2018-12-13 17:02:08 +00:00
|
|
|
"""passbook multi-factor authentication engine"""
|
2019-10-01 09:17:39 +01:00
|
|
|
from typing import List, Tuple
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2018-12-14 08:49:34 +00:00
|
|
|
from django.contrib.auth import login
|
2018-12-18 14:34:26 +00:00
|
|
|
from django.contrib.auth.mixins import UserPassesTestMixin
|
2018-12-13 17:02:08 +00:00
|
|
|
from django.shortcuts import get_object_or_404, redirect, reverse
|
2019-02-27 11:35:48 +00:00
|
|
|
from django.utils.http import urlencode
|
2018-12-14 08:49:34 +00:00
|
|
|
from django.views.generic import View
|
2019-10-01 09:24:10 +01:00
|
|
|
from structlog import get_logger
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2019-02-16 08:52:37 +00:00
|
|
|
from passbook.core.models import Factor, User
|
2018-12-14 14:18:02 +00:00
|
|
|
from passbook.core.views.utils import PermissionDeniedView
|
2018-12-14 08:49:34 +00:00
|
|
|
from passbook.lib.utils.reflection import class_to_path, path_to_class
|
2019-02-25 12:02:50 +00:00
|
|
|
from passbook.lib.utils.urls import is_url_absolute
|
2019-10-07 15:33:48 +01:00
|
|
|
from passbook.policies.engine import PolicyEngine
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2019-10-04 09:08:53 +01:00
|
|
|
LOGGER = get_logger()
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2019-02-27 11:35:48 +00:00
|
|
|
def _redirect_with_qs(view, get_query_set=None):
|
|
|
|
"""Wrapper to redirect whilst keeping GET Parameters"""
|
|
|
|
target = reverse(view)
|
|
|
|
if get_query_set:
|
|
|
|
target += '?' + urlencode({key: value for key, value in get_query_set.items()})
|
|
|
|
return redirect(target)
|
2018-12-18 14:34:26 +00:00
|
|
|
|
2019-10-07 15:33:48 +01:00
|
|
|
|
|
|
|
# Argument used to redirect user after login
|
|
|
|
NEXT_ARG_NAME = 'next'
|
|
|
|
|
2019-02-16 08:52:37 +00:00
|
|
|
class AuthenticationView(UserPassesTestMixin, View):
|
2018-12-13 17:02:08 +00:00
|
|
|
"""Wizard-like Multi-factor authenticator"""
|
|
|
|
|
|
|
|
SESSION_FACTOR = 'passbook_factor'
|
|
|
|
SESSION_PENDING_FACTORS = 'passbook_pending_factors'
|
|
|
|
SESSION_PENDING_USER = 'passbook_pending_user'
|
2018-12-14 08:49:34 +00:00
|
|
|
SESSION_USER_BACKEND = 'passbook_user_backend'
|
2019-04-29 22:19:37 +01:00
|
|
|
SESSION_IS_SSO_LOGIN = 'passbook_sso_login'
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2019-10-01 09:17:39 +01:00
|
|
|
pending_user: User
|
|
|
|
pending_factors: List[Tuple[str, str]] = []
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2019-10-01 09:17:39 +01:00
|
|
|
_current_factor_class: Factor
|
2019-02-25 11:29:40 +00:00
|
|
|
|
2019-10-01 09:17:39 +01:00
|
|
|
current_factor: Factor
|
2018-12-13 17:02:08 +00:00
|
|
|
|
2018-12-18 14:34:26 +00:00
|
|
|
# Allow only not authenticated users to login
|
|
|
|
def test_func(self):
|
2019-03-10 01:08:09 +00:00
|
|
|
return AuthenticationView.SESSION_PENDING_USER in self.request.session
|
2018-12-18 14:34:26 +00:00
|
|
|
|
|
|
|
def handle_no_permission(self):
|
2019-02-16 08:52:37 +00:00
|
|
|
# Function from UserPassesTestMixin
|
2019-10-07 15:33:48 +01:00
|
|
|
if NEXT_ARG_NAME in self.request.GET:
|
|
|
|
return redirect(self.request.GET.get(NEXT_ARG_NAME))
|
2019-03-10 01:08:09 +00:00
|
|
|
if self.request.user.is_authenticated:
|
|
|
|
return _redirect_with_qs('passbook_core:overview', self.request.GET)
|
|
|
|
return _redirect_with_qs('passbook_core:auth-login', self.request.GET)
|
|
|
|
|
|
|
|
def get_pending_factors(self):
|
|
|
|
"""Loading pending factors from Database or load from session variable"""
|
|
|
|
# Write pending factors to session
|
|
|
|
if AuthenticationView.SESSION_PENDING_FACTORS in self.request.session:
|
|
|
|
return self.request.session[AuthenticationView.SESSION_PENDING_FACTORS]
|
|
|
|
# Get an initial list of factors which are currently enabled
|
|
|
|
# and apply to the current user. We check policies here and block the request
|
|
|
|
_all_factors = Factor.objects.filter(enabled=True).order_by('order').select_subclasses()
|
|
|
|
pending_factors = []
|
|
|
|
for factor in _all_factors:
|
2019-10-04 12:43:47 +01:00
|
|
|
LOGGER.debug("Checking if factor applies to user",
|
|
|
|
factor=factor, user=self.pending_user)
|
2019-10-15 14:44:59 +01:00
|
|
|
policy_engine = PolicyEngine(factor.policies.all(), self.pending_user, self.request)
|
|
|
|
policy_engine.build()
|
2019-03-10 01:08:09 +00:00
|
|
|
if policy_engine.passing:
|
|
|
|
pending_factors.append((factor.uuid.hex, factor.type))
|
2019-10-04 12:43:47 +01:00
|
|
|
LOGGER.debug("Factor applies", factor=factor, user=self.pending_user)
|
2019-03-10 01:08:09 +00:00
|
|
|
return pending_factors
|
2018-12-18 14:34:26 +00:00
|
|
|
|
2018-12-13 17:02:08 +00:00
|
|
|
def dispatch(self, request, *args, **kwargs):
|
2019-03-10 01:08:09 +00:00
|
|
|
# Check if user passes test (i.e. SESSION_PENDING_USER is set)
|
|
|
|
user_test_result = self.get_test_func()()
|
|
|
|
if not user_test_result:
|
|
|
|
return self.handle_no_permission()
|
2018-12-13 17:02:08 +00:00
|
|
|
# Extract pending user from session (only remember uid)
|
2019-03-10 01:08:09 +00:00
|
|
|
self.pending_user = get_object_or_404(
|
|
|
|
User, id=self.request.session[AuthenticationView.SESSION_PENDING_USER])
|
|
|
|
self.pending_factors = self.get_pending_factors()
|
2018-12-14 08:49:34 +00:00
|
|
|
# Read and instantiate factor from session
|
2019-02-25 11:29:40 +00:00
|
|
|
factor_uuid, factor_class = None, None
|
2019-02-16 08:52:37 +00:00
|
|
|
if AuthenticationView.SESSION_FACTOR not in request.session:
|
2019-02-16 10:13:00 +00:00
|
|
|
# Case when no factors apply to user, return error denied
|
|
|
|
if not self.pending_factors:
|
2019-04-29 22:19:37 +01:00
|
|
|
# Case when user logged in from SSO provider and no more factors apply
|
|
|
|
if AuthenticationView.SESSION_IS_SSO_LOGIN in request.session:
|
|
|
|
LOGGER.debug("User authenticated with SSO, logging in...")
|
|
|
|
return self._user_passed()
|
2019-02-16 10:13:00 +00:00
|
|
|
return self.user_invalid()
|
2019-02-25 11:29:40 +00:00
|
|
|
factor_uuid, factor_class = self.pending_factors[0]
|
2018-12-14 08:49:34 +00:00
|
|
|
else:
|
2019-02-25 11:29:40 +00:00
|
|
|
factor_uuid, factor_class = request.session[AuthenticationView.SESSION_FACTOR]
|
|
|
|
# Lookup current factor object
|
|
|
|
self.current_factor = Factor.objects.filter(uuid=factor_uuid).select_subclasses().first()
|
2019-02-16 08:52:37 +00:00
|
|
|
# Instantiate Next Factor and pass request
|
2018-12-14 08:49:34 +00:00
|
|
|
factor = path_to_class(factor_class)
|
2019-02-25 11:29:40 +00:00
|
|
|
self._current_factor_class = factor(self)
|
|
|
|
self._current_factor_class.pending_user = self.pending_user
|
|
|
|
self._current_factor_class.request = request
|
2018-12-13 17:02:08 +00:00
|
|
|
return super().dispatch(request, *args, **kwargs)
|
|
|
|
|
|
|
|
def get(self, request, *args, **kwargs):
|
|
|
|
"""pass get request to current factor"""
|
2019-10-04 09:21:33 +01:00
|
|
|
LOGGER.debug("Passing GET", view_class=class_to_path(self._current_factor_class.__class__))
|
2019-02-25 11:29:40 +00:00
|
|
|
return self._current_factor_class.get(request, *args, **kwargs)
|
2018-12-13 17:02:08 +00:00
|
|
|
|
|
|
|
def post(self, request, *args, **kwargs):
|
|
|
|
"""pass post request to current factor"""
|
2019-10-04 09:21:33 +01:00
|
|
|
LOGGER.debug("Passing POST", view_class=class_to_path(self._current_factor_class.__class__))
|
2019-02-25 11:29:40 +00:00
|
|
|
return self._current_factor_class.post(request, *args, **kwargs)
|
2018-12-13 17:02:08 +00:00
|
|
|
|
|
|
|
def user_ok(self):
|
|
|
|
"""Redirect to next Factor"""
|
2019-10-04 09:21:33 +01:00
|
|
|
LOGGER.debug("Factor passed",
|
|
|
|
factor_class=class_to_path(self._current_factor_class.__class__))
|
2018-12-14 08:49:34 +00:00
|
|
|
# Remove passed factor from pending factors
|
2019-02-25 11:29:40 +00:00
|
|
|
current_factor_tuple = (self.current_factor.uuid.hex,
|
|
|
|
class_to_path(self._current_factor_class.__class__))
|
|
|
|
if current_factor_tuple in self.pending_factors:
|
|
|
|
self.pending_factors.remove(current_factor_tuple)
|
2018-12-13 17:02:08 +00:00
|
|
|
next_factor = None
|
|
|
|
if self.pending_factors:
|
|
|
|
next_factor = self.pending_factors.pop()
|
2019-03-10 01:08:09 +00:00
|
|
|
# Save updated pening_factor list to session
|
2019-02-16 08:52:37 +00:00
|
|
|
self.request.session[AuthenticationView.SESSION_PENDING_FACTORS] = \
|
2018-12-13 17:02:08 +00:00
|
|
|
self.pending_factors
|
2019-02-16 08:52:37 +00:00
|
|
|
self.request.session[AuthenticationView.SESSION_FACTOR] = next_factor
|
2019-10-04 09:21:33 +01:00
|
|
|
LOGGER.debug("Rendering Factor", next_factor=next_factor)
|
2019-02-27 11:35:48 +00:00
|
|
|
return _redirect_with_qs('passbook_core:auth-process', self.request.GET)
|
2018-12-13 17:02:08 +00:00
|
|
|
# User passed all factors
|
2019-10-11 11:47:29 +01:00
|
|
|
LOGGER.debug("User passed all factors, logging in", user=self.pending_user)
|
2018-12-14 08:49:34 +00:00
|
|
|
return self._user_passed()
|
2018-12-13 17:02:08 +00:00
|
|
|
|
|
|
|
def user_invalid(self):
|
2018-12-18 14:34:26 +00:00
|
|
|
"""Show error message, user cannot login.
|
|
|
|
This should only be shown if user authenticated successfully, but is disabled/locked/etc"""
|
2018-12-13 17:02:08 +00:00
|
|
|
LOGGER.debug("User invalid")
|
2019-02-25 15:41:33 +00:00
|
|
|
self.cleanup()
|
2019-02-27 11:35:48 +00:00
|
|
|
return _redirect_with_qs('passbook_core:auth-denied', self.request.GET)
|
2018-12-14 08:49:34 +00:00
|
|
|
|
|
|
|
def _user_passed(self):
|
|
|
|
"""User Successfully passed all factors"""
|
2019-02-16 08:52:37 +00:00
|
|
|
backend = self.request.session[AuthenticationView.SESSION_USER_BACKEND]
|
2018-12-14 08:49:34 +00:00
|
|
|
login(self.request, self.pending_user, backend=backend)
|
2019-10-04 09:21:33 +01:00
|
|
|
LOGGER.debug("Logged in", user=self.pending_user)
|
2018-12-18 14:34:26 +00:00
|
|
|
# Cleanup
|
2019-02-25 15:41:33 +00:00
|
|
|
self.cleanup()
|
2019-10-07 15:33:48 +01:00
|
|
|
next_param = self.request.GET.get(NEXT_ARG_NAME, None)
|
2019-02-27 11:35:48 +00:00
|
|
|
if next_param and not is_url_absolute(next_param):
|
2019-02-25 12:02:50 +00:00
|
|
|
return redirect(next_param)
|
2019-02-27 11:35:48 +00:00
|
|
|
return _redirect_with_qs('passbook_core:overview')
|
2018-12-14 14:18:02 +00:00
|
|
|
|
2019-02-25 15:41:33 +00:00
|
|
|
def cleanup(self):
|
2018-12-18 14:34:26 +00:00
|
|
|
"""Remove temporary data from session"""
|
2019-02-25 11:29:40 +00:00
|
|
|
session_keys = [self.SESSION_FACTOR, self.SESSION_PENDING_FACTORS,
|
|
|
|
self.SESSION_PENDING_USER, self.SESSION_USER_BACKEND, ]
|
2018-12-18 14:34:26 +00:00
|
|
|
for key in session_keys:
|
|
|
|
if key in self.request.session:
|
|
|
|
del self.request.session[key]
|
|
|
|
LOGGER.debug("Cleaned up sessions")
|
|
|
|
|
2019-02-16 09:54:15 +00:00
|
|
|
class FactorPermissionDeniedView(PermissionDeniedView):
|
2018-12-14 14:18:02 +00:00
|
|
|
"""User could not be authenticated"""
|