-
-
Notifications
You must be signed in to change notification settings - Fork 6.9k
Rejecting anonymous in DjangoModelPermissions *before* the get_queryset call #5367
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Hi @theoden-dd. I'm not familiar with this permissions class, but off the cuff, this issue seems valid. That all said, my general advice is to always include a test case that demonstrates the desired behavior.
|
request = factory.generic('METHOD_NOT_ALLOWED', '/') | ||
request = factory.generic( | ||
'METHOD_NOT_ALLOWED', '/', HTTP_AUTHORIZATION=self.credentials['readonly'] | ||
) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are the test changes necessary? The changes to DjangoModelPermissions
seems like it wouldn't affect existing behavior.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Unfortunately, yes. It was a surprise for me, too.
These tests became broken, since they used anonymous users (accidentally, I think) and started to retrieve "403 forbidden" instead of "405 not allowed". That's connected with the priority of permission checks, which is higher than most of other checks.
So, all I did - just changed users to authenticated ones in these tests.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will need to review it, but thanks for the explanation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So, it is possible to retain the existing behavior by moving the HTTP method check out of get_required_permissions()
and into has_permission()
before the request.user
check.
That said, I think the test changes are appropriate, as I'd argue that users shouldn't really be relying on the permissions class to perform 405 checks. 405 checking should happen earlier during dispatch.
Hi @rpkilby .
I totally agree and understand the reasons, but I missed that requirement while making a patch and had no time left when finished. If that's an absolute requirement, just say it - I'll add it later on. |
Nope, just advice. Requirements for tests are more or less flexible given the scope of changes, although I always prefer to add them because...
😉 |
Hey @theoden-dd - closing this in favor of the updated PR that has a failing test + your commit. Thanks! |
Description
There can be a situation when
get_queryset
uses request.user to determine a queryset filtration to apply. If DjangoModelPermissions hasauthenticated_users_only
equal toTrue
, one could assume that there'll be no anonymous in theget_queryset
. However, that was not the case before this PR.Before
There were workarounds which you had to apply if you wanted to avoid anonymous inside the
get_queryset
method:IsAuthenticated
permission to every concerned viewset.Both seem to be reasonably redundant.
After
No additional tuning is required. Having
authenticated_users_only
equal toTrue
is enough.