Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

oauth_server.py 6.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. from functools import wraps
  2. from typing import cast
  3. import flask_login
  4. from flask import request
  5. from flask_restx import Resource, reqparse
  6. from werkzeug.exceptions import BadRequest, NotFound
  7. from controllers.console.wraps import account_initialization_required, setup_required
  8. from core.model_runtime.utils.encoders import jsonable_encoder
  9. from libs.login import login_required
  10. from models.account import Account
  11. from models.model import OAuthProviderApp
  12. from services.oauth_server import OAUTH_ACCESS_TOKEN_EXPIRES_IN, OAuthGrantType, OAuthServerService
  13. from .. import api
  14. def oauth_server_client_id_required(view):
  15. @wraps(view)
  16. def decorated(*args, **kwargs):
  17. parser = reqparse.RequestParser()
  18. parser.add_argument("client_id", type=str, required=True, location="json")
  19. parsed_args = parser.parse_args()
  20. client_id = parsed_args.get("client_id")
  21. if not client_id:
  22. raise BadRequest("client_id is required")
  23. oauth_provider_app = OAuthServerService.get_oauth_provider_app(client_id)
  24. if not oauth_provider_app:
  25. raise NotFound("client_id is invalid")
  26. kwargs["oauth_provider_app"] = oauth_provider_app
  27. return view(*args, **kwargs)
  28. return decorated
  29. def oauth_server_access_token_required(view):
  30. @wraps(view)
  31. def decorated(*args, **kwargs):
  32. oauth_provider_app = kwargs.get("oauth_provider_app")
  33. if not oauth_provider_app or not isinstance(oauth_provider_app, OAuthProviderApp):
  34. raise BadRequest("Invalid oauth_provider_app")
  35. authorization_header = request.headers.get("Authorization")
  36. if not authorization_header:
  37. raise BadRequest("Authorization header is required")
  38. parts = authorization_header.strip().split(" ")
  39. if len(parts) != 2:
  40. raise BadRequest("Invalid Authorization header format")
  41. token_type = parts[0].strip()
  42. if token_type.lower() != "bearer":
  43. raise BadRequest("token_type is invalid")
  44. access_token = parts[1].strip()
  45. if not access_token:
  46. raise BadRequest("access_token is required")
  47. account = OAuthServerService.validate_oauth_access_token(oauth_provider_app.client_id, access_token)
  48. if not account:
  49. raise BadRequest("access_token or client_id is invalid")
  50. kwargs["account"] = account
  51. return view(*args, **kwargs)
  52. return decorated
  53. class OAuthServerAppApi(Resource):
  54. @setup_required
  55. @oauth_server_client_id_required
  56. def post(self, oauth_provider_app: OAuthProviderApp):
  57. parser = reqparse.RequestParser()
  58. parser.add_argument("redirect_uri", type=str, required=True, location="json")
  59. parsed_args = parser.parse_args()
  60. redirect_uri = parsed_args.get("redirect_uri")
  61. # check if redirect_uri is valid
  62. if redirect_uri not in oauth_provider_app.redirect_uris:
  63. raise BadRequest("redirect_uri is invalid")
  64. return jsonable_encoder(
  65. {
  66. "app_icon": oauth_provider_app.app_icon,
  67. "app_label": oauth_provider_app.app_label,
  68. "scope": oauth_provider_app.scope,
  69. }
  70. )
  71. class OAuthServerUserAuthorizeApi(Resource):
  72. @setup_required
  73. @login_required
  74. @account_initialization_required
  75. @oauth_server_client_id_required
  76. def post(self, oauth_provider_app: OAuthProviderApp):
  77. account = cast(Account, flask_login.current_user)
  78. user_account_id = account.id
  79. code = OAuthServerService.sign_oauth_authorization_code(oauth_provider_app.client_id, user_account_id)
  80. return jsonable_encoder(
  81. {
  82. "code": code,
  83. }
  84. )
  85. class OAuthServerUserTokenApi(Resource):
  86. @setup_required
  87. @oauth_server_client_id_required
  88. def post(self, oauth_provider_app: OAuthProviderApp):
  89. parser = reqparse.RequestParser()
  90. parser.add_argument("grant_type", type=str, required=True, location="json")
  91. parser.add_argument("code", type=str, required=False, location="json")
  92. parser.add_argument("client_secret", type=str, required=False, location="json")
  93. parser.add_argument("redirect_uri", type=str, required=False, location="json")
  94. parser.add_argument("refresh_token", type=str, required=False, location="json")
  95. parsed_args = parser.parse_args()
  96. grant_type = OAuthGrantType(parsed_args["grant_type"])
  97. if grant_type == OAuthGrantType.AUTHORIZATION_CODE:
  98. if not parsed_args["code"]:
  99. raise BadRequest("code is required")
  100. if parsed_args["client_secret"] != oauth_provider_app.client_secret:
  101. raise BadRequest("client_secret is invalid")
  102. if parsed_args["redirect_uri"] not in oauth_provider_app.redirect_uris:
  103. raise BadRequest("redirect_uri is invalid")
  104. access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
  105. grant_type, code=parsed_args["code"], client_id=oauth_provider_app.client_id
  106. )
  107. return jsonable_encoder(
  108. {
  109. "access_token": access_token,
  110. "token_type": "Bearer",
  111. "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
  112. "refresh_token": refresh_token,
  113. }
  114. )
  115. elif grant_type == OAuthGrantType.REFRESH_TOKEN:
  116. if not parsed_args["refresh_token"]:
  117. raise BadRequest("refresh_token is required")
  118. access_token, refresh_token = OAuthServerService.sign_oauth_access_token(
  119. grant_type, refresh_token=parsed_args["refresh_token"], client_id=oauth_provider_app.client_id
  120. )
  121. return jsonable_encoder(
  122. {
  123. "access_token": access_token,
  124. "token_type": "Bearer",
  125. "expires_in": OAUTH_ACCESS_TOKEN_EXPIRES_IN,
  126. "refresh_token": refresh_token,
  127. }
  128. )
  129. else:
  130. raise BadRequest("invalid grant_type")
  131. class OAuthServerUserAccountApi(Resource):
  132. @setup_required
  133. @oauth_server_client_id_required
  134. @oauth_server_access_token_required
  135. def post(self, oauth_provider_app: OAuthProviderApp, account: Account):
  136. return jsonable_encoder(
  137. {
  138. "name": account.name,
  139. "email": account.email,
  140. "avatar": account.avatar,
  141. "interface_language": account.interface_language,
  142. "timezone": account.timezone,
  143. }
  144. )
  145. api.add_resource(OAuthServerAppApi, "/oauth/provider")
  146. api.add_resource(OAuthServerUserAuthorizeApi, "/oauth/provider/authorize")
  147. api.add_resource(OAuthServerUserTokenApi, "/oauth/provider/token")
  148. api.add_resource(OAuthServerUserAccountApi, "/oauth/provider/account")