Revert "Merge pull request #39 from wwitzel3/issue-7260"

This reverts commit 6cd059278184bc1693320ad7e4403d08d1457def, reversing
changes made to 943a40eb40817a3c4d28bfb11d2acca0dae277ce.
This commit is contained in:
Wayne Witzel III 2017-07-27 11:32:09 -04:00
parent c3f2a8a140
commit 5d167cafa2
3 changed files with 21 additions and 20 deletions

View File

@ -1,14 +1,16 @@
import json
import logging
import urllib
from channels import Group, channel_layers
from channels.sessions import enforce_ordering, channel_session, channel_and_http_session
from channels.sessions import channel_session
from channels.handler import AsgiRequest
from django.conf import settings
from django.core.serializers.json import DjangoJSONEncoder
from django.contrib.auth.models import User
from django.contrib.sessions.models import Session
from awx.main.models.organization import AuthToken
logger = logging.getLogger('awx.main.consumers')
@ -20,21 +22,24 @@ def discard_groups(message):
Group(group).discard(message.reply_channel)
@channel_and_http_session
@channel_session
def ws_connect(message):
if message.http_session.session_key is None:
raise ValueError('No valid session key to get auth from')
connect_text = {'accept':False, 'user':None}
session = Session.objects.get(session_key=message.http_session.session_key)
session_data = session.get_decoded()
try:
user = User.objects.get(pk=session_data['_auth_user_id'])
except User.DoesNotExist:
raise ValueError('No valid user for the session key')
message.channel_session['user_id'] = user.pk
message.reply_channel.send({"text": json.dumps({'accept': True, 'user': user.pk})})
message.content['method'] = 'FAKE'
request = AsgiRequest(message)
token = request.COOKIES.get('token', None)
if token is not None:
token = urllib.unquote(token).strip('"')
try:
auth_token = AuthToken.objects.get(key=token)
if auth_token.in_valid_tokens:
message.channel_session['user_id'] = auth_token.user_id
connect_text['accept'] = True
connect_text['user'] = auth_token.user_id
except AuthToken.DoesNotExist:
logger.error("auth_token provided was invalid.")
message.reply_channel.send({"text": json.dumps(connect_text)})
@channel_session
@ -42,7 +47,6 @@ def ws_disconnect(message):
discard_groups(message)
@enforce_ordering
@channel_session
def ws_receive(message):
from awx.main.access import consumer_access

View File

@ -189,9 +189,6 @@ JOB_EVENT_MAX_QUEUE_SIZE = 10000
# Disallow sending session cookies over insecure connections
SESSION_COOKIE_SECURE = True
# Do not allow non-browser clients to read the CSRF cookie.
CSRF_COOKIE_HTTPONLY = True
# Disallow sending csrf cookies over insecure connections
CSRF_COOKIE_SECURE = True

View File

@ -60,7 +60,7 @@ class CompleteView(BaseRedirectView):
logger.info(smart_text(u"User {} logged in".format(self.request.user.username)))
request.session['auth_token_key'] = token.key
token_key = urllib.quote('"%s"' % token.key)
response.set_cookie('token', value=token_key, httponly=True)
response.set_cookie('token', token_key)
token_expires = token.expires.astimezone(utc).strftime('%Y-%m-%dT%H:%M:%S')
token_expires = '%s.%03dZ' % (token_expires, token.expires.microsecond / 1000)
token_expires = urllib.quote('"%s"' % token_expires)