2020-02-20 20:33:45 +00:00
|
|
|
"""passbook saml source processor"""
|
2020-02-21 08:03:59 +00:00
|
|
|
from typing import TYPE_CHECKING, Optional
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
from defusedxml import ElementTree
|
2020-06-07 14:35:08 +00:00
|
|
|
from django.http import HttpRequest, HttpResponse
|
2020-02-20 20:33:45 +00:00
|
|
|
from signxml import XMLVerifier
|
|
|
|
from structlog import get_logger
|
|
|
|
|
|
|
|
from passbook.core.models import User
|
2020-06-07 14:35:08 +00:00
|
|
|
from passbook.flows.planner import (
|
|
|
|
PLAN_CONTEXT_PENDING_USER,
|
|
|
|
PLAN_CONTEXT_SSO,
|
|
|
|
FlowPlanner,
|
|
|
|
)
|
|
|
|
from passbook.flows.views import SESSION_KEY_PLAN
|
|
|
|
from passbook.lib.utils.urls import redirect_with_qs
|
2020-02-20 20:33:45 +00:00
|
|
|
from passbook.providers.saml.utils.encoding import decode_base64_and_inflate
|
|
|
|
from passbook.sources.saml.exceptions import (
|
|
|
|
MissingSAMLResponse,
|
|
|
|
UnsupportedNameIDFormat,
|
|
|
|
)
|
|
|
|
from passbook.sources.saml.models import SAMLSource
|
2020-06-07 14:35:08 +00:00
|
|
|
from passbook.stages.password.stage import PLAN_CONTEXT_AUTHENTICATION_BACKEND
|
|
|
|
from passbook.stages.prompt.stage import PLAN_CONTEXT_PROMPT
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
LOGGER = get_logger()
|
2020-02-21 08:03:59 +00:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from xml.etree.ElementTree import Element # nosec
|
2020-06-07 14:35:08 +00:00
|
|
|
DEFAULT_BACKEND = "django.contrib.auth.backends.ModelBackend"
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
|
|
|
|
class Processor:
|
|
|
|
"""SAML Response Processor"""
|
|
|
|
|
|
|
|
_source: SAMLSource
|
|
|
|
|
2020-02-21 08:03:59 +00:00
|
|
|
_root: "Element"
|
2020-02-20 20:33:45 +00:00
|
|
|
_root_xml: str
|
|
|
|
|
|
|
|
def __init__(self, source: SAMLSource):
|
|
|
|
self._source = source
|
|
|
|
|
|
|
|
def parse(self, request: HttpRequest):
|
|
|
|
"""Check if `request` contains SAML Response data, parse and validate it."""
|
|
|
|
# First off, check if we have any SAML Data at all.
|
|
|
|
raw_response = request.POST.get("SAMLResponse", None)
|
|
|
|
if not raw_response:
|
|
|
|
raise MissingSAMLResponse("Request does not contain 'SAMLResponse'")
|
|
|
|
# relay_state = request.POST.get('RelayState', None)
|
|
|
|
# Check if response is compressed, b64 decode it
|
2020-02-20 20:37:14 +00:00
|
|
|
self._root_xml = decode_base64_and_inflate(raw_response)
|
2020-02-20 20:33:45 +00:00
|
|
|
self._root = ElementTree.fromstring(self._root_xml)
|
|
|
|
# Verify signed XML
|
|
|
|
self._verify_signed()
|
|
|
|
|
|
|
|
def _verify_signed(self):
|
|
|
|
"""Verify SAML Response's Signature"""
|
|
|
|
verifier = XMLVerifier()
|
2020-06-07 14:35:08 +00:00
|
|
|
verifier.verify(
|
|
|
|
self._root_xml, x509_cert=self._source.signing_kp.certificate_data
|
|
|
|
)
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
def _get_email(self) -> Optional[str]:
|
|
|
|
"""
|
|
|
|
Returns the email out of the response.
|
|
|
|
|
|
|
|
At present, response must pass the email address as the Subject, eg.:
|
|
|
|
|
|
|
|
<saml:Subject>
|
|
|
|
<saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"
|
2020-06-23 19:49:27 +00:00
|
|
|
SPNameQualifier="">
|
|
|
|
email@example.com
|
|
|
|
</saml:NameID>
|
2020-02-20 20:33:45 +00:00
|
|
|
"""
|
|
|
|
assertion = self._root.find("{urn:oasis:names:tc:SAML:2.0:assertion}Assertion")
|
|
|
|
subject = assertion.find("{urn:oasis:names:tc:SAML:2.0:assertion}Subject")
|
|
|
|
name_id = subject.find("{urn:oasis:names:tc:SAML:2.0:assertion}NameID")
|
|
|
|
name_id_format = name_id.attrib["Format"]
|
|
|
|
if name_id_format != "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress":
|
|
|
|
raise UnsupportedNameIDFormat(
|
|
|
|
f"Assertion contains NameID with unsupported format {name_id_format}."
|
|
|
|
)
|
|
|
|
return name_id.text
|
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def prepare_flow(self, request: HttpRequest) -> HttpResponse:
|
|
|
|
"""Prepare flow plan depending on whether or not the user exists"""
|
2020-02-20 20:33:45 +00:00
|
|
|
email = self._get_email()
|
2020-06-07 14:35:08 +00:00
|
|
|
matching_users = User.objects.filter(email=email)
|
|
|
|
if matching_users.exists():
|
|
|
|
# User exists already, switch to authentication flow
|
|
|
|
flow = self._source.authentication_flow
|
|
|
|
request.session[SESSION_KEY_PLAN] = FlowPlanner(flow).plan(
|
|
|
|
request,
|
|
|
|
{
|
|
|
|
# Data for authentication
|
|
|
|
PLAN_CONTEXT_PENDING_USER: matching_users.first(),
|
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND: DEFAULT_BACKEND,
|
|
|
|
PLAN_CONTEXT_SSO: True,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
flow = self._source.enrollment_flow
|
|
|
|
request.session[SESSION_KEY_PLAN] = FlowPlanner(flow).plan(
|
|
|
|
request,
|
|
|
|
{
|
|
|
|
# Data for enrollment
|
|
|
|
PLAN_CONTEXT_PROMPT: {"username": email, "email": email},
|
|
|
|
PLAN_CONTEXT_SSO: True,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
return redirect_with_qs(
|
|
|
|
"passbook_flows:flow-executor-shell", request.GET, flow_slug=flow.slug,
|
|
|
|
)
|