2015-05-16 21:43:46 +00:00
# ⁻*- coding: utf-8 -*-
2015-05-17 21:24:41 +00:00
import default_settings
2015-05-16 21:43:46 +00:00
from django . shortcuts import render , redirect
from django . http import HttpResponse , StreamingHttpResponse
from django . conf import settings
from django . contrib import messages
2015-05-22 17:31:50 +00:00
from django . views . decorators . csrf import csrf_exempt
2015-05-22 15:55:00 +00:00
from django . utils . translation import ugettext as _
2015-05-16 21:43:46 +00:00
import requests
from datetime import datetime , timedelta
2015-05-22 17:31:50 +00:00
from lxml import etree
2015-05-16 21:43:46 +00:00
import utils
import forms
import models
def _logout ( request ) :
try : del request . session [ " authenticated " ]
except KeyError : pass
try : del request . session [ " username " ]
except KeyError : pass
try : del request . session [ " warn " ]
except KeyError : pass
def login ( request ) :
user = None
form = None
service_pattern = None
renewed = False
2015-05-16 21:50:25 +00:00
warned = False
2015-05-16 21:43:46 +00:00
if request . method == ' POST ' :
service = request . POST . get ( ' service ' )
renew = True if request . POST . get ( ' renew ' ) else False
gateway = request . POST . get ( ' gateway ' )
method = request . POST . get ( ' method ' )
if not request . session . get ( " authenticated " ) or renew :
form = forms . UserCredential ( request . POST , initial = { ' service ' : service , ' method ' : method , ' warn ' : request . session . get ( " warn " ) } )
if form . is_valid ( ) :
user = models . User . objects . get ( username = form . cleaned_data [ ' username ' ] )
2015-05-19 16:33:56 +00:00
request . session . set_expiry ( 0 )
2015-05-16 21:43:46 +00:00
request . session [ " username " ] = form . cleaned_data [ ' username ' ]
request . session [ " warn " ] = True if form . cleaned_data . get ( " warn " ) else False
request . session [ " authenticated " ] = True
renewed = True
2015-05-16 21:50:25 +00:00
warned = True
2015-05-16 21:43:46 +00:00
else :
_logout ( request )
else :
service = request . GET . get ( ' service ' )
renew = True if request . GET . get ( ' renew ' ) else False
gateway = request . GET . get ( ' gateway ' )
method = request . GET . get ( ' method ' )
if not request . session . get ( " authenticated " ) or renew :
form = forms . UserCredential ( initial = { ' service ' : service , ' method ' : method , ' warn ' : request . session . get ( " warn " ) } )
# if authenticated and successfully renewed authentication if needed
2015-05-23 17:47:54 +00:00
if request . session . get ( " authenticated " ) and request . session . get ( " username " ) and ( not renew or renewed ) :
2015-05-16 21:43:46 +00:00
try :
user = models . User . objects . get ( username = request . session [ " username " ] )
except models . User . DoesNotExist :
_logout ( request )
2015-05-23 17:47:10 +00:00
return redirect ( " login " )
2015-05-16 21:43:46 +00:00
# if login agains a service is requestest
if service :
try :
# is the service allowed
service_pattern = models . ServicePattern . validate ( service )
# is the current user allowed on this service
service_pattern . check_user ( user )
# if the user has asked to be warned before any login to a service (no transparent SSO)
2015-05-23 17:43:21 +00:00
if request . session . get ( " warn " , True ) and not warned :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . WARNING , _ ( u " Authentication has been required by service %(name)s ( %(url)s ) " ) % { ' name ' : service_pattern . name , ' url ' : service } )
return render ( request , settings . CAS_WARN_TEMPLATE , { ' service_ticket_url ' : user . get_service_url ( service , service_pattern , renew = renew ) } )
2015-05-16 21:43:46 +00:00
else :
return redirect ( user . get_service_url ( service , service_pattern , renew = renew ) ) # redirect, using method ?
except models . ServicePattern . DoesNotExist :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . ERROR , _ ( u ' Service %(url)s non allowed. ' ) % { ' url ' : service } )
2015-05-16 21:43:46 +00:00
except models . BadUsername :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . ERROR , _ ( u " Username non allowed " ) )
2015-05-16 21:43:46 +00:00
except models . BadFilter :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . ERROR , _ ( u " User charateristics non allowed " ) )
2015-05-17 21:24:41 +00:00
except models . UserFieldNotDefined :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . ERROR , _ ( u " The attribut %(field)s is needed to use that service " ) % { ' field ' : service_pattern . user_field } )
2015-05-16 21:43:46 +00:00
# if gateway is set and auth failed redirect to the service without authentication
if gateway :
list ( messages . get_messages ( request ) ) # clean messages before leaving the django app
return redirect ( service )
2015-05-22 15:55:00 +00:00
return render ( request , settings . CAS_LOGGED_TEMPLATE , { ' session ' : request . session } )
2015-05-16 21:43:46 +00:00
else :
if service :
2015-05-18 18:30:00 +00:00
try :
service_pattern = models . ServicePattern . validate ( service )
if gateway :
list ( messages . get_messages ( request ) ) # clean messages before leaving the django app
return redirect ( service )
if request . session . get ( " authenticated " ) and renew :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . WARNING , _ ( u " Authentication renewal required by service %(name)s ( %(url)s ). " ) % { ' name ' : service_pattern . name , ' url ' : service } )
2015-05-18 18:30:00 +00:00
else :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . WARNING , _ ( u " Authentication required by service %(name)s ( %(url)s ). " ) % { ' name ' : service_pattern . name , ' url ' : service } )
2015-05-18 18:30:00 +00:00
except models . ServicePattern . DoesNotExist :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . ERROR , _ ( u ' Service %s non allowed ' ) % service )
2015-05-16 21:43:46 +00:00
return render ( request , settings . CAS_LOGIN_TEMPLATE , { ' form ' : form } )
def logout ( request ) :
service = request . GET . get ( ' service ' )
if request . session . get ( " authenticated " ) :
user = models . User . objects . get ( username = request . session [ " username " ] )
user . logout ( request )
user . delete ( )
_logout ( request )
# if service is set, redirect to service after logout
if service :
list ( messages . get_messages ( request ) ) # clean messages before leaving the django app
return redirect ( service )
# else redirect to login page
else :
2015-05-22 15:55:00 +00:00
messages . add_message ( request , messages . SUCCESS , _ ( u ' Successfully logout ' ) )
2015-05-16 21:43:46 +00:00
return redirect ( " login " )
def validate ( request ) :
service = request . GET . get ( ' service ' )
ticket = request . GET . get ( ' ticket ' )
renew = True if request . GET . get ( ' renew ' ) else False
if service and ticket :
try :
ticket = models . ServiceTicket . objects . get ( value = ticket , service = service , validate = False , renew = renew , creation__gt = ( datetime . now ( ) - timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) )
ticket . validate = True
ticket . save ( )
return HttpResponse ( " yes \n " , content_type = " text/plain " )
except models . ServiceTicket . DoesNotExist :
return HttpResponse ( " no \n " , content_type = " text/plain " )
else :
return HttpResponse ( " no \n " , content_type = " text/plain " )
def psValidate ( request , typ = [ ' ST ' ] ) :
service = request . GET . get ( ' service ' )
ticket = request . GET . get ( ' ticket ' )
pgtUrl = request . GET . get ( ' pgtUrl ' )
renew = True if request . GET . get ( ' renew ' ) else False
if service and ticket :
for t in typ :
if ticket . startswith ( t ) :
break
else :
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_TICKET ' } , content_type = " text/xml; charset=utf-8 " )
try :
proxies = [ ]
if ticket . startswith ( " ST " ) :
ticket = models . ServiceTicket . objects . get ( value = ticket , service = service , validate = False , renew = renew , creation__gt = ( datetime . now ( ) - timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) )
elif ticket . startswith ( " PT " ) :
ticket = models . ProxyTicket . objects . get ( value = ticket , service = service , validate = False , renew = renew , creation__gt = ( datetime . now ( ) - timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) )
for p in ticket . proxies . all ( ) :
proxies . add ( p . url )
ticket . validate = True
ticket . save ( )
attributes = [ ]
for key , value in ticket . attributs . items ( ) :
if isinstance ( value , list ) :
for v in value :
attributes . append ( ( key , v ) )
else :
attributes . append ( ( key , value ) )
params = { ' username ' : ticket . user . username , ' attributes ' : attributes , ' proxies ' : proxies }
2015-05-17 21:24:41 +00:00
if ticket . service_pattern . user_field and ticket . user . attributs . get ( ticket . service_pattern . user_field ) :
params [ ' username ' ] = ticket . user . attributs . get ( ticket . service_pattern . user_field )
2015-05-16 21:43:46 +00:00
if pgtUrl and pgtUrl . startswith ( " https:// " ) :
2015-05-17 21:24:41 +00:00
pattern = models . ServicePattern . validate ( pgtUrl )
2015-05-16 21:43:46 +00:00
if pattern . proxy :
proxyid = models . _gen_ticket ( ' PGTIOU ' )
2015-05-17 21:24:41 +00:00
pticket = models . ProxyGrantingTicket . objects . create ( user = ticket . user , service = pgtUrl , service_pattern = pattern )
2015-05-16 21:43:46 +00:00
url = utils . update_url ( pgtUrl , { ' pgtIou ' : proxyid , ' pgtId ' : pticket . value } )
try :
r = requests . get ( url , verify = settings . CAS_PROXY_CA_CERTIFICATE_PATH )
if r . status_code == 200 :
params [ ' proxyGrantingTicket ' ] = proxyid
else :
pticket . delete ( )
return render ( request , " cas_server/serviceValidate.xml " , params , content_type = " text/xml; charset=utf-8 " )
except requests . exceptions . SSLError :
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_PROXY_CALLBACK ' } , content_type = " text/xml; charset=utf-8 " )
else :
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_PROXY_CALLBACK ' } , content_type = " text/xml; charset=utf-8 " )
else :
return render ( request , " cas_server/serviceValidate.xml " , params , content_type = " text/xml; charset=utf-8 " )
2015-05-17 21:24:41 +00:00
except ( models . ServiceTicket . DoesNotExist , models . ProxyTicket . DoesNotExist , models . ServicePattern . DoesNotExist ) :
2015-05-16 21:43:46 +00:00
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_TICKET ' } , content_type = " text/xml; charset=utf-8 " )
else :
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_REQUEST ' } , content_type = " text/xml; charset=utf-8 " )
def serviceValidate ( request ) :
return psValidate ( request )
def proxyValidate ( request ) :
return psValidate ( request , [ " ST " , " PT " ] )
def proxy ( request ) :
pgt = request . GET . get ( ' pgt ' )
targetService = request . GET . get ( ' targetService ' )
if pgt and targetService :
try :
2015-05-17 21:24:41 +00:00
pattern = models . ServicePattern . validate ( targetService )
2015-05-16 21:43:46 +00:00
ticket = models . ProxyGrantingTicket . objects . get ( value = pgt , creation__gt = ( datetime . now ( ) - timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) )
2015-05-17 21:24:41 +00:00
pattern . check_user ( ticket . user )
2015-05-18 18:30:00 +00:00
pticket = ticket . user . get_ticket ( models . ProxyTicket , targetService , pattern , False )
2015-05-16 21:43:46 +00:00
pticket . proxies . create ( url = ticket . service )
return render ( request , " cas_server/proxy.xml " , { ' ticket ' : pticket . value } , content_type = " text/xml; charset=utf-8 " )
2015-05-17 21:24:41 +00:00
except ( models . ProxyGrantingTicket . DoesNotExist , models . ServicePattern . DoesNotExist , models . BadUsername , models . BadFilter ) :
2015-05-16 21:43:46 +00:00
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_TICKET ' } , content_type = " text/xml; charset=utf-8 " )
else :
return render ( request , " cas_server/serviceValidateError.xml " , { ' code ' : ' INVALID_REQUEST ' } , content_type = " text/xml; charset=utf-8 " )
def p3_serviceValidate ( request ) :
return serviceValidate ( request )
def p3_proxyValidate ( request ) :
return proxyValidate ( request )
2015-05-22 17:31:50 +00:00
@csrf_exempt
def samlValidate ( request ) :
if request . method == ' POST ' :
target = request . GET . get ( ' TARGET ' )
root = etree . fromstring ( request . body )
try :
auth_req = root . getchildren ( ) [ 1 ] . getchildren ( ) [ 0 ]
IssueInstant = auth_req . attrib [ ' IssueInstant ' ]
RequestID = auth_req . attrib [ ' RequestID ' ]
ticket = auth_req . getchildren ( ) [ 0 ] . text
ticket = models . ServiceTicket . objects . get ( value = ticket , service = target , validate = False , creation__gt = ( datetime . now ( ) - timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) )
ticket . validate = True
ticket . save ( )
expireInstant = ( ticket . creation + timedelta ( seconds = settings . CAS_TICKET_VALIDITY ) ) . isoformat ( )
attributes = [ ]
for key , value in ticket . attributs . items ( ) :
if isinstance ( value , list ) :
for v in value :
attributes . append ( ( key , v ) )
else :
attributes . append ( ( key , value ) )
params = { ' IssueInstant ' : IssueInstant , ' expireInstant ' : expireInstant , ' Recipient ' : target , ' ResponseID ' : RequestID , ' username ' : ticket . user . username , ' attributes ' : attributes }
if ticket . service_pattern . user_field and ticket . user . attributs . get ( ticket . service_pattern . user_field ) :
params [ ' username ' ] = ticket . user . attributs . get ( ticket . service_pattern . user_field )
return render ( request , " cas_server/samlValidate.xml " , params , content_type = " text/xml; charset=utf-8 " )
except IndexError :
return render ( request , " cas_server/samlValidateError.xml " , { ' code ' : ' VersionMismatch ' } , content_type = " text/xml; charset=utf-8 " )
except KeyError :
return render ( request , " cas_server/samlValidateError.xml " , { ' code ' : ' VersionMismatch ' } , content_type = " text/xml; charset=utf-8 " )
except models . ServiceTicket . DoesNotExist :
return render ( request , " cas_server/samlValidateError.xml " , { ' code ' : ' AuthnFailed ' } , content_type = " text/xml; charset=utf-8 " )
2015-05-22 17:39:51 +00:00
else :
return redirect ( " login " )