Statistics
| Branch: | Tag: | Revision:

root / snf-astakos-app / astakos / im / auth_providers.py @ 26498848

History | View | Annotate | Download (21.6 kB)

1
# Copyright 2011 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
import copy
35
import json
36

    
37
from synnefo.lib.ordereddict import OrderedDict
38

    
39
from django.core.urlresolvers import reverse
40
from django.utils.translation import ugettext as _
41
from django.contrib.auth.models import Group
42
from django import template
43

    
44
from django.conf import settings
45

    
46
from astakos.im import settings as astakos_settings
47
from astakos.im import messages as astakos_messages
48

    
49
import logging
50

    
51
logger = logging.getLogger(__name__)
52

    
53
# providers registry
54
PROVIDERS = {}
55
REQUIRED_PROVIDERS = {}
56

    
57

    
58
class AuthProviderBase(type):
59

    
60
    def __new__(cls, name, bases, dct):
61
        include = False
62
        if [b for b in bases if isinstance(b, AuthProviderBase)]:
63
            type_id = dct.get('module')
64
            if type_id:
65
                include = True
66
            if type_id in astakos_settings.IM_MODULES:
67
                if astakos_settings.IM_MODULES.index(type_id) == 0:
68
                    dct['is_primary'] = True
69
                dct['module_enabled'] = True
70

    
71
        newcls = super(AuthProviderBase, cls).__new__(cls, name, bases, dct)
72
        if include:
73
            PROVIDERS[type_id] = newcls
74
            if newcls().get_required_policy:
75
                REQUIRED_PROVIDERS[type_id] = newcls
76
        return newcls
77

    
78

    
79
class AuthProvider(object):
80

    
81
    __metaclass__ = AuthProviderBase
82

    
83
    module = None
84
    module_enabled = False
85
    is_primary = False
86

    
87
    message_tpls = OrderedDict((
88
        ('title', '{module_title}'),
89
        ('login_title', '{title} LOGIN'),
90
        ('method_prompt', '{title} login'),
91
        ('account_prompt', '{title} account'),
92
        ('signup_title', '{title}'),
93
        ('profile_title', '{title}'),
94
        ('method_details', '{account_prompt}: {identifier}'),
95
        ('primary_login_prompt', 'Login using '),
96
        ('required', '{title} is required. You can assign it '
97
                     'from your profile page'),
98
        ('login_prompt', ''),
99
        ('add_prompt', 'Allows you to login using {title}'),
100
        ('login_extra', ''),
101
        ('username', '{username}'),
102
        ('disabled_for_create', '{title} is not available for signup.'),
103
        ('switch_success', 'Account changed successfully.'),
104
        ('cannot_login', '{title} is not available for login. '
105
                         'Please use one of your other available methods '
106
                         'to login ({available_methods_links}'),
107

    
108
        # icons should end with _icon
109
        ('module_medium_icon', 'im/auth/icons-medium/{module}.png'),
110
        ('module_icon', 'im/auth/icons/{module}.png'))
111
    )
112

    
113
    messages = {}
114
    module_urls = {}
115

    
116
    remote_authenticate = True
117
    remote_logout_url = None
118

    
119
    # templates
120
    primary_login_template = 'im/auth/generic_primary_login.html'
121
    login_template = 'im/auth/generic_login.html'
122
    signup_template = 'im/signup.html'
123
    login_prompt_template = 'im/auth/generic_login_prompt.html'
124
    signup_prompt_template = 'im/auth/signup_prompt.html'
125

    
126
    default_policies = {
127
        'login': True,
128
        'create': True,
129
        'add': True,
130
        'remove': True,
131
        'limit': 1,
132
        'switch': True,
133
        'add_groups': [],
134
        'creation_groups': [],
135
        'required': False,
136
        'automoderate': not astakos_settings.MODERATION_ENABLED
137
    }
138

    
139
    policies = {}
140

    
141
    def __init__(self, user=None, identifier=None, **provider_params):
142
        """
143
        3 ways to initialize (no args, user, user and identifier).
144

145
        no args: Used for anonymous unauthenticated users.
146
        >>> p = auth_providers.get_provider('local')
147
        >>> # check that global settings allows us to create a new account
148
        >>> # using `local` provider.
149
        >>> print p.is_available_for_create()
150

151
        user and identifier: Used to provide details about a user's specific
152
        login method.
153
        >>> p = auth_providers.get_provider('google', user,
154
        >>>                                 identifier='1421421')
155
        >>> # provider (google) details prompt
156
        >>> print p.get_method_details()
157
        "Google account: 1421421"
158
        """
159

    
160
        # handle AnonymousUser instance
161
        self.user = None
162
        if user and hasattr(user, 'pk') and user.pk:
163
            self.user = user
164

    
165
        self.identifier = identifier
166
        self._instance = None
167
        if 'instance' in provider_params:
168
            self._instance = provider_params['instance']
169
            del provider_params['instance']
170

    
171
        # initialize policies
172
        self.module_policies = copy.copy(self.default_policies)
173
        self.module_policies['automoderate'] = not \
174
            astakos_settings.MODERATION_ENABLED
175
        for policy, value in self.policies.iteritems():
176
            setting_key = "%s_POLICY" % policy.upper()
177
            if self.has_setting(setting_key):
178
                self.module_policies[policy] = self.get_setting(setting_key)
179
            else:
180
                self.module_policies[policy] = value
181

    
182
        # messages cache
183
        self.message_tpls_compiled = OrderedDict()
184

    
185
        # module specific messages
186
        self.message_tpls = OrderedDict(self.message_tpls)
187
        for key, value in self.messages.iteritems():
188
            self.message_tpls[key] = value
189

    
190
        self._provider_details = provider_params
191

    
192
        self.resolve_available_methods = True
193

    
194
    def get_provider_model(self):
195
        from astakos.im.models import AstakosUserAuthProvider as AuthProvider
196
        return AuthProvider
197

    
198
    def remove_from_user(self):
199
        if not self.get_remove_policy:
200
            raise Exception("Provider cannot be removed")
201

    
202
        for group_name in self.get_add_groups_policy:
203
            group = Group.objects.get(name=group_name)
204
            self.user.groups.remove(group)
205
            self.log('removed from group due to add_groups_policy %s',
206
                     group.name)
207

    
208
        self._instance.delete()
209
        self.log('removed')
210

    
211
    def add_to_user(self, **params):
212
        if self._instance:
213
            raise Exception("Cannot add an existing provider")
214

    
215
        create = False
216
        if self.get_user_providers().count() == 0:
217
            create = True
218

    
219
        if create and not self.get_create_policy:
220
            raise Exception("Provider not available for create")
221

    
222
        if not self.get_add_policy:
223
            raise Exception("Provider cannot be added")
224

    
225
        if create:
226
            for group_name in self.get_creation_groups_policy:
227
                group, created = Group.objects.get_or_create(name=group_name)
228
                self.user.groups.add(group)
229
                self.log("added to %s group due to creation_groups_policy",
230
                         group_name)
231

    
232
        for group_name in self.get_add_groups_policy:
233
            group, created = Group.objects.get_or_create(name=group_name)
234
            self.user.groups.add(group)
235
            self.log("added to %s group due to add_groups_policy",
236
                     group_name)
237

    
238
        if self.identifier:
239
            pending = self.get_provider_model().objects.unverified(
240
                self.module, identifier=self.identifier)
241

    
242
            if pending:
243
                pending._instance.delete()
244

    
245
        create_params = {
246
            'module': self.module,
247
            'info_data': json.dumps(self.provider_details.get('info', {})),
248
            'active': True,
249
            'identifier': self.identifier
250
        }
251
        if 'info' in self.provider_details:
252
            del self.provider_details['info']
253

    
254
        create_params.update(self.provider_details)
255
        create_params.update(params)
256
        create = self.user.auth_providers.create(**create_params)
257
        self.log("created %r" % create_params)
258
        return create
259

    
260
    def __repr__(self):
261
        r = "'%s' module" % self.__class__.__name__
262
        if self.user:
263
            r += ' (user: %s)' % self.user
264
        if self.identifier:
265
            r += '(identifier: %s)' % self.identifier
266
        return r
267

    
268
    def _message_params(self, **extra_params):
269
        """
270
        Retrieve message formating parameters.
271
        """
272
        params = {'module': self.module, 'module_title': self.module.title()}
273
        if self.identifier:
274
            params['identifier'] = self.identifier
275

    
276
        if self.user:
277
            for key, val in self.user.__dict__.iteritems():
278
                params["user_%s" % key.lower()] = val
279

    
280
        if self.provider_details:
281
            for key, val in self.provider_details.iteritems():
282
                params["provider_%s" % key.lower()] = val
283

    
284
            if 'info' in self.provider_details:
285
                if isinstance(self.provider_details['info'], basestring):
286
                    self.provider_details['info'] = \
287
                        json.loads(self.provider_details['info'])
288
                for key, val in self.provider_details['info'].iteritems():
289
                   params['provider_info_%s' % key.lower()] = val
290

    
291
        # resolve username, handle unexisting defined username key
292
        if self.user and self.username_key in params:
293
            params['username'] = params[self.username_key]
294
        else:
295
            params['username'] = self.identifier
296

    
297
        if not self.message_tpls_compiled:
298
            for key, message_tpl in self.message_tpls.iteritems():
299
                msg = self.messages.get(key, self.message_tpls.get(key))
300
                override_in_settings = self.get_setting(key)
301
                if override_in_settings is not None:
302
                    msg = override_in_settings
303
                try:
304
                    self.message_tpls_compiled[key] = msg.format(**params)
305
                    params.update(self.message_tpls_compiled)
306
                except KeyError, e:
307
                    continue
308
        else:
309
            params.update(self.message_tpls_compiled)
310

    
311
        for key, value in self.urls.iteritems():
312
            params['%s_url' % key] = value
313

    
314
        if self.user and self.resolve_available_methods:
315
            available_providers = self.user.get_enabled_auth_providers()
316
            for p in available_providers:
317
                p.resolve_available_methods = False
318
                if p.module == self.module and p.identifier == self.identifier:
319
                    available_providers.remove(p)
320

    
321
            get_msg = lambda p: p.get_method_prompt_msg
322
            params['available_methods'] = \
323
                ','.join(map(get_msg, available_providers))
324

    
325
            get_msg = lambda p: "<a href='%s'>%s</a>" % \
326
                (p.get_login_url, p.get_method_prompt_msg)
327

    
328
            params['available_methods_links'] = \
329
                ','.join(map(get_msg, available_providers))
330

    
331
        params.update(extra_params)
332
        return params
333

    
334
    def get_template(self, tpl):
335
        tpls = ['im/auth/%s_%s.html' % (self.module, tpl),
336
                getattr(self, '%s_template' % tpl)]
337
        found = None
338
        for tpl in tpls:
339
            try:
340
                found = template.loader.get_template(tpl)
341
                return tpl
342
            except template.TemplateDoesNotExist:
343
                continue
344
        if not found:
345
            raise template.TemplateDoesNotExist
346
        return tpl
347

    
348
    def get_username(self):
349
        return self.get_username_msg
350

    
351
    def get_user_providers(self):
352
        return self.user.auth_providers.active().filter(
353
            module__in=astakos_settings.IM_MODULES)
354

    
355
    def get_user_module_providers(self):
356
        return self.user.auth_providers.active().filter(module=self.module)
357

    
358
    def get_existing_providers(self):
359
        return ""
360

    
361
    def verified_exists(self):
362
        return self.get_provider_model().objects.verified(
363
            self.module, identifier=self.identifier)
364

    
365
    def resolve_policy(self, policy, default=None):
366

    
367
        if policy == 'switch' and default and not self.get_add_policy:
368
            return not self.get_policy('remove')
369

    
370
        if not self.user:
371
            return default
372

    
373
        if policy == 'remove' and default is True:
374
            return self.get_user_providers().count() > 1
375

    
376
        if policy == 'add' and default is True:
377
            limit = self.get_policy('limit')
378
            if limit <= self.get_user_module_providers().count():
379
                return False
380

    
381
            if self.identifier:
382
                if self.verified_exists():
383
                    return False
384

    
385
        return default
386

    
387
    def get_user_policies(self):
388
        from astakos.im.models import AuthProviderPolicyProfile
389
        return AuthProviderPolicyProfile.objects.for_user(self.user,
390
                                                          self.module)
391

    
392
    def get_policy(self, policy):
393
        module_default = self.module_policies.get(policy)
394
        settings_key = '%s_POLICY' % policy.upper()
395
        settings_default = self.get_setting(settings_key, module_default)
396

    
397
        if self.user:
398
            user_policies = self.get_user_policies()
399
            settings_default = user_policies.get(policy, settings_default)
400

    
401
        return self.resolve_policy(policy, settings_default)
402

    
403
    def get_message(self, msg, **extra_params):
404
        """
405
        Retrieve an auth provider message
406
        """
407
        if msg.endswith('_msg'):
408
            msg = msg.replace('_msg', '')
409
        params = self._message_params(**extra_params)
410

    
411
        # is message ???
412
        tpl = self.message_tpls_compiled.get(msg.lower(), None)
413
        if not tpl:
414
            msg_key = 'AUTH_PROVIDER_%s' % msg.upper()
415
            try:
416
                tpl = getattr(astakos_messages, msg_key)
417
            except AttributeError, e:
418
                try:
419
                    msg_key = msg.upper()
420
                    tpl = getattr(astakos_messages, msg_key)
421
                except AttributeError, e:
422
                    tpl = ''
423

    
424
        in_settings = self.get_setting(msg)
425
        if in_settings:
426
            tpl = in_settings
427

    
428
        return tpl.format(**params)
429

    
430
    @property
431
    def urls(self):
432
        urls = {
433
            'login': reverse(self.login_view),
434
            'add': reverse(self.login_view),
435
            'profile': reverse('edit_profile'),
436
        }
437
        if self.user:
438
            urls.update({
439
                'resend_activation': self.user.get_resend_activation_url(),
440
            })
441
        if self.identifier and self._instance:
442
            urls.update({
443
                'switch': reverse(self.login_view) + '?switch_from=%d' % \
444
                    self._instance.pk,
445
                'remove': reverse('remove_auth_provider',
446
                                  kwargs={'pk': self._instance.pk})
447
            })
448
        urls.update(self.module_urls)
449
        return urls
450

    
451
    def get_setting_key(self, name):
452
        return 'ASTAKOS_AUTH_PROVIDER_%s_%s' % (self.module.upper(),
453
                                                name.upper())
454

    
455
    def get_global_setting_key(self, name):
456
        return 'ASTAKOS_AUTH_PROVIDERS_%s' % name.upper()
457

    
458
    def has_global_setting(self, name):
459
        return hasattr(settings, self.get_global_setting_key(name))
460

    
461
    def has_setting(self, name):
462
        return hasattr(settings, self.get_setting_key(name))
463

    
464
    def get_setting(self, name, default=None):
465
        attr = self.get_setting_key(name)
466
        if not self.has_setting(name):
467
            return self.get_global_setting(name, default)
468
        return getattr(settings, attr, default)
469

    
470
    def get_global_setting(self, name, default=None):
471
        attr = self.get_global_setting_key(name)
472
        if not self.has_global_setting(name):
473
            return default
474
        return getattr(settings, attr, default)
475

    
476
    @property
477
    def provider_details(self):
478
        if self._provider_details:
479
            return self._provider_details
480

    
481
        self._provider_details = {}
482

    
483
        if self._instance:
484
            self._provider_details = self._instance.__dict__
485

    
486
        if self.user and self.identifier:
487
            if self.identifier:
488
                try:
489
                    self._provider_details = \
490
                        self.user.get_auth_providers().get(
491
                            module=self.module,
492
                            identifier=self.identifier).__dict__
493
                except Exception:
494
                    return {}
495
        return self._provider_details
496

    
497
    def __getattr__(self, key):
498
        if not key.startswith('get_'):
499
            return super(AuthProvider, self).__getattribute__(key)
500

    
501
        key = key.replace('get_', '')
502
        if key.endswith('_msg'):
503
            return self.get_message(key)
504

    
505
        if key.endswith('_policy'):
506
            return self.get_policy(key.replace('_policy', ''))
507

    
508
        if key.endswith('_url'):
509
            key = key.replace('_url', '')
510
            return self.urls.get(key)
511

    
512
        if key.endswith('_icon'):
513
            key = key.replace('_msg', '_icon')
514
            return settings.MEDIA_URL + self.get_message(key)
515

    
516
        if key.endswith('_setting'):
517
            key = key.replace('_setting', '')
518
            return self.get_message(key)
519

    
520
        if key.endswith('_template'):
521
            key = key.replace('_template', '')
522
            return self.get_template(key)
523

    
524
        return super(AuthProvider, self).__getattribute__(key)
525

    
526
    def is_active(self):
527
        return self.module_enabled
528

    
529
    @property
530
    def log_display(self):
531
        dsp = "%sAuth" % self.module.title()
532
        if self.user:
533
            dsp += "[%s]" % self.user.log_display
534
            if self.identifier:
535
                dsp += '[%s]' % self.identifier
536
                if self._instance and self._instance.pk:
537
                    dsp += '[%d]' % self._instance.pk
538
        return dsp
539

    
540
    def log(self, msg, *args, **kwargs):
541
        level = kwargs.pop('level', logging.INFO)
542
        message = '%s: %s' % (self.log_display, msg)
543
        logger.log(level, message, *args, **kwargs)
544

    
545

    
546
class LocalAuthProvider(AuthProvider):
547
    module = 'local'
548

    
549
    login_view = 'password_change'
550
    remote_authenticate = False
551
    username_key = 'user_email'
552

    
553
    messages = {
554
        'title': _('Classic'),
555
        'login_prompt': _('Classic login (username/password)'),
556
        'login_success': _('Logged in successfully.'),
557
        'method_details': 'Username: {username}',
558
        'logout_success_extra': ' '
559
    }
560

    
561
    policies = {
562
        'limit': 1,
563
        'switch': False
564
    }
565

    
566
    @property
567
    def urls(self):
568
        urls = super(LocalAuthProvider, self).urls
569
        urls['change_password'] = reverse('password_change')
570
        if self.user:
571
            urls['add'] = reverse('password_change')
572
        if self._instance:
573
            urls.update({
574
                'remove': reverse('remove_auth_provider',
575
                                  kwargs={'pk': self._instance.pk})
576
            })
577
            if 'switch' in urls:
578
                del urls['switch']
579
        return urls
580

    
581
    def remove_from_user(self):
582
        super(LocalAuthProvider, self).remove_from_user()
583
        self.user.set_unusable_password()
584
        self.user.save()
585

    
586

    
587
class ShibbolethAuthProvider(AuthProvider):
588
    module = 'shibboleth'
589
    login_view = 'astakos.im.views.target.shibboleth.login'
590
    username_key = 'identifier'
591

    
592
    policies = {
593
        'switch': False
594
    }
595

    
596
    messages = {
597
        'title': _('Academic'),
598
        'login_description': _('If you are a student, professor or researcher'
599
                               ' you can login using your academic account.'),
600
        'method_details': 'Account: {username}',
601
        'logout_extra': _('Please close all browser windows to complete '
602
                          'logout from your Academic account, too.')
603
    }
604

    
605

    
606
class TwitterAuthProvider(AuthProvider):
607
    module = 'twitter'
608
    login_view = 'astakos.im.views.target.twitter.login'
609
    username_key = 'provider_info_screen_name'
610

    
611
    messages = {
612
        'title': _('Twitter'),
613
        'method_details': 'Screen name: {username}',
614
    }
615

    
616

    
617
class GoogleAuthProvider(AuthProvider):
618
    module = 'google'
619
    login_view = 'astakos.im.views.target.google.login'
620
    username_key = 'provider_info_email'
621

    
622
    messages = {
623
        'title': _('Google'),
624
        'method_details': 'Email: {username}',
625
    }
626

    
627

    
628
class LinkedInAuthProvider(AuthProvider):
629
    module = 'linkedin'
630
    login_view = 'astakos.im.views.target.linkedin.login'
631
    username_key = 'provider_info_email'
632

    
633
    messages = {
634
        'title': _('LinkedIn'),
635
        'method_details': 'Email: {username}',
636
    }
637

    
638

    
639
# Utility method
640
def get_provider(module, user_obj=None, identifier=None, **params):
641
    """
642
    Return a provider instance from the auth providers registry.
643
    """
644
    if not module in PROVIDERS:
645
        raise Exception('Invalid auth provider "%s"' % id)
646

    
647
    return PROVIDERS.get(module)(user_obj, identifier, **params)