[packaging] 3.8 depends on lgc 0.50 (new argument to dot generator in lgc.graph)
"""user authentication component:organization: Logilab:copyright: 2001-2010 LOGILAB S.A. (Paris, FRANCE), license is LGPL v2.:contact: http://www.logilab.fr/ -- mailto:contact@logilab.fr:license: GNU Lesser General Public License, v2.1 - http://www.gnu.org/licenses"""__docformat__="restructuredtext en"fromlogilab.common.decoratorsimportclear_cachefromcubicwebimportAuthenticationError,BadConnectionIdfromcubicweb.viewimportComponentfromcubicweb.dbapiimportrepo_connect,ConnectionPropertiesfromcubicweb.webimportInvalidSessionfromcubicweb.web.applicationimportAbstractAuthenticationManagerclassNoAuthInfo(Exception):passclassWebAuthInfoRetreiver(Component):__registry__='webauth'order=Nonedefauthentication_information(self,req):"""retreive authentication information from the given request, raise NoAuthInfo if expected information is not found. """raiseNotImplementedError()defauthenticated(self,retreiver,req,cnx,login,authinfo):"""callback when return authentication information have opened a repository connection successfully. Take care req has no session attached yet, hence req.execute isn't available. """passclassLoginPasswordRetreiver(WebAuthInfoRetreiver):__regid__='loginpwdauth'order=10defauthentication_information(self,req):"""retreive authentication information from the given request, raise NoAuthInfo if expected information is not found. """login,password=req.get_authorization()ifnotlogin:raiseNoAuthInfo()returnlogin,{'password':password}classRepositoryAuthenticationManager(AbstractAuthenticationManager):"""authenticate user associated to a request and check session validity"""def__init__(self,vreg):super(RepositoryAuthenticationManager,self).__init__(vreg)self.repo=vreg.config.repository(vreg)self.log_queries=vreg.config['query-log-file']self.authinforetreivers=sorted(vreg['webauth'].possible_objects(vreg),key=lambdax:x.order)assertself.authinforetreivers# 2-uple login / password, login is None when no anonymous access# configuredself.anoninfo=vreg.config.anonymous_user()ifself.anoninfo[0]:self.anoninfo=(self.anoninfo[0],{'password':self.anoninfo[1]})defvalidate_session(self,req,session):"""check session validity, reconnecting it to the repository if the associated connection expired in the repository side (hence the necessity for this method). Return the connected user on success. raise :exc:`InvalidSession` if session is corrupted for a reason or another and should be closed """# with this authentication manager, session is actually a dbapi# connectioncnx=session.cnxlogin=req.get_authorization()[0]# check cnx.login and not user.login, since in case of login by# email, login and cnx.login are the email while user.login is the# actual user loginifloginandsession.login!=login:raiseInvalidSession('login mismatch')try:# calling cnx.user() check connection validity, raise# BadConnectionId on failureuser=cnx.user(req)exceptBadConnectionId:# check if a connection should be automatically restablishedif(loginisNoneorlogin==session.login):cnx=self._authenticate(session.login,session.authinfo)user=cnx.user(req)session.cnx=cnxelse:raiseInvalidSession('bad connection id')returnuserdefauthenticate(self,req):"""authenticate user using connection information found in the request, and return corresponding a :class:`~cubicweb.dbapi.Connection` instance, as well as login and authentication information dictionary used to open the connection. raise :exc:`cubicweb.AuthenticationError` if authentication failed (no authentication info found or wrong user/password) """forretreiverinself.authinforetreivers:try:login,authinfo=retreiver.authentication_information(req)exceptNoAuthInfo:continuetry:cnx=self._authenticate(login,authinfo)exceptAuthenticationError:continue# the next one may succeedforretreiver_inself.authinforetreivers:retreiver_.authenticated(retreiver,req,cnx,login,authinfo)returncnx,login,authinfo# false if no authentication info found, eg this is not an# authentication failureif'login'inlocals():req.set_message(req._('authentication failure'))login,authinfo=self.anoninfoiflogin:cnx=self._authenticate(login,authinfo)cnx.anonymous_connection=Truereturncnx,login,authinforaiseAuthenticationError()def_authenticate(self,login,authinfo):cnxprops=ConnectionProperties(self.vreg.config.repo_method,close=False,log=self.log_queries)cnx=repo_connect(self.repo,login,cnxprops=cnxprops,**authinfo)# decorate connectioncnx.vreg=self.vregreturncnx