author | sylvain.thenault@logilab.fr |
Tue, 05 May 2009 19:31:00 +0200 | |
branch | tls-sprint |
changeset 1699 | f61402624f7b |
parent 1690 | e4f7d2ddc99a |
child 1977 | 606923dff11b |
permissions | -rw-r--r-- |
0 | 1 |
"""user authentication component |
2 |
||
3 |
:organization: Logilab |
|
1668 | 4 |
:copyright: 2001-2009 LOGILAB S.A. (Paris, FRANCE), all rights reserved. |
0 | 5 |
:contact: http://www.logilab.fr/ -- mailto:contact@logilab.fr |
6 |
""" |
|
7 |
__docformat__ = "restructuredtext en" |
|
8 |
||
9 |
from logilab.common.decorators import clear_cache |
|
10 |
||
11 |
from cubicweb import AuthenticationError, BadConnectionId |
|
12 |
from cubicweb.dbapi import repo_connect, ConnectionProperties |
|
13 |
from cubicweb.web import ExplicitLogin, InvalidSession |
|
14 |
from cubicweb.web.application import AbstractAuthenticationManager |
|
1668 | 15 |
|
0 | 16 |
|
17 |
class RepositoryAuthenticationManager(AbstractAuthenticationManager): |
|
18 |
"""authenticate user associated to a request and check session validity""" |
|
1668 | 19 |
|
0 | 20 |
def __init__(self): |
21 |
self.repo = self.config.repository(self.vreg) |
|
22 |
self.log_queries = self.config['query-log-file'] |
|
23 |
||
24 |
def validate_session(self, req, session): |
|
25 |
"""check session validity, and return eventually hijacked session |
|
26 |
||
27 |
:raise InvalidSession: |
|
28 |
if session is corrupted for a reason or another and should be closed |
|
29 |
""" |
|
30 |
# with this authentication manager, session is actually a dbapi |
|
31 |
# connection |
|
32 |
cnx = session |
|
33 |
login = req.get_authorization()[0] |
|
34 |
try: |
|
35 |
# calling cnx.user() check connection validity, raise |
|
36 |
# BadConnectionId on failure |
|
37 |
user = cnx.user(req) |
|
38 |
if login and user.login != login: |
|
39 |
cnx.close() |
|
40 |
raise InvalidSession('login mismatch') |
|
41 |
except BadConnectionId: |
|
42 |
# check if a connection should be automatically restablished |
|
43 |
if (login is None or login == cnx.login): |
|
44 |
login, password = cnx.login, cnx.password |
|
45 |
cnx = self.authenticate(req, login, password) |
|
46 |
user = cnx.user(req) |
|
47 |
# backport session's data |
|
48 |
cnx.data = session.data |
|
49 |
else: |
|
50 |
raise InvalidSession('bad connection id') |
|
51 |
# associate the connection to the current request |
|
52 |
req.set_connection(cnx, user) |
|
53 |
return cnx |
|
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
54 |
|
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
55 |
def login_from_email(self, login): |
1664
03ebeccf9f1d
add XXX before 2 calls to self.repo.internal_session() on the web interface side
Florent <florent@secondweb.fr>
parents:
1663
diff
changeset
|
56 |
# XXX should not be called from web interface |
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
57 |
session = self.repo.internal_session() |
1663
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
58 |
try: |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
59 |
rset = session.execute('Any L WHERE U login L, U primary_email M, ' |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
60 |
'M address %(login)s', {'login': login}) |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
61 |
if rset.rowcount == 1: |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
62 |
login = rset[0][0] |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
63 |
finally: |
89efe0e744cf
close internal session in login_from_email
Florent <florent@secondweb.fr>
parents:
1490
diff
changeset
|
64 |
session.close() |
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
65 |
return login |
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
66 |
|
0 | 67 |
def authenticate(self, req, _login=None, _password=None): |
68 |
"""authenticate user and return corresponding user object |
|
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
69 |
|
0 | 70 |
:raise ExplicitLogin: if authentication is required (no authentication |
71 |
info found or wrong user/password) |
|
72 |
||
73 |
Note: this method is violating AuthenticationManager interface by |
|
74 |
returning a session instance instead of the user. This is expected by |
|
75 |
the InMemoryRepositorySessionManager. |
|
76 |
""" |
|
77 |
if _login is not None: |
|
78 |
login, password = _login, _password |
|
79 |
else: |
|
80 |
login, password = req.get_authorization() |
|
1490
6b024694d493
add allow-email-login option
Florent <florent@secondweb.fr>
parents:
1488
diff
changeset
|
81 |
if self.vreg.config['allow-email-login'] and '@' in (login or u''): |
1488
6da89a703c5a
add ability to login with a primary email address - no tests for now are unittest_application.py are now broken
Florent <florent@secondweb.fr>
parents:
0
diff
changeset
|
82 |
login = self.login_from_email(login) |
0 | 83 |
if not login: |
84 |
# No session and no login -> try anonymous |
|
85 |
login, password = self.vreg.config.anonymous_user() |
|
86 |
if not login: # anonymous not authorized |
|
87 |
raise ExplicitLogin() |
|
88 |
# remove possibly cached cursor coming from closed connection |
|
89 |
clear_cache(req, 'cursor') |
|
90 |
cnxprops = ConnectionProperties(self.vreg.config.repo_method, |
|
91 |
close=False, log=self.log_queries) |
|
92 |
try: |
|
93 |
cnx = repo_connect(self.repo, login, password, cnxprops=cnxprops) |
|
94 |
except AuthenticationError: |
|
95 |
req.set_message(req._('authentication failure')) |
|
96 |
# restore an anonymous connection if possible |
|
97 |
anonlogin, anonpassword = self.vreg.config.anonymous_user() |
|
98 |
if anonlogin and anonlogin != login: |
|
99 |
cnx = repo_connect(self.repo, anonlogin, anonpassword, |
|
100 |
cnxprops=cnxprops) |
|
101 |
self._init_cnx(cnx, anonlogin, anonpassword) |
|
102 |
else: |
|
103 |
raise ExplicitLogin() |
|
104 |
else: |
|
105 |
self._init_cnx(cnx, login, password) |
|
106 |
# associate the connection to the current request |
|
107 |
req.set_connection(cnx) |
|
108 |
return cnx |
|
109 |
||
110 |
def _init_cnx(self, cnx, login, password): |
|
111 |
# decorate connection |
|
112 |
if login == self.vreg.config.anonymous_user()[0]: |
|
113 |
cnx.anonymous_connection = True |
|
114 |
cnx.vreg = self.vreg |
|
115 |
cnx.login = login |
|
116 |
cnx.password = password |
|
117 |