1 # Copyright (C) 2014 Ipsilon project Contributors, for licensee see COPYING
3 from __future__ import absolute_import
5 from ipsilon.providers.common import ProviderBase, ProviderInstaller
6 from ipsilon.util.plugin import PluginObject
7 from ipsilon.util import config as pconfig
8 from ipsilon.info.common import InfoMapping
9 from ipsilon.providers.persona.auth import Persona
10 from ipsilon.tools import files
17 class IdpProvider(ProviderBase):
19 def __init__(self, *pargs):
20 super(IdpProvider, self).__init__('persona', 'persona', *pargs)
21 self.mapping = InfoMapping()
26 self.description = """
27 Provides Persona authentication infrastructure. """
33 'The issuer domain of the Persona provider',
37 'The key where the Persona key is stored.',
41 'List of domains this IdP is willing to issue claims for.'),
45 def issuer_domain(self):
46 return self.get_config_value('issuer domain')
49 def idp_key_file(self):
50 return self.get_config_value('idp key file')
53 def allowed_domains(self):
54 return self.get_config_value('allowed domains')
56 def get_tree(self, site):
58 self.page = Persona(site, self)
59 # self.admin = AdminPage(site, self)
66 self.key = M2Crypto.RSA.load_key(self.idp_key_file,
68 except Exception, e: # pylint: disable=broad-except
69 self._debug('Failed to init Persona provider: %r' % e)
73 super(IdpProvider, self).on_enable()
77 class Installer(ProviderInstaller):
79 def __init__(self, *pargs):
80 super(Installer, self).__init__()
84 def install_args(self, group):
85 group.add_argument('--persona', choices=['yes', 'no'], default='yes',
86 help='Configure Persona Provider')
88 def configure(self, opts):
89 if opts['persona'] != 'yes':
92 # Check storage path is present or create it
93 path = os.path.join(opts['data_dir'], 'persona')
94 if not os.path.exists(path):
95 os.makedirs(path, 0700)
97 keyfile = os.path.join(path, 'persona.key')
99 key = M2Crypto.RSA.gen_key(2048, exponent)
100 key.save_key(keyfile, cipher=None)
103 key_n = (key_n*256) + ord(c)
105 wellknown['authentication'] = '/%s/persona/SignIn/' % opts['instance']
106 wellknown['provisioning'] = '/%s/persona/' % opts['instance']
107 wellknown['public-key'] = {'algorithm': 'RS',
110 with open(os.path.join(opts['wellknown_dir'], 'browserid'), 'w') as f:
111 f.write(json.dumps(wellknown))
113 # Add configuration data to database
114 po = PluginObject(*self.pargs)
117 po.wipe_config_values()
118 config = {'issuer domain': opts['hostname'],
119 'idp key file': keyfile,
120 'allowed domains': opts['hostname']}
121 po.save_plugin_config(config)
123 # Update global config to add login plugin
125 po.save_enabled_state()
127 # Fixup permissions so only the ipsilon user can read these files
128 files.fix_user_dirs(path, opts['system_user'])