-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauth.py
167 lines (133 loc) · 5.23 KB
/
auth.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
import json
import os
from functools import wraps
from urllib.request import urlopen
from dotenv import load_dotenv
from flask import request
from jose import jwt
load_dotenv()
AUTH0_DOMAIN = os.environ.get('AUTH0_DOMAIN')
ALGORITHMS = os.environ.get('ALGORITHMS')
API_AUDIENCE = os.environ.get('API_AUDIENCE')
# AuthError Exception
'''
AuthError Exception
A standardized way to communicate auth failure modes
'''
class AuthError(Exception):
def __init__(self, error, status_code):
self.error = error
self.status_code = status_code
# Auth Header
def get_token_auth_header():
auth = request.headers.get('Authorization', None)
# if there is no header
if not auth:
print('ERROR ==> Authorization header is expected')
raise AuthError('Authorization header is expected.', 401)
# to check for the bearer and the token seperatly
parts = auth.split()
if parts[0].lower() != 'bearer':
print('ERROR ==> Authorization header must start with "Bearer"')
raise AuthError('Authorization header must start with "Bearer".', 401)
# if the length of the splited header is not 2 and
# it passed the previous check then it doesn't have a token
elif len(parts) == 1:
print('ERROR ==> Token not found')
raise AuthError('Token not found.', 401)
# checks for the format of the header
elif len(parts) > 2:
print('ERROR ==> Authorization header must be Bearer<Token>.')
raise AuthError('Authorization header must be Bearer<Token>.', 401)
# except:
# abort(401)
token = parts[1]
return token
'''
@INPUTS
permission: string permission (i.e. 'post:drink')
payload: decoded jwt payload
it should raise an AuthError if permissions are not included in the payload
!!NOTE check your RBAC settings in Auth0
it should raise an AuthError if the requested permission string is not in the payload permissions array
return true otherwise
'''
def check_permissions(permission, payload):
if 'permissions' not in payload:
print('ERROR ==> Permissions not included in JWT')
raise AuthError('Permissions not included in JWT.', 400)
if permission not in payload['permissions']:
print('ERROR ==> Permission not found')
raise AuthError('Permission not found.', 403)
return True
'''
@INPUTS
token: a json web token (string)
it should be an Auth0 token with key id (kid)
it should verify the token using Auth0 /.well-known/jwks.json
it should decode the payload from the token
it should validate the claims
return the decoded payload
'''
def verify_decode_jwt(token):
# this is to compare with the provided token to make sure it is valid
jsonurl = urlopen(f'https://{AUTH0_DOMAIN}/.well-known/jwks.json')
jwks = json.loads(jsonurl.read())
unverified_header = jwt.get_unverified_header(token)
# if there is no key id then it is an invalid header
if 'kid' not in unverified_header:
print('ERROR ==> Authorization malformed')
raise AuthError('Authorization malformed.', 401)
# does the compare to check that the key id matches the one provided
# then it adds the values of the key(key type, key id, usage)
rsa_key = {}
for key in jwks['keys']:
if key['kid'] == unverified_header['kid']:
rsa_key = {
'kty': key['kty'],
'kid': key['kid'],
'use': key['use'],
'n': key['n'],
'e': key['e']
}
# if rsa_key was not found it raises AuthError
if rsa_key:
try:
payload = jwt.decode(
token,
rsa_key,
algorithms=ALGORITHMS,
audience=API_AUDIENCE,
issuer='https://' + AUTH0_DOMAIN + '/'
)
return payload
except jwt.ExpiredSignatureError:
print('ERROR ==> Token expired')
raise AuthError('Token expired.', 401)
except jwt.JWTClaimsError:
print('ERROR ==> Incorrect claims. Please, check the audience and issuer')
raise AuthError(
'Incorrect claims. Please, check the audience and issuer.', 401)
except Exception:
print('ERROR ==> Unable to parse authentication token')
raise AuthError('Unable to parse authentication token.', 400)
print('ERROR ==> Unable to find the appropriate key')
raise AuthError('Unable to find the appropriate key.', 403)
'''
@INPUTS
permission: string permission (i.e. 'post:drink')
it should use the get_token_auth_header method to get the token
it should use the verify_decode_jwt method to decode the jwt
it should use the check_permissions method validate claims and check the requested permission
return the decorator which passes the decoded payload to the decorated method
'''
def requires_auth(permission=''):
def requires_auth_decorator(f):
@wraps(f)
def wrapper(*args, **kwargs):
token = get_token_auth_header()
payload = verify_decode_jwt(token)
check_permissions(permission, payload)
return f(payload, *args, **kwargs)
return wrapper
return requires_auth_decorator