2020-07-11 11:28:48 +00:00
|
|
|
"""SAML AuthNRequest Parser and dataclass"""
|
2020-07-12 14:17:53 +00:00
|
|
|
from base64 import b64decode
|
2020-07-11 11:28:48 +00:00
|
|
|
from dataclasses import dataclass
|
2020-07-11 17:57:27 +00:00
|
|
|
from typing import Optional
|
2020-07-12 14:17:53 +00:00
|
|
|
from urllib.parse import quote_plus
|
2020-07-11 11:28:48 +00:00
|
|
|
|
2020-11-11 23:12:59 +00:00
|
|
|
import xmlsec
|
2020-07-11 11:28:48 +00:00
|
|
|
from defusedxml import ElementTree
|
2020-11-11 23:12:59 +00:00
|
|
|
from lxml import etree # nosec
|
2020-07-11 11:28:48 +00:00
|
|
|
from structlog import get_logger
|
|
|
|
|
|
|
|
from passbook.providers.saml.exceptions import CannotHandleAssertion
|
|
|
|
from passbook.providers.saml.models import SAMLProvider
|
|
|
|
from passbook.providers.saml.utils.encoding import decode_base64_and_inflate
|
2020-07-12 15:05:48 +00:00
|
|
|
from passbook.sources.saml.processors.constants import (
|
2020-11-11 23:12:59 +00:00
|
|
|
DSA_SHA1,
|
2020-11-12 21:31:50 +00:00
|
|
|
NS_MAP,
|
2020-07-12 15:05:48 +00:00
|
|
|
NS_SAML_PROTOCOL,
|
2020-11-11 23:12:59 +00:00
|
|
|
RSA_SHA1,
|
|
|
|
RSA_SHA256,
|
|
|
|
RSA_SHA384,
|
|
|
|
RSA_SHA512,
|
2020-07-12 15:05:48 +00:00
|
|
|
SAML_NAME_ID_FORMAT_EMAIL,
|
|
|
|
)
|
2020-07-11 11:28:48 +00:00
|
|
|
|
|
|
|
LOGGER = get_logger()
|
2020-11-11 23:12:59 +00:00
|
|
|
ERROR_SIGNATURE_REQUIRED_BUT_ABSENT = (
|
|
|
|
"Verification Certificate configured, but request is not signed."
|
|
|
|
)
|
|
|
|
ERROR_SIGNATURE_EXISTS_BUT_NO_VERIFIER = (
|
|
|
|
"Provider does not have a Validation Certificate configured."
|
|
|
|
)
|
|
|
|
ERROR_FAILED_TO_VERIFY = "Failed to verify signature"
|
2020-07-11 11:28:48 +00:00
|
|
|
|
|
|
|
|
|
|
|
@dataclass
|
|
|
|
class AuthNRequest:
|
|
|
|
"""AuthNRequest Dataclass"""
|
|
|
|
|
|
|
|
# pylint: disable=invalid-name
|
|
|
|
id: Optional[str] = None
|
|
|
|
|
2020-07-12 14:17:53 +00:00
|
|
|
relay_state: Optional[str] = None
|
2020-07-11 11:28:48 +00:00
|
|
|
|
2020-07-12 15:05:48 +00:00
|
|
|
name_id_policy: str = SAML_NAME_ID_FORMAT_EMAIL
|
|
|
|
|
2020-07-11 11:28:48 +00:00
|
|
|
|
|
|
|
class AuthNRequestParser:
|
|
|
|
"""AuthNRequest Parser"""
|
|
|
|
|
|
|
|
provider: SAMLProvider
|
|
|
|
|
|
|
|
def __init__(self, provider: SAMLProvider):
|
|
|
|
self.provider = provider
|
|
|
|
|
2020-07-12 14:17:53 +00:00
|
|
|
def _parse_xml(self, decoded_xml: str, relay_state: Optional[str]) -> AuthNRequest:
|
2020-07-11 11:28:48 +00:00
|
|
|
root = ElementTree.fromstring(decoded_xml)
|
|
|
|
|
|
|
|
request_acs_url = root.attrib["AssertionConsumerServiceURL"]
|
|
|
|
|
2020-10-01 08:04:13 +00:00
|
|
|
if self.provider.acs_url.lower() != request_acs_url.lower():
|
2020-07-11 11:28:48 +00:00
|
|
|
msg = (
|
|
|
|
f"ACS URL of {request_acs_url} doesn't match Provider "
|
|
|
|
f"ACS URL of {self.provider.acs_url}."
|
|
|
|
)
|
|
|
|
LOGGER.info(msg)
|
|
|
|
raise CannotHandleAssertion(msg)
|
|
|
|
|
|
|
|
auth_n_request = AuthNRequest(id=root.attrib["ID"], relay_state=relay_state)
|
2020-07-12 15:05:48 +00:00
|
|
|
|
|
|
|
# Check if AuthnRequest has a NameID Policy object
|
|
|
|
name_id_policies = root.findall(f"{{{NS_SAML_PROTOCOL}}}:NameIDPolicy")
|
|
|
|
if len(name_id_policies) > 0:
|
|
|
|
name_id_policy = name_id_policies[0]
|
|
|
|
auth_n_request.name_id_policy = name_id_policy.attrib["Format"]
|
|
|
|
|
2020-07-11 11:28:48 +00:00
|
|
|
return auth_n_request
|
|
|
|
|
2020-07-12 14:17:53 +00:00
|
|
|
def parse(self, saml_request: str, relay_state: Optional[str]) -> AuthNRequest:
|
|
|
|
"""Validate and parse raw request with enveloped signautre."""
|
2020-11-12 21:31:50 +00:00
|
|
|
decoded_xml = b64decode(saml_request.encode()).decode()
|
2020-07-12 14:17:53 +00:00
|
|
|
|
2020-11-11 23:12:59 +00:00
|
|
|
verifier = self.provider.verification_kp
|
|
|
|
|
|
|
|
root = etree.fromstring(decoded_xml) # nosec
|
|
|
|
xmlsec.tree.add_ids(root, ["ID"])
|
2020-11-12 21:31:50 +00:00
|
|
|
signature_nodes = root.xpath(
|
|
|
|
"/samlp:AuthnRequest/ds:Signature", namespaces=NS_MAP
|
|
|
|
)
|
|
|
|
if len(signature_nodes) != 1:
|
|
|
|
raise CannotHandleAssertion(ERROR_SIGNATURE_REQUIRED_BUT_ABSENT)
|
|
|
|
|
|
|
|
signature_node = signature_nodes[0]
|
2020-11-11 23:12:59 +00:00
|
|
|
|
2020-11-12 21:31:50 +00:00
|
|
|
if verifier and signature_node is None:
|
2020-11-11 23:12:59 +00:00
|
|
|
raise CannotHandleAssertion(ERROR_SIGNATURE_REQUIRED_BUT_ABSENT)
|
|
|
|
|
2020-11-12 21:31:50 +00:00
|
|
|
if signature_node is not None:
|
2020-11-11 23:12:59 +00:00
|
|
|
if not verifier:
|
|
|
|
raise CannotHandleAssertion(ERROR_SIGNATURE_EXISTS_BUT_NO_VERIFIER)
|
|
|
|
|
2020-07-12 14:17:53 +00:00
|
|
|
try:
|
2020-11-11 23:12:59 +00:00
|
|
|
ctx = xmlsec.SignatureContext()
|
|
|
|
key = xmlsec.Key.from_memory(
|
|
|
|
verifier.certificate_data,
|
|
|
|
xmlsec.constants.KeyDataFormatCertPem,
|
|
|
|
None,
|
2020-07-12 14:17:53 +00:00
|
|
|
)
|
2020-11-11 23:12:59 +00:00
|
|
|
ctx.key = key
|
|
|
|
ctx.verify(signature_node)
|
|
|
|
except xmlsec.VerificationError as exc:
|
|
|
|
raise CannotHandleAssertion(ERROR_FAILED_TO_VERIFY) from exc
|
2020-07-12 14:17:53 +00:00
|
|
|
|
|
|
|
return self._parse_xml(decoded_xml, relay_state)
|
|
|
|
|
|
|
|
def parse_detached(
|
|
|
|
self,
|
|
|
|
saml_request: str,
|
|
|
|
relay_state: Optional[str],
|
|
|
|
signature: Optional[str] = None,
|
|
|
|
sig_alg: Optional[str] = None,
|
|
|
|
) -> AuthNRequest:
|
|
|
|
"""Validate and parse raw request with detached signature"""
|
|
|
|
decoded_xml = decode_base64_and_inflate(saml_request)
|
|
|
|
|
2020-11-11 23:12:59 +00:00
|
|
|
verifier = self.provider.verification_kp
|
|
|
|
|
|
|
|
if verifier and not (signature and sig_alg):
|
|
|
|
raise CannotHandleAssertion(ERROR_SIGNATURE_REQUIRED_BUT_ABSENT)
|
|
|
|
|
2020-07-12 14:17:53 +00:00
|
|
|
if signature and sig_alg:
|
2020-11-11 23:12:59 +00:00
|
|
|
if not verifier:
|
|
|
|
raise CannotHandleAssertion(ERROR_SIGNATURE_EXISTS_BUT_NO_VERIFIER)
|
2020-07-12 14:17:53 +00:00
|
|
|
|
|
|
|
querystring = f"SAMLRequest={quote_plus(saml_request)}&"
|
|
|
|
if relay_state is not None:
|
|
|
|
querystring += f"RelayState={quote_plus(relay_state)}&"
|
2020-11-11 23:12:59 +00:00
|
|
|
querystring += f"SigAlg={quote_plus(sig_alg)}"
|
|
|
|
|
|
|
|
dsig_ctx = xmlsec.SignatureContext()
|
|
|
|
key = xmlsec.Key.from_memory(
|
|
|
|
verifier.certificate_data, xmlsec.constants.KeyDataFormatCertPem, None
|
|
|
|
)
|
|
|
|
dsig_ctx.key = key
|
|
|
|
|
|
|
|
sign_algorithm_transform_map = {
|
|
|
|
DSA_SHA1: xmlsec.constants.TransformDsaSha1,
|
|
|
|
RSA_SHA1: xmlsec.constants.TransformRsaSha1,
|
|
|
|
RSA_SHA256: xmlsec.constants.TransformRsaSha256,
|
|
|
|
RSA_SHA384: xmlsec.constants.TransformRsaSha384,
|
|
|
|
RSA_SHA512: xmlsec.constants.TransformRsaSha512,
|
|
|
|
}
|
|
|
|
sign_algorithm_transform = sign_algorithm_transform_map.get(
|
|
|
|
sig_alg, xmlsec.constants.TransformRsaSha1
|
|
|
|
)
|
2020-07-12 14:17:53 +00:00
|
|
|
|
|
|
|
try:
|
2020-11-11 23:12:59 +00:00
|
|
|
dsig_ctx.verify_binary(
|
|
|
|
querystring.encode("utf-8"),
|
|
|
|
sign_algorithm_transform,
|
2020-07-12 14:17:53 +00:00
|
|
|
b64decode(signature),
|
|
|
|
)
|
2020-11-11 23:12:59 +00:00
|
|
|
except xmlsec.VerificationError as exc:
|
|
|
|
raise CannotHandleAssertion(ERROR_FAILED_TO_VERIFY) from exc
|
2020-07-12 14:17:53 +00:00
|
|
|
return self._parse_xml(decoded_xml, relay_state)
|
|
|
|
|
2020-07-11 11:28:48 +00:00
|
|
|
def idp_initiated(self) -> AuthNRequest:
|
|
|
|
"""Create IdP Initiated AuthNRequest"""
|
|
|
|
return AuthNRequest()
|