2018-11-25 19:39:09 +00:00
|
|
|
"""passbook access helper classes"""
|
2020-10-11 18:26:20 +01:00
|
|
|
from typing import Any, Optional
|
2020-07-01 22:18:10 +01:00
|
|
|
|
2019-02-26 08:10:37 +00:00
|
|
|
from django.contrib import messages
|
2020-07-02 12:48:42 +01:00
|
|
|
from django.contrib.auth.mixins import AccessMixin
|
2020-07-12 21:47:46 +01:00
|
|
|
from django.contrib.auth.views import redirect_to_login
|
2020-07-02 12:48:42 +01:00
|
|
|
from django.http import HttpRequest, HttpResponse
|
2019-02-26 08:10:37 +00:00
|
|
|
from django.utils.translation import gettext as _
|
2020-10-11 18:26:20 +01:00
|
|
|
from django.views.generic.base import View
|
2019-10-01 09:24:10 +01:00
|
|
|
from structlog import get_logger
|
2018-12-09 20:07:38 +00:00
|
|
|
|
2019-10-04 15:09:35 +01:00
|
|
|
from passbook.core.models import Application, Provider, User
|
2020-09-15 08:53:59 +01:00
|
|
|
from passbook.flows.views import SESSION_KEY_APPLICATION_PRE
|
2019-10-07 15:33:48 +01:00
|
|
|
from passbook.policies.engine import PolicyEngine
|
2020-09-15 08:53:59 +01:00
|
|
|
from passbook.policies.http import AccessDeniedResponse
|
2020-05-28 20:45:54 +01:00
|
|
|
from passbook.policies.types import PolicyResult
|
2018-12-09 20:07:38 +00:00
|
|
|
|
2019-10-04 09:08:53 +01:00
|
|
|
LOGGER = get_logger()
|
2018-11-25 19:39:09 +00:00
|
|
|
|
2019-12-31 11:51:16 +00:00
|
|
|
|
2020-07-01 22:18:10 +01:00
|
|
|
class BaseMixin:
|
|
|
|
"""Base Mixin class, used to annotate View Member variables"""
|
|
|
|
|
|
|
|
request: HttpRequest
|
|
|
|
|
|
|
|
|
2020-10-11 18:26:20 +01:00
|
|
|
class PolicyAccessView(AccessMixin, View):
|
2018-11-25 19:39:09 +00:00
|
|
|
"""Mixin class for usage in Authorization views.
|
|
|
|
Provider functions to check application access, etc"""
|
|
|
|
|
2020-10-11 18:26:20 +01:00
|
|
|
provider: Provider
|
|
|
|
application: Application
|
|
|
|
|
|
|
|
def resolve_provider_application(self):
|
|
|
|
"""Resolve self.provider and self.application. *.DoesNotExist Exceptions cause a normal
|
|
|
|
AccessDenied view to be shown. An Http404 exception
|
|
|
|
is not caught, and will return directly"""
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def dispatch(self, request: HttpRequest, *args: Any, **kwargs: Any) -> HttpResponse:
|
|
|
|
try:
|
|
|
|
self.resolve_provider_application()
|
|
|
|
except (Application.DoesNotExist, Provider.DoesNotExist):
|
|
|
|
return self.handle_no_permission_authenticated()
|
|
|
|
# Check if user is unauthenticated, so we pass the application
|
|
|
|
# for the identification stage
|
|
|
|
if not request.user.is_authenticated:
|
|
|
|
return self.handle_no_permission()
|
|
|
|
# Check permissions
|
|
|
|
result = self.user_has_access()
|
|
|
|
if not result.passing:
|
|
|
|
return self.handle_no_permission_authenticated(result)
|
|
|
|
return super().dispatch(request, *args, **kwargs)
|
|
|
|
|
|
|
|
def handle_no_permission(self) -> HttpResponse:
|
2020-09-15 08:53:59 +01:00
|
|
|
"""User has no access and is not authenticated, so we remember the application
|
|
|
|
they try to access and redirect to the login URL. The application is saved to show
|
|
|
|
a hint on the Identification Stage what the user should login for."""
|
2020-10-11 18:26:20 +01:00
|
|
|
if self.application:
|
|
|
|
self.request.session[SESSION_KEY_APPLICATION_PRE] = self.application
|
2020-07-12 21:47:46 +01:00
|
|
|
return redirect_to_login(
|
|
|
|
self.request.get_full_path(),
|
|
|
|
self.get_login_url(),
|
|
|
|
self.get_redirect_field_name(),
|
|
|
|
)
|
|
|
|
|
2020-09-14 20:51:59 +01:00
|
|
|
def handle_no_permission_authenticated(
|
|
|
|
self, result: Optional[PolicyResult] = None
|
|
|
|
) -> HttpResponse:
|
|
|
|
"""Function called when user has no permissions but is authenticated"""
|
2020-09-15 08:53:59 +01:00
|
|
|
response = AccessDeniedResponse(self.request)
|
2020-09-14 20:51:59 +01:00
|
|
|
if result:
|
2020-09-15 08:53:59 +01:00
|
|
|
response.policy_result = result
|
|
|
|
return response
|
2020-07-02 12:48:42 +01:00
|
|
|
|
2020-10-11 18:26:20 +01:00
|
|
|
def user_has_access(self, user: Optional[User] = None) -> PolicyResult:
|
2018-11-25 19:39:09 +00:00
|
|
|
"""Check if user has access to application."""
|
2020-07-01 22:18:10 +01:00
|
|
|
user = user or self.request.user
|
|
|
|
policy_engine = PolicyEngine(
|
2020-10-11 18:26:20 +01:00
|
|
|
self.application, user or self.request.user, self.request
|
2020-07-01 22:18:10 +01:00
|
|
|
)
|
2019-10-15 14:44:59 +01:00
|
|
|
policy_engine.build()
|
2020-07-01 22:18:10 +01:00
|
|
|
result = policy_engine.result
|
|
|
|
LOGGER.debug(
|
2020-09-30 18:34:22 +01:00
|
|
|
"AccessMixin user_has_access",
|
|
|
|
user=user,
|
2020-10-11 18:26:20 +01:00
|
|
|
app=self.application,
|
2020-09-30 18:34:22 +01:00
|
|
|
result=result,
|
2020-07-01 22:18:10 +01:00
|
|
|
)
|
|
|
|
if not result.passing:
|
|
|
|
for message in result.messages:
|
|
|
|
messages.error(self.request, _(message))
|
|
|
|
return result
|