Compare commits
	
		
			145 Commits
		
	
	
		
			version/0.
			...
			version/0.
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| e6376a05f7 | |||
| 1f45aff7ad | |||
| e1f1f617b6 | |||
| 2690675dca | |||
| 7529b51358 | |||
| c394066d99 | |||
| 9c585032ef | |||
| d408031304 | |||
| c47bc11ec0 | |||
| 1deb094afe | |||
| 501fed1922 | |||
| ad8125ac1c | |||
| b42a551fb2 | |||
| 3256be23df | |||
| f7c0c0146a | |||
| e4baf8c21e | |||
| 364f040b36 | |||
| 2b8c2b2346 | |||
| 5f861189e4 | |||
| 5e11b6687e | |||
| c4b429825d | |||
| eebbae0677 | |||
| 42b30f4507 | |||
| 0e425418df | |||
| 7fe0300b86 | |||
| c012c6be5c | |||
| a5dc193cfd | |||
| 7507ad2620 | |||
| f1291fec8d | |||
| 37aeeea239 | |||
| 0fa1fc86da | |||
| c3034ab9ac | |||
| 76694e037a | |||
| 787db41cc3 | |||
| 74da3df7cd | |||
| a6e435bd70 | |||
| c313b496aa | |||
| a7eaa74191 | |||
| 11ecdc4fcf | |||
| 2f7781b67a | |||
| 296d4f691a | |||
| 64033031b1 | |||
| 9daff7608d | |||
| 0a4af80b9b | |||
| a54adb05c4 | |||
| 43a389e596 | |||
| 2d7e8f1b50 | |||
| cf11f6b121 | |||
| 6dcdf7bcce | |||
| 56d872af15 | |||
| ca663d16fc | |||
| e05c18b19b | |||
| a7b86e46bc | |||
| 84f56674c2 | |||
| 02ab177c6d | |||
| 1232c487e9 | |||
| ef0a2bfbe8 | |||
| 05242a11ad | |||
| 4593ad7bcc | |||
| d7fd5a7fa6 | |||
| 4439378fd4 | |||
| acf65eafdd | |||
| c2ebff55ef | |||
| 99c82676b6 | |||
| 4991e9b825 | |||
| 612f95c3ba | |||
| cd91d5ca15 | |||
| cbbbb5dc08 | |||
| c1640b9411 | |||
| a4842c1f95 | |||
| a4707ddc54 | |||
| fb82d56307 | |||
| 1a1005f80d | |||
| e86cae6cac | |||
| 0b282f45e0 | |||
| 791e88ffc1 | |||
| 7bd3c4bccf | |||
| 722e2e4050 | |||
| c7fc444c95 | |||
| 20ad062814 | |||
| fcb5d36e07 | |||
| 9b131b619f | |||
| 54427f7c68 | |||
| 35eef9c28d | |||
| e88a82553d | |||
| 01a9520140 | |||
| 46667615c3 | |||
| c6721a83a4 | |||
| 46866e8ef0 | |||
| 4a49681127 | |||
| 4c3fced4e9 | |||
| 172347d90f | |||
| f54520b5cf | |||
| d7c4697625 | |||
| 5584f5bda8 | |||
| 2ce6f5a714 | |||
| c66945623a | |||
| cbae05c74c | |||
| 5b771da972 | |||
| 2db1738e4a | |||
| 95de6a14fd | |||
| 17132ebc19 | |||
| 289be46388 | |||
| 6c300b7b31 | |||
| b726583084 | |||
| 48055d1cfd | |||
| 436070f5bd | |||
| 3ee79818db | |||
| e7a02104db | |||
| 556740d7bc | |||
| 421f51770c | |||
| 96f7e70f9e | |||
| ad96f7dbb8 | |||
| e7fb48eba2 | |||
| b19b5b644d | |||
| 250b6691d4 | |||
| e3b02a6e78 | |||
| e94ef34d8f | |||
| 49e945307a | |||
| edfe0e5450 | |||
| 06b65a7882 | |||
| ff9bc8aa70 | |||
| 28da67abe6 | |||
| 39d9fe9bf0 | |||
| 750117b0fd | |||
| 983462f80d | |||
| 4ae31d409b | |||
| 98b414f3e2 | |||
| a0d42092e3 | |||
| f2569b6424 | |||
| 9d344d887c | |||
| 7e9154a0ea | |||
| e0ef061771 | |||
| b8694a7ade | |||
| 10d6a30f2c | |||
| 8c94aef6d0 | |||
| 19bd3bfffb | |||
| 8611ac624c | |||
| fa93b59a8c | |||
| 8b66b40f0d | |||
| c2756f15fc | |||
| 408e205c5f | |||
| 5f3ab49535 | |||
| 33431ae013 | |||
| b40ac6dc5d | 
| @ -1,5 +1,5 @@ | ||||
| [bumpversion] | ||||
| current_version = 0.0.7-alpha | ||||
| current_version = 0.1.13-beta | ||||
| tag = True | ||||
| commit = True | ||||
| parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*) | ||||
| @ -9,11 +9,14 @@ tag_name = version/{new_version} | ||||
|  | ||||
| [bumpversion:part:release] | ||||
| optional_value = stable | ||||
| first_value = beta | ||||
| values =  | ||||
| 	alpha | ||||
| 	beta | ||||
| 	stable | ||||
|  | ||||
| [bumpversion:file:helm/passbook/values.yaml] | ||||
|  | ||||
| [bumpversion:file:helm/passbook/Chart.yaml] | ||||
|  | ||||
| [bumpversion:file:.gitlab-ci.yml] | ||||
| @ -34,6 +37,10 @@ values = | ||||
|  | ||||
| [bumpversion:file:passbook/lib/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/hibp_policy/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/password_expiry_policy/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/saml_idp/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/audit/__init__.py] | ||||
|  | ||||
| @ -8,6 +8,7 @@ stages: | ||||
|   - test | ||||
|   - build | ||||
|   - docs | ||||
|   - deploy | ||||
| image: python:3.6 | ||||
| services: | ||||
|   - postgres:latest | ||||
| @ -16,7 +17,6 @@ variables: | ||||
|   POSTGRES_DB: passbook | ||||
|   POSTGRES_USER: passbook | ||||
|   POSTGRES_PASSWORD: 'EK-5jnKfjrGRm<77' | ||||
|   SUPERVISR_ENV: ci | ||||
|  | ||||
| include: | ||||
|   - /allauth/.gitlab-ci.yml | ||||
| @ -52,9 +52,9 @@ package-docker: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|     - echo "{\"auths\":{\"https://docker.$NEXUS_URL/\":{\"username\":\"$NEXUS_USER\",\"password\":\"$NEXUS_PASS\"}}}" > /kaniko/.docker/config.json | ||||
|     - echo "{\"auths\":{\"docker.$NEXUS_URL\":{\"auth\":\"$NEXUS_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.0.7-alpha | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.1.13-beta | ||||
|   stage: build | ||||
|   only: | ||||
|     - tags | ||||
| @ -65,58 +65,34 @@ package-helm: | ||||
|     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
|     - helm init --client-only | ||||
|     - helm package helm/passbook | ||||
|     - ./manage.py nexus_upload --method put --url $NEXUS_URL --user $NEXUS_USER --password $NEXUS_PASS --repo helm *.tgz | ||||
|     - ./manage.py nexus_upload --method put --url $NEXUS_URL --auth $NEXUS_AUTH --repo helm *.tgz | ||||
|   only: | ||||
|     - tags | ||||
|     - /^version/.*$/ | ||||
| package-debian: | ||||
|   before_script: | ||||
|     - apt update | ||||
|     - apt install -y --no-install-recommends build-essential debhelper devscripts equivs python3 python3-dev python3-pip libsasl2-dev libldap2-dev | ||||
|     - mk-build-deps debian/control | ||||
|     - apt install ./*build-deps*deb -f -y | ||||
|     - python3 -m pip install -U virtualenv pip | ||||
|     - virtualenv env | ||||
|     - source env/bin/activate | ||||
|     - pip3 install -U -r requirements.txt -r requirements-dev.txt | ||||
|     - ./manage.py collectstatic --no-input | ||||
|   image: ubuntu:18.04 | ||||
|   script: | ||||
|     - debuild -us -uc | ||||
|     - cp ../passbook*.deb . | ||||
|     - ./manage.py nexus_upload --method post --url $NEXUS_URL --auth $NEXUS_AUTH --repo apt passbook*deb | ||||
|   artifacts: | ||||
|     paths: | ||||
|     - passbook*deb | ||||
|     expire_in: 2 days | ||||
|   stage: build | ||||
|   only: | ||||
|   - tags | ||||
|   - /^version/.*$/ | ||||
| # package-3.5: | ||||
| #   before_script: | ||||
| #     - apt update | ||||
| #     - apt install -y build-essential debhelper devscripts equivs python3 python3-pip | ||||
| #     - cp debian/control-3.5 debian/control | ||||
| #     - mk-build-deps debian/control | ||||
| #     - apt install ./*build-deps*deb -f -y | ||||
| #     - "python3 -m pip install -U virtualenv" | ||||
| #     - "virtualenv env" | ||||
| #     - "source env/bin/activate" | ||||
| #     - "pip3 install -U -r requirements.txt -r requirements-dev.txt" | ||||
| #   image: debian | ||||
| #   script: | ||||
| #     - debuild -us -uc | ||||
| #     - cp ../passbook*.deb . | ||||
| #     - python manage.py nexus_upload | ||||
| #   artifacts: | ||||
| #     paths: | ||||
| #     - passbook-python3.5*deb | ||||
| #     expire_in: 2 days | ||||
| #   stage: build | ||||
| #   only: | ||||
| #   - tags | ||||
| #   - /^debian/.*$/ | ||||
| # package-3.6: | ||||
| #   before_script: | ||||
| #     - apt update | ||||
| #     - apt install -y build-essential debhelper devscripts equivs python3 python3-pip | ||||
| #     - cp debian/control-3.6 debian/control | ||||
| #     - mk-build-deps debian/control | ||||
| #     - apt install ./*build-deps*deb -f -y | ||||
| #     - "python3 -m pip install -U virtualenv" | ||||
| #     - "virtualenv env" | ||||
| #     - "source env/bin/activate" | ||||
| #     - "pip3 install -U -r requirements.txt -r requirements-dev.txt" | ||||
| #   image: debian:buster | ||||
| #   script: | ||||
| #     - debuild -us -uc | ||||
| #     - cp ../passbook*.deb . | ||||
| #     - python manage.py nexus_upload | ||||
| #   artifacts: | ||||
| #     paths: | ||||
| #     - passbook-python3.6*deb | ||||
| #     expire_in: 2 days | ||||
| #   stage: build | ||||
| #   only: | ||||
| #     - tags | ||||
| #     - /^debian/.*$r | ||||
|  | ||||
| # docs: | ||||
| #   stage: docs | ||||
| @ -138,3 +114,16 @@ package-helm: | ||||
| #     - mkdocs build | ||||
| #     - 'rsync -avh --delete web/* "beryjuorg@ory1-web-prod-1.ory1.beryju.org:passbook.beryju.org/"' | ||||
| #     - 'rsync -avh --delete site/* "beryjuorg@ory1-web-prod-1.ory1.beryju.org:passbook.beryju.org/docs/"' | ||||
|  | ||||
| # deploy: | ||||
| #   environment: | ||||
| #     name: production | ||||
| #     url: https://passbook-prod.default.k8s.beryju.org/ | ||||
| #   stage: deploy | ||||
| #   only: | ||||
| #   - tags | ||||
| #   - /^version/.*$/ | ||||
| #   script: | ||||
| #     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
| #     - helm init | ||||
| #     - helm upgrade passbook-prod helm/passbook --devel | ||||
|  | ||||
							
								
								
									
										14
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								Dockerfile
									
									
									
									
									
								
							| @ -6,10 +6,13 @@ COPY ./requirements.txt /app/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN mkdir /app/static/ && \ | ||||
| RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||
|     mkdir /app/static/ && \ | ||||
|     pip install -r requirements.txt && \ | ||||
|     pip install psycopg2 && \ | ||||
|     ./manage.py collectstatic --no-input | ||||
|     ./manage.py collectstatic --no-input && \ | ||||
|     apt-get remove --purge -y build-essential && \ | ||||
|     apt-get autoremove --purge -y | ||||
|  | ||||
| FROM python:3.6-slim-stretch | ||||
|  | ||||
| @ -20,9 +23,12 @@ COPY --from=build /app/static /app/static/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN pip install -r requirements.txt && \ | ||||
| RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||
|     pip install -r requirements.txt && \ | ||||
|     pip install psycopg2 && \ | ||||
|     adduser --system --home /app/ passbook && \ | ||||
|     chown -R passbook /app/ | ||||
|     chown -R passbook /app/ && \ | ||||
|     apt-get remove --purge -y build-essential && \ | ||||
|     apt-get autoremove --purge -y | ||||
|  | ||||
| USER passbook | ||||
|  | ||||
| @ -1,6 +1,5 @@ | ||||
| """passbook provider""" | ||||
| from allauth.socialaccount.providers.oauth2.urls import default_urlpatterns | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
| urlpatterns = default_urlpatterns(PassbookProvider) | ||||
|  | ||||
| @ -1,10 +1,10 @@ | ||||
| """passbook adapter""" | ||||
| import requests | ||||
|  | ||||
| from allauth.socialaccount import app_settings | ||||
| from allauth.socialaccount.providers.oauth2.views import (OAuth2Adapter, | ||||
|                                                           OAuth2CallbackView, | ||||
|                                                           OAuth2LoginView) | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
|  | ||||
|  | ||||
							
								
								
									
										71
									
								
								debian/changelog
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								debian/changelog
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,71 @@ | ||||
| passbook (0.1.13) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.11-beta -> 0.1.12-beta | ||||
|   * Fix DoesNotExist error when running PolicyEngine against None user | ||||
|   * allow custom email server for helm installs | ||||
|   * fix UserChangePasswordView not requiring Login | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Mon, 11 Mar 2019 10:28:36 +0000 | ||||
|  | ||||
| passbook (0.1.12) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.10-beta -> 0.1.11-beta | ||||
|   * rewrite PasswordFactor to use backends setting instead of trying all backends | ||||
|   * install updated helm release from local folder | ||||
|   * disable automatic k8s deployment for now | ||||
|   * fix OAuth Authorization View not requiring authentication | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Mon, 11 Mar 2019 08:50:29 +0000 | ||||
|  | ||||
| passbook (0.1.11) stable; urgency=medium | ||||
|  | ||||
|   * add group administration | ||||
|   * bump version: 0.1.9-beta -> 0.1.10-beta | ||||
|   * fix helm labels being on deployments and not pods | ||||
|   * automatically deploy after release | ||||
|   * use Django's Admin FilteredSelectMultiple for Group Membership | ||||
|   * always use FilteredSelectMultiple for many-to-many fields | ||||
|   * Add Group Member policy | ||||
|   * add LDAP Group Membership Policy | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Sun, 10 Mar 2019 18:55:31 +0000 | ||||
|  | ||||
| passbook (0.1.10) stable; urgency=high | ||||
|  | ||||
|   * bump version: 0.1.7-beta -> 0.1.8-beta | ||||
|   * consistently using PolicyEngine | ||||
|   * add more Verbosity to PolicyEngine, rewrite SAML Authorisation check | ||||
|   * slightly refactor Factor View, add more unittests | ||||
|   * add impersonation middleware, add to templates | ||||
|   * bump version: 0.1.8-beta -> 0.1.9-beta | ||||
|   * fix k8s service routing http traffic to workers | ||||
|   * Fix button on policy test page | ||||
|   * better show loading state when testing a policy | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Sun, 10 Mar 2019 14:52:40 +0000 | ||||
|  | ||||
| passbook (0.1.7) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.3-beta -> 0.1.4-beta | ||||
|   * implicitly add kubernetes-healthcheck-host in helm configmap | ||||
|   * fix debian build (again) | ||||
|   * add PropertyMapping Model, add Subclass for SAML, test with AWS | ||||
|   * add custom DynamicArrayField to better handle arrays | ||||
|   * format data before inserting it | ||||
|   * bump version: 0.1.4-beta -> 0.1.5-beta | ||||
|   * fix static files missing for debian package | ||||
|   * fix password not getting set on user import | ||||
|   * remove audit's login attempt | ||||
|   * add passing property to PolicyEngine | ||||
|   * fix captcha factor not loading keys from Factor class | ||||
|   * bump version: 0.1.5-beta -> 0.1.6-beta | ||||
|   * fix MATCH_EXACT not working as intended | ||||
|   * Improve access control for saml | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Fri, 08 Mar 2019 20:37:05 +0000 | ||||
|  | ||||
| passbook (0.1.4) stable; urgency=medium | ||||
|  | ||||
|   * initial debian package release | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Wed, 06 Mar 2019 18:22:41 +0000 | ||||
							
								
								
									
										1
									
								
								debian/compat
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								debian/compat
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | ||||
| 10 | ||||
							
								
								
									
										20
									
								
								debian/config
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								debian/config
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,20 @@ | ||||
| #!/bin/sh | ||||
| # config maintainer script for passbook | ||||
| set -e | ||||
|  | ||||
| # source debconf stuff | ||||
| . /usr/share/debconf/confmodule | ||||
|  | ||||
| dbc_first_version=1.0.0 | ||||
| dbc_dbuser=passbook | ||||
| dbc_dbname=passbook | ||||
|  | ||||
| # source dbconfig-common shell library, and call the hook function | ||||
| if [ -f /usr/share/dbconfig-common/dpkg/config.pgsql ]; then | ||||
|     . /usr/share/dbconfig-common/dpkg/config.pgsql | ||||
|     dbc_go passbook "$@" | ||||
| fi | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
| exit 0 | ||||
							
								
								
									
										14
									
								
								debian/control
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								debian/control
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,14 @@ | ||||
| Source: passbook | ||||
| Section: admin | ||||
| Priority: optional | ||||
| Maintainer: BeryJu.org <support@beryju.org> | ||||
| Uploaders: Jens Langhammer <jens@beryju.org>, BeryJu.org <support@beryju.org> | ||||
| Build-Depends: debhelper (>= 10), dh-systemd (>= 1.5), dh-exec, wget, dh-exec, python3 (>= 3.5) | python3.6 | python3.7 | ||||
| Standards-Version: 3.9.6 | ||||
|  | ||||
| Package: passbook | ||||
| Architecture: all | ||||
| Recommends: mysql-server, redis-server | ||||
| Pre-Depends: adduser, libldap2-dev, libsasl2-dev | ||||
| Depends: python3 (>= 3.5) | python3.6 | python3.7, python3-pip, dbconfig-pgsql | dbconfig-no-thanks, ${misc:Depends} | ||||
| Description: Authentication Provider/Proxy supporting protocols like SAML, OAuth, LDAP and more. | ||||
							
								
								
									
										22
									
								
								debian/copyright
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										22
									
								
								debian/copyright
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,22 @@ | ||||
| MIT License | ||||
|  | ||||
| Copyright (c) 2019 BeryJu.org | ||||
|  | ||||
| Permission is hereby granted, free of charge, to any person obtaining a copy | ||||
| of this software and associated documentation files (the "Software"), to deal | ||||
| in the Software without restriction, including without limitation the rights | ||||
| to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||||
| copies of the Software, and to permit persons to whom the Software is | ||||
| furnished to do so, subject to the following conditions: | ||||
|  | ||||
| The above copyright notice and this permission notice shall be included in all | ||||
| copies or substantial portions of the Software. | ||||
|  | ||||
| THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||||
| IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||||
| FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||||
| AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||||
| LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||||
| OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | ||||
| SOFTWARE. | ||||
|  | ||||
							
								
								
									
										4
									
								
								debian/dirs
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								debian/dirs
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,4 @@ | ||||
| etc/passbook/ | ||||
| etc/passbook/config.d/ | ||||
| var/log/passbook/ | ||||
| usr/share/passbook/ | ||||
							
								
								
									
										44
									
								
								debian/etc/passbook/config.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								debian/etc/passbook/config.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,44 @@ | ||||
| debug: false | ||||
| http: | ||||
|     host: 0.0.0.0 | ||||
|     port: 8000 | ||||
| secret_key_file: /etc/passbook/secret_key | ||||
| log: | ||||
|     level: | ||||
|         console: INFO | ||||
|         file: DEBUG | ||||
|     file: /var/log/passbook/passbook.log | ||||
| # Error reporting, disabled by default | ||||
| # error_report_enabled: true | ||||
|  | ||||
| # Set this to the server's external address. | ||||
| # This is used to generate external URLs | ||||
| external_url: http://image.example.com | ||||
|  | ||||
| # This dictates how the Path is generated | ||||
| # can be either of: | ||||
| # - view_sha512_short | ||||
| # - view_md5 | ||||
| # - view_sha256 | ||||
| # - view_sha512 | ||||
| default_return_view: view_sha256 | ||||
|  | ||||
| # Set this to true if you only want to use external authentication | ||||
| external_auth_only: false | ||||
|  | ||||
| # If this is true, images are automatically claimed if the windows user exists | ||||
| # in django | ||||
| auto_claim_enabled: true | ||||
|  | ||||
| # LDAP Authentication | ||||
| # ldap: | ||||
| #     enabled: false | ||||
| #     server: | ||||
| #         uri: 'ldap://dc1.example.com' | ||||
| #         tls: false | ||||
| #     bind: | ||||
| #         dn: '' | ||||
| #         password: '' | ||||
| #     search_base: '' | ||||
| #     filter: '(sAMAccountName=%(user)s)' | ||||
| #     require_group: '' | ||||
							
								
								
									
										2
									
								
								debian/gbp.conf
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								debian/gbp.conf
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,2 @@ | ||||
| [buildpackage] | ||||
| export-dir=../build-area | ||||
							
								
								
									
										8
									
								
								debian/install
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								debian/install
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,8 @@ | ||||
| passbook		/usr/share/passbook/ | ||||
| static			/usr/share/passbook/ | ||||
| manage.py		/usr/share/passbook/ | ||||
| passbook.sh		/usr/share/passbook/ | ||||
| vendor			/usr/share/passbook/ | ||||
|  | ||||
| debian/etc/passbook								/etc/ | ||||
| debian/templates/database.yml					/usr/share/passbook/ | ||||
							
								
								
									
										0
									
								
								debian/links
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								debian/links
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
								
								
									
										14
									
								
								debian/passbook-worker.service
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								debian/passbook-worker.service
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,14 @@ | ||||
| [Unit] | ||||
| Description=passbook - Authentication Provider/Proxy (Background worker) | ||||
| After=network.target | ||||
| Requires=network.target | ||||
|  | ||||
| [Service] | ||||
| User=passbook | ||||
| Group=passbook | ||||
| WorkingDirectory=/usr/share/passbook | ||||
| Type=simple | ||||
| ExecStart=/usr/share/passbook/passbook.sh worker | ||||
|  | ||||
| [Install] | ||||
| WantedBy=multi-user.target | ||||
							
								
								
									
										14
									
								
								debian/passbook.service
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								debian/passbook.service
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,14 @@ | ||||
| [Unit] | ||||
| Description=passbook - Authentication Provider/Proxy | ||||
| After=network.target | ||||
| Requires=network.target | ||||
|  | ||||
| [Service] | ||||
| User=passbook | ||||
| Group=passbook | ||||
| WorkingDirectory=/usr/share/passbook | ||||
| Type=simple | ||||
| ExecStart=/usr/share/passbook/passbook.sh web | ||||
|  | ||||
| [Install] | ||||
| WantedBy=multi-user.target | ||||
							
								
								
									
										36
									
								
								debian/postinst
									
									
									
									
										vendored
									
									
										Executable file
									
								
							
							
						
						
									
										36
									
								
								debian/postinst
									
									
									
									
										vendored
									
									
										Executable file
									
								
							| @ -0,0 +1,36 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| set -e | ||||
|  | ||||
| . /usr/share/debconf/confmodule | ||||
| . /usr/share/dbconfig-common/dpkg/postinst.pgsql | ||||
|  | ||||
| # you can set the default database encoding to something else | ||||
| dbc_pgsql_createdb_encoding="UTF8" | ||||
| dbc_generate_include=template:/etc/passbook/config.d/database.yml | ||||
| dbc_generate_include_args="-o template_infile=/usr/share/passbook/database.yml" | ||||
| dbc_go passbook "$@" | ||||
|  | ||||
| if [ -z "`getent group passbook`" ]; then | ||||
| 	addgroup --quiet --system passbook | ||||
| fi | ||||
| if [ -z "`getent passwd passbook`" ]; then | ||||
| 	echo " * Creating user and group passbook..." | ||||
| 	adduser --quiet --system --home /usr/share/passbook --shell /bin/false --ingroup passbook --disabled-password --disabled-login --gecos "passbook User" passbook  >> /var/log/passbook/passbook.log 2>&1 | ||||
| fi | ||||
| echo " * Updating binary packages (psycopg2)" | ||||
| python3 -m pip install --target=/usr/share/passbook/vendor/ --no-cache-dir --upgrade --force-reinstall psycopg2 >> /var/log/passbook/passbook.log 2>&1 | ||||
| if [ ! -f '/etc/passbook/secret_key' ]; then | ||||
| 	echo " * Generating Secret Key" | ||||
| 	python3 -c 'import random; result = "".join([random.choice("abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)") for i in range(50)]); print(result)' > /etc/passbook/secret_key 2> /dev/null | ||||
| fi | ||||
| chown -R passbook: /usr/share/passbook/ | ||||
| chown -R passbook: /etc/passbook/ | ||||
| chown -R passbook: /var/log/passbook/ | ||||
| chmod 440 /etc/passbook/secret_key | ||||
| echo " * Running Database Migration" | ||||
| /usr/share/passbook/passbook.sh migrate | ||||
| echo " * A superuser can be created with this command '/usr/share/passbook/passbook.sh createsuperuser'" | ||||
| echo " * You should probably also adjust your settings in '/etc/passbook/config.yml'" | ||||
|  | ||||
| #DEBHELPER# | ||||
							
								
								
									
										24
									
								
								debian/postrm
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								debian/postrm
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,24 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| set -e | ||||
|  | ||||
| if [ -f /usr/share/debconf/confmodule ]; then | ||||
|     . /usr/share/debconf/confmodule | ||||
| fi | ||||
| if [ -f /usr/share/dbconfig-common/dpkg/postrm.pgsql ]; then | ||||
|     . /usr/share/dbconfig-common/dpkg/postrm.pgsql | ||||
|     dbc_go passbook "$@" | ||||
| fi | ||||
|  | ||||
|  | ||||
| if [ "$1" = "purge" ]; then | ||||
|     if which ucf >/dev/null 2>&1; then | ||||
|         ucf --purge /etc/passbook/config.d/database.yml | ||||
|         ucfr --purge passbook /etc/passbook/config.d/database.yml | ||||
|     fi | ||||
|     rm -rf /etc/passbook/ | ||||
|     rm -rf /usr/share/passbook/ | ||||
| fi | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
							
								
								
									
										10
									
								
								debian/prerm
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								debian/prerm
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,10 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| set -e | ||||
|  | ||||
| . /usr/share/debconf/confmodule | ||||
| . /usr/share/dbconfig-common/dpkg/prerm.pgsql | ||||
| dbc_go passbook "$@" | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
							
								
								
									
										27
									
								
								debian/rules
									
									
									
									
										vendored
									
									
										Executable file
									
								
							
							
						
						
									
										27
									
								
								debian/rules
									
									
									
									
										vendored
									
									
										Executable file
									
								
							| @ -0,0 +1,27 @@ | ||||
| #!/usr/bin/make -f | ||||
|  | ||||
| # Uncomment this to turn on verbose mode. | ||||
| # export DH_VERBOSE=1 | ||||
|  | ||||
| %: | ||||
| 	dh $@ --with=systemd | ||||
|  | ||||
| build-arch: | ||||
| 	python3 -m pip install setuptools | ||||
| 	python3 -m pip install --target=vendor/ -r requirements.txt | ||||
|  | ||||
| override_dh_strip: | ||||
| 	dh_strip --exclude=psycopg2 | ||||
|  | ||||
| override_dh_shlibdeps: | ||||
| 	dh_shlibdeps --exclude=psycopg2 | ||||
|  | ||||
| override_dh_installinit: | ||||
| 	dh_installinit --name=passbook | ||||
| 	dh_installinit --name=passbook-worker | ||||
| 	dh_systemd_enable --name=passbook | ||||
| 	dh_systemd_enable --name=passbook-worker | ||||
| 	dh_systemd_start | ||||
|  | ||||
| # override_dh_usrlocal to do nothing | ||||
| override_dh_usrlocal: | ||||
							
								
								
									
										1
									
								
								debian/source/format
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								debian/source/format
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | ||||
| 3.0 (native) | ||||
							
								
								
									
										8
									
								
								debian/templates/database.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								debian/templates/database.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @ -0,0 +1,8 @@ | ||||
| databases: | ||||
|   default: | ||||
|     engine: django.db.backends.postgresql | ||||
|     name: _DBC_DBNAME_ | ||||
|     user: _DBC_DBUSER_ | ||||
|     password: _DBC_DBPASS_ | ||||
|     host: _DBC_DBSERVER_ | ||||
|     port: _DBC_DBPORT_ | ||||
| @ -1,6 +1,6 @@ | ||||
| apiVersion: v1 | ||||
| appVersion: "0.0.7-alpha" | ||||
| appVersion: "0.1.13-beta" | ||||
| description: A Helm chart for passbook. | ||||
| name: passbook | ||||
| version: 1.0.0 | ||||
| version: "0.1.13-beta" | ||||
| icon: https://passbook.beryju.org/images/logo.png | ||||
|  | ||||
| @ -22,7 +22,7 @@ data: | ||||
|         host: 127.0.0.1 | ||||
|         port: 514 | ||||
|     email: | ||||
|       host: localhost | ||||
|       host: {{ .Values.config.email.host }} | ||||
|       port: 25 | ||||
|       user: '' | ||||
|       password: '' | ||||
| @ -36,7 +36,7 @@ data: | ||||
|     debug: false | ||||
|     secure_proxy_header: | ||||
|       HTTP_X_FORWARDED_PROTO: https | ||||
|     redis: {{ .Release.Name }}-redis | ||||
|     redis: ":{{ .Values.redis.password }}@{{ .Release.Name }}-redis-master" | ||||
|     # Error reporting, sends stacktrace to sentry.services.beryju.org | ||||
|     error_report_enabled: {{ .Values.config.error_reporting }} | ||||
|  | ||||
| @ -50,6 +50,7 @@ data: | ||||
|         {{- range .Values.ingress.hosts }} | ||||
|         - {{ . | quote }} | ||||
|         {{- end }} | ||||
|         - kubernetes-healthcheck-host | ||||
|  | ||||
|     passbook: | ||||
|       sign_up: | ||||
| @ -105,10 +106,9 @@ data: | ||||
|         email: mail # or userPrincipalName | ||||
|       user_attribute_map: | ||||
|         active_directory: | ||||
|           sAMAccountName: username | ||||
|           mail: email | ||||
|           given_name: first_name | ||||
|           name: last_name | ||||
|           username: "%(sAMAccountName)s" | ||||
|           email: "%(mail)s" | ||||
|           name: "%(displayName)" | ||||
|       # # Create new users in LDAP upon sign-up | ||||
|       # create_users: true | ||||
|       # # Reset LDAP password when user reset their password | ||||
| @ -131,6 +131,7 @@ data: | ||||
|       # List of python packages with provider types to load. | ||||
|       types: | ||||
|         - passbook.saml_idp.processors.generic | ||||
|         - passbook.saml_idp.processors.aws | ||||
|         - passbook.saml_idp.processors.gitlab | ||||
|         - passbook.saml_idp.processors.nextcloud | ||||
|         - passbook.saml_idp.processors.salesforce | ||||
|  | ||||
| @ -18,6 +18,7 @@ spec: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|         app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|         passbook.io/component: web | ||||
|     spec: | ||||
|       volumes: | ||||
|         - name: config-volume | ||||
|  | ||||
| @ -17,3 +17,4 @@ spec: | ||||
|   selector: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     passbook.io/component: web | ||||
|  | ||||
| @ -18,6 +18,7 @@ spec: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|         app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|         passbook.io/component: worker | ||||
|     spec: | ||||
|       volumes: | ||||
|         - name: config-volume | ||||
|  | ||||
| @ -5,7 +5,7 @@ | ||||
| replicaCount: 1 | ||||
|  | ||||
| image: | ||||
|   tag: latest | ||||
|   tag: 0.1.13-beta | ||||
|  | ||||
| nameOverride: "" | ||||
|  | ||||
| @ -14,6 +14,8 @@ config: | ||||
|   # secret_key: _k*@6h2u2@q-dku57hhgzb7tnx*ba9wodcb^s9g0j59@=y(@_o | ||||
|   # Enable error reporting | ||||
|   error_reporting: true | ||||
|   email: | ||||
|     host: localhost | ||||
|  | ||||
| postgresql: | ||||
|     postgresqlDatabase: passbook | ||||
|  | ||||
							
								
								
									
										7
									
								
								passbook.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										7
									
								
								passbook.sh
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,7 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| # Check if this file is a symlink, if so, read real base dir | ||||
| BASE_DIR=$(dirname $(readlink -f ${BASH_SOURCE[0]})) | ||||
|  | ||||
| cd $BASE_DIR | ||||
| PYTHONPATH="${BASE_DIR}/vendor/" python3 manage.py $@ | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook admin""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
| @ -11,7 +11,7 @@ class UserSerializer(ModelSerializer): | ||||
|  | ||||
|     class Meta: | ||||
|         model = User | ||||
|         fields = ['is_superuser', 'username', 'first_name', 'last_name', 'email', 'date_joined', | ||||
|         fields = ['is_superuser', 'username', 'name', 'email', 'date_joined', | ||||
|                   'uuid'] | ||||
|  | ||||
|  | ||||
|  | ||||
							
								
								
									
										17
									
								
								passbook/admin/forms/users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								passbook/admin/forms/users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,17 @@ | ||||
| """passbook administrative user forms""" | ||||
|  | ||||
| from django import forms | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
|  | ||||
| class UserForm(forms.ModelForm): | ||||
|     """Update User Details""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = User | ||||
|         fields = ['username', 'name', 'email', 'is_staff', 'is_active'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput | ||||
|         } | ||||
							
								
								
									
										25
									
								
								passbook/admin/middleware.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/admin/middleware.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| """passbook admin Middleware to impersonate users""" | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
|  | ||||
| def impersonate(get_response): | ||||
|     """Middleware to impersonate users""" | ||||
|  | ||||
|     def middleware(request): | ||||
|         """Middleware to impersonate users""" | ||||
|  | ||||
|         # User is superuser and has __impersonate ID set | ||||
|         if request.user.is_superuser and "__impersonate" in request.GET: | ||||
|             request.session['impersonate_id'] = request.GET["__impersonate"] | ||||
|         # user wants to stop impersonation | ||||
|         elif "__unimpersonate" in request.GET and 'impersonate_id' in request.session: | ||||
|             del request.session['impersonate_id'] | ||||
|  | ||||
|         # Actually impersonate user | ||||
|         if request.user.is_superuser and 'impersonate_id' in request.session: | ||||
|             request.user = User.objects.get(pk=request.session['impersonate_id']) | ||||
|  | ||||
|         response = get_response(request) | ||||
|         return response | ||||
|     return middleware | ||||
							
								
								
									
										5
									
								
								passbook/admin/settings.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								passbook/admin/settings.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,5 @@ | ||||
| """passbook admin settings""" | ||||
|  | ||||
| MIDDLEWARE = [ | ||||
|     'passbook.admin.middleware.impersonate', | ||||
| ] | ||||
| @ -9,10 +9,10 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Applications" %}</h1> | ||||
|     <h1><span class="pficon-applications"></span> {% trans "Applications" %}</h1> | ||||
|     <span>{% trans "External Applications which use passbook as Identity-Provider, utilizing protocols like OAuth2 and SAML." %}</span> | ||||
|     <hr> | ||||
|   <a href="{% url 'passbook_admin:application-create' %}" class="btn btn-primary"> | ||||
|     <a href="{% url 'passbook_admin:application-create' %}?back={{ request.get_full_path }}" class="btn btn-primary"> | ||||
|         {% trans 'Create...' %} | ||||
|     </a> | ||||
|     <hr> | ||||
| @ -21,6 +21,7 @@ | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Provider' %}</th> | ||||
|                 <th>{% trans 'Provider Type' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
| @ -28,10 +29,13 @@ | ||||
|             {% for application in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ application.name }}</td> | ||||
|           <td>{{ application.provider }}</td> | ||||
|                 <td>{{ application.get_provider }}</td> | ||||
|                 <td>{{ application.get_provider|verbose_name }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:application-update' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:application-delete' pk=application.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -8,7 +8,7 @@ | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
|   <h1>{% trans "Audit Log" %}</h1> | ||||
| <h1><span class="pficon-catalog"></span> {% trans "Audit Log" %}</h1> | ||||
| <div id="pf-list-standard" class="list-group list-view-pf list-view-pf-view"> | ||||
|     {% for entry in object_list %} | ||||
|     <div class="list-group-item"> | ||||
|  | ||||
| @ -8,27 +8,40 @@ | ||||
|     <li class="{% is_active 'passbook_admin:overview' %}"> | ||||
|         <a href="{% url 'passbook_admin:overview' %}">{% trans 'Overview' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:applications' 'passbook_admin:application-create' 'passbook_admin:application-update' 'passbook_admin:application-delete' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:applications' 'passbook_admin:application-create' 'passbook_admin:application-update' 'passbook_admin:application-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:applications' %}">{% trans 'Applications' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:sources' 'passbook_admin:source-create' 'passbook_admin:source-update' 'passbook_admin:source-delete' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:sources' 'passbook_admin:source-create' 'passbook_admin:source-update' 'passbook_admin:source-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:sources' %}">{% trans 'Sources' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:providers' 'passbook_admin:provider-create' 'passbook_admin:provider-update' 'passbook_admin:provider-delete' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:providers' 'passbook_admin:provider-create' 'passbook_admin:provider-update' 'passbook_admin:provider-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:providers' %}">{% trans 'Providers' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:factors' 'passbook_admin:factor-create' 'passbook_admin:factor-update' 'passbook_admin:factor-delete' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:property-mappings' 'passbook_admin:property-mapping-create' 'passbook_admin:property-mapping-update' 'passbook_admin:property-mapping-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:property-mappings' %}">{% trans 'Property Mappings' %}</a> | ||||
|     </li> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:factors' 'passbook_admin:factor-create' 'passbook_admin:factor-update' 'passbook_admin:factor-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:factors' %}">{% trans 'Factors' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:policies' 'passbook_admin:policy-create' 'passbook_admin:policy-update' 'passbook_admin:policy-delete' 'passbook_admin:policy-test' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:policies' 'passbook_admin:policy-create' 'passbook_admin:policy-update' 'passbook_admin:policy-delete' 'passbook_admin:policy-test' %}"> | ||||
|         <a href="{% url 'passbook_admin:policies' %}">{% trans 'Policies' %}</a> | ||||
|     </li> | ||||
|   <li class="{% is_active 'passbook_admin:invitations' 'passbook_admin:invitation-create' 'passbook_admin:invitation-update' 'passbook_admin:invitation-delete' 'passbook_admin:invitation-test' %}"> | ||||
|     <li | ||||
|         class="{% is_active 'passbook_admin:invitations' 'passbook_admin:invitation-create' 'passbook_admin:invitation-update' 'passbook_admin:invitation-delete' 'passbook_admin:invitation-test' %}"> | ||||
|         <a href="{% url 'passbook_admin:invitations' %}">{% trans 'Invitations' %}</a> | ||||
|     </li> | ||||
|     <li class="{% is_active 'passbook_admin:users' 'passbook_admin:user-update' 'passbook_admin:user-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:users' %}">{% trans 'Users' %}</a> | ||||
|     </li> | ||||
|     <li class="{% is_active 'passbook_admin:groups' 'passbook_admin:group-update' 'passbook_admin:group-delete' %}"> | ||||
|         <a href="{% url 'passbook_admin:groups' %}">{% trans 'Groups' %}</a> | ||||
|     </li> | ||||
|     <li class="{% is_active 'passbook_admin:audit-log' %}"> | ||||
|         <a href="{% url 'passbook_admin:audit-log' %}">{% trans 'Audit Log' %}</a> | ||||
|     </li> | ||||
|  | ||||
| @ -10,7 +10,7 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1>{% trans "Factors" %}</h1> | ||||
|     <h1><span class="pficon-plugged"></span> {% trans "Factors" %}</h1> | ||||
|     <span>{% trans "Factors required for a user to successfully authenticate." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
| @ -20,7 +20,8 @@ | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:factor-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:factor-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -39,7 +40,7 @@ | ||||
|             {% for factor in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ factor.name }} ({{ factor.slug }})</td> | ||||
|                 <td>{{ factor.type }}</td> | ||||
|                 <td>{{ factor|verbose_name }}</td> | ||||
|                 <td>{{ factor.order }}</td> | ||||
|                 <td>{{ factor.enabled }}</td> | ||||
|                 <td> | ||||
|  | ||||
							
								
								
									
										45
									
								
								passbook/admin/templates/administration/group/list.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										45
									
								
								passbook/admin/templates/administration/group/list.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,45 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1><span class="pficon-users"></span> {% trans "Groups" %}</h1> | ||||
|     <span>{% trans "Group users together and give them permissions based on the membership." %}</span> | ||||
|     <hr> | ||||
|     <a href="{% url 'passbook_admin:group-create' %}?back={{ request.get_full_path }}" class="btn btn-primary"> | ||||
|         {% trans 'Create...' %} | ||||
|     </a> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Parent' %}</th> | ||||
|                 <th>{% trans 'Members' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for group in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ group.name }}</td> | ||||
|                 <td>{{ group.parent }}</td> | ||||
|                 <td>{{ group.user_set.all|length }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:group-update' pk=group.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:group-delete' pk=group.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|         </tbody> | ||||
|     </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
| @ -1,83 +0,0 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load static %} | ||||
| {% load utils %} | ||||
|  | ||||
| {% block head %} | ||||
| {{ block.super }} | ||||
| <link rel="stylesheet" href="{% static 'css/bootstrap-treeview.min.css'%}"> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block scripts %} | ||||
| {{ block.super }} | ||||
| <script src="{% static 'js/bootstrap-treeview.min.js' %}"></script> | ||||
| <script> | ||||
|   var cleanupData = function (obj) { | ||||
|     return { | ||||
|       text: obj.name, | ||||
|       href: '?group=' + obj.uuid, | ||||
|       nodes: obj.children.map(cleanupData), | ||||
|     }; | ||||
|   } | ||||
|  $(function() { | ||||
|    var apiUrl = "{% url 'passbook_admin:group-list' %}?format=json"; | ||||
|    $.ajax({ | ||||
|       url: apiUrl, | ||||
|     }).done(function(data) { | ||||
|       $('#treeview1').treeview({ | ||||
|         collapseIcon: "fa fa-angle-down", | ||||
|         data: data.map(cleanupData), | ||||
|         expandIcon: "fa fa-angle-right", | ||||
|         nodeIcon: "fa pficon-users", | ||||
|         showBorder: true, | ||||
|         enableLinks: true, | ||||
|         onNodeSelected: function (event, node) { | ||||
|           window.location.href = node.href; | ||||
|         } | ||||
|       }); | ||||
|     }); | ||||
|   }); | ||||
| </script> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="col-md-3"> | ||||
|   <div id="treeview1" class="treeview"> | ||||
|   </div> | ||||
| </div> | ||||
| <div class="col-md-9"> | ||||
|   <h1>{% trans "Invitations" %}</h1> | ||||
|   <a href="{% url 'passbook_admin:invitation-create' %}" class="btn btn-primary"> | ||||
|     {% trans 'Create...' %} | ||||
|   </a> | ||||
|   <hr> | ||||
|   <table class="table table-striped table-bordered"> | ||||
|     <thead> | ||||
|       <tr> | ||||
|         <th>{% trans 'Expiry' %}</th> | ||||
|         <th>{% trans 'Link' %}</th> | ||||
|         <th></th> | ||||
|       </tr> | ||||
|     </thead> | ||||
|     <tbody> | ||||
|       {% for invitation in object_list %} | ||||
|       <tr> | ||||
|         <td>{{ invitation.expires|default:"Never" }}</td> | ||||
|         <td> | ||||
|           <pre>{{ invitation.link }}</pre> | ||||
|         </td> | ||||
|         <td> | ||||
|           <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% | ||||
|             trans 'Delete' %}</a> | ||||
|         </td> | ||||
|       </tr> | ||||
|       {% endfor %} | ||||
|     </tbody> | ||||
|   </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
| @ -9,10 +9,10 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Invitations" %}</h1> | ||||
|     <h1><span class="pficon-migration"></span> {% trans "Invitations" %}</h1> | ||||
|     <span>{% trans "Create Invitation Links which optionally force a username or expire on a set date." %}</span> | ||||
|     <hr> | ||||
|   <a href="{% url 'passbook_admin:invitation-create' %}" class="btn btn-primary"> | ||||
|     <a href="{% url 'passbook_admin:invitation-create' %}?back={{ request.get_full_path }}" class="btn btn-primary"> | ||||
|         {% trans 'Create...' %} | ||||
|     </a> | ||||
|     <hr> | ||||
| @ -28,9 +28,12 @@ | ||||
|             {% for invitation in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ invitation.expires|default:"Never" }}</td> | ||||
|           <td><pre>{{ invitation.link }}</pre></td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <pre>{{ invitation.link }}</pre> | ||||
|                 </td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:invitation-delete' pk=invitation.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -7,11 +7,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:applications' %}"> | ||||
|                     <span class="pficon-applications"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Applications' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ application_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:applications' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ application_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -19,11 +26,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Sources' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:sources' %}"> | ||||
|                     <span class="pficon-resource-pool"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Sources' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ source_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:sources' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ source_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -31,11 +45,22 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:providers' %}"> | ||||
|                     <span class="pficon-integration"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Providers' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ provider_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:providers' %}"> | ||||
|                             {% if providers_without_application.exists %} | ||||
|                             <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: At least one Provider has no application assigned.' %}"></span> {{ provider_count }} | ||||
|                             {% else %} | ||||
|                             <span class="pficon pficon-ok"></span> {{ provider_count }} | ||||
|                             {% endif %} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -43,11 +68,22 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Factors' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:factors' %}"> | ||||
|                     <span class="pficon-plugged"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Factors' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ factor_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         {% if factor_count < 1 %} | ||||
|                         <span class="pficon-error-circle-o" data-toggle="tooltip" data-placement="right" | ||||
|                             title="{% trans 'No Factors configured. No Users will be able to login.' %}"></span> | ||||
|                         {{ factor_count }} | ||||
|                         {% else %} | ||||
|                         <span class="pficon pficon-ok"></span>{{ factor_count }} | ||||
|                         {% endif %} | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -55,11 +91,22 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Invitation' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:policies' %}"> | ||||
|                     <span class="pficon-infrastructure"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Policies' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ invitation_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         {% if policies_without_attachment > 0 %} | ||||
|                         <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" | ||||
|                             title="{% trans 'Policies without attachment exist.' %}"></span> | ||||
|                         {{ policy_count }} | ||||
|                         {% else %} | ||||
|                         <span class="pficon pficon-ok"></span>{{ policy_count }} | ||||
|                         {% endif %} | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -67,11 +114,18 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Policies' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:invitations' %}"> | ||||
|                     <span class="pficon-migration"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Invitation' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ policy_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:invitations' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ invitation_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
| @ -79,11 +133,61 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"><span class="fa fa-shield"></span><span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %}</a> | ||||
|                 <a href="{% url 'passbook_admin:users' %}"> | ||||
|                     <span class="pficon-users"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Users' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"><a href="#"><span class="pficon pficon-ok"></span>{{ user_count }}</a></span> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="{% url 'passbook_admin:users' %}"> | ||||
|                             <span class="pficon pficon-ok"></span>{{ user_count }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"> | ||||
|                     <span class="pficon-bundle"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Version' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="#"> | ||||
|                             {{ version }} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"> | ||||
|                     <span class="pficon-server"></span> | ||||
|                     <span class="card-pf-aggregate-status-count"></span> {% trans 'Worker(s)' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="#"> | ||||
|                             {% if worker_count < 1%} | ||||
|                             <span class="pficon-error-circle-o" data-toggle="tooltip" data-placement="right" | ||||
|                                 title="{% trans 'No workers connected. Policies will not work and you may expect other issues.' %}"></span> {{ worker_count }} | ||||
|                             {% else %} | ||||
|                             <span class="pficon pficon-ok"></span>{{ worker_count }} | ||||
|                             {% endif %} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|  | ||||
| @ -9,7 +9,7 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Policies" %}</h1> | ||||
|     <h1><span class="pficon-infrastructure"></span> {% trans "Policies" %}</h1> | ||||
|     <span>{% trans "Allow users to use Applications based on properties, enforce Password Criteria and selectively apply Factors." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
| @ -19,7 +19,8 @@ | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:policy-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:policy-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -27,20 +28,31 @@ | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th></th> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|         <th>{% trans 'Class' %}</th> | ||||
|                 <th>{% trans 'Type' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for policy in object_list %} | ||||
|         <tr> | ||||
|             <tr {% if not policy.policymodel_set.exists %} class="warning" {% endif %}> | ||||
|                 <th> | ||||
|                     {% if not policy.policymodel_set.exists %} | ||||
|                     <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: Policy is not assigned.' %}"></span> | ||||
|                     {% else %} | ||||
|                     <span class="pficon-ok" data-toggle="tooltip" data-placement="right" title="{% blocktrans with objects=policy.policymodel_set.all|join:', ' %}Assigned to objects {{ objects }}{% endblocktrans %}"></span> | ||||
|                     {% endif %} | ||||
|                 </th> | ||||
|                 <td>{{ policy.name }}</td> | ||||
|           <td>{{ policy|fieldtype }}</td> | ||||
|                 <td>{{ policy|verbose_name }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:policy-update' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:policy-test' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:policy-delete' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-update' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-test' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Test' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:policy-delete' pk=policy.uuid %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -5,3 +5,22 @@ | ||||
| {% block above_form %} | ||||
| <h1>{% blocktrans with policy=policy %}Test policy {{ policy }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block action %} | ||||
| {% trans 'Test' %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block beneath_form %} | ||||
| <p class="loading" style="display: none;"> | ||||
|   <span class="spinner spinner-xs spinner-inline"></span> {% trans 'Processing, please wait...' %} | ||||
| </p> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block scripts %} | ||||
| {{ block.super }} | ||||
| <script> | ||||
|   $('form').on('submit', function () { | ||||
|     $('p.loading').show(); | ||||
|   }) | ||||
| </script> | ||||
| {% endblock %} | ||||
|  | ||||
| @ -0,0 +1,52 @@ | ||||
| {% extends "administration/base.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
|  | ||||
| {% block title %} | ||||
| {% title %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1><span class="fa fa-table"></span> {% trans "Property Mappings" %}</h1> | ||||
|     <span>{% trans "Property Mappings allow you expose provider-specific attributes." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
|         <button class="btn btn-primary dropdown-toggle" type="button" id="createDropdown" data-toggle="dropdown"> | ||||
|             {% trans 'Create...' %} | ||||
|             <span class="caret"></span> | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:property-mapping-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Type' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for property_mapping in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ property_mapping.name }} ({{ property_mapping.slug }})</td> | ||||
|                 <td>{{ property_mapping|verbose_name }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:property-mapping-update' pk=property_mapping.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:property-mapping-delete' pk=property_mapping.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|         </tbody> | ||||
|     </table> | ||||
| </div> | ||||
| {% endblock %} | ||||
| @ -10,7 +10,7 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Providers" %}</h1> | ||||
|     <h1><span class="pficon-integration"></span> {% trans "Providers" %}</h1> | ||||
|     <span>{% trans "Authentication Protocol Provider, used as Protocol behind an Application." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
| @ -20,7 +20,8 @@ | ||||
|         </button> | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|       <li role="presentation"><a role="menuitem" tabindex="-1" href="{% url 'passbook_admin:provider-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:provider-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -28,22 +29,33 @@ | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th></th> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|         <th>{% trans 'Class' %}</th> | ||||
|                 <th>{% trans 'Type' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
|         <tbody> | ||||
|             {% for provider in object_list %} | ||||
|         <tr> | ||||
|             <tr {% if not provider.application %} class="warning" {% endif %}> | ||||
|                 <th> | ||||
|                     {% if not provider.application %} | ||||
|                     <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" title="{% trans 'Warning: Provider has no application assigned.' %}"></span> | ||||
|                     {% else %} | ||||
|                     <span class="pficon-ok" data-toggle="tooltip" data-placement="right" title="{% blocktrans with app=provider.application %}Assigned to Application {{ app }}{% endblocktrans %}"></span> | ||||
|                     {% endif %} | ||||
|                 </th> | ||||
|                 <td>{{ provider.name }}</td> | ||||
|           <td>{{ provider|fieldtype }}</td> | ||||
|                 <td>{{ provider|verbose_name }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:provider-update' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:provider-delete' pk=provider.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     {% get_links provider as links %} | ||||
|                     {% for name, href in links.items %} | ||||
|               <a class="btn btn-default btn-sm" href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{{ href }}?back={{ request.get_full_path }}">{% trans name %}</a> | ||||
|                     {% endfor %} | ||||
|                 </td> | ||||
|             </tr> | ||||
|  | ||||
| @ -6,7 +6,7 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|     <h1>{% trans "Sources" %}</h1> | ||||
|     <h1><span class="pficon-resource-pool"></span> {% trans "Sources" %}</h1> | ||||
|     <span>{% trans "External Sources which can be used to get Identities into passbook, for example Social Providers like Twiter and GitHub or Enterprise Providers like ADFS and LDAP." %}</span> | ||||
|     <hr> | ||||
|     <div class="dropdown"> | ||||
| @ -17,7 +17,7 @@ | ||||
|         <ul class="dropdown-menu" role="menu" aria-labelledby="createDropdown"> | ||||
|             {% for type, name in types.items %} | ||||
|             <li role="presentation"><a role="menuitem" tabindex="-1" | ||||
|                     href="{% url 'passbook_admin:source-create' %}?type={{ type }}">{{ name }}</a></li> | ||||
|                     href="{% url 'passbook_admin:source-create' %}?type={{ type }}&back={{ request.get_full_path }}">{{ name }}</a></li> | ||||
|             {% endfor %} | ||||
|         </ul> | ||||
|     </div> | ||||
| @ -27,6 +27,7 @@ | ||||
|             <tr> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Class' %}</th> | ||||
|                 <th>{% trans 'Additional Info' %}</th> | ||||
|                 <th></th> | ||||
|             </tr> | ||||
|         </thead> | ||||
| @ -35,6 +36,7 @@ | ||||
|             <tr> | ||||
|                 <td>{{ source.name }}</td> | ||||
|                 <td>{{ source|fieldtype }}</td> | ||||
|                 <td>{{ source.additional_info }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|  | ||||
| @ -5,14 +5,13 @@ | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
|   <h1>{% trans "Users" %}</h1> | ||||
|     <h1><span class="pficon-users"></span> {% trans "Users" %}</h1> | ||||
|     <hr> | ||||
|     <table class="table table-striped table-bordered"> | ||||
|         <thead> | ||||
|             <tr> | ||||
|                 <th>{% trans 'Username' %}</th> | ||||
|         <th>{% trans 'First Name' %}</th> | ||||
|         <th>{% trans 'Last Name' %}</th> | ||||
|                 <th>{% trans 'Name' %}</th> | ||||
|                 <th>{% trans 'Active' %}</th> | ||||
|                 <th>{% trans 'Last Login' %}</th> | ||||
|                 <th></th> | ||||
| @ -22,13 +21,18 @@ | ||||
|             {% for user in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ user.username }}</td> | ||||
|           <td>{{ user.first_name|default:'-' }}</td> | ||||
|           <td>{{ user.last_name|default:'-' }}</td> | ||||
|                 <td>{{ user.name|default:'-' }}</td> | ||||
|                 <td>{{ user.is_active }}</td> | ||||
|                 <td>{{ user.last_login }}</td> | ||||
|                 <td> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|             <a class="btn btn-default btn-sm" href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-update' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-delete' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Delete' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:user-password-reset' pk=user.pk %}?back={{ request.get_full_path }}">{% trans 'Reset Password' %}</a> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_core:overview' %}?__impersonate={{ user.pk }}">{% trans 'Impersonate' %}</a> | ||||
|                 </td> | ||||
|             </tr> | ||||
|             {% endfor %} | ||||
|  | ||||
| @ -1,7 +1,12 @@ | ||||
| {% extends "generic/form.html" %} | ||||
|  | ||||
| {% load utils %} | ||||
| {% load i18n %} | ||||
|  | ||||
| {% block above_form %} | ||||
| <h1>{% trans 'Create' %}</h1> | ||||
| <h1>{% blocktrans with type=form|form_verbose_name %}Create {{ type }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block action %} | ||||
| {% blocktrans with type=form|form_verbose_name %}Create {{ type }}{% endblocktrans %} | ||||
| {% endblock %} | ||||
| @ -1,11 +0,0 @@ | ||||
| {% extends "generic/create.html" %} | ||||
|  | ||||
| {% load i18n %} | ||||
|  | ||||
| {% block title %} | ||||
| {% blocktrans with type=request.GET.type %}Create {{ type }}{% endblocktrans %} | ||||
| {% endblock %} | ||||
|  | ||||
| {% block above_form %} | ||||
| <h1>{% blocktrans with type=request.GET.type %}Create {{ type }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
| @ -2,6 +2,21 @@ | ||||
|  | ||||
| {% load i18n %} | ||||
| {% load utils %} | ||||
| {% load static %} | ||||
|  | ||||
| {% block head %} | ||||
| {{ block.super }} | ||||
| {{ form.media.css }} | ||||
| <script type="text/javascript" src="{% url 'admin:jsi18n' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/vendor/jquery/jquery.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/jquery.init.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/core.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/actions.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/urlify.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/prepopulate.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/SelectBox.js' %}"></script> | ||||
| <script type="text/javascript" src="{% static 'admin/js/SelectFilter2.js' %}"></script> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block content %} | ||||
| <div class="container"> | ||||
| @ -11,8 +26,15 @@ | ||||
|     <form action="" method="post" class="form-horizontal"> | ||||
|       {% include 'partials/form.html' with form=form %} | ||||
|       <a class="btn btn-default" href="{% back %}">{% trans "Cancel" %}</a> | ||||
|       <input type="submit" class="btn btn-primary" value="{% trans 'Create' %}" /> | ||||
|       <input type="submit" class="btn btn-primary" value="{% block action %}{% endblock %}" /> | ||||
|     </form> | ||||
|   </div> | ||||
|   {% block beneath_form %} | ||||
|   {% endblock %} | ||||
| </div> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block scripts %} | ||||
| {{ block.super }} | ||||
| {{ form.media.js }} | ||||
| {% endblock %} | ||||
|  | ||||
| @ -1,7 +1,12 @@ | ||||
| {% extends "generic/form.html" %} | ||||
|  | ||||
| {% load utils %} | ||||
| {% load i18n %} | ||||
|  | ||||
| {% block above_form %} | ||||
| <h1>{% trans 'Update' %}</h1> | ||||
| <h1>{% blocktrans with type=form|form_verbose_name %}Update {{ type }}{% endblocktrans %}</h1> | ||||
| {% endblock %} | ||||
|  | ||||
| {% block action %} | ||||
| {% blocktrans with type=form|form_verbose_name %}Update {{ type }}{% endblocktrans %} | ||||
| {% endblock %} | ||||
| @ -2,8 +2,8 @@ | ||||
| from django.urls import include, path | ||||
|  | ||||
| from passbook.admin.views import (applications, audit, factors, groups, | ||||
|                                   invitations, overview, policy, providers, | ||||
|                                   sources, users) | ||||
|                                   invitations, overview, policy, | ||||
|                                   property_mapping, providers, sources, users) | ||||
|  | ||||
| urlpatterns = [ | ||||
|     path('', overview.AdministrationOverviewView.as_view(), name='overview'), | ||||
| @ -43,6 +43,15 @@ urlpatterns = [ | ||||
|          factors.FactorUpdateView.as_view(), name='factor-update'), | ||||
|     path('factors/<uuid:pk>/delete/', | ||||
|          factors.FactorDeleteView.as_view(), name='factor-delete'), | ||||
|     # Factors | ||||
|     path('property-mappings/', property_mapping.PropertyMappingListView.as_view(), | ||||
|          name='property-mappings'), | ||||
|     path('property-mappings/create/', | ||||
|          property_mapping.PropertyMappingCreateView.as_view(), name='property-mapping-create'), | ||||
|     path('property-mappings/<uuid:pk>/update/', | ||||
|          property_mapping.PropertyMappingUpdateView.as_view(), name='property-mapping-update'), | ||||
|     path('property-mappings/<uuid:pk>/delete/', | ||||
|          property_mapping.PropertyMappingDeleteView.as_view(), name='property-mapping-delete'), | ||||
|     # Invitations | ||||
|     path('invitations/', invitations.InvitationListView.as_view(), name='invitations'), | ||||
|     path('invitations/create/', | ||||
| @ -56,6 +65,13 @@ urlpatterns = [ | ||||
|          users.UserUpdateView.as_view(), name='user-update'), | ||||
|     path('users/<int:pk>/delete/', | ||||
|          users.UserDeleteView.as_view(), name='user-delete'), | ||||
|     path('users/<int:pk>/reset/', | ||||
|          users.UserPasswordResetView.as_view(), name='user-password-reset'), | ||||
|     # Groups | ||||
|     path('group/', groups.GroupListView.as_view(), name='group'), | ||||
|     path('group/create/', groups.GroupCreateView.as_view(), name='group-create'), | ||||
|     path('group/<uuid:pk>/update/', groups.GroupUpdateView.as_view(), name='group-update'), | ||||
|     path('group/<uuid:pk>/delete/', groups.GroupDeleteView.as_view(), name='group-delete'), | ||||
|     # Audit Log | ||||
|     path('audit/', audit.AuditEntryListView.as_view(), name='audit-log'), | ||||
|     # Groups | ||||
|  | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Application administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| @ -13,6 +14,7 @@ class ApplicationListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all applications""" | ||||
|  | ||||
|     model = Application | ||||
|     ordering = 'name' | ||||
|     template_name = 'administration/application/list.html' | ||||
|  | ||||
|     def get_queryset(self): | ||||
| @ -28,6 +30,10 @@ class ApplicationCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView) | ||||
|     success_url = reverse_lazy('passbook_admin:applications') | ||||
|     success_message = _('Successfully created Application') | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['type'] = 'Application' | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|  | ||||
| class ApplicationUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update application""" | ||||
| @ -45,5 +51,10 @@ class ApplicationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView) | ||||
|  | ||||
|     model = Application | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:applications') | ||||
|     success_message = _('Successfully updated Application') | ||||
|     success_message = _('Successfully deleted Application') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Factor administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| @ -33,25 +34,24 @@ class FactorListView(AdminRequiredMixin, ListView): | ||||
| class FactorCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Factor""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:factors') | ||||
|     success_message = _('Successfully created Factor') | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs = super().get_context_data(**kwargs) | ||||
|         source_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == source_type) | ||||
|         factor_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||
|         kwargs['type'] = model._meta.verbose_name | ||||
|         return kwargs | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         source_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == source_type) | ||||
|         factor_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == factor_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|  | ||||
|  | ||||
| class FactorUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update factor""" | ||||
|  | ||||
| @ -61,11 +61,12 @@ class FactorUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     success_message = _('Successfully updated Factor') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         source_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(Factor) if x.__name__ == source_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|         form_class_path = self.get_object().form | ||||
|         form_class = path_to_class(form_class_path) | ||||
|         return form_class | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
| class FactorDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete factor""" | ||||
| @ -73,7 +74,11 @@ class FactorDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Factor | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:factors') | ||||
|     success_message = _('Successfully updated Factor') | ||||
|     success_message = _('Successfully deleted Factor') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Factor.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,12 +1,57 @@ | ||||
| """passbook Group administration""" | ||||
| from django.views.generic import ListView | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views.generic import CreateView, DeleteView, ListView, UpdateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.forms.groups import GroupForm | ||||
| from passbook.core.models import Group | ||||
|  | ||||
|  | ||||
| class GroupListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all invitations""" | ||||
|     """Show list of all groups""" | ||||
|  | ||||
|     model = Group | ||||
|     template_name = 'administration/groups/list.html' | ||||
|     ordering = 'name' | ||||
|     template_name = 'administration/group/list.html' | ||||
|  | ||||
|  | ||||
| class GroupCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Group""" | ||||
|  | ||||
|     form_class = GroupForm | ||||
|  | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:groups') | ||||
|     success_message = _('Successfully created Group') | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['type'] = 'Group' | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|  | ||||
| class GroupUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update group""" | ||||
|  | ||||
|     model = Group | ||||
|     form_class = GroupForm | ||||
|  | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:groups') | ||||
|     success_message = _('Successfully updated Group') | ||||
|  | ||||
|  | ||||
| class GroupDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete group""" | ||||
|  | ||||
|     model = Group | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:groups') | ||||
|     success_message = _('Successfully deleted Group') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Invitation administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import HttpResponseRedirect | ||||
| from django.urls import reverse_lazy | ||||
| @ -26,6 +27,10 @@ class InvitationCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     success_message = _('Successfully created Invitation') | ||||
|     form_class = InvitationForm | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['type'] = 'Invitation' | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def form_valid(self, form): | ||||
|         obj = form.save(commit=False) | ||||
|         obj.created_by = self.request.user | ||||
| @ -42,4 +47,8 @@ class InvitationDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Invitation | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:invitations') | ||||
|     success_message = _('Successfully updated Invitation') | ||||
|     success_message = _('Successfully deleted Invitation') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -2,6 +2,8 @@ | ||||
| from django.views.generic import TemplateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core import __version__ | ||||
| from passbook.core.celery import CELERY_APP | ||||
| from passbook.core.models import (Application, Factor, Invitation, Policy, | ||||
|                                   Provider, Source, User) | ||||
|  | ||||
| @ -19,4 +21,8 @@ class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
|         kwargs['source_count'] = len(Source.objects.all()) | ||||
|         kwargs['factor_count'] = len(Factor.objects.all()) | ||||
|         kwargs['invitation_count'] = len(Invitation.objects.all()) | ||||
|         kwargs['version'] = __version__ | ||||
|         kwargs['worker_count'] = len(CELERY_APP.control.ping(timeout=0.5)) | ||||
|         kwargs['providers_without_application'] = Provider.objects.filter(application=None) | ||||
|         kwargs['policies_without_attachment'] = len(Policy.objects.filter(policymodel__isnull=True)) | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
| @ -11,6 +11,7 @@ from django.views.generic.detail import DetailView | ||||
| from passbook.admin.forms.policies import PolicyTestForm | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import Policy | ||||
| from passbook.core.policies import PolicyEngine | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
|  | ||||
| @ -32,7 +33,7 @@ class PolicyListView(AdminRequiredMixin, ListView): | ||||
| class PolicyCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Policy""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:policies') | ||||
|     success_message = _('Successfully created Policy') | ||||
|  | ||||
| @ -68,11 +69,15 @@ class PolicyDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Policy | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:policies') | ||||
|     success_message = _('Successfully updated Policy') | ||||
|     success_message = _('Successfully deleted Policy') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Policy.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
|  | ||||
| class PolicyTestView(AdminRequiredMixin, DetailView, FormView): | ||||
|     """View to test policy(s)""" | ||||
| @ -96,7 +101,9 @@ class PolicyTestView(AdminRequiredMixin, DetailView, FormView): | ||||
|     def form_valid(self, form): | ||||
|         policy = self.get_object() | ||||
|         user = form.cleaned_data.get('user') | ||||
|         result = policy.passes(user) | ||||
|         policy_engine = PolicyEngine([policy]) | ||||
|         policy_engine.for_user(user).with_request(self.request).build() | ||||
|         result = policy_engine.passing | ||||
|         if result: | ||||
|             messages.success(self.request, _('User successfully passed policy.')) | ||||
|         else: | ||||
|  | ||||
							
								
								
									
										90
									
								
								passbook/admin/views/property_mapping.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										90
									
								
								passbook/admin/views/property_mapping.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,90 @@ | ||||
| """passbook PropertyMapping administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views.generic import CreateView, DeleteView, ListView, UpdateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.models import PropertyMapping | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
|  | ||||
| def all_subclasses(cls): | ||||
|     """Recursively return all subclassess of cls""" | ||||
|     return set(cls.__subclasses__()).union( | ||||
|         [s for c in cls.__subclasses__() for s in all_subclasses(c)]) | ||||
|  | ||||
|  | ||||
| class PropertyMappingListView(AdminRequiredMixin, ListView): | ||||
|     """Show list of all property_mappings""" | ||||
|  | ||||
|     model = PropertyMapping | ||||
|     template_name = 'administration/property_mapping/list.html' | ||||
|     ordering = 'name' | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['types'] = { | ||||
|             x.__name__: x._meta.verbose_name for x in all_subclasses(PropertyMapping)} | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def get_queryset(self): | ||||
|         return super().get_queryset().select_subclasses() | ||||
|  | ||||
|  | ||||
| class PropertyMappingCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new PropertyMapping""" | ||||
|  | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:property-mappings') | ||||
|     success_message = _('Successfully created Property Mapping') | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs = super().get_context_data(**kwargs) | ||||
|         property_mapping_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(PropertyMapping) | ||||
|                      if x.__name__ == property_mapping_type) | ||||
|         kwargs['type'] = model._meta.verbose_name | ||||
|         return kwargs | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         property_mapping_type = self.request.GET.get('type') | ||||
|         model = next(x for x in all_subclasses(PropertyMapping) | ||||
|                      if x.__name__ == property_mapping_type) | ||||
|         if not model: | ||||
|             raise Http404 | ||||
|         return path_to_class(model.form) | ||||
|  | ||||
|  | ||||
| class PropertyMappingUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update property_mapping""" | ||||
|  | ||||
|     model = PropertyMapping | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:property-mappings') | ||||
|     success_message = _('Successfully updated Property Mapping') | ||||
|  | ||||
|     def get_form_class(self): | ||||
|         form_class_path = self.get_object().form | ||||
|         form_class = path_to_class(form_class_path) | ||||
|         return form_class | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return PropertyMapping.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|  | ||||
| class PropertyMappingDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete property_mapping""" | ||||
|  | ||||
|     model = PropertyMapping | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:property-mappings') | ||||
|     success_message = _('Successfully deleted Property Mapping') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return PropertyMapping.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Provider administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| @ -28,7 +29,7 @@ class ProviderListView(AdminRequiredMixin, ListView): | ||||
| class ProviderCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Provider""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:providers') | ||||
|     success_message = _('Successfully created Provider') | ||||
|  | ||||
| @ -64,7 +65,11 @@ class ProviderDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     model = Provider | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:providers') | ||||
|     success_message = _('Successfully updated Provider') | ||||
|     success_message = _('Successfully deleted Provider') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Provider.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,4 +1,5 @@ | ||||
| """passbook Source administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.http import Http404 | ||||
| from django.urls import reverse_lazy | ||||
| @ -33,7 +34,7 @@ class SourceListView(AdminRequiredMixin, ListView): | ||||
| class SourceCreateView(SuccessMessageMixin, AdminRequiredMixin, CreateView): | ||||
|     """Create new Source""" | ||||
|  | ||||
|     template_name = 'generic/create_inheritance.html' | ||||
|     template_name = 'generic/create.html' | ||||
|     success_url = reverse_lazy('passbook_admin:sources') | ||||
|     success_message = _('Successfully created Source') | ||||
|  | ||||
| @ -66,9 +67,13 @@ class SourceDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete source""" | ||||
|  | ||||
|     model = Source | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:sources') | ||||
|     success_message = _('Successfully updated Source') | ||||
|     success_message = _('Successfully deleted Source') | ||||
|  | ||||
|     def get_object(self, queryset=None): | ||||
|         return Source.objects.filter(pk=self.kwargs.get('pk')).select_subclasses().first() | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
| @ -1,12 +1,15 @@ | ||||
| """passbook User administration""" | ||||
| from django.contrib import messages | ||||
| from django.contrib.messages.views import SuccessMessageMixin | ||||
| from django.urls import reverse_lazy | ||||
| from django.shortcuts import get_object_or_404, redirect | ||||
| from django.urls import reverse, reverse_lazy | ||||
| from django.utils.translation import ugettext as _ | ||||
| from django.views import View | ||||
| from django.views.generic import DeleteView, ListView, UpdateView | ||||
|  | ||||
| from passbook.admin.forms.users import UserForm | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core.forms.users import UserDetailForm | ||||
| from passbook.core.models import User | ||||
| from passbook.core.models import Nonce, User | ||||
|  | ||||
|  | ||||
| class UserListView(AdminRequiredMixin, ListView): | ||||
| @ -20,7 +23,7 @@ class UserUpdateView(SuccessMessageMixin, AdminRequiredMixin, UpdateView): | ||||
|     """Update user""" | ||||
|  | ||||
|     model = User | ||||
|     form_class = UserDetailForm | ||||
|     form_class = UserForm | ||||
|  | ||||
|     template_name = 'generic/update.html' | ||||
|     success_url = reverse_lazy('passbook_admin:users') | ||||
| @ -31,6 +34,24 @@ class UserDeleteView(SuccessMessageMixin, AdminRequiredMixin, DeleteView): | ||||
|     """Delete user""" | ||||
|  | ||||
|     model = User | ||||
|  | ||||
|     template_name = 'generic/delete.html' | ||||
|     success_url = reverse_lazy('passbook_admin:users') | ||||
|     success_message = _('Successfully updated User') | ||||
|     success_message = _('Successfully deleted User') | ||||
|  | ||||
|     def delete(self, request, *args, **kwargs): | ||||
|         messages.success(self.request, self.success_message) | ||||
|         return super().delete(request, *args, **kwargs) | ||||
|  | ||||
|  | ||||
| class UserPasswordResetView(AdminRequiredMixin, View): | ||||
|     """Get Password reset link for user""" | ||||
|  | ||||
|     # pylint: disable=invalid-name | ||||
|     def get(self, request, pk): | ||||
|         """Create nonce for user and return link""" | ||||
|         user = get_object_or_404(User, pk=pk) | ||||
|         nonce = Nonce.objects.create(user=user) | ||||
|         link = request.build_absolute_uri(reverse( | ||||
|             'passbook_core:auth-password-reset', kwargs={'nonce': nonce.uuid})) | ||||
|         messages.success(request, _('Password reset link: <pre>%(link)s</pre>' % {'link': link})) | ||||
|         return redirect('passbook_admin:users') | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook api""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
| @ -14,8 +14,8 @@ class OpenIDUserInfoView(ScopedResourceMixin, View): | ||||
|         payload = { | ||||
|             'sub': request.user.uuid.int, | ||||
|             'name': request.user.get_full_name(), | ||||
|             'given_name': request.user.first_name, | ||||
|             'family_name': request.user.last_name, | ||||
|             'given_name': request.user.name, | ||||
|             'family_name': '', | ||||
|             'preferred_username': request.user.username, | ||||
|             'email': request.user.email, | ||||
|         } | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook audit Header""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
							
								
								
									
										16
									
								
								passbook/audit/migrations/0004_delete_loginattempt.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								passbook/audit/migrations/0004_delete_loginattempt.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,16 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-08 14:53 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_audit', '0003_auto_20190221_1240'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.DeleteModel( | ||||
|             name='LoginAttempt', | ||||
|         ), | ||||
|     ] | ||||
| @ -1,5 +1,4 @@ | ||||
| """passbook audit models""" | ||||
| from datetime import timedelta | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.conf import settings | ||||
| @ -7,11 +6,10 @@ from django.contrib.auth.models import AnonymousUser | ||||
| from django.contrib.postgres.fields import JSONField | ||||
| from django.core.exceptions import ValidationError | ||||
| from django.db import models | ||||
| from django.utils import timezone | ||||
| from django.utils.translation import gettext as _ | ||||
| from ipware import get_client_ip | ||||
|  | ||||
| from passbook.lib.models import CreatedUpdatedModel, UUIDModel | ||||
| from passbook.lib.models import UUIDModel | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @ -51,6 +49,9 @@ class AuditEntry(UUIDModel): | ||||
|     def create(action, request, **kwargs): | ||||
|         """Create AuditEntry from arguments""" | ||||
|         client_ip, _ = get_client_ip(request) | ||||
|         if not hasattr(request, 'user'): | ||||
|             user = None | ||||
|         else: | ||||
|             user = request.user | ||||
|         if isinstance(user, AnonymousUser): | ||||
|             user = kwargs.get('user', None) | ||||
| @ -60,7 +61,7 @@ class AuditEntry(UUIDModel): | ||||
|             # User 255.255.255.255 as fallback if IP cannot be determined | ||||
|             request_ip=client_ip or '255.255.255.255', | ||||
|             context=kwargs) | ||||
|         LOGGER.debug("Logged %s from %s (%s)", action, request.user, client_ip) | ||||
|         LOGGER.debug("Logged %s from %s (%s)", action, user, client_ip) | ||||
|         return entry | ||||
|  | ||||
|     def save(self, *args, **kwargs): | ||||
| @ -72,41 +73,3 @@ class AuditEntry(UUIDModel): | ||||
|  | ||||
|         verbose_name = _('Audit Entry') | ||||
|         verbose_name_plural = _('Audit Entries') | ||||
|  | ||||
|  | ||||
| class LoginAttempt(CreatedUpdatedModel): | ||||
|     """Track failed login-attempts""" | ||||
|  | ||||
|     target_uid = models.CharField(max_length=254) | ||||
|     request_ip = models.GenericIPAddressField() | ||||
|     attempts = models.IntegerField(default=1) | ||||
|  | ||||
|     @staticmethod | ||||
|     def attempt(target_uid, request): | ||||
|         """Helper function to create attempt or count up existing one""" | ||||
|         client_ip, _ = get_client_ip(request) | ||||
|         # Since we can only use 254 chars for target_uid, truncate target_uid. | ||||
|         target_uid = target_uid[:254] | ||||
|         time_threshold = timezone.now() - timedelta(minutes=10) | ||||
|         existing_attempts = LoginAttempt.objects.filter( | ||||
|             target_uid=target_uid, | ||||
|             request_ip=client_ip, | ||||
|             last_updated__gt=time_threshold).order_by('created') | ||||
|         if existing_attempts.exists(): | ||||
|             attempt = existing_attempts.first() | ||||
|             attempt.attempts += 1 | ||||
|             attempt.save() | ||||
|             LOGGER.debug("Increased attempts on %s", attempt) | ||||
|         else: | ||||
|             attempt = LoginAttempt.objects.create( | ||||
|                 target_uid=target_uid, | ||||
|                 request_ip=client_ip) | ||||
|             LOGGER.debug("Created new attempt %s", attempt) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "LoginAttempt to %s from %s (x%d)" % (self.target_uid, | ||||
|                                                      self.request_ip, self.attempts) | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         unique_together = (('target_uid', 'request_ip', 'created'),) | ||||
|  | ||||
| @ -1 +0,0 @@ | ||||
| django-ipware | ||||
| @ -1,9 +1,8 @@ | ||||
| """passbook audit signal listener""" | ||||
| from django.contrib.auth.signals import (user_logged_in, user_logged_out, | ||||
|                                          user_login_failed) | ||||
| from django.contrib.auth.signals import user_logged_in, user_logged_out | ||||
| from django.dispatch import receiver | ||||
|  | ||||
| from passbook.audit.models import AuditEntry, LoginAttempt | ||||
| from passbook.audit.models import AuditEntry | ||||
| from passbook.core.signals import (invitation_created, invitation_used, | ||||
|                                    user_signed_up) | ||||
|  | ||||
| @ -34,8 +33,3 @@ def on_invitation_used(sender, request, invitation, **kwargs): | ||||
|     """Log Invitation usage""" | ||||
|     AuditEntry.create(AuditEntry.ACTION_INVITE_USED, request, | ||||
|                       invitation_uuid=invitation.uuid.hex) | ||||
|  | ||||
| @receiver(user_login_failed) | ||||
| def on_user_login_failed(sender, request, credentials, **kwargs): | ||||
|     """Log failed login attempt""" | ||||
|     LoginAttempt.attempt(target_uid=credentials.get('username'), request=request) | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook captcha_factor Header""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
| @ -13,3 +13,10 @@ class CaptchaFactor(FormView, AuthenticationFactor): | ||||
|  | ||||
|     def form_valid(self, form): | ||||
|         return self.authenticator.user_ok() | ||||
|  | ||||
|     def get_form(self, form_class=None): | ||||
|         form = CaptchaForm(**self.get_form_kwargs()) | ||||
|         form.fields['captcha'].public_key = '6Lfi1w8TAAAAAELH-YiWp0OFItmMzvjGmw2xkvUN' | ||||
|         form.fields['captcha'].private_key = '6Lfi1w8TAAAAAMQI3f86tGMvd1QkcqqVQyBWI23D' | ||||
|         form.fields['captcha'].widget.attrs["data-sitekey"] = form.fields['captcha'].public_key | ||||
|         return form | ||||
|  | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook core""" | ||||
| __version__ = '0.0.7-alpha' | ||||
| __version__ = '0.1.13-beta' | ||||
|  | ||||
| @ -1,26 +1,85 @@ | ||||
| """passbook multi-factor authentication engine""" | ||||
| from inspect import Signature | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.contrib.auth import authenticate | ||||
| from django.contrib import messages | ||||
| from django.contrib.auth import _clean_credentials | ||||
| from django.contrib.auth.signals import user_login_failed | ||||
| from django.core.exceptions import PermissionDenied | ||||
| from django.forms.utils import ErrorList | ||||
| from django.shortcuts import redirect, reverse | ||||
| from django.utils.translation import gettext as _ | ||||
| from django.views.generic import FormView | ||||
|  | ||||
| from passbook.core.auth.factor import AuthenticationFactor | ||||
| from passbook.core.auth.view import AuthenticationView | ||||
| from passbook.core.forms.authentication import PasswordFactorForm | ||||
| from passbook.core.models import Nonce | ||||
| from passbook.core.tasks import send_email | ||||
| from passbook.lib.config import CONFIG | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| def authenticate(request, backends, **credentials): | ||||
|     """If the given credentials are valid, return a User object. | ||||
|     Customized version of django's authenticate, which accepts a list of backends""" | ||||
|     for backend_path in backends: | ||||
|         backend = path_to_class(backend_path)() | ||||
|         try: | ||||
|             signature = Signature.from_callable(backend.authenticate) | ||||
|             signature.bind(request, **credentials) | ||||
|         except TypeError: | ||||
|             LOGGER.debug("Backend %s doesn't accept our arguments", backend) | ||||
|             # This backend doesn't accept these credentials as arguments. Try the next one. | ||||
|             continue | ||||
|         LOGGER.debug('Attempting authentication with %s...', backend) | ||||
|         try: | ||||
|             user = backend.authenticate(request, **credentials) | ||||
|         except PermissionDenied: | ||||
|             LOGGER.debug('Backend %r threw PermissionDenied', backend) | ||||
|             # This backend says to stop in our tracks - this user should not be allowed in at all. | ||||
|             break | ||||
|         if user is None: | ||||
|             continue | ||||
|         # Annotate the user object with the path of the backend. | ||||
|         user.backend = backend_path | ||||
|         return user | ||||
|  | ||||
|     # The credentials supplied are invalid to all backends, fire signal | ||||
|     user_login_failed.send(sender=__name__, credentials=_clean_credentials( | ||||
|         credentials), request=request) | ||||
|  | ||||
| class PasswordFactor(FormView, AuthenticationFactor): | ||||
|     """Authentication factor which authenticates against django's AuthBackend""" | ||||
|  | ||||
|     form_class = PasswordFactorForm | ||||
|     template_name = 'login/factors/backend.html' | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['show_password_forget_notice'] = CONFIG.y('passbook.password_reset.enabled') | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
|     def get(self, request, *args, **kwargs): | ||||
|         if 'password-forgotten' in request.GET: | ||||
|             nonce = Nonce.objects.create(user=self.pending_user) | ||||
|             LOGGER.debug("DEBUG %s", str(nonce.uuid)) | ||||
|             # Send mail to user | ||||
|             send_email.delay(self.pending_user.email, _('Forgotten password'), | ||||
|                              'email/account_password_reset.html', { | ||||
|                                  'url': self.request.build_absolute_uri( | ||||
|                                      reverse('passbook_core:auth-password-reset', | ||||
|                                              kwargs={ | ||||
|                                                  'nonce': nonce.uuid | ||||
|                                              }) | ||||
|                                  ) | ||||
|                              }) | ||||
|             self.authenticator.cleanup() | ||||
|             messages.success(request, _('Check your E-Mails for a password reset link.')) | ||||
|             return redirect('passbook_core:auth-login') | ||||
|         return super().get(request, *args, **kwargs) | ||||
|  | ||||
|     def form_valid(self, form): | ||||
|         """Authenticate against django's authentication backend""" | ||||
|         uid_fields = CONFIG.y('passbook.uid_fields') | ||||
| @ -30,7 +89,7 @@ class PasswordFactor(FormView, AuthenticationFactor): | ||||
|         for uid_field in uid_fields: | ||||
|             kwargs[uid_field] = getattr(self.authenticator.pending_user, uid_field) | ||||
|         try: | ||||
|             user = authenticate(self.request, **kwargs) | ||||
|             user = authenticate(self.request, self.authenticator.current_factor.backends, **kwargs) | ||||
|             if user: | ||||
|                 # User instance returned from authenticate() has .backend property set | ||||
|                 self.authenticator.pending_user = user | ||||
|  | ||||
| @ -4,15 +4,23 @@ from logging import getLogger | ||||
| from django.contrib.auth import login | ||||
| from django.contrib.auth.mixins import UserPassesTestMixin | ||||
| from django.shortcuts import get_object_or_404, redirect, reverse | ||||
| from django.utils.http import urlencode | ||||
| from django.views.generic import View | ||||
|  | ||||
| from passbook.core.models import Factor, User | ||||
| from passbook.core.policies import PolicyEngine | ||||
| from passbook.core.views.utils import PermissionDeniedView | ||||
| from passbook.lib.utils.reflection import class_to_path, path_to_class | ||||
| from passbook.lib.utils.urls import is_url_absolute | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| def _redirect_with_qs(view, get_query_set=None): | ||||
|     """Wrapper to redirect whilst keeping GET Parameters""" | ||||
|     target = reverse(view) | ||||
|     if get_query_set: | ||||
|         target += '?' + urlencode({key: value for key, value in get_query_set.items()}) | ||||
|     return redirect(target) | ||||
|  | ||||
| class AuthenticationView(UserPassesTestMixin, View): | ||||
|     """Wizard-like Multi-factor authenticator""" | ||||
| @ -31,33 +39,41 @@ class AuthenticationView(UserPassesTestMixin, View): | ||||
|  | ||||
|     # Allow only not authenticated users to login | ||||
|     def test_func(self): | ||||
|         return self.request.user.is_authenticated is False | ||||
|         return AuthenticationView.SESSION_PENDING_USER in self.request.session | ||||
|  | ||||
|     def handle_no_permission(self): | ||||
|         # Function from UserPassesTestMixin | ||||
|         if 'next' in self.request.GET: | ||||
|             return redirect(self.request.GET.get('next')) | ||||
|         return redirect(reverse('passbook_core:overview')) | ||||
|         if self.request.user.is_authenticated: | ||||
|             return _redirect_with_qs('passbook_core:overview', self.request.GET) | ||||
|         return _redirect_with_qs('passbook_core:auth-login', self.request.GET) | ||||
|  | ||||
|     def dispatch(self, request, *args, **kwargs): | ||||
|         # Extract pending user from session (only remember uid) | ||||
|         if AuthenticationView.SESSION_PENDING_USER in request.session: | ||||
|             self.pending_user = get_object_or_404( | ||||
|                 User, id=self.request.session[AuthenticationView.SESSION_PENDING_USER]) | ||||
|         else: | ||||
|             # No Pending user, redirect to login screen | ||||
|             return redirect(reverse('passbook_core:auth-login')) | ||||
|     def get_pending_factors(self): | ||||
|         """Loading pending factors from Database or load from session variable""" | ||||
|         # Write pending factors to session | ||||
|         if AuthenticationView.SESSION_PENDING_FACTORS in request.session: | ||||
|             self.pending_factors = request.session[AuthenticationView.SESSION_PENDING_FACTORS] | ||||
|         else: | ||||
|         if AuthenticationView.SESSION_PENDING_FACTORS in self.request.session: | ||||
|             return self.request.session[AuthenticationView.SESSION_PENDING_FACTORS] | ||||
|         # Get an initial list of factors which are currently enabled | ||||
|         # and apply to the current user. We check policies here and block the request | ||||
|         _all_factors = Factor.objects.filter(enabled=True).order_by('order').select_subclasses() | ||||
|             self.pending_factors = [] | ||||
|         pending_factors = [] | ||||
|         for factor in _all_factors: | ||||
|                 if factor.passes(self.pending_user): | ||||
|                     self.pending_factors.append((factor.uuid.hex, factor.type)) | ||||
|             policy_engine = PolicyEngine(factor.policies.all()) | ||||
|             policy_engine.for_user(self.pending_user).with_request(self.request).build() | ||||
|             if policy_engine.passing: | ||||
|                 pending_factors.append((factor.uuid.hex, factor.type)) | ||||
|         return pending_factors | ||||
|  | ||||
|     def dispatch(self, request, *args, **kwargs): | ||||
|         # Check if user passes test (i.e. SESSION_PENDING_USER is set) | ||||
|         user_test_result = self.get_test_func()() | ||||
|         if not user_test_result: | ||||
|             return self.handle_no_permission() | ||||
|         # Extract pending user from session (only remember uid) | ||||
|         self.pending_user = get_object_or_404( | ||||
|             User, id=self.request.session[AuthenticationView.SESSION_PENDING_USER]) | ||||
|         self.pending_factors = self.get_pending_factors() | ||||
|         # Read and instantiate factor from session | ||||
|         factor_uuid, factor_class = None, None | ||||
|         if AuthenticationView.SESSION_FACTOR not in request.session: | ||||
| @ -97,12 +113,12 @@ class AuthenticationView(UserPassesTestMixin, View): | ||||
|         next_factor = None | ||||
|         if self.pending_factors: | ||||
|             next_factor = self.pending_factors.pop() | ||||
|             # Save updated pening_factor list to session | ||||
|             self.request.session[AuthenticationView.SESSION_PENDING_FACTORS] = \ | ||||
|                 self.pending_factors | ||||
|             self.request.session[AuthenticationView.SESSION_FACTOR] = next_factor | ||||
|             LOGGER.debug("Rendering Factor is %s", next_factor) | ||||
|             # return redirect(reverse('passbook_core:auth-process', kwargs={'factor': next_factor})) | ||||
|             return redirect(reverse('passbook_core:auth-process')) | ||||
|             return _redirect_with_qs('passbook_core:auth-process', self.request.GET) | ||||
|         # User passed all factors | ||||
|         LOGGER.debug("User passed all factors, logging in") | ||||
|         return self._user_passed() | ||||
| @ -111,23 +127,22 @@ class AuthenticationView(UserPassesTestMixin, View): | ||||
|         """Show error message, user cannot login. | ||||
|         This should only be shown if user authenticated successfully, but is disabled/locked/etc""" | ||||
|         LOGGER.debug("User invalid") | ||||
|         self._cleanup() | ||||
|         return redirect(reverse('passbook_core:auth-denied')) | ||||
|         self.cleanup() | ||||
|         return _redirect_with_qs('passbook_core:auth-denied', self.request.GET) | ||||
|  | ||||
|     def _user_passed(self): | ||||
|         """User Successfully passed all factors""" | ||||
|         # user = authenticate(request=self.request, ) | ||||
|         backend = self.request.session[AuthenticationView.SESSION_USER_BACKEND] | ||||
|         login(self.request, self.pending_user, backend=backend) | ||||
|         LOGGER.debug("Logged in user %s", self.pending_user) | ||||
|         # Cleanup | ||||
|         self._cleanup() | ||||
|         self.cleanup() | ||||
|         next_param = self.request.GET.get('next', None) | ||||
|         if next_param and is_url_absolute(next_param): | ||||
|         if next_param and not is_url_absolute(next_param): | ||||
|             return redirect(next_param) | ||||
|         return redirect(reverse('passbook_core:overview')) | ||||
|         return _redirect_with_qs('passbook_core:overview') | ||||
|  | ||||
|     def _cleanup(self): | ||||
|     def cleanup(self): | ||||
|         """Remove temporary data from session""" | ||||
|         session_keys = [self.SESSION_FACTOR, self.SESSION_PENDING_FACTORS, | ||||
|                         self.SESSION_PENDING_USER, self.SESSION_USER_BACKEND, ] | ||||
|  | ||||
| @ -5,9 +5,8 @@ import os | ||||
|  | ||||
| import celery | ||||
| from django.conf import settings | ||||
|  | ||||
| # from raven import Client | ||||
| # from raven.contrib.celery import register_logger_signal, register_signal | ||||
| from raven import Client | ||||
| from raven.contrib.celery import register_logger_signal, register_signal | ||||
|  | ||||
| # set the default Django settings module for the 'celery' program. | ||||
| os.environ.setdefault("DJANGO_SETTINGS_MODULE", "passbook.core.settings") | ||||
| @ -18,16 +17,17 @@ LOGGER = logging.getLogger(__name__) | ||||
| class Celery(celery.Celery): | ||||
|     """Custom Celery class with Raven configured""" | ||||
|  | ||||
|     # def on_configure(self): | ||||
|     #     """Update raven client""" | ||||
|     #     try: | ||||
|     #         client = Client(settings.RAVEN_CONFIG.get('dsn')) | ||||
|     #         # register a custom filter to filter out duplicate logs | ||||
|     #         register_logger_signal(client) | ||||
|     #         # hook into the Celery error handler | ||||
|     #         register_signal(client) | ||||
|     #     except RecursionError:  # This error happens when pdoc is running | ||||
|     #         pass | ||||
|     # pylint: disable=method-hidden | ||||
|     def on_configure(self): | ||||
|         """Update raven client""" | ||||
|         try: | ||||
|             client = Client(settings.RAVEN_CONFIG.get('dsn')) | ||||
|             # register a custom filter to filter out duplicate logs | ||||
|             register_logger_signal(client) | ||||
|             # hook into the Celery error handler | ||||
|             register_signal(client) | ||||
|         except RecursionError:  # This error happens when pdoc is running | ||||
|             pass | ||||
|  | ||||
|  | ||||
| # pylint: disable=unused-argument | ||||
|  | ||||
							
								
								
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								passbook/core/exceptions.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,10 @@ | ||||
| """passbook core exceptions""" | ||||
|  | ||||
| class PasswordPolicyInvalid(Exception): | ||||
|     """Exception raised when a Password Policy fails""" | ||||
|  | ||||
|     messages = [] | ||||
|  | ||||
|     def __init__(self, *messages): | ||||
|         super().__init__() | ||||
|         self.messages = messages | ||||
| @ -1,5 +1,6 @@ | ||||
| """passbook Core Application forms""" | ||||
| from django import forms | ||||
| from django.contrib.admin.widgets import FilteredSelectMultiple | ||||
| from django.utils.translation import gettext_lazy as _ | ||||
|  | ||||
| from passbook.core.models import Application, Provider | ||||
| @ -20,6 +21,7 @@ class ApplicationForm(forms.ModelForm): | ||||
|             'name': forms.TextInput(), | ||||
|             'launch_url': forms.TextInput(), | ||||
|             'icon_url': forms.TextInput(), | ||||
|             'policies': FilteredSelectMultiple(_('policies'), False) | ||||
|         } | ||||
|         labels = { | ||||
|             'launch_url': _('Launch URL'), | ||||
|  | ||||
| @ -8,6 +8,7 @@ from django.utils.translation import gettext_lazy as _ | ||||
|  | ||||
| from passbook.core.models import User | ||||
| from passbook.lib.config import CONFIG | ||||
| from passbook.lib.utils.ui import human_list | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @ -15,13 +16,16 @@ class LoginForm(forms.Form): | ||||
|     """Allow users to login""" | ||||
|  | ||||
|     title = _('Log in to your account') | ||||
|     uid_field = forms.CharField(widget=forms.TextInput(attrs={'placeholder': _('UID')})) | ||||
|     uid_field = forms.CharField() | ||||
|     remember_me = forms.BooleanField(required=False) | ||||
|  | ||||
|     def __init__(self, *args, **kwargs): | ||||
|         super().__init__(*args, **kwargs) | ||||
|         if CONFIG.y('passbook.uid_fields') == ['email']: | ||||
|         if CONFIG.y('passbook.uid_fields') == ['e-mail']: | ||||
|             self.fields['uid_field'] = forms.EmailField() | ||||
|         self.fields['uid_field'].widget.attrs = { | ||||
|             'placeholder': _(human_list([x.title() for x in CONFIG.y('passbook.uid_fields')])) | ||||
|         } | ||||
|  | ||||
|     def clean_uid_field(self): | ||||
|         """Validate uid_field after EmailValidator if 'email' is the only selected uid_fields""" | ||||
| @ -34,10 +38,8 @@ class SignUpForm(forms.Form): | ||||
|     """SignUp Form""" | ||||
|  | ||||
|     title = _('Sign Up') | ||||
|     first_name = forms.CharField(label=_('First Name'), | ||||
|                                  widget=forms.TextInput(attrs={'placeholder': _('First Name')})) | ||||
|     last_name = forms.CharField(label=_('Last Name'), | ||||
|                                 widget=forms.TextInput(attrs={'placeholder': _('Last Name')})) | ||||
|     name = forms.CharField(label=_('Name'), | ||||
|                            widget=forms.TextInput(attrs={'placeholder': _('Name')})) | ||||
|     username = forms.CharField(label=_('Username'), | ||||
|                                widget=forms.TextInput(attrs={'placeholder': _('Username')})) | ||||
|     email = forms.EmailField(label=_('E-Mail'), | ||||
| @ -79,12 +81,14 @@ class SignUpForm(forms.Form): | ||||
|         password_repeat = self.cleaned_data.get('password_repeat') | ||||
|         if password != password_repeat: | ||||
|             raise ValidationError(_("Passwords don't match")) | ||||
|         # TODO: Password policy? Via Plugin? via Policy? | ||||
|         # return check_password(self) | ||||
|         return self.cleaned_data.get('password_repeat') | ||||
|  | ||||
|  | ||||
| class PasswordFactorForm(forms.Form): | ||||
|     """Password authentication form""" | ||||
|  | ||||
|     password = forms.CharField(widget=forms.PasswordInput(attrs={'placeholder': _('Password')})) | ||||
|     password = forms.CharField(widget=forms.PasswordInput(attrs={ | ||||
|         'placeholder': _('Password'), | ||||
|         'autofocus': 'autofocus', | ||||
|         'autocomplete': 'current-password' | ||||
|         })) | ||||
|  | ||||
| @ -1,20 +1,33 @@ | ||||
| """passbook administration forms""" | ||||
| from django import forms | ||||
| from django.conf import settings | ||||
| from django.contrib.admin.widgets import FilteredSelectMultiple | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import DummyFactor, PasswordFactor | ||||
| from passbook.lib.utils.reflection import path_to_class | ||||
|  | ||||
| GENERAL_FIELDS = ['name', 'slug', 'order', 'policies', 'enabled'] | ||||
|  | ||||
| def get_authentication_backends(): | ||||
|     """Return all available authentication backends as tuple set""" | ||||
|     for backend in settings.AUTHENTICATION_BACKENDS: | ||||
|         klass = path_to_class(backend) | ||||
|         yield backend, getattr(klass(), 'name', '%s (%s)' % (klass.__name__, klass.__module__)) | ||||
|  | ||||
| class PasswordFactorForm(forms.ModelForm): | ||||
|     """Form to create/edit Password Factors""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = PasswordFactor | ||||
|         fields = GENERAL_FIELDS + ['backends'] | ||||
|         fields = GENERAL_FIELDS + ['backends', 'password_policies'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'order': forms.NumberInput(), | ||||
|             'policies': FilteredSelectMultiple(_('policies'), False), | ||||
|             'backends': FilteredSelectMultiple(_('backends'), False, | ||||
|                                                choices=get_authentication_backends()) | ||||
|         } | ||||
|  | ||||
| class DummyFactorForm(forms.ModelForm): | ||||
| @ -27,4 +40,5 @@ class DummyFactorForm(forms.ModelForm): | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'order': forms.NumberInput(), | ||||
|             'policies': FilteredSelectMultiple(_('policies'), False) | ||||
|         } | ||||
|  | ||||
							
								
								
									
										32
									
								
								passbook/core/forms/groups.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								passbook/core/forms/groups.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,32 @@ | ||||
| """passbook Core Group forms""" | ||||
| from django import forms | ||||
| from django.contrib.admin.widgets import FilteredSelectMultiple | ||||
|  | ||||
| from passbook.core.models import Group, User | ||||
|  | ||||
|  | ||||
| class GroupForm(forms.ModelForm): | ||||
|     """Group Form""" | ||||
|  | ||||
|     members = forms.ModelMultipleChoiceField( | ||||
|         User.objects.all(), required=False, widget=FilteredSelectMultiple('users', False)) | ||||
|  | ||||
|     def __init__(self, *args, **kwargs): | ||||
|         super().__init__(*args, **kwargs) | ||||
|         if self.instance.pk: | ||||
|             self.initial['members'] = self.instance.user_set.values_list('pk', flat=True) | ||||
|  | ||||
|     def save(self, *args, **kwargs): | ||||
|         instance = super().save(*args, **kwargs) | ||||
|         if instance.pk: | ||||
|             instance.user_set.clear() | ||||
|             instance.user_set.add(*self.cleaned_data['members']) | ||||
|         return instance | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = Group | ||||
|         fields = ['name', 'parent', 'members', 'tags'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|         } | ||||
| @ -27,7 +27,7 @@ class InvitationForm(forms.ModelForm): | ||||
|     class Meta: | ||||
|  | ||||
|         model = Invitation | ||||
|         fields = ['expires', 'fixed_username', 'fixed_email'] | ||||
|         fields = ['expires', 'fixed_username', 'fixed_email', 'needs_confirmation'] | ||||
|         labels = { | ||||
|             'fixed_username': "Force user's username (optional)", | ||||
|             'fixed_email': "Force user's email (optional)", | ||||
|  | ||||
| @ -3,7 +3,9 @@ | ||||
| from django import forms | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import DebugPolicy, FieldMatcherPolicy, WebhookPolicy | ||||
| from passbook.core.models import (DebugPolicy, FieldMatcherPolicy, | ||||
|                                   GroupMembershipPolicy, PasswordPolicy, | ||||
|                                   WebhookPolicy) | ||||
|  | ||||
| GENERAL_FIELDS = ['name', 'action', 'negate', 'order', ] | ||||
|  | ||||
| @ -50,3 +52,36 @@ class DebugPolicyForm(forms.ModelForm): | ||||
|         labels = { | ||||
|             'result': _('Allow user') | ||||
|         } | ||||
|  | ||||
|  | ||||
| class GroupMembershipPolicyForm(forms.ModelForm): | ||||
|     """GroupMembershipPolicy Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = GroupMembershipPolicy | ||||
|         fields = GENERAL_FIELDS + ['group', ] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|         } | ||||
|  | ||||
| class PasswordPolicyForm(forms.ModelForm): | ||||
|     """PasswordPolicy Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = PasswordPolicy | ||||
|         fields = GENERAL_FIELDS + ['amount_uppercase', 'amount_lowercase', | ||||
|                                    'amount_symbols', 'length_min', 'symbol_charset', | ||||
|                                    'error_message'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'symbol_charset': forms.TextInput(), | ||||
|             'error_message': forms.TextInput(), | ||||
|         } | ||||
|         labels = { | ||||
|             'amount_uppercase': _('Minimum amount of Uppercase Characters'), | ||||
|             'amount_lowercase': _('Minimum amount of Lowercase Characters'), | ||||
|             'amount_symbols': _('Minimum amount of Symbols Characters'), | ||||
|             'length_min': _('Minimum Length'), | ||||
|         } | ||||
|  | ||||
| @ -13,16 +13,23 @@ class UserDetailForm(forms.ModelForm): | ||||
|     class Meta: | ||||
|  | ||||
|         model = User | ||||
|         fields = ['username', 'first_name', 'last_name', 'email'] | ||||
|         fields = ['username', 'name', 'email'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput | ||||
|         } | ||||
|  | ||||
| class PasswordChangeForm(forms.Form): | ||||
|     """Form to update password""" | ||||
|  | ||||
|     password = forms.CharField(label=_('Password'), | ||||
|                                widget=forms.PasswordInput(attrs={'placeholder': _('New Password')})) | ||||
|                                widget=forms.PasswordInput(attrs={ | ||||
|                                    'placeholder': _('New Password'), | ||||
|                                    'autocomplete': 'new-password' | ||||
|                                    })) | ||||
|     password_repeat = forms.CharField(label=_('Repeat Password'), | ||||
|                                       widget=forms.PasswordInput(attrs={ | ||||
|                                           'placeholder': _('Repeat Password') | ||||
|                                           'placeholder': _('Repeat Password'), | ||||
|                                           'autocomplete': 'new-password' | ||||
|                                       })) | ||||
|  | ||||
|     def clean_password_repeat(self): | ||||
| @ -31,5 +38,4 @@ class PasswordChangeForm(forms.Form): | ||||
|         password_repeat = self.cleaned_data.get('password_repeat') | ||||
|         if password != password_repeat: | ||||
|             raise ValidationError(_("Passwords don't match")) | ||||
|         # TODO: Password policy check | ||||
|         return self.cleaned_data.get('password_repeat') | ||||
|  | ||||
							
								
								
									
										45
									
								
								passbook/core/management/commands/import_users.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										45
									
								
								passbook/core/management/commands/import_users.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,45 @@ | ||||
| """passbook import_users management command""" | ||||
| from csv import DictReader | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.core.management.base import BaseCommand | ||||
| from django.core.validators import EmailValidator, ValidationError | ||||
|  | ||||
| from passbook.core.models import User | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| class Command(BaseCommand): | ||||
|     """Import users from CSV file""" | ||||
|  | ||||
|     def add_arguments(self, parser): | ||||
|         # Positional arguments | ||||
|         parser.add_argument('file', nargs='+', type=str) | ||||
|  | ||||
|     def handle(self, *args, **options): | ||||
|         """Create Users from CSV file""" | ||||
|         for file in options.get('file'): | ||||
|             with open(file, 'r') as _file: | ||||
|                 reader = DictReader(_file) | ||||
|                 for user in reader: | ||||
|                     LOGGER.debug('User %s', user.get('username')) | ||||
|                     try: | ||||
|                         # only import users with valid email addresses | ||||
|                         if user.get('email'): | ||||
|                             validator = EmailValidator() | ||||
|                             validator(user.get('email')) | ||||
|                         # use combination of username and email to check for existing user | ||||
|                         if User.objects.filter( | ||||
|                                 username=user.get('username'), | ||||
|                                 email=user.get('email')).exists(): | ||||
|                             LOGGER.debug('User %s exists already, skipping', user.get('username')) | ||||
|                         # Create user | ||||
|                         User.objects.create( | ||||
|                             username=user.get('username'), | ||||
|                             email=user.get('email'), | ||||
|                             name=user.get('name'), | ||||
|                             password=user.get('password')) | ||||
|                         LOGGER.debug('Created User %s', user.get('username')) | ||||
|                     except ValidationError as exc: | ||||
|                         LOGGER.warning('User %s caused %r, skipping', user.get('username'), exc) | ||||
|                         continue | ||||
| @ -1,5 +1,5 @@ | ||||
| """passbook nexus_upload management command""" | ||||
| from getpass import getpass | ||||
| from base64 import b64decode | ||||
|  | ||||
| import requests | ||||
| from django.core.management.base import BaseCommand | ||||
| @ -24,9 +24,9 @@ class Command(BaseCommand): | ||||
|             help='Nexus root URL', | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--user', | ||||
|             '--auth', | ||||
|             action='store', | ||||
|             help='Username to use for Nexus upload', | ||||
|             help='base64-encoded string of username:password', | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--method', | ||||
| @ -37,29 +37,21 @@ class Command(BaseCommand): | ||||
|             help=('Method used for uploading files to nexus. ' | ||||
|                   'Apt repositories use post, Helm uses put.'), | ||||
|             required=True) | ||||
|         parser.add_argument( | ||||
|             '--password', | ||||
|             action='store', | ||||
|             help=("Password to use for Nexus upload. " | ||||
|                   "If parameter not given, we'll interactively ask")) | ||||
|         # Positional arguments | ||||
|         parser.add_argument('file', nargs='+', type=str) | ||||
|  | ||||
|     def handle(self, *args, **options): | ||||
|         """Upload debian package to nexus repository""" | ||||
|         if options.get('password') is None: | ||||
|             options['password'] = getpass() | ||||
|         auth = tuple(b64decode(options.get('auth')).decode('utf-8').split(':', 1)) | ||||
|         responses = {} | ||||
|         url = 'https://%(url)s/repository/%(repo)s//' % options | ||||
|         url = 'https://%(url)s/repository/%(repo)s/' % options | ||||
|         method = options.get('method') | ||||
|         exit_code = 0 | ||||
|         for file in options.get('file'): | ||||
|             if method == 'post': | ||||
|                 responses[file] = requests.post(url, data=open(file, mode='rb'), | ||||
|                                                 auth=(options.get('user'), options.get('password'))) | ||||
|                 responses[file] = requests.post(url, data=open(file, mode='rb'), auth=auth) | ||||
|             else: | ||||
|                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), | ||||
|                                                auth=(options.get('user'), options.get('password'))) | ||||
|                 responses[file] = requests.put(url+file, data=open(file, mode='rb'), auth=auth) | ||||
|         self.stdout.write('Upload results:\n') | ||||
|         sep = '-' * 60 | ||||
|         self.stdout.write('%s\n' % sep) | ||||
|  | ||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0011_auto_20190225_1438.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 14:38 | ||||
|  | ||||
| import django.utils.timezone | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0010_auto_20190224_1016'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='passwordfactor', | ||||
|             name='password_policies', | ||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||
|         ), | ||||
|         migrations.AddField( | ||||
|             model_name='user', | ||||
|             name='password_change_date', | ||||
|             field=models.DateTimeField(auto_now_add=True, default=django.utils.timezone.now), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										31
									
								
								passbook/core/migrations/0012_nonce.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								passbook/core/migrations/0012_nonce.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,31 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 19:12 | ||||
|  | ||||
| import uuid | ||||
|  | ||||
| import django.db.models.deletion | ||||
| from django.conf import settings | ||||
| from django.db import migrations, models | ||||
|  | ||||
| import passbook.core.models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0011_auto_20190225_1438'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='Nonce', | ||||
|             fields=[ | ||||
|                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), | ||||
|                 ('expires', models.DateTimeField(default=passbook.core.models.default_nonce_duration)), | ||||
|                 ('user', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to=settings.AUTH_USER_MODEL)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Nonce', | ||||
|                 'verbose_name_plural': 'Nonces', | ||||
|             }, | ||||
|         ), | ||||
|     ] | ||||
| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-25 19:57 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0012_nonce'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='invitation', | ||||
|             name='needs_confirmation', | ||||
|             field=models.BooleanField(default=True), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0014_auto_20190226_0850.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0014_auto_20190226_0850.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-26 08:50 | ||||
|  | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| def create_initial_factor(apps, schema_editor): | ||||
|     """Create initial PasswordFactor if none exists""" | ||||
|     PasswordFactor = apps.get_model("passbook_core", "PasswordFactor") | ||||
|     if not PasswordFactor.objects.exists(): | ||||
|         PasswordFactor.objects.create( | ||||
|             name='password', | ||||
|             slug='password', | ||||
|             order=0, | ||||
|             backends=['django.contrib.auth.backends.ModelBackend'] | ||||
|         ) | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0013_invitation_needs_confirmation'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.RunPython(create_initial_factor) | ||||
|     ] | ||||
| @ -0,0 +1,19 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-26 14:28 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0014_auto_20190226_0850'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='passwordpolicy', | ||||
|             name='error_message', | ||||
|             field=models.TextField(default=''), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										38
									
								
								passbook/core/migrations/0016_auto_20190227_1355.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										38
									
								
								passbook/core/migrations/0016_auto_20190227_1355.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,38 @@ | ||||
| # Generated by Django 2.1.7 on 2019-02-27 13:55 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| def migrate_names(apps, schema_editor): | ||||
|     """migrate first_name and last_name to name""" | ||||
|     User = apps.get_model("passbook_core", "User") | ||||
|     for user in User.objects.all(): | ||||
|         user.name = '%s %s' % (user.first_name, user.last_name) | ||||
|         user.save() | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0015_passwordpolicy_error_message'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='user', | ||||
|             name='name', | ||||
|             field=models.TextField(default=''), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|         migrations.RunPython(migrate_names), | ||||
|         migrations.AlterField( | ||||
|             model_name='user', | ||||
|             name='name', | ||||
|             field=models.TextField(), | ||||
|             preserve_default=False, | ||||
|         ), | ||||
|         migrations.AlterField( | ||||
|             model_name='fieldmatcherpolicy', | ||||
|             name='user_field', | ||||
|             field=models.TextField(choices=[('username', 'Username'), ('name', 'Name'), ('email', 'E-Mail'), ('is_staff', 'Is staff'), ('is_active', 'Is active'), ('data_joined', 'Date joined')]), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										26
									
								
								passbook/core/migrations/0017_propertymapping.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								passbook/core/migrations/0017_propertymapping.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,26 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-08 10:40 | ||||
|  | ||||
| import uuid | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0016_auto_20190227_1355'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='PropertyMapping', | ||||
|             fields=[ | ||||
|                 ('uuid', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), | ||||
|                 ('name', models.TextField()), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Property Mapping', | ||||
|                 'verbose_name_plural': 'Property Mappings', | ||||
|             }, | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										18
									
								
								passbook/core/migrations/0018_provider_property_mappings.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/core/migrations/0018_provider_property_mappings.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-08 10:50 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0017_propertymapping'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AddField( | ||||
|             model_name='provider', | ||||
|             name='property_mappings', | ||||
|             field=models.ManyToManyField(blank=True, default=None, to='passbook_core.PropertyMapping'), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										25
									
								
								passbook/core/migrations/0019_auto_20190310_1615.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								passbook/core/migrations/0019_auto_20190310_1615.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,25 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-10 16:15 | ||||
|  | ||||
| import django.contrib.postgres.fields.hstore | ||||
| from django.contrib.postgres.operations import HStoreExtension | ||||
| from django.db import migrations | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0018_provider_property_mappings'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.RemoveField( | ||||
|             model_name='group', | ||||
|             name='extra_data', | ||||
|         ), | ||||
|         HStoreExtension(), | ||||
|         migrations.AddField( | ||||
|             model_name='group', | ||||
|             name='tags', | ||||
|             field=django.contrib.postgres.fields.hstore.HStoreField(default=dict), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										26
									
								
								passbook/core/migrations/0020_groupmembershippolicy.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								passbook/core/migrations/0020_groupmembershippolicy.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,26 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-10 18:25 | ||||
|  | ||||
| import django.db.models.deletion | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0019_auto_20190310_1615'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='GroupMembershipPolicy', | ||||
|             fields=[ | ||||
|                 ('policy_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Policy')), | ||||
|                 ('group', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to='passbook_core.Group')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Group Membership Policy', | ||||
|                 'verbose_name_plural': 'Group Membership Policies', | ||||
|             }, | ||||
|             bases=('passbook_core.policy',), | ||||
|         ), | ||||
|     ] | ||||
| @ -1,28 +1,37 @@ | ||||
| """passbook core models""" | ||||
| import re | ||||
| from datetime import timedelta | ||||
| from logging import getLogger | ||||
| from random import SystemRandom | ||||
| from time import sleep | ||||
| from typing import Tuple, Union | ||||
| from uuid import uuid4 | ||||
|  | ||||
| from django.contrib.auth.models import AbstractUser | ||||
| from django.contrib.postgres.fields import ArrayField | ||||
| from django.contrib.postgres.fields import ArrayField, HStoreField | ||||
| from django.db import models | ||||
| from django.urls import reverse_lazy | ||||
| from django.utils.timezone import now | ||||
| from django.utils.translation import gettext as _ | ||||
| from model_utils.managers import InheritanceManager | ||||
|  | ||||
| from passbook.core.signals import password_changed | ||||
| from passbook.lib.models import CreatedUpdatedModel, UUIDModel | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| def default_nonce_duration(): | ||||
|     """Default duration a Nonce is valid""" | ||||
|     return now() + timedelta(hours=4) | ||||
|  | ||||
| class Group(UUIDModel): | ||||
|     """Custom Group model which supports a basic hierarchy""" | ||||
|  | ||||
|     name = models.CharField(_('name'), max_length=80) | ||||
|     parent = models.ForeignKey('Group', blank=True, null=True, | ||||
|                                on_delete=models.SET_NULL, related_name='children') | ||||
|     extra_data = models.TextField(blank=True) | ||||
|     tags = HStoreField(default=dict) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Group %s" % self.name | ||||
| @ -35,13 +44,24 @@ class User(AbstractUser): | ||||
|     """Custom User model to allow easier adding o f user-based settings""" | ||||
|  | ||||
|     uuid = models.UUIDField(default=uuid4, editable=False) | ||||
|     name = models.TextField() | ||||
|  | ||||
|     sources = models.ManyToManyField('Source', through='UserSourceConnection') | ||||
|     applications = models.ManyToManyField('Application') | ||||
|     groups = models.ManyToManyField('Group') | ||||
|     password_change_date = models.DateTimeField(auto_now_add=True) | ||||
|  | ||||
|     def set_password(self, password): | ||||
|         if self.pk: | ||||
|             password_changed.send(sender=self, user=self, password=password) | ||||
|         self.password_change_date = now() | ||||
|         return super().set_password(password) | ||||
|  | ||||
| class Provider(models.Model): | ||||
|     """Application-independent Provider instance. For example SAML2 Remote, OAuth2 Application""" | ||||
|  | ||||
|     property_mappings = models.ManyToManyField('PropertyMapping', default=None, blank=True) | ||||
|  | ||||
|     objects = InheritanceManager() | ||||
|  | ||||
|     # This class defines no field for easier inheritance | ||||
| @ -55,13 +75,6 @@ class PolicyModel(UUIDModel, CreatedUpdatedModel): | ||||
|  | ||||
|     policies = models.ManyToManyField('Policy', blank=True) | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|         """Return true if user passes, otherwise False or raise Exception""" | ||||
|         for policy in self.policies.all(): | ||||
|             if not policy.passes(user): | ||||
|                 return False | ||||
|         return True | ||||
|  | ||||
| class Factor(PolicyModel): | ||||
|     """Authentication factor, multiple instances of the same Factor can be used""" | ||||
|  | ||||
| @ -87,6 +100,7 @@ class PasswordFactor(Factor): | ||||
|     """Password-based Django-backend Authentication Factor""" | ||||
|  | ||||
|     backends = ArrayField(models.TextField()) | ||||
|     password_policies = models.ManyToManyField('Policy', blank=True) | ||||
|  | ||||
|     type = 'passbook.core.auth.factors.password.PasswordFactor' | ||||
|     form = 'passbook.core.forms.factors.PasswordFactorForm' | ||||
| @ -94,6 +108,13 @@ class PasswordFactor(Factor): | ||||
|     def has_user_settings(self): | ||||
|         return _('Change Password'), 'pficon-key', 'passbook_core:user-change-password' | ||||
|  | ||||
|     def password_passes(self, user: User) -> bool: | ||||
|         """Return true if user's password passes, otherwise False or raise Exception""" | ||||
|         for policy in self.policies.all(): | ||||
|             if not policy.passes(user): | ||||
|                 return False | ||||
|         return True | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Password Factor %s" % self.slug | ||||
|  | ||||
| @ -134,7 +155,13 @@ class Application(PolicyModel): | ||||
|     def user_is_authorized(self, user: User) -> bool: | ||||
|         """Check if user is authorized to use this application""" | ||||
|         from passbook.core.policies import PolicyEngine | ||||
|         return PolicyEngine(self.policies.all()).for_user(user).result | ||||
|         return PolicyEngine(self.policies.all()).for_user(user).build().result | ||||
|  | ||||
|     def get_provider(self): | ||||
|         """Get casted provider instance""" | ||||
|         if not self.provider: | ||||
|             return None | ||||
|         return Provider.objects.get_subclass(pk=self.provider.pk) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return self.name | ||||
| @ -155,10 +182,15 @@ class Source(PolicyModel): | ||||
|         return False | ||||
|  | ||||
|     @property | ||||
|     def get_url(self): | ||||
|         """Return URL used for logging in""" | ||||
|     def get_login_button(self): | ||||
|         """Return a tuple of URL, Icon name and Name""" | ||||
|         raise NotImplementedError | ||||
|  | ||||
|     @property | ||||
|     def additional_info(self): | ||||
|         """Return additional Info, such as a callback URL. Show in the administration interface.""" | ||||
|         return None | ||||
|  | ||||
|     def __str__(self): | ||||
|         return self.name | ||||
|  | ||||
| @ -195,7 +227,7 @@ class Policy(UUIDModel, CreatedUpdatedModel): | ||||
|             return self.name | ||||
|         return "%s action %s" % (self.name, self.action) | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         """Check if user instance passes this policy""" | ||||
|         raise NotImplementedError() | ||||
|  | ||||
| @ -219,8 +251,7 @@ class FieldMatcherPolicy(Policy): | ||||
|  | ||||
|     USER_FIELDS = ( | ||||
|         ('username', _('Username'),), | ||||
|         ('first_name', _('First Name'),), | ||||
|         ('last_name', _('Last Name'),), | ||||
|         ('name', _('Name'),), | ||||
|         ('email', _('E-Mail'),), | ||||
|         ('is_staff', _('Is staff'),), | ||||
|         ('is_active', _('Is active'),), | ||||
| @ -240,7 +271,7 @@ class FieldMatcherPolicy(Policy): | ||||
|             description = "%s: %s" % (self.name, description) | ||||
|         return description | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         """Check if user instance passes this role""" | ||||
|         if not hasattr(user, self.user_field): | ||||
|             raise ValueError("Field does not exist") | ||||
| @ -257,8 +288,9 @@ class FieldMatcherPolicy(Policy): | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_REGEXP: | ||||
|             pattern = re.compile(self.value) | ||||
|             passes = bool(pattern.match(user_field_value)) | ||||
|         if self.negate: | ||||
|             passes = not passes | ||||
|         if self.match_action == FieldMatcherPolicy.MATCH_EXACT: | ||||
|             passes = user_field_value == self.value | ||||
|  | ||||
|         LOGGER.debug("User got '%r'", passes) | ||||
|         return passes | ||||
|  | ||||
| @ -275,10 +307,11 @@ class PasswordPolicy(Policy): | ||||
|     amount_symbols = models.IntegerField(default=0) | ||||
|     length_min = models.IntegerField(default=0) | ||||
|     symbol_charset = models.TextField(default=r"!\"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ ") | ||||
|     error_message = models.TextField() | ||||
|  | ||||
|     form = 'passbook.core.forms.policies.PasswordPolicyForm' | ||||
|  | ||||
|     def passes(self, user: User) -> bool: | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         # Only check if password is being set | ||||
|         if not hasattr(user, '__password__'): | ||||
|             return True | ||||
| @ -293,6 +326,8 @@ class PasswordPolicy(Policy): | ||||
|             filter_regex += r'[%s]{%d,}' % (self.symbol_charset, self.amount_symbols) | ||||
|         result = bool(re.compile(filter_regex).match(password)) | ||||
|         LOGGER.debug("User got %r", result) | ||||
|         if not result: | ||||
|             return result, self.error_message | ||||
|         return result | ||||
|  | ||||
|     class Meta: | ||||
| @ -351,13 +386,28 @@ class DebugPolicy(Policy): | ||||
|         wait = SystemRandom().randrange(self.wait_min, self.wait_max) | ||||
|         LOGGER.debug("Policy '%s' waiting for %ds", self.name, wait) | ||||
|         sleep(wait) | ||||
|         return self.result | ||||
|         return self.result, 'Debugging' | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Debug Policy') | ||||
|         verbose_name_plural = _('Debug Policies') | ||||
|  | ||||
| class GroupMembershipPolicy(Policy): | ||||
|     """Policy to check if the user is member in a certain group""" | ||||
|  | ||||
|     group = models.ForeignKey('Group', on_delete=models.CASCADE) | ||||
|  | ||||
|     form = 'passbook.core.forms.policies.GroupMembershipPolicyForm' | ||||
|  | ||||
|     def passes(self, user: User) -> Union[bool, Tuple[bool, str]]: | ||||
|         return self.group.user_set.filter(pk=user.pk).exists() | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Group Membership Policy') | ||||
|         verbose_name_plural = _('Group Membership Policies') | ||||
|  | ||||
| class Invitation(UUIDModel): | ||||
|     """Single-use invitation link""" | ||||
|  | ||||
| @ -365,6 +415,7 @@ class Invitation(UUIDModel): | ||||
|     expires = models.DateTimeField(default=None, blank=True, null=True) | ||||
|     fixed_username = models.TextField(blank=True, default=None) | ||||
|     fixed_email = models.TextField(blank=True, default=None) | ||||
|     needs_confirmation = models.BooleanField(default=True) | ||||
|  | ||||
|     @property | ||||
|     def link(self): | ||||
| @ -378,3 +429,33 @@ class Invitation(UUIDModel): | ||||
|  | ||||
|         verbose_name = _('Invitation') | ||||
|         verbose_name_plural = _('Invitations') | ||||
|  | ||||
| class Nonce(UUIDModel): | ||||
|     """One-time link for password resets/sign-up-confirmations""" | ||||
|  | ||||
|     expires = models.DateTimeField(default=default_nonce_duration) | ||||
|     user = models.ForeignKey('User', on_delete=models.CASCADE) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Nonce %s (expires=%s)" % (self.uuid.hex, self.expires) | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Nonce') | ||||
|         verbose_name_plural = _('Nonces') | ||||
|  | ||||
| class PropertyMapping(UUIDModel): | ||||
|     """User-defined key -> x mapping which can be used by providers to expose extra data.""" | ||||
|  | ||||
|     name = models.TextField() | ||||
|  | ||||
|     form = '' | ||||
|     objects = InheritanceManager() | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Property Mapping %s" % self.name | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Property Mapping') | ||||
|         verbose_name_plural = _('Property Mappings') | ||||
|  | ||||
| @ -2,6 +2,7 @@ | ||||
| from logging import getLogger | ||||
|  | ||||
| from celery import group | ||||
| from ipware import get_client_ip | ||||
|  | ||||
| from passbook.core.celery import CELERY_APP | ||||
| from passbook.core.models import Policy, User | ||||
| @ -11,38 +12,85 @@ LOGGER = getLogger(__name__) | ||||
| @CELERY_APP.task() | ||||
| def _policy_engine_task(user_pk, policy_pk, **kwargs): | ||||
|     """Task wrapper to run policy checking""" | ||||
|     if not user_pk: | ||||
|         raise ValueError() | ||||
|     policy_obj = Policy.objects.filter(pk=policy_pk).select_subclasses().first() | ||||
|     user_obj = User.objects.get(pk=user_pk) | ||||
|     for key, value in kwargs.items(): | ||||
|         setattr(user_obj, key, value) | ||||
|     LOGGER.debug("Running policy `%s`#%s for user %s...", policy_obj.name, | ||||
|                  policy_obj.pk.hex, user_obj) | ||||
|     return policy_obj.passes(user_obj) | ||||
|     policy_result = policy_obj.passes(user_obj) | ||||
|     # Handle policy result correctly if result, message or just result | ||||
|     message = None | ||||
|     if isinstance(policy_result, (tuple, list)): | ||||
|         policy_result, message = policy_result | ||||
|     # Invert result if policy.negate is set | ||||
|     if policy_obj.negate: | ||||
|         policy_result = not policy_result | ||||
|     LOGGER.debug("Policy %r#%s got %s", policy_obj.name, policy_obj.pk.hex, policy_result) | ||||
|     return policy_obj.action, policy_result, message | ||||
|  | ||||
| class PolicyEngine: | ||||
|     """Orchestrate policy checking, launch tasks and return result""" | ||||
|  | ||||
|     policies = None | ||||
|     _group = None | ||||
|     _request = None | ||||
|     _user = None | ||||
|  | ||||
|     def __init__(self, policies): | ||||
|         self.policies = policies | ||||
|         self._request = None | ||||
|         self._user = None | ||||
|  | ||||
|     def for_user(self, user): | ||||
|         """Check policies for user""" | ||||
|         self._user = user | ||||
|         return self | ||||
|  | ||||
|     def with_request(self, request): | ||||
|         """Set request""" | ||||
|         self._request = request | ||||
|         return self | ||||
|  | ||||
|     def build(self): | ||||
|         """Build task group""" | ||||
|         if not self._user: | ||||
|             raise ValueError("User not set.") | ||||
|         signatures = [] | ||||
|         kwargs = { | ||||
|             '__password__': getattr(user, '__password__', None) | ||||
|             '__password__': getattr(self._user, '__password__', None), | ||||
|         } | ||||
|         if self._request: | ||||
|             kwargs['remote_ip'], _ = get_client_ip(self._request) | ||||
|             if not kwargs['remote_ip']: | ||||
|                 kwargs['remote_ip'] = '255.255.255.255' | ||||
|         for policy in self.policies: | ||||
|             signatures.append(_policy_engine_task.s(user.pk, policy.pk.hex, **kwargs)) | ||||
|             signatures.append(_policy_engine_task.s(self._user.pk, policy.pk.hex, **kwargs)) | ||||
|         self._group = group(signatures)() | ||||
|         return self | ||||
|  | ||||
|     @property | ||||
|     def result(self): | ||||
|         """Get policy-checking result""" | ||||
|         for policy_result in self._group.get(): | ||||
|             if policy_result is False: | ||||
|                 return False | ||||
|         return True | ||||
|         messages = [] | ||||
|         try: | ||||
|             # ValueError can be thrown from _policy_engine_task when user is None | ||||
|             group_result = self._group.get() | ||||
|         except ValueError as exc: | ||||
|             return False, str(exc) | ||||
|         for policy_action, policy_result, policy_message in group_result: | ||||
|             passing = (policy_action == Policy.ACTION_ALLOW and policy_result) or \ | ||||
|                       (policy_action == Policy.ACTION_DENY and not policy_result) | ||||
|             LOGGER.debug('Action=%s, Result=%r => %r', policy_action, policy_result, passing) | ||||
|             if policy_message: | ||||
|                 messages.append(policy_message) | ||||
|             if not passing: | ||||
|                 return False, messages | ||||
|         return True, messages | ||||
|  | ||||
|     @property | ||||
|     def passing(self): | ||||
|         """Only get true/false if user passes""" | ||||
|         return self.result[0] | ||||
|  | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	