Code factorisation in views.py
This commit is contained in:
parent
d46428520f
commit
aaadca15b7
@ -45,6 +45,7 @@ logger = logging.getLogger(__name__)
|
|||||||
|
|
||||||
class LogoutMixin(object):
|
class LogoutMixin(object):
|
||||||
"""destroy CAS session utils"""
|
"""destroy CAS session utils"""
|
||||||
|
|
||||||
def logout(self, all_session=False):
|
def logout(self, all_session=False):
|
||||||
"""
|
"""
|
||||||
effectively destroy a CAS session
|
effectively destroy a CAS session
|
||||||
@ -63,28 +64,25 @@ class LogoutMixin(object):
|
|||||||
logger.info("Logging out user %s from all of they sessions." % username)
|
logger.info("Logging out user %s from all of they sessions." % username)
|
||||||
else:
|
else:
|
||||||
logger.info("Logging out user %s." % username)
|
logger.info("Logging out user %s." % username)
|
||||||
# logout the user from the current session
|
users = []
|
||||||
|
# try to get the user from the current session
|
||||||
try:
|
try:
|
||||||
user = models.User.objects.get(
|
users.append(
|
||||||
|
models.User.objects.get(
|
||||||
username=username,
|
username=username,
|
||||||
session_key=self.request.session.session_key
|
session_key=self.request.session.session_key
|
||||||
)
|
)
|
||||||
# flush the session
|
)
|
||||||
self.request.session.flush()
|
|
||||||
# send SLO requests
|
|
||||||
user.logout(self.request)
|
|
||||||
# delete the user
|
|
||||||
user.delete()
|
|
||||||
# increment the destroyed session counter
|
|
||||||
session_nb += 1
|
|
||||||
except models.User.DoesNotExist:
|
except models.User.DoesNotExist:
|
||||||
# if user not found in database, flush the session anyway
|
# if user not found in database, flush the session anyway
|
||||||
self.request.session.flush()
|
self.request.session.flush()
|
||||||
|
|
||||||
# If all_session is set logout user from alternative sessions
|
# If all_session is set, search all of the user sessions
|
||||||
if all_session:
|
if all_session:
|
||||||
# Iterate over all user sessions
|
users.extend(models.User.objects.filter(username=username))
|
||||||
for user in models.User.objects.filter(username=username):
|
|
||||||
|
# Iterate over all user sessions that have to be logged out
|
||||||
|
for user in users:
|
||||||
# get the user session
|
# get the user session
|
||||||
session = SessionStore(session_key=user.session_key)
|
session = SessionStore(session_key=user.session_key)
|
||||||
# flush the session
|
# flush the session
|
||||||
@ -100,6 +98,19 @@ class LogoutMixin(object):
|
|||||||
return session_nb
|
return session_nb
|
||||||
|
|
||||||
|
|
||||||
|
class CsrfExemptView(View):
|
||||||
|
"""base class for csrf exempt class views"""
|
||||||
|
|
||||||
|
@method_decorator(csrf_exempt) # csrf is disabled for allowing SLO requests reception
|
||||||
|
def dispatch(self, request, *args, **kwargs):
|
||||||
|
"""
|
||||||
|
dispatch different http request to the methods of the same name
|
||||||
|
|
||||||
|
:param django.http.HttpRequest request: The current request object
|
||||||
|
"""
|
||||||
|
return super(CsrfExemptView, self).dispatch(request, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
class LogoutView(View, LogoutMixin):
|
class LogoutView(View, LogoutMixin):
|
||||||
"""destroy CAS session (logout) view"""
|
"""destroy CAS session (logout) view"""
|
||||||
|
|
||||||
@ -210,17 +221,12 @@ class LogoutView(View, LogoutMixin):
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
class FederateAuth(View):
|
class FederateAuth(CsrfExemptView):
|
||||||
"""view to authenticated user agains a backend CAS then CAS_FEDERATE is True"""
|
|
||||||
|
|
||||||
@method_decorator(csrf_exempt) # csrf is disabled for allowing SLO requests reception
|
|
||||||
def dispatch(self, request, *args, **kwargs):
|
|
||||||
"""
|
"""
|
||||||
dispatch different http request to the methods of the same name
|
view to authenticated user agains a backend CAS then CAS_FEDERATE is True
|
||||||
|
|
||||||
:param django.http.HttpRequest request: The current request object
|
csrf is disabled for allowing SLO requests reception.
|
||||||
"""
|
"""
|
||||||
return super(FederateAuth, self).dispatch(request, *args, **kwargs)
|
|
||||||
|
|
||||||
def get_cas_client(self, request, provider, renew=False):
|
def get_cas_client(self, request, provider, renew=False):
|
||||||
"""
|
"""
|
||||||
@ -923,18 +929,13 @@ class LoginView(View, LogoutMixin):
|
|||||||
return self.not_authenticated()
|
return self.not_authenticated()
|
||||||
|
|
||||||
|
|
||||||
class Auth(View):
|
class Auth(CsrfExemptView):
|
||||||
"""A simple view to validate username/password/service tuple"""
|
|
||||||
# csrf is disable as it is intended to be used by programs. Security is assured by a shared
|
|
||||||
# secret between the programs dans django-cas-server.
|
|
||||||
@method_decorator(csrf_exempt)
|
|
||||||
def dispatch(self, request, *args, **kwargs):
|
|
||||||
"""
|
"""
|
||||||
dispatch requests based on method GET, POST, ...
|
A simple view to validate username/password/service tuple
|
||||||
|
|
||||||
:param django.http.HttpRequest request: The current request object
|
csrf is disable as it is intended to be used by programs. Security is assured by a shared
|
||||||
|
secret between the programs dans django-cas-server.
|
||||||
"""
|
"""
|
||||||
return super(Auth, self).dispatch(request, *args, **kwargs)
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def post(request):
|
def post(request):
|
||||||
@ -1041,8 +1042,9 @@ class Validate(View):
|
|||||||
|
|
||||||
|
|
||||||
@python_2_unicode_compatible
|
@python_2_unicode_compatible
|
||||||
class ValidateError(Exception):
|
class ValidationBaseError(Exception):
|
||||||
"""handle service validation error"""
|
"""Base class for both saml and cas validation error"""
|
||||||
|
|
||||||
#: The error code
|
#: The error code
|
||||||
code = None
|
code = None
|
||||||
#: The error message
|
#: The error message
|
||||||
@ -1064,12 +1066,23 @@ class ValidateError(Exception):
|
|||||||
:return: the rendered ``cas_server/serviceValidateError.xml`` template
|
:return: the rendered ``cas_server/serviceValidateError.xml`` template
|
||||||
:rtype: django.http.HttpResponse
|
:rtype: django.http.HttpResponse
|
||||||
"""
|
"""
|
||||||
return render(
|
return render(request, self.template, self.contex(), content_type="text/xml; charset=utf-8")
|
||||||
request,
|
|
||||||
"cas_server/serviceValidateError.xml",
|
|
||||||
{'code': self.code, 'msg': self.msg},
|
class ValidateError(ValidationBaseError):
|
||||||
content_type="text/xml; charset=utf-8"
|
"""handle service validation error"""
|
||||||
)
|
|
||||||
|
#: template to be render for the error
|
||||||
|
template = "cas_server/serviceValidateError.xml"
|
||||||
|
|
||||||
|
def context(self):
|
||||||
|
"""
|
||||||
|
content to use to render :attr:`template`
|
||||||
|
|
||||||
|
:return: A dictionary to contextualize :attr:`template`
|
||||||
|
:rtype: dict
|
||||||
|
"""
|
||||||
|
return {'code': self.code, 'msg': self.msg}
|
||||||
|
|
||||||
|
|
||||||
class ValidateService(View):
|
class ValidateService(View):
|
||||||
@ -1333,59 +1346,32 @@ class Proxy(View):
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@python_2_unicode_compatible
|
class SamlValidateError(ValidationBaseError):
|
||||||
class SamlValidateError(Exception):
|
|
||||||
"""handle saml validation error"""
|
"""handle saml validation error"""
|
||||||
#: The error code
|
|
||||||
code = None
|
|
||||||
#: The error message
|
|
||||||
msg = None
|
|
||||||
|
|
||||||
def __init__(self, code, msg=""):
|
#: template to be render for the error
|
||||||
self.code = code
|
template = "cas_server/samlValidateError.xml"
|
||||||
self.msg = msg
|
|
||||||
super(SamlValidateError, self).__init__(code)
|
|
||||||
|
|
||||||
def __str__(self):
|
def context(self):
|
||||||
return u"%s" % self.msg
|
|
||||||
|
|
||||||
def render(self, request):
|
|
||||||
"""
|
"""
|
||||||
render the error template for the exception
|
:return: A dictionary to contextualize :attr:`template`
|
||||||
|
:rtype: dict
|
||||||
:param django.http.HttpRequest request: The current request object:
|
|
||||||
:return: the rendered ``cas_server/samlValidateError.xml`` template
|
|
||||||
:rtype: django.http.HttpResponse
|
|
||||||
"""
|
"""
|
||||||
return render(
|
return {
|
||||||
request,
|
|
||||||
"cas_server/samlValidateError.xml",
|
|
||||||
{
|
|
||||||
'code': self.code,
|
'code': self.code,
|
||||||
'msg': self.msg,
|
'msg': self.msg,
|
||||||
'IssueInstant': timezone.now().isoformat(),
|
'IssueInstant': timezone.now().isoformat(),
|
||||||
'ResponseID': utils.gen_saml_id()
|
'ResponseID': utils.gen_saml_id()
|
||||||
},
|
}
|
||||||
content_type="text/xml; charset=utf-8"
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class SamlValidate(View):
|
class SamlValidate(CsrfExemptView):
|
||||||
"""SAML ticket validation"""
|
"""SAML ticket validation"""
|
||||||
request = None
|
request = None
|
||||||
target = None
|
target = None
|
||||||
ticket = None
|
ticket = None
|
||||||
root = None
|
root = None
|
||||||
|
|
||||||
@method_decorator(csrf_exempt)
|
|
||||||
def dispatch(self, request, *args, **kwargs):
|
|
||||||
"""
|
|
||||||
dispatch requests based on method GET, POST, ...
|
|
||||||
|
|
||||||
:param django.http.HttpRequest request: The current request object
|
|
||||||
"""
|
|
||||||
return super(SamlValidate, self).dispatch(request, *args, **kwargs)
|
|
||||||
|
|
||||||
def post(self, request):
|
def post(self, request):
|
||||||
"""
|
"""
|
||||||
methode called on POST request on this view
|
methode called on POST request on this view
|
||||||
|
Loading…
Reference in New Issue
Block a user