~azzar1/unity/add-show-desktop-key

124 by mattgiuca
dispatch/request: Added new fields: method and username.
1
# IVLE - Informatics Virtual Learning Environment
2
# Copyright (C) 2007-2008 The University of Melbourne
3
#
4
# This program is free software; you can redistribute it and/or modify
5
# it under the terms of the GNU General Public License as published by
6
# the Free Software Foundation; either version 2 of the License, or
7
# (at your option) any later version.
8
#
9
# This program is distributed in the hope that it will be useful,
10
# but WITHOUT ANY WARRANTY; without even the implied warranty of
11
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
# GNU General Public License for more details.
13
#
14
# You should have received a copy of the GNU General Public License
15
# along with this program; if not, write to the Free Software
16
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
17
18
# Module: authenticate
19
# Author: Matt Giuca
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
20
# Date:   19/2/2008
124 by mattgiuca
dispatch/request: Added new fields: method and username.
21
22
# Provides a mechanism for authenticating a username and password, and
23
# returning a yes/no response.
24
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
25
# Has a plugin interface for authentication modules.
26
# An authentication module is a callable object which accepts 3 positional
27
# arguments.
28
# plugin_auth_func(dbconn, login, password, user)
29
# dbconn is an open connection to the IVLE database.
30
# login and password are required strings, password is cleartext.
31
# user is a User object or None.
32
# If it's a User object, it must return the same object if it returns a user.
33
# This object should describe the user logging in.
34
# It may be None if the user is not known to this DB.
35
# Returns either a User object or None, or raises an AuthError.
36
# Returning a User object implies success, and also gives details about the
37
# user if none were known to the DB (such details will be written to the DB).
38
# Returning None implies a soft failure, and that another auth method should
39
# be found.
40
# Raising an AuthError implies a hard failure, with an appropriate error
41
# message. No more auth will be done.
42
510 by mattgiuca
setup.py: Added 2 new config options for the LDAP authentication server.
43
import conf
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
44
import common.db
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
45
import common.user
510 by mattgiuca
setup.py: Added 2 new config options for the LDAP authentication server.
46
import ldap
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
47
48
class AuthError(Exception):
49
    def __init__(self, message="Invalid username or password."):
50
        self.message = message
51
        self.args = (message,)
52
53
def authenticate(login, password):
54
    """Determines whether a particular login/password combination is
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
55
    valid. The password is in cleartext.
56
500 by mattgiuca
db: get_user and get_users now return User objects instead of dictionaries.
57
    Returns a User object containing the user's details on success.
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
58
    Raises an AuthError containing an appropriate error message on failure.
59
60
    The User returned is guaranteed to be in the IVLE database.
61
    This could be from reading or writing to the DB. If authenticate can't
62
    find the user in the DB, it may get user data from some other source
63
    (such as LDAP) and actually write it to the DB before returning.
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
64
    """
124 by mattgiuca
dispatch/request: Added new fields: method and username.
65
    # WARNING: Both username and password may contain any characters, and must
66
    # be sanitized within this function.
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
67
    # (Not SQL-sanitized, just sanitized to our particular constraints).
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
68
    # TODO Sanitize username
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
69
70
    # Spawn a DB object just for making this call.
71
    # (This should not spawn a DB connection on each page reload, only when
72
    # there is no session object to begin with).
73
    dbconn = common.db.DB()
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
74
    user = dbconn.get_user(login)
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
75
    try:
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
76
        for m in auth_modules:
77
            # May raise an AuthError - allow to propagate
78
            auth_result = m(dbconn, login, password, user)
79
            if auth_result is None:
80
                # Can't auth with this module; try another
81
                pass
82
            elif auth_result == False:
83
                return None
84
            elif isinstance(auth_result, common.user.User):
85
                if user is not None and auth_result is not user:
86
                    # If user is not None, then it must return the same user
87
                    raise AuthError("Internal error: "
88
                        "Bad authentication module (changed user)")
89
                if user is None:
90
                    # We just got ourselves some user details from an external
91
                    # source. Put them in the DB.
92
                    # TODO: Write user to DB
93
                    pass
94
                return auth_result
95
            else:
96
                raise AuthError("Internal error: "
97
                    "Bad authentication module (bad return type)")
98
        # No auths checked out; fail.
99
        raise AuthError()
376 by mattgiuca
auth/authenticate: Replaced dummy code (which always auths) with a call to the
100
    finally:
101
        dbconn.close()
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
102
103
def simple_db_auth(dbconn, login, password, user):
104
    """
105
    A plugin auth function, as described above.
106
    This one just authenticates against the local database.
107
    Returns None if the password in the DB is NULL, indicating that another
108
    auth method should be used.
109
    Raises an AuthError if mismatched, indicating failure to auth.
110
    """
111
    auth_result = dbconn.user_authenticate(login, password)
112
    # auth_result is either True, False (fail) or None (try another)
113
    if auth_result is None:
114
        return None
115
    elif auth_result:
116
        return user
117
    else:
118
        raise AuthError()
119
510 by mattgiuca
setup.py: Added 2 new config options for the LDAP authentication server.
120
def ldap_auth(dbconn, login, password, user):
121
    """
122
    A plugin auth function, as described above.
123
    This one authenticates against an LDAP server.
124
    Returns user if successful. Raises AuthError if unsuccessful.
125
    Also raises AuthError if the LDAP server had an unexpected error.
126
    """
127
    try:
128
        l = ldap.initialize(conf.ldap_url)
129
        # ldap_format_string contains a "%s" to put the login name
130
        l.simple_bind_s(conf.ldap_format_string % login, password)
131
    except ldap.INVALID_CREDENTIALS:
132
        raise AuthError()
133
    except Exception, msg:
134
        raise AuthError("Internal error (LDAP auth): %s" % repr(msg))
135
    # Got here - Must have successfully authenticated with LDAP
136
    return user
137
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
138
# List of auth plugin modules, in the order to try them
139
auth_modules = [
140
    simple_db_auth,
510 by mattgiuca
setup.py: Added 2 new config options for the LDAP authentication server.
141
    ldap_auth,
509 by mattgiuca
common.db: Rewrote user_authenticate to return 3 values (True, false, None)
142
]