Compare commits
	
		
			110 Commits
		
	
	
		
			version/0.
			...
			version/0.
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 4439378fd4 | |||
| acf65eafdd | |||
| c2ebff55ef | |||
| 99c82676b6 | |||
| 4991e9b825 | |||
| 612f95c3ba | |||
| cd91d5ca15 | |||
| cbbbb5dc08 | |||
| c1640b9411 | |||
| a4842c1f95 | |||
| a4707ddc54 | |||
| fb82d56307 | |||
| 1a1005f80d | |||
| e86cae6cac | |||
| 0b282f45e0 | |||
| 791e88ffc1 | |||
| 7bd3c4bccf | |||
| 722e2e4050 | |||
| c7fc444c95 | |||
| 20ad062814 | |||
| fcb5d36e07 | |||
| 9b131b619f | |||
| 54427f7c68 | |||
| 35eef9c28d | |||
| e88a82553d | |||
| 01a9520140 | |||
| 46667615c3 | |||
| c6721a83a4 | |||
| 46866e8ef0 | |||
| 4a49681127 | |||
| 4c3fced4e9 | |||
| 172347d90f | |||
| f54520b5cf | |||
| d7c4697625 | |||
| 5584f5bda8 | |||
| 2ce6f5a714 | |||
| c66945623a | |||
| cbae05c74c | |||
| 5b771da972 | |||
| 2db1738e4a | |||
| 95de6a14fd | |||
| 17132ebc19 | |||
| 289be46388 | |||
| 6c300b7b31 | |||
| b726583084 | |||
| 48055d1cfd | |||
| 436070f5bd | |||
| 3ee79818db | |||
| e7a02104db | |||
| 556740d7bc | |||
| 421f51770c | |||
| 96f7e70f9e | |||
| ad96f7dbb8 | |||
| e7fb48eba2 | |||
| b19b5b644d | |||
| 250b6691d4 | |||
| e3b02a6e78 | |||
| e94ef34d8f | |||
| 49e945307a | |||
| edfe0e5450 | |||
| 06b65a7882 | |||
| ff9bc8aa70 | |||
| 28da67abe6 | |||
| 39d9fe9bf0 | |||
| 750117b0fd | |||
| 983462f80d | |||
| 4ae31d409b | |||
| 98b414f3e2 | |||
| a0d42092e3 | |||
| f2569b6424 | |||
| 9d344d887c | |||
| 7e9154a0ea | |||
| e0ef061771 | |||
| b8694a7ade | |||
| 10d6a30f2c | |||
| 8c94aef6d0 | |||
| 19bd3bfffb | |||
| 8611ac624c | |||
| fa93b59a8c | |||
| 8b66b40f0d | |||
| c2756f15fc | |||
| 408e205c5f | |||
| 5f3ab49535 | |||
| 33431ae013 | |||
| b40ac6dc5d | |||
| fec9b5cf94 | |||
| 986fed3e7c | |||
| da5568b571 | |||
| 07f5dce97a | |||
| bb81bb5a8d | |||
| 9c2cfd7db4 | |||
| 292fbecca0 | |||
| e5a405bf43 | |||
| 66c0fc9d9a | |||
| 5fa8711bfa | |||
| dd9cd7aa0c | |||
| 8bc8765035 | |||
| b7ac4f1dd2 | |||
| 183308e444 | |||
| c941107d42 | |||
| d3d75737ed | |||
| 458decfbb3 | |||
| 7601351f51 | |||
| df45797b4a | |||
| 744a320731 | |||
| 89722336e3 | |||
| d6f4832e90 | |||
| d32699b332 | |||
| 59a15c988f | |||
| 57e5996513 | 
| @ -1,5 +1,5 @@ | |||||||
| [bumpversion] | [bumpversion] | ||||||
| current_version = 0.0.6-alpha | current_version = 0.1.2-beta | ||||||
| tag = True | tag = True | ||||||
| commit = True | commit = True | ||||||
| parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*) | parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*) | ||||||
| @ -9,11 +9,14 @@ tag_name = version/{new_version} | |||||||
|  |  | ||||||
| [bumpversion:part:release] | [bumpversion:part:release] | ||||||
| optional_value = stable | optional_value = stable | ||||||
|  | first_value = beta | ||||||
| values =  | values =  | ||||||
| 	alpha | 	alpha | ||||||
| 	beta | 	beta | ||||||
| 	stable | 	stable | ||||||
|  |  | ||||||
|  | [bumpversion:file:helm/passbook/values.yaml] | ||||||
|  |  | ||||||
| [bumpversion:file:helm/passbook/Chart.yaml] | [bumpversion:file:helm/passbook/Chart.yaml] | ||||||
|  |  | ||||||
| [bumpversion:file:.gitlab-ci.yml] | [bumpversion:file:.gitlab-ci.yml] | ||||||
| @ -34,11 +37,15 @@ values = | |||||||
|  |  | ||||||
| [bumpversion:file:passbook/lib/__init__.py] | [bumpversion:file:passbook/lib/__init__.py] | ||||||
|  |  | ||||||
|  | [bumpversion:file:passbook/hibp_policy/__init__.py] | ||||||
|  |  | ||||||
|  | [bumpversion:file:passbook/password_expiry_policy/__init__.py] | ||||||
|  |  | ||||||
| [bumpversion:file:passbook/saml_idp/__init__.py] | [bumpversion:file:passbook/saml_idp/__init__.py] | ||||||
|  |  | ||||||
| [bumpversion:file:passbook/audit/__init__.py] | [bumpversion:file:passbook/audit/__init__.py] | ||||||
|  |  | ||||||
| [bumpversion:file:passbook/oauth_provider/__init__.py] | [bumpversion:file:passbook/oauth_provider/__init__.py] | ||||||
|  |  | ||||||
| [bumpversion:file:passbook/totp/__init__.py] | [bumpversion:file:passbook/otp/__init__.py] | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,3 +1,4 @@ | |||||||
| env | env | ||||||
| helm | helm | ||||||
| passbook-ui | passbook-ui | ||||||
|  | static | ||||||
|  | |||||||
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -189,5 +189,5 @@ pyvenv.cfg | |||||||
| pip-selfcheck.json | pip-selfcheck.json | ||||||
|  |  | ||||||
| # End of https://www.gitignore.io/api/python,django | # End of https://www.gitignore.io/api/python,django | ||||||
| static/ | /static/ | ||||||
| local.env.yml | local.env.yml | ||||||
|  | |||||||
| @ -8,7 +8,14 @@ stages: | |||||||
|   - test |   - test | ||||||
|   - build |   - build | ||||||
|   - docs |   - docs | ||||||
| image: python:3.5 | image: python:3.6 | ||||||
|  | services: | ||||||
|  |   - postgres:latest | ||||||
|  |  | ||||||
|  | variables: | ||||||
|  |   POSTGRES_DB: passbook | ||||||
|  |   POSTGRES_USER: passbook | ||||||
|  |   POSTGRES_PASSWORD: 'EK-5jnKfjrGRm<77' | ||||||
|  |  | ||||||
| include: | include: | ||||||
|   - /allauth/.gitlab-ci.yml |   - /allauth/.gitlab-ci.yml | ||||||
| @ -44,9 +51,9 @@ package-docker: | |||||||
|     name: gcr.io/kaniko-project/executor:debug |     name: gcr.io/kaniko-project/executor:debug | ||||||
|     entrypoint: [""] |     entrypoint: [""] | ||||||
|   before_script: |   before_script: | ||||||
|     - echo "{\"auths\":{\"https://docker.$NEXUS_URL/\":{\"username\":\"$NEXUS_USER\",\"password\":\"$NEXUS_PASS\"}}}" > /kaniko/.docker/config.json |     - echo "{\"auths\":{\"docker.$NEXUS_URL\":{\"auth\":\"$NEXUS_AUTH\"}}}" > /kaniko/.docker/config.json | ||||||
|   script: |   script: | ||||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.0.6-alpha |     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.1.2-beta | ||||||
|   stage: build |   stage: build | ||||||
|   only: |   only: | ||||||
|     - tags |     - tags | ||||||
| @ -57,7 +64,7 @@ package-helm: | |||||||
|     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash |     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||||
|     - helm init --client-only |     - helm init --client-only | ||||||
|     - helm package helm/passbook |     - helm package helm/passbook | ||||||
|     - ./manage.py nexus_upload --method put --url $NEXUS_URL --user $NEXUS_USER --password $NEXUS_PASS --repo helm *.tgz |     - ./manage.py nexus_upload --method put --url $NEXUS_URL --auth $NEXUS_AUTH --repo helm *.tgz | ||||||
|   only: |   only: | ||||||
|     - tags |     - tags | ||||||
|     - /^version/.*$/ |     - /^version/.*$/ | ||||||
|  | |||||||
							
								
								
									
										12
									
								
								.prospector.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								.prospector.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,12 @@ | |||||||
|  | strictness: medium | ||||||
|  | test-warnings: true | ||||||
|  | doc-warnings: false | ||||||
|  |  | ||||||
|  | ignore-paths: | ||||||
|  |   - env | ||||||
|  |   - migrations | ||||||
|  |   - docs | ||||||
|  |   - node_modules | ||||||
|  |  | ||||||
|  | uses: | ||||||
|  |  - django | ||||||
							
								
								
									
										16
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										16
									
								
								Dockerfile
									
									
									
									
									
								
							| @ -6,23 +6,29 @@ COPY ./requirements.txt /app/ | |||||||
|  |  | ||||||
| WORKDIR /app/ | WORKDIR /app/ | ||||||
|  |  | ||||||
| RUN mkdir /app/static/ && \ | RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||||
|  |     mkdir /app/static/ && \ | ||||||
|     pip install -r requirements.txt && \ |     pip install -r requirements.txt && \ | ||||||
|     pip install psycopg2 && \ |     pip install psycopg2 && \ | ||||||
|     ./manage.py collectstatic --no-input |     ./manage.py collectstatic --no-input && \ | ||||||
|  |     apt-get remove --purge -y build-essential && \ | ||||||
|  |     apt-get autoremove --purge -y | ||||||
|  |  | ||||||
| FROM python:3.6-slim-stretch | FROM python:3.6-slim-stretch | ||||||
|  |  | ||||||
| COPY ./passbook/ /app/passbook | COPY ./passbook/ /app/passbook | ||||||
| COPY ./manage.py /app/ | COPY ./manage.py /app/ | ||||||
| COPY ./requirements.txt /app/ | COPY ./requirements.txt /app/ | ||||||
| COPY --from=build /app/static/* /app/static/ | COPY --from=build /app/static /app/static/ | ||||||
|  |  | ||||||
| WORKDIR /app/ | WORKDIR /app/ | ||||||
|  |  | ||||||
| RUN pip install -r requirements.txt && \ | RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||||
|  |     pip install -r requirements.txt && \ | ||||||
|     pip install psycopg2 && \ |     pip install psycopg2 && \ | ||||||
|     adduser --system --home /app/ passbook && \ |     adduser --system --home /app/ passbook && \ | ||||||
|     chown -R passbook /app/ |     chown -R passbook /app/ && \ | ||||||
|  |     apt-get remove --purge -y build-essential && \ | ||||||
|  |     apt-get autoremove --purge -y | ||||||
|  |  | ||||||
| USER passbook | USER passbook | ||||||
|  | |||||||
							
								
								
									
										14
									
								
								TODO
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								TODO
									
									
									
									
									
								
							| @ -1,14 +0,0 @@ | |||||||
| ## oauth_client |  | ||||||
|  |  | ||||||
|  - Move provider_type logic to own class, not name-based URL matching |  | ||||||
|  - add provider_type field to Provider Model |  | ||||||
|  - make Provider inherit core.application |  | ||||||
|  - Add template for popular services like github, twitter, facebook, etc |  | ||||||
|  |  | ||||||
| ## saml_idp |  | ||||||
|  |  | ||||||
|  - move certificates to Provider so each provider can have different certificates |  | ||||||
|  |  | ||||||
| ## admin |  | ||||||
|  |  | ||||||
|  - add testing page where user can supply input and let rules run against it to debug/test |  | ||||||
| @ -1,6 +1,5 @@ | |||||||
| """passbook provider""" | """passbook provider""" | ||||||
| from allauth.socialaccount.providers.oauth2.urls import default_urlpatterns | from allauth.socialaccount.providers.oauth2.urls import default_urlpatterns | ||||||
|  |  | ||||||
| from allauth_passbook.provider import PassbookProvider | from allauth_passbook.provider import PassbookProvider | ||||||
|  |  | ||||||
| urlpatterns = default_urlpatterns(PassbookProvider) | urlpatterns = default_urlpatterns(PassbookProvider) | ||||||
|  | |||||||
| @ -1,10 +1,10 @@ | |||||||
| """passbook adapter""" | """passbook adapter""" | ||||||
| import requests | import requests | ||||||
|  |  | ||||||
| from allauth.socialaccount import app_settings | from allauth.socialaccount import app_settings | ||||||
| from allauth.socialaccount.providers.oauth2.views import (OAuth2Adapter, | from allauth.socialaccount.providers.oauth2.views import (OAuth2Adapter, | ||||||
|                                                           OAuth2CallbackView, |                                                           OAuth2CallbackView, | ||||||
|                                                           OAuth2LoginView) |                                                           OAuth2LoginView) | ||||||
|  |  | ||||||
| from allauth_passbook.provider import PassbookProvider | from allauth_passbook.provider import PassbookProvider | ||||||
|  |  | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,6 +1,6 @@ | |||||||
| apiVersion: v1 | apiVersion: v1 | ||||||
| appVersion: "0.0.6-alpha" | appVersion: "0.1.2-beta" | ||||||
| description: A Helm chart for passbook. | description: A Helm chart for passbook. | ||||||
| name: passbook | name: passbook | ||||||
| version: 1.0.0 | version: "0.1.2-beta" | ||||||
| icon: https://passbook.beryju.org/images/logo.png | icon: https://passbook.beryju.org/images/logo.png | ||||||
|  | |||||||
| @ -36,7 +36,7 @@ data: | |||||||
|     debug: false |     debug: false | ||||||
|     secure_proxy_header: |     secure_proxy_header: | ||||||
|       HTTP_X_FORWARDED_PROTO: https |       HTTP_X_FORWARDED_PROTO: https | ||||||
|     redis: {{ .Release.Name }}-redis |     redis: ":{{ .Values.redis.password }}@{{ .Release.Name }}-redis-master" | ||||||
|     # Error reporting, sends stacktrace to sentry.services.beryju.org |     # Error reporting, sends stacktrace to sentry.services.beryju.org | ||||||
|     error_report_enabled: {{ .Values.config.error_reporting }} |     error_report_enabled: {{ .Values.config.error_reporting }} | ||||||
|  |  | ||||||
| @ -105,10 +105,9 @@ data: | |||||||
|         email: mail # or userPrincipalName |         email: mail # or userPrincipalName | ||||||
|       user_attribute_map: |       user_attribute_map: | ||||||
|         active_directory: |         active_directory: | ||||||
|           sAMAccountName: username |           username: "%(sAMAccountName)s" | ||||||
|           mail: email |           email: "%(mail)s" | ||||||
|           given_name: first_name |           name: "%(displayName)" | ||||||
|           name: last_name |  | ||||||
|       # # Create new users in LDAP upon sign-up |       # # Create new users in LDAP upon sign-up | ||||||
|       # create_users: true |       # create_users: true | ||||||
|       # # Reset LDAP password when user reset their password |       # # Reset LDAP password when user reset their password | ||||||
|  | |||||||
| @ -5,7 +5,7 @@ | |||||||
| replicaCount: 1 | replicaCount: 1 | ||||||
|  |  | ||||||
| image: | image: | ||||||
|   tag: latest |   tag: 0.1.2-beta | ||||||
|  |  | ||||||
| nameOverride: "" | nameOverride: "" | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook""" | """passbook""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook admin""" | """passbook admin""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
							
								
								
									
										6
									
								
								passbook/admin/api/urls.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								passbook/admin/api/urls.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,6 @@ | |||||||
|  | """Versioned Admin API Urls""" | ||||||
|  | from django.conf.urls import include, url | ||||||
|  |  | ||||||
|  | urlpatterns = [ | ||||||
|  |     url(r'^v1/', include('passbook.admin.api.v1.urls', namespace='v1')), | ||||||
|  | ] | ||||||
							
								
								
									
										22
									
								
								passbook/admin/api/v1/applications.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										22
									
								
								passbook/admin/api/v1/applications.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,22 @@ | |||||||
|  | """passbook admin application API""" | ||||||
|  | from rest_framework.permissions import IsAdminUser | ||||||
|  | from rest_framework.serializers import ModelSerializer | ||||||
|  | from rest_framework.viewsets import ModelViewSet | ||||||
|  |  | ||||||
|  | from passbook.core.models import Application | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class ApplicationSerializer(ModelSerializer): | ||||||
|  |     """Application Serializer""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |         model = Application | ||||||
|  |         fields = '__all__' | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class ApplicationViewSet(ModelViewSet): | ||||||
|  |     """Application Viewset""" | ||||||
|  |  | ||||||
|  |     permission_classes = [IsAdminUser] | ||||||
|  |     serializer_class = ApplicationSerializer | ||||||
|  |     queryset = Application.objects.all() | ||||||
| @ -1,9 +1,33 @@ | |||||||
| """passbook admin API URLs""" | """passbook admin API URLs""" | ||||||
|  | from django.urls import path | ||||||
|  | from drf_yasg import openapi | ||||||
|  | from drf_yasg.views import get_schema_view | ||||||
|  | from rest_framework import permissions | ||||||
| from rest_framework.routers import DefaultRouter | from rest_framework.routers import DefaultRouter | ||||||
|  |  | ||||||
|  | from passbook.admin.api.v1.applications import ApplicationViewSet | ||||||
| from passbook.admin.api.v1.groups import GroupViewSet | from passbook.admin.api.v1.groups import GroupViewSet | ||||||
|  | from passbook.admin.api.v1.users import UserViewSet | ||||||
|  |  | ||||||
| router = DefaultRouter() | router = DefaultRouter() | ||||||
| router.register(r'groups', GroupViewSet) | router.register('applications', ApplicationViewSet) | ||||||
|  | router.register('groups', GroupViewSet) | ||||||
|  | router.register('users', UserViewSet) | ||||||
|  |  | ||||||
| urlpatterns = router.urls | SchemaView = get_schema_view( | ||||||
|  |     openapi.Info( | ||||||
|  |         title="passbook Administration API", | ||||||
|  |         default_version='v1', | ||||||
|  |         description="Internal passbook API for Administration Interface", | ||||||
|  |         contact=openapi.Contact(email="contact@snippets.local"), | ||||||
|  |         license=openapi.License(name="MIT License"), | ||||||
|  |     ), | ||||||
|  |     public=True, | ||||||
|  |     permission_classes=(permissions.IsAdminUser,), | ||||||
|  | ) | ||||||
|  |  | ||||||
|  | urlpatterns = router.urls + [ | ||||||
|  |     path('swagger.yml', SchemaView.without_ui(cache_timeout=0), name='schema-json'), | ||||||
|  |     path('swagger/', SchemaView.with_ui('swagger', cache_timeout=0), name='schema-swagger-ui'), | ||||||
|  | ] | ||||||
|  | app_name = 'passbook.admin' | ||||||
|  | |||||||
							
								
								
									
										23
									
								
								passbook/admin/api/v1/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/admin/api/v1/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | |||||||
|  | """passbook admin user API""" | ||||||
|  | from rest_framework.permissions import IsAdminUser | ||||||
|  | from rest_framework.serializers import ModelSerializer | ||||||
|  | from rest_framework.viewsets import ModelViewSet | ||||||
|  |  | ||||||
|  | from passbook.core.models import User | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UserSerializer(ModelSerializer): | ||||||
|  |     """User Serializer""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |         model = User | ||||||
|  |         fields = ['is_superuser', 'username', 'name', 'email', 'date_joined', | ||||||
|  |                   'uuid'] | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UserViewSet(ModelViewSet): | ||||||
|  |     """User Viewset""" | ||||||
|  |  | ||||||
|  |     permission_classes = [IsAdminUser] | ||||||
|  |     serializer_class = UserSerializer | ||||||
|  |     queryset = User.objects.all() | ||||||
| @ -4,7 +4,7 @@ from django import forms | |||||||
| from passbook.core.models import User | from passbook.core.models import User | ||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| class RuleTestForm(forms.Form): | class PolicyTestForm(forms.Form): | ||||||
|     """Form to test rule against user""" |     """Form to test policies against user""" | ||||||
| 
 | 
 | ||||||
|     user = forms.ModelChoiceField(queryset=User.objects.all()) |     user = forms.ModelChoiceField(queryset=User.objects.all()) | ||||||
| @ -1,6 +1,6 @@ | |||||||
| """passbook core source form fields""" | """passbook core source form fields""" | ||||||
| # from django import forms | # from django import forms | ||||||
|  |  | ||||||
| SOURCE_FORM_FIELDS = ['name', 'slug', 'enabled'] | SOURCE_FORM_FIELDS = ['name', 'slug', 'enabled', 'policies'] | ||||||
|  |  | ||||||
| # class SourceForm(forms.Form) | # class SourceForm(forms.Form) | ||||||
|  | |||||||
							
								
								
									
										17
									
								
								passbook/admin/forms/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/admin/forms/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | |||||||
|  | """passbook administrative user forms""" | ||||||
|  |  | ||||||
|  | from django import forms | ||||||
|  |  | ||||||
|  | from passbook.core.models import User | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UserForm(forms.ModelForm): | ||||||
|  |     """Update User Details""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = User | ||||||
|  |         fields = ['username', 'name', 'email', 'is_staff', 'is_active'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput | ||||||
|  |         } | ||||||
| @ -1,2 +1,2 @@ | |||||||
| django-rest-framework | django-rest-framework | ||||||
| django-rest-swagger | drf_yasg | ||||||
|  | |||||||
| @ -9,8 +9,10 @@ | |||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <div class="container"> | ||||||
|   <h1>{% trans "Applications" %}</h1> |     <h1><span class="pficon-applications"></span> {% trans "Applications" %}</h1> | ||||||
|   <a href="{% url 'passbook_admin:application-create' %}" class="btn btn-primary"> |     <span>{% trans "External Applications which use passbook as Identity-Provider, utilizing protocols like OAuth2 and SAML." %}</span> | ||||||
|  |     <hr> | ||||||
|  |     <a href="{% url 'passbook_admin:application-create' %}?back={{ request.get_full_path }}" class="btn btn-primary"> | ||||||
|         {% trans 'Create...' %} |         {% trans 'Create...' %} | ||||||
|     </a> |     </a> | ||||||
|     <hr> |     <hr> | ||||||
| @ -19,6 +21,7 @@ | |||||||
|             <tr> |             <tr> | ||||||
|                 <th>{% trans 'Name' %}</th> |                 <th>{% trans 'Name' %}</th> | ||||||
|                 <th>{% trans 'Provider' %}</th> |                 <th>{% trans 'Provider' %}</th> | ||||||
|  |                 <th>{% trans 'Provider Type' %}</th> | ||||||
|                 <th></th> |                 <th></th> | ||||||
|             </tr> |             </tr> | ||||||
|         </thead> |         </thead> | ||||||
| @ -26,10 +29,13 @@ | |||||||
|             {% for application in object_list %} |             {% for application in object_list %} | ||||||
|             <tr> |             <tr> | ||||||
|                 <td>{{ application.name }}</td> |                 <td>{{ application.name }}</td> | ||||||
|           <td>{{ application.provider }}</td> |                 <td>{{ application.get_provider }}</td> | ||||||
|  |                 <td>{{ application.get_provider|verbose_name }}</td> | ||||||
|                 <td> |                 <td> | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |                         href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|                 </td> |                 </td> | ||||||
|             </tr> |             </tr> | ||||||
|             {% endfor %} |             {% endfor %} | ||||||
|  | |||||||
| @ -8,8 +8,7 @@ | |||||||
| {% endblock %} | {% endblock %} | ||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <h1><span class="pficon-catalog"></span> {% trans "Audit Log" %}</h1> | ||||||
|   <h1>{% trans "Audit Log" %}</h1> |  | ||||||
| <div id="pf-list-standard" class="list-group list-view-pf list-view-pf-view"> | <div id="pf-list-standard" class="list-group list-view-pf list-view-pf-view"> | ||||||
|     {% for entry in object_list %} |     {% for entry in object_list %} | ||||||
|     <div class="list-group-item"> |     <div class="list-group-item"> | ||||||
| @ -23,6 +22,7 @@ | |||||||
|                         {{ entry.action }} |                         {{ entry.action }} | ||||||
|                     </div> |                     </div> | ||||||
|                     <div class="list-group-item-text"> |                     <div class="list-group-item-text"> | ||||||
|  |                         {{ entry.context }} | ||||||
|                     </div> |                     </div> | ||||||
|                 </div> |                 </div> | ||||||
|                 <div class="list-view-pf-additional-info"> |                 <div class="list-view-pf-additional-info"> | ||||||
| @ -30,20 +30,23 @@ | |||||||
|                         <span class="pficon pficon-user"></span> |                         <span class="pficon pficon-user"></span> | ||||||
|                         <strong>{{ entry.user }}</strong> |                         <strong>{{ entry.user }}</strong> | ||||||
|                     </div> |                     </div> | ||||||
|             <div class="list-view-pf-additional-info-item"> |  | ||||||
|               <span class="pficon pficon-screen"></span> |  | ||||||
|               <strong>{{ entry.request_ip }}</strong> |  | ||||||
|             </div> |  | ||||||
|                     <div class="list-view-pf-additional-info-item"> |                     <div class="list-view-pf-additional-info-item"> | ||||||
|                         <span class="pficon pficon-cluster"></span> |                         <span class="pficon pficon-cluster"></span> | ||||||
|                         <strong>{{ entry.app|default:'-' }}</strong> |                         <strong>{{ entry.app|default:'-' }}</strong> | ||||||
|                     </div> |                     </div> | ||||||
|  |                     <div class="list-view-pf-additional-info-item"> | ||||||
|  |                         <span class="fa fa-clock-o"></span> | ||||||
|  |                         <strong>{{ entry.created }}</strong> | ||||||
|  |                     </div> | ||||||
|  |                     <div class="list-view-pf-additional-info-item"> | ||||||
|  |                         <span class="pficon pficon-screen"></span> | ||||||
|  |                         <strong>{{ entry.request_ip }}</strong> | ||||||
|  |                     </div> | ||||||
|                 </div> |                 </div> | ||||||
|             </div> |             </div> | ||||||
|         </div> |         </div> | ||||||
|     </div> |     </div> | ||||||
|     {% endfor %} |     {% endfor %} | ||||||
|   </div> |  | ||||||
|     <script> |     <script> | ||||||
|         $(document).ready(function () { |         $(document).ready(function () { | ||||||
|             // Row Checkbox Selection |             // Row Checkbox Selection | ||||||
|  | |||||||
| @ -17,8 +17,11 @@ | |||||||
|   <li class="{% is_active 'passbook_admin:providers' 'passbook_admin:provider-create' 'passbook_admin:provider-update' 'passbook_admin:provider-delete' %}"> |   <li class="{% is_active 'passbook_admin:providers' 'passbook_admin:provider-create' 'passbook_admin:provider-update' 'passbook_admin:provider-delete' %}"> | ||||||
|     <a href="{% url 'passbook_admin:providers' %}">{% trans 'Providers' %}</a> |     <a href="{% url 'passbook_admin:providers' %}">{% trans 'Providers' %}</a> | ||||||
|   </li> |   </li> | ||||||
|   <li class="{% is_active 'passbook_admin:rules' 'passbook_admin:rule-create' 'passbook_admin:rule-update' 'passbook_admin:rule-delete' 'passbook_admin:rule-test' %}"> |   <li class="{% is_active 'passbook_admin:factors' 'passbook_admin:factor-create' 'passbook_admin:factor-update' 'passbook_admin:factor-delete' %}"> | ||||||
|     <a href="{% url 'passbook_admin:rules' %}">{% trans 'Rules' %}</a> |     <a href="{% url 'passbook_admin:factors' %}">{% trans 'Factors' %}</a> | ||||||
|  |   </li> | ||||||
|  |   <li class="{% is_active 'passbook_admin:policies' 'passbook_admin:policy-create' 'passbook_admin:policy-update' 'passbook_admin:policy-delete' 'passbook_admin:policy-test' %}"> | ||||||
|  |     <a href="{% url 'passbook_admin:policies' %}">{% trans 'Policies' %}</a> | ||||||
|   </li> |   </li> | ||||||
|   <li class="{% is_active 'passbook_admin:invitations' 'passbook_admin:invitation-create' 'passbook_admin:invitation-update' 'passbook_admin:invitation-delete' 'passbook_admin:invitation-test' %}"> |   <li class="{% is_active 'passbook_admin:invitations' 'passbook_admin:invitation-create' 'passbook_admin:invitation-update' 'passbook_admin:invitation-delete' 'passbook_admin:invitation-test' %}"> | ||||||
|     <a href="{% url 'passbook_admin:invitations' %}">{% trans 'Invitations' %}</a> |     <a href="{% url 'passbook_admin:invitations' %}">{% trans 'Invitations' %}</a> | ||||||
|  | |||||||
							
								
								
									
										62
									
								
								passbook/admin/templates/administration/factor/list.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								passbook/admin/templates/administration/factor/list.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,62 @@ | |||||||
|  | {% extends "administration/base.html" %} | ||||||
|  |  | ||||||
|  | {% load i18n %} | ||||||
|  | {% load utils %} | ||||||
|  | {% load admin_reflection %} | ||||||
|  |  | ||||||
|  | {% block title %} | ||||||
|  | {% title %} | ||||||
|  | {% endblock %} | ||||||
|  |  | ||||||
|  | {% block content %} | ||||||
|  | <div class="container"> | ||||||
|  |     <h1><span class="pficon-plugged"></span> {% trans "Factors" %}</h1> | ||||||
|  |     <span>{% trans "Factors required for a user to successfully authenticate." %}</span> | ||||||
|  |     <hr> | ||||||
|  |     <div class="dropdown"> | ||||||
|  |         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||||
|  |             {% trans 'Create...' %} | ||||||
|  |             <span class="caret"></span> | ||||||
|  |         </button> | ||||||
|  |         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||||
|  |             {% for type, name in types.items %} | ||||||
|  |             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||||
|  |                     href="{% url 'passbook_admin:factor-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||||
|  |             {% endfor %} | ||||||
|  |         </ul> | ||||||
|  |     </div> | ||||||
|  |     <hr> | ||||||
|  |     <table class="table table-striped table-bordered"> | ||||||
|  |         <thead> | ||||||
|  |             <tr> | ||||||
|  |                 <th>{% trans 'Name' %}</th> | ||||||
|  |                 <th>{% trans 'Type' %}</th> | ||||||
|  |                 <th>{% trans 'Order' %}</th> | ||||||
|  |                 <th>{% trans 'Enabled?' %}</th> | ||||||
|  |                 <th></th> | ||||||
|  |             </tr> | ||||||
|  |         </thead> | ||||||
|  |         <tbody> | ||||||
|  |             {% for factor in object_list %} | ||||||
|  |             <tr> | ||||||
|  |                 <td>{{ factor.name }} ({{ factor.slug }})</td> | ||||||
|  |                 <td>{{ factor|verbose_name }}</td> | ||||||
|  |                 <td>{{ factor.order }}</td> | ||||||
|  |                 <td>{{ factor.enabled }}</td> | ||||||
|  |                 <td> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:factor-update' pk=factor.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:factor-delete' pk=factor.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|  |                     {% get_links factor as links %} | ||||||
|  |                     {% for name, href in links.items %} | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||||
|  |                     {% endfor %} | ||||||
|  |                 </td> | ||||||
|  |             </tr> | ||||||
|  |             {% endfor %} | ||||||
|  |         </tbody> | ||||||
|  |     </table> | ||||||
|  | </div> | ||||||
|  | {% endblock %} | ||||||
| @ -9,8 +9,10 @@ | |||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <div class="container"> | ||||||
|   <h1>{% trans "Invitations" %}</h1> |     <h1><span class="pficon-migration"></span> {% trans "Invitations" %}</h1> | ||||||
|   <a href="{% url 'passbook_admin:invitation-create' %}" class="btn btn-primary"> |     <span>{% trans "Create Invitation Links which optionally force a username or expire on a set date." %}</span> | ||||||
|  |     <hr> | ||||||
|  |     <a href="{% url 'passbook_admin:invitation-create' %}?back={{ request.get_full_path }}" class="btn btn-primary"> | ||||||
|         {% trans 'Create...' %} |         {% trans 'Create...' %} | ||||||
|     </a> |     </a> | ||||||
|     <hr> |     <hr> | ||||||
| @ -26,9 +28,12 @@ | |||||||
|             {% for invitation in object_list %} |             {% for invitation in object_list %} | ||||||
|             <tr> |             <tr> | ||||||
|                 <td>{{ invitation.expires|default:"Never" }}</td> |                 <td>{{ invitation.expires|default:"Never" }}</td> | ||||||
|           <td><pre>{{ invitation.link }}</pre></td> |  | ||||||
|                 <td> |                 <td> | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |                     <pre>{{ invitation.link }}</pre> | ||||||
|  |                 </td> | ||||||
|  |                 <td> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|                 </td> |                 </td> | ||||||
|             </tr> |             </tr> | ||||||
|             {% endfor %} |             {% endfor %} | ||||||
|  | |||||||
| @ -7,11 +7,18 @@ | |||||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|             <h2 class="card-pf-title"> |             <h2 class="card-pf-title"> | ||||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %}</a> |                 <a href="{% url 'passbook_admin:applications' %}"> | ||||||
|  |                     <span class="pficon-applications"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %} | ||||||
|  |                 </a> | ||||||
|             </h2> |             </h2> | ||||||
|             <div class="card-pf-body"> |             <div class="card-pf-body"> | ||||||
|                 <p class="card-pf-aggregate-status-notifications"> |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ application_count }}</a></span> |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="{% url 'passbook_admin:applications' %}"> | ||||||
|  |                             <span class="pficon pficon-ok"></span>{{ application_count }} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|                 </p> |                 </p> | ||||||
|             </div> |             </div> | ||||||
|         </div> |         </div> | ||||||
| @ -19,11 +26,18 @@ | |||||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|             <h2 class="card-pf-title"> |             <h2 class="card-pf-title"> | ||||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %}</a> |                 <a href="{% url 'passbook_admin:sources' %}"> | ||||||
|  |                     <span class="pficon-resource-pool"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Sources' %} | ||||||
|  |                 </a> | ||||||
|             </h2> |             </h2> | ||||||
|             <div class="card-pf-body"> |             <div class="card-pf-body"> | ||||||
|                 <p class="card-pf-aggregate-status-notifications"> |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ provider_count }}</a></span> |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="{% url 'passbook_admin:sources' %}"> | ||||||
|  |                             <span class="pficon pficon-ok"></span>{{ source_count }} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|                 </p> |                 </p> | ||||||
|             </div> |             </div> | ||||||
|         </div> |         </div> | ||||||
| @ -31,11 +45,22 @@ | |||||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|             <h2 class="card-pf-title"> |             <h2 class="card-pf-title"> | ||||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Rules' %}</a> |                 <a href="{% url 'passbook_admin:providers' %}"> | ||||||
|  |                     <span class="pficon-integration"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %} | ||||||
|  |                 </a> | ||||||
|             </h2> |             </h2> | ||||||
|             <div class="card-pf-body"> |             <div class="card-pf-body"> | ||||||
|                 <p class="card-pf-aggregate-status-notifications"> |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ rule_count }}</a></span> |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="{% url 'passbook_admin:providers' %}"> | ||||||
|  |                             {% if providers_without_application.exists %} | ||||||
|  |                             <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: At least one Provider has no application assigned.' %}"></span> {{ provider_count }} | ||||||
|  |                             {% else %} | ||||||
|  |                             <span class="pficon pficon-ok"></span> {{ provider_count }} | ||||||
|  |                             {% endif %} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|                 </p> |                 </p> | ||||||
|             </div> |             </div> | ||||||
|         </div> |         </div> | ||||||
| @ -43,11 +68,126 @@ | |||||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|             <h2 class="card-pf-title"> |             <h2 class="card-pf-title"> | ||||||
|         <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %}</a> |                 <a href="{% url 'passbook_admin:factors' %}"> | ||||||
|  |                     <span class="pficon-plugged"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Factors' %} | ||||||
|  |                 </a> | ||||||
|             </h2> |             </h2> | ||||||
|             <div class="card-pf-body"> |             <div class="card-pf-body"> | ||||||
|                 <p class="card-pf-aggregate-status-notifications"> |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|           <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ user_count }}</a></span> |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         {% if factor_count < 1 %} | ||||||
|  |                         <span class="pficon-error-circle-o" data-toggle="tooltip" data-placement="right" | ||||||
|  |                             title="{% trans 'No Factors configured. No Users will be able to login.' %}"></span> | ||||||
|  |                         {{ factor_count }} | ||||||
|  |                         {% else %} | ||||||
|  |                         <span class="pficon pficon-ok"></span>{{ factor_count }} | ||||||
|  |                         {% endif %} | ||||||
|  |                     </span> | ||||||
|  |                 </p> | ||||||
|  |             </div> | ||||||
|  |         </div> | ||||||
|  |     </div> | ||||||
|  |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|  |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|  |             <h2 class="card-pf-title"> | ||||||
|  |                 <a href="{% url 'passbook_admin:policies' %}"> | ||||||
|  |                     <span class="pficon-infrastructure"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Policies' %} | ||||||
|  |                 </a> | ||||||
|  |             </h2> | ||||||
|  |             <div class="card-pf-body"> | ||||||
|  |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|  |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         {% if policies_without_attachment > 0 %} | ||||||
|  |                         <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" | ||||||
|  |                             title="{% trans 'Policies without attachment exist.' %}"></span> | ||||||
|  |                         {{ policy_count }} | ||||||
|  |                         {% else %} | ||||||
|  |                         <span class="pficon pficon-ok"></span>{{ policy_count }} | ||||||
|  |                         {% endif %} | ||||||
|  |                     </span> | ||||||
|  |                 </p> | ||||||
|  |             </div> | ||||||
|  |         </div> | ||||||
|  |     </div> | ||||||
|  |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|  |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|  |             <h2 class="card-pf-title"> | ||||||
|  |                 <a href="{% url 'passbook_admin:invitations' %}"> | ||||||
|  |                     <span class="pficon-migration"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Invitation' %} | ||||||
|  |                 </a> | ||||||
|  |             </h2> | ||||||
|  |             <div class="card-pf-body"> | ||||||
|  |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|  |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="{% url 'passbook_admin:invitations' %}"> | ||||||
|  |                             <span class="pficon pficon-ok"></span>{{ invitation_count }} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|  |                 </p> | ||||||
|  |             </div> | ||||||
|  |         </div> | ||||||
|  |     </div> | ||||||
|  |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|  |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|  |             <h2 class="card-pf-title"> | ||||||
|  |                 <a href="{% url 'passbook_admin:users' %}"> | ||||||
|  |                     <span class="pficon-users"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %} | ||||||
|  |                 </a> | ||||||
|  |             </h2> | ||||||
|  |             <div class="card-pf-body"> | ||||||
|  |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|  |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="{% url 'passbook_admin:users' %}"> | ||||||
|  |                             <span class="pficon pficon-ok"></span>{{ user_count }} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|  |                 </p> | ||||||
|  |             </div> | ||||||
|  |         </div> | ||||||
|  |     </div> | ||||||
|  |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|  |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|  |             <h2 class="card-pf-title"> | ||||||
|  |                 <a href="#"> | ||||||
|  |                     <span class="pficon-bundle"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Version' %} | ||||||
|  |                 </a> | ||||||
|  |             </h2> | ||||||
|  |             <div class="card-pf-body"> | ||||||
|  |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|  |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="#"> | ||||||
|  |                             {{ version }} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|  |                 </p> | ||||||
|  |             </div> | ||||||
|  |         </div> | ||||||
|  |     </div> | ||||||
|  |     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||||
|  |         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||||
|  |             <h2 class="card-pf-title"> | ||||||
|  |                 <a href="#"> | ||||||
|  |                     <span class="pficon-server"></span> | ||||||
|  |                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Worker(s)' %} | ||||||
|  |                 </a> | ||||||
|  |             </h2> | ||||||
|  |             <div class="card-pf-body"> | ||||||
|  |                 <p class="card-pf-aggregate-status-notifications"> | ||||||
|  |                     <span class="card-pf-aggregate-status-notification"> | ||||||
|  |                         <a href="#"> | ||||||
|  |                             {% if worker_count < 1%} | ||||||
|  |                             <span class="pficon-error-circle-o" data-toggle="tooltip" data-placement="right" | ||||||
|  |                                 title="{% trans 'No workers connected. Policies will not work and you may expect other issues.' %}"></span> {{ worker_count }} | ||||||
|  |                             {% else %} | ||||||
|  |                             <span class="pficon pficon-ok"></span>{{ worker_count }} | ||||||
|  |                             {% endif %} | ||||||
|  |                         </a> | ||||||
|  |                     </span> | ||||||
|                 </p> |                 </p> | ||||||
|             </div> |             </div> | ||||||
|         </div> |         </div> | ||||||
|  | |||||||
							
								
								
									
										62
									
								
								passbook/admin/templates/administration/policy/list.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								passbook/admin/templates/administration/policy/list.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,62 @@ | |||||||
|  | {% extends "administration/base.html" %} | ||||||
|  |  | ||||||
|  | {% load i18n %} | ||||||
|  | {% load utils %} | ||||||
|  |  | ||||||
|  | {% block title %} | ||||||
|  | {% title %} | ||||||
|  | {% endblock %} | ||||||
|  |  | ||||||
|  | {% block content %} | ||||||
|  | <div class="container"> | ||||||
|  |     <h1><span class="pficon-infrastructure"></span> {% trans "Policies" %}</h1> | ||||||
|  |     <span>{% trans "Allow users to use Applications based on properties, enforce Password Criteria and selectively apply Factors." %}</span> | ||||||
|  |     <hr> | ||||||
|  |     <div class="dropdown"> | ||||||
|  |         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||||
|  |             {% trans 'Create...' %} | ||||||
|  |             <span class="caret"></span> | ||||||
|  |         </button> | ||||||
|  |         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||||
|  |             {% for type, name in types.items %} | ||||||
|  |             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||||
|  |                     href="{% url 'passbook_admin:policy-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||||
|  |             {% endfor %} | ||||||
|  |         </ul> | ||||||
|  |     </div> | ||||||
|  |     <hr> | ||||||
|  |     <table class="table table-striped table-bordered"> | ||||||
|  |         <thead> | ||||||
|  |             <tr> | ||||||
|  |                 <th></th> | ||||||
|  |                 <th>{% trans 'Name' %}</th> | ||||||
|  |                 <th>{% trans 'Type' %}</th> | ||||||
|  |                 <th></th> | ||||||
|  |             </tr> | ||||||
|  |         </thead> | ||||||
|  |         <tbody> | ||||||
|  |             {% for policy in object_list %} | ||||||
|  |             <tr {% if not policy.policymodel_set.exists %} class="warning" {% endif %}> | ||||||
|  |                 <th> | ||||||
|  |                     {% if not policy.policymodel_set.exists %} | ||||||
|  |                     <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: Policy is not assigned.' %}"></span> | ||||||
|  |                     {% else %} | ||||||
|  |                     <span class="pficon-ok" data-toggle="tooltip" data-placement="right" title="{% blocktrans with objects=policy.policymodel_set.all|join:', ' %}Assigned to objects {{ objects }}{% endblocktrans %}"></span> | ||||||
|  |                     {% endif %} | ||||||
|  |                 </th> | ||||||
|  |                 <td>{{ policy.name }}</td> | ||||||
|  |                 <td>{{ policy|verbose_name }}</td> | ||||||
|  |                 <td> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:policy-update' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:policy-test' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:policy-delete' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|  |                 </td> | ||||||
|  |             </tr> | ||||||
|  |             {% endfor %} | ||||||
|  |         </tbody> | ||||||
|  |     </table> | ||||||
|  | </div> | ||||||
|  | {% endblock %} | ||||||
							
								
								
									
										7
									
								
								passbook/admin/templates/administration/policy/test.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								passbook/admin/templates/administration/policy/test.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,7 @@ | |||||||
|  | {% extends 'generic/form.html' %} | ||||||
|  |  | ||||||
|  | {% load i18n %} | ||||||
|  |  | ||||||
|  | {% block above_form %} | ||||||
|  | <h1>{% blocktrans with policy=policy %}Test policy {{ policy }}{% endblocktrans %}</h1> | ||||||
|  | {% endblock %} | ||||||
| @ -10,7 +10,9 @@ | |||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <div class="container"> | ||||||
|   <h1>{% trans "Providers" %}</h1> |     <h1><span class="pficon-integration"></span> {% trans "Providers" %}</h1> | ||||||
|  |     <span>{% trans "Authentication Protocol Provider, used as Protocol behind an Application." %}</span> | ||||||
|  |     <hr> | ||||||
|     <div class="dropdown"> |     <div class="dropdown"> | ||||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> |         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||||
|             {% trans 'Create...' %} |             {% trans 'Create...' %} | ||||||
| @ -18,7 +20,8 @@ | |||||||
|         </button> |         </button> | ||||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> |         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||||
|             {% for type, name in types.items %} |             {% for type, name in types.items %} | ||||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:provider-create' %}?type={{ type }}">{{ name }}</a></li> |             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||||
|  |                     href="{% url 'passbook_admin:provider-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||||
|             {% endfor %} |             {% endfor %} | ||||||
|         </ul> |         </ul> | ||||||
|     </div> |     </div> | ||||||
| @ -26,22 +29,33 @@ | |||||||
|     <table class="table table-striped table-bordered"> |     <table class="table table-striped table-bordered"> | ||||||
|         <thead> |         <thead> | ||||||
|             <tr> |             <tr> | ||||||
|  |                 <th></th> | ||||||
|                 <th>{% trans 'Name' %}</th> |                 <th>{% trans 'Name' %}</th> | ||||||
|         <th>{% trans 'Class' %}</th> |                 <th>{% trans 'Type' %}</th> | ||||||
|                 <th></th> |                 <th></th> | ||||||
|             </tr> |             </tr> | ||||||
|         </thead> |         </thead> | ||||||
|         <tbody> |         <tbody> | ||||||
|             {% for provider in object_list %} |             {% for provider in object_list %} | ||||||
|         <tr> |             <tr {% if not provider.application %} class="warning" {% endif %}> | ||||||
|  |                 <th> | ||||||
|  |                     {% if not provider.application %} | ||||||
|  |                     <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: Provider has no application assigned.' %}"></span> | ||||||
|  |                     {% else %} | ||||||
|  |                     <span class="pficon-ok" data-toggle="tooltip" data-placement="right" title="{% blocktrans with app=provider.application %}Assigned to Application {{ app }}{% endblocktrans %}"></span> | ||||||
|  |                     {% endif %} | ||||||
|  |                 </th> | ||||||
|                 <td>{{ provider.name }}</td> |                 <td>{{ provider.name }}</td> | ||||||
|           <td>{{ provider|fieldtype }}</td> |                 <td>{{ provider|verbose_name }}</td> | ||||||
|                 <td> |                 <td> | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |                         href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|                     {% get_links provider as links %} |                     {% get_links provider as links %} | ||||||
|                     {% for name, href in links.items %} |                     {% for name, href in links.items %} | ||||||
|               <a class="btn btn-default btn-sm" href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||||
|                     {% endfor %} |                     {% endfor %} | ||||||
|                 </td> |                 </td> | ||||||
|             </tr> |             </tr> | ||||||
|  | |||||||
| @ -1,48 +0,0 @@ | |||||||
| {% extends "administration/base.html" %} |  | ||||||
|  |  | ||||||
| {% load i18n %} |  | ||||||
| {% load utils %} |  | ||||||
|  |  | ||||||
| {% block title %} |  | ||||||
| {% title %} |  | ||||||
| {% endblock %} |  | ||||||
|  |  | ||||||
| {% block content %} |  | ||||||
| <div class="container"> |  | ||||||
|   <h1>{% trans "Rules" %}</h1> |  | ||||||
|   <div class="dropdown"> |  | ||||||
|     <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> |  | ||||||
|       {% trans 'Create...' %} |  | ||||||
|       <span class="caret"></span> |  | ||||||
|     </button> |  | ||||||
|     <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> |  | ||||||
|       {% for type, name in types.items %} |  | ||||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:rule-create' %}?type={{ type }}">{{ name }}</a></li> |  | ||||||
|       {% endfor %} |  | ||||||
|     </ul> |  | ||||||
|   </div> |  | ||||||
|   <hr> |  | ||||||
|   <table class="table table-striped table-bordered"> |  | ||||||
|     <thead> |  | ||||||
|       <tr> |  | ||||||
|         <th>{% trans 'Name' %}</th> |  | ||||||
|         <th>{% trans 'Class' %}</th> |  | ||||||
|         <th></th> |  | ||||||
|       </tr> |  | ||||||
|     </thead> |  | ||||||
|     <tbody> |  | ||||||
|       {% for rule in object_list %} |  | ||||||
|         <tr> |  | ||||||
|           <td>{{ rule.name }}</td> |  | ||||||
|           <td>{{ rule|fieldtype }}</td> |  | ||||||
|           <td> |  | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-update' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> |  | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-test' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> |  | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:rule-delete' pk=rule.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |  | ||||||
|           </td> |  | ||||||
|         </tr> |  | ||||||
|       {% endfor %} |  | ||||||
|     </tbody> |  | ||||||
|   </table> |  | ||||||
| </div> |  | ||||||
| {% endblock %} |  | ||||||
| @ -1,7 +0,0 @@ | |||||||
| {% extends 'generic/form.html' %} |  | ||||||
|  |  | ||||||
| {% load i18n %} |  | ||||||
|  |  | ||||||
| {% block above_form %} |  | ||||||
| <h1>{% blocktrans with rule=rule %}Test rule {{ rule }}{% endblocktrans %}</h1> |  | ||||||
| {% endblock %} |  | ||||||
| @ -6,7 +6,9 @@ | |||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <div class="container"> | ||||||
|   <h1>{% trans "Sources" %}</h1> |     <h1><span class="pficon-resource-pool"></span> {% trans "Sources" %}</h1> | ||||||
|  |     <span>{% trans "External Sources which can be used to get Identities into passbook, for example Social Providers like Twiter and GitHub or Enterprise Providers like ADFS and LDAP." %}</span> | ||||||
|  |     <hr> | ||||||
|     <div class="dropdown"> |     <div class="dropdown"> | ||||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> |         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||||
|             {% trans 'Create...' %} |             {% trans 'Create...' %} | ||||||
| @ -14,7 +16,8 @@ | |||||||
|         </button> |         </button> | ||||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> |         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||||
|             {% for type, name in types.items %} |             {% for type, name in types.items %} | ||||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:source-create' %}?type={{ type }}">{{ name }}</a></li> |             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||||
|  |                     href="{% url 'passbook_admin:source-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||||
|             {% endfor %} |             {% endfor %} | ||||||
|         </ul> |         </ul> | ||||||
|     </div> |     </div> | ||||||
| @ -24,6 +27,7 @@ | |||||||
|             <tr> |             <tr> | ||||||
|                 <th>{% trans 'Name' %}</th> |                 <th>{% trans 'Name' %}</th> | ||||||
|                 <th>{% trans 'Class' %}</th> |                 <th>{% trans 'Class' %}</th> | ||||||
|  |                 <th>{% trans 'Additional Info' %}</th> | ||||||
|                 <th></th> |                 <th></th> | ||||||
|             </tr> |             </tr> | ||||||
|         </thead> |         </thead> | ||||||
| @ -32,12 +36,16 @@ | |||||||
|             <tr> |             <tr> | ||||||
|                 <td>{{ source.name }}</td> |                 <td>{{ source.name }}</td> | ||||||
|                 <td>{{ source|fieldtype }}</td> |                 <td>{{ source|fieldtype }}</td> | ||||||
|  |                 <td>{{ source.additional_info }}</td> | ||||||
|                 <td> |                 <td> | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:source-delete' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |                         href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:source-delete' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|                     {% get_links source as links %} |                     {% get_links source as links %} | ||||||
|                     {% for name, href in links %} |                     {% for name, href in links %} | ||||||
|               <a class="btn btn-default btn-sm" href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||||
|                     {% endfor %} |                     {% endfor %} | ||||||
|                 </td> |                 </td> | ||||||
|             </tr> |             </tr> | ||||||
|  | |||||||
| @ -5,14 +5,13 @@ | |||||||
|  |  | ||||||
| {% block content %} | {% block content %} | ||||||
| <div class="container"> | <div class="container"> | ||||||
|   <h1>{% trans "Users" %}</h1> |     <h1><span class="pficon-users"></span> {% trans "Users" %}</h1> | ||||||
|     <hr> |     <hr> | ||||||
|     <table class="table table-striped table-bordered"> |     <table class="table table-striped table-bordered"> | ||||||
|         <thead> |         <thead> | ||||||
|             <tr> |             <tr> | ||||||
|                 <th>{% trans 'Username' %}</th> |                 <th>{% trans 'Username' %}</th> | ||||||
|         <th>{% trans 'First Name' %}</th> |                 <th>{% trans 'Name' %}</th> | ||||||
|         <th>{% trans 'Last Name' %}</th> |  | ||||||
|                 <th>{% trans 'Active' %}</th> |                 <th>{% trans 'Active' %}</th> | ||||||
|                 <th>{% trans 'Last Login' %}</th> |                 <th>{% trans 'Last Login' %}</th> | ||||||
|                 <th></th> |                 <th></th> | ||||||
| @ -22,13 +21,16 @@ | |||||||
|             {% for user in object_list %} |             {% for user in object_list %} | ||||||
|             <tr> |             <tr> | ||||||
|                 <td>{{ user.username }}</td> |                 <td>{{ user.username }}</td> | ||||||
|           <td>{{ user.first_name|default:'-' }}</td> |                 <td>{{ user.name|default:'-' }}</td> | ||||||
|           <td>{{ user.last_name|default:'-' }}</td> |  | ||||||
|                 <td>{{ user.is_active }}</td> |                 <td>{{ user.is_active }}</td> | ||||||
|                 <td>{{ user.last_login }}</td> |                 <td>{{ user.last_login }}</td> | ||||||
|                 <td> |                 <td> | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> |                     <a class="btn btn-default btn-sm" | ||||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> |                         href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||||
|  |                     <a class="btn btn-default btn-sm" | ||||||
|  |                         href="{% url 'passbook_admin:user-password-reset' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Reset Password' %}</a> | ||||||
|                 </td> |                 </td> | ||||||
|             </tr> |             </tr> | ||||||
|             {% endfor %} |             {% endfor %} | ||||||
|  | |||||||
| @ -1,7 +1,12 @@ | |||||||
| {% extends "generic/form.html" %} | {% extends "generic/form.html" %} | ||||||
|  |  | ||||||
|  | {% load utils %} | ||||||
| {% load i18n %} | {% load i18n %} | ||||||
|  |  | ||||||
| {% block above_form %} | {% block above_form %} | ||||||
| <h1>{% trans 'Create' %}</h1> | <h1>{% blocktrans with type=form|form_verbose_name %}Create {{ type }}{% endblocktrans %}</h1> | ||||||
|  | {% endblock %} | ||||||
|  |  | ||||||
|  | {% block action %} | ||||||
|  | {% blocktrans with type=form|form_verbose_name %}Create {{ type }}{% endblocktrans %} | ||||||
| {% endblock %} | {% endblock %} | ||||||
| @ -1,11 +0,0 @@ | |||||||
| {% extends "generic/create.html" %} |  | ||||||
|  |  | ||||||
| {% load i18n %} |  | ||||||
|  |  | ||||||
| {% block title %} |  | ||||||
| {% blocktrans with type=request.GET.type %}Create {{ type }}{% endblocktrans %} |  | ||||||
| {% endblock %} |  | ||||||
|  |  | ||||||
| {% block above_form %} |  | ||||||
| <h1>{% blocktrans with type=request.GET.type %}Create {{ type }}{% endblocktrans %}</h1> |  | ||||||
| {% endblock %} |  | ||||||
| @ -11,7 +11,7 @@ | |||||||
|     <form action="" method="post" class="form-horizontal"> |     <form action="" method="post" class="form-horizontal"> | ||||||
|       {% include 'partials/form.html' with form=form %} |       {% include 'partials/form.html' with form=form %} | ||||||
|       <a class="btn btn-default" href="{% back %}">{% trans "Cancel" %}</a> |       <a class="btn btn-default" href="{% back %}">{% trans "Cancel" %}</a> | ||||||
|       <input type="submit" class="btn btn-primary" value="{% trans 'Create' %}" /> |       <input type="submit" class="btn btn-primary" value="{% block action %}{% endblock %}" /> | ||||||
|     </form> |     </form> | ||||||
|   </div> |   </div> | ||||||
| </div> | </div> | ||||||
|  | |||||||
| @ -1,7 +1,12 @@ | |||||||
| {% extends "generic/form.html" %} | {% extends "generic/form.html" %} | ||||||
|  |  | ||||||
|  | {% load utils %} | ||||||
| {% load i18n %} | {% load i18n %} | ||||||
|  |  | ||||||
| {% block above_form %} | {% block above_form %} | ||||||
| <h1>{% trans 'Update' %}</h1> | <h1>{% blocktrans with type=form|form_verbose_name %}Update {{ type }}{% endblocktrans %}</h1> | ||||||
|  | {% endblock %} | ||||||
|  |  | ||||||
|  | {% block action %} | ||||||
|  | {% blocktrans with type=form|form_verbose_name %}Update {{ type }}{% endblocktrans %} | ||||||
| {% endblock %} | {% endblock %} | ||||||
| @ -1,12 +1,9 @@ | |||||||
| """passbook URL Configuration""" | """passbook URL Configuration""" | ||||||
| from django.urls import include, path | from django.urls import include, path | ||||||
| from rest_framework_swagger.views import get_swagger_view |  | ||||||
|  |  | ||||||
| from passbook.admin.views import (applications, audit, groups, invitations, |  | ||||||
|                                   overview, providers, rules, sources, users) |  | ||||||
|  |  | ||||||
| schema_view = get_swagger_view(title='passbook Admin Internal API') |  | ||||||
|  |  | ||||||
|  | from passbook.admin.views import (applications, audit, factors, groups, | ||||||
|  |                                   invitations, overview, policy, providers, | ||||||
|  |                                   sources, users) | ||||||
|  |  | ||||||
| urlpatterns = [ | urlpatterns = [ | ||||||
|     path('', overview.AdministrationOverviewView.as_view(), name='overview'), |     path('', overview.AdministrationOverviewView.as_view(), name='overview'), | ||||||
| @ -24,12 +21,12 @@ urlpatterns = [ | |||||||
|     path('sources/create/', sources.SourceCreateView.as_view(), name='source-create'), |     path('sources/create/', sources.SourceCreateView.as_view(), name='source-create'), | ||||||
|     path('sources/<uuid:pk>/update/', sources.SourceUpdateView.as_view(), name='source-update'), |     path('sources/<uuid:pk>/update/', sources.SourceUpdateView.as_view(), name='source-update'), | ||||||
|     path('sources/<uuid:pk>/delete/', sources.SourceDeleteView.as_view(), name='source-delete'), |     path('sources/<uuid:pk>/delete/', sources.SourceDeleteView.as_view(), name='source-delete'), | ||||||
|     # Rules |     # Policies | ||||||
|     path('rules/', rules.RuleListView.as_view(), name='rules'), |     path('policies/', policy.PolicyListView.as_view(), name='policies'), | ||||||
|     path('rules/create/', rules.RuleCreateView.as_view(), name='rule-create'), |     path('policies/create/', policy.PolicyCreateView.as_view(), name='policy-create'), | ||||||
|     path('rules/<uuid:pk>/update/', rules.RuleUpdateView.as_view(), name='rule-update'), |     path('policies/<uuid:pk>/update/', policy.PolicyUpdateView.as_view(), name='policy-update'), | ||||||
|     path('rules/<uuid:pk>/delete/', rules.RuleDeleteView.as_view(), name='rule-delete'), |     path('policies/<uuid:pk>/delete/', policy.PolicyDeleteView.as_view(), name='policy-delete'), | ||||||
|     path('rules/<uuid:pk>/test/', rules.RuleTestView.as_view(), name='rule-test'), |     path('policies/<uuid:pk>/test/', policy.PolicyTestView.as_view(), name='policy-test'), | ||||||
|     # Providers |     # Providers | ||||||
|     path('providers/', providers.ProviderListView.as_view(), name='providers'), |     path('providers/', providers.ProviderListView.as_view(), name='providers'), | ||||||
|     path('providers/create/', |     path('providers/create/', | ||||||
| @ -38,6 +35,14 @@ urlpatterns = [ | |||||||
|          providers.ProviderUpdateView.as_view(), name='provider-update'), |          providers.ProviderUpdateView.as_view(), name='provider-update'), | ||||||
|     path('providers/<int:pk>/delete/', |     path('providers/<int:pk>/delete/', | ||||||
|          providers.ProviderDeleteView.as_view(), name='provider-delete'), |          providers.ProviderDeleteView.as_view(), name='provider-delete'), | ||||||
|  |     # Factors | ||||||
|  |     path('factors/', factors.FactorListView.as_view(), name='factors'), | ||||||
|  |     path('factors/create/', | ||||||
|  |          factors.FactorCreateView.as_view(), name='factor-create'), | ||||||
|  |     path('factors/<uuid:pk>/update/', | ||||||
|  |          factors.FactorUpdateView.as_view(), name='factor-update'), | ||||||
|  |     path('factors/<uuid:pk>/delete/', | ||||||
|  |          factors.FactorDeleteView.as_view(), name='factor-delete'), | ||||||
|     # Invitations |     # Invitations | ||||||
|     path('invitations/', invitations.InvitationListView.as_view(), name='invitations'), |     path('invitations/', invitations.InvitationListView.as_view(), name='invitations'), | ||||||
|     path('invitations/create/', |     path('invitations/create/', | ||||||
| @ -51,11 +56,12 @@ urlpatterns = [ | |||||||
|          users.UserUpdateView.as_view(), name='user-update'), |          users.UserUpdateView.as_view(), name='user-update'), | ||||||
|     path('users/<int:pk>/delete/', |     path('users/<int:pk>/delete/', | ||||||
|          users.UserDeleteView.as_view(), name='user-delete'), |          users.UserDeleteView.as_view(), name='user-delete'), | ||||||
|  |     path('users/<int:pk>/reset/', | ||||||
|  |          users.UserPasswordResetView.as_view(), name='user-password-reset'), | ||||||
|     # Audit Log |     # Audit Log | ||||||
|     path('audit/', audit.AuditEntryListView.as_view(), name='audit-log'), |     path('audit/', audit.AuditEntryListView.as_view(), name='audit-log'), | ||||||
|     # Groups |     # Groups | ||||||
|     path('groups/', groups.GroupListView.as_view(), name='groups'), |     path('groups/', groups.GroupListView.as_view(), name='groups'), | ||||||
|     # API |     # API | ||||||
|     path('api/', schema_view), |     path('api/', include('passbook.admin.api.urls')) | ||||||
|     path('api/v1/', include('passbook.admin.api.v1.urls')) |  | ||||||
| ] | ] | ||||||
|  | |||||||
| @ -1,4 +1,5 @@ | |||||||
| """passbook Application administration""" | """passbook Application administration""" | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.messages.views import SuccessMessageMixin | from django.contrib.messages.views import SuccessMessageMixin | ||||||
| from django.urls import reverse_lazy | from django.urls import reverse_lazy | ||||||
| from django.utils.translation import ugettext as _ | from django.utils.translation import ugettext as _ | ||||||
| @ -13,6 +14,7 @@ class ApplicationListView(AdminRequiredMixin, ListView): | |||||||
|     """Show list of all applications""" |     """Show list of all applications""" | ||||||
|  |  | ||||||
|     model = Application |     model = Application | ||||||
|  |     ordering = 'name' | ||||||
|     template_name = 'administration/application/list.html' |     template_name = 'administration/application/list.html' | ||||||
|  |  | ||||||
|     def get_queryset(self): |     def get_queryset(self): | ||||||
| @ -28,6 +30,10 @@ class ApplicationCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView) | |||||||
|     success_url = reverse_lazy('passbook_admin:applications') |     success_url = reverse_lazy('passbook_admin:applications') | ||||||
|     success_message = _('Successfully created Application') |     success_message = _('Successfully created Application') | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['type'] = 'Application' | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  |  | ||||||
|  |  | ||||||
| class ApplicationUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | class ApplicationUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||||
|     """Update application""" |     """Update application""" | ||||||
| @ -45,5 +51,10 @@ class ApplicationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView) | |||||||
|  |  | ||||||
|     model = Application |     model = Application | ||||||
|  |  | ||||||
|  |     template_name = 'generic/delete.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:applications') |     success_url = reverse_lazy('passbook_admin:applications') | ||||||
|     success_message = _('Successfully updated Application') |     success_message = _('Successfully deleted Application') | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  | |||||||
							
								
								
									
										84
									
								
								passbook/admin/views/factors.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										84
									
								
								passbook/admin/views/factors.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,84 @@ | |||||||
|  | """passbook Factor administration""" | ||||||
|  | from django.contrib import messages | ||||||
|  | from django.contrib.messages.views import SuccessMessageMixin | ||||||
|  | from django.http import Http404 | ||||||
|  | from django.urls import reverse_lazy | ||||||
|  | from django.utils.translation import ugettext as _ | ||||||
|  | from django.views.generic import CreateView, DeleteView, ListView, UpdateView | ||||||
|  |  | ||||||
|  | from passbook.admin.mixins import AdminRequiredMixin | ||||||
|  | from passbook.core.models import Factor | ||||||
|  | from passbook.lib.utils.reflection import path_to_class | ||||||
|  |  | ||||||
|  |  | ||||||
|  | def all_subclasses(cls): | ||||||
|  |     """Recursively return all subclassess of cls""" | ||||||
|  |     return set(cls.__subclasses__()).union( | ||||||
|  |         [s for c in cls.__subclasses__() for s in all_subclasses(c)]) | ||||||
|  |  | ||||||
|  | class FactorListView(AdminRequiredMixin, ListView): | ||||||
|  |     """Show list of all factors""" | ||||||
|  |  | ||||||
|  |     model = Factor | ||||||
|  |     template_name = 'administration/factor/list.html' | ||||||
|  |     ordering = 'order' | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['types'] = { | ||||||
|  |             x.__name__: x._meta.verbose_name for x in all_subclasses(Factor)} | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  |  | ||||||
|  |     def get_queryset(self): | ||||||
|  |         return super().get_queryset().select_subclasses() | ||||||
|  |  | ||||||
|  | class FactorCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||||
|  |     """Create new Factor""" | ||||||
|  |  | ||||||
|  |     template_name = 'generic/create.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:factors') | ||||||
|  |     success_message = _('Successfully created Factor') | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs = super().get_context_data(**kwargs) | ||||||
|  |         factor_type = self.request.GET.get('type') | ||||||
|  |         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||||
|  |         kwargs['type'] = model._meta.verbose_name | ||||||
|  |         return kwargs | ||||||
|  |  | ||||||
|  |     def get_form_class(self): | ||||||
|  |         factor_type = self.request.GET.get('type') | ||||||
|  |         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||||
|  |         if not model: | ||||||
|  |             raise Http404 | ||||||
|  |         return path_to_class(model.form) | ||||||
|  |  | ||||||
|  | class FactorUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||||
|  |     """Update factor""" | ||||||
|  |  | ||||||
|  |     model = Factor | ||||||
|  |     template_name = 'generic/update.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:factors') | ||||||
|  |     success_message = _('Successfully updated Factor') | ||||||
|  |  | ||||||
|  |     def get_form_class(self): | ||||||
|  |         form_class_path = self.get_object().form | ||||||
|  |         form_class = path_to_class(form_class_path) | ||||||
|  |         return form_class | ||||||
|  |  | ||||||
|  |     def get_object(self, queryset=None): | ||||||
|  |         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  | class FactorDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||||
|  |     """Delete factor""" | ||||||
|  |  | ||||||
|  |     model = Factor | ||||||
|  |     template_name = 'generic/delete.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:factors') | ||||||
|  |     success_message = _('Successfully deleted Factor') | ||||||
|  |  | ||||||
|  |     def get_object(self, queryset=None): | ||||||
|  |         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
| @ -1,4 +1,5 @@ | |||||||
| """passbook Invitation administration""" | """passbook Invitation administration""" | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.messages.views import SuccessMessageMixin | from django.contrib.messages.views import SuccessMessageMixin | ||||||
| from django.http import HttpResponseRedirect | from django.http import HttpResponseRedirect | ||||||
| from django.urls import reverse_lazy | from django.urls import reverse_lazy | ||||||
| @ -26,6 +27,10 @@ class InvitationCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | |||||||
|     success_message = _('Successfully created Invitation') |     success_message = _('Successfully created Invitation') | ||||||
|     form_class = InvitationForm |     form_class = InvitationForm | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['type'] = 'Invitation' | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  |  | ||||||
|     def form_valid(self, form): |     def form_valid(self, form): | ||||||
|         obj = form.save(commit=False) |         obj = form.save(commit=False) | ||||||
|         obj.created_by = self.request.user |         obj.created_by = self.request.user | ||||||
| @ -42,4 +47,8 @@ class InvitationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | |||||||
|     model = Invitation |     model = Invitation | ||||||
|     template_name = 'generic/delete.html' |     template_name = 'generic/delete.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:invitations') |     success_url = reverse_lazy('passbook_admin:invitations') | ||||||
|     success_message = _('Successfully updated Invitation') |     success_message = _('Successfully deleted Invitation') | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  | |||||||
| @ -2,7 +2,10 @@ | |||||||
| from django.views.generic import TemplateView | from django.views.generic import TemplateView | ||||||
|  |  | ||||||
| from passbook.admin.mixins import AdminRequiredMixin | from passbook.admin.mixins import AdminRequiredMixin | ||||||
| from passbook.core.models import Application, Provider, Rule, User | from passbook.core import __version__ | ||||||
|  | from passbook.core.celery import CELERY_APP | ||||||
|  | from passbook.core.models import (Application, Factor, Invitation, Policy, | ||||||
|  |                                   Provider, Source, User) | ||||||
|  |  | ||||||
|  |  | ||||||
| class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||||
| @ -12,7 +15,14 @@ class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | |||||||
|  |  | ||||||
|     def get_context_data(self, **kwargs): |     def get_context_data(self, **kwargs): | ||||||
|         kwargs['application_count'] = len(Application.objects.all()) |         kwargs['application_count'] = len(Application.objects.all()) | ||||||
|         kwargs['rule_count'] = len(Rule.objects.all()) |         kwargs['policy_count'] = len(Policy.objects.all()) | ||||||
|         kwargs['user_count'] = len(User.objects.all()) |         kwargs['user_count'] = len(User.objects.all()) | ||||||
|         kwargs['provider_count'] = len(Provider.objects.all()) |         kwargs['provider_count'] = len(Provider.objects.all()) | ||||||
|  |         kwargs['source_count'] = len(Source.objects.all()) | ||||||
|  |         kwargs['factor_count'] = len(Factor.objects.all()) | ||||||
|  |         kwargs['invitation_count'] = len(Invitation.objects.all()) | ||||||
|  |         kwargs['version'] = __version__ | ||||||
|  |         kwargs['worker_count'] = len(CELERY_APP.control.ping(timeout=0.5)) | ||||||
|  |         kwargs['providers_without_application'] = Provider.objects.filter(application=None) | ||||||
|  |         kwargs['policies_without_attachment'] = len(Policy.objects.filter(policymodel__isnull=True)) | ||||||
|         return super().get_context_data(**kwargs) |         return super().get_context_data(**kwargs) | ||||||
|  | |||||||
							
								
								
									
										108
									
								
								passbook/admin/views/policy.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										108
									
								
								passbook/admin/views/policy.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,108 @@ | |||||||
|  | """passbook Policy administration""" | ||||||
|  | from django.contrib import messages | ||||||
|  | from django.contrib.messages.views import SuccessMessageMixin | ||||||
|  | from django.http import Http404 | ||||||
|  | from django.urls import reverse_lazy | ||||||
|  | from django.utils.translation import ugettext as _ | ||||||
|  | from django.views.generic import (CreateView, DeleteView, FormView, ListView, | ||||||
|  |                                   UpdateView) | ||||||
|  | from django.views.generic.detail import DetailView | ||||||
|  |  | ||||||
|  | from passbook.admin.forms.policies import PolicyTestForm | ||||||
|  | from passbook.admin.mixins import AdminRequiredMixin | ||||||
|  | from passbook.core.models import Policy | ||||||
|  | from passbook.lib.utils.reflection import path_to_class | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PolicyListView(AdminRequiredMixin, ListView): | ||||||
|  |     """Show list of all policies""" | ||||||
|  |  | ||||||
|  |     model = Policy | ||||||
|  |     template_name = 'administration/policy/list.html' | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['types'] = { | ||||||
|  |             x.__name__: x._meta.verbose_name for x in Policy.__subclasses__()} | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  |  | ||||||
|  |     def get_queryset(self): | ||||||
|  |         return super().get_queryset().order_by('order').select_subclasses() | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PolicyCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||||
|  |     """Create new Policy""" | ||||||
|  |  | ||||||
|  |     template_name = 'generic/create.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:policies') | ||||||
|  |     success_message = _('Successfully created Policy') | ||||||
|  |  | ||||||
|  |     def get_form_class(self): | ||||||
|  |         policy_type = self.request.GET.get('type') | ||||||
|  |         model = next(x for x in Policy.__subclasses__() | ||||||
|  |                      if x.__name__ == policy_type) | ||||||
|  |         if not model: | ||||||
|  |             raise Http404 | ||||||
|  |         return path_to_class(model.form) | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PolicyUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||||
|  |     """Update policy""" | ||||||
|  |  | ||||||
|  |     model = Policy | ||||||
|  |     template_name = 'generic/update.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:policies') | ||||||
|  |     success_message = _('Successfully updated Policy') | ||||||
|  |  | ||||||
|  |     def get_form_class(self): | ||||||
|  |         form_class_path = self.get_object().form | ||||||
|  |         form_class = path_to_class(form_class_path) | ||||||
|  |         return form_class | ||||||
|  |  | ||||||
|  |     def get_object(self, queryset=None): | ||||||
|  |         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PolicyDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||||
|  |     """Delete policy""" | ||||||
|  |  | ||||||
|  |     model = Policy | ||||||
|  |     template_name = 'generic/delete.html' | ||||||
|  |     success_url = reverse_lazy('passbook_admin:policies') | ||||||
|  |     success_message = _('Successfully deleted Policy') | ||||||
|  |  | ||||||
|  |     def get_object(self, queryset=None): | ||||||
|  |         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PolicyTestView(AdminRequiredMixin, DetailView, FormView): | ||||||
|  |     """View to test policy(s)""" | ||||||
|  |  | ||||||
|  |     model = Policy | ||||||
|  |     form_class = PolicyTestForm | ||||||
|  |     template_name = 'administration/policy/test.html' | ||||||
|  |     object = None | ||||||
|  |  | ||||||
|  |     def get_object(self, queryset=None): | ||||||
|  |         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['policy'] = self.get_object() | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  |  | ||||||
|  |     def post(self, *args, **kwargs): | ||||||
|  |         self.object = self.get_object() | ||||||
|  |         return super().post(*args, **kwargs) | ||||||
|  |  | ||||||
|  |     def form_valid(self, form): | ||||||
|  |         policy = self.get_object() | ||||||
|  |         user = form.cleaned_data.get('user') | ||||||
|  |         result = policy.passes(user) | ||||||
|  |         if result: | ||||||
|  |             messages.success(self.request, _('User successfully passed policy.')) | ||||||
|  |         else: | ||||||
|  |             messages.error(self.request, _("User didn't pass policy.")) | ||||||
|  |         return self.render_to_response(self.get_context_data(form=form, result=result)) | ||||||
| @ -1,4 +1,5 @@ | |||||||
| """passbook Provider administration""" | """passbook Provider administration""" | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.messages.views import SuccessMessageMixin | from django.contrib.messages.views import SuccessMessageMixin | ||||||
| from django.http import Http404 | from django.http import Http404 | ||||||
| from django.urls import reverse_lazy | from django.urls import reverse_lazy | ||||||
| @ -28,7 +29,7 @@ class ProviderListView(AdminRequiredMixin, ListView): | |||||||
| class ProviderCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | class ProviderCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||||
|     """Create new Provider""" |     """Create new Provider""" | ||||||
|  |  | ||||||
|     template_name = 'generic/create_inheritance.html' |     template_name = 'generic/create.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:providers') |     success_url = reverse_lazy('passbook_admin:providers') | ||||||
|     success_message = _('Successfully created Provider') |     success_message = _('Successfully created Provider') | ||||||
|  |  | ||||||
| @ -64,7 +65,11 @@ class ProviderDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | |||||||
|     model = Provider |     model = Provider | ||||||
|     template_name = 'generic/delete.html' |     template_name = 'generic/delete.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:providers') |     success_url = reverse_lazy('passbook_admin:providers') | ||||||
|     success_message = _('Successfully updated Provider') |     success_message = _('Successfully deleted Provider') | ||||||
|  |  | ||||||
|     def get_object(self, queryset=None): |     def get_object(self, queryset=None): | ||||||
|         return Provider.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() |         return Provider.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  | |||||||
| @ -1,104 +0,0 @@ | |||||||
| """passbook Rule administration""" |  | ||||||
| from django.contrib import messages |  | ||||||
| from django.contrib.messages.views import SuccessMessageMixin |  | ||||||
| from django.http import Http404 |  | ||||||
| from django.urls import reverse_lazy |  | ||||||
| from django.utils.translation import ugettext as _ |  | ||||||
| from django.views.generic import (CreateView, DeleteView, FormView, ListView, |  | ||||||
|                                   UpdateView) |  | ||||||
| from django.views.generic.detail import DetailView |  | ||||||
|  |  | ||||||
| from passbook.admin.forms.rule import RuleTestForm |  | ||||||
| from passbook.admin.mixins import AdminRequiredMixin |  | ||||||
| from passbook.core.models import Rule |  | ||||||
| from passbook.lib.utils.reflection import path_to_class |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class RuleListView(AdminRequiredMixin, ListView): |  | ||||||
|     """Show list of all rules""" |  | ||||||
|  |  | ||||||
|     model = Rule |  | ||||||
|     template_name = 'administration/rule/list.html' |  | ||||||
|  |  | ||||||
|     def get_context_data(self, **kwargs): |  | ||||||
|         kwargs['types'] = { |  | ||||||
|             x.__name__: x._meta.verbose_name for x in Rule.__subclasses__()} |  | ||||||
|         return super().get_context_data(**kwargs) |  | ||||||
|  |  | ||||||
|     def get_queryset(self): |  | ||||||
|         return super().get_queryset().order_by('order').select_subclasses() |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class RuleCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): |  | ||||||
|     """Create new Rule""" |  | ||||||
|  |  | ||||||
|     template_name = 'generic/create_inheritance.html' |  | ||||||
|     success_url = reverse_lazy('passbook_admin:rules') |  | ||||||
|     success_message = _('Successfully created Rule') |  | ||||||
|  |  | ||||||
|     def get_form_class(self): |  | ||||||
|         rule_type = self.request.GET.get('type') |  | ||||||
|         model = next(x for x in Rule.__subclasses__() |  | ||||||
|                      if x.__name__ == rule_type) |  | ||||||
|         if not model: |  | ||||||
|             raise Http404 |  | ||||||
|         return path_to_class(model.form) |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class RuleUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): |  | ||||||
|     """Update rule""" |  | ||||||
|  |  | ||||||
|     model = Rule |  | ||||||
|     template_name = 'generic/update.html' |  | ||||||
|     success_url = reverse_lazy('passbook_admin:rules') |  | ||||||
|     success_message = _('Successfully updated Rule') |  | ||||||
|  |  | ||||||
|     def get_form_class(self): |  | ||||||
|         form_class_path = self.get_object().form |  | ||||||
|         form_class = path_to_class(form_class_path) |  | ||||||
|         return form_class |  | ||||||
|  |  | ||||||
|     def get_object(self, queryset=None): |  | ||||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class RuleDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): |  | ||||||
|     """Delete rule""" |  | ||||||
|  |  | ||||||
|     model = Rule |  | ||||||
|     template_name = 'generic/delete.html' |  | ||||||
|     success_url = reverse_lazy('passbook_admin:rules') |  | ||||||
|     success_message = _('Successfully updated Rule') |  | ||||||
|  |  | ||||||
|     def get_object(self, queryset=None): |  | ||||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class RuleTestView(AdminRequiredMixin, DetailView, FormView): |  | ||||||
|     """View to test rule(s)""" |  | ||||||
|  |  | ||||||
|     model = Rule |  | ||||||
|     form_class = RuleTestForm |  | ||||||
|     template_name = 'administration/rule/test.html' |  | ||||||
|     object = None |  | ||||||
|  |  | ||||||
|     def get_object(self, queryset=None): |  | ||||||
|         return Rule.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() |  | ||||||
|  |  | ||||||
|     def get_context_data(self, **kwargs): |  | ||||||
|         kwargs['rule'] = self.get_object() |  | ||||||
|         return super().get_context_data(**kwargs) |  | ||||||
|  |  | ||||||
|     def post(self, *args, **kwargs): |  | ||||||
|         self.object = self.get_object() |  | ||||||
|         return super().post(*args, **kwargs) |  | ||||||
|  |  | ||||||
|     def form_valid(self, form): |  | ||||||
|         rule = self.get_object() |  | ||||||
|         user = form.cleaned_data.get('user') |  | ||||||
|         result = rule.passes(user) |  | ||||||
|         if result: |  | ||||||
|             messages.success(self.request, _('User successfully passed rule.')) |  | ||||||
|         else: |  | ||||||
|             messages.error(self.request, _("User didn't pass rule.")) |  | ||||||
|         return self.render_to_response(self.get_context_data(form=form, result=result)) |  | ||||||
| @ -1,4 +1,5 @@ | |||||||
| """passbook Source administration""" | """passbook Source administration""" | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.messages.views import SuccessMessageMixin | from django.contrib.messages.views import SuccessMessageMixin | ||||||
| from django.http import Http404 | from django.http import Http404 | ||||||
| from django.urls import reverse_lazy | from django.urls import reverse_lazy | ||||||
| @ -33,7 +34,7 @@ class SourceListView(AdminRequiredMixin, ListView): | |||||||
| class SourceCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | class SourceCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||||
|     """Create new Source""" |     """Create new Source""" | ||||||
|  |  | ||||||
|     template_name = 'generic/create_inheritance.html' |     template_name = 'generic/create.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:sources') |     success_url = reverse_lazy('passbook_admin:sources') | ||||||
|     success_message = _('Successfully created Source') |     success_message = _('Successfully created Source') | ||||||
|  |  | ||||||
| @ -66,9 +67,13 @@ class SourceDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | |||||||
|     """Delete source""" |     """Delete source""" | ||||||
|  |  | ||||||
|     model = Source |     model = Source | ||||||
|  |     template_name = 'generic/delete.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:sources') |     success_url = reverse_lazy('passbook_admin:sources') | ||||||
|     success_message = _('Successfully updated Source') |     success_message = _('Successfully deleted Source') | ||||||
|  |  | ||||||
|     def get_object(self, queryset=None): |     def get_object(self, queryset=None): | ||||||
|         return Source.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() |         return Source.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  | |||||||
| @ -1,12 +1,15 @@ | |||||||
| """passbook User administration""" | """passbook User administration""" | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.messages.views import SuccessMessageMixin | from django.contrib.messages.views import SuccessMessageMixin | ||||||
| from django.urls import reverse_lazy | from django.shortcuts import get_object_or_404, redirect | ||||||
|  | from django.urls import reverse, reverse_lazy | ||||||
| from django.utils.translation import ugettext as _ | from django.utils.translation import ugettext as _ | ||||||
|  | from django.views import View | ||||||
| from django.views.generic import DeleteView, ListView, UpdateView | from django.views.generic import DeleteView, ListView, UpdateView | ||||||
|  |  | ||||||
|  | from passbook.admin.forms.users import UserForm | ||||||
| from passbook.admin.mixins import AdminRequiredMixin | from passbook.admin.mixins import AdminRequiredMixin | ||||||
| from passbook.core.forms.user import UserDetailForm | from passbook.core.models import Nonce, User | ||||||
| from passbook.core.models import User |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class UserListView(AdminRequiredMixin, ListView): | class UserListView(AdminRequiredMixin, ListView): | ||||||
| @ -20,7 +23,7 @@ class UserUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | |||||||
|     """Update user""" |     """Update user""" | ||||||
|  |  | ||||||
|     model = User |     model = User | ||||||
|     form_class = UserDetailForm |     form_class = UserForm | ||||||
|  |  | ||||||
|     template_name = 'generic/update.html' |     template_name = 'generic/update.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:users') |     success_url = reverse_lazy('passbook_admin:users') | ||||||
| @ -31,6 +34,24 @@ class UserDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | |||||||
|     """Delete user""" |     """Delete user""" | ||||||
|  |  | ||||||
|     model = User |     model = User | ||||||
|  |     template_name = 'generic/delete.html' | ||||||
|     success_url = reverse_lazy('passbook_admin:users') |     success_url = reverse_lazy('passbook_admin:users') | ||||||
|     success_message = _('Successfully updated User') |     success_message = _('Successfully deleted User') | ||||||
|  |  | ||||||
|  |     def delete(self, request, *args, **kwargs): | ||||||
|  |         messages.success(self.request, self.success_message) | ||||||
|  |         return super().delete(request, *args, **kwargs) | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UserPasswordResetView(AdminRequiredMixin, View): | ||||||
|  |     """Get Password reset link for user""" | ||||||
|  |  | ||||||
|  |     # pylint: disable=invalid-name | ||||||
|  |     def get(self, request, pk): | ||||||
|  |         """Create nonce for user and return link""" | ||||||
|  |         user = get_object_or_404(User, pk=pk) | ||||||
|  |         nonce = Nonce.objects.create(user=user) | ||||||
|  |         link = request.build_absolute_uri(reverse( | ||||||
|  |             'passbook_core:auth-password-reset', kwargs={'nonce': nonce.uuid})) | ||||||
|  |         messages.success(request, _('Password reset link: <pre>%(link)s</pre>' % {'link': link})) | ||||||
|  |         return redirect('passbook_admin:users') | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook api""" | """passbook api""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
| @ -14,8 +14,8 @@ class OpenIDUserInfoView(ScopedResourceMixin, View): | |||||||
|         payload = { |         payload = { | ||||||
|             'sub': request.user.uuid.int, |             'sub': request.user.uuid.int, | ||||||
|             'name': request.user.get_full_name(), |             'name': request.user.get_full_name(), | ||||||
|             'given_name': request.user.first_name, |             'given_name': request.user.name, | ||||||
|             'family_name': request.user.last_name, |             'family_name': '', | ||||||
|             'preferred_username': request.user.username, |             'preferred_username': request.user.username, | ||||||
|             'email': request.user.email, |             'email': request.user.email, | ||||||
|         } |         } | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook audit Header""" | """passbook audit Header""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
| @ -1,4 +1,4 @@ | |||||||
| # Generated by Django 2.1.3 on 2018-11-25 10:39 | # Generated by Django 2.1.7 on 2019-02-16 09:13 | ||||||
|  |  | ||||||
| import uuid | import uuid | ||||||
|  |  | ||||||
| @ -20,13 +20,32 @@ class Migration(migrations.Migration): | |||||||
|             name='AuditEntry', |             name='AuditEntry', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), |                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), | ||||||
|                 ('action', models.TextField()), |                 ('action', models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_created', 'invitation_created'), ('invitation_used', 'invitation_used')])), | ||||||
|                 ('date', models.DateTimeField(auto_now_add=True)), |                 ('date', models.DateTimeField(auto_now_add=True)), | ||||||
|                 ('app', models.TextField()), |                 ('app', models.TextField()), | ||||||
|  |                 ('_context', models.TextField()), | ||||||
|  |                 ('request_ip', models.GenericIPAddressField()), | ||||||
|  |                 ('created', models.DateTimeField(auto_now_add=True)), | ||||||
|                 ('user', models.ForeignKey(null=True, on_delete=django.db.models.deletion.SET_NULL, to=settings.AUTH_USER_MODEL)), |                 ('user', models.ForeignKey(null=True, on_delete=django.db.models.deletion.SET_NULL, to=settings.AUTH_USER_MODEL)), | ||||||
|             ], |             ], | ||||||
|             options={ |             options={ | ||||||
|                 'abstract': False, |                 'verbose_name': 'Audit Entry', | ||||||
|  |                 'verbose_name_plural': 'Audit Entries', | ||||||
|             }, |             }, | ||||||
|         ), |         ), | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='LoginAttempt', | ||||||
|  |             fields=[ | ||||||
|  |                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||||
|  |                 ('created', models.DateField(auto_now_add=True)), | ||||||
|  |                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||||
|  |                 ('target_uid', models.CharField(max_length=254)), | ||||||
|  |                 ('request_ip', models.GenericIPAddressField()), | ||||||
|  |                 ('attempts', models.IntegerField(default=1)), | ||||||
|  |             ], | ||||||
|  |         ), | ||||||
|  |         migrations.AlterUniqueTogether( | ||||||
|  |             name='loginattempt', | ||||||
|  |             unique_together={('target_uid', 'request_ip', 'created')}, | ||||||
|  |         ), | ||||||
|     ] |     ] | ||||||
|  | |||||||
| @ -1,30 +0,0 @@ | |||||||
| # Generated by Django 2.1.4 on 2018-12-10 10:39 |  | ||||||
|  |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_audit', '0001_initial'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.AddField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='context', |  | ||||||
|             field=models.TextField(default=''), |  | ||||||
|             preserve_default=False, |  | ||||||
|         ), |  | ||||||
|         migrations.AddField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='request_ip', |  | ||||||
|             field=models.GenericIPAddressField(default=''), |  | ||||||
|             preserve_default=False, |  | ||||||
|         ), |  | ||||||
|         migrations.AlterField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='action', |  | ||||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset')]), |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
							
								
								
									
										18
									
								
								passbook/audit/migrations/0002_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/audit/migrations/0002_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 12:01 | ||||||
|  |  | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_audit', '0001_initial'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='loginattempt', | ||||||
|  |             name='created', | ||||||
|  |             field=models.DateTimeField(auto_now_add=True), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
| @ -1,27 +0,0 @@ | |||||||
| # Generated by Django 2.1.4 on 2018-12-10 12:13 |  | ||||||
|  |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_audit', '0002_auto_20181210_1039'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.AlterModelOptions( |  | ||||||
|             name='auditentry', |  | ||||||
|             options={'verbose_name': 'Audit Entry', 'verbose_name_plural': 'Audit Entries'}, |  | ||||||
|         ), |  | ||||||
|         migrations.RenameField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             old_name='context', |  | ||||||
|             new_name='_context', |  | ||||||
|         ), |  | ||||||
|         migrations.AlterField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='action', |  | ||||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_used', 'invitation_used')]), |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
							
								
								
									
										23
									
								
								passbook/audit/migrations/0003_auto_20190221_1240.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/audit/migrations/0003_auto_20190221_1240.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 12:40 | ||||||
|  |  | ||||||
|  | import django.contrib.postgres.fields.jsonb | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_audit', '0002_auto_20190221_1201'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.RemoveField( | ||||||
|  |             model_name='auditentry', | ||||||
|  |             name='_context', | ||||||
|  |         ), | ||||||
|  |         migrations.AddField( | ||||||
|  |             model_name='auditentry', | ||||||
|  |             name='context', | ||||||
|  |             field=django.contrib.postgres.fields.jsonb.JSONField(blank=True, default=dict), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
| @ -1,18 +0,0 @@ | |||||||
| # Generated by Django 2.1.4 on 2018-12-10 13:48 |  | ||||||
|  |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_audit', '0003_auto_20181210_1213'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.AlterField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='action', |  | ||||||
|             field=models.TextField(choices=[('login', 'login'), ('login_failed', 'login_failed'), ('logout', 'logout'), ('authorize_application', 'authorize_application'), ('suspicious_request', 'suspicious_request'), ('sign_up', 'sign_up'), ('password_reset', 'password_reset'), ('invitation_created', 'invitation_created'), ('invitation_used', 'invitation_used')]), |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
| @ -1,20 +0,0 @@ | |||||||
| # Generated by Django 2.1.4 on 2018-12-11 15:00 |  | ||||||
|  |  | ||||||
| import django.utils.timezone |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_audit', '0004_auto_20181210_1348'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.AddField( |  | ||||||
|             model_name='auditentry', |  | ||||||
|             name='created', |  | ||||||
|             field=models.DateTimeField(auto_now_add=True, default=django.utils.timezone.now), |  | ||||||
|             preserve_default=False, |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
| @ -1,28 +0,0 @@ | |||||||
| # Generated by Django 2.1.4 on 2018-12-18 12:52 |  | ||||||
|  |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_audit', '0005_auditentry_created'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.CreateModel( |  | ||||||
|             name='LoginAttempt', |  | ||||||
|             fields=[ |  | ||||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), |  | ||||||
|                 ('created', models.DateField(auto_now_add=True)), |  | ||||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), |  | ||||||
|                 ('target_uid', models.CharField(max_length=254)), |  | ||||||
|                 ('request_ip', models.GenericIPAddressField()), |  | ||||||
|                 ('attempts', models.IntegerField(default=1)), |  | ||||||
|             ], |  | ||||||
|         ), |  | ||||||
|         migrations.AlterUniqueTogether( |  | ||||||
|             name='loginattempt', |  | ||||||
|             unique_together={('target_uid', 'request_ip', 'created')}, |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
| @ -1,22 +1,18 @@ | |||||||
| """passbook audit models""" | """passbook audit models""" | ||||||
| from datetime import timedelta |  | ||||||
| from json import dumps, loads |  | ||||||
| from logging import getLogger | from logging import getLogger | ||||||
|  |  | ||||||
| from django.conf import settings | from django.conf import settings | ||||||
| from django.contrib.auth.models import AnonymousUser | from django.contrib.auth.models import AnonymousUser | ||||||
|  | from django.contrib.postgres.fields import JSONField | ||||||
| from django.core.exceptions import ValidationError | from django.core.exceptions import ValidationError | ||||||
| from django.db import models | from django.db import models | ||||||
| from django.utils import timezone |  | ||||||
| from django.utils.translation import gettext as _ | from django.utils.translation import gettext as _ | ||||||
| from ipware import get_client_ip | from ipware import get_client_ip | ||||||
| from reversion import register |  | ||||||
|  |  | ||||||
| from passbook.lib.models import CreatedUpdatedModel, UUIDModel | from passbook.lib.models import UUIDModel | ||||||
|  |  | ||||||
| LOGGER = getLogger(__name__) | LOGGER = getLogger(__name__) | ||||||
|  |  | ||||||
| @register() |  | ||||||
| class AuditEntry(UUIDModel): | class AuditEntry(UUIDModel): | ||||||
|     """An individual audit log entry""" |     """An individual audit log entry""" | ||||||
|  |  | ||||||
| @ -45,22 +41,17 @@ class AuditEntry(UUIDModel): | |||||||
|     action = models.TextField(choices=ACTIONS) |     action = models.TextField(choices=ACTIONS) | ||||||
|     date = models.DateTimeField(auto_now_add=True) |     date = models.DateTimeField(auto_now_add=True) | ||||||
|     app = models.TextField() |     app = models.TextField() | ||||||
|     _context = models.TextField() |     context = JSONField(default=dict, blank=True) | ||||||
|     _context_cache = None |  | ||||||
|     request_ip = models.GenericIPAddressField() |     request_ip = models.GenericIPAddressField() | ||||||
|     created = models.DateTimeField(auto_now_add=True) |     created = models.DateTimeField(auto_now_add=True) | ||||||
|  |  | ||||||
|     @property |  | ||||||
|     def context(self): |  | ||||||
|         """Load context data and load json""" |  | ||||||
|         if not self._context_cache: |  | ||||||
|             self._context_cache = loads(self._context) |  | ||||||
|         return self._context_cache |  | ||||||
|  |  | ||||||
|     @staticmethod |     @staticmethod | ||||||
|     def create(action, request, **kwargs): |     def create(action, request, **kwargs): | ||||||
|         """Create AuditEntry from arguments""" |         """Create AuditEntry from arguments""" | ||||||
|         client_ip, _ = get_client_ip(request) |         client_ip, _ = get_client_ip(request) | ||||||
|  |         if not hasattr(request, 'user'): | ||||||
|  |             user = None | ||||||
|  |         else: | ||||||
|             user = request.user |             user = request.user | ||||||
|         if isinstance(user, AnonymousUser): |         if isinstance(user, AnonymousUser): | ||||||
|             user = kwargs.get('user', None) |             user = kwargs.get('user', None) | ||||||
| @ -69,8 +60,8 @@ class AuditEntry(UUIDModel): | |||||||
|             user=user, |             user=user, | ||||||
|             # User 255.255.255.255 as fallback if IP cannot be determined |             # User 255.255.255.255 as fallback if IP cannot be determined | ||||||
|             request_ip=client_ip or '255.255.255.255', |             request_ip=client_ip or '255.255.255.255', | ||||||
|             _context=dumps(kwargs)) |             context=kwargs) | ||||||
|         LOGGER.debug("Logged %s from %s (%s)", action, request.user, client_ip) |         LOGGER.debug("Logged %s from %s (%s)", action, user, client_ip) | ||||||
|         return entry |         return entry | ||||||
|  |  | ||||||
|     def save(self, *args, **kwargs): |     def save(self, *args, **kwargs): | ||||||
| @ -82,41 +73,3 @@ class AuditEntry(UUIDModel): | |||||||
|  |  | ||||||
|         verbose_name = _('Audit Entry') |         verbose_name = _('Audit Entry') | ||||||
|         verbose_name_plural = _('Audit Entries') |         verbose_name_plural = _('Audit Entries') | ||||||
|  |  | ||||||
|  |  | ||||||
| class LoginAttempt(CreatedUpdatedModel): |  | ||||||
|     """Track failed login-attempts""" |  | ||||||
|  |  | ||||||
|     target_uid = models.CharField(max_length=254) |  | ||||||
|     request_ip = models.GenericIPAddressField() |  | ||||||
|     attempts = models.IntegerField(default=1) |  | ||||||
|  |  | ||||||
|     @staticmethod |  | ||||||
|     def attempt(target_uid, request): |  | ||||||
|         """Helper function to create attempt or count up existing one""" |  | ||||||
|         client_ip, _ = get_client_ip(request) |  | ||||||
|         # Since we can only use 254 chars for target_uid, truncate target_uid. |  | ||||||
|         target_uid = target_uid[:254] |  | ||||||
|         time_threshold = timezone.now() - timedelta(minutes=10) |  | ||||||
|         existing_attempts = LoginAttempt.objects.filter( |  | ||||||
|             target_uid=target_uid, |  | ||||||
|             request_ip=client_ip, |  | ||||||
|             last_updated__gt=time_threshold).order_by('created') |  | ||||||
|         if existing_attempts.exists(): |  | ||||||
|             attempt = existing_attempts.first() |  | ||||||
|             attempt.attempts += 1 |  | ||||||
|             attempt.save() |  | ||||||
|             LOGGER.debug("Increased attempts on %s", attempt) |  | ||||||
|         else: |  | ||||||
|             attempt = LoginAttempt.objects.create( |  | ||||||
|                 target_uid=target_uid, |  | ||||||
|                 request_ip=client_ip) |  | ||||||
|             LOGGER.debug("Created new attempt %s", attempt) |  | ||||||
|  |  | ||||||
|     def __str__(self): |  | ||||||
|         return "LoginAttempt to %s from %s (x%d)" % (self.target_uid, |  | ||||||
|                                                      self.request_ip, self.attempts) |  | ||||||
|  |  | ||||||
|     class Meta: |  | ||||||
|  |  | ||||||
|         unique_together = (('target_uid', 'request_ip', 'created'),) |  | ||||||
|  | |||||||
| @ -1 +0,0 @@ | |||||||
| django-ipware |  | ||||||
| @ -1,9 +1,8 @@ | |||||||
| """passbook audit signal listener""" | """passbook audit signal listener""" | ||||||
| from django.contrib.auth.signals import (user_logged_in, user_logged_out, | from django.contrib.auth.signals import user_logged_in, user_logged_out | ||||||
|                                          user_login_failed) |  | ||||||
| from django.dispatch import receiver | from django.dispatch import receiver | ||||||
|  |  | ||||||
| from passbook.audit.models import AuditEntry, LoginAttempt | from passbook.audit.models import AuditEntry | ||||||
| from passbook.core.signals import (invitation_created, invitation_used, | from passbook.core.signals import (invitation_created, invitation_used, | ||||||
|                                    user_signed_up) |                                    user_signed_up) | ||||||
|  |  | ||||||
| @ -34,8 +33,3 @@ def on_invitation_used(sender, request, invitation, **kwargs): | |||||||
|     """Log Invitation usage""" |     """Log Invitation usage""" | ||||||
|     AuditEntry.create(AuditEntry.ACTION_INVITE_USED, request, |     AuditEntry.create(AuditEntry.ACTION_INVITE_USED, request, | ||||||
|                       invitation_uuid=invitation.uuid.hex) |                       invitation_uuid=invitation.uuid.hex) | ||||||
|  |  | ||||||
| @receiver(user_login_failed) |  | ||||||
| def on_user_login_failed(sender, request, credentials, **kwargs): |  | ||||||
|     """Log failed login attempt""" |  | ||||||
|     LoginAttempt.attempt(target_uid=credentials.get('username'), request=request) |  | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook captcha_factor Header""" | """passbook captcha_factor Header""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
| @ -2,8 +2,25 @@ | |||||||
| from captcha.fields import ReCaptchaField | from captcha.fields import ReCaptchaField | ||||||
| from django import forms | from django import forms | ||||||
|  |  | ||||||
|  | from passbook.captcha_factor.models import CaptchaFactor | ||||||
|  | from passbook.core.forms.factors import GENERAL_FIELDS | ||||||
|  |  | ||||||
|  |  | ||||||
| class CaptchaForm(forms.Form): | class CaptchaForm(forms.Form): | ||||||
|     """passbook captcha factor form""" |     """passbook captcha factor form""" | ||||||
|  |  | ||||||
|     captcha = ReCaptchaField() |     captcha = ReCaptchaField() | ||||||
|  |  | ||||||
|  | class CaptchaFactorForm(forms.ModelForm): | ||||||
|  |     """Form to edit CaptchaFactor Instance""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = CaptchaFactor | ||||||
|  |         fields = GENERAL_FIELDS + ['public_key', 'private_key'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'order': forms.NumberInput(), | ||||||
|  |             'public_key': forms.TextInput(), | ||||||
|  |             'private_key': forms.TextInput(), | ||||||
|  |         } | ||||||
|  | |||||||
							
								
								
									
										29
									
								
								passbook/captcha_factor/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								passbook/captcha_factor/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,29 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-24 21:35 | ||||||
|  |  | ||||||
|  | import django.db.models.deletion | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     initial = True | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0010_auto_20190224_1016'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='CaptchaFactor', | ||||||
|  |             fields=[ | ||||||
|  |                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||||
|  |                 ('public_key', models.TextField()), | ||||||
|  |                 ('private_key', models.TextField()), | ||||||
|  |             ], | ||||||
|  |             options={ | ||||||
|  |                 'verbose_name': 'Captcha Factor', | ||||||
|  |                 'verbose_name_plural': 'Captcha Factors', | ||||||
|  |             }, | ||||||
|  |             bases=('passbook_core.factor',), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										23
									
								
								passbook/captcha_factor/models.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								passbook/captcha_factor/models.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,23 @@ | |||||||
|  | """passbook captcha factor""" | ||||||
|  | from django.db import models | ||||||
|  | from django.utils.translation import gettext as _ | ||||||
|  |  | ||||||
|  | from passbook.core.models import Factor | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class CaptchaFactor(Factor): | ||||||
|  |     """Captcha Factor instance""" | ||||||
|  |  | ||||||
|  |     public_key = models.TextField() | ||||||
|  |     private_key = models.TextField() | ||||||
|  |  | ||||||
|  |     type = 'passbook.captcha_factor.factor.CaptchaFactor' | ||||||
|  |     form = 'passbook.captcha_factor.forms.CaptchaFactorForm' | ||||||
|  |  | ||||||
|  |     def __str__(self): | ||||||
|  |         return "Captcha Factor %s" % self.slug | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         verbose_name = _('Captcha Factor') | ||||||
|  |         verbose_name_plural = _('Captcha Factors') | ||||||
| @ -1,2 +1,2 @@ | |||||||
| """passbook core""" | """passbook core""" | ||||||
| __version__ = '0.0.6-alpha' | __version__ = '0.1.2-beta' | ||||||
|  | |||||||
| @ -1,8 +1,12 @@ | |||||||
| """passbook core app config""" | """passbook core app config""" | ||||||
| from importlib import import_module | from importlib import import_module | ||||||
|  | from logging import getLogger | ||||||
|  |  | ||||||
| from django.apps import AppConfig | from django.apps import AppConfig | ||||||
|  |  | ||||||
|  | from passbook.lib.config import CONFIG | ||||||
|  |  | ||||||
|  | LOGGER = getLogger(__name__) | ||||||
|  |  | ||||||
| class PassbookCoreConfig(AppConfig): | class PassbookCoreConfig(AppConfig): | ||||||
|     """passbook core app config""" |     """passbook core app config""" | ||||||
| @ -12,4 +16,11 @@ class PassbookCoreConfig(AppConfig): | |||||||
|     verbose_name = 'passbook Core' |     verbose_name = 'passbook Core' | ||||||
|  |  | ||||||
|     def ready(self): |     def ready(self): | ||||||
|         import_module('passbook.core.rules') |         import_module('passbook.core.policies') | ||||||
|  |         factors_to_load = CONFIG.y('passbook.factors', []) | ||||||
|  |         for factors_to_load in factors_to_load: | ||||||
|  |             try: | ||||||
|  |                 import_module(factors_to_load) | ||||||
|  |                 LOGGER.info("Loaded %s", factors_to_load) | ||||||
|  |             except ImportError as exc: | ||||||
|  |                 LOGGER.debug(exc) | ||||||
|  | |||||||
| @ -1,13 +1,9 @@ | |||||||
| """passbook multi-factor authentication engine""" | """passbook multi-factor authentication engine""" | ||||||
| from logging import getLogger |  | ||||||
|  |  | ||||||
| from django.utils.translation import gettext as _ | from django.utils.translation import gettext as _ | ||||||
| from django.views.generic import TemplateView | from django.views.generic import TemplateView | ||||||
|  |  | ||||||
| from passbook.lib.config import CONFIG | from passbook.lib.config import CONFIG | ||||||
|  |  | ||||||
| LOGGER = getLogger(__name__) |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class AuthenticationFactor(TemplateView): | class AuthenticationFactor(TemplateView): | ||||||
|     """Abstract Authentication factor, inherits TemplateView but can be combined with FormView""" |     """Abstract Authentication factor, inherits TemplateView but can be combined with FormView""" | ||||||
| @ -15,8 +11,9 @@ class AuthenticationFactor(TemplateView): | |||||||
|     form = None |     form = None | ||||||
|     required = True |     required = True | ||||||
|     authenticator = None |     authenticator = None | ||||||
|  |     pending_user = None | ||||||
|     request = None |     request = None | ||||||
|     template_name = 'login/form.html' |     template_name = 'login/form_with_user.html' | ||||||
|  |  | ||||||
|     def __init__(self, authenticator): |     def __init__(self, authenticator): | ||||||
|         self.authenticator = authenticator |         self.authenticator = authenticator | ||||||
| @ -26,4 +23,5 @@ class AuthenticationFactor(TemplateView): | |||||||
|         kwargs['is_login'] = True |         kwargs['is_login'] = True | ||||||
|         kwargs['title'] = _('Log in to your account') |         kwargs['title'] = _('Log in to your account') | ||||||
|         kwargs['primary_action'] = _('Log in') |         kwargs['primary_action'] = _('Log in') | ||||||
|  |         kwargs['user'] = self.pending_user | ||||||
|         return super().get_context_data(**kwargs) |         return super().get_context_data(**kwargs) | ||||||
|  | |||||||
							
								
								
									
										0
									
								
								passbook/core/auth/factors/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								passbook/core/auth/factors/__init__.py
									
									
									
									
									
										Normal file
									
								
							| @ -1,26 +1,53 @@ | |||||||
| """passbook multi-factor authentication engine""" | """passbook multi-factor authentication engine""" | ||||||
| from logging import getLogger | from logging import getLogger | ||||||
| 
 | 
 | ||||||
|  | from django.contrib import messages | ||||||
| from django.contrib.auth import authenticate | from django.contrib.auth import authenticate | ||||||
| from django.core.exceptions import PermissionDenied | from django.core.exceptions import PermissionDenied | ||||||
| from django.forms.utils import ErrorList | from django.forms.utils import ErrorList | ||||||
|  | from django.shortcuts import redirect, reverse | ||||||
| from django.utils.translation import gettext as _ | from django.utils.translation import gettext as _ | ||||||
| from django.views.generic import FormView | from django.views.generic import FormView | ||||||
| 
 | 
 | ||||||
| from passbook.core.auth.factor import AuthenticationFactor | from passbook.core.auth.factor import AuthenticationFactor | ||||||
| from passbook.core.auth.mfa import MultiFactorAuthenticator | from passbook.core.auth.view import AuthenticationView | ||||||
| from passbook.core.forms.authentication import AuthenticationBackendFactorForm | from passbook.core.forms.authentication import PasswordFactorForm | ||||||
|  | from passbook.core.models import Nonce | ||||||
|  | from passbook.core.tasks import send_email | ||||||
| from passbook.lib.config import CONFIG | from passbook.lib.config import CONFIG | ||||||
| 
 | 
 | ||||||
| LOGGER = getLogger(__name__) | LOGGER = getLogger(__name__) | ||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| class AuthenticationBackendFactor(FormView, AuthenticationFactor): | class PasswordFactor(FormView, AuthenticationFactor): | ||||||
|     """Authentication factor which authenticates against django's AuthBackend""" |     """Authentication factor which authenticates against django's AuthBackend""" | ||||||
| 
 | 
 | ||||||
|     form_class = AuthenticationBackendFactorForm |     form_class = PasswordFactorForm | ||||||
|     template_name = 'login/factors/backend.html' |     template_name = 'login/factors/backend.html' | ||||||
| 
 | 
 | ||||||
|  |     def get_context_data(self, **kwargs): | ||||||
|  |         kwargs['show_password_forget_notice'] = CONFIG.y('passbook.password_reset.enabled') | ||||||
|  |         return super().get_context_data(**kwargs) | ||||||
|  | 
 | ||||||
|  |     def get(self, request, *args, **kwargs): | ||||||
|  |         if 'password-forgotten' in request.GET: | ||||||
|  |             nonce = Nonce.objects.create(user=self.pending_user) | ||||||
|  |             LOGGER.debug("DEBUG %s", str(nonce.uuid)) | ||||||
|  |             # Send mail to user | ||||||
|  |             send_email.delay(self.pending_user.email, _('Forgotten password'), | ||||||
|  |                              'email/account_password_reset.html', { | ||||||
|  |                                  'url': self.request.build_absolute_uri( | ||||||
|  |                                      reverse('passbook_core:passbook_core:auth-password-reset', | ||||||
|  |                                              kwargs={ | ||||||
|  |                                                  'nonce': nonce.uuid | ||||||
|  |                                              }) | ||||||
|  |                                  ) | ||||||
|  |                              }) | ||||||
|  |             self.authenticator.cleanup() | ||||||
|  |             messages.success(request, _('Check your E-Mails for a password reset link.')) | ||||||
|  |             return redirect('passbook_core:auth-login') | ||||||
|  |         return super().get(request, *args, **kwargs) | ||||||
|  | 
 | ||||||
|     def form_valid(self, form): |     def form_valid(self, form): | ||||||
|         """Authenticate against django's authentication backend""" |         """Authenticate against django's authentication backend""" | ||||||
|         uid_fields = CONFIG.y('passbook.uid_fields') |         uid_fields = CONFIG.y('passbook.uid_fields') | ||||||
| @ -34,7 +61,7 @@ class AuthenticationBackendFactor(FormView, AuthenticationFactor): | |||||||
|             if user: |             if user: | ||||||
|                 # User instance returned from authenticate() has .backend property set |                 # User instance returned from authenticate() has .backend property set | ||||||
|                 self.authenticator.pending_user = user |                 self.authenticator.pending_user = user | ||||||
|                 self.request.session[MultiFactorAuthenticator.SESSION_USER_BACKEND] = user.backend |                 self.request.session[AuthenticationView.SESSION_USER_BACKEND] = user.backend | ||||||
|                 return self.authenticator.user_ok() |                 return self.authenticator.user_ok() | ||||||
|             # No user was found -> invalid credentials |             # No user was found -> invalid credentials | ||||||
|             LOGGER.debug("Invalid credentials") |             LOGGER.debug("Invalid credentials") | ||||||
| @ -1,119 +0,0 @@ | |||||||
| """passbook multi-factor authentication engine""" |  | ||||||
| from logging import getLogger |  | ||||||
|  |  | ||||||
| from django.conf import settings |  | ||||||
| from django.contrib.auth import login |  | ||||||
| from django.contrib.auth.mixins import UserPassesTestMixin |  | ||||||
| from django.shortcuts import get_object_or_404, redirect, reverse |  | ||||||
| from django.views.generic import View |  | ||||||
|  |  | ||||||
| from passbook.core.models import User |  | ||||||
| from passbook.core.views.utils import PermissionDeniedView |  | ||||||
| from passbook.lib.utils.reflection import class_to_path, path_to_class |  | ||||||
|  |  | ||||||
| LOGGER = getLogger(__name__) |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class MultiFactorAuthenticator(UserPassesTestMixin, View): |  | ||||||
|     """Wizard-like Multi-factor authenticator""" |  | ||||||
|  |  | ||||||
|     SESSION_FACTOR = 'passbook_factor' |  | ||||||
|     SESSION_PENDING_FACTORS = 'passbook_pending_factors' |  | ||||||
|     SESSION_PENDING_USER = 'passbook_pending_user' |  | ||||||
|     SESSION_USER_BACKEND = 'passbook_user_backend' |  | ||||||
|  |  | ||||||
|     pending_user = None |  | ||||||
|     pending_factors = [] |  | ||||||
|  |  | ||||||
|     factors = settings.AUTHENTICATION_FACTORS.copy() |  | ||||||
|  |  | ||||||
|     _current_factor = None |  | ||||||
|  |  | ||||||
|     # Allow only not authenticated users to login |  | ||||||
|     def test_func(self): |  | ||||||
|         return self.request.user.is_authenticated is False |  | ||||||
|  |  | ||||||
|     def handle_no_permission(self): |  | ||||||
|         if 'next' in self.request.GET: |  | ||||||
|             return redirect(self.request.GET.get('next')) |  | ||||||
|         return redirect(reverse('passbook_core:overview')) |  | ||||||
|  |  | ||||||
|     def dispatch(self, request, *args, **kwargs): |  | ||||||
|         # Extract pending user from session (only remember uid) |  | ||||||
|         if MultiFactorAuthenticator.SESSION_PENDING_USER in request.session: |  | ||||||
|             self.pending_user = get_object_or_404( |  | ||||||
|                 User, id=self.request.session[MultiFactorAuthenticator.SESSION_PENDING_USER]) |  | ||||||
|         else: |  | ||||||
|             # No Pending user, redirect to login screen |  | ||||||
|             return redirect(reverse('passbook_core:auth-login')) |  | ||||||
|         # Write pending factors to session |  | ||||||
|         if MultiFactorAuthenticator.SESSION_PENDING_FACTORS in request.session: |  | ||||||
|             self.pending_factors = request.session[MultiFactorAuthenticator.SESSION_PENDING_FACTORS] |  | ||||||
|         else: |  | ||||||
|             self.pending_factors = self.factors.copy() |  | ||||||
|         # Read and instantiate factor from session |  | ||||||
|         factor_class = None |  | ||||||
|         if MultiFactorAuthenticator.SESSION_FACTOR not in request.session: |  | ||||||
|             factor_class = self.pending_factors[0] |  | ||||||
|         else: |  | ||||||
|             factor_class = request.session[MultiFactorAuthenticator.SESSION_FACTOR] |  | ||||||
|         factor = path_to_class(factor_class) |  | ||||||
|         self._current_factor = factor(self) |  | ||||||
|         self._current_factor.request = request |  | ||||||
|         return super().dispatch(request, *args, **kwargs) |  | ||||||
|  |  | ||||||
|     def get(self, request, *args, **kwargs): |  | ||||||
|         """pass get request to current factor""" |  | ||||||
|         LOGGER.debug("Passing GET to %s", class_to_path(self._current_factor.__class__)) |  | ||||||
|         return self._current_factor.get(request, *args, **kwargs) |  | ||||||
|  |  | ||||||
|     def post(self, request, *args, **kwargs): |  | ||||||
|         """pass post request to current factor""" |  | ||||||
|         LOGGER.debug("Passing POST to %s", class_to_path(self._current_factor.__class__)) |  | ||||||
|         return self._current_factor.post(request, *args, **kwargs) |  | ||||||
|  |  | ||||||
|     def user_ok(self): |  | ||||||
|         """Redirect to next Factor""" |  | ||||||
|         LOGGER.debug("Factor %s passed", class_to_path(self._current_factor.__class__)) |  | ||||||
|         # Remove passed factor from pending factors |  | ||||||
|         if class_to_path(self._current_factor.__class__) in self.pending_factors: |  | ||||||
|             self.pending_factors.remove(class_to_path(self._current_factor.__class__)) |  | ||||||
|         next_factor = None |  | ||||||
|         if self.pending_factors: |  | ||||||
|             next_factor = self.pending_factors.pop() |  | ||||||
|             self.request.session[MultiFactorAuthenticator.SESSION_PENDING_FACTORS] = \ |  | ||||||
|                 self.pending_factors |  | ||||||
|             self.request.session[MultiFactorAuthenticator.SESSION_FACTOR] = next_factor |  | ||||||
|             LOGGER.debug("Rendering Factor is %s", next_factor) |  | ||||||
|             return redirect(reverse('passbook_core:mfa')) |  | ||||||
|         # User passed all factors |  | ||||||
|         LOGGER.debug("User passed all factors, logging in") |  | ||||||
|         return self._user_passed() |  | ||||||
|  |  | ||||||
|     def user_invalid(self): |  | ||||||
|         """Show error message, user cannot login. |  | ||||||
|         This should only be shown if user authenticated successfully, but is disabled/locked/etc""" |  | ||||||
|         LOGGER.debug("User invalid") |  | ||||||
|         return redirect(reverse('passbook_core:mfa-denied')) |  | ||||||
|  |  | ||||||
|     def _user_passed(self): |  | ||||||
|         """User Successfully passed all factors""" |  | ||||||
|         # user = authenticate(request=self.request, ) |  | ||||||
|         backend = self.request.session[MultiFactorAuthenticator.SESSION_USER_BACKEND] |  | ||||||
|         login(self.request, self.pending_user, backend=backend) |  | ||||||
|         LOGGER.debug("Logged in user %s", self.pending_user) |  | ||||||
|         # Cleanup |  | ||||||
|         self._cleanup() |  | ||||||
|         return redirect(reverse('passbook_core:overview')) |  | ||||||
|  |  | ||||||
|     def _cleanup(self): |  | ||||||
|         """Remove temporary data from session""" |  | ||||||
|         session_keys = ['SESSION_FACTOR', 'SESSION_PENDING_FACTORS', |  | ||||||
|                         'SESSION_PENDING_USER', 'SESSION_USER_BACKEND', ] |  | ||||||
|         for key in session_keys: |  | ||||||
|             if key in self.request.session: |  | ||||||
|                 del self.request.session[key] |  | ||||||
|         LOGGER.debug("Cleaned up sessions") |  | ||||||
|  |  | ||||||
| class MFAPermissionDeniedView(PermissionDeniedView): |  | ||||||
|     """User could not be authenticated""" |  | ||||||
							
								
								
									
										150
									
								
								passbook/core/auth/view.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										150
									
								
								passbook/core/auth/view.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,150 @@ | |||||||
|  | """passbook multi-factor authentication engine""" | ||||||
|  | from logging import getLogger | ||||||
|  |  | ||||||
|  | from django.contrib.auth import login | ||||||
|  | from django.contrib.auth.mixins import UserPassesTestMixin | ||||||
|  | from django.shortcuts import get_object_or_404, redirect, reverse | ||||||
|  | from django.utils.http import urlencode | ||||||
|  | from django.views.generic import View | ||||||
|  |  | ||||||
|  | from passbook.core.models import Factor, User | ||||||
|  | from passbook.core.policies import PolicyEngine | ||||||
|  | from passbook.core.views.utils import PermissionDeniedView | ||||||
|  | from passbook.lib.utils.reflection import class_to_path, path_to_class | ||||||
|  | from passbook.lib.utils.urls import is_url_absolute | ||||||
|  |  | ||||||
|  | LOGGER = getLogger(__name__) | ||||||
|  |  | ||||||
|  | def _redirect_with_qs(view, get_query_set=None): | ||||||
|  |     """Wrapper to redirect whilst keeping GET Parameters""" | ||||||
|  |     target = reverse(view) | ||||||
|  |     if get_query_set: | ||||||
|  |         target += '?' + urlencode({key: value for key, value in get_query_set.items()}) | ||||||
|  |     return redirect(target) | ||||||
|  |  | ||||||
|  | class AuthenticationView(UserPassesTestMixin, View): | ||||||
|  |     """Wizard-like Multi-factor authenticator""" | ||||||
|  |  | ||||||
|  |     SESSION_FACTOR = 'passbook_factor' | ||||||
|  |     SESSION_PENDING_FACTORS = 'passbook_pending_factors' | ||||||
|  |     SESSION_PENDING_USER = 'passbook_pending_user' | ||||||
|  |     SESSION_USER_BACKEND = 'passbook_user_backend' | ||||||
|  |  | ||||||
|  |     pending_user = None | ||||||
|  |     pending_factors = [] | ||||||
|  |  | ||||||
|  |     _current_factor_class = None | ||||||
|  |  | ||||||
|  |     current_factor = None | ||||||
|  |  | ||||||
|  |     # Allow only not authenticated users to login | ||||||
|  |     def test_func(self): | ||||||
|  |         return self.request.user.is_authenticated is False | ||||||
|  |  | ||||||
|  |     def handle_no_permission(self): | ||||||
|  |         # Function from UserPassesTestMixin | ||||||
|  |         if 'next' in self.request.GET: | ||||||
|  |             return redirect(self.request.GET.get('next')) | ||||||
|  |         return _redirect_with_qs('passbook_core:overview', self.request.GET) | ||||||
|  |  | ||||||
|  |     def dispatch(self, request, *args, **kwargs): | ||||||
|  |         # Extract pending user from session (only remember uid) | ||||||
|  |         if AuthenticationView.SESSION_PENDING_USER in request.session: | ||||||
|  |             self.pending_user = get_object_or_404( | ||||||
|  |                 User, id=self.request.session[AuthenticationView.SESSION_PENDING_USER]) | ||||||
|  |         else: | ||||||
|  |             # No Pending user, redirect to login screen | ||||||
|  |             return _redirect_with_qs('passbook_core:auth-login', request.GET) | ||||||
|  |         # Write pending factors to session | ||||||
|  |         if AuthenticationView.SESSION_PENDING_FACTORS in request.session: | ||||||
|  |             self.pending_factors = request.session[AuthenticationView.SESSION_PENDING_FACTORS] | ||||||
|  |         else: | ||||||
|  |             # Get an initial list of factors which are currently enabled | ||||||
|  |             # and apply to the current user. We check policies here and block the request | ||||||
|  |             _all_factors = Factor.objects.filter(enabled=True).order_by('order').select_subclasses() | ||||||
|  |             self.pending_factors = [] | ||||||
|  |             for factor in _all_factors: | ||||||
|  |                 policy_engine = PolicyEngine(factor.policies.all()) | ||||||
|  |                 policy_engine.for_user(self.pending_user).with_request(request).build() | ||||||
|  |                 if policy_engine.result[0]: | ||||||
|  |                     self.pending_factors.append((factor.uuid.hex, factor.type)) | ||||||
|  |         # Read and instantiate factor from session | ||||||
|  |         factor_uuid, factor_class = None, None | ||||||
|  |         if AuthenticationView.SESSION_FACTOR not in request.session: | ||||||
|  |             # Case when no factors apply to user, return error denied | ||||||
|  |             if not self.pending_factors: | ||||||
|  |                 return self.user_invalid() | ||||||
|  |             factor_uuid, factor_class = self.pending_factors[0] | ||||||
|  |         else: | ||||||
|  |             factor_uuid, factor_class = request.session[AuthenticationView.SESSION_FACTOR] | ||||||
|  |         # Lookup current factor object | ||||||
|  |         self.current_factor = Factor.objects.filter(uuid=factor_uuid).select_subclasses().first() | ||||||
|  |         # Instantiate Next Factor and pass request | ||||||
|  |         factor = path_to_class(factor_class) | ||||||
|  |         self._current_factor_class = factor(self) | ||||||
|  |         self._current_factor_class.pending_user = self.pending_user | ||||||
|  |         self._current_factor_class.request = request | ||||||
|  |         return super().dispatch(request, *args, **kwargs) | ||||||
|  |  | ||||||
|  |     def get(self, request, *args, **kwargs): | ||||||
|  |         """pass get request to current factor""" | ||||||
|  |         LOGGER.debug("Passing GET to %s", class_to_path(self._current_factor_class.__class__)) | ||||||
|  |         return self._current_factor_class.get(request, *args, **kwargs) | ||||||
|  |  | ||||||
|  |     def post(self, request, *args, **kwargs): | ||||||
|  |         """pass post request to current factor""" | ||||||
|  |         LOGGER.debug("Passing POST to %s", class_to_path(self._current_factor_class.__class__)) | ||||||
|  |         return self._current_factor_class.post(request, *args, **kwargs) | ||||||
|  |  | ||||||
|  |     def user_ok(self): | ||||||
|  |         """Redirect to next Factor""" | ||||||
|  |         LOGGER.debug("Factor %s passed", class_to_path(self._current_factor_class.__class__)) | ||||||
|  |         # Remove passed factor from pending factors | ||||||
|  |         current_factor_tuple = (self.current_factor.uuid.hex, | ||||||
|  |                                 class_to_path(self._current_factor_class.__class__)) | ||||||
|  |         if current_factor_tuple in self.pending_factors: | ||||||
|  |             self.pending_factors.remove(current_factor_tuple) | ||||||
|  |         next_factor = None | ||||||
|  |         if self.pending_factors: | ||||||
|  |             next_factor = self.pending_factors.pop() | ||||||
|  |             self.request.session[AuthenticationView.SESSION_PENDING_FACTORS] = \ | ||||||
|  |                 self.pending_factors | ||||||
|  |             self.request.session[AuthenticationView.SESSION_FACTOR] = next_factor | ||||||
|  |             LOGGER.debug("Rendering Factor is %s", next_factor) | ||||||
|  |             # return _redirect_with_qs('passbook_core:auth-process', kwargs={'factor': next_factor}) | ||||||
|  |             return _redirect_with_qs('passbook_core:auth-process', self.request.GET) | ||||||
|  |         # User passed all factors | ||||||
|  |         LOGGER.debug("User passed all factors, logging in") | ||||||
|  |         return self._user_passed() | ||||||
|  |  | ||||||
|  |     def user_invalid(self): | ||||||
|  |         """Show error message, user cannot login. | ||||||
|  |         This should only be shown if user authenticated successfully, but is disabled/locked/etc""" | ||||||
|  |         LOGGER.debug("User invalid") | ||||||
|  |         self.cleanup() | ||||||
|  |         return _redirect_with_qs('passbook_core:auth-denied', self.request.GET) | ||||||
|  |  | ||||||
|  |     def _user_passed(self): | ||||||
|  |         """User Successfully passed all factors""" | ||||||
|  |         # user = authenticate(request=self.request, ) | ||||||
|  |         backend = self.request.session[AuthenticationView.SESSION_USER_BACKEND] | ||||||
|  |         login(self.request, self.pending_user, backend=backend) | ||||||
|  |         LOGGER.debug("Logged in user %s", self.pending_user) | ||||||
|  |         # Cleanup | ||||||
|  |         self.cleanup() | ||||||
|  |         next_param = self.request.GET.get('next', None) | ||||||
|  |         if next_param and not is_url_absolute(next_param): | ||||||
|  |             return redirect(next_param) | ||||||
|  |         return _redirect_with_qs('passbook_core:overview') | ||||||
|  |  | ||||||
|  |     def cleanup(self): | ||||||
|  |         """Remove temporary data from session""" | ||||||
|  |         session_keys = [self.SESSION_FACTOR, self.SESSION_PENDING_FACTORS, | ||||||
|  |                         self.SESSION_PENDING_USER, self.SESSION_USER_BACKEND, ] | ||||||
|  |         for key in session_keys: | ||||||
|  |             if key in self.request.session: | ||||||
|  |                 del self.request.session[key] | ||||||
|  |         LOGGER.debug("Cleaned up sessions") | ||||||
|  |  | ||||||
|  | class FactorPermissionDeniedView(PermissionDeniedView): | ||||||
|  |     """User could not be authenticated""" | ||||||
| @ -4,13 +4,9 @@ import logging | |||||||
| import os | import os | ||||||
|  |  | ||||||
| import celery | import celery | ||||||
| # import pymysql |  | ||||||
| from django.conf import settings | from django.conf import settings | ||||||
|  | from raven import Client | ||||||
| # from raven import Client | from raven.contrib.celery import register_logger_signal, register_signal | ||||||
| # from raven.contrib.celery import register_logger_signal, register_signal |  | ||||||
|  |  | ||||||
| # pymysql.install_as_MySQLdb() |  | ||||||
|  |  | ||||||
| # set the default Django settings module for the 'celery' program. | # set the default Django settings module for the 'celery' program. | ||||||
| os.environ.setdefault("DJANGO_SETTINGS_MODULE", "passbook.core.settings") | os.environ.setdefault("DJANGO_SETTINGS_MODULE", "passbook.core.settings") | ||||||
| @ -21,16 +17,17 @@ LOGGER = logging.getLogger(__name__) | |||||||
| class Celery(celery.Celery): | class Celery(celery.Celery): | ||||||
|     """Custom Celery class with Raven configured""" |     """Custom Celery class with Raven configured""" | ||||||
|  |  | ||||||
|     # def on_configure(self): |     # pylint: disable=method-hidden | ||||||
|     #     """Update raven client""" |     def on_configure(self): | ||||||
|     #     try: |         """Update raven client""" | ||||||
|     #         client = Client(settings.RAVEN_CONFIG.get('dsn')) |         try: | ||||||
|     #         # register a custom filter to filter out duplicate logs |             client = Client(settings.RAVEN_CONFIG.get('dsn')) | ||||||
|     #         register_logger_signal(client) |             # register a custom filter to filter out duplicate logs | ||||||
|     #         # hook into the Celery error handler |             register_logger_signal(client) | ||||||
|     #         register_signal(client) |             # hook into the Celery error handler | ||||||
|     #     except RecursionError:  # This error happens when pdoc is running |             register_signal(client) | ||||||
|     #         pass |         except RecursionError:  # This error happens when pdoc is running | ||||||
|  |             pass | ||||||
|  |  | ||||||
|  |  | ||||||
| # pylint: disable=unused-argument | # pylint: disable=unused-argument | ||||||
|  | |||||||
							
								
								
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,10 @@ | |||||||
|  | """passbook core exceptions""" | ||||||
|  |  | ||||||
|  | class PasswordPolicyInvalid(Exception): | ||||||
|  |     """Exception raised when a Password Policy fails""" | ||||||
|  |  | ||||||
|  |     messages = [] | ||||||
|  |  | ||||||
|  |     def __init__(self, *messages): | ||||||
|  |         super().__init__() | ||||||
|  |         self.messages = messages | ||||||
| @ -1,5 +1,6 @@ | |||||||
| """passbook Core Application forms""" | """passbook Core Application forms""" | ||||||
| from django import forms | from django import forms | ||||||
|  | from django.utils.translation import gettext_lazy as _ | ||||||
|  |  | ||||||
| from passbook.core.models import Application, Provider | from passbook.core.models import Application, Provider | ||||||
|  |  | ||||||
| @ -7,15 +8,20 @@ from passbook.core.models import Application, Provider | |||||||
| class ApplicationForm(forms.ModelForm): | class ApplicationForm(forms.ModelForm): | ||||||
|     """Application Form""" |     """Application Form""" | ||||||
|  |  | ||||||
|     provider = forms.ModelChoiceField(queryset=Provider.objects.all().select_subclasses()) |     provider = forms.ModelChoiceField(queryset=Provider.objects.all().select_subclasses(), | ||||||
|  |                                       required=False) | ||||||
|  |  | ||||||
|     class Meta: |     class Meta: | ||||||
|  |  | ||||||
|         model = Application |         model = Application | ||||||
|         fields = ['name', 'slug', 'launch_url', 'icon_url', |         fields = ['name', 'slug', 'launch_url', 'icon_url', | ||||||
|                   'rules', 'provider', 'skip_authorization'] |                   'policies', 'provider', 'skip_authorization'] | ||||||
|         widgets = { |         widgets = { | ||||||
|             'name': forms.TextInput(), |             'name': forms.TextInput(), | ||||||
|             'launch_url': forms.TextInput(), |             'launch_url': forms.TextInput(), | ||||||
|             'icon_url': forms.TextInput(), |             'icon_url': forms.TextInput(), | ||||||
|         } |         } | ||||||
|  |         labels = { | ||||||
|  |             'launch_url': _('Launch URL'), | ||||||
|  |             'icon_url': _('Icon URL'), | ||||||
|  |         } | ||||||
|  | |||||||
| @ -8,6 +8,7 @@ from django.utils.translation import gettext_lazy as _ | |||||||
|  |  | ||||||
| from passbook.core.models import User | from passbook.core.models import User | ||||||
| from passbook.lib.config import CONFIG | from passbook.lib.config import CONFIG | ||||||
|  | from passbook.lib.utils.ui import human_list | ||||||
|  |  | ||||||
| LOGGER = getLogger(__name__) | LOGGER = getLogger(__name__) | ||||||
|  |  | ||||||
| @ -15,28 +16,30 @@ class LoginForm(forms.Form): | |||||||
|     """Allow users to login""" |     """Allow users to login""" | ||||||
|  |  | ||||||
|     title = _('Log in to your account') |     title = _('Log in to your account') | ||||||
|     uid_field = forms.CharField(widget=forms.TextInput(attrs={'placeholder': _('UID')})) |     uid_field = forms.CharField() | ||||||
|     remember_me = forms.BooleanField(required=False) |     remember_me = forms.BooleanField(required=False) | ||||||
|  |  | ||||||
|  |     def __init__(self, *args, **kwargs): | ||||||
|  |         super().__init__(*args, **kwargs) | ||||||
|  |         if CONFIG.y('passbook.uid_fields') == ['e-mail']: | ||||||
|  |             self.fields['uid_field'] = forms.EmailField() | ||||||
|  |         self.fields['uid_field'].widget.attrs = { | ||||||
|  |             'placeholder': _(human_list([x.title() for x in CONFIG.y('passbook.uid_fields')])) | ||||||
|  |         } | ||||||
|  |  | ||||||
|     def clean_uid_field(self): |     def clean_uid_field(self): | ||||||
|         """Validate uid_field after EmailValidator if 'email' is the only selected uid_fields""" |         """Validate uid_field after EmailValidator if 'email' is the only selected uid_fields""" | ||||||
|         if CONFIG.y('passbook.uid_fields') == ['email']: |         if CONFIG.y('passbook.uid_fields') == ['email']: | ||||||
|             validate_email(self.cleaned_data.get('uid_field')) |             validate_email(self.cleaned_data.get('uid_field')) | ||||||
|         return self.cleaned_data.get('uid_field') |         return self.cleaned_data.get('uid_field') | ||||||
|  |  | ||||||
| class AuthenticationBackendFactorForm(forms.Form): |  | ||||||
|     """Password authentication form""" |  | ||||||
|  |  | ||||||
|     password = forms.CharField(widget=forms.PasswordInput(attrs={'placeholder': _('Password')})) |  | ||||||
|  |  | ||||||
| class SignUpForm(forms.Form): | class SignUpForm(forms.Form): | ||||||
|     """SignUp Form""" |     """SignUp Form""" | ||||||
|  |  | ||||||
|     title = _('Sign Up') |     title = _('Sign Up') | ||||||
|     first_name = forms.CharField(label=_('First Name'), |     name = forms.CharField(label=_('Name'), | ||||||
|                                  widget=forms.TextInput(attrs={'placeholder': _('First Name')})) |                            widget=forms.TextInput(attrs={'placeholder': _('Name')})) | ||||||
|     last_name = forms.CharField(label=_('Last Name'), |  | ||||||
|                                 widget=forms.TextInput(attrs={'placeholder': _('Last Name')})) |  | ||||||
|     username = forms.CharField(label=_('Username'), |     username = forms.CharField(label=_('Username'), | ||||||
|                                widget=forms.TextInput(attrs={'placeholder': _('Username')})) |                                widget=forms.TextInput(attrs={'placeholder': _('Username')})) | ||||||
|     email = forms.EmailField(label=_('E-Mail'), |     email = forms.EmailField(label=_('E-Mail'), | ||||||
| @ -74,6 +77,18 @@ class SignUpForm(forms.Form): | |||||||
|  |  | ||||||
|     def clean_password_repeat(self): |     def clean_password_repeat(self): | ||||||
|         """Check if Password adheres to filter and if passwords matche""" |         """Check if Password adheres to filter and if passwords matche""" | ||||||
|         # TODO: Password policy? Via Plugin? via Policy? |         password = self.cleaned_data.get('password') | ||||||
|         # return check_password(self) |         password_repeat = self.cleaned_data.get('password_repeat') | ||||||
|  |         if password != password_repeat: | ||||||
|  |             raise ValidationError(_("Passwords don't match")) | ||||||
|         return self.cleaned_data.get('password_repeat') |         return self.cleaned_data.get('password_repeat') | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PasswordFactorForm(forms.Form): | ||||||
|  |     """Password authentication form""" | ||||||
|  |  | ||||||
|  |     password = forms.CharField(widget=forms.PasswordInput(attrs={ | ||||||
|  |         'placeholder': _('Password'), | ||||||
|  |         'autofocus': 'autofocus', | ||||||
|  |         'autocomplete': 'current-password' | ||||||
|  |         })) | ||||||
|  | |||||||
							
								
								
									
										30
									
								
								passbook/core/forms/factors.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								passbook/core/forms/factors.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,30 @@ | |||||||
|  | """passbook administration forms""" | ||||||
|  | from django import forms | ||||||
|  |  | ||||||
|  | from passbook.core.models import DummyFactor, PasswordFactor | ||||||
|  |  | ||||||
|  | GENERAL_FIELDS = ['name', 'slug', 'order', 'policies', 'enabled'] | ||||||
|  |  | ||||||
|  | class PasswordFactorForm(forms.ModelForm): | ||||||
|  |     """Form to create/edit Password Factors""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = PasswordFactor | ||||||
|  |         fields = GENERAL_FIELDS + ['backends', 'password_policies'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'order': forms.NumberInput(), | ||||||
|  |         } | ||||||
|  |  | ||||||
|  | class DummyFactorForm(forms.ModelForm): | ||||||
|  |     """Form to create/edit Dummy Factor""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = DummyFactor | ||||||
|  |         fields = GENERAL_FIELDS | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'order': forms.NumberInput(), | ||||||
|  |         } | ||||||
| @ -27,7 +27,7 @@ class InvitationForm(forms.ModelForm): | |||||||
|     class Meta: |     class Meta: | ||||||
|  |  | ||||||
|         model = Invitation |         model = Invitation | ||||||
|         fields = ['expires', 'fixed_username', 'fixed_email'] |         fields = ['expires', 'fixed_username', 'fixed_email', 'needs_confirmation'] | ||||||
|         labels = { |         labels = { | ||||||
|             'fixed_username': "Force user's username (optional)", |             'fixed_username': "Force user's username (optional)", | ||||||
|             'fixed_email': "Force user's email (optional)", |             'fixed_email': "Force user's email (optional)", | ||||||
|  | |||||||
							
								
								
									
										75
									
								
								passbook/core/forms/policies.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										75
									
								
								passbook/core/forms/policies.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,75 @@ | |||||||
|  | """passbook Policy forms""" | ||||||
|  |  | ||||||
|  | from django import forms | ||||||
|  | from django.utils.translation import gettext as _ | ||||||
|  |  | ||||||
|  | from passbook.core.models import (DebugPolicy, FieldMatcherPolicy, | ||||||
|  |                                   PasswordPolicy, WebhookPolicy) | ||||||
|  |  | ||||||
|  | GENERAL_FIELDS = ['name', 'action', 'negate', 'order', ] | ||||||
|  |  | ||||||
|  | class FieldMatcherPolicyForm(forms.ModelForm): | ||||||
|  |     """FieldMatcherPolicy Form""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = FieldMatcherPolicy | ||||||
|  |         fields = GENERAL_FIELDS + ['user_field', 'match_action', 'value', ] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'value': forms.TextInput(), | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class WebhookPolicyForm(forms.ModelForm): | ||||||
|  |     """WebhookPolicyForm Form""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = WebhookPolicy | ||||||
|  |         fields = GENERAL_FIELDS + ['url', 'method', 'json_body', 'json_headers', | ||||||
|  |                                    'result_jsonpath', 'result_json_value', ] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'json_body': forms.TextInput(), | ||||||
|  |             'json_headers': forms.TextInput(), | ||||||
|  |             'result_jsonpath': forms.TextInput(), | ||||||
|  |             'result_json_value': forms.TextInput(), | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class DebugPolicyForm(forms.ModelForm): | ||||||
|  |     """DebugPolicyForm Form""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = DebugPolicy | ||||||
|  |         fields = GENERAL_FIELDS + ['result', 'wait_min', 'wait_max'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |         } | ||||||
|  |         labels = { | ||||||
|  |             'result': _('Allow user') | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PasswordPolicyForm(forms.ModelForm): | ||||||
|  |     """PasswordPolicy Form""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = PasswordPolicy | ||||||
|  |         fields = GENERAL_FIELDS + ['amount_uppercase', 'amount_lowercase', | ||||||
|  |                                    'amount_symbols', 'length_min', 'symbol_charset', | ||||||
|  |                                    'error_message'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput(), | ||||||
|  |             'symbol_charset': forms.TextInput(), | ||||||
|  |             'error_message': forms.TextInput(), | ||||||
|  |         } | ||||||
|  |         labels = { | ||||||
|  |             'amount_uppercase': _('Minimum amount of Uppercase Characters'), | ||||||
|  |             'amount_lowercase': _('Minimum amount of Lowercase Characters'), | ||||||
|  |             'amount_symbols': _('Minimum amount of Symbols Characters'), | ||||||
|  |             'length_min': _('Minimum Length'), | ||||||
|  |         } | ||||||
| @ -1,52 +0,0 @@ | |||||||
| """passbook rule forms""" |  | ||||||
|  |  | ||||||
| from django import forms |  | ||||||
| from django.utils.translation import gettext as _ |  | ||||||
|  |  | ||||||
| from passbook.core.models import DebugRule, FieldMatcherRule, WebhookRule |  | ||||||
|  |  | ||||||
| GENERAL_FIELDS = ['name', 'action', 'negate', 'order', ] |  | ||||||
|  |  | ||||||
| class FieldMatcherRuleForm(forms.ModelForm): |  | ||||||
|     """FieldMatcherRule Form""" |  | ||||||
|  |  | ||||||
|     class Meta: |  | ||||||
|  |  | ||||||
|         model = FieldMatcherRule |  | ||||||
|         fields = GENERAL_FIELDS + ['user_field', 'match_action', 'value', ] |  | ||||||
|         widgets = { |  | ||||||
|             'name': forms.TextInput(), |  | ||||||
|             'value': forms.TextInput(), |  | ||||||
|         } |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class WebhookRuleForm(forms.ModelForm): |  | ||||||
|     """WebhookRuleForm Form""" |  | ||||||
|  |  | ||||||
|     class Meta: |  | ||||||
|  |  | ||||||
|         model = WebhookRule |  | ||||||
|         fields = GENERAL_FIELDS + ['url', 'method', 'json_body', 'json_headers', |  | ||||||
|                                    'result_jsonpath', 'result_json_value', ] |  | ||||||
|         widgets = { |  | ||||||
|             'name': forms.TextInput(), |  | ||||||
|             'json_body': forms.TextInput(), |  | ||||||
|             'json_headers': forms.TextInput(), |  | ||||||
|             'result_jsonpath': forms.TextInput(), |  | ||||||
|             'result_json_value': forms.TextInput(), |  | ||||||
|         } |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class DebugRuleForm(forms.ModelForm): |  | ||||||
|     """DebugRuleForm Form""" |  | ||||||
|  |  | ||||||
|     class Meta: |  | ||||||
|  |  | ||||||
|         model = DebugRule |  | ||||||
|         fields = GENERAL_FIELDS + ['result', 'wait_min', 'wait_max'] |  | ||||||
|         widgets = { |  | ||||||
|             'name': forms.TextInput(), |  | ||||||
|         } |  | ||||||
|         labels = { |  | ||||||
|             'result': _('Allow user') |  | ||||||
|         } |  | ||||||
| @ -1,14 +0,0 @@ | |||||||
| """passbook core user forms""" |  | ||||||
|  |  | ||||||
| from django import forms |  | ||||||
|  |  | ||||||
| from passbook.core.models import User |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class UserDetailForm(forms.ModelForm): |  | ||||||
|     """Update User Details""" |  | ||||||
|  |  | ||||||
|     class Meta: |  | ||||||
|  |  | ||||||
|         model = User |  | ||||||
|         fields = ['username', 'first_name', 'last_name', 'email'] |  | ||||||
							
								
								
									
										41
									
								
								passbook/core/forms/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								passbook/core/forms/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,41 @@ | |||||||
|  | """passbook core user forms""" | ||||||
|  |  | ||||||
|  | from django import forms | ||||||
|  | from django.forms import ValidationError | ||||||
|  | from django.utils.translation import gettext_lazy as _ | ||||||
|  |  | ||||||
|  | from passbook.core.models import User | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UserDetailForm(forms.ModelForm): | ||||||
|  |     """Update User Details""" | ||||||
|  |  | ||||||
|  |     class Meta: | ||||||
|  |  | ||||||
|  |         model = User | ||||||
|  |         fields = ['username', 'name', 'email'] | ||||||
|  |         widgets = { | ||||||
|  |             'name': forms.TextInput | ||||||
|  |         } | ||||||
|  |  | ||||||
|  | class PasswordChangeForm(forms.Form): | ||||||
|  |     """Form to update password""" | ||||||
|  |  | ||||||
|  |     password = forms.CharField(label=_('Password'), | ||||||
|  |                                widget=forms.PasswordInput(attrs={ | ||||||
|  |                                    'placeholder': _('New Password'), | ||||||
|  |                                    'autocomplete': 'new-password' | ||||||
|  |                                    })) | ||||||
|  |     password_repeat = forms.CharField(label=_('Repeat Password'), | ||||||
|  |                                       widget=forms.PasswordInput(attrs={ | ||||||
|  |                                           'placeholder': _('Repeat Password'), | ||||||
|  |                                           'autocomplete': 'new-password' | ||||||
|  |                                       })) | ||||||
|  |  | ||||||
|  |     def clean_password_repeat(self): | ||||||
|  |         """Check if Password adheres to filter and if passwords matche""" | ||||||
|  |         password = self.cleaned_data.get('password') | ||||||
|  |         password_repeat = self.cleaned_data.get('password_repeat') | ||||||
|  |         if password != password_repeat: | ||||||
|  |             raise ValidationError(_("Passwords don't match")) | ||||||
|  |         return self.cleaned_data.get('password_repeat') | ||||||
							
								
								
									
										44
									
								
								passbook/core/management/commands/import_users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								passbook/core/management/commands/import_users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,44 @@ | |||||||
|  | """passbook import_users management command""" | ||||||
|  | from csv import DictReader | ||||||
|  | from logging import getLogger | ||||||
|  |  | ||||||
|  | from django.core.management.base import BaseCommand | ||||||
|  | from django.core.validators import EmailValidator, ValidationError | ||||||
|  |  | ||||||
|  | from passbook.core.models import User | ||||||
|  |  | ||||||
|  | LOGGER = getLogger(__name__) | ||||||
|  |  | ||||||
|  | class Command(BaseCommand): | ||||||
|  |     """Import users from CSV file""" | ||||||
|  |  | ||||||
|  |     def add_arguments(self, parser): | ||||||
|  |         # Positional arguments | ||||||
|  |         parser.add_argument('file', nargs='+', type=str) | ||||||
|  |  | ||||||
|  |     def handle(self, *args, **options): | ||||||
|  |         """Create Users from CSV file""" | ||||||
|  |         for file in options.get('file'): | ||||||
|  |             with open(file, 'r') as _file: | ||||||
|  |                 reader = DictReader(_file) | ||||||
|  |                 for user in reader: | ||||||
|  |                     LOGGER.debug('User %s', user.get('username')) | ||||||
|  |                     try: | ||||||
|  |                         # only import users with valid email addresses | ||||||
|  |                         if user.get('email'): | ||||||
|  |                             validator = EmailValidator() | ||||||
|  |                             validator(user.get('email')) | ||||||
|  |                         # use combination of username and email to check for existing user | ||||||
|  |                         if User.objects.filter( | ||||||
|  |                                 username=user.get('username'), | ||||||
|  |                                 email=user.get('email')).exists(): | ||||||
|  |                             LOGGER.debug('User %s exists already, skipping', user.get('username')) | ||||||
|  |                         # Create user | ||||||
|  |                         User.objects.create( | ||||||
|  |                             username=user.get('username'), | ||||||
|  |                             email=user.get('email'), | ||||||
|  |                             name=user.get('name')) | ||||||
|  |                         LOGGER.debug('Created User %s', user.get('username')) | ||||||
|  |                     except ValidationError as exc: | ||||||
|  |                         LOGGER.warning('User %s caused %r, skipping', user.get('username'), exc) | ||||||
|  |                         continue | ||||||
| @ -1,5 +1,5 @@ | |||||||
| """passbook nexus_upload management command""" | """passbook nexus_upload management command""" | ||||||
| from getpass import getpass | from base64 import b64decode | ||||||
|  |  | ||||||
| import requests | import requests | ||||||
| from django.core.management.base import BaseCommand | from django.core.management.base import BaseCommand | ||||||
| @ -24,9 +24,9 @@ class Command(BaseCommand): | |||||||
|             help='Nexus root URL', |             help='Nexus root URL', | ||||||
|             required=True) |             required=True) | ||||||
|         parser.add_argument( |         parser.add_argument( | ||||||
|             '--user', |             '--auth', | ||||||
|             action='store', |             action='store', | ||||||
|             help='Username to use for Nexus upload', |             help='base64-encoded string of username:password', | ||||||
|             required=True) |             required=True) | ||||||
|         parser.add_argument( |         parser.add_argument( | ||||||
|             '--method', |             '--method', | ||||||
| @ -37,29 +37,21 @@ class Command(BaseCommand): | |||||||
|             help=('Method used for uploading files to nexus. ' |             help=('Method used for uploading files to nexus. ' | ||||||
|                   'Apt repositories use post, Helm uses put.'), |                   'Apt repositories use post, Helm uses put.'), | ||||||
|             required=True) |             required=True) | ||||||
|         parser.add_argument( |  | ||||||
|             '--password', |  | ||||||
|             action='store', |  | ||||||
|             help=("Password to use for Nexus upload. " |  | ||||||
|                   "If parameter not given, we'll interactively ask")) |  | ||||||
|         # Positional arguments |         # Positional arguments | ||||||
|         parser.add_argument('file', nargs='+', type=str) |         parser.add_argument('file', nargs='+', type=str) | ||||||
|  |  | ||||||
|     def handle(self, *args, **options): |     def handle(self, *args, **options): | ||||||
|         """Upload debian package to nexus repository""" |         """Upload debian package to nexus repository""" | ||||||
|         if options.get('password') is None: |         auth = tuple(b64decode(options.get('auth')).decode('utf-8').split(':', 1)) | ||||||
|             options['password'] = getpass() |  | ||||||
|         responses = {} |         responses = {} | ||||||
|         url = 'https://%(url)s/repository/%(repo)s//' % options |         url = 'https://%(url)s/repository/%(repo)s/' % options | ||||||
|         method = options.get('method') |         method = options.get('method') | ||||||
|         exit_code = 0 |         exit_code = 0 | ||||||
|         for file in options.get('file'): |         for file in options.get('file'): | ||||||
|             if method == 'post': |             if method == 'post': | ||||||
|                 responses[file] = requests.post(url, data=open(file, mode='rb'), |                 responses[file] = requests.post(url, data=open(file, mode='rb'), auth=auth) | ||||||
|                                                 auth=(options.get('user'), options.get('password'))) |  | ||||||
|             else: |             else: | ||||||
|                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), |                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), auth=auth) | ||||||
|                                                auth=(options.get('user'), options.get('password'))) |  | ||||||
|         self.stdout.write('Upload results:\n') |         self.stdout.write('Upload results:\n') | ||||||
|         sep = '-' * 60 |         sep = '-' * 60 | ||||||
|         self.stdout.write('%s\n' % sep) |         self.stdout.write('%s\n' % sep) | ||||||
|  | |||||||
| @ -1,4 +1,4 @@ | |||||||
| # Generated by Django 2.1.5 on 2019-02-08 10:42 | # Generated by Django 2.1.7 on 2019-02-16 09:10 | ||||||
|  |  | ||||||
| import uuid | import uuid | ||||||
|  |  | ||||||
| @ -68,13 +68,7 @@ class Migration(migrations.Migration): | |||||||
|             }, |             }, | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='Provider', |             name='Policy', | ||||||
|             fields=[ |  | ||||||
|                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), |  | ||||||
|             ], |  | ||||||
|         ), |  | ||||||
|         migrations.CreateModel( |  | ||||||
|             name='Rule', |  | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('created', models.DateField(auto_now_add=True)), |                 ('created', models.DateField(auto_now_add=True)), | ||||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), |                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||||
| @ -89,7 +83,7 @@ class Migration(migrations.Migration): | |||||||
|             }, |             }, | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='RuleModel', |             name='PolicyModel', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('created', models.DateField(auto_now_add=True)), |                 ('created', models.DateField(auto_now_add=True)), | ||||||
|                 ('last_updated', models.DateTimeField(auto_now=True)), |                 ('last_updated', models.DateTimeField(auto_now=True)), | ||||||
| @ -99,6 +93,12 @@ class Migration(migrations.Migration): | |||||||
|                 'abstract': False, |                 'abstract': False, | ||||||
|             }, |             }, | ||||||
|         ), |         ), | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='Provider', | ||||||
|  |             fields=[ | ||||||
|  |                 ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), | ||||||
|  |             ], | ||||||
|  |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='UserSourceConnection', |             name='UserSourceConnection', | ||||||
|             fields=[ |             fields=[ | ||||||
| @ -111,51 +111,82 @@ class Migration(migrations.Migration): | |||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='Application', |             name='Application', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('rulemodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.RuleModel')), |                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||||
|                 ('name', models.TextField()), |                 ('name', models.TextField()), | ||||||
|                 ('slug', models.SlugField()), |                 ('slug', models.SlugField()), | ||||||
|                 ('launch_url', models.URLField(blank=True, null=True)), |                 ('launch_url', models.URLField(blank=True, null=True)), | ||||||
|                 ('icon_url', models.TextField(blank=True, null=True)), |                 ('icon_url', models.TextField(blank=True, null=True)), | ||||||
|                 ('skip_authorization', models.BooleanField(default=False)), |                 ('skip_authorization', models.BooleanField(default=False)), | ||||||
|                 ('provider', models.OneToOneField(default=None, null=True, on_delete=django.db.models.deletion.SET_DEFAULT, to='passbook_core.Provider')), |                 ('provider', models.OneToOneField(blank=True, default=None, null=True, on_delete=django.db.models.deletion.SET_DEFAULT, to='passbook_core.Provider')), | ||||||
|             ], |             ], | ||||||
|             options={ |             options={ | ||||||
|                 'abstract': False, |                 'abstract': False, | ||||||
|             }, |             }, | ||||||
|             bases=('passbook_core.rulemodel',), |             bases=('passbook_core.policymodel',), | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='DebugRule', |             name='DebugPolicy', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), |                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||||
|                 ('result', models.BooleanField(default=False)), |                 ('result', models.BooleanField(default=False)), | ||||||
|                 ('wait_min', models.IntegerField(default=5)), |                 ('wait_min', models.IntegerField(default=5)), | ||||||
|                 ('wait_max', models.IntegerField(default=30)), |                 ('wait_max', models.IntegerField(default=30)), | ||||||
|             ], |             ], | ||||||
|             options={ |             options={ | ||||||
|                 'verbose_name': 'Debug Rule', |                 'verbose_name': 'Debug Policy', | ||||||
|                 'verbose_name_plural': 'Debug Rules', |                 'verbose_name_plural': 'Debug Policys', | ||||||
|             }, |             }, | ||||||
|             bases=('passbook_core.rule',), |             bases=('passbook_core.policy',), | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='FieldMatcherRule', |             name='Factor', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), |                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||||
|                 ('user_field', models.TextField(choices=[('username', 'username'), ('first_name', 'first_name'), ('last_name', 'last_name'), ('email', 'email'), ('is_staff', 'is_staff'), ('is_active', 'is_active'), ('data_joined', 'data_joined')])), |                 ('name', models.TextField()), | ||||||
|  |                 ('slug', models.SlugField(unique=True)), | ||||||
|  |                 ('order', models.IntegerField()), | ||||||
|  |                 ('type', models.TextField(unique=True)), | ||||||
|  |                 ('enabled', models.BooleanField(default=True)), | ||||||
|  |             ], | ||||||
|  |             options={ | ||||||
|  |                 'abstract': False, | ||||||
|  |             }, | ||||||
|  |             bases=('passbook_core.policymodel',), | ||||||
|  |         ), | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='FieldMatcherPolicy', | ||||||
|  |             fields=[ | ||||||
|  |                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||||
|  |                 ('user_field', models.TextField(choices=[('username', 'Username'), ('first_name', 'First Name'), ('last_name', 'Last Name'), ('email', 'E-Mail'), ('is_staff', 'Is staff'), ('is_active', 'Is active'), ('data_joined', 'Date joined')])), | ||||||
|                 ('match_action', models.CharField(choices=[('startswith', 'Starts with'), ('endswith', 'Ends with'), ('endswith', 'Contains'), ('regexp', 'Regexp'), ('exact', 'Exact')], max_length=50)), |                 ('match_action', models.CharField(choices=[('startswith', 'Starts with'), ('endswith', 'Ends with'), ('endswith', 'Contains'), ('regexp', 'Regexp'), ('exact', 'Exact')], max_length=50)), | ||||||
|                 ('value', models.TextField()), |                 ('value', models.TextField()), | ||||||
|             ], |             ], | ||||||
|             options={ |             options={ | ||||||
|                 'verbose_name': 'Field matcher Rule', |                 'verbose_name': 'Field matcher Policy', | ||||||
|                 'verbose_name_plural': 'Field matcher Rules', |                 'verbose_name_plural': 'Field matcher Policys', | ||||||
|             }, |             }, | ||||||
|             bases=('passbook_core.rule',), |             bases=('passbook_core.policy',), | ||||||
|  |         ), | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='PasswordPolicyPolicy', | ||||||
|  |             fields=[ | ||||||
|  |                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||||
|  |                 ('amount_uppercase', models.IntegerField(default=0)), | ||||||
|  |                 ('amount_lowercase', models.IntegerField(default=0)), | ||||||
|  |                 ('amount_symbols', models.IntegerField(default=0)), | ||||||
|  |                 ('length_min', models.IntegerField(default=0)), | ||||||
|  |                 ('symbol_charset', models.TextField(default='!\\"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~ ')), | ||||||
|  |             ], | ||||||
|  |             options={ | ||||||
|  |                 'verbose_name': 'Password Policy Policy', | ||||||
|  |                 'verbose_name_plural': 'Password Policy Policys', | ||||||
|  |             }, | ||||||
|  |             bases=('passbook_core.policy',), | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='Source', |             name='Source', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('rulemodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.RuleModel')), |                 ('policymodel_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PolicyModel')), | ||||||
|                 ('name', models.TextField()), |                 ('name', models.TextField()), | ||||||
|                 ('slug', models.SlugField()), |                 ('slug', models.SlugField()), | ||||||
|                 ('enabled', models.BooleanField(default=True)), |                 ('enabled', models.BooleanField(default=True)), | ||||||
| @ -163,12 +194,12 @@ class Migration(migrations.Migration): | |||||||
|             options={ |             options={ | ||||||
|                 'abstract': False, |                 'abstract': False, | ||||||
|             }, |             }, | ||||||
|             bases=('passbook_core.rulemodel',), |             bases=('passbook_core.policymodel',), | ||||||
|         ), |         ), | ||||||
|         migrations.CreateModel( |         migrations.CreateModel( | ||||||
|             name='WebhookRule', |             name='WebhookPolicy', | ||||||
|             fields=[ |             fields=[ | ||||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), |                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||||
|                 ('url', models.URLField()), |                 ('url', models.URLField()), | ||||||
|                 ('method', models.CharField(choices=[('GET', 'GET'), ('POST', 'POST'), ('PATCH', 'PATCH'), ('DELETE', 'DELETE'), ('PUT', 'PUT')], max_length=10)), |                 ('method', models.CharField(choices=[('GET', 'GET'), ('POST', 'POST'), ('PATCH', 'PATCH'), ('DELETE', 'DELETE'), ('PUT', 'PUT')], max_length=10)), | ||||||
|                 ('json_body', models.TextField()), |                 ('json_body', models.TextField()), | ||||||
| @ -177,15 +208,15 @@ class Migration(migrations.Migration): | |||||||
|                 ('result_json_value', models.TextField()), |                 ('result_json_value', models.TextField()), | ||||||
|             ], |             ], | ||||||
|             options={ |             options={ | ||||||
|                 'verbose_name': 'Webhook Rule', |                 'verbose_name': 'Webhook Policy', | ||||||
|                 'verbose_name_plural': 'Webhook Rules', |                 'verbose_name_plural': 'Webhook Policys', | ||||||
|             }, |             }, | ||||||
|             bases=('passbook_core.rule',), |             bases=('passbook_core.policy',), | ||||||
|         ), |         ), | ||||||
|         migrations.AddField( |         migrations.AddField( | ||||||
|             model_name='rulemodel', |             model_name='policymodel', | ||||||
|             name='rules', |             name='policies', | ||||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Rule'), |             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||||
|         ), |         ), | ||||||
|         migrations.AddField( |         migrations.AddField( | ||||||
|             model_name='user', |             model_name='user', | ||||||
|  | |||||||
| @ -1,35 +0,0 @@ | |||||||
| # Generated by Django 2.1.5 on 2019-02-08 15:14 |  | ||||||
|  |  | ||||||
| import django.db.models.deletion |  | ||||||
| from django.db import migrations, models |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class Migration(migrations.Migration): |  | ||||||
|  |  | ||||||
|     dependencies = [ |  | ||||||
|         ('passbook_core', '0001_initial'), |  | ||||||
|     ] |  | ||||||
|  |  | ||||||
|     operations = [ |  | ||||||
|         migrations.CreateModel( |  | ||||||
|             name='PasswordPolicyRule', |  | ||||||
|             fields=[ |  | ||||||
|                 ('rule_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Rule')), |  | ||||||
|                 ('amount_uppercase', models.IntegerField(default=0)), |  | ||||||
|                 ('amount_lowercase', models.IntegerField(default=0)), |  | ||||||
|                 ('amount_symbols', models.IntegerField(default=0)), |  | ||||||
|                 ('length_min', models.IntegerField(default=0)), |  | ||||||
|                 ('symbol_charset', models.TextField(default='!\\"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~ ')), |  | ||||||
|             ], |  | ||||||
|             options={ |  | ||||||
|                 'verbose_name': 'Password Policy Rule', |  | ||||||
|                 'verbose_name_plural': 'Password Policy Rules', |  | ||||||
|             }, |  | ||||||
|             bases=('passbook_core.rule',), |  | ||||||
|         ), |  | ||||||
|         migrations.AlterField( |  | ||||||
|             model_name='fieldmatcherrule', |  | ||||||
|             name='user_field', |  | ||||||
|             field=models.TextField(choices=[('username', 'Username'), ('first_name', 'First Name'), ('last_name', 'Last Name'), ('email', 'E-Mail'), ('is_staff', 'Is staff'), ('is_active', 'Is active'), ('data_joined', 'Date joined')]), |  | ||||||
|         ), |  | ||||||
|     ] |  | ||||||
							
								
								
									
										29
									
								
								passbook/core/migrations/0002_auto_20190216_1002.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								passbook/core/migrations/0002_auto_20190216_1002.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,29 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-16 10:02 | ||||||
|  |  | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0001_initial'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='debugpolicy', | ||||||
|  |             options={'verbose_name': 'Debug Policy', 'verbose_name_plural': 'Debug Policies'}, | ||||||
|  |         ), | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='fieldmatcherpolicy', | ||||||
|  |             options={'verbose_name': 'Field matcher Policy', 'verbose_name_plural': 'Field matcher Policies'}, | ||||||
|  |         ), | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='passwordpolicypolicy', | ||||||
|  |             options={'verbose_name': 'Password Policy Policy', 'verbose_name_plural': 'Password Policy Policies'}, | ||||||
|  |         ), | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='webhookpolicy', | ||||||
|  |             options={'verbose_name': 'Webhook Policy', 'verbose_name_plural': 'Webhook Policies'}, | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										17
									
								
								passbook/core/migrations/0003_auto_20190216_1004.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/core/migrations/0003_auto_20190216_1004.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-16 10:04 | ||||||
|  |  | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0002_auto_20190216_1002'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.RenameModel( | ||||||
|  |             old_name='PasswordPolicyPolicy', | ||||||
|  |             new_name='PasswordPolicy', | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										17
									
								
								passbook/core/migrations/0004_auto_20190216_1013.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/core/migrations/0004_auto_20190216_1013.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-16 10:13 | ||||||
|  |  | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0003_auto_20190216_1004'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='passwordpolicy', | ||||||
|  |             options={'verbose_name': 'Password Policy', 'verbose_name_plural': 'Password Policies'}, | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										28
									
								
								passbook/core/migrations/0005_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								passbook/core/migrations/0005_auto_20190221_1201.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,28 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 12:01 | ||||||
|  |  | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0004_auto_20190216_1013'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='policy', | ||||||
|  |             name='created', | ||||||
|  |             field=models.DateTimeField(auto_now_add=True), | ||||||
|  |         ), | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='policymodel', | ||||||
|  |             name='created', | ||||||
|  |             field=models.DateTimeField(auto_now_add=True), | ||||||
|  |         ), | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='usersourceconnection', | ||||||
|  |             name='created', | ||||||
|  |             field=models.DateTimeField(auto_now_add=True), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										19
									
								
								passbook/core/migrations/0006_factor_arguments.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								passbook/core/migrations/0006_factor_arguments.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,19 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 12:32 | ||||||
|  |  | ||||||
|  | import django.contrib.postgres.fields.jsonb | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0005_auto_20190221_1201'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AddField( | ||||||
|  |             model_name='factor', | ||||||
|  |             name='arguments', | ||||||
|  |             field=django.contrib.postgres.fields.jsonb.JSONField(default=dict), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										19
									
								
								passbook/core/migrations/0007_auto_20190221_1233.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								passbook/core/migrations/0007_auto_20190221_1233.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,19 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 12:33 | ||||||
|  |  | ||||||
|  | import django.contrib.postgres.fields.jsonb | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0006_factor_arguments'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='factor', | ||||||
|  |             name='arguments', | ||||||
|  |             field=django.contrib.postgres.fields.jsonb.JSONField(blank=True, default=dict), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										18
									
								
								passbook/core/migrations/0008_auto_20190221_1516.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/core/migrations/0008_auto_20190221_1516.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-21 15:16 | ||||||
|  |  | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0007_auto_20190221_1233'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterField( | ||||||
|  |             model_name='fieldmatcherpolicy', | ||||||
|  |             name='match_action', | ||||||
|  |             field=models.CharField(choices=[('startswith', 'Starts with'), ('endswith', 'Ends with'), ('contains', 'Contains'), ('regexp', 'Regexp'), ('exact', 'Exact')], max_length=50), | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										44
									
								
								passbook/core/migrations/0009_auto_20190224_0950.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								passbook/core/migrations/0009_auto_20190224_0950.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,44 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-24 09:50 | ||||||
|  |  | ||||||
|  | import django.contrib.postgres.fields | ||||||
|  | import django.db.models.deletion | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0008_auto_20190221_1516'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='DummyFactor', | ||||||
|  |             fields=[ | ||||||
|  |                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||||
|  |             ], | ||||||
|  |             options={ | ||||||
|  |                 'abstract': False, | ||||||
|  |             }, | ||||||
|  |             bases=('passbook_core.factor',), | ||||||
|  |         ), | ||||||
|  |         migrations.CreateModel( | ||||||
|  |             name='PasswordFactor', | ||||||
|  |             fields=[ | ||||||
|  |                 ('factor_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Factor')), | ||||||
|  |                 ('backends', django.contrib.postgres.fields.ArrayField(base_field=models.TextField(), size=None)), | ||||||
|  |             ], | ||||||
|  |             options={ | ||||||
|  |                 'abstract': False, | ||||||
|  |             }, | ||||||
|  |             bases=('passbook_core.factor',), | ||||||
|  |         ), | ||||||
|  |         migrations.RemoveField( | ||||||
|  |             model_name='factor', | ||||||
|  |             name='arguments', | ||||||
|  |         ), | ||||||
|  |         migrations.RemoveField( | ||||||
|  |             model_name='factor', | ||||||
|  |             name='type', | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										21
									
								
								passbook/core/migrations/0010_auto_20190224_1016.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								passbook/core/migrations/0010_auto_20190224_1016.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-24 10:16 | ||||||
|  |  | ||||||
|  | from django.db import migrations | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0009_auto_20190224_0950'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='dummyfactor', | ||||||
|  |             options={'verbose_name': 'Dummy Factor', 'verbose_name_plural': 'Dummy Factors'}, | ||||||
|  |         ), | ||||||
|  |         migrations.AlterModelOptions( | ||||||
|  |             name='passwordfactor', | ||||||
|  |             options={'verbose_name': 'Password Factor', 'verbose_name_plural': 'Password Factors'}, | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | |||||||
|  | # Generated by Django 2.1.7 on 2019-02-25 14:38 | ||||||
|  |  | ||||||
|  | import django.utils.timezone | ||||||
|  | from django.db import migrations, models | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class Migration(migrations.Migration): | ||||||
|  |  | ||||||
|  |     dependencies = [ | ||||||
|  |         ('passbook_core', '0010_auto_20190224_1016'), | ||||||
|  |     ] | ||||||
|  |  | ||||||
|  |     operations = [ | ||||||
|  |         migrations.AddField( | ||||||
|  |             model_name='passwordfactor', | ||||||
|  |             name='password_policies', | ||||||
|  |             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||||
|  |         ), | ||||||
|  |         migrations.AddField( | ||||||
|  |             model_name='user', | ||||||
|  |             name='password_change_date', | ||||||
|  |             field=models.DateTimeField(auto_now_add=True, default=django.utils.timezone.now), | ||||||
|  |             preserve_default=False, | ||||||
|  |         ), | ||||||
|  |     ] | ||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	