##// END OF EJS Templates
auth: prepare code for removal of pylons request in pyramid migration.
marcink -
r1791:8160938e default
parent child Browse files
Show More
@@ -1,2008 +1,2021 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 authentication and permission libraries
23 23 """
24 24
25 25 import os
26 26 import inspect
27 27 import collections
28 28 import fnmatch
29 29 import hashlib
30 30 import itertools
31 31 import logging
32 32 import random
33 33 import traceback
34 34 from functools import wraps
35 35
36 36 import ipaddress
37 37 from pyramid.httpexceptions import HTTPForbidden, HTTPFound
38 from pylons import request
39 from pylons.controllers.util import abort
40 38 from pylons.i18n.translation import _
39 # NOTE(marcink): this has to be removed only after pyramid migration,
40 # replace with _ = request.translate
41 41 from sqlalchemy.orm.exc import ObjectDeletedError
42 42 from sqlalchemy.orm import joinedload
43 43 from zope.cachedescriptors.property import Lazy as LazyProperty
44 44
45 45 import rhodecode
46 46 from rhodecode.model import meta
47 47 from rhodecode.model.meta import Session
48 48 from rhodecode.model.user import UserModel
49 49 from rhodecode.model.db import (
50 50 User, Repository, Permission, UserToPerm, UserGroupToPerm, UserGroupMember,
51 51 UserIpMap, UserApiKeys, RepoGroup)
52 52 from rhodecode.lib import caches
53 53 from rhodecode.lib.utils2 import safe_unicode, aslist, safe_str, md5
54 54 from rhodecode.lib.utils import (
55 55 get_repo_slug, get_repo_group_slug, get_user_group_slug)
56 56 from rhodecode.lib.caching_query import FromCache
57 57
58 58
59 59 if rhodecode.is_unix:
60 60 import bcrypt
61 61
62 62 log = logging.getLogger(__name__)
63 63
64 64 csrf_token_key = "csrf_token"
65 65
66 66
67 67 class PasswordGenerator(object):
68 68 """
69 69 This is a simple class for generating password from different sets of
70 70 characters
71 71 usage::
72 72
73 73 passwd_gen = PasswordGenerator()
74 74 #print 8-letter password containing only big and small letters
75 75 of alphabet
76 76 passwd_gen.gen_password(8, passwd_gen.ALPHABETS_BIG_SMALL)
77 77 """
78 78 ALPHABETS_NUM = r'''1234567890'''
79 79 ALPHABETS_SMALL = r'''qwertyuiopasdfghjklzxcvbnm'''
80 80 ALPHABETS_BIG = r'''QWERTYUIOPASDFGHJKLZXCVBNM'''
81 81 ALPHABETS_SPECIAL = r'''`-=[]\;',./~!@#$%^&*()_+{}|:"<>?'''
82 82 ALPHABETS_FULL = ALPHABETS_BIG + ALPHABETS_SMALL \
83 83 + ALPHABETS_NUM + ALPHABETS_SPECIAL
84 84 ALPHABETS_ALPHANUM = ALPHABETS_BIG + ALPHABETS_SMALL + ALPHABETS_NUM
85 85 ALPHABETS_BIG_SMALL = ALPHABETS_BIG + ALPHABETS_SMALL
86 86 ALPHABETS_ALPHANUM_BIG = ALPHABETS_BIG + ALPHABETS_NUM
87 87 ALPHABETS_ALPHANUM_SMALL = ALPHABETS_SMALL + ALPHABETS_NUM
88 88
89 89 def __init__(self, passwd=''):
90 90 self.passwd = passwd
91 91
92 92 def gen_password(self, length, type_=None):
93 93 if type_ is None:
94 94 type_ = self.ALPHABETS_FULL
95 95 self.passwd = ''.join([random.choice(type_) for _ in xrange(length)])
96 96 return self.passwd
97 97
98 98
99 99 class _RhodeCodeCryptoBase(object):
100 100 ENC_PREF = None
101 101
102 102 def hash_create(self, str_):
103 103 """
104 104 hash the string using
105 105
106 106 :param str_: password to hash
107 107 """
108 108 raise NotImplementedError
109 109
110 110 def hash_check_with_upgrade(self, password, hashed):
111 111 """
112 112 Returns tuple in which first element is boolean that states that
113 113 given password matches it's hashed version, and the second is new hash
114 114 of the password, in case this password should be migrated to new
115 115 cipher.
116 116 """
117 117 checked_hash = self.hash_check(password, hashed)
118 118 return checked_hash, None
119 119
120 120 def hash_check(self, password, hashed):
121 121 """
122 122 Checks matching password with it's hashed value.
123 123
124 124 :param password: password
125 125 :param hashed: password in hashed form
126 126 """
127 127 raise NotImplementedError
128 128
129 129 def _assert_bytes(self, value):
130 130 """
131 131 Passing in an `unicode` object can lead to hard to detect issues
132 132 if passwords contain non-ascii characters. Doing a type check
133 133 during runtime, so that such mistakes are detected early on.
134 134 """
135 135 if not isinstance(value, str):
136 136 raise TypeError(
137 137 "Bytestring required as input, got %r." % (value, ))
138 138
139 139
140 140 class _RhodeCodeCryptoBCrypt(_RhodeCodeCryptoBase):
141 141 ENC_PREF = ('$2a$10', '$2b$10')
142 142
143 143 def hash_create(self, str_):
144 144 self._assert_bytes(str_)
145 145 return bcrypt.hashpw(str_, bcrypt.gensalt(10))
146 146
147 147 def hash_check_with_upgrade(self, password, hashed):
148 148 """
149 149 Returns tuple in which first element is boolean that states that
150 150 given password matches it's hashed version, and the second is new hash
151 151 of the password, in case this password should be migrated to new
152 152 cipher.
153 153
154 154 This implements special upgrade logic which works like that:
155 155 - check if the given password == bcrypted hash, if yes then we
156 156 properly used password and it was already in bcrypt. Proceed
157 157 without any changes
158 158 - if bcrypt hash check is not working try with sha256. If hash compare
159 159 is ok, it means we using correct but old hashed password. indicate
160 160 hash change and proceed
161 161 """
162 162
163 163 new_hash = None
164 164
165 165 # regular pw check
166 166 password_match_bcrypt = self.hash_check(password, hashed)
167 167
168 168 # now we want to know if the password was maybe from sha256
169 169 # basically calling _RhodeCodeCryptoSha256().hash_check()
170 170 if not password_match_bcrypt:
171 171 if _RhodeCodeCryptoSha256().hash_check(password, hashed):
172 172 new_hash = self.hash_create(password) # make new bcrypt hash
173 173 password_match_bcrypt = True
174 174
175 175 return password_match_bcrypt, new_hash
176 176
177 177 def hash_check(self, password, hashed):
178 178 """
179 179 Checks matching password with it's hashed value.
180 180
181 181 :param password: password
182 182 :param hashed: password in hashed form
183 183 """
184 184 self._assert_bytes(password)
185 185 try:
186 186 return bcrypt.hashpw(password, hashed) == hashed
187 187 except ValueError as e:
188 188 # we're having a invalid salt here probably, we should not crash
189 189 # just return with False as it would be a wrong password.
190 190 log.debug('Failed to check password hash using bcrypt %s',
191 191 safe_str(e))
192 192
193 193 return False
194 194
195 195
196 196 class _RhodeCodeCryptoSha256(_RhodeCodeCryptoBase):
197 197 ENC_PREF = '_'
198 198
199 199 def hash_create(self, str_):
200 200 self._assert_bytes(str_)
201 201 return hashlib.sha256(str_).hexdigest()
202 202
203 203 def hash_check(self, password, hashed):
204 204 """
205 205 Checks matching password with it's hashed value.
206 206
207 207 :param password: password
208 208 :param hashed: password in hashed form
209 209 """
210 210 self._assert_bytes(password)
211 211 return hashlib.sha256(password).hexdigest() == hashed
212 212
213 213
214 214 class _RhodeCodeCryptoMd5(_RhodeCodeCryptoBase):
215 215 ENC_PREF = '_'
216 216
217 217 def hash_create(self, str_):
218 218 self._assert_bytes(str_)
219 219 return hashlib.md5(str_).hexdigest()
220 220
221 221 def hash_check(self, password, hashed):
222 222 """
223 223 Checks matching password with it's hashed value.
224 224
225 225 :param password: password
226 226 :param hashed: password in hashed form
227 227 """
228 228 self._assert_bytes(password)
229 229 return hashlib.md5(password).hexdigest() == hashed
230 230
231 231
232 232 def crypto_backend():
233 233 """
234 234 Return the matching crypto backend.
235 235
236 236 Selection is based on if we run tests or not, we pick md5 backend to run
237 237 tests faster since BCRYPT is expensive to calculate
238 238 """
239 239 if rhodecode.is_test:
240 240 RhodeCodeCrypto = _RhodeCodeCryptoMd5()
241 241 else:
242 242 RhodeCodeCrypto = _RhodeCodeCryptoBCrypt()
243 243
244 244 return RhodeCodeCrypto
245 245
246 246
247 247 def get_crypt_password(password):
248 248 """
249 249 Create the hash of `password` with the active crypto backend.
250 250
251 251 :param password: The cleartext password.
252 252 :type password: unicode
253 253 """
254 254 password = safe_str(password)
255 255 return crypto_backend().hash_create(password)
256 256
257 257
258 258 def check_password(password, hashed):
259 259 """
260 260 Check if the value in `password` matches the hash in `hashed`.
261 261
262 262 :param password: The cleartext password.
263 263 :type password: unicode
264 264
265 265 :param hashed: The expected hashed version of the password.
266 266 :type hashed: The hash has to be passed in in text representation.
267 267 """
268 268 password = safe_str(password)
269 269 return crypto_backend().hash_check(password, hashed)
270 270
271 271
272 272 def generate_auth_token(data, salt=None):
273 273 """
274 274 Generates API KEY from given string
275 275 """
276 276
277 277 if salt is None:
278 278 salt = os.urandom(16)
279 279 return hashlib.sha1(safe_str(data) + salt).hexdigest()
280 280
281 281
282 282 class CookieStoreWrapper(object):
283 283
284 284 def __init__(self, cookie_store):
285 285 self.cookie_store = cookie_store
286 286
287 287 def __repr__(self):
288 288 return 'CookieStore<%s>' % (self.cookie_store)
289 289
290 290 def get(self, key, other=None):
291 291 if isinstance(self.cookie_store, dict):
292 292 return self.cookie_store.get(key, other)
293 293 elif isinstance(self.cookie_store, AuthUser):
294 294 return self.cookie_store.__dict__.get(key, other)
295 295
296 296
297 297 def _cached_perms_data(user_id, scope, user_is_admin,
298 298 user_inherit_default_permissions, explicit, algo):
299 299
300 300 permissions = PermissionCalculator(
301 301 user_id, scope, user_is_admin, user_inherit_default_permissions,
302 302 explicit, algo)
303 303 return permissions.calculate()
304 304
305 class PermOrigin:
305
306 class PermOrigin(object):
306 307 ADMIN = 'superadmin'
307 308
308 309 REPO_USER = 'user:%s'
309 310 REPO_USERGROUP = 'usergroup:%s'
310 311 REPO_OWNER = 'repo.owner'
311 312 REPO_DEFAULT = 'repo.default'
312 313 REPO_PRIVATE = 'repo.private'
313 314
314 315 REPOGROUP_USER = 'user:%s'
315 316 REPOGROUP_USERGROUP = 'usergroup:%s'
316 317 REPOGROUP_OWNER = 'group.owner'
317 318 REPOGROUP_DEFAULT = 'group.default'
318 319
319 320 USERGROUP_USER = 'user:%s'
320 321 USERGROUP_USERGROUP = 'usergroup:%s'
321 322 USERGROUP_OWNER = 'usergroup.owner'
322 323 USERGROUP_DEFAULT = 'usergroup.default'
323 324
324 325
325 326 class PermOriginDict(dict):
326 327 """
327 328 A special dict used for tracking permissions along with their origins.
328 329
329 330 `__setitem__` has been overridden to expect a tuple(perm, origin)
330 331 `__getitem__` will return only the perm
331 332 `.perm_origin_stack` will return the stack of (perm, origin) set per key
332 333
333 334 >>> perms = PermOriginDict()
334 335 >>> perms['resource'] = 'read', 'default'
335 336 >>> perms['resource']
336 337 'read'
337 338 >>> perms['resource'] = 'write', 'admin'
338 339 >>> perms['resource']
339 340 'write'
340 341 >>> perms.perm_origin_stack
341 342 {'resource': [('read', 'default'), ('write', 'admin')]}
342 343 """
343 344
344
345 345 def __init__(self, *args, **kw):
346 346 dict.__init__(self, *args, **kw)
347 347 self.perm_origin_stack = {}
348 348
349 349 def __setitem__(self, key, (perm, origin)):
350 350 self.perm_origin_stack.setdefault(key, []).append((perm, origin))
351 351 dict.__setitem__(self, key, perm)
352 352
353 353
354 354 class PermissionCalculator(object):
355 355
356 356 def __init__(
357 357 self, user_id, scope, user_is_admin,
358 358 user_inherit_default_permissions, explicit, algo):
359 359 self.user_id = user_id
360 360 self.user_is_admin = user_is_admin
361 361 self.inherit_default_permissions = user_inherit_default_permissions
362 362 self.explicit = explicit
363 363 self.algo = algo
364 364
365 365 scope = scope or {}
366 366 self.scope_repo_id = scope.get('repo_id')
367 367 self.scope_repo_group_id = scope.get('repo_group_id')
368 368 self.scope_user_group_id = scope.get('user_group_id')
369 369
370 370 self.default_user_id = User.get_default_user(cache=True).user_id
371 371
372 372 self.permissions_repositories = PermOriginDict()
373 373 self.permissions_repository_groups = PermOriginDict()
374 374 self.permissions_user_groups = PermOriginDict()
375 375 self.permissions_global = set()
376 376
377 377 self.default_repo_perms = Permission.get_default_repo_perms(
378 378 self.default_user_id, self.scope_repo_id)
379 379 self.default_repo_groups_perms = Permission.get_default_group_perms(
380 380 self.default_user_id, self.scope_repo_group_id)
381 381 self.default_user_group_perms = \
382 382 Permission.get_default_user_group_perms(
383 383 self.default_user_id, self.scope_user_group_id)
384 384
385 385 def calculate(self):
386 386 if self.user_is_admin:
387 387 return self._admin_permissions()
388 388
389 389 self._calculate_global_default_permissions()
390 390 self._calculate_global_permissions()
391 391 self._calculate_default_permissions()
392 392 self._calculate_repository_permissions()
393 393 self._calculate_repository_group_permissions()
394 394 self._calculate_user_group_permissions()
395 395 return self._permission_structure()
396 396
397 397 def _admin_permissions(self):
398 398 """
399 399 admin user have all default rights for repositories
400 400 and groups set to admin
401 401 """
402 402 self.permissions_global.add('hg.admin')
403 403 self.permissions_global.add('hg.create.write_on_repogroup.true')
404 404
405 405 # repositories
406 406 for perm in self.default_repo_perms:
407 407 r_k = perm.UserRepoToPerm.repository.repo_name
408 408 p = 'repository.admin'
409 409 self.permissions_repositories[r_k] = p, PermOrigin.ADMIN
410 410
411 411 # repository groups
412 412 for perm in self.default_repo_groups_perms:
413 413 rg_k = perm.UserRepoGroupToPerm.group.group_name
414 414 p = 'group.admin'
415 415 self.permissions_repository_groups[rg_k] = p, PermOrigin.ADMIN
416 416
417 417 # user groups
418 418 for perm in self.default_user_group_perms:
419 419 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
420 420 p = 'usergroup.admin'
421 421 self.permissions_user_groups[u_k] = p, PermOrigin.ADMIN
422 422
423 423 return self._permission_structure()
424 424
425 425 def _calculate_global_default_permissions(self):
426 426 """
427 427 global permissions taken from the default user
428 428 """
429 429 default_global_perms = UserToPerm.query()\
430 430 .filter(UserToPerm.user_id == self.default_user_id)\
431 431 .options(joinedload(UserToPerm.permission))
432 432
433 433 for perm in default_global_perms:
434 434 self.permissions_global.add(perm.permission.permission_name)
435 435
436 436 def _calculate_global_permissions(self):
437 437 """
438 438 Set global system permissions with user permissions or permissions
439 439 taken from the user groups of the current user.
440 440
441 441 The permissions include repo creating, repo group creating, forking
442 442 etc.
443 443 """
444 444
445 445 # now we read the defined permissions and overwrite what we have set
446 446 # before those can be configured from groups or users explicitly.
447 447
448 448 # TODO: johbo: This seems to be out of sync, find out the reason
449 449 # for the comment below and update it.
450 450
451 451 # In case we want to extend this list we should be always in sync with
452 452 # User.DEFAULT_USER_PERMISSIONS definitions
453 453 _configurable = frozenset([
454 454 'hg.fork.none', 'hg.fork.repository',
455 455 'hg.create.none', 'hg.create.repository',
456 456 'hg.usergroup.create.false', 'hg.usergroup.create.true',
457 457 'hg.repogroup.create.false', 'hg.repogroup.create.true',
458 458 'hg.create.write_on_repogroup.false',
459 459 'hg.create.write_on_repogroup.true',
460 460 'hg.inherit_default_perms.false', 'hg.inherit_default_perms.true'
461 461 ])
462 462
463 463 # USER GROUPS comes first user group global permissions
464 464 user_perms_from_users_groups = Session().query(UserGroupToPerm)\
465 465 .options(joinedload(UserGroupToPerm.permission))\
466 466 .join((UserGroupMember, UserGroupToPerm.users_group_id ==
467 467 UserGroupMember.users_group_id))\
468 468 .filter(UserGroupMember.user_id == self.user_id)\
469 469 .order_by(UserGroupToPerm.users_group_id)\
470 470 .all()
471 471
472 472 # need to group here by groups since user can be in more than
473 473 # one group, so we get all groups
474 474 _explicit_grouped_perms = [
475 475 [x, list(y)] for x, y in
476 476 itertools.groupby(user_perms_from_users_groups,
477 477 lambda _x: _x.users_group)]
478 478
479 479 for gr, perms in _explicit_grouped_perms:
480 480 # since user can be in multiple groups iterate over them and
481 481 # select the lowest permissions first (more explicit)
482 482 # TODO: marcink: do this^^
483 483
484 484 # group doesn't inherit default permissions so we actually set them
485 485 if not gr.inherit_default_permissions:
486 486 # NEED TO IGNORE all previously set configurable permissions
487 487 # and replace them with explicitly set from this user
488 488 # group permissions
489 489 self.permissions_global = self.permissions_global.difference(
490 490 _configurable)
491 491 for perm in perms:
492 492 self.permissions_global.add(perm.permission.permission_name)
493 493
494 494 # user explicit global permissions
495 495 user_perms = Session().query(UserToPerm)\
496 496 .options(joinedload(UserToPerm.permission))\
497 497 .filter(UserToPerm.user_id == self.user_id).all()
498 498
499 499 if not self.inherit_default_permissions:
500 500 # NEED TO IGNORE all configurable permissions and
501 501 # replace them with explicitly set from this user permissions
502 502 self.permissions_global = self.permissions_global.difference(
503 503 _configurable)
504 504 for perm in user_perms:
505 505 self.permissions_global.add(perm.permission.permission_name)
506 506
507 507 def _calculate_default_permissions(self):
508 508 """
509 509 Set default user permissions for repositories, repository groups
510 510 taken from the default user.
511 511
512 512 Calculate inheritance of object permissions based on what we have now
513 513 in GLOBAL permissions. We check if .false is in GLOBAL since this is
514 514 explicitly set. Inherit is the opposite of .false being there.
515 515
516 516 .. note::
517 517
518 518 the syntax is little bit odd but what we need to check here is
519 519 the opposite of .false permission being in the list so even for
520 520 inconsistent state when both .true/.false is there
521 521 .false is more important
522 522
523 523 """
524 524 user_inherit_object_permissions = not ('hg.inherit_default_perms.false'
525 525 in self.permissions_global)
526 526
527 527 # defaults for repositories, taken from `default` user permissions
528 528 # on given repo
529 529 for perm in self.default_repo_perms:
530 530 r_k = perm.UserRepoToPerm.repository.repo_name
531 531 o = PermOrigin.REPO_DEFAULT
532 532 if perm.Repository.private and not (
533 533 perm.Repository.user_id == self.user_id):
534 534 # disable defaults for private repos,
535 535 p = 'repository.none'
536 536 o = PermOrigin.REPO_PRIVATE
537 537 elif perm.Repository.user_id == self.user_id:
538 538 # set admin if owner
539 539 p = 'repository.admin'
540 540 o = PermOrigin.REPO_OWNER
541 541 else:
542 542 p = perm.Permission.permission_name
543 543 # if we decide this user isn't inheriting permissions from
544 544 # default user we set him to .none so only explicit
545 545 # permissions work
546 546 if not user_inherit_object_permissions:
547 547 p = 'repository.none'
548 548 self.permissions_repositories[r_k] = p, o
549 549
550 550 # defaults for repository groups taken from `default` user permission
551 551 # on given group
552 552 for perm in self.default_repo_groups_perms:
553 553 rg_k = perm.UserRepoGroupToPerm.group.group_name
554 554 o = PermOrigin.REPOGROUP_DEFAULT
555 555 if perm.RepoGroup.user_id == self.user_id:
556 556 # set admin if owner
557 557 p = 'group.admin'
558 558 o = PermOrigin.REPOGROUP_OWNER
559 559 else:
560 560 p = perm.Permission.permission_name
561 561
562 562 # if we decide this user isn't inheriting permissions from default
563 563 # user we set him to .none so only explicit permissions work
564 564 if not user_inherit_object_permissions:
565 565 p = 'group.none'
566 566 self.permissions_repository_groups[rg_k] = p, o
567 567
568 568 # defaults for user groups taken from `default` user permission
569 569 # on given user group
570 570 for perm in self.default_user_group_perms:
571 571 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
572 572 o = PermOrigin.USERGROUP_DEFAULT
573 573 if perm.UserGroup.user_id == self.user_id:
574 574 # set admin if owner
575 575 p = 'usergroup.admin'
576 576 o = PermOrigin.USERGROUP_OWNER
577 577 else:
578 578 p = perm.Permission.permission_name
579 579
580 580 # if we decide this user isn't inheriting permissions from default
581 581 # user we set him to .none so only explicit permissions work
582 582 if not user_inherit_object_permissions:
583 583 p = 'usergroup.none'
584 584 self.permissions_user_groups[u_k] = p, o
585 585
586 586 def _calculate_repository_permissions(self):
587 587 """
588 588 Repository permissions for the current user.
589 589
590 590 Check if the user is part of user groups for this repository and
591 591 fill in the permission from it. `_choose_permission` decides of which
592 592 permission should be selected based on selected method.
593 593 """
594 594
595 595 # user group for repositories permissions
596 596 user_repo_perms_from_user_group = Permission\
597 597 .get_default_repo_perms_from_user_group(
598 598 self.user_id, self.scope_repo_id)
599 599
600 600 multiple_counter = collections.defaultdict(int)
601 601 for perm in user_repo_perms_from_user_group:
602 602 r_k = perm.UserGroupRepoToPerm.repository.repo_name
603 603 ug_k = perm.UserGroupRepoToPerm.users_group.users_group_name
604 604 multiple_counter[r_k] += 1
605 605 p = perm.Permission.permission_name
606 606 o = PermOrigin.REPO_USERGROUP % ug_k
607 607
608 608 if perm.Repository.user_id == self.user_id:
609 609 # set admin if owner
610 610 p = 'repository.admin'
611 611 o = PermOrigin.REPO_OWNER
612 612 else:
613 613 if multiple_counter[r_k] > 1:
614 614 cur_perm = self.permissions_repositories[r_k]
615 615 p = self._choose_permission(p, cur_perm)
616 616 self.permissions_repositories[r_k] = p, o
617 617
618 618 # user explicit permissions for repositories, overrides any specified
619 619 # by the group permission
620 620 user_repo_perms = Permission.get_default_repo_perms(
621 621 self.user_id, self.scope_repo_id)
622 622 for perm in user_repo_perms:
623 623 r_k = perm.UserRepoToPerm.repository.repo_name
624 624 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
625 625 # set admin if owner
626 626 if perm.Repository.user_id == self.user_id:
627 627 p = 'repository.admin'
628 628 o = PermOrigin.REPO_OWNER
629 629 else:
630 630 p = perm.Permission.permission_name
631 631 if not self.explicit:
632 632 cur_perm = self.permissions_repositories.get(
633 633 r_k, 'repository.none')
634 634 p = self._choose_permission(p, cur_perm)
635 635 self.permissions_repositories[r_k] = p, o
636 636
637 637 def _calculate_repository_group_permissions(self):
638 638 """
639 639 Repository group permissions for the current user.
640 640
641 641 Check if the user is part of user groups for repository groups and
642 642 fill in the permissions from it. `_choose_permmission` decides of which
643 643 permission should be selected based on selected method.
644 644 """
645 645 # user group for repo groups permissions
646 646 user_repo_group_perms_from_user_group = Permission\
647 647 .get_default_group_perms_from_user_group(
648 648 self.user_id, self.scope_repo_group_id)
649 649
650 650 multiple_counter = collections.defaultdict(int)
651 651 for perm in user_repo_group_perms_from_user_group:
652 652 g_k = perm.UserGroupRepoGroupToPerm.group.group_name
653 653 ug_k = perm.UserGroupRepoGroupToPerm.users_group.users_group_name
654 654 o = PermOrigin.REPOGROUP_USERGROUP % ug_k
655 655 multiple_counter[g_k] += 1
656 656 p = perm.Permission.permission_name
657 657 if perm.RepoGroup.user_id == self.user_id:
658 658 # set admin if owner, even for member of other user group
659 659 p = 'group.admin'
660 660 o = PermOrigin.REPOGROUP_OWNER
661 661 else:
662 662 if multiple_counter[g_k] > 1:
663 663 cur_perm = self.permissions_repository_groups[g_k]
664 664 p = self._choose_permission(p, cur_perm)
665 665 self.permissions_repository_groups[g_k] = p, o
666 666
667 667 # user explicit permissions for repository groups
668 668 user_repo_groups_perms = Permission.get_default_group_perms(
669 669 self.user_id, self.scope_repo_group_id)
670 670 for perm in user_repo_groups_perms:
671 671 rg_k = perm.UserRepoGroupToPerm.group.group_name
672 672 u_k = perm.UserRepoGroupToPerm.user.username
673 673 o = PermOrigin.REPOGROUP_USER % u_k
674 674
675 675 if perm.RepoGroup.user_id == self.user_id:
676 676 # set admin if owner
677 677 p = 'group.admin'
678 678 o = PermOrigin.REPOGROUP_OWNER
679 679 else:
680 680 p = perm.Permission.permission_name
681 681 if not self.explicit:
682 682 cur_perm = self.permissions_repository_groups.get(
683 683 rg_k, 'group.none')
684 684 p = self._choose_permission(p, cur_perm)
685 685 self.permissions_repository_groups[rg_k] = p, o
686 686
687 687 def _calculate_user_group_permissions(self):
688 688 """
689 689 User group permissions for the current user.
690 690 """
691 691 # user group for user group permissions
692 692 user_group_from_user_group = Permission\
693 693 .get_default_user_group_perms_from_user_group(
694 694 self.user_id, self.scope_user_group_id)
695 695
696 696 multiple_counter = collections.defaultdict(int)
697 697 for perm in user_group_from_user_group:
698 698 g_k = perm.UserGroupUserGroupToPerm\
699 699 .target_user_group.users_group_name
700 700 u_k = perm.UserGroupUserGroupToPerm\
701 701 .user_group.users_group_name
702 702 o = PermOrigin.USERGROUP_USERGROUP % u_k
703 703 multiple_counter[g_k] += 1
704 704 p = perm.Permission.permission_name
705 705
706 706 if perm.UserGroup.user_id == self.user_id:
707 707 # set admin if owner, even for member of other user group
708 708 p = 'usergroup.admin'
709 709 o = PermOrigin.USERGROUP_OWNER
710 710 else:
711 711 if multiple_counter[g_k] > 1:
712 712 cur_perm = self.permissions_user_groups[g_k]
713 713 p = self._choose_permission(p, cur_perm)
714 714 self.permissions_user_groups[g_k] = p, o
715 715
716 716 # user explicit permission for user groups
717 717 user_user_groups_perms = Permission.get_default_user_group_perms(
718 718 self.user_id, self.scope_user_group_id)
719 719 for perm in user_user_groups_perms:
720 720 ug_k = perm.UserUserGroupToPerm.user_group.users_group_name
721 721 u_k = perm.UserUserGroupToPerm.user.username
722 722 o = PermOrigin.USERGROUP_USER % u_k
723 723
724 724 if perm.UserGroup.user_id == self.user_id:
725 725 # set admin if owner
726 726 p = 'usergroup.admin'
727 727 o = PermOrigin.USERGROUP_OWNER
728 728 else:
729 729 p = perm.Permission.permission_name
730 730 if not self.explicit:
731 731 cur_perm = self.permissions_user_groups.get(
732 732 ug_k, 'usergroup.none')
733 733 p = self._choose_permission(p, cur_perm)
734 734 self.permissions_user_groups[ug_k] = p, o
735 735
736 736 def _choose_permission(self, new_perm, cur_perm):
737 737 new_perm_val = Permission.PERM_WEIGHTS[new_perm]
738 738 cur_perm_val = Permission.PERM_WEIGHTS[cur_perm]
739 739 if self.algo == 'higherwin':
740 740 if new_perm_val > cur_perm_val:
741 741 return new_perm
742 742 return cur_perm
743 743 elif self.algo == 'lowerwin':
744 744 if new_perm_val < cur_perm_val:
745 745 return new_perm
746 746 return cur_perm
747 747
748 748 def _permission_structure(self):
749 749 return {
750 750 'global': self.permissions_global,
751 751 'repositories': self.permissions_repositories,
752 752 'repositories_groups': self.permissions_repository_groups,
753 753 'user_groups': self.permissions_user_groups,
754 754 }
755 755
756 756
757 757 def allowed_auth_token_access(controller_name, whitelist=None, auth_token=None):
758 758 """
759 759 Check if given controller_name is in whitelist of auth token access
760 760 """
761 761 if not whitelist:
762 762 from rhodecode import CONFIG
763 763 whitelist = aslist(
764 764 CONFIG.get('api_access_controllers_whitelist'), sep=',')
765 765 log.debug(
766 766 'Allowed controllers for AUTH TOKEN access: %s' % (whitelist,))
767 767
768 768 auth_token_access_valid = False
769 769 for entry in whitelist:
770 770 if fnmatch.fnmatch(controller_name, entry):
771 771 auth_token_access_valid = True
772 772 break
773 773
774 774 if auth_token_access_valid:
775 775 log.debug('controller:%s matches entry in whitelist'
776 776 % (controller_name,))
777 777 else:
778 778 msg = ('controller: %s does *NOT* match any entry in whitelist'
779 779 % (controller_name,))
780 780 if auth_token:
781 781 # if we use auth token key and don't have access it's a warning
782 782 log.warning(msg)
783 783 else:
784 784 log.debug(msg)
785 785
786 786 return auth_token_access_valid
787 787
788 788
789 789 class AuthUser(object):
790 790 """
791 791 A simple object that handles all attributes of user in RhodeCode
792 792
793 793 It does lookup based on API key,given user, or user present in session
794 794 Then it fills all required information for such user. It also checks if
795 795 anonymous access is enabled and if so, it returns default user as logged in
796 796 """
797 797 GLOBAL_PERMS = [x[0] for x in Permission.PERMS]
798 798
799 799 def __init__(self, user_id=None, api_key=None, username=None, ip_addr=None):
800 800
801 801 self.user_id = user_id
802 802 self._api_key = api_key
803 803
804 804 self.api_key = None
805 805 self.feed_token = ''
806 806 self.username = username
807 807 self.ip_addr = ip_addr
808 808 self.name = ''
809 809 self.lastname = ''
810 810 self.email = ''
811 811 self.is_authenticated = False
812 812 self.admin = False
813 813 self.inherit_default_permissions = False
814 814 self.password = ''
815 815
816 816 self.anonymous_user = None # propagated on propagate_data
817 817 self.propagate_data()
818 818 self._instance = None
819 819 self._permissions_scoped_cache = {} # used to bind scoped calculation
820 820
821 821 @LazyProperty
822 822 def permissions(self):
823 823 return self.get_perms(user=self, cache=False)
824 824
825 825 def permissions_with_scope(self, scope):
826 826 """
827 827 Call the get_perms function with scoped data. The scope in that function
828 828 narrows the SQL calls to the given ID of objects resulting in fetching
829 829 Just particular permission we want to obtain. If scope is an empty dict
830 830 then it basically narrows the scope to GLOBAL permissions only.
831 831
832 832 :param scope: dict
833 833 """
834 834 if 'repo_name' in scope:
835 835 obj = Repository.get_by_repo_name(scope['repo_name'])
836 836 if obj:
837 837 scope['repo_id'] = obj.repo_id
838 838 _scope = {
839 839 'repo_id': -1,
840 840 'user_group_id': -1,
841 841 'repo_group_id': -1,
842 842 }
843 843 _scope.update(scope)
844 844 cache_key = "_".join(map(safe_str, reduce(lambda a, b: a+b,
845 845 _scope.items())))
846 846 if cache_key not in self._permissions_scoped_cache:
847 847 # store in cache to mimic how the @LazyProperty works,
848 848 # the difference here is that we use the unique key calculated
849 849 # from params and values
850 850 res = self.get_perms(user=self, cache=False, scope=_scope)
851 851 self._permissions_scoped_cache[cache_key] = res
852 852 return self._permissions_scoped_cache[cache_key]
853 853
854 854 def get_instance(self):
855 855 return User.get(self.user_id)
856 856
857 857 def update_lastactivity(self):
858 858 if self.user_id:
859 859 User.get(self.user_id).update_lastactivity()
860 860
861 861 def propagate_data(self):
862 862 """
863 863 Fills in user data and propagates values to this instance. Maps fetched
864 864 user attributes to this class instance attributes
865 865 """
866 866 log.debug('starting data propagation for new potential AuthUser')
867 867 user_model = UserModel()
868 868 anon_user = self.anonymous_user = User.get_default_user(cache=True)
869 869 is_user_loaded = False
870 870
871 871 # lookup by userid
872 872 if self.user_id is not None and self.user_id != anon_user.user_id:
873 873 log.debug('Trying Auth User lookup by USER ID: `%s`' % self.user_id)
874 874 is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
875 875
876 876 # try go get user by api key
877 877 elif self._api_key and self._api_key != anon_user.api_key:
878 878 log.debug('Trying Auth User lookup by API KEY: `%s`' % self._api_key)
879 879 is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
880 880
881 881 # lookup by username
882 882 elif self.username:
883 883 log.debug('Trying Auth User lookup by USER NAME: `%s`' % self.username)
884 884 is_user_loaded = user_model.fill_data(self, username=self.username)
885 885 else:
886 886 log.debug('No data in %s that could been used to log in' % self)
887 887
888 888 if not is_user_loaded:
889 889 log.debug('Failed to load user. Fallback to default user')
890 890 # if we cannot authenticate user try anonymous
891 891 if anon_user.active:
892 892 user_model.fill_data(self, user_id=anon_user.user_id)
893 893 # then we set this user is logged in
894 894 self.is_authenticated = True
895 895 else:
896 896 # in case of disabled anonymous user we reset some of the
897 897 # parameters so such user is "corrupted", skipping the fill_data
898 898 for attr in ['user_id', 'username', 'admin', 'active']:
899 899 setattr(self, attr, None)
900 900 self.is_authenticated = False
901 901
902 902 if not self.username:
903 903 self.username = 'None'
904 904
905 905 log.debug('Auth User is now %s' % self)
906 906
907 907 def get_perms(self, user, scope=None, explicit=True, algo='higherwin',
908 908 cache=False):
909 909 """
910 910 Fills user permission attribute with permissions taken from database
911 911 works for permissions given for repositories, and for permissions that
912 912 are granted to groups
913 913
914 914 :param user: instance of User object from database
915 915 :param explicit: In case there are permissions both for user and a group
916 916 that user is part of, explicit flag will defiine if user will
917 917 explicitly override permissions from group, if it's False it will
918 918 make decision based on the algo
919 919 :param algo: algorithm to decide what permission should be choose if
920 920 it's multiple defined, eg user in two different groups. It also
921 921 decides if explicit flag is turned off how to specify the permission
922 922 for case when user is in a group + have defined separate permission
923 923 """
924 924 user_id = user.user_id
925 925 user_is_admin = user.is_admin
926 926
927 927 # inheritance of global permissions like create repo/fork repo etc
928 928 user_inherit_default_permissions = user.inherit_default_permissions
929 929
930 930 log.debug('Computing PERMISSION tree for scope %s' % (scope, ))
931 931 compute = caches.conditional_cache(
932 932 'short_term', 'cache_desc',
933 933 condition=cache, func=_cached_perms_data)
934 934 result = compute(user_id, scope, user_is_admin,
935 935 user_inherit_default_permissions, explicit, algo)
936 936
937 937 result_repr = []
938 938 for k in result:
939 939 result_repr.append((k, len(result[k])))
940 940
941 941 log.debug('PERMISSION tree computed %s' % (result_repr,))
942 942 return result
943 943
944 944 @property
945 945 def is_default(self):
946 946 return self.username == User.DEFAULT_USER
947 947
948 948 @property
949 949 def is_admin(self):
950 950 return self.admin
951 951
952 952 @property
953 953 def is_user_object(self):
954 954 return self.user_id is not None
955 955
956 956 @property
957 957 def repositories_admin(self):
958 958 """
959 959 Returns list of repositories you're an admin of
960 960 """
961 961 return [
962 962 x[0] for x in self.permissions['repositories'].iteritems()
963 963 if x[1] == 'repository.admin']
964 964
965 965 @property
966 966 def repository_groups_admin(self):
967 967 """
968 968 Returns list of repository groups you're an admin of
969 969 """
970 970 return [
971 971 x[0] for x in self.permissions['repositories_groups'].iteritems()
972 972 if x[1] == 'group.admin']
973 973
974 974 @property
975 975 def user_groups_admin(self):
976 976 """
977 977 Returns list of user groups you're an admin of
978 978 """
979 979 return [
980 980 x[0] for x in self.permissions['user_groups'].iteritems()
981 981 if x[1] == 'usergroup.admin']
982 982
983 983 @property
984 984 def ip_allowed(self):
985 985 """
986 986 Checks if ip_addr used in constructor is allowed from defined list of
987 987 allowed ip_addresses for user
988 988
989 989 :returns: boolean, True if ip is in allowed ip range
990 990 """
991 991 # check IP
992 992 inherit = self.inherit_default_permissions
993 993 return AuthUser.check_ip_allowed(self.user_id, self.ip_addr,
994 994 inherit_from_default=inherit)
995 995 @property
996 996 def personal_repo_group(self):
997 997 return RepoGroup.get_user_personal_repo_group(self.user_id)
998 998
999 999 @classmethod
1000 1000 def check_ip_allowed(cls, user_id, ip_addr, inherit_from_default):
1001 1001 allowed_ips = AuthUser.get_allowed_ips(
1002 1002 user_id, cache=True, inherit_from_default=inherit_from_default)
1003 1003 if check_ip_access(source_ip=ip_addr, allowed_ips=allowed_ips):
1004 1004 log.debug('IP:%s is in range of %s' % (ip_addr, allowed_ips))
1005 1005 return True
1006 1006 else:
1007 1007 log.info('Access for IP:%s forbidden, '
1008 1008 'not in %s' % (ip_addr, allowed_ips))
1009 1009 return False
1010 1010
1011 1011 def __repr__(self):
1012 1012 return "<AuthUser('id:%s[%s] ip:%s auth:%s')>"\
1013 1013 % (self.user_id, self.username, self.ip_addr, self.is_authenticated)
1014 1014
1015 1015 def set_authenticated(self, authenticated=True):
1016 1016 if self.user_id != self.anonymous_user.user_id:
1017 1017 self.is_authenticated = authenticated
1018 1018
1019 1019 def get_cookie_store(self):
1020 1020 return {
1021 1021 'username': self.username,
1022 1022 'password': md5(self.password),
1023 1023 'user_id': self.user_id,
1024 1024 'is_authenticated': self.is_authenticated
1025 1025 }
1026 1026
1027 1027 @classmethod
1028 1028 def from_cookie_store(cls, cookie_store):
1029 1029 """
1030 1030 Creates AuthUser from a cookie store
1031 1031
1032 1032 :param cls:
1033 1033 :param cookie_store:
1034 1034 """
1035 1035 user_id = cookie_store.get('user_id')
1036 1036 username = cookie_store.get('username')
1037 1037 api_key = cookie_store.get('api_key')
1038 1038 return AuthUser(user_id, api_key, username)
1039 1039
1040 1040 @classmethod
1041 1041 def get_allowed_ips(cls, user_id, cache=False, inherit_from_default=False):
1042 1042 _set = set()
1043 1043
1044 1044 if inherit_from_default:
1045 1045 default_ips = UserIpMap.query().filter(
1046 1046 UserIpMap.user == User.get_default_user(cache=True))
1047 1047 if cache:
1048 1048 default_ips = default_ips.options(
1049 1049 FromCache("sql_cache_short", "get_user_ips_default"))
1050 1050
1051 1051 # populate from default user
1052 1052 for ip in default_ips:
1053 1053 try:
1054 1054 _set.add(ip.ip_addr)
1055 1055 except ObjectDeletedError:
1056 1056 # since we use heavy caching sometimes it happens that
1057 1057 # we get deleted objects here, we just skip them
1058 1058 pass
1059 1059
1060 1060 user_ips = UserIpMap.query().filter(UserIpMap.user_id == user_id)
1061 1061 if cache:
1062 1062 user_ips = user_ips.options(
1063 1063 FromCache("sql_cache_short", "get_user_ips_%s" % user_id))
1064 1064
1065 1065 for ip in user_ips:
1066 1066 try:
1067 1067 _set.add(ip.ip_addr)
1068 1068 except ObjectDeletedError:
1069 1069 # since we use heavy caching sometimes it happens that we get
1070 1070 # deleted objects here, we just skip them
1071 1071 pass
1072 1072 return _set or set(['0.0.0.0/0', '::/0'])
1073 1073
1074 1074
1075 1075 def set_available_permissions(config):
1076 1076 """
1077 1077 This function will propagate pylons globals with all available defined
1078 1078 permission given in db. We don't want to check each time from db for new
1079 1079 permissions since adding a new permission also requires application restart
1080 1080 ie. to decorate new views with the newly created permission
1081 1081
1082 1082 :param config: current pylons config instance
1083 1083
1084 1084 """
1085 1085 log.info('getting information about all available permissions')
1086 1086 try:
1087 1087 sa = meta.Session
1088 1088 all_perms = sa.query(Permission).all()
1089 1089 config['available_permissions'] = [x.permission_name for x in all_perms]
1090 1090 except Exception:
1091 1091 log.error(traceback.format_exc())
1092 1092 finally:
1093 1093 meta.Session.remove()
1094 1094
1095 1095
1096 1096 def get_csrf_token(session=None, force_new=False, save_if_missing=True):
1097 1097 """
1098 1098 Return the current authentication token, creating one if one doesn't
1099 1099 already exist and the save_if_missing flag is present.
1100 1100
1101 1101 :param session: pass in the pylons session, else we use the global ones
1102 1102 :param force_new: force to re-generate the token and store it in session
1103 1103 :param save_if_missing: save the newly generated token if it's missing in
1104 1104 session
1105 1105 """
1106 1106 if not session:
1107 1107 from pylons import session
1108 1108
1109 1109 if (csrf_token_key not in session and save_if_missing) or force_new:
1110 1110 token = hashlib.sha1(str(random.getrandbits(128))).hexdigest()
1111 1111 session[csrf_token_key] = token
1112 1112 if hasattr(session, 'save'):
1113 1113 session.save()
1114 1114 return session.get(csrf_token_key)
1115 1115
1116 1116
1117 def get_request(perm_class):
1118 from pyramid.threadlocal import get_current_request
1119 pyramid_request = get_current_request()
1120 if not pyramid_request:
1121 # return global request of pylons in case pyramid isn't available
1122 # NOTE(marcink): this should be removed after migration to pyramid
1123 from pylons import request
1124 return request
1125 return pyramid_request
1126
1127
1117 1128 # CHECK DECORATORS
1118 1129 class CSRFRequired(object):
1119 1130 """
1120 1131 Decorator for authenticating a form
1121 1132
1122 1133 This decorator uses an authorization token stored in the client's
1123 1134 session for prevention of certain Cross-site request forgery (CSRF)
1124 1135 attacks (See
1125 1136 http://en.wikipedia.org/wiki/Cross-site_request_forgery for more
1126 1137 information).
1127 1138
1128 1139 For use with the ``webhelpers.secure_form`` helper functions.
1129 1140
1130 1141 """
1131 1142 def __init__(self, token=csrf_token_key, header='X-CSRF-Token',
1132 1143 except_methods=None):
1133 1144 self.token = token
1134 1145 self.header = header
1135 1146 self.except_methods = except_methods or []
1136 1147
1137 1148 def __call__(self, func):
1138 1149 return get_cython_compat_decorator(self.__wrapper, func)
1139 1150
1140 1151 def _get_csrf(self, _request):
1141 1152 return _request.POST.get(self.token, _request.headers.get(self.header))
1142 1153
1143 1154 def check_csrf(self, _request, cur_token):
1144 1155 supplied_token = self._get_csrf(_request)
1145 1156 return supplied_token and supplied_token == cur_token
1146 1157
1158 def _get_request(self):
1159 return get_request(self)
1160
1147 1161 def __wrapper(self, func, *fargs, **fkwargs):
1162 request = self._get_request()
1163
1148 1164 if request.method in self.except_methods:
1149 1165 return func(*fargs, **fkwargs)
1150 1166
1151 1167 cur_token = get_csrf_token(save_if_missing=False)
1152 1168 if self.check_csrf(request, cur_token):
1153 1169 if request.POST.get(self.token):
1154 1170 del request.POST[self.token]
1155 1171 return func(*fargs, **fkwargs)
1156 1172 else:
1157 1173 reason = 'token-missing'
1158 1174 supplied_token = self._get_csrf(request)
1159 1175 if supplied_token and cur_token != supplied_token:
1160 reason = 'token-mismatch [%s:%s]' % (cur_token or ''[:6],
1161 supplied_token or ''[:6])
1176 reason = 'token-mismatch [%s:%s]' % (
1177 cur_token or ''[:6], supplied_token or ''[:6])
1162 1178
1163 1179 csrf_message = \
1164 1180 ("Cross-site request forgery detected, request denied. See "
1165 1181 "http://en.wikipedia.org/wiki/Cross-site_request_forgery for "
1166 1182 "more information.")
1167 1183 log.warn('Cross-site request forgery detected, request %r DENIED: %s '
1168 1184 'REMOTE_ADDR:%s, HEADERS:%s' % (
1169 1185 request, reason, request.remote_addr, request.headers))
1170 1186
1171 1187 raise HTTPForbidden(explanation=csrf_message)
1172 1188
1173 1189
1174 1190 class LoginRequired(object):
1175 1191 """
1176 1192 Must be logged in to execute this function else
1177 1193 redirect to login page
1178 1194
1179 1195 :param api_access: if enabled this checks only for valid auth token
1180 1196 and grants access based on valid token
1181 1197 """
1182 1198 def __init__(self, auth_token_access=None):
1183 1199 self.auth_token_access = auth_token_access
1184 1200
1185 1201 def __call__(self, func):
1186 1202 return get_cython_compat_decorator(self.__wrapper, func)
1187 1203
1188 1204 def _get_request(self):
1189 from pyramid.threadlocal import get_current_request
1190 pyramid_request = get_current_request()
1191 if not pyramid_request:
1192 # return global request of pylons in case pyramid isn't available
1193 return request
1194 return pyramid_request
1205 return get_request(self)
1195 1206
1196 1207 def __wrapper(self, func, *fargs, **fkwargs):
1197 1208 from rhodecode.lib import helpers as h
1198 1209 cls = fargs[0]
1199 1210 user = cls._rhodecode_user
1200 1211 request = self._get_request()
1201 1212
1202 1213 loc = "%s:%s" % (cls.__class__.__name__, func.__name__)
1203 1214 log.debug('Starting login restriction checks for user: %s' % (user,))
1204 1215 # check if our IP is allowed
1205 1216 ip_access_valid = True
1206 1217 if not user.ip_allowed:
1207 1218 h.flash(h.literal(_('IP %s not allowed' % (user.ip_addr,))),
1208 1219 category='warning')
1209 1220 ip_access_valid = False
1210 1221
1211 1222 # check if we used an APIKEY and it's a valid one
1212 1223 # defined white-list of controllers which API access will be enabled
1213 1224 _auth_token = request.GET.get(
1214 1225 'auth_token', '') or request.GET.get('api_key', '')
1215 1226 auth_token_access_valid = allowed_auth_token_access(
1216 1227 loc, auth_token=_auth_token)
1217 1228
1218 1229 # explicit controller is enabled or API is in our whitelist
1219 1230 if self.auth_token_access or auth_token_access_valid:
1220 1231 log.debug('Checking AUTH TOKEN access for %s' % (cls,))
1221 1232 db_user = user.get_instance()
1222 1233
1223 1234 if db_user:
1224 1235 if self.auth_token_access:
1225 1236 roles = self.auth_token_access
1226 1237 else:
1227 1238 roles = [UserApiKeys.ROLE_HTTP]
1228 1239 token_match = db_user.authenticate_by_token(
1229 1240 _auth_token, roles=roles)
1230 1241 else:
1231 1242 log.debug('Unable to fetch db instance for auth user: %s', user)
1232 1243 token_match = False
1233 1244
1234 1245 if _auth_token and token_match:
1235 1246 auth_token_access_valid = True
1236 1247 log.debug('AUTH TOKEN ****%s is VALID' % (_auth_token[-4:],))
1237 1248 else:
1238 1249 auth_token_access_valid = False
1239 1250 if not _auth_token:
1240 1251 log.debug("AUTH TOKEN *NOT* present in request")
1241 1252 else:
1242 1253 log.warning(
1243 1254 "AUTH TOKEN ****%s *NOT* valid" % _auth_token[-4:])
1244 1255
1245 1256 log.debug('Checking if %s is authenticated @ %s' % (user.username, loc))
1246 1257 reason = 'RHODECODE_AUTH' if user.is_authenticated \
1247 1258 else 'AUTH_TOKEN_AUTH'
1248 1259
1249 1260 if ip_access_valid and (
1250 1261 user.is_authenticated or auth_token_access_valid):
1251 1262 log.info(
1252 1263 'user %s authenticating with:%s IS authenticated on func %s'
1253 1264 % (user, reason, loc))
1254 1265
1255 1266 # update user data to check last activity
1256 1267 user.update_lastactivity()
1257 1268 Session().commit()
1258 1269 return func(*fargs, **fkwargs)
1259 1270 else:
1260 1271 log.warning(
1261 1272 'user %s authenticating with:%s NOT authenticated on '
1262 1273 'func: %s: IP_ACCESS:%s AUTH_TOKEN_ACCESS:%s'
1263 1274 % (user, reason, loc, ip_access_valid,
1264 1275 auth_token_access_valid))
1265 1276 # we preserve the get PARAM
1266 1277 came_from = request.path_qs
1267 1278 log.debug('redirecting to login page with %s' % (came_from,))
1268 1279 raise HTTPFound(
1269 1280 h.route_path('login', _query={'came_from': came_from}))
1270 1281
1271 1282
1272 1283 class NotAnonymous(object):
1273 1284 """
1274 1285 Must be logged in to execute this function else
1275 1286 redirect to login page
1276 1287 """
1277 1288
1278 1289 def __call__(self, func):
1279 1290 return get_cython_compat_decorator(self.__wrapper, func)
1280 1291
1292 def _get_request(self):
1293 return get_request(self)
1294
1281 1295 def __wrapper(self, func, *fargs, **fkwargs):
1282 1296 import rhodecode.lib.helpers as h
1283 1297 cls = fargs[0]
1284 1298 self.user = cls._rhodecode_user
1299 request = self._get_request()
1285 1300
1286 1301 log.debug('Checking if user is not anonymous @%s' % cls)
1287 1302
1288 1303 anonymous = self.user.username == User.DEFAULT_USER
1289 1304
1290 1305 if anonymous:
1291 1306 came_from = request.path_qs
1292 1307 h.flash(_('You need to be a registered user to '
1293 1308 'perform this action'),
1294 1309 category='warning')
1295 1310 raise HTTPFound(
1296 1311 h.route_path('login', _query={'came_from': came_from}))
1297 1312 else:
1298 1313 return func(*fargs, **fkwargs)
1299 1314
1300 1315
1301 1316 class XHRRequired(object):
1302 1317 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1303 1318
1304 1319 def __call__(self, func):
1305 1320 return get_cython_compat_decorator(self.__wrapper, func)
1306 1321
1322 def _get_request(self):
1323 return get_request(self)
1324
1307 1325 def __wrapper(self, func, *fargs, **fkwargs):
1326 from pylons.controllers.util import abort
1327 request = self._get_request()
1328
1308 1329 log.debug('Checking if request is XMLHttpRequest (XHR)')
1309 1330 xhr_message = 'This is not a valid XMLHttpRequest (XHR) request'
1331
1310 1332 if not request.is_xhr:
1311 1333 abort(400, detail=xhr_message)
1312 1334
1313 1335 return func(*fargs, **fkwargs)
1314 1336
1315 1337
1316 1338 class HasAcceptedRepoType(object):
1317 1339 """
1318 1340 Check if requested repo is within given repo type aliases
1319 1341 """
1320 1342
1321 1343 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1322 1344
1323 1345 def __init__(self, *repo_type_list):
1324 1346 self.repo_type_list = set(repo_type_list)
1325 1347
1326 1348 def __call__(self, func):
1327 1349 return get_cython_compat_decorator(self.__wrapper, func)
1328 1350
1329 1351 def __wrapper(self, func, *fargs, **fkwargs):
1330 1352 import rhodecode.lib.helpers as h
1331 1353 cls = fargs[0]
1332 1354 rhodecode_repo = cls.rhodecode_repo
1333 1355
1334 1356 log.debug('%s checking repo type for %s in %s',
1335 1357 self.__class__.__name__,
1336 1358 rhodecode_repo.alias, self.repo_type_list)
1337 1359
1338 1360 if rhodecode_repo.alias in self.repo_type_list:
1339 1361 return func(*fargs, **fkwargs)
1340 1362 else:
1341 1363 h.flash(h.literal(
1342 1364 _('Action not supported for %s.' % rhodecode_repo.alias)),
1343 1365 category='warning')
1344 1366 raise HTTPFound(
1345 1367 h.route_path('repo_summary',
1346 1368 repo_name=cls.rhodecode_db_repo.repo_name))
1347 1369
1348 1370
1349 1371 class PermsDecorator(object):
1350 1372 """
1351 1373 Base class for controller decorators, we extract the current user from
1352 1374 the class itself, which has it stored in base controllers
1353 1375 """
1354 1376
1355 1377 def __init__(self, *required_perms):
1356 1378 self.required_perms = set(required_perms)
1357 1379
1358 1380 def __call__(self, func):
1359 1381 return get_cython_compat_decorator(self.__wrapper, func)
1360 1382
1361 1383 def _get_request(self):
1362 from pyramid.threadlocal import get_current_request
1363 pyramid_request = get_current_request()
1364 if not pyramid_request:
1365 # return global request of pylons in case pyramid isn't available
1366 return request
1367 return pyramid_request
1384 return get_request(self)
1368 1385
1369 1386 def _get_came_from(self):
1370 1387 _request = self._get_request()
1371 1388
1372 1389 # both pylons/pyramid has this attribute
1373 1390 return _request.path_qs
1374 1391
1375 1392 def __wrapper(self, func, *fargs, **fkwargs):
1376 1393 import rhodecode.lib.helpers as h
1377 1394 cls = fargs[0]
1378 1395 _user = cls._rhodecode_user
1379 1396
1380 1397 log.debug('checking %s permissions %s for %s %s',
1381 1398 self.__class__.__name__, self.required_perms, cls, _user)
1382 1399
1383 1400 if self.check_permissions(_user):
1384 1401 log.debug('Permission granted for %s %s', cls, _user)
1385 1402 return func(*fargs, **fkwargs)
1386 1403
1387 1404 else:
1388 1405 log.debug('Permission denied for %s %s', cls, _user)
1389 1406 anonymous = _user.username == User.DEFAULT_USER
1390 1407
1391 1408 if anonymous:
1392 1409 came_from = self._get_came_from()
1393 1410 h.flash(_('You need to be signed in to view this page'),
1394 1411 category='warning')
1395 1412 raise HTTPFound(
1396 1413 h.route_path('login', _query={'came_from': came_from}))
1397 1414
1398 1415 else:
1399 1416 # redirect with forbidden ret code
1400 1417 raise HTTPForbidden()
1401 1418
1402 1419 def check_permissions(self, user):
1403 1420 """Dummy function for overriding"""
1404 1421 raise NotImplementedError(
1405 1422 'You have to write this function in child class')
1406 1423
1407 1424
1408 1425 class HasPermissionAllDecorator(PermsDecorator):
1409 1426 """
1410 1427 Checks for access permission for all given predicates. All of them
1411 1428 have to be meet in order to fulfill the request
1412 1429 """
1413 1430
1414 1431 def check_permissions(self, user):
1415 1432 perms = user.permissions_with_scope({})
1416 1433 if self.required_perms.issubset(perms['global']):
1417 1434 return True
1418 1435 return False
1419 1436
1420 1437
1421 1438 class HasPermissionAnyDecorator(PermsDecorator):
1422 1439 """
1423 1440 Checks for access permission for any of given predicates. In order to
1424 1441 fulfill the request any of predicates must be meet
1425 1442 """
1426 1443
1427 1444 def check_permissions(self, user):
1428 1445 perms = user.permissions_with_scope({})
1429 1446 if self.required_perms.intersection(perms['global']):
1430 1447 return True
1431 1448 return False
1432 1449
1433 1450
1434 1451 class HasRepoPermissionAllDecorator(PermsDecorator):
1435 1452 """
1436 1453 Checks for access permission for all given predicates for specific
1437 1454 repository. All of them have to be meet in order to fulfill the request
1438 1455 """
1439 1456 def _get_repo_name(self):
1440 1457 _request = self._get_request()
1441 1458 return get_repo_slug(_request)
1442 1459
1443 1460 def check_permissions(self, user):
1444 1461 perms = user.permissions
1445 1462 repo_name = self._get_repo_name()
1446 1463
1447 1464 try:
1448 1465 user_perms = set([perms['repositories'][repo_name]])
1449 1466 except KeyError:
1450 1467 log.debug('cannot locate repo with name: `%s` in permissions defs',
1451 1468 repo_name)
1452 1469 return False
1453 1470
1454 1471 log.debug('checking `%s` permissions for repo `%s`',
1455 1472 user_perms, repo_name)
1456 1473 if self.required_perms.issubset(user_perms):
1457 1474 return True
1458 1475 return False
1459 1476
1460 1477
1461 1478 class HasRepoPermissionAnyDecorator(PermsDecorator):
1462 1479 """
1463 1480 Checks for access permission for any of given predicates for specific
1464 1481 repository. In order to fulfill the request any of predicates must be meet
1465 1482 """
1466 1483 def _get_repo_name(self):
1467 1484 _request = self._get_request()
1468 1485 return get_repo_slug(_request)
1469 1486
1470 1487 def check_permissions(self, user):
1471 1488 perms = user.permissions
1472 1489 repo_name = self._get_repo_name()
1473 1490
1474 1491 try:
1475 1492 user_perms = set([perms['repositories'][repo_name]])
1476 1493 except KeyError:
1477 1494 log.debug('cannot locate repo with name: `%s` in permissions defs',
1478 1495 repo_name)
1479 1496 return False
1480 1497
1481 1498 log.debug('checking `%s` permissions for repo `%s`',
1482 1499 user_perms, repo_name)
1483 1500 if self.required_perms.intersection(user_perms):
1484 1501 return True
1485 1502 return False
1486 1503
1487 1504
1488 1505 class HasRepoGroupPermissionAllDecorator(PermsDecorator):
1489 1506 """
1490 1507 Checks for access permission for all given predicates for specific
1491 1508 repository group. All of them have to be meet in order to
1492 1509 fulfill the request
1493 1510 """
1494 1511 def _get_repo_group_name(self):
1495 1512 _request = self._get_request()
1496 1513 return get_repo_group_slug(_request)
1497 1514
1498 1515 def check_permissions(self, user):
1499 1516 perms = user.permissions
1500 1517 group_name = self._get_repo_group_name()
1501 1518 try:
1502 1519 user_perms = set([perms['repositories_groups'][group_name]])
1503 1520 except KeyError:
1504 1521 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1505 1522 group_name)
1506 1523 return False
1507 1524
1508 1525 log.debug('checking `%s` permissions for repo group `%s`',
1509 1526 user_perms, group_name)
1510 1527 if self.required_perms.issubset(user_perms):
1511 1528 return True
1512 1529 return False
1513 1530
1514 1531
1515 1532 class HasRepoGroupPermissionAnyDecorator(PermsDecorator):
1516 1533 """
1517 1534 Checks for access permission for any of given predicates for specific
1518 1535 repository group. In order to fulfill the request any
1519 1536 of predicates must be met
1520 1537 """
1521 1538 def _get_repo_group_name(self):
1522 1539 _request = self._get_request()
1523 1540 return get_repo_group_slug(_request)
1524 1541
1525 1542 def check_permissions(self, user):
1526 1543 perms = user.permissions
1527 1544 group_name = self._get_repo_group_name()
1528 1545
1529 1546 try:
1530 1547 user_perms = set([perms['repositories_groups'][group_name]])
1531 1548 except KeyError:
1532 1549 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1533 1550 group_name)
1534 1551 return False
1535 1552
1536 1553 log.debug('checking `%s` permissions for repo group `%s`',
1537 1554 user_perms, group_name)
1538 1555 if self.required_perms.intersection(user_perms):
1539 1556 return True
1540 1557 return False
1541 1558
1542 1559
1543 1560 class HasUserGroupPermissionAllDecorator(PermsDecorator):
1544 1561 """
1545 1562 Checks for access permission for all given predicates for specific
1546 1563 user group. All of them have to be meet in order to fulfill the request
1547 1564 """
1548 1565 def _get_user_group_name(self):
1549 1566 _request = self._get_request()
1550 1567 return get_user_group_slug(_request)
1551 1568
1552 1569 def check_permissions(self, user):
1553 1570 perms = user.permissions
1554 1571 group_name = self._get_user_group_name()
1555 1572 try:
1556 1573 user_perms = set([perms['user_groups'][group_name]])
1557 1574 except KeyError:
1558 1575 return False
1559 1576
1560 1577 if self.required_perms.issubset(user_perms):
1561 1578 return True
1562 1579 return False
1563 1580
1564 1581
1565 1582 class HasUserGroupPermissionAnyDecorator(PermsDecorator):
1566 1583 """
1567 1584 Checks for access permission for any of given predicates for specific
1568 1585 user group. In order to fulfill the request any of predicates must be meet
1569 1586 """
1570 1587 def _get_user_group_name(self):
1571 1588 _request = self._get_request()
1572 1589 return get_user_group_slug(_request)
1573 1590
1574 1591 def check_permissions(self, user):
1575 1592 perms = user.permissions
1576 1593 group_name = self._get_user_group_name()
1577 1594 try:
1578 1595 user_perms = set([perms['user_groups'][group_name]])
1579 1596 except KeyError:
1580 1597 return False
1581 1598
1582 1599 if self.required_perms.intersection(user_perms):
1583 1600 return True
1584 1601 return False
1585 1602
1586 1603
1587 1604 # CHECK FUNCTIONS
1588 1605 class PermsFunction(object):
1589 1606 """Base function for other check functions"""
1590 1607
1591 1608 def __init__(self, *perms):
1592 1609 self.required_perms = set(perms)
1593 1610 self.repo_name = None
1594 1611 self.repo_group_name = None
1595 1612 self.user_group_name = None
1596 1613
1597 1614 def __bool__(self):
1598 1615 frame = inspect.currentframe()
1599 1616 stack_trace = traceback.format_stack(frame)
1600 1617 log.error('Checking bool value on a class instance of perm '
1601 1618 'function is not allowed: %s' % ''.join(stack_trace))
1602 1619 # rather than throwing errors, here we always return False so if by
1603 1620 # accident someone checks truth for just an instance it will always end
1604 1621 # up in returning False
1605 1622 return False
1606 1623 __nonzero__ = __bool__
1607 1624
1608 1625 def __call__(self, check_location='', user=None):
1609 1626 if not user:
1610 1627 log.debug('Using user attribute from global request')
1611 1628 # TODO: remove this someday,put as user as attribute here
1612 1629 request = self._get_request()
1613 1630 user = request.user
1614 1631
1615 1632 # init auth user if not already given
1616 1633 if not isinstance(user, AuthUser):
1617 1634 log.debug('Wrapping user %s into AuthUser', user)
1618 1635 user = AuthUser(user.user_id)
1619 1636
1620 1637 cls_name = self.__class__.__name__
1621 1638 check_scope = self._get_check_scope(cls_name)
1622 1639 check_location = check_location or 'unspecified location'
1623 1640
1624 1641 log.debug('checking cls:%s %s usr:%s %s @ %s', cls_name,
1625 1642 self.required_perms, user, check_scope, check_location)
1626 1643 if not user:
1627 1644 log.warning('Empty user given for permission check')
1628 1645 return False
1629 1646
1630 1647 if self.check_permissions(user):
1631 1648 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1632 1649 check_scope, user, check_location)
1633 1650 return True
1634 1651
1635 1652 else:
1636 1653 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1637 1654 check_scope, user, check_location)
1638 1655 return False
1639 1656
1640 1657 def _get_request(self):
1641 from pyramid.threadlocal import get_current_request
1642 pyramid_request = get_current_request()
1643 if not pyramid_request:
1644 # return global request of pylons incase pyramid one isn't available
1645 return request
1646 return pyramid_request
1658 return get_request(self)
1647 1659
1648 1660 def _get_check_scope(self, cls_name):
1649 1661 return {
1650 1662 'HasPermissionAll': 'GLOBAL',
1651 1663 'HasPermissionAny': 'GLOBAL',
1652 1664 'HasRepoPermissionAll': 'repo:%s' % self.repo_name,
1653 1665 'HasRepoPermissionAny': 'repo:%s' % self.repo_name,
1654 1666 'HasRepoGroupPermissionAll': 'repo_group:%s' % self.repo_group_name,
1655 1667 'HasRepoGroupPermissionAny': 'repo_group:%s' % self.repo_group_name,
1656 1668 'HasUserGroupPermissionAll': 'user_group:%s' % self.user_group_name,
1657 1669 'HasUserGroupPermissionAny': 'user_group:%s' % self.user_group_name,
1658 1670 }.get(cls_name, '?:%s' % cls_name)
1659 1671
1660 1672 def check_permissions(self, user):
1661 1673 """Dummy function for overriding"""
1662 1674 raise Exception('You have to write this function in child class')
1663 1675
1664 1676
1665 1677 class HasPermissionAll(PermsFunction):
1666 1678 def check_permissions(self, user):
1667 1679 perms = user.permissions_with_scope({})
1668 1680 if self.required_perms.issubset(perms.get('global')):
1669 1681 return True
1670 1682 return False
1671 1683
1672 1684
1673 1685 class HasPermissionAny(PermsFunction):
1674 1686 def check_permissions(self, user):
1675 1687 perms = user.permissions_with_scope({})
1676 1688 if self.required_perms.intersection(perms.get('global')):
1677 1689 return True
1678 1690 return False
1679 1691
1680 1692
1681 1693 class HasRepoPermissionAll(PermsFunction):
1682 1694 def __call__(self, repo_name=None, check_location='', user=None):
1683 1695 self.repo_name = repo_name
1684 1696 return super(HasRepoPermissionAll, self).__call__(check_location, user)
1685 1697
1686 1698 def _get_repo_name(self):
1687 1699 if not self.repo_name:
1688 1700 _request = self._get_request()
1689 1701 self.repo_name = get_repo_slug(_request)
1690 1702 return self.repo_name
1691 1703
1692 1704 def check_permissions(self, user):
1693 1705 self.repo_name = self._get_repo_name()
1694 1706 perms = user.permissions
1695 1707 try:
1696 1708 user_perms = set([perms['repositories'][self.repo_name]])
1697 1709 except KeyError:
1698 1710 return False
1699 1711 if self.required_perms.issubset(user_perms):
1700 1712 return True
1701 1713 return False
1702 1714
1703 1715
1704 1716 class HasRepoPermissionAny(PermsFunction):
1705 1717 def __call__(self, repo_name=None, check_location='', user=None):
1706 1718 self.repo_name = repo_name
1707 1719 return super(HasRepoPermissionAny, self).__call__(check_location, user)
1708 1720
1709 1721 def _get_repo_name(self):
1710 1722 if not self.repo_name:
1711 self.repo_name = get_repo_slug(request)
1723 _request = self._get_request()
1724 self.repo_name = get_repo_slug(_request)
1712 1725 return self.repo_name
1713 1726
1714 1727 def check_permissions(self, user):
1715 1728 self.repo_name = self._get_repo_name()
1716 1729 perms = user.permissions
1717 1730 try:
1718 1731 user_perms = set([perms['repositories'][self.repo_name]])
1719 1732 except KeyError:
1720 1733 return False
1721 1734 if self.required_perms.intersection(user_perms):
1722 1735 return True
1723 1736 return False
1724 1737
1725 1738
1726 1739 class HasRepoGroupPermissionAny(PermsFunction):
1727 1740 def __call__(self, group_name=None, check_location='', user=None):
1728 1741 self.repo_group_name = group_name
1729 1742 return super(HasRepoGroupPermissionAny, self).__call__(
1730 1743 check_location, user)
1731 1744
1732 1745 def check_permissions(self, user):
1733 1746 perms = user.permissions
1734 1747 try:
1735 1748 user_perms = set(
1736 1749 [perms['repositories_groups'][self.repo_group_name]])
1737 1750 except KeyError:
1738 1751 return False
1739 1752 if self.required_perms.intersection(user_perms):
1740 1753 return True
1741 1754 return False
1742 1755
1743 1756
1744 1757 class HasRepoGroupPermissionAll(PermsFunction):
1745 1758 def __call__(self, group_name=None, check_location='', user=None):
1746 1759 self.repo_group_name = group_name
1747 1760 return super(HasRepoGroupPermissionAll, self).__call__(
1748 1761 check_location, user)
1749 1762
1750 1763 def check_permissions(self, user):
1751 1764 perms = user.permissions
1752 1765 try:
1753 1766 user_perms = set(
1754 1767 [perms['repositories_groups'][self.repo_group_name]])
1755 1768 except KeyError:
1756 1769 return False
1757 1770 if self.required_perms.issubset(user_perms):
1758 1771 return True
1759 1772 return False
1760 1773
1761 1774
1762 1775 class HasUserGroupPermissionAny(PermsFunction):
1763 1776 def __call__(self, user_group_name=None, check_location='', user=None):
1764 1777 self.user_group_name = user_group_name
1765 1778 return super(HasUserGroupPermissionAny, self).__call__(
1766 1779 check_location, user)
1767 1780
1768 1781 def check_permissions(self, user):
1769 1782 perms = user.permissions
1770 1783 try:
1771 1784 user_perms = set([perms['user_groups'][self.user_group_name]])
1772 1785 except KeyError:
1773 1786 return False
1774 1787 if self.required_perms.intersection(user_perms):
1775 1788 return True
1776 1789 return False
1777 1790
1778 1791
1779 1792 class HasUserGroupPermissionAll(PermsFunction):
1780 1793 def __call__(self, user_group_name=None, check_location='', user=None):
1781 1794 self.user_group_name = user_group_name
1782 1795 return super(HasUserGroupPermissionAll, self).__call__(
1783 1796 check_location, user)
1784 1797
1785 1798 def check_permissions(self, user):
1786 1799 perms = user.permissions
1787 1800 try:
1788 1801 user_perms = set([perms['user_groups'][self.user_group_name]])
1789 1802 except KeyError:
1790 1803 return False
1791 1804 if self.required_perms.issubset(user_perms):
1792 1805 return True
1793 1806 return False
1794 1807
1795 1808
1796 1809 # SPECIAL VERSION TO HANDLE MIDDLEWARE AUTH
1797 1810 class HasPermissionAnyMiddleware(object):
1798 1811 def __init__(self, *perms):
1799 1812 self.required_perms = set(perms)
1800 1813
1801 1814 def __call__(self, user, repo_name):
1802 1815 # repo_name MUST be unicode, since we handle keys in permission
1803 1816 # dict by unicode
1804 1817 repo_name = safe_unicode(repo_name)
1805 1818 user = AuthUser(user.user_id)
1806 1819 log.debug(
1807 1820 'Checking VCS protocol permissions %s for user:%s repo:`%s`',
1808 1821 self.required_perms, user, repo_name)
1809 1822
1810 1823 if self.check_permissions(user, repo_name):
1811 1824 log.debug('Permission to repo:`%s` GRANTED for user:%s @ %s',
1812 1825 repo_name, user, 'PermissionMiddleware')
1813 1826 return True
1814 1827
1815 1828 else:
1816 1829 log.debug('Permission to repo:`%s` DENIED for user:%s @ %s',
1817 1830 repo_name, user, 'PermissionMiddleware')
1818 1831 return False
1819 1832
1820 1833 def check_permissions(self, user, repo_name):
1821 1834 perms = user.permissions_with_scope({'repo_name': repo_name})
1822 1835
1823 1836 try:
1824 1837 user_perms = set([perms['repositories'][repo_name]])
1825 1838 except Exception:
1826 1839 log.exception('Error while accessing user permissions')
1827 1840 return False
1828 1841
1829 1842 if self.required_perms.intersection(user_perms):
1830 1843 return True
1831 1844 return False
1832 1845
1833 1846
1834 1847 # SPECIAL VERSION TO HANDLE API AUTH
1835 1848 class _BaseApiPerm(object):
1836 1849 def __init__(self, *perms):
1837 1850 self.required_perms = set(perms)
1838 1851
1839 1852 def __call__(self, check_location=None, user=None, repo_name=None,
1840 1853 group_name=None, user_group_name=None):
1841 1854 cls_name = self.__class__.__name__
1842 1855 check_scope = 'global:%s' % (self.required_perms,)
1843 1856 if repo_name:
1844 1857 check_scope += ', repo_name:%s' % (repo_name,)
1845 1858
1846 1859 if group_name:
1847 1860 check_scope += ', repo_group_name:%s' % (group_name,)
1848 1861
1849 1862 if user_group_name:
1850 1863 check_scope += ', user_group_name:%s' % (user_group_name,)
1851 1864
1852 1865 log.debug(
1853 1866 'checking cls:%s %s %s @ %s'
1854 1867 % (cls_name, self.required_perms, check_scope, check_location))
1855 1868 if not user:
1856 1869 log.debug('Empty User passed into arguments')
1857 1870 return False
1858 1871
1859 1872 # process user
1860 1873 if not isinstance(user, AuthUser):
1861 1874 user = AuthUser(user.user_id)
1862 1875 if not check_location:
1863 1876 check_location = 'unspecified'
1864 1877 if self.check_permissions(user.permissions, repo_name, group_name,
1865 1878 user_group_name):
1866 1879 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1867 1880 check_scope, user, check_location)
1868 1881 return True
1869 1882
1870 1883 else:
1871 1884 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1872 1885 check_scope, user, check_location)
1873 1886 return False
1874 1887
1875 1888 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1876 1889 user_group_name=None):
1877 1890 """
1878 1891 implement in child class should return True if permissions are ok,
1879 1892 False otherwise
1880 1893
1881 1894 :param perm_defs: dict with permission definitions
1882 1895 :param repo_name: repo name
1883 1896 """
1884 1897 raise NotImplementedError()
1885 1898
1886 1899
1887 1900 class HasPermissionAllApi(_BaseApiPerm):
1888 1901 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1889 1902 user_group_name=None):
1890 1903 if self.required_perms.issubset(perm_defs.get('global')):
1891 1904 return True
1892 1905 return False
1893 1906
1894 1907
1895 1908 class HasPermissionAnyApi(_BaseApiPerm):
1896 1909 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1897 1910 user_group_name=None):
1898 1911 if self.required_perms.intersection(perm_defs.get('global')):
1899 1912 return True
1900 1913 return False
1901 1914
1902 1915
1903 1916 class HasRepoPermissionAllApi(_BaseApiPerm):
1904 1917 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1905 1918 user_group_name=None):
1906 1919 try:
1907 1920 _user_perms = set([perm_defs['repositories'][repo_name]])
1908 1921 except KeyError:
1909 1922 log.warning(traceback.format_exc())
1910 1923 return False
1911 1924 if self.required_perms.issubset(_user_perms):
1912 1925 return True
1913 1926 return False
1914 1927
1915 1928
1916 1929 class HasRepoPermissionAnyApi(_BaseApiPerm):
1917 1930 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1918 1931 user_group_name=None):
1919 1932 try:
1920 1933 _user_perms = set([perm_defs['repositories'][repo_name]])
1921 1934 except KeyError:
1922 1935 log.warning(traceback.format_exc())
1923 1936 return False
1924 1937 if self.required_perms.intersection(_user_perms):
1925 1938 return True
1926 1939 return False
1927 1940
1928 1941
1929 1942 class HasRepoGroupPermissionAnyApi(_BaseApiPerm):
1930 1943 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1931 1944 user_group_name=None):
1932 1945 try:
1933 1946 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1934 1947 except KeyError:
1935 1948 log.warning(traceback.format_exc())
1936 1949 return False
1937 1950 if self.required_perms.intersection(_user_perms):
1938 1951 return True
1939 1952 return False
1940 1953
1941 1954
1942 1955 class HasRepoGroupPermissionAllApi(_BaseApiPerm):
1943 1956 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1944 1957 user_group_name=None):
1945 1958 try:
1946 1959 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1947 1960 except KeyError:
1948 1961 log.warning(traceback.format_exc())
1949 1962 return False
1950 1963 if self.required_perms.issubset(_user_perms):
1951 1964 return True
1952 1965 return False
1953 1966
1954 1967
1955 1968 class HasUserGroupPermissionAnyApi(_BaseApiPerm):
1956 1969 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1957 1970 user_group_name=None):
1958 1971 try:
1959 1972 _user_perms = set([perm_defs['user_groups'][user_group_name]])
1960 1973 except KeyError:
1961 1974 log.warning(traceback.format_exc())
1962 1975 return False
1963 1976 if self.required_perms.intersection(_user_perms):
1964 1977 return True
1965 1978 return False
1966 1979
1967 1980
1968 1981 def check_ip_access(source_ip, allowed_ips=None):
1969 1982 """
1970 1983 Checks if source_ip is a subnet of any of allowed_ips.
1971 1984
1972 1985 :param source_ip:
1973 1986 :param allowed_ips: list of allowed ips together with mask
1974 1987 """
1975 1988 log.debug('checking if ip:%s is subnet of %s' % (source_ip, allowed_ips))
1976 1989 source_ip_address = ipaddress.ip_address(source_ip)
1977 1990 if isinstance(allowed_ips, (tuple, list, set)):
1978 1991 for ip in allowed_ips:
1979 1992 try:
1980 1993 network_address = ipaddress.ip_network(ip, strict=False)
1981 1994 if source_ip_address in network_address:
1982 1995 log.debug('IP %s is network %s' %
1983 1996 (source_ip_address, network_address))
1984 1997 return True
1985 1998 # for any case we cannot determine the IP, don't crash just
1986 1999 # skip it and log as error, we want to say forbidden still when
1987 2000 # sending bad IP
1988 2001 except Exception:
1989 2002 log.error(traceback.format_exc())
1990 2003 continue
1991 2004 return False
1992 2005
1993 2006
1994 2007 def get_cython_compat_decorator(wrapper, func):
1995 2008 """
1996 2009 Creates a cython compatible decorator. The previously used
1997 2010 decorator.decorator() function seems to be incompatible with cython.
1998 2011
1999 2012 :param wrapper: __wrapper method of the decorator class
2000 2013 :param func: decorated function
2001 2014 """
2002 2015 @wraps(func)
2003 2016 def local_wrapper(*args, **kwds):
2004 2017 return wrapper(func, *args, **kwds)
2005 2018 local_wrapper.__wrapped__ = func
2006 2019 return local_wrapper
2007 2020
2008 2021
General Comments 0
You need to be logged in to leave comments. Login now