##// END OF EJS Templates
auth: prepare code for removal of pylons request in pyramid migration.
marcink -
r1791:8160938e default
parent child Browse files
Show More
@@ -1,2008 +1,2021 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2017 RhodeCode GmbH
3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 """
21 """
22 authentication and permission libraries
22 authentication and permission libraries
23 """
23 """
24
24
25 import os
25 import os
26 import inspect
26 import inspect
27 import collections
27 import collections
28 import fnmatch
28 import fnmatch
29 import hashlib
29 import hashlib
30 import itertools
30 import itertools
31 import logging
31 import logging
32 import random
32 import random
33 import traceback
33 import traceback
34 from functools import wraps
34 from functools import wraps
35
35
36 import ipaddress
36 import ipaddress
37 from pyramid.httpexceptions import HTTPForbidden, HTTPFound
37 from pyramid.httpexceptions import HTTPForbidden, HTTPFound
38 from pylons import request
39 from pylons.controllers.util import abort
40 from pylons.i18n.translation import _
38 from pylons.i18n.translation import _
39 # NOTE(marcink): this has to be removed only after pyramid migration,
40 # replace with _ = request.translate
41 from sqlalchemy.orm.exc import ObjectDeletedError
41 from sqlalchemy.orm.exc import ObjectDeletedError
42 from sqlalchemy.orm import joinedload
42 from sqlalchemy.orm import joinedload
43 from zope.cachedescriptors.property import Lazy as LazyProperty
43 from zope.cachedescriptors.property import Lazy as LazyProperty
44
44
45 import rhodecode
45 import rhodecode
46 from rhodecode.model import meta
46 from rhodecode.model import meta
47 from rhodecode.model.meta import Session
47 from rhodecode.model.meta import Session
48 from rhodecode.model.user import UserModel
48 from rhodecode.model.user import UserModel
49 from rhodecode.model.db import (
49 from rhodecode.model.db import (
50 User, Repository, Permission, UserToPerm, UserGroupToPerm, UserGroupMember,
50 User, Repository, Permission, UserToPerm, UserGroupToPerm, UserGroupMember,
51 UserIpMap, UserApiKeys, RepoGroup)
51 UserIpMap, UserApiKeys, RepoGroup)
52 from rhodecode.lib import caches
52 from rhodecode.lib import caches
53 from rhodecode.lib.utils2 import safe_unicode, aslist, safe_str, md5
53 from rhodecode.lib.utils2 import safe_unicode, aslist, safe_str, md5
54 from rhodecode.lib.utils import (
54 from rhodecode.lib.utils import (
55 get_repo_slug, get_repo_group_slug, get_user_group_slug)
55 get_repo_slug, get_repo_group_slug, get_user_group_slug)
56 from rhodecode.lib.caching_query import FromCache
56 from rhodecode.lib.caching_query import FromCache
57
57
58
58
59 if rhodecode.is_unix:
59 if rhodecode.is_unix:
60 import bcrypt
60 import bcrypt
61
61
62 log = logging.getLogger(__name__)
62 log = logging.getLogger(__name__)
63
63
64 csrf_token_key = "csrf_token"
64 csrf_token_key = "csrf_token"
65
65
66
66
67 class PasswordGenerator(object):
67 class PasswordGenerator(object):
68 """
68 """
69 This is a simple class for generating password from different sets of
69 This is a simple class for generating password from different sets of
70 characters
70 characters
71 usage::
71 usage::
72
72
73 passwd_gen = PasswordGenerator()
73 passwd_gen = PasswordGenerator()
74 #print 8-letter password containing only big and small letters
74 #print 8-letter password containing only big and small letters
75 of alphabet
75 of alphabet
76 passwd_gen.gen_password(8, passwd_gen.ALPHABETS_BIG_SMALL)
76 passwd_gen.gen_password(8, passwd_gen.ALPHABETS_BIG_SMALL)
77 """
77 """
78 ALPHABETS_NUM = r'''1234567890'''
78 ALPHABETS_NUM = r'''1234567890'''
79 ALPHABETS_SMALL = r'''qwertyuiopasdfghjklzxcvbnm'''
79 ALPHABETS_SMALL = r'''qwertyuiopasdfghjklzxcvbnm'''
80 ALPHABETS_BIG = r'''QWERTYUIOPASDFGHJKLZXCVBNM'''
80 ALPHABETS_BIG = r'''QWERTYUIOPASDFGHJKLZXCVBNM'''
81 ALPHABETS_SPECIAL = r'''`-=[]\;',./~!@#$%^&*()_+{}|:"<>?'''
81 ALPHABETS_SPECIAL = r'''`-=[]\;',./~!@#$%^&*()_+{}|:"<>?'''
82 ALPHABETS_FULL = ALPHABETS_BIG + ALPHABETS_SMALL \
82 ALPHABETS_FULL = ALPHABETS_BIG + ALPHABETS_SMALL \
83 + ALPHABETS_NUM + ALPHABETS_SPECIAL
83 + ALPHABETS_NUM + ALPHABETS_SPECIAL
84 ALPHABETS_ALPHANUM = ALPHABETS_BIG + ALPHABETS_SMALL + ALPHABETS_NUM
84 ALPHABETS_ALPHANUM = ALPHABETS_BIG + ALPHABETS_SMALL + ALPHABETS_NUM
85 ALPHABETS_BIG_SMALL = ALPHABETS_BIG + ALPHABETS_SMALL
85 ALPHABETS_BIG_SMALL = ALPHABETS_BIG + ALPHABETS_SMALL
86 ALPHABETS_ALPHANUM_BIG = ALPHABETS_BIG + ALPHABETS_NUM
86 ALPHABETS_ALPHANUM_BIG = ALPHABETS_BIG + ALPHABETS_NUM
87 ALPHABETS_ALPHANUM_SMALL = ALPHABETS_SMALL + ALPHABETS_NUM
87 ALPHABETS_ALPHANUM_SMALL = ALPHABETS_SMALL + ALPHABETS_NUM
88
88
89 def __init__(self, passwd=''):
89 def __init__(self, passwd=''):
90 self.passwd = passwd
90 self.passwd = passwd
91
91
92 def gen_password(self, length, type_=None):
92 def gen_password(self, length, type_=None):
93 if type_ is None:
93 if type_ is None:
94 type_ = self.ALPHABETS_FULL
94 type_ = self.ALPHABETS_FULL
95 self.passwd = ''.join([random.choice(type_) for _ in xrange(length)])
95 self.passwd = ''.join([random.choice(type_) for _ in xrange(length)])
96 return self.passwd
96 return self.passwd
97
97
98
98
99 class _RhodeCodeCryptoBase(object):
99 class _RhodeCodeCryptoBase(object):
100 ENC_PREF = None
100 ENC_PREF = None
101
101
102 def hash_create(self, str_):
102 def hash_create(self, str_):
103 """
103 """
104 hash the string using
104 hash the string using
105
105
106 :param str_: password to hash
106 :param str_: password to hash
107 """
107 """
108 raise NotImplementedError
108 raise NotImplementedError
109
109
110 def hash_check_with_upgrade(self, password, hashed):
110 def hash_check_with_upgrade(self, password, hashed):
111 """
111 """
112 Returns tuple in which first element is boolean that states that
112 Returns tuple in which first element is boolean that states that
113 given password matches it's hashed version, and the second is new hash
113 given password matches it's hashed version, and the second is new hash
114 of the password, in case this password should be migrated to new
114 of the password, in case this password should be migrated to new
115 cipher.
115 cipher.
116 """
116 """
117 checked_hash = self.hash_check(password, hashed)
117 checked_hash = self.hash_check(password, hashed)
118 return checked_hash, None
118 return checked_hash, None
119
119
120 def hash_check(self, password, hashed):
120 def hash_check(self, password, hashed):
121 """
121 """
122 Checks matching password with it's hashed value.
122 Checks matching password with it's hashed value.
123
123
124 :param password: password
124 :param password: password
125 :param hashed: password in hashed form
125 :param hashed: password in hashed form
126 """
126 """
127 raise NotImplementedError
127 raise NotImplementedError
128
128
129 def _assert_bytes(self, value):
129 def _assert_bytes(self, value):
130 """
130 """
131 Passing in an `unicode` object can lead to hard to detect issues
131 Passing in an `unicode` object can lead to hard to detect issues
132 if passwords contain non-ascii characters. Doing a type check
132 if passwords contain non-ascii characters. Doing a type check
133 during runtime, so that such mistakes are detected early on.
133 during runtime, so that such mistakes are detected early on.
134 """
134 """
135 if not isinstance(value, str):
135 if not isinstance(value, str):
136 raise TypeError(
136 raise TypeError(
137 "Bytestring required as input, got %r." % (value, ))
137 "Bytestring required as input, got %r." % (value, ))
138
138
139
139
140 class _RhodeCodeCryptoBCrypt(_RhodeCodeCryptoBase):
140 class _RhodeCodeCryptoBCrypt(_RhodeCodeCryptoBase):
141 ENC_PREF = ('$2a$10', '$2b$10')
141 ENC_PREF = ('$2a$10', '$2b$10')
142
142
143 def hash_create(self, str_):
143 def hash_create(self, str_):
144 self._assert_bytes(str_)
144 self._assert_bytes(str_)
145 return bcrypt.hashpw(str_, bcrypt.gensalt(10))
145 return bcrypt.hashpw(str_, bcrypt.gensalt(10))
146
146
147 def hash_check_with_upgrade(self, password, hashed):
147 def hash_check_with_upgrade(self, password, hashed):
148 """
148 """
149 Returns tuple in which first element is boolean that states that
149 Returns tuple in which first element is boolean that states that
150 given password matches it's hashed version, and the second is new hash
150 given password matches it's hashed version, and the second is new hash
151 of the password, in case this password should be migrated to new
151 of the password, in case this password should be migrated to new
152 cipher.
152 cipher.
153
153
154 This implements special upgrade logic which works like that:
154 This implements special upgrade logic which works like that:
155 - check if the given password == bcrypted hash, if yes then we
155 - check if the given password == bcrypted hash, if yes then we
156 properly used password and it was already in bcrypt. Proceed
156 properly used password and it was already in bcrypt. Proceed
157 without any changes
157 without any changes
158 - if bcrypt hash check is not working try with sha256. If hash compare
158 - if bcrypt hash check is not working try with sha256. If hash compare
159 is ok, it means we using correct but old hashed password. indicate
159 is ok, it means we using correct but old hashed password. indicate
160 hash change and proceed
160 hash change and proceed
161 """
161 """
162
162
163 new_hash = None
163 new_hash = None
164
164
165 # regular pw check
165 # regular pw check
166 password_match_bcrypt = self.hash_check(password, hashed)
166 password_match_bcrypt = self.hash_check(password, hashed)
167
167
168 # now we want to know if the password was maybe from sha256
168 # now we want to know if the password was maybe from sha256
169 # basically calling _RhodeCodeCryptoSha256().hash_check()
169 # basically calling _RhodeCodeCryptoSha256().hash_check()
170 if not password_match_bcrypt:
170 if not password_match_bcrypt:
171 if _RhodeCodeCryptoSha256().hash_check(password, hashed):
171 if _RhodeCodeCryptoSha256().hash_check(password, hashed):
172 new_hash = self.hash_create(password) # make new bcrypt hash
172 new_hash = self.hash_create(password) # make new bcrypt hash
173 password_match_bcrypt = True
173 password_match_bcrypt = True
174
174
175 return password_match_bcrypt, new_hash
175 return password_match_bcrypt, new_hash
176
176
177 def hash_check(self, password, hashed):
177 def hash_check(self, password, hashed):
178 """
178 """
179 Checks matching password with it's hashed value.
179 Checks matching password with it's hashed value.
180
180
181 :param password: password
181 :param password: password
182 :param hashed: password in hashed form
182 :param hashed: password in hashed form
183 """
183 """
184 self._assert_bytes(password)
184 self._assert_bytes(password)
185 try:
185 try:
186 return bcrypt.hashpw(password, hashed) == hashed
186 return bcrypt.hashpw(password, hashed) == hashed
187 except ValueError as e:
187 except ValueError as e:
188 # we're having a invalid salt here probably, we should not crash
188 # we're having a invalid salt here probably, we should not crash
189 # just return with False as it would be a wrong password.
189 # just return with False as it would be a wrong password.
190 log.debug('Failed to check password hash using bcrypt %s',
190 log.debug('Failed to check password hash using bcrypt %s',
191 safe_str(e))
191 safe_str(e))
192
192
193 return False
193 return False
194
194
195
195
196 class _RhodeCodeCryptoSha256(_RhodeCodeCryptoBase):
196 class _RhodeCodeCryptoSha256(_RhodeCodeCryptoBase):
197 ENC_PREF = '_'
197 ENC_PREF = '_'
198
198
199 def hash_create(self, str_):
199 def hash_create(self, str_):
200 self._assert_bytes(str_)
200 self._assert_bytes(str_)
201 return hashlib.sha256(str_).hexdigest()
201 return hashlib.sha256(str_).hexdigest()
202
202
203 def hash_check(self, password, hashed):
203 def hash_check(self, password, hashed):
204 """
204 """
205 Checks matching password with it's hashed value.
205 Checks matching password with it's hashed value.
206
206
207 :param password: password
207 :param password: password
208 :param hashed: password in hashed form
208 :param hashed: password in hashed form
209 """
209 """
210 self._assert_bytes(password)
210 self._assert_bytes(password)
211 return hashlib.sha256(password).hexdigest() == hashed
211 return hashlib.sha256(password).hexdigest() == hashed
212
212
213
213
214 class _RhodeCodeCryptoMd5(_RhodeCodeCryptoBase):
214 class _RhodeCodeCryptoMd5(_RhodeCodeCryptoBase):
215 ENC_PREF = '_'
215 ENC_PREF = '_'
216
216
217 def hash_create(self, str_):
217 def hash_create(self, str_):
218 self._assert_bytes(str_)
218 self._assert_bytes(str_)
219 return hashlib.md5(str_).hexdigest()
219 return hashlib.md5(str_).hexdigest()
220
220
221 def hash_check(self, password, hashed):
221 def hash_check(self, password, hashed):
222 """
222 """
223 Checks matching password with it's hashed value.
223 Checks matching password with it's hashed value.
224
224
225 :param password: password
225 :param password: password
226 :param hashed: password in hashed form
226 :param hashed: password in hashed form
227 """
227 """
228 self._assert_bytes(password)
228 self._assert_bytes(password)
229 return hashlib.md5(password).hexdigest() == hashed
229 return hashlib.md5(password).hexdigest() == hashed
230
230
231
231
232 def crypto_backend():
232 def crypto_backend():
233 """
233 """
234 Return the matching crypto backend.
234 Return the matching crypto backend.
235
235
236 Selection is based on if we run tests or not, we pick md5 backend to run
236 Selection is based on if we run tests or not, we pick md5 backend to run
237 tests faster since BCRYPT is expensive to calculate
237 tests faster since BCRYPT is expensive to calculate
238 """
238 """
239 if rhodecode.is_test:
239 if rhodecode.is_test:
240 RhodeCodeCrypto = _RhodeCodeCryptoMd5()
240 RhodeCodeCrypto = _RhodeCodeCryptoMd5()
241 else:
241 else:
242 RhodeCodeCrypto = _RhodeCodeCryptoBCrypt()
242 RhodeCodeCrypto = _RhodeCodeCryptoBCrypt()
243
243
244 return RhodeCodeCrypto
244 return RhodeCodeCrypto
245
245
246
246
247 def get_crypt_password(password):
247 def get_crypt_password(password):
248 """
248 """
249 Create the hash of `password` with the active crypto backend.
249 Create the hash of `password` with the active crypto backend.
250
250
251 :param password: The cleartext password.
251 :param password: The cleartext password.
252 :type password: unicode
252 :type password: unicode
253 """
253 """
254 password = safe_str(password)
254 password = safe_str(password)
255 return crypto_backend().hash_create(password)
255 return crypto_backend().hash_create(password)
256
256
257
257
258 def check_password(password, hashed):
258 def check_password(password, hashed):
259 """
259 """
260 Check if the value in `password` matches the hash in `hashed`.
260 Check if the value in `password` matches the hash in `hashed`.
261
261
262 :param password: The cleartext password.
262 :param password: The cleartext password.
263 :type password: unicode
263 :type password: unicode
264
264
265 :param hashed: The expected hashed version of the password.
265 :param hashed: The expected hashed version of the password.
266 :type hashed: The hash has to be passed in in text representation.
266 :type hashed: The hash has to be passed in in text representation.
267 """
267 """
268 password = safe_str(password)
268 password = safe_str(password)
269 return crypto_backend().hash_check(password, hashed)
269 return crypto_backend().hash_check(password, hashed)
270
270
271
271
272 def generate_auth_token(data, salt=None):
272 def generate_auth_token(data, salt=None):
273 """
273 """
274 Generates API KEY from given string
274 Generates API KEY from given string
275 """
275 """
276
276
277 if salt is None:
277 if salt is None:
278 salt = os.urandom(16)
278 salt = os.urandom(16)
279 return hashlib.sha1(safe_str(data) + salt).hexdigest()
279 return hashlib.sha1(safe_str(data) + salt).hexdigest()
280
280
281
281
282 class CookieStoreWrapper(object):
282 class CookieStoreWrapper(object):
283
283
284 def __init__(self, cookie_store):
284 def __init__(self, cookie_store):
285 self.cookie_store = cookie_store
285 self.cookie_store = cookie_store
286
286
287 def __repr__(self):
287 def __repr__(self):
288 return 'CookieStore<%s>' % (self.cookie_store)
288 return 'CookieStore<%s>' % (self.cookie_store)
289
289
290 def get(self, key, other=None):
290 def get(self, key, other=None):
291 if isinstance(self.cookie_store, dict):
291 if isinstance(self.cookie_store, dict):
292 return self.cookie_store.get(key, other)
292 return self.cookie_store.get(key, other)
293 elif isinstance(self.cookie_store, AuthUser):
293 elif isinstance(self.cookie_store, AuthUser):
294 return self.cookie_store.__dict__.get(key, other)
294 return self.cookie_store.__dict__.get(key, other)
295
295
296
296
297 def _cached_perms_data(user_id, scope, user_is_admin,
297 def _cached_perms_data(user_id, scope, user_is_admin,
298 user_inherit_default_permissions, explicit, algo):
298 user_inherit_default_permissions, explicit, algo):
299
299
300 permissions = PermissionCalculator(
300 permissions = PermissionCalculator(
301 user_id, scope, user_is_admin, user_inherit_default_permissions,
301 user_id, scope, user_is_admin, user_inherit_default_permissions,
302 explicit, algo)
302 explicit, algo)
303 return permissions.calculate()
303 return permissions.calculate()
304
304
305 class PermOrigin:
305
306 class PermOrigin(object):
306 ADMIN = 'superadmin'
307 ADMIN = 'superadmin'
307
308
308 REPO_USER = 'user:%s'
309 REPO_USER = 'user:%s'
309 REPO_USERGROUP = 'usergroup:%s'
310 REPO_USERGROUP = 'usergroup:%s'
310 REPO_OWNER = 'repo.owner'
311 REPO_OWNER = 'repo.owner'
311 REPO_DEFAULT = 'repo.default'
312 REPO_DEFAULT = 'repo.default'
312 REPO_PRIVATE = 'repo.private'
313 REPO_PRIVATE = 'repo.private'
313
314
314 REPOGROUP_USER = 'user:%s'
315 REPOGROUP_USER = 'user:%s'
315 REPOGROUP_USERGROUP = 'usergroup:%s'
316 REPOGROUP_USERGROUP = 'usergroup:%s'
316 REPOGROUP_OWNER = 'group.owner'
317 REPOGROUP_OWNER = 'group.owner'
317 REPOGROUP_DEFAULT = 'group.default'
318 REPOGROUP_DEFAULT = 'group.default'
318
319
319 USERGROUP_USER = 'user:%s'
320 USERGROUP_USER = 'user:%s'
320 USERGROUP_USERGROUP = 'usergroup:%s'
321 USERGROUP_USERGROUP = 'usergroup:%s'
321 USERGROUP_OWNER = 'usergroup.owner'
322 USERGROUP_OWNER = 'usergroup.owner'
322 USERGROUP_DEFAULT = 'usergroup.default'
323 USERGROUP_DEFAULT = 'usergroup.default'
323
324
324
325
325 class PermOriginDict(dict):
326 class PermOriginDict(dict):
326 """
327 """
327 A special dict used for tracking permissions along with their origins.
328 A special dict used for tracking permissions along with their origins.
328
329
329 `__setitem__` has been overridden to expect a tuple(perm, origin)
330 `__setitem__` has been overridden to expect a tuple(perm, origin)
330 `__getitem__` will return only the perm
331 `__getitem__` will return only the perm
331 `.perm_origin_stack` will return the stack of (perm, origin) set per key
332 `.perm_origin_stack` will return the stack of (perm, origin) set per key
332
333
333 >>> perms = PermOriginDict()
334 >>> perms = PermOriginDict()
334 >>> perms['resource'] = 'read', 'default'
335 >>> perms['resource'] = 'read', 'default'
335 >>> perms['resource']
336 >>> perms['resource']
336 'read'
337 'read'
337 >>> perms['resource'] = 'write', 'admin'
338 >>> perms['resource'] = 'write', 'admin'
338 >>> perms['resource']
339 >>> perms['resource']
339 'write'
340 'write'
340 >>> perms.perm_origin_stack
341 >>> perms.perm_origin_stack
341 {'resource': [('read', 'default'), ('write', 'admin')]}
342 {'resource': [('read', 'default'), ('write', 'admin')]}
342 """
343 """
343
344
344
345 def __init__(self, *args, **kw):
345 def __init__(self, *args, **kw):
346 dict.__init__(self, *args, **kw)
346 dict.__init__(self, *args, **kw)
347 self.perm_origin_stack = {}
347 self.perm_origin_stack = {}
348
348
349 def __setitem__(self, key, (perm, origin)):
349 def __setitem__(self, key, (perm, origin)):
350 self.perm_origin_stack.setdefault(key, []).append((perm, origin))
350 self.perm_origin_stack.setdefault(key, []).append((perm, origin))
351 dict.__setitem__(self, key, perm)
351 dict.__setitem__(self, key, perm)
352
352
353
353
354 class PermissionCalculator(object):
354 class PermissionCalculator(object):
355
355
356 def __init__(
356 def __init__(
357 self, user_id, scope, user_is_admin,
357 self, user_id, scope, user_is_admin,
358 user_inherit_default_permissions, explicit, algo):
358 user_inherit_default_permissions, explicit, algo):
359 self.user_id = user_id
359 self.user_id = user_id
360 self.user_is_admin = user_is_admin
360 self.user_is_admin = user_is_admin
361 self.inherit_default_permissions = user_inherit_default_permissions
361 self.inherit_default_permissions = user_inherit_default_permissions
362 self.explicit = explicit
362 self.explicit = explicit
363 self.algo = algo
363 self.algo = algo
364
364
365 scope = scope or {}
365 scope = scope or {}
366 self.scope_repo_id = scope.get('repo_id')
366 self.scope_repo_id = scope.get('repo_id')
367 self.scope_repo_group_id = scope.get('repo_group_id')
367 self.scope_repo_group_id = scope.get('repo_group_id')
368 self.scope_user_group_id = scope.get('user_group_id')
368 self.scope_user_group_id = scope.get('user_group_id')
369
369
370 self.default_user_id = User.get_default_user(cache=True).user_id
370 self.default_user_id = User.get_default_user(cache=True).user_id
371
371
372 self.permissions_repositories = PermOriginDict()
372 self.permissions_repositories = PermOriginDict()
373 self.permissions_repository_groups = PermOriginDict()
373 self.permissions_repository_groups = PermOriginDict()
374 self.permissions_user_groups = PermOriginDict()
374 self.permissions_user_groups = PermOriginDict()
375 self.permissions_global = set()
375 self.permissions_global = set()
376
376
377 self.default_repo_perms = Permission.get_default_repo_perms(
377 self.default_repo_perms = Permission.get_default_repo_perms(
378 self.default_user_id, self.scope_repo_id)
378 self.default_user_id, self.scope_repo_id)
379 self.default_repo_groups_perms = Permission.get_default_group_perms(
379 self.default_repo_groups_perms = Permission.get_default_group_perms(
380 self.default_user_id, self.scope_repo_group_id)
380 self.default_user_id, self.scope_repo_group_id)
381 self.default_user_group_perms = \
381 self.default_user_group_perms = \
382 Permission.get_default_user_group_perms(
382 Permission.get_default_user_group_perms(
383 self.default_user_id, self.scope_user_group_id)
383 self.default_user_id, self.scope_user_group_id)
384
384
385 def calculate(self):
385 def calculate(self):
386 if self.user_is_admin:
386 if self.user_is_admin:
387 return self._admin_permissions()
387 return self._admin_permissions()
388
388
389 self._calculate_global_default_permissions()
389 self._calculate_global_default_permissions()
390 self._calculate_global_permissions()
390 self._calculate_global_permissions()
391 self._calculate_default_permissions()
391 self._calculate_default_permissions()
392 self._calculate_repository_permissions()
392 self._calculate_repository_permissions()
393 self._calculate_repository_group_permissions()
393 self._calculate_repository_group_permissions()
394 self._calculate_user_group_permissions()
394 self._calculate_user_group_permissions()
395 return self._permission_structure()
395 return self._permission_structure()
396
396
397 def _admin_permissions(self):
397 def _admin_permissions(self):
398 """
398 """
399 admin user have all default rights for repositories
399 admin user have all default rights for repositories
400 and groups set to admin
400 and groups set to admin
401 """
401 """
402 self.permissions_global.add('hg.admin')
402 self.permissions_global.add('hg.admin')
403 self.permissions_global.add('hg.create.write_on_repogroup.true')
403 self.permissions_global.add('hg.create.write_on_repogroup.true')
404
404
405 # repositories
405 # repositories
406 for perm in self.default_repo_perms:
406 for perm in self.default_repo_perms:
407 r_k = perm.UserRepoToPerm.repository.repo_name
407 r_k = perm.UserRepoToPerm.repository.repo_name
408 p = 'repository.admin'
408 p = 'repository.admin'
409 self.permissions_repositories[r_k] = p, PermOrigin.ADMIN
409 self.permissions_repositories[r_k] = p, PermOrigin.ADMIN
410
410
411 # repository groups
411 # repository groups
412 for perm in self.default_repo_groups_perms:
412 for perm in self.default_repo_groups_perms:
413 rg_k = perm.UserRepoGroupToPerm.group.group_name
413 rg_k = perm.UserRepoGroupToPerm.group.group_name
414 p = 'group.admin'
414 p = 'group.admin'
415 self.permissions_repository_groups[rg_k] = p, PermOrigin.ADMIN
415 self.permissions_repository_groups[rg_k] = p, PermOrigin.ADMIN
416
416
417 # user groups
417 # user groups
418 for perm in self.default_user_group_perms:
418 for perm in self.default_user_group_perms:
419 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
419 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
420 p = 'usergroup.admin'
420 p = 'usergroup.admin'
421 self.permissions_user_groups[u_k] = p, PermOrigin.ADMIN
421 self.permissions_user_groups[u_k] = p, PermOrigin.ADMIN
422
422
423 return self._permission_structure()
423 return self._permission_structure()
424
424
425 def _calculate_global_default_permissions(self):
425 def _calculate_global_default_permissions(self):
426 """
426 """
427 global permissions taken from the default user
427 global permissions taken from the default user
428 """
428 """
429 default_global_perms = UserToPerm.query()\
429 default_global_perms = UserToPerm.query()\
430 .filter(UserToPerm.user_id == self.default_user_id)\
430 .filter(UserToPerm.user_id == self.default_user_id)\
431 .options(joinedload(UserToPerm.permission))
431 .options(joinedload(UserToPerm.permission))
432
432
433 for perm in default_global_perms:
433 for perm in default_global_perms:
434 self.permissions_global.add(perm.permission.permission_name)
434 self.permissions_global.add(perm.permission.permission_name)
435
435
436 def _calculate_global_permissions(self):
436 def _calculate_global_permissions(self):
437 """
437 """
438 Set global system permissions with user permissions or permissions
438 Set global system permissions with user permissions or permissions
439 taken from the user groups of the current user.
439 taken from the user groups of the current user.
440
440
441 The permissions include repo creating, repo group creating, forking
441 The permissions include repo creating, repo group creating, forking
442 etc.
442 etc.
443 """
443 """
444
444
445 # now we read the defined permissions and overwrite what we have set
445 # now we read the defined permissions and overwrite what we have set
446 # before those can be configured from groups or users explicitly.
446 # before those can be configured from groups or users explicitly.
447
447
448 # TODO: johbo: This seems to be out of sync, find out the reason
448 # TODO: johbo: This seems to be out of sync, find out the reason
449 # for the comment below and update it.
449 # for the comment below and update it.
450
450
451 # In case we want to extend this list we should be always in sync with
451 # In case we want to extend this list we should be always in sync with
452 # User.DEFAULT_USER_PERMISSIONS definitions
452 # User.DEFAULT_USER_PERMISSIONS definitions
453 _configurable = frozenset([
453 _configurable = frozenset([
454 'hg.fork.none', 'hg.fork.repository',
454 'hg.fork.none', 'hg.fork.repository',
455 'hg.create.none', 'hg.create.repository',
455 'hg.create.none', 'hg.create.repository',
456 'hg.usergroup.create.false', 'hg.usergroup.create.true',
456 'hg.usergroup.create.false', 'hg.usergroup.create.true',
457 'hg.repogroup.create.false', 'hg.repogroup.create.true',
457 'hg.repogroup.create.false', 'hg.repogroup.create.true',
458 'hg.create.write_on_repogroup.false',
458 'hg.create.write_on_repogroup.false',
459 'hg.create.write_on_repogroup.true',
459 'hg.create.write_on_repogroup.true',
460 'hg.inherit_default_perms.false', 'hg.inherit_default_perms.true'
460 'hg.inherit_default_perms.false', 'hg.inherit_default_perms.true'
461 ])
461 ])
462
462
463 # USER GROUPS comes first user group global permissions
463 # USER GROUPS comes first user group global permissions
464 user_perms_from_users_groups = Session().query(UserGroupToPerm)\
464 user_perms_from_users_groups = Session().query(UserGroupToPerm)\
465 .options(joinedload(UserGroupToPerm.permission))\
465 .options(joinedload(UserGroupToPerm.permission))\
466 .join((UserGroupMember, UserGroupToPerm.users_group_id ==
466 .join((UserGroupMember, UserGroupToPerm.users_group_id ==
467 UserGroupMember.users_group_id))\
467 UserGroupMember.users_group_id))\
468 .filter(UserGroupMember.user_id == self.user_id)\
468 .filter(UserGroupMember.user_id == self.user_id)\
469 .order_by(UserGroupToPerm.users_group_id)\
469 .order_by(UserGroupToPerm.users_group_id)\
470 .all()
470 .all()
471
471
472 # need to group here by groups since user can be in more than
472 # need to group here by groups since user can be in more than
473 # one group, so we get all groups
473 # one group, so we get all groups
474 _explicit_grouped_perms = [
474 _explicit_grouped_perms = [
475 [x, list(y)] for x, y in
475 [x, list(y)] for x, y in
476 itertools.groupby(user_perms_from_users_groups,
476 itertools.groupby(user_perms_from_users_groups,
477 lambda _x: _x.users_group)]
477 lambda _x: _x.users_group)]
478
478
479 for gr, perms in _explicit_grouped_perms:
479 for gr, perms in _explicit_grouped_perms:
480 # since user can be in multiple groups iterate over them and
480 # since user can be in multiple groups iterate over them and
481 # select the lowest permissions first (more explicit)
481 # select the lowest permissions first (more explicit)
482 # TODO: marcink: do this^^
482 # TODO: marcink: do this^^
483
483
484 # group doesn't inherit default permissions so we actually set them
484 # group doesn't inherit default permissions so we actually set them
485 if not gr.inherit_default_permissions:
485 if not gr.inherit_default_permissions:
486 # NEED TO IGNORE all previously set configurable permissions
486 # NEED TO IGNORE all previously set configurable permissions
487 # and replace them with explicitly set from this user
487 # and replace them with explicitly set from this user
488 # group permissions
488 # group permissions
489 self.permissions_global = self.permissions_global.difference(
489 self.permissions_global = self.permissions_global.difference(
490 _configurable)
490 _configurable)
491 for perm in perms:
491 for perm in perms:
492 self.permissions_global.add(perm.permission.permission_name)
492 self.permissions_global.add(perm.permission.permission_name)
493
493
494 # user explicit global permissions
494 # user explicit global permissions
495 user_perms = Session().query(UserToPerm)\
495 user_perms = Session().query(UserToPerm)\
496 .options(joinedload(UserToPerm.permission))\
496 .options(joinedload(UserToPerm.permission))\
497 .filter(UserToPerm.user_id == self.user_id).all()
497 .filter(UserToPerm.user_id == self.user_id).all()
498
498
499 if not self.inherit_default_permissions:
499 if not self.inherit_default_permissions:
500 # NEED TO IGNORE all configurable permissions and
500 # NEED TO IGNORE all configurable permissions and
501 # replace them with explicitly set from this user permissions
501 # replace them with explicitly set from this user permissions
502 self.permissions_global = self.permissions_global.difference(
502 self.permissions_global = self.permissions_global.difference(
503 _configurable)
503 _configurable)
504 for perm in user_perms:
504 for perm in user_perms:
505 self.permissions_global.add(perm.permission.permission_name)
505 self.permissions_global.add(perm.permission.permission_name)
506
506
507 def _calculate_default_permissions(self):
507 def _calculate_default_permissions(self):
508 """
508 """
509 Set default user permissions for repositories, repository groups
509 Set default user permissions for repositories, repository groups
510 taken from the default user.
510 taken from the default user.
511
511
512 Calculate inheritance of object permissions based on what we have now
512 Calculate inheritance of object permissions based on what we have now
513 in GLOBAL permissions. We check if .false is in GLOBAL since this is
513 in GLOBAL permissions. We check if .false is in GLOBAL since this is
514 explicitly set. Inherit is the opposite of .false being there.
514 explicitly set. Inherit is the opposite of .false being there.
515
515
516 .. note::
516 .. note::
517
517
518 the syntax is little bit odd but what we need to check here is
518 the syntax is little bit odd but what we need to check here is
519 the opposite of .false permission being in the list so even for
519 the opposite of .false permission being in the list so even for
520 inconsistent state when both .true/.false is there
520 inconsistent state when both .true/.false is there
521 .false is more important
521 .false is more important
522
522
523 """
523 """
524 user_inherit_object_permissions = not ('hg.inherit_default_perms.false'
524 user_inherit_object_permissions = not ('hg.inherit_default_perms.false'
525 in self.permissions_global)
525 in self.permissions_global)
526
526
527 # defaults for repositories, taken from `default` user permissions
527 # defaults for repositories, taken from `default` user permissions
528 # on given repo
528 # on given repo
529 for perm in self.default_repo_perms:
529 for perm in self.default_repo_perms:
530 r_k = perm.UserRepoToPerm.repository.repo_name
530 r_k = perm.UserRepoToPerm.repository.repo_name
531 o = PermOrigin.REPO_DEFAULT
531 o = PermOrigin.REPO_DEFAULT
532 if perm.Repository.private and not (
532 if perm.Repository.private and not (
533 perm.Repository.user_id == self.user_id):
533 perm.Repository.user_id == self.user_id):
534 # disable defaults for private repos,
534 # disable defaults for private repos,
535 p = 'repository.none'
535 p = 'repository.none'
536 o = PermOrigin.REPO_PRIVATE
536 o = PermOrigin.REPO_PRIVATE
537 elif perm.Repository.user_id == self.user_id:
537 elif perm.Repository.user_id == self.user_id:
538 # set admin if owner
538 # set admin if owner
539 p = 'repository.admin'
539 p = 'repository.admin'
540 o = PermOrigin.REPO_OWNER
540 o = PermOrigin.REPO_OWNER
541 else:
541 else:
542 p = perm.Permission.permission_name
542 p = perm.Permission.permission_name
543 # if we decide this user isn't inheriting permissions from
543 # if we decide this user isn't inheriting permissions from
544 # default user we set him to .none so only explicit
544 # default user we set him to .none so only explicit
545 # permissions work
545 # permissions work
546 if not user_inherit_object_permissions:
546 if not user_inherit_object_permissions:
547 p = 'repository.none'
547 p = 'repository.none'
548 self.permissions_repositories[r_k] = p, o
548 self.permissions_repositories[r_k] = p, o
549
549
550 # defaults for repository groups taken from `default` user permission
550 # defaults for repository groups taken from `default` user permission
551 # on given group
551 # on given group
552 for perm in self.default_repo_groups_perms:
552 for perm in self.default_repo_groups_perms:
553 rg_k = perm.UserRepoGroupToPerm.group.group_name
553 rg_k = perm.UserRepoGroupToPerm.group.group_name
554 o = PermOrigin.REPOGROUP_DEFAULT
554 o = PermOrigin.REPOGROUP_DEFAULT
555 if perm.RepoGroup.user_id == self.user_id:
555 if perm.RepoGroup.user_id == self.user_id:
556 # set admin if owner
556 # set admin if owner
557 p = 'group.admin'
557 p = 'group.admin'
558 o = PermOrigin.REPOGROUP_OWNER
558 o = PermOrigin.REPOGROUP_OWNER
559 else:
559 else:
560 p = perm.Permission.permission_name
560 p = perm.Permission.permission_name
561
561
562 # if we decide this user isn't inheriting permissions from default
562 # if we decide this user isn't inheriting permissions from default
563 # user we set him to .none so only explicit permissions work
563 # user we set him to .none so only explicit permissions work
564 if not user_inherit_object_permissions:
564 if not user_inherit_object_permissions:
565 p = 'group.none'
565 p = 'group.none'
566 self.permissions_repository_groups[rg_k] = p, o
566 self.permissions_repository_groups[rg_k] = p, o
567
567
568 # defaults for user groups taken from `default` user permission
568 # defaults for user groups taken from `default` user permission
569 # on given user group
569 # on given user group
570 for perm in self.default_user_group_perms:
570 for perm in self.default_user_group_perms:
571 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
571 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
572 o = PermOrigin.USERGROUP_DEFAULT
572 o = PermOrigin.USERGROUP_DEFAULT
573 if perm.UserGroup.user_id == self.user_id:
573 if perm.UserGroup.user_id == self.user_id:
574 # set admin if owner
574 # set admin if owner
575 p = 'usergroup.admin'
575 p = 'usergroup.admin'
576 o = PermOrigin.USERGROUP_OWNER
576 o = PermOrigin.USERGROUP_OWNER
577 else:
577 else:
578 p = perm.Permission.permission_name
578 p = perm.Permission.permission_name
579
579
580 # if we decide this user isn't inheriting permissions from default
580 # if we decide this user isn't inheriting permissions from default
581 # user we set him to .none so only explicit permissions work
581 # user we set him to .none so only explicit permissions work
582 if not user_inherit_object_permissions:
582 if not user_inherit_object_permissions:
583 p = 'usergroup.none'
583 p = 'usergroup.none'
584 self.permissions_user_groups[u_k] = p, o
584 self.permissions_user_groups[u_k] = p, o
585
585
586 def _calculate_repository_permissions(self):
586 def _calculate_repository_permissions(self):
587 """
587 """
588 Repository permissions for the current user.
588 Repository permissions for the current user.
589
589
590 Check if the user is part of user groups for this repository and
590 Check if the user is part of user groups for this repository and
591 fill in the permission from it. `_choose_permission` decides of which
591 fill in the permission from it. `_choose_permission` decides of which
592 permission should be selected based on selected method.
592 permission should be selected based on selected method.
593 """
593 """
594
594
595 # user group for repositories permissions
595 # user group for repositories permissions
596 user_repo_perms_from_user_group = Permission\
596 user_repo_perms_from_user_group = Permission\
597 .get_default_repo_perms_from_user_group(
597 .get_default_repo_perms_from_user_group(
598 self.user_id, self.scope_repo_id)
598 self.user_id, self.scope_repo_id)
599
599
600 multiple_counter = collections.defaultdict(int)
600 multiple_counter = collections.defaultdict(int)
601 for perm in user_repo_perms_from_user_group:
601 for perm in user_repo_perms_from_user_group:
602 r_k = perm.UserGroupRepoToPerm.repository.repo_name
602 r_k = perm.UserGroupRepoToPerm.repository.repo_name
603 ug_k = perm.UserGroupRepoToPerm.users_group.users_group_name
603 ug_k = perm.UserGroupRepoToPerm.users_group.users_group_name
604 multiple_counter[r_k] += 1
604 multiple_counter[r_k] += 1
605 p = perm.Permission.permission_name
605 p = perm.Permission.permission_name
606 o = PermOrigin.REPO_USERGROUP % ug_k
606 o = PermOrigin.REPO_USERGROUP % ug_k
607
607
608 if perm.Repository.user_id == self.user_id:
608 if perm.Repository.user_id == self.user_id:
609 # set admin if owner
609 # set admin if owner
610 p = 'repository.admin'
610 p = 'repository.admin'
611 o = PermOrigin.REPO_OWNER
611 o = PermOrigin.REPO_OWNER
612 else:
612 else:
613 if multiple_counter[r_k] > 1:
613 if multiple_counter[r_k] > 1:
614 cur_perm = self.permissions_repositories[r_k]
614 cur_perm = self.permissions_repositories[r_k]
615 p = self._choose_permission(p, cur_perm)
615 p = self._choose_permission(p, cur_perm)
616 self.permissions_repositories[r_k] = p, o
616 self.permissions_repositories[r_k] = p, o
617
617
618 # user explicit permissions for repositories, overrides any specified
618 # user explicit permissions for repositories, overrides any specified
619 # by the group permission
619 # by the group permission
620 user_repo_perms = Permission.get_default_repo_perms(
620 user_repo_perms = Permission.get_default_repo_perms(
621 self.user_id, self.scope_repo_id)
621 self.user_id, self.scope_repo_id)
622 for perm in user_repo_perms:
622 for perm in user_repo_perms:
623 r_k = perm.UserRepoToPerm.repository.repo_name
623 r_k = perm.UserRepoToPerm.repository.repo_name
624 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
624 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
625 # set admin if owner
625 # set admin if owner
626 if perm.Repository.user_id == self.user_id:
626 if perm.Repository.user_id == self.user_id:
627 p = 'repository.admin'
627 p = 'repository.admin'
628 o = PermOrigin.REPO_OWNER
628 o = PermOrigin.REPO_OWNER
629 else:
629 else:
630 p = perm.Permission.permission_name
630 p = perm.Permission.permission_name
631 if not self.explicit:
631 if not self.explicit:
632 cur_perm = self.permissions_repositories.get(
632 cur_perm = self.permissions_repositories.get(
633 r_k, 'repository.none')
633 r_k, 'repository.none')
634 p = self._choose_permission(p, cur_perm)
634 p = self._choose_permission(p, cur_perm)
635 self.permissions_repositories[r_k] = p, o
635 self.permissions_repositories[r_k] = p, o
636
636
637 def _calculate_repository_group_permissions(self):
637 def _calculate_repository_group_permissions(self):
638 """
638 """
639 Repository group permissions for the current user.
639 Repository group permissions for the current user.
640
640
641 Check if the user is part of user groups for repository groups and
641 Check if the user is part of user groups for repository groups and
642 fill in the permissions from it. `_choose_permmission` decides of which
642 fill in the permissions from it. `_choose_permmission` decides of which
643 permission should be selected based on selected method.
643 permission should be selected based on selected method.
644 """
644 """
645 # user group for repo groups permissions
645 # user group for repo groups permissions
646 user_repo_group_perms_from_user_group = Permission\
646 user_repo_group_perms_from_user_group = Permission\
647 .get_default_group_perms_from_user_group(
647 .get_default_group_perms_from_user_group(
648 self.user_id, self.scope_repo_group_id)
648 self.user_id, self.scope_repo_group_id)
649
649
650 multiple_counter = collections.defaultdict(int)
650 multiple_counter = collections.defaultdict(int)
651 for perm in user_repo_group_perms_from_user_group:
651 for perm in user_repo_group_perms_from_user_group:
652 g_k = perm.UserGroupRepoGroupToPerm.group.group_name
652 g_k = perm.UserGroupRepoGroupToPerm.group.group_name
653 ug_k = perm.UserGroupRepoGroupToPerm.users_group.users_group_name
653 ug_k = perm.UserGroupRepoGroupToPerm.users_group.users_group_name
654 o = PermOrigin.REPOGROUP_USERGROUP % ug_k
654 o = PermOrigin.REPOGROUP_USERGROUP % ug_k
655 multiple_counter[g_k] += 1
655 multiple_counter[g_k] += 1
656 p = perm.Permission.permission_name
656 p = perm.Permission.permission_name
657 if perm.RepoGroup.user_id == self.user_id:
657 if perm.RepoGroup.user_id == self.user_id:
658 # set admin if owner, even for member of other user group
658 # set admin if owner, even for member of other user group
659 p = 'group.admin'
659 p = 'group.admin'
660 o = PermOrigin.REPOGROUP_OWNER
660 o = PermOrigin.REPOGROUP_OWNER
661 else:
661 else:
662 if multiple_counter[g_k] > 1:
662 if multiple_counter[g_k] > 1:
663 cur_perm = self.permissions_repository_groups[g_k]
663 cur_perm = self.permissions_repository_groups[g_k]
664 p = self._choose_permission(p, cur_perm)
664 p = self._choose_permission(p, cur_perm)
665 self.permissions_repository_groups[g_k] = p, o
665 self.permissions_repository_groups[g_k] = p, o
666
666
667 # user explicit permissions for repository groups
667 # user explicit permissions for repository groups
668 user_repo_groups_perms = Permission.get_default_group_perms(
668 user_repo_groups_perms = Permission.get_default_group_perms(
669 self.user_id, self.scope_repo_group_id)
669 self.user_id, self.scope_repo_group_id)
670 for perm in user_repo_groups_perms:
670 for perm in user_repo_groups_perms:
671 rg_k = perm.UserRepoGroupToPerm.group.group_name
671 rg_k = perm.UserRepoGroupToPerm.group.group_name
672 u_k = perm.UserRepoGroupToPerm.user.username
672 u_k = perm.UserRepoGroupToPerm.user.username
673 o = PermOrigin.REPOGROUP_USER % u_k
673 o = PermOrigin.REPOGROUP_USER % u_k
674
674
675 if perm.RepoGroup.user_id == self.user_id:
675 if perm.RepoGroup.user_id == self.user_id:
676 # set admin if owner
676 # set admin if owner
677 p = 'group.admin'
677 p = 'group.admin'
678 o = PermOrigin.REPOGROUP_OWNER
678 o = PermOrigin.REPOGROUP_OWNER
679 else:
679 else:
680 p = perm.Permission.permission_name
680 p = perm.Permission.permission_name
681 if not self.explicit:
681 if not self.explicit:
682 cur_perm = self.permissions_repository_groups.get(
682 cur_perm = self.permissions_repository_groups.get(
683 rg_k, 'group.none')
683 rg_k, 'group.none')
684 p = self._choose_permission(p, cur_perm)
684 p = self._choose_permission(p, cur_perm)
685 self.permissions_repository_groups[rg_k] = p, o
685 self.permissions_repository_groups[rg_k] = p, o
686
686
687 def _calculate_user_group_permissions(self):
687 def _calculate_user_group_permissions(self):
688 """
688 """
689 User group permissions for the current user.
689 User group permissions for the current user.
690 """
690 """
691 # user group for user group permissions
691 # user group for user group permissions
692 user_group_from_user_group = Permission\
692 user_group_from_user_group = Permission\
693 .get_default_user_group_perms_from_user_group(
693 .get_default_user_group_perms_from_user_group(
694 self.user_id, self.scope_user_group_id)
694 self.user_id, self.scope_user_group_id)
695
695
696 multiple_counter = collections.defaultdict(int)
696 multiple_counter = collections.defaultdict(int)
697 for perm in user_group_from_user_group:
697 for perm in user_group_from_user_group:
698 g_k = perm.UserGroupUserGroupToPerm\
698 g_k = perm.UserGroupUserGroupToPerm\
699 .target_user_group.users_group_name
699 .target_user_group.users_group_name
700 u_k = perm.UserGroupUserGroupToPerm\
700 u_k = perm.UserGroupUserGroupToPerm\
701 .user_group.users_group_name
701 .user_group.users_group_name
702 o = PermOrigin.USERGROUP_USERGROUP % u_k
702 o = PermOrigin.USERGROUP_USERGROUP % u_k
703 multiple_counter[g_k] += 1
703 multiple_counter[g_k] += 1
704 p = perm.Permission.permission_name
704 p = perm.Permission.permission_name
705
705
706 if perm.UserGroup.user_id == self.user_id:
706 if perm.UserGroup.user_id == self.user_id:
707 # set admin if owner, even for member of other user group
707 # set admin if owner, even for member of other user group
708 p = 'usergroup.admin'
708 p = 'usergroup.admin'
709 o = PermOrigin.USERGROUP_OWNER
709 o = PermOrigin.USERGROUP_OWNER
710 else:
710 else:
711 if multiple_counter[g_k] > 1:
711 if multiple_counter[g_k] > 1:
712 cur_perm = self.permissions_user_groups[g_k]
712 cur_perm = self.permissions_user_groups[g_k]
713 p = self._choose_permission(p, cur_perm)
713 p = self._choose_permission(p, cur_perm)
714 self.permissions_user_groups[g_k] = p, o
714 self.permissions_user_groups[g_k] = p, o
715
715
716 # user explicit permission for user groups
716 # user explicit permission for user groups
717 user_user_groups_perms = Permission.get_default_user_group_perms(
717 user_user_groups_perms = Permission.get_default_user_group_perms(
718 self.user_id, self.scope_user_group_id)
718 self.user_id, self.scope_user_group_id)
719 for perm in user_user_groups_perms:
719 for perm in user_user_groups_perms:
720 ug_k = perm.UserUserGroupToPerm.user_group.users_group_name
720 ug_k = perm.UserUserGroupToPerm.user_group.users_group_name
721 u_k = perm.UserUserGroupToPerm.user.username
721 u_k = perm.UserUserGroupToPerm.user.username
722 o = PermOrigin.USERGROUP_USER % u_k
722 o = PermOrigin.USERGROUP_USER % u_k
723
723
724 if perm.UserGroup.user_id == self.user_id:
724 if perm.UserGroup.user_id == self.user_id:
725 # set admin if owner
725 # set admin if owner
726 p = 'usergroup.admin'
726 p = 'usergroup.admin'
727 o = PermOrigin.USERGROUP_OWNER
727 o = PermOrigin.USERGROUP_OWNER
728 else:
728 else:
729 p = perm.Permission.permission_name
729 p = perm.Permission.permission_name
730 if not self.explicit:
730 if not self.explicit:
731 cur_perm = self.permissions_user_groups.get(
731 cur_perm = self.permissions_user_groups.get(
732 ug_k, 'usergroup.none')
732 ug_k, 'usergroup.none')
733 p = self._choose_permission(p, cur_perm)
733 p = self._choose_permission(p, cur_perm)
734 self.permissions_user_groups[ug_k] = p, o
734 self.permissions_user_groups[ug_k] = p, o
735
735
736 def _choose_permission(self, new_perm, cur_perm):
736 def _choose_permission(self, new_perm, cur_perm):
737 new_perm_val = Permission.PERM_WEIGHTS[new_perm]
737 new_perm_val = Permission.PERM_WEIGHTS[new_perm]
738 cur_perm_val = Permission.PERM_WEIGHTS[cur_perm]
738 cur_perm_val = Permission.PERM_WEIGHTS[cur_perm]
739 if self.algo == 'higherwin':
739 if self.algo == 'higherwin':
740 if new_perm_val > cur_perm_val:
740 if new_perm_val > cur_perm_val:
741 return new_perm
741 return new_perm
742 return cur_perm
742 return cur_perm
743 elif self.algo == 'lowerwin':
743 elif self.algo == 'lowerwin':
744 if new_perm_val < cur_perm_val:
744 if new_perm_val < cur_perm_val:
745 return new_perm
745 return new_perm
746 return cur_perm
746 return cur_perm
747
747
748 def _permission_structure(self):
748 def _permission_structure(self):
749 return {
749 return {
750 'global': self.permissions_global,
750 'global': self.permissions_global,
751 'repositories': self.permissions_repositories,
751 'repositories': self.permissions_repositories,
752 'repositories_groups': self.permissions_repository_groups,
752 'repositories_groups': self.permissions_repository_groups,
753 'user_groups': self.permissions_user_groups,
753 'user_groups': self.permissions_user_groups,
754 }
754 }
755
755
756
756
757 def allowed_auth_token_access(controller_name, whitelist=None, auth_token=None):
757 def allowed_auth_token_access(controller_name, whitelist=None, auth_token=None):
758 """
758 """
759 Check if given controller_name is in whitelist of auth token access
759 Check if given controller_name is in whitelist of auth token access
760 """
760 """
761 if not whitelist:
761 if not whitelist:
762 from rhodecode import CONFIG
762 from rhodecode import CONFIG
763 whitelist = aslist(
763 whitelist = aslist(
764 CONFIG.get('api_access_controllers_whitelist'), sep=',')
764 CONFIG.get('api_access_controllers_whitelist'), sep=',')
765 log.debug(
765 log.debug(
766 'Allowed controllers for AUTH TOKEN access: %s' % (whitelist,))
766 'Allowed controllers for AUTH TOKEN access: %s' % (whitelist,))
767
767
768 auth_token_access_valid = False
768 auth_token_access_valid = False
769 for entry in whitelist:
769 for entry in whitelist:
770 if fnmatch.fnmatch(controller_name, entry):
770 if fnmatch.fnmatch(controller_name, entry):
771 auth_token_access_valid = True
771 auth_token_access_valid = True
772 break
772 break
773
773
774 if auth_token_access_valid:
774 if auth_token_access_valid:
775 log.debug('controller:%s matches entry in whitelist'
775 log.debug('controller:%s matches entry in whitelist'
776 % (controller_name,))
776 % (controller_name,))
777 else:
777 else:
778 msg = ('controller: %s does *NOT* match any entry in whitelist'
778 msg = ('controller: %s does *NOT* match any entry in whitelist'
779 % (controller_name,))
779 % (controller_name,))
780 if auth_token:
780 if auth_token:
781 # if we use auth token key and don't have access it's a warning
781 # if we use auth token key and don't have access it's a warning
782 log.warning(msg)
782 log.warning(msg)
783 else:
783 else:
784 log.debug(msg)
784 log.debug(msg)
785
785
786 return auth_token_access_valid
786 return auth_token_access_valid
787
787
788
788
789 class AuthUser(object):
789 class AuthUser(object):
790 """
790 """
791 A simple object that handles all attributes of user in RhodeCode
791 A simple object that handles all attributes of user in RhodeCode
792
792
793 It does lookup based on API key,given user, or user present in session
793 It does lookup based on API key,given user, or user present in session
794 Then it fills all required information for such user. It also checks if
794 Then it fills all required information for such user. It also checks if
795 anonymous access is enabled and if so, it returns default user as logged in
795 anonymous access is enabled and if so, it returns default user as logged in
796 """
796 """
797 GLOBAL_PERMS = [x[0] for x in Permission.PERMS]
797 GLOBAL_PERMS = [x[0] for x in Permission.PERMS]
798
798
799 def __init__(self, user_id=None, api_key=None, username=None, ip_addr=None):
799 def __init__(self, user_id=None, api_key=None, username=None, ip_addr=None):
800
800
801 self.user_id = user_id
801 self.user_id = user_id
802 self._api_key = api_key
802 self._api_key = api_key
803
803
804 self.api_key = None
804 self.api_key = None
805 self.feed_token = ''
805 self.feed_token = ''
806 self.username = username
806 self.username = username
807 self.ip_addr = ip_addr
807 self.ip_addr = ip_addr
808 self.name = ''
808 self.name = ''
809 self.lastname = ''
809 self.lastname = ''
810 self.email = ''
810 self.email = ''
811 self.is_authenticated = False
811 self.is_authenticated = False
812 self.admin = False
812 self.admin = False
813 self.inherit_default_permissions = False
813 self.inherit_default_permissions = False
814 self.password = ''
814 self.password = ''
815
815
816 self.anonymous_user = None # propagated on propagate_data
816 self.anonymous_user = None # propagated on propagate_data
817 self.propagate_data()
817 self.propagate_data()
818 self._instance = None
818 self._instance = None
819 self._permissions_scoped_cache = {} # used to bind scoped calculation
819 self._permissions_scoped_cache = {} # used to bind scoped calculation
820
820
821 @LazyProperty
821 @LazyProperty
822 def permissions(self):
822 def permissions(self):
823 return self.get_perms(user=self, cache=False)
823 return self.get_perms(user=self, cache=False)
824
824
825 def permissions_with_scope(self, scope):
825 def permissions_with_scope(self, scope):
826 """
826 """
827 Call the get_perms function with scoped data. The scope in that function
827 Call the get_perms function with scoped data. The scope in that function
828 narrows the SQL calls to the given ID of objects resulting in fetching
828 narrows the SQL calls to the given ID of objects resulting in fetching
829 Just particular permission we want to obtain. If scope is an empty dict
829 Just particular permission we want to obtain. If scope is an empty dict
830 then it basically narrows the scope to GLOBAL permissions only.
830 then it basically narrows the scope to GLOBAL permissions only.
831
831
832 :param scope: dict
832 :param scope: dict
833 """
833 """
834 if 'repo_name' in scope:
834 if 'repo_name' in scope:
835 obj = Repository.get_by_repo_name(scope['repo_name'])
835 obj = Repository.get_by_repo_name(scope['repo_name'])
836 if obj:
836 if obj:
837 scope['repo_id'] = obj.repo_id
837 scope['repo_id'] = obj.repo_id
838 _scope = {
838 _scope = {
839 'repo_id': -1,
839 'repo_id': -1,
840 'user_group_id': -1,
840 'user_group_id': -1,
841 'repo_group_id': -1,
841 'repo_group_id': -1,
842 }
842 }
843 _scope.update(scope)
843 _scope.update(scope)
844 cache_key = "_".join(map(safe_str, reduce(lambda a, b: a+b,
844 cache_key = "_".join(map(safe_str, reduce(lambda a, b: a+b,
845 _scope.items())))
845 _scope.items())))
846 if cache_key not in self._permissions_scoped_cache:
846 if cache_key not in self._permissions_scoped_cache:
847 # store in cache to mimic how the @LazyProperty works,
847 # store in cache to mimic how the @LazyProperty works,
848 # the difference here is that we use the unique key calculated
848 # the difference here is that we use the unique key calculated
849 # from params and values
849 # from params and values
850 res = self.get_perms(user=self, cache=False, scope=_scope)
850 res = self.get_perms(user=self, cache=False, scope=_scope)
851 self._permissions_scoped_cache[cache_key] = res
851 self._permissions_scoped_cache[cache_key] = res
852 return self._permissions_scoped_cache[cache_key]
852 return self._permissions_scoped_cache[cache_key]
853
853
854 def get_instance(self):
854 def get_instance(self):
855 return User.get(self.user_id)
855 return User.get(self.user_id)
856
856
857 def update_lastactivity(self):
857 def update_lastactivity(self):
858 if self.user_id:
858 if self.user_id:
859 User.get(self.user_id).update_lastactivity()
859 User.get(self.user_id).update_lastactivity()
860
860
861 def propagate_data(self):
861 def propagate_data(self):
862 """
862 """
863 Fills in user data and propagates values to this instance. Maps fetched
863 Fills in user data and propagates values to this instance. Maps fetched
864 user attributes to this class instance attributes
864 user attributes to this class instance attributes
865 """
865 """
866 log.debug('starting data propagation for new potential AuthUser')
866 log.debug('starting data propagation for new potential AuthUser')
867 user_model = UserModel()
867 user_model = UserModel()
868 anon_user = self.anonymous_user = User.get_default_user(cache=True)
868 anon_user = self.anonymous_user = User.get_default_user(cache=True)
869 is_user_loaded = False
869 is_user_loaded = False
870
870
871 # lookup by userid
871 # lookup by userid
872 if self.user_id is not None and self.user_id != anon_user.user_id:
872 if self.user_id is not None and self.user_id != anon_user.user_id:
873 log.debug('Trying Auth User lookup by USER ID: `%s`' % self.user_id)
873 log.debug('Trying Auth User lookup by USER ID: `%s`' % self.user_id)
874 is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
874 is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
875
875
876 # try go get user by api key
876 # try go get user by api key
877 elif self._api_key and self._api_key != anon_user.api_key:
877 elif self._api_key and self._api_key != anon_user.api_key:
878 log.debug('Trying Auth User lookup by API KEY: `%s`' % self._api_key)
878 log.debug('Trying Auth User lookup by API KEY: `%s`' % self._api_key)
879 is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
879 is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
880
880
881 # lookup by username
881 # lookup by username
882 elif self.username:
882 elif self.username:
883 log.debug('Trying Auth User lookup by USER NAME: `%s`' % self.username)
883 log.debug('Trying Auth User lookup by USER NAME: `%s`' % self.username)
884 is_user_loaded = user_model.fill_data(self, username=self.username)
884 is_user_loaded = user_model.fill_data(self, username=self.username)
885 else:
885 else:
886 log.debug('No data in %s that could been used to log in' % self)
886 log.debug('No data in %s that could been used to log in' % self)
887
887
888 if not is_user_loaded:
888 if not is_user_loaded:
889 log.debug('Failed to load user. Fallback to default user')
889 log.debug('Failed to load user. Fallback to default user')
890 # if we cannot authenticate user try anonymous
890 # if we cannot authenticate user try anonymous
891 if anon_user.active:
891 if anon_user.active:
892 user_model.fill_data(self, user_id=anon_user.user_id)
892 user_model.fill_data(self, user_id=anon_user.user_id)
893 # then we set this user is logged in
893 # then we set this user is logged in
894 self.is_authenticated = True
894 self.is_authenticated = True
895 else:
895 else:
896 # in case of disabled anonymous user we reset some of the
896 # in case of disabled anonymous user we reset some of the
897 # parameters so such user is "corrupted", skipping the fill_data
897 # parameters so such user is "corrupted", skipping the fill_data
898 for attr in ['user_id', 'username', 'admin', 'active']:
898 for attr in ['user_id', 'username', 'admin', 'active']:
899 setattr(self, attr, None)
899 setattr(self, attr, None)
900 self.is_authenticated = False
900 self.is_authenticated = False
901
901
902 if not self.username:
902 if not self.username:
903 self.username = 'None'
903 self.username = 'None'
904
904
905 log.debug('Auth User is now %s' % self)
905 log.debug('Auth User is now %s' % self)
906
906
907 def get_perms(self, user, scope=None, explicit=True, algo='higherwin',
907 def get_perms(self, user, scope=None, explicit=True, algo='higherwin',
908 cache=False):
908 cache=False):
909 """
909 """
910 Fills user permission attribute with permissions taken from database
910 Fills user permission attribute with permissions taken from database
911 works for permissions given for repositories, and for permissions that
911 works for permissions given for repositories, and for permissions that
912 are granted to groups
912 are granted to groups
913
913
914 :param user: instance of User object from database
914 :param user: instance of User object from database
915 :param explicit: In case there are permissions both for user and a group
915 :param explicit: In case there are permissions both for user and a group
916 that user is part of, explicit flag will defiine if user will
916 that user is part of, explicit flag will defiine if user will
917 explicitly override permissions from group, if it's False it will
917 explicitly override permissions from group, if it's False it will
918 make decision based on the algo
918 make decision based on the algo
919 :param algo: algorithm to decide what permission should be choose if
919 :param algo: algorithm to decide what permission should be choose if
920 it's multiple defined, eg user in two different groups. It also
920 it's multiple defined, eg user in two different groups. It also
921 decides if explicit flag is turned off how to specify the permission
921 decides if explicit flag is turned off how to specify the permission
922 for case when user is in a group + have defined separate permission
922 for case when user is in a group + have defined separate permission
923 """
923 """
924 user_id = user.user_id
924 user_id = user.user_id
925 user_is_admin = user.is_admin
925 user_is_admin = user.is_admin
926
926
927 # inheritance of global permissions like create repo/fork repo etc
927 # inheritance of global permissions like create repo/fork repo etc
928 user_inherit_default_permissions = user.inherit_default_permissions
928 user_inherit_default_permissions = user.inherit_default_permissions
929
929
930 log.debug('Computing PERMISSION tree for scope %s' % (scope, ))
930 log.debug('Computing PERMISSION tree for scope %s' % (scope, ))
931 compute = caches.conditional_cache(
931 compute = caches.conditional_cache(
932 'short_term', 'cache_desc',
932 'short_term', 'cache_desc',
933 condition=cache, func=_cached_perms_data)
933 condition=cache, func=_cached_perms_data)
934 result = compute(user_id, scope, user_is_admin,
934 result = compute(user_id, scope, user_is_admin,
935 user_inherit_default_permissions, explicit, algo)
935 user_inherit_default_permissions, explicit, algo)
936
936
937 result_repr = []
937 result_repr = []
938 for k in result:
938 for k in result:
939 result_repr.append((k, len(result[k])))
939 result_repr.append((k, len(result[k])))
940
940
941 log.debug('PERMISSION tree computed %s' % (result_repr,))
941 log.debug('PERMISSION tree computed %s' % (result_repr,))
942 return result
942 return result
943
943
944 @property
944 @property
945 def is_default(self):
945 def is_default(self):
946 return self.username == User.DEFAULT_USER
946 return self.username == User.DEFAULT_USER
947
947
948 @property
948 @property
949 def is_admin(self):
949 def is_admin(self):
950 return self.admin
950 return self.admin
951
951
952 @property
952 @property
953 def is_user_object(self):
953 def is_user_object(self):
954 return self.user_id is not None
954 return self.user_id is not None
955
955
956 @property
956 @property
957 def repositories_admin(self):
957 def repositories_admin(self):
958 """
958 """
959 Returns list of repositories you're an admin of
959 Returns list of repositories you're an admin of
960 """
960 """
961 return [
961 return [
962 x[0] for x in self.permissions['repositories'].iteritems()
962 x[0] for x in self.permissions['repositories'].iteritems()
963 if x[1] == 'repository.admin']
963 if x[1] == 'repository.admin']
964
964
965 @property
965 @property
966 def repository_groups_admin(self):
966 def repository_groups_admin(self):
967 """
967 """
968 Returns list of repository groups you're an admin of
968 Returns list of repository groups you're an admin of
969 """
969 """
970 return [
970 return [
971 x[0] for x in self.permissions['repositories_groups'].iteritems()
971 x[0] for x in self.permissions['repositories_groups'].iteritems()
972 if x[1] == 'group.admin']
972 if x[1] == 'group.admin']
973
973
974 @property
974 @property
975 def user_groups_admin(self):
975 def user_groups_admin(self):
976 """
976 """
977 Returns list of user groups you're an admin of
977 Returns list of user groups you're an admin of
978 """
978 """
979 return [
979 return [
980 x[0] for x in self.permissions['user_groups'].iteritems()
980 x[0] for x in self.permissions['user_groups'].iteritems()
981 if x[1] == 'usergroup.admin']
981 if x[1] == 'usergroup.admin']
982
982
983 @property
983 @property
984 def ip_allowed(self):
984 def ip_allowed(self):
985 """
985 """
986 Checks if ip_addr used in constructor is allowed from defined list of
986 Checks if ip_addr used in constructor is allowed from defined list of
987 allowed ip_addresses for user
987 allowed ip_addresses for user
988
988
989 :returns: boolean, True if ip is in allowed ip range
989 :returns: boolean, True if ip is in allowed ip range
990 """
990 """
991 # check IP
991 # check IP
992 inherit = self.inherit_default_permissions
992 inherit = self.inherit_default_permissions
993 return AuthUser.check_ip_allowed(self.user_id, self.ip_addr,
993 return AuthUser.check_ip_allowed(self.user_id, self.ip_addr,
994 inherit_from_default=inherit)
994 inherit_from_default=inherit)
995 @property
995 @property
996 def personal_repo_group(self):
996 def personal_repo_group(self):
997 return RepoGroup.get_user_personal_repo_group(self.user_id)
997 return RepoGroup.get_user_personal_repo_group(self.user_id)
998
998
999 @classmethod
999 @classmethod
1000 def check_ip_allowed(cls, user_id, ip_addr, inherit_from_default):
1000 def check_ip_allowed(cls, user_id, ip_addr, inherit_from_default):
1001 allowed_ips = AuthUser.get_allowed_ips(
1001 allowed_ips = AuthUser.get_allowed_ips(
1002 user_id, cache=True, inherit_from_default=inherit_from_default)
1002 user_id, cache=True, inherit_from_default=inherit_from_default)
1003 if check_ip_access(source_ip=ip_addr, allowed_ips=allowed_ips):
1003 if check_ip_access(source_ip=ip_addr, allowed_ips=allowed_ips):
1004 log.debug('IP:%s is in range of %s' % (ip_addr, allowed_ips))
1004 log.debug('IP:%s is in range of %s' % (ip_addr, allowed_ips))
1005 return True
1005 return True
1006 else:
1006 else:
1007 log.info('Access for IP:%s forbidden, '
1007 log.info('Access for IP:%s forbidden, '
1008 'not in %s' % (ip_addr, allowed_ips))
1008 'not in %s' % (ip_addr, allowed_ips))
1009 return False
1009 return False
1010
1010
1011 def __repr__(self):
1011 def __repr__(self):
1012 return "<AuthUser('id:%s[%s] ip:%s auth:%s')>"\
1012 return "<AuthUser('id:%s[%s] ip:%s auth:%s')>"\
1013 % (self.user_id, self.username, self.ip_addr, self.is_authenticated)
1013 % (self.user_id, self.username, self.ip_addr, self.is_authenticated)
1014
1014
1015 def set_authenticated(self, authenticated=True):
1015 def set_authenticated(self, authenticated=True):
1016 if self.user_id != self.anonymous_user.user_id:
1016 if self.user_id != self.anonymous_user.user_id:
1017 self.is_authenticated = authenticated
1017 self.is_authenticated = authenticated
1018
1018
1019 def get_cookie_store(self):
1019 def get_cookie_store(self):
1020 return {
1020 return {
1021 'username': self.username,
1021 'username': self.username,
1022 'password': md5(self.password),
1022 'password': md5(self.password),
1023 'user_id': self.user_id,
1023 'user_id': self.user_id,
1024 'is_authenticated': self.is_authenticated
1024 'is_authenticated': self.is_authenticated
1025 }
1025 }
1026
1026
1027 @classmethod
1027 @classmethod
1028 def from_cookie_store(cls, cookie_store):
1028 def from_cookie_store(cls, cookie_store):
1029 """
1029 """
1030 Creates AuthUser from a cookie store
1030 Creates AuthUser from a cookie store
1031
1031
1032 :param cls:
1032 :param cls:
1033 :param cookie_store:
1033 :param cookie_store:
1034 """
1034 """
1035 user_id = cookie_store.get('user_id')
1035 user_id = cookie_store.get('user_id')
1036 username = cookie_store.get('username')
1036 username = cookie_store.get('username')
1037 api_key = cookie_store.get('api_key')
1037 api_key = cookie_store.get('api_key')
1038 return AuthUser(user_id, api_key, username)
1038 return AuthUser(user_id, api_key, username)
1039
1039
1040 @classmethod
1040 @classmethod
1041 def get_allowed_ips(cls, user_id, cache=False, inherit_from_default=False):
1041 def get_allowed_ips(cls, user_id, cache=False, inherit_from_default=False):
1042 _set = set()
1042 _set = set()
1043
1043
1044 if inherit_from_default:
1044 if inherit_from_default:
1045 default_ips = UserIpMap.query().filter(
1045 default_ips = UserIpMap.query().filter(
1046 UserIpMap.user == User.get_default_user(cache=True))
1046 UserIpMap.user == User.get_default_user(cache=True))
1047 if cache:
1047 if cache:
1048 default_ips = default_ips.options(
1048 default_ips = default_ips.options(
1049 FromCache("sql_cache_short", "get_user_ips_default"))
1049 FromCache("sql_cache_short", "get_user_ips_default"))
1050
1050
1051 # populate from default user
1051 # populate from default user
1052 for ip in default_ips:
1052 for ip in default_ips:
1053 try:
1053 try:
1054 _set.add(ip.ip_addr)
1054 _set.add(ip.ip_addr)
1055 except ObjectDeletedError:
1055 except ObjectDeletedError:
1056 # since we use heavy caching sometimes it happens that
1056 # since we use heavy caching sometimes it happens that
1057 # we get deleted objects here, we just skip them
1057 # we get deleted objects here, we just skip them
1058 pass
1058 pass
1059
1059
1060 user_ips = UserIpMap.query().filter(UserIpMap.user_id == user_id)
1060 user_ips = UserIpMap.query().filter(UserIpMap.user_id == user_id)
1061 if cache:
1061 if cache:
1062 user_ips = user_ips.options(
1062 user_ips = user_ips.options(
1063 FromCache("sql_cache_short", "get_user_ips_%s" % user_id))
1063 FromCache("sql_cache_short", "get_user_ips_%s" % user_id))
1064
1064
1065 for ip in user_ips:
1065 for ip in user_ips:
1066 try:
1066 try:
1067 _set.add(ip.ip_addr)
1067 _set.add(ip.ip_addr)
1068 except ObjectDeletedError:
1068 except ObjectDeletedError:
1069 # since we use heavy caching sometimes it happens that we get
1069 # since we use heavy caching sometimes it happens that we get
1070 # deleted objects here, we just skip them
1070 # deleted objects here, we just skip them
1071 pass
1071 pass
1072 return _set or set(['0.0.0.0/0', '::/0'])
1072 return _set or set(['0.0.0.0/0', '::/0'])
1073
1073
1074
1074
1075 def set_available_permissions(config):
1075 def set_available_permissions(config):
1076 """
1076 """
1077 This function will propagate pylons globals with all available defined
1077 This function will propagate pylons globals with all available defined
1078 permission given in db. We don't want to check each time from db for new
1078 permission given in db. We don't want to check each time from db for new
1079 permissions since adding a new permission also requires application restart
1079 permissions since adding a new permission also requires application restart
1080 ie. to decorate new views with the newly created permission
1080 ie. to decorate new views with the newly created permission
1081
1081
1082 :param config: current pylons config instance
1082 :param config: current pylons config instance
1083
1083
1084 """
1084 """
1085 log.info('getting information about all available permissions')
1085 log.info('getting information about all available permissions')
1086 try:
1086 try:
1087 sa = meta.Session
1087 sa = meta.Session
1088 all_perms = sa.query(Permission).all()
1088 all_perms = sa.query(Permission).all()
1089 config['available_permissions'] = [x.permission_name for x in all_perms]
1089 config['available_permissions'] = [x.permission_name for x in all_perms]
1090 except Exception:
1090 except Exception:
1091 log.error(traceback.format_exc())
1091 log.error(traceback.format_exc())
1092 finally:
1092 finally:
1093 meta.Session.remove()
1093 meta.Session.remove()
1094
1094
1095
1095
1096 def get_csrf_token(session=None, force_new=False, save_if_missing=True):
1096 def get_csrf_token(session=None, force_new=False, save_if_missing=True):
1097 """
1097 """
1098 Return the current authentication token, creating one if one doesn't
1098 Return the current authentication token, creating one if one doesn't
1099 already exist and the save_if_missing flag is present.
1099 already exist and the save_if_missing flag is present.
1100
1100
1101 :param session: pass in the pylons session, else we use the global ones
1101 :param session: pass in the pylons session, else we use the global ones
1102 :param force_new: force to re-generate the token and store it in session
1102 :param force_new: force to re-generate the token and store it in session
1103 :param save_if_missing: save the newly generated token if it's missing in
1103 :param save_if_missing: save the newly generated token if it's missing in
1104 session
1104 session
1105 """
1105 """
1106 if not session:
1106 if not session:
1107 from pylons import session
1107 from pylons import session
1108
1108
1109 if (csrf_token_key not in session and save_if_missing) or force_new:
1109 if (csrf_token_key not in session and save_if_missing) or force_new:
1110 token = hashlib.sha1(str(random.getrandbits(128))).hexdigest()
1110 token = hashlib.sha1(str(random.getrandbits(128))).hexdigest()
1111 session[csrf_token_key] = token
1111 session[csrf_token_key] = token
1112 if hasattr(session, 'save'):
1112 if hasattr(session, 'save'):
1113 session.save()
1113 session.save()
1114 return session.get(csrf_token_key)
1114 return session.get(csrf_token_key)
1115
1115
1116
1116
1117 def get_request(perm_class):
1118 from pyramid.threadlocal import get_current_request
1119 pyramid_request = get_current_request()
1120 if not pyramid_request:
1121 # return global request of pylons in case pyramid isn't available
1122 # NOTE(marcink): this should be removed after migration to pyramid
1123 from pylons import request
1124 return request
1125 return pyramid_request
1126
1127
1117 # CHECK DECORATORS
1128 # CHECK DECORATORS
1118 class CSRFRequired(object):
1129 class CSRFRequired(object):
1119 """
1130 """
1120 Decorator for authenticating a form
1131 Decorator for authenticating a form
1121
1132
1122 This decorator uses an authorization token stored in the client's
1133 This decorator uses an authorization token stored in the client's
1123 session for prevention of certain Cross-site request forgery (CSRF)
1134 session for prevention of certain Cross-site request forgery (CSRF)
1124 attacks (See
1135 attacks (See
1125 http://en.wikipedia.org/wiki/Cross-site_request_forgery for more
1136 http://en.wikipedia.org/wiki/Cross-site_request_forgery for more
1126 information).
1137 information).
1127
1138
1128 For use with the ``webhelpers.secure_form`` helper functions.
1139 For use with the ``webhelpers.secure_form`` helper functions.
1129
1140
1130 """
1141 """
1131 def __init__(self, token=csrf_token_key, header='X-CSRF-Token',
1142 def __init__(self, token=csrf_token_key, header='X-CSRF-Token',
1132 except_methods=None):
1143 except_methods=None):
1133 self.token = token
1144 self.token = token
1134 self.header = header
1145 self.header = header
1135 self.except_methods = except_methods or []
1146 self.except_methods = except_methods or []
1136
1147
1137 def __call__(self, func):
1148 def __call__(self, func):
1138 return get_cython_compat_decorator(self.__wrapper, func)
1149 return get_cython_compat_decorator(self.__wrapper, func)
1139
1150
1140 def _get_csrf(self, _request):
1151 def _get_csrf(self, _request):
1141 return _request.POST.get(self.token, _request.headers.get(self.header))
1152 return _request.POST.get(self.token, _request.headers.get(self.header))
1142
1153
1143 def check_csrf(self, _request, cur_token):
1154 def check_csrf(self, _request, cur_token):
1144 supplied_token = self._get_csrf(_request)
1155 supplied_token = self._get_csrf(_request)
1145 return supplied_token and supplied_token == cur_token
1156 return supplied_token and supplied_token == cur_token
1146
1157
1158 def _get_request(self):
1159 return get_request(self)
1160
1147 def __wrapper(self, func, *fargs, **fkwargs):
1161 def __wrapper(self, func, *fargs, **fkwargs):
1162 request = self._get_request()
1163
1148 if request.method in self.except_methods:
1164 if request.method in self.except_methods:
1149 return func(*fargs, **fkwargs)
1165 return func(*fargs, **fkwargs)
1150
1166
1151 cur_token = get_csrf_token(save_if_missing=False)
1167 cur_token = get_csrf_token(save_if_missing=False)
1152 if self.check_csrf(request, cur_token):
1168 if self.check_csrf(request, cur_token):
1153 if request.POST.get(self.token):
1169 if request.POST.get(self.token):
1154 del request.POST[self.token]
1170 del request.POST[self.token]
1155 return func(*fargs, **fkwargs)
1171 return func(*fargs, **fkwargs)
1156 else:
1172 else:
1157 reason = 'token-missing'
1173 reason = 'token-missing'
1158 supplied_token = self._get_csrf(request)
1174 supplied_token = self._get_csrf(request)
1159 if supplied_token and cur_token != supplied_token:
1175 if supplied_token and cur_token != supplied_token:
1160 reason = 'token-mismatch [%s:%s]' % (cur_token or ''[:6],
1176 reason = 'token-mismatch [%s:%s]' % (
1161 supplied_token or ''[:6])
1177 cur_token or ''[:6], supplied_token or ''[:6])
1162
1178
1163 csrf_message = \
1179 csrf_message = \
1164 ("Cross-site request forgery detected, request denied. See "
1180 ("Cross-site request forgery detected, request denied. See "
1165 "http://en.wikipedia.org/wiki/Cross-site_request_forgery for "
1181 "http://en.wikipedia.org/wiki/Cross-site_request_forgery for "
1166 "more information.")
1182 "more information.")
1167 log.warn('Cross-site request forgery detected, request %r DENIED: %s '
1183 log.warn('Cross-site request forgery detected, request %r DENIED: %s '
1168 'REMOTE_ADDR:%s, HEADERS:%s' % (
1184 'REMOTE_ADDR:%s, HEADERS:%s' % (
1169 request, reason, request.remote_addr, request.headers))
1185 request, reason, request.remote_addr, request.headers))
1170
1186
1171 raise HTTPForbidden(explanation=csrf_message)
1187 raise HTTPForbidden(explanation=csrf_message)
1172
1188
1173
1189
1174 class LoginRequired(object):
1190 class LoginRequired(object):
1175 """
1191 """
1176 Must be logged in to execute this function else
1192 Must be logged in to execute this function else
1177 redirect to login page
1193 redirect to login page
1178
1194
1179 :param api_access: if enabled this checks only for valid auth token
1195 :param api_access: if enabled this checks only for valid auth token
1180 and grants access based on valid token
1196 and grants access based on valid token
1181 """
1197 """
1182 def __init__(self, auth_token_access=None):
1198 def __init__(self, auth_token_access=None):
1183 self.auth_token_access = auth_token_access
1199 self.auth_token_access = auth_token_access
1184
1200
1185 def __call__(self, func):
1201 def __call__(self, func):
1186 return get_cython_compat_decorator(self.__wrapper, func)
1202 return get_cython_compat_decorator(self.__wrapper, func)
1187
1203
1188 def _get_request(self):
1204 def _get_request(self):
1189 from pyramid.threadlocal import get_current_request
1205 return get_request(self)
1190 pyramid_request = get_current_request()
1191 if not pyramid_request:
1192 # return global request of pylons in case pyramid isn't available
1193 return request
1194 return pyramid_request
1195
1206
1196 def __wrapper(self, func, *fargs, **fkwargs):
1207 def __wrapper(self, func, *fargs, **fkwargs):
1197 from rhodecode.lib import helpers as h
1208 from rhodecode.lib import helpers as h
1198 cls = fargs[0]
1209 cls = fargs[0]
1199 user = cls._rhodecode_user
1210 user = cls._rhodecode_user
1200 request = self._get_request()
1211 request = self._get_request()
1201
1212
1202 loc = "%s:%s" % (cls.__class__.__name__, func.__name__)
1213 loc = "%s:%s" % (cls.__class__.__name__, func.__name__)
1203 log.debug('Starting login restriction checks for user: %s' % (user,))
1214 log.debug('Starting login restriction checks for user: %s' % (user,))
1204 # check if our IP is allowed
1215 # check if our IP is allowed
1205 ip_access_valid = True
1216 ip_access_valid = True
1206 if not user.ip_allowed:
1217 if not user.ip_allowed:
1207 h.flash(h.literal(_('IP %s not allowed' % (user.ip_addr,))),
1218 h.flash(h.literal(_('IP %s not allowed' % (user.ip_addr,))),
1208 category='warning')
1219 category='warning')
1209 ip_access_valid = False
1220 ip_access_valid = False
1210
1221
1211 # check if we used an APIKEY and it's a valid one
1222 # check if we used an APIKEY and it's a valid one
1212 # defined white-list of controllers which API access will be enabled
1223 # defined white-list of controllers which API access will be enabled
1213 _auth_token = request.GET.get(
1224 _auth_token = request.GET.get(
1214 'auth_token', '') or request.GET.get('api_key', '')
1225 'auth_token', '') or request.GET.get('api_key', '')
1215 auth_token_access_valid = allowed_auth_token_access(
1226 auth_token_access_valid = allowed_auth_token_access(
1216 loc, auth_token=_auth_token)
1227 loc, auth_token=_auth_token)
1217
1228
1218 # explicit controller is enabled or API is in our whitelist
1229 # explicit controller is enabled or API is in our whitelist
1219 if self.auth_token_access or auth_token_access_valid:
1230 if self.auth_token_access or auth_token_access_valid:
1220 log.debug('Checking AUTH TOKEN access for %s' % (cls,))
1231 log.debug('Checking AUTH TOKEN access for %s' % (cls,))
1221 db_user = user.get_instance()
1232 db_user = user.get_instance()
1222
1233
1223 if db_user:
1234 if db_user:
1224 if self.auth_token_access:
1235 if self.auth_token_access:
1225 roles = self.auth_token_access
1236 roles = self.auth_token_access
1226 else:
1237 else:
1227 roles = [UserApiKeys.ROLE_HTTP]
1238 roles = [UserApiKeys.ROLE_HTTP]
1228 token_match = db_user.authenticate_by_token(
1239 token_match = db_user.authenticate_by_token(
1229 _auth_token, roles=roles)
1240 _auth_token, roles=roles)
1230 else:
1241 else:
1231 log.debug('Unable to fetch db instance for auth user: %s', user)
1242 log.debug('Unable to fetch db instance for auth user: %s', user)
1232 token_match = False
1243 token_match = False
1233
1244
1234 if _auth_token and token_match:
1245 if _auth_token and token_match:
1235 auth_token_access_valid = True
1246 auth_token_access_valid = True
1236 log.debug('AUTH TOKEN ****%s is VALID' % (_auth_token[-4:],))
1247 log.debug('AUTH TOKEN ****%s is VALID' % (_auth_token[-4:],))
1237 else:
1248 else:
1238 auth_token_access_valid = False
1249 auth_token_access_valid = False
1239 if not _auth_token:
1250 if not _auth_token:
1240 log.debug("AUTH TOKEN *NOT* present in request")
1251 log.debug("AUTH TOKEN *NOT* present in request")
1241 else:
1252 else:
1242 log.warning(
1253 log.warning(
1243 "AUTH TOKEN ****%s *NOT* valid" % _auth_token[-4:])
1254 "AUTH TOKEN ****%s *NOT* valid" % _auth_token[-4:])
1244
1255
1245 log.debug('Checking if %s is authenticated @ %s' % (user.username, loc))
1256 log.debug('Checking if %s is authenticated @ %s' % (user.username, loc))
1246 reason = 'RHODECODE_AUTH' if user.is_authenticated \
1257 reason = 'RHODECODE_AUTH' if user.is_authenticated \
1247 else 'AUTH_TOKEN_AUTH'
1258 else 'AUTH_TOKEN_AUTH'
1248
1259
1249 if ip_access_valid and (
1260 if ip_access_valid and (
1250 user.is_authenticated or auth_token_access_valid):
1261 user.is_authenticated or auth_token_access_valid):
1251 log.info(
1262 log.info(
1252 'user %s authenticating with:%s IS authenticated on func %s'
1263 'user %s authenticating with:%s IS authenticated on func %s'
1253 % (user, reason, loc))
1264 % (user, reason, loc))
1254
1265
1255 # update user data to check last activity
1266 # update user data to check last activity
1256 user.update_lastactivity()
1267 user.update_lastactivity()
1257 Session().commit()
1268 Session().commit()
1258 return func(*fargs, **fkwargs)
1269 return func(*fargs, **fkwargs)
1259 else:
1270 else:
1260 log.warning(
1271 log.warning(
1261 'user %s authenticating with:%s NOT authenticated on '
1272 'user %s authenticating with:%s NOT authenticated on '
1262 'func: %s: IP_ACCESS:%s AUTH_TOKEN_ACCESS:%s'
1273 'func: %s: IP_ACCESS:%s AUTH_TOKEN_ACCESS:%s'
1263 % (user, reason, loc, ip_access_valid,
1274 % (user, reason, loc, ip_access_valid,
1264 auth_token_access_valid))
1275 auth_token_access_valid))
1265 # we preserve the get PARAM
1276 # we preserve the get PARAM
1266 came_from = request.path_qs
1277 came_from = request.path_qs
1267 log.debug('redirecting to login page with %s' % (came_from,))
1278 log.debug('redirecting to login page with %s' % (came_from,))
1268 raise HTTPFound(
1279 raise HTTPFound(
1269 h.route_path('login', _query={'came_from': came_from}))
1280 h.route_path('login', _query={'came_from': came_from}))
1270
1281
1271
1282
1272 class NotAnonymous(object):
1283 class NotAnonymous(object):
1273 """
1284 """
1274 Must be logged in to execute this function else
1285 Must be logged in to execute this function else
1275 redirect to login page
1286 redirect to login page
1276 """
1287 """
1277
1288
1278 def __call__(self, func):
1289 def __call__(self, func):
1279 return get_cython_compat_decorator(self.__wrapper, func)
1290 return get_cython_compat_decorator(self.__wrapper, func)
1280
1291
1292 def _get_request(self):
1293 return get_request(self)
1294
1281 def __wrapper(self, func, *fargs, **fkwargs):
1295 def __wrapper(self, func, *fargs, **fkwargs):
1282 import rhodecode.lib.helpers as h
1296 import rhodecode.lib.helpers as h
1283 cls = fargs[0]
1297 cls = fargs[0]
1284 self.user = cls._rhodecode_user
1298 self.user = cls._rhodecode_user
1299 request = self._get_request()
1285
1300
1286 log.debug('Checking if user is not anonymous @%s' % cls)
1301 log.debug('Checking if user is not anonymous @%s' % cls)
1287
1302
1288 anonymous = self.user.username == User.DEFAULT_USER
1303 anonymous = self.user.username == User.DEFAULT_USER
1289
1304
1290 if anonymous:
1305 if anonymous:
1291 came_from = request.path_qs
1306 came_from = request.path_qs
1292 h.flash(_('You need to be a registered user to '
1307 h.flash(_('You need to be a registered user to '
1293 'perform this action'),
1308 'perform this action'),
1294 category='warning')
1309 category='warning')
1295 raise HTTPFound(
1310 raise HTTPFound(
1296 h.route_path('login', _query={'came_from': came_from}))
1311 h.route_path('login', _query={'came_from': came_from}))
1297 else:
1312 else:
1298 return func(*fargs, **fkwargs)
1313 return func(*fargs, **fkwargs)
1299
1314
1300
1315
1301 class XHRRequired(object):
1316 class XHRRequired(object):
1302 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1317 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1303
1318
1304 def __call__(self, func):
1319 def __call__(self, func):
1305 return get_cython_compat_decorator(self.__wrapper, func)
1320 return get_cython_compat_decorator(self.__wrapper, func)
1306
1321
1322 def _get_request(self):
1323 return get_request(self)
1324
1307 def __wrapper(self, func, *fargs, **fkwargs):
1325 def __wrapper(self, func, *fargs, **fkwargs):
1326 from pylons.controllers.util import abort
1327 request = self._get_request()
1328
1308 log.debug('Checking if request is XMLHttpRequest (XHR)')
1329 log.debug('Checking if request is XMLHttpRequest (XHR)')
1309 xhr_message = 'This is not a valid XMLHttpRequest (XHR) request'
1330 xhr_message = 'This is not a valid XMLHttpRequest (XHR) request'
1331
1310 if not request.is_xhr:
1332 if not request.is_xhr:
1311 abort(400, detail=xhr_message)
1333 abort(400, detail=xhr_message)
1312
1334
1313 return func(*fargs, **fkwargs)
1335 return func(*fargs, **fkwargs)
1314
1336
1315
1337
1316 class HasAcceptedRepoType(object):
1338 class HasAcceptedRepoType(object):
1317 """
1339 """
1318 Check if requested repo is within given repo type aliases
1340 Check if requested repo is within given repo type aliases
1319 """
1341 """
1320
1342
1321 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1343 # TODO(marcink): remove this in favor of the predicates in pyramid routes
1322
1344
1323 def __init__(self, *repo_type_list):
1345 def __init__(self, *repo_type_list):
1324 self.repo_type_list = set(repo_type_list)
1346 self.repo_type_list = set(repo_type_list)
1325
1347
1326 def __call__(self, func):
1348 def __call__(self, func):
1327 return get_cython_compat_decorator(self.__wrapper, func)
1349 return get_cython_compat_decorator(self.__wrapper, func)
1328
1350
1329 def __wrapper(self, func, *fargs, **fkwargs):
1351 def __wrapper(self, func, *fargs, **fkwargs):
1330 import rhodecode.lib.helpers as h
1352 import rhodecode.lib.helpers as h
1331 cls = fargs[0]
1353 cls = fargs[0]
1332 rhodecode_repo = cls.rhodecode_repo
1354 rhodecode_repo = cls.rhodecode_repo
1333
1355
1334 log.debug('%s checking repo type for %s in %s',
1356 log.debug('%s checking repo type for %s in %s',
1335 self.__class__.__name__,
1357 self.__class__.__name__,
1336 rhodecode_repo.alias, self.repo_type_list)
1358 rhodecode_repo.alias, self.repo_type_list)
1337
1359
1338 if rhodecode_repo.alias in self.repo_type_list:
1360 if rhodecode_repo.alias in self.repo_type_list:
1339 return func(*fargs, **fkwargs)
1361 return func(*fargs, **fkwargs)
1340 else:
1362 else:
1341 h.flash(h.literal(
1363 h.flash(h.literal(
1342 _('Action not supported for %s.' % rhodecode_repo.alias)),
1364 _('Action not supported for %s.' % rhodecode_repo.alias)),
1343 category='warning')
1365 category='warning')
1344 raise HTTPFound(
1366 raise HTTPFound(
1345 h.route_path('repo_summary',
1367 h.route_path('repo_summary',
1346 repo_name=cls.rhodecode_db_repo.repo_name))
1368 repo_name=cls.rhodecode_db_repo.repo_name))
1347
1369
1348
1370
1349 class PermsDecorator(object):
1371 class PermsDecorator(object):
1350 """
1372 """
1351 Base class for controller decorators, we extract the current user from
1373 Base class for controller decorators, we extract the current user from
1352 the class itself, which has it stored in base controllers
1374 the class itself, which has it stored in base controllers
1353 """
1375 """
1354
1376
1355 def __init__(self, *required_perms):
1377 def __init__(self, *required_perms):
1356 self.required_perms = set(required_perms)
1378 self.required_perms = set(required_perms)
1357
1379
1358 def __call__(self, func):
1380 def __call__(self, func):
1359 return get_cython_compat_decorator(self.__wrapper, func)
1381 return get_cython_compat_decorator(self.__wrapper, func)
1360
1382
1361 def _get_request(self):
1383 def _get_request(self):
1362 from pyramid.threadlocal import get_current_request
1384 return get_request(self)
1363 pyramid_request = get_current_request()
1364 if not pyramid_request:
1365 # return global request of pylons in case pyramid isn't available
1366 return request
1367 return pyramid_request
1368
1385
1369 def _get_came_from(self):
1386 def _get_came_from(self):
1370 _request = self._get_request()
1387 _request = self._get_request()
1371
1388
1372 # both pylons/pyramid has this attribute
1389 # both pylons/pyramid has this attribute
1373 return _request.path_qs
1390 return _request.path_qs
1374
1391
1375 def __wrapper(self, func, *fargs, **fkwargs):
1392 def __wrapper(self, func, *fargs, **fkwargs):
1376 import rhodecode.lib.helpers as h
1393 import rhodecode.lib.helpers as h
1377 cls = fargs[0]
1394 cls = fargs[0]
1378 _user = cls._rhodecode_user
1395 _user = cls._rhodecode_user
1379
1396
1380 log.debug('checking %s permissions %s for %s %s',
1397 log.debug('checking %s permissions %s for %s %s',
1381 self.__class__.__name__, self.required_perms, cls, _user)
1398 self.__class__.__name__, self.required_perms, cls, _user)
1382
1399
1383 if self.check_permissions(_user):
1400 if self.check_permissions(_user):
1384 log.debug('Permission granted for %s %s', cls, _user)
1401 log.debug('Permission granted for %s %s', cls, _user)
1385 return func(*fargs, **fkwargs)
1402 return func(*fargs, **fkwargs)
1386
1403
1387 else:
1404 else:
1388 log.debug('Permission denied for %s %s', cls, _user)
1405 log.debug('Permission denied for %s %s', cls, _user)
1389 anonymous = _user.username == User.DEFAULT_USER
1406 anonymous = _user.username == User.DEFAULT_USER
1390
1407
1391 if anonymous:
1408 if anonymous:
1392 came_from = self._get_came_from()
1409 came_from = self._get_came_from()
1393 h.flash(_('You need to be signed in to view this page'),
1410 h.flash(_('You need to be signed in to view this page'),
1394 category='warning')
1411 category='warning')
1395 raise HTTPFound(
1412 raise HTTPFound(
1396 h.route_path('login', _query={'came_from': came_from}))
1413 h.route_path('login', _query={'came_from': came_from}))
1397
1414
1398 else:
1415 else:
1399 # redirect with forbidden ret code
1416 # redirect with forbidden ret code
1400 raise HTTPForbidden()
1417 raise HTTPForbidden()
1401
1418
1402 def check_permissions(self, user):
1419 def check_permissions(self, user):
1403 """Dummy function for overriding"""
1420 """Dummy function for overriding"""
1404 raise NotImplementedError(
1421 raise NotImplementedError(
1405 'You have to write this function in child class')
1422 'You have to write this function in child class')
1406
1423
1407
1424
1408 class HasPermissionAllDecorator(PermsDecorator):
1425 class HasPermissionAllDecorator(PermsDecorator):
1409 """
1426 """
1410 Checks for access permission for all given predicates. All of them
1427 Checks for access permission for all given predicates. All of them
1411 have to be meet in order to fulfill the request
1428 have to be meet in order to fulfill the request
1412 """
1429 """
1413
1430
1414 def check_permissions(self, user):
1431 def check_permissions(self, user):
1415 perms = user.permissions_with_scope({})
1432 perms = user.permissions_with_scope({})
1416 if self.required_perms.issubset(perms['global']):
1433 if self.required_perms.issubset(perms['global']):
1417 return True
1434 return True
1418 return False
1435 return False
1419
1436
1420
1437
1421 class HasPermissionAnyDecorator(PermsDecorator):
1438 class HasPermissionAnyDecorator(PermsDecorator):
1422 """
1439 """
1423 Checks for access permission for any of given predicates. In order to
1440 Checks for access permission for any of given predicates. In order to
1424 fulfill the request any of predicates must be meet
1441 fulfill the request any of predicates must be meet
1425 """
1442 """
1426
1443
1427 def check_permissions(self, user):
1444 def check_permissions(self, user):
1428 perms = user.permissions_with_scope({})
1445 perms = user.permissions_with_scope({})
1429 if self.required_perms.intersection(perms['global']):
1446 if self.required_perms.intersection(perms['global']):
1430 return True
1447 return True
1431 return False
1448 return False
1432
1449
1433
1450
1434 class HasRepoPermissionAllDecorator(PermsDecorator):
1451 class HasRepoPermissionAllDecorator(PermsDecorator):
1435 """
1452 """
1436 Checks for access permission for all given predicates for specific
1453 Checks for access permission for all given predicates for specific
1437 repository. All of them have to be meet in order to fulfill the request
1454 repository. All of them have to be meet in order to fulfill the request
1438 """
1455 """
1439 def _get_repo_name(self):
1456 def _get_repo_name(self):
1440 _request = self._get_request()
1457 _request = self._get_request()
1441 return get_repo_slug(_request)
1458 return get_repo_slug(_request)
1442
1459
1443 def check_permissions(self, user):
1460 def check_permissions(self, user):
1444 perms = user.permissions
1461 perms = user.permissions
1445 repo_name = self._get_repo_name()
1462 repo_name = self._get_repo_name()
1446
1463
1447 try:
1464 try:
1448 user_perms = set([perms['repositories'][repo_name]])
1465 user_perms = set([perms['repositories'][repo_name]])
1449 except KeyError:
1466 except KeyError:
1450 log.debug('cannot locate repo with name: `%s` in permissions defs',
1467 log.debug('cannot locate repo with name: `%s` in permissions defs',
1451 repo_name)
1468 repo_name)
1452 return False
1469 return False
1453
1470
1454 log.debug('checking `%s` permissions for repo `%s`',
1471 log.debug('checking `%s` permissions for repo `%s`',
1455 user_perms, repo_name)
1472 user_perms, repo_name)
1456 if self.required_perms.issubset(user_perms):
1473 if self.required_perms.issubset(user_perms):
1457 return True
1474 return True
1458 return False
1475 return False
1459
1476
1460
1477
1461 class HasRepoPermissionAnyDecorator(PermsDecorator):
1478 class HasRepoPermissionAnyDecorator(PermsDecorator):
1462 """
1479 """
1463 Checks for access permission for any of given predicates for specific
1480 Checks for access permission for any of given predicates for specific
1464 repository. In order to fulfill the request any of predicates must be meet
1481 repository. In order to fulfill the request any of predicates must be meet
1465 """
1482 """
1466 def _get_repo_name(self):
1483 def _get_repo_name(self):
1467 _request = self._get_request()
1484 _request = self._get_request()
1468 return get_repo_slug(_request)
1485 return get_repo_slug(_request)
1469
1486
1470 def check_permissions(self, user):
1487 def check_permissions(self, user):
1471 perms = user.permissions
1488 perms = user.permissions
1472 repo_name = self._get_repo_name()
1489 repo_name = self._get_repo_name()
1473
1490
1474 try:
1491 try:
1475 user_perms = set([perms['repositories'][repo_name]])
1492 user_perms = set([perms['repositories'][repo_name]])
1476 except KeyError:
1493 except KeyError:
1477 log.debug('cannot locate repo with name: `%s` in permissions defs',
1494 log.debug('cannot locate repo with name: `%s` in permissions defs',
1478 repo_name)
1495 repo_name)
1479 return False
1496 return False
1480
1497
1481 log.debug('checking `%s` permissions for repo `%s`',
1498 log.debug('checking `%s` permissions for repo `%s`',
1482 user_perms, repo_name)
1499 user_perms, repo_name)
1483 if self.required_perms.intersection(user_perms):
1500 if self.required_perms.intersection(user_perms):
1484 return True
1501 return True
1485 return False
1502 return False
1486
1503
1487
1504
1488 class HasRepoGroupPermissionAllDecorator(PermsDecorator):
1505 class HasRepoGroupPermissionAllDecorator(PermsDecorator):
1489 """
1506 """
1490 Checks for access permission for all given predicates for specific
1507 Checks for access permission for all given predicates for specific
1491 repository group. All of them have to be meet in order to
1508 repository group. All of them have to be meet in order to
1492 fulfill the request
1509 fulfill the request
1493 """
1510 """
1494 def _get_repo_group_name(self):
1511 def _get_repo_group_name(self):
1495 _request = self._get_request()
1512 _request = self._get_request()
1496 return get_repo_group_slug(_request)
1513 return get_repo_group_slug(_request)
1497
1514
1498 def check_permissions(self, user):
1515 def check_permissions(self, user):
1499 perms = user.permissions
1516 perms = user.permissions
1500 group_name = self._get_repo_group_name()
1517 group_name = self._get_repo_group_name()
1501 try:
1518 try:
1502 user_perms = set([perms['repositories_groups'][group_name]])
1519 user_perms = set([perms['repositories_groups'][group_name]])
1503 except KeyError:
1520 except KeyError:
1504 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1521 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1505 group_name)
1522 group_name)
1506 return False
1523 return False
1507
1524
1508 log.debug('checking `%s` permissions for repo group `%s`',
1525 log.debug('checking `%s` permissions for repo group `%s`',
1509 user_perms, group_name)
1526 user_perms, group_name)
1510 if self.required_perms.issubset(user_perms):
1527 if self.required_perms.issubset(user_perms):
1511 return True
1528 return True
1512 return False
1529 return False
1513
1530
1514
1531
1515 class HasRepoGroupPermissionAnyDecorator(PermsDecorator):
1532 class HasRepoGroupPermissionAnyDecorator(PermsDecorator):
1516 """
1533 """
1517 Checks for access permission for any of given predicates for specific
1534 Checks for access permission for any of given predicates for specific
1518 repository group. In order to fulfill the request any
1535 repository group. In order to fulfill the request any
1519 of predicates must be met
1536 of predicates must be met
1520 """
1537 """
1521 def _get_repo_group_name(self):
1538 def _get_repo_group_name(self):
1522 _request = self._get_request()
1539 _request = self._get_request()
1523 return get_repo_group_slug(_request)
1540 return get_repo_group_slug(_request)
1524
1541
1525 def check_permissions(self, user):
1542 def check_permissions(self, user):
1526 perms = user.permissions
1543 perms = user.permissions
1527 group_name = self._get_repo_group_name()
1544 group_name = self._get_repo_group_name()
1528
1545
1529 try:
1546 try:
1530 user_perms = set([perms['repositories_groups'][group_name]])
1547 user_perms = set([perms['repositories_groups'][group_name]])
1531 except KeyError:
1548 except KeyError:
1532 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1549 log.debug('cannot locate repo group with name: `%s` in permissions defs',
1533 group_name)
1550 group_name)
1534 return False
1551 return False
1535
1552
1536 log.debug('checking `%s` permissions for repo group `%s`',
1553 log.debug('checking `%s` permissions for repo group `%s`',
1537 user_perms, group_name)
1554 user_perms, group_name)
1538 if self.required_perms.intersection(user_perms):
1555 if self.required_perms.intersection(user_perms):
1539 return True
1556 return True
1540 return False
1557 return False
1541
1558
1542
1559
1543 class HasUserGroupPermissionAllDecorator(PermsDecorator):
1560 class HasUserGroupPermissionAllDecorator(PermsDecorator):
1544 """
1561 """
1545 Checks for access permission for all given predicates for specific
1562 Checks for access permission for all given predicates for specific
1546 user group. All of them have to be meet in order to fulfill the request
1563 user group. All of them have to be meet in order to fulfill the request
1547 """
1564 """
1548 def _get_user_group_name(self):
1565 def _get_user_group_name(self):
1549 _request = self._get_request()
1566 _request = self._get_request()
1550 return get_user_group_slug(_request)
1567 return get_user_group_slug(_request)
1551
1568
1552 def check_permissions(self, user):
1569 def check_permissions(self, user):
1553 perms = user.permissions
1570 perms = user.permissions
1554 group_name = self._get_user_group_name()
1571 group_name = self._get_user_group_name()
1555 try:
1572 try:
1556 user_perms = set([perms['user_groups'][group_name]])
1573 user_perms = set([perms['user_groups'][group_name]])
1557 except KeyError:
1574 except KeyError:
1558 return False
1575 return False
1559
1576
1560 if self.required_perms.issubset(user_perms):
1577 if self.required_perms.issubset(user_perms):
1561 return True
1578 return True
1562 return False
1579 return False
1563
1580
1564
1581
1565 class HasUserGroupPermissionAnyDecorator(PermsDecorator):
1582 class HasUserGroupPermissionAnyDecorator(PermsDecorator):
1566 """
1583 """
1567 Checks for access permission for any of given predicates for specific
1584 Checks for access permission for any of given predicates for specific
1568 user group. In order to fulfill the request any of predicates must be meet
1585 user group. In order to fulfill the request any of predicates must be meet
1569 """
1586 """
1570 def _get_user_group_name(self):
1587 def _get_user_group_name(self):
1571 _request = self._get_request()
1588 _request = self._get_request()
1572 return get_user_group_slug(_request)
1589 return get_user_group_slug(_request)
1573
1590
1574 def check_permissions(self, user):
1591 def check_permissions(self, user):
1575 perms = user.permissions
1592 perms = user.permissions
1576 group_name = self._get_user_group_name()
1593 group_name = self._get_user_group_name()
1577 try:
1594 try:
1578 user_perms = set([perms['user_groups'][group_name]])
1595 user_perms = set([perms['user_groups'][group_name]])
1579 except KeyError:
1596 except KeyError:
1580 return False
1597 return False
1581
1598
1582 if self.required_perms.intersection(user_perms):
1599 if self.required_perms.intersection(user_perms):
1583 return True
1600 return True
1584 return False
1601 return False
1585
1602
1586
1603
1587 # CHECK FUNCTIONS
1604 # CHECK FUNCTIONS
1588 class PermsFunction(object):
1605 class PermsFunction(object):
1589 """Base function for other check functions"""
1606 """Base function for other check functions"""
1590
1607
1591 def __init__(self, *perms):
1608 def __init__(self, *perms):
1592 self.required_perms = set(perms)
1609 self.required_perms = set(perms)
1593 self.repo_name = None
1610 self.repo_name = None
1594 self.repo_group_name = None
1611 self.repo_group_name = None
1595 self.user_group_name = None
1612 self.user_group_name = None
1596
1613
1597 def __bool__(self):
1614 def __bool__(self):
1598 frame = inspect.currentframe()
1615 frame = inspect.currentframe()
1599 stack_trace = traceback.format_stack(frame)
1616 stack_trace = traceback.format_stack(frame)
1600 log.error('Checking bool value on a class instance of perm '
1617 log.error('Checking bool value on a class instance of perm '
1601 'function is not allowed: %s' % ''.join(stack_trace))
1618 'function is not allowed: %s' % ''.join(stack_trace))
1602 # rather than throwing errors, here we always return False so if by
1619 # rather than throwing errors, here we always return False so if by
1603 # accident someone checks truth for just an instance it will always end
1620 # accident someone checks truth for just an instance it will always end
1604 # up in returning False
1621 # up in returning False
1605 return False
1622 return False
1606 __nonzero__ = __bool__
1623 __nonzero__ = __bool__
1607
1624
1608 def __call__(self, check_location='', user=None):
1625 def __call__(self, check_location='', user=None):
1609 if not user:
1626 if not user:
1610 log.debug('Using user attribute from global request')
1627 log.debug('Using user attribute from global request')
1611 # TODO: remove this someday,put as user as attribute here
1628 # TODO: remove this someday,put as user as attribute here
1612 request = self._get_request()
1629 request = self._get_request()
1613 user = request.user
1630 user = request.user
1614
1631
1615 # init auth user if not already given
1632 # init auth user if not already given
1616 if not isinstance(user, AuthUser):
1633 if not isinstance(user, AuthUser):
1617 log.debug('Wrapping user %s into AuthUser', user)
1634 log.debug('Wrapping user %s into AuthUser', user)
1618 user = AuthUser(user.user_id)
1635 user = AuthUser(user.user_id)
1619
1636
1620 cls_name = self.__class__.__name__
1637 cls_name = self.__class__.__name__
1621 check_scope = self._get_check_scope(cls_name)
1638 check_scope = self._get_check_scope(cls_name)
1622 check_location = check_location or 'unspecified location'
1639 check_location = check_location or 'unspecified location'
1623
1640
1624 log.debug('checking cls:%s %s usr:%s %s @ %s', cls_name,
1641 log.debug('checking cls:%s %s usr:%s %s @ %s', cls_name,
1625 self.required_perms, user, check_scope, check_location)
1642 self.required_perms, user, check_scope, check_location)
1626 if not user:
1643 if not user:
1627 log.warning('Empty user given for permission check')
1644 log.warning('Empty user given for permission check')
1628 return False
1645 return False
1629
1646
1630 if self.check_permissions(user):
1647 if self.check_permissions(user):
1631 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1648 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1632 check_scope, user, check_location)
1649 check_scope, user, check_location)
1633 return True
1650 return True
1634
1651
1635 else:
1652 else:
1636 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1653 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1637 check_scope, user, check_location)
1654 check_scope, user, check_location)
1638 return False
1655 return False
1639
1656
1640 def _get_request(self):
1657 def _get_request(self):
1641 from pyramid.threadlocal import get_current_request
1658 return get_request(self)
1642 pyramid_request = get_current_request()
1643 if not pyramid_request:
1644 # return global request of pylons incase pyramid one isn't available
1645 return request
1646 return pyramid_request
1647
1659
1648 def _get_check_scope(self, cls_name):
1660 def _get_check_scope(self, cls_name):
1649 return {
1661 return {
1650 'HasPermissionAll': 'GLOBAL',
1662 'HasPermissionAll': 'GLOBAL',
1651 'HasPermissionAny': 'GLOBAL',
1663 'HasPermissionAny': 'GLOBAL',
1652 'HasRepoPermissionAll': 'repo:%s' % self.repo_name,
1664 'HasRepoPermissionAll': 'repo:%s' % self.repo_name,
1653 'HasRepoPermissionAny': 'repo:%s' % self.repo_name,
1665 'HasRepoPermissionAny': 'repo:%s' % self.repo_name,
1654 'HasRepoGroupPermissionAll': 'repo_group:%s' % self.repo_group_name,
1666 'HasRepoGroupPermissionAll': 'repo_group:%s' % self.repo_group_name,
1655 'HasRepoGroupPermissionAny': 'repo_group:%s' % self.repo_group_name,
1667 'HasRepoGroupPermissionAny': 'repo_group:%s' % self.repo_group_name,
1656 'HasUserGroupPermissionAll': 'user_group:%s' % self.user_group_name,
1668 'HasUserGroupPermissionAll': 'user_group:%s' % self.user_group_name,
1657 'HasUserGroupPermissionAny': 'user_group:%s' % self.user_group_name,
1669 'HasUserGroupPermissionAny': 'user_group:%s' % self.user_group_name,
1658 }.get(cls_name, '?:%s' % cls_name)
1670 }.get(cls_name, '?:%s' % cls_name)
1659
1671
1660 def check_permissions(self, user):
1672 def check_permissions(self, user):
1661 """Dummy function for overriding"""
1673 """Dummy function for overriding"""
1662 raise Exception('You have to write this function in child class')
1674 raise Exception('You have to write this function in child class')
1663
1675
1664
1676
1665 class HasPermissionAll(PermsFunction):
1677 class HasPermissionAll(PermsFunction):
1666 def check_permissions(self, user):
1678 def check_permissions(self, user):
1667 perms = user.permissions_with_scope({})
1679 perms = user.permissions_with_scope({})
1668 if self.required_perms.issubset(perms.get('global')):
1680 if self.required_perms.issubset(perms.get('global')):
1669 return True
1681 return True
1670 return False
1682 return False
1671
1683
1672
1684
1673 class HasPermissionAny(PermsFunction):
1685 class HasPermissionAny(PermsFunction):
1674 def check_permissions(self, user):
1686 def check_permissions(self, user):
1675 perms = user.permissions_with_scope({})
1687 perms = user.permissions_with_scope({})
1676 if self.required_perms.intersection(perms.get('global')):
1688 if self.required_perms.intersection(perms.get('global')):
1677 return True
1689 return True
1678 return False
1690 return False
1679
1691
1680
1692
1681 class HasRepoPermissionAll(PermsFunction):
1693 class HasRepoPermissionAll(PermsFunction):
1682 def __call__(self, repo_name=None, check_location='', user=None):
1694 def __call__(self, repo_name=None, check_location='', user=None):
1683 self.repo_name = repo_name
1695 self.repo_name = repo_name
1684 return super(HasRepoPermissionAll, self).__call__(check_location, user)
1696 return super(HasRepoPermissionAll, self).__call__(check_location, user)
1685
1697
1686 def _get_repo_name(self):
1698 def _get_repo_name(self):
1687 if not self.repo_name:
1699 if not self.repo_name:
1688 _request = self._get_request()
1700 _request = self._get_request()
1689 self.repo_name = get_repo_slug(_request)
1701 self.repo_name = get_repo_slug(_request)
1690 return self.repo_name
1702 return self.repo_name
1691
1703
1692 def check_permissions(self, user):
1704 def check_permissions(self, user):
1693 self.repo_name = self._get_repo_name()
1705 self.repo_name = self._get_repo_name()
1694 perms = user.permissions
1706 perms = user.permissions
1695 try:
1707 try:
1696 user_perms = set([perms['repositories'][self.repo_name]])
1708 user_perms = set([perms['repositories'][self.repo_name]])
1697 except KeyError:
1709 except KeyError:
1698 return False
1710 return False
1699 if self.required_perms.issubset(user_perms):
1711 if self.required_perms.issubset(user_perms):
1700 return True
1712 return True
1701 return False
1713 return False
1702
1714
1703
1715
1704 class HasRepoPermissionAny(PermsFunction):
1716 class HasRepoPermissionAny(PermsFunction):
1705 def __call__(self, repo_name=None, check_location='', user=None):
1717 def __call__(self, repo_name=None, check_location='', user=None):
1706 self.repo_name = repo_name
1718 self.repo_name = repo_name
1707 return super(HasRepoPermissionAny, self).__call__(check_location, user)
1719 return super(HasRepoPermissionAny, self).__call__(check_location, user)
1708
1720
1709 def _get_repo_name(self):
1721 def _get_repo_name(self):
1710 if not self.repo_name:
1722 if not self.repo_name:
1711 self.repo_name = get_repo_slug(request)
1723 _request = self._get_request()
1724 self.repo_name = get_repo_slug(_request)
1712 return self.repo_name
1725 return self.repo_name
1713
1726
1714 def check_permissions(self, user):
1727 def check_permissions(self, user):
1715 self.repo_name = self._get_repo_name()
1728 self.repo_name = self._get_repo_name()
1716 perms = user.permissions
1729 perms = user.permissions
1717 try:
1730 try:
1718 user_perms = set([perms['repositories'][self.repo_name]])
1731 user_perms = set([perms['repositories'][self.repo_name]])
1719 except KeyError:
1732 except KeyError:
1720 return False
1733 return False
1721 if self.required_perms.intersection(user_perms):
1734 if self.required_perms.intersection(user_perms):
1722 return True
1735 return True
1723 return False
1736 return False
1724
1737
1725
1738
1726 class HasRepoGroupPermissionAny(PermsFunction):
1739 class HasRepoGroupPermissionAny(PermsFunction):
1727 def __call__(self, group_name=None, check_location='', user=None):
1740 def __call__(self, group_name=None, check_location='', user=None):
1728 self.repo_group_name = group_name
1741 self.repo_group_name = group_name
1729 return super(HasRepoGroupPermissionAny, self).__call__(
1742 return super(HasRepoGroupPermissionAny, self).__call__(
1730 check_location, user)
1743 check_location, user)
1731
1744
1732 def check_permissions(self, user):
1745 def check_permissions(self, user):
1733 perms = user.permissions
1746 perms = user.permissions
1734 try:
1747 try:
1735 user_perms = set(
1748 user_perms = set(
1736 [perms['repositories_groups'][self.repo_group_name]])
1749 [perms['repositories_groups'][self.repo_group_name]])
1737 except KeyError:
1750 except KeyError:
1738 return False
1751 return False
1739 if self.required_perms.intersection(user_perms):
1752 if self.required_perms.intersection(user_perms):
1740 return True
1753 return True
1741 return False
1754 return False
1742
1755
1743
1756
1744 class HasRepoGroupPermissionAll(PermsFunction):
1757 class HasRepoGroupPermissionAll(PermsFunction):
1745 def __call__(self, group_name=None, check_location='', user=None):
1758 def __call__(self, group_name=None, check_location='', user=None):
1746 self.repo_group_name = group_name
1759 self.repo_group_name = group_name
1747 return super(HasRepoGroupPermissionAll, self).__call__(
1760 return super(HasRepoGroupPermissionAll, self).__call__(
1748 check_location, user)
1761 check_location, user)
1749
1762
1750 def check_permissions(self, user):
1763 def check_permissions(self, user):
1751 perms = user.permissions
1764 perms = user.permissions
1752 try:
1765 try:
1753 user_perms = set(
1766 user_perms = set(
1754 [perms['repositories_groups'][self.repo_group_name]])
1767 [perms['repositories_groups'][self.repo_group_name]])
1755 except KeyError:
1768 except KeyError:
1756 return False
1769 return False
1757 if self.required_perms.issubset(user_perms):
1770 if self.required_perms.issubset(user_perms):
1758 return True
1771 return True
1759 return False
1772 return False
1760
1773
1761
1774
1762 class HasUserGroupPermissionAny(PermsFunction):
1775 class HasUserGroupPermissionAny(PermsFunction):
1763 def __call__(self, user_group_name=None, check_location='', user=None):
1776 def __call__(self, user_group_name=None, check_location='', user=None):
1764 self.user_group_name = user_group_name
1777 self.user_group_name = user_group_name
1765 return super(HasUserGroupPermissionAny, self).__call__(
1778 return super(HasUserGroupPermissionAny, self).__call__(
1766 check_location, user)
1779 check_location, user)
1767
1780
1768 def check_permissions(self, user):
1781 def check_permissions(self, user):
1769 perms = user.permissions
1782 perms = user.permissions
1770 try:
1783 try:
1771 user_perms = set([perms['user_groups'][self.user_group_name]])
1784 user_perms = set([perms['user_groups'][self.user_group_name]])
1772 except KeyError:
1785 except KeyError:
1773 return False
1786 return False
1774 if self.required_perms.intersection(user_perms):
1787 if self.required_perms.intersection(user_perms):
1775 return True
1788 return True
1776 return False
1789 return False
1777
1790
1778
1791
1779 class HasUserGroupPermissionAll(PermsFunction):
1792 class HasUserGroupPermissionAll(PermsFunction):
1780 def __call__(self, user_group_name=None, check_location='', user=None):
1793 def __call__(self, user_group_name=None, check_location='', user=None):
1781 self.user_group_name = user_group_name
1794 self.user_group_name = user_group_name
1782 return super(HasUserGroupPermissionAll, self).__call__(
1795 return super(HasUserGroupPermissionAll, self).__call__(
1783 check_location, user)
1796 check_location, user)
1784
1797
1785 def check_permissions(self, user):
1798 def check_permissions(self, user):
1786 perms = user.permissions
1799 perms = user.permissions
1787 try:
1800 try:
1788 user_perms = set([perms['user_groups'][self.user_group_name]])
1801 user_perms = set([perms['user_groups'][self.user_group_name]])
1789 except KeyError:
1802 except KeyError:
1790 return False
1803 return False
1791 if self.required_perms.issubset(user_perms):
1804 if self.required_perms.issubset(user_perms):
1792 return True
1805 return True
1793 return False
1806 return False
1794
1807
1795
1808
1796 # SPECIAL VERSION TO HANDLE MIDDLEWARE AUTH
1809 # SPECIAL VERSION TO HANDLE MIDDLEWARE AUTH
1797 class HasPermissionAnyMiddleware(object):
1810 class HasPermissionAnyMiddleware(object):
1798 def __init__(self, *perms):
1811 def __init__(self, *perms):
1799 self.required_perms = set(perms)
1812 self.required_perms = set(perms)
1800
1813
1801 def __call__(self, user, repo_name):
1814 def __call__(self, user, repo_name):
1802 # repo_name MUST be unicode, since we handle keys in permission
1815 # repo_name MUST be unicode, since we handle keys in permission
1803 # dict by unicode
1816 # dict by unicode
1804 repo_name = safe_unicode(repo_name)
1817 repo_name = safe_unicode(repo_name)
1805 user = AuthUser(user.user_id)
1818 user = AuthUser(user.user_id)
1806 log.debug(
1819 log.debug(
1807 'Checking VCS protocol permissions %s for user:%s repo:`%s`',
1820 'Checking VCS protocol permissions %s for user:%s repo:`%s`',
1808 self.required_perms, user, repo_name)
1821 self.required_perms, user, repo_name)
1809
1822
1810 if self.check_permissions(user, repo_name):
1823 if self.check_permissions(user, repo_name):
1811 log.debug('Permission to repo:`%s` GRANTED for user:%s @ %s',
1824 log.debug('Permission to repo:`%s` GRANTED for user:%s @ %s',
1812 repo_name, user, 'PermissionMiddleware')
1825 repo_name, user, 'PermissionMiddleware')
1813 return True
1826 return True
1814
1827
1815 else:
1828 else:
1816 log.debug('Permission to repo:`%s` DENIED for user:%s @ %s',
1829 log.debug('Permission to repo:`%s` DENIED for user:%s @ %s',
1817 repo_name, user, 'PermissionMiddleware')
1830 repo_name, user, 'PermissionMiddleware')
1818 return False
1831 return False
1819
1832
1820 def check_permissions(self, user, repo_name):
1833 def check_permissions(self, user, repo_name):
1821 perms = user.permissions_with_scope({'repo_name': repo_name})
1834 perms = user.permissions_with_scope({'repo_name': repo_name})
1822
1835
1823 try:
1836 try:
1824 user_perms = set([perms['repositories'][repo_name]])
1837 user_perms = set([perms['repositories'][repo_name]])
1825 except Exception:
1838 except Exception:
1826 log.exception('Error while accessing user permissions')
1839 log.exception('Error while accessing user permissions')
1827 return False
1840 return False
1828
1841
1829 if self.required_perms.intersection(user_perms):
1842 if self.required_perms.intersection(user_perms):
1830 return True
1843 return True
1831 return False
1844 return False
1832
1845
1833
1846
1834 # SPECIAL VERSION TO HANDLE API AUTH
1847 # SPECIAL VERSION TO HANDLE API AUTH
1835 class _BaseApiPerm(object):
1848 class _BaseApiPerm(object):
1836 def __init__(self, *perms):
1849 def __init__(self, *perms):
1837 self.required_perms = set(perms)
1850 self.required_perms = set(perms)
1838
1851
1839 def __call__(self, check_location=None, user=None, repo_name=None,
1852 def __call__(self, check_location=None, user=None, repo_name=None,
1840 group_name=None, user_group_name=None):
1853 group_name=None, user_group_name=None):
1841 cls_name = self.__class__.__name__
1854 cls_name = self.__class__.__name__
1842 check_scope = 'global:%s' % (self.required_perms,)
1855 check_scope = 'global:%s' % (self.required_perms,)
1843 if repo_name:
1856 if repo_name:
1844 check_scope += ', repo_name:%s' % (repo_name,)
1857 check_scope += ', repo_name:%s' % (repo_name,)
1845
1858
1846 if group_name:
1859 if group_name:
1847 check_scope += ', repo_group_name:%s' % (group_name,)
1860 check_scope += ', repo_group_name:%s' % (group_name,)
1848
1861
1849 if user_group_name:
1862 if user_group_name:
1850 check_scope += ', user_group_name:%s' % (user_group_name,)
1863 check_scope += ', user_group_name:%s' % (user_group_name,)
1851
1864
1852 log.debug(
1865 log.debug(
1853 'checking cls:%s %s %s @ %s'
1866 'checking cls:%s %s %s @ %s'
1854 % (cls_name, self.required_perms, check_scope, check_location))
1867 % (cls_name, self.required_perms, check_scope, check_location))
1855 if not user:
1868 if not user:
1856 log.debug('Empty User passed into arguments')
1869 log.debug('Empty User passed into arguments')
1857 return False
1870 return False
1858
1871
1859 # process user
1872 # process user
1860 if not isinstance(user, AuthUser):
1873 if not isinstance(user, AuthUser):
1861 user = AuthUser(user.user_id)
1874 user = AuthUser(user.user_id)
1862 if not check_location:
1875 if not check_location:
1863 check_location = 'unspecified'
1876 check_location = 'unspecified'
1864 if self.check_permissions(user.permissions, repo_name, group_name,
1877 if self.check_permissions(user.permissions, repo_name, group_name,
1865 user_group_name):
1878 user_group_name):
1866 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1879 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1867 check_scope, user, check_location)
1880 check_scope, user, check_location)
1868 return True
1881 return True
1869
1882
1870 else:
1883 else:
1871 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1884 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1872 check_scope, user, check_location)
1885 check_scope, user, check_location)
1873 return False
1886 return False
1874
1887
1875 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1888 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1876 user_group_name=None):
1889 user_group_name=None):
1877 """
1890 """
1878 implement in child class should return True if permissions are ok,
1891 implement in child class should return True if permissions are ok,
1879 False otherwise
1892 False otherwise
1880
1893
1881 :param perm_defs: dict with permission definitions
1894 :param perm_defs: dict with permission definitions
1882 :param repo_name: repo name
1895 :param repo_name: repo name
1883 """
1896 """
1884 raise NotImplementedError()
1897 raise NotImplementedError()
1885
1898
1886
1899
1887 class HasPermissionAllApi(_BaseApiPerm):
1900 class HasPermissionAllApi(_BaseApiPerm):
1888 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1901 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1889 user_group_name=None):
1902 user_group_name=None):
1890 if self.required_perms.issubset(perm_defs.get('global')):
1903 if self.required_perms.issubset(perm_defs.get('global')):
1891 return True
1904 return True
1892 return False
1905 return False
1893
1906
1894
1907
1895 class HasPermissionAnyApi(_BaseApiPerm):
1908 class HasPermissionAnyApi(_BaseApiPerm):
1896 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1909 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1897 user_group_name=None):
1910 user_group_name=None):
1898 if self.required_perms.intersection(perm_defs.get('global')):
1911 if self.required_perms.intersection(perm_defs.get('global')):
1899 return True
1912 return True
1900 return False
1913 return False
1901
1914
1902
1915
1903 class HasRepoPermissionAllApi(_BaseApiPerm):
1916 class HasRepoPermissionAllApi(_BaseApiPerm):
1904 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1917 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1905 user_group_name=None):
1918 user_group_name=None):
1906 try:
1919 try:
1907 _user_perms = set([perm_defs['repositories'][repo_name]])
1920 _user_perms = set([perm_defs['repositories'][repo_name]])
1908 except KeyError:
1921 except KeyError:
1909 log.warning(traceback.format_exc())
1922 log.warning(traceback.format_exc())
1910 return False
1923 return False
1911 if self.required_perms.issubset(_user_perms):
1924 if self.required_perms.issubset(_user_perms):
1912 return True
1925 return True
1913 return False
1926 return False
1914
1927
1915
1928
1916 class HasRepoPermissionAnyApi(_BaseApiPerm):
1929 class HasRepoPermissionAnyApi(_BaseApiPerm):
1917 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1930 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1918 user_group_name=None):
1931 user_group_name=None):
1919 try:
1932 try:
1920 _user_perms = set([perm_defs['repositories'][repo_name]])
1933 _user_perms = set([perm_defs['repositories'][repo_name]])
1921 except KeyError:
1934 except KeyError:
1922 log.warning(traceback.format_exc())
1935 log.warning(traceback.format_exc())
1923 return False
1936 return False
1924 if self.required_perms.intersection(_user_perms):
1937 if self.required_perms.intersection(_user_perms):
1925 return True
1938 return True
1926 return False
1939 return False
1927
1940
1928
1941
1929 class HasRepoGroupPermissionAnyApi(_BaseApiPerm):
1942 class HasRepoGroupPermissionAnyApi(_BaseApiPerm):
1930 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1943 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1931 user_group_name=None):
1944 user_group_name=None):
1932 try:
1945 try:
1933 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1946 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1934 except KeyError:
1947 except KeyError:
1935 log.warning(traceback.format_exc())
1948 log.warning(traceback.format_exc())
1936 return False
1949 return False
1937 if self.required_perms.intersection(_user_perms):
1950 if self.required_perms.intersection(_user_perms):
1938 return True
1951 return True
1939 return False
1952 return False
1940
1953
1941
1954
1942 class HasRepoGroupPermissionAllApi(_BaseApiPerm):
1955 class HasRepoGroupPermissionAllApi(_BaseApiPerm):
1943 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1956 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1944 user_group_name=None):
1957 user_group_name=None):
1945 try:
1958 try:
1946 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1959 _user_perms = set([perm_defs['repositories_groups'][group_name]])
1947 except KeyError:
1960 except KeyError:
1948 log.warning(traceback.format_exc())
1961 log.warning(traceback.format_exc())
1949 return False
1962 return False
1950 if self.required_perms.issubset(_user_perms):
1963 if self.required_perms.issubset(_user_perms):
1951 return True
1964 return True
1952 return False
1965 return False
1953
1966
1954
1967
1955 class HasUserGroupPermissionAnyApi(_BaseApiPerm):
1968 class HasUserGroupPermissionAnyApi(_BaseApiPerm):
1956 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1969 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
1957 user_group_name=None):
1970 user_group_name=None):
1958 try:
1971 try:
1959 _user_perms = set([perm_defs['user_groups'][user_group_name]])
1972 _user_perms = set([perm_defs['user_groups'][user_group_name]])
1960 except KeyError:
1973 except KeyError:
1961 log.warning(traceback.format_exc())
1974 log.warning(traceback.format_exc())
1962 return False
1975 return False
1963 if self.required_perms.intersection(_user_perms):
1976 if self.required_perms.intersection(_user_perms):
1964 return True
1977 return True
1965 return False
1978 return False
1966
1979
1967
1980
1968 def check_ip_access(source_ip, allowed_ips=None):
1981 def check_ip_access(source_ip, allowed_ips=None):
1969 """
1982 """
1970 Checks if source_ip is a subnet of any of allowed_ips.
1983 Checks if source_ip is a subnet of any of allowed_ips.
1971
1984
1972 :param source_ip:
1985 :param source_ip:
1973 :param allowed_ips: list of allowed ips together with mask
1986 :param allowed_ips: list of allowed ips together with mask
1974 """
1987 """
1975 log.debug('checking if ip:%s is subnet of %s' % (source_ip, allowed_ips))
1988 log.debug('checking if ip:%s is subnet of %s' % (source_ip, allowed_ips))
1976 source_ip_address = ipaddress.ip_address(source_ip)
1989 source_ip_address = ipaddress.ip_address(source_ip)
1977 if isinstance(allowed_ips, (tuple, list, set)):
1990 if isinstance(allowed_ips, (tuple, list, set)):
1978 for ip in allowed_ips:
1991 for ip in allowed_ips:
1979 try:
1992 try:
1980 network_address = ipaddress.ip_network(ip, strict=False)
1993 network_address = ipaddress.ip_network(ip, strict=False)
1981 if source_ip_address in network_address:
1994 if source_ip_address in network_address:
1982 log.debug('IP %s is network %s' %
1995 log.debug('IP %s is network %s' %
1983 (source_ip_address, network_address))
1996 (source_ip_address, network_address))
1984 return True
1997 return True
1985 # for any case we cannot determine the IP, don't crash just
1998 # for any case we cannot determine the IP, don't crash just
1986 # skip it and log as error, we want to say forbidden still when
1999 # skip it and log as error, we want to say forbidden still when
1987 # sending bad IP
2000 # sending bad IP
1988 except Exception:
2001 except Exception:
1989 log.error(traceback.format_exc())
2002 log.error(traceback.format_exc())
1990 continue
2003 continue
1991 return False
2004 return False
1992
2005
1993
2006
1994 def get_cython_compat_decorator(wrapper, func):
2007 def get_cython_compat_decorator(wrapper, func):
1995 """
2008 """
1996 Creates a cython compatible decorator. The previously used
2009 Creates a cython compatible decorator. The previously used
1997 decorator.decorator() function seems to be incompatible with cython.
2010 decorator.decorator() function seems to be incompatible with cython.
1998
2011
1999 :param wrapper: __wrapper method of the decorator class
2012 :param wrapper: __wrapper method of the decorator class
2000 :param func: decorated function
2013 :param func: decorated function
2001 """
2014 """
2002 @wraps(func)
2015 @wraps(func)
2003 def local_wrapper(*args, **kwds):
2016 def local_wrapper(*args, **kwds):
2004 return wrapper(func, *args, **kwds)
2017 return wrapper(func, *args, **kwds)
2005 local_wrapper.__wrapped__ = func
2018 local_wrapper.__wrapped__ = func
2006 return local_wrapper
2019 return local_wrapper
2007
2020
2008
2021
General Comments 0
You need to be logged in to leave comments. Login now