2018-02-27 04:18:36 +00:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
#
|
|
|
|
|
|
|
|
from django.dispatch import receiver
|
2020-04-26 12:36:17 +00:00
|
|
|
from django_auth_ldap.backend import populate_user
|
|
|
|
from django.conf import settings
|
2021-02-26 09:33:11 +00:00
|
|
|
from django.core.exceptions import PermissionDenied
|
2020-03-12 08:24:38 +00:00
|
|
|
from django_cas_ng.signals import cas_user_authenticated
|
2021-05-17 11:32:12 +00:00
|
|
|
from django.db.models.signals import post_save
|
2018-02-27 04:18:36 +00:00
|
|
|
|
2022-02-25 11:23:59 +00:00
|
|
|
from authentication.backends.oidc.signals import openid_create_or_update_user
|
2020-04-26 12:36:17 +00:00
|
|
|
|
2021-12-09 07:47:21 +00:00
|
|
|
from authentication.backends.saml2.signals import saml2_create_or_update_user
|
2018-02-27 04:18:36 +00:00
|
|
|
from common.utils import get_logger
|
2018-04-03 08:28:58 +00:00
|
|
|
from .signals import post_user_create
|
2021-05-17 11:32:12 +00:00
|
|
|
from .models import User, UserPasswordHistory
|
2018-02-27 04:18:36 +00:00
|
|
|
|
2020-04-26 12:36:17 +00:00
|
|
|
|
2018-02-27 04:18:36 +00:00
|
|
|
logger = get_logger(__file__)
|
|
|
|
|
|
|
|
|
2021-12-09 07:47:21 +00:00
|
|
|
def user_authenticated_handle(user, created, source, attrs=None, **kwargs):
|
|
|
|
if created and settings.ONLY_ALLOW_EXIST_USER_AUTH:
|
|
|
|
user.delete()
|
|
|
|
raise PermissionDenied(f'Not allow non-exist user auth: {user.username}')
|
|
|
|
if created:
|
|
|
|
user.source = source
|
|
|
|
user.save()
|
|
|
|
elif not created and settings.AUTH_SAML2_ALWAYS_UPDATE_USER:
|
|
|
|
attr_whitelist = ('user', 'username', 'email', 'phone', 'comment')
|
|
|
|
logger.debug(
|
|
|
|
"Receive saml2 user updated signal: {}, "
|
|
|
|
"Update user info: {},"
|
|
|
|
"(Update only properties in the whitelist. [{}])"
|
|
|
|
"".format(user, str(attrs), ','.join(attr_whitelist))
|
|
|
|
)
|
|
|
|
if attrs is not None:
|
|
|
|
for key, value in attrs.items():
|
|
|
|
if key in attr_whitelist and value:
|
|
|
|
setattr(user, key, value)
|
|
|
|
user.save()
|
|
|
|
|
|
|
|
|
2021-05-17 11:32:12 +00:00
|
|
|
@receiver(post_save, sender=User)
|
|
|
|
def save_passwd_change(sender, instance: User, **kwargs):
|
2022-03-08 05:35:40 +00:00
|
|
|
passwords = UserPasswordHistory.objects.filter(user=instance) \
|
|
|
|
.order_by('-date_created')\
|
|
|
|
.values_list('password', flat=True)
|
|
|
|
passwords = passwords[:int(settings.OLD_PASSWORD_HISTORY_LIMIT_COUNT)]
|
2021-05-17 11:32:12 +00:00
|
|
|
|
2022-03-08 05:35:40 +00:00
|
|
|
for p in passwords:
|
2021-05-17 11:32:12 +00:00
|
|
|
if instance.password == p:
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
UserPasswordHistory.objects.create(
|
|
|
|
user=instance, password=instance.password,
|
|
|
|
date_created=instance.date_password_last_updated
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2018-04-03 08:28:58 +00:00
|
|
|
@receiver(post_user_create)
|
|
|
|
def on_user_create(sender, user=None, **kwargs):
|
|
|
|
logger.debug("Receive user `{}` create signal".format(user.name))
|
|
|
|
from .utils import send_user_created_mail
|
|
|
|
logger.info(" - Sending welcome mail ...".format(user.name))
|
2020-03-13 04:33:09 +00:00
|
|
|
if user.can_send_created_mail():
|
2018-04-03 08:28:58 +00:00
|
|
|
send_user_created_mail(user)
|
2019-11-06 09:18:39 +00:00
|
|
|
|
|
|
|
|
2020-03-12 08:24:38 +00:00
|
|
|
@receiver(cas_user_authenticated)
|
|
|
|
def on_cas_user_authenticated(sender, user, created, **kwargs):
|
2021-12-09 07:47:21 +00:00
|
|
|
source = user.Source.cas.value
|
|
|
|
user_authenticated_handle(user, created, source)
|
|
|
|
|
|
|
|
|
|
|
|
@receiver(saml2_create_or_update_user)
|
|
|
|
def on_saml2_create_or_update_user(sender, user, created, attrs, **kwargs):
|
|
|
|
source = user.Source.saml2.value
|
|
|
|
user_authenticated_handle(user, created, source, attrs, **kwargs)
|
2020-04-26 12:36:17 +00:00
|
|
|
|
|
|
|
|
|
|
|
@receiver(populate_user)
|
|
|
|
def on_ldap_create_user(sender, user, ldap_user, **kwargs):
|
|
|
|
if user and user.username not in ['admin']:
|
|
|
|
exists = User.objects.filter(username=user.username).exists()
|
|
|
|
if not exists:
|
2020-12-09 10:43:13 +00:00
|
|
|
user.source = user.Source.ldap.value
|
2020-04-26 12:36:17 +00:00
|
|
|
user.save()
|
|
|
|
|
|
|
|
|
2020-04-28 14:29:56 +00:00
|
|
|
@receiver(openid_create_or_update_user)
|
|
|
|
def on_openid_create_or_update_user(sender, request, user, created, name, username, email, **kwargs):
|
2021-02-26 09:33:11 +00:00
|
|
|
if created and settings.ONLY_ALLOW_EXIST_USER_AUTH:
|
|
|
|
user.delete()
|
|
|
|
raise PermissionDenied(f'Not allow non-exist user auth: {username}')
|
|
|
|
|
2020-04-28 13:00:22 +00:00
|
|
|
if created:
|
2020-04-28 16:43:54 +00:00
|
|
|
logger.debug(
|
|
|
|
"Receive OpenID user created signal: {}, "
|
2020-12-09 10:43:13 +00:00
|
|
|
"Set user source is: {}".format(user, User.Source.openid.value)
|
2020-04-28 16:43:54 +00:00
|
|
|
)
|
2020-12-09 10:43:13 +00:00
|
|
|
user.source = User.Source.openid.value
|
2020-04-28 13:00:22 +00:00
|
|
|
user.save()
|
2020-04-28 14:29:56 +00:00
|
|
|
elif not created and settings.AUTH_OPENID_ALWAYS_UPDATE_USER:
|
2020-04-28 16:43:54 +00:00
|
|
|
logger.debug(
|
|
|
|
"Receive OpenID user updated signal: {}, "
|
|
|
|
"Update user info: {}"
|
|
|
|
"".format(user, "name: {}|username: {}|email: {}".format(name, username, email))
|
|
|
|
)
|
2020-04-28 13:00:22 +00:00
|
|
|
user.name = name
|
|
|
|
user.username = username
|
|
|
|
user.email = email
|
|
|
|
user.save()
|