Files
calendars/docs/entitlements.md
Sylvain Zimmer 9c18f96090 (all) add organizations, resources, channels, and infra migration (#34)
Add multi-tenant organization model populated from OIDC claims with
org-scoped user discovery, CalDAV principal filtering, and cross-org
isolation at the SabreDAV layer.

Add bookable resource principals (rooms, equipment) with CalDAV
auto-scheduling that handles conflict detection, auto-accept/decline,
and org-scoped booking enforcement. Fixes #14.

Replace CalendarSubscriptionToken with a unified Channel model
supporting CalDAV integration tokens and iCal feed URLs, with
encrypted token storage and role-based access control. Fixes #16.

Migrate task queue from Celery to Dramatiq with async ICS import,
progress tracking, and task status polling endpoint.

Replace nginx with Caddy for both the reverse proxy and frontend
static serving. Switch frontend package manager from yarn/pnpm to
npm and upgrade Node to 24, Next.js to 16, TypeScript to 5.9.

Harden security with fail-closed entitlements, RSVP rate limiting
and token expiry, CalDAV proxy path validation blocking internal
API routes, channel path scope enforcement, and ETag-based
conflict prevention.

Add frontend pages for resource management and integration channel
CRUD, with resource booking in the event modal.

Restructure CalDAV paths to /calendars/users/ and
/calendars/resources/ with nested principal collections in SabreDAV.
2026-03-09 09:09:34 +01:00

11 KiB

Entitlements System

The entitlements system provides a pluggable backend architecture for checking whether a user is allowed to access the application. It integrates with the DeployCenter API in production and uses a local backend for development.

Calendars checks two entitlements:

  • can_access: whether the user can use the app at all
  • can_admin: whether the user is an admin of their organization (e.g. can create/delete resources)

Architecture

┌─────────────────────────────────────────────┐
│       OIDC Authentication Backend           │
│  post_get_or_create_user() — warms cache    │
└──────────────┬──────────────────────────────┘
               │
┌──────────────▼──────────────────────────────┐
│          UserMeSerializer                   │
│  GET /users/me/ → { can_access, can_admin } │
└──────────────┬──────────────────────────────┘
               │
┌──────────────▼──────────────────────────────┐
│            Service Layer                    │
│       get_user_entitlements()               │
└──────────────┬──────────────────────────────┘
               │
┌──────────────▼──────────────────────────────┐
│       Backend Factory (singleton)           │
│       get_entitlements_backend()            │
└──────────────┬──────────────────────────────┘
               │
       ┌───────┴───────┐
       │               │
┌──────▼─────┐  ┌──────▼───────────────┐
│   Local    │  │    DeployCenter      │
│  Backend   │  │      Backend         │
│ (dev/test) │  │ (production, cached) │
└────────────┘  └──────────────────────┘

Components

  • Service layer (core/entitlements/__init__.py): Public get_user_entitlements() function and EntitlementsUnavailableError exception.
  • Backend factory (core/entitlements/factory.py): @functools.cache singleton that imports and instantiates the configured backend class.
  • Abstract base (core/entitlements/backends/base.py): Defines the EntitlementsBackend interface.
  • Local backend (core/entitlements/backends/local.py): Always grants access. Used for local development.
  • DeployCenter backend (core/entitlements/backends/deploycenter.py): Calls the DeployCenter API with Django cache and stale fallback.

Integration points

  1. OIDC login (core/authentication/backends.py): post_get_or_create_user() calls get_user_entitlements() with force_refresh=True to warm the cache. Login always succeeds regardless of can_access value — access is gated at API level and in the frontend.
  2. User API (core/api/serializers.py): UserMeSerializer exposes can_access as a field on GET /users/me/. Fail-open: returns True when entitlements are unavailable.
  3. Default calendar creation (core/signals.py): provision_default_calendar checks entitlements before creating a calendar for a new user. Fail-closed: skips creation when entitlements are unavailable.
  4. CalDAV proxy (core/api/viewsets_caldav.py): Blocks MKCALENDAR and MKCOL methods for non-entitled users. Other methods (PROPFIND, REPORT, GET, PUT, DELETE) are allowed so that users invited to shared calendars can still use them. Fail-closed: denies creation when entitlements are unavailable.
  5. Import events (core/api/viewsets.py): Blocks POST /calendars/import-events/ for non-entitled users. Fail-closed: denies import when entitlements are unavailable.
  6. Frontend (pages/index.tsx, pages/calendar.tsx): Checks user.can_access and redirects to /no-access when false. Calendar creation uses MKCALENDAR via CalDAV proxy (no Django endpoint).

Error handling

  • Login is fail-open: if the entitlements service is unavailable, login succeeds and the cache warming is skipped.
  • User API is fail-open: if the entitlements service is unavailable, can_access defaults to True.
  • Calendar creation is fail-closed: if the entitlements service is unavailable, the default calendar is not created (avoids provisioning resources for users who may not be entitled).
  • CalDAV proxy MKCALENDAR/MKCOL is fail-closed: if the entitlements service is unavailable, calendar creation via CalDAV is denied (returns 403).
  • Import events is fail-closed: if the entitlements service is unavailable, ICS import is denied (returns 403).
  • Resource provisioning is fail-closed: if the entitlements service is unavailable, resource creation/deletion is denied (returns 403). The can_admin check follows the same pattern as can_access fail-closed checks.
  • The DeployCenter backend falls back to stale cached data when the API is unavailable.
  • EntitlementsUnavailableError is only raised when the API fails and no cache exists.

Configuration

Environment variables

Variable Default Description
ENTITLEMENTS_BACKEND core.entitlements.backends.local.LocalEntitlementsBackend Python import path of the backend class
ENTITLEMENTS_BACKEND_PARAMETERS {} JSON object passed to the backend constructor
ENTITLEMENTS_CACHE_TIMEOUT 300 Cache TTL in seconds

DeployCenter backend parameters

When using core.entitlements.backends.deploycenter.DeployCenterEntitlementsBackend, provide these in ENTITLEMENTS_BACKEND_PARAMETERS:

{
  "base_url": "https://deploycenter.example.com/api/v1.0/entitlements/",
  "service_id": "calendar",
  "api_key": "your-api-key",
  "timeout": 10,
  "oidc_claims": ["siret"]
}
Parameter Required Description
base_url Yes Full URL of the DeployCenter entitlements endpoint
service_id Yes Service identifier in DeployCenter
api_key Yes API key for X-Service-Auth: Bearer header
timeout No HTTP timeout in seconds (default: 10)
oidc_claims No OIDC claim names to forward as query params

Example production configuration

ENTITLEMENTS_BACKEND=core.entitlements.backends.deploycenter.DeployCenterEntitlementsBackend
ENTITLEMENTS_BACKEND_PARAMETERS='{"base_url":"https://deploycenter.example.com/api/v1.0/entitlements/","service_id":"calendar","api_key":"secret","timeout":10,"oidc_claims":["siret"]}'
ENTITLEMENTS_CACHE_TIMEOUT=300

Backend interface

Custom backends must extend EntitlementsBackend and implement:

class MyBackend(EntitlementsBackend):
    def __init__(self, **kwargs):
        # Receives ENTITLEMENTS_BACKEND_PARAMETERS as kwargs
        pass

    def get_user_entitlements(
        self, user_sub, user_email, user_info=None, force_refresh=False
    ):
        # Return: {"can_access": bool, "can_admin": bool, ...}
        # Raise EntitlementsUnavailableError on failure.
        pass

DeployCenter API

The DeployCenter backend calls:

GET {base_url}?service_id=X&account_type=user&account_email=X

Headers: X-Service-Auth: Bearer {api_key}

Query parameters include any configured oidc_claims extracted from the OIDC user_info response (e.g. siret).

Expected response: {"entitlements": {"can_access": true, "can_admin": false}}

Access control flow

The entitlements check follows a two-step approach: the backend exposes entitlements data, and the frontend gates access.

On login

  1. User authenticates via OIDC — login always succeeds
  2. post_get_or_create_user calls get_user_entitlements() with force_refresh=True to warm the cache
  3. If entitlements are unavailable, a warning is logged but login proceeds

On page load

  1. Frontend calls GET /users/me/ which includes can_access
  2. If can_access is false, the frontend redirects to /no-access
  3. The user remains authenticated — they see the header, logo, and their profile, but cannot use the app
  4. The /no-access page offers a logout button and a message to contact support

This approach ensures users always have a session (important for shared calendars and other interactions) while still gating access to the main application.

Caching behavior

  • The DeployCenter backend caches results in Django's cache framework (key: entitlements:user:{user_sub}, TTL: ENTITLEMENTS_CACHE_TIMEOUT).
  • On login, force_refresh=True bypasses the cache for fresh data.
  • If the API fails during a forced refresh, stale cached data is returned as fallback.
  • Subsequent GET /users/me/ calls use the cached value (no force_refresh).

Frontend

Users denied access see /no-access — a page using the main layout (header with logo and user profile visible) with:

  • A message explaining the app is not available for their account
  • A suggestion to contact support
  • A logout button

The user is fully authenticated and can see their profile in the header, but cannot access calendars or events.

Key files

Area Path
Service layer src/backend/core/entitlements/__init__.py
Backend factory src/backend/core/entitlements/factory.py
Abstract base src/backend/core/entitlements/backends/base.py
Local backend src/backend/core/entitlements/backends/local.py
DeployCenter backend src/backend/core/entitlements/backends/deploycenter.py
Auth integration src/backend/core/authentication/backends.py
User API serializer src/backend/core/api/serializers.py
Calendar gating (signal) src/backend/core/signals.py
CalDAV proxy gating src/backend/core/api/viewsets_caldav.py
Import events gating src/backend/core/api/viewsets.py
No-access page src/frontend/apps/calendars/src/pages/no-access.tsx
Homepage gate src/frontend/apps/calendars/src/pages/index.tsx
Calendar gate src/frontend/apps/calendars/src/pages/calendar.tsx
Tests src/backend/core/tests/test_entitlements.py