def authenticate(self, username=None, password=None, **kwargs): UserModel = get_user_class() if username is None: username = kwargs.get(UserModel.USERNAME_FIELD) try: user = UserModel._default_manager.get_by_natural_key(username) # pylint: disable=W0212 if user.check_password(password): return user except UserModel.DoesNotExist: # Run the default password hasher once to reduce the timing # difference between an existing and a non-existing user (#20760). UserModel().set_password(password)
def get_group_permissions(self, user_obj, obj=None): """ Returns a set of permission strings that this user has through his/her groups. """ if user_obj.is_anonymous() or obj is not None: return set() if not hasattr(user_obj, '_group_perm_cache'): if user_obj.is_superuser: perms = Permission.objects.all() else: user_groups_field = get_user_class()._meta.get_field('groups') # pylint: disable=W0212 user_groups_query = 'group__%s' % user_groups_field.related_query_name() perms = Permission.objects.filter(**{user_groups_query: user_obj}) perms = perms.values_list('content_type__app_label', 'codename').order_by() user_obj._group_perm_cache = set(["%s.%s" % (ct, name) for ct, name in perms]) # pylint: disable=W0212 return user_obj._group_perm_cache # pylint: disable=W0212
def test_get_current_user_class(self): assert_equal(get_user_class(), BackendUser)
def get_user(self, user_id): UserModel = get_user_class() try: return UserModel._default_manager.get(pk=user_id) except UserModel.DoesNotExist: return None