391 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			391 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Python
		
	
	
| # Copyright 2020 The Matrix.org Foundation C.I.C.
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #     http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| import logging
 | |
| import urllib.parse
 | |
| from typing import TYPE_CHECKING, Dict, List, Optional
 | |
| from xml.etree import ElementTree as ET
 | |
| 
 | |
| import attr
 | |
| 
 | |
| from twisted.web.client import PartialDownloadError
 | |
| 
 | |
| from synapse.api.errors import HttpResponseException
 | |
| from synapse.handlers.sso import MappingException, UserAttributes
 | |
| from synapse.http.site import SynapseRequest
 | |
| from synapse.types import UserID, map_username_to_mxid_localpart
 | |
| 
 | |
| if TYPE_CHECKING:
 | |
|     from synapse.server import HomeServer
 | |
| 
 | |
| logger = logging.getLogger(__name__)
 | |
| 
 | |
| 
 | |
| class CasError(Exception):
 | |
|     """Used to catch errors when validating the CAS ticket."""
 | |
| 
 | |
|     def __init__(self, error: str, error_description: Optional[str] = None):
 | |
|         self.error = error
 | |
|         self.error_description = error_description
 | |
| 
 | |
|     def __str__(self) -> str:
 | |
|         if self.error_description:
 | |
|             return f"{self.error}: {self.error_description}"
 | |
|         return self.error
 | |
| 
 | |
| 
 | |
| @attr.s(slots=True, frozen=True, auto_attribs=True)
 | |
| class CasResponse:
 | |
|     username: str
 | |
|     attributes: Dict[str, List[Optional[str]]]
 | |
| 
 | |
| 
 | |
| class CasHandler:
 | |
|     """
 | |
|     Utility class for to handle the response from a CAS SSO service.
 | |
| 
 | |
|     Args:
 | |
|         hs
 | |
|     """
 | |
| 
 | |
|     def __init__(self, hs: "HomeServer"):
 | |
|         self.hs = hs
 | |
|         self._hostname = hs.hostname
 | |
|         self._store = hs.get_datastores().main
 | |
|         self._auth_handler = hs.get_auth_handler()
 | |
|         self._registration_handler = hs.get_registration_handler()
 | |
| 
 | |
|         self._cas_server_url = hs.config.cas.cas_server_url
 | |
|         self._cas_service_url = hs.config.cas.cas_service_url
 | |
|         self._cas_displayname_attribute = hs.config.cas.cas_displayname_attribute
 | |
|         self._cas_required_attributes = hs.config.cas.cas_required_attributes
 | |
| 
 | |
|         self._http_client = hs.get_proxied_http_client()
 | |
| 
 | |
|         # identifier for the external_ids table
 | |
|         self.idp_id = "cas"
 | |
| 
 | |
|         # user-facing name of this auth provider
 | |
|         self.idp_name = "CAS"
 | |
| 
 | |
|         # we do not currently support brands/icons for CAS auth, but this is required by
 | |
|         # the SsoIdentityProvider protocol type.
 | |
|         self.idp_icon = None
 | |
|         self.idp_brand = None
 | |
| 
 | |
|         self._sso_handler = hs.get_sso_handler()
 | |
| 
 | |
|         self._sso_handler.register_identity_provider(self)
 | |
| 
 | |
|     def _build_service_param(self, args: Dict[str, str]) -> str:
 | |
|         """
 | |
|         Generates a value to use as the "service" parameter when redirecting or
 | |
|         querying the CAS service.
 | |
| 
 | |
|         Args:
 | |
|             args: Additional arguments to include in the final redirect URL.
 | |
| 
 | |
|         Returns:
 | |
|             The URL to use as a "service" parameter.
 | |
|         """
 | |
|         return "%s?%s" % (
 | |
|             self._cas_service_url,
 | |
|             urllib.parse.urlencode(args),
 | |
|         )
 | |
| 
 | |
|     async def _validate_ticket(
 | |
|         self, ticket: str, service_args: Dict[str, str]
 | |
|     ) -> CasResponse:
 | |
|         """
 | |
|         Validate a CAS ticket with the server, and return the parsed the response.
 | |
| 
 | |
|         Args:
 | |
|             ticket: The CAS ticket from the client.
 | |
|             service_args: Additional arguments to include in the service URL.
 | |
|                 Should be the same as those passed to `handle_redirect_request`.
 | |
| 
 | |
|         Raises:
 | |
|             CasError: If there's an error parsing the CAS response.
 | |
| 
 | |
|         Returns:
 | |
|             The parsed CAS response.
 | |
|         """
 | |
|         uri = self._cas_server_url + "/proxyValidate"
 | |
|         args = {
 | |
|             "ticket": ticket,
 | |
|             "service": self._build_service_param(service_args),
 | |
|         }
 | |
|         try:
 | |
|             body = await self._http_client.get_raw(uri, args)
 | |
|         except PartialDownloadError as pde:
 | |
|             # Twisted raises this error if the connection is closed,
 | |
|             # even if that's being used old-http style to signal end-of-data
 | |
|             body = pde.response
 | |
|         except HttpResponseException as e:
 | |
|             description = (
 | |
|                 'Authorization server responded with a "{status}" error '
 | |
|                 "while exchanging the authorization code."
 | |
|             ).format(status=e.code)
 | |
|             raise CasError("server_error", description) from e
 | |
| 
 | |
|         return self._parse_cas_response(body)
 | |
| 
 | |
|     def _parse_cas_response(self, cas_response_body: bytes) -> CasResponse:
 | |
|         """
 | |
|         Retrieve the user and other parameters from the CAS response.
 | |
| 
 | |
|         Args:
 | |
|             cas_response_body: The response from the CAS query.
 | |
| 
 | |
|         Raises:
 | |
|             CasError: If there's an error parsing the CAS response.
 | |
| 
 | |
|         Returns:
 | |
|             The parsed CAS response.
 | |
|         """
 | |
| 
 | |
|         # Ensure the response is valid.
 | |
|         root = ET.fromstring(cas_response_body)
 | |
|         if not root.tag.endswith("serviceResponse"):
 | |
|             raise CasError(
 | |
|                 "missing_service_response",
 | |
|                 "root of CAS response is not serviceResponse",
 | |
|             )
 | |
| 
 | |
|         success = root[0].tag.endswith("authenticationSuccess")
 | |
|         if not success:
 | |
|             raise CasError("unsucessful_response", "Unsuccessful CAS response")
 | |
| 
 | |
|         # Iterate through the nodes and pull out the user and any extra attributes.
 | |
|         user = None
 | |
|         attributes: Dict[str, List[Optional[str]]] = {}
 | |
|         for child in root[0]:
 | |
|             if child.tag.endswith("user"):
 | |
|                 user = child.text
 | |
|             if child.tag.endswith("attributes"):
 | |
|                 for attribute in child:
 | |
|                     # ElementTree library expands the namespace in
 | |
|                     # attribute tags to the full URL of the namespace.
 | |
|                     # We don't care about namespace here and it will always
 | |
|                     # be encased in curly braces, so we remove them.
 | |
|                     tag = attribute.tag
 | |
|                     if "}" in tag:
 | |
|                         tag = tag.split("}")[1]
 | |
|                     attributes.setdefault(tag, []).append(attribute.text)
 | |
| 
 | |
|         # Ensure a user was found.
 | |
|         if user is None:
 | |
|             raise CasError("no_user", "CAS response does not contain user")
 | |
| 
 | |
|         return CasResponse(user, attributes)
 | |
| 
 | |
|     async def handle_redirect_request(
 | |
|         self,
 | |
|         request: SynapseRequest,
 | |
|         client_redirect_url: Optional[bytes],
 | |
|         ui_auth_session_id: Optional[str] = None,
 | |
|     ) -> str:
 | |
|         """Generates a URL for the CAS server where the client should be redirected.
 | |
| 
 | |
|         Args:
 | |
|             request: the incoming HTTP request
 | |
|             client_redirect_url: the URL that we should redirect the
 | |
|                 client to after login (or None for UI Auth).
 | |
|             ui_auth_session_id: The session ID of the ongoing UI Auth (or
 | |
|                 None if this is a login).
 | |
| 
 | |
|         Returns:
 | |
|             URL to redirect to
 | |
|         """
 | |
| 
 | |
|         if ui_auth_session_id:
 | |
|             service_args = {"session": ui_auth_session_id}
 | |
|         else:
 | |
|             assert client_redirect_url
 | |
|             service_args = {"redirectUrl": client_redirect_url.decode("utf8")}
 | |
| 
 | |
|         args = urllib.parse.urlencode(
 | |
|             {"service": self._build_service_param(service_args)}
 | |
|         )
 | |
| 
 | |
|         return "%s/login?%s" % (self._cas_server_url, args)
 | |
| 
 | |
|     async def handle_ticket(
 | |
|         self,
 | |
|         request: SynapseRequest,
 | |
|         ticket: str,
 | |
|         client_redirect_url: Optional[str],
 | |
|         session: Optional[str],
 | |
|     ) -> None:
 | |
|         """
 | |
|         Called once the user has successfully authenticated with the SSO.
 | |
|         Validates a CAS ticket sent by the client and completes the auth process.
 | |
| 
 | |
|         If the user interactive authentication session is provided, marks the
 | |
|         UI Auth session as complete, then returns an HTML page notifying the
 | |
|         user they are done.
 | |
| 
 | |
|         Otherwise, this registers the user if necessary, and then returns a
 | |
|         redirect (with a login token) to the client.
 | |
| 
 | |
|         Args:
 | |
|             request: the incoming request from the browser. We'll
 | |
|                 respond to it with a redirect or an HTML page.
 | |
| 
 | |
|             ticket: The CAS ticket provided by the client.
 | |
| 
 | |
|             client_redirect_url: the redirectUrl parameter from the `/cas/ticket` HTTP request, if given.
 | |
|                 This should be the same as the redirectUrl from the original `/login/sso/redirect` request.
 | |
| 
 | |
|             session: The session parameter from the `/cas/ticket` HTTP request, if given.
 | |
|                 This should be the UI Auth session id.
 | |
|         """
 | |
|         args = {}
 | |
|         if client_redirect_url:
 | |
|             args["redirectUrl"] = client_redirect_url
 | |
|         if session:
 | |
|             args["session"] = session
 | |
| 
 | |
|         try:
 | |
|             cas_response = await self._validate_ticket(ticket, args)
 | |
|         except CasError as e:
 | |
|             logger.exception("Could not validate ticket")
 | |
|             self._sso_handler.render_error(request, e.error, e.error_description, 401)
 | |
|             return
 | |
| 
 | |
|         await self._handle_cas_response(
 | |
|             request, cas_response, client_redirect_url, session
 | |
|         )
 | |
| 
 | |
|     async def _handle_cas_response(
 | |
|         self,
 | |
|         request: SynapseRequest,
 | |
|         cas_response: CasResponse,
 | |
|         client_redirect_url: Optional[str],
 | |
|         session: Optional[str],
 | |
|     ) -> None:
 | |
|         """Handle a CAS response to a ticket request.
 | |
| 
 | |
|         Assumes that the response has been validated. Maps the user onto an MXID,
 | |
|         registering them if necessary, and returns a response to the browser.
 | |
| 
 | |
|         Args:
 | |
|             request: the incoming request from the browser. We'll respond to it with an
 | |
|                 HTML page or a redirect
 | |
| 
 | |
|             cas_response: The parsed CAS response.
 | |
| 
 | |
|             client_redirect_url: the redirectUrl parameter from the `/cas/ticket` HTTP request, if given.
 | |
|                 This should be the same as the redirectUrl from the original `/login/sso/redirect` request.
 | |
| 
 | |
|             session: The session parameter from the `/cas/ticket` HTTP request, if given.
 | |
|                 This should be the UI Auth session id.
 | |
|         """
 | |
| 
 | |
|         # first check if we're doing a UIA
 | |
|         if session:
 | |
|             return await self._sso_handler.complete_sso_ui_auth_request(
 | |
|                 self.idp_id,
 | |
|                 cas_response.username,
 | |
|                 session,
 | |
|                 request,
 | |
|             )
 | |
| 
 | |
|         # otherwise, we're handling a login request.
 | |
| 
 | |
|         # Ensure that the attributes of the logged in user meet the required
 | |
|         # attributes.
 | |
|         if not self._sso_handler.check_required_attributes(
 | |
|             request, cas_response.attributes, self._cas_required_attributes
 | |
|         ):
 | |
|             return
 | |
| 
 | |
|         # Call the mapper to register/login the user
 | |
| 
 | |
|         # If this not a UI auth request than there must be a redirect URL.
 | |
|         assert client_redirect_url is not None
 | |
| 
 | |
|         try:
 | |
|             await self._complete_cas_login(cas_response, request, client_redirect_url)
 | |
|         except MappingException as e:
 | |
|             logger.exception("Could not map user")
 | |
|             self._sso_handler.render_error(request, "mapping_error", str(e))
 | |
| 
 | |
|     async def _complete_cas_login(
 | |
|         self,
 | |
|         cas_response: CasResponse,
 | |
|         request: SynapseRequest,
 | |
|         client_redirect_url: str,
 | |
|     ) -> None:
 | |
|         """
 | |
|         Given a CAS response, complete the login flow
 | |
| 
 | |
|         Retrieves the remote user ID, registers the user if necessary, and serves
 | |
|         a redirect back to the client with a login-token.
 | |
| 
 | |
|         Args:
 | |
|             cas_response: The parsed CAS response.
 | |
|             request: The request to respond to
 | |
|             client_redirect_url: The redirect URL passed in by the client.
 | |
| 
 | |
|         Raises:
 | |
|             MappingException if there was a problem mapping the response to a user.
 | |
|             RedirectException: some mapping providers may raise this if they need
 | |
|                 to redirect to an interstitial page.
 | |
|         """
 | |
|         # Note that CAS does not support a mapping provider, so the logic is hard-coded.
 | |
|         localpart = map_username_to_mxid_localpart(cas_response.username)
 | |
| 
 | |
|         async def cas_response_to_user_attributes(failures: int) -> UserAttributes:
 | |
|             """
 | |
|             Map from CAS attributes to user attributes.
 | |
|             """
 | |
|             # Due to the grandfathering logic matching any previously registered
 | |
|             # mxids it isn't expected for there to be any failures.
 | |
|             if failures:
 | |
|                 raise RuntimeError("CAS is not expected to de-duplicate Matrix IDs")
 | |
| 
 | |
|             # Arbitrarily use the first attribute found.
 | |
|             display_name = cas_response.attributes.get(
 | |
|                 self._cas_displayname_attribute, [None]
 | |
|             )[0]
 | |
| 
 | |
|             return UserAttributes(localpart=localpart, display_name=display_name)
 | |
| 
 | |
|         async def grandfather_existing_users() -> Optional[str]:
 | |
|             # Since CAS did not always use the user_external_ids table, always
 | |
|             # to attempt to map to existing users.
 | |
|             user_id = UserID(localpart, self._hostname).to_string()
 | |
| 
 | |
|             logger.debug(
 | |
|                 "Looking for existing account based on mapped %s",
 | |
|                 user_id,
 | |
|             )
 | |
| 
 | |
|             users = await self._store.get_users_by_id_case_insensitive(user_id)
 | |
|             if users:
 | |
|                 registered_user_id = list(users.keys())[0]
 | |
|                 logger.info("Grandfathering mapping to %s", registered_user_id)
 | |
|                 return registered_user_id
 | |
| 
 | |
|             return None
 | |
| 
 | |
|         await self._sso_handler.complete_sso_login_request(
 | |
|             self.idp_id,
 | |
|             cas_response.username,
 | |
|             request,
 | |
|             client_redirect_url,
 | |
|             cas_response_to_user_attributes,
 | |
|             grandfather_existing_users,
 | |
|         )
 |