2019-12-02 03:32:03 +00:00
|
|
|
import os
|
2019-12-14 16:13:55 +00:00
|
|
|
import re
|
2019-12-02 03:32:03 +00:00
|
|
|
import json
|
|
|
|
import traceback
|
|
|
|
import datetime
|
|
|
|
import ipaddress
|
2021-12-17 10:41:51 +00:00
|
|
|
import base64
|
2023-03-17 03:44:08 +00:00
|
|
|
import string
|
|
|
|
from zxcvbn import zxcvbn
|
2019-12-02 03:32:03 +00:00
|
|
|
from distutils.util import strtobool
|
|
|
|
from yaml import Loader, load
|
|
|
|
from flask import Blueprint, render_template, make_response, url_for, current_app, g, session, request, redirect, abort
|
|
|
|
from flask_login import login_user, logout_user, login_required, current_user
|
|
|
|
|
2023-02-18 16:04:14 +00:00
|
|
|
from .base import captcha, csrf, login_manager
|
2019-12-02 03:32:03 +00:00
|
|
|
from ..lib import utils
|
|
|
|
from ..decorators import dyndns_login_required
|
|
|
|
from ..models.base import db
|
|
|
|
from ..models.user import User, Anonymous
|
|
|
|
from ..models.role import Role
|
|
|
|
from ..models.account import Account
|
|
|
|
from ..models.account_user import AccountUser
|
|
|
|
from ..models.domain import Domain
|
|
|
|
from ..models.domain_user import DomainUser
|
|
|
|
from ..models.domain_setting import DomainSetting
|
|
|
|
from ..models.record import Record
|
|
|
|
from ..models.setting import Setting
|
|
|
|
from ..models.history import History
|
|
|
|
from ..services.google import google_oauth
|
|
|
|
from ..services.github import github_oauth
|
2019-12-06 07:27:35 +00:00
|
|
|
from ..services.azure import azure_oauth
|
2019-12-02 03:32:03 +00:00
|
|
|
from ..services.oidc import oidc_oauth
|
2019-12-13 14:55:11 +00:00
|
|
|
from ..services.saml import SAML
|
2019-12-21 14:43:03 +00:00
|
|
|
from ..services.token import confirm_token
|
|
|
|
from ..services.email import send_account_verification
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
google = None
|
|
|
|
github = None
|
2019-12-06 07:27:35 +00:00
|
|
|
azure = None
|
2019-12-02 03:32:03 +00:00
|
|
|
oidc = None
|
2019-12-13 14:55:11 +00:00
|
|
|
saml = None
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
index_bp = Blueprint('index',
|
|
|
|
__name__,
|
|
|
|
template_folder='templates',
|
|
|
|
url_prefix='/')
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.before_app_first_request
|
|
|
|
def register_modules():
|
|
|
|
global google
|
|
|
|
global github
|
2019-12-06 07:27:35 +00:00
|
|
|
global azure
|
2019-12-02 03:32:03 +00:00
|
|
|
global oidc
|
2019-12-13 14:55:11 +00:00
|
|
|
global saml
|
2019-12-02 03:32:03 +00:00
|
|
|
google = google_oauth()
|
|
|
|
github = github_oauth()
|
2019-12-06 07:27:35 +00:00
|
|
|
azure = azure_oauth()
|
2019-12-02 03:32:03 +00:00
|
|
|
oidc = oidc_oauth()
|
2019-12-13 14:55:11 +00:00
|
|
|
saml = SAML()
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
|
|
|
|
@index_bp.before_request
|
|
|
|
def before_request():
|
|
|
|
# Check if user is anonymous
|
|
|
|
g.user = current_user
|
|
|
|
login_manager.anonymous_user = Anonymous
|
|
|
|
|
|
|
|
# Check site is in maintenance mode
|
|
|
|
maintenance = Setting().get('maintenance')
|
|
|
|
if maintenance and current_user.is_authenticated and current_user.role.name not in [
|
2023-04-08 21:05:27 +00:00
|
|
|
'Administrator', 'Operator'
|
2019-12-02 03:32:03 +00:00
|
|
|
]:
|
|
|
|
return render_template('maintenance.html')
|
|
|
|
|
|
|
|
# Manage session timeout
|
|
|
|
session.permanent = True
|
|
|
|
current_app.permanent_session_lifetime = datetime.timedelta(
|
|
|
|
minutes=int(Setting().get('session_timeout')))
|
|
|
|
session.modified = True
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/', methods=['GET'])
|
|
|
|
@login_required
|
|
|
|
def index():
|
|
|
|
return redirect(url_for('dashboard.dashboard'))
|
|
|
|
|
|
|
|
|
2019-12-17 16:46:34 +00:00
|
|
|
@index_bp.route('/ping', methods=['GET'])
|
|
|
|
def ping():
|
|
|
|
return make_response('ok')
|
|
|
|
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.route('/google/login')
|
|
|
|
def google_login():
|
|
|
|
if not Setting().get('google_oauth_enabled') or google is None:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Google OAuth is disabled or you have not yet reloaded the pda application after enabling.'
|
|
|
|
)
|
|
|
|
abort(400)
|
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
use_ssl = current_app.config.get('SERVER_EXTERNAL_SSL')
|
|
|
|
params = {'_external': True}
|
|
|
|
if isinstance(use_ssl, bool):
|
|
|
|
params['_scheme'] = 'https' if use_ssl else 'http'
|
|
|
|
redirect_uri = url_for('google_authorized', **params)
|
2019-12-02 03:32:03 +00:00
|
|
|
return google.authorize_redirect(redirect_uri)
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/github/login')
|
|
|
|
def github_login():
|
|
|
|
if not Setting().get('github_oauth_enabled') or github is None:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Github OAuth is disabled or you have not yet reloaded the pda application after enabling.'
|
|
|
|
)
|
|
|
|
abort(400)
|
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
use_ssl = current_app.config.get('SERVER_EXTERNAL_SSL')
|
|
|
|
params = {'_external': True}
|
|
|
|
if isinstance(use_ssl, bool):
|
|
|
|
params['_scheme'] = 'https' if use_ssl else 'http'
|
|
|
|
redirect_uri = url_for('github_authorized', **params)
|
2019-12-02 03:32:03 +00:00
|
|
|
return github.authorize_redirect(redirect_uri)
|
|
|
|
|
|
|
|
|
2019-12-06 07:27:35 +00:00
|
|
|
@index_bp.route('/azure/login')
|
|
|
|
def azure_login():
|
|
|
|
if not Setting().get('azure_oauth_enabled') or azure is None:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Microsoft OAuth is disabled or you have not yet reloaded the pda application after enabling.'
|
|
|
|
)
|
|
|
|
abort(400)
|
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
use_ssl = current_app.config.get('SERVER_EXTERNAL_SSL')
|
|
|
|
params = {'_external': True}
|
|
|
|
if isinstance(use_ssl, bool):
|
|
|
|
params['_scheme'] = 'https' if use_ssl else 'http'
|
|
|
|
redirect_uri = url_for('azure_authorized', **params)
|
2019-12-06 07:27:35 +00:00
|
|
|
return azure.authorize_redirect(redirect_uri)
|
|
|
|
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.route('/oidc/login')
|
|
|
|
def oidc_login():
|
|
|
|
if not Setting().get('oidc_oauth_enabled') or oidc is None:
|
|
|
|
current_app.logger.error(
|
|
|
|
'OIDC OAuth is disabled or you have not yet reloaded the pda application after enabling.'
|
|
|
|
)
|
|
|
|
abort(400)
|
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
use_ssl = current_app.config.get('SERVER_EXTERNAL_SSL')
|
|
|
|
params = {'_external': True}
|
|
|
|
if isinstance(use_ssl, bool):
|
|
|
|
params['_scheme'] = 'https' if use_ssl else 'http'
|
|
|
|
redirect_uri = url_for('oidc_authorized', **params)
|
2019-12-02 03:32:03 +00:00
|
|
|
return oidc.authorize_redirect(redirect_uri)
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/login', methods=['GET', 'POST'])
|
|
|
|
def login():
|
2022-12-18 11:50:59 +00:00
|
|
|
SAML_ENABLED = current_app.config.get('SAML_ENABLED', False)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
if g.user is not None and current_user.is_authenticated:
|
|
|
|
return redirect(url_for('dashboard.dashboard'))
|
|
|
|
|
|
|
|
if 'google_token' in session:
|
|
|
|
user_data = json.loads(google.get('userinfo').text)
|
2023-04-08 22:14:40 +00:00
|
|
|
google_first_name = user_data['given_name']
|
|
|
|
google_last_name = user_data['family_name']
|
|
|
|
google_email = user_data['email']
|
|
|
|
user = User.query.filter_by(username=google_email).first()
|
2019-12-02 03:32:03 +00:00
|
|
|
if user is None:
|
2023-04-08 22:14:40 +00:00
|
|
|
user = User.query.filter_by(email=google_email).first()
|
2019-12-02 03:32:03 +00:00
|
|
|
if not user:
|
2023-04-08 22:14:40 +00:00
|
|
|
user = User(username=google_email,
|
|
|
|
firstname=google_first_name,
|
|
|
|
lastname=google_last_name,
|
2019-12-02 03:32:03 +00:00
|
|
|
plain_text_password=None,
|
2023-04-08 22:14:40 +00:00
|
|
|
email=google_email)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
result = user.create_local_user()
|
|
|
|
if not result['status']:
|
|
|
|
session.pop('google_token', None)
|
|
|
|
return redirect(url_for('index.login'))
|
|
|
|
|
|
|
|
session['user_id'] = user.id
|
|
|
|
session['authentication_type'] = 'OAuth'
|
2021-12-17 10:41:51 +00:00
|
|
|
return authenticate_user(user, 'Google OAuth')
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
if 'github_token' in session:
|
2023-04-08 22:14:40 +00:00
|
|
|
user_data = json.loads(github.get('user').text)
|
|
|
|
github_username = user_data['login']
|
|
|
|
github_first_name = user_data['name']
|
2023-04-08 22:11:55 +00:00
|
|
|
github_last_name = ''
|
2023-04-08 22:14:40 +00:00
|
|
|
github_email = user_data['email']
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2023-04-08 22:11:55 +00:00
|
|
|
# If the user's full name from GitHub contains at least two words, use the first word as the first name and
|
|
|
|
# the rest as the last name.
|
|
|
|
github_name_parts = github_first_name.split(' ')
|
|
|
|
if len(github_name_parts) > 1:
|
|
|
|
github_first_name = github_name_parts[0]
|
|
|
|
github_last_name = ' '.join(github_name_parts[1:])
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
user = User.query.filter_by(username=github_username).first()
|
|
|
|
if user is None:
|
|
|
|
user = User.query.filter_by(email=github_email).first()
|
|
|
|
if not user:
|
|
|
|
user = User(username=github_username,
|
|
|
|
plain_text_password=None,
|
2023-04-08 22:11:55 +00:00
|
|
|
firstname=github_first_name,
|
|
|
|
lastname=github_last_name,
|
2019-12-02 03:32:03 +00:00
|
|
|
email=github_email)
|
|
|
|
|
|
|
|
result = user.create_local_user()
|
|
|
|
if not result['status']:
|
|
|
|
session.pop('github_token', None)
|
|
|
|
return redirect(url_for('index.login'))
|
|
|
|
|
|
|
|
session['user_id'] = user.id
|
|
|
|
session['authentication_type'] = 'OAuth'
|
2021-12-17 10:41:51 +00:00
|
|
|
return authenticate_user(user, 'Github OAuth')
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-12-06 07:27:35 +00:00
|
|
|
if 'azure_token' in session:
|
2020-04-30 10:14:32 +00:00
|
|
|
azure_info = azure.get('me?$select=displayName,givenName,id,mail,surname,userPrincipalName').text
|
2023-04-08 21:05:27 +00:00
|
|
|
current_app.logger.info('Azure login returned: ' + azure_info)
|
2023-04-08 22:14:40 +00:00
|
|
|
user_data = json.loads(azure_info)
|
2020-01-03 02:36:38 +00:00
|
|
|
|
2020-01-03 02:57:07 +00:00
|
|
|
azure_info = azure.post('me/getMemberGroups',
|
|
|
|
json={'securityEnabledOnly': False}).text
|
|
|
|
current_app.logger.info('Azure groups returned: ' + azure_info)
|
2020-01-03 02:36:38 +00:00
|
|
|
grouplookup = json.loads(azure_info)
|
|
|
|
# Groups are in mygroups['value'] which is an array
|
|
|
|
if "value" in grouplookup:
|
|
|
|
mygroups = grouplookup["value"]
|
|
|
|
else:
|
|
|
|
mygroups = []
|
|
|
|
|
2023-04-08 22:14:40 +00:00
|
|
|
azure_username = user_data["userPrincipalName"]
|
|
|
|
azure_first_name = user_data["givenName"]
|
|
|
|
azure_last_name = user_data["surname"]
|
|
|
|
if "mail" in user_data:
|
|
|
|
azure_email = user_data["mail"]
|
2019-12-06 07:27:35 +00:00
|
|
|
else:
|
|
|
|
azure_email = ""
|
|
|
|
if not azure_email:
|
2023-04-08 22:14:40 +00:00
|
|
|
azure_email = user_data["userPrincipalName"]
|
2020-01-03 02:36:38 +00:00
|
|
|
|
2019-12-06 07:27:35 +00:00
|
|
|
# Handle foreign principals such as guest users
|
|
|
|
azure_email = re.sub(r"#.*$", "", azure_email)
|
|
|
|
azure_username = re.sub(r"#.*$", "", azure_username)
|
|
|
|
|
|
|
|
user = User.query.filter_by(username=azure_username).first()
|
|
|
|
if not user:
|
|
|
|
user = User(username=azure_username,
|
|
|
|
plain_text_password=None,
|
2023-04-08 22:11:55 +00:00
|
|
|
firstname=azure_first_name,
|
|
|
|
lastname=azure_last_name,
|
2019-12-06 07:27:35 +00:00
|
|
|
email=azure_email)
|
|
|
|
|
|
|
|
result = user.create_local_user()
|
|
|
|
if not result['status']:
|
|
|
|
current_app.logger.warning('Unable to create ' + azure_username)
|
|
|
|
session.pop('azure_token', None)
|
|
|
|
# note: a redirect to login results in an endless loop, so render the login page instead
|
|
|
|
return render_template('login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error=('User ' + azure_username +
|
|
|
|
' cannot be created.'))
|
|
|
|
|
|
|
|
session['user_id'] = user.id
|
|
|
|
session['authentication_type'] = 'OAuth'
|
2020-01-03 02:36:38 +00:00
|
|
|
|
|
|
|
# Handle group memberships, if defined
|
|
|
|
if Setting().get('azure_sg_enabled'):
|
|
|
|
if Setting().get('azure_admin_group') in mygroups:
|
2020-01-03 02:57:07 +00:00
|
|
|
current_app.logger.info('Setting role for user ' +
|
2023-04-08 21:05:27 +00:00
|
|
|
azure_username +
|
|
|
|
' to Administrator due to group membership')
|
2020-01-03 02:36:38 +00:00
|
|
|
user.set_role("Administrator")
|
|
|
|
else:
|
|
|
|
if Setting().get('azure_operator_group') in mygroups:
|
2020-01-03 02:57:07 +00:00
|
|
|
current_app.logger.info('Setting role for user ' +
|
2023-04-08 21:05:27 +00:00
|
|
|
azure_username +
|
|
|
|
' to Operator due to group membership')
|
2020-01-03 02:36:38 +00:00
|
|
|
user.set_role("Operator")
|
|
|
|
else:
|
|
|
|
if Setting().get('azure_user_group') in mygroups:
|
2020-01-03 02:57:07 +00:00
|
|
|
current_app.logger.info('Setting role for user ' +
|
2023-04-08 21:05:27 +00:00
|
|
|
azure_username +
|
|
|
|
' to User due to group membership')
|
2020-01-03 02:36:38 +00:00
|
|
|
user.set_role("User")
|
|
|
|
else:
|
2020-01-03 02:57:07 +00:00
|
|
|
current_app.logger.warning('User ' +
|
2023-04-08 21:05:27 +00:00
|
|
|
azure_username +
|
|
|
|
' has no relevant group memberships')
|
2020-01-03 02:36:38 +00:00
|
|
|
session.pop('azure_token', None)
|
2020-05-29 15:41:20 +00:00
|
|
|
return render_template('login.html',
|
2023-04-08 21:05:27 +00:00
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error=('User ' + azure_username +
|
|
|
|
' is not in any authorised groups.'))
|
2020-01-03 02:36:38 +00:00
|
|
|
|
2020-07-03 06:55:31 +00:00
|
|
|
# Handle account/group creation, if enabled
|
|
|
|
if Setting().get('azure_group_accounts_enabled') and mygroups:
|
|
|
|
current_app.logger.info('Azure group account sync enabled')
|
2021-01-31 10:31:56 +00:00
|
|
|
name_value = Setting().get('azure_group_accounts_name')
|
|
|
|
description_value = Setting().get('azure_group_accounts_description')
|
|
|
|
select_values = name_value
|
|
|
|
if description_value != '':
|
|
|
|
select_values += ',' + description_value
|
|
|
|
|
|
|
|
mygroups = get_azure_groups(
|
|
|
|
'me/memberOf/microsoft.graph.group?$count=false&$securityEnabled=true&$select={}'.format(select_values))
|
|
|
|
|
|
|
|
description_pattern = Setting().get('azure_group_accounts_description_re')
|
|
|
|
pattern = Setting().get('azure_group_accounts_name_re')
|
2020-07-03 06:55:31 +00:00
|
|
|
|
2021-01-31 10:31:56 +00:00
|
|
|
# Loop through users security groups
|
|
|
|
for azure_group in mygroups:
|
|
|
|
if name_value in azure_group:
|
|
|
|
group_name = azure_group[name_value]
|
2020-07-03 06:55:31 +00:00
|
|
|
group_description = ''
|
2021-01-31 10:31:56 +00:00
|
|
|
if description_value in azure_group:
|
|
|
|
group_description = azure_group[description_value]
|
2020-07-03 06:55:31 +00:00
|
|
|
|
2020-07-03 08:55:06 +00:00
|
|
|
# Do regex search if enabled for group description
|
|
|
|
if description_pattern != '':
|
2021-01-31 10:31:56 +00:00
|
|
|
current_app.logger.info('Matching group description {} against regex {}'.format(
|
|
|
|
group_description, description_pattern))
|
|
|
|
matches = re.match(
|
|
|
|
description_pattern, group_description)
|
2020-07-03 08:55:06 +00:00
|
|
|
if matches:
|
2021-01-31 10:31:56 +00:00
|
|
|
current_app.logger.info(
|
|
|
|
'Group {} matched regexp'.format(group_description))
|
2020-07-03 09:01:17 +00:00
|
|
|
group_description = matches.group(1)
|
2020-07-03 08:55:06 +00:00
|
|
|
else:
|
|
|
|
# Regexp didn't match, continue to next iteration
|
2021-01-31 10:31:56 +00:00
|
|
|
continue
|
2020-07-03 08:55:06 +00:00
|
|
|
|
|
|
|
# Do regex search if enabled for group name
|
2020-07-03 06:55:31 +00:00
|
|
|
if pattern != '':
|
2021-01-31 10:31:56 +00:00
|
|
|
current_app.logger.info(
|
|
|
|
'Matching group name {} against regex {}'.format(group_name, pattern))
|
|
|
|
matches = re.match(pattern, group_name)
|
2020-07-03 06:55:31 +00:00
|
|
|
if matches:
|
2021-01-31 10:31:56 +00:00
|
|
|
current_app.logger.info(
|
|
|
|
'Group {} matched regexp'.format(group_name))
|
2020-07-03 09:01:17 +00:00
|
|
|
group_name = matches.group(1)
|
2020-07-03 06:55:31 +00:00
|
|
|
else:
|
|
|
|
# Regexp didn't match, continue to next iteration
|
2021-01-31 10:31:56 +00:00
|
|
|
continue
|
2020-07-03 08:55:06 +00:00
|
|
|
|
2023-01-11 10:21:40 +00:00
|
|
|
account = Account()
|
2021-12-31 08:51:12 +00:00
|
|
|
sanitized_group_name = Account.sanitize_name(group_name)
|
|
|
|
account_id = account.get_id_by_name(account_name=sanitized_group_name)
|
2020-07-03 06:55:31 +00:00
|
|
|
|
|
|
|
if account_id:
|
|
|
|
account = Account.query.get(account_id)
|
|
|
|
# check if user has permissions
|
|
|
|
account_users = account.get_user()
|
|
|
|
current_app.logger.info('Group: {} Users: {}'.format(
|
2021-11-18 23:34:16 +00:00
|
|
|
group_name,
|
2020-07-03 06:55:31 +00:00
|
|
|
account_users))
|
|
|
|
if user.id in account_users:
|
|
|
|
current_app.logger.info('User id {} is already in account {}'.format(
|
|
|
|
user.id, group_name))
|
|
|
|
else:
|
|
|
|
account.add_user(user)
|
|
|
|
history = History(msg='Update account {0}'.format(
|
|
|
|
account.name),
|
|
|
|
created_by='System')
|
|
|
|
history.add()
|
|
|
|
current_app.logger.info('User {} added to Account {}'.format(
|
|
|
|
user.username, account.name))
|
|
|
|
else:
|
2021-12-31 08:51:12 +00:00
|
|
|
account = Account(
|
|
|
|
name=sanitized_group_name,
|
|
|
|
description=group_description,
|
|
|
|
contact='',
|
|
|
|
mail=''
|
|
|
|
)
|
2020-07-03 06:55:31 +00:00
|
|
|
account.create_account()
|
|
|
|
history = History(msg='Create account {0}'.format(
|
2021-11-18 23:34:16 +00:00
|
|
|
account.name),
|
2020-07-03 06:55:31 +00:00
|
|
|
created_by='System')
|
|
|
|
history.add()
|
|
|
|
|
|
|
|
account.add_user(user)
|
|
|
|
history = History(msg='Update account {0}'.format(account.name),
|
|
|
|
created_by='System')
|
|
|
|
history.add()
|
|
|
|
current_app.logger.warning('group info: {} '.format(account_id))
|
|
|
|
|
2021-12-17 10:41:51 +00:00
|
|
|
return authenticate_user(user, 'Azure OAuth')
|
2019-12-06 07:27:35 +00:00
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
if 'oidc_token' in session:
|
2023-04-08 22:14:40 +00:00
|
|
|
user_data = json.loads(oidc.get('userinfo').text)
|
|
|
|
oidc_username = user_data[Setting().get('oidc_oauth_username')]
|
|
|
|
oidc_first_name = user_data[Setting().get('oidc_oauth_firstname')]
|
|
|
|
oidc_last_name = user_data[Setting().get('oidc_oauth_last_name')]
|
|
|
|
oidc_email = user_data[Setting().get('oidc_oauth_email')]
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
user = User.query.filter_by(username=oidc_username).first()
|
|
|
|
if not user:
|
|
|
|
user = User(username=oidc_username,
|
|
|
|
plain_text_password=None,
|
2023-04-08 22:11:55 +00:00
|
|
|
firstname=oidc_first_name,
|
|
|
|
lastname=oidc_last_name,
|
2019-12-02 03:32:03 +00:00
|
|
|
email=oidc_email)
|
|
|
|
result = user.create_local_user()
|
2020-03-06 12:49:22 +00:00
|
|
|
else:
|
2023-04-08 22:11:55 +00:00
|
|
|
user.firstname = oidc_first_name
|
|
|
|
user.lastname = oidc_last_name
|
2020-03-06 12:49:22 +00:00
|
|
|
user.email = oidc_email
|
|
|
|
user.plain_text_password = None
|
|
|
|
result = user.update_local_user()
|
|
|
|
|
|
|
|
if not result['status']:
|
|
|
|
session.pop('oidc_token', None)
|
|
|
|
return redirect(url_for('index.login'))
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
# This checks if the account_name_property and account_description property were included in settings.
|
|
|
|
if Setting().get('oidc_oauth_account_name_property') and Setting().get(
|
|
|
|
'oidc_oauth_account_description_property'):
|
2021-11-19 15:53:17 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
# Gets the name_property and description_property.
|
2020-03-06 15:01:18 +00:00
|
|
|
name_prop = Setting().get('oidc_oauth_account_name_property')
|
|
|
|
desc_prop = Setting().get('oidc_oauth_account_description_property')
|
2021-11-19 15:53:17 +00:00
|
|
|
|
|
|
|
account_to_add = []
|
2023-04-08 22:14:40 +00:00
|
|
|
# If the name_property and desc_property exist in me (A variable that contains all the userinfo from the
|
|
|
|
# IdP).
|
|
|
|
if name_prop in user_data and desc_prop in user_data:
|
|
|
|
accounts_name_prop = [user_data[name_prop]] if type(user_data[name_prop]) is not list else user_data[name_prop]
|
|
|
|
accounts_desc_prop = [user_data[desc_prop]] if type(user_data[desc_prop]) is not list else user_data[desc_prop]
|
2021-12-01 13:35:05 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
# Run on all groups the user is in by the index num.
|
2021-11-19 15:53:17 +00:00
|
|
|
for i in range(len(accounts_name_prop)):
|
|
|
|
description = ''
|
|
|
|
if i < len(accounts_desc_prop):
|
|
|
|
description = accounts_desc_prop[i]
|
|
|
|
account = handle_account(accounts_name_prop[i], description)
|
|
|
|
|
|
|
|
account_to_add.append(account)
|
2020-03-06 15:01:18 +00:00
|
|
|
user_accounts = user.get_accounts()
|
2021-12-01 13:35:05 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
# Add accounts
|
2021-11-19 15:53:17 +00:00
|
|
|
for account in account_to_add:
|
|
|
|
if account not in user_accounts:
|
|
|
|
account.add_user(user)
|
|
|
|
|
|
|
|
# Remove accounts if the setting is enabled
|
|
|
|
if Setting().get('delete_sso_accounts'):
|
|
|
|
for account in user_accounts:
|
|
|
|
if account not in account_to_add:
|
2023-04-08 21:05:27 +00:00
|
|
|
account.remove_user(user)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
session['user_id'] = user.id
|
|
|
|
session['authentication_type'] = 'OAuth'
|
2021-12-17 10:41:51 +00:00
|
|
|
return authenticate_user(user, 'OIDC OAuth')
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
if request.method == 'GET':
|
|
|
|
return render_template('login.html', saml_enabled=SAML_ENABLED)
|
|
|
|
elif request.method == 'POST':
|
|
|
|
# process Local-DB authentication
|
|
|
|
username = request.form['username']
|
|
|
|
password = request.form['password']
|
|
|
|
otp_token = request.form.get('otptoken')
|
|
|
|
auth_method = request.form.get('auth_method', 'LOCAL')
|
|
|
|
session[
|
|
|
|
'authentication_type'] = 'LDAP' if auth_method != 'LOCAL' else 'LOCAL'
|
|
|
|
remember_me = True if 'remember' in request.form else False
|
|
|
|
|
2020-04-16 07:46:27 +00:00
|
|
|
if auth_method == 'LOCAL' and not Setting().get('local_db_enabled'):
|
|
|
|
return render_template(
|
|
|
|
'login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error='Local authentication is disabled')
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
user = User(username=username,
|
|
|
|
password=password,
|
|
|
|
plain_text_password=password)
|
|
|
|
|
|
|
|
try:
|
2019-12-21 14:43:03 +00:00
|
|
|
if Setting().get('verify_user_email') and user.email and not user.confirmed:
|
|
|
|
return render_template(
|
|
|
|
'login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error='Please confirm your email address first')
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
auth = user.is_validate(method=auth_method,
|
|
|
|
src_ip=request.remote_addr)
|
|
|
|
if auth == False:
|
2022-02-17 15:34:54 +00:00
|
|
|
signin_history(user.username, auth_method, False)
|
2019-12-02 03:32:03 +00:00
|
|
|
return render_template('login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error='Invalid credentials')
|
|
|
|
except Exception as e:
|
|
|
|
current_app.logger.error(
|
|
|
|
"Cannot authenticate user. Error: {}".format(e))
|
|
|
|
current_app.logger.debug(traceback.format_exc())
|
|
|
|
return render_template('login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error=e)
|
|
|
|
|
|
|
|
# check if user enabled OPT authentication
|
|
|
|
if user.otp_secret:
|
|
|
|
if otp_token and otp_token.isdigit():
|
|
|
|
good_token = user.verify_totp(otp_token)
|
|
|
|
if not good_token:
|
2022-02-17 15:34:54 +00:00
|
|
|
signin_history(user.username, auth_method, False)
|
2019-12-02 03:32:03 +00:00
|
|
|
return render_template('login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error='Invalid credentials')
|
|
|
|
else:
|
|
|
|
return render_template('login.html',
|
|
|
|
saml_enabled=SAML_ENABLED,
|
|
|
|
error='Token required')
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
if Setting().get('autoprovisioning') and auth_method != 'LOCAL':
|
|
|
|
urn_value = Setting().get('urn_value')
|
|
|
|
Entitlements = user.read_entitlements(Setting().get('autoprovisioning_attribute'))
|
|
|
|
if len(Entitlements) == 0 and Setting().get('purge'):
|
2021-08-05 17:37:48 +00:00
|
|
|
user.set_role("User")
|
|
|
|
user.revoke_privilege(True)
|
2021-11-18 23:34:16 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
elif len(Entitlements) != 0:
|
2021-08-05 17:37:48 +00:00
|
|
|
if checkForPDAEntries(Entitlements, urn_value):
|
|
|
|
user.updateUser(Entitlements)
|
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
current_app.logger.warning(
|
|
|
|
'Not a single powerdns-admin record was found, possibly a typo in the prefix')
|
2021-08-05 17:37:48 +00:00
|
|
|
if Setting().get('purge'):
|
|
|
|
user.set_role("User")
|
|
|
|
user.revoke_privilege(True)
|
2023-04-08 21:05:27 +00:00
|
|
|
current_app.logger.warning('Procceding to revoke every privilige from ' + user.username + '.')
|
2021-08-05 17:37:48 +00:00
|
|
|
|
2022-02-17 15:34:54 +00:00
|
|
|
return authenticate_user(user, auth_method, remember_me)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2021-08-05 17:37:48 +00:00
|
|
|
def checkForPDAEntries(Entitlements, urn_value):
|
|
|
|
"""
|
|
|
|
Run through every record located in the ldap attribute given and determine if there are any valid powerdns-admin records
|
|
|
|
"""
|
2023-04-08 21:05:27 +00:00
|
|
|
urnArguments = [x.lower() for x in urn_value.split(':')]
|
2021-08-05 17:37:48 +00:00
|
|
|
for Entitlement in Entitlements:
|
2023-04-08 21:05:27 +00:00
|
|
|
entArguments = Entitlement.split(':powerdns-admin')
|
|
|
|
entArguments = [x.lower() for x in entArguments[0].split(':')]
|
|
|
|
if (entArguments == urnArguments):
|
2021-08-05 17:37:48 +00:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
def clear_session():
|
|
|
|
session.pop('user_id', None)
|
|
|
|
session.pop('github_token', None)
|
|
|
|
session.pop('google_token', None)
|
2023-04-11 23:09:33 +00:00
|
|
|
session.pop('azure_token', None)
|
|
|
|
session.pop('oidc_token', None)
|
2019-12-02 03:32:03 +00:00
|
|
|
session.pop('authentication_type', None)
|
2020-01-02 22:01:13 +00:00
|
|
|
session.pop('remote_user', None)
|
2020-05-29 15:41:20 +00:00
|
|
|
logout_user()
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
|
2019-12-16 04:01:16 +00:00
|
|
|
def signin_history(username, authenticator, success):
|
|
|
|
# Get user ip address
|
|
|
|
if request.headers.getlist("X-Forwarded-For"):
|
|
|
|
request_ip = request.headers.getlist("X-Forwarded-For")[0]
|
|
|
|
request_ip = request_ip.split(',')[0]
|
|
|
|
else:
|
|
|
|
request_ip = request.remote_addr
|
|
|
|
|
|
|
|
# Write log
|
|
|
|
if success:
|
|
|
|
str_success = 'succeeded'
|
|
|
|
current_app.logger.info(
|
|
|
|
"User {} authenticated successfully via {} from {}".format(
|
|
|
|
username, authenticator, request_ip))
|
|
|
|
else:
|
|
|
|
str_success = 'failed'
|
|
|
|
current_app.logger.warning(
|
|
|
|
"User {} failed to authenticate via {} from {}".format(
|
|
|
|
username, authenticator, request_ip))
|
|
|
|
|
|
|
|
# Write history
|
|
|
|
History(msg='User {} authentication {}'.format(username, str_success),
|
2023-04-08 21:05:27 +00:00
|
|
|
detail=json.dumps({
|
|
|
|
'username': username,
|
|
|
|
'authenticator': authenticator,
|
|
|
|
'ip_address': request_ip,
|
|
|
|
'success': 1 if success else 0
|
|
|
|
}),
|
2019-12-16 04:01:16 +00:00
|
|
|
created_by='System').add()
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2021-01-31 10:31:56 +00:00
|
|
|
# Get a list of Azure security groups the user is a member of
|
|
|
|
def get_azure_groups(uri):
|
|
|
|
azure_info = azure.get(uri).text
|
|
|
|
current_app.logger.info('Azure groups returned: ' + azure_info)
|
|
|
|
grouplookup = json.loads(azure_info)
|
|
|
|
if "value" in grouplookup:
|
|
|
|
mygroups = grouplookup["value"]
|
|
|
|
# If "@odata.nextLink" exists in the results, we need to get more groups
|
|
|
|
if "@odata.nextLink" in grouplookup:
|
|
|
|
# The additional groups are added to the existing array
|
|
|
|
mygroups.extend(get_azure_groups(grouplookup["@odata.nextLink"]))
|
|
|
|
else:
|
|
|
|
mygroups = []
|
|
|
|
return mygroups
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2021-12-17 10:41:51 +00:00
|
|
|
# Handle user login, write history and, if set, handle showing the register_otp QR code.
|
|
|
|
# if Setting for OTP on first login is enabled, and OTP field is also enabled,
|
|
|
|
# but user isn't using it yet, enable OTP, get QR code and display it, logging the user out.
|
|
|
|
def authenticate_user(user, authenticator, remember=False):
|
|
|
|
login_user(user, remember=remember)
|
|
|
|
signin_history(user.username, authenticator, True)
|
2023-04-08 21:05:27 +00:00
|
|
|
if Setting().get('otp_force') and Setting().get('otp_field_enabled') and not user.otp_secret \
|
|
|
|
and session['authentication_type'] not in ['OAuth']:
|
2021-12-17 10:41:51 +00:00
|
|
|
user.update_profile(enable_otp=True)
|
|
|
|
user_id = current_user.id
|
|
|
|
prepare_welcome_user(user_id)
|
|
|
|
return redirect(url_for('index.welcome'))
|
|
|
|
return redirect(url_for('index.login'))
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2021-12-17 10:41:51 +00:00
|
|
|
# Prepare user to enter /welcome screen, otherwise they won't have permission to do so
|
|
|
|
def prepare_welcome_user(user_id):
|
|
|
|
logout_user()
|
|
|
|
session['welcome_user_id'] = user_id
|
2019-12-16 04:01:16 +00:00
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.route('/logout')
|
|
|
|
def logout():
|
|
|
|
if current_app.config.get(
|
|
|
|
'SAML_ENABLED'
|
2023-04-08 21:05:27 +00:00
|
|
|
) and 'samlSessionIndex' in session and current_app.config.get('SAML_LOGOUT'):
|
2019-12-13 14:55:11 +00:00
|
|
|
req = saml.prepare_flask_request(request)
|
|
|
|
auth = saml.init_saml_auth(req)
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_app.config.get('SAML_LOGOUT_URL'):
|
|
|
|
return redirect(
|
|
|
|
auth.logout(
|
|
|
|
name_id_format=
|
|
|
|
"urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
|
|
return_to=current_app.config.get('SAML_LOGOUT_URL'),
|
|
|
|
session_index=session['samlSessionIndex'],
|
|
|
|
name_id=session['samlNameId']))
|
|
|
|
return redirect(
|
|
|
|
auth.logout(
|
|
|
|
name_id_format=
|
|
|
|
"urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
|
|
session_index=session['samlSessionIndex'],
|
|
|
|
name_id=session['samlNameId']))
|
2020-01-02 22:01:13 +00:00
|
|
|
|
2020-08-05 11:46:07 +00:00
|
|
|
redirect_uri = url_for('index.login')
|
|
|
|
oidc_logout = Setting().get('oidc_oauth_logout_url')
|
|
|
|
|
|
|
|
if 'oidc_token' in session and oidc_logout:
|
|
|
|
redirect_uri = "{}?redirect_uri={}".format(
|
|
|
|
oidc_logout, url_for('index.login', _external=True))
|
|
|
|
|
2020-01-02 22:01:13 +00:00
|
|
|
# Clean cookies and flask session
|
2019-12-02 03:32:03 +00:00
|
|
|
clear_session()
|
2020-01-02 22:01:13 +00:00
|
|
|
|
|
|
|
# If remote user authentication is enabled and a logout URL is configured for it,
|
|
|
|
# redirect users to that instead
|
|
|
|
remote_user_logout_url = current_app.config.get('REMOTE_USER_LOGOUT_URL')
|
|
|
|
if current_app.config.get('REMOTE_USER_ENABLED') and remote_user_logout_url:
|
|
|
|
current_app.logger.debug(
|
|
|
|
'Redirecting remote user "{0}" to logout URL {1}'
|
|
|
|
.format(current_user.username, remote_user_logout_url))
|
|
|
|
# Warning: if REMOTE_USER environment variable is still set and not cleared by
|
|
|
|
# some external module, not defining a custom logout URL will trigger a loop
|
|
|
|
# that will just log the user back in right after logging out
|
|
|
|
res = make_response(redirect(remote_user_logout_url.strip()))
|
|
|
|
|
|
|
|
# Remove any custom cookies the remote authentication mechanism may use
|
|
|
|
# (e.g.: MOD_AUTH_CAS and MOD_AUTH_CAS_S)
|
|
|
|
remote_cookies = current_app.config.get('REMOTE_USER_COOKIES')
|
|
|
|
for r_cookie_name in utils.ensure_list(remote_cookies):
|
|
|
|
res.delete_cookie(r_cookie_name)
|
2020-05-29 15:41:20 +00:00
|
|
|
|
2020-01-02 22:01:13 +00:00
|
|
|
return res
|
|
|
|
|
2020-08-05 11:46:07 +00:00
|
|
|
return redirect(redirect_uri)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
|
2023-03-17 03:44:08 +00:00
|
|
|
def password_policy_check(user, password):
|
|
|
|
def check_policy(chars, user_password, setting):
|
2023-04-08 21:05:27 +00:00
|
|
|
setting_as_int = int(Setting().get(setting))
|
2023-03-17 03:44:08 +00:00
|
|
|
test_string = user_password
|
|
|
|
for c in chars:
|
|
|
|
test_string = test_string.replace(c, '')
|
2023-04-08 21:05:27 +00:00
|
|
|
return (setting_as_int, len(user_password) - len(test_string))
|
2023-03-17 03:44:08 +00:00
|
|
|
|
|
|
|
def matches_policy(item, policy_fails):
|
|
|
|
return "*" if item in policy_fails else ""
|
|
|
|
|
|
|
|
policy = []
|
|
|
|
policy_fails = {}
|
|
|
|
|
|
|
|
# If either policy is enabled check basics first ... this is obvious!
|
|
|
|
if Setting().get('pwd_enforce_characters') or Setting().get('pwd_enforce_complexity'):
|
|
|
|
# Cannot contain username
|
|
|
|
if user.username in password:
|
|
|
|
policy_fails["username"] = True
|
|
|
|
policy.append(f"{matches_policy('username', policy_fails)}cannot contain username")
|
|
|
|
|
|
|
|
# Cannot contain password
|
|
|
|
if user.firstname in password:
|
|
|
|
policy_fails["firstname"] = True
|
|
|
|
policy.append(f"{matches_policy('firstname', policy_fails)}cannot contain firstname")
|
|
|
|
|
|
|
|
# Cannot contain lastname
|
|
|
|
if user.lastname in password:
|
|
|
|
policy_fails["lastname"] = True
|
|
|
|
policy.append(f"{matches_policy('lastname', policy_fails)}cannot contain lastname")
|
|
|
|
|
|
|
|
# Cannot contain email
|
|
|
|
if user.email in password:
|
|
|
|
policy_fails["email"] = True
|
|
|
|
policy.append(f"{matches_policy('email', policy_fails)}cannot contain email")
|
|
|
|
|
|
|
|
# Check if we're enforcing character requirements
|
|
|
|
if Setting().get('pwd_enforce_characters'):
|
|
|
|
# Length
|
|
|
|
pwd_min_len_setting = int(Setting().get('pwd_min_len'))
|
|
|
|
pwd_len = len(password)
|
|
|
|
if pwd_len < pwd_min_len_setting:
|
|
|
|
policy_fails["length"] = True
|
|
|
|
policy.append(f"{matches_policy('length', policy_fails)}length={pwd_len}/{pwd_min_len_setting}")
|
|
|
|
# Digits
|
|
|
|
(pwd_min_digits_setting, pwd_digits) = check_policy(string.digits, password, 'pwd_min_digits')
|
|
|
|
if pwd_digits < pwd_min_digits_setting:
|
|
|
|
policy_fails["digits"] = True
|
|
|
|
policy.append(f"{matches_policy('digits', policy_fails)}digits={pwd_digits}/{pwd_min_digits_setting}")
|
|
|
|
# Lowercase
|
|
|
|
(pwd_min_lowercase_setting, pwd_lowercase) = check_policy(string.digits, password, 'pwd_min_lowercase')
|
|
|
|
if pwd_lowercase < pwd_min_lowercase_setting:
|
|
|
|
policy_fails["lowercase"] = True
|
2023-04-08 21:05:27 +00:00
|
|
|
policy.append(
|
|
|
|
f"{matches_policy('lowercase', policy_fails)}lowercase={pwd_lowercase}/{pwd_min_lowercase_setting}")
|
2023-03-17 03:44:08 +00:00
|
|
|
# Uppercase
|
|
|
|
(pwd_min_uppercase_setting, pwd_uppercase) = check_policy(string.digits, password, 'pwd_min_uppercase')
|
|
|
|
if pwd_uppercase < pwd_min_uppercase_setting:
|
|
|
|
policy_fails["uppercase"] = True
|
2023-04-08 21:05:27 +00:00
|
|
|
policy.append(
|
|
|
|
f"{matches_policy('uppercase', policy_fails)}uppercase={pwd_uppercase}/{pwd_min_uppercase_setting}")
|
2023-03-17 03:44:08 +00:00
|
|
|
# Special
|
|
|
|
(pwd_min_special_setting, pwd_special) = check_policy(string.digits, password, 'pwd_min_special')
|
|
|
|
if pwd_special < pwd_min_special_setting:
|
|
|
|
policy_fails["special"] = True
|
|
|
|
policy.append(f"{matches_policy('special', policy_fails)}special={pwd_special}/{pwd_min_special_setting}")
|
|
|
|
|
|
|
|
if Setting().get('pwd_enforce_complexity'):
|
|
|
|
# Complexity checking
|
|
|
|
zxcvbn_inputs = []
|
|
|
|
for input in (user.firstname, user.lastname, user.username, user.email):
|
|
|
|
if len(input):
|
|
|
|
zxcvbn_inputs.append(input)
|
|
|
|
|
|
|
|
result = zxcvbn(password, user_inputs=zxcvbn_inputs)
|
|
|
|
pwd_min_complexity_setting = int(Setting().get('pwd_min_complexity'))
|
|
|
|
pwd_complexity = result['guesses_log10']
|
|
|
|
if pwd_complexity < pwd_min_complexity_setting:
|
|
|
|
policy_fails["complexity"] = True
|
2023-04-08 21:05:27 +00:00
|
|
|
policy.append(
|
|
|
|
f"{matches_policy('complexity', policy_fails)}complexity={pwd_complexity:.0f}/{pwd_min_complexity_setting}")
|
2023-03-17 03:44:08 +00:00
|
|
|
|
|
|
|
policy_str = {"password": f"Fails policy: {', '.join(policy)}. Items prefixed with '*' failed."}
|
|
|
|
|
|
|
|
# NK: the first item in the tuple indicates a PASS, so, we check for any True's and negate that
|
|
|
|
return (not any(policy_fails.values()), policy_str)
|
|
|
|
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.route('/register', methods=['GET', 'POST'])
|
|
|
|
def register():
|
2023-04-08 21:05:27 +00:00
|
|
|
CAPTCHA_ENABLE = current_app.config.get('CAPTCHA_ENABLE')
|
|
|
|
if Setting().get('signup_enabled'):
|
|
|
|
if current_user.is_authenticated:
|
|
|
|
return redirect(url_for('index.index'))
|
|
|
|
if request.method == 'GET':
|
|
|
|
return render_template('register.html', captcha_enable=CAPTCHA_ENABLE)
|
|
|
|
elif request.method == 'POST':
|
|
|
|
username = request.form.get('username', '').strip()
|
|
|
|
password = request.form.get('password', '')
|
|
|
|
firstname = request.form.get('firstname', '').strip()
|
|
|
|
lastname = request.form.get('lastname', '').strip()
|
|
|
|
email = request.form.get('email', '').strip()
|
|
|
|
rpassword = request.form.get('rpassword', '')
|
|
|
|
|
|
|
|
is_valid_email = re.compile(r'^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$')
|
|
|
|
|
|
|
|
error_messages = {}
|
|
|
|
if not firstname:
|
|
|
|
error_messages['firstname'] = 'First Name is required'
|
|
|
|
if not lastname:
|
|
|
|
error_messages['lastname'] = 'Last Name is required'
|
|
|
|
if not username:
|
|
|
|
error_messages['username'] = 'Username is required'
|
|
|
|
if not password:
|
|
|
|
error_messages['password'] = 'Password is required'
|
|
|
|
if not rpassword:
|
|
|
|
error_messages['rpassword'] = 'Password confirmation is required'
|
|
|
|
if not email:
|
|
|
|
error_messages['email'] = 'Email is required'
|
|
|
|
if not is_valid_email.match(email):
|
|
|
|
error_messages['email'] = 'Invalid email address'
|
|
|
|
if password != rpassword:
|
|
|
|
error_messages['password'] = 'Password confirmation does not match'
|
|
|
|
error_messages['rpassword'] = 'Password confirmation does not match'
|
|
|
|
|
|
|
|
if not captcha.validate():
|
|
|
|
return render_template(
|
|
|
|
'register.html', error='Invalid CAPTCHA answer', error_messages=error_messages,
|
|
|
|
captcha_enable=CAPTCHA_ENABLE)
|
|
|
|
|
|
|
|
if error_messages:
|
|
|
|
return render_template('register.html', error_messages=error_messages, captcha_enable=CAPTCHA_ENABLE)
|
|
|
|
|
|
|
|
user = User(username=username,
|
|
|
|
plain_text_password=password,
|
|
|
|
firstname=firstname,
|
|
|
|
lastname=lastname,
|
|
|
|
email=email
|
|
|
|
)
|
|
|
|
|
|
|
|
(password_policy_pass, password_policy) = password_policy_check(user, password)
|
|
|
|
if not password_policy_pass:
|
|
|
|
return render_template('register.html', error_messages=password_policy, captcha_enable=CAPTCHA_ENABLE)
|
|
|
|
|
|
|
|
try:
|
|
|
|
result = user.create_local_user()
|
|
|
|
if result and result['status']:
|
|
|
|
if Setting().get('verify_user_email'):
|
|
|
|
send_account_verification(email)
|
|
|
|
if Setting().get('otp_force') and Setting().get('otp_field_enabled'):
|
|
|
|
user.update_profile(enable_otp=True)
|
|
|
|
prepare_welcome_user(user.id)
|
|
|
|
return redirect(url_for('index.welcome'))
|
|
|
|
else:
|
|
|
|
return redirect(url_for('index.login'))
|
|
|
|
else:
|
|
|
|
return render_template('register.html',
|
|
|
|
error=result['msg'], captcha_enable=CAPTCHA_ENABLE)
|
|
|
|
except Exception as e:
|
|
|
|
return render_template('register.html', error=e, captcha_enable=CAPTCHA_ENABLE)
|
2023-02-18 16:04:14 +00:00
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
return render_template('errors/404.html'), 404
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
|
2021-12-17 10:41:51 +00:00
|
|
|
# Show welcome page on first login if otp_force is enabled
|
|
|
|
@index_bp.route('/welcome', methods=['GET', 'POST'])
|
|
|
|
def welcome():
|
|
|
|
if 'welcome_user_id' not in session:
|
|
|
|
return redirect(url_for('index.index'))
|
|
|
|
|
|
|
|
user = User(id=session['welcome_user_id'])
|
|
|
|
encoded_img_data = base64.b64encode(user.get_qrcode_value())
|
|
|
|
|
|
|
|
if request.method == 'GET':
|
|
|
|
return render_template('register_otp.html', qrcode_image=encoded_img_data.decode(), user=user)
|
|
|
|
elif request.method == 'POST':
|
|
|
|
otp_token = request.form.get('otptoken', '')
|
|
|
|
if otp_token and otp_token.isdigit():
|
|
|
|
good_token = user.verify_totp(otp_token)
|
|
|
|
if not good_token:
|
2023-04-08 21:05:27 +00:00
|
|
|
return render_template('register_otp.html', qrcode_image=encoded_img_data.decode(), user=user,
|
|
|
|
error="Invalid token")
|
2021-12-17 10:41:51 +00:00
|
|
|
else:
|
2023-04-08 21:05:27 +00:00
|
|
|
return render_template('register_otp.html', qrcode_image=encoded_img_data.decode(), user=user,
|
|
|
|
error="Token required")
|
2021-12-17 10:41:51 +00:00
|
|
|
session.pop('welcome_user_id')
|
|
|
|
return redirect(url_for('index.index'))
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2019-12-21 14:43:03 +00:00
|
|
|
@index_bp.route('/confirm/<token>', methods=['GET'])
|
|
|
|
def confirm_email(token):
|
|
|
|
email = confirm_token(token)
|
|
|
|
if not email:
|
|
|
|
# Cannot confirm email
|
|
|
|
return render_template('email_confirmation.html', status=0)
|
|
|
|
|
|
|
|
user = User.query.filter_by(email=email).first_or_404()
|
|
|
|
if user.confirmed:
|
|
|
|
# Already confirmed
|
|
|
|
current_app.logger.info(
|
|
|
|
"User email {} already confirmed".format(email))
|
|
|
|
return render_template('email_confirmation.html', status=2)
|
|
|
|
else:
|
|
|
|
# Confirm email is valid
|
2019-12-21 15:26:56 +00:00
|
|
|
user.update_confirmed(confirmed=1)
|
2019-12-21 14:43:03 +00:00
|
|
|
current_app.logger.info(
|
|
|
|
"User email {} confirmed successfully".format(email))
|
|
|
|
return render_template('email_confirmation.html', status=1)
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/resend-confirmation-email', methods=['GET', 'POST'])
|
|
|
|
def resend_confirmation_email():
|
|
|
|
if current_user.is_authenticated:
|
|
|
|
return redirect(url_for('index.index'))
|
|
|
|
if request.method == 'GET':
|
|
|
|
return render_template('resend_confirmation_email.html')
|
|
|
|
elif request.method == 'POST':
|
|
|
|
email = request.form.get('email')
|
|
|
|
user = User.query.filter(User.email == email).first()
|
|
|
|
if not user:
|
|
|
|
# Email not found
|
|
|
|
status = 0
|
|
|
|
elif user.confirmed:
|
|
|
|
# Email already confirmed
|
|
|
|
status = 1
|
|
|
|
else:
|
|
|
|
# Send new confirmed email
|
|
|
|
send_account_verification(user.email)
|
|
|
|
status = 2
|
|
|
|
|
|
|
|
return render_template('resend_confirmation_email.html', status=status)
|
|
|
|
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
@index_bp.route('/nic/checkip.html', methods=['GET', 'POST'])
|
2022-05-27 10:53:19 +00:00
|
|
|
@csrf.exempt
|
2019-12-02 03:32:03 +00:00
|
|
|
def dyndns_checkip():
|
|
|
|
# This route covers the default ddclient 'web' setting for the checkip service
|
|
|
|
return render_template('dyndns.html',
|
|
|
|
response=request.environ.get(
|
|
|
|
'HTTP_X_REAL_IP', request.remote_addr))
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/nic/update', methods=['GET', 'POST'])
|
2022-05-27 10:53:19 +00:00
|
|
|
@csrf.exempt
|
2019-12-02 03:32:03 +00:00
|
|
|
@dyndns_login_required
|
|
|
|
def dyndns_update():
|
|
|
|
# dyndns protocol response codes in use are:
|
|
|
|
# good: update successful
|
|
|
|
# nochg: IP address already set to update address
|
|
|
|
# nohost: hostname does not exist for this user account
|
|
|
|
# 911: server error
|
|
|
|
# have to use 200 HTTP return codes because ddclient does not read the return string if the code is other than 200
|
|
|
|
# reference: https://help.dyn.com/remote-access-api/perform-update/
|
|
|
|
# reference: https://help.dyn.com/remote-access-api/return-codes/
|
|
|
|
hostname = request.args.get('hostname')
|
|
|
|
myip = request.args.get('myip')
|
|
|
|
|
|
|
|
if not hostname:
|
|
|
|
history = History(msg="DynDNS update: missing hostname parameter",
|
|
|
|
created_by=current_user.username)
|
|
|
|
history.add()
|
|
|
|
return render_template('dyndns.html', response='nohost'), 200
|
|
|
|
|
|
|
|
try:
|
|
|
|
if current_user.role.name in ['Administrator', 'Operator']:
|
|
|
|
domains = Domain.query.all()
|
|
|
|
else:
|
|
|
|
# Get query for domain to which the user has access permission.
|
|
|
|
# This includes direct domain permission AND permission through
|
|
|
|
# account membership
|
|
|
|
domains = db.session.query(Domain) \
|
|
|
|
.outerjoin(DomainUser, Domain.id == DomainUser.domain_id) \
|
|
|
|
.outerjoin(Account, Domain.account_id == Account.id) \
|
|
|
|
.outerjoin(AccountUser, Account.id == AccountUser.account_id) \
|
|
|
|
.filter(
|
2023-04-08 21:05:27 +00:00
|
|
|
db.or_(
|
|
|
|
DomainUser.user_id == current_user.id,
|
|
|
|
AccountUser.user_id == current_user.id
|
|
|
|
)).all()
|
2019-12-02 03:32:03 +00:00
|
|
|
except Exception as e:
|
|
|
|
current_app.logger.error('DynDNS Error: {0}'.format(e))
|
|
|
|
current_app.logger.debug(traceback.format_exc())
|
|
|
|
return render_template('dyndns.html', response='911'), 200
|
|
|
|
|
|
|
|
domain = None
|
|
|
|
domain_segments = hostname.split('.')
|
2019-12-14 16:13:55 +00:00
|
|
|
for _index in range(len(domain_segments)):
|
2019-12-02 03:32:03 +00:00
|
|
|
full_domain = '.'.join(domain_segments)
|
|
|
|
potential_domain = Domain.query.filter(
|
|
|
|
Domain.name == full_domain).first()
|
|
|
|
if potential_domain in domains:
|
|
|
|
domain = potential_domain
|
|
|
|
break
|
|
|
|
domain_segments.pop(0)
|
|
|
|
|
|
|
|
if not domain:
|
|
|
|
history = History(
|
|
|
|
msg=
|
|
|
|
"DynDNS update: attempted update of {0} but it does not exist for this user"
|
|
|
|
.format(hostname),
|
|
|
|
created_by=current_user.username)
|
|
|
|
history.add()
|
|
|
|
return render_template('dyndns.html', response='nohost'), 200
|
|
|
|
|
|
|
|
myip_addr = []
|
|
|
|
if myip:
|
|
|
|
for address in myip.split(','):
|
|
|
|
myip_addr += utils.validate_ipaddress(address)
|
|
|
|
|
|
|
|
remote_addr = utils.validate_ipaddress(
|
|
|
|
request.headers.get('X-Forwarded-For',
|
2022-06-18 10:11:22 +00:00
|
|
|
request.remote_addr).split(', ')[0])
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
response = 'nochg'
|
|
|
|
for ip in myip_addr or remote_addr:
|
|
|
|
if isinstance(ip, ipaddress.IPv4Address):
|
|
|
|
rtype = 'A'
|
|
|
|
else:
|
|
|
|
rtype = 'AAAA'
|
|
|
|
|
|
|
|
r = Record(name=hostname, type=rtype)
|
|
|
|
# Check if the user requested record exists within this domain
|
|
|
|
if r.exists(domain.name) and r.is_allowed_edit():
|
|
|
|
if r.data == str(ip):
|
|
|
|
# Record content did not change, return 'nochg'
|
|
|
|
history = History(
|
|
|
|
msg=
|
2019-12-16 04:01:16 +00:00
|
|
|
"DynDNS update: attempted update of {0} but record already up-to-date"
|
2019-12-02 03:32:03 +00:00
|
|
|
.format(hostname),
|
2021-03-27 18:33:11 +00:00
|
|
|
created_by=current_user.username,
|
|
|
|
domain_id=domain.id)
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
else:
|
|
|
|
oldip = r.data
|
|
|
|
result = r.update(domain.name, str(ip))
|
|
|
|
if result['status'] == 'ok':
|
|
|
|
history = History(
|
2019-12-16 04:01:16 +00:00
|
|
|
msg='DynDNS update: updated {} successfully'.format(hostname),
|
2023-04-08 21:05:27 +00:00
|
|
|
detail=json.dumps({
|
|
|
|
'domain': domain.name,
|
|
|
|
'record': hostname,
|
|
|
|
'type': rtype,
|
|
|
|
'old_value': oldip,
|
|
|
|
'new_value': str(ip)
|
|
|
|
}),
|
2021-03-27 18:33:11 +00:00
|
|
|
created_by=current_user.username,
|
|
|
|
domain_id=domain.id)
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
response = 'good'
|
|
|
|
else:
|
|
|
|
response = '911'
|
|
|
|
break
|
|
|
|
elif r.is_allowed_edit():
|
|
|
|
ondemand_creation = DomainSetting.query.filter(
|
|
|
|
DomainSetting.domain == domain).filter(
|
2023-04-08 21:05:27 +00:00
|
|
|
DomainSetting.setting == 'create_via_dyndns').first()
|
2019-12-02 03:32:03 +00:00
|
|
|
if (ondemand_creation is not None) and (strtobool(
|
|
|
|
ondemand_creation.value) == True):
|
2019-12-14 16:13:55 +00:00
|
|
|
|
|
|
|
# Build the rrset
|
|
|
|
rrset_data = [{
|
|
|
|
"changetype": "REPLACE",
|
|
|
|
"name": hostname + '.',
|
|
|
|
"ttl": 3600,
|
|
|
|
"type": rtype,
|
|
|
|
"records": [{
|
|
|
|
"content": str(ip),
|
|
|
|
"disabled": False
|
|
|
|
}],
|
|
|
|
"comments": []
|
|
|
|
}]
|
|
|
|
|
|
|
|
# Format the rrset
|
|
|
|
rrset = {"rrsets": rrset_data}
|
|
|
|
result = Record().add(domain.name, rrset)
|
2019-12-02 03:32:03 +00:00
|
|
|
if result['status'] == 'ok':
|
|
|
|
history = History(
|
|
|
|
msg=
|
2019-12-16 04:01:16 +00:00
|
|
|
'DynDNS update: created record {0} in zone {1} successfully'
|
2019-12-02 03:32:03 +00:00
|
|
|
.format(hostname, domain.name, str(ip)),
|
2023-04-08 21:05:27 +00:00
|
|
|
detail=json.dumps({
|
|
|
|
'domain': domain.name,
|
|
|
|
'record': hostname,
|
|
|
|
'value': str(ip)
|
|
|
|
}),
|
2021-03-27 18:33:11 +00:00
|
|
|
created_by=current_user.username,
|
|
|
|
domain_id=domain.id)
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
response = 'good'
|
|
|
|
else:
|
|
|
|
history = History(
|
|
|
|
msg=
|
|
|
|
'DynDNS update: attempted update of {0} but it does not exist for this user'
|
|
|
|
.format(hostname),
|
|
|
|
created_by=current_user.username)
|
|
|
|
history.add()
|
|
|
|
|
|
|
|
return render_template('dyndns.html', response=response), 200
|
|
|
|
|
|
|
|
|
|
|
|
### START SAML AUTHENTICATION ###
|
|
|
|
@index_bp.route('/saml/login')
|
|
|
|
def saml_login():
|
2022-12-18 11:50:59 +00:00
|
|
|
if not current_app.config.get('SAML_ENABLED', False):
|
2019-12-02 03:32:03 +00:00
|
|
|
abort(400)
|
2021-07-23 06:56:09 +00:00
|
|
|
from onelogin.saml2.utils import OneLogin_Saml2_Utils
|
2019-12-13 14:55:11 +00:00
|
|
|
req = saml.prepare_flask_request(request)
|
|
|
|
auth = saml.init_saml_auth(req)
|
2019-12-02 03:32:03 +00:00
|
|
|
redirect_url = OneLogin_Saml2_Utils.get_self_url(req) + url_for(
|
2019-12-14 17:59:59 +00:00
|
|
|
'index.saml_authorized')
|
2019-12-02 03:32:03 +00:00
|
|
|
return redirect(auth.login(return_to=redirect_url))
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/saml/metadata')
|
|
|
|
def saml_metadata():
|
2022-12-18 11:50:59 +00:00
|
|
|
if not current_app.config.get('SAML_ENABLED', False):
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error("SAML authentication is disabled.")
|
|
|
|
abort(400)
|
2021-07-23 06:56:09 +00:00
|
|
|
from onelogin.saml2.utils import OneLogin_Saml2_Utils
|
2019-12-13 14:55:11 +00:00
|
|
|
req = saml.prepare_flask_request(request)
|
|
|
|
auth = saml.init_saml_auth(req)
|
2019-12-02 03:32:03 +00:00
|
|
|
settings = auth.get_settings()
|
|
|
|
metadata = settings.get_sp_metadata()
|
|
|
|
errors = settings.validate_metadata(metadata)
|
|
|
|
|
|
|
|
if len(errors) == 0:
|
|
|
|
resp = make_response(metadata, 200)
|
|
|
|
resp.headers['Content-Type'] = 'text/xml'
|
|
|
|
else:
|
|
|
|
resp = make_response(errors.join(', '), 500)
|
|
|
|
return resp
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/saml/authorized', methods=['GET', 'POST'])
|
2022-05-27 10:53:19 +00:00
|
|
|
@csrf.exempt
|
2019-12-02 03:32:03 +00:00
|
|
|
def saml_authorized():
|
|
|
|
errors = []
|
2022-12-18 11:50:59 +00:00
|
|
|
if not current_app.config.get('SAML_ENABLED', False):
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error("SAML authentication is disabled.")
|
|
|
|
abort(400)
|
2022-04-12 14:50:16 +00:00
|
|
|
from onelogin.saml2.utils import OneLogin_Saml2_Utils
|
2019-12-13 14:55:11 +00:00
|
|
|
req = saml.prepare_flask_request(request)
|
|
|
|
auth = saml.init_saml_auth(req)
|
2019-12-02 03:32:03 +00:00
|
|
|
auth.process_response()
|
2023-04-08 21:05:27 +00:00
|
|
|
current_app.logger.debug(auth.get_attributes())
|
2019-12-02 03:32:03 +00:00
|
|
|
errors = auth.get_errors()
|
|
|
|
if len(errors) == 0:
|
|
|
|
session['samlUserdata'] = auth.get_attributes()
|
|
|
|
session['samlNameId'] = auth.get_nameid()
|
|
|
|
session['samlSessionIndex'] = auth.get_session_index()
|
|
|
|
self_url = OneLogin_Saml2_Utils.get_self_url(req)
|
|
|
|
self_url = self_url + req['script_name']
|
|
|
|
if 'RelayState' in request.form and self_url != request.form[
|
2023-04-08 21:05:27 +00:00
|
|
|
'RelayState']:
|
2019-12-02 03:32:03 +00:00
|
|
|
return redirect(auth.redirect_to(request.form['RelayState']))
|
|
|
|
if current_app.config.get('SAML_ATTRIBUTE_USERNAME', False):
|
|
|
|
username = session['samlUserdata'][
|
|
|
|
current_app.config['SAML_ATTRIBUTE_USERNAME']][0].lower()
|
|
|
|
else:
|
|
|
|
username = session['samlNameId'].lower()
|
|
|
|
user = User.query.filter_by(username=username).first()
|
|
|
|
if not user:
|
|
|
|
# create user
|
|
|
|
user = User(username=username,
|
|
|
|
plain_text_password=None,
|
|
|
|
email=session['samlNameId'])
|
|
|
|
user.create_local_user()
|
|
|
|
session['user_id'] = user.id
|
|
|
|
email_attribute_name = current_app.config.get('SAML_ATTRIBUTE_EMAIL',
|
|
|
|
'email')
|
|
|
|
givenname_attribute_name = current_app.config.get(
|
|
|
|
'SAML_ATTRIBUTE_GIVENNAME', 'givenname')
|
|
|
|
surname_attribute_name = current_app.config.get(
|
|
|
|
'SAML_ATTRIBUTE_SURNAME', 'surname')
|
|
|
|
name_attribute_name = current_app.config.get('SAML_ATTRIBUTE_NAME',
|
|
|
|
None)
|
|
|
|
account_attribute_name = current_app.config.get(
|
|
|
|
'SAML_ATTRIBUTE_ACCOUNT', None)
|
|
|
|
admin_attribute_name = current_app.config.get('SAML_ATTRIBUTE_ADMIN',
|
|
|
|
None)
|
|
|
|
group_attribute_name = current_app.config.get('SAML_ATTRIBUTE_GROUP',
|
|
|
|
None)
|
|
|
|
admin_group_name = current_app.config.get('SAML_GROUP_ADMIN_NAME',
|
|
|
|
None)
|
2022-05-23 04:38:16 +00:00
|
|
|
operator_group_name = current_app.config.get('SAML_GROUP_OPERATOR_NAME',
|
2023-04-08 21:05:27 +00:00
|
|
|
None)
|
2019-12-02 03:32:03 +00:00
|
|
|
group_to_account_mapping = create_group_to_account_mapping()
|
|
|
|
|
|
|
|
if email_attribute_name in session['samlUserdata']:
|
|
|
|
user.email = session['samlUserdata'][email_attribute_name][
|
|
|
|
0].lower()
|
|
|
|
if givenname_attribute_name in session['samlUserdata']:
|
|
|
|
user.firstname = session['samlUserdata'][givenname_attribute_name][
|
|
|
|
0]
|
|
|
|
if surname_attribute_name in session['samlUserdata']:
|
|
|
|
user.lastname = session['samlUserdata'][surname_attribute_name][0]
|
|
|
|
if name_attribute_name in session['samlUserdata']:
|
|
|
|
name = session['samlUserdata'][name_attribute_name][0].split(' ')
|
|
|
|
user.firstname = name[0]
|
|
|
|
user.lastname = ' '.join(name[1:])
|
|
|
|
|
|
|
|
if group_attribute_name:
|
|
|
|
user_groups = session['samlUserdata'].get(group_attribute_name, [])
|
|
|
|
else:
|
|
|
|
user_groups = []
|
|
|
|
if admin_attribute_name or group_attribute_name:
|
2021-05-07 21:36:55 +00:00
|
|
|
user_accounts = set(user.get_accounts())
|
2019-12-02 03:32:03 +00:00
|
|
|
saml_accounts = []
|
|
|
|
for group_mapping in group_to_account_mapping:
|
|
|
|
mapping = group_mapping.split('=')
|
|
|
|
group = mapping[0]
|
|
|
|
account_name = mapping[1]
|
|
|
|
|
|
|
|
if group in user_groups:
|
|
|
|
account = handle_account(account_name)
|
|
|
|
saml_accounts.append(account)
|
|
|
|
|
|
|
|
for account_name in session['samlUserdata'].get(
|
|
|
|
account_attribute_name, []):
|
|
|
|
account = handle_account(account_name)
|
|
|
|
saml_accounts.append(account)
|
|
|
|
saml_accounts = set(saml_accounts)
|
|
|
|
for account in saml_accounts - user_accounts:
|
|
|
|
account.add_user(user)
|
|
|
|
history = History(msg='Adding {0} to account {1}'.format(
|
|
|
|
user.username, account.name),
|
2023-04-08 21:05:27 +00:00
|
|
|
created_by='SAML Assertion')
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
for account in user_accounts - saml_accounts:
|
|
|
|
account.remove_user(user)
|
|
|
|
history = History(msg='Removing {0} from account {1}'.format(
|
|
|
|
user.username, account.name),
|
2023-04-08 21:05:27 +00:00
|
|
|
created_by='SAML Assertion')
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
if admin_attribute_name and 'true' in session['samlUserdata'].get(
|
|
|
|
admin_attribute_name, []):
|
|
|
|
uplift_to_admin(user)
|
|
|
|
elif admin_group_name in user_groups:
|
|
|
|
uplift_to_admin(user)
|
2022-05-23 04:38:16 +00:00
|
|
|
elif operator_group_name in user_groups:
|
|
|
|
uplift_to_operator(user)
|
2019-12-02 03:32:03 +00:00
|
|
|
elif admin_attribute_name or group_attribute_name:
|
|
|
|
if user.role.name != 'User':
|
|
|
|
user.role_id = Role.query.filter_by(name='User').first().id
|
|
|
|
history = History(msg='Demoting {0} to user'.format(
|
|
|
|
user.username),
|
2023-04-08 21:05:27 +00:00
|
|
|
created_by='SAML Assertion')
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
user.plain_text_password = None
|
|
|
|
user.update_profile()
|
|
|
|
session['authentication_type'] = 'SAML'
|
2021-12-17 10:41:51 +00:00
|
|
|
return authenticate_user(user, 'SAML')
|
2019-12-02 03:32:03 +00:00
|
|
|
else:
|
|
|
|
return render_template('errors/SAML.html', errors=errors)
|
|
|
|
|
|
|
|
|
|
|
|
def create_group_to_account_mapping():
|
|
|
|
group_to_account_mapping_string = current_app.config.get(
|
|
|
|
'SAML_GROUP_TO_ACCOUNT_MAPPING', None)
|
|
|
|
if group_to_account_mapping_string and len(
|
|
|
|
group_to_account_mapping_string.strip()) > 0:
|
|
|
|
group_to_account_mapping = group_to_account_mapping_string.split(',')
|
|
|
|
else:
|
|
|
|
group_to_account_mapping = []
|
|
|
|
return group_to_account_mapping
|
|
|
|
|
|
|
|
|
2020-03-06 15:01:18 +00:00
|
|
|
def handle_account(account_name, account_description=""):
|
2021-12-31 08:51:12 +00:00
|
|
|
clean_name = Account.sanitize_name(account_name)
|
2019-12-02 03:32:03 +00:00
|
|
|
account = Account.query.filter_by(name=clean_name).first()
|
|
|
|
if not account:
|
2021-12-31 08:51:12 +00:00
|
|
|
account = Account(name=clean_name,
|
2020-03-06 15:01:18 +00:00
|
|
|
description=account_description,
|
2019-12-02 03:32:03 +00:00
|
|
|
contact='',
|
|
|
|
mail='')
|
|
|
|
account.create_account()
|
|
|
|
history = History(msg='Account {0} created'.format(account.name),
|
2020-03-06 15:01:18 +00:00
|
|
|
created_by='OIDC/SAML Assertion')
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
2020-03-06 15:01:18 +00:00
|
|
|
else:
|
|
|
|
account.description = account_description
|
|
|
|
account.update_account()
|
2019-12-02 03:32:03 +00:00
|
|
|
return account
|
|
|
|
|
|
|
|
|
|
|
|
def uplift_to_admin(user):
|
|
|
|
if user.role.name != 'Administrator':
|
|
|
|
user.role_id = Role.query.filter_by(name='Administrator').first().id
|
|
|
|
history = History(msg='Promoting {0} to administrator'.format(
|
|
|
|
user.username),
|
2023-04-08 21:05:27 +00:00
|
|
|
created_by='SAML Assertion')
|
2019-12-02 03:32:03 +00:00
|
|
|
history.add()
|
|
|
|
|
2023-04-08 21:05:27 +00:00
|
|
|
|
2022-05-23 04:38:16 +00:00
|
|
|
def uplift_to_operator(user):
|
|
|
|
if user.role.name != 'Operator':
|
|
|
|
user.role_id = Role.query.filter_by(name='Operator').first().id
|
|
|
|
history = History(msg='Promoting {0} to operator'.format(
|
|
|
|
user.username),
|
2023-04-08 21:05:27 +00:00
|
|
|
created_by='SAML Assertion')
|
2022-05-23 04:38:16 +00:00
|
|
|
history.add()
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
@index_bp.route('/saml/sls')
|
|
|
|
def saml_logout():
|
2019-12-13 14:55:11 +00:00
|
|
|
req = saml.prepare_flask_request(request)
|
|
|
|
auth = saml.init_saml_auth(req)
|
2019-12-02 03:32:03 +00:00
|
|
|
url = auth.process_slo()
|
|
|
|
errors = auth.get_errors()
|
|
|
|
if len(errors) == 0:
|
|
|
|
clear_session()
|
|
|
|
if url is not None:
|
|
|
|
return redirect(url)
|
|
|
|
elif current_app.config.get('SAML_LOGOUT_URL') is not None:
|
|
|
|
return redirect(current_app.config.get('SAML_LOGOUT_URL'))
|
|
|
|
else:
|
|
|
|
return redirect(url_for('login'))
|
|
|
|
else:
|
|
|
|
return render_template('errors/SAML.html', errors=errors)
|
|
|
|
|
|
|
|
|
|
|
|
### END SAML AUTHENTICATION ###
|
|
|
|
|
|
|
|
|
|
|
|
@index_bp.route('/swagger', methods=['GET'])
|
|
|
|
def swagger_spec():
|
|
|
|
try:
|
|
|
|
spec_path = os.path.join(current_app.root_path, "swagger-spec.yaml")
|
|
|
|
spec = open(spec_path, 'r')
|
|
|
|
loaded_spec = load(spec.read(), Loader)
|
|
|
|
except Exception as e:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Cannot view swagger spec. Error: {0}'.format(e))
|
|
|
|
current_app.logger.debug(traceback.format_exc())
|
|
|
|
abort(500)
|
|
|
|
|
|
|
|
resp = make_response(json.dumps(loaded_spec), 200)
|
|
|
|
resp.headers['Content-Type'] = 'application/json'
|
|
|
|
|
|
|
|
return resp
|