mirror of
https://github.com/goauthentik/authentik
synced 2026-04-25 17:15:26 +02:00
* tenants -> brands, init new tenant model, migrate some config to tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * setup logging for tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * configure celery and cache Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * small fixes, runs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * task fixes, creation of tenant now works by cloning a template schema, some other small stuff Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix-tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * upstream fixes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix-pylint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix avatar tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * migrate config reputation_expiry as well Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web rebase Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema 3 Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * revert reputation expiry migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix type Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix some more tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * website: tenants -> brands Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try fixing e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * start frontend :help: Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add ability to disable tenants api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * delete embedded outpost if it is disabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make sure embedded outpost is disabled when tenants are enabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * management commands: add --schema option where relevant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * store files per-tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix embedded outpost deletion Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix files migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tenant api tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add domain tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add settings tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make --schema-name default to public in mgmt commands Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * sources/ldap: make sure lock is per-tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix stuff I broke Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix remaining failing tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try fixing e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * much better frontend, but save does not refresh form properly Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update django-tenants with latest fixes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * i18n-extract Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * review comments Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * move event_retention from brands to tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * wip Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * root: add support for storing media files in S3 Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * use permissions for settings api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * blueprints: disable tenants management Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix embedded outpost create/delete logic Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make gen Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make sure prometheus metrics are correctly served Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * makefile: don't delete the go api client when not regenerating it Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * tenants api: add recovery group and token creation endpoints Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix startup Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix prometheus metrics Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web stuff Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix migrations from stable Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix oauth source type import Signed-off-by: Jens Langhammer <jens@goauthentik.io> * Revert "fix oauth source type import" This reverts commitd015fd0244. * try with setting_changed signal Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try with connection_created signal Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix scim tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web after merge Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix enterprise settings Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "try with connection_created signal" This reverts commit764a999db8. * Revert "try with setting_changed signal" This reverts commit32b40a3bbb. * lib/expression: refactor expression compilation Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix django version Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web after merge Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * relock poetry Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix reconcile Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try running tenant save in a transaction Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * black Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * test: export postgres logs for debugging and use failfast Signed-off-by: Jens Langhammer <jens@goauthentik.io> * test: fix container name for logs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * do not copy tenant data Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "try running tenant save in a transaction" This reverts commitda6dec5a61. * Revert "do not copy tenant data" This reverts commit d07ae9423672f068b0bd8be409ff9b58452a80f2. * Revert "Revert "do not copy tenant data"" This reverts commit4bffb19704. * fix clone with nodata Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * why not Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove failfast Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove postgres query logging Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update reconcile logic to clearly differentiate between tenant and global Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix reconcile app decorator Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * enable django checks Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * actually nodata was unnecessary as we're cloning from template and not from public Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * pylint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update django-tenants with sequence fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * actually update Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tests for settings api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tests for recovery api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * recovery tests: do them on a new tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * web: fix system status being degraded when embedded outpost is disabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix recovery tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tenants tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint-fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint-fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add management command to create a tenant Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add docs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * release notes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * more docs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * checklist Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * self review Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * spelling Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make web after upgrading Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove extra xlif file Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * prettier Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "add management command to create a tenant" This reverts commit39d13c0447. * split api into smaller files, only import urls when tenants is enabled Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rewite some things on the release notes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * root: make sure install_id comes from public schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * require a license to use tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tenants tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix files migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * release notes: add warning about user sessions being invalidated Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove api disabled test, we can't test for it Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> --------- Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
229 lines
9.2 KiB
Python
229 lines
9.2 KiB
Python
"""authentik expression policy evaluator"""
|
|
import re
|
|
import socket
|
|
from ipaddress import ip_address, ip_network
|
|
from textwrap import indent
|
|
from typing import Any, Iterable, Optional
|
|
|
|
from cachetools import TLRUCache, cached
|
|
from django.core.exceptions import FieldError
|
|
from guardian.shortcuts import get_anonymous_user
|
|
from rest_framework.serializers import ValidationError
|
|
from sentry_sdk.hub import Hub
|
|
from sentry_sdk.tracing import Span
|
|
from structlog.stdlib import get_logger
|
|
|
|
from authentik.core.models import User
|
|
from authentik.events.models import Event
|
|
from authentik.lib.utils.http import get_http_session
|
|
from authentik.policies.models import Policy, PolicyBinding
|
|
from authentik.policies.process import PolicyProcess
|
|
from authentik.policies.types import PolicyRequest, PolicyResult
|
|
from authentik.stages.authenticator import devices_for_user
|
|
|
|
LOGGER = get_logger()
|
|
|
|
|
|
class BaseEvaluator:
|
|
"""Validate and evaluate python-based expressions"""
|
|
|
|
# Globals that can be used by function
|
|
_globals: dict[str, Any]
|
|
# Context passed as locals to exec()
|
|
_context: dict[str, Any]
|
|
|
|
# Filename used for exec
|
|
_filename: str
|
|
|
|
def __init__(self, filename: Optional[str] = None):
|
|
self._filename = filename if filename else "BaseEvaluator"
|
|
# update website/docs/expressions/_objects.md
|
|
# update website/docs/expressions/_functions.md
|
|
self._globals = {
|
|
"ak_call_policy": self.expr_func_call_policy,
|
|
"ak_create_event": self.expr_event_create,
|
|
"ak_is_group_member": BaseEvaluator.expr_is_group_member,
|
|
"ak_logger": get_logger(self._filename).bind(),
|
|
"ak_user_by": BaseEvaluator.expr_user_by,
|
|
"ak_user_has_authenticator": BaseEvaluator.expr_func_user_has_authenticator,
|
|
"ip_address": ip_address,
|
|
"ip_network": ip_network,
|
|
"list_flatten": BaseEvaluator.expr_flatten,
|
|
"regex_match": BaseEvaluator.expr_regex_match,
|
|
"regex_replace": BaseEvaluator.expr_regex_replace,
|
|
"requests": get_http_session(),
|
|
"resolve_dns": BaseEvaluator.expr_resolve_dns,
|
|
"reverse_dns": BaseEvaluator.expr_reverse_dns,
|
|
}
|
|
self._context = {}
|
|
|
|
@cached(cache=TLRUCache(maxsize=32, ttu=lambda key, value, now: now + 180))
|
|
@staticmethod
|
|
def expr_resolve_dns(host: str, ip_version: Optional[int] = None) -> list[str]:
|
|
"""Resolve host to a list of IPv4 and/or IPv6 addresses."""
|
|
# Although it seems to be fine (raising OSError), docs warn
|
|
# against passing `None` for both the host and the port
|
|
# https://docs.python.org/3/library/socket.html#socket.getaddrinfo
|
|
host = host or ""
|
|
|
|
ip_list = []
|
|
|
|
family = 0
|
|
if ip_version == 4:
|
|
family = socket.AF_INET
|
|
if ip_version == 6:
|
|
family = socket.AF_INET6
|
|
|
|
try:
|
|
for ip_addr in socket.getaddrinfo(host, None, family=family):
|
|
ip_list.append(str(ip_addr[4][0]))
|
|
except OSError:
|
|
pass
|
|
return list(set(ip_list))
|
|
|
|
@cached(cache=TLRUCache(maxsize=32, ttu=lambda key, value, now: now + 180))
|
|
@staticmethod
|
|
def expr_reverse_dns(ip_addr: str) -> str:
|
|
"""Perform a reverse DNS lookup."""
|
|
try:
|
|
return socket.getfqdn(ip_addr)
|
|
except OSError:
|
|
return ip_addr
|
|
|
|
@staticmethod
|
|
def expr_flatten(value: list[Any] | Any) -> Optional[Any]:
|
|
"""Flatten `value` if its a list"""
|
|
if isinstance(value, list):
|
|
if len(value) < 1:
|
|
return None
|
|
return value[0]
|
|
return value
|
|
|
|
@staticmethod
|
|
def expr_regex_match(value: Any, regex: str) -> bool:
|
|
"""Expression Filter to run re.search"""
|
|
return re.search(regex, value) is not None
|
|
|
|
@staticmethod
|
|
def expr_regex_replace(value: Any, regex: str, repl: str) -> str:
|
|
"""Expression Filter to run re.sub"""
|
|
return re.sub(regex, repl, value)
|
|
|
|
@staticmethod
|
|
def expr_is_group_member(user: User, **group_filters) -> bool:
|
|
"""Check if `user` is member of group with name `group_name`"""
|
|
return user.all_groups().filter(**group_filters).exists()
|
|
|
|
@staticmethod
|
|
def expr_user_by(**filters) -> Optional[User]:
|
|
"""Get user by filters"""
|
|
try:
|
|
users = User.objects.filter(**filters)
|
|
if users:
|
|
return users.first()
|
|
return None
|
|
except FieldError:
|
|
return None
|
|
|
|
@staticmethod
|
|
def expr_func_user_has_authenticator(user: User, device_type: Optional[str] = None) -> bool:
|
|
"""Check if a user has any authenticator devices, optionally matching *device_type*"""
|
|
user_devices = devices_for_user(user)
|
|
if device_type:
|
|
for device in user_devices:
|
|
device_class = device.__class__.__name__.lower().replace("device", "")
|
|
if device_class == device_type:
|
|
return True
|
|
return False
|
|
return len(list(user_devices)) > 0
|
|
|
|
def expr_event_create(self, action: str, **kwargs):
|
|
"""Create event with supplied data and try to extract as much relevant data
|
|
from the context"""
|
|
context = self._context.copy()
|
|
# If the result was a complex variable, we don't want to reuse it
|
|
context.pop("result", None)
|
|
context.pop("handler", None)
|
|
event_kwargs = context
|
|
event_kwargs.update(kwargs)
|
|
event = Event.new(
|
|
action,
|
|
app=self._filename,
|
|
**event_kwargs,
|
|
)
|
|
if "request" in context and isinstance(context["request"], PolicyRequest):
|
|
policy_request: PolicyRequest = context["request"]
|
|
if policy_request.http_request:
|
|
event.from_http(policy_request.http_request)
|
|
return
|
|
event.save()
|
|
|
|
def expr_func_call_policy(self, name: str, **kwargs) -> PolicyResult:
|
|
"""Call policy by name, with current request"""
|
|
policy = Policy.objects.filter(name=name).select_subclasses().first()
|
|
if not policy:
|
|
raise ValueError(f"Policy '{name}' not found.")
|
|
user = self._context.get("user", get_anonymous_user())
|
|
req = PolicyRequest(user)
|
|
if "request" in self._context:
|
|
req = self._context["request"]
|
|
req.context.update(kwargs)
|
|
proc = PolicyProcess(PolicyBinding(policy=policy), request=req, connection=None)
|
|
return proc.profiling_wrapper()
|
|
|
|
def wrap_expression(self, expression: str, params: Iterable[str]) -> str:
|
|
"""Wrap expression in a function, call it, and save the result as `result`"""
|
|
handler_signature = ",".join(params)
|
|
full_expression = ""
|
|
full_expression += f"def handler({handler_signature}):\n"
|
|
full_expression += indent(expression, " ")
|
|
full_expression += f"\nresult = handler({handler_signature})"
|
|
return full_expression
|
|
|
|
def compile(self, expression: str) -> Any:
|
|
"""Parse expression. Raises SyntaxError or ValueError if the syntax is incorrect."""
|
|
param_keys = self._context.keys()
|
|
return compile(self.wrap_expression(expression, param_keys), self._filename, "exec")
|
|
|
|
def evaluate(self, expression_source: str) -> Any:
|
|
"""Parse and evaluate expression. If the syntax is incorrect, a SyntaxError is raised.
|
|
If any exception is raised during execution, it is raised.
|
|
The result is returned without any type-checking."""
|
|
with Hub.current.start_span(op="authentik.lib.evaluator.evaluate") as span:
|
|
span: Span
|
|
span.description = self._filename
|
|
span.set_data("expression", expression_source)
|
|
try:
|
|
ast_obj = self.compile(expression_source)
|
|
except (SyntaxError, ValueError) as exc:
|
|
self.handle_error(exc, expression_source)
|
|
raise exc
|
|
try:
|
|
_locals = self._context
|
|
# Yes this is an exec, yes it is potentially bad. Since we limit what variables are
|
|
# available here, and these policies can only be edited by admins, this is a risk
|
|
# we're willing to take.
|
|
# pylint: disable=exec-used
|
|
exec(ast_obj, self._globals, _locals) # nosec # noqa
|
|
result = _locals["result"]
|
|
except Exception as exc:
|
|
# So, this is a bit questionable. Essentially, we are edit the stacktrace
|
|
# so the user only sees information relevant to them
|
|
# and none of our surrounding error handling
|
|
exc.__traceback__ = exc.__traceback__.tb_next
|
|
self.handle_error(exc, expression_source)
|
|
raise exc
|
|
return result
|
|
|
|
def handle_error(self, exc: Exception, expression_source: str): # pragma: no cover
|
|
"""Exception Handler"""
|
|
LOGGER.warning("Expression error", exc=exc)
|
|
|
|
def validate(self, expression: str) -> bool:
|
|
"""Validate expression's syntax, raise ValidationError if Syntax is invalid"""
|
|
try:
|
|
self.compile(expression)
|
|
return True
|
|
except (ValueError, SyntaxError) as exc:
|
|
raise ValidationError(f"Expression Syntax Error: {str(exc)}") from exc
|