Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(285)

Side by Side Diff: third_party/oauth2client/appengine.py

Issue 183793010: Added OAuth2 authentication to apply_issue (Closed) Base URL: https://chromium.googlesource.com/chromium/tools/depot_tools.git@master
Patch Set: Added another option Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 # Copyright (C) 2010 Google Inc.
2 #
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
6 #
7 # http://www.apache.org/licenses/LICENSE-2.0
8 #
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
14
15 """Utilities for Google App Engine
16
17 Utilities for making it easier to use OAuth 2.0 on Google App Engine.
18 """
19
20 __author__ = 'jcgregorio@google.com (Joe Gregorio)'
21
22 import base64
23 import httplib2
24 import logging
25 import pickle
26 import time
27
28 import clientsecrets
29
30 from anyjson import simplejson
31 from client import AccessTokenRefreshError
32 from client import AssertionCredentials
33 from client import Credentials
34 from client import Flow
35 from client import OAuth2WebServerFlow
36 from client import Storage
37 from google.appengine.api import memcache
38 from google.appengine.api import users
39 from google.appengine.api.app_identity import app_identity
40 from google.appengine.ext import db
41 from google.appengine.ext import webapp
42 from google.appengine.ext.webapp.util import login_required
43 from google.appengine.ext.webapp.util import run_wsgi_app
44
45 OAUTH2CLIENT_NAMESPACE = 'oauth2client#ns'
46
47
48 class InvalidClientSecretsError(Exception):
49 """The client_secrets.json file is malformed or missing required fields."""
50 pass
51
52
53 class AppAssertionCredentials(AssertionCredentials):
54 """Credentials object for App Engine Assertion Grants
55
56 This object will allow an App Engine application to identify itself to Google
57 and other OAuth 2.0 servers that can verify assertions. It can be used for
58 the purpose of accessing data stored under an account assigned to the App
59 Engine application itself. The algorithm used for generating the assertion is
60 the Signed JSON Web Token (JWT) algorithm. Additional details can be found at
61 the following link:
62
63 http://self-issued.info/docs/draft-jones-json-web-token.html
64
65 This credential does not require a flow to instantiate because it represents
66 a two legged flow, and therefore has all of the required information to
67 generate and refresh its own access tokens.
68
69 """
70
71 def __init__(self, scope,
72 audience='https://accounts.google.com/o/oauth2/token',
73 assertion_type='http://oauth.net/grant_type/jwt/1.0/bearer',
74 token_uri='https://accounts.google.com/o/oauth2/token', **kwargs):
75 """Constructor for AppAssertionCredentials
76
77 Args:
78 scope: string, scope of the credentials being requested.
79 audience: string, The audience, or verifier of the assertion. For
80 convenience defaults to Google's audience.
81 assertion_type: string, Type name that will identify the format of the
82 assertion string. For convience, defaults to the JSON Web Token (JWT)
83 assertion type string.
84 token_uri: string, URI for token endpoint. For convenience
85 defaults to Google's endpoints but any OAuth 2.0 provider can be used.
86 """
87 self.scope = scope
88 self.audience = audience
89 self.app_name = app_identity.get_service_account_name()
90
91 super(AppAssertionCredentials, self).__init__(
92 assertion_type,
93 None,
94 token_uri)
95
96 @classmethod
97 def from_json(cls, json):
98 data = simplejson.loads(json)
99 retval = AccessTokenCredentials(
100 data['scope'],
101 data['audience'],
102 data['assertion_type'],
103 data['token_uri'])
104 return retval
105
106 def _generate_assertion(self):
107 header = {
108 'typ': 'JWT',
109 'alg': 'RS256',
110 }
111
112 now = int(time.time())
113 claims = {
114 'aud': self.audience,
115 'scope': self.scope,
116 'iat': now,
117 'exp': now + 3600,
118 'iss': self.app_name,
119 }
120
121 jwt_components = [base64.b64encode(simplejson.dumps(seg))
122 for seg in [header, claims]]
123
124 base_str = ".".join(jwt_components)
125 key_name, signature = app_identity.sign_blob(base_str)
126 jwt_components.append(base64.b64encode(signature))
127 return ".".join(jwt_components)
128
129
130 class FlowProperty(db.Property):
131 """App Engine datastore Property for Flow.
132
133 Utility property that allows easy storage and retreival of an
134 oauth2client.Flow"""
135
136 # Tell what the user type is.
137 data_type = Flow
138
139 # For writing to datastore.
140 def get_value_for_datastore(self, model_instance):
141 flow = super(FlowProperty,
142 self).get_value_for_datastore(model_instance)
143 return db.Blob(pickle.dumps(flow))
144
145 # For reading from datastore.
146 def make_value_from_datastore(self, value):
147 if value is None:
148 return None
149 return pickle.loads(value)
150
151 def validate(self, value):
152 if value is not None and not isinstance(value, Flow):
153 raise db.BadValueError('Property %s must be convertible '
154 'to a FlowThreeLegged instance (%s)' %
155 (self.name, value))
156 return super(FlowProperty, self).validate(value)
157
158 def empty(self, value):
159 return not value
160
161
162 class CredentialsProperty(db.Property):
163 """App Engine datastore Property for Credentials.
164
165 Utility property that allows easy storage and retrieval of
166 oath2client.Credentials
167 """
168
169 # Tell what the user type is.
170 data_type = Credentials
171
172 # For writing to datastore.
173 def get_value_for_datastore(self, model_instance):
174 logging.info("get: Got type " + str(type(model_instance)))
175 cred = super(CredentialsProperty,
176 self).get_value_for_datastore(model_instance)
177 if cred is None:
178 cred = ''
179 else:
180 cred = cred.to_json()
181 return db.Blob(cred)
182
183 # For reading from datastore.
184 def make_value_from_datastore(self, value):
185 logging.info("make: Got type " + str(type(value)))
186 if value is None:
187 return None
188 if len(value) == 0:
189 return None
190 try:
191 credentials = Credentials.new_from_json(value)
192 except ValueError:
193 credentials = None
194 return credentials
195
196 def validate(self, value):
197 value = super(CredentialsProperty, self).validate(value)
198 logging.info("validate: Got type " + str(type(value)))
199 if value is not None and not isinstance(value, Credentials):
200 raise db.BadValueError('Property %s must be convertible '
201 'to a Credentials instance (%s)' %
202 (self.name, value))
203 #if value is not None and not isinstance(value, Credentials):
204 # return None
205 return value
206
207
208 class StorageByKeyName(Storage):
209 """Store and retrieve a single credential to and from
210 the App Engine datastore.
211
212 This Storage helper presumes the Credentials
213 have been stored as a CredenialsProperty
214 on a datastore model class, and that entities
215 are stored by key_name.
216 """
217
218 def __init__(self, model, key_name, property_name, cache=None):
219 """Constructor for Storage.
220
221 Args:
222 model: db.Model, model class
223 key_name: string, key name for the entity that has the credentials
224 property_name: string, name of the property that is a CredentialsProperty
225 cache: memcache, a write-through cache to put in front of the datastore
226 """
227 self._model = model
228 self._key_name = key_name
229 self._property_name = property_name
230 self._cache = cache
231
232 def locked_get(self):
233 """Retrieve Credential from datastore.
234
235 Returns:
236 oauth2client.Credentials
237 """
238 if self._cache:
239 json = self._cache.get(self._key_name)
240 if json:
241 return Credentials.new_from_json(json)
242
243 credential = None
244 entity = self._model.get_by_key_name(self._key_name)
245 if entity is not None:
246 credential = getattr(entity, self._property_name)
247 if credential and hasattr(credential, 'set_store'):
248 credential.set_store(self)
249 if self._cache:
250 self._cache.set(self._key_name, credentials.to_json())
251
252 return credential
253
254 def locked_put(self, credentials):
255 """Write a Credentials to the datastore.
256
257 Args:
258 credentials: Credentials, the credentials to store.
259 """
260 entity = self._model.get_or_insert(self._key_name)
261 setattr(entity, self._property_name, credentials)
262 entity.put()
263 if self._cache:
264 self._cache.set(self._key_name, credentials.to_json())
265
266
267 class CredentialsModel(db.Model):
268 """Storage for OAuth 2.0 Credentials
269
270 Storage of the model is keyed by the user.user_id().
271 """
272 credentials = CredentialsProperty()
273
274
275 class OAuth2Decorator(object):
276 """Utility for making OAuth 2.0 easier.
277
278 Instantiate and then use with oauth_required or oauth_aware
279 as decorators on webapp.RequestHandler methods.
280
281 Example:
282
283 decorator = OAuth2Decorator(
284 client_id='837...ent.com',
285 client_secret='Qh...wwI',
286 scope='https://www.googleapis.com/auth/plus')
287
288
289 class MainHandler(webapp.RequestHandler):
290
291 @decorator.oauth_required
292 def get(self):
293 http = decorator.http()
294 # http is authorized with the user's Credentials and can be used
295 # in API calls
296
297 """
298
299 def __init__(self, client_id, client_secret, scope,
300 auth_uri='https://accounts.google.com/o/oauth2/auth',
301 token_uri='https://accounts.google.com/o/oauth2/token',
302 message=None, **kwargs):
303
304 """Constructor for OAuth2Decorator
305
306 Args:
307 client_id: string, client identifier.
308 client_secret: string client secret.
309 scope: string or list of strings, scope(s) of the credentials being
310 requested.
311 auth_uri: string, URI for authorization endpoint. For convenience
312 defaults to Google's endpoints but any OAuth 2.0 provider can be used.
313 token_uri: string, URI for token endpoint. For convenience
314 defaults to Google's endpoints but any OAuth 2.0 provider can be used.
315 message: Message to display if there are problems with the OAuth 2.0
316 configuration. The message may contain HTML and will be presented on the
317 web interface for any method that uses the decorator.
318 **kwargs: dict, Keyword arguments are be passed along as kwargs to the
319 OAuth2WebServerFlow constructor.
320 """
321 self.flow = OAuth2WebServerFlow(client_id, client_secret, scope, None,
322 auth_uri, token_uri, **kwargs)
323 self.credentials = None
324 self._request_handler = None
325 self._message = message
326 self._in_error = False
327
328 def _display_error_message(self, request_handler):
329 request_handler.response.out.write('<html><body>')
330 request_handler.response.out.write(self._message)
331 request_handler.response.out.write('</body></html>')
332
333 def oauth_required(self, method):
334 """Decorator that starts the OAuth 2.0 dance.
335
336 Starts the OAuth dance for the logged in user if they haven't already
337 granted access for this application.
338
339 Args:
340 method: callable, to be decorated method of a webapp.RequestHandler
341 instance.
342 """
343
344 def check_oauth(request_handler, *args):
345 if self._in_error:
346 self._display_error_message(request_handler)
347 return
348
349 user = users.get_current_user()
350 # Don't use @login_decorator as this could be used in a POST request.
351 if not user:
352 request_handler.redirect(users.create_login_url(
353 request_handler.request.uri))
354 return
355 # Store the request URI in 'state' so we can use it later
356 self.flow.params['state'] = request_handler.request.url
357 self._request_handler = request_handler
358 self.credentials = StorageByKeyName(
359 CredentialsModel, user.user_id(), 'credentials').get()
360
361 if not self.has_credentials():
362 return request_handler.redirect(self.authorize_url())
363 try:
364 method(request_handler, *args)
365 except AccessTokenRefreshError:
366 return request_handler.redirect(self.authorize_url())
367
368 return check_oauth
369
370 def oauth_aware(self, method):
371 """Decorator that sets up for OAuth 2.0 dance, but doesn't do it.
372
373 Does all the setup for the OAuth dance, but doesn't initiate it.
374 This decorator is useful if you want to create a page that knows
375 whether or not the user has granted access to this application.
376 From within a method decorated with @oauth_aware the has_credentials()
377 and authorize_url() methods can be called.
378
379 Args:
380 method: callable, to be decorated method of a webapp.RequestHandler
381 instance.
382 """
383
384 def setup_oauth(request_handler, *args):
385 if self._in_error:
386 self._display_error_message(request_handler)
387 return
388
389 user = users.get_current_user()
390 # Don't use @login_decorator as this could be used in a POST request.
391 if not user:
392 request_handler.redirect(users.create_login_url(
393 request_handler.request.uri))
394 return
395
396
397 self.flow.params['state'] = request_handler.request.url
398 self._request_handler = request_handler
399 self.credentials = StorageByKeyName(
400 CredentialsModel, user.user_id(), 'credentials').get()
401 method(request_handler, *args)
402 return setup_oauth
403
404 def has_credentials(self):
405 """True if for the logged in user there are valid access Credentials.
406
407 Must only be called from with a webapp.RequestHandler subclassed method
408 that had been decorated with either @oauth_required or @oauth_aware.
409 """
410 return self.credentials is not None and not self.credentials.invalid
411
412 def authorize_url(self):
413 """Returns the URL to start the OAuth dance.
414
415 Must only be called from with a webapp.RequestHandler subclassed method
416 that had been decorated with either @oauth_required or @oauth_aware.
417 """
418 callback = self._request_handler.request.relative_url('/oauth2callback')
419 url = self.flow.step1_get_authorize_url(callback)
420 user = users.get_current_user()
421 memcache.set(user.user_id(), pickle.dumps(self.flow),
422 namespace=OAUTH2CLIENT_NAMESPACE)
423 return url
424
425 def http(self):
426 """Returns an authorized http instance.
427
428 Must only be called from within an @oauth_required decorated method, or
429 from within an @oauth_aware decorated method where has_credentials()
430 returns True.
431 """
432 return self.credentials.authorize(httplib2.Http())
433
434
435 class OAuth2DecoratorFromClientSecrets(OAuth2Decorator):
436 """An OAuth2Decorator that builds from a clientsecrets file.
437
438 Uses a clientsecrets file as the source for all the information when
439 constructing an OAuth2Decorator.
440
441 Example:
442
443 decorator = OAuth2DecoratorFromClientSecrets(
444 os.path.join(os.path.dirname(__file__), 'client_secrets.json')
445 scope='https://www.googleapis.com/auth/plus')
446
447
448 class MainHandler(webapp.RequestHandler):
449
450 @decorator.oauth_required
451 def get(self):
452 http = decorator.http()
453 # http is authorized with the user's Credentials and can be used
454 # in API calls
455 """
456
457 def __init__(self, filename, scope, message=None):
458 """Constructor
459
460 Args:
461 filename: string, File name of client secrets.
462 scope: string, Space separated list of scopes.
463 message: string, A friendly string to display to the user if the
464 clientsecrets file is missing or invalid. The message may contain HTML a nd
465 will be presented on the web interface for any method that uses the
466 decorator.
467 """
468 try:
469 client_type, client_info = clientsecrets.loadfile(filename)
470 if client_type not in [clientsecrets.TYPE_WEB, clientsecrets.TYPE_INSTALLE D]:
471 raise InvalidClientSecretsError('OAuth2Decorator doesn\'t support this O Auth 2.0 flow.')
472 super(OAuth2DecoratorFromClientSecrets,
473 self).__init__(
474 client_info['client_id'],
475 client_info['client_secret'],
476 scope,
477 client_info['auth_uri'],
478 client_info['token_uri'],
479 message)
480 except clientsecrets.InvalidClientSecretsError:
481 self._in_error = True
482 if message is not None:
483 self._message = message
484 else:
485 self._message = "Please configure your application for OAuth 2.0"
486
487
488 def oauth2decorator_from_clientsecrets(filename, scope, message=None):
489 """Creates an OAuth2Decorator populated from a clientsecrets file.
490
491 Args:
492 filename: string, File name of client secrets.
493 scope: string, Space separated list of scopes.
494 message: string, A friendly string to display to the user if the
495 clientsecrets file is missing or invalid. The message may contain HTML and
496 will be presented on the web interface for any method that uses the
497 decorator.
498
499 Returns: An OAuth2Decorator
500
501 """
502 return OAuth2DecoratorFromClientSecrets(filename, scope, message)
503
504
505 class OAuth2Handler(webapp.RequestHandler):
506 """Handler for the redirect_uri of the OAuth 2.0 dance."""
507
508 @login_required
509 def get(self):
510 error = self.request.get('error')
511 if error:
512 errormsg = self.request.get('error_description', error)
513 self.response.out.write(
514 'The authorization request failed: %s' % errormsg)
515 else:
516 user = users.get_current_user()
517 flow = pickle.loads(memcache.get(user.user_id(),
518 namespace=OAUTH2CLIENT_NAMESPACE))
519 # This code should be ammended with application specific error
520 # handling. The following cases should be considered:
521 # 1. What if the flow doesn't exist in memcache? Or is corrupt?
522 # 2. What if the step2_exchange fails?
523 if flow:
524 credentials = flow.step2_exchange(self.request.params)
525 StorageByKeyName(
526 CredentialsModel, user.user_id(), 'credentials').put(credentials)
527 self.redirect(str(self.request.get('state')))
528 else:
529 # TODO Add error handling here.
530 pass
531
532
533 application = webapp.WSGIApplication([('/oauth2callback', OAuth2Handler)])
534
535
536 def main():
537 run_wsgi_app(application)
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698