Compare commits
	
		
			70 Commits
		
	
	
		
			version/0.
			...
			version/0.
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 95de6a14fd | |||
| 17132ebc19 | |||
| 289be46388 | |||
| 6c300b7b31 | |||
| b726583084 | |||
| 48055d1cfd | |||
| 436070f5bd | |||
| 3ee79818db | |||
| e7a02104db | |||
| 556740d7bc | |||
| 421f51770c | |||
| 96f7e70f9e | |||
| ad96f7dbb8 | |||
| e7fb48eba2 | |||
| b19b5b644d | |||
| 250b6691d4 | |||
| e3b02a6e78 | |||
| e94ef34d8f | |||
| 49e945307a | |||
| edfe0e5450 | |||
| 06b65a7882 | |||
| ff9bc8aa70 | |||
| 28da67abe6 | |||
| 39d9fe9bf0 | |||
| 750117b0fd | |||
| 983462f80d | |||
| 4ae31d409b | |||
| 98b414f3e2 | |||
| a0d42092e3 | |||
| f2569b6424 | |||
| 9d344d887c | |||
| 7e9154a0ea | |||
| e0ef061771 | |||
| b8694a7ade | |||
| 10d6a30f2c | |||
| 8c94aef6d0 | |||
| 19bd3bfffb | |||
| 8611ac624c | |||
| fa93b59a8c | |||
| 8b66b40f0d | |||
| c2756f15fc | |||
| 408e205c5f | |||
| 5f3ab49535 | |||
| 33431ae013 | |||
| b40ac6dc5d | |||
| fec9b5cf94 | |||
| 986fed3e7c | |||
| da5568b571 | |||
| 07f5dce97a | |||
| bb81bb5a8d | |||
| 9c2cfd7db4 | |||
| 292fbecca0 | |||
| e5a405bf43 | |||
| 66c0fc9d9a | |||
| 5fa8711bfa | |||
| dd9cd7aa0c | |||
| 8bc8765035 | |||
| b7ac4f1dd2 | |||
| 183308e444 | |||
| c941107d42 | |||
| d3d75737ed | |||
| 458decfbb3 | |||
| 7601351f51 | |||
| df45797b4a | |||
| 744a320731 | |||
| 89722336e3 | |||
| d6f4832e90 | |||
| d32699b332 | |||
| 59a15c988f | |||
| 57e5996513 | 
| @ -1,5 +1,5 @@ | ||||
| [bumpversion] | ||||
| current_version = 0.0.6-alpha | ||||
| current_version = 0.0.12-alpha | ||||
| tag = True | ||||
| commit = True | ||||
| parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*) | ||||
| @ -14,6 +14,8 @@ values = | ||||
| 	beta | ||||
| 	stable | ||||
|  | ||||
| [bumpversion:file:helm/passbook/values.yaml] | ||||
|  | ||||
| [bumpversion:file:helm/passbook/Chart.yaml] | ||||
|  | ||||
| [bumpversion:file:.gitlab-ci.yml] | ||||
| @ -40,5 +42,5 @@ values = | ||||
|  | ||||
| [bumpversion:file:passbook/oauth_provider/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/totp/__init__.py] | ||||
| [bumpversion:file:passbook/otp/__init__.py] | ||||
|  | ||||
|  | ||||
| @ -1,3 +1,4 @@ | ||||
| env | ||||
| helm | ||||
| passbook-ui | ||||
| static | ||||
|  | ||||
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -189,5 +189,5 @@ pyvenv.cfg | ||||
| pip-selfcheck.json | ||||
|  | ||||
| # End of https://www.gitignore.io/api/python,django | ||||
| static/ | ||||
| /static/ | ||||
| local.env.yml | ||||
|  | ||||
| @ -8,7 +8,14 @@ stages: | ||||
|   - test | ||||
|   - build | ||||
|   - docs | ||||
| image: python:3.5 | ||||
| image: python:3.6 | ||||
| services: | ||||
|   - postgres:latest | ||||
|  | ||||
| variables: | ||||
|   POSTGRES_DB: passbook | ||||
|   POSTGRES_USER: passbook | ||||
|   POSTGRES_PASSWORD: 'EK-5jnKfjrGRm<77' | ||||
|  | ||||
| include: | ||||
|   - /allauth/.gitlab-ci.yml | ||||
| @ -44,9 +51,9 @@ package-docker: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|     - echo "{\"auths\":{\"https://docker.$NEXUS_URL/\":{\"username\":\"$NEXUS_USER\",\"password\":\"$NEXUS_PASS\"}}}" > /kaniko/.docker/config.json | ||||
|     - echo "{\"auths\":{\"docker.$NEXUS_URL\":{\"auth\":\"$NEXUS_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.0.6-alpha | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.0.12-alpha | ||||
|   stage: build | ||||
|   only: | ||||
|     - tags | ||||
| @ -57,7 +64,7 @@ package-helm: | ||||
|     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
|     - helm init --client-only | ||||
|     - helm package helm/passbook | ||||
|     - ./manage.py nexus_upload --method put --url $NEXUS_URL --user $NEXUS_USER --password $NEXUS_PASS --repo helm *.tgz | ||||
|     - ./manage.py nexus_upload --method put --url $NEXUS_URL --auth $NEXUS_AUTH --repo helm *.tgz | ||||
|   only: | ||||
|     - tags | ||||
|     - /^version/.*$/ | ||||
|  | ||||
							
								
								
									
										12
									
								
								.prospector.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								.prospector.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,12 @@ | ||||
| strictness: medium | ||||
| test-warnings: true | ||||
| doc-warnings: false | ||||
|  | ||||
| ignore-paths: | ||||
|   - env | ||||
|   - migrations | ||||
|   - docs | ||||
|   - node_modules | ||||
|  | ||||
| uses: | ||||
|  - django | ||||
| @ -16,7 +16,7 @@ FROM python:3.6-slim-stretch | ||||
| COPY ./passbook/ /app/passbook | ||||
| COPY ./manage.py /app/ | ||||
| COPY ./requirements.txt /app/ | ||||
| COPY --from=build /app/static/* /app/static/ | ||||
| COPY --from=build /app/static /app/static/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
|  | ||||
							
								
								
									
										14
									
								
								TODO
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								TODO
									
									
									
									
									
								
							| @ -1,14 +0,0 @@ | ||||
| ## oauth_client | ||||
|  | ||||
|  - Move provider_type logic to own class, not name-based URL matching | ||||
|  - add provider_type field to Provider Model | ||||
|  - make Provider inherit core.application | ||||
|  - Add template for popular services like github, twitter, facebook, etc | ||||
|  | ||||
| ## saml_idp | ||||
|  | ||||
|  - move certificates to Provider so each provider can have different certificates | ||||
|  | ||||
| ## admin | ||||
|  | ||||
|  - add testing page where user can supply input and let rules run against it to debug/test | ||||
| @ -1,6 +1,5 @@ | ||||
| """passbook provider""" | ||||
| from allauth.socialaccount.providers.oauth2.urls import default_urlpatterns | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
| urlpatterns = default_urlpatterns(PassbookProvider) | ||||
|  | ||||
| @ -1,10 +1,10 @@ | ||||
| """passbook adapter""" | ||||
| import requests | ||||
|  | ||||
| from allauth.socialaccount import app_settings | ||||
| from allauth.socialaccount.providers.oauth2.views import (OAuth2Adapter, | ||||
|                                                           OAuth2CallbackView, | ||||
|                                                           OAuth2LoginView) | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
|  | ||||
|  | ||||
| @ -1,6 +1,6 @@ | ||||
| apiVersion: v1 | ||||
| appVersion: "0.0.6-alpha" | ||||
| appVersion: "0.0.12-alpha" | ||||
| description: A Helm chart for passbook. | ||||
| name: passbook | ||||
| version: 1.0.0 | ||||
| version: "0.0.12-alpha" | ||||
| icon: https://passbook.beryju.org/images/logo.png | ||||
|  | ||||
| @ -36,7 +36,7 @@ data: | ||||
|     debug: false | ||||
|     secure_proxy_header: | ||||
|       HTTP_X_FORWARDED_PROTO: https | ||||
|     redis: {{ .Release.Name }}-redis | ||||
|     redis: ":{{ .Values.redis.password }}@{{ .Release.Name }}-redis-master" | ||||
|     # Error reporting, sends stacktrace to sentry.services.beryju.org | ||||
|     error_report_enabled: {{ .Values.config.error_reporting }} | ||||
|  | ||||
|  | ||||
| @ -5,7 +5,7 @@ | ||||
| replicaCount: 1 | ||||
|  | ||||
| image: | ||||
|   tag: latest | ||||
|   tag: 0.0.12-alpha | ||||
|  | ||||
| nameOverride: "" | ||||
|  | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook admin""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
							
								
								
									
										6
									
								
								passbook/admin/api/urls.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								passbook/admin/api/urls.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,6 @@ | ||||
| """Versioned Admin API Urls""" | ||||
| from django.conf.urls import include, url | ||||
|  | ||||
| urlpatterns = [ | ||||
|     url(r'^v1/', include('passbook.admin.api.v1.urls', namespace='v1')), | ||||
| ] | ||||
							
								
								
									
										22
									
								
								passbook/admin/api/v1/applications.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										22
									
								
								passbook/admin/api/v1/applications.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,22 @@ | ||||
| """passbook admin application API""" | ||||
| from rest_framework.permissions import IsAdminUser | ||||
| from rest_framework.serializers import ModelSerializer | ||||
| from rest_framework.viewsets import ModelViewSet | ||||
|  | ||||
| from passbook.core.models import Application | ||||
|  | ||||
|  | ||||
| class ApplicationSerializer(ModelSerializer): | ||||
|     """Application Serializer""" | ||||
|  | ||||
|     class Meta: | ||||
|         model = Application | ||||
|         fields = '__all__' | ||||
|  | ||||
|  | ||||
| class ApplicationViewSet(ModelViewSet): | ||||
|     """Application Viewset""" | ||||
|  | ||||
|     permission_classes = [IsAdminUser] | ||||
|     serializer_class = ApplicationSerializer | ||||
|     queryset = Application.objects.all() | ||||
| @ -1,9 +1,33 @@ | ||||
| """passbook admin API URLs""" | ||||
| from django.urls import path | ||||
| from drf_yasg import openapi | ||||
| from drf_yasg.views import get_schema_view | ||||
| from rest_framework import permissions | ||||
| from rest_framework.routers import DefaultRouter | ||||
|  | ||||
| from passbook.admin.api.v1.applications import ApplicationViewSet | ||||
| from passbook.admin.api.v1.groups import GroupViewSet | ||||
| from passbook.admin.api.v1.users import UserViewSet | ||||
|  | ||||
| router = DefaultRouter() | ||||
| router.register(r'groups', GroupViewSet) | ||||
| router.register('applications', ApplicationViewSet) | ||||
| router.register('groups', GroupViewSet) | ||||
| router.register('users', UserViewSet) | ||||
|  | ||||
| urlpatterns = router.urls | ||||
| SchemaView = get_schema_view( | ||||
|     openapi.Info( | ||||
|         title="passbook Administration API", | ||||
|         default_version='v1', | ||||
|         description="Internal passbook API for Administration Interface", | ||||
|         contact=openapi.Contact(email="contact@snippets.local"), | ||||
|         license=openapi.License(name="MIT License"), | ||||
|     ), | ||||
|     public=True, | ||||
|     permission_classes=(permissions.IsAdminUser,), | ||||
| ) | ||||
|  | ||||
| urlpatterns = router.urls + [ | ||||
|     path('swagger.yml', SchemaView.without_ui(cache_timeout=0), name='schema-json'), | ||||
|     path('swagger/', SchemaView.with_ui('swagger', cache_timeout=0), name='schema-swagger-ui'), | ||||
| ] | ||||
| app_name = 'passbook.admin' | ||||
|  | ||||
							
								
								
									
										23
									
								
								passbook/admin/api/v1/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/admin/api/v1/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | ||||
| """passbook admin user API""" | ||||
| from rest_framework.permissions import IsAdminUser | ||||
| from rest_framework.serializers import ModelSerializer | ||||
| from rest_framework.viewsets import ModelViewSet | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
|  | ||||
| class UserSerializer(ModelSerializer): | ||||
|     """User Serializer""" | ||||
|  | ||||
|     class Meta: | ||||
|         model = User | ||||
|         fields = ['is_superuser', 'username', 'first_name', 'last_name', 'email', 'date_joined', | ||||
|                   'uuid'] | ||||
|  | ||||
|  | ||||
| class UserViewSet(ModelViewSet): | ||||
|     """User Viewset""" | ||||
|  | ||||
|     permission_classes = [IsAdminUser] | ||||
|     serializer_class = UserSerializer | ||||
|     queryset = User.objects.all() | ||||
| @ -4,7 +4,7 @@ from django import forms | ||||
| from passbook.core.models import User | ||||
| 
 | ||||
| 
 | ||||
| class RuleTestForm(forms.Form): | ||||
|     """Form to test rule against user""" | ||||
| class PolicyTestForm(forms.Form): | ||||
|     """Form to test policies against user""" | ||||
| 
 | ||||
|     user = forms.ModelChoiceField(queryset=User.objects.all()) | ||||
| @ -1,6 +1,6 @@ | ||||
| """passbook core source form fields""" | ||||
| # from django import forms | ||||
|  | ||||
| SOURCE_FORM_FIELDS = ['name', 'slug', 'enabled'] | ||||
| SOURCE_FORM_FIELDS = ['name', 'slug', 'enabled', 'policies'] | ||||
|  | ||||
| # class SourceForm(forms.Form) | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| django-rest-framework | ||||
| django-rest-swagger | ||||
| drf_yasg | ||||
|  | ||||
| @ -9,7 +9,9 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Applications" %}</h1> | ||||
|     <h1><span class="pficon-applications"></span> {% trans "Applications" %}</h1> | ||||
|     <span>{% trans "External Applications which use passbook as Identity-Provider, utilizing protocols like OAuth2 and SAML." %}</span> | ||||
|     <hr> | ||||
|     <a href="{% url 'passbook_admin:application-create' %}" class="btn btn-primary"> | ||||
|         {% trans 'Create...' %} | ||||
|     </a> | ||||
| @ -28,8 +30,10 @@ | ||||
|                 <td>{{ application.name }}</td> | ||||
|                 <td>{{ application.provider }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -8,8 +8,7 @@ | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Audit Log" %}</h1> | ||||
| <h1><span class="pficon-catalog"></span> {% trans "Audit Log" %}</h1> | ||||
| <div id="pf-list-standard" class="list-group list-view-pf list-view-pf-view"> | ||||
|     {% for entry in object_list %} | ||||
|     <div class="list-group-item"> | ||||
| @ -23,6 +22,7 @@ | ||||
|                         {{ entry.action }} | ||||
|                     </div> | ||||
|                     <div class="list-group-item-text"> | ||||
|                         {{ entry.context }} | ||||
|                     </div> | ||||
|                 </div> | ||||
|                 <div class="list-view-pf-additional-info"> | ||||
| @ -30,20 +30,23 @@ | ||||
|                         <span class="pficon pficon-user"></span> | ||||
|                         <strong>{{ entry.user }}</strong> | ||||
|                     </div> | ||||
|             <div class="list-view-pf-additional-info-item"> | ||||
|               <span class="pficon pficon-screen"></span> | ||||
|               <strong>{{ entry.request_ip }}</strong> | ||||
|             </div> | ||||
|                     <div class="list-view-pf-additional-info-item"> | ||||
|                         <span class="pficon pficon-cluster"></span> | ||||
|                         <strong>{{ entry.app|default:'-' }}</strong> | ||||
|                     </div> | ||||
|                     <div class="list-view-pf-additional-info-item"> | ||||
|                         <span class="fa fa-clock-o"></span> | ||||
|                         <strong>{{ entry.created }}</strong> | ||||
|                     </div> | ||||
|                     <div class="list-view-pf-additional-info-item"> | ||||
|                         <span class="pficon pficon-screen"></span> | ||||
|                         <strong>{{ entry.request_ip }}</strong> | ||||
|                     </div> | ||||
|                 </div> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     {% endfor %} | ||||
|   </div> | ||||
|     <script> | ||||
|         $(document).ready(function () { | ||||
|             // Row Checkbox Selection | ||||
|  | ||||
| @ -17,8 +17,11 @@ | ||||
|   <li class="{% is_active 'passbook_admin:providers' 'passbook_admin:provider-create' 'passbook_admin:provider-update' 'passbook_admin:provider-delete' %}"> | ||||
|     <a href="{% url 'passbook_admin:providers' %}">{% trans 'Providers' %}</a> | ||||
|   </li> | ||||
|   <li class="{% is_active 'passbook_admin:rules' 'passbook_admin:rule-create' 'passbook_admin:rule-update' 'passbook_admin:rule-delete' 'passbook_admin:rule-test' %}"> | ||||
|     <a href="{% url 'passbook_admin:rules' %}">{% trans 'Rules' %}</a> | ||||
|   <li class="{% is_active 'passbook_admin:factors' 'passbook_admin:factor-create' 'passbook_admin:factor-update' 'passbook_admin:factor-delete' %}"> | ||||
|     <a href="{% url 'passbook_admin:factors' %}">{% trans 'Factors' %}</a> | ||||
|   </li> | ||||
|   <li class="{% is_active 'passbook_admin:policies' 'passbook_admin:policy-create' 'passbook_admin:policy-update' 'passbook_admin:policy-delete' 'passbook_admin:policy-test' %}"> | ||||
|     <a href="{% url 'passbook_admin:policies' %}">{% trans 'Policies' %}</a> | ||||
|   </li> | ||||
|   <li class="{% is_active 'passbook_admin:invitations' 'passbook_admin:invitation-create' 'passbook_admin:invitation-update' 'passbook_admin:invitation-delete' 'passbook_admin:invitation-test' %}"> | ||||
|     <a href="{% url 'passbook_admin:invitations' %}">{% trans 'Invitations' %}</a> | ||||
|  | ||||
							
								
								
									
										62
									
								
								passbook/admin/templates/administration/factor/list.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								passbook/admin/templates/administration/factor/list.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,62 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
| {% load admin_reflection %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1><span class="pficon-plugged"></span> {% trans "Factors" %}</h1> | ||||
|     <span>{% trans "Factors required for a user to successfully authenticate." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|             {% trans 'Create...' %} | ||||
|             <span class="caret"></span> | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:factor-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Type' %}</th> | ||||
|                 <th>{% trans 'Order' %}</th> | ||||
|                 <th>{% trans 'Enabled?' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for factor in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ factor.name }} ({{ factor.slug }})</td> | ||||
|                 <td>{{ factor.type }}</td> | ||||
|                 <td>{{ factor.order }}</td> | ||||
|                 <td>{{ factor.enabled }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:factor-update' pk=factor.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:factor-delete' pk=factor.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     {% get_links factor as links %} | ||||
|                     {% for name, href in links.items %} | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     {% endfor %} | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|         </tbody> | ||||
|     </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
| @ -9,7 +9,9 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Invitations" %}</h1> | ||||
|     <h1><span class="pficon-migration"></span> {% trans "Invitations" %}</h1> | ||||
|     <span>{% trans "Create Invitation Links which optionally force a username or expire on a set date." %}</span> | ||||
|     <hr> | ||||
|     <a href="{% url 'passbook_admin:invitation-create' %}" class="btn btn-primary"> | ||||
|         {% trans 'Create...' %} | ||||
|     </a> | ||||
| @ -26,9 +28,12 @@ | ||||
|             {% for invitation in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ invitation.expires|default:"Never" }}</td> | ||||
|           <td><pre>{{ invitation.link }}</pre></td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <pre>{{ invitation.link }}</pre> | ||||
|                 </td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -7,11 +7,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:applications' %}"> | ||||
|                     <span class="pficon-applications"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ application_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:applications' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ application_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -19,11 +26,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:sources' %}"> | ||||
|                     <span class="pficon-resource-pool"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Sources' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ provider_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:sources' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ source_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -31,11 +45,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Rules' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:providers' %}"> | ||||
|                     <span class="pficon-integration"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ rule_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:providers' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ provider_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -43,11 +64,113 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:factors' %}"> | ||||
|                     <span class="pficon-plugged"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Factors' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ user_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:factors' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ factor_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="{% url 'passbook_admin:policies' %}"> | ||||
|                     <span class="pficon-infrastructure"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Policies' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:policies' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ policy_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="{% url 'passbook_admin:invitations' %}"> | ||||
|                     <span class="pficon-migration"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Invitation' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:invitations' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ invitation_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="{% url 'passbook_admin:users' %}"> | ||||
|                     <span class="pficon-users"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:users' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ user_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"> | ||||
|                     <span class="pficon-bundle"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Version' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="#"> | ||||
|                             {{ version }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"> | ||||
|                     <span class="pficon-server"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Worker(s)' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="#"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ worker_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|  | ||||
							
								
								
									
										54
									
								
								passbook/admin/templates/administration/policy/list.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								passbook/admin/templates/administration/policy/list.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,54 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1><span class="pficon-infrastructure"></span> {% trans "Policies" %}</h1> | ||||
|     <span>{% trans "Allow users to use Applications based on properties, enforce Password Criteria and selectively apply Factors." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|             {% trans 'Create...' %} | ||||
|             <span class="caret"></span> | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:policy-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Class' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for policy in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ policy.name }}</td> | ||||
|                 <td>{{ policy|fieldtype }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-update' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-test' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-delete' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|         </tbody> | ||||
|     </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
							
								
								
									
										7
									
								
								passbook/admin/templates/administration/policy/test.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								passbook/admin/templates/administration/policy/test.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,7 @@ | ||||
| {% extends 'generic/form.html' %} | ||||
|  | ||||
| {% load i18n %} | ||||
|  | ||||
| {% block above_form %} | ||||
| <h1>{% blocktrans with policy=policy %}Test policy {{ policy }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
| @ -10,7 +10,9 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Providers" %}</h1> | ||||
|     <h1><span class="pficon-integration"></span> {% trans "Providers" %}</h1> | ||||
|     <span>{% trans "Authentication Protocol Provider, used as Protocol behind an Application." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|             {% trans 'Create...' %} | ||||
| @ -18,7 +20,8 @@ | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:provider-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:provider-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -37,11 +40,14 @@ | ||||
|                 <td>{{ provider.name }}</td> | ||||
|                 <td>{{ provider|fieldtype }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     {% get_links provider as links %} | ||||
|                     {% for name, href in links.items %} | ||||
|               <a class="btn btn-default btn-sm" href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     {% endfor %} | ||||
|                 </td> | ||||
|             </tr> | ||||
|  | ||||
| @ -1,48 +0,0 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Rules" %}</h1> | ||||
|   <div class="dropdown"> | ||||
|     <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|       {% trans 'Create...' %} | ||||
|       <span class="caret"></span> | ||||
|     </button> | ||||
|     <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|       {% for type, name in types.items %} | ||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:rule-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|       {% endfor %} | ||||
|     </ul> | ||||
|   </div> | ||||
|   <hr> | ||||
|   <table class="table table-striped table-bordered"> | ||||
|     <thead> | ||||
|       <tr> | ||||
|         <th>{% trans 'Name' %}</th> | ||||
|         <th>{% trans 'Class' %}</th> | ||||
|         <th></th> | ||||
|       </tr> | ||||
|     </thead> | ||||
|     <tbody> | ||||
|       {% for rule in object_list %} | ||||
|         <tr> | ||||
|           <td>{{ rule.name }}</td> | ||||
|           <td>{{ rule|fieldtype }}</td> | ||||
|           <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-update' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-test' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-delete' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|           </td> | ||||
|         </tr> | ||||
|       {% endfor %} | ||||
|     </tbody> | ||||
|   </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
| @ -1,7 +0,0 @@ | ||||
| {% extends 'generic/form.html' %} | ||||
|  | ||||
| {% load i18n %} | ||||
|  | ||||
| {% block above_form %} | ||||
| <h1>{% blocktrans with rule=rule %}Test rule {{ rule }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
| @ -6,7 +6,9 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Sources" %}</h1> | ||||
|     <h1><span class="pficon-resource-pool"></span> {% trans "Sources" %}</h1> | ||||
|     <span>{% trans "External Sources which can be used to get Identities into passbook, for example Social Providers like Twiter and GitHub or Enterprise Providers like ADFS and LDAP." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|             {% trans 'Create...' %} | ||||
| @ -14,7 +16,8 @@ | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:source-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:source-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -24,6 +27,7 @@ | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Class' %}</th> | ||||
|                 <th>{% trans 'Additional Info' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
| @ -32,12 +36,16 @@ | ||||
|             <tr> | ||||
|                 <td>{{ source.name }}</td> | ||||
|                 <td>{{ source|fieldtype }}</td> | ||||
|                 <td>{{ source.additional_info }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:source-delete' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:source-delete' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     {% get_links source as links %} | ||||
|                     {% for name, href in links %} | ||||
|               <a class="btn btn-default btn-sm" href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     {% endfor %} | ||||
|                 </td> | ||||
|             </tr> | ||||
|  | ||||
| @ -5,7 +5,7 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Users" %}</h1> | ||||
|     <h1><span class="pficon-users"></span> {% trans "Users" %}</h1> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
| @ -27,8 +27,12 @@ | ||||
|                 <td>{{ user.is_active }}</td> | ||||
|                 <td>{{ user.last_login }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-password-reset' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Reset Password' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -5,3 +5,7 @@ | ||||
| {% block above_form %} | ||||
| <h1>{% trans 'Create' %}</h1> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block action %} | ||||
| {% trans 'Create' %} | ||||
| {% endblock %} | ||||
|  | ||||
| @ -11,7 +11,7 @@ | ||||
|     <form action="" method="post" class="form-horizontal"> | ||||
|       {% include 'partials/form.html' with form=form %} | ||||
|       <a class="btn btn-default" href="{% back %}">{% trans "Cancel" %}</a> | ||||
|       <input type="submit" class="btn btn-primary" value="{% trans 'Create' %}" /> | ||||
|       <input type="submit" class="btn btn-primary" value="{% block action %}{% endblock %}" /> | ||||
|     </form> | ||||
|   </div> | ||||
| </div> | ||||
|  | ||||
| @ -5,3 +5,7 @@ | ||||
| {% block above_form %} | ||||
| <h1>{% trans 'Update' %}</h1> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block action %} | ||||
| {% trans 'Update' %} | ||||
| {% endblock %} | ||||
|  | ||||
| @ -1,12 +1,9 @@ | ||||
| """passbook URL Configuration""" | ||||
| from django.urls import include, path | ||||
| from rest_framework_swagger.views import get_swagger_view | ||||
|  | ||||
| from passbook.admin.views import (applications, audit, groups, invitations, | ||||
|                                   overview, providers, rules, sources, users) | ||||
|  | ||||
| schema_view = get_swagger_view(title='passbook Admin Internal API') | ||||
|  | ||||
| from passbook.admin.views import (applications, audit, factors, groups, | ||||
|                                   invitations, overview, policy, providers, | ||||
|                                   sources, users) | ||||
|  | ||||
| urlpatterns = [ | ||||
|     path('', overview.AdministrationOverviewView.as_view(), name='overview'), | ||||
| @ -24,12 +21,12 @@ urlpatterns = [ | ||||
|     path('sources/create/', sources.SourceCreateView.as_view(), name='source-create'), | ||||
|     path('sources/<uuid:pk>/update/', sources.SourceUpdateView.as_view(), name='source-update'), | ||||
|     path('sources/<uuid:pk>/delete/', sources.SourceDeleteView.as_view(), name='source-delete'), | ||||
|     # Rules | ||||
|     path('rules/', rules.RuleListView.as_view(), name='rules'), | ||||
|     path('rules/create/', rules.RuleCreateView.as_view(), name='rule-create'), | ||||
|     path('rules/<uuid:pk>/update/', rules.RuleUpdateView.as_view(), name='rule-update'), | ||||
|     path('rules/<uuid:pk>/delete/', rules.RuleDeleteView.as_view(), name='rule-delete'), | ||||
|     path('rules/<uuid:pk>/test/', rules.RuleTestView.as_view(), name='rule-test'), | ||||
|     # Policies | ||||
|     path('policies/', policy.PolicyListView.as_view(), name='policies'), | ||||
|     path('policies/create/', policy.PolicyCreateView.as_view(), name='policy-create'), | ||||
|     path('policies/<uuid:pk>/update/', policy.PolicyUpdateView.as_view(), name='policy-update'), | ||||
|     path('policies/<uuid:pk>/delete/', policy.PolicyDeleteView.as_view(), name='policy-delete'), | ||||
|     path('policies/<uuid:pk>/test/', policy.PolicyTestView.as_view(), name='policy-test'), | ||||
|     # Providers | ||||
|     path('providers/', providers.ProviderListView.as_view(), name='providers'), | ||||
|     path('providers/create/', | ||||
| @ -38,6 +35,14 @@ urlpatterns = [ | ||||
|          providers.ProviderUpdateView.as_view(), name='provider-update'), | ||||
|     path('providers/<int:pk>/delete/', | ||||
|          providers.ProviderDeleteView.as_view(), name='provider-delete'), | ||||
|     # Factors | ||||
|     path('factors/', factors.FactorListView.as_view(), name='factors'), | ||||
|     path('factors/create/', | ||||
|          factors.FactorCreateView.as_view(), name='factor-create'), | ||||
|     path('factors/<uuid:pk>/update/', | ||||
|          factors.FactorUpdateView.as_view(), name='factor-update'), | ||||
|     path('factors/<uuid:pk>/delete/', | ||||
|          factors.FactorDeleteView.as_view(), name='factor-delete'), | ||||
|     # Invitations | ||||
|     path('invitations/', invitations.InvitationListView.as_view(), name='invitations'), | ||||
|     path('invitations/create/', | ||||
| @ -51,11 +56,12 @@ urlpatterns = [ | ||||
|          users.UserUpdateView.as_view(), name='user-update'), | ||||
|     path('users/<int:pk>/delete/', | ||||
|          users.UserDeleteView.as_view(), name='user-delete'), | ||||
|     path('users/<int:pk>/reset/', | ||||
|          users.UserPasswordResetView.as_view(), name='user-password-reset'), | ||||
|     # Audit Log | ||||
|     path('audit/', audit.AuditEntryListView.as_view(), name='audit-log'), | ||||
|     # Groups | ||||
|     path('groups/', groups.GroupListView.as_view(), name='groups'), | ||||
|     # API | ||||
|     path('api/', schema_view), | ||||
|     path('api/v1/', include('passbook.admin.api.v1.urls')) | ||||
|     path('api/', include('passbook.admin.api.urls')) | ||||
| ] | ||||
|  | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Application administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| @ -45,5 +46,10 @@ class ApplicationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView) | ||||
|  | ||||
|     model = Application | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:applications') | ||||
|     success_message = _('Successfully updated Application') | ||||
|     success_message = _('Successfully deleted Application') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
							
								
								
									
										84
									
								
								passbook/admin/views/factors.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										84
									
								
								passbook/admin/views/factors.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,84 @@ | ||||
| """passbook Factor administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views.generic import CreateView, DeleteView, ListView, UpdateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import Factor | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
|  | ||||
| def all_subclasses(cls): | ||||
|     """Recursively return all subclassess of cls""" | ||||
|     return set(cls.__subclasses__()).union( | ||||
|         [s for c in cls.__subclasses__() for s in all_subclasses(c)]) | ||||
|  | ||||
| class FactorListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all factors""" | ||||
|  | ||||
|     model = Factor | ||||
|     template_name = 'administration/factor/list.html' | ||||
|     ordering = 'order' | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['types'] = { | ||||
|             x.__name__: x._meta.verbose_name for x in all_subclasses(Factor)} | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def get_queryset(self): | ||||
|         return super().get_queryset().select_subclasses() | ||||
|  | ||||
| class FactorCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Factor""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     success_url = reverse_lazy('passbook_admin:factors') | ||||
|     success_message = _('Successfully created Factor') | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs = super().get_context_data(**kwargs) | ||||
|         factor_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||
|         kwargs['type'] = model._meta.verbose_name | ||||
|         return kwargs | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         factor_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|  | ||||
| class FactorUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update factor""" | ||||
|  | ||||
|     model = Factor | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:factors') | ||||
|     success_message = _('Successfully updated Factor') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         form_class_path = self.get_object().form | ||||
|         form_class = path_to_class(form_class_path) | ||||
|         return form_class | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
| class FactorDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete factor""" | ||||
|  | ||||
|     model = Factor | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:factors') | ||||
|     success_message = _('Successfully deleted Factor') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Invitation administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import HttpResponseRedirect | ||||
| from django.urls import reverse_lazy | ||||
| @ -42,4 +43,8 @@ class InvitationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Invitation | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:invitations') | ||||
|     success_message = _('Successfully updated Invitation') | ||||
|     success_message = _('Successfully deleted Invitation') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -2,7 +2,10 @@ | ||||
| from django.views.generic import TemplateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import Application, Provider, Rule, User | ||||
| from passbook.core import __version__ | ||||
| from passbook.core.celery import CELERY_APP | ||||
| from passbook.core.models import (Application, Factor, Invitation, Policy, | ||||
|                                   Provider, Source, User) | ||||
|  | ||||
|  | ||||
| class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
| @ -12,7 +15,12 @@ class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['application_count'] = len(Application.objects.all()) | ||||
|         kwargs['rule_count'] = len(Rule.objects.all()) | ||||
|         kwargs['policy_count'] = len(Policy.objects.all()) | ||||
|         kwargs['user_count'] = len(User.objects.all()) | ||||
|         kwargs['provider_count'] = len(Provider.objects.all()) | ||||
|         kwargs['source_count'] = len(Source.objects.all()) | ||||
|         kwargs['factor_count'] = len(Factor.objects.all()) | ||||
|         kwargs['invitation_count'] = len(Invitation.objects.all()) | ||||
|         kwargs['version'] = __version__ | ||||
|         kwargs['worker_count'] = len(CELERY_APP.control.ping(timeout=0.5)) | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
							
								
								
									
										108
									
								
								passbook/admin/views/policy.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										108
									
								
								passbook/admin/views/policy.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,108 @@ | ||||
| """passbook Policy administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views.generic import (CreateView, DeleteView, FormView, ListView, | ||||
|                                   UpdateView) | ||||
| from django.views.generic.detail import DetailView | ||||
|  | ||||
| from passbook.admin.forms.policies import PolicyTestForm | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import Policy | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
|  | ||||
| class PolicyListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all policies""" | ||||
|  | ||||
|     model = Policy | ||||
|     template_name = 'administration/policy/list.html' | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['types'] = { | ||||
|             x.__name__: x._meta.verbose_name for x in Policy.__subclasses__()} | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def get_queryset(self): | ||||
|         return super().get_queryset().order_by('order').select_subclasses() | ||||
|  | ||||
|  | ||||
| class PolicyCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Policy""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     success_url = reverse_lazy('passbook_admin:policies') | ||||
|     success_message = _('Successfully created Policy') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         policy_type = self.request.GET.get('type') | ||||
|         model = next(x for x in Policy.__subclasses__() | ||||
|                      if x.__name__ == policy_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|  | ||||
|  | ||||
| class PolicyUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update policy""" | ||||
|  | ||||
|     model = Policy | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:policies') | ||||
|     success_message = _('Successfully updated Policy') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         form_class_path = self.get_object().form | ||||
|         form_class = path_to_class(form_class_path) | ||||
|         return form_class | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|  | ||||
| class PolicyDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete policy""" | ||||
|  | ||||
|     model = Policy | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:policies') | ||||
|     success_message = _('Successfully deleted Policy') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
|  | ||||
| class PolicyTestView(AdminRequiredMixin, DetailView, FormView): | ||||
|     """View to test policy(s)""" | ||||
|  | ||||
|     model = Policy | ||||
|     form_class = PolicyTestForm | ||||
|     template_name = 'administration/policy/test.html' | ||||
|     object = None | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['policy'] = self.get_object() | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def post(self, *args, **kwargs): | ||||
|         self.object = self.get_object() | ||||
|         return super().post(*args, **kwargs) | ||||
|  | ||||
|     def form_valid(self, form): | ||||
|         policy = self.get_object() | ||||
|         user = form.cleaned_data.get('user') | ||||
|         result = policy.passes(user) | ||||
|         if result: | ||||
|             messages.success(self.request, _('User successfully passed policy.')) | ||||
|         else: | ||||
|             messages.error(self.request, _("User didn't pass policy.")) | ||||
|         return self.render_to_response(self.get_context_data(form=form, result=result)) | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Provider administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| @ -64,7 +65,11 @@ class ProviderDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Provider | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:providers') | ||||
|     success_message = _('Successfully updated Provider') | ||||
|     success_message = _('Successfully deleted Provider') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Provider.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,104 +0,0 @@ | ||||
| """passbook Rule administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views.generic import (CreateView, DeleteView, FormView, ListView, | ||||
|                                   UpdateView) | ||||
| from django.views.generic.detail import DetailView | ||||
|  | ||||
| from passbook.admin.forms.rule import RuleTestForm | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import Rule | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
|  | ||||
| class RuleListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all rules""" | ||||
|  | ||||
|     model = Rule | ||||
|     template_name = 'administration/rule/list.html' | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['types'] = { | ||||
|             x.__name__: x._meta.verbose_name for x in Rule.__subclasses__()} | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def get_queryset(self): | ||||
|         return super().get_queryset().order_by('order').select_subclasses() | ||||
|  | ||||
|  | ||||
| class RuleCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Rule""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     success_url = reverse_lazy('passbook_admin:rules') | ||||
|     success_message = _('Successfully created Rule') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         rule_type = self.request.GET.get('type') | ||||
|         model = next(x for x in Rule.__subclasses__() | ||||
|                      if x.__name__ == rule_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|  | ||||
|  | ||||
| class RuleUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update rule""" | ||||
|  | ||||
|     model = Rule | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:rules') | ||||
|     success_message = _('Successfully updated Rule') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         form_class_path = self.get_object().form | ||||
|         form_class = path_to_class(form_class_path) | ||||
|         return form_class | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|  | ||||
| class RuleDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete rule""" | ||||
|  | ||||
|     model = Rule | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:rules') | ||||
|     success_message = _('Successfully updated Rule') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|  | ||||
| class RuleTestView(AdminRequiredMixin, DetailView, FormView): | ||||
|     """View to test rule(s)""" | ||||
|  | ||||
|     model = Rule | ||||
|     form_class = RuleTestForm | ||||
|     template_name = 'administration/rule/test.html' | ||||
|     object = None | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['rule'] = self.get_object() | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def post(self, *args, **kwargs): | ||||
|         self.object = self.get_object() | ||||
|         return super().post(*args, **kwargs) | ||||
|  | ||||
|     def form_valid(self, form): | ||||
|         rule = self.get_object() | ||||
|         user = form.cleaned_data.get('user') | ||||
|         result = rule.passes(user) | ||||
|         if result: | ||||
|             messages.success(self.request, _('User successfully passed rule.')) | ||||
|         else: | ||||
|             messages.error(self.request, _("User didn't pass rule.")) | ||||
|         return self.render_to_response(self.get_context_data(form=form, result=result)) | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Source administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| @ -66,9 +67,13 @@ class SourceDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete source""" | ||||
|  | ||||
|     model = Source | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:sources') | ||||
|     success_message = _('Successfully updated Source') | ||||
|     success_message = _('Successfully deleted Source') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Source.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,12 +1,15 @@ | ||||
| """passbook User administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.urls import reverse_lazy | ||||
| from django.shortcuts import get_object_or_404, redirect | ||||
| from django.urls import reverse, reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views import View | ||||
| from django.views.generic import DeleteView, ListView, UpdateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.forms.user import UserDetailForm | ||||
| from passbook.core.models import User | ||||
| from passbook.core.forms.users import UserDetailForm | ||||
| from passbook.core.models import Nonce, User | ||||
|  | ||||
|  | ||||
| class UserListView(AdminRequiredMixin, ListView): | ||||
| @ -31,6 +34,24 @@ class UserDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete user""" | ||||
|  | ||||
|     model = User | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:users') | ||||
|     success_message = _('Successfully updated User') | ||||
|     success_message = _('Successfully deleted User') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
|  | ||||
| class UserPasswordResetView(AdminRequiredMixin, View): | ||||
|     """Get Password reset link for user""" | ||||
|  | ||||
|     # pylint: disable=invalid-name | ||||
|     def get(self, request, pk): | ||||
|         """Create nonce for user and return link""" | ||||
|         user = get_object_or_404(User, pk=pk) | ||||
|         nonce = Nonce.objects.create(user=user) | ||||
|         link = request.build_absolute_uri(reverse( | ||||
|             'passbook_core:auth-password-reset', kwargs={'nonce': nonce.uuid})) | ||||
|         messages.success(request, _('Password reset link: <pre>%(link)s</pre>' % {'link': link})) | ||||
|         return redirect('passbook_admin:users') | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook api""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook audit Header""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
| @ -1,4 +1,4 @@ | ||||
| # Generated by Django 2.1.3 on 2018-11-25 10:39 | ||||
| # Generated by Django 2.1.7 on 2019-02-16 09:13 | ||||
|  | ||||
| import uuid | ||||
|  | ||||
| @ -20,13 +20,32 @@ class Migration(migrations.Migration): | ||||
|             name='AuditEntry', | ||||
|             fields=[ | ||||
|                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), | ||||
|                 ('action', models.TextField()), | ||||
|                 ('action', models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_created', 'invitation_created'), ('invitation_used', 'invitation_used')])), | ||||
|                 ('date', models.DateTimeField(auto_now_add=True)), | ||||
|                 ('app', models.TextField()), | ||||
|                 ('_context', models.TextField()), | ||||
|                 ('request_ip', models.GenericIPAddressField()), | ||||
|                 ('created', models.DateTimeField(auto_now_add=True)), | ||||
|                 ('user', models.ForeignKey(null=True, on_delete=django.db.models.deletion.SET_NULL, to=settings.AUTH_USER_MODEL)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|                 'verbose_name': 'Audit Entry', | ||||
|                 'verbose_name_plural': 'Audit Entries', | ||||
|             }, | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='LoginAttempt', | ||||
|             fields=[ | ||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||
|                 ('created', models.DateField(auto_now_add=True)), | ||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||
|                 ('target_uid', models.CharField(max_length=254)), | ||||
|                 ('request_ip', models.GenericIPAddressField()), | ||||
|                 ('attempts', models.IntegerField(default=1)), | ||||
|             ], | ||||
|         ), | ||||
|         migrations.AlterUniqueTogether( | ||||
|             name='loginattempt', | ||||
|             unique_together={('target_uid', 'request_ip', 'created')}, | ||||
|         ), | ||||
|     ] | ||||
|  | ||||
| @ -1,30 +0,0 @@ | ||||
| # Generated by Django 2.1.4 on 2018-12-10 10:39 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0001_initial'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='auditentry', | ||||
|             name='context', | ||||
|             field=models.TextField(default=''), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='auditentry', | ||||
|             name='request_ip', | ||||
|             field=models.GenericIPAddressField(default=''), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='auditentry', | ||||
|             name='action', | ||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset')]), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										18
									
								
								passbook/audit/migrations/0002_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/audit/migrations/0002_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 12:01 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0001_initial'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='loginattempt', | ||||
|             name='created', | ||||
|             field=models.DateTimeField(auto_now_add=True), | ||||
|         ), | ||||
|     ] | ||||
| @ -1,27 +0,0 @@ | ||||
| # Generated by Django 2.1.4 on 2018-12-10 12:13 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0002_auto_20181210_1039'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterModelOptions( | ||||
|             name='auditentry', | ||||
|             options={'verbose_name': 'Audit Entry', 'verbose_name_plural': 'Audit Entries'}, | ||||
|         ), | ||||
|         migrations.RenameField( | ||||
|             model_name='auditentry', | ||||
|             old_name='context', | ||||
|             new_name='_context', | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='auditentry', | ||||
|             name='action', | ||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_used', 'invitation_used')]), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										23
									
								
								passbook/audit/migrations/0003_auto_20190221_1240.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/audit/migrations/0003_auto_20190221_1240.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 12:40 | ||||
|  | ||||
| import django.contrib.postgres.fields.jsonb | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0002_auto_20190221_1201'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.RemoveField( | ||||
|             model_name='auditentry', | ||||
|             name='_context', | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='auditentry', | ||||
|             name='context', | ||||
|             field=django.contrib.postgres.fields.jsonb.JSONField(blank=True, default=dict), | ||||
|         ), | ||||
|     ] | ||||
| @ -1,18 +0,0 @@ | ||||
| # Generated by Django 2.1.4 on 2018-12-10 13:48 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0003_auto_20181210_1213'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='auditentry', | ||||
|             name='action', | ||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_created', 'invitation_created'), ('invitation_used', 'invitation_used')]), | ||||
|         ), | ||||
|     ] | ||||
| @ -1,20 +0,0 @@ | ||||
| # Generated by Django 2.1.4 on 2018-12-11 15:00 | ||||
|  | ||||
| import django.utils.timezone | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0004_auto_20181210_1348'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='auditentry', | ||||
|             name='created', | ||||
|             field=models.DateTimeField(auto_now_add=True, default=django.utils.timezone.now), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|     ] | ||||
| @ -1,28 +0,0 @@ | ||||
| # Generated by Django 2.1.4 on 2018-12-18 12:52 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0005_auditentry_created'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='LoginAttempt', | ||||
|             fields=[ | ||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||
|                 ('created', models.DateField(auto_now_add=True)), | ||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||
|                 ('target_uid', models.CharField(max_length=254)), | ||||
|                 ('request_ip', models.GenericIPAddressField()), | ||||
|                 ('attempts', models.IntegerField(default=1)), | ||||
|             ], | ||||
|         ), | ||||
|         migrations.AlterUniqueTogether( | ||||
|             name='loginattempt', | ||||
|             unique_together={('target_uid', 'request_ip', 'created')}, | ||||
|         ), | ||||
|     ] | ||||
| @ -1,22 +1,20 @@ | ||||
| """passbook audit models""" | ||||
| from datetime import timedelta | ||||
| from json import dumps, loads | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.conf import settings | ||||
| from django.contrib.auth.models import AnonymousUser | ||||
| from django.contrib.postgres.fields import JSONField | ||||
| from django.core.exceptions import ValidationError | ||||
| from django.db import models | ||||
| from django.utils import timezone | ||||
| from django.utils.translation import gettext as _ | ||||
| from ipware import get_client_ip | ||||
| from reversion import register | ||||
|  | ||||
| from passbook.lib.models import CreatedUpdatedModel, UUIDModel | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @register() | ||||
| class AuditEntry(UUIDModel): | ||||
|     """An individual audit log entry""" | ||||
|  | ||||
| @ -45,22 +43,17 @@ class AuditEntry(UUIDModel): | ||||
|     action = models.TextField(choices=ACTIONS) | ||||
|     date = models.DateTimeField(auto_now_add=True) | ||||
|     app = models.TextField() | ||||
|     _context = models.TextField() | ||||
|     _context_cache = None | ||||
|     context = JSONField(default=dict, blank=True) | ||||
|     request_ip = models.GenericIPAddressField() | ||||
|     created = models.DateTimeField(auto_now_add=True) | ||||
|  | ||||
|     @property | ||||
|     def context(self): | ||||
|         """Load context data and load json""" | ||||
|         if not self._context_cache: | ||||
|             self._context_cache = loads(self._context) | ||||
|         return self._context_cache | ||||
|  | ||||
|     @staticmethod | ||||
|     def create(action, request, **kwargs): | ||||
|         """Create AuditEntry from arguments""" | ||||
|         client_ip, _ = get_client_ip(request) | ||||
|         if not hasattr(request, 'user'): | ||||
|             user = None | ||||
|         else: | ||||
|             user = request.user | ||||
|         if isinstance(user, AnonymousUser): | ||||
|             user = kwargs.get('user', None) | ||||
| @ -69,8 +62,8 @@ class AuditEntry(UUIDModel): | ||||
|             user=user, | ||||
|             # User 255.255.255.255 as fallback if IP cannot be determined | ||||
|             request_ip=client_ip or '255.255.255.255', | ||||
|             _context=dumps(kwargs)) | ||||
|         LOGGER.debug("Logged %s from %s (%s)", action, request.user, client_ip) | ||||
|             context=kwargs) | ||||
|         LOGGER.debug("Logged %s from %s (%s)", action, user, client_ip) | ||||
|         return entry | ||||
|  | ||||
|     def save(self, *args, **kwargs): | ||||
| @ -94,6 +87,8 @@ class LoginAttempt(CreatedUpdatedModel): | ||||
|     @staticmethod | ||||
|     def attempt(target_uid, request): | ||||
|         """Helper function to create attempt or count up existing one""" | ||||
|         if not target_uid: | ||||
|             return | ||||
|         client_ip, _ = get_client_ip(request) | ||||
|         # Since we can only use 254 chars for target_uid, truncate target_uid. | ||||
|         target_uid = target_uid[:254] | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook captcha_factor Header""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
| @ -2,8 +2,25 @@ | ||||
| from captcha.fields import ReCaptchaField | ||||
| from django import forms | ||||
|  | ||||
| from passbook.captcha_factor.models import CaptchaFactor | ||||
| from passbook.core.forms.factors import GENERAL_FIELDS | ||||
|  | ||||
|  | ||||
| class CaptchaForm(forms.Form): | ||||
|     """passbook captcha factor form""" | ||||
|  | ||||
|     captcha = ReCaptchaField() | ||||
|  | ||||
| class CaptchaFactorForm(forms.ModelForm): | ||||
|     """Form to edit CaptchaFactor Instance""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = CaptchaFactor | ||||
|         fields = GENERAL_FIELDS + ['public_key', 'private_key'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'order': forms.NumberInput(), | ||||
|             'public_key': forms.TextInput(), | ||||
|             'private_key': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
							
								
								
									
										29
									
								
								passbook/captcha_factor/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								passbook/captcha_factor/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,29 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-24 21:35 | ||||
|  | ||||
| import django.db.models.deletion | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     initial = True | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0010_auto_20190224_1016'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='CaptchaFactor', | ||||
|             fields=[ | ||||
|                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||
|                 ('public_key', models.TextField()), | ||||
|                 ('private_key', models.TextField()), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Captcha Factor', | ||||
|                 'verbose_name_plural': 'Captcha Factors', | ||||
|             }, | ||||
|             bases=('passbook_core.factor',), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										23
									
								
								passbook/captcha_factor/models.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/captcha_factor/models.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | ||||
| """passbook captcha factor""" | ||||
| from django.db import models | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import Factor | ||||
|  | ||||
|  | ||||
| class CaptchaFactor(Factor): | ||||
|     """Captcha Factor instance""" | ||||
|  | ||||
|     public_key = models.TextField() | ||||
|     private_key = models.TextField() | ||||
|  | ||||
|     type = 'passbook.captcha_factor.factor.CaptchaFactor' | ||||
|     form = 'passbook.captcha_factor.forms.CaptchaFactorForm' | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Captcha Factor %s" % self.slug | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Captcha Factor') | ||||
|         verbose_name_plural = _('Captcha Factors') | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook core""" | ||||
| __version__ = '0.0.6-alpha' | ||||
| __version__ = '0.0.12-alpha' | ||||
|  | ||||
| @ -1,8 +1,12 @@ | ||||
| """passbook core app config""" | ||||
| from importlib import import_module | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.apps import AppConfig | ||||
|  | ||||
| from passbook.lib.config import CONFIG | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| class PassbookCoreConfig(AppConfig): | ||||
|     """passbook core app config""" | ||||
| @ -12,4 +16,11 @@ class PassbookCoreConfig(AppConfig): | ||||
|     verbose_name = 'passbook Core' | ||||
|  | ||||
|     def ready(self): | ||||
|         import_module('passbook.core.rules') | ||||
|         import_module('passbook.core.policies') | ||||
|         factors_to_load = CONFIG.y('passbook.factors', []) | ||||
|         for factors_to_load in factors_to_load: | ||||
|             try: | ||||
|                 import_module(factors_to_load) | ||||
|                 LOGGER.info("Loaded %s", factors_to_load) | ||||
|             except ImportError as exc: | ||||
|                 LOGGER.debug(exc) | ||||
|  | ||||
| @ -1,13 +1,9 @@ | ||||
| """passbook multi-factor authentication engine""" | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.utils.translation import gettext as _ | ||||
| from django.views.generic import TemplateView | ||||
|  | ||||
| from passbook.lib.config import CONFIG | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| class AuthenticationFactor(TemplateView): | ||||
|     """Abstract Authentication factor, inherits TemplateView but can be combined with FormView""" | ||||
| @ -15,8 +11,9 @@ class AuthenticationFactor(TemplateView): | ||||
|     form = None | ||||
|     required = True | ||||
|     authenticator = None | ||||
|     pending_user = None | ||||
|     request = None | ||||
|     template_name = 'login/form.html' | ||||
|     template_name = 'login/form_with_user.html' | ||||
|  | ||||
|     def __init__(self, authenticator): | ||||
|         self.authenticator = authenticator | ||||
| @ -26,4 +23,5 @@ class AuthenticationFactor(TemplateView): | ||||
|         kwargs['is_login'] = True | ||||
|         kwargs['title'] = _('Log in to your account') | ||||
|         kwargs['primary_action'] = _('Log in') | ||||
|         kwargs['user'] = self.pending_user | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
							
								
								
									
										0
									
								
								passbook/core/auth/factors/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								passbook/core/auth/factors/__init__.py
									
									
									
									
									
										Normal file
									
								
							| @ -1,26 +1,53 @@ | ||||
| """passbook multi-factor authentication engine""" | ||||
| from logging import getLogger | ||||
| 
 | ||||
| from django.contrib import messages | ||||
| from django.contrib.auth import authenticate | ||||
| from django.core.exceptions import PermissionDenied | ||||
| from django.forms.utils import ErrorList | ||||
| from django.shortcuts import redirect, reverse | ||||
| from django.utils.translation import gettext as _ | ||||
| from django.views.generic import FormView | ||||
| 
 | ||||
| from passbook.core.auth.factor import AuthenticationFactor | ||||
| from passbook.core.auth.mfa import MultiFactorAuthenticator | ||||
| from passbook.core.forms.authentication import AuthenticationBackendFactorForm | ||||
| from passbook.core.auth.view import AuthenticationView | ||||
| from passbook.core.forms.authentication import PasswordFactorForm | ||||
| from passbook.core.models import Nonce | ||||
| from passbook.core.tasks import send_email | ||||
| from passbook.lib.config import CONFIG | ||||
| 
 | ||||
| LOGGER = getLogger(__name__) | ||||
| 
 | ||||
| 
 | ||||
| class AuthenticationBackendFactor(FormView, AuthenticationFactor): | ||||
| class PasswordFactor(FormView, AuthenticationFactor): | ||||
|     """Authentication factor which authenticates against django's AuthBackend""" | ||||
| 
 | ||||
|     form_class = AuthenticationBackendFactorForm | ||||
|     form_class = PasswordFactorForm | ||||
|     template_name = 'login/factors/backend.html' | ||||
| 
 | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['show_password_forget_notice'] = CONFIG.y('passbook.password_reset.enabled') | ||||
|         return super().get_context_data(**kwargs) | ||||
| 
 | ||||
|     def get(self, request, *args, **kwargs): | ||||
|         if 'password-forgotten' in request.GET: | ||||
|             nonce = Nonce.objects.create(user=self.pending_user) | ||||
|             LOGGER.debug("DEBUG %s", str(nonce.uuid)) | ||||
|             # Send mail to user | ||||
|             send_email.delay(self.pending_user.email, _('Forgotten password'), | ||||
|                              'email/account_password_reset.html', { | ||||
|                                  'url': self.request.build_absolute_uri( | ||||
|                                      reverse('passbook_core:passbook_core:auth-password-reset', | ||||
|                                              kwargs={ | ||||
|                                                  'nonce': nonce.uuid | ||||
|                                              }) | ||||
|                                  ) | ||||
|                              }) | ||||
|             self.authenticator.cleanup() | ||||
|             messages.success(request, _('Check your E-Mails for a password reset link.')) | ||||
|             return redirect('passbook_core:auth-login') | ||||
|         return super().get(request, *args, **kwargs) | ||||
| 
 | ||||
|     def form_valid(self, form): | ||||
|         """Authenticate against django's authentication backend""" | ||||
|         uid_fields = CONFIG.y('passbook.uid_fields') | ||||
| @ -34,7 +61,7 @@ class AuthenticationBackendFactor(FormView, AuthenticationFactor): | ||||
|             if user: | ||||
|                 # User instance returned from authenticate() has .backend property set | ||||
|                 self.authenticator.pending_user = user | ||||
|                 self.request.session[MultiFactorAuthenticator.SESSION_USER_BACKEND] = user.backend | ||||
|                 self.request.session[AuthenticationView.SESSION_USER_BACKEND] = user.backend | ||||
|                 return self.authenticator.user_ok() | ||||
|             # No user was found -> invalid credentials | ||||
|             LOGGER.debug("Invalid credentials") | ||||
| @ -1,119 +0,0 @@ | ||||
| """passbook multi-factor authentication engine""" | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.conf import settings | ||||
| from django.contrib.auth import login | ||||
| from django.contrib.auth.mixins import UserPassesTestMixin | ||||
| from django.shortcuts import get_object_or_404, redirect, reverse | ||||
| from django.views.generic import View | ||||
|  | ||||
| from passbook.core.models import User | ||||
| from passbook.core.views.utils import PermissionDeniedView | ||||
| from passbook.lib.utils.reflection import class_to_path, path_to_class | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| class MultiFactorAuthenticator(UserPassesTestMixin, View): | ||||
|     """Wizard-like Multi-factor authenticator""" | ||||
|  | ||||
|     SESSION_FACTOR = 'passbook_factor' | ||||
|     SESSION_PENDING_FACTORS = 'passbook_pending_factors' | ||||
|     SESSION_PENDING_USER = 'passbook_pending_user' | ||||
|     SESSION_USER_BACKEND = 'passbook_user_backend' | ||||
|  | ||||
|     pending_user = None | ||||
|     pending_factors = [] | ||||
|  | ||||
|     factors = settings.AUTHENTICATION_FACTORS.copy() | ||||
|  | ||||
|     _current_factor = None | ||||
|  | ||||
|     # Allow only not authenticated users to login | ||||
|     def test_func(self): | ||||
|         return self.request.user.is_authenticated is False | ||||
|  | ||||
|     def handle_no_permission(self): | ||||
|         if 'next' in self.request.GET: | ||||
|             return redirect(self.request.GET.get('next')) | ||||
|         return redirect(reverse('passbook_core:overview')) | ||||
|  | ||||
|     def dispatch(self, request, *args, **kwargs): | ||||
|         # Extract pending user from session (only remember uid) | ||||
|         if MultiFactorAuthenticator.SESSION_PENDING_USER in request.session: | ||||
|             self.pending_user = get_object_or_404( | ||||
|                 User, id=self.request.session[MultiFactorAuthenticator.SESSION_PENDING_USER]) | ||||
|         else: | ||||
|             # No Pending user, redirect to login screen | ||||
|             return redirect(reverse('passbook_core:auth-login')) | ||||
|         # Write pending factors to session | ||||
|         if MultiFactorAuthenticator.SESSION_PENDING_FACTORS in request.session: | ||||
|             self.pending_factors = request.session[MultiFactorAuthenticator.SESSION_PENDING_FACTORS] | ||||
|         else: | ||||
|             self.pending_factors = self.factors.copy() | ||||
|         # Read and instantiate factor from session | ||||
|         factor_class = None | ||||
|         if MultiFactorAuthenticator.SESSION_FACTOR not in request.session: | ||||
|             factor_class = self.pending_factors[0] | ||||
|         else: | ||||
|             factor_class = request.session[MultiFactorAuthenticator.SESSION_FACTOR] | ||||
|         factor = path_to_class(factor_class) | ||||
|         self._current_factor = factor(self) | ||||
|         self._current_factor.request = request | ||||
|         return super().dispatch(request, *args, **kwargs) | ||||
|  | ||||
|     def get(self, request, *args, **kwargs): | ||||
|         """pass get request to current factor""" | ||||
|         LOGGER.debug("Passing GET to %s", class_to_path(self._current_factor.__class__)) | ||||
|         return self._current_factor.get(request, *args, **kwargs) | ||||
|  | ||||
|     def post(self, request, *args, **kwargs): | ||||
|         """pass post request to current factor""" | ||||
|         LOGGER.debug("Passing POST to %s", class_to_path(self._current_factor.__class__)) | ||||
|         return self._current_factor.post(request, *args, **kwargs) | ||||
|  | ||||
|     def user_ok(self): | ||||
|         """Redirect to next Factor""" | ||||
|         LOGGER.debug("Factor %s passed", class_to_path(self._current_factor.__class__)) | ||||
|         # Remove passed factor from pending factors | ||||
|         if class_to_path(self._current_factor.__class__) in self.pending_factors: | ||||
|             self.pending_factors.remove(class_to_path(self._current_factor.__class__)) | ||||
|         next_factor = None | ||||
|         if self.pending_factors: | ||||
|             next_factor = self.pending_factors.pop() | ||||
|             self.request.session[MultiFactorAuthenticator.SESSION_PENDING_FACTORS] = \ | ||||
|                 self.pending_factors | ||||
|             self.request.session[MultiFactorAuthenticator.SESSION_FACTOR] = next_factor | ||||
|             LOGGER.debug("Rendering Factor is %s", next_factor) | ||||
|             return redirect(reverse('passbook_core:mfa')) | ||||
|         # User passed all factors | ||||
|         LOGGER.debug("User passed all factors, logging in") | ||||
|         return self._user_passed() | ||||
|  | ||||
|     def user_invalid(self): | ||||
|         """Show error message, user cannot login. | ||||
|         This should only be shown if user authenticated successfully, but is disabled/locked/etc""" | ||||
|         LOGGER.debug("User invalid") | ||||
|         return redirect(reverse('passbook_core:mfa-denied')) | ||||
|  | ||||
|     def _user_passed(self): | ||||
|         """User Successfully passed all factors""" | ||||
|         # user = authenticate(request=self.request, ) | ||||
|         backend = self.request.session[MultiFactorAuthenticator.SESSION_USER_BACKEND] | ||||
|         login(self.request, self.pending_user, backend=backend) | ||||
|         LOGGER.debug("Logged in user %s", self.pending_user) | ||||
|         # Cleanup | ||||
|         self._cleanup() | ||||
|         return redirect(reverse('passbook_core:overview')) | ||||
|  | ||||
|     def _cleanup(self): | ||||
|         """Remove temporary data from session""" | ||||
|         session_keys = ['SESSION_FACTOR', 'SESSION_PENDING_FACTORS', | ||||
|                         'SESSION_PENDING_USER', 'SESSION_USER_BACKEND', ] | ||||
|         for key in session_keys: | ||||
|             if key in self.request.session: | ||||
|                 del self.request.session[key] | ||||
|         LOGGER.debug("Cleaned up sessions") | ||||
|  | ||||
| class MFAPermissionDeniedView(PermissionDeniedView): | ||||
|     """User could not be authenticated""" | ||||
							
								
								
									
										147
									
								
								passbook/core/auth/view.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										147
									
								
								passbook/core/auth/view.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,147 @@ | ||||
| """passbook multi-factor authentication engine""" | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.contrib.auth import login | ||||
| from django.contrib.auth.mixins import UserPassesTestMixin | ||||
| from django.shortcuts import get_object_or_404, redirect, reverse | ||||
| from django.utils.http import urlencode | ||||
| from django.views.generic import View | ||||
|  | ||||
| from passbook.core.models import Factor, User | ||||
| from passbook.core.views.utils import PermissionDeniedView | ||||
| from passbook.lib.utils.reflection import class_to_path, path_to_class | ||||
| from passbook.lib.utils.urls import is_url_absolute | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| def _redirect_with_qs(view, get_query_set=None): | ||||
|     """Wrapper to redirect whilst keeping GET Parameters""" | ||||
|     target = reverse(view) | ||||
|     if get_query_set: | ||||
|         target += '?' + urlencode({key: value for key, value in get_query_set.items()}) | ||||
|     return redirect(target) | ||||
|  | ||||
| class AuthenticationView(UserPassesTestMixin, View): | ||||
|     """Wizard-like Multi-factor authenticator""" | ||||
|  | ||||
|     SESSION_FACTOR = 'passbook_factor' | ||||
|     SESSION_PENDING_FACTORS = 'passbook_pending_factors' | ||||
|     SESSION_PENDING_USER = 'passbook_pending_user' | ||||
|     SESSION_USER_BACKEND = 'passbook_user_backend' | ||||
|  | ||||
|     pending_user = None | ||||
|     pending_factors = [] | ||||
|  | ||||
|     _current_factor_class = None | ||||
|  | ||||
|     current_factor = None | ||||
|  | ||||
|     # Allow only not authenticated users to login | ||||
|     def test_func(self): | ||||
|         return self.request.user.is_authenticated is False | ||||
|  | ||||
|     def handle_no_permission(self): | ||||
|         # Function from UserPassesTestMixin | ||||
|         if 'next' in self.request.GET: | ||||
|             return redirect(self.request.GET.get('next')) | ||||
|         return _redirect_with_qs('passbook_core:overview', self.request.GET) | ||||
|  | ||||
|     def dispatch(self, request, *args, **kwargs): | ||||
|         # Extract pending user from session (only remember uid) | ||||
|         if AuthenticationView.SESSION_PENDING_USER in request.session: | ||||
|             self.pending_user = get_object_or_404( | ||||
|                 User, id=self.request.session[AuthenticationView.SESSION_PENDING_USER]) | ||||
|         else: | ||||
|             # No Pending user, redirect to login screen | ||||
|             return _redirect_with_qs('passbook_core:auth-login', request.GET) | ||||
|         # Write pending factors to session | ||||
|         if AuthenticationView.SESSION_PENDING_FACTORS in request.session: | ||||
|             self.pending_factors = request.session[AuthenticationView.SESSION_PENDING_FACTORS] | ||||
|         else: | ||||
|             # Get an initial list of factors which are currently enabled | ||||
|             # and apply to the current user. We check policies here and block the request | ||||
|             _all_factors = Factor.objects.filter(enabled=True).order_by('order').select_subclasses() | ||||
|             self.pending_factors = [] | ||||
|             for factor in _all_factors: | ||||
|                 if factor.passes(self.pending_user): | ||||
|                     self.pending_factors.append((factor.uuid.hex, factor.type)) | ||||
|         # Read and instantiate factor from session | ||||
|         factor_uuid, factor_class = None, None | ||||
|         if AuthenticationView.SESSION_FACTOR not in request.session: | ||||
|             # Case when no factors apply to user, return error denied | ||||
|             if not self.pending_factors: | ||||
|                 return self.user_invalid() | ||||
|             factor_uuid, factor_class = self.pending_factors[0] | ||||
|         else: | ||||
|             factor_uuid, factor_class = request.session[AuthenticationView.SESSION_FACTOR] | ||||
|         # Lookup current factor object | ||||
|         self.current_factor = Factor.objects.filter(uuid=factor_uuid).select_subclasses().first() | ||||
|         # Instantiate Next Factor and pass request | ||||
|         factor = path_to_class(factor_class) | ||||
|         self._current_factor_class = factor(self) | ||||
|         self._current_factor_class.pending_user = self.pending_user | ||||
|         self._current_factor_class.request = request | ||||
|         return super().dispatch(request, *args, **kwargs) | ||||
|  | ||||
|     def get(self, request, *args, **kwargs): | ||||
|         """pass get request to current factor""" | ||||
|         LOGGER.debug("Passing GET to %s", class_to_path(self._current_factor_class.__class__)) | ||||
|         return self._current_factor_class.get(request, *args, **kwargs) | ||||
|  | ||||
|     def post(self, request, *args, **kwargs): | ||||
|         """pass post request to current factor""" | ||||
|         LOGGER.debug("Passing POST to %s", class_to_path(self._current_factor_class.__class__)) | ||||
|         return self._current_factor_class.post(request, *args, **kwargs) | ||||
|  | ||||
|     def user_ok(self): | ||||
|         """Redirect to next Factor""" | ||||
|         LOGGER.debug("Factor %s passed", class_to_path(self._current_factor_class.__class__)) | ||||
|         # Remove passed factor from pending factors | ||||
|         current_factor_tuple = (self.current_factor.uuid.hex, | ||||
|                                 class_to_path(self._current_factor_class.__class__)) | ||||
|         if current_factor_tuple in self.pending_factors: | ||||
|             self.pending_factors.remove(current_factor_tuple) | ||||
|         next_factor = None | ||||
|         if self.pending_factors: | ||||
|             next_factor = self.pending_factors.pop() | ||||
|             self.request.session[AuthenticationView.SESSION_PENDING_FACTORS] = \ | ||||
|                 self.pending_factors | ||||
|             self.request.session[AuthenticationView.SESSION_FACTOR] = next_factor | ||||
|             LOGGER.debug("Rendering Factor is %s", next_factor) | ||||
|             # return _redirect_with_qs('passbook_core:auth-process', kwargs={'factor': next_factor}) | ||||
|             return _redirect_with_qs('passbook_core:auth-process', self.request.GET) | ||||
|         # User passed all factors | ||||
|         LOGGER.debug("User passed all factors, logging in") | ||||
|         return self._user_passed() | ||||
|  | ||||
|     def user_invalid(self): | ||||
|         """Show error message, user cannot login. | ||||
|         This should only be shown if user authenticated successfully, but is disabled/locked/etc""" | ||||
|         LOGGER.debug("User invalid") | ||||
|         self.cleanup() | ||||
|         return _redirect_with_qs('passbook_core:auth-denied', self.request.GET) | ||||
|  | ||||
|     def _user_passed(self): | ||||
|         """User Successfully passed all factors""" | ||||
|         # user = authenticate(request=self.request, ) | ||||
|         backend = self.request.session[AuthenticationView.SESSION_USER_BACKEND] | ||||
|         login(self.request, self.pending_user, backend=backend) | ||||
|         LOGGER.debug("Logged in user %s", self.pending_user) | ||||
|         # Cleanup | ||||
|         self.cleanup() | ||||
|         next_param = self.request.GET.get('next', None) | ||||
|         if next_param and not is_url_absolute(next_param): | ||||
|             return redirect(next_param) | ||||
|         return _redirect_with_qs('passbook_core:overview') | ||||
|  | ||||
|     def cleanup(self): | ||||
|         """Remove temporary data from session""" | ||||
|         session_keys = [self.SESSION_FACTOR, self.SESSION_PENDING_FACTORS, | ||||
|                         self.SESSION_PENDING_USER, self.SESSION_USER_BACKEND, ] | ||||
|         for key in session_keys: | ||||
|             if key in self.request.session: | ||||
|                 del self.request.session[key] | ||||
|         LOGGER.debug("Cleaned up sessions") | ||||
|  | ||||
| class FactorPermissionDeniedView(PermissionDeniedView): | ||||
|     """User could not be authenticated""" | ||||
| @ -4,14 +4,11 @@ import logging | ||||
| import os | ||||
|  | ||||
| import celery | ||||
| # import pymysql | ||||
| from django.conf import settings | ||||
|  | ||||
| # from raven import Client | ||||
| # from raven.contrib.celery import register_logger_signal, register_signal | ||||
|  | ||||
| # pymysql.install_as_MySQLdb() | ||||
|  | ||||
| # set the default Django settings module for the 'celery' program. | ||||
| os.environ.setdefault("DJANGO_SETTINGS_MODULE", "passbook.core.settings") | ||||
|  | ||||
|  | ||||
							
								
								
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,10 @@ | ||||
| """passbook core exceptions""" | ||||
|  | ||||
| class PasswordPolicyInvalid(Exception): | ||||
|     """Exception raised when a Password Policy fails""" | ||||
|  | ||||
|     messages = [] | ||||
|  | ||||
|     def __init__(self, *messages): | ||||
|         super().__init__() | ||||
|         self.messages = messages | ||||
| @ -1,5 +1,6 @@ | ||||
| """passbook Core Application forms""" | ||||
| from django import forms | ||||
| from django.utils.translation import gettext_lazy as _ | ||||
|  | ||||
| from passbook.core.models import Application, Provider | ||||
|  | ||||
| @ -7,15 +8,20 @@ from passbook.core.models import Application, Provider | ||||
| class ApplicationForm(forms.ModelForm): | ||||
|     """Application Form""" | ||||
|  | ||||
|     provider = forms.ModelChoiceField(queryset=Provider.objects.all().select_subclasses()) | ||||
|     provider = forms.ModelChoiceField(queryset=Provider.objects.all().select_subclasses(), | ||||
|                                       required=False) | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = Application | ||||
|         fields = ['name', 'slug', 'launch_url', 'icon_url', | ||||
|                   'rules', 'provider', 'skip_authorization'] | ||||
|                   'policies', 'provider', 'skip_authorization'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'launch_url': forms.TextInput(), | ||||
|             'icon_url': forms.TextInput(), | ||||
|         } | ||||
|         labels = { | ||||
|             'launch_url': _('Launch URL'), | ||||
|             'icon_url': _('Icon URL'), | ||||
|         } | ||||
|  | ||||
| @ -8,6 +8,7 @@ from django.utils.translation import gettext_lazy as _ | ||||
|  | ||||
| from passbook.core.models import User | ||||
| from passbook.lib.config import CONFIG | ||||
| from passbook.lib.utils.ui import human_list | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @ -15,19 +16,23 @@ class LoginForm(forms.Form): | ||||
|     """Allow users to login""" | ||||
|  | ||||
|     title = _('Log in to your account') | ||||
|     uid_field = forms.CharField(widget=forms.TextInput(attrs={'placeholder': _('UID')})) | ||||
|     uid_field = forms.CharField() | ||||
|     remember_me = forms.BooleanField(required=False) | ||||
|  | ||||
|     def __init__(self, *args, **kwargs): | ||||
|         super().__init__(*args, **kwargs) | ||||
|         if CONFIG.y('passbook.uid_fields') == ['e-mail']: | ||||
|             self.fields['uid_field'] = forms.EmailField() | ||||
|         self.fields['uid_field'].widget.attrs = { | ||||
|             'placeholder': _(human_list([x.title() for x in CONFIG.y('passbook.uid_fields')])) | ||||
|         } | ||||
|  | ||||
|     def clean_uid_field(self): | ||||
|         """Validate uid_field after EmailValidator if 'email' is the only selected uid_fields""" | ||||
|         if CONFIG.y('passbook.uid_fields') == ['email']: | ||||
|             validate_email(self.cleaned_data.get('uid_field')) | ||||
|         return self.cleaned_data.get('uid_field') | ||||
|  | ||||
| class AuthenticationBackendFactorForm(forms.Form): | ||||
|     """Password authentication form""" | ||||
|  | ||||
|     password = forms.CharField(widget=forms.PasswordInput(attrs={'placeholder': _('Password')})) | ||||
|  | ||||
| class SignUpForm(forms.Form): | ||||
|     """SignUp Form""" | ||||
| @ -74,6 +79,19 @@ class SignUpForm(forms.Form): | ||||
|  | ||||
|     def clean_password_repeat(self): | ||||
|         """Check if Password adheres to filter and if passwords matche""" | ||||
|         password = self.cleaned_data.get('password') | ||||
|         password_repeat = self.cleaned_data.get('password_repeat') | ||||
|         if password != password_repeat: | ||||
|             raise ValidationError(_("Passwords don't match")) | ||||
|         # TODO: Password policy? Via Plugin? via Policy? | ||||
|         # return check_password(self) | ||||
|         return self.cleaned_data.get('password_repeat') | ||||
|  | ||||
|  | ||||
| class PasswordFactorForm(forms.Form): | ||||
|     """Password authentication form""" | ||||
|  | ||||
|     password = forms.CharField(widget=forms.PasswordInput(attrs={ | ||||
|         'placeholder': _('Password'), | ||||
|         'autofocus': 'autofocus' | ||||
|         })) | ||||
|  | ||||
							
								
								
									
										30
									
								
								passbook/core/forms/factors.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								passbook/core/forms/factors.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,30 @@ | ||||
| """passbook administration forms""" | ||||
| from django import forms | ||||
|  | ||||
| from passbook.core.models import DummyFactor, PasswordFactor | ||||
|  | ||||
| GENERAL_FIELDS = ['name', 'slug', 'order', 'policies', 'enabled'] | ||||
|  | ||||
| class PasswordFactorForm(forms.ModelForm): | ||||
|     """Form to create/edit Password Factors""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = PasswordFactor | ||||
|         fields = GENERAL_FIELDS + ['backends', 'password_policies'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'order': forms.NumberInput(), | ||||
|         } | ||||
|  | ||||
| class DummyFactorForm(forms.ModelForm): | ||||
|     """Form to create/edit Dummy Factor""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = DummyFactor | ||||
|         fields = GENERAL_FIELDS | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'order': forms.NumberInput(), | ||||
|         } | ||||
| @ -27,7 +27,7 @@ class InvitationForm(forms.ModelForm): | ||||
|     class Meta: | ||||
|  | ||||
|         model = Invitation | ||||
|         fields = ['expires', 'fixed_username', 'fixed_email'] | ||||
|         fields = ['expires', 'fixed_username', 'fixed_email', 'needs_confirmation'] | ||||
|         labels = { | ||||
|             'fixed_username': "Force user's username (optional)", | ||||
|             'fixed_email': "Force user's email (optional)", | ||||
|  | ||||
							
								
								
									
										75
									
								
								passbook/core/forms/policies.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										75
									
								
								passbook/core/forms/policies.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,75 @@ | ||||
| """passbook Policy forms""" | ||||
|  | ||||
| from django import forms | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import (DebugPolicy, FieldMatcherPolicy, | ||||
|                                   PasswordPolicy, WebhookPolicy) | ||||
|  | ||||
| GENERAL_FIELDS = ['name', 'action', 'negate', 'order', ] | ||||
|  | ||||
| class FieldMatcherPolicyForm(forms.ModelForm): | ||||
|     """FieldMatcherPolicy Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = FieldMatcherPolicy | ||||
|         fields = GENERAL_FIELDS + ['user_field', 'match_action', 'value', ] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'value': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
|  | ||||
| class WebhookPolicyForm(forms.ModelForm): | ||||
|     """WebhookPolicyForm Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = WebhookPolicy | ||||
|         fields = GENERAL_FIELDS + ['url', 'method', 'json_body', 'json_headers', | ||||
|                                    'result_jsonpath', 'result_json_value', ] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'json_body': forms.TextInput(), | ||||
|             'json_headers': forms.TextInput(), | ||||
|             'result_jsonpath': forms.TextInput(), | ||||
|             'result_json_value': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
|  | ||||
| class DebugPolicyForm(forms.ModelForm): | ||||
|     """DebugPolicyForm Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = DebugPolicy | ||||
|         fields = GENERAL_FIELDS + ['result', 'wait_min', 'wait_max'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|         } | ||||
|         labels = { | ||||
|             'result': _('Allow user') | ||||
|         } | ||||
|  | ||||
|  | ||||
| class PasswordPolicyForm(forms.ModelForm): | ||||
|     """PasswordPolicy Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = PasswordPolicy | ||||
|         fields = GENERAL_FIELDS + ['amount_uppercase', 'amount_lowercase', | ||||
|                                    'amount_symbols', 'length_min', 'symbol_charset', | ||||
|                                    'error_message'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'symbol_charset': forms.TextInput(), | ||||
|             'error_message': forms.TextInput(), | ||||
|         } | ||||
|         labels = { | ||||
|             'amount_uppercase': _('Minimum amount of Uppercase Characters'), | ||||
|             'amount_lowercase': _('Minimum amount of Lowercase Characters'), | ||||
|             'amount_symbols': _('Minimum amount of Symbols Characters'), | ||||
|             'length_min': _('Minimum Length'), | ||||
|         } | ||||
| @ -1,52 +0,0 @@ | ||||
| """passbook rule forms""" | ||||
|  | ||||
| from django import forms | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import DebugRule, FieldMatcherRule, WebhookRule | ||||
|  | ||||
| GENERAL_FIELDS = ['name', 'action', 'negate', 'order', ] | ||||
|  | ||||
| class FieldMatcherRuleForm(forms.ModelForm): | ||||
|     """FieldMatcherRule Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = FieldMatcherRule | ||||
|         fields = GENERAL_FIELDS + ['user_field', 'match_action', 'value', ] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'value': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
|  | ||||
| class WebhookRuleForm(forms.ModelForm): | ||||
|     """WebhookRuleForm Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = WebhookRule | ||||
|         fields = GENERAL_FIELDS + ['url', 'method', 'json_body', 'json_headers', | ||||
|                                    'result_jsonpath', 'result_json_value', ] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'json_body': forms.TextInput(), | ||||
|             'json_headers': forms.TextInput(), | ||||
|             'result_jsonpath': forms.TextInput(), | ||||
|             'result_json_value': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
|  | ||||
| class DebugRuleForm(forms.ModelForm): | ||||
|     """DebugRuleForm Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = DebugRule | ||||
|         fields = GENERAL_FIELDS + ['result', 'wait_min', 'wait_max'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|         } | ||||
|         labels = { | ||||
|             'result': _('Allow user') | ||||
|         } | ||||
| @ -1,14 +0,0 @@ | ||||
| """passbook core user forms""" | ||||
|  | ||||
| from django import forms | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
|  | ||||
| class UserDetailForm(forms.ModelForm): | ||||
|     """Update User Details""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = User | ||||
|         fields = ['username', 'first_name', 'last_name', 'email'] | ||||
							
								
								
									
										35
									
								
								passbook/core/forms/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										35
									
								
								passbook/core/forms/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,35 @@ | ||||
| """passbook core user forms""" | ||||
|  | ||||
| from django import forms | ||||
| from django.forms import ValidationError | ||||
| from django.utils.translation import gettext_lazy as _ | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
|  | ||||
| class UserDetailForm(forms.ModelForm): | ||||
|     """Update User Details""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = User | ||||
|         fields = ['username', 'first_name', 'last_name', 'email'] | ||||
|  | ||||
| class PasswordChangeForm(forms.Form): | ||||
|     """Form to update password""" | ||||
|  | ||||
|     password = forms.CharField(label=_('Password'), | ||||
|                                widget=forms.PasswordInput(attrs={'placeholder': _('New Password')})) | ||||
|     password_repeat = forms.CharField(label=_('Repeat Password'), | ||||
|                                       widget=forms.PasswordInput(attrs={ | ||||
|                                           'placeholder': _('Repeat Password') | ||||
|                                       })) | ||||
|  | ||||
|     def clean_password_repeat(self): | ||||
|         """Check if Password adheres to filter and if passwords matche""" | ||||
|         password = self.cleaned_data.get('password') | ||||
|         password_repeat = self.cleaned_data.get('password_repeat') | ||||
|         if password != password_repeat: | ||||
|             raise ValidationError(_("Passwords don't match")) | ||||
|         # TODO: Password policy check | ||||
|         return self.cleaned_data.get('password_repeat') | ||||
| @ -1,5 +1,5 @@ | ||||
| """passbook nexus_upload management command""" | ||||
| from getpass import getpass | ||||
| from base64 import b64decode | ||||
|  | ||||
| import requests | ||||
| from django.core.management.base import BaseCommand | ||||
| @ -24,9 +24,9 @@ class Command(BaseCommand): | ||||
|             help='Nexus root URL', | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--user', | ||||
|             '--auth', | ||||
|             action='store', | ||||
|             help='Username to use for Nexus upload', | ||||
|             help='base64-encoded string of username:password', | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--method', | ||||
| @ -37,29 +37,21 @@ class Command(BaseCommand): | ||||
|             help=('Method used for uploading files to nexus. ' | ||||
|                   'Apt repositories use post, Helm uses put.'), | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--password', | ||||
|             action='store', | ||||
|             help=("Password to use for Nexus upload. " | ||||
|                   "If parameter not given, we'll interactively ask")) | ||||
|         # Positional arguments | ||||
|         parser.add_argument('file', nargs='+', type=str) | ||||
|  | ||||
|     def handle(self, *args, **options): | ||||
|         """Upload debian package to nexus repository""" | ||||
|         if options.get('password') is None: | ||||
|             options['password'] = getpass() | ||||
|         auth = tuple(b64decode(options.get('auth')).decode('utf-8').split(':', 1)) | ||||
|         responses = {} | ||||
|         url = 'https://%(url)s/repository/%(repo)s//' % options | ||||
|         url = 'https://%(url)s/repository/%(repo)s/' % options | ||||
|         method = options.get('method') | ||||
|         exit_code = 0 | ||||
|         for file in options.get('file'): | ||||
|             if method == 'post': | ||||
|                 responses[file] = requests.post(url, data=open(file, mode='rb'), | ||||
|                                                 auth=(options.get('user'), options.get('password'))) | ||||
|                 responses[file] = requests.post(url, data=open(file, mode='rb'), auth=auth) | ||||
|             else: | ||||
|                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), | ||||
|                                                auth=(options.get('user'), options.get('password'))) | ||||
|                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), auth=auth) | ||||
|         self.stdout.write('Upload results:\n') | ||||
|         sep = '-' * 60 | ||||
|         self.stdout.write('%s\n' % sep) | ||||
|  | ||||
| @ -1,4 +1,4 @@ | ||||
| # Generated by Django 2.1.5 on 2019-02-08 10:42 | ||||
| # Generated by Django 2.1.7 on 2019-02-16 09:10 | ||||
|  | ||||
| import uuid | ||||
|  | ||||
| @ -68,13 +68,7 @@ class Migration(migrations.Migration): | ||||
|             }, | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='Provider', | ||||
|             fields=[ | ||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||
|             ], | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='Rule', | ||||
|             name='Policy', | ||||
|             fields=[ | ||||
|                 ('created', models.DateField(auto_now_add=True)), | ||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||
| @ -89,7 +83,7 @@ class Migration(migrations.Migration): | ||||
|             }, | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='RuleModel', | ||||
|             name='PolicyModel', | ||||
|             fields=[ | ||||
|                 ('created', models.DateField(auto_now_add=True)), | ||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||
| @ -99,6 +93,12 @@ class Migration(migrations.Migration): | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='Provider', | ||||
|             fields=[ | ||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||
|             ], | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='UserSourceConnection', | ||||
|             fields=[ | ||||
| @ -111,51 +111,82 @@ class Migration(migrations.Migration): | ||||
|         migrations.CreateModel( | ||||
|             name='Application', | ||||
|             fields=[ | ||||
|                 ('rulemodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.RuleModel')), | ||||
|                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||
|                 ('name', models.TextField()), | ||||
|                 ('slug', models.SlugField()), | ||||
|                 ('launch_url', models.URLField(blank=True, null=True)), | ||||
|                 ('icon_url', models.TextField(blank=True, null=True)), | ||||
|                 ('skip_authorization', models.BooleanField(default=False)), | ||||
|                 ('provider', models.OneToOneField(default=None, null=True, on_delete=django.db.models.deletion.SET_DEFAULT, to='passbook_core.Provider')), | ||||
|                 ('provider', models.OneToOneField(blank=True, default=None, null=True, on_delete=django.db.models.deletion.SET_DEFAULT, to='passbook_core.Provider')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|             bases=('passbook_core.rulemodel',), | ||||
|             bases=('passbook_core.policymodel',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='DebugRule', | ||||
|             name='DebugPolicy', | ||||
|             fields=[ | ||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), | ||||
|                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||
|                 ('result', models.BooleanField(default=False)), | ||||
|                 ('wait_min', models.IntegerField(default=5)), | ||||
|                 ('wait_max', models.IntegerField(default=30)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Debug Rule', | ||||
|                 'verbose_name_plural': 'Debug Rules', | ||||
|                 'verbose_name': 'Debug Policy', | ||||
|                 'verbose_name_plural': 'Debug Policys', | ||||
|             }, | ||||
|             bases=('passbook_core.rule',), | ||||
|             bases=('passbook_core.policy',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='FieldMatcherRule', | ||||
|             name='Factor', | ||||
|             fields=[ | ||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), | ||||
|                 ('user_field', models.TextField(choices=[('username', 'username'), ('first_name', 'first_name'), ('last_name', 'last_name'), ('email', 'email'), ('is_staff', 'is_staff'), ('is_active', 'is_active'), ('data_joined', 'data_joined')])), | ||||
|                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||
|                 ('name', models.TextField()), | ||||
|                 ('slug', models.SlugField(unique=True)), | ||||
|                 ('order', models.IntegerField()), | ||||
|                 ('type', models.TextField(unique=True)), | ||||
|                 ('enabled', models.BooleanField(default=True)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|             bases=('passbook_core.policymodel',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='FieldMatcherPolicy', | ||||
|             fields=[ | ||||
|                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||
|                 ('user_field', models.TextField(choices=[('username', 'Username'), ('first_name', 'First Name'), ('last_name', 'Last Name'), ('email', 'E-Mail'), ('is_staff', 'Is staff'), ('is_active', 'Is active'), ('data_joined', 'Date joined')])), | ||||
|                 ('match_action', models.CharField(choices=[('startswith', 'Starts with'), ('endswith', 'Ends with'), ('endswith', 'Contains'), ('regexp', 'Regexp'), ('exact', 'Exact')], max_length=50)), | ||||
|                 ('value', models.TextField()), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Field matcher Rule', | ||||
|                 'verbose_name_plural': 'Field matcher Rules', | ||||
|                 'verbose_name': 'Field matcher Policy', | ||||
|                 'verbose_name_plural': 'Field matcher Policys', | ||||
|             }, | ||||
|             bases=('passbook_core.rule',), | ||||
|             bases=('passbook_core.policy',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='PasswordPolicyPolicy', | ||||
|             fields=[ | ||||
|                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||
|                 ('amount_uppercase', models.IntegerField(default=0)), | ||||
|                 ('amount_lowercase', models.IntegerField(default=0)), | ||||
|                 ('amount_symbols', models.IntegerField(default=0)), | ||||
|                 ('length_min', models.IntegerField(default=0)), | ||||
|                 ('symbol_charset', models.TextField(default='!\\"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~ ')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Password Policy Policy', | ||||
|                 'verbose_name_plural': 'Password Policy Policys', | ||||
|             }, | ||||
|             bases=('passbook_core.policy',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='Source', | ||||
|             fields=[ | ||||
|                 ('rulemodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.RuleModel')), | ||||
|                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||
|                 ('name', models.TextField()), | ||||
|                 ('slug', models.SlugField()), | ||||
|                 ('enabled', models.BooleanField(default=True)), | ||||
| @ -163,12 +194,12 @@ class Migration(migrations.Migration): | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|             bases=('passbook_core.rulemodel',), | ||||
|             bases=('passbook_core.policymodel',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='WebhookRule', | ||||
|             name='WebhookPolicy', | ||||
|             fields=[ | ||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), | ||||
|                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||
|                 ('url', models.URLField()), | ||||
|                 ('method', models.CharField(choices=[('GET', 'GET'), ('POST', 'POST'), ('PATCH', 'PATCH'), ('DELETE', 'DELETE'), ('PUT', 'PUT')], max_length=10)), | ||||
|                 ('json_body', models.TextField()), | ||||
| @ -177,15 +208,15 @@ class Migration(migrations.Migration): | ||||
|                 ('result_json_value', models.TextField()), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Webhook Rule', | ||||
|                 'verbose_name_plural': 'Webhook Rules', | ||||
|                 'verbose_name': 'Webhook Policy', | ||||
|                 'verbose_name_plural': 'Webhook Policys', | ||||
|             }, | ||||
|             bases=('passbook_core.rule',), | ||||
|             bases=('passbook_core.policy',), | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='rulemodel', | ||||
|             name='rules', | ||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Rule'), | ||||
|             model_name='policymodel', | ||||
|             name='policies', | ||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='user', | ||||
|  | ||||
| @ -1,35 +0,0 @@ | ||||
| # Generated by Django 2.1.5 on 2019-02-08 15:14 | ||||
|  | ||||
| import django.db.models.deletion | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0001_initial'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='PasswordPolicyRule', | ||||
|             fields=[ | ||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), | ||||
|                 ('amount_uppercase', models.IntegerField(default=0)), | ||||
|                 ('amount_lowercase', models.IntegerField(default=0)), | ||||
|                 ('amount_symbols', models.IntegerField(default=0)), | ||||
|                 ('length_min', models.IntegerField(default=0)), | ||||
|                 ('symbol_charset', models.TextField(default='!\\"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~ ')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Password Policy Rule', | ||||
|                 'verbose_name_plural': 'Password Policy Rules', | ||||
|             }, | ||||
|             bases=('passbook_core.rule',), | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='fieldmatcherrule', | ||||
|             name='user_field', | ||||
|             field=models.TextField(choices=[('username', 'Username'), ('first_name', 'First Name'), ('last_name', 'Last Name'), ('email', 'E-Mail'), ('is_staff', 'Is staff'), ('is_active', 'Is active'), ('data_joined', 'Date joined')]), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										29
									
								
								passbook/core/migrations/0002_auto_20190216_1002.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								passbook/core/migrations/0002_auto_20190216_1002.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,29 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-16 10:02 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0001_initial'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterModelOptions( | ||||
|             name='debugpolicy', | ||||
|             options={'verbose_name': 'Debug Policy', 'verbose_name_plural': 'Debug Policies'}, | ||||
|         ), | ||||
|         migrations.AlterModelOptions( | ||||
|             name='fieldmatcherpolicy', | ||||
|             options={'verbose_name': 'Field matcher Policy', 'verbose_name_plural': 'Field matcher Policies'}, | ||||
|         ), | ||||
|         migrations.AlterModelOptions( | ||||
|             name='passwordpolicypolicy', | ||||
|             options={'verbose_name': 'Password Policy Policy', 'verbose_name_plural': 'Password Policy Policies'}, | ||||
|         ), | ||||
|         migrations.AlterModelOptions( | ||||
|             name='webhookpolicy', | ||||
|             options={'verbose_name': 'Webhook Policy', 'verbose_name_plural': 'Webhook Policies'}, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										17
									
								
								passbook/core/migrations/0003_auto_20190216_1004.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/core/migrations/0003_auto_20190216_1004.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-16 10:04 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0002_auto_20190216_1002'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.RenameModel( | ||||
|             old_name='PasswordPolicyPolicy', | ||||
|             new_name='PasswordPolicy', | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										17
									
								
								passbook/core/migrations/0004_auto_20190216_1013.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/core/migrations/0004_auto_20190216_1013.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-16 10:13 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0003_auto_20190216_1004'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterModelOptions( | ||||
|             name='passwordpolicy', | ||||
|             options={'verbose_name': 'Password Policy', 'verbose_name_plural': 'Password Policies'}, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										28
									
								
								passbook/core/migrations/0005_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								passbook/core/migrations/0005_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,28 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 12:01 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0004_auto_20190216_1013'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='policy', | ||||
|             name='created', | ||||
|             field=models.DateTimeField(auto_now_add=True), | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='policymodel', | ||||
|             name='created', | ||||
|             field=models.DateTimeField(auto_now_add=True), | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='usersourceconnection', | ||||
|             name='created', | ||||
|             field=models.DateTimeField(auto_now_add=True), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										19
									
								
								passbook/core/migrations/0006_factor_arguments.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								passbook/core/migrations/0006_factor_arguments.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,19 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 12:32 | ||||
|  | ||||
| import django.contrib.postgres.fields.jsonb | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0005_auto_20190221_1201'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='factor', | ||||
|             name='arguments', | ||||
|             field=django.contrib.postgres.fields.jsonb.JSONField(default=dict), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										19
									
								
								passbook/core/migrations/0007_auto_20190221_1233.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								passbook/core/migrations/0007_auto_20190221_1233.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,19 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 12:33 | ||||
|  | ||||
| import django.contrib.postgres.fields.jsonb | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0006_factor_arguments'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='factor', | ||||
|             name='arguments', | ||||
|             field=django.contrib.postgres.fields.jsonb.JSONField(blank=True, default=dict), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										18
									
								
								passbook/core/migrations/0008_auto_20190221_1516.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/core/migrations/0008_auto_20190221_1516.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-21 15:16 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0007_auto_20190221_1233'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='fieldmatcherpolicy', | ||||
|             name='match_action', | ||||
|             field=models.CharField(choices=[('startswith', 'Starts with'), ('endswith', 'Ends with'), ('contains', 'Contains'), ('regexp', 'Regexp'), ('exact', 'Exact')], max_length=50), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										44
									
								
								passbook/core/migrations/0009_auto_20190224_0950.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								passbook/core/migrations/0009_auto_20190224_0950.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,44 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-24 09:50 | ||||
|  | ||||
| import django.contrib.postgres.fields | ||||
| import django.db.models.deletion | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0008_auto_20190221_1516'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='DummyFactor', | ||||
|             fields=[ | ||||
|                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|             bases=('passbook_core.factor',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='PasswordFactor', | ||||
|             fields=[ | ||||
|                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||
|                 ('backends', django.contrib.postgres.fields.ArrayField(base_field=models.TextField(), size=None)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'abstract': False, | ||||
|             }, | ||||
|             bases=('passbook_core.factor',), | ||||
|         ), | ||||
|         migrations.RemoveField( | ||||
|             model_name='factor', | ||||
|             name='arguments', | ||||
|         ), | ||||
|         migrations.RemoveField( | ||||
|             model_name='factor', | ||||
|             name='type', | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										21
									
								
								passbook/core/migrations/0010_auto_20190224_1016.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								passbook/core/migrations/0010_auto_20190224_1016.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-24 10:16 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0009_auto_20190224_0950'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterModelOptions( | ||||
|             name='dummyfactor', | ||||
|             options={'verbose_name': 'Dummy Factor', 'verbose_name_plural': 'Dummy Factors'}, | ||||
|         ), | ||||
|         migrations.AlterModelOptions( | ||||
|             name='passwordfactor', | ||||
|             options={'verbose_name': 'Password Factor', 'verbose_name_plural': 'Password Factors'}, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 14:38 | ||||
|  | ||||
| import django.utils.timezone | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0010_auto_20190224_1016'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='passwordfactor', | ||||
|             name='password_policies', | ||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='user', | ||||
|             name='password_change_date', | ||||
|             field=models.DateTimeField(auto_now_add=True, default=django.utils.timezone.now), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										31
									
								
								passbook/core/migrations/0012_nonce.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								passbook/core/migrations/0012_nonce.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,31 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 19:12 | ||||
|  | ||||
| import uuid | ||||
|  | ||||
| import django.db.models.deletion | ||||
| from django.conf import settings | ||||
| from django.db import migrations, models | ||||
|  | ||||
| import passbook.core.models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0011_auto_20190225_1438'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='Nonce', | ||||
|             fields=[ | ||||
|                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), | ||||
|                 ('expires', models.DateTimeField(default=passbook.core.models.default_nonce_duration)), | ||||
|                 ('user', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to=settings.AUTH_USER_MODEL)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Nonce', | ||||
|                 'verbose_name_plural': 'Nonces', | ||||
|             }, | ||||
|         ), | ||||
|     ] | ||||
| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 19:57 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0012_nonce'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='invitation', | ||||
|             name='needs_confirmation', | ||||
|             field=models.BooleanField(default=True), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0014_auto_20190226_0850.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0014_auto_20190226_0850.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-26 08:50 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| def create_initial_factor(apps, schema_editor): | ||||
|     """Create initial PasswordFactor if none exists""" | ||||
|     PasswordFactor = apps.get_model("passbook_core", "PasswordFactor") | ||||
|     if not PasswordFactor.objects.exists(): | ||||
|         PasswordFactor.objects.create( | ||||
|             name='password', | ||||
|             slug='password', | ||||
|             order=0, | ||||
|             backends=[] | ||||
|         ) | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0013_invitation_needs_confirmation'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.RunPython(create_initial_factor) | ||||
|     ] | ||||
| @ -0,0 +1,19 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-26 14:28 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0014_auto_20190226_0850'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='passwordpolicy', | ||||
|             name='error_message', | ||||
|             field=models.TextField(default=''), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|     ] | ||||
| @ -1,21 +1,30 @@ | ||||
| """passbook core models""" | ||||
| import re | ||||
| from datetime import timedelta | ||||
| from logging import getLogger | ||||
| from random import SystemRandom | ||||
| from time import sleep | ||||
| from typing import Tuple, Union | ||||
| from uuid import uuid4 | ||||
|  | ||||
| import reversion | ||||
| from django.contrib.auth.models import AbstractUser | ||||
| from django.contrib.postgres.fields import ArrayField | ||||
| from django.db import models | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.timezone import now | ||||
| from django.utils.translation import gettext as _ | ||||
| from model_utils.managers import InheritanceManager | ||||
|  | ||||
| from passbook.core.signals import password_changed | ||||
| from passbook.lib.models import CreatedUpdatedModel, UUIDModel | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| def default_nonce_duration(): | ||||
|     """Default duration a Nonce is valid""" | ||||
|     return now() + timedelta(hours=4) | ||||
|  | ||||
| class Group(UUIDModel): | ||||
|     """Custom Group model which supports a basic hierarchy""" | ||||
|  | ||||
| @ -38,8 +47,14 @@ class User(AbstractUser): | ||||
|     sources = models.ManyToManyField('Source', through='UserSourceConnection') | ||||
|     applications = models.ManyToManyField('Application') | ||||
|     groups = models.ManyToManyField('Group') | ||||
|     password_change_date = models.DateTimeField(auto_now_add=True) | ||||
|  | ||||
|     def set_password(self, password): | ||||
|         if self.pk: | ||||
|             password_changed.send(sender=self, user=self, password=password) | ||||
|         self.password_change_date = now() | ||||
|         return super().set_password(password) | ||||
|  | ||||
| @reversion.register() | ||||
| class Provider(models.Model): | ||||
|     """Application-independent Provider instance. For example SAML2 Remote, OAuth2 Application""" | ||||
|  | ||||
| @ -51,20 +66,82 @@ class Provider(models.Model): | ||||
|             return getattr(self, 'name') | ||||
|         return super().__str__() | ||||
|  | ||||
| class RuleModel(UUIDModel, CreatedUpdatedModel): | ||||
|     """Base model which can have rules applied to it""" | ||||
| class PolicyModel(UUIDModel, CreatedUpdatedModel): | ||||
|     """Base model which can have policies applied to it""" | ||||
|  | ||||
|     rules = models.ManyToManyField('Rule', blank=True) | ||||
|     policies = models.ManyToManyField('Policy', blank=True) | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|         """Return true if user passes, otherwise False or raise Exception""" | ||||
|         for rule in self.rules: | ||||
|             if not rule.passes(user): | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         """Return False, str if a user fails where str is a | ||||
|         reasons shown to the user. Return True if user succeeds.""" | ||||
|         for policy in self.policies.all(): | ||||
|             if not policy.passes(user): | ||||
|                 return False | ||||
|         return True | ||||
|  | ||||
| @reversion.register() | ||||
| class Application(RuleModel): | ||||
| class Factor(PolicyModel): | ||||
|     """Authentication factor, multiple instances of the same Factor can be used""" | ||||
|  | ||||
|     name = models.TextField() | ||||
|     slug = models.SlugField(unique=True) | ||||
|     order = models.IntegerField() | ||||
|     enabled = models.BooleanField(default=True) | ||||
|  | ||||
|     objects = InheritanceManager() | ||||
|     type = '' | ||||
|     form = '' | ||||
|  | ||||
|     def has_user_settings(self): | ||||
|         """Entrypoint to integrate with User settings. Can either return False if no | ||||
|         user settings are available, or a tuple or string, string, string where the first string | ||||
|         is the name the item has, the second string is the icon and the third is the view-name.""" | ||||
|         return False | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Factor %s" % self.slug | ||||
|  | ||||
| class PasswordFactor(Factor): | ||||
|     """Password-based Django-backend Authentication Factor""" | ||||
|  | ||||
|     backends = ArrayField(models.TextField()) | ||||
|     password_policies = models.ManyToManyField('Policy', blank=True) | ||||
|  | ||||
|     type = 'passbook.core.auth.factors.password.PasswordFactor' | ||||
|     form = 'passbook.core.forms.factors.PasswordFactorForm' | ||||
|  | ||||
|     def has_user_settings(self): | ||||
|         return _('Change Password'), 'pficon-key', 'passbook_core:user-change-password' | ||||
|  | ||||
|     def password_passes(self, user: User) -> bool: | ||||
|         """Return true if user's password passes, otherwise False or raise Exception""" | ||||
|         for policy in self.policies.all(): | ||||
|             if not policy.passes(user): | ||||
|                 return False | ||||
|         return True | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Password Factor %s" % self.slug | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Password Factor') | ||||
|         verbose_name_plural = _('Password Factors') | ||||
|  | ||||
| class DummyFactor(Factor): | ||||
|     """Dummy factor, mostly used to debug""" | ||||
|  | ||||
|     type = 'passbook.core.auth.factors.dummy.DummyFactor' | ||||
|     form = 'passbook.core.forms.factors.DummyFactorForm' | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Dummy Factor %s" % self.slug | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Dummy Factor') | ||||
|         verbose_name_plural = _('Dummy Factors') | ||||
|  | ||||
| class Application(PolicyModel): | ||||
|     """Every Application which uses passbook for authentication/identification/authorization | ||||
|     needs an Application record. Other authentication types can subclass this Model to | ||||
|     add custom fields and other properties""" | ||||
| @ -73,7 +150,7 @@ class Application(RuleModel): | ||||
|     slug = models.SlugField() | ||||
|     launch_url = models.URLField(null=True, blank=True) | ||||
|     icon_url = models.TextField(null=True, blank=True) | ||||
|     provider = models.OneToOneField('Provider', null=True, | ||||
|     provider = models.OneToOneField('Provider', null=True, blank=True, | ||||
|                                     default=None, on_delete=models.SET_DEFAULT) | ||||
|     skip_authorization = models.BooleanField(default=False) | ||||
|  | ||||
| @ -81,14 +158,13 @@ class Application(RuleModel): | ||||
|  | ||||
|     def user_is_authorized(self, user: User) -> bool: | ||||
|         """Check if user is authorized to use this application""" | ||||
|         from passbook.core.rules import RuleEngine | ||||
|         return RuleEngine(self.rules.all()).for_user(user).result | ||||
|         from passbook.core.policies import PolicyEngine | ||||
|         return PolicyEngine(self.policies.all()).for_user(user).result | ||||
|  | ||||
|     def __str__(self): | ||||
|         return self.name | ||||
|  | ||||
| @reversion.register() | ||||
| class Source(RuleModel): | ||||
| class Source(PolicyModel): | ||||
|     """Base Authentication source, i.e. an OAuth Provider, SAML Remote or LDAP Server""" | ||||
|  | ||||
|     name = models.TextField() | ||||
| @ -104,14 +180,18 @@ class Source(RuleModel): | ||||
|         return False | ||||
|  | ||||
|     @property | ||||
|     def get_url(self): | ||||
|         """Return URL used for logging in""" | ||||
|     def get_login_button(self): | ||||
|         """Return a tuple of URL, Icon name and Name""" | ||||
|         raise NotImplementedError | ||||
|  | ||||
|     @property | ||||
|     def additional_info(self): | ||||
|         """Return additional Info, such as a callback URL. Show in the administration interface.""" | ||||
|         return None | ||||
|  | ||||
|     def __str__(self): | ||||
|         return self.name | ||||
|  | ||||
| @reversion.register() | ||||
| class UserSourceConnection(CreatedUpdatedModel): | ||||
|     """Connection between User and Source.""" | ||||
|  | ||||
| @ -122,9 +202,8 @@ class UserSourceConnection(CreatedUpdatedModel): | ||||
|  | ||||
|         unique_together = (('user', 'source'),) | ||||
|  | ||||
| @reversion.register() | ||||
| class Rule(UUIDModel, CreatedUpdatedModel): | ||||
|     """Rules which specify if a user is authorized to use an Application. Can be overridden by | ||||
| class Policy(UUIDModel, CreatedUpdatedModel): | ||||
|     """Policies which specify if a user is authorized to use an Application. Can be overridden by | ||||
|     other types to add other fields, more logic, etc.""" | ||||
|  | ||||
|     ACTION_ALLOW = 'allow' | ||||
| @ -146,13 +225,12 @@ class Rule(UUIDModel, CreatedUpdatedModel): | ||||
|             return self.name | ||||
|         return "%s action %s" % (self.name, self.action) | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|         """Check if user instance passes this rule""" | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         """Check if user instance passes this policy""" | ||||
|         raise NotImplementedError() | ||||
|  | ||||
| @reversion.register() | ||||
| class FieldMatcherRule(Rule): | ||||
|     """Rule which checks if a field of the User model matches/doesn't match a | ||||
| class FieldMatcherPolicy(Policy): | ||||
|     """Policy which checks if a field of the User model matches/doesn't match a | ||||
|     certain pattern""" | ||||
|  | ||||
|     MATCH_STARTSWITH = 'startswith' | ||||
| @ -164,7 +242,7 @@ class FieldMatcherRule(Rule): | ||||
|     MATCHES = ( | ||||
|         (MATCH_STARTSWITH, _('Starts with')), | ||||
|         (MATCH_ENDSWITH, _('Ends with')), | ||||
|         (MATCH_ENDSWITH, _('Contains')), | ||||
|         (MATCH_CONTAINS, _('Contains')), | ||||
|         (MATCH_REGEXP, _('Regexp')), | ||||
|         (MATCH_EXACT, _('Exact')), | ||||
|     ) | ||||
| @ -183,7 +261,7 @@ class FieldMatcherRule(Rule): | ||||
|     match_action = models.CharField(max_length=50, choices=MATCHES) | ||||
|     value = models.TextField() | ||||
|  | ||||
|     form = 'passbook.core.forms.rules.FieldMatcherRuleForm' | ||||
|     form = 'passbook.core.forms.policies.FieldMatcherPolicyForm' | ||||
|  | ||||
|     def __str__(self): | ||||
|         description = "%s, user.%s %s '%s'" % (self.name, self.user_field, | ||||
| @ -192,7 +270,7 @@ class FieldMatcherRule(Rule): | ||||
|             description = "%s: %s" % (self.name, description) | ||||
|         return description | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         """Check if user instance passes this role""" | ||||
|         if not hasattr(user, self.user_field): | ||||
|             raise ValueError("Field does not exist") | ||||
| @ -200,13 +278,13 @@ class FieldMatcherRule(Rule): | ||||
|         LOGGER.debug("Checked '%s' %s with '%s'...", | ||||
|                      user_field_value, self.match_action, self.value) | ||||
|         passes = False | ||||
|         if self.match_action == FieldMatcherRule.MATCH_STARTSWITH: | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_STARTSWITH: | ||||
|             passes = user_field_value.startswith(self.value) | ||||
|         if self.match_action == FieldMatcherRule.MATCH_ENDSWITH: | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_ENDSWITH: | ||||
|             passes = user_field_value.endswith(self.value) | ||||
|         if self.match_action == FieldMatcherRule.MATCH_CONTAINS: | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_CONTAINS: | ||||
|             passes = self.value in user_field_value | ||||
|         if self.match_action == FieldMatcherRule.MATCH_REGEXP: | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_REGEXP: | ||||
|             pattern = re.compile(self.value) | ||||
|             passes = bool(pattern.match(user_field_value)) | ||||
|         if self.negate: | ||||
| @ -216,22 +294,22 @@ class FieldMatcherRule(Rule): | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Field matcher Rule') | ||||
|         verbose_name_plural = _('Field matcher Rules') | ||||
|         verbose_name = _('Field matcher Policy') | ||||
|         verbose_name_plural = _('Field matcher Policies') | ||||
|  | ||||
| @reversion.register() | ||||
| class PasswordPolicyRule(Rule): | ||||
|     """Rule to make sure passwords have certain properties""" | ||||
| class PasswordPolicy(Policy): | ||||
|     """Policy to make sure passwords have certain properties""" | ||||
|  | ||||
|     amount_uppercase = models.IntegerField(default=0) | ||||
|     amount_lowercase = models.IntegerField(default=0) | ||||
|     amount_symbols = models.IntegerField(default=0) | ||||
|     length_min = models.IntegerField(default=0) | ||||
|     symbol_charset = models.TextField(default=r"!\"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ ") | ||||
|     error_message = models.TextField() | ||||
|  | ||||
|     form = 'passbook.core.forms.rules.PasswordPolicyRuleForm' | ||||
|     form = 'passbook.core.forms.policies.PasswordPolicyForm' | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         # Only check if password is being set | ||||
|         if not hasattr(user, '__password__'): | ||||
|             return True | ||||
| @ -246,17 +324,18 @@ class PasswordPolicyRule(Rule): | ||||
|             filter_regex += r'[%s]{%d,}' % (self.symbol_charset, self.amount_symbols) | ||||
|         result = bool(re.compile(filter_regex).match(password)) | ||||
|         LOGGER.debug("User got %r", result) | ||||
|         if not result: | ||||
|             return result, self.error_message | ||||
|         return result | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Password Policy Rule') | ||||
|         verbose_name_plural = _('Password Policy Rules') | ||||
|         verbose_name = _('Password Policy') | ||||
|         verbose_name_plural = _('Password Policies') | ||||
|  | ||||
|  | ||||
| @reversion.register() | ||||
| class WebhookRule(Rule): | ||||
|     """Rule that asks webhook""" | ||||
| class WebhookPolicy(Policy): | ||||
|     """Policy that asks webhook""" | ||||
|  | ||||
|     METHOD_GET = 'GET' | ||||
|     METHOD_POST = 'POST' | ||||
| @ -279,7 +358,7 @@ class WebhookRule(Rule): | ||||
|     result_jsonpath = models.TextField() | ||||
|     result_json_value = models.TextField() | ||||
|  | ||||
|     form = 'passbook.core.forms.rules.WebhookRuleForm' | ||||
|     form = 'passbook.core.forms.policies.WebhookPolicyForm' | ||||
|  | ||||
|     def passes(self, user: User): | ||||
|         """Call webhook asynchronously and report back""" | ||||
| @ -287,31 +366,30 @@ class WebhookRule(Rule): | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Webhook Rule') | ||||
|         verbose_name_plural = _('Webhook Rules') | ||||
|         verbose_name = _('Webhook Policy') | ||||
|         verbose_name_plural = _('Webhook Policies') | ||||
|  | ||||
| @reversion.register() | ||||
| class DebugRule(Rule): | ||||
|     """Rule used for debugging the RuleEngine. Returns a fixed result, | ||||
| class DebugPolicy(Policy): | ||||
|     """Policy used for debugging the PolicyEngine. Returns a fixed result, | ||||
|     but takes a random time to process.""" | ||||
|  | ||||
|     result = models.BooleanField(default=False) | ||||
|     wait_min = models.IntegerField(default=5) | ||||
|     wait_max = models.IntegerField(default=30) | ||||
|  | ||||
|     form = 'passbook.core.forms.rules.DebugRuleForm' | ||||
|     form = 'passbook.core.forms.policies.DebugPolicyForm' | ||||
|  | ||||
|     def passes(self, user: User): | ||||
|         """Wait random time then return result""" | ||||
|         wait = SystemRandom().randrange(self.wait_min, self.wait_max) | ||||
|         LOGGER.debug("Rule '%s' waiting for %ds", self.name, wait) | ||||
|         LOGGER.debug("Policy '%s' waiting for %ds", self.name, wait) | ||||
|         sleep(wait) | ||||
|         return self.result | ||||
|         return self.result, 'Debugging' | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Debug Rule') | ||||
|         verbose_name_plural = _('Debug Rules') | ||||
|         verbose_name = _('Debug Policy') | ||||
|         verbose_name_plural = _('Debug Policies') | ||||
|  | ||||
| class Invitation(UUIDModel): | ||||
|     """Single-use invitation link""" | ||||
| @ -320,6 +398,7 @@ class Invitation(UUIDModel): | ||||
|     expires = models.DateTimeField(default=None, blank=True, null=True) | ||||
|     fixed_username = models.TextField(blank=True, default=None) | ||||
|     fixed_email = models.TextField(blank=True, default=None) | ||||
|     needs_confirmation = models.BooleanField(default=True) | ||||
|  | ||||
|     @property | ||||
|     def link(self): | ||||
| @ -333,3 +412,17 @@ class Invitation(UUIDModel): | ||||
|  | ||||
|         verbose_name = _('Invitation') | ||||
|         verbose_name_plural = _('Invitations') | ||||
|  | ||||
| class Nonce(UUIDModel): | ||||
|     """One-time link for password resets/signup-confirmations""" | ||||
|  | ||||
|     expires = models.DateTimeField(default=default_nonce_duration) | ||||
|     user = models.ForeignKey('User', on_delete=models.CASCADE) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Nonce %s (expires=%s)" % (self.uuid.hex, self.expires) | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Nonce') | ||||
|         verbose_name_plural = _('Nonces') | ||||
|  | ||||
							
								
								
									
										52
									
								
								passbook/core/policies.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										52
									
								
								passbook/core/policies.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,52 @@ | ||||
| """passbook core policy engine""" | ||||
| from logging import getLogger | ||||
|  | ||||
| from celery import group | ||||
|  | ||||
| from passbook.core.celery import CELERY_APP | ||||
| from passbook.core.models import Policy, User | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @CELERY_APP.task() | ||||
| def _policy_engine_task(user_pk, policy_pk, **kwargs): | ||||
|     """Task wrapper to run policy checking""" | ||||
|     policy_obj = Policy.objects.filter(pk=policy_pk).select_subclasses().first() | ||||
|     user_obj = User.objects.get(pk=user_pk) | ||||
|     for key, value in kwargs.items(): | ||||
|         setattr(user_obj, key, value) | ||||
|     LOGGER.debug("Running policy `%s`#%s for user %s...", policy_obj.name, | ||||
|                  policy_obj.pk.hex, user_obj) | ||||
|     return policy_obj.passes(user_obj) | ||||
|  | ||||
| class PolicyEngine: | ||||
|     """Orchestrate policy checking, launch tasks and return result""" | ||||
|  | ||||
|     policies = None | ||||
|     _group = None | ||||
|  | ||||
|     def __init__(self, policies): | ||||
|         self.policies = policies | ||||
|  | ||||
|     def for_user(self, user): | ||||
|         """Check policies for user""" | ||||
|         signatures = [] | ||||
|         kwargs = { | ||||
|             '__password__': getattr(user, '__password__', None) | ||||
|         } | ||||
|         for policy in self.policies: | ||||
|             signatures.append(_policy_engine_task.s(user.pk, policy.pk.hex, **kwargs)) | ||||
|         self._group = group(signatures)() | ||||
|         return self | ||||
|  | ||||
|     @property | ||||
|     def result(self): | ||||
|         """Get policy-checking result""" | ||||
|         messages = [] | ||||
|         for policy_result in self._group.get(): | ||||
|             if isinstance(policy_result, (tuple, list)): | ||||
|                 policy_result, policy_message = policy_result | ||||
|                 messages.append(policy_message) | ||||
|             if policy_result is False: | ||||
|                 return False, messages | ||||
|         return True, messages | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	