def auth_login(): if not 'next' in request.args and not 'next' in session: return redirect(url_for('view_main')) if 'next' in request.args: session['next'] = request.args['next'] if g.fas_user and not ('timeout' in session and session['timeout']): # We can also have "timeout" as of 0.4.0, indicating PAPE or application configuration requires a re-auth log_debug('Info', {'message': 'User tried to login but is already authenticated'}) return redirect(session['next']) if request.method == 'POST': username = request.form['username'] password = request.form['password'] if (not app.config['AVAILABLE_FILTER']) or (username in app.config['AVAILABLE_TO']): if FAS.login(username, password): log_info('Success', {'username': username, 'message': 'User authenticated succesfully'}) session['last_auth_time'] = time() session['timeout'] = False session['trust_root'] = '' session.modified = True return redirect(session['next']) else: log_warning('Failure', {'username': username, 'message': 'User entered incorrect username or password'}) flash(_('Incorrect username or password')) else: log_warning('Failure', {'username': username, 'message': 'Tried to login with an account that is not allowed to use this service'}) flash(_('This service is limited to the following users: %(users)s', users=', '.join(app.config['AVAILABLE_TO']))) return render_template('login.html', trust_root=session['trust_root'])
def auth_login(): if not 'next' in request.args and not 'next' in get_session(): return redirect(url_for('view_main')) if 'next' in request.args: get_session()['next'] = request.args['next'] get_session().save() if logged_in() and not \ ('timeout' in get_session() and get_session()['timeout']): # We can also have "timeout" as of 0.4.0 # indicating PAPE or application configuration requires a re-auth log_debug('Info', { 'message': 'User tried to login but is already authenticated'}) return redirect(get_session()['next']) if request.method == 'POST': username = request.form['username'] password = request.form['password'] if (not app.config['AVAILABLE_FILTER']) or \ (username in app.config['AVAILABLE_TO']): if username == '' or password == '': user = None else: user = check_login(username, password) if user: log_info('Success', { 'username': username, 'message': 'User authenticated succesfully'}) user = user.toDict() # A bunch is not serializable... user['groups'] = [x['name'] for x in user['approved_memberships']] get_session()['user'] = user get_session()['last_auth_time'] = time() get_session()['timeout'] = False get_session()['trust_root'] = '' get_session().save() return redirect(get_session()['next']) else: log_warning('Failure', { 'username': username, 'message': 'User entered incorrect username or password'}) flash(_('Incorrect username or password')) else: log_warning('Failure', { 'username': username, 'message': 'Tried to login with an account that is not ' 'allowed to use this service'}) flash(_('This service is limited to the following ' 'users: %(users)s', users=', '.join(app.config['AVAILABLE_TO']))) return render_template( 'auth_fas_login.html', trust_root=get_session()['trust_root'])
sreg_info = addSReg(openid_request, openid_response) teams_info = addTeams( openid_request, openid_response, filter_cla_groups(auth_module.get('groups'))) cla_info = addCLAs( openid_request, openid_response, get_cla_uris(auth_module.get('groups'))) auth_level = addPape(openid_request, openid_response) log_info('Success', { 'claimed_id': get_claimed_id(auth_module.get('username')), 'trust_root': openid_request.trust_root, 'security_level': auth_level, 'message': 'The user succesfully claimed the identity'}) log_debug('Info', {'teams': teams_info}) return openid_respond(openid_response) elif authed == AUTH_TRUST_ROOT_ASK: # User needs to confirm trust root return user_ask_trust_root(openid_request) elif authed == AUTH_TRUST_ROOT_NOT_OK: log_info('Info', { 'trust_root': openid_request.trust_root, 'message': 'User chose not to trust trust_root'}) return openid_respond(openid_request.answer(False)) elif authed == AUTH_TRUST_ROOT_CONFIG_NOT_OK: log_info('Info', { 'trust_root': openid_request.trust_root, 'message': 'Configuration blacklisted this trust_root'}) return openid_respond(openid_request.answer(False)) elif openid_request.immediate: