"""A WSGI app for serving CAS. """ import datetime import os import random import time try: from urllib import urlencode # Python 2.x except ImportError: # pragma: no cover from urllib.parse import urlencode # Python 3.x try: from urlparse import urlparse, parse_qsl, urlunparse # Python 2.x except ImportError: # pragma: no cover from urllib.parse import urlparse, parse_qsl, urlunparse # Python 3.x from webob import exc, Response from webob.dec import wsgify from waeup.cas.authenticators import get_authenticator from waeup.cas.db import ( DB, DBSessionContext, LoginTicket, ServiceTicket, TicketGrantingCookie) template_dir = os.path.join(os.path.dirname(__file__), 'templates') RANDOM = random.SystemRandom(os.urandom(1024)) #: The chars allowed by protocol specification for tickets and cookie #: values. ALPHABET = ('abcdefghijklmnopqrstuvwxyz' 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' '01234567789-') def get_random_string(length): """Get a random string of length `length`. The returned string should be hard to guess but is not neccessarily unique. """ return ''.join([RANDOM.choice(ALPHABET) for x in range(length)]) def get_unique_string(): """Get a unique string based on current time. The returned string contains only chars from `ALPHABET`. We try to be unique by using a timestamp in high resolution, so that even tickets created shortly after another should differ. On very fast machines, however, this might be not enough (currently we use 16 decimal places). This is fast because we don't have to fetch foreign data sources nor have to do database lookups. The returned string will be unique but it won't be hard to guess for people able to read a clock. """ return ('%.16f' % time.time()).replace('.', '-') def create_service_ticket(user, service=None, sso=True): """Get a service ticket. Ticket length will be 32 chars, randomly picked from `ALPHABET`. """ t_id = 'ST-' + get_random_string(29) return ServiceTicket(t_id, user, service, sso) def check_service_ticket(db, ticket, service, renew=False): """Check whether (`ticket`, `service`) represents a valid service ticket in `db`. Returns a database set or ``None``. """ if None in (ticket, service): return None ticket, service = str(ticket), str(service) q = db.query(ServiceTicket).filter( ServiceTicket.ticket == ticket).filter( ServiceTicket.service == service).first() if renew and q.sso: return None return q def create_login_ticket(): """Create a unique login ticket. Login tickets are required to be unique (but not neccessarily hard to guess), according to protocol specification. """ t_id = 'LT-%s' % get_unique_string() return LoginTicket(t_id) def check_login_ticket(db, lt_string): """Check whether `lt_string` represents a valid login ticket in `db`. """ if lt_string is None: return False q = db.query(LoginTicket).filter(LoginTicket.ticket == str(lt_string)) result = [x for x in q] if result: db.delete(result[0]) return len(result) > 0 def create_tgc_value(): """Get a ticket granting cookie value. """ value = 'TGC-' + get_random_string(128) return TicketGrantingCookie(value) def set_session_cookie(db, response): """Create a session cookie (ticket granting cookie) on `response`. The `db` database is used to make the created cookie value persistent. """ tgc = create_tgc_value() db.add(tgc) response.set_cookie( 'cas-tgc', tgc.value, path='/', secure=True, httponly=True) return response def delete_session_cookie(db, response, old_value=None): """Delete session cookie. Sets cookie with expiration date in past and deletes respective entry from database. """ if old_value is not None: # delete old tgc from db q = db.query(TicketGrantingCookie).filter( TicketGrantingCookie.value == old_value) result = list(q) if len(result) == 1: db.delete(result[0]) response.set_cookie( 'cas-tgc', '', path='/', secure=True, httponly=True, expires=datetime.datetime(1970, 1, 1, 0, 0, 0)) return response def check_session_cookie(db, cookie_value): """Check whether `cookie_value` represents a valid ticket granting ticket in `db`. `cookie_value` is a string representing a ticket granting ticket maybe stored in `db`. If a respective cookie can be found, a :class:`waeup.cas.db.TicketGrantingCookie` is returend. Else ``None`` is returned. """ if cookie_value is None: return None try: # turn value into unicode (py2.x) / str (py3.x) cookie_value = cookie_value.decode('utf-8') except AttributeError: # pragma: no cover pass q = db.query(TicketGrantingCookie).filter( TicketGrantingCookie.value == cookie_value) result = [x for x in q] if len(result): return result[0] return None def get_template(name): path = os.path.join(template_dir, name) if os.path.isfile(path): return open(path, 'r').read() return None def update_url(url, params_dict): """Update query params of an url. The `url` is modified to have the query parameters set to keys/values in `params_dict`, preserving any different existing keys/values and overwriting any existing keys/values that are also in `params_dict`. Thus, ``'http://sample?a=1', dict(b='1')`` will result in ``'http://sample?a=1&b=1`` and similar. """ parts = [x for x in urlparse(url)] old_params = dict(parse_qsl(parts[4])) old_params.update(params_dict) query_string = urlencode(old_params) parts[4] = query_string return urlunparse(parts) def login_redirect_service(db, user, service, sso=True, create_ticket=True, warn=False): """Return a response redirecting to a service via HTTP 303 See Other. """ if create_ticket: st = create_service_ticket(user, service, sso) db.add(st) service = update_url(service, dict(ticket=st.ticket)) html = get_template('login_service_redirect.html') if warn: html = get_template('login_service_confirm.html') html = html.replace('SERVICE_URL', service) resp = exc.HTTPSeeOther(location=service) if warn: resp = Response() # try to forbid caching of any type resp.cache_control = 'no-store' resp.pragma = 'no-cache' # some arbitrary date in the past resp.expires = 'Thu, 01 Dec 1994 16:00:00 GMT' resp.text = html if not sso: resp = set_session_cookie(db, resp) return resp def login_success_no_service(db, msg='', sso=False): """Show logged-in screen after successful auth. `sso` must be a boolean indicating whether login happened via credentials (``False``) or via cookie (``True``). Returns a response. """ # show logged-in screen html = get_template('login_successful.html') html = html.replace('MSG_TEXT', msg) resp = Response(html) if not sso: resp = set_session_cookie(db, resp) return resp class CASServer(object): """A WSGI CAS server. This CAS server stores credential data (tickets, etc.) in a local sqlite3 database file. `db_path` - The filesystem path to the database to use. If none is given CAS server will create a new one in some new, temporary directory. Please note that credentials will be lost after a CAS server restart. If the path is given and the file exists already, it will be used. If the database file does not exist, it will be created. """ def __init__(self, db='sqlite:///:memory:', auth=None): self.db_connection_string = db self.db = DB(self.db_connection_string) self.auth = auth @wsgify def __call__(self, req): with DBSessionContext(): if req.path in ['/login', '/validate', '/logout']: return getattr(self, req.path[1:])(req) return exc.HTTPNotFound() def _get_template(self, name): path = os.path.join(template_dir, name) if os.path.isfile(path): return open(path, 'r').read() return None def login(self, req): service = req.POST.get('service', req.GET.get('service', None)) renew = req.POST.get('renew', req.GET.get('renew', None)) warn = req.POST.get('warn', req.GET.get('warn', False)) gateway = req.POST.get('gateway', req.GET.get('gateway', None)) if renew is not None and gateway is not None: gateway = None service_field = '' msg = '' username = req.POST.get('username', None) password = req.POST.get('password', None) valid_lt = check_login_ticket(self.db, req.POST.get('lt')) tgc = check_session_cookie(self.db, req.cookies.get('cas-tgc', None)) if gateway and (not tgc) and service: return login_redirect_service( self.db, username, service, sso=True, create_ticket=False) if tgc and (renew is None): if service: return login_redirect_service( self.db, username, service, sso=True, warn=warn) else: return login_success_no_service( self.db, 'You logged in already.', True) if username and password and valid_lt: # act as credentials acceptor cred_ok, reason = self.auth.check_credentials( username, password) if cred_ok: if service is None: # show logged-in screen return login_success_no_service(self.db, msg, False) else: # safely redirect to service given return login_redirect_service( self.db, username, service, sso=False, warn=warn) else: # login failed msg = 'Login failed
Reason: %s' % reason if service is not None: service_field = ( '' % ( service) ) lt = create_login_ticket() self.db.add(lt) html = self._get_template('login.html') html = html.replace('LT_VALUE', lt.ticket) html = html.replace('SERVICE_FIELD_VALUE', service_field) html = html.replace('MSG_TEXT', msg) return Response(html) def validate(self, req): service = req.POST.get('service', req.GET.get('service', None)) ticket = req.POST.get('ticket', req.GET.get('ticket', None)) renew = req.POST.get('renew', req.GET.get('renew', None)) renew = renew is not None st = check_service_ticket(self.db, ticket, service, renew) if st is not None: return Response('yes' + chr(0x0a) + st.user + chr(0x0a)) return Response('no' + chr(0x0a) + chr(0x0a)) def logout(self, req): url = req.GET.get('url', req.POST.get('url', None)) old_val = req.cookies.get('cas-tgc', None) html = self._get_template('logout.html') if url is not None: html = self._get_template('logout_url.html') html = html.replace('URL_HREF', url) resp = Response(html) delete_session_cookie(self.db, resp, old_val) return resp cas_server = CASServer def make_cas_server(global_conf, **local_conf): local_conf = get_authenticator(local_conf) return CASServer(**local_conf)