2020-02-20 20:33:45 +00:00
|
|
|
"""passbook saml source processor"""
|
2020-06-24 20:27:14 +00:00
|
|
|
from typing import TYPE_CHECKING, Dict
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
from defusedxml import ElementTree
|
2020-06-07 14:35:08 +00:00
|
|
|
from django.http import HttpRequest, HttpResponse
|
2020-02-20 20:33:45 +00:00
|
|
|
from signxml import XMLVerifier
|
|
|
|
from structlog import get_logger
|
|
|
|
|
|
|
|
from passbook.core.models import User
|
2020-06-24 19:50:30 +00:00
|
|
|
from passbook.flows.models import Flow
|
2020-06-07 14:35:08 +00:00
|
|
|
from passbook.flows.planner import (
|
|
|
|
PLAN_CONTEXT_PENDING_USER,
|
|
|
|
PLAN_CONTEXT_SSO,
|
|
|
|
FlowPlanner,
|
|
|
|
)
|
|
|
|
from passbook.flows.views import SESSION_KEY_PLAN
|
|
|
|
from passbook.lib.utils.urls import redirect_with_qs
|
2020-07-08 21:03:58 +00:00
|
|
|
from passbook.policies.utils import delete_none_keys
|
2020-02-20 20:33:45 +00:00
|
|
|
from passbook.providers.saml.utils.encoding import decode_base64_and_inflate
|
|
|
|
from passbook.sources.saml.exceptions import (
|
2020-09-11 22:53:38 +00:00
|
|
|
MismatchedRequestID,
|
2020-02-20 20:33:45 +00:00
|
|
|
MissingSAMLResponse,
|
|
|
|
UnsupportedNameIDFormat,
|
|
|
|
)
|
|
|
|
from passbook.sources.saml.models import SAMLSource
|
2020-06-24 20:27:14 +00:00
|
|
|
from passbook.sources.saml.processors.constants import (
|
|
|
|
SAML_NAME_ID_FORMAT_EMAIL,
|
2020-07-12 15:20:41 +00:00
|
|
|
SAML_NAME_ID_FORMAT_PERSISTENT,
|
2020-06-24 20:27:14 +00:00
|
|
|
SAML_NAME_ID_FORMAT_TRANSIENT,
|
|
|
|
SAML_NAME_ID_FORMAT_WINDOWS,
|
|
|
|
SAML_NAME_ID_FORMAT_X509,
|
|
|
|
)
|
2020-09-11 22:53:38 +00:00
|
|
|
from passbook.sources.saml.processors.request import SESSION_REQUEST_ID
|
2020-06-07 14:35:08 +00:00
|
|
|
from passbook.stages.password.stage import PLAN_CONTEXT_AUTHENTICATION_BACKEND
|
|
|
|
from passbook.stages.prompt.stage import PLAN_CONTEXT_PROMPT
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
LOGGER = get_logger()
|
2020-02-21 08:03:59 +00:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from xml.etree.ElementTree import Element # nosec
|
2020-06-07 14:35:08 +00:00
|
|
|
DEFAULT_BACKEND = "django.contrib.auth.backends.ModelBackend"
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
|
2020-07-10 23:02:55 +00:00
|
|
|
class ResponseProcessor:
|
2020-02-20 20:33:45 +00:00
|
|
|
"""SAML Response Processor"""
|
|
|
|
|
|
|
|
_source: SAMLSource
|
|
|
|
|
2020-02-21 08:03:59 +00:00
|
|
|
_root: "Element"
|
2020-02-20 20:33:45 +00:00
|
|
|
_root_xml: str
|
|
|
|
|
|
|
|
def __init__(self, source: SAMLSource):
|
|
|
|
self._source = source
|
|
|
|
|
|
|
|
def parse(self, request: HttpRequest):
|
|
|
|
"""Check if `request` contains SAML Response data, parse and validate it."""
|
|
|
|
# First off, check if we have any SAML Data at all.
|
|
|
|
raw_response = request.POST.get("SAMLResponse", None)
|
|
|
|
if not raw_response:
|
|
|
|
raise MissingSAMLResponse("Request does not contain 'SAMLResponse'")
|
|
|
|
# relay_state = request.POST.get('RelayState', None)
|
|
|
|
# Check if response is compressed, b64 decode it
|
2020-02-20 20:37:14 +00:00
|
|
|
self._root_xml = decode_base64_and_inflate(raw_response)
|
2020-02-20 20:33:45 +00:00
|
|
|
self._root = ElementTree.fromstring(self._root_xml)
|
2020-09-11 22:53:38 +00:00
|
|
|
|
2020-02-20 20:33:45 +00:00
|
|
|
self._verify_signed()
|
2020-09-11 22:53:38 +00:00
|
|
|
self._verify_request_id(request)
|
2020-02-20 20:33:45 +00:00
|
|
|
|
|
|
|
def _verify_signed(self):
|
|
|
|
"""Verify SAML Response's Signature"""
|
|
|
|
verifier = XMLVerifier()
|
2020-06-07 14:35:08 +00:00
|
|
|
verifier.verify(
|
|
|
|
self._root_xml, x509_cert=self._source.signing_kp.certificate_data
|
|
|
|
)
|
2020-07-12 15:55:09 +00:00
|
|
|
LOGGER.debug("Successfully verified signautre")
|
2020-02-20 20:33:45 +00:00
|
|
|
|
2020-09-11 22:53:38 +00:00
|
|
|
def _verify_request_id(self, request: HttpRequest):
|
|
|
|
if self._source.allow_idp_initiated:
|
|
|
|
return
|
|
|
|
if SESSION_REQUEST_ID not in request.session or "ID" not in self._root.attrib:
|
|
|
|
raise MismatchedRequestID(
|
|
|
|
"Missing request ID and IdP-initiated Logins are not allowed"
|
|
|
|
)
|
|
|
|
if request.session[SESSION_REQUEST_ID] != self._root.attrib["ID"]:
|
|
|
|
raise MismatchedRequestID("Mismatched request ID")
|
|
|
|
|
2020-06-24 19:50:30 +00:00
|
|
|
def _handle_name_id_transient(self, request: HttpRequest) -> HttpResponse:
|
|
|
|
"""Handle a NameID with the Format of Transient. This is a bit more complex than other
|
|
|
|
formats, as we need to create a temporary User that is used in the session. This
|
|
|
|
user has an attribute that refers to our Source for cleanup. The user is also deleted
|
|
|
|
on logout and periodically."""
|
|
|
|
# Create a temporary User
|
|
|
|
name_id = self._get_name_id().text
|
|
|
|
user: User = User.objects.create(
|
|
|
|
username=name_id,
|
|
|
|
attributes={
|
|
|
|
"saml": {"source": self._source.pk.hex, "delete_on_logout": True}
|
|
|
|
},
|
|
|
|
)
|
|
|
|
LOGGER.debug("Created temporary user for NameID Transient", username=name_id)
|
|
|
|
user.set_unusable_password()
|
|
|
|
user.save()
|
|
|
|
return self._flow_response(
|
|
|
|
request,
|
|
|
|
self._source.authentication_flow,
|
|
|
|
**{
|
|
|
|
PLAN_CONTEXT_PENDING_USER: user,
|
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND: DEFAULT_BACKEND,
|
|
|
|
},
|
|
|
|
)
|
2020-02-20 20:33:45 +00:00
|
|
|
|
2020-06-24 19:50:30 +00:00
|
|
|
def _get_name_id(self) -> "Element":
|
|
|
|
"""Get NameID Element"""
|
2020-02-20 20:33:45 +00:00
|
|
|
assertion = self._root.find("{urn:oasis:names:tc:SAML:2.0:assertion}Assertion")
|
|
|
|
subject = assertion.find("{urn:oasis:names:tc:SAML:2.0:assertion}Subject")
|
|
|
|
name_id = subject.find("{urn:oasis:names:tc:SAML:2.0:assertion}NameID")
|
2020-06-24 19:50:30 +00:00
|
|
|
if name_id is None:
|
|
|
|
raise ValueError("NameID Element not found!")
|
|
|
|
return name_id
|
|
|
|
|
|
|
|
def _get_name_id_filter(self) -> Dict[str, str]:
|
|
|
|
"""Returns the subject's NameID as a Filter for the `User`"""
|
|
|
|
name_id_el = self._get_name_id()
|
|
|
|
name_id = name_id_el.text
|
|
|
|
if not name_id:
|
2020-06-24 20:27:14 +00:00
|
|
|
raise UnsupportedNameIDFormat("Subject's NameID is empty.")
|
2020-06-24 19:50:30 +00:00
|
|
|
_format = name_id_el.attrib["Format"]
|
2020-06-24 20:27:14 +00:00
|
|
|
if _format == SAML_NAME_ID_FORMAT_EMAIL:
|
2020-06-24 19:50:30 +00:00
|
|
|
return {"email": name_id}
|
2020-07-12 15:20:41 +00:00
|
|
|
if _format == SAML_NAME_ID_FORMAT_PERSISTENT:
|
2020-06-24 19:50:30 +00:00
|
|
|
return {"username": name_id}
|
2020-06-24 20:27:14 +00:00
|
|
|
if _format == SAML_NAME_ID_FORMAT_X509:
|
2020-06-24 19:50:30 +00:00
|
|
|
# This attribute is statically set by the LDAP source
|
|
|
|
return {"attributes__distinguishedName": name_id}
|
2020-06-24 20:27:14 +00:00
|
|
|
if _format == SAML_NAME_ID_FORMAT_WINDOWS:
|
2020-06-24 19:50:30 +00:00
|
|
|
if "\\" in name_id:
|
|
|
|
name_id = name_id.split("\\")[1]
|
|
|
|
return {"username": name_id}
|
|
|
|
raise UnsupportedNameIDFormat(
|
|
|
|
f"Assertion contains NameID with unsupported format {_format}."
|
|
|
|
)
|
2020-02-20 20:33:45 +00:00
|
|
|
|
2020-06-07 14:35:08 +00:00
|
|
|
def prepare_flow(self, request: HttpRequest) -> HttpResponse:
|
|
|
|
"""Prepare flow plan depending on whether or not the user exists"""
|
2020-06-24 19:50:30 +00:00
|
|
|
name_id = self._get_name_id()
|
2020-07-08 14:18:02 +00:00
|
|
|
# Sanity check, show a warning if NameIDPolicy doesn't match what we go
|
|
|
|
if self._source.name_id_policy != name_id.attrib["Format"]:
|
|
|
|
LOGGER.warning(
|
|
|
|
"NameID from IdP doesn't match our policy",
|
|
|
|
expected=self._source.name_id_policy,
|
|
|
|
got=name_id.attrib["Format"],
|
|
|
|
)
|
2020-06-24 19:50:30 +00:00
|
|
|
# transient NameIDs are handeled seperately as they don't have to go through flows.
|
2020-06-24 20:27:14 +00:00
|
|
|
if name_id.attrib["Format"] == SAML_NAME_ID_FORMAT_TRANSIENT:
|
2020-06-24 19:50:30 +00:00
|
|
|
return self._handle_name_id_transient(request)
|
|
|
|
|
|
|
|
name_id_filter = self._get_name_id_filter()
|
|
|
|
matching_users = User.objects.filter(**name_id_filter)
|
2020-06-07 14:35:08 +00:00
|
|
|
if matching_users.exists():
|
|
|
|
# User exists already, switch to authentication flow
|
2020-06-24 19:50:30 +00:00
|
|
|
return self._flow_response(
|
2020-06-07 14:35:08 +00:00
|
|
|
request,
|
2020-06-24 19:50:30 +00:00
|
|
|
self._source.authentication_flow,
|
|
|
|
**{
|
2020-06-07 14:35:08 +00:00
|
|
|
PLAN_CONTEXT_PENDING_USER: matching_users.first(),
|
|
|
|
PLAN_CONTEXT_AUTHENTICATION_BACKEND: DEFAULT_BACKEND,
|
|
|
|
},
|
|
|
|
)
|
2020-06-24 19:50:30 +00:00
|
|
|
return self._flow_response(
|
|
|
|
request,
|
|
|
|
self._source.enrollment_flow,
|
2020-07-08 21:03:58 +00:00
|
|
|
**{PLAN_CONTEXT_PROMPT: delete_none_keys(name_id_filter)},
|
2020-06-24 19:50:30 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
def _flow_response(
|
|
|
|
self, request: HttpRequest, flow: Flow, **kwargs
|
|
|
|
) -> HttpResponse:
|
|
|
|
kwargs[PLAN_CONTEXT_SSO] = True
|
2020-06-29 14:19:39 +00:00
|
|
|
request.session[SESSION_KEY_PLAN] = FlowPlanner(flow).plan(request, kwargs)
|
2020-06-07 14:35:08 +00:00
|
|
|
return redirect_with_qs(
|
|
|
|
"passbook_flows:flow-executor-shell", request.GET, flow_slug=flow.slug,
|
|
|
|
)
|