Statistics
| Branch: | Tag: | Revision:

root / snf-astakos-app / astakos / im / auth_providers.py @ d7030402

History | View | Annotate | Download (22.6 kB)

1
# Copyright 2011 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
import copy
35
import json
36

    
37
from synnefo.lib.ordereddict import OrderedDict
38

    
39
from django.core.urlresolvers import reverse, NoReverseMatch
40
from django.utils.translation import ugettext as _
41
from django.contrib.auth.models import Group
42
from django import template
43

    
44
from django.conf import settings
45

    
46
from astakos.im import settings as astakos_settings
47
from astakos.im import messages as astakos_messages
48

    
49
from synnefo_branding import utils as branding_utils
50

    
51
import logging
52

    
53
logger = logging.getLogger(__name__)
54

    
55
# providers registry
56
PROVIDERS = {}
57
REQUIRED_PROVIDERS = {}
58

    
59

    
60
class AuthProviderBase(type):
61

    
62
    def __new__(cls, name, bases, dct):
63
        include = False
64
        if [b for b in bases if isinstance(b, AuthProviderBase)]:
65
            type_id = dct.get('module')
66
            if type_id:
67
                include = True
68
            if type_id in astakos_settings.IM_MODULES:
69
                if astakos_settings.IM_MODULES.index(type_id) == 0:
70
                    dct['is_primary'] = True
71
                dct['module_enabled'] = True
72

    
73
        newcls = super(AuthProviderBase, cls).__new__(cls, name, bases, dct)
74
        if include:
75
            PROVIDERS[type_id] = newcls
76
            if newcls().get_required_policy:
77
                REQUIRED_PROVIDERS[type_id] = newcls
78
        return newcls
79

    
80

    
81
class AuthProvider(object):
82

    
83
    __metaclass__ = AuthProviderBase
84

    
85
    module = None
86
    module_enabled = False
87
    is_primary = False
88

    
89
    message_tpls = OrderedDict((
90
        ('title', '{module_title}'),
91
        ('login_title', '{title} LOGIN'),
92
        ('method_prompt', '{title} login'),
93
        ('account_prompt', '{title} account'),
94
        ('signup_title', '{title}'),
95
        ('profile_title', '{title}'),
96
        ('method_details', '{account_prompt}: {identifier}'),
97
        ('primary_login_prompt', 'Login using '),
98
        ('required', '{title} is required. You can assign it '
99
                     'from your profile page'),
100
        ('login_prompt', ''),
101
        ('add_prompt', 'Allows you to login using {title}'),
102
        ('login_extra', ''),
103
        ('username', '{username}'),
104
        ('disabled_for_create', 'It seems this is the first time you\'re '
105
                                'trying to access {service_name}. '
106
                                'Unfortunately, we are not accepting new '
107
                                'users at this point.'),
108
        ('switch_success', 'Account changed successfully.'),
109
        ('cannot_login', '{title} is not available for login. '
110
                         'Please use one of your other available methods '
111
                         'to login ({available_methods_links}'),
112

    
113
        # icons should end with _icon
114
        ('module_medium_icon', 'im/auth/icons-medium/{module}.png'),
115
        ('module_icon', 'im/auth/icons/{module}.png'))
116
    )
117

    
118
    messages = {}
119
    module_urls = {}
120

    
121
    remote_authenticate = True
122
    remote_logout_url = None
123

    
124
    # templates
125
    primary_login_template = 'im/auth/generic_primary_login.html'
126
    login_template = 'im/auth/generic_login.html'
127
    signup_template = 'im/signup.html'
128
    login_prompt_template = 'im/auth/generic_login_prompt.html'
129
    signup_prompt_template = 'im/auth/signup_prompt.html'
130

    
131
    default_policies = {
132
        'login': True,
133
        'create': True,
134
        'add': True,
135
        'remove': True,
136
        'limit': 1,
137
        'switch': True,
138
        'add_groups': [],
139
        'creation_groups': [],
140
        'required': False,
141
        'automoderate': not astakos_settings.MODERATION_ENABLED
142
    }
143

    
144
    policies = {}
145

    
146
    def __init__(self, user=None, identifier=None, **provider_params):
147
        """
148
        3 ways to initialize (no args, user, user and identifier).
149

150
        no args: Used for anonymous unauthenticated users.
151
        >>> p = auth_providers.get_provider('local')
152
        >>> # check that global settings allows us to create a new account
153
        >>> # using `local` provider.
154
        >>> print p.is_available_for_create()
155

156
        user and identifier: Used to provide details about a user's specific
157
        login method.
158
        >>> p = auth_providers.get_provider('google', user,
159
        >>>                                 identifier='1421421')
160
        >>> # provider (google) details prompt
161
        >>> print p.get_method_details()
162
        "Google account: 1421421"
163
        """
164

    
165
        # handle AnonymousUser instance
166
        self.user = None
167
        if user and hasattr(user, 'pk') and user.pk:
168
            self.user = user
169

    
170
        self.identifier = identifier
171
        self._instance = None
172
        if 'instance' in provider_params:
173
            self._instance = provider_params['instance']
174
            del provider_params['instance']
175

    
176
        # initialize policies
177
        self.module_policies = copy.copy(self.default_policies)
178
        self.module_policies['automoderate'] = not \
179
            astakos_settings.MODERATION_ENABLED
180
        for policy, value in self.policies.iteritems():
181
            setting_key = "%s_POLICY" % policy.upper()
182
            if self.has_setting(setting_key):
183
                self.module_policies[policy] = self.get_setting(setting_key)
184
            else:
185
                self.module_policies[policy] = value
186

    
187
        # messages cache
188
        self.message_tpls_compiled = OrderedDict()
189

    
190
        # module specific messages
191
        self.message_tpls = OrderedDict(self.message_tpls)
192
        for key, value in self.messages.iteritems():
193
            self.message_tpls[key] = value
194

    
195
        self._provider_details = provider_params
196

    
197
        self.resolve_available_methods = True
198

    
199
    def get_provider_model(self):
200
        from astakos.im.models import AstakosUserAuthProvider as AuthProvider
201
        return AuthProvider
202

    
203
    def remove_from_user(self):
204
        if not self.get_remove_policy:
205
            raise Exception("Provider cannot be removed")
206

    
207
        for group_name in self.get_add_groups_policy:
208
            group = Group.objects.get(name=group_name)
209
            self.user.groups.remove(group)
210
            self.log('removed from group due to add_groups_policy %s',
211
                     group.name)
212

    
213
        self._instance.delete()
214
        self.log('removed')
215

    
216
    def add_to_user(self, **params):
217
        if self._instance:
218
            raise Exception("Cannot add an existing provider")
219

    
220
        create = False
221
        if self.get_user_providers().count() == 0:
222
            create = True
223

    
224
        if create and not self.get_create_policy:
225
            raise Exception("Provider not available for create")
226

    
227
        if not self.get_add_policy:
228
            raise Exception("Provider cannot be added")
229

    
230
        if create:
231
            for group_name in self.get_creation_groups_policy:
232
                group, created = Group.objects.get_or_create(name=group_name)
233
                self.user.groups.add(group)
234
                self.log("added to %s group due to creation_groups_policy",
235
                         group_name)
236

    
237
        for group_name in self.get_add_groups_policy:
238
            group, created = Group.objects.get_or_create(name=group_name)
239
            self.user.groups.add(group)
240
            self.log("added to %s group due to add_groups_policy",
241
                     group_name)
242

    
243
        if self.identifier:
244
            pending = self.get_provider_model().objects.unverified(
245
                self.module, identifier=self.identifier)
246

    
247
            if pending:
248
                user = pending._instance.user
249
                logger.info("Removing existing unverified user (%r)",
250
                            user.log_display)
251
                user.delete()
252

    
253
        create_params = {
254
            'module': self.module,
255
            'info_data': json.dumps(self.provider_details.get('info', {})),
256
            'active': True,
257
            'identifier': self.identifier
258
        }
259
        if 'info' in self.provider_details:
260
            del self.provider_details['info']
261

    
262
        create_params.update(self.provider_details)
263
        create_params.update(params)
264
        create = self.user.auth_providers.create(**create_params)
265
        self.log("created %r" % create_params)
266
        return create
267

    
268
    def __repr__(self):
269
        r = "'%r' module" % self.__class__.__name__
270
        if self.user:
271
            r += ' (user: %r)' % self.user
272
        if self.identifier:
273
            r += '(identifier: %r)' % self.identifier
274
        return r
275

    
276
    def _message_params(self, **extra_params):
277
        """
278
        Retrieve message formating parameters.
279
        """
280
        params = {'module': self.module, 'module_title': self.module.title()}
281
        if self.identifier:
282
            params['identifier'] = self.identifier
283

    
284
        if self.user:
285
            for key, val in self.user.__dict__.iteritems():
286
                params["user_%s" % key.lower()] = val
287

    
288
        if self.provider_details:
289
            for key, val in self.provider_details.iteritems():
290
                params["provider_%s" % key.lower()] = val
291

    
292
            if 'info' in self.provider_details:
293
                if isinstance(self.provider_details['info'], basestring):
294
                    self.provider_details['info'] = \
295
                        json.loads(self.provider_details['info'])
296
                for key, val in self.provider_details['info'].iteritems():
297
                    params['provider_info_%s' % key.lower()] = val
298

    
299
        # resolve username, handle unexisting defined username key
300
        if self.user and self.username_key in params:
301
            params['username'] = params[self.username_key]
302
        else:
303
            params['username'] = self.identifier
304

    
305
        branding_params = dict(
306
            map(lambda k: (k[0].lower(), k[1]),
307
                branding_utils.get_branding_dict().iteritems()))
308
        params.update(branding_params)
309

    
310
        if not self.message_tpls_compiled:
311
            for key, message_tpl in self.message_tpls.iteritems():
312
                msg = self.messages.get(key, self.message_tpls.get(key))
313
                override_in_settings = self.get_setting(key)
314
                if override_in_settings is not None:
315
                    msg = override_in_settings
316
                try:
317
                    self.message_tpls_compiled[key] = msg.format(**params)
318
                    params.update(self.message_tpls_compiled)
319
                except KeyError, e:
320
                    continue
321
        else:
322
            params.update(self.message_tpls_compiled)
323

    
324
        for key, value in self.urls.iteritems():
325
            params['%s_url' % key] = value
326

    
327
        if self.user and self.resolve_available_methods:
328
            available_providers = self.user.get_enabled_auth_providers()
329
            for p in available_providers:
330
                p.resolve_available_methods = False
331
                if p.module == self.module and p.identifier == self.identifier:
332
                    available_providers.remove(p)
333

    
334
            get_msg = lambda p: p.get_method_prompt_msg
335
            params['available_methods'] = \
336
                ','.join(map(get_msg, available_providers))
337

    
338
            get_msg = lambda p: "<a href='%s'>%s</a>" % \
339
                (p.get_login_url, p.get_method_prompt_msg)
340

    
341
            params['available_methods_links'] = \
342
                ','.join(map(get_msg, available_providers))
343

    
344
        params.update(extra_params)
345
        return params
346

    
347
    def get_template(self, tpl):
348
        tpls = ['im/auth/%s_%s.html' % (self.module, tpl),
349
                getattr(self, '%s_template' % tpl)]
350
        found = None
351
        for tpl in tpls:
352
            try:
353
                found = template.loader.get_template(tpl)
354
                return tpl
355
            except template.TemplateDoesNotExist:
356
                continue
357
        if not found:
358
            raise template.TemplateDoesNotExist
359
        return tpl
360

    
361
    def get_username(self):
362
        return self.get_username_msg
363

    
364
    def get_user_providers(self):
365
        return self.user.auth_providers.active().filter(
366
            module__in=astakos_settings.IM_MODULES)
367

    
368
    def get_user_module_providers(self):
369
        return self.user.auth_providers.active().filter(module=self.module)
370

    
371
    def get_existing_providers(self):
372
        return ""
373

    
374
    def verified_exists(self):
375
        return self.get_provider_model().objects.verified(
376
            self.module, identifier=self.identifier)
377

    
378
    def resolve_policy(self, policy, default=None):
379

    
380
        if policy == 'switch' and default and not self.get_add_policy:
381
            return not self.get_policy('remove')
382

    
383
        if not self.user:
384
            return default
385

    
386
        if policy == 'remove' and default is True:
387
            return self.get_user_providers().count() > 1
388

    
389
        if policy == 'add' and default is True:
390
            limit = self.get_policy('limit')
391
            if limit <= self.get_user_module_providers().count():
392
                return False
393

    
394
            if self.identifier:
395
                if self.verified_exists():
396
                    return False
397

    
398
        return default
399

    
400
    def get_user_policies(self):
401
        from astakos.im.models import AuthProviderPolicyProfile
402
        return AuthProviderPolicyProfile.objects.for_user(self.user,
403
                                                          self.module)
404

    
405
    def get_policy(self, policy):
406
        module_default = self.module_policies.get(policy)
407
        settings_key = '%s_POLICY' % policy.upper()
408
        settings_default = self.get_setting(settings_key, module_default)
409

    
410
        if self.user:
411
            user_policies = self.get_user_policies()
412
            settings_default = user_policies.get(policy, settings_default)
413

    
414
        return self.resolve_policy(policy, settings_default)
415

    
416
    def get_message(self, msg, **extra_params):
417
        """
418
        Retrieve an auth provider message
419
        """
420
        if msg.endswith('_msg'):
421
            msg = msg.replace('_msg', '')
422
        params = self._message_params(**extra_params)
423

    
424
        # is message ???
425
        tpl = self.message_tpls_compiled.get(msg.lower(), None)
426
        if not tpl:
427
            msg_key = 'AUTH_PROVIDER_%s' % msg.upper()
428
            try:
429
                tpl = getattr(astakos_messages, msg_key)
430
            except AttributeError, e:
431
                try:
432
                    msg_key = msg.upper()
433
                    tpl = getattr(astakos_messages, msg_key)
434
                except AttributeError, e:
435
                    tpl = ''
436

    
437
        in_settings = self.get_setting(msg)
438
        if in_settings:
439
            tpl = in_settings
440

    
441
        return tpl.format(**params)
442

    
443
    @property
444
    def urls(self):
445
        urls = {
446
            'login': reverse(self.login_view),
447
            'add': reverse(self.login_view),
448
            'profile': reverse('edit_profile'),
449
        }
450
        if self.user:
451
            urls.update({
452
                'resend_activation': self.user.get_resend_activation_url(),
453
            })
454
        if self.identifier and self._instance:
455
            urls.update({
456
                'switch': reverse(self.login_view) + '?switch_from=%d' %
457
                self._instance.pk,
458
                'remove': reverse('remove_auth_provider',
459
                                  kwargs={'pk': self._instance.pk})
460
            })
461
        urls.update(self.module_urls)
462
        return urls
463

    
464
    def get_setting_key(self, name):
465
        return 'ASTAKOS_AUTH_PROVIDER_%s_%s' % (self.module.upper(),
466
                                                name.upper())
467

    
468
    def get_global_setting_key(self, name):
469
        return 'ASTAKOS_AUTH_PROVIDERS_%s' % name.upper()
470

    
471
    def has_global_setting(self, name):
472
        return hasattr(settings, self.get_global_setting_key(name))
473

    
474
    def has_setting(self, name):
475
        return hasattr(settings, self.get_setting_key(name))
476

    
477
    def get_setting(self, name, default=None):
478
        attr = self.get_setting_key(name)
479
        if not self.has_setting(name):
480
            return self.get_global_setting(name, default)
481
        return getattr(settings, attr, default)
482

    
483
    def get_global_setting(self, name, default=None):
484
        attr = self.get_global_setting_key(name)
485
        if not self.has_global_setting(name):
486
            return default
487
        return getattr(settings, attr, default)
488

    
489
    @property
490
    def provider_details(self):
491
        if self._provider_details:
492
            return self._provider_details
493

    
494
        self._provider_details = {}
495

    
496
        if self._instance:
497
            self._provider_details = self._instance.__dict__
498

    
499
        if self.user and self.identifier:
500
            if self.identifier:
501
                try:
502
                    self._provider_details = \
503
                        self.user.get_auth_providers().get(
504
                            module=self.module,
505
                            identifier=self.identifier).__dict__
506
                except Exception:
507
                    return {}
508
        return self._provider_details
509

    
510
    def __getattr__(self, key):
511
        if not key.startswith('get_'):
512
            return super(AuthProvider, self).__getattribute__(key)
513

    
514
        key = key.replace('get_', '')
515
        if key.endswith('_msg'):
516
            return self.get_message(key)
517

    
518
        if key.endswith('_policy'):
519
            return self.get_policy(key.replace('_policy', ''))
520

    
521
        if key.endswith('_url'):
522
            key = key.replace('_url', '')
523
            return self.urls.get(key)
524

    
525
        if key.endswith('_icon'):
526
            key = key.replace('_msg', '_icon')
527
            return settings.MEDIA_URL + self.get_message(key)
528

    
529
        if key.endswith('_setting'):
530
            key = key.replace('_setting', '')
531
            return self.get_message(key)
532

    
533
        if key.endswith('_template'):
534
            key = key.replace('_template', '')
535
            return self.get_template(key)
536

    
537
        return super(AuthProvider, self).__getattribute__(key)
538

    
539
    def is_active(self):
540
        return self.module_enabled
541

    
542
    @property
543
    def log_display(self):
544
        dsp = "%sAuth" % self.module.title()
545
        if self.user:
546
            dsp += "[%s]" % self.user.log_display
547
            if self.identifier:
548
                dsp += '[%s]' % self.identifier
549
                if self._instance and self._instance.pk:
550
                    dsp += '[%d]' % self._instance.pk
551
        return dsp
552

    
553
    def log(self, msg, *args, **kwargs):
554
        level = kwargs.pop('level', logging.INFO)
555
        message = '%s: %s' % (self.log_display, msg)
556
        logger.log(level, message, *args, **kwargs)
557

    
558

    
559
class LocalAuthProvider(AuthProvider):
560
    module = 'local'
561

    
562
    login_view = 'login'
563
    remote_authenticate = False
564
    username_key = 'user_email'
565

    
566
    messages = {
567
        'title': _('Classic'),
568
        'login_prompt': _('Classic login (username/password)'),
569
        'login_success': _('Logged in successfully.'),
570
        'method_details': 'Username: {username}',
571
        'logout_success_extra': ' '
572
    }
573

    
574
    policies = {
575
        'limit': 1,
576
        'switch': False
577
    }
578

    
579
    @property
580
    def urls(self):
581
        urls = super(LocalAuthProvider, self).urls
582

    
583
        password_change_url = None
584
        try:
585
            password_change_url = reverse('password_change')
586
        except NoReverseMatch:
587
            pass
588

    
589
        urls['change_password'] = password_change_url
590
        if self.user:
591
            urls['add'] = password_change_url
592
        if self._instance:
593
            urls.update({
594
                'remove': reverse('remove_auth_provider',
595
                                  kwargs={'pk': self._instance.pk})
596
            })
597
            if 'switch' in urls:
598
                del urls['switch']
599
        return urls
600

    
601
    def remove_from_user(self):
602
        super(LocalAuthProvider, self).remove_from_user()
603
        self.user.set_unusable_password()
604
        self.user.save()
605

    
606

    
607
class ShibbolethAuthProvider(AuthProvider):
608
    module = 'shibboleth'
609
    login_view = 'astakos.im.views.target.shibboleth.login'
610
    username_key = 'provider_info_eppn'
611

    
612
    policies = {
613
        'switch': False
614
    }
615

    
616
    messages = {
617
        'title': _('Academic'),
618
        'method_details': '{account_prompt}: {provider_info_eppn}',
619
        'login_description': _('If you are a student, professor or researcher'
620
                               ' you can login using your academic account.'),
621
        'add_prompt': _('Allows you to login using your Academic '
622
                        'account'),
623
        'method_details': 'Account: {username}',
624
        'logout_success_extra': _('You may still be logged in at your Academic'
625
                                  ' account though. Consider logging out '
626
                                  'from there too by closing all browser '
627
                                  'windows')
628
    }
629

    
630

    
631
class TwitterAuthProvider(AuthProvider):
632
    module = 'twitter'
633
    login_view = 'astakos.im.views.target.twitter.login'
634
    username_key = 'provider_info_screen_name'
635

    
636
    messages = {
637
        'title': _('Twitter'),
638
        'method_details': 'Screen name: {username}',
639
    }
640

    
641

    
642
class GoogleAuthProvider(AuthProvider):
643
    module = 'google'
644
    login_view = 'astakos.im.views.target.google.login'
645
    username_key = 'provider_info_email'
646

    
647
    messages = {
648
        'title': _('Google'),
649
        'method_details': 'Email: {username}',
650
    }
651

    
652

    
653
class LinkedInAuthProvider(AuthProvider):
654
    module = 'linkedin'
655
    login_view = 'astakos.im.views.target.linkedin.login'
656
    username_key = 'provider_info_email'
657

    
658
    messages = {
659
        'title': _('LinkedIn'),
660
        'method_details': 'Email: {username}',
661
    }
662

    
663

    
664
# Utility method
665
def get_provider(module, user_obj=None, identifier=None, **params):
666
    """
667
    Return a provider instance from the auth providers registry.
668
    """
669
    if not module in PROVIDERS:
670
        raise Exception('Invalid auth provider "%s"' % id)
671

    
672
    return PROVIDERS.get(module)(user_obj, identifier, **params)