您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符

oauth_server.py 7.6KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. from collections.abc import Callable
  2. from functools import wraps
  3. from typing import Concatenate, ParamSpec, TypeVar, cast
  4. import flask_login
  5. from flask import jsonify, request
  6. from flask_restx import Resource, reqparse
  7. from werkzeug.exceptions import BadRequest, NotFound
  8. from controllers.console.wraps import account_initialization_required, setup_required
  9. from core.model_runtime.utils.encoders import jsonable_encoder
  10. from libs.login import login_required
  11. from models.account import Account
  12. from models.model import OAuthProviderApp
  13. from services.oauth_server import OAUTH_ACCESS_TOKEN_EXPIRES_IN, OAuthGrantType, OAuthServerService
  14. from .. import console_ns
  15. P = ParamSpec("P")
  16. R = TypeVar("R")
  17. T = TypeVar("T")
  18. def oauth_server_client_id_required(view: Callable[Concatenate[T, OAuthProviderApp, P], R]):
  19. @wraps(view)
  20. def decorated(self: T, *args: P.args, **kwargs: P.kwargs):
  21. parser = reqparse.RequestParser()
  22. parser.add_argument("client_id", type=str, required=True, location="json")
  23. parsed_args = parser.parse_args()
  24. client_id = parsed_args.get("client_id")
  25. if not client_id:
  26. raise BadRequest("client_id is required")
  27. oauth_provider_app = OAuthServerService.get_oauth_provider_app(client_id)
  28. if not oauth_provider_app:
  29. raise NotFound("client_id is invalid")
  30. return view(self, oauth_provider_app, *args, **kwargs)
  31. return decorated
  32. def oauth_server_access_token_required(view: Callable[Concatenate[T, OAuthProviderApp, Account, P], R]):
  33. @wraps(view)
  34. def decorated(self: T, oauth_provider_app: OAuthProviderApp, *args: P.args, **kwargs: P.kwargs):
  35. if not isinstance(oauth_provider_app, OAuthProviderApp):
  36. raise BadRequest("Invalid oauth_provider_app")
  37. authorization_header = request.headers.get("Authorization")
  38. if not authorization_header:
  39. response = jsonify({"error": "Authorization header is required"})
  40. response.status_code = 401
  41. response.headers["WWW-Authenticate"] = "Bearer"
  42. return response
  43. parts = authorization_header.strip().split(None, 1)
  44. if len(parts) != 2:
  45. response = jsonify({"error": "Invalid Authorization header format"})
  46. response.status_code = 401
  47. response.headers["WWW-Authenticate"] = "Bearer"
  48. return response
  49. token_type = parts[0].strip()
  50. if token_type.lower() != "bearer":
  51. response = jsonify({"error": "token_type is invalid"})
  52. response.status_code = 401
  53. response.headers["WWW-Authenticate"] = "Bearer"
  54. return response
  55. access_token = parts[1].strip()
  56. if not access_token:
  57. response = jsonify({"error": "access_token is required"})
  58. response.status_code = 401
  59. response.headers["WWW-Authenticate"] = "Bearer"
  60. return response
  61. account = OAuthServerService.validate_oauth_access_token(oauth_provider_app.client_id, access_token)
  62. if not account:
  63. response = jsonify({"error": "access_token or client_id is invalid"})
  64. response.status_code = 401
  65. response.headers["WWW-Authenticate"] = "Bearer"
  66. return response
  67. return view(self, oauth_provider_app, account, *args, **kwargs)
  68. return decorated
  69. @console_ns.route("/oauth/provider")
  70. class OAuthServerAppApi(Resource):
  71. @setup_required
  72. @oauth_server_client_id_required
  73. def post(self, oauth_provider_app: OAuthProviderApp):
  74. parser = reqparse.RequestParser()
  75. parser.add_argument("redirect_uri", type=str, required=True, location="json")
  76. parsed_args = parser.parse_args()
  77. redirect_uri = parsed_args.get("redirect_uri")
  78. # check if redirect_uri is valid
  79. if redirect_uri not in oauth_provider_app.redirect_uris:
  80. raise BadRequest("redirect_uri is invalid")
  81. return jsonable_encoder(
  82. {
  83. "app_icon": oauth_provider_app.app_icon,
  84. "app_label": oauth_provider_app.app_label,
  85. "scope": oauth_provider_app.scope,
  86. }
  87. )
  88. @console_ns.route("/oauth/provider/authorize")
  89. class OAuthServerUserAuthorizeApi(Resource):
  90. @setup_required
  91. @login_required
  92. @account_initialization_required
  93. @oauth_server_client_id_required
  94. def post(self, oauth_provider_app: OAuthProviderApp):
  95. account = cast(Account, flask_login.current_user)
  96. user_account_id = account.id
  97. code = OAuthServerService.sign_oauth_authorization_code(oauth_provider_app.client_id, user_account_id)
  98. return jsonable_encoder(
  99. {
  100. "code": code,
  101. }
  102. )
  103. @console_ns.route("/oauth/provider/token")
  104. class OAuthServerUserTokenApi(Resource):
  105. @setup_required
  106. @oauth_server_client_id_required
  107. def post(self, oauth_provider_app: OAuthProviderApp):
  108. parser = reqparse.RequestParser()
  109. parser.add_argument("grant_type", type=str, required=True, location="json")
  110. parser.add_argument("code", type=str, required=False, location="json")
  111. parser.add_argument("client_secret", type=str, required=False, location="json")
  112. parser.add_argument("redirect_uri", type=str, required=False, location="json")
  113. parser.add_argument("refresh_token", type=str, required=False, location="json")
  114. parsed_args = parser.parse_args()
  115. try:
  116. grant_type = OAuthGrantType(parsed_args["grant_type"])
  117. except ValueError:
  118. raise BadRequest("invalid grant_type")
  119. if grant_type == OAuthGrantType.AUTHORIZATION_CODE:
  120. if not parsed_args["code"]:
  121. raise BadRequest("code is required")
  122. if parsed_args["client_secret"] != oauth_provider_app.client_secret:
  123. raise BadRequest("client_secret is invalid")
  124. if parsed_args["redirect_uri"] not in oauth_provider_app.redirect_uris:
  125. raise BadRequest("redirect_uri is invalid")
  126. access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
  127. grant_type, code=parsed_args["code"], client_id=oauth_provider_app.client_id
  128. )
  129. return jsonable_encoder(
  130. {
  131. "access_token": access_token,
  132. "token_type": "Bearer",
  133. "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
  134. "refresh_token": refresh_token,
  135. }
  136. )
  137. elif grant_type == OAuthGrantType.REFRESH_TOKEN:
  138. if not parsed_args["refresh_token"]:
  139. raise BadRequest("refresh_token is required")
  140. access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
  141. grant_type, refresh_token=parsed_args["refresh_token"], client_id=oauth_provider_app.client_id
  142. )
  143. return jsonable_encoder(
  144. {
  145. "access_token": access_token,
  146. "token_type": "Bearer",
  147. "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
  148. "refresh_token": refresh_token,
  149. }
  150. )
  151. @console_ns.route("/oauth/provider/account")
  152. class OAuthServerUserAccountApi(Resource):
  153. @setup_required
  154. @oauth_server_client_id_required
  155. @oauth_server_access_token_required
  156. def post(self, oauth_provider_app: OAuthProviderApp, account: Account):
  157. return jsonable_encoder(
  158. {
  159. "name": account.name,
  160. "email": account.email,
  161. "avatar": account.avatar,
  162. "interface_language": account.interface_language,
  163. "timezone": account.timezone,
  164. }
  165. )