aboutsummaryrefslogtreecommitdiff
path: root/uploader/oauth2/client.py
blob: a3e4ba3d24e82e3ac07259b167543a3f6df077f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
"""OAuth2 client utilities."""
import json
from datetime import datetime, timedelta
from urllib.parse import urljoin, urlparse

import requests
from flask import request, current_app as app

from pymonad.either import Left, Right, Either

from authlib.jose import jwt
from authlib.common.urls import url_decode
from authlib.jose import KeySet, JsonWebKey
from authlib.jose.errors import BadSignatureError
from authlib.integrations.requests_client import OAuth2Session

from uploader import session
import uploader.monadic_requests as mrequests

SCOPE = ("profile group role resource register-client user masquerade "
         "introspect migrate-data")


def authserver_uri():
    """Return URI to authorisation server."""
    return app.config["AUTH_SERVER_URL"]


def oauth2_clientid():
    """Return the client id."""
    return app.config["OAUTH2_CLIENT_ID"]


def oauth2_clientsecret():
    """Return the client secret."""
    return app.config["OAUTH2_CLIENT_SECRET"]


def __make_token_validator__(keys: KeySet):
    """Make a token validator function."""
    def __validator__(token: dict):
        for key in keys.keys:
            try:
                jwt.decode(token["access_token"], key)
                return Right(token)
            except BadSignatureError:
                pass

        return Left("INVALID-TOKEN")

    return __validator__


def __validate_token__(sess_info):
    """Validate that the token is really from the auth server."""
    info = sess_info
    info["user"]["token"] = info["user"]["token"].then(__make_token_validator__(
        KeySet([JsonWebKey.import_key(key) for key in info.get(
            "auth_server_jwks", {}).get(
                "jwks", {"keys": []})["keys"]])))
    return session.save_session_info(info)


def __update_auth_server_jwks__(sess_info):
    """Updates the JWKs every 2 hours or so."""
    jwks = sess_info.get("auth_server_jwks")
    if bool(jwks):
        last_updated = jwks.get("last-updated")
        now = datetime.now().timestamp()
        if bool(last_updated) and (now - last_updated) < timedelta(hours=2).seconds:
            return __validate_token__({**sess_info, "auth_server_jwks": jwks})

    jwksuri = urljoin(authserver_uri(), "auth/public-jwks")
    return __validate_token__({
        **sess_info,
        "auth_server_jwks": {
            "jwks": KeySet([
                JsonWebKey.import_key(key)
                for key in requests.get(jwksuri).json()["jwks"]]).as_dict(),
            "last-updated": datetime.now().timestamp()
        }
    })


def oauth2_client():
    """Build the OAuth2 client for use fetching data."""
    def __update_token__(token, refresh_token=None, access_token=None):# pylint: disable=[unused-argument]
        """Update the token when refreshed."""
        session.set_user_token(token)

    def __json_auth__(client, _method, uri, headers, body):
        return (
            uri,
            {**headers, "Content-Type": "application/json"},
            json.dumps({
                **dict(url_decode(body)),
                "client_id": client.client_id,
                "client_secret": client.client_secret
            }))

    def __client__(token) -> OAuth2Session:
        client = OAuth2Session(
            oauth2_clientid(),
            oauth2_clientsecret(),
            scope=SCOPE,
            token_endpoint=urljoin(authserver_uri(), "/auth/token"),
            token_endpoint_auth_method="client_secret_post",
            token=token,
            update_token=__update_token__)
        client.register_client_auth_method(
            ("client_secret_post", __json_auth__))
        return client

    __update_auth_server_jwks__(session.session_info())
    return session.user_token().either(
        lambda _notok: __client__(None),
        __client__)


def user_logged_in():
    """Check whether the user has logged in."""
    suser = session.session_info()["user"]
    return suser["logged_in"] and suser["token"].is_right()


def authserver_authorise_uri():
    """Build up the authorisation URI."""
    req_baseurl = urlparse(request.base_url, scheme=request.scheme)
    host_uri = f"{req_baseurl.scheme}://{req_baseurl.netloc}/"
    return urljoin(
        authserver_uri(),
        "auth/authorise?response_type=code"
        f"&client_id={oauth2_clientid()}"
        f"&redirect_uri={urljoin(host_uri, 'oauth2/code')}")


def __no_token__(_err) -> Left:
    """Handle situation where request is attempted with no token."""
    resp = requests.models.Response()
    resp._content = json.dumps({#pylint: disable=[protected-access]
        "error": "AuthenticationError",
        "error-description": ("You need to authenticate to access requested "
                              "information.")}).encode("utf-8")
    resp.status_code = 400
    return Left(resp)


def oauth2_get(url, **kwargs) -> Either:
    """Do a get request to the authentication/authorisation server."""
    def __get__(_token) -> Either:
        _uri = urljoin(authserver_uri(), url)
        try:
            resp = oauth2_client().get(
                _uri,
                **{
                    **kwargs,
                    "headers": {
                        **kwargs.get("headers", {}),
                        "Content-Type": "application/json"
                    }
                })
            if resp.status_code in mrequests.SUCCESS_CODES:
                return Right(resp.json())
            return Left(resp)
        except Exception as exc:#pylint: disable=[broad-except]
            app.logger.error("Error retriving data from auth server: (GET %s)",
                             _uri,
                             exc_info=True)
            return Left(exc)
    return session.user_token().either(__no_token__, __get__)


def oauth2_post(url, data=None, json=None, **kwargs):#pylint: disable=[redefined-outer-name]
    """Do a POST request to the authentication/authorisation server."""
    def __post__(_token) -> Either:
        _uri = urljoin(authserver_uri(), url)
        _headers = ({
                        **kwargs.get("headers", {}),
                        "Content-Type": "application/json"
                    }
                    if bool(json) else kwargs.get("headers", {}))
        try:
            request_data = {
                **(data or {}),
                **(json or {}),
                "client_id": oauth2_clientid(),
                "client_secret": oauth2_clientsecret()
            }
            resp = oauth2_client().post(
                _uri,
                data=(request_data if bool(data) else None),
                json=(request_data if bool(json) else None),
                **{**kwargs, "headers": _headers})
            if resp.status_code in mrequests.SUCCESS_CODES:
                return Right(resp.json())
            return Left(resp)
        except Exception as exc:#pylint: disable=[broad-except]
            app.logger.error("Error retriving data from auth server: (POST %s)",
                             _uri,
                             exc_info=True)
            return Left(exc)
    return session.user_token().either(__no_token__, __post__)