|
| 1 | +# SPDX-FileCopyrightText: 2023-2025 MTS PJSC |
| 2 | +# SPDX-License-Identifier: Apache-2.0 |
| 3 | +import logging |
| 4 | +from typing import Annotated, Any |
| 5 | + |
| 6 | +from fastapi import Depends, FastAPI, Request |
| 7 | + |
| 8 | +from syncmaster.db.models import User |
| 9 | +from syncmaster.exceptions import EntityNotFoundError |
| 10 | +from syncmaster.exceptions.auth import AuthorizationError |
| 11 | +from syncmaster.server.dependencies import Stub |
| 12 | +from syncmaster.server.providers.auth.base_provider import AuthProvider |
| 13 | +from syncmaster.server.providers.auth.keycloak_provider import ( |
| 14 | + KeycloakAuthProvider, |
| 15 | + KeycloakOperationError, |
| 16 | +) |
| 17 | +from syncmaster.server.services.unit_of_work import UnitOfWork |
| 18 | +from syncmaster.server.settings.auth.oauth2_gateway import OAuth2GatewayProviderSettings |
| 19 | + |
| 20 | +log = logging.getLogger(__name__) |
| 21 | + |
| 22 | + |
| 23 | +class OAuth2GatewayProvider(KeycloakAuthProvider): |
| 24 | + def __init__( |
| 25 | + self, |
| 26 | + settings: Annotated[OAuth2GatewayProviderSettings, Depends(Stub(OAuth2GatewayProviderSettings))], |
| 27 | + unit_of_work: Annotated[UnitOfWork, Depends()], |
| 28 | + ) -> None: |
| 29 | + super().__init__(settings, unit_of_work) # type: ignore[arg-type] |
| 30 | + |
| 31 | + @classmethod |
| 32 | + def setup(cls, app: FastAPI) -> FastAPI: |
| 33 | + settings = OAuth2GatewayProviderSettings.model_validate( |
| 34 | + app.state.settings.auth.model_dump(exclude={"provider"}), |
| 35 | + ) |
| 36 | + log.info("Using %s provider with settings:\n%s", cls.__name__, settings) |
| 37 | + app.dependency_overrides[AuthProvider] = cls |
| 38 | + app.dependency_overrides[OAuth2GatewayProviderSettings] = lambda: settings |
| 39 | + return app |
| 40 | + |
| 41 | + async def get_current_user(self, access_token: str | None, request: Request) -> User: # noqa: WPS231, WPS217 |
| 42 | + |
| 43 | + if not access_token: |
| 44 | + log.debug("No access token found in request") |
| 45 | + raise AuthorizationError("Missing auth credentials") |
| 46 | + |
| 47 | + try: |
| 48 | + token_info = await self.keycloak_openid.a_introspect(access_token) |
| 49 | + except KeycloakOperationError as e: |
| 50 | + log.info("Failed to introspect token: %s", e) |
| 51 | + raise AuthorizationError("Invalid token payload") |
| 52 | + |
| 53 | + if token_info["active"] is False: |
| 54 | + raise AuthorizationError("Token is not active") |
| 55 | + |
| 56 | + # these names are hardcoded in keycloak: |
| 57 | + # https://github.com/keycloak/keycloak/blob/3ca3a4ad349b4d457f6829eaf2ae05f1e01408be/core/src/main/java/org/keycloak/representations/IDToken.java |
| 58 | + # TODO: make sure which fields are guaranteed |
| 59 | + login = token_info["preferred_username"] |
| 60 | + email = token_info.get("email") |
| 61 | + first_name = token_info.get("given_name") |
| 62 | + middle_name = token_info.get("middle_name") |
| 63 | + last_name = token_info.get("family_name") |
| 64 | + |
| 65 | + async with self._uow: |
| 66 | + try: |
| 67 | + user = await self._uow.user.read_by_username(login) |
| 68 | + except EntityNotFoundError: |
| 69 | + user = await self._uow.user.create( |
| 70 | + username=login, |
| 71 | + email=email, |
| 72 | + first_name=first_name, |
| 73 | + middle_name=middle_name, |
| 74 | + last_name=last_name, |
| 75 | + ) |
| 76 | + return user |
| 77 | + |
| 78 | + async def get_token_authorization_code_grant( |
| 79 | + self, |
| 80 | + code: str, |
| 81 | + scopes: list[str] | None = None, |
| 82 | + client_id: str | None = None, |
| 83 | + client_secret: str | None = None, |
| 84 | + ) -> dict[str, Any]: |
| 85 | + raise NotImplementedError(f"Authorization code grant is not supported by {self.__class__.__name__}.") |
| 86 | + |
| 87 | + async def logout(self, user: User, refresh_token: str | None) -> None: |
| 88 | + raise NotImplementedError(f"Logout is not supported by {self.__class__.__name__}.") |
0 commit comments