Permissions
Together with authentication and throttling, permissions determine whether a request should be granted or denied access.
Permission checks are always run at the very start of the view, before any other code is allowed to proceed. Permission checks will typically use the authentication information in the request.user and request.auth properties to determine if the incoming request should be permitted.
Permissions are used to grant or deny access for different classes of users to different parts of the API.
The simplest style of permission would be to allow access to any authenticated user, and deny access to any unauthenticated user. This corresponds to the IsAuthenticated class in REST framework.
A slightly less strict style of permission would be to allow full access to authenticated users, but allow read-only access to unauthenticated users. This corresponds to the IsAuthenticatedOrReadOnly class in REST framework.
How permissions are determined
Permissions in REST framework are always defined as a list of permission classes.Before running the main body of the view each permission in the list is checked. If any permission check fails, an exceptions.PermissionDenied or exceptions.NotAuthenticated exception will be raised, and the main body of the view will not run.When the permission checks fail, either a “403 Forbidden” or a “401 Unauthorized” response will be returned.
Setting the permission policy
The default permission policy may be set globally, using the DEFAULT_PERMISSION_CLASSES setting. For example.
REST_FRAMEWORK = {
'DEFAULT_PERMISSION_CLASSES': [
'rest_framework.permissions.IsAuthenticated',
]
}
If not specified, this setting defaults to allowing unrestricted access:
'DEFAULT_PERMISSION_CLASSES': [
'rest_framework.permissions.AllowAny',
]
You can also set the authentication policy on a per-view, or per-viewset basis, using the APIView class-based views.
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
class ExampleView(APIView):
permission_classes = [IsAuthenticated]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
when you set new permission classes via the class attribute or decorators you’re telling the view to ignore the default list set in the settings.py file.
List of permissions
AllowAny Allow any access whether authenticated or not.Useful for views that need to be publicly accessible (e.g., login or registration).This permission is not strictly required, since you can achieve the same result by using an empty list or tuple for the permissions setting.
IsAuthenticated The IsAuthenticated permission class will deny permission to any unauthenticated user, and allow permission otherwise.This permission is suitable if you want your API to only be accessible to registered users.
IsAdminUser The IsAdminUser permission class will deny permission to any user, unless user.is_staff is True in which case permission will be allowed.This permission is suitable if you want your API to only be accessible to a subset of trusted administrators
IsAuthenticatedOrReadOnly The IsAuthenticatedOrReadOnly will allow authenticated users to perform any request. Requests for unauthenticated users will only be permitted if the request method is one of the “safe” methods; GET, HEAD or OPTIONS.This permission is suitable if you want to your API to allow read permissions to anonymous users, and only allow write permissions to authenticated users.
Example Of Using Permissions
from rest_framework import permissions
from rest_framework.response import Response
from rest_framework.views import APIView
class ExampleView(APIView):
permission_classes = [permissions.IsAuthenticated]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
Custom Permissions
To implement a custom permission, override BasePermission and implement either, or both, of the following methods:
- has_permission(self, request, view) Should return True if the request should be granted access, and False otherwise.
- has_object_permission(self, request, view, obj) Should return True if the request should be granted access to the object obj, and False otherwise.
Note: The instance-level has_object_permission method will only be called if the view-level has_permission checks have already passed. Also note that in order for the instance-level checks to run, the view code should explicitly call .check_object_permissions(request, obj)
Example Of HasPermission
for example, if you want to allow access to only admin users, you can create a custom permission class like this:
from rest_framework.permissions import BasePermission
from rest_framework.response import Response
from rest_framework.views import APIView
class IsAdminUser(BasePermission):
def has_permission(self, request, view):
return request.user and request.user.is_staff
class ExampleView(APIView):
permission_classes = [IsAdminUser]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
Ip blacklisting is another example of custom permission
from rest_framework.permissions import BasePermission
from rest_framework.response import Response
from rest_framework.views import APIView
class BlacklistPermission(BasePermission):
def has_permission(self, request, view):
ip = request.META['REMOTE_ADDR']
blacklisted = Blacklist.objects.filter(ip=ip).exists()
return not blacklisted
class ExampleView(APIView):
permission_classes = [BlacklistPermission]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
Example of has_object_permission
The following example demonstrates how to implement a custom permission that only allows owners of an object to edit it. This permission checks if the user is the owner of the object.
from rest_framework.permissions import BasePermission,IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
from .models import ExampleModel
from .serializers import ExampleSerializer
class IsOwner(BasePermission):
def has_object_permission(self, request, view, obj):
return obj.owner == request.user
class ExampleView(APIView):
permission_classes = [IsAuthenticated,IsOwner]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
def put(self, request, pk):
example = ExampleModel.objects.get(pk=pk)
self.check_object_permissions(request, example)
serializer = ExampleSerializer(example, data=request.data)
if serializer.is_valid():
serializer.save()
return Response(serializer.data)
return Response(serializer.errors, status=400)
Instead of using this custom permission we can use for this
class ExampleView(APIView):
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
def put(self, request, pk):
example = ExampleModel.objects.get(pk=pk)
if example.owner != request.user:
return Response({'error': 'You do not have permission to edit this object'})
serializer = ExampleSerializer(example, data=request.data)
if serializer.is_valid():
serializer.save()
return Response(serializer.data)
return Response(serializer.errors, status=400)
combining has_permission and has_object_permission
from rest_framework.permissions import BasePermission,IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
from .models import ExampleModel
from .serializers import ExampleSerializer
class IsOwner(BasePermission):
def has_permission(self, request, view):
return request.user and request.user.is_authenticated
def has_object_permission(self, request, view, obj):
return obj.owner == request.user
class ExampleView(APIView):
permission_classes = [IsOwner]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
def put(self, request, pk):
example = ExampleModel.objects.get(pk=pk)
self.check_object_permissions(request, example)
serializer = ExampleSerializer(example, data=request.data)
if serializer.is_valid():
serializer.save()
return Response(serializer.data)
return Response(serializer.errors, status=400)
first, the has_permission method is called to check if the user is authenticated. If the user is authenticated, It will run the view and then the has_object_permission method is invoked to check if the user is the owner of the object if the user is the owner of the object then it will allow the user to edit the object otherwise it will return an error message.
Throttling
Throttling is used to limit the number of requests that a user can make to an API within a certain timeframe. It is used to prevent abuse of the API.The order of execution is
- Authentication
- Permission
- Throttling
- View
How throttling works
As with permissions and authentication, throttling in REST framework is always defined as a list of classes.Before running the main body of the view each throttle in the list is checked. If any throttle check fails an exceptions.Throttled exception will be raised, and the main body of the view will not run.
Setting the throttling policy
The default throttling policy may be set globally, using the DEFAULT_THROTTLE_CLASSES setting. For example.
REST_FRAMEWORK = {
'DEFAULT_THROTTLE_CLASSES': [
'rest_framework.throttling.AnonRateThrottle',
'rest_framework.throttling.UserRateThrottle'
],
'DEFAULT_THROTTLE_RATES': {
'anon': '100/day',
'user': '1000/day'
}
}
The rate descriptions used in DEFAULT_THROTTLE_RATES may include second
, minute
, hour
or day
as the throttle period.
You can also set the throttling policy on a per-view or per-viewset basis, using the APIView
class-based views.
from rest_framework.response import Response
from rest_framework.throttling import UserRateThrottle
from rest_framework.views import APIView
class ExampleView(APIView):
throttle_classes = [UserRateThrottle]
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content)
How Clients are identified
The X-Forwarded-For HTTP header and REMOTE_ADDR WSGI variable are used to uniquely identify client IP addresses for throttling. If the X-Forwarded-For header is present then it will be used, otherwise the value of the REMOTE_ADDR variable from the WSGI environment will be used.
API Reference
AnonRateThrottle
The AnonRateThrottle will only ever throttle unauthenticated users. The IP address of the incoming request is used to generate a unique key to throttle against.The allowed number of requests is determined by the ‘anon’ key in the DEFAULT_THROTTLE_RATES setting.AnonRateThrottle is suitable if you want to restrict the rate of requests from unknown sources.
UserRateThrottle
The UserRateThrottle will throttle users to a given rate of requests across the API. The user id is used to generate a unique key to throttle against. Unauthenticated requests will fall back to using the IP address of the incoming request to generate a unique key to throttle against.The allowed number of requests is determined by the ‘user’ key in the DEFAULT_THROTTLE_RATES setting.UserRateThrottle.
ScopedRateThrottle
The ScopedRateThrottle class can be used to restrict access to specific parts of the API. This throttle will only be applied if the view that is being accessed includes a .throttle_scope property. The unique throttle key will then be formed by concatenating the “scope” of the request with the unique user id or IP address.
The allowed request rate is determined by the DEFAULT_THROTTLE_RATES setting using a key from the request “scope”.
For example, given the following views…
class ContactListView(APIView):
throttle_classes = [ScopedRateThrottle]
throttle_scope = 'contacts'
...
class ContactDetailView(APIView):
throttle_classes = [ScopedRateThrottle]
throttle_scope = 'contacts'
...
class UploadView(APIView):
throttle_classes = [ScopedRateThrottle]
throttle_scope = 'uploads'
...
…and the following settings.
REST_FRAMEWORK = {
'DEFAULT_THROTTLE_CLASSES': [
'rest_framework.throttling.ScopedRateThrottle',
],
'DEFAULT_THROTTLE_RATES': {
'contacts': '1000/day',
'uploads': '20/day'
}
}
User requests to either ContactListView or ContactDetailView would be restricted to a total of 1000 requests per-day. User requests to UploadView would be restricted to 20 requests per day.
Status
To send status code in response rest_framework provides a class called status which is used to send status code in response.
from rest_framework import status
from rest_framework.response import Response
from rest_framework.views import APIView
class ExampleView(APIView):
def get(self, request, format=None):
content = {
'status': 'request was permitted'
}
return Response(content, status=status.HTTP_200_OK)
For other status code you can visit here
Returning Url
To return url in response rest_framework provides reverse
which is used to return url in response.
from rest_framework.reverse import reverse
from rest_framework.response import Response
from rest_framework.views import APIView
class ExampleView(APIView):
def get(self, request, format=None):
content = {
'status': 'request was permitted',
'url': reverse('example-view', request=request,args=[1,2,3,4])
}
return Response(content)
Pagination
YOu can implement your own pagination using request.query_params
like this
from rest_framework.api import APIView
from rest_framework.response import Response
class ExampleView(APIView):
def get(self, request, format=None):
page = int(request.query_params.get('page', 1))
limit = int(request.query_params.get('limit', 10))
offset = (page - 1) * limit
data = ExampleModel.objects.all()[offset:offset+limit]
return Response(data)