76 lines
3 KiB
Python
76 lines
3 KiB
Python
"""passbook OAuth2 Views"""
|
|
from logging import getLogger
|
|
from urllib.parse import urlencode
|
|
|
|
from django.contrib import messages
|
|
from django.contrib.auth.mixins import LoginRequiredMixin
|
|
from django.shortcuts import get_object_or_404, redirect, reverse
|
|
from django.utils.translation import ugettext as _
|
|
from oauth2_provider.views.base import AuthorizationView
|
|
|
|
from passbook.audit.models import AuditEntry
|
|
from passbook.core.models import Application
|
|
from passbook.core.views.access import AccessMixin
|
|
from passbook.core.views.utils import LoadingView, PermissionDeniedView
|
|
from passbook.oauth_provider.models import OAuth2Provider
|
|
|
|
LOGGER = getLogger(__name__)
|
|
|
|
|
|
class PassbookAuthorizationLoadingView(LoginRequiredMixin, LoadingView):
|
|
"""Show loading view for permission checks"""
|
|
|
|
title = _('Checking permissions...')
|
|
|
|
def get_url(self):
|
|
querystring = urlencode(self.request.GET)
|
|
return reverse('passbook_oauth_provider:oauth2-ok-authorize')+'?'+querystring
|
|
|
|
|
|
class OAuthPermissionDenied(PermissionDeniedView):
|
|
"""Show permission denied view"""
|
|
|
|
|
|
class PassbookAuthorizationView(AccessMixin, AuthorizationView):
|
|
"""Custom OAuth2 Authorization View which checks policies, etc"""
|
|
|
|
_application = None
|
|
|
|
def dispatch(self, request, *args, **kwargs):
|
|
"""Update OAuth2Provider's skip_authorization state"""
|
|
# Get client_id to get provider, so we can update skip_authorization field
|
|
client_id = request.GET.get('client_id')
|
|
provider = get_object_or_404(OAuth2Provider, client_id=client_id)
|
|
try:
|
|
application = self.provider_to_application(provider)
|
|
except Application.DoesNotExist:
|
|
return redirect('passbook_oauth_provider:oauth2-permission-denied')
|
|
# Update field here so oauth-toolkit does work for us
|
|
provider.skip_authorization = application.skip_authorization
|
|
provider.save()
|
|
self._application = application
|
|
# Check permissions
|
|
passing, policy_meaages = self.user_has_access(self._application, request.user)
|
|
if not passing:
|
|
for policy_meaage in policy_meaages:
|
|
messages.error(request, policy_meaage)
|
|
return redirect('passbook_oauth_provider:oauth2-permission-denied')
|
|
actual_response = super().dispatch(request, *args, **kwargs)
|
|
if actual_response.status_code == 400:
|
|
LOGGER.debug(request.GET.get('redirect_uri'))
|
|
return actual_response
|
|
|
|
def render_to_response(self, context, **kwargs):
|
|
# Always set is_login to true for correct css class
|
|
context['is_login'] = True
|
|
return super().render_to_response(context, **kwargs)
|
|
|
|
def form_valid(self, form):
|
|
# User has clicked on "Authorize"
|
|
AuditEntry.create(
|
|
action=AuditEntry.ACTION_AUTHORIZE_APPLICATION,
|
|
request=self.request,
|
|
app=str(self._application))
|
|
LOGGER.debug('user %s authorized %s', self.request.user, self._application)
|
|
return super().form_valid(form)
|