3 # Copyright (C) 2014 Simo Sorce <simo@redhat.com>
5 # see file 'COPYING' for use and warranty information
7 # This program is free software; you can redistribute it and/or modify
8 # it under the terms of the GNU General Public License as published by
9 # the Free Software Foundation, either version 3 of the License, or
10 # (at your option) any later version.
12 # This program is distributed in the hope that it will be useful,
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 # GNU General Public License for more details.
17 # You should have received a copy of the GNU General Public License
18 # along with this program. If not, see <http://www.gnu.org/licenses/>.
21 from ipsilon.util.page import Page
22 from ipsilon.providers.saml2.provider import ServiceProvider
23 from ipsilon.providers.saml2.provider import ServiceProviderCreator
24 from ipsilon.providers.saml2.provider import InvalidProviderId
28 VALID_IN_NAME = r'[^\ a-zA-Z0-9]'
31 class NewSPAdminPage(Page):
33 def __init__(self, site, parent):
34 super(NewSPAdminPage, self).__init__(site, form=True)
36 self.title = 'New Service Provider'
37 self.backurl = parent.url
38 self.url = '%s/new' % (parent.url,)
40 def form_new(self, message=None, message_type=None):
41 return self._template('admin/providers/saml2_sp_new.html',
44 message_type=message_type,
45 name='saml2_sp_new_form',
46 backurl=self.backurl, action=self.url)
48 def GET(self, *args, **kwargs):
49 return self.form_new()
51 def POST(self, *args, **kwargs):
53 if self.user.is_admin:
54 # TODO: allow authenticated user to create SPs on their own
55 # set the owner in that case
58 if 'content-type' not in cherrypy.request.headers:
59 self._debug("Invalid request, missing content-type")
60 message = "Malformed request"
61 message_type = "error"
62 return self.form_new(message, message_type)
63 ctype = cherrypy.request.headers['content-type'].split(';')[0]
64 if ctype != 'multipart/form-data':
65 self._debug("Invalid form type (%s), trying to cope" % (
66 cherrypy.request.content_type,))
67 for key, value in kwargs.iteritems():
69 if re.search(VALID_IN_NAME, value):
70 message = "Invalid name!" \
71 " Use only numbers and letters"
72 message_type = "error"
73 return self.form_new(message, message_type)
77 if hasattr(value, 'content_type'):
78 meta = value.fullvalue()
80 self._debug("Invalid format for 'meta'")
84 spc = ServiceProviderCreator(self.parent.cfg)
85 sp = spc.create_from_buffer(name, meta)
86 sp_page = self.parent.add_sp(name, sp)
87 message = "SP Successfully added"
88 message_type = "success"
89 return sp_page.form_standard(message, message_type)
90 except InvalidProviderId, e:
92 message_type = "error"
93 except Exception, e: # pylint: disable=broad-except
95 message = "Failed to create Service Provider!"
96 message_type = "error"
98 message = "A name and a metadata file must be provided"
99 message_type = "error"
101 message = "Unauthorized"
102 message_type = "error"
104 return self.form_new(message, message_type)
107 class InvalidValueFormat(Exception):
111 class UnauthorizedUser(Exception):
115 class SPAdminPage(Page):
117 def __init__(self, sp, site, parent):
118 super(SPAdminPage, self).__init__(site, form=True)
122 self.backurl = parent.url
123 self.url = '%s/sp/%s' % (parent.url, sp.name)
125 def form_standard(self, message=None, message_type=None):
126 return self._template('admin/providers/saml2_sp.html',
128 message_type=message_type,
130 name='saml2_sp_%s_form' % self.sp.name,
131 backurl=self.backurl, action=self.url,
134 def GET(self, *args, **kwargs):
135 return self.form_standard()
137 def change_name(self, key, value):
139 if value == self.sp.name:
142 if self.user.is_admin or self.user.name == self.sp.owner:
143 if re.search(VALID_IN_NAME, value):
144 err = "Invalid name! Use only numbers and letters"
145 raise InvalidValueFormat(err)
147 self._debug("Replacing %s: %s -> %s" % (key, self.sp.name, value))
148 return {'name': value, 'rename': [self.sp.name, value]}
150 raise UnauthorizedUser("Unauthorized to rename Service Provider")
152 def change_owner(self, key, value):
153 if value == self.sp.owner:
156 if self.user.is_admin:
157 self._debug("Replacing %s: %s -> %s" % (key, self.sp.owner, value))
158 return {'owner': value}
160 raise UnauthorizedUser("Unauthorized to set owner value")
162 def change_default_nameid(self, key, value):
163 if value == self.sp.default_nameid:
166 if self.user.is_admin:
167 self._debug("Replacing %s: %s -> %s" % (key,
168 self.sp.default_nameid,
170 if not self.sp.is_valid_nameid(value):
171 raise InvalidValueFormat('Invalid default nameid value')
172 return {'default_nameid': value}
174 raise UnauthorizedUser("Unauthorized to set default nameid value")
176 def change_allowed_nameids(self, key, value):
177 v = set([x.strip() for x in value.split(',')])
178 if v == set(self.sp.allowed_nameids):
181 if self.user.is_admin:
182 self._debug("Replacing %s: %s -> %s" % (key,
183 self.sp.allowed_nameids,
186 if not self.sp.is_valid_nameid(x):
187 l = ', '.join(self.sp.valid_nameids())
188 err = 'Invalid nameid [%s]. Available [%s].' % (x, l)
189 raise InvalidValueFormat(err)
190 return {'allowed_nameids': list(v)}
192 raise UnauthorizedUser("Unauthorized to set alowed nameids values")
194 def POST(self, *args, **kwargs):
196 message = "Nothing was modified."
197 message_type = "info"
201 for key, value in kwargs.iteritems():
203 r = self.change_name(key, value)
207 r = self.change_owner(key, value)
211 elif key == 'default_nameid':
212 r = self.change_default_nameid(key, value)
216 elif key == 'allowed_nameids':
217 r = self.change_allowed_nameids(key, value)
221 except InvalidValueFormat, e:
223 message_type = "warning"
224 return self.form_standard(message, message_type)
225 except UnauthorizedUser, e:
227 message_type = "error"
228 return self.form_standard(message, message_type)
229 except Exception, e: # pylint: disable=broad-except
230 self._debug("Error: %s" % repr(e))
231 message = "Internal Error"
232 message_type = "error"
233 return self.form_standard(message, message_type)
237 if 'name' in results:
238 self.sp.name = results['name']
239 if 'owner' in results:
240 self.sp.owner = results['owner']
241 if 'default_nameid' in results:
242 self.sp.default_nameid = results['default_nameid']
243 if 'allowed_nameids' in results:
244 self.sp.allowed_nameids = results['allowed_nameids']
245 self.sp.save_properties()
246 if 'rename' in results:
247 rename = results['rename']
248 self.parent.rename_sp(rename[0], rename[1])
249 message = "Properties succssfully changed"
250 message_type = "success"
251 except Exception: # pylint: disable=broad-except
252 message = "Failed to save data!"
253 message_type = "error"
255 return self.form_standard(message, message_type)
258 self.parent.del_sp(self.sp.name)
259 self.sp.permanently_delete()
260 return self.parent.root()
261 delete.exposed = True
264 class AdminPage(Page):
265 def __init__(self, site, config):
266 super(AdminPage, self).__init__(site)
272 self.sp = Page(self._site)
274 def add_sp(self, name, sp):
275 page = SPAdminPage(sp, self._site, self)
276 self.sp.add_subtree(name, page)
277 self.providers.append(sp)
280 def rename_sp(self, oldname, newname):
281 page = getattr(self.sp, oldname)
282 self.sp.del_subtree(oldname)
283 self.sp.add_subtree(newname, page)
285 def del_sp(self, name):
287 page = getattr(self.sp, name)
288 self.providers.remove(page.sp)
289 self.sp.del_subtree(name)
290 except Exception, e: # pylint: disable=broad-except
291 self._debug("Failed to remove provider %s: %s" % (name, str(e)))
293 def mount(self, page):
294 self.menu = page.menu
295 self.url = '%s/%s' % (page.url, self.name)
296 for p in self.cfg.idp.get_providers():
298 sp = ServiceProvider(self.cfg, p)
299 self.add_sp(sp.name, sp)
300 except Exception, e: # pylint: disable=broad-except
301 self._debug("Failed to find provider %s: %s" % (p, str(e)))
302 self.add_subtree('new', NewSPAdminPage(self._site, self))
303 page.add_subtree(self.name, self)
305 def root(self, *args, **kwargs):
306 return self._template('admin/providers/saml2.html',
307 title='SAML2 Administration',
308 providers=self.providers,