File: security.py

package info (click to toggle)
lava 2026.01-2
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 30,796 kB
  • sloc: python: 82,790; javascript: 16,658; sh: 1,364; makefile: 335
file content (114 lines) | stat: -rw-r--r-- 3,462 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
# Copyright (C) 2022 Collabora Limited
#
# Author: Igor Ponomarev <igor.ponomarev@collabora.com>
#
# SPDX-License-Identifier: GPL-2.0-or-later
from __future__ import annotations

from base64 import b64decode
from pathlib import PurePosixPath
from typing import ClassVar

from django.conf import settings
from django.contrib.auth.decorators import login_required

from linaro_django_xmlrpc.models import AuthToken


class LavaRequireLoginMiddleware:
    HOME_PATH: ClassVar[PurePosixPath] = PurePosixPath("/") / settings.MOUNT_POINT
    LOGIN_PATH: ClassVar[PurePosixPath] = PurePosixPath(settings.LOGIN_URL)
    HEALTHZ_PATH: ClassVar[PurePosixPath] = HOME_PATH / "v1/healthz"
    SYSTEM_VERSION_PATH: ClassVar[PurePosixPath] = HOME_PATH / "api/v0.2/system/version"
    # Token authenticated paths
    XMLRPC_PATH: ClassVar[PurePosixPath] = HOME_PATH / "RPC2"
    REST_API_PATH: ClassVar[PurePosixPath] = HOME_PATH / "api"

    SCHEDULER_INTERNALS_PATH: ClassVar[PurePosixPath] = (
        HOME_PATH / "scheduler/internal/v1"
    )
    OIDC_PATH: ClassVar[PurePosixPath] = HOME_PATH / "oidc"

    def __init__(self, get_response):
        self.get_response = get_response
        self.require_login = login_required(get_response)

    @classmethod
    def is_login_not_required(cls, path: PurePosixPath) -> bool:
        if path in [
            cls.HEALTHZ_PATH,
            cls.HOME_PATH,
            cls.LOGIN_PATH,
            cls.SYSTEM_VERSION_PATH,
        ]:
            return True

        if path.is_relative_to(cls.SCHEDULER_INTERNALS_PATH):
            return True

        if settings.OIDC_ENABLED:
            if path.is_relative_to(cls.OIDC_PATH):
                return True

        return False

    @classmethod
    def is_token_authenticated_path(cls, path: PurePosixPath) -> bool:
        if path.is_relative_to(cls.XMLRPC_PATH):
            return True

        if path.is_relative_to(cls.REST_API_PATH):
            return True

        return False

    @classmethod
    def passthrough_valid_token(cls, auth_header: str) -> bool:
        if not auth_header:
            return False

        try:
            auth_method, auth_value = auth_header.split()
        except ValueError:
            return False

        if auth_method.lower() == "token":
            token_str = auth_value
        elif auth_method.lower() == "basic":
            # HACK: lavacli sends token as a password of basic auth
            try:
                basic_auth_decoded = b64decode(auth_value).decode("utf-8")
            except UnicodeDecodeError:
                return False

            try:
                _, token_str = basic_auth_decoded.split(":")
            except ValueError:
                return False
        else:
            return False

        try:
            token_object = AuthToken.objects.select_related("user").get(
                secret=token_str
            )
        except AuthToken.DoesNotExist:
            return False

        if not token_object.user.is_active:
            return False

        return True

    def __call__(self, request):
        path = PurePosixPath(request.path)

        if self.is_login_not_required(path):
            return self.get_response(request)

        if self.is_token_authenticated_path(path) and self.passthrough_valid_token(
            request.META.get("HTTP_AUTHORIZATION", "")
        ):
            return self.get_response(request)

        return self.require_login(request)