2018-12-14 08:49:34 +00:00
|
|
|
"""passbook multi-factor authentication engine"""
|
2019-03-10 20:47:08 +00:00
|
|
|
from inspect import Signature
|
2019-10-08 12:30:17 +00:00
|
|
|
from typing import Optional
|
2018-12-14 08:49:34 +00:00
|
|
|
|
2019-03-10 20:47:08 +00:00
|
|
|
from django.contrib.auth import _clean_credentials
|
|
|
|
from django.contrib.auth.signals import user_login_failed
|
2018-12-18 14:34:15 +00:00
|
|
|
from django.core.exceptions import PermissionDenied
|
|
|
|
from django.forms.utils import ErrorList
|
|
|
|
from django.utils.translation import gettext as _
|
2018-12-14 08:49:34 +00:00
|
|
|
from django.views.generic import FormView
|
2019-10-01 08:24:10 +00:00
|
|
|
from structlog import get_logger
|
2018-12-14 08:49:34 +00:00
|
|
|
|
2019-10-08 12:30:17 +00:00
|
|
|
from passbook.core.models import User
|
|
|
|
from passbook.factors.password.forms import PasswordForm
|
2020-05-07 19:30:52 +00:00
|
|
|
from passbook.flows.factor_base import AuthenticationFactor
|
2020-05-08 14:10:27 +00:00
|
|
|
from passbook.flows.planner import PLAN_CONTEXT_PENDING_USER
|
2018-12-14 08:49:34 +00:00
|
|
|
from passbook.lib.config import CONFIG
|
2019-03-10 20:47:08 +00:00
|
|
|
from passbook.lib.utils.reflection import path_to_class
|
2018-12-14 08:49:34 +00:00
|
|
|
|
2019-10-04 08:08:53 +00:00
|
|
|
LOGGER = get_logger()
|
2020-05-08 14:10:27 +00:00
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND = "user_backend"
|
2018-12-14 08:49:34 +00:00
|
|
|
|
|
|
|
|
2019-10-08 12:30:17 +00:00
|
|
|
def authenticate(request, backends, **credentials) -> Optional[User]:
|
2019-03-10 20:47:08 +00:00
|
|
|
"""If the given credentials are valid, return a User object.
|
2019-10-07 14:33:48 +00:00
|
|
|
|
2019-03-10 20:47:08 +00:00
|
|
|
Customized version of django's authenticate, which accepts a list of backends"""
|
|
|
|
for backend_path in backends:
|
|
|
|
backend = path_to_class(backend_path)()
|
|
|
|
try:
|
|
|
|
signature = Signature.from_callable(backend.authenticate)
|
|
|
|
signature.bind(request, **credentials)
|
|
|
|
except TypeError:
|
2019-10-11 10:47:29 +00:00
|
|
|
LOGGER.warning("Backend doesn't accept our arguments", backend=backend)
|
2019-03-10 20:47:08 +00:00
|
|
|
# This backend doesn't accept these credentials as arguments. Try the next one.
|
|
|
|
continue
|
2019-12-31 11:51:16 +00:00
|
|
|
LOGGER.debug("Attempting authentication...", backend=backend)
|
2019-03-10 20:47:08 +00:00
|
|
|
try:
|
|
|
|
user = backend.authenticate(request, **credentials)
|
|
|
|
except PermissionDenied:
|
2019-12-31 11:51:16 +00:00
|
|
|
LOGGER.debug("Backend threw PermissionDenied", backend=backend)
|
2019-03-10 20:47:08 +00:00
|
|
|
# This backend says to stop in our tracks - this user should not be allowed in at all.
|
|
|
|
break
|
|
|
|
if user is None:
|
|
|
|
continue
|
|
|
|
# Annotate the user object with the path of the backend.
|
|
|
|
user.backend = backend_path
|
|
|
|
return user
|
|
|
|
|
|
|
|
# The credentials supplied are invalid to all backends, fire signal
|
2019-12-31 11:51:16 +00:00
|
|
|
user_login_failed.send(
|
|
|
|
sender=__name__, credentials=_clean_credentials(credentials), request=request
|
|
|
|
)
|
|
|
|
|
2019-03-10 20:47:08 +00:00
|
|
|
|
2019-02-24 21:39:09 +00:00
|
|
|
class PasswordFactor(FormView, AuthenticationFactor):
|
2018-12-14 08:49:34 +00:00
|
|
|
"""Authentication factor which authenticates against django's AuthBackend"""
|
|
|
|
|
2019-10-08 12:30:17 +00:00
|
|
|
form_class = PasswordForm
|
2020-05-08 14:10:27 +00:00
|
|
|
template_name = "factors/password/backend.html"
|
2018-12-14 08:49:34 +00:00
|
|
|
|
|
|
|
def form_valid(self, form):
|
|
|
|
"""Authenticate against django's authentication backend"""
|
2019-12-31 11:51:16 +00:00
|
|
|
uid_fields = CONFIG.y("passbook.uid_fields")
|
2018-12-14 08:49:34 +00:00
|
|
|
kwargs = {
|
2019-12-31 11:51:16 +00:00
|
|
|
"password": form.cleaned_data.get("password"),
|
2018-12-14 08:49:34 +00:00
|
|
|
}
|
|
|
|
for uid_field in uid_fields:
|
2020-05-08 14:10:27 +00:00
|
|
|
kwargs[uid_field] = getattr(
|
|
|
|
self.executor.plan.context[PLAN_CONTEXT_PENDING_USER], uid_field
|
|
|
|
)
|
2018-12-18 14:34:15 +00:00
|
|
|
try:
|
2019-12-31 11:51:16 +00:00
|
|
|
user = authenticate(
|
2020-05-08 14:10:27 +00:00
|
|
|
self.request, self.executor.current_factor.backends, **kwargs
|
2019-12-31 11:51:16 +00:00
|
|
|
)
|
2018-12-18 14:34:15 +00:00
|
|
|
if user:
|
|
|
|
# User instance returned from authenticate() has .backend property set
|
2020-05-08 14:10:27 +00:00
|
|
|
self.executor.plan.context[PLAN_CONTEXT_PENDING_USER] = user
|
|
|
|
self.executor.plan.context[
|
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND
|
2019-12-31 11:51:16 +00:00
|
|
|
] = user.backend
|
2020-05-08 14:10:27 +00:00
|
|
|
return self.executor.factor_ok()
|
2018-12-18 14:34:15 +00:00
|
|
|
# No user was found -> invalid credentials
|
|
|
|
LOGGER.debug("Invalid credentials")
|
|
|
|
# Manually inject error into form
|
|
|
|
# pylint: disable=protected-access
|
|
|
|
errors = form._errors.setdefault("password", ErrorList())
|
|
|
|
errors.append(_("Invalid password"))
|
|
|
|
return self.form_invalid(form)
|
|
|
|
except PermissionDenied:
|
|
|
|
# User was found, but permission was denied (i.e. user is not active)
|
2019-10-04 08:21:33 +00:00
|
|
|
LOGGER.debug("Denied access", **kwargs)
|
2020-05-08 14:10:27 +00:00
|
|
|
return self.executor.factor_invalid()
|