Compare commits
	
		
			147 Commits
		
	
	
		
			version/0.
			...
			version/0.
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 4cf6c36f34 | |||
| 75a6f6c875 | |||
| 62abe3f256 | |||
| 9296c41650 | |||
| 7fb48fde6d | |||
| 174472bb45 | |||
| 17575ed921 | |||
| b1b1a27444 | |||
| f97a5eeefb | |||
| 10fd96981e | |||
| 67e3eb549c | |||
| 30a6d1f0b1 | |||
| 3d1fa9f048 | |||
| 1d2be6e68b | |||
| c21e343986 | |||
| ff37ed095c | |||
| 8623a2c3fc | |||
| 23d277eaf1 | |||
| 75ced59451 | |||
| bccf424c5e | |||
| 2f9ae40d20 | |||
| 11e1eec3fb | |||
| 765c5633df | |||
| 6344b1aafb | |||
| ed25801e6e | |||
| 4d0148193f | |||
| 804ae15c2e | |||
| b35a9fad86 | |||
| a4f83bd28a | |||
| 796f83c3d0 | |||
| 2099bbb713 | |||
| 67beba8f78 | |||
| a798412e17 | |||
| 3b2c2d781f | |||
| 98c844f3d6 | |||
| 2645bd0132 | |||
| 2c4fc56b49 | |||
| 0ec1468058 | |||
| 5d1a3043b2 | |||
| b46958d1f9 | |||
| 5daa8d5fe3 | |||
| 31846f1d05 | |||
| 1fac964b8b | |||
| dfa6ed8ac2 | |||
| 66fe10299e | |||
| e0a3ec033f | |||
| 7033ec0ab9 | |||
| 4004579905 | |||
| 9fe9e48a5c | |||
| 595a6c7fe6 | |||
| 11b5860d4a | |||
| 9bdbff4cda | |||
| e0d597eeac | |||
| f576985cc9 | |||
| 22a6aef60b | |||
| ec0a6e7854 | |||
| 6904608e6f | |||
| cb3732cb2b | |||
| 57de6cbafc | |||
| b1dda764a9 | |||
| 5ec2102487 | |||
| 9f8fb7378a | |||
| 98cd646044 | |||
| 0cba1b4c45 | |||
| 53918462b6 | |||
| 8a7e74b523 | |||
| 4dc7065e97 | |||
| 3c93bb9f9f | |||
| 8143fae2d6 | |||
| 3cfe45d3cb | |||
| 8e5c3f2f31 | |||
| 5a3b2fdd49 | |||
| e47b9f0d57 | |||
| 146dd747f1 | |||
| f2ce56063b | |||
| b26f378e4c | |||
| 9072b836c6 | |||
| 2fa57d064e | |||
| 146705c60a | |||
| 5029a99df6 | |||
| e7129d18f6 | |||
| d2bf9f81d6 | |||
| 30acf0660b | |||
| dda41af5c8 | |||
| 9b5b03647b | |||
| 940b3eb943 | |||
| 16eb629b71 | |||
| 755045b226 | |||
| 61478db94e | |||
| f69f959bdb | |||
| 146edb45d4 | |||
| 045a802365 | |||
| c90d8ddcff | |||
| 3ff2ec929f | |||
| a3ef26b7ad | |||
| 19cd1624c1 | |||
| 366ef352c6 | |||
| a9031a6abc | |||
| a1a5223b58 | |||
| c723b0233f | |||
| b369eb28f1 | |||
| 9b8f390e31 | |||
| 11630c9a74 | |||
| c9ac10f6f6 | |||
| 04d613cb28 | |||
| 40866f9ecd | |||
| d8585eb872 | |||
| 15aaeda475 | |||
| 8536ef9e23 | |||
| 35b6bb6b3f | |||
| eaa573c715 | |||
| 660972e303 | |||
| a21012bf0c | |||
| 8dbafa4bda | |||
| 80049413f0 | |||
| 2739442d4a | |||
| c679f0a67c | |||
| d9a952dd03 | |||
| 9a1a0f0aa8 | |||
| 4d6bb60134 | |||
| 80e6d59382 | |||
| 81ac951872 | |||
| f33e553cfd | |||
| 9b0240dc26 | |||
| c327310392 | |||
| 457375287c | |||
| 7e87bfef5b | |||
| a7af5268de | |||
| 6d916029bb | |||
| 81fdcbadad | |||
| ec1e25fe71 | |||
| b5306e4a94 | |||
| 801b8a1e59 | |||
| 3a52059793 | |||
| 10b7d99b37 | |||
| 6be8d0cbb2 | |||
| 5b8e3689ec | |||
| 25a5d8f5da | |||
| 883d439544 | |||
| 1c3b5889e5 | |||
| 87012b65e1 | |||
| 29913773a7 | |||
| 0bc6a4fed4 | |||
| 4645d8353f | |||
| 260c5555fa | |||
| ae3d3d0295 | |||
| c23ceacd0b | 
| @ -1,10 +1,10 @@ | ||||
| [bumpversion] | ||||
| current_version = 0.1.24-beta | ||||
| current_version = 0.2.7-beta | ||||
| tag = True | ||||
| commit = True | ||||
| parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*) | ||||
| serialize = {major}.{minor}.{patch}-{release} | ||||
| message = bump version: {current_version} -> {new_version} | ||||
| message = new release: {new_version} | ||||
| tag_name = version/{new_version} | ||||
|  | ||||
| [bumpversion:part:release] | ||||
| @ -15,10 +15,6 @@ values = | ||||
| 	beta | ||||
| 	stable | ||||
|  | ||||
| [bumpversion:file:client-packages/allauth/setup.py] | ||||
|  | ||||
| [bumpversion:file:client-packages/sentry-auth-passbook/setup.py] | ||||
|  | ||||
| [bumpversion:file:helm/passbook/values.yaml] | ||||
|  | ||||
| [bumpversion:file:helm/passbook/Chart.yaml] | ||||
| @ -27,29 +23,5 @@ values = | ||||
|  | ||||
| [bumpversion:file:passbook/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/api/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/core/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/admin/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/captcha_factor/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/oauth_client/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/ldap/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/lib/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/hibp_policy/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/password_expiry_policy/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/saml_idp/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/audit/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/oauth_provider/__init__.py] | ||||
|  | ||||
| [bumpversion:file:passbook/otp/__init__.py] | ||||
| [bumpversion:file:passbook/core/nginx.conf] | ||||
|  | ||||
|  | ||||
| @ -6,7 +6,6 @@ omit = | ||||
|     manage.py | ||||
|     */migrations/* | ||||
|     */apps.py | ||||
|     passbook/management/commands/nexus_upload.py | ||||
|     passbook/management/commands/web.py | ||||
|     passbook/management/commands/worker.py | ||||
|     docs/ | ||||
|  | ||||
| @ -9,3 +9,6 @@ insert_final_newline = true | ||||
|  | ||||
| [html] | ||||
| indent_size = 2 | ||||
|  | ||||
| [yaml] | ||||
| indent_size = 2 | ||||
|  | ||||
							
								
								
									
										187
									
								
								.gitlab-ci.yml
									
									
									
									
									
								
							
							
						
						
									
										187
									
								
								.gitlab-ci.yml
									
									
									
									
									
								
							| @ -1,155 +1,132 @@ | ||||
| # Global Variables | ||||
| before_script: | ||||
|     - "python3 -m pip install -U virtualenv" | ||||
|     - "virtualenv env" | ||||
|     - "source env/bin/activate" | ||||
|     - "pip3 install -U -r requirements-dev.txt" | ||||
| stages: | ||||
|   - build-base-image | ||||
|   - build-dev-image | ||||
|   - test | ||||
|   - build | ||||
|     - docs | ||||
|     - deploy | ||||
| image: python:3.6 | ||||
| services: | ||||
|     - postgres:latest | ||||
|   - package | ||||
| image: docker.beryju.org/passbook/dev:latest | ||||
|  | ||||
| variables: | ||||
|   POSTGRES_DB: passbook | ||||
|   POSTGRES_USER: passbook | ||||
|   POSTGRES_PASSWORD: "EK-5jnKfjrGRm<77" | ||||
|  | ||||
| include: | ||||
|     - /client-packages/allauth/.gitlab-ci.yml | ||||
| before_script: | ||||
|   # Ensure all dependencies are installed, even those not included in passbook/dev | ||||
|   - pip install -r requirements.txt | ||||
|   - pip install -r requirements-dev.txt | ||||
|  | ||||
| create-base-image: | ||||
|   image: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|     - echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile.base --destination docker.beryju.org/passbook/base:latest --destination docker.beryju.org/passbook/base:0.2.7-beta | ||||
|   stage: build-base-image | ||||
|   only: | ||||
|     refs: | ||||
|       - tags | ||||
|       - /^version/.*$/ | ||||
|  | ||||
| build-dev-image: | ||||
|   image: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|     - echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile.dev --destination docker.beryju.org/passbook/dev:latest --destination docker.beryju.org/passbook/dev:0.2.7-beta | ||||
|   stage: build-dev-image | ||||
|   only: | ||||
|     refs: | ||||
|       - tags | ||||
|       - /^version/.*$/ | ||||
|  | ||||
|  | ||||
| isort: | ||||
|   script: | ||||
|     - isort -c -sg env | ||||
|   stage: test | ||||
|   services: | ||||
|   - postgres:latest | ||||
|   - redis:latest | ||||
| migrations: | ||||
|   script: | ||||
|     - python manage.py migrate | ||||
|   stage: test | ||||
|   services: | ||||
|   - postgres:latest | ||||
|   - redis:latest | ||||
| prospector: | ||||
|   script: | ||||
|     - prospector | ||||
|   stage: test | ||||
|   services: | ||||
|   - postgres:latest | ||||
|   - redis:latest | ||||
| pylint: | ||||
|   script: | ||||
|     - pylint passbook | ||||
|   stage: test | ||||
|   services: | ||||
|   - postgres:latest | ||||
|   - redis:latest | ||||
| coverage: | ||||
|   script: | ||||
|     - coverage run manage.py test | ||||
|     - coverage report | ||||
|     - coverage html | ||||
|   stage: test | ||||
| bandit: | ||||
|     script: | ||||
|         - bandit -r passbook | ||||
|     stage: test | ||||
|   services: | ||||
|   - postgres:latest | ||||
|   - redis:latest | ||||
|  | ||||
| package-docker: | ||||
| package-passbook-server: | ||||
|   image: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|         - echo "{\"auths\":{\"docker.$NEXUS_URL\":{\"auth\":\"$NEXUS_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|     - echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|         - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.pkg.beryju.org/passbook:latest --destination docker.pkg.beryju.org/passbook:0.1.24-beta | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.beryju.org/passbook/server:latest --destination docker.beryju.org/passbook/server:0.2.7-beta | ||||
|   stage: build | ||||
|   only: | ||||
|     - tags | ||||
|     - /^version/.*$/ | ||||
| package-helm: | ||||
| build-passbook-static: | ||||
|   stage: build | ||||
|     script: | ||||
|         - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
|         - helm init --client-only | ||||
|         - helm package helm/passbook | ||||
|         - ./manage.py nexus_upload --method put --url $NEXUS_URL --auth $NEXUS_AUTH --repo helm *.tgz | ||||
|     only: | ||||
|         - tags | ||||
|         - /^version/.*$/ | ||||
| package-debian: | ||||
|   image: | ||||
|     name: gcr.io/kaniko-project/executor:debug | ||||
|     entrypoint: [""] | ||||
|   before_script: | ||||
|         - apt update | ||||
|         - apt install -y --no-install-recommends build-essential debhelper devscripts equivs python3 python3-dev python3-pip libsasl2-dev libldap2-dev | ||||
|         - mk-build-deps debian/control | ||||
|         - apt install ./*build-deps*deb -f -y | ||||
|         - python3 -m pip install -U virtualenv pip | ||||
|         - virtualenv env | ||||
|         - source env/bin/activate | ||||
|         - pip3 install -U -r requirements.txt -r requirements-dev.txt | ||||
|         - ./manage.py collectstatic --no-input | ||||
|     image: ubuntu:18.04 | ||||
|     - echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json | ||||
|   script: | ||||
|         - debuild -us -uc | ||||
|         - cp ../passbook*.deb . | ||||
|         - ./manage.py nexus_upload --method post --url $NEXUS_URL --auth $NEXUS_AUTH --repo apt passbook*deb | ||||
|     - /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile.static --destination docker.beryju.org/passbook/static:latest --destination docker.beryju.org/passbook/static:0.2.7-beta | ||||
|   only: | ||||
|     - tags | ||||
|     - /^version/.*$/ | ||||
|   # running collectstatic fully initialises django, hence we need that databases | ||||
|   services: | ||||
|     - postgres:latest | ||||
|     - redis:latest | ||||
|  | ||||
| package-helm: | ||||
|   image: debian:stretch-slim | ||||
|   stage: package | ||||
|   before_script: | ||||
|     - apt update && apt install -y curl | ||||
|     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
|   script: | ||||
|     - helm init --client-only | ||||
|     - helm dependency build helm/passbook | ||||
|     - helm package helm/passbook | ||||
|   artifacts: | ||||
|     paths: | ||||
|             - passbook*deb | ||||
|         expire_in: 2 days | ||||
|     stage: build | ||||
|       - passbook-*.tgz | ||||
|     expire_in: 1 week | ||||
|   only: | ||||
|     - tags | ||||
|     - /^version/.*$/ | ||||
|  | ||||
| package-client-package-allauth: | ||||
|     script: | ||||
|         - cd client-packages/allauth | ||||
|         - python setup.py sdist | ||||
|         - twine upload --username $TWINE_USERNAME --password $TWINE_PASSWORD dist/* | ||||
|     stage: build | ||||
|     only: | ||||
|         refs: | ||||
|             - tags | ||||
|             - /^version/.*$/ | ||||
|         changes: | ||||
|             - client-packages/allauth/** | ||||
|  | ||||
| package-client-package-sentry: | ||||
|     script: | ||||
|         - cd client-packages/sentry-auth-passbook | ||||
|         - python setup.py sdist | ||||
|         - twine upload --username $TWINE_USERNAME --password $TWINE_PASSWORD dist/* | ||||
|     stage: build | ||||
|     only: | ||||
|         refs: | ||||
|             - tags | ||||
|             - /^version/.*$/ | ||||
|         changes: | ||||
|             - client-packages/sentry-auth-passbook/** | ||||
|  | ||||
| # docs: | ||||
| #   stage: docs | ||||
| #   only: | ||||
| #   - master | ||||
| #   - tags | ||||
| #   - /^debian/.*$/ | ||||
| #   environment: | ||||
| #     name: docs | ||||
| #     url: "https://passbook.beryju.org/docs/" | ||||
| #   script: | ||||
| #     - apt update | ||||
| #     - apt install -y rsync | ||||
| #     - "mkdir ~/.ssh" | ||||
| #     - "cp .gitlab/known_hosts ~/.ssh/" | ||||
| #     - "pip3 install -U -r requirements-docs.txt" | ||||
| #     - "eval $(ssh-agent -s)" | ||||
| #     - "echo \"${CI_SSH_PRIVATE}\" | ssh-add -" | ||||
| #     - mkdocs build | ||||
| #     - 'rsync -avh --delete web/* "beryjuorg@ory1-web-prod-1.ory1.beryju.org:passbook.beryju.org/"' | ||||
| #     - 'rsync -avh --delete site/* "beryjuorg@ory1-web-prod-1.ory1.beryju.org:passbook.beryju.org/docs/"' | ||||
|  | ||||
| # deploy: | ||||
| #   environment: | ||||
| #     name: production | ||||
| #     url: https://passbook-prod.default.k8s.beryju.org/ | ||||
| #   stage: deploy | ||||
| #   only: | ||||
| #   - tags | ||||
| #   - /^version/.*$/ | ||||
| #   script: | ||||
| #     - curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash | ||||
| #     - helm init | ||||
| #     - helm upgrade passbook-prod helm/passbook --devel | ||||
|  | ||||
							
								
								
									
										3
									
								
								.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							| @ -4,6 +4,9 @@ | ||||
|   "[html]": { | ||||
|     "editor.tabSize": 2 | ||||
|   }, | ||||
|   "[yml]": { | ||||
|     "editor.tabSize": 2 | ||||
|   }, | ||||
|   "cSpell.words": [ | ||||
|     "SAML", | ||||
|     "passbook" | ||||
|  | ||||
							
								
								
									
										32
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										32
									
								
								Dockerfile
									
									
									
									
									
								
							| @ -1,34 +1,8 @@ | ||||
| FROM python:3.6-slim-stretch as build | ||||
| FROM docker.beryju.org/passbook/base:latest | ||||
|  | ||||
| COPY ./passbook/ /app/passbook | ||||
| COPY ./manage.py /app/ | ||||
| COPY ./requirements.txt /app/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||
|     mkdir /app/static/ && \ | ||||
|     pip install -r requirements.txt && \ | ||||
|     pip install psycopg2 && \ | ||||
|     ./manage.py collectstatic --no-input && \ | ||||
|     apt-get remove --purge -y build-essential && \ | ||||
|     apt-get autoremove --purge -y | ||||
|  | ||||
| FROM python:3.6-slim-stretch | ||||
|  | ||||
| COPY ./passbook/ /app/passbook | ||||
| COPY ./manage.py /app/ | ||||
| COPY ./requirements.txt /app/ | ||||
| COPY --from=build /app/static /app/static/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN apt-get update && apt-get install build-essential libssl-dev libffi-dev -y && \ | ||||
|     pip install -r requirements.txt && \ | ||||
|     pip install psycopg2 && \ | ||||
|     adduser --system --home /app/ passbook && \ | ||||
|     chown -R passbook /app/ && \ | ||||
|     apt-get remove --purge -y build-essential && \ | ||||
|     apt-get autoremove --purge -y | ||||
|  | ||||
| USER passbook | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
							
								
								
									
										11
									
								
								Dockerfile.base
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								Dockerfile.base
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,11 @@ | ||||
| FROM python:3.7-alpine | ||||
|  | ||||
| COPY ./requirements.txt /app/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN apk update && \ | ||||
|     apk add --no-cache openssl-dev build-base libxml2-dev libxslt-dev libffi-dev gcc musl-dev libgcc zlib-dev postgresql-dev && \ | ||||
|     pip install -r /app/requirements.txt  --no-cache-dir && \ | ||||
|     adduser -S passbook && \ | ||||
|     chown -R passbook /app | ||||
							
								
								
									
										5
									
								
								Dockerfile.dev
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								Dockerfile.dev
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,5 @@ | ||||
| FROM docker.beryju.org/passbook/base:latest | ||||
|  | ||||
| COPY ./requirements-dev.txt /app/ | ||||
|  | ||||
| RUN pip install -r /app/requirements-dev.txt  --no-cache-dir | ||||
							
								
								
									
										14
									
								
								Dockerfile.static
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								Dockerfile.static
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,14 @@ | ||||
| FROM docker.beryju.org/passbook/dev:latest as static-build | ||||
|  | ||||
| COPY ./passbook/ /app/passbook | ||||
| COPY ./manage.py /app/ | ||||
| COPY ./requirements.txt /app/ | ||||
|  | ||||
| WORKDIR /app/ | ||||
|  | ||||
| RUN ./manage.py collectstatic --no-input | ||||
|  | ||||
| FROM nginx:latest | ||||
|  | ||||
| COPY --from=static-build /app/static /static/_/static/ | ||||
| COPY ./passbook/core/nginx.conf /etc/nginx/nginx.conf | ||||
							
								
								
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							| @ -1,6 +1,6 @@ | ||||
| MIT License | ||||
|  | ||||
| Copyright (c) 2018 BeryJu.org | ||||
| Copyright (c) 2019 BeryJu.org | ||||
|  | ||||
| Permission is hereby granted, free of charge, to any person obtaining a copy | ||||
| of this software and associated documentation files (the "Software"), to deal | ||||
|  | ||||
| @ -1,27 +0,0 @@ | ||||
| # Global Variables | ||||
| before_script: | ||||
|   - cd allauth/ | ||||
|   - "python3 -m pip install -U virtualenv" | ||||
|   - "virtualenv env" | ||||
|   - "source env/bin/activate" | ||||
|   - "pip3 install -U -r requirements-dev.txt" | ||||
| stages: | ||||
|   - test-allauth | ||||
| image: python:3.6 | ||||
|  | ||||
| isort: | ||||
|   script: | ||||
|     - isort -c -sg env | ||||
|   stage: test-allauth | ||||
| prospector: | ||||
|   script: | ||||
|     - prospector | ||||
|   stage: test-allauth | ||||
| pylint: | ||||
|   script: | ||||
|     - pylint passbook | ||||
|   stage: test-allauth | ||||
| bandit: | ||||
|   script: | ||||
|     - bandit -r allauth_passbook | ||||
|   stage: test-allauth | ||||
| @ -1,35 +0,0 @@ | ||||
| """passbook provider""" | ||||
| from allauth.socialaccount.providers.base import ProviderAccount | ||||
| from allauth.socialaccount.providers.oauth2.provider import OAuth2Provider | ||||
|  | ||||
|  | ||||
| class PassbookAccount(ProviderAccount): | ||||
|     """passbook account""" | ||||
|  | ||||
|     def to_str(self): | ||||
|         dflt = super().to_str() | ||||
|         return self.account.extra_data.get('username', dflt) | ||||
|  | ||||
|  | ||||
| class PassbookProvider(OAuth2Provider): | ||||
|     """passbook provider""" | ||||
|  | ||||
|     id = 'passbook' | ||||
|     name = 'passbook' | ||||
|     account_class = PassbookAccount | ||||
|  | ||||
|     def extract_uid(self, data): | ||||
|         return str(data['sub']) | ||||
|  | ||||
|     def extract_common_fields(self, data): | ||||
|         return { | ||||
|             'email': data.get('email'), | ||||
|             'username': data.get('preferred_username'), | ||||
|             'name': data.get('name'), | ||||
|         } | ||||
|  | ||||
|     def get_default_scope(self): | ||||
|         return ['openid:userinfo'] | ||||
|  | ||||
|  | ||||
| provider_classes = [PassbookProvider] # noqa | ||||
| @ -1,6 +0,0 @@ | ||||
| """passbook provider""" | ||||
| from allauth.socialaccount.providers.oauth2.urls import default_urlpatterns | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
| urlpatterns = default_urlpatterns(PassbookProvider) | ||||
| @ -1,37 +0,0 @@ | ||||
| """passbook adapter""" | ||||
| import requests | ||||
| from allauth.socialaccount import app_settings | ||||
| from allauth.socialaccount.providers.oauth2.views import (OAuth2Adapter, | ||||
|                                                           OAuth2CallbackView, | ||||
|                                                           OAuth2LoginView) | ||||
|  | ||||
| from allauth_passbook.provider import PassbookProvider | ||||
|  | ||||
|  | ||||
| class PassbookOAuth2Adapter(OAuth2Adapter): | ||||
|     """passbook OAuth2 Adapter""" | ||||
|     provider_id = PassbookProvider.id | ||||
|     # pylint: disable=no-member | ||||
|     settings = app_settings.PROVIDERS.get(provider_id, {}) # noqa | ||||
|     provider_base_url = settings.get("PASSBOOK_URL", 'https://id.beryju.org') | ||||
|  | ||||
|     access_token_url = '{0}/application/oauth/token/'.format(provider_base_url) | ||||
|     authorize_url = '{0}/application/oauth/authorize/'.format(provider_base_url) | ||||
|     profile_url = '{0}/api/v1/openid/'.format( | ||||
|         provider_base_url) | ||||
|  | ||||
|     def complete_login(self, request, app, access_token, **kwargs): | ||||
|         headers = { | ||||
|             'Authorization': 'Bearer {0}'.format(access_token.token), | ||||
|             'Content-Type': 'application/json', | ||||
|         } | ||||
|         extra_data = requests.get(self.profile_url, headers=headers) | ||||
|  | ||||
|         return self.get_provider().sociallogin_from_response( | ||||
|             request, | ||||
|             extra_data.json() | ||||
|         ) | ||||
|  | ||||
|  | ||||
| oauth2_login = OAuth2LoginView.adapter_view(PassbookOAuth2Adapter) # noqa | ||||
| oauth2_callback = OAuth2CallbackView.adapter_view(PassbookOAuth2Adapter) # noqa | ||||
| @ -1 +0,0 @@ | ||||
| django-allauth | ||||
| @ -1,33 +0,0 @@ | ||||
| """passbook allauth setup.py""" | ||||
| from setuptools import setup | ||||
|  | ||||
| setup( | ||||
|     name='django-allauth-passbook', | ||||
|     version='0.1.24-beta', | ||||
|     description='passbook support for django-allauth', | ||||
|     # long_description='\n'.join(read_simple('docs/index.md')[2:]), | ||||
|     long_description_content_type='text/markdown', | ||||
|     author='BeryJu.org', | ||||
|     author_email='hello@beryju.org', | ||||
|     packages=['allauth_passbook'], | ||||
|     include_package_data=True, | ||||
|     install_requires=['django-allauth'], | ||||
|     keywords='django allauth passbook', | ||||
|     license='MIT', | ||||
|     classifiers=[ | ||||
|         'Intended Audience :: Developers', | ||||
|         'Topic :: Software Development :: Libraries :: Python Modules', | ||||
|         'Environment :: Web Environment', | ||||
|         'Topic :: Internet', | ||||
|         'License :: OSI Approved :: MIT License', | ||||
|         'Operating System :: OS Independent', | ||||
|         'Programming Language :: Python', | ||||
|         'Programming Language :: Python :: 3.4', | ||||
|         'Programming Language :: Python :: 3.5', | ||||
|         'Programming Language :: Python :: 3.6', | ||||
|         'Framework :: Django', | ||||
|         'Framework :: Django :: 1.11', | ||||
|         'Framework :: Django :: 2.0', | ||||
|         'Framework :: Django :: 2.1', | ||||
|     ], | ||||
| ) | ||||
| @ -1,5 +0,0 @@ | ||||
| *.pyc | ||||
| *.egg-info/ | ||||
| *.eggs | ||||
| /dist | ||||
| /build | ||||
| @ -1,32 +0,0 @@ | ||||
| sudo: false | ||||
| language: python | ||||
| services: | ||||
|   - memcached | ||||
|   - postgresql | ||||
|   - redis-server | ||||
| python: | ||||
|   - '2.7' | ||||
| cache: | ||||
|   directories: | ||||
|     - node_modules | ||||
|     - "$HOME/.cache/pip" | ||||
| deploy: | ||||
|   provider: pypi | ||||
|   user: getsentry | ||||
|   password: | ||||
|     secure: kVmxKHkBWRLYyZme05p+WZSJmb8GjHV9uyuaSCVMRlqWCW+GXRB7P1xXR2jb9URTlNdcs56Ab/UrwzCbMFGC8LmwCeFVgIR/ltytVZG2FgXZPWaeA4dH25qK2oGWgzJ/xeiMpmuJqN9hRl25MX6jG7FZKvrrOkG7+8tpPd1yO+uYWZQbnebZMjcPBqEpn7CC0hR39GSoyVAbydpMe5hwENGQM26CepcicdrelfawItoUrXrkJzBHkIQQTO/xRSbCtRJOtzI5lwtv3GP0hcbOy5tI5dhG/93pLwZRc5+dZaCaP7oaVeOcBjN0zfINRQobt8d6h2Qgvd/YyFkGi0/xKn1zMmKIVLOG6VsYwEAUq8wNOsP4A/jdm4Y0J/1oEZStCkpaGpx85TYi4kq1hWQdyqaVJSPhh4Tk4roIaS2zOYQl+nIpbHqmJ4FJrg1il+TCdjBXobATQ1mKRBUrjD+RDzH/r4ogbd8+UwvvvevpqS2K+/wgT6UD0MzDInv9S29CUQvuFhPoqyJb5XRddHMRE9EEK/2Z8tFN91sDATnqfXHgwnvu00q/nKP5JnijBPzGmx7ydgUViIukklDrlPvo9BbRJz0Vr2vbAvMTrLMLCXqi5CwTm+v+iaOf/YaCziaG2vx0eVASYjpOLCedSgRZBubPM8z4E/HMXhChN7sVDWk= | ||||
|   on: | ||||
|     tags: true | ||||
|   distributions: sdist bdist_wheel | ||||
| env: | ||||
|   global: | ||||
|     - PIP_DOWNLOAD_CACHE=".pip_download_cache" | ||||
| before_install: | ||||
|   - pip install codecov | ||||
| install: | ||||
|   - make develop | ||||
| script: | ||||
|   - PYFLAKES_NODOCTEST=1 flake8 | ||||
|   - coverage run --source=. -m py.test tests | ||||
| after_success: | ||||
|   - codecov | ||||
| @ -1,201 +0,0 @@ | ||||
|                               Apache License | ||||
|                         Version 2.0, January 2004 | ||||
|                      http://www.apache.org/licenses/ | ||||
|  | ||||
| TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION | ||||
|  | ||||
| 1. Definitions. | ||||
|  | ||||
|    "License" shall mean the terms and conditions for use, reproduction, | ||||
|    and distribution as defined by Sections 1 through 9 of this document. | ||||
|  | ||||
|    "Licensor" shall mean the copyright owner or entity authorized by | ||||
|    the copyright owner that is granting the License. | ||||
|  | ||||
|    "Legal Entity" shall mean the union of the acting entity and all | ||||
|    other entities that control, are controlled by, or are under common | ||||
|    control with that entity. For the purposes of this definition, | ||||
|    "control" means (i) the power, direct or indirect, to cause the | ||||
|    direction or management of such entity, whether by contract or | ||||
|    otherwise, or (ii) ownership of fifty percent (50%) or more of the | ||||
|    outstanding shares, or (iii) beneficial ownership of such entity. | ||||
|  | ||||
|    "You" (or "Your") shall mean an individual or Legal Entity | ||||
|    exercising permissions granted by this License. | ||||
|  | ||||
|    "Source" form shall mean the preferred form for making modifications, | ||||
|    including but not limited to software source code, documentation | ||||
|    source, and configuration files. | ||||
|  | ||||
|    "Object" form shall mean any form resulting from mechanical | ||||
|    transformation or translation of a Source form, including but | ||||
|    not limited to compiled object code, generated documentation, | ||||
|    and conversions to other media types. | ||||
|  | ||||
|    "Work" shall mean the work of authorship, whether in Source or | ||||
|    Object form, made available under the License, as indicated by a | ||||
|    copyright notice that is included in or attached to the work | ||||
|    (an example is provided in the Appendix below). | ||||
|  | ||||
|    "Derivative Works" shall mean any work, whether in Source or Object | ||||
|    form, that is based on (or derived from) the Work and for which the | ||||
|    editorial revisions, annotations, elaborations, or other modifications | ||||
|    represent, as a whole, an original work of authorship. For the purposes | ||||
|    of this License, Derivative Works shall not include works that remain | ||||
|    separable from, or merely link (or bind by name) to the interfaces of, | ||||
|    the Work and Derivative Works thereof. | ||||
|  | ||||
|    "Contribution" shall mean any work of authorship, including | ||||
|    the original version of the Work and any modifications or additions | ||||
|    to that Work or Derivative Works thereof, that is intentionally | ||||
|    submitted to Licensor for inclusion in the Work by the copyright owner | ||||
|    or by an individual or Legal Entity authorized to submit on behalf of | ||||
|    the copyright owner. For the purposes of this definition, "submitted" | ||||
|    means any form of electronic, verbal, or written communication sent | ||||
|    to the Licensor or its representatives, including but not limited to | ||||
|    communication on electronic mailing lists, source code control systems, | ||||
|    and issue tracking systems that are managed by, or on behalf of, the | ||||
|    Licensor for the purpose of discussing and improving the Work, but | ||||
|    excluding communication that is conspicuously marked or otherwise | ||||
|    designated in writing by the copyright owner as "Not a Contribution." | ||||
|  | ||||
|    "Contributor" shall mean Licensor and any individual or Legal Entity | ||||
|    on behalf of whom a Contribution has been received by Licensor and | ||||
|    subsequently incorporated within the Work. | ||||
|  | ||||
| 2. Grant of Copyright License. Subject to the terms and conditions of | ||||
|    this License, each Contributor hereby grants to You a perpetual, | ||||
|    worldwide, non-exclusive, no-charge, royalty-free, irrevocable | ||||
|    copyright license to reproduce, prepare Derivative Works of, | ||||
|    publicly display, publicly perform, sublicense, and distribute the | ||||
|    Work and such Derivative Works in Source or Object form. | ||||
|  | ||||
| 3. Grant of Patent License. Subject to the terms and conditions of | ||||
|    this License, each Contributor hereby grants to You a perpetual, | ||||
|    worldwide, non-exclusive, no-charge, royalty-free, irrevocable | ||||
|    (except as stated in this section) patent license to make, have made, | ||||
|    use, offer to sell, sell, import, and otherwise transfer the Work, | ||||
|    where such license applies only to those patent claims licensable | ||||
|    by such Contributor that are necessarily infringed by their | ||||
|    Contribution(s) alone or by combination of their Contribution(s) | ||||
|    with the Work to which such Contribution(s) was submitted. If You | ||||
|    institute patent litigation against any entity (including a | ||||
|    cross-claim or counterclaim in a lawsuit) alleging that the Work | ||||
|    or a Contribution incorporated within the Work constitutes direct | ||||
|    or contributory patent infringement, then any patent licenses | ||||
|    granted to You under this License for that Work shall terminate | ||||
|    as of the date such litigation is filed. | ||||
|  | ||||
| 4. Redistribution. You may reproduce and distribute copies of the | ||||
|    Work or Derivative Works thereof in any medium, with or without | ||||
|    modifications, and in Source or Object form, provided that You | ||||
|    meet the following conditions: | ||||
|  | ||||
|    (a) You must give any other recipients of the Work or | ||||
|        Derivative Works a copy of this License; and | ||||
|  | ||||
|    (b) You must cause any modified files to carry prominent notices | ||||
|        stating that You changed the files; and | ||||
|  | ||||
|    (c) You must retain, in the Source form of any Derivative Works | ||||
|        that You distribute, all copyright, patent, trademark, and | ||||
|        attribution notices from the Source form of the Work, | ||||
|        excluding those notices that do not pertain to any part of | ||||
|        the Derivative Works; and | ||||
|  | ||||
|    (d) If the Work includes a "NOTICE" text file as part of its | ||||
|        distribution, then any Derivative Works that You distribute must | ||||
|        include a readable copy of the attribution notices contained | ||||
|        within such NOTICE file, excluding those notices that do not | ||||
|        pertain to any part of the Derivative Works, in at least one | ||||
|        of the following places: within a NOTICE text file distributed | ||||
|        as part of the Derivative Works; within the Source form or | ||||
|        documentation, if provided along with the Derivative Works; or, | ||||
|        within a display generated by the Derivative Works, if and | ||||
|        wherever such third-party notices normally appear. The contents | ||||
|        of the NOTICE file are for informational purposes only and | ||||
|        do not modify the License. You may add Your own attribution | ||||
|        notices within Derivative Works that You distribute, alongside | ||||
|        or as an addendum to the NOTICE text from the Work, provided | ||||
|        that such additional attribution notices cannot be construed | ||||
|        as modifying the License. | ||||
|  | ||||
|    You may add Your own copyright statement to Your modifications and | ||||
|    may provide additional or different license terms and conditions | ||||
|    for use, reproduction, or distribution of Your modifications, or | ||||
|    for any such Derivative Works as a whole, provided Your use, | ||||
|    reproduction, and distribution of the Work otherwise complies with | ||||
|    the conditions stated in this License. | ||||
|  | ||||
| 5. Submission of Contributions. Unless You explicitly state otherwise, | ||||
|    any Contribution intentionally submitted for inclusion in the Work | ||||
|    by You to the Licensor shall be under the terms and conditions of | ||||
|    this License, without any additional terms or conditions. | ||||
|    Notwithstanding the above, nothing herein shall supersede or modify | ||||
|    the terms of any separate license agreement you may have executed | ||||
|    with Licensor regarding such Contributions. | ||||
|  | ||||
| 6. Trademarks. This License does not grant permission to use the trade | ||||
|    names, trademarks, service marks, or product names of the Licensor, | ||||
|    except as required for reasonable and customary use in describing the | ||||
|    origin of the Work and reproducing the content of the NOTICE file. | ||||
|  | ||||
| 7. Disclaimer of Warranty. Unless required by applicable law or | ||||
|    agreed to in writing, Licensor provides the Work (and each | ||||
|    Contributor provides its Contributions) on an "AS IS" BASIS, | ||||
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or | ||||
|    implied, including, without limitation, any warranties or conditions | ||||
|    of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A | ||||
|    PARTICULAR PURPOSE. You are solely responsible for determining the | ||||
|    appropriateness of using or redistributing the Work and assume any | ||||
|    risks associated with Your exercise of permissions under this License. | ||||
|  | ||||
| 8. Limitation of Liability. In no event and under no legal theory, | ||||
|    whether in tort (including negligence), contract, or otherwise, | ||||
|    unless required by applicable law (such as deliberate and grossly | ||||
|    negligent acts) or agreed to in writing, shall any Contributor be | ||||
|    liable to You for damages, including any direct, indirect, special, | ||||
|    incidental, or consequential damages of any character arising as a | ||||
|    result of this License or out of the use or inability to use the | ||||
|    Work (including but not limited to damages for loss of goodwill, | ||||
|    work stoppage, computer failure or malfunction, or any and all | ||||
|    other commercial damages or losses), even if such Contributor | ||||
|    has been advised of the possibility of such damages. | ||||
|  | ||||
| 9. Accepting Warranty or Additional Liability. While redistributing | ||||
|    the Work or Derivative Works thereof, You may choose to offer, | ||||
|    and charge a fee for, acceptance of support, warranty, indemnity, | ||||
|    or other liability obligations and/or rights consistent with this | ||||
|    License. However, in accepting such obligations, You may act only | ||||
|    on Your own behalf and on Your sole responsibility, not on behalf | ||||
|    of any other Contributor, and only if You agree to indemnify, | ||||
|    defend, and hold each Contributor harmless for any liability | ||||
|    incurred by, or claims asserted against, such Contributor by reason | ||||
|    of your accepting any such warranty or additional liability. | ||||
|  | ||||
| END OF TERMS AND CONDITIONS | ||||
|  | ||||
| APPENDIX: How to apply the Apache License to your work. | ||||
|  | ||||
|    To apply the Apache License to your work, attach the following | ||||
|    boilerplate notice, with the fields enclosed by brackets "[]" | ||||
|    replaced with your own identifying information. (Don't include | ||||
|    the brackets!)  The text should be enclosed in the appropriate | ||||
|    comment syntax for the file format. We also recommend that a | ||||
|    file or class name and description of purpose be included on the | ||||
|    same "printed page" as the copyright notice for easier | ||||
|    identification within third-party archives. | ||||
|  | ||||
| Copyright 2016 Functional Software, Inc. | ||||
|  | ||||
| Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| you may not use this file except in compliance with the License. | ||||
| You may obtain a copy of the License at | ||||
|  | ||||
|     http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
| Unless required by applicable law or agreed to in writing, software | ||||
| distributed under the License is distributed on an "AS IS" BASIS, | ||||
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| See the License for the specific language governing permissions and | ||||
| limitations under the License. | ||||
| @ -1,3 +0,0 @@ | ||||
| include setup.py package.json webpack.config.js README.rst MANIFEST.in LICENSE AUTHORS | ||||
| recursive-include sentry_auth_supervisr/templates * | ||||
| global-exclude *~ | ||||
| @ -1,26 +0,0 @@ | ||||
| .PHONY: clean develop install-tests lint publish test | ||||
|  | ||||
| develop: | ||||
| 	pip install "pip>=7" | ||||
| 	pip install -e . | ||||
| 	make install-tests | ||||
|  | ||||
| install-tests: | ||||
| 	pip install .[tests] | ||||
|  | ||||
| lint: | ||||
| 	@echo "--> Linting python" | ||||
| 	flake8 | ||||
| 	@echo "" | ||||
|  | ||||
| test: | ||||
| 	@echo "--> Running Python tests" | ||||
| 	py.test tests || exit 1 | ||||
| 	@echo "" | ||||
|  | ||||
| publish: | ||||
| 	python setup.py sdist bdist_wheel upload | ||||
|  | ||||
| clean: | ||||
| 	rm -rf *.egg-info src/*.egg-info | ||||
| 	rm -rf dist build | ||||
| @ -1,55 +0,0 @@ | ||||
| GitHub Auth for Sentry | ||||
| ====================== | ||||
|  | ||||
| An SSO provider for Sentry which enables GitHub organization-restricted authentication. | ||||
|  | ||||
| Install | ||||
| ------- | ||||
|  | ||||
| :: | ||||
|  | ||||
|     $ pip install https://github.com/getsentry/sentry-auth-github/archive/master.zip | ||||
|  | ||||
| Setup | ||||
| ----- | ||||
|  | ||||
| Create a new application under your organization in GitHub. Enter the **Authorization | ||||
| callback URL** as the prefix to your Sentry installation: | ||||
|  | ||||
| :: | ||||
|  | ||||
|     https://example.sentry.com | ||||
|  | ||||
|  | ||||
| Once done, grab your API keys and drop them in your ``sentry.conf.py``: | ||||
|  | ||||
| .. code-block:: python | ||||
|  | ||||
|     GITHUB_APP_ID = "" | ||||
|  | ||||
|     GITHUB_API_SECRET = "" | ||||
|  | ||||
|  | ||||
| Verified email addresses can optionally be required: | ||||
|  | ||||
| .. code-block:: python | ||||
|  | ||||
|     GITHUB_REQUIRE_VERIFIED_EMAIL = True | ||||
|  | ||||
|  | ||||
| Optionally you may also specify the domain (for GHE users): | ||||
|  | ||||
| .. code-block:: python | ||||
|  | ||||
|     GITHUB_BASE_DOMAIN = "git.example.com" | ||||
|  | ||||
|     GITHUB_API_DOMAIN = "api.git.example.com" | ||||
|  | ||||
|  | ||||
| If Subdomain isolation is disabled in GHE: | ||||
|  | ||||
| .. code-block:: python | ||||
|  | ||||
|     GITHUB_BASE_DOMAIN = "git.example.com" | ||||
|  | ||||
|     GITHUB_API_DOMAIN = "git.example.com/api/v3" | ||||
| @ -1,14 +0,0 @@ | ||||
| from __future__ import absolute_import | ||||
|  | ||||
| # Run tests against sqlite for simplicity | ||||
| import os | ||||
| import os.path | ||||
| import sys | ||||
|  | ||||
| sys.path.insert(0, os.path.join(os.path.dirname(__file__))) | ||||
|  | ||||
| os.environ.setdefault('DB', 'sqlite') | ||||
|  | ||||
| pytest_plugins = [ | ||||
|     'sentry.utils.pytest' | ||||
| ] | ||||
| @ -1,7 +0,0 @@ | ||||
| from __future__ import absolute_import | ||||
|  | ||||
| from sentry.auth import register | ||||
|  | ||||
| from .provider import PassbookOAuth2Provider | ||||
|  | ||||
| register('passbook', PassbookOAuth2Provider) | ||||
| @ -1,45 +0,0 @@ | ||||
| from __future__ import absolute_import, print_function | ||||
|  | ||||
| from requests.exceptions import RequestException | ||||
|  | ||||
| from sentry import http | ||||
| from sentry.utils import json | ||||
|  | ||||
| from .constants import BASE_DOMAIN | ||||
|  | ||||
|  | ||||
| class PassbookApiError(Exception): | ||||
|     def __init__(self, message='', status=0): | ||||
|         super(PassbookApiError, self).__init__(message) | ||||
|         self.status = status | ||||
|  | ||||
|  | ||||
| class PassbookClient(object): | ||||
|     def __init__(self, client_id, client_secret): | ||||
|         self.client_id = client_id | ||||
|         self.client_secret = client_secret | ||||
|         self.http = http.build_session() | ||||
|  | ||||
|     def _request(self, path, access_token): | ||||
|         params = { | ||||
|             'client_id': self.client_id, | ||||
|             'client_secret': self.client_secret, | ||||
|         } | ||||
|  | ||||
|         headers = { | ||||
|             'Authorization': 'Bearer {0}'.format(access_token), | ||||
|         } | ||||
|  | ||||
|         try: | ||||
|             req = self.http.get('https://{0}/{1}'.format(BASE_DOMAIN, path.lstrip('/')), | ||||
|                 params=params, | ||||
|                 headers=headers, | ||||
|             ) | ||||
|         except RequestException as e: | ||||
|             raise PassbookApiError(unicode(e), status=getattr(e, 'status_code', 0)) | ||||
|         if req.status_code < 200 or req.status_code >= 300: | ||||
|             raise PassbookApiError(req.content, status=req.status_code) | ||||
|         return json.loads(req.content) | ||||
|  | ||||
|     def get_user(self, access_token): | ||||
|         return self._request('/api/v1/openid/', access_token) | ||||
| @ -1,14 +0,0 @@ | ||||
| from __future__ import absolute_import, print_function | ||||
|  | ||||
| from django.conf import settings | ||||
|  | ||||
| CLIENT_ID = getattr(settings, 'PASSBOOK_APP_ID', None) | ||||
|  | ||||
| CLIENT_SECRET = getattr(settings, 'PASSBOOK_API_SECRET', None) | ||||
|  | ||||
| SCOPE = 'openid:userinfo' | ||||
|  | ||||
| BASE_DOMAIN = getattr(settings, 'PASSBOOK_BASE_DOMAIN', 'id.beryju.org') | ||||
|  | ||||
| ACCESS_TOKEN_URL = 'https://{0}/application/oauth/token/'.format(BASE_DOMAIN) | ||||
| AUTHORIZE_URL = 'https://{0}/application/oauth/authorize/'.format(BASE_DOMAIN) | ||||
| @ -1,62 +0,0 @@ | ||||
| from __future__ import absolute_import, print_function | ||||
|  | ||||
| from sentry.auth.exceptions import IdentityNotValid | ||||
| from sentry.auth.providers.oauth2 import (OAuth2Callback, OAuth2Login, | ||||
|                                           OAuth2Provider) | ||||
|  | ||||
| from .client import PassbookApiError, PassbookClient | ||||
| from .constants import (ACCESS_TOKEN_URL, AUTHORIZE_URL, CLIENT_ID, | ||||
|                         CLIENT_SECRET, SCOPE) | ||||
| from .views import FetchUser, PassbookConfigureView | ||||
|  | ||||
|  | ||||
| class PassbookOAuth2Provider(OAuth2Provider): | ||||
|     access_token_url = ACCESS_TOKEN_URL | ||||
|     authorize_url = AUTHORIZE_URL | ||||
|     name = 'Passbook' | ||||
|     client_id = CLIENT_ID | ||||
|     client_secret = CLIENT_SECRET | ||||
|  | ||||
|     def __init__(self, **config): | ||||
|         super(PassbookOAuth2Provider, self).__init__(**config) | ||||
|  | ||||
|     def get_configure_view(self): | ||||
|         return PassbookConfigureView.as_view() | ||||
|  | ||||
|     def get_auth_pipeline(self): | ||||
|         return [ | ||||
|             OAuth2Login( | ||||
|                 authorize_url=self.authorize_url, | ||||
|                 client_id=self.client_id, | ||||
|                 scope=SCOPE, | ||||
|             ), | ||||
|             OAuth2Callback( | ||||
|                 access_token_url=self.access_token_url, | ||||
|                 client_id=self.client_id, | ||||
|                 client_secret=self.client_secret, | ||||
|             ), | ||||
|             FetchUser( | ||||
|                 client_id=self.client_id, | ||||
|                 client_secret=self.client_secret, | ||||
|             ), | ||||
|         ] | ||||
|  | ||||
|     def get_refresh_token_url(self): | ||||
|         return ACCESS_TOKEN_URL | ||||
|  | ||||
|     def build_identity(self, state): | ||||
|         data = state['data'] | ||||
|         user_data = state['user'] | ||||
|         return { | ||||
|             'id': user_data['email'], | ||||
|             'email': user_data['email'], | ||||
|             'name': user_data['name'], | ||||
|             'data': self.get_oauth_data(data), | ||||
|         } | ||||
|  | ||||
|     def build_config(self, state): | ||||
|         return {} | ||||
|  | ||||
|     def refresh_identity(self, auth_identity): | ||||
|         client = PassbookClient(self.client_id, self.client_secret) | ||||
|         access_token = auth_identity.data['access_token'] | ||||
| @ -1,75 +0,0 @@ | ||||
| from __future__ import absolute_import, print_function | ||||
|  | ||||
| from django import forms | ||||
|  | ||||
| from sentry.auth.view import AuthView, ConfigureView | ||||
| from sentry.models import AuthIdentity | ||||
|  | ||||
| from .client import PassbookClient | ||||
|  | ||||
|  | ||||
| def _get_name_from_email(email): | ||||
|     """ | ||||
|     Given an email return a capitalized name. Ex. john.smith@example.com would return John Smith. | ||||
|     """ | ||||
|     name = email.rsplit('@', 1)[0] | ||||
|     name = ' '.join([n_part.capitalize() for n_part in name.split('.')]) | ||||
|     return name | ||||
|  | ||||
|  | ||||
| class FetchUser(AuthView): | ||||
|     def __init__(self, client_id, client_secret, *args, **kwargs): | ||||
|         self.client = PassbookClient(client_id, client_secret) | ||||
|         super(FetchUser, self).__init__(*args, **kwargs) | ||||
|  | ||||
|     def handle(self, request, helper): | ||||
|         access_token = helper.fetch_state('data')['access_token'] | ||||
|  | ||||
|         user = self.client.get_user(access_token) | ||||
|  | ||||
|         # A user hasn't set their name in their Passbook profile so it isn't | ||||
|         # populated in the response | ||||
|         if not user.get('name'): | ||||
|             user['name'] = _get_name_from_email(user['email']) | ||||
|  | ||||
|         helper.bind_state('user', user) | ||||
|  | ||||
|         return helper.next_step() | ||||
|  | ||||
|  | ||||
| class ConfirmEmailForm(forms.Form): | ||||
|     email = forms.EmailField(label='Email') | ||||
|  | ||||
|  | ||||
| class ConfirmEmail(AuthView): | ||||
|     def handle(self, request, helper): | ||||
|         user = helper.fetch_state('user') | ||||
|  | ||||
|         # TODO(dcramer): this isnt ideal, but our current flow doesnt really | ||||
|         # support this behavior; | ||||
|         try: | ||||
|             auth_identity = AuthIdentity.objects.select_related('user').get( | ||||
|                 auth_provider=helper.auth_provider, | ||||
|                 ident=user['id'], | ||||
|             ) | ||||
|         except AuthIdentity.DoesNotExist: | ||||
|             pass | ||||
|         else: | ||||
|             user['email'] = auth_identity.user.email | ||||
|  | ||||
|         if user.get('email'): | ||||
|             return helper.next_step() | ||||
|  | ||||
|         form = ConfirmEmailForm(request.POST or None) | ||||
|         if form.is_valid(): | ||||
|             user['email'] = form.cleaned_data['email'] | ||||
|             helper.bind_state('user', user) | ||||
|             return helper.next_step() | ||||
|  | ||||
|         return self.respond('sentry_auth_passbook/enter-email.html', { | ||||
|             'form': form, | ||||
|         }) | ||||
|  | ||||
| class PassbookConfigureView(ConfigureView): | ||||
|     def dispatch(self, request, organization, auth_provider): | ||||
|         return self.render('sentry_auth_passbook/configure.html') | ||||
| @ -1,12 +0,0 @@ | ||||
| [wheel] | ||||
| universal = 1 | ||||
|  | ||||
| [pytest] | ||||
| python_files = test*.py | ||||
| addopts = --tb=native -p no:doctest | ||||
| norecursedirs = bin dist docs htmlcov script hooks node_modules .* {args} | ||||
|  | ||||
| [flake8] | ||||
| ignore = F999,E501,E128,E124,E402,W503,E731,C901 | ||||
| max-line-length = 100 | ||||
| exclude = .tox,.git,*/migrations/*,node_modules/*,docs/* | ||||
| @ -1,45 +0,0 @@ | ||||
| #!/usr/bin/env python | ||||
| """ | ||||
| sentry-auth-passbook | ||||
| ================== | ||||
|  | ||||
| :copyright: (c) 2016 Functional Software, Inc | ||||
| """ | ||||
| from setuptools import find_packages, setup | ||||
|  | ||||
| install_requires = [ | ||||
|     'sentry>=7.0.0', | ||||
| ] | ||||
|  | ||||
| tests_require = [ | ||||
|     'mock', | ||||
|     'flake8>=2.0,<2.1', | ||||
| ] | ||||
|  | ||||
| setup( | ||||
|     name='sentry-auth-passbook', | ||||
|     version='0.1.24-beta', | ||||
|     author='BeryJu.org', | ||||
|     author_email='support@beryju.org', | ||||
|     url='https://passbook.beryju.org', | ||||
|     description='passbook authentication provider for Sentry', | ||||
|     long_description=__doc__, | ||||
|     license='MIT', | ||||
|     packages=find_packages(exclude=['tests']), | ||||
|     zip_safe=False, | ||||
|     install_requires=install_requires, | ||||
|     tests_require=tests_require, | ||||
|     extras_require={'tests': tests_require}, | ||||
|     include_package_data=True, | ||||
|     entry_points={ | ||||
|         'sentry.apps': [ | ||||
|             'auth_passbook = sentry_auth_passbook', | ||||
|         ], | ||||
|     }, | ||||
|     classifiers=[ | ||||
|         'Intended Audience :: Developers', | ||||
|         'Intended Audience :: System Administrators', | ||||
|         'Operating System :: OS Independent', | ||||
|         'Topic :: Software Development' | ||||
|     ], | ||||
| ) | ||||
| @ -1,6 +0,0 @@ | ||||
| from sentry.testutils import TestCase | ||||
|  | ||||
|  | ||||
| class GitHubOAuth2ProviderTest(TestCase): | ||||
|     def test_simple(self): | ||||
|         pass | ||||
| @ -1,17 +0,0 @@ | ||||
| from __future__ import absolute_import, print_function | ||||
|  | ||||
| import pytest | ||||
| from sentry_auth_sentry.views import _get_name_from_email | ||||
|  | ||||
| expected_data = [ | ||||
|     ('john.smith@example.com', 'John Smith'), | ||||
|     ('john@example.com', 'John'), | ||||
|     ('XYZ-234=3523@example.com', 'Xyz-234=3523'), | ||||
|     ('XYZ.1111@example.com', 'Xyz 1111'), | ||||
|     ('JOHN@example.com', 'John'), | ||||
| ] | ||||
|  | ||||
|  | ||||
| @pytest.mark.parametrize("email,expected_name", expected_data) | ||||
| def test_get_name_from_email(email, expected_name): | ||||
|     assert _get_name_from_email(email) == expected_name | ||||
							
								
								
									
										145
									
								
								debian/changelog
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										145
									
								
								debian/changelog
									
									
									
									
										vendored
									
									
								
							| @ -1,145 +0,0 @@ | ||||
| passbook (0.1.24) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.22-beta -> 0.1.23-beta | ||||
|   * add modal for OAuth Providers showing the URLs | ||||
|   * remove user field from form. Closes #32 | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Wed, 20 Mar 2019 21:59:21 +0000 | ||||
|  | ||||
| passbook (0.1.23) stable; urgency=medium | ||||
|  | ||||
|   * add support for OpenID-Connect Discovery | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Thu, 18 Mar 2019 20:19:27 +0000 | ||||
|  | ||||
| passbook (0.1.22) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.20-beta -> 0.1.21-beta | ||||
|   * fix missing debug template | ||||
|   * move icons to single folder, cleanup | ||||
|   * fix layout when on mobile viewport and scrolling | ||||
|   * fix delete form not working | ||||
|   * point to correct icons | ||||
|   * add Azure AD Source | ||||
|   * Fix OAuth Client's disconnect view having invalid URL names | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Thu, 14 Mar 2019 20:19:27 +0000 | ||||
|  | ||||
| passbook (0.1.21) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.19-beta -> 0.1.20-beta | ||||
|   * add request debug view | ||||
|   * detect HTTPS from reverse proxy | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Thu, 14 Mar 2019 17:01:49 +0000 | ||||
|  | ||||
| passbook (0.1.20) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.18-beta -> 0.1.19-beta | ||||
|   * fix GitHub Pretend again | ||||
|   * add user settings for Sources | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Wed, 13 Mar 2019 15:49:44 +0000 | ||||
|  | ||||
| passbook (0.1.18) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.16-beta -> 0.1.17-beta | ||||
|   * fix Server Error when downloading metadata | ||||
|   * add sentry client | ||||
|   * fix included yaml file | ||||
|   * adjust versions for client packages, auto build client-packages | ||||
|   * bump version: 0.1.17-beta -> 0.1.18-beta | ||||
|   * fix API Call for sentry-client, add missing template | ||||
|   * fix GitHub Pretend throwing a 500 error | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Wed, 13 Mar 2019 14:14:10 +0000 | ||||
|  | ||||
| passbook (0.1.17) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.15-beta -> 0.1.16-beta | ||||
|   * remove Application.user_is_authorized | ||||
|   * don't use celery heartbeat, use TCP keepalive instead | ||||
|   * switch to vertical navigation | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Tue, 12 Mar 2019 14:54:27 +0000 | ||||
|  | ||||
| passbook (0.1.16) stable; urgency=medium | ||||
|  | ||||
|   * Replace redis with RabbitMQ | ||||
|   * updated debian package to suggest RabbitMQ | ||||
|   * update helm chart to require RabbitMQ | ||||
|   * fix invalid default config in debian package | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Mon, 11 Mar 2019 10:28:36 +0000 | ||||
|  | ||||
| passbook (0.1.14) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.11-beta -> 0.1.12-beta | ||||
|   * Fix DoesNotExist error when running PolicyEngine against None user | ||||
|   * allow custom email server for helm installs | ||||
|   * fix UserChangePasswordView not requiring Login | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Mon, 11 Mar 2019 10:28:36 +0000 | ||||
|  | ||||
| passbook (0.1.12) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.10-beta -> 0.1.11-beta | ||||
|   * rewrite PasswordFactor to use backends setting instead of trying all backends | ||||
|   * install updated helm release from local folder | ||||
|   * disable automatic k8s deployment for now | ||||
|   * fix OAuth Authorization View not requiring authentication | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Mon, 11 Mar 2019 08:50:29 +0000 | ||||
|  | ||||
| passbook (0.1.11) stable; urgency=medium | ||||
|  | ||||
|   * add group administration | ||||
|   * bump version: 0.1.9-beta -> 0.1.10-beta | ||||
|   * fix helm labels being on deployments and not pods | ||||
|   * automatically deploy after release | ||||
|   * use Django's Admin FilteredSelectMultiple for Group Membership | ||||
|   * always use FilteredSelectMultiple for many-to-many fields | ||||
|   * Add Group Member policy | ||||
|   * add LDAP Group Membership Policy | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Sun, 10 Mar 2019 18:55:31 +0000 | ||||
|  | ||||
| passbook (0.1.10) stable; urgency=high | ||||
|  | ||||
|   * bump version: 0.1.7-beta -> 0.1.8-beta | ||||
|   * consistently using PolicyEngine | ||||
|   * add more Verbosity to PolicyEngine, rewrite SAML Authorisation check | ||||
|   * slightly refactor Factor View, add more unittests | ||||
|   * add impersonation middleware, add to templates | ||||
|   * bump version: 0.1.8-beta -> 0.1.9-beta | ||||
|   * fix k8s service routing http traffic to workers | ||||
|   * Fix button on policy test page | ||||
|   * better show loading state when testing a policy | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Sun, 10 Mar 2019 14:52:40 +0000 | ||||
|  | ||||
| passbook (0.1.7) stable; urgency=medium | ||||
|  | ||||
|   * bump version: 0.1.3-beta -> 0.1.4-beta | ||||
|   * implicitly add kubernetes-healthcheck-host in helm configmap | ||||
|   * fix debian build (again) | ||||
|   * add PropertyMapping Model, add Subclass for SAML, test with AWS | ||||
|   * add custom DynamicArrayField to better handle arrays | ||||
|   * format data before inserting it | ||||
|   * bump version: 0.1.4-beta -> 0.1.5-beta | ||||
|   * fix static files missing for debian package | ||||
|   * fix password not getting set on user import | ||||
|   * remove audit's login attempt | ||||
|   * add passing property to PolicyEngine | ||||
|   * fix captcha factor not loading keys from Factor class | ||||
|   * bump version: 0.1.5-beta -> 0.1.6-beta | ||||
|   * fix MATCH_EXACT not working as intended | ||||
|   * Improve access control for saml | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Fri, 08 Mar 2019 20:37:05 +0000 | ||||
|  | ||||
| passbook (0.1.4) stable; urgency=medium | ||||
|  | ||||
|   * initial debian package release | ||||
|  | ||||
|  -- Jens Langhammer <jens.langhammer@beryju.org>  Wed, 06 Mar 2019 18:22:41 +0000 | ||||
							
								
								
									
										1
									
								
								debian/compat
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								debian/compat
									
									
									
									
										vendored
									
									
								
							| @ -1 +0,0 @@ | ||||
| 10 | ||||
							
								
								
									
										20
									
								
								debian/config
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								debian/config
									
									
									
									
										vendored
									
									
								
							| @ -1,20 +0,0 @@ | ||||
| #!/bin/sh | ||||
| # config maintainer script for passbook | ||||
| set -e | ||||
|  | ||||
| # source debconf stuff | ||||
| . /usr/share/debconf/confmodule | ||||
|  | ||||
| dbc_first_version=1.0.0 | ||||
| dbc_dbuser=passbook | ||||
| dbc_dbname=passbook | ||||
|  | ||||
| # source dbconfig-common shell library, and call the hook function | ||||
| if [ -f /usr/share/dbconfig-common/dpkg/config.pgsql ]; then | ||||
|     . /usr/share/dbconfig-common/dpkg/config.pgsql | ||||
|     dbc_go passbook "$@" | ||||
| fi | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
| exit 0 | ||||
							
								
								
									
										14
									
								
								debian/control
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										14
									
								
								debian/control
									
									
									
									
										vendored
									
									
								
							| @ -1,14 +0,0 @@ | ||||
| Source: passbook | ||||
| Section: admin | ||||
| Priority: optional | ||||
| Maintainer: BeryJu.org <support@beryju.org> | ||||
| Uploaders: Jens Langhammer <jens@beryju.org>, BeryJu.org <support@beryju.org> | ||||
| Build-Depends: debhelper (>= 10), dh-systemd (>= 1.5), dh-exec, wget, dh-exec, python3 (>= 3.5) | python3.6 | python3.7 | ||||
| Standards-Version: 3.9.6 | ||||
|  | ||||
| Package: passbook | ||||
| Architecture: all | ||||
| Recommends: mysql-server, rabbitmq-server | ||||
| Pre-Depends: adduser, libldap2-dev, libsasl2-dev | ||||
| Depends: python3 (>= 3.5) | python3.6 | python3.7, python3-pip, dbconfig-pgsql | dbconfig-no-thanks, ${misc:Depends} | ||||
| Description: Authentication Provider/Proxy supporting protocols like SAML, OAuth, LDAP and more. | ||||
							
								
								
									
										22
									
								
								debian/copyright
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										22
									
								
								debian/copyright
									
									
									
									
										vendored
									
									
								
							| @ -1,22 +0,0 @@ | ||||
| MIT License | ||||
|  | ||||
| Copyright (c) 2019 BeryJu.org | ||||
|  | ||||
| Permission is hereby granted, free of charge, to any person obtaining a copy | ||||
| of this software and associated documentation files (the "Software"), to deal | ||||
| in the Software without restriction, including without limitation the rights | ||||
| to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||||
| copies of the Software, and to permit persons to whom the Software is | ||||
| furnished to do so, subject to the following conditions: | ||||
|  | ||||
| The above copyright notice and this permission notice shall be included in all | ||||
| copies or substantial portions of the Software. | ||||
|  | ||||
| THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||||
| IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||||
| FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||||
| AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||||
| LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||||
| OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | ||||
| SOFTWARE. | ||||
|  | ||||
							
								
								
									
										4
									
								
								debian/dirs
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								debian/dirs
									
									
									
									
										vendored
									
									
								
							| @ -1,4 +0,0 @@ | ||||
| etc/passbook/ | ||||
| etc/passbook/config.d/ | ||||
| var/log/passbook/ | ||||
| usr/share/passbook/ | ||||
							
								
								
									
										77
									
								
								debian/etc/passbook/config.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										77
									
								
								debian/etc/passbook/config.yml
									
									
									
									
										vendored
									
									
								
							| @ -1,77 +0,0 @@ | ||||
| http: | ||||
|     host: 0.0.0.0 | ||||
|     port: 8000 | ||||
| secret_key_file: /etc/passbook/secret_key | ||||
| log: | ||||
|     level: | ||||
|         console: INFO | ||||
|         file: DEBUG | ||||
|     file: /var/log/passbook/passbook.log | ||||
| debug: false | ||||
| secure_proxy_header: | ||||
|   HTTP_X_FORWARDED_PROTO: https | ||||
| rabbitmq: guest:guest@localhost/passbook | ||||
| # Error reporting, sends stacktrace to sentry.services.beryju.org | ||||
| error_report_enabled: true | ||||
|  | ||||
| passbook: | ||||
|   sign_up: | ||||
|     # Enables signup, created users are stored in internal Database and created in LDAP if ldap.create_users is true | ||||
|     enabled: true | ||||
|   password_reset: | ||||
|     # Enable password reset, passwords are reset in internal Database and in LDAP if ldap.reset_password is true | ||||
|     enabled: true | ||||
|     # Verification the user has to provide in order to be able to reset passwords. Can be any combination of `email`, `2fa`, `security_questions` | ||||
|     verification: | ||||
|       - email | ||||
|   # Text used in title, on login page and multiple other places | ||||
|   branding: passbook | ||||
|   login: | ||||
|     # Override URL used for logo | ||||
|     logo_url: null | ||||
|     # Override URL used for Background on Login page | ||||
|     bg_url: null | ||||
|     # Optionally add a subtext, placed below logo on the login page | ||||
|     subtext: null | ||||
|   footer: | ||||
|     links: | ||||
|       # Optionally add links to the footer on the login page | ||||
|       #  - name: test | ||||
|       #    href: https://test | ||||
|   # Specify which fields can be used to authenticate. Can be any combination of `username` and `email` | ||||
|   uid_fields: | ||||
|     - username | ||||
|     - email | ||||
|   session: | ||||
|     remember_age: 2592000 # 60 * 60 * 24 * 30, one month | ||||
| # Provider-specific settings | ||||
| ldap: | ||||
|   # Which field from `uid_fields` maps to which LDAP Attribute | ||||
|   login_field_map: | ||||
|     username: sAMAccountName | ||||
|     email: mail # or userPrincipalName | ||||
|   user_attribute_map: | ||||
|     active_directory: | ||||
|       username: "%(sAMAccountName)s" | ||||
|       email: "%(mail)s" | ||||
|       name: "%(displayName)" | ||||
| oauth_client: | ||||
|   # List of python packages with sources types to load. | ||||
|   types: | ||||
|     - passbook.oauth_client.source_types.discord | ||||
|     - passbook.oauth_client.source_types.facebook | ||||
|     - passbook.oauth_client.source_types.github | ||||
|     - passbook.oauth_client.source_types.google | ||||
|     - passbook.oauth_client.source_types.reddit | ||||
|     - passbook.oauth_client.source_types.supervisr | ||||
|     - passbook.oauth_client.source_types.twitter | ||||
| saml_idp: | ||||
|   # List of python packages with provider types to load. | ||||
|   types: | ||||
|     - passbook.saml_idp.processors.generic | ||||
|     - passbook.saml_idp.processors.aws | ||||
|     - passbook.saml_idp.processors.gitlab | ||||
|     - passbook.saml_idp.processors.nextcloud | ||||
|     - passbook.saml_idp.processors.salesforce | ||||
|     - passbook.saml_idp.processors.shibboleth | ||||
|     - passbook.saml_idp.processors.wordpress_orange | ||||
							
								
								
									
										2
									
								
								debian/gbp.conf
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								debian/gbp.conf
									
									
									
									
										vendored
									
									
								
							| @ -1,2 +0,0 @@ | ||||
| [buildpackage] | ||||
| export-dir=../build-area | ||||
							
								
								
									
										8
									
								
								debian/install
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								debian/install
									
									
									
									
										vendored
									
									
								
							| @ -1,8 +0,0 @@ | ||||
| passbook		/usr/share/passbook/ | ||||
| static			/usr/share/passbook/ | ||||
| manage.py		/usr/share/passbook/ | ||||
| passbook.sh		/usr/share/passbook/ | ||||
| vendor			/usr/share/passbook/ | ||||
|  | ||||
| debian/etc/passbook								/etc/ | ||||
| debian/templates/database.yml					/usr/share/passbook/ | ||||
							
								
								
									
										14
									
								
								debian/passbook-worker.service
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										14
									
								
								debian/passbook-worker.service
									
									
									
									
										vendored
									
									
								
							| @ -1,14 +0,0 @@ | ||||
| [Unit] | ||||
| Description=passbook - Authentication Provider/Proxy (Background worker) | ||||
| After=network.target | ||||
| Requires=network.target | ||||
|  | ||||
| [Service] | ||||
| User=passbook | ||||
| Group=passbook | ||||
| WorkingDirectory=/usr/share/passbook | ||||
| Type=simple | ||||
| ExecStart=/usr/share/passbook/passbook.sh worker | ||||
|  | ||||
| [Install] | ||||
| WantedBy=multi-user.target | ||||
							
								
								
									
										14
									
								
								debian/passbook.service
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										14
									
								
								debian/passbook.service
									
									
									
									
										vendored
									
									
								
							| @ -1,14 +0,0 @@ | ||||
| [Unit] | ||||
| Description=passbook - Authentication Provider/Proxy | ||||
| After=network.target | ||||
| Requires=network.target | ||||
|  | ||||
| [Service] | ||||
| User=passbook | ||||
| Group=passbook | ||||
| WorkingDirectory=/usr/share/passbook | ||||
| Type=simple | ||||
| ExecStart=/usr/share/passbook/passbook.sh web | ||||
|  | ||||
| [Install] | ||||
| WantedBy=multi-user.target | ||||
							
								
								
									
										36
									
								
								debian/postinst
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										36
									
								
								debian/postinst
									
									
									
									
										vendored
									
									
								
							| @ -1,36 +0,0 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| set -e | ||||
|  | ||||
| . /usr/share/debconf/confmodule | ||||
| . /usr/share/dbconfig-common/dpkg/postinst.pgsql | ||||
|  | ||||
| # you can set the default database encoding to something else | ||||
| dbc_pgsql_createdb_encoding="UTF8" | ||||
| dbc_generate_include=template:/etc/passbook/config.d/database.yml | ||||
| dbc_generate_include_args="-o template_infile=/usr/share/passbook/database.yml" | ||||
| dbc_go passbook "$@" | ||||
|  | ||||
| if [ -z "`getent group passbook`" ]; then | ||||
| 	addgroup --quiet --system passbook | ||||
| fi | ||||
| if [ -z "`getent passwd passbook`" ]; then | ||||
| 	echo " * Creating user and group passbook..." | ||||
| 	adduser --quiet --system --home /usr/share/passbook --shell /bin/false --ingroup passbook --disabled-password --disabled-login --gecos "passbook User" passbook  >> /var/log/passbook/passbook.log 2>&1 | ||||
| fi | ||||
| echo " * Updating binary packages (psycopg2)" | ||||
| python3 -m pip install --target=/usr/share/passbook/vendor/ --no-cache-dir --upgrade --force-reinstall psycopg2 >> /var/log/passbook/passbook.log 2>&1 | ||||
| if [ ! -f '/etc/passbook/secret_key' ]; then | ||||
| 	echo " * Generating Secret Key" | ||||
| 	python3 -c 'import random; result = "".join([random.choice("abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)") for i in range(50)]); print(result)' > /etc/passbook/secret_key 2> /dev/null | ||||
| fi | ||||
| chown -R passbook: /usr/share/passbook/ | ||||
| chown -R passbook: /etc/passbook/ | ||||
| chown -R passbook: /var/log/passbook/ | ||||
| chmod 440 /etc/passbook/secret_key | ||||
| echo " * Running Database Migration" | ||||
| /usr/share/passbook/passbook.sh migrate | ||||
| echo " * A superuser can be created with this command '/usr/share/passbook/passbook.sh createsuperuser'" | ||||
| echo " * You should probably also adjust your settings in '/etc/passbook/config.yml'" | ||||
|  | ||||
| #DEBHELPER# | ||||
							
								
								
									
										24
									
								
								debian/postrm
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										24
									
								
								debian/postrm
									
									
									
									
										vendored
									
									
								
							| @ -1,24 +0,0 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| set -e | ||||
|  | ||||
| if [ -f /usr/share/debconf/confmodule ]; then | ||||
|     . /usr/share/debconf/confmodule | ||||
| fi | ||||
| if [ -f /usr/share/dbconfig-common/dpkg/postrm.pgsql ]; then | ||||
|     . /usr/share/dbconfig-common/dpkg/postrm.pgsql | ||||
|     dbc_go passbook "$@" | ||||
| fi | ||||
|  | ||||
|  | ||||
| if [ "$1" = "purge" ]; then | ||||
|     if which ucf >/dev/null 2>&1; then | ||||
|         ucf --purge /etc/passbook/config.d/database.yml | ||||
|         ucfr --purge passbook /etc/passbook/config.d/database.yml | ||||
|     fi | ||||
|     rm -rf /etc/passbook/ | ||||
|     rm -rf /usr/share/passbook/ | ||||
| fi | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
							
								
								
									
										10
									
								
								debian/prerm
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										10
									
								
								debian/prerm
									
									
									
									
										vendored
									
									
								
							| @ -1,10 +0,0 @@ | ||||
| #!/bin/sh | ||||
|  | ||||
| set -e | ||||
|  | ||||
| . /usr/share/debconf/confmodule | ||||
| . /usr/share/dbconfig-common/dpkg/prerm.pgsql | ||||
| dbc_go passbook "$@" | ||||
|  | ||||
| #DEBHELPER# | ||||
|  | ||||
							
								
								
									
										27
									
								
								debian/rules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										27
									
								
								debian/rules
									
									
									
									
										vendored
									
									
								
							| @ -1,27 +0,0 @@ | ||||
| #!/usr/bin/make -f | ||||
|  | ||||
| # Uncomment this to turn on verbose mode. | ||||
| # export DH_VERBOSE=1 | ||||
|  | ||||
| %: | ||||
| 	dh $@ --with=systemd | ||||
|  | ||||
| build-arch: | ||||
| 	python3 -m pip install setuptools | ||||
| 	python3 -m pip install --target=vendor/ -r requirements.txt | ||||
|  | ||||
| override_dh_strip: | ||||
| 	dh_strip --exclude=psycopg2 | ||||
|  | ||||
| override_dh_shlibdeps: | ||||
| 	dh_shlibdeps --exclude=psycopg2 | ||||
|  | ||||
| override_dh_installinit: | ||||
| 	dh_installinit --name=passbook | ||||
| 	dh_installinit --name=passbook-worker | ||||
| 	dh_systemd_enable --name=passbook | ||||
| 	dh_systemd_enable --name=passbook-worker | ||||
| 	dh_systemd_start | ||||
|  | ||||
| # override_dh_usrlocal to do nothing | ||||
| override_dh_usrlocal: | ||||
							
								
								
									
										1
									
								
								debian/source/format
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								debian/source/format
									
									
									
									
										vendored
									
									
								
							| @ -1 +0,0 @@ | ||||
| 3.0 (native) | ||||
							
								
								
									
										8
									
								
								debian/templates/database.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								debian/templates/database.yml
									
									
									
									
										vendored
									
									
								
							| @ -1,8 +0,0 @@ | ||||
| databases: | ||||
|   default: | ||||
|     engine: django.db.backends.postgresql | ||||
|     name: _DBC_DBNAME_ | ||||
|     user: _DBC_DBUSER_ | ||||
|     password: _DBC_DBPASS_ | ||||
|     host: _DBC_DBSERVER_ | ||||
|     port: _DBC_DBPORT_ | ||||
| @ -1,6 +1,6 @@ | ||||
| apiVersion: v1 | ||||
| appVersion: "0.1.24-beta" | ||||
| appVersion: "0.2.7-beta" | ||||
| description: A Helm chart for passbook. | ||||
| name: passbook | ||||
| version: "0.1.24-beta" | ||||
| icon: https://passbook.beryju.org/images/logo.png | ||||
| version: "0.2.7-beta" | ||||
| icon: https://git.beryju.org/uploads/-/system/project/avatar/108/logo.png | ||||
|  | ||||
							
								
								
									
										1
									
								
								helm/passbook/app-readme.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								helm/passbook/app-readme.md
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1 @@ | ||||
| # passbook | ||||
							
								
								
									
										
											BIN
										
									
								
								helm/passbook/charts/redis-5.1.0.tgz
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								helm/passbook/charts/redis-5.1.0.tgz
									
									
									
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
							
								
								
									
										98
									
								
								helm/passbook/questions.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										98
									
								
								helm/passbook/questions.yml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,98 @@ | ||||
| --- | ||||
| categories: | ||||
|   - Authentication | ||||
|   - SSO | ||||
| questions: | ||||
|   - default: "true" | ||||
|     variable: config.error_reporting | ||||
|     type: boolean | ||||
|     description: "Enable error-reporting to sentry.services.beryju.org" | ||||
|     group: "passbook Configuration" | ||||
|     label: "Error Reporting" | ||||
|     #################################################################### | ||||
|     ### PostgreSQL | ||||
|     #################################################################### | ||||
|   - variable: postgresql.enabled | ||||
|     default: true | ||||
|     description: "Deploy a database server as part of this deployment, or set to false and configure an external database connection." | ||||
|     type: boolean | ||||
|     required: true | ||||
|     label: Install PostgreSQL | ||||
|     show_subquestion_if: true | ||||
|     group: "Database Settings" | ||||
|     subquestions: | ||||
|       - variable: postgresql.postgresqlDatabase | ||||
|         default: "passbook" | ||||
|         description: "Database name to create" | ||||
|         type: string | ||||
|         label: PostgreSQL Database | ||||
|       - variable: postgresql.postgresqlUsername | ||||
|         default: "passbook" | ||||
|         description: "Database user to create" | ||||
|         type: string | ||||
|         label: PostgreSQL User | ||||
|       - variable: postgresql.postgresqlPassword | ||||
|         default: "" | ||||
|         description: "password will be auto-generated if not specified" | ||||
|         type: password | ||||
|         label: PostgreSQL Password | ||||
|   - variable: externalDatabase.host | ||||
|     default: "" | ||||
|     description: "Host of the external database" | ||||
|     type: string | ||||
|     label: External Database Host | ||||
|     show_if: "postgresql.enabled=false" | ||||
|     group: "Database Settings" | ||||
|   - variable: externalDatabase.user | ||||
|     default: "" | ||||
|     description: "Existing username in the external DB" | ||||
|     type: string | ||||
|     label: External Database username | ||||
|     show_if: "postgresql.enabled=false" | ||||
|     group: "Database Settings" | ||||
|   - variable: externalDatabase.password | ||||
|     default: "" | ||||
|     description: "External database password" | ||||
|     type: password | ||||
|     label: External Database password | ||||
|     show_if: "postgresql.enabled=false" | ||||
|     group: "Database Settings" | ||||
|   - variable: externalDatabase.database | ||||
|     default: "" | ||||
|     description: "Name of the existing database" | ||||
|     type: string | ||||
|     label: External Database | ||||
|     show_if: "postgresql.enabled=false" | ||||
|     group: "Database Settings" | ||||
|   - variable: externalDatabase.port | ||||
|     default: "3306" | ||||
|     description: "External database port number" | ||||
|     type: string | ||||
|     label: External Database Port | ||||
|     show_if: "postgresql.enabled=false" | ||||
|     group: "Database Settings" | ||||
|   - variable: postgresql.persistence.enabled | ||||
|     default: false | ||||
|     description: "Enable persistent volume for PostgreSQL" | ||||
|     type: boolean | ||||
|     required: true | ||||
|     label: PostgreSQL Persistent Volume Enabled | ||||
|     show_if: "postgresql.enabled=true" | ||||
|     show_subquestion_if: true | ||||
|     group: "Database Settings" | ||||
|     subquestions: | ||||
|       - variable: postgresql.master.persistence.size | ||||
|         default: "8Gi" | ||||
|         description: "PostgreSQL Persistent Volume Size" | ||||
|         type: string | ||||
|         label: PostgreSQL Volume Size | ||||
|       - variable: postgresql.master.persistence.storageClass | ||||
|         default: "" | ||||
|         description: "If undefined or null, uses the default StorageClass. Default to null" | ||||
|         type: storageclass | ||||
|         label: Default StorageClass for PostgreSQL | ||||
|       - variable: postgresql.master.persistence.existingClaim | ||||
|         default: "" | ||||
|         description: "If not empty, uses the specified existing PVC instead of creating new one" | ||||
|         type: string | ||||
|         label: Existing Persistent Volume Claim for PostgreSQL | ||||
| @ -5,5 +5,8 @@ dependencies: | ||||
| - name: postgresql | ||||
|   repository: https://kubernetes-charts.storage.googleapis.com/ | ||||
|   version: 3.10.1 | ||||
| digest: sha256:c36e054785f7d706d7d3f525eb1b167dbc89b42f84da7fc167a18bbb6542c999 | ||||
| generated: 2019-03-11T20:36:35.125079+01:00 | ||||
| - name: redis | ||||
|   repository: https://kubernetes-charts.storage.googleapis.com/ | ||||
|   version: 5.1.0 | ||||
| digest: sha256:8bf68bc928a2e3c0f05139635be05fa0840554c7bde4cecd624fac78fb5fa5a3 | ||||
| generated: 2019-03-21T11:06:51.553379+01:00 | ||||
|  | ||||
| @ -5,3 +5,6 @@ dependencies: | ||||
| - name: postgresql | ||||
|   version: 3.10.1 | ||||
|   repository: https://kubernetes-charts.storage.googleapis.com/ | ||||
| - name: redis | ||||
|   version: 5.1.0 | ||||
|   repository: https://kubernetes-charts.storage.googleapis.com/ | ||||
|  | ||||
| @ -1,7 +1,7 @@ | ||||
| apiVersion: apps/v1beta2 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }}-web | ||||
|   name: {{ include "passbook.fullname" . }}-appgw | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
| @ -18,7 +18,7 @@ spec: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|         app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|         passbook.io/component: web | ||||
|         passbook.io/component: appgw | ||||
|     spec: | ||||
|       volumes: | ||||
|         - name: config-volume | ||||
| @ -26,10 +26,12 @@ spec: | ||||
|             name: {{ include "passbook.fullname" . }}-config | ||||
|       containers: | ||||
|         - name: {{ .Chart.Name }} | ||||
|           image: "docker.pkg.beryju.org/passbook:{{ .Values.image.tag }}" | ||||
|           image: "docker.beryju.org/passbook/server:{{ .Values.image.tag }}" | ||||
|           imagePullPolicy: IfNotPresent | ||||
|           command: ["/bin/sh","-c"] | ||||
|           args: ["./manage.py migrate && ./manage.py web"] | ||||
|           command: | ||||
|             - ./manage.py | ||||
|           args: | ||||
|             - app_gw_web | ||||
|           ports: | ||||
|             - name: http | ||||
|               containerPort: 8000 | ||||
| @ -52,16 +54,9 @@ spec: | ||||
|                 - name: Host | ||||
|                   value: kubernetes-healthcheck-host | ||||
|           resources: | ||||
| {{ toYaml .Values.resources | indent 12 }} | ||||
|     {{- with .Values.nodeSelector }} | ||||
|       nodeSelector: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|     {{- with .Values.affinity }} | ||||
|       affinity: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|     {{- with .Values.tolerations }} | ||||
|       tolerations: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|             requests: | ||||
|               cpu: 150m | ||||
|               memory: 300M | ||||
|             limits: | ||||
|               cpu: 500m | ||||
|               memory: 500M | ||||
							
								
								
									
										20
									
								
								helm/passbook/templates/appgw-service.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								helm/passbook/templates/appgw-service.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,20 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }}-appgw | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     app.kubernetes.io/managed-by: {{ .Release.Service }} | ||||
| spec: | ||||
|   type: {{ .Values.service.type }} | ||||
|   ports: | ||||
|     - port: {{ .Values.service.port }} | ||||
|       targetPort: http | ||||
|       protocol: TCP | ||||
|       name: http | ||||
|   selector: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     passbook.io/component: appgw | ||||
| @ -15,8 +15,8 @@ data: | ||||
|         port: '' | ||||
|     log: | ||||
|       level: | ||||
|         console: DEBUG | ||||
|         file: DEBUG | ||||
|         console: WARNING | ||||
|         file: WARNING | ||||
|       file: /dev/null | ||||
|       syslog: | ||||
|         host: 127.0.0.1 | ||||
| @ -37,6 +37,7 @@ data: | ||||
|     secure_proxy_header: | ||||
|       HTTP_X_FORWARDED_PROTO: https | ||||
|     rabbitmq: "user:{{ .Values.rabbitmq.rabbitmq.password }}@{{ .Release.Name }}-rabbitmq" | ||||
|     redis: ":{{ .Values.redis.password }}@{{ .Release.Name }}-redis-master/0" | ||||
|     # Error reporting, sends stacktrace to sentry.services.beryju.org | ||||
|     error_report_enabled: {{ .Values.config.error_reporting }} | ||||
| 
 | ||||
| @ -46,6 +47,7 @@ data: | ||||
|     secret_key: {{ randAlphaNum 50 }} | ||||
|     {{- end }} | ||||
| 
 | ||||
|     primary_domain: {{ .Values.primary_domain }} | ||||
|     domains: | ||||
|         {{- range .Values.ingress.hosts }} | ||||
|         - {{ . | quote }} | ||||
| @ -132,9 +134,4 @@ data: | ||||
|       # List of python packages with provider types to load. | ||||
|       types: | ||||
|         - passbook.saml_idp.processors.generic | ||||
|         - passbook.saml_idp.processors.aws | ||||
|         - passbook.saml_idp.processors.gitlab | ||||
|         - passbook.saml_idp.processors.nextcloud | ||||
|         - passbook.saml_idp.processors.salesforce | ||||
|         - passbook.saml_idp.processors.shibboleth | ||||
|         - passbook.saml_idp.processors.wordpress_orange | ||||
| @ -1,6 +1,5 @@ | ||||
| {{- if .Values.ingress.enabled -}} | ||||
| {{- $fullName := include "passbook.fullname" . -}} | ||||
| {{- $ingressPath := .Values.ingress.path -}} | ||||
| apiVersion: extensions/v1beta1 | ||||
| kind: Ingress | ||||
| metadata: | ||||
| @ -30,9 +29,22 @@ spec: | ||||
|     - host: {{ . | quote }} | ||||
|       http: | ||||
|         paths: | ||||
|           - path: {{ $ingressPath }} | ||||
|           - path: / | ||||
|             backend: | ||||
|               serviceName: {{ $fullName }} | ||||
|               serviceName: {{ $fullName }}-web | ||||
|               servicePort: http | ||||
|           - path: /static/ | ||||
|             backend: | ||||
|               serviceName: {{ $fullname }}-static | ||||
|               servicePort: http | ||||
|   {{- end }} | ||||
|   {{- range .Values.ingress.app_gw_hosts }} | ||||
|     - host: {{ . | quote }} | ||||
|       http: | ||||
|         paths: | ||||
|           - path: / | ||||
|             backend: | ||||
|               serviceName: {{ $fullName }}-appgw | ||||
|               servicePort: http | ||||
|   {{- end }} | ||||
| {{- end }} | ||||
							
								
								
									
										56
									
								
								helm/passbook/templates/static-deployment.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								helm/passbook/templates/static-deployment.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,56 @@ | ||||
| apiVersion: apps/v1beta2 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }}-static | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     app.kubernetes.io/managed-by: {{ .Release.Service }} | ||||
| spec: | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|       app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|         app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|         k8s.passbook.io/component: static | ||||
|       annotations: | ||||
|         prometheus.io/scrape: "true" | ||||
|         prometheus.io/port: '9113' | ||||
|         field.cattle.io/workloadMetrics: '[{"path":"/metrics","port":9113,"schema":"HTTP"}]' | ||||
|     spec: | ||||
|       containers: | ||||
|         - name: {{ .Chart.Name }}-static-prometheus | ||||
|           image: nginx/nginx-prometheus-exporter:0.4.1 | ||||
|           imagePullPolicy: IfNotPresent | ||||
|         - name: {{ .Chart.Name }}-static | ||||
|           image: "docker.beryju.org/passbook/static:{{ .Values.image.tag }}" | ||||
|           imagePullPolicy: IfNotPresent | ||||
|           ports: | ||||
|             - name: http | ||||
|               containerPort: 80 | ||||
|               protocol: TCP | ||||
|           livenessProbe: | ||||
|             initialDelaySeconds: 10 | ||||
|             timeoutSeconds: 5 | ||||
|             httpGet: | ||||
|               path: /_/healthz | ||||
|               port: http | ||||
|           readinessProbe: | ||||
|             initialDelaySeconds: 10 | ||||
|             timeoutSeconds: 5 | ||||
|             httpGet: | ||||
|               path: /_/healthz | ||||
|               port: http | ||||
|           resources: | ||||
|             requests: | ||||
|               cpu: 10m | ||||
|               memory: 10M | ||||
|             limits: | ||||
|               cpu: 20m | ||||
|               memory: 20M | ||||
|  | ||||
							
								
								
									
										21
									
								
								helm/passbook/templates/static-service.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								helm/passbook/templates/static-service.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }}-static | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     app.kubernetes.io/managed-by: {{ .Release.Service }} | ||||
|     k8s.passbook.io/component: static | ||||
| spec: | ||||
|   type: ClusterIP | ||||
|   ports: | ||||
|     - port: 80 | ||||
|       targetPort: http | ||||
|       protocol: TCP | ||||
|       name: http | ||||
|   selector: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     k8s.passbook.io/component: static | ||||
							
								
								
									
										72
									
								
								helm/passbook/templates/web-deployment.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										72
									
								
								helm/passbook/templates/web-deployment.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,72 @@ | ||||
| apiVersion: apps/v1beta2 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }}-web | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
|     app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|     app.kubernetes.io/managed-by: {{ .Release.Service }} | ||||
| spec: | ||||
|   replicas: {{ .Values.replicaCount }} | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|       app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|         app.kubernetes.io/instance: {{ .Release.Name }} | ||||
|         passbook.io/component: web | ||||
|     spec: | ||||
|       volumes: | ||||
|         - name: config-volume | ||||
|           configMap: | ||||
|             name: {{ include "passbook.fullname" . }}-config | ||||
|       initContainers: | ||||
|         - name: passbook-database-migrations | ||||
|           image: "docker.beryju.org/passbook/server:{{ .Values.image.tag }}" | ||||
|           command: | ||||
|             - ./manage.py | ||||
|           args: | ||||
|             - migrate | ||||
|           volumeMounts: | ||||
|             - mountPath: /etc/passbook | ||||
|               name: config-volume | ||||
|       containers: | ||||
|         - name: {{ .Chart.Name }} | ||||
|           image: "docker.beryju.org/passbook/server:{{ .Values.image.tag }}" | ||||
|           imagePullPolicy: IfNotPresent | ||||
|           command: | ||||
|             - ./manage.py | ||||
|           args: | ||||
|             - web | ||||
|           ports: | ||||
|             - name: http | ||||
|               containerPort: 8000 | ||||
|               protocol: TCP | ||||
|           volumeMounts: | ||||
|             - mountPath: /etc/passbook | ||||
|               name: config-volume | ||||
|           livenessProbe: | ||||
|             httpGet: | ||||
|               path: / | ||||
|               port: http | ||||
|               httpHeaders: | ||||
|                 - name: Host | ||||
|                   value: kubernetes-healthcheck-host | ||||
|           readinessProbe: | ||||
|             httpGet: | ||||
|               path: / | ||||
|               port: http | ||||
|               httpHeaders: | ||||
|                 - name: Host | ||||
|                   value: kubernetes-healthcheck-host | ||||
|           resources: | ||||
|             requests: | ||||
|               cpu: 50m | ||||
|               memory: 150M | ||||
|             limits: | ||||
|               cpu: 200m | ||||
|               memory: 300M | ||||
| @ -1,7 +1,7 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: {{ include "passbook.fullname" . }} | ||||
|   name: {{ include "passbook.fullname" . }}-web | ||||
|   labels: | ||||
|     app.kubernetes.io/name: {{ include "passbook.name" . }} | ||||
|     helm.sh/chart: {{ include "passbook.chart" . }} | ||||
| @ -26,9 +26,12 @@ spec: | ||||
|             name: {{ include "passbook.fullname" . }}-config | ||||
|       containers: | ||||
|         - name: {{ .Chart.Name }} | ||||
|           image: "docker.pkg.beryju.org/passbook:{{ .Values.image.tag }}" | ||||
|           image: "docker.beryju.org/passbook/server:{{ .Values.image.tag }}" | ||||
|           imagePullPolicy: IfNotPresent | ||||
|           command: ["./manage.py", "worker"] | ||||
|           command: | ||||
|             - ./manage.py | ||||
|           args: | ||||
|             - worker | ||||
|           ports: | ||||
|             - name: http | ||||
|               containerPort: 8000 | ||||
| @ -37,16 +40,9 @@ spec: | ||||
|             - mountPath: /etc/passbook | ||||
|               name: config-volume | ||||
|           resources: | ||||
| {{ toYaml .Values.resources | indent 12 }} | ||||
|     {{- with .Values.nodeSelector }} | ||||
|       nodeSelector: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|     {{- with .Values.affinity }} | ||||
|       affinity: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|     {{- with .Values.tolerations }} | ||||
|       tolerations: | ||||
| {{ toYaml . | indent 8 }} | ||||
|     {{- end }} | ||||
|             requests: | ||||
|               cpu: 150m | ||||
|               memory: 400M | ||||
|             limits: | ||||
|               cpu: 300m | ||||
|               memory: 600M | ||||
| @ -5,7 +5,7 @@ | ||||
| replicaCount: 1 | ||||
|  | ||||
| image: | ||||
|   tag: 0.1.24-beta | ||||
|   tag: 0.2.7-beta | ||||
|  | ||||
| nameOverride: "" | ||||
|  | ||||
| @ -37,6 +37,8 @@ ingress: | ||||
|   path: / | ||||
|   hosts: | ||||
|     - passbook.k8s.local | ||||
|   app_gw_hosts: | ||||
|     - '*.passbook.k8s.local' | ||||
|   defaultHost: passbook.k8s.local | ||||
|   tls: [] | ||||
|   #  - secretName: chart-example-tls | ||||
|  | ||||
| @ -4,7 +4,7 @@ import os | ||||
| import sys | ||||
|  | ||||
| if __name__ == '__main__': | ||||
|     os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'passbook.core.settings') | ||||
|     os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'passbook.root.settings') | ||||
|     try: | ||||
|         from django.core.management import execute_from_command_line | ||||
|     except ImportError as exc: | ||||
|  | ||||
| @ -1,7 +0,0 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| # Check if this file is a symlink, if so, read real base dir | ||||
| BASE_DIR=$(dirname $(readlink -f ${BASH_SOURCE[0]})) | ||||
|  | ||||
| cd $BASE_DIR | ||||
| PYTHONPATH="${BASE_DIR}/vendor/" python3 manage.py $@ | ||||
| @ -1,2 +1,2 @@ | ||||
| """passbook""" | ||||
| __version__ = '0.1.24-beta' | ||||
| __version__ = '0.2.7-beta' | ||||
|  | ||||
| @ -1,2 +0,0 @@ | ||||
| """passbook admin""" | ||||
| __version__ = '0.1.24-beta' | ||||
|  | ||||
| @ -1,2 +0,0 @@ | ||||
| django-rest-framework | ||||
| drf_yasg | ||||
| @ -152,10 +152,8 @@ | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <a href="#"> | ||||
|                 <span class="pficon-bundle"></span> | ||||
|                 <span class="card-pf-aggregate-status-count"></span> {% trans 'Version' %} | ||||
|                 </a> | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
| @ -192,5 +190,59 @@ | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
|     <div class="col-xs-6 col-sm-2 col-md-2"> | ||||
|         <div class="card-pf card-pf-accented card-pf-aggregate-status"> | ||||
|             <h2 class="card-pf-title"> | ||||
|                 <span class="pficon-server"></span> | ||||
|                 <span class="card-pf-aggregate-status-count"></span> {% trans 'Cached Policies' %} | ||||
|             </h2> | ||||
|             <div class="card-pf-body"> | ||||
|                 <p class="card-pf-aggregate-status-notifications"> | ||||
|                     <span class="card-pf-aggregate-status-notification"> | ||||
|                         <a href="#" data-toggle="modal" data-target="#clearCacheMOdal"> | ||||
|                             {% if cached_policies < 1 %} | ||||
|                             <span class="pficon-warning-triangle-o" data-toggle="tooltip" data-placement="right" | ||||
|                                 title="{% trans 'No policies cached. Users may experience slow response times.' %}"></span> {{ cached_policies }} | ||||
|                             {% else %} | ||||
|                             <span class="pficon pficon-ok"></span>{{ cached_policies }} | ||||
|                             {% endif %} | ||||
|                         </a> | ||||
|                     </span> | ||||
|                 </p> | ||||
|             </div> | ||||
|         </div> | ||||
|     </div> | ||||
| </div> | ||||
| <div class="modal fade" id="clearCacheMOdal" tabindex="-1" role="dialog" aria-labelledby="clearCacheMOdalLabel" aria-hidden="true"> | ||||
|   <div class="modal-dialog"> | ||||
|     <div class="modal-content"> | ||||
|       <div class="modal-header"> | ||||
|         <button type="button" class="close" data-dismiss="modal" aria-hidden="true"> | ||||
|           <span class="pficon pficon-close"></span> | ||||
|         </button> | ||||
|         <h4 class="modal-title" id="clearCacheMOdalLabel">{% trans 'Clear Cache' %}</h4> | ||||
|       </div> | ||||
|       <div class="modal-body"> | ||||
|         <form method="post" id="clearForm"> | ||||
|             {% csrf_token %} | ||||
|             <input type="hidden" name="clear"> | ||||
|             <p> | ||||
|                 {% blocktrans %} | ||||
|                     Are you sure you want to clear the cache? This includes all user sessions and all cached Policy results. | ||||
|                 {% endblocktrans %} | ||||
|             </p> | ||||
|             <h3> | ||||
|                 {% blocktrans %} | ||||
|                     This will also log you out. | ||||
|                 {% endblocktrans %} | ||||
|             </h3> | ||||
|         </form> | ||||
|       </div> | ||||
|       <div class="modal-footer"> | ||||
|         <button type="button" class="btn btn-default" data-dismiss="modal">Cancel</button> | ||||
|         <button form="clearForm" type="submit" type="button" class="btn btn-danger">{% trans 'Clear' %}</button> | ||||
|       </div> | ||||
|     </div> | ||||
|   </div> | ||||
| </div> | ||||
| {% endblock %} | ||||
|  | ||||
| @ -36,7 +36,7 @@ | ||||
|         <tbody> | ||||
|             {% for property_mapping in object_list %} | ||||
|             <tr> | ||||
|                 <td>{{ property_mapping.name }} ({{ property_mapping.slug }})</td> | ||||
|                 <td>{{ property_mapping.name }}</td> | ||||
|                 <td>{{ property_mapping|verbose_name }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|  | ||||
| @ -36,7 +36,7 @@ | ||||
|             <tr> | ||||
|                 <td>{{ source.name }}</td> | ||||
|                 <td>{{ source|fieldtype }}</td> | ||||
|                 <td>{{ source.additional_info }}</td> | ||||
|                 <td>{{ source.additional_info|safe }}</td> | ||||
|                 <td> | ||||
|                     <a class="btn btn-default btn-sm" | ||||
|                         href="{% url 'passbook_admin:source-update' pk=source.uuid %}?back={{ request.get_full_path }}">{% trans 'Edit' %}</a> | ||||
|  | ||||
| @ -1,11 +1,13 @@ | ||||
| """passbook administration overview""" | ||||
| from django.core.cache import cache | ||||
| from django.shortcuts import redirect, reverse | ||||
| from django.views.generic import TemplateView | ||||
|  | ||||
| from passbook.admin.mixins import AdminRequiredMixin | ||||
| from passbook.core import __version__ | ||||
| from passbook.core.celery import CELERY_APP | ||||
| from passbook.core.models import (Application, Factor, Invitation, Policy, | ||||
|                                   Provider, Source, User) | ||||
| from passbook.root.celery import CELERY_APP | ||||
|  | ||||
|  | ||||
| class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
| @ -13,6 +15,13 @@ class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
|  | ||||
|     template_name = 'administration/overview.html' | ||||
|  | ||||
|     def post(self, *args, **kwargs): | ||||
|         """Handle post (clear cache from modal)""" | ||||
|         if 'clear' in self.request.POST: | ||||
|             cache.clear() | ||||
|             return redirect(reverse('passbook_core:auth-login')) | ||||
|         return self.get(*args, **kwargs) | ||||
|  | ||||
|     def get_context_data(self, **kwargs): | ||||
|         kwargs['application_count'] = len(Application.objects.all()) | ||||
|         kwargs['policy_count'] = len(Policy.objects.all()) | ||||
| @ -25,4 +34,5 @@ class AdministrationOverviewView(AdminRequiredMixin, TemplateView): | ||||
|         kwargs['worker_count'] = len(CELERY_APP.control.ping(timeout=0.5)) | ||||
|         kwargs['providers_without_application'] = Provider.objects.filter(application=None) | ||||
|         kwargs['policies_without_attachment'] = len(Policy.objects.filter(policymodel__isnull=True)) | ||||
|         kwargs['cached_policies'] = len(cache.keys('policy_*')) | ||||
|         return super().get_context_data(**kwargs) | ||||
|  | ||||
| @ -1,2 +0,0 @@ | ||||
| """passbook api""" | ||||
| __version__ = '0.1.24-beta' | ||||
|  | ||||
| @ -1,3 +0,0 @@ | ||||
| django-rest-framework | ||||
| drf_yasg | ||||
| django-filters | ||||
							
								
								
									
										
											BIN
										
									
								
								passbook/app_gw/.DS_Store
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								passbook/app_gw/.DS_Store
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
							
								
								
									
										5
									
								
								passbook/app_gw/admin.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								passbook/app_gw/admin.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,5 @@ | ||||
| """passbook Application Security Gateway model admin""" | ||||
|  | ||||
| from passbook.lib.admin import admin_autoregister | ||||
|  | ||||
| admin_autoregister('passbook_app_gw') | ||||
							
								
								
									
										16
									
								
								passbook/app_gw/apps.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								passbook/app_gw/apps.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,16 @@ | ||||
| """passbook Application Security Gateway app""" | ||||
| from importlib import import_module | ||||
|  | ||||
| from django.apps import AppConfig | ||||
|  | ||||
|  | ||||
| class PassbookApplicationApplicationGatewayConfig(AppConfig): | ||||
|     """passbook app_gw app""" | ||||
|  | ||||
|     name = 'passbook.app_gw' | ||||
|     label = 'passbook_app_gw' | ||||
|     verbose_name = 'passbook Application Security Gateway' | ||||
|     mountpoint = 'app_gw/' | ||||
|  | ||||
|     def ready(self): | ||||
|         import_module('passbook.app_gw.signals') | ||||
							
								
								
									
										13
									
								
								passbook/app_gw/asgi.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								passbook/app_gw/asgi.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,13 @@ | ||||
| """ | ||||
| ASGI entrypoint. Configures Django and then runs the application | ||||
| defined in the ASGI_APPLICATION setting. | ||||
| """ | ||||
|  | ||||
| import os | ||||
|  | ||||
| import django | ||||
| from channels.routing import get_default_application | ||||
|  | ||||
| os.environ.setdefault("DJANGO_SETTINGS_MODULE", "passbook.root.settings") | ||||
| django.setup() | ||||
| application = get_default_application() | ||||
							
								
								
									
										66
									
								
								passbook/app_gw/forms.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										66
									
								
								passbook/app_gw/forms.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,66 @@ | ||||
| """passbook Application Security Gateway Forms""" | ||||
| from urllib.parse import urlparse | ||||
|  | ||||
| from django import forms | ||||
| from django.contrib.admin.widgets import FilteredSelectMultiple | ||||
| from django.forms import ValidationError | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.app_gw.models import ApplicationGatewayProvider, RewriteRule | ||||
| from passbook.lib.fields import DynamicArrayField | ||||
|  | ||||
|  | ||||
| class ApplicationGatewayProviderForm(forms.ModelForm): | ||||
|     """Security Gateway Provider form""" | ||||
|  | ||||
|     def clean_server_name(self): | ||||
|         """Check if server_name is in DB already, since | ||||
|         Postgres ArrayField doesn't suppport keys.""" | ||||
|         current = self.cleaned_data.get('server_name') | ||||
|         if ApplicationGatewayProvider.objects \ | ||||
|                 .filter(server_name__overlap=current) \ | ||||
|                 .exclude(pk=self.instance.pk).exists(): | ||||
|             raise ValidationError(_("Server Name already in use.")) | ||||
|         return current | ||||
|  | ||||
|     def clean_upstream(self): | ||||
|         """Check that upstream begins with http(s)""" | ||||
|         for upstream in self.cleaned_data.get('upstream'): | ||||
|             _parsed_url = urlparse(upstream) | ||||
|  | ||||
|             if _parsed_url.scheme not in ('http', 'https'): | ||||
|                 raise ValidationError(_("URL Scheme must be either http or https")) | ||||
|         return self.cleaned_data.get('upstream') | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = ApplicationGatewayProvider | ||||
|         fields = ['server_name', 'upstream', 'enabled', 'authentication_header', | ||||
|                   'default_content_type', 'upstream_ssl_verification', 'property_mappings'] | ||||
|         widgets = { | ||||
|             'authentication_header': forms.TextInput(), | ||||
|             'default_content_type': forms.TextInput(), | ||||
|             'property_mappings': FilteredSelectMultiple(_('Property Mappings'), False) | ||||
|         } | ||||
|         field_classes = { | ||||
|             'server_name': DynamicArrayField, | ||||
|             'upstream': DynamicArrayField | ||||
|         } | ||||
|         labels = { | ||||
|             'upstream_ssl_verification': _('Verify upstream SSL Certificates?'), | ||||
|             'property_mappings': _('Rewrite Rules') | ||||
|         } | ||||
|  | ||||
| class RewriteRuleForm(forms.ModelForm): | ||||
|     """Rewrite Rule Form""" | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         model = RewriteRule | ||||
|         fields = ['name', 'match', 'halt', 'replacement', 'redirect', 'conditions'] | ||||
|         widgets = { | ||||
|             'name': forms.TextInput(), | ||||
|             'match': forms.TextInput(attrs={'data-is-monospace': True}), | ||||
|             'replacement': forms.TextInput(attrs={'data-is-monospace': True}), | ||||
|             'conditions': FilteredSelectMultiple(_('Conditions'), False) | ||||
|         } | ||||
							
								
								
									
										30
									
								
								passbook/app_gw/management/commands/app_gw_web.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								passbook/app_gw/management/commands/app_gw_web.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,30 @@ | ||||
| """passbook app_gw webserver management command""" | ||||
|  | ||||
| from logging import getLogger | ||||
|  | ||||
| from daphne.cli import CommandLineInterface | ||||
| from django.core.management.base import BaseCommand | ||||
| from django.utils import autoreload | ||||
|  | ||||
| from passbook.lib.config import CONFIG | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
|  | ||||
| class Command(BaseCommand): | ||||
|     """Run Daphne Webserver for app_gw""" | ||||
|  | ||||
|     def handle(self, *args, **options): | ||||
|         """passbook daphne server""" | ||||
|         autoreload.run_with_reloader(self.daphne_server) | ||||
|  | ||||
|     def daphne_server(self): | ||||
|         """Run daphne server within autoreload""" | ||||
|         autoreload.raise_last_exception() | ||||
|         CommandLineInterface().run([ | ||||
|             '-p', str(CONFIG.y('app_gw.port', 8000)), | ||||
|             '-b', CONFIG.y('app_gw.listen', '0.0.0.0'),  # nosec | ||||
|             '--access-log', '/dev/null', | ||||
|             '--application-close-timeout', '500', | ||||
|             'passbook.app_gw.asgi:application' | ||||
|         ]) | ||||
							
								
								
									
										33
									
								
								passbook/app_gw/middleware.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										33
									
								
								passbook/app_gw/middleware.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,33 @@ | ||||
| """passbook app_gw middleware""" | ||||
| from django.views.generic import RedirectView | ||||
|  | ||||
| from passbook.app_gw.proxy.handler import RequestHandler | ||||
| from passbook.lib.config import CONFIG | ||||
|  | ||||
|  | ||||
| class ApplicationGatewayMiddleware: | ||||
|     """Check if request should be proxied or handeled normally""" | ||||
|  | ||||
|     _app_gw_cache = {} | ||||
|  | ||||
|     def __init__(self, get_response): | ||||
|         self.get_response = get_response | ||||
|  | ||||
|     def __call__(self, request): | ||||
|         # Rudimentary cache | ||||
|         host_header = request.META.get('HTTP_HOST') | ||||
|         if host_header not in self._app_gw_cache: | ||||
|             self._app_gw_cache[host_header] = RequestHandler.find_app_gw_for_request(request) | ||||
|         if self._app_gw_cache[host_header]: | ||||
|             return self.dispatch(request, self._app_gw_cache[host_header]) | ||||
|         return self.get_response(request) | ||||
|  | ||||
|     def dispatch(self, request, app_gw): | ||||
|         """Build proxied request and pass to upstream""" | ||||
|         handler = RequestHandler(app_gw, request) | ||||
|  | ||||
|         if not handler.check_permission(): | ||||
|             to_url = 'https://%s/?next=%s' % (CONFIG.get('domains')[0], request.get_full_path()) | ||||
|             return RedirectView.as_view(url=to_url)(request) | ||||
|  | ||||
|         return handler.get_response() | ||||
							
								
								
									
										
											BIN
										
									
								
								passbook/app_gw/migrations/.DS_Store
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								passbook/app_gw/migrations/.DS_Store
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
							
								
								
									
										50
									
								
								passbook/app_gw/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										50
									
								
								passbook/app_gw/migrations/0001_initial.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,50 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-20 21:38 | ||||
|  | ||||
| import django.contrib.postgres.fields | ||||
| import django.db.models.deletion | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     initial = True | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_core', '0020_groupmembershippolicy'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.CreateModel( | ||||
|             name='ApplicationGatewayProvider', | ||||
|             fields=[ | ||||
|                 ('provider_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.Provider')), | ||||
|                 ('server_name', django.contrib.postgres.fields.ArrayField(base_field=models.TextField(), size=None)), | ||||
|                 ('upstream', django.contrib.postgres.fields.ArrayField(base_field=models.TextField(), size=None)), | ||||
|                 ('enabled', models.BooleanField(default=True)), | ||||
|                 ('authentication_header', models.TextField(default='X-Remote-User')), | ||||
|                 ('default_content_type', models.TextField(default='application/octet-stream')), | ||||
|                 ('upstream_ssl_verification', models.BooleanField(default=True)), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Application Gateway Provider', | ||||
|                 'verbose_name_plural': 'Application Gateway Providers', | ||||
|             }, | ||||
|             bases=('passbook_core.provider',), | ||||
|         ), | ||||
|         migrations.CreateModel( | ||||
|             name='RewriteRule', | ||||
|             fields=[ | ||||
|                 ('propertymapping_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='passbook_core.PropertyMapping')), | ||||
|                 ('match', models.TextField()), | ||||
|                 ('halt', models.BooleanField(default=False)), | ||||
|                 ('replacement', models.TextField()), | ||||
|                 ('redirect', models.CharField(choices=[('internal', 'Internal'), (301, 'Moved Permanently'), (302, 'Found')], max_length=50)), | ||||
|                 ('conditions', models.ManyToManyField(to='passbook_core.Policy')), | ||||
|             ], | ||||
|             options={ | ||||
|                 'verbose_name': 'Rewrite Rule', | ||||
|                 'verbose_name_plural': 'Rewrite Rules', | ||||
|             }, | ||||
|             bases=('passbook_core.propertymapping',), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										18
									
								
								passbook/app_gw/migrations/0002_auto_20190321_1521.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/app_gw/migrations/0002_auto_20190321_1521.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.1.7 on 2019-03-21 15:21 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_app_gw', '0001_initial'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='rewriterule', | ||||
|             name='conditions', | ||||
|             field=models.ManyToManyField(blank=True, to='passbook_core.Policy'), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										18
									
								
								passbook/app_gw/migrations/0003_auto_20190411_1314.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								passbook/app_gw/migrations/0003_auto_20190411_1314.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,18 @@ | ||||
| # Generated by Django 2.2 on 2019-04-11 13:14 | ||||
|  | ||||
| from django.db import migrations, models | ||||
|  | ||||
|  | ||||
| class Migration(migrations.Migration): | ||||
|  | ||||
|     dependencies = [ | ||||
|         ('passbook_app_gw', '0002_auto_20190321_1521'), | ||||
|     ] | ||||
|  | ||||
|     operations = [ | ||||
|         migrations.AlterField( | ||||
|             model_name='applicationgatewayprovider', | ||||
|             name='authentication_header', | ||||
|             field=models.TextField(blank=True, default='X-Remote-User'), | ||||
|         ), | ||||
|     ] | ||||
							
								
								
									
										74
									
								
								passbook/app_gw/models.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										74
									
								
								passbook/app_gw/models.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,74 @@ | ||||
| """passbook app_gw models""" | ||||
| import re | ||||
|  | ||||
| from django.contrib.postgres.fields import ArrayField | ||||
| from django.db import models | ||||
| from django.utils.translation import gettext as _ | ||||
|  | ||||
| from passbook.core.models import Policy, PropertyMapping, Provider | ||||
|  | ||||
|  | ||||
| class ApplicationGatewayProvider(Provider): | ||||
|     """Virtual server which proxies requests to any hostname in server_name to upstream""" | ||||
|  | ||||
|     server_name = ArrayField(models.TextField()) | ||||
|     upstream = ArrayField(models.TextField()) | ||||
|     enabled = models.BooleanField(default=True) | ||||
|  | ||||
|     authentication_header = models.TextField(default='X-Remote-User', blank=True) | ||||
|     default_content_type = models.TextField(default='application/octet-stream') | ||||
|     upstream_ssl_verification = models.BooleanField(default=True) | ||||
|  | ||||
|     form = 'passbook.app_gw.forms.ApplicationGatewayProviderForm' | ||||
|  | ||||
|     @property | ||||
|     def name(self): | ||||
|         """since this model has no name property, return a joined list of server_names as name""" | ||||
|         return ', '.join(self.server_name) | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Application Gateway %s" % ', '.join(self.server_name) | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Application Gateway Provider') | ||||
|         verbose_name_plural = _('Application Gateway Providers') | ||||
|  | ||||
|  | ||||
| class RewriteRule(PropertyMapping): | ||||
|     """Rewrite requests matching `match` with `replacement`, if all polcies in `conditions` apply""" | ||||
|  | ||||
|     REDIRECT_INTERNAL = 'internal' | ||||
|     REDIRECT_PERMANENT = 301 | ||||
|     REDIRECT_FOUND = 302 | ||||
|  | ||||
|     REDIRECTS = ( | ||||
|         (REDIRECT_INTERNAL, _('Internal')), | ||||
|         (REDIRECT_PERMANENT, _('Moved Permanently')), | ||||
|         (REDIRECT_FOUND, _('Found')), | ||||
|     ) | ||||
|  | ||||
|     match = models.TextField() | ||||
|     halt = models.BooleanField(default=False) | ||||
|     conditions = models.ManyToManyField(Policy, blank=True) | ||||
|     replacement = models.TextField() # python formatted strings, use {match.1} | ||||
|     redirect = models.CharField(max_length=50, choices=REDIRECTS) | ||||
|  | ||||
|     form = 'passbook.app_gw.forms.RewriteRuleForm' | ||||
|  | ||||
|     _matcher = None | ||||
|  | ||||
|     @property | ||||
|     def compiled_matcher(self): | ||||
|         """Cache the compiled regex in memory""" | ||||
|         if not self._matcher: | ||||
|             self._matcher = re.compile(self.match) | ||||
|         return self._matcher | ||||
|  | ||||
|     def __str__(self): | ||||
|         return "Rewrite Rule %s" % self.name | ||||
|  | ||||
|     class Meta: | ||||
|  | ||||
|         verbose_name = _('Rewrite Rule') | ||||
|         verbose_name_plural = _('Rewrite Rules') | ||||
							
								
								
									
										0
									
								
								passbook/app_gw/proxy/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								passbook/app_gw/proxy/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										8
									
								
								passbook/app_gw/proxy/exceptions.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								passbook/app_gw/proxy/exceptions.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,8 @@ | ||||
| """Exception classes""" | ||||
|  | ||||
| class ReverseProxyException(Exception): | ||||
|     """Base for revproxy exception""" | ||||
|  | ||||
|  | ||||
| class InvalidUpstream(ReverseProxyException): | ||||
|     """Invalid upstream set""" | ||||
							
								
								
									
										233
									
								
								passbook/app_gw/proxy/handler.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										233
									
								
								passbook/app_gw/proxy/handler.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,233 @@ | ||||
| """passbook app_gw request handler""" | ||||
| import mimetypes | ||||
| from logging import getLogger | ||||
| from random import SystemRandom | ||||
| from urllib.parse import urlparse | ||||
|  | ||||
| import certifi | ||||
| import urllib3 | ||||
| from django.core.cache import cache | ||||
| from django.utils.http import urlencode | ||||
|  | ||||
| from passbook.app_gw.models import ApplicationGatewayProvider | ||||
| from passbook.app_gw.proxy.exceptions import InvalidUpstream | ||||
| from passbook.app_gw.proxy.response import get_django_response | ||||
| from passbook.app_gw.proxy.rewrite import Rewriter | ||||
| from passbook.app_gw.proxy.utils import encode_items, normalize_request_headers | ||||
| from passbook.core.models import Application | ||||
| from passbook.core.policies import PolicyEngine | ||||
|  | ||||
| SESSION_UPSTREAM_KEY = 'passbook_app_gw_upstream' | ||||
| IGNORED_HOSTNAMES_KEY = 'passbook_app_gw_ignored' | ||||
| LOGGER = getLogger(__name__) | ||||
| QUOTE_SAFE = r'<.;>\(}*+|~=-$/_:^@)[{]&\'!,"`' | ||||
| ERRORS_MESSAGES = { | ||||
|     'upstream-no-scheme': ("Upstream URL scheme must be either " | ||||
|                            "'http' or 'https' (%s).") | ||||
| } | ||||
| HTTP_NO_VERIFY = urllib3.PoolManager() | ||||
| HTTP = urllib3.PoolManager( | ||||
|     cert_reqs='CERT_REQUIRED', | ||||
|     ca_certs=certifi.where()) | ||||
| IGNORED_HOSTS = cache.get(IGNORED_HOSTNAMES_KEY, []) | ||||
| POLICY_CACHE = {} | ||||
|  | ||||
| class RequestHandler: | ||||
|     """Forward requests""" | ||||
|  | ||||
|     _parsed_url = None | ||||
|     _request_headers = None | ||||
|  | ||||
|     def __init__(self, app_gw, request): | ||||
|         self.app_gw = app_gw | ||||
|         self.request = request | ||||
|         if self.app_gw.pk not in POLICY_CACHE: | ||||
|             POLICY_CACHE[self.app_gw.pk] = self.app_gw.application.policies.all() | ||||
|  | ||||
|     @staticmethod | ||||
|     def find_app_gw_for_request(request): | ||||
|         """Check if a request should be proxied or forwarded to passbook""" | ||||
|         # Check if hostname is in cached list of ignored hostnames | ||||
|         # This saves us having to query the database on each request | ||||
|         host_header = request.META.get('HTTP_HOST') | ||||
|         if host_header in IGNORED_HOSTS: | ||||
|             # LOGGER.debug("%s is ignored", host_header) | ||||
|             return False | ||||
|         # Look through all ApplicationGatewayProviders and check hostnames | ||||
|         matches = ApplicationGatewayProvider.objects.filter( | ||||
|             server_name__contains=[host_header], | ||||
|             enabled=True) | ||||
|         if not matches.exists(): | ||||
|             # Mo matching Providers found, add host header to ignored list | ||||
|             IGNORED_HOSTS.append(host_header) | ||||
|             cache.set(IGNORED_HOSTNAMES_KEY, IGNORED_HOSTS) | ||||
|             # LOGGER.debug("Ignoring %s", host_header) | ||||
|             return False | ||||
|         # At this point we're certain there's a matching ApplicationGateway | ||||
|         if len(matches) > 1: | ||||
|             # This should never happen | ||||
|             raise ValueError | ||||
|         app_gw = matches.first() | ||||
|         try: | ||||
|             # Check if ApplicationGateway is associated with application | ||||
|             getattr(app_gw, 'application') | ||||
|             if app_gw: | ||||
|                 return app_gw | ||||
|         except Application.DoesNotExist: | ||||
|             pass | ||||
|             # LOGGER.debug("ApplicationGateway not associated with Application") | ||||
|         return True | ||||
|  | ||||
|     def _get_upstream(self): | ||||
|         """Choose random upstream and save in session""" | ||||
|         if SESSION_UPSTREAM_KEY not in self.request.session: | ||||
|             self.request.session[SESSION_UPSTREAM_KEY] = {} | ||||
|         if self.app_gw.pk not in self.request.session[SESSION_UPSTREAM_KEY]: | ||||
|             upstream_index = int(SystemRandom().random() * len(self.app_gw.upstream)) | ||||
|             self.request.session[SESSION_UPSTREAM_KEY][self.app_gw.pk] = upstream_index | ||||
|         return self.app_gw.upstream[self.request.session[SESSION_UPSTREAM_KEY][self.app_gw.pk]] | ||||
|  | ||||
|     def get_upstream(self): | ||||
|         """Get upstream as parsed url""" | ||||
|         upstream = self._get_upstream() | ||||
|  | ||||
|         self._parsed_url = urlparse(upstream) | ||||
|  | ||||
|         if self._parsed_url.scheme not in ('http', 'https'): | ||||
|             raise InvalidUpstream(ERRORS_MESSAGES['upstream-no-scheme'] % | ||||
|                                   upstream) | ||||
|  | ||||
|         return upstream | ||||
|  | ||||
|     def _format_path_to_redirect(self): | ||||
|         # LOGGER.debug("Path before: %s", self.request.get_full_path()) | ||||
|         rewriter = Rewriter(self.app_gw, self.request) | ||||
|         after = rewriter.build() | ||||
|         # LOGGER.debug("Path after: %s", after) | ||||
|         return after | ||||
|  | ||||
|     def get_proxy_request_headers(self): | ||||
|         """Get normalized headers for the upstream | ||||
|         Gets all headers from the original request and normalizes them. | ||||
|         Normalization occurs by removing the prefix ``HTTP_`` and | ||||
|         replacing and ``_`` by ``-``. Example: ``HTTP_ACCEPT_ENCODING`` | ||||
|         becames ``Accept-Encoding``. | ||||
|         .. versionadded:: 0.9.1 | ||||
|         :param request:  The original HTTPRequest instance | ||||
|         :returns:  Normalized headers for the upstream | ||||
|         """ | ||||
|         return normalize_request_headers(self.request) | ||||
|  | ||||
|     def get_request_headers(self): | ||||
|         """Return request headers that will be sent to upstream. | ||||
|         The header REMOTE_USER is set to the current user | ||||
|         if AuthenticationMiddleware is enabled and | ||||
|         the view's add_remote_user property is True. | ||||
|         .. versionadded:: 0.9.8 | ||||
|         """ | ||||
|         request_headers = self.get_proxy_request_headers() | ||||
|         if not self.app_gw.authentication_header: | ||||
|             return request_headers | ||||
|         request_headers[self.app_gw.authentication_header] = self.request.user.get_username() | ||||
|         # LOGGER.debug("%s set", self.app_gw.authentication_header) | ||||
|  | ||||
|         return request_headers | ||||
|  | ||||
|     def check_permission(self): | ||||
|         """Check if user is authenticated and has permission to access app""" | ||||
|         if not hasattr(self.request, 'user'): | ||||
|             return False | ||||
|         if not self.request.user.is_authenticated: | ||||
|             return False | ||||
|         policy_engine = PolicyEngine(POLICY_CACHE[self.app_gw.pk]) | ||||
|         policy_engine.for_user(self.request.user).with_request(self.request).build() | ||||
|         passing, _messages = policy_engine.result | ||||
|  | ||||
|         return passing | ||||
|  | ||||
|     def get_encoded_query_params(self): | ||||
|         """Return encoded query params to be used in proxied request""" | ||||
|         get_data = encode_items(self.request.GET.lists()) | ||||
|         return urlencode(get_data) | ||||
|  | ||||
|     def _created_proxy_response(self, path): | ||||
|         request_payload = self.request.body | ||||
|  | ||||
|         # LOGGER.debug("Request headers: %s", self._request_headers) | ||||
|  | ||||
|         request_url = self.get_upstream() + path | ||||
|         # LOGGER.debug("Request URL: %s", request_url) | ||||
|  | ||||
|         if self.request.GET: | ||||
|             request_url += '?' + self.get_encoded_query_params() | ||||
|             # LOGGER.debug("Request URL: %s", request_url) | ||||
|  | ||||
|         http = HTTP | ||||
|         if not self.app_gw.upstream_ssl_verification: | ||||
|             http = HTTP_NO_VERIFY | ||||
|  | ||||
|         try: | ||||
|             proxy_response = http.urlopen(self.request.method, | ||||
|                                           request_url, | ||||
|                                           redirect=False, | ||||
|                                           retries=None, | ||||
|                                           headers=self._request_headers, | ||||
|                                           body=request_payload, | ||||
|                                           decode_content=False, | ||||
|                                           preload_content=False) | ||||
|             # LOGGER.debug("Proxy response header: %s", | ||||
|             #              proxy_response.getheaders()) | ||||
|         except urllib3.exceptions.HTTPError as error: | ||||
|             LOGGER.exception(error) | ||||
|             raise | ||||
|  | ||||
|         return proxy_response | ||||
|  | ||||
|     def _replace_host_on_redirect_location(self, proxy_response): | ||||
|         location = proxy_response.headers.get('Location') | ||||
|         if location: | ||||
|             if self.request.is_secure(): | ||||
|                 scheme = 'https://' | ||||
|             else: | ||||
|                 scheme = 'http://' | ||||
|             request_host = scheme + self.request.META.get('HTTP_HOST') | ||||
|  | ||||
|             upstream_host_http = 'http://' + self._parsed_url.netloc | ||||
|             upstream_host_https = 'https://' + self._parsed_url.netloc | ||||
|  | ||||
|             location = location.replace(upstream_host_http, request_host) | ||||
|             location = location.replace(upstream_host_https, request_host) | ||||
|             proxy_response.headers['Location'] = location | ||||
|             # LOGGER.debug("Proxy response LOCATION: %s", | ||||
|             #              proxy_response.headers['Location']) | ||||
|  | ||||
|     def _set_content_type(self, proxy_response): | ||||
|         content_type = proxy_response.headers.get('Content-Type') | ||||
|         if not content_type: | ||||
|             content_type = (mimetypes.guess_type(self.request.path)[0] or | ||||
|                             self.app_gw.default_content_type) | ||||
|             proxy_response.headers['Content-Type'] = content_type | ||||
|             # LOGGER.debug("Proxy response CONTENT-TYPE: %s", | ||||
|             #              proxy_response.headers['Content-Type']) | ||||
|  | ||||
|     def get_response(self): | ||||
|         """Pass request to upstream and return response""" | ||||
|         self._request_headers = self.get_request_headers() | ||||
|  | ||||
|         path = self._format_path_to_redirect() | ||||
|         proxy_response = self._created_proxy_response(path) | ||||
|  | ||||
|         self._replace_host_on_redirect_location(proxy_response) | ||||
|         self._set_content_type(proxy_response) | ||||
|         response = get_django_response(proxy_response, strict_cookies=False) | ||||
|  | ||||
|         # If response has a 'Location' header, we rewrite that location as well | ||||
|         if 'Location' in response: | ||||
|             LOGGER.debug("Rewriting Location header") | ||||
|             for server_name in self.app_gw.server_name: | ||||
|                 response['Location'] = response['Location'].replace( | ||||
|                     self._parsed_url.hostname, server_name) | ||||
|             LOGGER.debug(response['Location']) | ||||
|  | ||||
|         # LOGGER.debug("RESPONSE RETURNED: %s", response) | ||||
|         return response | ||||
							
								
								
									
										63
									
								
								passbook/app_gw/proxy/response.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								passbook/app_gw/proxy/response.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,63 @@ | ||||
| """response functions from django-revproxy""" | ||||
| import logging | ||||
|  | ||||
| from django.http import HttpResponse, StreamingHttpResponse | ||||
|  | ||||
| from passbook.app_gw.proxy.utils import (cookie_from_string, | ||||
|                                          set_response_headers, should_stream) | ||||
|  | ||||
| #: Default number of bytes that are going to be read in a file lecture | ||||
| DEFAULT_AMT = 2 ** 16 | ||||
|  | ||||
| logger = logging.getLogger(__name__) | ||||
|  | ||||
|  | ||||
| def get_django_response(proxy_response, strict_cookies=False): | ||||
|     """This method is used to create an appropriate response based on the | ||||
|     Content-Length of the proxy_response. If the content is bigger than | ||||
|     MIN_STREAMING_LENGTH, which is found on utils.py, | ||||
|     than django.http.StreamingHttpResponse will be created, | ||||
|     else a django.http.HTTPResponse will be created instead | ||||
|  | ||||
|     :param proxy_response: An Instance of urllib3.response.HTTPResponse that | ||||
|                            will create an appropriate response | ||||
|     :param strict_cookies: Whether to only accept RFC-compliant cookies | ||||
|     :returns: Returns an appropriate response based on the proxy_response | ||||
|               content-length | ||||
|     """ | ||||
|     status = proxy_response.status | ||||
|     headers = proxy_response.headers | ||||
|  | ||||
|     logger.debug('Proxy response headers: %s', headers) | ||||
|  | ||||
|     content_type = headers.get('Content-Type') | ||||
|  | ||||
|     logger.debug('Content-Type: %s', content_type) | ||||
|  | ||||
|     if should_stream(proxy_response): | ||||
|         logger.info('Content-Length is bigger than %s', DEFAULT_AMT) | ||||
|         response = StreamingHttpResponse(proxy_response.stream(DEFAULT_AMT), | ||||
|                                          status=status, | ||||
|                                          content_type=content_type) | ||||
|     else: | ||||
|         content = proxy_response.data or b'' | ||||
|         response = HttpResponse(content, status=status, | ||||
|                                 content_type=content_type) | ||||
|  | ||||
|     logger.info('Normalizing response headers') | ||||
|     set_response_headers(response, headers) | ||||
|  | ||||
|     logger.debug('Response headers: %s', getattr(response, '_headers')) | ||||
|  | ||||
|     cookies = proxy_response.headers.getlist('set-cookie') | ||||
|     logger.info('Checking for invalid cookies') | ||||
|     for cookie_string in cookies: | ||||
|         cookie_dict = cookie_from_string(cookie_string, | ||||
|                                          strict_cookies=strict_cookies) | ||||
|         # if cookie is invalid cookie_dict will be None | ||||
|         if cookie_dict: | ||||
|             response.set_cookie(**cookie_dict) | ||||
|  | ||||
|     logger.debug('Response cookies: %s', response.cookies) | ||||
|  | ||||
|     return response | ||||
							
								
								
									
										42
									
								
								passbook/app_gw/proxy/rewrite.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								passbook/app_gw/proxy/rewrite.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,42 @@ | ||||
| """passbook app_gw rewriter""" | ||||
|  | ||||
| from passbook.app_gw.models import RewriteRule | ||||
|  | ||||
| RULE_CACHE = {} | ||||
|  | ||||
| class Context: | ||||
|     """Empty class which we dynamically add attributes to""" | ||||
|  | ||||
| class Rewriter: | ||||
|     """Apply rewrites""" | ||||
|  | ||||
|     __application = None | ||||
|     __request = None | ||||
|  | ||||
|     def __init__(self, application, request): | ||||
|         self.__application = application | ||||
|         self.__request = request | ||||
|         if self.__application.pk not in RULE_CACHE: | ||||
|             RULE_CACHE[self.__application.pk] = RewriteRule.objects.filter( | ||||
|                 provider__in=[self.__application]) | ||||
|  | ||||
|     def __build_context(self, matches): | ||||
|         """Build object with .0, .1, etc as groups and give access to request""" | ||||
|         context = Context() | ||||
|         for index, group_match in enumerate(matches.groups()): | ||||
|             setattr(context, "g%d" % (index + 1), group_match) | ||||
|         setattr(context, 'request', self.__request) | ||||
|         return context | ||||
|  | ||||
|     def build(self): | ||||
|         """Run all rules over path and return final path""" | ||||
|         path = self.__request.get_full_path() | ||||
|         for rule in RULE_CACHE[self.__application.pk]: | ||||
|             matches = rule.compiled_matcher.search(path) | ||||
|             if not matches: | ||||
|                 continue | ||||
|             replace_context = self.__build_context(matches) | ||||
|             path = rule.replacement.format(context=replace_context) | ||||
|             if rule.halt: | ||||
|                 return path | ||||
|         return path | ||||
							
								
								
									
										225
									
								
								passbook/app_gw/proxy/utils.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										225
									
								
								passbook/app_gw/proxy/utils.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,225 @@ | ||||
| """Utils from django-revproxy, slightly adjusted""" | ||||
| import logging | ||||
| import re | ||||
| from wsgiref.util import is_hop_by_hop | ||||
|  | ||||
| try: | ||||
|     from http.cookies import SimpleCookie | ||||
|     COOKIE_PREFIX = '' | ||||
| except ImportError: | ||||
|     from Cookie import SimpleCookie | ||||
|     COOKIE_PREFIX = 'Set-Cookie: ' | ||||
|  | ||||
|  | ||||
| #: List containing string constant that are used to represent headers that can | ||||
| #: be ignored in the required_header function | ||||
| IGNORE_HEADERS = ( | ||||
|     'HTTP_ACCEPT_ENCODING',  # We want content to be uncompressed so | ||||
|                              # we remove the Accept-Encoding from | ||||
|                              # original request | ||||
|     'HTTP_HOST', | ||||
|     'HTTP_REMOTE_USER', | ||||
| ) | ||||
|  | ||||
|  | ||||
| # Default from HTTP RFC 2616 | ||||
| #   See: http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.7.1 | ||||
| #: Variable that represent the default charset used | ||||
| DEFAULT_CHARSET = 'latin-1' | ||||
|  | ||||
| #: List containing string constants that represents possible html content type | ||||
| HTML_CONTENT_TYPES = ( | ||||
|     'text/html', | ||||
|     'application/xhtml+xml' | ||||
| ) | ||||
|  | ||||
| #: Variable used to represent a minimal content size required for response | ||||
| #: to be turned into stream | ||||
| MIN_STREAMING_LENGTH = 4 * 1024  # 4KB | ||||
|  | ||||
| #: Regex used to find charset in a html content type | ||||
| _get_charset_re = re.compile(r';\s*charset=(?P<charset>[^\s;]+)', re.I) | ||||
|  | ||||
|  | ||||
| def is_html_content_type(content_type): | ||||
|     """Function used to verify if the parameter is a proper html content type | ||||
|  | ||||
|     :param content_type: String variable that represent a content-type | ||||
|     :returns:  A boolean value stating if the content_type is a valid html | ||||
|                content type | ||||
|     """ | ||||
|     for html_content_type in HTML_CONTENT_TYPES: | ||||
|         if content_type.startswith(html_content_type): | ||||
|             return True | ||||
|  | ||||
|     return False | ||||
|  | ||||
|  | ||||
| def should_stream(proxy_response): | ||||
|     """Function to verify if the proxy_response must be converted into | ||||
|     a stream.This will be done by checking the proxy_response content-length | ||||
|     and verify if its length is bigger than one stipulated | ||||
|     by MIN_STREAMING_LENGTH. | ||||
|  | ||||
|     :param proxy_response: An Instance of urllib3.response.HTTPResponse | ||||
|     :returns: A boolean stating if the proxy_response should | ||||
|               be treated as a stream | ||||
|     """ | ||||
|     content_type = proxy_response.headers.get('Content-Type') | ||||
|  | ||||
|     if is_html_content_type(content_type): | ||||
|         return False | ||||
|  | ||||
|     try: | ||||
|         content_length = int(proxy_response.headers.get('Content-Length', 0)) | ||||
|     except ValueError: | ||||
|         content_length = 0 | ||||
|  | ||||
|     if not content_length or content_length > MIN_STREAMING_LENGTH: | ||||
|         return True | ||||
|  | ||||
|     return False | ||||
|  | ||||
|  | ||||
| def get_charset(content_type): | ||||
|     """Function used to retrieve the charset from a content-type.If there is no | ||||
|     charset in the content type then the charset defined on DEFAULT_CHARSET | ||||
|     will be returned | ||||
|  | ||||
|     :param  content_type:   A string containing a Content-Type header | ||||
|     :returns:               A string containing the charset | ||||
|     """ | ||||
|     if not content_type: | ||||
|         return DEFAULT_CHARSET | ||||
|  | ||||
|     matched = _get_charset_re.search(content_type) | ||||
|     if matched: | ||||
|         # Extract the charset and strip its double quotes | ||||
|         return matched.group('charset').replace('"', '') | ||||
|     return DEFAULT_CHARSET | ||||
|  | ||||
|  | ||||
| def required_header(header): | ||||
|     """Function that verify if the header parameter is a essential header | ||||
|  | ||||
|     :param header:  A string represented a header | ||||
|     :returns:       A boolean value that represent if the header is required | ||||
|     """ | ||||
|     if header in IGNORE_HEADERS: | ||||
|         return False | ||||
|  | ||||
|     if header.startswith('HTTP_') or header == 'CONTENT_TYPE': | ||||
|         return True | ||||
|  | ||||
|     return False | ||||
|  | ||||
|  | ||||
| def set_response_headers(response, response_headers): | ||||
|     """Set response's header""" | ||||
|     for header, value in response_headers.items(): | ||||
|         if is_hop_by_hop(header) or header.lower() == 'set-cookie': | ||||
|             continue | ||||
|  | ||||
|         response[header.title()] = value | ||||
|  | ||||
|     logger.debug('Response headers: %s', getattr(response, '_headers')) | ||||
|  | ||||
|  | ||||
| def normalize_request_headers(request): | ||||
|     """Function used to transform header, replacing 'HTTP\\_' to '' | ||||
|     and replace '_' to '-' | ||||
|  | ||||
|     :param request:  A HttpRequest that will be transformed | ||||
|     :returns:        A dictionary with the normalized headers | ||||
|     """ | ||||
|     norm_headers = {} | ||||
|     for header, value in request.META.items(): | ||||
|         if required_header(header): | ||||
|             norm_header = header.replace('HTTP_', '').title().replace('_', '-') | ||||
|             norm_headers[norm_header] = value | ||||
|  | ||||
|     return norm_headers | ||||
|  | ||||
|  | ||||
| def encode_items(items): | ||||
|     """Function that encode all elements in the list of items passed as | ||||
|     a parameter | ||||
|  | ||||
|     :param items:  A list of tuple | ||||
|     :returns:      A list of tuple with all items encoded in 'utf-8' | ||||
|     """ | ||||
|     encoded = [] | ||||
|     for key, values in items: | ||||
|         for value in values: | ||||
|             encoded.append((key.encode('utf-8'), value.encode('utf-8'))) | ||||
|     return encoded | ||||
|  | ||||
|  | ||||
| logger = logging.getLogger('revproxy.cookies') | ||||
|  | ||||
|  | ||||
| def cookie_from_string(cookie_string, strict_cookies=False): | ||||
|     """Parser for HTTP header set-cookie | ||||
|     The return from this function will be used as parameters for | ||||
|     django's response.set_cookie method. Because set_cookie doesn't | ||||
|     have parameter comment, this cookie attribute will be ignored. | ||||
|  | ||||
|     :param  cookie_string: A string representing a valid cookie | ||||
|     :param  strict_cookies: Whether to only accept RFC-compliant cookies | ||||
|     :returns: A dictionary containing the cookie_string attributes | ||||
|     """ | ||||
|  | ||||
|     if strict_cookies: | ||||
|  | ||||
|         cookies = SimpleCookie(COOKIE_PREFIX + cookie_string) | ||||
|         if not cookies.keys(): | ||||
|             return None | ||||
|         cookie_name, = cookies.keys() | ||||
|         cookie_dict = {k: v for k, v in cookies[cookie_name].items() | ||||
|                        if v and k != 'comment'} | ||||
|         cookie_dict['key'] = cookie_name | ||||
|         cookie_dict['value'] = cookies[cookie_name].value | ||||
|         return cookie_dict | ||||
|     valid_attrs = ('path', 'domain', 'comment', 'expires', | ||||
|                    'max_age', 'httponly', 'secure') | ||||
|  | ||||
|     cookie_dict = {} | ||||
|  | ||||
|     cookie_parts = cookie_string.split(';') | ||||
|     try: | ||||
|         cookie_dict['key'], cookie_dict['value'] = \ | ||||
|             cookie_parts[0].split('=', 1) | ||||
|         cookie_dict['value'] = cookie_dict['value'].replace('"', '') | ||||
|     except ValueError: | ||||
|         logger.warning('Invalid cookie: `%s`', cookie_string) | ||||
|         return None | ||||
|  | ||||
|     if cookie_dict['value'].startswith('='): | ||||
|         logger.warning('Invalid cookie: `%s`', cookie_string) | ||||
|         return None | ||||
|  | ||||
|     for part in cookie_parts[1:]: | ||||
|         if '=' in part: | ||||
|             attr, value = part.split('=', 1) | ||||
|             value = value.strip() | ||||
|         else: | ||||
|             attr = part | ||||
|             value = '' | ||||
|  | ||||
|         attr = attr.strip().lower() | ||||
|         if not attr: | ||||
|             continue | ||||
|  | ||||
|         if attr in valid_attrs: | ||||
|             if attr in ('httponly', 'secure'): | ||||
|                 cookie_dict[attr] = True | ||||
|             elif attr in 'comment': | ||||
|                 # ignoring comment attr as explained in the | ||||
|                 # function docstring | ||||
|                 continue | ||||
|             else: | ||||
|                 cookie_dict[attr] = value | ||||
|         else: | ||||
|             logger.warning('Unknown cookie attribute %s', attr) | ||||
|  | ||||
|         return cookie_dict | ||||
							
								
								
									
										5
									
								
								passbook/app_gw/settings.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								passbook/app_gw/settings.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,5 @@ | ||||
| """Application Security Gateway settings""" | ||||
| INSTALLED_APPS = [ | ||||
|     'channels' | ||||
| ] | ||||
| ASGI_APPLICATION = "passbook.app_gw.websocket.routing.application" | ||||
							
								
								
									
										20
									
								
								passbook/app_gw/signals.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								passbook/app_gw/signals.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,20 @@ | ||||
| """passbook app_gw cache clean signals""" | ||||
|  | ||||
| from logging import getLogger | ||||
|  | ||||
| from django.core.cache import cache | ||||
| from django.db.models.signals import post_save | ||||
| from django.dispatch import receiver | ||||
|  | ||||
| from passbook.app_gw.models import ApplicationGatewayProvider | ||||
| from passbook.app_gw.proxy.handler import IGNORED_HOSTNAMES_KEY | ||||
|  | ||||
| LOGGER = getLogger(__name__) | ||||
|  | ||||
| @receiver(post_save) | ||||
| # pylint: disable=unused-argument | ||||
| def invalidate_app_gw_cache(sender, instance, **kwargs): | ||||
|     """Invalidate Policy cache when app_gw is updated""" | ||||
|     if isinstance(instance, ApplicationGatewayProvider): | ||||
|         LOGGER.debug("Invalidating cache for ignored hostnames") | ||||
|         cache.delete(IGNORED_HOSTNAMES_KEY) | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	