Decouple oauth methods from app with a namedtuple

This commit is contained in:
Sam Chow 2018-05-25 13:49:36 -04:00
parent d45b925155
commit e967fde3ae
7 changed files with 20 additions and 7 deletions

View file

@ -10,6 +10,7 @@ from auth.decorators import require_session_login
from auth.permissions import AdministerRepositoryPermission from auth.permissions import AdministerRepositoryPermission
from data import model from data import model
from endpoints.decorators import route_show_if, parse_repository_name from endpoints.decorators import route_show_if, parse_repository_name
from util.config import URLSchemeAndHostname
from util.http import abort from util.http import abort
@ -26,6 +27,7 @@ def attach_github_build_trigger(namespace_name, repo_name):
permission = AdministerRepositoryPermission(namespace_name, repo_name) permission = AdministerRepositoryPermission(namespace_name, repo_name)
if permission.can(): if permission.can():
code = request.args.get('code') code = request.args.get('code')
# url_scheme_and_hostname = URLSchemeAndHostname(app.config['PREFERRED_URL_SCHEME'], app.config['SERVER_HOSTNAME'])
token = github_trigger.exchange_code_for_token(app.config, client, code) token = github_trigger.exchange_code_for_token(app.config, client, code)
repo = model.repository.get_repository(namespace_name, repo_name) repo = model.repository.get_repository(namespace_name, repo_name)
if not repo: if not repo:

View file

@ -10,6 +10,7 @@ from auth.decorators import require_session_login
from auth.permissions import AdministerRepositoryPermission from auth.permissions import AdministerRepositoryPermission
from data import model from data import model
from endpoints.decorators import route_show_if from endpoints.decorators import route_show_if
from util.config import URLSchemeAndHostname
from util.http import abort from util.http import abort
@ -34,6 +35,7 @@ def attach_gitlab_build_trigger():
permission = AdministerRepositoryPermission(namespace, repository) permission = AdministerRepositoryPermission(namespace, repository)
if permission.can(): if permission.can():
code = request.args.get('code') code = request.args.get('code')
# url_scheme_and_hostname = URLSchemeAndHostname(app.config['PREFERRED_URL_SCHEME'], app.config['SERVER_HOSTNAME'])
token = gitlab_trigger.exchange_code_for_token(app.config, client, code, token = gitlab_trigger.exchange_code_for_token(app.config, client, code,
redirect_suffix='/trigger') redirect_suffix='/trigger')
if not token: if not token:

View file

@ -7,6 +7,7 @@ from abc import ABCMeta, abstractmethod
from six import add_metaclass from six import add_metaclass
from util import get_app_url from util import get_app_url
from util.config import URLSchemeAndHostname
logger = logging.getLogger(__name__) logger = logging.getLogger(__name__)
@ -111,9 +112,9 @@ class OAuthService(object):
return self.authorize_endpoint().with_params(params).to_url() return self.authorize_endpoint().with_params(params).to_url()
def get_redirect_uri(self, app_config, redirect_suffix=''): def get_redirect_uri(self, url_scheme_and_hostname, redirect_suffix=''):
return '%s://%s/oauth2/%s/callback%s' % (app_config['PREFERRED_URL_SCHEME'], return '%s://%s/oauth2/%s/callback%s' % (url_scheme_and_hostname.url_scheme,
app_config['SERVER_HOSTNAME'], url_scheme_and_hostname.hostname,
self.service_id(), self.service_id(),
redirect_suffix) redirect_suffix)
@ -153,10 +154,11 @@ class OAuthService(object):
def exchange_code(self, app_config, http_client, code, form_encode=False, redirect_suffix='', def exchange_code(self, app_config, http_client, code, form_encode=False, redirect_suffix='',
client_auth=False): client_auth=False):
""" Exchanges an OAuth access code for associated OAuth token and other data. """ """ Exchanges an OAuth access code for associated OAuth token and other data. """
url_scheme_and_hostname = URLSchemeAndHostname(app_config['PREFERRED_URL_SCHEME'], app_config['SERVER_HOSTNAME'])
payload = { payload = {
'code': code, 'code': code,
'grant_type': 'authorization_code', 'grant_type': 'authorization_code',
'redirect_uri': self.get_redirect_uri(app_config, redirect_suffix) 'redirect_uri': self.get_redirect_uri(url_scheme_and_hostname, redirect_suffix)
} }
headers = { headers = {

View file

@ -6,6 +6,7 @@ from six import add_metaclass
import features import features
from oauth.base import OAuthService, OAuthExchangeCodeException, OAuthGetUserInfoException from oauth.base import OAuthService, OAuthExchangeCodeException, OAuthGetUserInfoException
from util.config import URLSchemeAndHostname
logger = logging.getLogger(__name__) logger = logging.getLogger(__name__)
@ -64,6 +65,7 @@ class OAuthLoginService(OAuthService):
# Retrieve the token for the OAuth code. # Retrieve the token for the OAuth code.
try: try:
# url_scheme_and_hostname = URLSchemeAndHostname(app_config['PREFERRED_URL_SCHEME'], app_config['SERVER_HOSTNAME'])
token = self.exchange_code_for_token(app_config, http_client, code, token = self.exchange_code_for_token(app_config, http_client, code,
redirect_suffix=redirect_suffix, redirect_suffix=redirect_suffix,
form_encode=self.requires_form_encoding()) form_encode=self.requires_form_encoding())

View file

@ -29,13 +29,13 @@ class GitLabOAuthService(OAuthService):
def token_endpoint(self): def token_endpoint(self):
return OAuthEndpoint(slash_join(self._endpoint(), '/oauth/token')) return OAuthEndpoint(slash_join(self._endpoint(), '/oauth/token'))
def validate_client_id_and_secret(self, http_client, app_config): def validate_client_id_and_secret(self, http_client, url_scheme_and_hostname):
# We validate the client ID and secret by hitting the OAuth token exchange endpoint with # We validate the client ID and secret by hitting the OAuth token exchange endpoint with
# the real client ID and secret, but a fake auth code to exchange. Gitlab's implementation will # the real client ID and secret, but a fake auth code to exchange. Gitlab's implementation will
# return `invalid_client` as the `error` if the client ID or secret is invalid; otherwise, it # return `invalid_client` as the `error` if the client ID or secret is invalid; otherwise, it
# will return another error. # will return another error.
url = self.token_endpoint().to_url() url = self.token_endpoint().to_url()
redirect_uri = self.get_redirect_uri(app_config, redirect_suffix='trigger') redirect_uri = self.get_redirect_uri(url_scheme_and_hostname, redirect_suffix='trigger')
data = { data = {
'code': 'fakecode', 'code': 'fakecode',
'client_id': self.client_id(), 'client_id': self.client_id(),

View file

@ -0,0 +1,3 @@
from collections import namedtuple
URLSchemeAndHostname = namedtuple('URLSchemeAndHostname', ['url_scheme', 'hostname'])

View file

@ -1,4 +1,5 @@
from oauth.services.gitlab import GitLabOAuthService from oauth.services.gitlab import GitLabOAuthService
from util.config import URLSchemeAndHostname
from util.config.validators import BaseValidator, ConfigValidationException from util.config.validators import BaseValidator, ConfigValidationException
class GitLabTriggerValidator(BaseValidator): class GitLabTriggerValidator(BaseValidator):
@ -24,6 +25,7 @@ class GitLabTriggerValidator(BaseValidator):
client = app.config['HTTPCLIENT'] client = app.config['HTTPCLIENT']
oauth = GitLabOAuthService(config, 'GITLAB_TRIGGER_CONFIG') oauth = GitLabOAuthService(config, 'GITLAB_TRIGGER_CONFIG')
result = oauth.validate_client_id_and_secret(client, app.config) url_scheme_and_hostname = URLSchemeAndHostname(app.config['PREFERRED_URL_SCHEME'], app.config['SERVER_HOSTNAME'])
result = oauth.validate_client_id_and_secret(client, url_scheme_and_hostname)
if not result: if not result:
raise ConfigValidationException('Invalid client id or client secret') raise ConfigValidationException('Invalid client id or client secret')