Hi,

I understand the need for supporting multiple authentication systems,
but I don't think that the implementation is the best that it can be
done.

IMHO, silencing exceptions is something you should be very careful
with even if you control all the code that you are doing it for.

Other implementations will involve more work, yes. Whether that's
worth doing it's not for me to decide.

I would be inclined towards introducing the concept of Credentials of
different types. Username/password would be one type, Token-based
would be another one etc.
The code that tries to authenticate will know what type of credentials
it has (for example the login in admin knows that it has a
username/password) so it can tell the authenticate() method the type
of the Credentials.

Authentication backends would be written for a given type of
Credentials and shouldn't be called with other credential types.
(Alternatively they could be called with Credential types they don't
support, but will be required to raise an
UnsupportedAuthenticationMethod exception. In this case the API would
make it clear that your custom Authenticator can get different
Credential types, so you have to handle the unsupported ones.)

The current implementation assumes that TypeError can be raised only
by the call to authenticate(**credentials) method (which isn't true)
and also that it will always be raised if the wrong credentials are
passed in.
We already discussed the first assumption, but the second assumption
is also wrong.

For example if I have a Token based authenticator
(authenticate(token)) that is configured to be after my User/Password
based authenticator (authenticate(user, password)) in settings.py the
current code will call the user/password based authenticator and it
will pass in the token as a username (password will be null). If I
have an authenticator with 2 string arguments, the same will happen.
This is conceptually wrong and it could cause all kind of problems.
For example my User/Password based LDAPAuthenticator might be making
expensive LDAP queries as a result which will be much slower then a
changed implementation.

Regards,

Tamas


On Thu, Apr 23, 2009 at 8:06 AM, James Bennett <ubernost...@gmail.com> wrote:
>
> On Mon, Apr 20, 2009 at 4:20 AM, Tamas Szabo <szab...@gmail.com> wrote:
>> As you can see the code catches and silently ignores all TypeError 
>> exceptions:
>> The problems with this approach are:
>>    - Why not fail as early as possible if one of the authentication
>> backends configured in settings.py has a wrong signature? If nothing
>> else at least a warning should be logged IMHO.
>
> Because it's conceivable that you'll be using multiple authentication
> systems on the same site, and that not all of them will expect the
> same set of credentials. The alternative -- looking at the keys in the
> 'credentials' dictionary and manually inspecting the argument
> signature of the backend's method every time -- would be cumbersome,
> slower and also error-prone (what happens when a backend accepts
> '**kwargs' but really wants a specific set of keys in there and raises
> a KeyError you didn't expect?)
>
>>    - The bigger is that the code silently catches all TypeError
>> exceptions. If the signature is correct, but the custom backend
>> authenticator somewhere has a bug and a TypeError is raised as a
>> result, the exception will be hidden away. TypeError is a common
>> exception, so I don't think that catching and ignoring it in code that
>> others will write is a good idea.
>
> People who write custom auth backends should probably be unit-testing
> them independently of Django's auth framework, which would catch such
> errors early on. And since Python doesn't offer a more specific
> YouPassedArgumentsIDoNotLikeError, I think that means TypeError's the
> way to go.
>
>
> --
> "Bureaucrat Conrad, you are technically correct -- the best kind of correct."
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to 
django-users+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to