Update auth.py
Browse files
auth.py
CHANGED
@@ -1,71 +1,136 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
import os
|
2 |
-
from
|
|
|
|
|
3 |
from authlib.integrations.requests_client import OAuth2Session
|
4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
class OAuthManager:
|
6 |
-
"""
|
7 |
-
|
8 |
-
|
9 |
-
|
10 |
-
|
11 |
-
|
12 |
-
|
13 |
-
'client_secret': os.getenv('GITHUB_CLIENT_SECRET'),
|
14 |
-
'authorize_url': 'https://github.com/login/oauth/authorize',
|
15 |
-
'token_url': 'https://github.com/login/oauth/access_token',
|
16 |
-
'scope': 'repo read:org'
|
17 |
-
},
|
18 |
-
'google': {
|
19 |
-
'client_id': os.getenv('GOOGLE_CLIENT_ID'),
|
20 |
-
'client_secret': os.getenv('GOOGLE_CLIENT_SECRET'),
|
21 |
-
'authorize_url': 'https://accounts.google.com/o/oauth2/auth',
|
22 |
-
'token_url': 'https://oauth2.googleapis.com/token',
|
23 |
-
'scope': 'openid email profile https://www.googleapis.com/auth/drive.readonly'
|
24 |
-
},
|
25 |
-
'slack': {
|
26 |
-
'client_id': os.getenv('SLACK_CLIENT_ID'),
|
27 |
-
'client_secret': os.getenv('SLACK_CLIENT_SECRET'),
|
28 |
-
'authorize_url': 'https://slack.com/oauth/v2/authorize',
|
29 |
-
'token_url': 'https://slack.com/api/oauth.v2.access',
|
30 |
-
'scope': 'channels:read chat:write'
|
31 |
-
}
|
32 |
-
}
|
33 |
-
|
34 |
-
def _create_session(self, provider: str, redirect_uri: str) -> OAuth2Session:
|
35 |
cfg = self.providers.get(provider)
|
36 |
-
if not cfg
|
37 |
-
raise
|
|
|
|
|
|
|
|
|
|
|
38 |
return OAuth2Session(
|
39 |
-
cfg
|
40 |
-
cfg
|
41 |
-
scope=cfg
|
42 |
-
redirect_uri=redirect_uri
|
43 |
)
|
44 |
|
45 |
-
|
|
|
|
|
|
|
46 |
"""
|
47 |
-
|
48 |
|
49 |
-
|
50 |
-
(authorization_url, state)
|
51 |
"""
|
52 |
-
|
53 |
-
|
54 |
-
|
|
|
|
|
|
|
55 |
|
56 |
-
def fetch_token(
|
|
|
|
|
57 |
"""
|
58 |
-
Exchange
|
59 |
|
60 |
-
Returns
|
61 |
-
|
62 |
"""
|
63 |
-
|
64 |
-
|
65 |
-
|
66 |
-
|
|
|
|
|
67 |
)
|
68 |
-
return token
|
69 |
|
70 |
-
|
71 |
-
|
|
|
|
1 |
+
# auth.py
|
2 |
+
"""
|
3 |
+
Centralised OAuth 2.0 helper for GitHub, Google Drive and Slack.
|
4 |
+
|
5 |
+
Usage
|
6 |
+
-----
|
7 |
+
from auth import oauth_manager
|
8 |
+
|
9 |
+
# 1) Redirect user to consent page
|
10 |
+
auth_url, state = oauth_manager.get_authorization_url(
|
11 |
+
provider="github",
|
12 |
+
redirect_uri="https://your‑app.com/callback"
|
13 |
+
)
|
14 |
+
|
15 |
+
# 2) In your callback handler, exchange the code for a token
|
16 |
+
token = oauth_manager.fetch_token(
|
17 |
+
provider="github",
|
18 |
+
redirect_uri="https://your‑app.com/callback",
|
19 |
+
authorization_response=request.url # full URL with ?code=...
|
20 |
+
)
|
21 |
+
"""
|
22 |
+
|
23 |
+
from __future__ import annotations
|
24 |
+
|
25 |
import os
|
26 |
+
from dataclasses import dataclass
|
27 |
+
from typing import Dict, Optional, Tuple
|
28 |
+
|
29 |
from authlib.integrations.requests_client import OAuth2Session
|
30 |
|
31 |
+
|
32 |
+
# ------------------------------------------------------------------ #
|
33 |
+
# 1 Provider configuration
|
34 |
+
# ------------------------------------------------------------------ #
|
35 |
+
@dataclass(frozen=True)
|
36 |
+
class ProviderConfig:
|
37 |
+
client_id: str | None
|
38 |
+
client_secret: str | None
|
39 |
+
authorize_url: str
|
40 |
+
token_url: str
|
41 |
+
scope: str
|
42 |
+
|
43 |
+
|
44 |
+
def _env(name: str) -> str | None:
|
45 |
+
"""Shorthand for os.getenv with strip()."""
|
46 |
+
val = os.getenv(name)
|
47 |
+
return val.strip() if val else None
|
48 |
+
|
49 |
+
|
50 |
+
PROVIDERS: Dict[str, ProviderConfig] = {
|
51 |
+
"github": ProviderConfig(
|
52 |
+
client_id=_env("GITHUB_CLIENT_ID"),
|
53 |
+
client_secret=_env("GITHUB_CLIENT_SECRET"),
|
54 |
+
authorize_url="https://github.com/login/oauth/authorize",
|
55 |
+
token_url="https://github.com/login/oauth/access_token",
|
56 |
+
scope="repo read:org",
|
57 |
+
),
|
58 |
+
"google": ProviderConfig(
|
59 |
+
client_id=_env("GOOGLE_CLIENT_ID"),
|
60 |
+
client_secret=_env("GOOGLE_CLIENT_SECRET"),
|
61 |
+
authorize_url="https://accounts.google.com/o/oauth2/auth",
|
62 |
+
token_url="https://oauth2.googleapis.com/token",
|
63 |
+
scope="openid email profile https://www.googleapis.com/auth/drive.readonly",
|
64 |
+
),
|
65 |
+
"slack": ProviderConfig(
|
66 |
+
client_id=_env("SLACK_CLIENT_ID"),
|
67 |
+
client_secret=_env("SLACK_CLIENT_SECRET"),
|
68 |
+
authorize_url="https://slack.com/oauth/v2/authorize",
|
69 |
+
token_url="https://slack.com/api/oauth.v2.access",
|
70 |
+
scope="channels:read chat:write",
|
71 |
+
),
|
72 |
+
}
|
73 |
+
|
74 |
+
|
75 |
+
# ------------------------------------------------------------------ #
|
76 |
+
# 2 OAuth manager
|
77 |
+
# ------------------------------------------------------------------ #
|
78 |
class OAuthManager:
|
79 |
+
"""Tiny wrapper around Authlib’s OAuth2Session per provider."""
|
80 |
+
|
81 |
+
def __init__(self, providers: Dict[str, ProviderConfig]):
|
82 |
+
self.providers = providers
|
83 |
+
|
84 |
+
# ---------- helpers -------------------------------------------------
|
85 |
+
def _session(self, provider: str, redirect_uri: str) -> OAuth2Session:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
86 |
cfg = self.providers.get(provider)
|
87 |
+
if not cfg:
|
88 |
+
raise KeyError(f"Unsupported provider '{provider}'.")
|
89 |
+
if not (cfg.client_id and cfg.client_secret):
|
90 |
+
raise RuntimeError(
|
91 |
+
f"OAuth credentials for '{provider}' are missing. "
|
92 |
+
"Set the *_CLIENT_ID and *_CLIENT_SECRET env‑vars."
|
93 |
+
)
|
94 |
return OAuth2Session(
|
95 |
+
client_id=cfg.client_id,
|
96 |
+
client_secret=cfg.client_secret,
|
97 |
+
scope=cfg.scope,
|
98 |
+
redirect_uri=redirect_uri,
|
99 |
)
|
100 |
|
101 |
+
# ---------- public API ----------------------------------------------
|
102 |
+
def get_authorization_url(
|
103 |
+
self, provider: str, redirect_uri: str, state: Optional[str] = None
|
104 |
+
) -> Tuple[str, str]:
|
105 |
"""
|
106 |
+
Return (auth_url, state) for the given provider.
|
107 |
|
108 |
+
Pass the *state* back into `fetch_token` to mitigate CSRF.
|
|
|
109 |
"""
|
110 |
+
sess = self._session(provider, redirect_uri)
|
111 |
+
cfg = self.providers[provider]
|
112 |
+
auth_url, final_state = sess.create_authorization_url(
|
113 |
+
cfg.authorize_url, state=state
|
114 |
+
)
|
115 |
+
return auth_url, final_state
|
116 |
|
117 |
+
def fetch_token(
|
118 |
+
self, provider: str, redirect_uri: str, authorization_response: str
|
119 |
+
) -> Dict:
|
120 |
"""
|
121 |
+
Exchange ?code=… for an access token.
|
122 |
|
123 |
+
Returns the token dict from Authlib (includes access_token,
|
124 |
+
refresh_token, expires_in, etc.).
|
125 |
"""
|
126 |
+
sess = self._session(provider, redirect_uri)
|
127 |
+
cfg = self.providers[provider]
|
128 |
+
return sess.fetch_token(
|
129 |
+
cfg.token_url,
|
130 |
+
authorization_response=authorization_response,
|
131 |
+
client_secret=cfg.client_secret, # some providers require it explicitly
|
132 |
)
|
|
|
133 |
|
134 |
+
|
135 |
+
# Singleton instance used throughout the app
|
136 |
+
oauth_manager = OAuthManager(PROVIDERS)
|