import base64 from django.shortcuts import redirect, reverse, render from django.utils.deprecation import MiddlewareMixin from django.http import HttpResponse from django.conf import settings from django.utils.translation import ugettext as _ from django.contrib.auth import logout as auth_logout from apps.authentication import mixins from common.utils import gen_key_pair from common.utils import get_request_ip from .signals import post_auth_failed class MFAMiddleware: """ 这个 中间件 是用来全局拦截开启了 MFA 却没有认证的,如 OIDC, CAS,使用第三方库做的登录,直接 login 了, 所以只能在 Middleware 中控制 """ def __init__(self, get_response): self.get_response = get_response def __call__(self, request): response = self.get_response(request) # 没有校验 if not request.session.get('auth_mfa_required'): return response # 没有认证过,证明不是从 第三方 来的 if request.user.is_anonymous: return response # 这个是 mfa 登录页需要的请求, 也得放出来, 用户其实已经在 CAS/OIDC 中完成登录了 white_urls = [ 'login/mfa', 'mfa/select', 'jsi18n/', '/static/', '/profile/otp', '/logout/', ] for url in white_urls: if request.path.find(url) > -1: return response # 因为使用 CAS/OIDC 登录的,不小心去了别的页面就回不来了 if request.path.find('users/profile') > -1: return HttpResponse('', status=401) url = reverse('authentication:login-mfa') + '?_=middleware' return redirect(url) class ThirdPartyLoginMiddleware(mixins.AuthMixin): """OpenID、CAS、SAML2登录规则设置验证""" def __init__(self, get_response): self.get_response = get_response def __call__(self, request): response = self.get_response(request) # 没有认证过,证明不是从 第三方 来的 if request.user.is_anonymous: return response if not request.session.get('auth_third_party_required'): return response ip = get_request_ip(request) try: self.request = request self._check_login_acl(request.user, ip) except Exception as e: post_auth_failed.send( sender=self.__class__, username=request.user.username, request=self.request, reason=e.msg ) auth_logout(request) context = { 'title': _('Authentication failed'), 'message': _('Authentication failed (before login check failed): {}').format(e), 'interval': 10, 'redirect_url': reverse('authentication:login'), 'auto_redirect': True, } response = render(request, 'authentication/auth_fail_flash_message_standalone.html', context) else: if not self.request.session['auth_confirm_required']: return response guard_url = reverse('authentication:login-guard') args = request.META.get('QUERY_STRING', '') if args: guard_url = "%s?%s" % (guard_url, args) response = redirect(guard_url) finally: request.session.pop('auth_third_party_required', '') return response class SessionCookieMiddleware(MiddlewareMixin): @staticmethod def set_cookie_public_key(request, response): if request.path.startswith('/api'): return pub_key_name = settings.SESSION_RSA_PUBLIC_KEY_NAME public_key = request.session.get(pub_key_name) cookie_key = request.COOKIES.get(pub_key_name) if public_key and public_key == cookie_key: return pri_key_name = settings.SESSION_RSA_PRIVATE_KEY_NAME private_key, public_key = gen_key_pair() public_key_decode = base64.b64encode(public_key.encode()).decode() request.session[pub_key_name] = public_key_decode request.session[pri_key_name] = private_key response.set_cookie(pub_key_name, public_key_decode) @staticmethod def set_cookie_session_prefix(request, response): key = settings.SESSION_COOKIE_NAME_PREFIX_KEY value = settings.SESSION_COOKIE_NAME_PREFIX if request.COOKIES.get(key) == value: return response response.set_cookie(key, value) @staticmethod def set_cookie_session_expire(request, response): if not request.session.get('auth_session_expiration_required'): return value = 'age' if settings.SESSION_EXPIRE_AT_BROWSER_CLOSE_FORCE or \ not request.session.get('auto_login', False): value = 'close' age = request.session.get_expiry_age() response.set_cookie('jms_session_expire', value, max_age=age) request.session.pop('auth_session_expiration_required', None) def process_response(self, request, response: HttpResponse): self.set_cookie_session_prefix(request, response) self.set_cookie_public_key(request, response) self.set_cookie_session_expire(request, response) return response