} doesn't exist") if role_obj not in user.roles: user.roles.append(role_obj) self.put(user) return True return False def remove_role_from_user(self, user: User, role: Role | str) -> bool: """Removes a role from a user. :param user: The user to manipulate. Can be an User object or email :param role: The role to remove from the user. Can be a Role object or string role name :return: True if role was removed, False if role doesn't exist or user didn't have role. """ rv = False role_obj = self._prepare_role_modify_args(role) if role_obj in user.roles: rv = True user.roles.remove(role_obj) self.put(user) return rv def add_permissions_to_role( self, role: Role | str, permissions: set | list | tuple | str ) -> bool: """Add one or more permissions to role. :param role: The role to modify. Can be a Role object or string role name :param permissions: a set, list, tuple or comma separated string. :return: True if permissions added, False if role doesn't exist. Caller must commit to DB. .. versionadded:: 4.0.0 """ rv = False if role_obj := self._prepare_role_modify_args(role): rv = True current_perms = role_obj.get_permissions() if isinstance(permissions, set) or isinstance(permissions, tuple): permissions = list(permissions) elif isinstance(permissions, str): permissions = [p.strip() for p in permissions.split(",")] # always give a list to DB - some (e.g. Mongo) only take list/tuple role_obj.permissions = list(current_perms.union(set(permissions))) self.put(role_obj) return rv def remove_permissions_from_role( self, role: Role | str, permissions: set | list | tuple | str ) -> bool: """Remove one or more permissions from a role. :param role: The role to modify. Can be a Role object or string role name :param permissions: a set, list, tuple or a comma separated string. :return: True if permissions removed, False if role doesn't exist. Caller must commit to DB. .. versionadded:: 4.0.0 """ rv = False if role_obj := self._prepare_role_modify_args(role): rv = True current_perms = role_obj.get_permissions() if isinstance(permissions, set) or isinstance(permissions, tuple): permissions = list(permissions) elif isinstance(permissions, str): permissions = [p.strip() for p in permissions.split(",")] role_obj.permissions = list(current_perms.difference(set(permissions))) self.put(role_obj) return rv def toggle_active(self, user: User) -> bool: """Toggles a user's active status. Always returns True.""" user.active = not user.active self.put(user) return True def deactivate_user(self, user: User) -> bool: """Deactivates a specified user. Returns `True` if a change was made. This will immediately disallow access to all endpoints that require authentication either via session or tokens. The user will not be able to log in again. :param user: The user to deactivate """ if user.active: user.active = False self.put(user) return True return False def activate_user(self, user: User) -> bool: """Activates a specified user. Returns `True` if a change was made. :param user: The user to activate """ if not user.active: user.active = True self.put(user) return True return False def set_uniquifier(self, user: User, uniquifier: str | None = None) -> None: """Set user's Flask-Security identity key. This will immediately render outstanding auth tokens, session cookies and remember cookies invalid. :param user: User to modify :param uniquifier: Unique value - if none then uuid.uuid4().hex is used .. versionadded:: 3.3.0 """ if not uniquifier: uniquifier = uuid.uuid4().hex user.fs_uniquifier = uniquifier self.put(user) def set_token_uniquifier(self, user: User, uniquifier: str | None = None) -> None: """Set user's auth token identity key. This will immediately render outstanding auth tokens invalid. :param user: User to modify :param uniquifier: Unique value - if none then uuid.uuid4().hex is used This method is a no-op if the user model doesn't contain the attribute ``fs_token_uniquifier`` .. versionadded:: 4.0.0 """ if not uniquifier: uniquifier = uuid.uuid4().hex if hasattr(user, "fs_token_uniquifier"): user.fs_token_uniquifier = uniquifier self.put(user) def create_role(self, **kwargs: t.Any) -> Role: """ Creates and returns a new role from the given parameters. Supported params (depending on RoleModel): :kwparam name: Role name :kwparam permissions: a list, set, tuple or comma separated string. These are user-defined strings that correspond to args used with @permissions_required() .. versionadded:: 3.3.0 """ # Usually we just use raw DB model create - for permissions we want to # be nicer and allow sending in a list or set or a single string. if "permissions" in kwargs and hasattr(self.role_model, "permissions"): perms = kwargs["permissions"] if isinstance(perms, set) or isinstance(perms, tuple): perms = list(perms) elif isinstance(perms, str): perms = [p.strip() for p in perms.split(",")] kwargs["permissions"] = perms role = self.role_model(**kwargs) return self.put(role) def find_or_create_role(self, name: str, **kwargs: t.Any) -> Role: """Returns a role matching the given name or creates it with any additionally provided parameters. """ return self.find_role(name) or self.create_role(name=name, **kwargs) def create_user(self, **kwargs: t.Any) -> User: """Creates and returns a new user from the given parameters. :kwparam email: required. :kwparam password: Hashed password. :kwparam roles: list of roles to be added to user. Can be Role objects or strings Any other element of the User data model may be supplied as well. .. note:: No normalization is done on email - it is assumed the caller has already done that. Best practice is:: try: enorm = app.security._mail_util.validate(email) except ValueError: .. danger:: Be aware that whatever `password` is passed in will be stored directly in the DB. Do NOT pass in a plaintext password! Best practice is to pass in ``hash_password(plaintext_password)``. Furthermore, no validation nor normalization is done on the password (e.g for minimum length). Best practice is:: pbad, pnorm = app.security._password_util.validate(password, True) Look for `pbad` being None. Pass the normalized password `pnorm` to this method. The new user's ``active`` property will be set to ``True`` unless explicitly set to ``False`` in `kwargs` (e.g. active = False) """ kwargs = self._prepare_create_user_args(**kwargs) user = self.user_model(**kwargs) return self.put(user) def delete_user(self, user: User) -> None: """Deletes the specified user. :param user: The user to delete """ self.delete(user) # type: ignore def reset_user_access(self, user: User) -> None: """ Use this method to reset user authentication methods in the case of compromise. This will: * reset fs_uniquifier - which causes session cookie, remember cookie, auth tokens to be unusable * reset fs_token_uniquifier (if present) - cause auth tokens to be unusable * remove all unified signin TOTP secrets so those can't be used * remove all two-factor secrets so those can't be used * remove all registered webauthn credentials * remove all one-time recovery codes * will NOT affect password Note that if using unified sign in and allow 'email' as a way to receive a code; this will also get reset. If the user registered w/o a password then they likely will have no way to authenticate. Note - this method isn't used directly by Flask-Security - it is provided as a helper for an application's administrative needs. Remember to call commit on DB if needed. .. versionadded:: 3.4.1 .. versionchanged:: 5.0.0 Added webauthn and recovery codes reset. """ self.set_uniquifier(user) self.set_token_uniquifier(user) if hasattr(user, "us_totp_secrets"): self.us_reset(user) if hasattr(user, "tf_primary_method"): self.tf_reset(user) if hasattr(user, "webauthn"): self.webauthn_reset(user) if hasattr(user, "mf_recovery_codes"): self.mf_set_recovery_codes(user, None) def tf_set( self, user: User, primary_method: str, totp_secret: str | None = None, phone: str | None = None, ) -> None: """Set two-factor info into user record. This carefully only changes things if different. If totp_secret isn't provided - existing one won't be changed. If phone isn't provided, the existing phone number won't be changed. This could be called from an application to apiori setup a user for two factor without the user having to go through the setup process. To get a totp_secret - use ``app.security._totp_factory.generate_totp_secret()`` .. versionadded: 3.4.1 """ changed = False if user.tf_primary_method != primary_method: user.tf_primary_method = primary_method changed = True if totp_secret and user.tf_totp_secret != totp_secret: user.tf_totp_secret = totp_secret changed = True if phone and user.tf_phone_number != phone: user.tf_phone_number = phone changed = True if changed: self.put(user) def tf_reset(self, user: User) -> None: """Disable two-factor auth for user. .. versionadded: 3.4.1 """ user.tf_primary_method = None user.tf_totp_secret = None user.tf_phone_number = None self.put(user) def mf_set_recovery_codes(self, user: User, rcs: list[str] | None) -> None: """Set MF recovery codes into user record. Any existing codes will be erased. .. versionadded: 5.0.0 """ user.mf_recovery_codes = rcs self.put(user) def mf_get_recovery_codes(self, user: User) -> list[str]: codes = getattr(user, "mf_recovery_codes", []) return codes if codes else [] def mf_delete_recovery_code(self, user: User, idx: int) -> bool: """Delete a single recovery code. Recovery codes are single-use - so delete after using! Return True if code found and deleted, False otherwise. .. versionadded: 5.0.0 """ if not user.mf_recovery_codes: return False try: user.mf_recovery_codes.pop(idx) self.put(user) return True except IndexError: return False def us_get_totp_secrets(self, user: User) -> dict[str, str]: """Return totp secrets. These are json encoded in the DB. Returns a dict with methods as keys and secrets as values. .. versionadded:: 3.4.0 """ if not user.us_totp_secrets: return {} return json.loads(user.us_totp_secrets) def us_put_totp_secrets(self, user: User, secrets: dict[str, str] | None) -> None: """Save secrets. Assume to be a dict (or None) with keys as methods, and values as (encrypted) secrets. .. versionadded:: 3.4.0 """ user.us_totp_secrets = json.dumps(secrets) if secrets else None self.put(user) # type: ignore def us_set( self, user: User, method: str, totp_secret: str | None = None, phone: str | None = None, ) -> None: """Set unified sign in info into user record. If totp_secret isn't provided - existing one won't be changed. If phone isn't provided, the existing phone number won't be changed. This could be called from an application to apiori setup a user for unified sign in without the user having to go through the setup process. To get a totp_secret - use ``app.security._totp_factory.generate_totp_secret()`` .. versionadded:: 3.4.1 """ if totp_secret: totp_secrets = self.us_get_totp_secrets(user) totp_secrets[method] = totp_secret self.us_put_totp_secrets(user, totp_secrets) if phone and user.us_phone_number != phone: user.us_phone_number = phone self.put(user) def us_reset(self, user: User, method: str | None = None) -> None: """Disable unified sign in for user. This will disable authenticator app and SMS, and email. N.B. if user has no password they may not be able to authenticate at all. .. versionadded:: 3.4.1 .. versionchanged:: 5.0.0 Added optional method argument to delete just a single method """ if not method: # delete all self.us_put_totp_secrets(user, None) user.us_phone_number = None self.put(user) else: totp_secrets = self.us_get_totp_secrets(user) del totp_secrets[method] self.us_put_totp_secrets(user, totp_secrets) if method == "sms": user.us_phone_number = None self.put(user) def us_setup_email(self, user: User) -> bool: # setup email (if allowed) for user for unified sign in. from .proxies import _security if not cv("UNIFIED_SIGNIN") or "email" not in cv("US_ENABLED_METHODS"): return False totp_secrets = self.us_get_totp_secrets(user) totp_secrets["email"] = _security._totp_factory.generate_totp_secret() self.us_put_totp_secrets(user, totp_secrets) return True def set_webauthn_user_handle( self, user: User, user_handle: str | None = None ) -> None: """Set the value for the Relaying Party's (that's us) UserHandle (user.id) If no value is passed in, a UUID is generated. """ if not user_handle: user_handle = uuid.uuid4().hex user.fs_webauthn_user_handle = user_handle self.put(user) def create_webauthn( self, user: User, credential_id: bytes, public_key: bytes, name: str, sign_count: int, usage: str, device_type: str, backup_state: bool, transports: list[str] | None = None, extensions: str | None = None, **kwargs: t.Any, ) -> None: """ Create a new webauthn registration record. Note that we need to find webauthn records per user as well as find a user from a given webauthn (credential_id) record. .. versionadded: 5.0.0 """ raise NotImplementedError def delete_webauthn(self, webauthn: WebAuthn) -> None: """ .. versionadded: 5.0.0 """ self.delete(webauthn) def find_webauthn(self, credential_id: bytes) -> WebAuthn | None: """Returns a credential matching the id. .. versionadded: 5.0.0 """ raise NotImplementedError def find_user_from_webauthn(self, webauthn: WebAuthn) -> User | None: """Returns user associated with this webauthn credential .. versionadded: 5.0.0 """ if not self.webauthn_model: raise NotImplementedError user_filter = webauthn.get_user_mapping() return self.find_user(**user_filter) def webauthn_reset(self, user: User) -> None: """Reset access via webauthn credentials. This will DELETE all registered credentials. There doesn't appear to be any reason to change the user's fs_webauthn_user_handle. .. versionadded: 5.0.0 """ for cred in user.webauthn: self.delete(cred) self.put(user) class SQLAlchemyUserDatastore(SQLAlchemyDatastore, UserDatastore): """A UserDatastore implementation that assumes the use of `Flask-SQLAlchemy <https://pypi.python.org/pypi/flask-sqlalchemy/>`_ for datastore transactions. :param db: :param user_model: See :ref:`Models <models_topic>`. :param role_model: See :ref:`Models <models_topic>`. :param webauthn_model: See :ref:`Models <models_topic>`. """ def __init__( self, db: flask_sqlalchemy.SQLAlchemy, user_model: t.Type[User], role_model: t.Type[Role], webauthn_model: t.Type[WebAuthn] | None = None, ): SQLAlchemyDatastore.__init__(self, db) UserDatastore.__init__(self, user_model, role_model, webauthn_model) def find_user(self, case_insensitive: bool = False, **kwargs: t.Any) -> User | None: from sqlalchemy import func as alchemyFn query = self.user_model.query if cv("JOIN_USER_ROLES") and hasattr(self.user_model, "roles"): from sqlalchemy.orm import joinedload query = query.options(joinedload(self.user_model.roles)) # type: ignore if case_insensitive: # While it is of course possible to pass in multiple keys to filter on # that isn't the normal use case. If caller asks for case_insensitive # AND gives multiple keys - throw an error. if len(kwargs) > 1: raise ValueError("Case insensitive option only supports single key") attr, identifier = kwargs.popitem() subquery = alchemyFn.lower( getattr(self.user_model, attr) ) == alchemyFn.lower(identifier) return query.filter(subquery).first() else: return query.filter_by(**kwargs).first() def find_role(self, role: str) -> Role | None: return self.role_model.query.filter_by(name=role).first() # type: ignore def find_webauthn(self, credential_id: bytes) -> WebAuthn | None: return self.webauthn_model.query.filter_by( # type: ignore credential_id=credential_id ).first() def create_webauthn( self, user: User, credential_id: bytes, public_key: bytes, name: str, sign_count: int, usage: str, device_type: str, backup_state: bool, transports: list[str] | None = None, extensions: str | None = None, **kwargs: t.Any, ) -> None: from .proxies import _security if not hasattr(self, "webauthn_model") or not self.webauthn_model: raise NotImplementedError webauthn = self.webauthn_model( credential_id=credential_id, public_key=public_key, name=name, sign_count=sign_count, usage=usage, device_type=device_type, backup_state=backup_state, transports=transports, extensions=extensions, lastuse_datetime=_security.datetime_factory(), **kwargs, ) user.webauthn.append(webauthn) self.put(webauthn) self.put(user) class SQLAlchemySessionUserDatastore(SQLAlchemyUserDatastore, SQLAlchemyDatastore): """A UserDatastore implementation that directly uses `SQLAlchemy's <https://docs.sqlalchemy.org/en/14/orm/session_basics.html>`_ session API. :param session: :param user_model: See :ref:`Models <models_topic>`. :param role_model: See :ref:`Models <models_topic>`. :param webauthn_model: See :ref:`Models <models_topic>`. """ def __init__( self, session: sqlalchemy.orm.scoping.scoped_session, user_model: t.Type[User], role_model: t.Type[Role], webauthn_model: t.Type[WebAuthn] | None = None, ): class PretendFlaskSQLAlchemyDb: """This is a pretend db object, so we can just pass in a session.""" def __init__(self, session): self.session = session SQLAlchemyUserDatastore.__init__( self, PretendFlaskSQLAlchemyDb(session), # type: ignore user_model, role_model, webauthn_model, ) def commit(self): super().commit() class MongoEngineUserDatastore(MongoEngineDatastore, UserDatastore): """A UserDatastore implementation that assumes the use of `MongoEngine <https://pypi.org/project/mongoengine/>`_ for datastore transactions. :param db: :param user_model: See :ref:`Models <models_topic>`. :param role_model: See :ref:`Models <models_topic>`. :param webauthn_model: See :ref:`Models <models_topic>`. """ def __init__( self, db: mongoengine.connection, user_model: t.Type[User], role_model: t.Type[Role], webauthn_model: t.Type[WebAuthn] | None = None, ): MongoEngineDatastore.__init__(self, db) UserDatastore.__init__(self, user_model, role_model, webauthn_model) def find_user(self, case_insensitive=False, **kwargs): from mongoengine.queryset.visitor import Q, QCombination from mongoengine.errors import ValidationError try: if case_insensitive: # While it is of course possible to pass in multiple keys to filter on # that isn't the normal use case. If caller asks for case_insensitive # AND gives multiple keys - throw an error. if len(kwargs) > 1: raise ValueError("Case insensitive option only supports single key") attr, identifier = kwargs.popitem() query = {f"{attr}__iexact": identifier} obj = self.user_model.objects(**query).first() else: queries = map(lambda i: Q(**{i[0]: i[1]}), kwargs.items()) query = QCombination(QCombination.AND, queries) obj = self.user_model.objects(query).first() except ValidationError: # pragma: no cover return None return obj def find_role(self, role): return self.role_model.objects(name=role).first() def find_webauthn(self, credential_id: bytes) -> WebAuthn | None: if not self.webauthn_model: raise NotImplementedError obj = self.webauthn_model.objects( # type: ignore credential_id=credential_id ).first() return obj def create_webauthn( self, user: User, credential_id: bytes, public_key: bytes, name: str, sign_count: int, usage: str, device_type: str, backup_state: bool, transports: list[str] | None = None, extensions: str | None = None, **kwargs: t.Any, ) -> None: from .proxies import _security if not hasattr(self, "webauthn_model") or not self.webauthn_model: raise NotImplementedError webauthn = self.webauthn_model( user=user, credential_id=credential_id, public_key=public_key, name=name, sign_count=sign_count, usage=usage, device_type=device_type, backup_state=backup_state, transports=transports, extensions=extensions, lastuse_datetime=_security.datetime_factory(), **kwargs, ) user.webauthn.append(webauthn) self.put(webauthn) # type: ignore self.put(user) # type: ignore class PeeweeUserDatastore(PeeweeDatastore, UserDatastore): """A UserDatastore implementation that assumes the use of `Peewee Flask utils \ <https://docs.peewee-orm.com/en/latest/peewee/playhouse.html#flask-utils>`_ for datastore transactions. """ def __init__(self, db, user_model, role_model, role_link, webauthn_model=None): """ :param db: :param user_model: A user model class definition :param role_model: A role model class definition :param role_link: A model implementing the many-to-many user-role relation :param webauthn_model: A webauthn model class definition """ PeeweeDatastore.__init__(self, db) UserDatastore.__init__(self, user_model, role_model, webauthn_model) self.UserRole = role_link def find_user(self, case_insensitive=False, **kwargs): from peewee import fn as peeweeFn try: if case_insensitive: # While it is of course possible to pass in multiple keys to filter on # that isn't the normal use case. If caller asks for case_insensitive # AND gives multiple keys - throw an error. if len(kwargs) > 1: raise ValueError("Case insensitive option only supports single key") attr, identifier = kwargs.popitem() return self.user_model.get( peeweeFn.lower(getattr(self.user_model, attr)) == peeweeFn.lower(identifier) ) else: return self.user_model.filter(**kwargs).get() except self.user_model.DoesNotExist: return None def find_role(self, role): try: return self.role_model.filter(name=role).get() except self.role_model.DoesNotExist: return None def create_user(self, **kwargs): """Creates and returns a new user from the given parameters.""" roles = kwargs.pop("roles", []) user = self.user_model(**self._prepare_create_user_args(**kwargs)) user = self.put(user) for role in roles: self.add_role_to_user(user, role) self.put(user) return user def add_role_to_user(self, user, role): """Adds a role to a user. :param user: The user to manipulate :param role: The role to add to the user """ role = self._prepare_role_modify_args(role) result = self.UserRole.select().where( self.UserRole.user == user.id, self.UserRole.role == role.id ) if result.count(): return False else: self.put(self.UserRole.create(user=user.id, role=role.id)) return True def remove_role_from_user(self, user, role): """Removes a role from a user. :param user: The user to manipulate :param role: The role to remove from the user """ role = self._prepare_role_modify_args(role) result = self.UserRole.select().where( self.UserRole.user == user, self.UserRole.role == role ) if result.count(): query = self.UserRole.delete().where( self.UserRole.user == user, self.UserRole.role == role ) query.execute() return True else: return False def find_webauthn(self, credential_id): if not self.webauthn_model: raise NotImplementedError try: return self.webauthn_model.filter(credential_id=credential_id).get() except self.webauthn_model.DoesNotExist: return None def create_webauthn( self, user: User, credential_id: bytes, public_key: bytes, name: str, sign_count: int, usage: str, device_type: str, backup_state: bool, transports: list[str] | None = None, extensions: str | None = None, **kwargs: t.Any, ) -> None: from .proxies import _security if not hasattr(self, "webauthn_model") or not self.webauthn_model: raise NotImplementedError webauthn = self.webauthn_model( user=user, credential_id=credential_id, public_key=public_key, name=name, sign_count=sign_count, usage=usage, device_type=device_type, backup_state=backup_state, transports=transports, extensions=extensions, lastuse_datetime=_security.datetime_factory(), **kwargs, ) self.put(webauthn) # type: ignore class PonyUserDatastore(PonyDatastore, UserDatastore): """A UserDatastore implementation that assumes the use of `PonyORM <https://pypi.python.org/pypi/pony/>`_ for datastore transactions. Code primarily from https://github.com/ET-CS but taken over after being abandoned. :param db: :param user_model: See :ref:`Models <models_topic>`. :param role_model: See :ref:`Models <models_topic>`. :param webauthn_model: See :ref:`Models <models_topic>`. """ def __init__(self, db, user_model, role_model, webauthn_model=None): PonyDatastore.__init__(self, db) UserDatastore.__init__(self, user_model, role_model, webauthn_model) @with_pony_session def find_user(self, case_insensitive=False, **kwargs): if case_insensitive: # While it is of course possible to pass in multiple keys to filter on # that isn't the normal use case. If caller asks for case_insensitive # AND gives multiple keys - throw an error. if len(kwargs) > 1: raise ValueError("Case insensitive option only supports single key") # TODO - implement case insensitive look ups. return self.user_model.get(**kwargs) @with_pony_session def find_role(self, role): return self.role_model.get(name=role) @with_pony_session def add_role_to_user(self, *args, **kwargs): return super().add_role_to_user(*args, **kwargs) @with_pony_session def create_user(self, **kwargs): return super().create_user(**kwargs) @with_pony_session def create_role(self, **kwargs): return super().create_role(**kwargs) if t.TYPE_CHECKING: # pragma: no cover # Normally - the application creates the Models and glues them together # For typing we do that here since we don't know which DB interface they # will pick. from .core import UserMixin, RoleMixin, WebAuthnMixin class CanonicalUserDatastore(Datastore, UserDatastore): pass class User(UserMixin): id: int email: str username: str | None password: str | None active: bool fs_uniquifier: str fs_token_uniquifier: str fs_webauthn_user_handle: str confirmed_at: datetime | None last_login_at: datetime current_login_at: datetime last_login_ip: str | None current_login_ip: str | None login_count: int tf_primary_method: str | None tf_totp_secret: str | None tf_phone_number: str | None mf_recovery_codes: list[str] | None us_phone_number: str | None us_totp_secrets: str | bytes | None create_datetime: datetime update_datetime: datetime roles: list[Role] webauthn: list[WebAuthn] def __init__(self, **kwargs): ... class Role(RoleMixin): id: int name: str description: str | None permissions: list[str] | None update_datetime: datetime def __init__(self, **kwargs): ... class WebAuthn(WebAuthnMixin): id: int name: str credential_id: bytes public_key: bytes sign_count: int transports: list[str] | None backup_state: bool device_type: str extensions: str | None lastuse_datetime: datetime user_id: int usage: str def __init__(self, **kwargs): ...