This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/passbook/core/policies.py

90 lines
3.0 KiB
Python
Raw Normal View History

2019-02-16 09:24:31 +00:00
"""passbook core policy engine"""
from logging import getLogger
from celery import group
2019-03-03 19:54:23 +00:00
from ipware import get_client_ip
2019-02-16 09:24:31 +00:00
from passbook.core.celery import CELERY_APP
from passbook.core.models import Policy, User
LOGGER = getLogger(__name__)
@CELERY_APP.task()
def _policy_engine_task(user_pk, policy_pk, **kwargs):
"""Task wrapper to run policy checking"""
policy_obj = Policy.objects.filter(pk=policy_pk).select_subclasses().first()
user_obj = User.objects.get(pk=user_pk)
for key, value in kwargs.items():
setattr(user_obj, key, value)
LOGGER.debug("Running policy `%s`#%s for user %s...", policy_obj.name,
policy_obj.pk.hex, user_obj)
policy_result = policy_obj.passes(user_obj)
# Handle policy result correctly if result, message or just result
message = None
if isinstance(policy_result, (tuple, list)):
policy_result, message = policy_result
# Invert result if policy.negate is set
if policy_obj.negate:
policy_result = not policy_result
2019-03-03 16:21:58 +00:00
LOGGER.debug("Policy %r#%s got %s", policy_obj.name, policy_obj.pk.hex, policy_result)
return policy_obj.action, policy_result, message
2019-02-16 09:24:31 +00:00
class PolicyEngine:
"""Orchestrate policy checking, launch tasks and return result"""
policies = None
_group = None
_request = None
_user = None
2019-02-16 09:24:31 +00:00
def __init__(self, policies):
self.policies = policies
self._request = None
self._user = None
2019-02-16 09:24:31 +00:00
def for_user(self, user):
"""Check policies for user"""
self._user = user
return self
def with_request(self, request):
"""Set request"""
self._request = request
return self
def build(self):
"""Build task group"""
if not self._user:
raise ValueError("User not set.")
2019-02-16 09:24:31 +00:00
signatures = []
kwargs = {
'__password__': getattr(self._user, '__password__', None),
2019-02-16 09:24:31 +00:00
}
2019-03-03 19:34:00 +00:00
if self._request:
kwargs['remote_ip'], _ = get_client_ip(self._request)
if not kwargs['remote_ip']:
2019-03-03 19:54:23 +00:00
kwargs['remote_ip'] = '255.255.255.255'
2019-02-16 09:24:31 +00:00
for policy in self.policies:
signatures.append(_policy_engine_task.s(self._user.pk, policy.pk.hex, **kwargs))
2019-02-16 09:24:31 +00:00
self._group = group(signatures)()
return self
@property
def result(self):
"""Get policy-checking result"""
messages = []
for policy_action, policy_result, policy_message in self._group.get():
passing = (policy_action == Policy.ACTION_ALLOW and policy_result) or \
(policy_action == Policy.ACTION_DENY and not policy_result)
LOGGER.debug('Action=%s, Result=%r => %r', policy_action, policy_result, passing)
if policy_message:
messages.append(policy_message)
if not passing:
return False, messages
return True, messages
2019-03-08 18:49:53 +00:00
@property
def passing(self):
"""Only get true/false if user passes"""
return self.result[0]