-#!/usr/bin/python
-#
# Copyright (C) 2014 Simo Sorce <simo@redhat.com>
#
# see file 'COPYING' for use and warranty information
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
-from ipsilon.providers.common import ProviderPageBase
+from ipsilon.providers.common import ProviderPageBase, ProviderException
+from ipsilon.providers.common import AuthenticationError, InvalidRequest
+from ipsilon.providers.saml2.provider import ServiceProvider
+from ipsilon.providers.saml2.provider import InvalidProviderId
+from ipsilon.providers.saml2.provider import NameIdNotAllowed
+from ipsilon.providers.saml2.sessions import SAMLSessionsContainer
+from ipsilon.util.policy import Policy
from ipsilon.util.user import UserSession
+from ipsilon.util.trans import Transaction
import cherrypy
import datetime
import lasso
-class AuthenticationError(Exception):
-
- def __init__(self, message, code):
- super(AuthenticationError, self).__init__(message)
- self.message = message
- self.code = code
-
- def __str__(self):
- return repr(self.message)
-
-
-class InvalidRequest(Exception):
+class UnknownProvider(ProviderException):
def __init__(self, message):
- super(InvalidRequest, self).__init__(message)
- self.message = message
-
- def __str__(self):
- return repr(self.message)
+ super(UnknownProvider, self).__init__(message)
+ self._debug(message)
class AuthenticateRequest(ProviderPageBase):
def __init__(self, *args, **kwargs):
super(AuthenticateRequest, self).__init__(*args, **kwargs)
- self.STAGE_INIT = 0
- self.STAGE_AUTH = 1
- self.stage = self.STAGE_INIT
+ self.stage = 'init'
+ self.trans = None
+
+ def _preop(self, *args, **kwargs):
+ try:
+ # generate a new id or get current one
+ self.trans = Transaction('saml2', **kwargs)
+ if self.trans.cookie.value != self.trans.provider:
+ self.debug('Invalid transaction, %s != %s' % (
+ self.trans.cookie.value, self.trans.provider))
+ except Exception, e: # pylint: disable=broad-except
+ self.debug('Transaction initialization failed: %s' % repr(e))
+ raise cherrypy.HTTPError(400, 'Invalid transaction id')
+
+ def pre_GET(self, *args, **kwargs):
+ self._preop(*args, **kwargs)
+
+ def pre_POST(self, *args, **kwargs):
+ self._preop(*args, **kwargs)
def auth(self, login):
try:
self.saml2checks(login)
- self.saml2assertion(login)
except AuthenticationError, e:
self.saml2error(login, e.code, e.message)
return self.reply(login)
def _parse_request(self, message):
- login = lasso.Login(self.cfg.idp)
+ login = self.cfg.idp.get_login_handler()
try:
login.processAuthnRequestMsg(message)
msg = 'Invalid SP [%s] (%r [%r])' % (login.remoteProviderId,
e, message)
- raise InvalidRequest(msg)
+ raise UnknownProvider(msg)
self._debug('SP %s requested authentication' % login.remoteProviderId)
except InvalidRequest, e:
self._debug(str(e))
raise cherrypy.HTTPError(400, 'Invalid SAML request token')
+ except UnknownProvider, e:
+ self._debug(str(e))
+ raise cherrypy.HTTPError(400, 'Unknown Service Provider')
except Exception, e: # pylint: disable=broad-except
self._debug(str(e))
raise cherrypy.HTTPError(500)
def saml2checks(self, login):
- session = UserSession()
- user = session.get_user()
+ us = UserSession()
+ user = us.get_user()
if user.is_anonymous:
- if self.stage < self.STAGE_AUTH:
- session.save_data('saml2', 'stage', self.STAGE_AUTH)
- session.save_data('saml2', 'Request', login.dump())
- session.save_data('login', 'Return',
- '%s/saml2/SSO/Continue' % self.basepath)
- raise cherrypy.HTTPRedirect('%s/login' % self.basepath)
+ if self.stage == 'init':
+ returl = '%s/saml2/SSO/Continue?%s' % (
+ self.basepath, self.trans.get_GET_arg())
+ data = {'saml2_stage': 'auth',
+ 'saml2_request': login.dump(),
+ 'login_return': returl,
+ 'login_target': login.remoteProviderId}
+ self.trans.store(data)
+ redirect = '%s/login?%s' % (self.basepath,
+ self.trans.get_GET_arg())
+ raise cherrypy.HTTPRedirect(redirect)
else:
raise AuthenticationError(
"Unknown user", lasso.SAML2_STATUS_CODE_AUTHN_FAILED)
self._audit("Logged in user: %s [%s]" % (user.name, user.fullname))
+ # We can wipe the transaction now, as this is the last step
+ self.trans.wipe()
+
# TODO: check if this is the first time this user access this SP
# If required by user prefs, ask user for consent once and then
# record it
consent = True
- # TODO: check Name-ID Policy
+ # TODO: check destination
+
+ try:
+ provider = ServiceProvider(self.cfg, login.remoteProviderId)
+ nameidfmt = provider.get_valid_nameid(login.request.nameIdPolicy)
+ except NameIdNotAllowed, e:
+ raise AuthenticationError(
+ str(e), lasso.SAML2_STATUS_CODE_INVALID_NAME_ID_POLICY)
+ except InvalidProviderId, e:
+ raise AuthenticationError(
+ str(e), lasso.SAML2_STATUS_CODE_AUTHN_FAILED)
# TODO: check login.request.forceAuthn
login.validateRequestMsg(not user.is_anonymous, consent)
- def saml2assertion(self, login):
-
authtime = datetime.datetime.utcnow()
skew = datetime.timedelta(0, 60)
authtime_notbefore = authtime - skew
authtime_notafter = authtime + skew
- user = UserSession().get_user()
-
# TODO: get authentication type fnd name format from session
# need to save which login manager authenticated and map it to a
# saml2 authentication context
None,
authtime_notbefore.strftime(timeformat),
authtime_notafter.strftime(timeformat))
- login.assertion.subject.nameId.format = \
- lasso.SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT
- login.assertion.subject.nameId.content = user.name
- # TODO: add user attributes as policy requires taking from 'user'
+ nameid = None
+ if nameidfmt == lasso.SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT:
+ # TODO map to something else ?
+ nameid = provider.normalize_username(user.name)
+ elif nameidfmt == lasso.SAML2_NAME_IDENTIFIER_FORMAT_TRANSIENT:
+ # TODO map to something else ?
+ nameid = provider.normalize_username(user.name)
+ elif nameidfmt == lasso.SAML2_NAME_IDENTIFIER_FORMAT_KERBEROS:
+ nameid = us.get_data('user', 'krb_principal_name')
+ elif nameidfmt == lasso.SAML2_NAME_IDENTIFIER_FORMAT_EMAIL:
+ nameid = us.get_user().email
+ if not nameid:
+ nameid = '%s@%s' % (user.name, self.cfg.default_email_domain)
+
+ if nameid:
+ login.assertion.subject.nameId.format = nameidfmt
+ login.assertion.subject.nameId.content = nameid
+ else:
+ self.trans.wipe()
+ raise AuthenticationError("Unavailable Name ID type",
+ lasso.SAML2_STATUS_CODE_AUTHN_FAILED)
+
+ # Check attribute policy and perform mapping and filtering
+ policy = Policy(self.cfg.default_attribute_mapping,
+ self.cfg.default_allowed_attributes)
+ userattrs = us.get_user_attrs()
+ mappedattrs, _ = policy.map_attributes(userattrs)
+ attributes = policy.filter_attributes(mappedattrs)
+
+ if '_groups' in attributes and 'groups' not in attributes:
+ attributes['groups'] = attributes['_groups']
+
+ self.debug("%s's attributes: %s" % (user.name, attributes))
+
+ # The saml-core-2.0-os specification section 2.7.3 requires
+ # the AttributeStatement element to be non-empty.
+ if attributes:
+ if not login.assertion.attributeStatement:
+ attrstat = lasso.Saml2AttributeStatement()
+ login.assertion.attributeStatement = [attrstat]
+ else:
+ attrstat = login.assertion.attributeStatement[0]
+ if not attrstat.attribute:
+ attrstat.attribute = ()
+
+ for key in attributes:
+ # skip internal info
+ if key[0] == '_':
+ continue
+ values = attributes[key]
+ if isinstance(values, dict):
+ continue
+ if not isinstance(values, list):
+ values = [values]
+ for value in values:
+ attr = lasso.Saml2Attribute()
+ attr.name = key
+ attr.nameFormat = lasso.SAML2_ATTRIBUTE_NAME_FORMAT_BASIC
+ value = str(value).encode('utf-8')
+ self.debug('value %s' % value)
+ node = lasso.MiscTextNode.newWithString(value)
+ node.textChild = True
+ attrvalue = lasso.Saml2AttributeValue()
+ attrvalue.any = [node]
+ attr.attributeValue = [attrvalue]
+ attrstat.attribute = attrstat.attribute + (attr,)
+
+ self.debug('Assertion: %s' % login.assertion.dump())
+
+ saml_sessions = us.get_provider_data('saml2')
+ if saml_sessions is None:
+ saml_sessions = SAMLSessionsContainer()
+
+ session = saml_sessions.find_session_by_provider(
+ login.remoteProviderId)
+ if session:
+ # TODO: something...
+ self.debug('Login session for this user already exists!?')
+ session.dump()
+
+ lasso_session = lasso.Session()
+ lasso_session.addAssertion(login.remoteProviderId, login.assertion)
+ saml_sessions.add_session(login.assertion.id,
+ login.remoteProviderId,
+ lasso_session)
+ us.save_provider_data('saml2', saml_sessions)
def saml2error(self, login, code, message):
status = lasso.Samlp2Status()