1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
|
"""JWT as Authorisation Grant"""
from flask import current_app as app
from authlib.oauth2.rfc7523.jwt_bearer import JWTBearerGrant as _JWTBearerGrant
from authlib.oauth2.rfc7523.token import (
JWTBearerTokenGenerator as _JWTBearerTokenGenerator)
from gn_auth.auth.db.sqlite3 import with_db_connection
from gn_auth.auth.authentication.users import user_by_id
class JWTBearerTokenGenerator(_JWTBearerTokenGenerator):
"""
A JSON Web Token formatted bearer token generator for jwt-bearer grant type.
"""
DEFAULT_EXPIRES_IN = 300
def get_token_data(#pylint: disable=[too-many-arguments]
self, grant_type, client, expires_in=300, user=None, scope=None
):
"""Post process data to prevent JSON serialization problems."""
tokendata = super().get_token_data(
grant_type, client, expires_in, user, scope)
return {
**{
key: str(value) if key.endswith("_id") else value
for key, value in tokendata.items()
},
"sub": str(tokendata["sub"])}
class JWTBearerGrant(_JWTBearerGrant):
"""Implement JWT as Authorisation Grant."""
TOKEN_ENDPOINT_AUTH_METHODS = ["client_secret_post", "client_secret_jwt"]
def resolve_issuer_client(self, issuer):
"""Fetch client via "iss" in assertion claims."""
return with_db_connection(
lambda conn: self.server.query_client(issuer))
def resolve_client_key(self, client, headers, payload):
"""Resolve client key to decode assertion data."""
return app.config["SSL_PUBLIC_KEYS"].get(headers["kid"])
def authenticate_user(self, subject):
"""Authenticate user with the given assertion claims."""
return with_db_connection(lambda conn: user_by_id(conn, subject))
def has_granted_permission(self, client, user):
"""
Check if the client has permission to access the given user's resource.
"""
return True # TODO: Check this!!!
|