| author | durandn |
| Thu, 21 Apr 2016 12:04:00 +0200 | |
| changeset 58 | c56ca9e06cc8 |
| parent 40 | 10a829681179 |
| permissions | -rw-r--r-- |
| 1 | 1 |
# coding: utf-8 |
2 |
||
3 |
from datetime import datetime, timedelta |
|
4 |
from flask import Flask |
|
5 |
from flask import session, request |
|
6 |
from flask import render_template, redirect, jsonify |
|
7 |
from flask_sqlalchemy import SQLAlchemy |
|
8 |
from werkzeug.security import gen_salt |
|
9 |
from flask_oauthlib.provider import OAuth2Provider |
|
10 |
from settings.oauth_settings import OAuthSettings |
|
|
29
23de98e32b3b
added uai field to user model and corresponding migrations + edited test oauth server to serve uai info for testing
durandn
parents:
10
diff
changeset
|
11 |
import uuid |
| 1 | 12 |
|
13 |
app = Flask(__name__, template_folder='templates') |
|
14 |
app.debug = True |
|
15 |
app.secret_key = 'secret' |
|
16 |
app.config.from_object(OAuthSettings) |
|
17 |
app.config.update({ |
|
18 |
'SQLALCHEMY_DATABASE_URI': 'sqlite:///db.sqlite', |
|
19 |
}) |
|
20 |
db = SQLAlchemy(app) |
|
21 |
oauth = OAuth2Provider(app) |
|
22 |
||
23 |
||
24 |
class User(db.Model): |
|
|
29
23de98e32b3b
added uai field to user model and corresponding migrations + edited test oauth server to serve uai info for testing
durandn
parents:
10
diff
changeset
|
25 |
id = db.Column(db.String(256), primary_key=True) |
| 1 | 26 |
username = db.Column(db.String(40), unique=True) |
|
29
23de98e32b3b
added uai field to user model and corresponding migrations + edited test oauth server to serve uai info for testing
durandn
parents:
10
diff
changeset
|
27 |
uai = db.Column(db.String(40), default="uaidefault") |
| 1 | 28 |
|
29 |
class Client(db.Model): |
|
30 |
client_id = db.Column(db.String(40), primary_key=True) |
|
31 |
client_secret = db.Column(db.String(55), nullable=False) |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
32 |
client_type = db.Column(db.String(12), nullable=False, default='public') |
| 1 | 33 |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
34 |
user_id = db.Column(db.ForeignKey('user.id')) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
35 |
user = db.relationship('User') |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
36 |
|
| 1 | 37 |
_redirect_uris = db.Column(db.Text) |
38 |
_default_scopes = db.Column(db.Text) |
|
39 |
||
40 |
@property |
|
41 |
def redirect_uris(self): |
|
42 |
if self._redirect_uris: |
|
43 |
return self._redirect_uris.split() |
|
44 |
return [] |
|
45 |
||
46 |
@property |
|
47 |
def default_redirect_uri(self): |
|
48 |
return self.redirect_uris[0] |
|
49 |
||
50 |
@property |
|
51 |
def default_scopes(self): |
|
52 |
if self._default_scopes: |
|
53 |
return self._default_scopes.split() |
|
54 |
return [] |
|
55 |
||
56 |
||
57 |
class Grant(db.Model): |
|
58 |
id = db.Column(db.Integer, primary_key=True) |
|
59 |
||
60 |
user_id = db.Column( |
|
61 |
db.Integer, db.ForeignKey('user.id', ondelete='CASCADE') |
|
62 |
) |
|
63 |
user = db.relationship('User') |
|
64 |
||
65 |
client_id = db.Column( |
|
66 |
db.String(40), db.ForeignKey('client.client_id'), |
|
67 |
nullable=False, |
|
68 |
) |
|
69 |
client = db.relationship('Client') |
|
70 |
||
71 |
code = db.Column(db.String(255), index=True, nullable=False) |
|
72 |
||
73 |
redirect_uri = db.Column(db.String(255)) |
|
74 |
expires = db.Column(db.DateTime) |
|
75 |
||
76 |
_scopes = db.Column(db.Text) |
|
77 |
||
78 |
def delete(self): |
|
79 |
db.session.delete(self) |
|
80 |
db.session.commit() |
|
81 |
return self |
|
82 |
||
83 |
@property |
|
84 |
def scopes(self): |
|
85 |
if self._scopes: |
|
86 |
return self._scopes.split() |
|
87 |
return [] |
|
88 |
||
89 |
||
90 |
class Token(db.Model): |
|
91 |
id = db.Column(db.Integer, primary_key=True) |
|
92 |
client_id = db.Column( |
|
93 |
db.String(40), db.ForeignKey('client.client_id'), |
|
94 |
nullable=False, |
|
95 |
) |
|
96 |
client = db.relationship('Client') |
|
97 |
||
98 |
user_id = db.Column( |
|
99 |
db.Integer, db.ForeignKey('user.id') |
|
100 |
) |
|
101 |
user = db.relationship('User') |
|
102 |
||
103 |
# currently only bearer is supported |
|
104 |
token_type = db.Column(db.String(40)) |
|
105 |
||
106 |
access_token = db.Column(db.String(255), unique=True) |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
107 |
refresh_token = db.Column(db.String(255), unique=True, nullable=True) |
| 1 | 108 |
expires = db.Column(db.DateTime) |
109 |
_scopes = db.Column(db.Text) |
|
110 |
||
111 |
@property |
|
112 |
def scopes(self): |
|
113 |
if self._scopes: |
|
114 |
return self._scopes.split() |
|
115 |
return [] |
|
116 |
||
117 |
||
118 |
def current_user(): |
|
119 |
if 'id' in session: |
|
120 |
uid = session['id'] |
|
121 |
return User.query.get(uid) |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
122 |
print(session) |
| 1 | 123 |
return None |
124 |
||
125 |
||
126 |
@app.route('/', methods=('GET', 'POST')) |
|
127 |
def home(): |
|
128 |
if request.method == 'POST': |
|
129 |
username = request.form.get('username') |
|
130 |
user = User.query.filter_by(username=username).first() |
|
131 |
if not user: |
|
|
29
23de98e32b3b
added uai field to user model and corresponding migrations + edited test oauth server to serve uai info for testing
durandn
parents:
10
diff
changeset
|
132 |
user = User(id=str(uuid.uuid4()), username=username) |
| 1 | 133 |
db.session.add(user) |
134 |
db.session.commit() |
|
135 |
session['id'] = user.id |
|
136 |
return redirect('/') |
|
137 |
user = current_user() |
|
138 |
return render_template('oauth/home.html', user=user) |
|
139 |
||
140 |
@oauth.clientgetter |
|
141 |
def load_client(client_id): |
|
142 |
return Client.query.filter_by(client_id=client_id).first() |
|
143 |
||
144 |
||
145 |
@oauth.grantgetter |
|
146 |
def load_grant(client_id, code): |
|
147 |
return Grant.query.filter_by(client_id=client_id, code=code).first() |
|
148 |
||
149 |
||
150 |
@oauth.grantsetter |
|
151 |
def save_grant(client_id, code, request, *args, **kwargs): |
|
152 |
# decide the expires time yourself |
|
153 |
expires = datetime.utcnow() + timedelta(seconds=100) |
|
154 |
grant = Grant( |
|
155 |
client_id=client_id, |
|
156 |
code=code['code'], |
|
157 |
redirect_uri=request.redirect_uri, |
|
158 |
_scopes=' '.join(request.scopes), |
|
159 |
user=current_user(), |
|
160 |
expires=expires |
|
161 |
) |
|
162 |
db.session.add(grant) |
|
163 |
db.session.commit() |
|
164 |
return grant |
|
165 |
||
166 |
||
167 |
@oauth.tokengetter |
|
168 |
def load_token(access_token=None, refresh_token=None): |
|
169 |
if access_token: |
|
170 |
return Token.query.filter_by(access_token=access_token).first() |
|
171 |
elif refresh_token: |
|
172 |
return Token.query.filter_by(refresh_token=refresh_token).first() |
|
173 |
||
174 |
||
175 |
@oauth.tokensetter |
|
176 |
def save_token(token, request, *args, **kwargs): |
|
177 |
toks = Token.query.filter_by( |
|
178 |
client_id=request.client.client_id, |
|
179 |
user_id=request.user.id |
|
180 |
) |
|
181 |
# make sure that every client has only one token connected to a user |
|
182 |
for t in toks: |
|
183 |
db.session.delete(t) |
|
184 |
||
185 |
expires_in = token.pop('expires_in') |
|
186 |
expires = datetime.utcnow() + timedelta(seconds=expires_in) |
|
187 |
||
188 |
tok = Token( |
|
189 |
access_token=token['access_token'], |
|
190 |
token_type=token['token_type'], |
|
191 |
_scopes=token['scope'], |
|
192 |
expires=expires, |
|
193 |
client_id=request.client.client_id, |
|
194 |
user_id=request.user.id, |
|
195 |
) |
|
196 |
db.session.add(tok) |
|
197 |
db.session.commit() |
|
198 |
return tok |
|
199 |
||
200 |
||
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
201 |
@app.route('/oauth/oauth2/token', methods=['GET', 'POST']) |
| 1 | 202 |
@oauth.token_handler |
203 |
def access_token(): |
|
204 |
return None |
|
205 |
||
206 |
||
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
207 |
@app.route('/oauth/oauth2/authorize', methods=['GET', 'POST']) |
| 1 | 208 |
@oauth.authorize_handler |
209 |
def authorize(*args, **kwargs): |
|
210 |
user = current_user() |
|
211 |
if not user: |
|
212 |
return redirect('/') |
|
213 |
if request.method == 'GET': |
|
214 |
client_id = kwargs.get('client_id') |
|
215 |
client = Client.query.filter_by(client_id=client_id).first() |
|
216 |
kwargs['client'] = client |
|
217 |
kwargs['user'] = user |
|
218 |
return render_template('oauth/authorize.html', **kwargs) |
|
219 |
||
220 |
confirm = request.form.get('confirm', 'no') |
|
221 |
return confirm == 'yes' |
|
222 |
||
223 |
||
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
224 |
@app.route('/rest/user/InfoComplete') |
| 1 | 225 |
@oauth.require_oauth() |
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
226 |
def user_info(): |
| 1 | 227 |
user = request.oauth.user |
|
29
23de98e32b3b
added uai field to user model and corresponding migrations + edited test oauth server to serve uai info for testing
durandn
parents:
10
diff
changeset
|
228 |
return jsonify(id=user.id, displayName=user.username, ENTPersonStructRattachUAI=user.uai) |
| 1 | 229 |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
230 |
@app.route('/rest/oauth/validate/<token>') |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
231 |
def validate_token(token): |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
232 |
database_token = Token.query.filter_by(access_token=token).first() |
|
40
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
233 |
uris = "" |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
234 |
scopes = "" |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
235 |
if database_token is not None: |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
236 |
related_client = database_token.client |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
237 |
scopes = database_token.scopes |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
238 |
uris = related_client.redirect_uris |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
239 |
if database_token is not None and database_token.access_token == token: |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
240 |
validate_errors = "0" |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
241 |
error_description = "" |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
242 |
else: |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
243 |
validate_errors = "1" |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
244 |
error_description = "token not found in db?" |
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
245 |
return jsonify( |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
246 |
access_token=token, |
|
58
c56ca9e06cc8
adapted oauth test server validation service to correct(/itop) token validation format
durandn
parents:
40
diff
changeset
|
247 |
uriredirect= uris, |
|
c56ca9e06cc8
adapted oauth test server validation service to correct(/itop) token validation format
durandn
parents:
40
diff
changeset
|
248 |
error=validate_errors, |
|
40
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
249 |
description= error_description, |
|
10a829681179
Changes on auth.py: better token extraction and validation, better logging, fix to validate response interpretation + changes to oauth.py to properly test changes to auth.py
durandn
parents:
29
diff
changeset
|
250 |
scope=scopes |
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
251 |
) |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
252 |
|
|
10
50b532f5e6cb
Adjusted oauth test server and client to better reflect GED interface
durandn
parents:
7
diff
changeset
|
253 |
@app.route('/ws/resource/', methods=["POST", "PUT"]) |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
254 |
@oauth.require_oauth() |
|
10
50b532f5e6cb
Adjusted oauth test server and client to better reflect GED interface
durandn
parents:
7
diff
changeset
|
255 |
def reference_resource(): |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
256 |
print("#########################") |
|
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
257 |
print(request.headers) |
|
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
258 |
print("#########################") |
|
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
259 |
print(request.data) |
|
10
50b532f5e6cb
Adjusted oauth test server and client to better reflect GED interface
durandn
parents:
7
diff
changeset
|
260 |
return "Request is valid", 200 |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
261 |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
262 |
def init_client(client_id, client_secret, redirect_uris, client_owner, confidential=False): |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
263 |
client = Client.query.filter_by(client_id=client_id, client_secret=client_secret).first() |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
264 |
if not client: |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
265 |
print("Creating client for "+client_owner) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
266 |
user = User.query.filter_by(username=client_owner).first() |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
267 |
if not user: |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
268 |
user = User(username=client_owner) |
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
269 |
db.session.add(user) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
270 |
db.session.commit() |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
271 |
if confidential: |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
272 |
type="confidential" |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
273 |
else: |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
274 |
type="public" |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
275 |
client = Client( |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
276 |
client_id=client_id, |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
277 |
client_secret=client_secret, |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
278 |
_redirect_uris=' '.join(redirect_uris), |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
279 |
_default_scopes='basic', |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
280 |
user_id=user.id, |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
281 |
client_type=type |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
282 |
) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
283 |
db.session.add(client) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
284 |
db.session.commit() |
| 1 | 285 |
|
286 |
if __name__ == '__main__': |
|
287 |
db.create_all() |
|
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
288 |
init_client( |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
289 |
client_id=app.config["RENKAN_CLIENT_ID"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
290 |
client_secret=app.config["RENKAN_CLIENT_SECRET"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
291 |
redirect_uris=app.config["RENKAN_REDIRECT_URIS"], |
|
7
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
292 |
client_owner=app.config["RENKAN_SERVER_USER"], |
|
cb21b50b7793
small corrections on oauth server and allauth provider + implemented post_save signals to reference resources into itop ged
durandn
parents:
5
diff
changeset
|
293 |
confidential=True |
|
5
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
294 |
) |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
295 |
init_client( |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
296 |
client_id=app.config["MOCK_GED_CLIENT_ID"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
297 |
client_secret=app.config["MOCK_GED_CLIENT_SECRET"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
298 |
redirect_uris=app.config["MOCK_GED_REDIRECT_URIS"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
299 |
client_owner=app.config["MOCK_GED_SERVER_USER"], |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
300 |
confidential=True |
|
4407b131a70e
adjustments on Oauth server and mock ged client + Readme
durandn
parents:
1
diff
changeset
|
301 |
) |
| 1 | 302 |
app.run() |