policies: add AccessDeniedResponse as general response when access was denied

This commit is contained in:
Jens Langhammer 2020-09-15 09:53:59 +02:00
parent e7472de4bf
commit 92f79eb30e
3 changed files with 52 additions and 8 deletions

44
passbook/policies/http.py Normal file
View File

@ -0,0 +1,44 @@
"""policy http response"""
from typing import Any, Dict, Optional
from django.http.request import HttpRequest
from django.template.response import TemplateResponse
from django.utils.translation import gettext as _
from passbook.core.models import PASSBOOK_USER_DEBUG
from passbook.policies.types import PolicyResult
class AccessDeniedResponse(TemplateResponse):
"""Response used for access denied messages. Can optionally show an error message,
and if the user is a superuser or has user_debug enabled, shows a policy result."""
title: str
error_message: Optional[str] = None
policy_result: Optional[PolicyResult] = None
def __init__(self, request: HttpRequest) -> None:
# For some reason pyright complains about keyword argument usage here
# pyright: reportGeneralTypeIssues=false
super().__init__(request=request, template="policies/denied.html")
self.title = _("Access denied")
def resolve_context(
self, context: Optional[Dict[str, Any]]
) -> Optional[Dict[str, Any]]:
if not context:
context = {}
context["title"] = self.title
if self.error_message:
context["error"] = self.error_message
# Only show policy result if user is authenticated and
# either superuser or has PASSBOOK_USER_DEBUG set
if self.policy_result:
if self._request.user and self._request.user.is_authenticated:
if (
self._request.user.is_superuser
or self._request.user.attributes.get(PASSBOOK_USER_DEBUG, False)
):
context["policy_result"] = self.policy_result
return context

View File

@ -5,16 +5,13 @@ from django.contrib import messages
from django.contrib.auth.mixins import AccessMixin from django.contrib.auth.mixins import AccessMixin
from django.contrib.auth.views import redirect_to_login from django.contrib.auth.views import redirect_to_login
from django.http import HttpRequest, HttpResponse from django.http import HttpRequest, HttpResponse
from django.shortcuts import redirect
from django.utils.translation import gettext as _ from django.utils.translation import gettext as _
from structlog import get_logger from structlog import get_logger
from passbook.core.models import Application, Provider, User from passbook.core.models import Application, Provider, User
from passbook.flows.views import ( from passbook.flows.views import SESSION_KEY_APPLICATION_PRE
SESSION_KEY_APPLICATION_PRE,
SESSION_KEY_DENIED_POLICY_RESULT,
)
from passbook.policies.engine import PolicyEngine from passbook.policies.engine import PolicyEngine
from passbook.policies.http import AccessDeniedResponse
from passbook.policies.types import PolicyResult from passbook.policies.types import PolicyResult
LOGGER = get_logger() LOGGER = get_logger()
@ -31,6 +28,9 @@ class PolicyAccessMixin(BaseMixin, AccessMixin):
Provider functions to check application access, etc""" Provider functions to check application access, etc"""
def handle_no_permission(self, application: Optional[Application] = None): def handle_no_permission(self, application: Optional[Application] = None):
"""User has no access and is not authenticated, so we remember the application
they try to access and redirect to the login URL. The application is saved to show
a hint on the Identification Stage what the user should login for."""
if application: if application:
self.request.session[SESSION_KEY_APPLICATION_PRE] = application self.request.session[SESSION_KEY_APPLICATION_PRE] = application
return redirect_to_login( return redirect_to_login(
@ -43,10 +43,10 @@ class PolicyAccessMixin(BaseMixin, AccessMixin):
self, result: Optional[PolicyResult] = None self, result: Optional[PolicyResult] = None
) -> HttpResponse: ) -> HttpResponse:
"""Function called when user has no permissions but is authenticated""" """Function called when user has no permissions but is authenticated"""
response = AccessDeniedResponse(self.request)
if result: if result:
self.request.session[SESSION_KEY_DENIED_POLICY_RESULT] = result response.policy_result = result
# TODO: Remove this URL and render the view instead return response
return redirect("passbook_flows:denied")
def provider_to_application(self, provider: Provider) -> Application: def provider_to_application(self, provider: Provider) -> Application:
"""Lookup application assigned to provider, throw error if no application assigned""" """Lookup application assigned to provider, throw error if no application assigned"""