* feat: django-rest-framework + Person/Email API (#8233) * chore: djangorestframework -> requirements.txt * chore: auth/perm/schema classes for drf * chore: settings for drf and friends * chore: comment that api/serializer.py is not DRF * feat: URL router for DRF * feat: simple api/v3/person/{id} endpoint * fix: actually working demo endpoint * chore: no auth for PersonViewSet * ci: params in ci-run-tests.yml * Revert "ci: params in ci-run-tests.yml" This reverts commit 03808ddf94afe42b7382ddd3730959987389612b. * feat: email addresses for person API * feat: email update api (WIP) * fix: working Email API endpoint * chore: annotate address format in api schema * chore: api adjustments * feat: expose SpectacularAPIView At least for now... * chore: better schema_path_prefix * feat: permissions for DRF API * refactor: use permissions classes * refactor: extract NewEmailForm validation for reuse * refactor: ietfauth.validators module * refactor: send new email conf req via helper * feat: API call to issue new address request * chore: move datatracker DRF api to /api/core/ * fix: unused import * fix: lint * test: drf URL names + API tests (#8248) * refactor: better drf URL naming * test: test person-detail view * test: permissions * test: add_email tests + stubs * test: test email update * test: test 404 vs 403 * fix: fix permissions * test: test email partial update * test: assert we have a nonexistent PK * chore: disable DRF api for now * chore: fix git inanity * fix: lint * test: disable tests of disabled code * test: more lint
20 lines
744 B
Python
20 lines
744 B
Python
# Copyright The IETF Trust 2024, All Rights Reserved
|
|
#
|
|
from rest_framework import authentication
|
|
from django.contrib.auth.models import AnonymousUser
|
|
|
|
|
|
class ApiKeyAuthentication(authentication.BaseAuthentication):
|
|
"""API-Key header authentication"""
|
|
|
|
def authenticate(self, request):
|
|
"""Extract the authentication token, if present
|
|
|
|
This does not validate the token, it just arranges for it to be available in request.auth.
|
|
It's up to a Permissions class to validate it for the appropriate endpoint.
|
|
"""
|
|
token = request.META.get("HTTP_X_API_KEY", None)
|
|
if token is None:
|
|
return None
|
|
return AnonymousUser(), token # available as request.user and request.auth
|