forked from loris-imageserver/loris
-
Notifications
You must be signed in to change notification settings - Fork 0
/
authnServices.py
352 lines (294 loc) · 13.2 KB
/
authnServices.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
from bottle import request, response, abort, redirect
from bottle import auth_basic, parse_auth, Bottle, run
from bottle import debug as set_debug
import json
try:
from urllib import urlencode
from urllib2 import Request, urlopen
except ImportError:
from urllib.parse import urlencode
from urllib.request import Request, urlopen
from urlparse import urlparse
try:
from netaddr import IPNetwork, IPAddress
except ImportError:
# The IP authentication class just won't work without this
# but others will be fine
pass
import base64
import jwt
import datetime
from cryptography.fernet import Fernet
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
# For non JWT implementation, cryptography is MUCH faster than simplecrypt
class AuthApp(object):
def __init__(self, cookie_secret, token_secret, salt, name="iiif_access_cookie",
cookie_domain="", cookie_path="", is_https=True):
self.AUTH_URL_LOGIN = "login"
self.AUTH_URL_COOKIE = "cookie"
self.AUTH_URL_TOKEN = "token"
self.AUTH_URL_LOGOUT = "logout"
# login:
# self.handler = BasicAuthHandler(...)
# self.handler = OAuthHandler(...)
# self.handler = IPRangeHandler(...)
self.handler = BasicAuthHandler(self, cookie_secret, token_secret, salt, name,
cookie_domain, cookie_path, is_https)
def send(self, data, status=200, ct="text/plain"):
response.headers['Access-Control-Allow-Origin'] = '*'
response.headers['Access-Control-Allow-Methods'] = "GET,OPTIONS"
response.headers['Access-Control-Allow-Headers'] = 'Origin, Accept, Authorization'
response["content_type"] = ct
response.status = status
return data
def not_implemented(self):
abort(501)
def dispatch_views(self):
# Handle getting user to log in
self.app.route('/{0}'.format(self.AUTH_URL_LOGIN), ["GET"],
getattr(self.handler, "login", self.not_implemented))
# Give back a cookie and close window
# Also where user comes back to after OAuth
self.app.route('/{0}'.format(self.AUTH_URL_COOKIE), ["GET"],
getattr(self.handler, "cookie", self.not_implemented))
# PostMessage() or return a token
self.app.route('/{0}'.format(self.AUTH_URL_TOKEN), ["GET"],
getattr(self.handler, "token", self.not_implemented))
# Let the user logout
if self.AUTH_URL_LOGOUT:
self.app.route('/{0}'.format(self.AUTH_URL_LOGOUT), ["GET"],
getattr(self.handler, "logout", self.not_implemented))
def get_bottle_app(self):
"""Returns bottle instance"""
self.app = Bottle()
self.dispatch_views()
return self.app
class AuthNHandler(object):
def __init__(self, app, cookie_secret, token_secret, salt, name="iiif_access_cookie",
cookie_domain="", cookie_path="/", is_https=True):
self.application = app
self.cookie_name = name
self.cookie_domain = cookie_domain
self.cookie_path = cookie_path
self.is_https = is_https
self.cookie_secret = cookie_secret
self.token_secret = token_secret
self.salt = salt
self.use_jwt = True
self.token_expiresIn = 300
self.cookie_expiresIn = 3600
self.token_iss = ""
self.token_aud = ""
def kdf(self):
return PBKDF2HMAC(algorithm=hashes.SHA256(), length=32, salt=self.salt,
iterations=100000, backend=default_backend())
@staticmethod
def basic_origin(origin):
ccslds = ['co', 'org', 'com', 'net', 'ac', 'edu', 'gov', 'mil', 'or', \
'gen', 'govt', 'school', 'sch']
if not origin.startswith('http'):
origin = "http://" + origin
u = urlparse(origin)
domain = u.hostname.split('.')
if len(domain) >= 3 and domain[-2] in ccslds:
# foo.x.cctld
secret = ".".join(domain[-3:])
elif domain[-1].isdigit():
# 10.0.0.1
secret = u.hostname
elif len(domain) >= 2:
# foo.gtld
secret = ".".join(domain[-2:])
else:
# localhost or * ... hopefully not *!
secret = domain[0]
return secret
def set_cookie(self, value, origin, response):
# Reduce to public suffix
origin = self.basic_origin(origin)
# Append to our internal secret
secret = "%s-%s" % (self.cookie_secret, origin)
if self.use_jwt:
value['exp'] = datetime.datetime.utcnow() + datetime.timedelta(seconds=self.cookie_expiresIn)
print "Issuing cookie to origin %s, expires at %s" % (origin, value['exp'])
value = jwt.encode(value, secret, algorithm='HS256')
else:
key = base64.urlsafe_b64encode(self.kdf().derive(secret))
fern = Fernet(key)
value = fern.encrypt("%s|%s" % (origin, value.encode('utf-8')))
if self.cookie_domain:
response.set_cookie(self.cookie_name, value, max_age=self.cookie_expiresIn, httponly=True,
domain=self.cookie_domain, path=self.cookie_path)
else:
response.set_cookie(self.cookie_name, value, max_age=self.cookie_expiresIn, httponly=True)
def token_extra(self):
return {}
def cookie_to_token(self, cookie):
# this is okay, so long as the encryption keys are different
return cookie
def token(self):
# This is the second step -- client requests a token to send to info.json
# We're going to just copy it from our cookie.
# postMessage request to get the token to send to info.json in Auth'z header
msgId = request.query.get('messageId', '')
origin = request.query.get('origin', '*')
borigin = self.basic_origin(origin)
info = request.get_cookie(self.cookie_name, '')
data = {}
try:
secret = "%s-%s" % (self.cookie_secret, borigin)
if self.use_jwt:
info = jwt.decode(info, secret, algorithms=['HS256'])
else:
key = base64.urlsafe_b64encode(self.kdf().derive(secret))
fern = Fernet(key)
info = fern.decrypt(info.encode('utf-8'))
if not info.startswith(borigin):
# Hmmm... hack attempt?
data = {"error":"invalidCredentials","description":"Login details invalid"}
except:
info = ''
if not info:
data = {"error":"missingCredentials","description":"No login details received"}
elif not data:
# currently noop
token = self.cookie_to_token(info)
secret = "%s-%s" % (self.token_secret, borigin)
if self.use_jwt:
token['exp'] = datetime.datetime.utcnow() + datetime.timedelta(seconds=self.token_expiresIn)
print "Issuing token to origin %s, expires at %s" % (origin, token['exp'])
if self.token_iss:
token['iss'] = self.token_iss
if self.token_aud:
token['aud'] = self.token_aud
extra = self.token_extra()
if extra:
token.update(extra)
value = jwt.encode(token, secret, algorithm='HS256')
else:
key = base64.urlsafe_b64encode(self.kdf().derive(secret))
fern = Fernet(key)
value = fern.encrypt(token)
data = {"accessToken":value, "expiresIn": self.token_expiresIn}
if msgId:
data['messageId'] = msgId
dataStr = json.dumps(data)
html = """<html><body><script>
window.parent.postMessage({0}, '{1}');
</script></body></html>""".format(dataStr, origin)
return self.application.send(html, ct="text/html")
else:
dataStr = json.dumps(data)
return self.application.send(dataStr, ct="application/json")
def logout(self):
response.delete_cookie(self.cookie_name, domain=self.cookie_domain, path=self.cookie_path)
response['Access-Control-Allow-Origin'] = '*'
return self.application.send("<html><script>window.close();</script></html>", status=401, ct="text/html");
class BasicAuthHandler(AuthNHandler):
def check_basic_auth(user, password):
# Re-implement me to do actual user/password checking
return user == password
@auth_basic(check_basic_auth)
def login(self):
origin = request.query.get('origin', '*')
redirect("cookie?origin={0}".format(origin))
def cookie(self):
auth = request.headers.get('Authorization')
if not auth:
return self.application.send("<html><script>window.close();</script></html>", ct="text/html", );
who, p = parse_auth(auth)
origin = request.query.get('origin', '*')
# who is an identity (the username)
value = {'sub': who}
self.set_cookie(value, origin, response)
return self.application.send("<html><script>window.close();</script></html>", ct="text/html", );
class IPRangeHandler(AuthNHandler):
def __init__(self, app, cookie_secret, token_secret, salt, name="iiif_access_cookie",
cookie_domain="", cookie_path="", is_https=True):
super(IPRangeHandler,self).__init__(app, cookie_secret, token_secret, salt, name,
cookie_domain, cookie_path, is_https)
self.network = IPNetwork("10.0.0.0/16")
self.exclude = [IPAddress("10.0.0.1")]
def login(self):
# Check if IP of browser is acceptable
reqip = IPAddress(request.environ.get("REMOTE_ADDR"))
if reqip in self.network and not reqip in self.exclude:
origin = request.query.get('origin', '*')
value = {"roles": ["onsite"]}
self.set_cookie(value, origin, response)
return self.application.send("<html><script>window.close();</script><body>%s</body></html>" % reqip, ct="text/html")
else:
return self.application.send("<html><body>Message for requiring on-site access here</body></html>", status=403, ct="text/html")
class OAuthHandler(AuthNHandler):
def __init__(self, app, cookie_secret, token_secret, salt, name="iiif_access_cookie",
cookie_domain="", cookie_path="", is_https=True):
super(OAuthHandler,self).__init__(app, cookie_secret, token_secret, salt, name,
cookie_domain, cookie_path, is_https)
self.GOOGLE_API_CLIENT_ID = ""
self.GOOGLE_API_CLIENT_SECRET = ""
self.GOOGLE_REDIRECT_URI = ""
self.GOOGLE_OAUTH2_URL = "https://accounts.google.com/o/oauth2/"
self.GOOGLE_API_SCOPE = "https://www.googleapis.com/auth/userinfo.email"
self.GOOGLE_API_URL = "https://www.googleapis.com/oauth2/v1/"
def _get_token(self):
params = {
'code': request.query.get('code'),
'client_id': self.GOOGLE_API_CLIENT_ID,
'client_secret': self.GOOGLE_API_CLIENT_SECRET,
'redirect_uri': self.GOOGLE_REDIRECT_URI,
'grant_type': 'authorization_code',
}
payload = urlencode(params)
url = self.GOOGLE_OAUTH2_URL + 'token'
req = Request(url, payload)
return json.loads(urlopen(req).read())
def _get_data(self, response):
params = {
'access_token': response['access_token'],
}
payload = urlencode(params)
url = self.GOOGLE_API_URL + 'userinfo?' + payload
req = Request(url) # must be GET
return json.loads(urlopen(req).read())
def login(self):
# OAuth starts here. This will redirect User to Google to authenticate
origin = request.query.get('origin', '*')
params = {
'response_type': 'code',
'client_id': self.GOOGLE_API_CLIENT_ID,
'redirect_uri': self.GOOGLE_REDIRECT_URI,
'scope': self.GOOGLE_API_SCOPE,
'state': request.query.get('origin'),
}
url = self.GOOGLE_OAUTH2_URL + 'auth?' + urlencode(params)
response['Access-Control-Allow-Origin'] = '*'
redirect(url)
def cookie(self):
# OAuth ends up back here from Google. This sets a cookie and closes window
# to trigger next step
origin = request.query.get('state', '')
resp = self._get_token()
data = self._get_data(resp)
# Other info in data are: given_name, family_name, name, picture, ...
email = data.get('email', 'noone@nowhere')
value = {'sub': email}
self.set_cookie(value, origin, response)
return self.application.send("<html><script>window.close();</script></html>", ct="text/html");
def main():
host = "localhost"
port = 8000
# These are the test keys, replace with real ones!
k1 = "4rakTQJDyhaYgoew802q78pNnsXR7ClvbYtAF1YC87o="
k2 = "hyQijpEEe9z1OB9NOkHvmSA4lC1B4lu1n80bKNx0Uz0="
salt = "4rakTQJD4lC1B4lu"
authapp = AuthApp(k1, k2, salt, is_https=False)
app=authapp.get_bottle_app()
set_debug(True)
run(host=host, port=port, app=app)
if __name__ == "__main__":
main()
else:
app = AuthApp();
application = app.get_bottle_app()