1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
|
# -*- coding: utf-8 -*-
import importlib
from django.conf import settings
from django.contrib.auth import load_backend, BACKEND_SESSION_KEY, SESSION_KEY
from django.contrib.sessions.backends.base import VALID_KEY_CHARS
from django.core.management.base import BaseCommand, CommandError
from django_extensions.management.utils import signalcommand
class Command(BaseCommand):
help = (
"print the user information for the provided session key. "
"this is very helpful when trying to track down the person who "
"experienced a site crash."
)
def add_arguments(self, parser):
parser.add_argument("session_id", nargs="+", type=str, help="user session id")
@signalcommand
def handle(self, *args, **options):
key = options["session_id"][0]
if not set(key).issubset(set(VALID_KEY_CHARS)):
raise CommandError("malformed session key")
engine = importlib.import_module(settings.SESSION_ENGINE)
if not engine.SessionStore().exists(key):
print("Session Key does not exist. Expired?")
return
session = engine.SessionStore(key)
data = session.load()
print("Session to Expire: %s" % session.get_expiry_date())
print("Raw Data: %s" % data)
uid = data.get(SESSION_KEY, None)
backend_path = data.get(BACKEND_SESSION_KEY, None)
if backend_path is None:
print("No authentication backend associated with session")
return
if uid is None:
print("No user associated with session")
return
print("User id: %s" % uid)
backend = load_backend(backend_path)
user = backend.get_user(user_id=uid)
if user is None:
print("No user associated with that id.")
return
# use django standrd api for reporting
print("full name: %s" % user.get_full_name())
print("short name: %s" % user.get_short_name())
print("username: %s" % user.get_username())
if hasattr(user, "email"):
print("email: %s" % user.email)
|