root / snf-astakos-app / astakos / im / target / shibboleth.py @ 564a2292
History | View | Annotate | Download (7.1 kB)
1 |
# Copyright 2011-2012 GRNET S.A. All rights reserved.
|
---|---|
2 |
#
|
3 |
# Redistribution and use in source and binary forms, with or
|
4 |
# without modification, are permitted provided that the following
|
5 |
# conditions are met:
|
6 |
#
|
7 |
# 1. Redistributions of source code must retain the above
|
8 |
# copyright notice, this list of conditions and the following
|
9 |
# disclaimer.
|
10 |
#
|
11 |
# 2. Redistributions in binary form must reproduce the above
|
12 |
# copyright notice, this list of conditions and the following
|
13 |
# disclaimer in the documentation and/or other materials
|
14 |
# provided with the distribution.
|
15 |
#
|
16 |
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
|
17 |
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
18 |
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
19 |
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
|
20 |
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
21 |
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
22 |
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
23 |
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
24 |
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
25 |
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
26 |
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
27 |
# POSSIBILITY OF SUCH DAMAGE.
|
28 |
#
|
29 |
# The views and conclusions contained in the software and
|
30 |
# documentation are those of the authors and should not be
|
31 |
# interpreted as representing official policies, either expressed
|
32 |
# or implied, of GRNET S.A.
|
33 |
|
34 |
import json |
35 |
|
36 |
from django.http import HttpResponseBadRequest |
37 |
from django.utils.translation import ugettext as _ |
38 |
from django.contrib import messages |
39 |
from django.template import RequestContext |
40 |
from django.views.decorators.http import require_http_methods |
41 |
from django.http import HttpResponseRedirect |
42 |
from django.core.urlresolvers import reverse |
43 |
from django.core.exceptions import ImproperlyConfigured |
44 |
from django.shortcuts import get_object_or_404 |
45 |
|
46 |
from urlparse import urlunsplit, urlsplit |
47 |
|
48 |
from astakos.im.util import prepare_response, get_context, login_url |
49 |
from astakos.im.views import ( |
50 |
requires_anonymous, render_response, requires_auth_provider) |
51 |
from astakos.im.settings import ENABLE_LOCAL_ACCOUNT_MIGRATION, BASEURL |
52 |
from astakos.im.models import AstakosUser, PendingThirdPartyUser |
53 |
from astakos.im.forms import LoginForm |
54 |
from astakos.im.activation_backends import get_backend, SimpleBackend |
55 |
from astakos.im import auth_providers |
56 |
from astakos.im import settings |
57 |
from astakos.im.target import add_pending_auth_provider, get_pending_key, \ |
58 |
handle_third_party_signup
|
59 |
|
60 |
import astakos.im.messages as astakos_messages |
61 |
import logging |
62 |
|
63 |
logger = logging.getLogger(__name__) |
64 |
|
65 |
|
66 |
class Tokens: |
67 |
# these are mapped by the Shibboleth SP software
|
68 |
SHIB_EPPN = "HTTP_EPPN" # eduPersonPrincipalName |
69 |
SHIB_NAME = "HTTP_SHIB_INETORGPERSON_GIVENNAME"
|
70 |
SHIB_SURNAME = "HTTP_SHIB_PERSON_SURNAME"
|
71 |
SHIB_CN = "HTTP_SHIB_PERSON_COMMONNAME"
|
72 |
SHIB_DISPLAYNAME = "HTTP_SHIB_INETORGPERSON_DISPLAYNAME"
|
73 |
SHIB_EP_AFFILIATION = "HTTP_SHIB_EP_AFFILIATION"
|
74 |
SHIB_SESSION_ID = "HTTP_SHIB_SESSION_ID"
|
75 |
SHIB_MAIL = "HTTP_SHIB_MAIL"
|
76 |
|
77 |
|
78 |
@requires_auth_provider('shibboleth', login=True) |
79 |
@require_http_methods(["GET", "POST"]) |
80 |
def login( |
81 |
request, |
82 |
template='im/third_party_check_local.html',
|
83 |
extra_context=None):
|
84 |
|
85 |
extra_context = extra_context or {}
|
86 |
|
87 |
tokens = request.META |
88 |
third_party_key = get_pending_key(request) |
89 |
|
90 |
try:
|
91 |
eppn = tokens.get(Tokens.SHIB_EPPN) |
92 |
if not eppn: |
93 |
raise KeyError(_(astakos_messages.SHIBBOLETH_MISSING_EPPN) % { |
94 |
'domain': settings.BASEURL,
|
95 |
'contact_email': settings.DEFAULT_CONTACT_EMAIL
|
96 |
}) |
97 |
if Tokens.SHIB_DISPLAYNAME in tokens: |
98 |
realname = tokens[Tokens.SHIB_DISPLAYNAME] |
99 |
elif Tokens.SHIB_CN in tokens: |
100 |
realname = tokens[Tokens.SHIB_CN] |
101 |
elif Tokens.SHIB_NAME in tokens and Tokens.SHIB_SURNAME in tokens: |
102 |
realname = tokens[Tokens.SHIB_NAME] + ' ' + tokens[Tokens.SHIB_SURNAME]
|
103 |
else:
|
104 |
if settings.SHIBBOLETH_REQUIRE_NAME_INFO:
|
105 |
raise KeyError(_(astakos_messages.SHIBBOLETH_MISSING_NAME)) |
106 |
else:
|
107 |
realname = ''
|
108 |
|
109 |
except KeyError, e: |
110 |
# invalid shibboleth headers, redirect to login, display message
|
111 |
messages.error(request, e.message) |
112 |
return HttpResponseRedirect(login_url(request))
|
113 |
|
114 |
affiliation = tokens.get(Tokens.SHIB_EP_AFFILIATION, 'Shibboleth')
|
115 |
email = tokens.get(Tokens.SHIB_MAIL, '')
|
116 |
#eppn, email, realname, affiliation = 'test@grnet-hq.admin.grnet.gr', 'test@grnet.gr', 'sff', None
|
117 |
provider_info = {'eppn': eppn, 'email': email, 'name': realname} |
118 |
userid = eppn |
119 |
|
120 |
# an existing user accessed the view
|
121 |
if request.user.is_authenticated():
|
122 |
|
123 |
if request.user.has_auth_provider('shibboleth', identifier=eppn): |
124 |
return HttpResponseRedirect(reverse('edit_profile')) |
125 |
|
126 |
# automatically add eppn provider to user
|
127 |
user = request.user |
128 |
if not request.user.can_add_auth_provider('shibboleth', |
129 |
identifier=eppn): |
130 |
# TODO: handle existing uuid message separately
|
131 |
messages.error(request, _(astakos_messages.AUTH_PROVIDER_ADD_FAILED) + |
132 |
u' ' + _(astakos_messages.AUTH_PROVIDER_ADD_EXISTS))
|
133 |
return HttpResponseRedirect(reverse('edit_profile')) |
134 |
|
135 |
user.add_auth_provider('shibboleth', identifier=eppn,
|
136 |
affiliation=affiliation, |
137 |
provider_info=provider_info) |
138 |
messages.success(request, astakos_messages.AUTH_PROVIDER_ADDED) |
139 |
return HttpResponseRedirect(reverse('edit_profile')) |
140 |
|
141 |
try:
|
142 |
# astakos user exists ?
|
143 |
user = AstakosUser.objects.get_auth_provider_user( |
144 |
'shibboleth',
|
145 |
identifier=eppn |
146 |
) |
147 |
if user.is_active:
|
148 |
|
149 |
# authenticate user
|
150 |
response = prepare_response(request, |
151 |
user, |
152 |
request.GET.get('next'),
|
153 |
'renew' in request.GET) |
154 |
provider = auth_providers.get_provider('shibboleth')
|
155 |
messages.success(request, _(astakos_messages.LOGIN_SUCCESS) % |
156 |
_(provider.get_login_message_display)) |
157 |
add_pending_auth_provider(request, third_party_key) |
158 |
response.set_cookie('astakos_last_login_method', 'local') |
159 |
return response
|
160 |
else:
|
161 |
message = user.get_inactive_message() |
162 |
messages.error(request, message) |
163 |
return HttpResponseRedirect(login_url(request))
|
164 |
|
165 |
except AstakosUser.DoesNotExist, e:
|
166 |
user_info = {'affiliation': affiliation, 'realname': realname} |
167 |
return handle_third_party_signup(request, userid, 'shibboleth', |
168 |
third_party_key, |
169 |
provider_info, |
170 |
user_info, |
171 |
template, |
172 |
extra_context) |
173 |
|