summaryrefslogtreecommitdiff
path: root/service/pixelated/resources/auth.py
blob: 3afbbc36e4318d3123a35c62dc585f07876a72c6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
#
# Copyright (c) 2016 ThoughtWorks, Inc.
#
# Pixelated is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Pixelated is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with Pixelated. If not, see <http://www.gnu.org/licenses/>.

import re

from zope.interface import implements, implementer, Attribute
from twisted.cred.checkers import ANONYMOUS
from twisted.cred.credentials import ICredentials
from twisted.cred.error import UnauthorizedLogin
from twisted.internet import defer
from twisted.web._auth.wrapper import UnauthorizedResource
from twisted.web.error import UnsupportedMethod
from twisted.cred import portal, checkers, credentials
from twisted.web import util
from twisted.cred import error
from twisted.web.resource import IResource, ErrorPage
from twisted.logger import Logger

from leap.bitmask.bonafide._srp import SRPAuthError
from pixelated.config.leap import create_leap_session, authenticate
from pixelated.resources import IPixelatedSession


log = Logger()


@implementer(checkers.ICredentialsChecker)
class LeapPasswordChecker(object):
    credentialInterfaces = (
        credentials.IUsernamePassword,
    )

    def __init__(self, provider):
        self.provider = provider

    @defer.inlineCallbacks
    def requestAvatarId(self, credentials):
        try:
            auth = yield authenticate(self.provider, credentials.username, credentials.password)
        except SRPAuthError:
            raise UnauthorizedLogin()

        leap_session = yield create_leap_session(self.provider, credentials.username, credentials.password, auth)
        defer.returnValue(leap_session)


class ISessionCredential(ICredentials):

    request = Attribute('the current request')


@implementer(ISessionCredential)
class SessionCredential(object):
    def __init__(self, request):
        self.request = request


@implementer(checkers.ICredentialsChecker)
class SessionChecker(object):
    credentialInterfaces = (ISessionCredential,)

    def __init__(self, services_factory):
        self._services_factory = services_factory

    def requestAvatarId(self, credentials):
        session = self.get_session(credentials.request)
        if session.is_logged_in() and self._services_factory.has_session(session.user_uuid):
            return defer.succeed(session.user_uuid)
        return defer.succeed(ANONYMOUS)

    def get_session(self, request):
        return IPixelatedSession(request.getSession())


class PixelatedRealm(object):
    implements(portal.IRealm)

    def requestAvatar(self, avatarId, mind, *interfaces):
        if IResource in interfaces:
            return IResource, avatarId, lambda: None
        raise NotImplementedError()


@implementer(IResource)
class PixelatedAuthSessionWrapper(object):

    isLeaf = False

    def __init__(self, portal, root_resource, anonymous_resource, credentialFactories):
        self._portal = portal
        self._credentialFactories = credentialFactories
        self._root_resource = root_resource
        self._anonymous_resource = anonymous_resource

    def render(self, request):
        raise UnsupportedMethod(())

    def getChildWithDefault(self, path, request):
        request.postpath.insert(0, request.prepath.pop())
        return self._authorizedResource(request)

    def _authorizedResource(self, request):
        creds = SessionCredential(request)
        return util.DeferredResource(self._login(creds, request))

    def _login(self, credentials, request):
        pattern = re.compile("^/sandbox/")

        def loginSucceeded(args):
            interface, avatar, logout = args
            if avatar == checkers.ANONYMOUS and not pattern.match(request.path):
                return self._anonymous_resource
            else:
                return self._root_resource

        def loginFailed(result):
            if result.check(error.Unauthorized, error.LoginFailed):
                return UnauthorizedResource(self._credentialFactories)
            else:
                log.err(
                    result,
                    "HTTPAuthSessionWrapper.getChildWithDefault encountered "
                    "unexpected error")
                return ErrorPage(500, None, None)

        d = self._portal.login(credentials, None, IResource)
        d.addCallbacks(loginSucceeded, loginFailed)
        return d