Projet

Général

Profil

Télécharger (5,83 ko) Statistiques
| Branche: | Tag: | Révision:

oidc / ckanext / ozwillo_pyoidc / plugin.py @ 8a7afbab

1
import logging
2
import conf
3

    
4
import ckan.plugins as plugins
5
import ckan.plugins.toolkit as toolkit
6
from ckan.common import session, c, request
7
from ckan import model
8
import ckan.lib.base as base
9

    
10
from pylons import config, request
11

    
12
import conf
13
from oidc import create_client
14

    
15
plugin_config_prefix = 'ckanext.ozwillo_pyoidc.'
16

    
17
log = logging.getLogger(__name__)
18
plugin_controller = 'ckanext.ozwillo_pyoidc.plugin:OpenidController'
19

    
20
_CLIENTS = {}
21

    
22
class Clients(object):
23

    
24
    @classmethod
25
    def get(cls, g):
26
        global _CLIENTS
27
        if g.id in _CLIENTS:
28
            return _CLIENTS.get(g.id)
29
        client = cls().get_client(g)
30
        _CLIENTS.update({g.id: client})
31
        return client
32

    
33
    def get_client(self, g):
34
        params = conf.CLIENT.copy()
35
        params['client_registration'].update({
36
            'client_id': g._extras['client_id'].value,
37
            'client_secret': g._extras['client_secret'].value,
38
            'redirect_uris': [toolkit.url_for(host=request.host,
39
                                              controller=plugin_controller,
40
                                              action='callback',
41
                                              id=g.name,
42
                                              qualified=True)]
43
        })
44
        return create_client(**params)
45

    
46

    
47
class OzwilloPyoidcPlugin(plugins.SingletonPlugin):
48
    plugins.implements(plugins.IConfigurer)
49
    plugins.implements(plugins.IRoutes)
50
    plugins.implements(plugins.IAuthenticator, inherit=True)
51

    
52
    def before_map(self, map):
53
        map.connect('/organization/{id:.*}/sso',
54
                    controller=plugin_controller,
55
                    action='sso')
56
        map.connect('/organization/{id:.*}/callback',
57
                    controller=plugin_controller,
58
                    action='callback')
59
        map.connect('/user/slo',
60
                    controller=plugin_controller,
61
                    action='slo')
62
        map.redirect('/organization/{id:.*}/logout', '/user/_logout')
63

    
64
        return map
65

    
66
    def after_map(self, map):
67
        return map
68

    
69
    def identify(self):
70
        user = session.get('user')
71
        if user and not toolkit.c.userobj:
72
            userobj = model.User.get(user)
73
            toolkit.c.user = userobj.name
74
            toolkit.c.userobj = userobj
75

    
76
    def login(self):
77
        if 'organization_id' in session:
78
            g = model.Group.get(session['organization_id'])
79
            client = Clients.get(g)
80
            url, ht_args = client.create_authn_request(session, conf.ACR_VALUES)
81
            if ht_args:
82
                toolkit.request.headers.update(ht_args)
83
            toolkit.redirect_to(url)
84
        else:
85
            toolkit.redirect_to('/')
86

    
87
    def logout(self):
88
        session['user'] = None
89
        try:
90
            g = model.Group.get(session['organization_id'])
91
        except:
92
            toolkit.redirect_to('/')
93
        else:
94
            session['organization_id'] = None
95
            session.save()
96

    
97
            org_url = toolkit.url_for(host=request.host,
98
                                      controller='organization',
99
                                      action='read',
100
                                      id=g.name,
101
                                      qualified=True)
102

    
103
            toolkit.redirect_to(org_url)
104

    
105
    def update_config(self, config_):
106
        toolkit.add_template_directory(config_, 'templates')
107
        toolkit.add_public_directory(config_, 'public')
108
        toolkit.add_resource('fanstatic', 'ozwillo_pyoidc')
109

    
110
class OpenidController(base.BaseController):
111

    
112
    def sso(self, id):
113
        log.info('SSO for organization "%s"' % id)
114
        session['organization_id'] = id
115
        session.save()
116
        log.info('redirecting to login page')
117
        login_url = toolkit.url_for(host=request.host,
118
                                    controller='user',
119
                                    action='login',
120
                                    qualified=True)
121
        toolkit.redirect_to(login_url)
122

    
123
    def callback(self):
124
        g = model.Group.get(session['organization_id'])
125
        client = Clients.get(g)
126
        userinfo = client.callback(request.GET)
127
        log.info('Received userinfo: %s' % userinfo)
128
        userobj = model.User.get(userinfo['sub'])
129
        if userobj:
130
            userobj.email = userinfo['email']
131
            if 'given_name' in userinfo:
132
                userobj.fullname = userinfo['given_name']
133
            if 'family_name' in userinfo:
134
                userobj.fullname += userinfo['family_name']
135
            userobj.save()
136
            session['user'] = userobj.id
137
            session.save()
138

    
139
        org_url = toolkit.url_for(host=request.host,
140
                                  controller="organization",
141
                                  action='read',
142
                                  id=g.name,
143
                                  qualified=True)
144
        toolkit.redirect_to(org_url)
145

    
146
    def slo(self):
147
        """
148
        Revokes the delivered access token. Logs out the user
149
        """
150
        g = model.Group.get(session['organization_id'])
151
        client = Clients.get(g)
152
        logout_url = client.end_session_endpoint
153
        org_url = toolkit.url_for(host=request.host,
154
                                  controller='organization',
155
                                  action='read',
156
                                  id=g.name,
157
                                  qualified=True)
158
        redirect_uri = org_url + '/logout'
159

    
160
        # revoke the access token
161
        headers = {'Content-Type': 'application/x-www-form-urlencoded'}
162
        data = 'token=%s&token_type_hint=access_token' % client.access_token
163
        client.http_request(client.revocation_endpoint, 'POST',
164
                            data=data, headers=headers)
165

    
166
        # redirect to IDP logout
167
        logout_url += '?id_token_hint=%s&' % client.id_token
168
        logout_url += 'post_logout_redirect_uri=%s' % redirect_uri
169
        toolkit.redirect_to(str(logout_url))
(4-4/4)