2018-11-22 12:12:24 +00:00
|
|
|
"""Core OAauth Views"""
|
2020-06-07 14:35:08 +00:00
|
|
|
from typing import Any, Callable, Dict, Optional
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
from django.conf import settings
|
|
|
|
from django.contrib import messages
|
2018-11-22 12:12:24 +00:00
|
|
|
from django.contrib.auth.mixins import LoginRequiredMixin
|
2020-06-07 14:35:08 +00:00
|
|
|
from django.http import Http404, HttpRequest, HttpResponse
|
2018-11-22 12:12:24 +00:00
|
|
|
from django.shortcuts import get_object_or_404, redirect, render
|
2018-11-11 12:41:48 +00:00
|
|
|
from django.urls import reverse
|
|
|
|
from django.utils.translation import ugettext as _
|
|
|
|
from django.views.generic import RedirectView, View
|
2019-10-01 08:24:10 +00:00
|
|
|
from structlog import get_logger
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2019-12-05 15:14:08 +00:00
|
|
|
from passbook.audit.models import Event, EventAction
|
2020-06-07 14:35:08 +00:00
|
|
|
from passbook.core.models import User
|
|
|
|
from passbook.flows.models import Flow
|
2020-05-08 14:10:27 +00:00
|
|
|
from passbook.flows.planner import (
|
|
|
|
PLAN_CONTEXT_PENDING_USER,
|
|
|
|
PLAN_CONTEXT_SSO,
|
|
|
|
FlowPlanner,
|
|
|
|
)
|
|
|
|
from passbook.flows.views import SESSION_KEY_PLAN
|
|
|
|
from passbook.lib.utils.urls import redirect_with_qs
|
2020-07-07 19:47:07 +00:00
|
|
|
from passbook.sources.oauth.auth import AuthorizedServiceBackend
|
2020-05-23 18:33:23 +00:00
|
|
|
from passbook.sources.oauth.clients import BaseOAuthClient, get_client
|
2019-12-31 11:51:16 +00:00
|
|
|
from passbook.sources.oauth.models import OAuthSource, UserOAuthSourceConnection
|
2020-05-08 17:46:39 +00:00
|
|
|
from passbook.stages.password.stage import PLAN_CONTEXT_AUTHENTICATION_BACKEND
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2019-10-04 08:08:53 +00:00
|
|
|
LOGGER = get_logger()
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
|
2018-12-18 12:24:26 +00:00
|
|
|
# pylint: disable=too-few-public-methods
|
2018-11-11 12:41:48 +00:00
|
|
|
class OAuthClientMixin:
|
|
|
|
"Mixin for getting OAuth client for a source."
|
|
|
|
|
2020-02-18 21:12:51 +00:00
|
|
|
client_class: Optional[Callable] = None
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2020-05-23 18:33:23 +00:00
|
|
|
def get_client(self, source: OAuthSource) -> BaseOAuthClient:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Get instance of the OAuth client for this source."
|
|
|
|
if self.client_class is not None:
|
|
|
|
# pylint: disable=not-callable
|
|
|
|
return self.client_class(source)
|
|
|
|
return get_client(source)
|
|
|
|
|
|
|
|
|
|
|
|
class OAuthRedirect(OAuthClientMixin, RedirectView):
|
|
|
|
"Redirect user to OAuth source to enable access."
|
|
|
|
|
|
|
|
permanent = False
|
|
|
|
params = None
|
|
|
|
|
|
|
|
# pylint: disable=unused-argument
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_additional_parameters(self, source: OAuthSource) -> Dict[str, Any]:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Return additional redirect parameters for this source."
|
|
|
|
return self.params or {}
|
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_callback_url(self, source: OAuthSource) -> str:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Return the callback url for this source."
|
2019-12-31 11:51:16 +00:00
|
|
|
return reverse(
|
|
|
|
"passbook_sources_oauth:oauth-client-callback",
|
|
|
|
kwargs={"source_slug": source.slug},
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_redirect_url(self, **kwargs) -> str:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Build redirect url for a given source."
|
2019-12-31 11:51:16 +00:00
|
|
|
slug = kwargs.get("source_slug", "")
|
2018-11-11 12:41:48 +00:00
|
|
|
try:
|
|
|
|
source = OAuthSource.objects.get(slug=slug)
|
|
|
|
except OAuthSource.DoesNotExist:
|
|
|
|
raise Http404("Unknown OAuth source '%s'." % slug)
|
|
|
|
else:
|
|
|
|
if not source.enabled:
|
2019-12-31 11:51:16 +00:00
|
|
|
raise Http404("source %s is not enabled." % slug)
|
2018-11-11 12:41:48 +00:00
|
|
|
client = self.get_client(source)
|
|
|
|
callback = self.get_callback_url(source)
|
|
|
|
params = self.get_additional_parameters(source)
|
2019-12-31 11:51:16 +00:00
|
|
|
return client.get_redirect_url(
|
|
|
|
self.request, callback=callback, parameters=params
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
|
|
|
|
class OAuthCallback(OAuthClientMixin, View):
|
|
|
|
"Base OAuth callback view."
|
|
|
|
|
|
|
|
source_id = None
|
|
|
|
source = None
|
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def get(self, request: HttpRequest, *_, **kwargs) -> HttpResponse:
|
2018-11-11 12:41:48 +00:00
|
|
|
"""View Get handler"""
|
2019-12-31 11:51:16 +00:00
|
|
|
slug = kwargs.get("source_slug", "")
|
2018-11-11 12:41:48 +00:00
|
|
|
try:
|
|
|
|
self.source = OAuthSource.objects.get(slug=slug)
|
|
|
|
except OAuthSource.DoesNotExist:
|
|
|
|
raise Http404("Unknown OAuth source '%s'." % slug)
|
|
|
|
else:
|
|
|
|
if not self.source.enabled:
|
2019-12-31 11:51:16 +00:00
|
|
|
raise Http404("source %s is not enabled." % slug)
|
2018-11-11 12:41:48 +00:00
|
|
|
client = self.get_client(self.source)
|
|
|
|
callback = self.get_callback_url(self.source)
|
|
|
|
# Fetch access token
|
2020-02-23 18:42:57 +00:00
|
|
|
token = client.get_access_token(self.request, callback=callback)
|
|
|
|
if token is None:
|
2019-12-31 11:51:16 +00:00
|
|
|
return self.handle_login_failure(
|
|
|
|
self.source, "Could not retrieve token."
|
|
|
|
)
|
2020-02-23 18:42:57 +00:00
|
|
|
if "error" in token:
|
|
|
|
return self.handle_login_failure(self.source, token["error"])
|
2018-11-11 12:41:48 +00:00
|
|
|
# Fetch profile info
|
2020-02-23 18:42:57 +00:00
|
|
|
info = client.get_profile_info(token)
|
2018-11-11 12:41:48 +00:00
|
|
|
if info is None:
|
2019-12-31 11:51:16 +00:00
|
|
|
return self.handle_login_failure(
|
|
|
|
self.source, "Could not retrieve profile."
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
identifier = self.get_user_id(self.source, info)
|
|
|
|
if identifier is None:
|
|
|
|
return self.handle_login_failure(self.source, "Could not determine id.")
|
|
|
|
# Get or create access record
|
|
|
|
defaults = {
|
2020-02-23 18:42:57 +00:00
|
|
|
"access_token": token.get("access_token"),
|
2018-11-11 12:41:48 +00:00
|
|
|
}
|
|
|
|
existing = UserOAuthSourceConnection.objects.filter(
|
2019-12-31 11:51:16 +00:00
|
|
|
source=self.source, identifier=identifier
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
if existing.exists():
|
|
|
|
connection = existing.first()
|
2020-02-23 18:42:57 +00:00
|
|
|
connection.access_token = token.get("access_token")
|
2019-12-31 11:51:16 +00:00
|
|
|
UserOAuthSourceConnection.objects.filter(pk=connection.pk).update(
|
|
|
|
**defaults
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
else:
|
|
|
|
connection = UserOAuthSourceConnection(
|
2020-02-23 18:42:57 +00:00
|
|
|
source=self.source,
|
|
|
|
identifier=identifier,
|
|
|
|
access_token=token.get("access_token"),
|
2018-11-11 12:41:48 +00:00
|
|
|
)
|
2020-07-07 19:47:07 +00:00
|
|
|
user = AuthorizedServiceBackend().authenticate(
|
2019-12-31 11:51:16 +00:00
|
|
|
source=self.source, identifier=identifier, request=request
|
|
|
|
)
|
2018-11-11 12:41:48 +00:00
|
|
|
if user is None:
|
2020-02-18 20:35:58 +00:00
|
|
|
LOGGER.debug("Handling new user", source=self.source)
|
2018-12-18 12:24:26 +00:00
|
|
|
return self.handle_new_user(self.source, connection, info)
|
2020-02-18 20:35:58 +00:00
|
|
|
LOGGER.debug("Handling existing user", source=self.source)
|
2018-11-11 12:41:48 +00:00
|
|
|
return self.handle_existing_user(self.source, user, connection, info)
|
|
|
|
|
|
|
|
# pylint: disable=unused-argument
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_callback_url(self, source: OAuthSource) -> str:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Return callback url if different than the current url."
|
2020-06-07 14:35:08 +00:00
|
|
|
return ""
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
# pylint: disable=unused-argument
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_error_redirect(self, source: OAuthSource, reason: str) -> str:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Return url to redirect on login failure."
|
|
|
|
return settings.LOGIN_URL
|
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_or_create_user(
|
|
|
|
self,
|
|
|
|
source: OAuthSource,
|
|
|
|
access: UserOAuthSourceConnection,
|
|
|
|
info: Dict[str, Any],
|
|
|
|
) -> User:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Create a shell auth.User."
|
2018-12-09 16:44:54 +00:00
|
|
|
raise NotImplementedError()
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
# pylint: disable=unused-argument
|
2020-06-07 14:35:08 +00:00
|
|
|
def get_user_id(
|
|
|
|
self, source: UserOAuthSourceConnection, info: Dict[str, Any]
|
|
|
|
) -> Optional[str]:
|
|
|
|
"""Return unique identifier from the profile info."""
|
|
|
|
if "id" in info:
|
|
|
|
return info["id"]
|
|
|
|
return None
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def handle_login_flow(self, flow: Optional[Flow], user: User) -> HttpResponse:
|
2020-05-08 17:46:39 +00:00
|
|
|
"""Prepare Authentication Plan, redirect user FlowExecutor"""
|
2020-06-07 14:35:08 +00:00
|
|
|
if not flow:
|
|
|
|
raise Http404
|
2020-05-08 14:10:27 +00:00
|
|
|
# We run the Flow planner here so we can pass the Pending user in the context
|
|
|
|
planner = FlowPlanner(flow)
|
2020-05-20 14:15:16 +00:00
|
|
|
plan = planner.plan(
|
|
|
|
self.request,
|
|
|
|
{
|
|
|
|
PLAN_CONTEXT_PENDING_USER: user,
|
2020-07-07 19:47:07 +00:00
|
|
|
# Since we authenticate the user by their token, they have no backend set
|
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND: "django.contrib.auth.backends.ModelBackend",
|
2020-05-20 14:15:16 +00:00
|
|
|
PLAN_CONTEXT_SSO: True,
|
|
|
|
},
|
|
|
|
)
|
2020-05-08 14:10:27 +00:00
|
|
|
self.request.session[SESSION_KEY_PLAN] = plan
|
|
|
|
return redirect_with_qs(
|
2020-06-07 14:35:08 +00:00
|
|
|
"passbook_flows:flow-executor-shell", self.request.GET, flow_slug=flow.slug,
|
2020-05-08 14:10:27 +00:00
|
|
|
)
|
2019-04-29 21:19:37 +00:00
|
|
|
|
2018-11-11 12:41:48 +00:00
|
|
|
# pylint: disable=unused-argument
|
2020-06-07 14:35:08 +00:00
|
|
|
def handle_existing_user(
|
|
|
|
self,
|
|
|
|
source: OAuthSource,
|
|
|
|
user: User,
|
|
|
|
access: UserOAuthSourceConnection,
|
|
|
|
info: Dict[str, Any],
|
|
|
|
) -> HttpResponse:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Login user and redirect."
|
2019-12-31 11:51:16 +00:00
|
|
|
messages.success(
|
|
|
|
self.request,
|
|
|
|
_(
|
|
|
|
"Successfully authenticated with %(source)s!"
|
|
|
|
% {"source": self.source.name}
|
|
|
|
),
|
|
|
|
)
|
2020-07-07 19:47:07 +00:00
|
|
|
user = AuthorizedServiceBackend().authenticate(
|
2020-06-07 14:35:08 +00:00
|
|
|
source=access.source, identifier=access.identifier, request=self.request
|
|
|
|
)
|
|
|
|
return self.handle_login_flow(source.authentication_flow, user)
|
2018-11-11 12:41:48 +00:00
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def handle_login_failure(self, source: OAuthSource, reason: str) -> HttpResponse:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Message user and redirect on error."
|
2020-02-18 20:35:58 +00:00
|
|
|
LOGGER.warning("Authentication Failure", reason=reason)
|
2019-12-31 11:51:16 +00:00
|
|
|
messages.error(self.request, _("Authentication Failed."))
|
2018-11-11 12:41:48 +00:00
|
|
|
return redirect(self.get_error_redirect(source, reason))
|
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def handle_new_user(
|
|
|
|
self,
|
|
|
|
source: OAuthSource,
|
|
|
|
access: UserOAuthSourceConnection,
|
|
|
|
info: Dict[str, Any],
|
|
|
|
) -> HttpResponse:
|
2018-11-11 12:41:48 +00:00
|
|
|
"Create a shell auth.User and redirect."
|
2018-11-22 12:12:24 +00:00
|
|
|
was_authenticated = False
|
2018-11-27 09:56:40 +00:00
|
|
|
if self.request.user.is_authenticated:
|
2018-11-11 12:41:48 +00:00
|
|
|
# there's already a user logged in, just link them up
|
|
|
|
user = self.request.user
|
2018-11-22 12:12:24 +00:00
|
|
|
was_authenticated = True
|
2018-11-11 12:41:48 +00:00
|
|
|
else:
|
|
|
|
user = self.get_or_create_user(source, access, info)
|
2018-11-22 12:12:24 +00:00
|
|
|
access.user = user
|
|
|
|
access.save()
|
|
|
|
UserOAuthSourceConnection.objects.filter(pk=access.pk).update(user=user)
|
2019-12-31 11:51:16 +00:00
|
|
|
Event.new(
|
2019-12-31 12:33:07 +00:00
|
|
|
EventAction.CUSTOM, message="Linked OAuth Source", source=source
|
2019-12-31 11:51:16 +00:00
|
|
|
).from_http(self.request)
|
2018-11-22 12:12:24 +00:00
|
|
|
if was_authenticated:
|
2019-12-31 11:51:16 +00:00
|
|
|
messages.success(
|
|
|
|
self.request,
|
|
|
|
_("Successfully linked %(source)s!" % {"source": self.source.name}),
|
|
|
|
)
|
|
|
|
return redirect(
|
|
|
|
reverse(
|
|
|
|
"passbook_sources_oauth:oauth-client-user",
|
|
|
|
kwargs={"source_slug": self.source.slug},
|
|
|
|
)
|
|
|
|
)
|
2019-04-29 21:19:37 +00:00
|
|
|
# User was not authenticated, new user has been created
|
2020-07-07 19:47:07 +00:00
|
|
|
user = AuthorizedServiceBackend().authenticate(
|
2019-12-31 11:51:16 +00:00
|
|
|
source=access.source, identifier=access.identifier, request=self.request
|
|
|
|
)
|
|
|
|
messages.success(
|
|
|
|
self.request,
|
|
|
|
_(
|
|
|
|
"Successfully authenticated with %(source)s!"
|
|
|
|
% {"source": self.source.name}
|
|
|
|
),
|
|
|
|
)
|
2020-06-07 14:35:08 +00:00
|
|
|
return self.handle_login_flow(source.enrollment_flow, user)
|
2018-11-11 12:41:48 +00:00
|
|
|
|
|
|
|
|
2018-11-22 12:12:24 +00:00
|
|
|
class DisconnectView(LoginRequiredMixin, View):
|
2018-11-11 12:41:48 +00:00
|
|
|
"""Delete connection with source"""
|
2018-11-22 12:12:24 +00:00
|
|
|
|
|
|
|
source = None
|
|
|
|
aas = None
|
|
|
|
|
2019-03-14 20:19:14 +00:00
|
|
|
def dispatch(self, request, source_slug):
|
|
|
|
self.source = get_object_or_404(OAuthSource, slug=source_slug)
|
2019-12-31 11:51:16 +00:00
|
|
|
self.aas = get_object_or_404(
|
|
|
|
UserOAuthSourceConnection, source=self.source, user=request.user
|
|
|
|
)
|
2019-03-14 20:19:14 +00:00
|
|
|
return super().dispatch(request, source_slug)
|
2018-11-22 12:12:24 +00:00
|
|
|
|
2019-03-14 20:19:14 +00:00
|
|
|
def post(self, request, source_slug):
|
2018-11-22 12:12:24 +00:00
|
|
|
"""Delete connection object"""
|
2019-12-31 11:51:16 +00:00
|
|
|
if "confirmdelete" in request.POST:
|
2018-11-22 12:12:24 +00:00
|
|
|
# User confirmed deletion
|
|
|
|
self.aas.delete()
|
2019-12-31 11:51:16 +00:00
|
|
|
messages.success(request, _("Connection successfully deleted"))
|
|
|
|
return redirect(
|
|
|
|
reverse(
|
|
|
|
"passbook_sources_oauth:oauth-client-user",
|
|
|
|
kwargs={"source_slug": self.source.slug},
|
|
|
|
)
|
|
|
|
)
|
2019-03-14 20:19:14 +00:00
|
|
|
return self.get(request, source_slug)
|
2018-11-22 12:12:24 +00:00
|
|
|
|
2019-12-31 11:45:29 +00:00
|
|
|
# pylint: disable=unused-argument
|
|
|
|
def get(self, request, source_slug):
|
2018-11-22 12:12:24 +00:00
|
|
|
"""Show delete form"""
|
2019-12-31 11:51:16 +00:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"generic/delete.html",
|
|
|
|
{
|
|
|
|
"object": self.source,
|
|
|
|
"delete_url": reverse(
|
|
|
|
"passbook_sources_oauth:oauth-client-disconnect",
|
2020-05-27 09:26:48 +00:00
|
|
|
kwargs={"source_slug": self.source.slug},
|
2019-12-31 11:51:16 +00:00
|
|
|
),
|
|
|
|
},
|
|
|
|
)
|