| 
                        123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202 | 
                        - from functools import wraps
 - from typing import cast
 - 
 - import flask_login
 - from flask import jsonify, request
 - from flask_restx import Resource, reqparse
 - from werkzeug.exceptions import BadRequest, NotFound
 - 
 - from controllers.console.wraps import account_initialization_required, setup_required
 - from core.model_runtime.utils.encoders import jsonable_encoder
 - from libs.login import login_required
 - from models.account import Account
 - from models.model import OAuthProviderApp
 - from services.oauth_server import OAUTH_ACCESS_TOKEN_EXPIRES_IN, OAuthGrantType, OAuthServerService
 - 
 - from .. import api
 - 
 - 
 - def oauth_server_client_id_required(view):
 -     @wraps(view)
 -     def decorated(*args, **kwargs):
 -         parser = reqparse.RequestParser()
 -         parser.add_argument("client_id", type=str, required=True, location="json")
 -         parsed_args = parser.parse_args()
 -         client_id = parsed_args.get("client_id")
 -         if not client_id:
 -             raise BadRequest("client_id is required")
 - 
 -         oauth_provider_app = OAuthServerService.get_oauth_provider_app(client_id)
 -         if not oauth_provider_app:
 -             raise NotFound("client_id is invalid")
 - 
 -         kwargs["oauth_provider_app"] = oauth_provider_app
 - 
 -         return view(*args, **kwargs)
 - 
 -     return decorated
 - 
 - 
 - def oauth_server_access_token_required(view):
 -     @wraps(view)
 -     def decorated(*args, **kwargs):
 -         oauth_provider_app = kwargs.get("oauth_provider_app")
 -         if not oauth_provider_app or not isinstance(oauth_provider_app, OAuthProviderApp):
 -             raise BadRequest("Invalid oauth_provider_app")
 - 
 -         authorization_header = request.headers.get("Authorization")
 -         if not authorization_header:
 -             response = jsonify({"error": "Authorization header is required"})
 -             response.status_code = 401
 -             response.headers["WWW-Authenticate"] = "Bearer"
 -             return response
 - 
 -         parts = authorization_header.strip().split(None, 1)
 -         if len(parts) != 2:
 -             response = jsonify({"error": "Invalid Authorization header format"})
 -             response.status_code = 401
 -             response.headers["WWW-Authenticate"] = "Bearer"
 -             return response
 - 
 -         token_type = parts[0].strip()
 -         if token_type.lower() != "bearer":
 -             response = jsonify({"error": "token_type is invalid"})
 -             response.status_code = 401
 -             response.headers["WWW-Authenticate"] = "Bearer"
 -             return response
 - 
 -         access_token = parts[1].strip()
 -         if not access_token:
 -             response = jsonify({"error": "access_token is required"})
 -             response.status_code = 401
 -             response.headers["WWW-Authenticate"] = "Bearer"
 -             return response
 - 
 -         account = OAuthServerService.validate_oauth_access_token(oauth_provider_app.client_id, access_token)
 -         if not account:
 -             response = jsonify({"error": "access_token or client_id is invalid"})
 -             response.status_code = 401
 -             response.headers["WWW-Authenticate"] = "Bearer"
 -             return response
 - 
 -         kwargs["account"] = account
 - 
 -         return view(*args, **kwargs)
 - 
 -     return decorated
 - 
 - 
 - class OAuthServerAppApi(Resource):
 -     @setup_required
 -     @oauth_server_client_id_required
 -     def post(self, oauth_provider_app: OAuthProviderApp):
 -         parser = reqparse.RequestParser()
 -         parser.add_argument("redirect_uri", type=str, required=True, location="json")
 -         parsed_args = parser.parse_args()
 -         redirect_uri = parsed_args.get("redirect_uri")
 - 
 -         # check if redirect_uri is valid
 -         if redirect_uri not in oauth_provider_app.redirect_uris:
 -             raise BadRequest("redirect_uri is invalid")
 - 
 -         return jsonable_encoder(
 -             {
 -                 "app_icon": oauth_provider_app.app_icon,
 -                 "app_label": oauth_provider_app.app_label,
 -                 "scope": oauth_provider_app.scope,
 -             }
 -         )
 - 
 - 
 - class OAuthServerUserAuthorizeApi(Resource):
 -     @setup_required
 -     @login_required
 -     @account_initialization_required
 -     @oauth_server_client_id_required
 -     def post(self, oauth_provider_app: OAuthProviderApp):
 -         account = cast(Account, flask_login.current_user)
 -         user_account_id = account.id
 - 
 -         code = OAuthServerService.sign_oauth_authorization_code(oauth_provider_app.client_id, user_account_id)
 -         return jsonable_encoder(
 -             {
 -                 "code": code,
 -             }
 -         )
 - 
 - 
 - class OAuthServerUserTokenApi(Resource):
 -     @setup_required
 -     @oauth_server_client_id_required
 -     def post(self, oauth_provider_app: OAuthProviderApp):
 -         parser = reqparse.RequestParser()
 -         parser.add_argument("grant_type", type=str, required=True, location="json")
 -         parser.add_argument("code", type=str, required=False, location="json")
 -         parser.add_argument("client_secret", type=str, required=False, location="json")
 -         parser.add_argument("redirect_uri", type=str, required=False, location="json")
 -         parser.add_argument("refresh_token", type=str, required=False, location="json")
 -         parsed_args = parser.parse_args()
 - 
 -         try:
 -             grant_type = OAuthGrantType(parsed_args["grant_type"])
 -         except ValueError:
 -             raise BadRequest("invalid grant_type")
 - 
 -         if grant_type == OAuthGrantType.AUTHORIZATION_CODE:
 -             if not parsed_args["code"]:
 -                 raise BadRequest("code is required")
 - 
 -             if parsed_args["client_secret"] != oauth_provider_app.client_secret:
 -                 raise BadRequest("client_secret is invalid")
 - 
 -             if parsed_args["redirect_uri"] not in oauth_provider_app.redirect_uris:
 -                 raise BadRequest("redirect_uri is invalid")
 - 
 -             access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
 -                 grant_type, code=parsed_args["code"], client_id=oauth_provider_app.client_id
 -             )
 -             return jsonable_encoder(
 -                 {
 -                     "access_token": access_token,
 -                     "token_type": "Bearer",
 -                     "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
 -                     "refresh_token": refresh_token,
 -                 }
 -             )
 -         elif grant_type == OAuthGrantType.REFRESH_TOKEN:
 -             if not parsed_args["refresh_token"]:
 -                 raise BadRequest("refresh_token is required")
 - 
 -             access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
 -                 grant_type, refresh_token=parsed_args["refresh_token"], client_id=oauth_provider_app.client_id
 -             )
 -             return jsonable_encoder(
 -                 {
 -                     "access_token": access_token,
 -                     "token_type": "Bearer",
 -                     "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
 -                     "refresh_token": refresh_token,
 -                 }
 -             )
 - 
 - 
 - class OAuthServerUserAccountApi(Resource):
 -     @setup_required
 -     @oauth_server_client_id_required
 -     @oauth_server_access_token_required
 -     def post(self, oauth_provider_app: OAuthProviderApp, account: Account):
 -         return jsonable_encoder(
 -             {
 -                 "name": account.name,
 -                 "email": account.email,
 -                 "avatar": account.avatar,
 -                 "interface_language": account.interface_language,
 -                 "timezone": account.timezone,
 -             }
 -         )
 - 
 - 
 - api.add_resource(OAuthServerAppApi, "/oauth/provider")
 - api.add_resource(OAuthServerUserAuthorizeApi, "/oauth/provider/authorize")
 - api.add_resource(OAuthServerUserTokenApi, "/oauth/provider/token")
 - api.add_resource(OAuthServerUserAccountApi, "/oauth/provider/account")
 
 
  |