canaille-globuzma/web/models.py

280 lines
8.3 KiB
Python
Raw Normal View History

2020-08-14 11:18:08 +00:00
import ldap
2020-08-14 13:26:14 +00:00
import time
2020-08-14 11:18:08 +00:00
import datetime
from flask import g
from authlib.common.encoding import json_loads, json_dumps
from authlib.oauth2.rfc6749 import (
ClientMixin,
TokenMixin,
AuthorizationCodeMixin,
)
2020-08-14 13:26:14 +00:00
2020-08-14 11:18:08 +00:00
class LDAPObjectHelper:
_object_class_by_name = None
2020-08-17 07:45:35 +00:00
_attribute_type_by_name = None
2020-08-14 11:18:08 +00:00
may = None
must = None
base = None
id = None
def __init__(self, dn=None, **kwargs):
self.attrs = {}
for k, v in kwargs.items():
self.attrs[k] = [v] if not isinstance(v, list) else v
self.attrs.setdefault("objectClass", self.objectClass)
by_name = self.ocs_by_name()
ocs = [by_name[name] for name in self.objectClass]
self.may = []
self.must = []
for oc in ocs:
self.may.extend(oc.may)
self.must.extend(oc.must)
@property
def dn(self):
if not self.id in self.attrs:
return None
return f"{self.id}={self.attrs[self.id][0]},{self.base}"
@classmethod
def ocs_by_name(cls):
if cls._object_class_by_name:
return cls._object_class_by_name
2020-08-14 13:26:14 +00:00
res = g.ldap.search_s(
"cn=subschema", ldap.SCOPE_BASE, "(objectclass=*)", ["*", "+"]
)
2020-08-14 11:18:08 +00:00
subschema_entry = res[0]
subschema_subentry = ldap.cidict.cidict(subschema_entry[1])
subschema = ldap.schema.SubSchema(subschema_subentry)
object_class_oids = subschema.listall(ldap.schema.models.ObjectClass)
cls._object_class_by_name = {}
for oid in object_class_oids:
oc = subschema.get_obj(ldap.schema.models.ObjectClass, oid)
for name in oc.names:
cls._object_class_by_name[name] = oc
return cls._object_class_by_name
2020-08-16 18:16:57 +00:00
@classmethod
def attr_type_by_name(cls):
if cls._attribute_type_by_name:
return cls._attribute_type_by_name
res = g.ldap.search_s(
"cn=subschema", ldap.SCOPE_BASE, "(objectclass=*)", ["*", "+"]
)
subschema_entry = res[0]
subschema_subentry = ldap.cidict.cidict(subschema_entry[1])
subschema = ldap.schema.SubSchema(subschema_subentry)
attribute_type_oids = subschema.listall(ldap.schema.models.AttributeType)
cls._attribute_type_by_name = {}
for oid in attribute_type_oids:
oc = subschema.get_obj(ldap.schema.models.AttributeType, oid)
for name in oc.names:
cls._attribute_type_by_name[name] = oc
return cls._attribute_type_by_name
2020-08-14 11:18:08 +00:00
def save(self):
try:
match = bool(g.ldap.search_s(self.dn, ldap.SCOPE_SUBTREE))
except ldap.NO_SUCH_OBJECT:
match = False
if match:
attributes = [
(ldap.MOD_REPLACE, k, [elt.encode("utf-8") for elt in v])
for k, v in self.attrs.items()
]
g.ldap.modify_s(self.dn, attributes)
else:
attributes = [
(k, [elt.encode("utf-8") for elt in v]) for k, v in self.attrs.items()
]
g.ldap.add_s(self.dn, attributes)
@classmethod
def get(cls, dn):
if "=" not in dn:
dn = f"{cls.id}={dn},{cls.base}"
result = g.ldap.search_s(dn, ldap.SCOPE_SUBTREE)
if not result:
return None
o = cls(
**{k: [elt.decode("utf-8") for elt in v] for k, v in result[0][1].items()}
)
return o
@classmethod
def filter(cls, base=None, **kwargs):
class_filter = "".join([f"(objectClass={oc})" for oc in cls.objectClass])
arg_filter = "".join(f"({k}={v})" for k, v in kwargs.items())
ldapfilter = f"(&{class_filter}{arg_filter})"
result = g.ldap.search_s(base or cls.base, ldap.SCOPE_SUBTREE, ldapfilter)
return [
2020-08-14 13:26:14 +00:00
cls(**{k: [elt.decode("utf-8") for elt in v] for k, v in args.items()},)
2020-08-14 11:18:08 +00:00
for _, args in result
]
def __getattr__(self, name):
2020-08-17 09:56:03 +00:00
if (not self.may or name not in self.may) and (
not self.must or name not in self.must
):
2020-08-16 18:16:57 +00:00
return super().__getattribute__(name)
2020-08-17 09:56:03 +00:00
if (
not self.attr_type_by_name()
or not self.attr_type_by_name()[name].single_value
):
2020-08-14 11:18:08 +00:00
return self.attrs.get(name, [])
2020-08-16 18:16:57 +00:00
return self.attrs.get(name, [None])[0]
2020-08-14 11:18:08 +00:00
def __setattr__(self, name, value):
super().__setattr__(name, value)
if not isinstance(value, list):
value = [value]
if (self.may and name in self.may) or (self.must and name in self.must):
2020-08-17 07:45:35 +00:00
if self.attr_type_by_name()[name].single_value:
2020-08-16 18:16:57 +00:00
self.attrs[name] = [value]
else:
self.attrs[name] = value
2020-08-14 11:18:08 +00:00
class User(LDAPObjectHelper):
objectClass = ["person"]
base = "ou=users,dc=mydomain,dc=tld"
id = "cn"
def __repr__(self):
2020-08-17 07:45:35 +00:00
return self.cn[0]
2020-08-14 11:18:08 +00:00
def check_password(self, password):
return password == "valid"
class Client(LDAPObjectHelper, ClientMixin):
2020-08-14 13:26:14 +00:00
objectClass = ["oauthClient"]
2020-08-14 11:18:08 +00:00
base = "ou=clients,dc=mydomain,dc=tld"
id = "oauthClientID"
def get_client_id(self):
2020-08-16 18:16:57 +00:00
return self.oauthClientID
2020-08-14 11:18:08 +00:00
def get_default_redirect_uri(self):
2020-08-16 18:16:57 +00:00
return self.oauthRedirectURI
2020-08-14 11:18:08 +00:00
def get_allowed_scope(self, scope):
2020-08-16 18:16:57 +00:00
return self.oauthScope
2020-08-14 11:18:08 +00:00
def check_redirect_uri(self, redirect_uri):
return redirect_uri in self.oauthRedirectURI
def has_client_secret(self):
2020-08-17 07:45:35 +00:00
return bool(self.oauthClientSecret)
2020-08-14 11:18:08 +00:00
def check_client_secret(self, client_secret):
2020-08-16 18:16:57 +00:00
return client_secret == self.oauthClientSecret
2020-08-14 11:18:08 +00:00
def check_token_endpoint_auth_method(self, method):
2020-08-16 18:16:57 +00:00
return method == self.oauthTokenEndpointAuthMethod
2020-08-14 11:18:08 +00:00
def check_response_type(self, response_type):
return response_type in self.oauthResponseType
def check_grant_type(self, grant_type):
return grant_type in self.oauthGrantType
2020-08-14 13:26:14 +00:00
@property
def client_info(self):
return dict(
client_id=self.client_id,
client_secret=self.client_secret,
client_id_issued_at=self.client_id_issued_at,
client_secret_expires_at=self.client_secret_expires_at,
)
@property
def client_metadata(self):
if "client_metadata" in self.__dict__:
return self.__dict__["client_metadata"]
if self._client_metadata:
data = json_loads(self._client_metadata)
self.__dict__["client_metadata"] = data
return data
return {}
def set_client_metadata(self, value):
self._client_metadata = json_dumps(value)
@property
def redirect_uris(self):
return self.client_metadata.get("redirect_uris", [])
@property
def token_endpoint_auth_method(self):
return self.client_metadata.get(
"token_endpoint_auth_method", "client_secret_basic"
)
2020-08-14 11:18:08 +00:00
class AuthorizationCode(LDAPObjectHelper, AuthorizationCodeMixin):
2020-08-16 17:39:14 +00:00
objectClass = ["oauthAuthorizationCode"]
2020-08-14 11:18:08 +00:00
base = "ou=authorizations,dc=mydomain,dc=tld"
2020-08-14 13:26:14 +00:00
id = "oauthCode"
2020-08-14 11:18:08 +00:00
def get_redirect_uri(self):
2020-08-16 18:16:57 +00:00
return Client.get(self.authzClientID).oauthRedirectURI
2020-08-14 11:18:08 +00:00
def get_scope(self):
2020-08-16 18:16:57 +00:00
return self.oauth2ScopeValue
2020-08-14 11:18:08 +00:00
2020-08-14 13:26:14 +00:00
def is_refresh_token_active(self):
if self.revoked:
return False
expires_at = self.issued_at + self.expires_in * 2
return expires_at >= time.time()
def get_client_id(self):
return self.client_id
def get_expires_in(self):
return self.expires_in
def get_expires_at(self):
return self.issued_at + self.expires_in
2020-08-14 11:18:08 +00:00
class Token(LDAPObjectHelper, TokenMixin):
2020-08-16 17:39:14 +00:00
objectClass = ["oauthToken"]
2020-08-14 11:18:08 +00:00
base = "ou=tokens,dc=mydomain,dc=tld"
2020-08-16 17:39:14 +00:00
id = "oauthAccessToken"
2020-08-14 11:18:08 +00:00
def get_client_id(self):
2020-08-16 18:16:57 +00:00
return self.authzClientID
2020-08-14 11:18:08 +00:00
def get_scope(self):
2020-08-16 17:39:14 +00:00
return " ".join(self.oauthScope)
2020-08-14 11:18:08 +00:00
def get_expires_in(self):
2020-08-16 18:16:57 +00:00
return int(self.oauthTokenLifetime)
2020-08-14 11:18:08 +00:00
def get_expires_at(self):
2020-08-16 18:16:57 +00:00
issue_date = datetime.datetime.strptime(self.oauthIssueDate, "%Y%m%d%H%M%SZ")
2020-08-14 11:18:08 +00:00
issue_timestamp = (issue_date - datetime.datetime(1970, 1, 1)).total_seconds()
2020-08-16 18:16:57 +00:00
return issue_timestamp + int(self.oauthTokenLifetime)
2020-08-14 13:26:14 +00:00
def is_refresh_token_active(self):
if self.revoked:
return False
expires_at = self.issued_at + self.expires_in * 2
return expires_at >= time.time()