authentic/src/authentic2/api_views.py

1308 lines
51 KiB
Python

# authentic2 - versatile identity manager
# Copyright (C) 2010-2019 Entr'ouvert
#
# This program is free software: you can redistribute it and/or modify it
# under the terms of the GNU Affero General Public License as published
# by the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import smtplib
from functools import partial
import django
import requests
from django.conf import settings
from django.contrib.auth import get_user_model
from django.contrib.auth.hashers import identify_hasher
from django.core.exceptions import MultipleObjectsReturned
from django.db import models
from django.shortcuts import get_object_or_404
from django.utils.dateparse import parse_datetime
from django.utils.encoding import force_text
from django.utils.text import slugify
from django.utils.translation import ugettext as _
from django.utils.translation import ugettext_lazy as _
from django.views.decorators.cache import cache_control
from django.views.decorators.vary import vary_on_headers
from django_filters.fields import IsoDateTimeField
from django_filters.filters import IsoDateTimeFilter
from django_filters.rest_framework import FilterSet
from django_filters.utils import handle_timezone
from pytz.exceptions import AmbiguousTimeError, NonExistentTimeError
from requests.exceptions import RequestException
from rest_framework import VERSION as drf_version
from rest_framework import authentication, pagination, permissions, serializers, status
from rest_framework.authentication import SessionAuthentication
from rest_framework.exceptions import AuthenticationFailed, NotFound, PermissionDenied, ValidationError
from rest_framework.fields import CreateOnlyDefault
from rest_framework.filters import BaseFilterBackend
from rest_framework.generics import GenericAPIView
from rest_framework.response import Response
from rest_framework.routers import SimpleRouter
from rest_framework.settings import api_settings
from rest_framework.validators import UniqueTogetherValidator
from rest_framework.views import APIView
from rest_framework.viewsets import ModelViewSet, ViewSet
from authentic2.compat.drf import action
from django_rbac.utils import get_ou_model, get_role_model
from . import api_mixins, app_settings, decorators, hooks, utils
from .a2_rbac.utils import get_default_ou
from .custom_user.models import User
from .journal_event_types import UserLogin, UserRegistration
from .models import Attribute, PasswordReset, Service
from .passwords import get_password_checker
from .utils.lookups import Unaccent
# Retro-compatibility with older Django versions
if django.VERSION < (2,):
import rest_framework.fields
from . import validators
rest_framework.fields.ProhibitNullCharactersValidator = validators.ProhibitNullCharactersValidator
if django.VERSION < (1, 11):
authentication.authenticate = utils.authenticate
User = get_user_model()
class HookMixin:
def get_serializer(self, *args, **kwargs):
serializer = super().get_serializer(*args, **kwargs)
# if the serializer is a ListSerializer, we modify the child
if hasattr(serializer, 'child'):
hooks.call_hooks('api_modify_serializer', self, serializer.child)
else:
hooks.call_hooks('api_modify_serializer', self, serializer)
return serializer
def get_object(self):
hooks.call_hooks('api_modify_view_before_get_object', self)
return super().get_object()
class DjangoPermission(permissions.BasePermission):
def __init__(self, perm):
self.perm = perm
def has_permission(self, request, view):
return request.user.has_perm(self.perm)
def has_object_permission(self, request, view, obj):
return request.user.has_perm(self.perm, obj=obj)
def __call__(self):
return self
class ExceptionHandlerMixin:
def handle_exception(self, exc):
if hasattr(exc, 'detail'):
exc.detail = {
'result': 0,
'errors': exc.detail,
}
return super().handle_exception(exc)
else:
response = super().handle_exception(exc)
response.data = {
'result': 0,
'errors': response.data,
}
return response
class RegistrationSerializer(serializers.Serializer):
'''Register RPC payload'''
email = serializers.EmailField(required=False, allow_blank=True)
ou = serializers.SlugRelatedField(
queryset=get_ou_model().objects.all(),
slug_field='slug',
default=get_default_ou,
required=False,
allow_null=True,
)
username = serializers.CharField(required=False, allow_blank=True)
first_name = serializers.CharField(required=False, allow_blank=True, default='')
last_name = serializers.CharField(required=False, allow_blank=True, default='')
password = serializers.CharField(required=False, allow_null=True)
no_email_validation = serializers.BooleanField(required=False)
return_url = serializers.URLField(required=False, allow_blank=True)
def validate(self, data):
request = self.context.get('request')
ou = data.get('ou')
if request:
perm = 'custom_user.add_user'
if ou:
authorized = request.user.has_ou_perm(perm, data['ou'])
else:
authorized = request.user.has_perm(perm)
if not authorized:
raise serializers.ValidationError(
_('you are not authorized ' 'to create users in ' 'this ou')
)
User = get_user_model()
if ou:
if app_settings.A2_EMAIL_IS_UNIQUE or app_settings.A2_REGISTRATION_EMAIL_IS_UNIQUE:
if 'email' not in data:
raise serializers.ValidationError(_('Email is required'))
if User.objects.filter(email__iexact=data['email']).exists():
raise serializers.ValidationError(_('Account already exists'))
if ou.email_is_unique:
if 'email' not in data:
raise serializers.ValidationError(_('Email is required in this ou'))
if User.objects.filter(ou=ou, email__iexact=data['email']).exists():
raise serializers.ValidationError(_('Account already exists in this ou'))
if app_settings.A2_USERNAME_IS_UNIQUE or app_settings.A2_REGISTRATION_USERNAME_IS_UNIQUE:
if 'username' not in data:
raise serializers.ValidationError(_('Username is required'))
if User.objects.filter(username=data['username']).exists():
raise serializers.ValidationError(_('Account already exists'))
if ou.username_is_unique:
if 'username' not in data:
raise serializers.ValidationError(_('Username is required in this ou'))
if User.objects.filter(ou=ou, username=data['username']).exists():
raise serializers.ValidationError(_('Account already exists in this ou'))
return data
class RpcMixin:
def post(self, request, format=None):
serializer = self.get_serializer(data=request.data)
if serializer.is_valid():
response, response_status = self.rpc(request, serializer)
return Response(response, response_status)
else:
response = {'result': 0, 'errors': serializer.errors}
return Response(response, status.HTTP_400_BAD_REQUEST)
class BaseRpcView(ExceptionHandlerMixin, RpcMixin, GenericAPIView):
pass
class Register(BaseRpcView):
"""Register the given email, send a mail to the user and return a
validation token.
A mail will be sent to the user to validate its email. On
validation of the mail the user will be logged and redirected to
`{return_url}?token={token}`. It's the durty of the requesting
service to finish the registration process on its side.
If email is unique and an account already exist the requesting
must enter in a process of registration through SSO, i.e. ask for
authentication of the user and then finish the registration
process for the received identity.
"""
permission_classes = (permissions.IsAuthenticated,)
serializer_class = RegistrationSerializer
def rpc(self, request, serializer):
validated_data = serializer.validated_data
if not request.user.has_ou_perm('custom_user.add_user', validated_data['ou']):
raise PermissionDenied(
'You do not have permission to create users in ou %s' % validated_data['ou'].slug
)
email = validated_data.get('email')
registration_data = {}
for field in ('first_name', 'last_name', 'password', 'username'):
if field in validated_data:
if isinstance(validated_data[field], models.Model):
registration_data[field] = validated_data[field].pk
else:
registration_data[field] = validated_data[field]
ctx = {
'registration_data': registration_data,
}
token = None
final_return_url = None
if validated_data.get('return_url'):
token = utils.get_hex_uuid()[:16]
final_return_url = utils.make_url(validated_data['return_url'], params={'token': token})
if email and not validated_data.get('no_email_validation'):
registration_template = ['authentic2/activation_email']
if validated_data['ou']:
registration_template.insert(0, 'authentic2/activation_email_%s' % validated_data['ou'].slug)
try:
utils.send_registration_mail(
self.request,
email,
template_names=registration_template,
next_url=final_return_url,
ou=validated_data['ou'],
context=ctx,
**registration_data,
)
except smtplib.SMTPException as e:
response = {
'result': 0,
'errors': {'__all__': ['Mail sending failed']},
'exception': force_text(e),
}
response_status = status.HTTP_503_SERVICE_UNAVAILABLE
else:
response = {
'result': 1,
}
if token:
response['token'] = token
response_status = status.HTTP_202_ACCEPTED
else:
username = validated_data.get('username')
first_name = validated_data.get('first_name')
last_name = validated_data.get('last_name')
password = validated_data.get('password')
ou = validated_data.get('ou')
if not email and not username and not (first_name and last_name):
response = {
'result': 0,
'errors': {
'__all__': [
'You must set at least a username, an email or ' 'a first name and a last name'
]
},
}
response_status = status.HTTP_400_BAD_REQUEST
else:
new_user = User(
email=email, username=username, ou=ou, first_name=first_name, last_name=last_name
)
if password:
new_user.set_password(password)
new_user.save()
validated_data['uuid'] = new_user.uuid
response = {
'result': 1,
'user': BaseUserSerializer(new_user).data,
'token': token,
}
if email:
response['validation_url'] = utils.build_activation_url(
request, email, next_url=final_return_url, ou=ou, **registration_data
)
if token:
response['token'] = token
response_status = status.HTTP_201_CREATED
return response, response_status
register = Register.as_view()
class PasswordChangeSerializer(serializers.Serializer):
'''Register RPC payload'''
email = serializers.EmailField()
ou = serializers.SlugRelatedField(
queryset=get_ou_model().objects.all(), slug_field='slug', required=False, allow_null=True
)
old_password = serializers.CharField(required=True, allow_null=True)
new_password = serializers.CharField(required=True, allow_null=True)
def validate(self, data):
User = get_user_model()
qs = User.objects.filter(email=data['email'])
if data['ou']:
qs = qs.filter(ou=data['ou'])
try:
self.user = qs.get()
except User.DoesNotExist:
raise serializers.ValidationError('no user found')
except MultipleObjectsReturned:
raise serializers.ValidationError('more than one user have this email')
if not self.user.check_password(data['old_password']):
raise serializers.ValidationError('old_password is invalid')
return data
class PasswordChange(BaseRpcView):
permission_classes = (DjangoPermission('custom_user.change_user'),)
serializer_class = PasswordChangeSerializer
def rpc(self, request, serializer):
serializer.user.set_password(serializer.validated_data['new_password'])
serializer.user.save()
request.journal.record('manager.user.password.change', form=serializer, api=True)
return {'result': 1}, status.HTTP_200_OK
password_change = PasswordChange.as_view()
@vary_on_headers('Cookie', 'Origin', 'Referer')
@cache_control(private=True, max_age=60)
@decorators.json
def user(request):
if request.user.is_anonymous:
return {}
return request.user.to_json()
class BaseUserSerializer(serializers.ModelSerializer):
ou = serializers.SlugRelatedField(
queryset=get_ou_model().objects.all(), slug_field='slug', required=False, default=get_default_ou
)
date_joined = serializers.DateTimeField(read_only=True)
last_login = serializers.DateTimeField(read_only=True)
dist = serializers.FloatField(read_only=True)
send_registration_email = serializers.BooleanField(write_only=True, required=False, default=False)
send_registration_email_next_url = serializers.URLField(write_only=True, required=False)
password = serializers.CharField(max_length=128, required=False)
force_password_reset = serializers.BooleanField(write_only=True, required=False, default=False)
hashed_password = serializers.CharField(max_length=128, required=False)
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
for at in Attribute.objects.all():
if at.name in self.fields:
self.fields[at.name].required = at.required
if at.required and isinstance(self.fields[at.name], serializers.CharField):
self.fields[at.name].allow_blank = False
else:
self.fields[at.name] = at.get_drf_field()
self.fields[at.name + '_verified'] = serializers.BooleanField(
source='is_verified.%s' % at.name, required=False
)
for key in self.fields:
if key in app_settings.A2_REQUIRED_FIELDS:
self.fields[key].required = True
# A2_API_USERS_REQUIRED_FIELDS override all other sources of requiredness
if app_settings.A2_API_USERS_REQUIRED_FIELDS:
for key in self.fields:
self.fields[key].required = key in app_settings.A2_API_USERS_REQUIRED_FIELDS
def check_perm(self, perm, ou):
self.context['view'].check_perm(perm, ou)
def create(self, validated_data):
original_data = validated_data.copy()
send_registration_email = validated_data.pop('send_registration_email', False)
send_registration_email_next_url = validated_data.pop('send_registration_email_next_url', None)
force_password_reset = validated_data.pop('force_password_reset', False)
attributes = validated_data.pop('attributes', {})
is_verified = validated_data.pop('is_verified', {})
password = validated_data.pop('password', None)
hashed_password = validated_data.pop('hashed_password', None)
self.check_perm('custom_user.add_user', validated_data.get('ou'))
instance = super().create(validated_data)
# prevent update on a get_or_create
if not getattr(instance, '_a2_created', True):
return instance
for key, value in attributes.items():
if is_verified.get(key):
setattr(instance.verified_attributes, key, value)
else:
setattr(instance.attributes, key, value)
if is_verified.get('first_name'):
instance.verified_attributes.first_name = instance.first_name
if is_verified.get('last_name'):
instance.verified_attributes.last_name = instance.last_name
if password is not None:
instance.set_password(password)
else:
instance.set_unusable_password()
instance.save()
if force_password_reset:
PasswordReset.objects.get_or_create(user=instance)
if hashed_password is not None:
instance.password = hashed_password
instance.save()
if send_registration_email and validated_data.get('email'):
try:
utils.send_password_reset_mail(
instance,
template_names=[
'authentic2/api_user_create_registration_email',
'authentic2/password_reset',
],
request=self.context['request'],
next_url=send_registration_email_next_url,
context={
'data': original_data,
},
)
except smtplib.SMTPException as e:
logging.getLogger(__name__).error(
'registration mail could not be sent to user %s ' 'created through API: %s', instance, e
)
return instance
def update(self, instance, validated_data):
force_password_reset = validated_data.pop('force_password_reset', False)
# Remove unused fields
validated_data.pop('send_registration_email', False)
validated_data.pop('send_registration_email_next_url', None)
attributes = validated_data.pop('attributes', {})
is_verified = validated_data.pop('is_verified', {})
password = validated_data.pop('password', None)
hashed_password = validated_data.pop('hashed_password', None)
# Double check: to move an user from one ou into another you must be administrator of both
self.check_perm('custom_user.change_user', instance.ou)
if 'ou' in validated_data:
self.check_perm('custom_user.change_user', validated_data.get('ou'))
if validated_data.get('email') != instance.email and not validated_data.get('email_verified'):
instance.email_verified = False
super().update(instance, validated_data)
for key, value in attributes.items():
if is_verified.get(key):
setattr(instance.verified_attributes, key, value)
else:
setattr(instance.attributes, key, value)
for key in is_verified:
if key not in attributes:
if is_verified.get(key):
setattr(instance.verified_attributes, key, getattr(instance.attributes, key))
else:
setattr(instance.attributes, key, getattr(instance.attributes, key))
if is_verified.get('first_name'):
instance.verified_attributes.first_name = instance.first_name
if is_verified.get('last_name'):
instance.verified_attributes.last_name = instance.last_name
if password is not None:
instance.set_password(password)
instance.save()
if force_password_reset:
PasswordReset.objects.get_or_create(user=instance)
if hashed_password is not None:
instance.password = hashed_password
instance.save()
return instance
def validate(self, data):
User = get_user_model()
qs = User.objects.all()
ou = None
if self.instance:
ou = self.instance.ou
if 'ou' in data and not ou:
ou = data['ou']
get_or_create_fields = self.context['view'].request.GET.getlist('get_or_create')
update_or_create_fields = self.context['view'].request.GET.getlist('update_or_create')
already_used = False
if (
'email' not in get_or_create_fields
and 'email' not in update_or_create_fields
and data.get('email')
and (not self.instance or data.get('email') != self.instance.email)
):
if app_settings.A2_EMAIL_IS_UNIQUE and qs.filter(email=data['email']).exists():
already_used = True
if ou and ou.email_is_unique and qs.filter(ou=ou, email=data['email']).exists():
already_used = True
errors = {}
if already_used:
errors['email'] = 'email already used'
if data.get('password') and data.get('hashed_password'):
errors['password'] = 'conflict with provided hashed_password'
if data.get('hashed_password'):
try:
hasher = identify_hasher(data.get('hashed_password'))
except ValueError:
errors['hashed_password'] = "unknown hash format"
else:
try:
hasher.safe_summary(data.get('hashed_password'))
except Exception:
errors['hashed_password'] = "hash format error"
if errors:
raise serializers.ValidationError(errors)
return data
class Meta:
model = get_user_model()
extra_kwargs = {
'uuid': {
'read_only': False,
'required': False,
}
}
exclude = ('user_permissions', 'groups')
class DuplicateUserSerializer(BaseUserSerializer):
duplicate_distance = serializers.FloatField(required=True, source='dist')
text = serializers.CharField(required=True, source='get_full_name')
class SlugFromNameDefault:
requires_context = False
serializer_instance = None
def set_context(self, instance):
self.serializer_instance = instance
def __call__(self):
name = self.serializer_instance.context['request'].data.get('name', '')
return slugify(name)
class RoleSerializer(serializers.ModelSerializer):
ou = serializers.SlugRelatedField(
many=False,
required=False,
default=CreateOnlyDefault(get_default_ou),
queryset=get_ou_model().objects.all(),
slug_field='slug',
)
slug = serializers.SlugField(
required=False, allow_blank=False, max_length=256, default=SlugFromNameDefault()
)
@property
def user(self):
return self.context['request'].user
def __init__(self, instance=None, **kwargs):
super().__init__(instance, **kwargs)
if self.instance:
self.fields['ou'].read_only = True
def create(self, validated_data):
ou = validated_data.get('ou')
# Creating roles also means being allowed to within the OU:
if not self.user.has_ou_perm('a2_rbac.add_role', ou):
raise PermissionDenied('User %s can\'t create role in OU %s' % (self.user, ou))
return super().create(validated_data)
def update(self, instance, validated_data):
# Check role-updating permissions:
if not self.user.has_perm('a2_rbac.change_role', obj=instance):
raise PermissionDenied('User %s can\'t change role %s' % (self.user, instance))
super().update(instance, validated_data)
return instance
def partial_update(self, instance, validated_data):
# Check role-updating permissions:
if not self.user.has_perm('a2_rbac.change_role', obj=instance):
raise PermissionDenied('User %s can\'t change role %s' % (self.user, instance))
super().partial_update(instance, validated_data)
return instance
class Meta:
model = get_role_model()
fields = (
'uuid',
'name',
'slug',
'ou',
)
extra_kwargs = {'uuid': {'read_only': True}}
validators = [
UniqueTogetherValidator(queryset=get_role_model().objects.all(), fields=['name', 'ou']),
UniqueTogetherValidator(queryset=get_role_model().objects.all(), fields=['slug', 'ou']),
]
# override to handle ambiguous naive DateTime on DST change
class IsoDateTimeField(IsoDateTimeField):
def __init__(self, *args, **kwargs):
self.bound = kwargs.pop('bound')
assert self.bound in ['upper', 'lesser']
super().__init__(*args, **kwargs)
def strptime(self, value, format):
try:
return super().strptime(value, format)
except (NonExistentTimeError, AmbiguousTimeError):
parsed = parse_datetime(value)
possible = sorted(
[
handle_timezone(parsed, is_dst=True),
handle_timezone(parsed, is_dst=False),
]
)
if self.bound == 'lesser':
return possible[0]
elif self.bound == 'upper':
return possible[1]
class IsoDateTimeFilter(IsoDateTimeFilter):
@property
def field_class(self):
if self.lookup_expr.startswith('gt'):
return partial(IsoDateTimeField, bound='lesser')
elif self.lookup_expr.startswith('lt'):
return partial(IsoDateTimeField, bound='upper')
else:
raise NotImplementedError
def filter(self, qs, value):
return super().filter(qs, value)
class UsersFilter(FilterSet):
class Meta:
model = get_user_model()
fields = {
'username': ['exact', 'iexact'],
'first_name': [
'exact',
'iexact',
'icontains',
'gte',
'lte',
'gt',
'lt',
],
'last_name': [
'exact',
'iexact',
'icontains',
'gte',
'lte',
'gt',
'lt',
],
'modified': [
'gte',
'lte',
'gt',
'lt',
],
'email': [
'exact',
'iexact',
],
'ou__slug': [
'exact',
],
}
filter_overrides = {
models.DateTimeField: {
'filter_class': IsoDateTimeFilter,
}
}
class ChangeEmailSerializer(serializers.Serializer):
email = serializers.EmailField()
class FreeTextSearchFilter(BaseFilterBackend):
""""""
def filter_queryset(self, request, queryset, view):
if 'q' in request.GET:
queryset = queryset.free_text_search(request.GET['q'])
return queryset
class UsersAPIPagination(pagination.CursorPagination):
page_size_query_param = 'limit'
max_page_size = 100
class UsersAPI(api_mixins.GetOrCreateMixinView, HookMixin, ExceptionHandlerMixin, ModelViewSet):
queryset = User.objects.all()
ordering_fields = ['username', 'first_name', 'last_name', 'modified', 'date_joined']
lookup_field = 'uuid'
serializer_class = BaseUserSerializer
# https://django-filter.readthedocs.io/en/master/guide/migration.html#view-attributes-renamed-867
#
# MigrationNotice: `UsersAPI.filter_class` attribute should be renamed
# `filterset_class`. See:
# https://django-filter.readthedocs.io/en/master/guide/migration.html
filter_class = UsersFilter
filterset_class = UsersFilter
filter_backends = [FreeTextSearchFilter] + api_settings.DEFAULT_FILTER_BACKENDS
pagination_class = UsersAPIPagination
@property
def ordering(self):
if 'q' in self.request.GET:
return ['dist', Unaccent('last_name'), Unaccent('first_name')]
return User._meta.ordering
def get_queryset(self):
qs = super().get_queryset()
if self.request.method == 'GET':
qs = qs.prefetch_related('attribute_values', 'attribute_values__attribute')
new_qs = hooks.call_hooks_first_result('api_modify_queryset', self, qs)
if new_qs is not None:
return new_qs
return qs
def filter_queryset(self, qs):
qs = super().filter_queryset(qs)
qs = self.request.user.filter_by_perm(['custom_user.view_user'], qs)
# filter users authorized for a specified service
if 'service-slug' in self.request.GET:
service_slug = self.request.GET['service-slug']
service_ou = self.request.GET.get('service-ou', '')
service = (
Service.objects.filter(slug=service_slug, ou__slug=service_ou)
.prefetch_related('authorized_roles')
.first()
)
if service:
if service.authorized_roles.all():
qs = qs.filter(roles__in=service.authorized_roles.children())
qs = qs.distinct()
else:
qs = qs.none()
return qs
def update(self, request, *args, **kwargs):
kwargs['partial'] = True
return super().update(request, *args, **kwargs)
def check_perm(self, perm, ou):
if ou:
if not self.request.user.has_ou_perm(perm, ou):
raise PermissionDenied('You do not have permission %s in %s' % (perm, ou))
else:
if not self.request.user.has_perm(perm):
raise PermissionDenied('You do not have permission %s' % perm)
def perform_create(self, serializer):
super().perform_create(serializer)
self.request.journal.record('manager.user.creation', form=serializer, api=True)
def perform_update(self, serializer):
super().perform_update(serializer)
attributes = serializer.validated_data.pop('attributes', {})
serializer.validated_data.update(attributes)
self.request.journal.record('manager.user.profile.edit', form=serializer, api=True)
def perform_destroy(self, instance):
self.check_perm('custom_user.delete_user', instance.ou)
self.request.journal.record('manager.user.deletion', target_user=instance, api=True)
super().perform_destroy(instance)
class SynchronizationSerializer(serializers.Serializer):
known_uuids = serializers.ListField(child=serializers.CharField())
def check_uuids(self, uuids):
User = get_user_model()
known_uuids = User.objects.filter(uuid__in=uuids).values_list('uuid', flat=True)
return set(uuids) - set(known_uuids)
@action(detail=False, methods=['post'], permission_classes=(DjangoPermission('custom_user.search_user'),))
def synchronization(self, request):
serializer = self.SynchronizationSerializer(data=request.data)
if not serializer.is_valid():
response = {'result': 0, 'errors': serializer.errors}
return Response(response, status.HTTP_400_BAD_REQUEST)
hooks.call_hooks('api_modify_serializer_after_validation', self, serializer)
unknown_uuids = self.check_uuids(serializer.validated_data.get('known_uuids', []))
data = {
'result': 1,
'unknown_uuids': unknown_uuids,
}
hooks.call_hooks('api_modify_response', self, 'synchronization', data)
return Response(data)
@action(
detail=True,
methods=['post'],
url_path='password-reset',
permission_classes=(DjangoPermission('custom_user.reset_password_user'),),
)
def password_reset(self, request, uuid):
user = self.get_object()
# An user without email cannot receive the token
if not user.email:
return Response(
{'result': 0, 'reason': 'User has no mail'}, status=status.HTTP_500_INTERNAL_SERVER_ERROR
)
utils.send_password_reset_mail(user, request=request)
request.journal.record('manager.user.password.reset.request', target_user=user, api=True)
return Response(status=status.HTTP_204_NO_CONTENT)
@action(detail=True, methods=['post'], permission_classes=(DjangoPermission('custom_user.change_user'),))
def email(self, request, uuid):
user = self.get_object()
serializer = ChangeEmailSerializer(data=request.data)
if not serializer.is_valid():
response = {'result': 0, 'errors': serializer.errors}
return Response(response, status.HTTP_400_BAD_REQUEST)
user.email_verified = False
user.save()
utils.send_email_change_email(user, serializer.validated_data['email'], request=request)
return Response({'result': 1})
@action(detail=False, methods=['get'], permission_classes=(DjangoPermission('custom_user.search_user'),))
def find_duplicates(self, request):
serializer = self.get_serializer(data=request.query_params, partial=True)
if not serializer.is_valid():
response = {'data': [], 'err': 1, 'err_desc': serializer.errors}
return Response(response, status.HTTP_400_BAD_REQUEST)
data = serializer.validated_data
first_name = data.get('first_name')
last_name = data.get('last_name')
if not (first_name and last_name):
response = {
'data': [],
'err': 1,
'err_desc': 'first_name and last_name parameters are mandatory.',
}
return Response(response, status.HTTP_400_BAD_REQUEST)
ou = None
if 'ou' in request.query_params:
ou = data['ou']
attributes = data.pop('attributes', {})
birthdate = attributes.get('birthdate')
qs = User.objects.find_duplicates(first_name, last_name, birthdate=birthdate, ou=ou)
return Response(
{
'data': DuplicateUserSerializer(qs, many=True).data,
'err': 0,
}
)
class RolesAPI(api_mixins.GetOrCreateMixinView, ExceptionHandlerMixin, ModelViewSet):
permission_classes = (permissions.IsAuthenticated,)
serializer_class = RoleSerializer
lookup_field = 'uuid'
def get_queryset(self):
return self.request.user.filter_by_perm('a2_rbac.view_role', get_role_model().objects.all())
def perform_destroy(self, instance):
if not self.request.user.has_perm(perm='a2_rbac.delete_role', obj=instance):
raise PermissionDenied('User %s can\'t create role %s' % (self.request.user, instance))
self.request.journal.record('manager.role.deletion', role=instance, api=True)
super().perform_destroy(instance)
def perform_create(self, serializer):
super().perform_create(serializer)
self.request.journal.record('manager.role.creation', role=serializer.instance, api=True)
def perform_update(self, serializer):
super().perform_update(serializer)
self.request.journal.record('manager.role.edit', role=serializer.instance, form=serializer, api=True)
class RolesMembersAPI(UsersAPI):
def initial(self, request, *args, **kwargs):
super().initial(request, *args, **kwargs)
Role = get_role_model()
self.role = get_object_or_404(Role, uuid=kwargs['role_uuid'])
def get_queryset(self):
if self.request.GET.get('nested', 'false').lower() in ('true', '1'):
qs = self.role.all_members()
else:
qs = self.role.members.all()
return qs
roles_members = RolesMembersAPI.as_view({'get': 'list'})
class RoleMembershipAPI(ExceptionHandlerMixin, APIView):
permission_classes = (permissions.IsAuthenticated,)
def initial(self, request, *args, **kwargs):
super().initial(request, *args, **kwargs)
Role = get_role_model()
User = get_user_model()
self.role = get_object_or_404(Role, uuid=kwargs['role_uuid'])
self.member = get_object_or_404(User, uuid=kwargs['member_uuid'])
def get(self, request, *args, **kwargs):
if not request.user.has_perm('a2_rbac.view_role', obj=self.role):
raise PermissionDenied('User not allowed to view role')
if self.request.GET.get('nested', 'false').lower() in ('true', '1'):
qs = self.role.all_members()
else:
qs = self.role.members.all()
member = get_object_or_404(qs, uuid=kwargs['member_uuid'])
return Response(BaseUserSerializer(member).data)
def post(self, request, *args, **kwargs):
if not request.user.has_perm('a2_rbac.manage_members_role', obj=self.role):
raise PermissionDenied('User not allowed to manage role members')
self.role.members.add(self.member)
request.journal.record('manager.role.membership.grant', role=self.role, member=self.member, api=True)
return Response(
{'result': 1, 'detail': _('User successfully added to role')}, status=status.HTTP_201_CREATED
)
def delete(self, request, *args, **kwargs):
if not request.user.has_perm('a2_rbac.manage_members_role', obj=self.role):
raise PermissionDenied('User not allowed to manage role members')
self.role.members.remove(self.member)
request.journal.record(
'manager.role.membership.removal', role=self.role, member=self.member, api=True
)
return Response(
{'result': 1, 'detail': _('User successfully removed from role')}, status=status.HTTP_200_OK
)
role_membership = RoleMembershipAPI.as_view()
class RoleMembershipsAPI(ExceptionHandlerMixin, APIView):
permission_classes = (permissions.IsAuthenticated,)
http_method_names = ['post', 'put', 'patch', 'delete']
def initial(self, request, *args, **kwargs):
super().initial(request, *args, **kwargs)
Role = get_role_model()
User = get_user_model()
self.role = get_object_or_404(Role, uuid=kwargs['role_uuid'])
self.members = set()
perm = 'a2_rbac.manage_members_role'
authorized = request.user.has_perm(perm, obj=self.role)
if not authorized:
raise PermissionDenied('User not allowed to manage role members')
if not isinstance(request.data, dict):
raise ValidationError(_('Payload must be a dictionary'))
if request.method != 'GET' and not 'data' in request.data:
raise ValidationError(_("Invalid payload (missing 'data' key)"))
for entry in request.data.get('data', ()):
try:
uuid = entry['uuid']
except TypeError:
raise ValidationError(_("List elements of the 'data' dict " "entry must be dictionaries"))
except KeyError:
raise ValidationError(
_("Missing 'uuid' key for dict entry %s " "of the 'data' payload") % entry
)
try:
self.members.add(User.objects.get(uuid=uuid))
except User.DoesNotExist:
raise ValidationError(_('No known user for UUID %s') % entry['uuid'])
if not len(self.members) and request.method in ('POST', 'DELETE'):
raise ValidationError(_('No valid user UUID'))
def post(self, request, *args, **kwargs):
self.role.members.add(*self.members)
for member in self.members:
request.journal.record('manager.role.membership.grant', role=self.role, member=member, api=True)
return Response(
{'result': 1, 'detail': _('Users successfully added to role')}, status=status.HTTP_201_CREATED
)
def delete(self, request, *args, **kwargs):
self.role.members.remove(*self.members)
for member in self.members:
request.journal.record('manager.role.membership.removal', role=self.role, member=member, api=True)
return Response(
{'result': 1, 'detail': _('Users successfully removed from role')}, status=status.HTTP_200_OK
)
def patch(self, request, *args, **kwargs):
old_members = set(self.role.members.all())
self.role.members.set(self.members)
for member in self.members:
request.journal.record('manager.role.membership.grant', role=self.role, member=member, api=True)
for member in old_members.difference(self.members):
request.journal.record('manager.role.membership.removal', role=self.role, member=member, api=True)
return Response(
{'result': 1, 'detail': _('Users successfully assigned to role')}, status=status.HTTP_200_OK
)
def put(self, request, *args, **kwargs):
return self.patch(request, *args, **kwargs)
role_memberships = RoleMembershipsAPI.as_view()
class BaseOrganizationalUnitSerializer(serializers.ModelSerializer):
slug = serializers.SlugField(
required=False,
allow_blank=False,
max_length=256,
default=SlugFromNameDefault(),
)
class Meta:
model = get_ou_model()
fields = '__all__'
class OrganizationalUnitAPI(api_mixins.GetOrCreateMixinView, ExceptionHandlerMixin, ModelViewSet):
permission_classes = (DjangoPermission('a2_rbac.search_organizationalunit'),)
serializer_class = BaseOrganizationalUnitSerializer
lookup_field = 'uuid'
def get_queryset(self):
return get_ou_model().objects.all()
router = SimpleRouter()
router.register(r'users', UsersAPI, base_name='a2-api-users')
router.register(r'ous', OrganizationalUnitAPI, base_name='a2-api-ous')
router.register(r'roles', RolesAPI, base_name='a2-api-roles')
class CheckPasswordSerializer(serializers.Serializer):
username = serializers.CharField(required=True)
password = serializers.CharField(required=True)
class CheckPasswordAPI(BaseRpcView):
permission_classes = (DjangoPermission('custom_user.search_user'),)
serializer_class = CheckPasswordSerializer
def rpc(self, request, serializer):
username = serializer.validated_data['username']
password = serializer.validated_data['password']
result = {}
for authenticator in self.get_authenticators():
if hasattr(authenticator, 'authenticate_credentials'):
try:
user, oidc_client = authenticator.authenticate_credentials(
username, password, request=request
)
result['result'] = 1
if hasattr(user, 'oidc_client'):
result['oidc_client'] = True
break
except AuthenticationFailed as exc:
result['result'] = 0
result['errors'] = [exc.detail]
return result, status.HTTP_200_OK
check_password = CheckPasswordAPI.as_view()
class CsrfExemptSessionAuthentication(SessionAuthentication):
def enforce_csrf(self, request):
return # To not perform the csrf check previously happening
class ValidatePasswordSerializer(serializers.Serializer):
password = serializers.CharField(required=True, allow_blank=True)
class ValidatePasswordAPI(BaseRpcView):
permission_classes = ()
authentication_classes = (CsrfExemptSessionAuthentication,)
serializer_class = ValidatePasswordSerializer
def rpc(self, request, serializer):
password_checker = get_password_checker()
checks = []
result = {'result': 1, 'checks': checks}
ok = True
for check in password_checker(serializer.validated_data['password']):
ok = ok and check.result
checks.append(
{
'result': check.result,
'label': check.label,
}
)
result['ok'] = ok
return result, status.HTTP_200_OK
validate_password = ValidatePasswordAPI.as_view()
class AddressAutocompleteAPI(APIView):
permission_classes = (permissions.AllowAny,)
def get(self, request):
if not getattr(settings, 'ADDRESS_AUTOCOMPLETE_URL', None):
return Response({})
try:
response = requests.get(settings.ADDRESS_AUTOCOMPLETE_URL, params=request.GET)
response.raise_for_status()
return Response(response.json())
except RequestException:
return Response({})
address_autocomplete = AddressAutocompleteAPI.as_view()
class ServiceOUField(serializers.ListField):
def to_internal_value(self, data_list):
data = data_list[0].split(' ')
if not len(data) == 2:
raise ValidationError('This field should be a service slug and an OU slug separated by space.')
return super().to_internal_value(data)
class StatisticsSerializer(serializers.Serializer):
TIME_INTERVAL_CHOICES = [('day', _('Day')), ('month', _('Month')), ('year', _('Year'))]
time_interval = serializers.ChoiceField(choices=TIME_INTERVAL_CHOICES, default='month')
service = ServiceOUField(child=serializers.SlugField(max_length=256), required=False)
services_ou = serializers.SlugField(required=False, allow_blank=False, max_length=256)
users_ou = serializers.SlugField(required=False, allow_blank=False, max_length=256)
ou = serializers.SlugField(required=False, allow_blank=False, max_length=256) # legacy
start = serializers.DateTimeField(required=False, input_formats=['iso-8601', '%Y-%m-%d'])
end = serializers.DateTimeField(required=False, input_formats=['iso-8601', '%Y-%m-%d'])
def stat(**kwargs):
'''Extend action decorator to allow passing statistics related info.'''
filters = kwargs.pop('filters', [])
kwargs['detail'] = False
decorator = action(**kwargs)
def wraps(func):
func.filters = filters
return decorator(func)
return wraps
class StatisticsAPI(ViewSet):
permission_classes = (permissions.IsAuthenticated,)
def initial(self, *args, **kwargs):
super().initial(*args, **kwargs)
if drf_version < '3.9':
raise NotFound('Unavailable API (djangorestframework version too low)')
def list(self, request):
statistics = []
OU = get_ou_model()
services_ous = [{'id': ou.slug, 'label': ou.name} for ou in OU.objects.exclude(service__isnull=True)]
users_ous = [{'id': ou.slug, 'label': ou.name} for ou in OU.objects.exclude(user__isnull=True)]
services = [
{'id': '%s %s' % (service['slug'], service['ou__slug']), 'label': service['name']}
for service in Service.objects.values('slug', 'name', 'ou__slug')
]
time_interval_field = StatisticsSerializer().get_fields()['time_interval']
common_filters = [
{
'id': 'time_interval',
'label': _('Time interval'),
'options': [
{'id': key, 'label': label} for key, label in time_interval_field.choices.items()
],
'required': True,
'default': time_interval_field.default,
}
]
for action in self.get_extra_actions():
url = self.reverse_action(action.url_name)
filters = common_filters.copy()
if 'service' in action.filters:
filters.append({'id': 'service', 'label': _('Service'), 'options': services})
if 'services_ou' in action.filters and len(services_ous) > 1:
filters.append(
{'id': 'services_ou', 'label': _('Services organizational unit'), 'options': services_ous}
)
if 'users_ou' in action.filters and len(users_ous) > 1:
filters.append(
{'id': 'users_ou', 'label': _('Users organizational unit'), 'options': users_ous}
)
data = {
'name': action.kwargs['name'],
'url': url,
'id': action.url_name,
'filters': filters,
}
statistics.append(data)
return Response(
{
'data': statistics,
'err': 0,
}
)
def get_statistics(self, request, klass, method):
serializer = StatisticsSerializer(data=request.query_params)
if not serializer.is_valid():
response = {'data': [], 'err': 1, 'err_desc': serializer.errors}
return Response(response, status.HTTP_400_BAD_REQUEST)
data = serializer.validated_data
kwargs = {
'group_by_time': data['time_interval'],
'start': data.get('start'),
'end': data.get('end'),
}
allowed_filters = getattr(self, self.action).filters
service = data.get('service')
services_ou = data.get('services_ou') or data.get('ou') # legacy 'ou' filter
users_ou = data.get('users_ou')
if service and 'service' in allowed_filters:
service_slug, ou_slug = service
kwargs['service'] = get_object_or_404(Service, slug=service_slug, ou__slug=ou_slug)
elif services_ou and 'services_ou' in allowed_filters:
kwargs['services_ou'] = get_object_or_404(get_ou_model(), slug=services_ou)
if users_ou and 'users_ou' in allowed_filters:
kwargs['users_ou'] = get_object_or_404(get_ou_model(), slug=users_ou)
return Response(
{
'data': getattr(klass, method)(**kwargs),
'err': 0,
}
)
@stat(name=_('Login count by authentication type'), filters=('services_ou', 'users_ou', 'service'))
def login(self, request):
return self.get_statistics(request, UserLogin, 'get_method_statistics')
@stat(name=_('Login count by service'))
def service_login(self, request):
return self.get_statistics(request, UserLogin, 'get_service_statistics')
@stat(name=_('Login count by organizational unit'))
def service_ou_login(self, request):
return self.get_statistics(request, UserLogin, 'get_service_ou_statistics')
@stat(name=_('Registration count by type'), filters=('services_ou', 'users_ou', 'service'))
def registration(self, request):
return self.get_statistics(request, UserRegistration, 'get_method_statistics')
@stat(name=_('Registration count by service'))
def service_registration(self, request):
return self.get_statistics(request, UserRegistration, 'get_service_statistics')
@stat(name=_('Registration count by organizational unit'))
def service_ou_registration(self, request):
return self.get_statistics(request, UserRegistration, 'get_service_ou_statistics')
router.register(r'statistics', StatisticsAPI, base_name='a2-api-statistics')