[Catalyst] How to "sudo" using the Authentication plugin

Robert Rothenberg robrwo at gmail.com
Sat May 12 10:09:46 GMT 2012


On 11/05/12 19:18 Tomas Doran wrote:
> 
> On 11 May 2012, at 17:45, Robert Rothenberg wrote:
> 
>> We're working on an application with a lot of users, and where the passwords
>> are encrypted (and future versions may also allow OpenID logins).
>>
>> Developers would like the ability for the "root" user to be able to become
>> another user, for the purposes of debugging problems that real users might
>> be having on a live system.
>>
>> How does one do this using the Authentication plugin?
>>
>> Obvious things to try like the $c->user($new_user) doesn't work, not does
>> the (internal) $c->set_authenticated($user, $real) method.
>>
> 
> The recommended approach would be to keep $c->user 'pure', and to arrange to stash the current user in a top level base chain part, or top level auto.
> 
> If everything then subsequently uses $c->stash->{current_user} - then you can do your sudo (or whatever other mechanism you may need in future) simply by swapping out the user here.
> 
> This makes things a lot more pure - as the canonical user that $c->user will give you is (more) immutable..
> 
> Also, if you swap the 'canonical' user part way through the request - when the session plugin comes to re-serialize the session at the end of request - you're pretty stuffed, as you're now writing out the wrong user… I.e. re-sudoing, or doing any root level action is likely to require you to log out and log in again - not what you actually want! :)

We don't mind having to log out and log back in again after sudoing.

I'm not looking forward to changing every use of $c->user in the code, and
concerned about how this might interact with any plugins that rely on $c->user.

Would you consider the ability to sudo a feature request for the
Authentication plugin? (with appropriate thoughts about the security
implications, of course).

Thanks,
Rob




More information about the Catalyst mailing list