mirror of
https://github.com/ZwareBear/awx.git
synced 2026-03-20 15:53:36 -05:00
* Add separate Django app for configuration: awx.conf. * Migrate from existing main.TowerSettings model to conf.Setting. * Add settings wrapper to allow get/set/del via django.conf.settings. * Update existing references to tower_settings to use django.conf.settings. * Add a settings registry to allow for each Django app to register configurable settings. * Support setting validation and conversion using Django REST Framework fields. * Add /api/v1/settings/ to display a list of setting categories. * Add /api/v1/settings/<slug>/ to display all settings in a category as a single object. * Allow PUT/PATCH to update setting singleton, DELETE to reset to defaults. * Add "all" category to display all settings across categories. * Add "changed" category to display only settings configured in the database. * Support per-user settings via "user" category (/api/v1/settings/user/). * Support defaults for user settings via "user-defaults" category (/api/v1/settings/user-defaults/). * Update serializer metadata to support category, category_slug and placeholder on OPTIONS responses. * Update serializer metadata to handle child fields of a list/dict. * Hide raw data form in browsable API for OPTIONS and DELETE. * Combine existing licensing code into single "TaskEnhancer" class. * Move license helper functions from awx.api.license into awx.conf.license. * Update /api/v1/config/ to read/verify/update license using TaskEnhancer and settings wrapper. * Add support for caching settings accessed via settings wrapper. * Invalidate cached settings when Setting model changes or is deleted. * Preload all database settings into cache on first access via settings wrapper. * Add support for read-only settings than can update their value depending on other settings. * Use setting_changed signal whenever a setting changes. * Register configurable authentication, jobs, system and ui settings. * Register configurable LDAP, RADIUS and social auth settings. * Add custom fields and validators for URL, LDAP, RADIUS and social auth settings. * Rewrite existing validator for Credential ssh_private_key to support validating private keys, certs or combinations of both. * Get all unit/functional tests working with above changes. * Add "migrate_to_database_settings" command to determine settings to be migrated into the database and comment them out when set in Python settings files. * Add support for migrating license key from file to database. * Remove database-configuable settings from local_settings.py example files. * Update setup role to no longer install files for database-configurable settings. f 94ff6ee More settings work. f af4c4e0 Even more db settings stuff. f 96ea9c0 More settings, attempt at singleton serializer for settings. f 937c760 More work on singleton/category views in API, add code to comment out settings in Python files, work on command to migrate settings to database. f 425b0d3 Minor fixes for sprint demo. f ea402a4 Add support for read-only settings, cleanup license engine, get license support working with DB settings. f ec289e4 Rename migration, minor fixmes, update setup role. f 603640b Rewrite key/cert validator, finish adding social auth fields, hook up signals for setting_changed, use None to imply a setting is not set. f 67d1b5a Get functional/unit tests passing. f 2919b62 Flake8 fixes. f e62f421 Add redbaron to requirements, get file to database migration working (except for license). f c564508 Add support for migrating license file. f 982f767 Add support for regex in social map fields.
159 lines
5.7 KiB
Python
159 lines
5.7 KiB
Python
# Copyright (c) 2015 Ansible, Inc.
|
|
# All Rights Reserved.
|
|
|
|
# Python
|
|
import urllib
|
|
import logging
|
|
|
|
# Django
|
|
from django.conf import settings
|
|
from django.utils.timezone import now as tz_now
|
|
from django.utils.encoding import smart_text
|
|
|
|
# Django REST Framework
|
|
from rest_framework import authentication
|
|
from rest_framework import exceptions
|
|
from rest_framework import HTTP_HEADER_ENCODING
|
|
|
|
# AWX
|
|
from awx.main.models import UnifiedJob, AuthToken
|
|
|
|
logger = logging.getLogger('awx.api.authentication')
|
|
|
|
class TokenAuthentication(authentication.TokenAuthentication):
|
|
'''
|
|
Custom token authentication using tokens that expire and are associated
|
|
with parameters specific to the request.
|
|
'''
|
|
|
|
model = AuthToken
|
|
|
|
@staticmethod
|
|
def _get_x_auth_token_header(request):
|
|
auth = request.META.get('HTTP_X_AUTH_TOKEN', '')
|
|
if isinstance(auth, type('')):
|
|
# Work around django test client oddness
|
|
auth = auth.encode(HTTP_HEADER_ENCODING)
|
|
return auth
|
|
|
|
@staticmethod
|
|
def _get_auth_token_cookie(request):
|
|
token = request.COOKIES.get('token', '')
|
|
if token:
|
|
token = urllib.unquote(token).strip('"')
|
|
return 'token %s' % token
|
|
return ''
|
|
|
|
def authenticate(self, request):
|
|
self.request = request
|
|
|
|
# Prefer the custom X-Auth-Token header over the Authorization header,
|
|
# to handle cases where the browser submits saved Basic auth and
|
|
# overrides the UI's normal use of the Authorization header.
|
|
auth = TokenAuthentication._get_x_auth_token_header(request).split()
|
|
if not auth or auth[0].lower() != 'token':
|
|
auth = authentication.get_authorization_header(request).split()
|
|
# Prefer basic auth over cookie token
|
|
if auth and auth[0].lower() == 'basic':
|
|
return None
|
|
elif not auth or auth[0].lower() != 'token':
|
|
auth = TokenAuthentication._get_auth_token_cookie(request).split()
|
|
if not auth or auth[0].lower() != 'token':
|
|
return None
|
|
|
|
if len(auth) == 1:
|
|
msg = 'Invalid token header. No credentials provided.'
|
|
raise exceptions.AuthenticationFailed(msg)
|
|
elif len(auth) > 2:
|
|
msg = 'Invalid token header. Token string should not contain spaces.'
|
|
raise exceptions.AuthenticationFailed(msg)
|
|
|
|
return self.authenticate_credentials(auth[1])
|
|
|
|
def authenticate_credentials(self, key):
|
|
now = tz_now()
|
|
# Retrieve the request hash and token.
|
|
try:
|
|
request_hash = self.model.get_request_hash(self.request)
|
|
token = self.model.objects.select_related('user').get(
|
|
key=key,
|
|
request_hash=request_hash,
|
|
)
|
|
except self.model.DoesNotExist:
|
|
raise exceptions.AuthenticationFailed(AuthToken.reason_long('invalid_token'))
|
|
|
|
# Tell the user why their token was previously invalidated.
|
|
if token.invalidated:
|
|
raise exceptions.AuthenticationFailed(AuthToken.reason_long(token.reason))
|
|
|
|
# Explicitly handle expired tokens
|
|
if token.is_expired(now=now):
|
|
token.invalidate(reason='timeout_reached')
|
|
raise exceptions.AuthenticationFailed(AuthToken.reason_long('timeout_reached'))
|
|
|
|
# Token invalidated due to session limit config being reduced
|
|
# Session limit reached invalidation will also take place on authentication
|
|
if settings.AUTH_TOKEN_PER_USER != -1:
|
|
if not token.in_valid_tokens(now=now):
|
|
token.invalidate(reason='limit_reached')
|
|
raise exceptions.AuthenticationFailed(AuthToken.reason_long('limit_reached'))
|
|
|
|
# If the user is inactive, then return an error.
|
|
if not token.user.is_active:
|
|
raise exceptions.AuthenticationFailed('User inactive or deleted')
|
|
|
|
# Refresh the token.
|
|
# The token is extended from "right now" + configurable setting amount.
|
|
token.refresh(now=now)
|
|
|
|
# Return the user object and the token.
|
|
return (token.user, token)
|
|
|
|
|
|
class TokenGetAuthentication(TokenAuthentication):
|
|
|
|
def authenticate(self, request):
|
|
if request.method.lower() == 'get':
|
|
token = request.GET.get('token', None)
|
|
if token:
|
|
request.META['HTTP_X_AUTH_TOKEN'] = 'Token %s' % token
|
|
return super(TokenGetAuthentication, self).authenticate(request)
|
|
|
|
|
|
class LoggedBasicAuthentication(authentication.BasicAuthentication):
|
|
|
|
def authenticate(self, request):
|
|
if not settings.AUTH_BASIC_ENABLED:
|
|
return
|
|
ret = super(LoggedBasicAuthentication, self).authenticate(request)
|
|
if ret:
|
|
username = ret[0].username if ret[0] else '<none>'
|
|
logger.debug(smart_text(u"User {} performed a {} to {} through the API".format(username, request.method, request.path)))
|
|
return ret
|
|
|
|
|
|
class TaskAuthentication(authentication.BaseAuthentication):
|
|
'''
|
|
Custom authentication used for views accessed by the inventory and callback
|
|
scripts when running a task.
|
|
'''
|
|
|
|
model = None
|
|
|
|
def authenticate(self, request):
|
|
auth = authentication.get_authorization_header(request).split()
|
|
if len(auth) != 2 or auth[0].lower() != 'token' or '-' not in auth[1]:
|
|
return None
|
|
pk, key = auth[1].split('-', 1)
|
|
try:
|
|
unified_job = UnifiedJob.objects.get(pk=pk, status='running')
|
|
except UnifiedJob.DoesNotExist:
|
|
return None
|
|
token = unified_job.task_auth_token
|
|
if auth[1] != token:
|
|
raise exceptions.AuthenticationFailed('Invalid task token')
|
|
return (None, token)
|
|
|
|
def authenticate_header(self, request):
|
|
return 'Token'
|