2014-03-19 22:09:09 +00:00
|
|
|
import logging
|
2014-03-25 16:42:40 +00:00
|
|
|
import json
|
2014-03-19 22:09:09 +00:00
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
from datetime import datetime, timedelta
|
|
|
|
from oauth2lib.provider import AuthorizationProvider
|
|
|
|
from oauth2lib import utils
|
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
from data.database import (OAuthApplication, OAuthAuthorizationCode, OAuthAccessToken, User,
|
|
|
|
random_string_generator)
|
2014-03-25 16:42:40 +00:00
|
|
|
from data.model.legacy import get_user
|
2014-03-12 16:37:06 +00:00
|
|
|
from auth import scopes
|
2014-11-17 19:54:07 +00:00
|
|
|
from flask import render_template
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
|
2014-03-19 22:09:09 +00:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
class DatabaseAuthorizationProvider(AuthorizationProvider):
|
|
|
|
def get_authorized_user(self):
|
|
|
|
raise NotImplementedError('Subclasses must fill in the ability to get the authorized_user.')
|
|
|
|
|
2014-03-25 16:42:40 +00:00
|
|
|
def _generate_data_string(self):
|
|
|
|
return json.dumps({'username': self.get_authorized_user().username})
|
|
|
|
|
2014-03-25 19:38:16 +00:00
|
|
|
@property
|
|
|
|
def token_expires_in(self):
|
|
|
|
"""Property method to get the token expiration time in seconds.
|
|
|
|
"""
|
|
|
|
return int(60*60*24*365.25*10) # 10 Years
|
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
def validate_client_id(self, client_id):
|
2014-03-14 22:57:28 +00:00
|
|
|
return self.get_application_for_client_id(client_id) is not None
|
|
|
|
|
|
|
|
def get_application_for_client_id(self, client_id):
|
2014-03-12 16:37:06 +00:00
|
|
|
try:
|
2014-03-14 22:57:28 +00:00
|
|
|
return OAuthApplication.get(client_id=client_id)
|
2014-03-12 16:37:06 +00:00
|
|
|
except OAuthApplication.DoesNotExist:
|
2014-03-14 22:57:28 +00:00
|
|
|
return None
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
def validate_client_secret(self, client_id, client_secret):
|
|
|
|
try:
|
|
|
|
OAuthApplication.get(client_id=client_id, client_secret=client_secret)
|
|
|
|
return True
|
|
|
|
except OAuthApplication.DoesNotExist:
|
|
|
|
return False
|
|
|
|
|
|
|
|
def validate_redirect_uri(self, client_id, redirect_uri):
|
|
|
|
try:
|
|
|
|
app = OAuthApplication.get(client_id=client_id)
|
2014-09-15 15:27:33 +00:00
|
|
|
if app.redirect_uri and redirect_uri and redirect_uri.startswith(app.redirect_uri):
|
2014-03-12 16:37:06 +00:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
except OAuthApplication.DoesNotExist:
|
|
|
|
return False
|
|
|
|
|
2014-03-14 22:57:28 +00:00
|
|
|
def validate_scope(self, client_id, scopes_string):
|
|
|
|
return scopes.validate_scope_string(scopes_string)
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
def validate_access(self):
|
|
|
|
return self.get_authorized_user() is not None
|
|
|
|
|
2014-03-19 22:09:09 +00:00
|
|
|
def load_authorized_scope_string(self, client_id, username):
|
|
|
|
found = (OAuthAccessToken
|
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.switch(OAuthAccessToken)
|
|
|
|
.join(User)
|
|
|
|
.where(OAuthApplication.client_id == client_id, User.username == username,
|
2014-05-23 18:16:26 +00:00
|
|
|
OAuthAccessToken.expires_at > datetime.utcnow()))
|
2014-03-19 22:09:09 +00:00
|
|
|
found = list(found)
|
|
|
|
logger.debug('Found %s matching tokens.', len(found))
|
|
|
|
long_scope_string = ','.join([token.scope for token in found])
|
|
|
|
logger.debug('Computed long scope string: %s', long_scope_string)
|
|
|
|
return long_scope_string
|
2014-03-14 22:57:28 +00:00
|
|
|
|
2014-03-19 22:09:09 +00:00
|
|
|
def validate_has_scopes(self, client_id, username, scope):
|
|
|
|
long_scope_string = self.load_authorized_scope_string(client_id, username)
|
2014-03-14 22:57:28 +00:00
|
|
|
|
|
|
|
# Make sure the token contains the given scopes (at least).
|
2014-03-19 22:09:09 +00:00
|
|
|
return scopes.is_subset_string(long_scope_string, scope)
|
2014-03-14 22:57:28 +00:00
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
def from_authorization_code(self, client_id, code, scope):
|
|
|
|
try:
|
|
|
|
found = (OAuthAuthorizationCode
|
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.where(OAuthApplication.client_id == client_id, OAuthAuthorizationCode.code == code,
|
|
|
|
OAuthAuthorizationCode.scope == scope)
|
|
|
|
.get())
|
2014-03-25 16:42:40 +00:00
|
|
|
logger.debug('Returning data: %s', found.data)
|
2014-03-12 16:37:06 +00:00
|
|
|
return found.data
|
|
|
|
except OAuthAuthorizationCode.DoesNotExist:
|
|
|
|
return None
|
|
|
|
|
|
|
|
def from_refresh_token(self, client_id, refresh_token, scope):
|
|
|
|
try:
|
|
|
|
found = (OAuthAccessToken
|
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.where(OAuthApplication.client_id == client_id,
|
|
|
|
OAuthAccessToken.refresh_token == refresh_token,
|
|
|
|
OAuthAccessToken.scope == scope)
|
|
|
|
.get())
|
|
|
|
return found.data
|
|
|
|
except OAuthAccessToken.DoesNotExist:
|
2014-11-24 21:07:38 +00:00
|
|
|
return None
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
def persist_authorization_code(self, client_id, code, scope):
|
|
|
|
app = OAuthApplication.get(client_id=client_id)
|
2014-03-25 16:42:40 +00:00
|
|
|
data = self._generate_data_string()
|
|
|
|
OAuthAuthorizationCode.create(application=app, code=code, scope=scope, data=data)
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
def persist_token_information(self, client_id, scope, access_token, token_type, expires_in,
|
|
|
|
refresh_token, data):
|
2014-03-25 16:42:40 +00:00
|
|
|
user = get_user(json.loads(data)['username'])
|
|
|
|
if not user:
|
|
|
|
raise RuntimeError('Username must be in the data field')
|
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
app = OAuthApplication.get(client_id=client_id)
|
2014-05-23 18:16:26 +00:00
|
|
|
expires_at = datetime.utcnow() + timedelta(seconds=expires_in)
|
2014-03-12 16:37:06 +00:00
|
|
|
OAuthAccessToken.create(application=app, authorized_user=user, scope=scope,
|
|
|
|
access_token=access_token, token_type=token_type,
|
|
|
|
expires_at=expires_at, refresh_token=refresh_token, data=data)
|
|
|
|
|
|
|
|
def discard_authorization_code(self, client_id, code):
|
2014-03-25 16:42:40 +00:00
|
|
|
found = (OAuthAuthorizationCode
|
2014-03-12 16:37:06 +00:00
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.where(OAuthApplication.client_id == client_id, OAuthAuthorizationCode.code == code)
|
|
|
|
.get())
|
|
|
|
found.delete_instance()
|
|
|
|
|
|
|
|
def discard_refresh_token(self, client_id, refresh_token):
|
|
|
|
found = (AccessToken
|
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.where(OAuthApplication.client_id == client_id,
|
|
|
|
OAuthAccessToken.refresh_token == refresh_token)
|
|
|
|
.get())
|
|
|
|
found.delete_instance()
|
|
|
|
|
2014-03-24 22:30:22 +00:00
|
|
|
|
|
|
|
def get_auth_denied_response(self, response_type, client_id, redirect_uri, **params):
|
|
|
|
# Ensure proper response_type
|
|
|
|
if response_type != 'token':
|
|
|
|
err = 'unsupported_response_type'
|
|
|
|
return self._make_redirect_error_response(redirect_uri, err)
|
|
|
|
|
|
|
|
# Check redirect URI
|
|
|
|
is_valid_redirect_uri = self.validate_redirect_uri(client_id, redirect_uri)
|
|
|
|
if not is_valid_redirect_uri:
|
|
|
|
return self._invalid_redirect_uri_response()
|
|
|
|
|
|
|
|
return self._make_redirect_error_response(redirect_uri, 'authorization_denied')
|
|
|
|
|
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
def get_token_response(self, response_type, client_id, redirect_uri, **params):
|
2014-11-17 19:54:07 +00:00
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
# Ensure proper response_type
|
|
|
|
if response_type != 'token':
|
|
|
|
err = 'unsupported_response_type'
|
|
|
|
return self._make_redirect_error_response(redirect_uri, err)
|
|
|
|
|
|
|
|
# Check redirect URI
|
|
|
|
is_valid_redirect_uri = self.validate_redirect_uri(client_id, redirect_uri)
|
2014-11-17 19:54:07 +00:00
|
|
|
if redirect_uri != 'display' and not is_valid_redirect_uri:
|
2014-03-12 16:37:06 +00:00
|
|
|
return self._invalid_redirect_uri_response()
|
|
|
|
|
|
|
|
# Check conditions
|
|
|
|
is_valid_client_id = self.validate_client_id(client_id)
|
|
|
|
is_valid_access = self.validate_access()
|
|
|
|
scope = params.get('scope', '')
|
2014-03-14 22:57:28 +00:00
|
|
|
are_valid_scopes = self.validate_scope(client_id, scope)
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
# Return proper error responses on invalid conditions
|
|
|
|
if not is_valid_client_id:
|
|
|
|
err = 'unauthorized_client'
|
|
|
|
return self._make_redirect_error_response(redirect_uri, err)
|
|
|
|
|
|
|
|
if not is_valid_access:
|
|
|
|
err = 'access_denied'
|
|
|
|
return self._make_redirect_error_response(redirect_uri, err)
|
|
|
|
|
2014-03-14 22:57:28 +00:00
|
|
|
if not are_valid_scopes:
|
2014-03-12 16:37:06 +00:00
|
|
|
err = 'invalid_scope'
|
|
|
|
return self._make_redirect_error_response(redirect_uri, err)
|
|
|
|
|
|
|
|
access_token = self.generate_access_token()
|
|
|
|
token_type = self.token_type
|
|
|
|
expires_in = self.token_expires_in
|
|
|
|
refresh_token = None # No refresh token for this kind of flow
|
|
|
|
|
2014-03-25 16:42:40 +00:00
|
|
|
data = self._generate_data_string()
|
2014-03-12 16:37:06 +00:00
|
|
|
self.persist_token_information(client_id=client_id, scope=scope, access_token=access_token,
|
|
|
|
token_type=token_type, expires_in=expires_in,
|
2014-03-25 16:42:40 +00:00
|
|
|
refresh_token=refresh_token, data=data)
|
2014-03-12 16:37:06 +00:00
|
|
|
|
|
|
|
url = utils.build_url(redirect_uri, params)
|
|
|
|
url += '#access_token=%s&token_type=%s&expires_in=%s' % (access_token, token_type, expires_in)
|
|
|
|
|
2014-11-17 19:54:07 +00:00
|
|
|
if redirect_uri == 'display':
|
|
|
|
return self._make_response(
|
|
|
|
render_template("message.html", message="Access Token: " + access_token))
|
|
|
|
|
2014-03-12 16:37:06 +00:00
|
|
|
return self._make_response(headers={'Location': url}, status_code=302)
|
|
|
|
|
2014-03-25 18:32:02 +00:00
|
|
|
|
2014-03-14 22:57:28 +00:00
|
|
|
def create_application(org, name, application_uri, redirect_uri, **kwargs):
|
2014-03-25 16:42:40 +00:00
|
|
|
return OAuthApplication.create(organization=org, name=name, application_uri=application_uri,
|
|
|
|
redirect_uri=redirect_uri, **kwargs)
|
2014-03-12 20:31:37 +00:00
|
|
|
|
2014-03-25 18:32:02 +00:00
|
|
|
|
2014-03-12 20:31:37 +00:00
|
|
|
def validate_access_token(access_token):
|
|
|
|
try:
|
|
|
|
found = (OAuthAccessToken
|
|
|
|
.select(OAuthAccessToken, User)
|
|
|
|
.join(User)
|
|
|
|
.where(OAuthAccessToken.access_token == access_token)
|
|
|
|
.get())
|
|
|
|
return found
|
|
|
|
except OAuthAccessToken.DoesNotExist:
|
2014-03-14 22:57:28 +00:00
|
|
|
return None
|
2014-03-18 20:45:18 +00:00
|
|
|
|
2014-03-25 18:32:02 +00:00
|
|
|
|
2014-03-18 20:45:18 +00:00
|
|
|
def get_application_for_client_id(client_id):
|
|
|
|
try:
|
|
|
|
return OAuthApplication.get(client_id=client_id)
|
|
|
|
except OAuthApplication.DoesNotExist:
|
|
|
|
return None
|
2014-03-20 19:46:13 +00:00
|
|
|
|
2014-03-25 18:32:02 +00:00
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
def reset_client_secret(application):
|
|
|
|
application.client_secret = random_string_generator(length=40)()
|
|
|
|
application.save()
|
|
|
|
return application
|
|
|
|
|
2014-03-25 18:32:02 +00:00
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
def lookup_application(org, client_id):
|
|
|
|
try:
|
|
|
|
return OAuthApplication.get(organization = org, client_id=client_id)
|
|
|
|
except OAuthApplication.DoesNotExist:
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
|
|
def delete_application(org, client_id):
|
|
|
|
application = lookup_application(org, client_id)
|
|
|
|
if not application:
|
|
|
|
return
|
|
|
|
|
|
|
|
application.delete_instance(recursive=True, delete_nullable=True)
|
|
|
|
return application
|
|
|
|
|
2014-03-25 00:57:02 +00:00
|
|
|
|
|
|
|
def lookup_access_token_for_user(user, token_uuid):
|
|
|
|
try:
|
|
|
|
return OAuthAccessToken.get(OAuthAccessToken.authorized_user == user,
|
|
|
|
OAuthAccessToken.uuid == token_uuid)
|
|
|
|
except OAuthAccessToken.DoesNotExist:
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
|
|
def list_access_tokens_for_user(user):
|
|
|
|
query = (OAuthAccessToken
|
|
|
|
.select()
|
|
|
|
.join(OAuthApplication)
|
|
|
|
.switch(OAuthAccessToken)
|
|
|
|
.join(User)
|
|
|
|
.where(OAuthAccessToken.authorized_user == user))
|
|
|
|
|
2014-11-24 21:07:38 +00:00
|
|
|
return query
|
2014-03-25 00:57:02 +00:00
|
|
|
|
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
def list_applications_for_org(org):
|
|
|
|
query = (OAuthApplication
|
|
|
|
.select()
|
|
|
|
.join(User)
|
|
|
|
.where(OAuthApplication.organization == org))
|
|
|
|
|
|
|
|
return query
|
2014-03-25 00:57:02 +00:00
|
|
|
|
|
|
|
|
|
|
|
def create_access_token_for_testing(user, client_id, scope):
|
2014-05-23 18:16:26 +00:00
|
|
|
expires_at = datetime.utcnow() + timedelta(seconds=10000)
|
2014-03-25 00:57:02 +00:00
|
|
|
application = get_application_for_client_id(client_id)
|
|
|
|
OAuthAccessToken.create(application=application, authorized_user=user, scope=scope,
|
|
|
|
token_type='token', access_token='test',
|
|
|
|
expires_at=expires_at, refresh_token='', data='')
|