aboutsummaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorFrederick Muriuki Muriithi2024-04-24 11:37:19 +0300
committerFrederick Muriuki Muriithi2024-04-24 11:37:19 +0300
commit9a53bf35e1a5165f8af8669cb3d2dfe2917f4d3d (patch)
tree8723ecd865cfb1a3a521208f15f8b2ac9f8f1394 /scripts
parent6d61ef8de94fa87cb6ee31cc57f1f37dd04d097d (diff)
downloadgn-auth-9a53bf35e1a5165f8af8669cb3d2dfe2917f4d3d.tar.gz
Move entry-point wsgi.py file/script to gn_auth package
Diffstat (limited to 'scripts')
-rw-r--r--scripts/gn_auth_wsgi.py157
1 files changed, 0 insertions, 157 deletions
diff --git a/scripts/gn_auth_wsgi.py b/scripts/gn_auth_wsgi.py
deleted file mode 100644
index 811a0d5..0000000
--- a/scripts/gn_auth_wsgi.py
+++ /dev/null
@@ -1,157 +0,0 @@
-"""Main entry point for project"""
-import os
-import sys
-import uuid
-import json
-import logging
-from math import ceil
-from pathlib import Path
-from typing import Callable
-from datetime import datetime
-
-import click
-from flask import Flask
-from yoyo import get_backend, read_migrations
-
-from gn_auth import migrations
-from gn_auth import create_app
-
-from gn_auth.auth.db import sqlite3 as db
-from gn_auth.auth.errors import NotFoundError
-from gn_auth.auth.authentication.users import user_by_id, hash_password
-from gn_auth.auth.authorisation.users.admin.models import make_sys_admin
-
-from scripts import register_sys_admin as rsysadm# type: ignore[import]
-from scripts import migrate_existing_data as med# type: ignore[import]
-
-
-def dev_loggers(appl: Flask) -> None:
- """Setup the logging handlers."""
- stderr_handler = logging.StreamHandler(stream=sys.stderr)
- appl.logger.addHandler(stderr_handler)
-
- root_logger = logging.getLogger()
- root_logger.addHandler(stderr_handler)
- root_logger.setLevel(appl.config["LOGLEVEL"])
-
-
-def gunicorn_loggers(appl: Flask) -> None:
- """Use gunicorn logging handlers for the application."""
- logger = logging.getLogger("gunicorn.error")
- appl.logger.handlers = logger.handlers
- appl.logger.setLevel(logger.level)
-
-
-def setup_loggers() -> Callable[[Flask], None]:
- """
- Setup the loggers according to the WSGI server used to run the application.
- """
- # https://datatracker.ietf.org/doc/html/draft-coar-cgi-v11-03#section-4.1.17
- # https://wsgi.readthedocs.io/en/latest/proposals-2.0.html#making-some-keys-required
- # https://peps.python.org/pep-3333/#id4
- software, *_version_and_comments = os.environ.get(
- "SERVER_SOFTWARE", "").split('/')
- return gunicorn_loggers if bool(software) else dev_loggers
-
-# app = create_app()
-app = create_app(setup_logging=setup_loggers())
-
-##### BEGIN: CLI Commands #####
-
-@app.cli.command()
-def apply_migrations():
- """Apply the dabasase migrations."""
- migrations.apply_migrations(
- get_backend(f'sqlite:///{app.config["AUTH_DB"]}'),
- read_migrations(app.config["AUTH_MIGRATIONS"]))
-
-def __init_dev_users__():
- """Initialise dev users. Get's used in more than one place"""
- dev_users_query = "INSERT INTO users VALUES (:user_id, :email, :name)"
- dev_users_passwd = "INSERT INTO user_credentials VALUES (:user_id, :hash)"
- dev_users = ({
- "user_id": "0ad1917c-57da-46dc-b79e-c81c91e5b928",
- "email": "test@development.user",
- "name": "Test Development User",
- "password": "testpasswd"},)
-
- with db.connection(app.config["AUTH_DB"]) as conn, db.cursor(conn) as cursor:
- cursor.executemany(dev_users_query, dev_users)
- cursor.executemany(dev_users_passwd, (
- {**usr, "hash": hash_password(usr["password"])}
- for usr in dev_users))
-
-@app.cli.command()
-def init_dev_users():
- """
- Initialise development users for OAuth2 sessions.
-
- **NOTE**: You really should not run this in production/staging
- """
- __init_dev_users__()
-
-@app.cli.command()
-def init_dev_clients():
- """
- Initialise a development client for OAuth2 sessions.
-
- **NOTE**: You really should not run this in production/staging
- """
- __init_dev_users__()
- dev_clients_query = (
- "INSERT INTO oauth2_clients VALUES ("
- ":client_id, :client_secret, :client_id_issued_at, "
- ":client_secret_expires_at, :client_metadata, :user_id"
- ")")
- dev_clients = ({
- "client_id": "0bbfca82-d73f-4bd4-a140-5ae7abb4a64d",
- "client_secret": "yadabadaboo",
- "client_id_issued_at": ceil(datetime.now().timestamp()),
- "client_secret_expires_at": 0,
- "client_metadata": json.dumps({
- "client_name": "GN2 Dev Server",
- "token_endpoint_auth_method": [
- "client_secret_post", "client_secret_basic"],
- "client_type": "confidential",
- "grant_types": ["password", "authorization_code", "refresh_token"],
- "default_redirect_uri": "http://localhost:5033/oauth2/code",
- "redirect_uris": ["http://localhost:5033/oauth2/code",
- "http://localhost:5033/oauth2/token"],
- "response_type": ["code", "token"],
- "scope": ["profile", "group", "role", "resource", "register-client",
- "user", "masquerade", "migrate-data", "introspect"]
- }),
- "user_id": "0ad1917c-57da-46dc-b79e-c81c91e5b928"},)
-
- with db.connection(app.config["AUTH_DB"]) as conn, db.cursor(conn) as cursor:
- cursor.executemany(dev_clients_query, dev_clients)
-
-
-@app.cli.command()
-@click.argument("user_id", type=click.UUID)
-def assign_system_admin(user_id: uuid.UUID):
- """Assign user with ID `user_id` administrator role."""
- try:
- dburi = app.config["AUTH_DB"]
- with db.connection(dburi) as conn, db.cursor(conn) as cursor:
- make_sys_admin(cursor, user_by_id(conn, user_id))
- return 0
- except NotFoundError as nfe:
- print(nfe, file=sys.stderr)
- sys.exit(1)
-
-@app.cli.command()
-def make_data_public():
- """Make existing data that is not assigned to any group publicly visible."""
- med.entry(app.config["AUTH_DB"], app.config["SQL_URI"])
-
-@app.cli.command()
-def register_admin():
- """Register the administrator."""
- rsysadm.register_admin(Path(app.config["AUTH_DB"]))
-
-##### END: CLI Commands #####
-
-if __name__ == '__main__':
- print("Starting app...")
- app.run()