author | Aurelien Campeas <aurelien.campeas@logilab.fr> |
Wed, 29 Apr 2009 19:48:27 +0200 | |
branch | tls-sprint |
changeset 1559 | c4d4851bd18b |
parent 1490 | 6b024694d493 |
child 1663 | 89efe0e744cf |
child 1668 | d2ac1d681d70 |
permissions | -rw-r--r-- |
0 | 1 |
"""user authentication component |
2 |
||
3 |
:organization: Logilab |
|
4 |
:copyright: 2001-2008 LOGILAB S.A. (Paris, FRANCE), all rights reserved. |
|
5 |
:contact: http://www.logilab.fr/ -- mailto:contact@logilab.fr |
|
6 |
""" |
|
7 |
__docformat__ = "restructuredtext en" |
|
8 |
||
9 |
from logilab.common.decorators import clear_cache |
|
10 |
||
11 |
from cubicweb import AuthenticationError, BadConnectionId |
|
12 |
from cubicweb.dbapi import repo_connect, ConnectionProperties |
|
13 |
from cubicweb.web import ExplicitLogin, InvalidSession |
|
14 |
from cubicweb.web.application import AbstractAuthenticationManager |
|
15 |
||
16 |
||
17 |
class RepositoryAuthenticationManager(AbstractAuthenticationManager): |
|
18 |
"""authenticate user associated to a request and check session validity""" |
|
19 |
||
20 |
def __init__(self): |
|
21 |
self.repo = self.config.repository(self.vreg) |
|
22 |
self.log_queries = self.config['query-log-file'] |
|
23 |
||
24 |
def validate_session(self, req, session): |
|
25 |
"""check session validity, and return eventually hijacked session |
|
26 |
||
27 |
:raise InvalidSession: |
|
28 |
if session is corrupted for a reason or another and should be closed |
|
29 |
""" |
|
30 |
# with this authentication manager, session is actually a dbapi |
|
31 |
# connection |
|
32 |
cnx = session |
|
33 |
login = req.get_authorization()[0] |
|
34 |
try: |
|
35 |
# calling cnx.user() check connection validity, raise |
|
36 |
# BadConnectionId on failure |
|
37 |
user = cnx.user(req) |
|
38 |
if login and user.login != login: |
|
39 |
cnx.close() |
|
40 |
raise InvalidSession('login mismatch') |
|
41 |
except BadConnectionId: |
|
42 |
# check if a connection should be automatically restablished |
|
43 |
if (login is None or login == cnx.login): |
|
44 |
login, password = cnx.login, cnx.password |
|
45 |
cnx = self.authenticate(req, login, password) |
|
46 |
user = cnx.user(req) |
|
47 |
# backport session's data |
|
48 |
cnx.data = session.data |
|
49 |
else: |
|
50 |
raise InvalidSession('bad connection id') |
|
51 |
# associate the connection to the current request |
|
52 |
req.set_connection(cnx, user) |
|
53 |
return cnx |
|
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
54 |
|
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
55 |
def login_from_email(self, login): |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
56 |
session = self.repo.internal_session() |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
57 |
rset = session.execute('Any L WHERE U login L, U primary_email M, ' |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
58 |
'M address %(login)s', {'login': login}) |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
59 |
if rset.rowcount == 1: |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
60 |
login = rset[0][0] |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
61 |
return login |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
62 |
|
0 | 63 |
def authenticate(self, req, _login=None, _password=None): |
64 |
"""authenticate user and return corresponding user object |
|
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
65 |
|
0 | 66 |
:raise ExplicitLogin: if authentication is required (no authentication |
67 |
info found or wrong user/password) |
|
68 |
||
69 |
Note: this method is violating AuthenticationManager interface by |
|
70 |
returning a session instance instead of the user. This is expected by |
|
71 |
the InMemoryRepositorySessionManager. |
|
72 |
""" |
|
73 |
if _login is not None: |
|
74 |
login, password = _login, _password |
|
75 |
else: |
|
76 |
login, password = req.get_authorization() |
|
1490
6b024694d493
add allow-email-login option
Florent <florent@secondweb.fr>
parents:
1488
diff
changeset
|
77 |
if self.vreg.config['allow-email-login'] and '@' in (login or u''): |
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
78 |
login = self.login_from_email(login) |
0 | 79 |
if not login: |
80 |
# No session and no login -> try anonymous |
|
81 |
login, password = self.vreg.config.anonymous_user() |
|
82 |
if not login: # anonymous not authorized |
|
83 |
raise ExplicitLogin() |
|
84 |
# remove possibly cached cursor coming from closed connection |
|
85 |
clear_cache(req, 'cursor') |
|
86 |
cnxprops = ConnectionProperties(self.vreg.config.repo_method, |
|
87 |
close=False, log=self.log_queries) |
|
88 |
try: |
|
89 |
cnx = repo_connect(self.repo, login, password, cnxprops=cnxprops) |
|
90 |
except AuthenticationError: |
|
91 |
req.set_message(req._('authentication failure')) |
|
92 |
# restore an anonymous connection if possible |
|
93 |
anonlogin, anonpassword = self.vreg.config.anonymous_user() |
|
94 |
if anonlogin and anonlogin != login: |
|
95 |
cnx = repo_connect(self.repo, anonlogin, anonpassword, |
|
96 |
cnxprops=cnxprops) |
|
97 |
self._init_cnx(cnx, anonlogin, anonpassword) |
|
98 |
else: |
|
99 |
raise ExplicitLogin() |
|
100 |
else: |
|
101 |
self._init_cnx(cnx, login, password) |
|
102 |
# associate the connection to the current request |
|
103 |
req.set_connection(cnx) |
|
104 |
return cnx |
|
105 |
||
106 |
def _init_cnx(self, cnx, login, password): |
|
107 |
# decorate connection |
|
108 |
if login == self.vreg.config.anonymous_user()[0]: |
|
109 |
cnx.anonymous_connection = True |
|
110 |
cnx.vreg = self.vreg |
|
111 |
cnx.login = login |
|
112 |
cnx.password = password |
|
113 |