Initial tests for OAuthSignIn

This commit is contained in:
2017-08-24 12:38:43 +02:00
parent 45275c3831
commit cecf81a07d
4 changed files with 82 additions and 19 deletions

View File

@@ -3,7 +3,7 @@ import attr
import json
from rauth import OAuth2Service
from flask import current_app, url_for, request, redirect, session
from flask import current_app, url_for, request, redirect, session, Response
@attr.s
@@ -16,18 +16,29 @@ class OAuthUserResponse:
email = attr.ib(validator=attr.validators.instance_of(str))
class ProviderConfigurationMissing(ValueError):
"""Raised when an OAuth provider is used but not configured."""
class ProviderNotImplemented(ValueError):
"""Raised when a provider is requested that does not exist."""
class OAuthSignIn(metaclass=abc.ABCMeta):
providers = None
_providers = None # initialized in get_provider()
def __init__(self, provider_name):
self.provider_name = provider_name
credentials = current_app.config['OAUTH_CREDENTIALS'][provider_name]
try:
credentials = current_app.config['OAUTH_CREDENTIALS'][provider_name]
except KeyError:
raise ProviderConfigurationMissing(f'Missing OAuth credentials for {provider_name}')
self.consumer_id = credentials['id']
self.consumer_secret = credentials['secret']
@abc.abstractmethod
def authorize(self) -> redirect:
"""Redirect to the corret authorization endpoint for the current provider
def authorize(self) -> Response:
"""Redirect to the correct authorization endpoint for the current provider.
Depending on the provider, we sometimes have to specify a different
'scope'.
@@ -36,7 +47,7 @@ class OAuthSignIn(metaclass=abc.ABCMeta):
@abc.abstractmethod
def callback(self) -> OAuthUserResponse:
"""Callback performed after authorizing the user
"""Callback performed after authorizing the user.
This is usually a request to a protected /me endpoint to query for
user information, such as user id and email address.
@@ -48,14 +59,17 @@ class OAuthSignIn(metaclass=abc.ABCMeta):
_external=True)
@classmethod
def get_provider(cls, provider_name):
if cls.providers is None:
cls.providers = {}
def get_provider(cls, provider_name) -> 'OAuthSignIn':
if cls._providers is None:
cls._providers = {}
# TODO convert to the new __init_subclass__
for provider_class in cls.__subclasses__():
provider = provider_class()
cls.providers[provider.provider_name] = provider
return cls.providers[provider_name]
cls._providers[provider.provider_name] = provider
try:
return cls._providers[provider_name]
except KeyError:
raise ProviderNotImplemented(f'No such OAuth provider {provider_name}')
class BlenderIdSignIn(OAuthSignIn):
@@ -93,7 +107,7 @@ class BlenderIdSignIn(OAuthSignIn):
'redirect_uri': self.get_callback_url()},
decoder=decode_json
)
# TODO handle exception for failed oauth or not authorized
session['blender_id_oauth_token'] = oauth_session.access_token

View File

@@ -93,13 +93,15 @@ FULL_FILE_ACCESS_ROLES = {'admin', 'subscriber', 'demo'}
BLENDER_ID_CLIENT_ID = 'SPECIAL-SNOWFLAKE-57'
BLENDER_ID_SUBCLIENT_ID = 'PILLAR'
# Collection of supported OAuth providers (Blender ID, Facebook and Google). Example entry:
# 'blender-id': {
# 'id': 'CLOUD-OF-SNOWFLAKES-43',
# 'secret': 'thesecret',
# 'base_url': 'http://blender_id:8000/'
# }
# Collection of supported OAuth providers (Blender ID, Facebook and Google).
# Example entry:
# OAUTH_CREDENTIALS = {
# 'blender-id': {
# 'id': 'CLOUD-OF-SNOWFLAKES-43',
# 'secret': 'thesecret',
# 'base_url': 'http://blender_id:8000/'
# }
# }
OAUTH_CREDENTIALS = {}
# See https://docs.python.org/2/library/logging.config.html#configuration-dictionary-schema

View File

@@ -16,3 +16,19 @@ STORAGE_BACKEND = 'local'
EXTERNAL_SUBSCRIPTIONS_MANAGEMENT_SERVER = "http://store.localhost/api"
SECRET_KEY = '12345'
OAUTH_CREDENTIALS = {
'blender-id': {
'id': 'blender-id-app-id',
'secret': 'blender-idsecret',
'base_url': 'http://blender_id:8000/'
},
'facebook': {
'id': 'fb-app-id',
'secret': 'facebook-secret'
},
'google': {
'id': 'google-app-id',
'secret': 'google-secret'
}
}