views.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298
  1. #!/usr/bin/env python
  2. # Licensed to Cloudera, Inc. under one
  3. # or more contributor license agreements. See the NOTICE file
  4. # distributed with this work for additional information
  5. # regarding copyright ownership. Cloudera, Inc. licenses this file
  6. # to you under the Apache License, Version 2.0 (the
  7. # "License"); you may not use this file except in compliance
  8. # with the License. You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing, software
  13. # distributed under the License is distributed on an "AS IS" BASIS,
  14. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. # See the License for the specific language governing permissions and
  16. # limitations under the License.
  17. try:
  18. import oauth2 as oauth
  19. except:
  20. oauth = None
  21. import cgi
  22. import logging
  23. import urllib
  24. from datetime import datetime
  25. from axes.decorators import watch_login
  26. import django.contrib.auth.views
  27. from django.core import urlresolvers
  28. from django.core.exceptions import SuspiciousOperation
  29. from django.contrib.auth import login, get_backends, authenticate
  30. from django.contrib.auth.models import User
  31. from django.contrib.sessions.models import Session
  32. from django.http import HttpResponseRedirect
  33. from django.utils.translation import ugettext as _
  34. from desktop.auth import forms as auth_forms
  35. from desktop.auth.backend import OIDCBackend
  36. from desktop.auth.forms import ImpersonationAuthenticationForm
  37. from desktop.lib.django_util import render
  38. from desktop.lib.django_util import login_notrequired
  39. from desktop.lib.django_util import JsonResponse
  40. from desktop.log.access import access_log, access_warn, last_access_map
  41. from desktop.conf import OAUTH
  42. from desktop.settings import LOAD_BALANCER_COOKIE
  43. from hadoop.fs.exceptions import WebHdfsException
  44. from useradmin.models import get_profile, UserProfile
  45. from useradmin.views import ensure_home_directory, require_change_password
  46. from notebook.connectors.base import get_api
  47. LOG = logging.getLogger(__name__)
  48. def get_current_users():
  49. """Return dictionary of User objects and
  50. a dictionary of the user's IP address and last access time"""
  51. current_users = { }
  52. for session in Session.objects.all():
  53. try:
  54. uid = session.get_decoded().get(django.contrib.auth.SESSION_KEY)
  55. except SuspiciousOperation:
  56. # If secret_key changed, this resolution won't work.
  57. uid = None
  58. if uid is not None:
  59. try:
  60. userobj = User.objects.get(pk=uid)
  61. current_users[userobj] = last_access_map.get(userobj.username, { })
  62. except User.DoesNotExist:
  63. LOG.debug("User with id=%d does not exist" % uid)
  64. return current_users
  65. def first_login_ever():
  66. backends = get_backends()
  67. for backend in backends:
  68. if hasattr(backend, 'is_first_login_ever') and backend.is_first_login_ever():
  69. return True
  70. return False
  71. # We want unique method name to represent HUE-3 vs HUE-4 method call. This is required because of urlresolvers.reverse('desktop.auth.views.dt_login') below which needs uniqueness to work correctly
  72. @login_notrequired
  73. def dt_login_old(request, from_modal=False):
  74. return dt_login(request, from_modal)
  75. @login_notrequired
  76. @watch_login
  77. def dt_login(request, from_modal=False):
  78. redirect_to = request.GET.get('next', '/')
  79. is_first_login_ever = first_login_ever()
  80. backend_names = auth_forms.get_backend_names()
  81. is_active_directory = auth_forms.is_active_directory()
  82. is_ldap_option_selected = 'server' not in request.POST or request.POST.get('server') == 'LDAP' \
  83. or request.POST.get('server') in auth_forms.get_ldap_server_keys()
  84. if is_active_directory and is_ldap_option_selected:
  85. UserCreationForm = auth_forms.LdapUserCreationForm
  86. AuthenticationForm = auth_forms.LdapAuthenticationForm
  87. else:
  88. UserCreationForm = auth_forms.UserCreationForm
  89. if 'ImpersonationBackend' in backend_names:
  90. AuthenticationForm = ImpersonationAuthenticationForm
  91. else:
  92. AuthenticationForm = auth_forms.AuthenticationForm
  93. if request.method == 'POST':
  94. request.audit = {
  95. 'operation': 'USER_LOGIN',
  96. 'username': request.POST.get('username')
  97. }
  98. # For first login, need to validate user info!
  99. first_user_form = is_first_login_ever and UserCreationForm(data=request.POST) or None
  100. first_user = first_user_form and first_user_form.is_valid()
  101. if first_user or not is_first_login_ever:
  102. auth_form = AuthenticationForm(data=request.POST)
  103. if auth_form.is_valid():
  104. # Must login by using the AuthenticationForm. It provides 'backends' on the User object.
  105. user = auth_form.get_user()
  106. userprofile = get_profile(user)
  107. login(request, user)
  108. if request.session.test_cookie_worked():
  109. request.session.delete_test_cookie()
  110. try:
  111. ensure_home_directory(request.fs, user)
  112. except (IOError, WebHdfsException), e:
  113. LOG.error('Could not create home directory at login for %s.' % user, exc_info=e)
  114. if require_change_password(userprofile):
  115. return HttpResponseRedirect(urlresolvers.reverse('useradmin.views.edit_user', kwargs={'username': user.username}))
  116. userprofile.first_login = False
  117. userprofile.last_activity = datetime.now()
  118. # This is to fix a bug in Hue 4.3
  119. if userprofile.creation_method == UserProfile.CreationMethod.EXTERNAL:
  120. userprofile.creation_method = UserProfile.CreationMethod.EXTERNAL.name
  121. userprofile.save()
  122. msg = 'Successful login for user: %s' % user.username
  123. request.audit['operationText'] = msg
  124. access_warn(request, msg)
  125. if from_modal or request.GET.get('fromModal', 'false') == 'true':
  126. return JsonResponse({'auth': True})
  127. else:
  128. return HttpResponseRedirect(redirect_to)
  129. else:
  130. request.audit['allowed'] = False
  131. msg = 'Failed login for user: %s' % request.POST.get('username')
  132. request.audit['operationText'] = msg
  133. access_warn(request, msg)
  134. if from_modal or request.GET.get('fromModal', 'false') == 'true':
  135. return JsonResponse({'auth': False})
  136. else:
  137. first_user_form = None
  138. auth_form = AuthenticationForm()
  139. # SAML/OIDC user is already authenticated in djangosaml2.views.login
  140. if hasattr(request,'fs') and ('SpnegoDjangoBackend' in backend_names or 'OIDCBackend' in backend_names or 'SAML2Backend' in backend_names) and request.user.is_authenticated():
  141. try:
  142. ensure_home_directory(request.fs, request.user)
  143. except (IOError, WebHdfsException), e:
  144. LOG.error('Could not create home directory for %s user %s.' % ('OIDC' if 'OIDCBackend' in backend_names else 'SAML', request.user))
  145. if is_active_directory and not is_ldap_option_selected and \
  146. request.method == 'POST' and request.user.username != request.POST.get('username'):
  147. # local user login failed, give the right auth_form with 'server' field
  148. auth_form = auth_forms.LdapAuthenticationForm()
  149. if not from_modal:
  150. request.session.set_test_cookie()
  151. renderable_path = 'login.mako'
  152. if from_modal:
  153. renderable_path = 'login_modal.mako'
  154. response = render(renderable_path, request, {
  155. 'action': urlresolvers.reverse('desktop_auth_views_dt_login'),
  156. 'form': first_user_form or auth_form,
  157. 'next': redirect_to,
  158. 'first_login_ever': is_first_login_ever,
  159. 'login_errors': request.method == 'POST',
  160. 'backend_names': backend_names,
  161. 'active_directory': is_active_directory
  162. })
  163. if not request.user.is_authenticated():
  164. response.delete_cookie(LOAD_BALANCER_COOKIE) # Note: might be re-balanced to another Hue on login.
  165. return response
  166. def dt_logout(request, next_page=None):
  167. """Log out the user"""
  168. username = request.user.get_username()
  169. request.audit = {
  170. 'username': username,
  171. 'operation': 'USER_LOGOUT',
  172. 'operationText': 'Logged out user: %s' % username
  173. }
  174. # Close Impala session on logout
  175. session_app = "impala"
  176. if request.user.has_hue_permission(action='access', app=session_app):
  177. session = {"type":session_app,"sourceMethod":"dt_logout"}
  178. try:
  179. get_api(request, session).close_session(session)
  180. except Exception, e:
  181. LOG.warn("Error closing Impala session: %s" % e)
  182. backends = get_backends()
  183. if backends:
  184. for backend in backends:
  185. if hasattr(backend, 'logout'):
  186. try:
  187. response = backend.logout(request, next_page)
  188. if response:
  189. return response
  190. except Exception, e:
  191. LOG.warn('Potential error on logout for user: %s with exception: %s' % (username, e))
  192. if len(filter(lambda backend: hasattr(backend, 'logout'), backends)) == len(backends):
  193. LOG.warn("Failed to log out from all backends for user: %s" % (username))
  194. response = django.contrib.auth.views.logout(request, next_page)
  195. response.delete_cookie(LOAD_BALANCER_COOKIE)
  196. return response
  197. def profile(request):
  198. """
  199. Dumps JSON for user-profile information.
  200. """
  201. return render(None, request, _profile_dict(request.user))
  202. def _profile_dict(user):
  203. return dict(
  204. username=user.username,
  205. first_name=user.first_name,
  206. last_name=user.last_name,
  207. last_login=str(user.last_login), # datetime object needs to be converted
  208. email=user.email)
  209. # OAuth is based on Twitter as example.
  210. @login_notrequired
  211. def oauth_login(request):
  212. assert oauth is not None
  213. consumer = oauth.Consumer(OAUTH.CONSUMER_KEY.get(), OAUTH.CONSUMER_SECRET.get())
  214. client = oauth.Client(consumer)
  215. resp, content = client.request(OAUTH.REQUEST_TOKEN_URL.get(), "POST", body=urllib.urlencode({
  216. 'oauth_callback': 'http://' + request.get_host() + '/login/oauth_authenticated/'
  217. }))
  218. if resp['status'] != '200':
  219. raise Exception(_("Invalid response from OAuth provider: %s") % resp)
  220. request.session['request_token'] = dict(cgi.parse_qsl(content))
  221. url = "%s?oauth_token=%s" % (OAUTH.AUTHENTICATE_URL.get(), request.session['request_token']['oauth_token'])
  222. return HttpResponseRedirect(url)
  223. @login_notrequired
  224. def oauth_authenticated(request):
  225. consumer = oauth.Consumer(OAUTH.CONSUMER_KEY.get(), OAUTH.CONSUMER_SECRET.get())
  226. token = oauth.Token(request.session['request_token']['oauth_token'], request.session['request_token']['oauth_token_secret'])
  227. client = oauth.Client(consumer, token)
  228. resp, content = client.request(OAUTH.ACCESS_TOKEN_URL.get(), "GET")
  229. if resp['status'] != '200':
  230. raise Exception(_("Invalid response from OAuth provider: %s") % resp)
  231. access_token = dict(cgi.parse_qsl(content))
  232. user = authenticate(access_token=access_token)
  233. login(request, user)
  234. redirect_to = request.GET.get('next', '/')
  235. return HttpResponseRedirect(redirect_to)
  236. @login_notrequired
  237. def oidc_failed(request):
  238. if request.user.is_authenticated():
  239. return HttpResponseRedirect('/')
  240. access_warn(request, "401 Unauthorized by oidc")
  241. return render("oidc_failed.mako", request, dict(uri=request.build_absolute_uri()), status=401)