def decorated(*args, **kwargs): campus_id = kwargs.get('campus_id', None) if campus_id: try: request.campus = Campus.objects(id=campus_id).get() except Campus.DoesNotExist: return abort(404) # check access token access_token = None auth_header = request.headers.get('Authorization') if auth_header and auth_header.startswith('Bearer '): access_token = auth_header[7:] elif request.args.get('access_token'): access_token = request.args.get('access_token') request.access_token = None if access_token: try: request.access_token = OAuth2AccessToken.objects(access_token=access_token).get() except OAuth2AccessToken.DoesNotExist: pass if not request.access_token: return jsonify({ 'error': { 'code': 'token_not_exist' } }), 403 result = f(*args, **kwargs) callback = request.args.get('callback', None) if callback: return app.response_class(callback + '(' + result.data.decode('utf8') + ')', mimetype='application/javascript') return result
def oauth2_authorize(): client_id = request.args.get('client_id') redirect_uri = request.args.get('redirect_uri') response_type = request.args.get('response_type') scope = [scope.strip() for scope in request.args.get('scope', '').split(',')] if not (client_id and redirect_uri and response_type): return jsonify({'error': 'invalid_request'}), 400 try: client = ApplicationOAuth2Client.objects(id=client_id).get() except ApplicationOAuth2Client.DoesNotExist: return jsonify({'error': 'unauthorized_client'}), 400 check_redirect_uri = False for accept_redirect_uri in client.redirect_uris: if redirect_uri.startswith(accept_redirect_uri): check_redirect_uri = True if not check_redirect_uri: return 'redirect_uri error', 400 if not session.get_account(): if request.method == 'GET': return render_template('api/oauth2/login.html') else: account_id = request.form.get('account_id') account_pw = request.form.get('account_pw') from opencampus.module.account.models import Account try: Account.login(account_id, account_pw) except: return render_template('api/oauth2/login.html') check_accept = True try: accept = OAuth2AccountAccept.objects(client_id=client_id, account_id=session.get_account().id).get() for s in scope: if accept and s not in accept.scope: check_accept = False except OAuth2AccountAccept.DoesNotExist: check_accept = False accept = None if not check_accept: if request.method == 'GET': return render_template('api/oauth2/permission.html', app=Application.objects(id=client.application_id).get(), scope=scope, scope_name=SCOPE) elif request.method == 'POST': token = session.get('csrf_token') if not token or token != request.form.get('csrf_token'): return abort(403) if not accept: accept = OAuth2AccountAccept() accept.client_id = client_id accept.account_id = session.get_account().id accept.created_at = datetime.utcnow() accept.scope = scope accept.save() if response_type == 'token': token = OAuth2AccessToken.create_token('account', session.get_account().id, client_id=client.id, scope=accept.scope) token.save() return redirect(redirect_uri + '?access_token=' + token.access_token) elif response_type == 'code': code = OAuth2AuthorizationCode.create_code(client.id, session.get_account().id, scope=accept.scope) return redirect(redirect_uri + '?code=' + code.code) else: return jsonify({'error': 'unsupported_response_type'}), 400
def oauth2_token(): grant_type = request.form.get('grant_type') if grant_type == 'authorization_code': """ 일반 사용자가 앱에서 토큰을 획득할 때 사용 """ client_id = request.form.get('client_id') client_secret = request.form.get('client_secret') redirect_uri = request.form.get('redirect_uri') # TODO code = request.form.get('code') try: code = OAuth2AuthorizationCode.objects(code=code, client_id=client_id).get() except OAuth2AuthorizationCode.DoesNotExist: return jsonify({'error': 'invalid_request'}), 400 try: client = ApplicationOAuth2Client.objects(id=code.client_id).get() except ApplicationOAuth2Client.DoesNotExist: return jsonify({'error': 'unauthorized_client'}), 400 if client_secret != client.secret_key: return jsonify({'error': 'unauthorized_client'}), 400 token = OAuth2AccessToken.create_token('account', code.account_id, scope=code.scope) token.client_id = client.id token.save() code.delete() expires_in = token.expires_at - datetime.utcnow() expires_in = expires_in.days * 86400 + expires_in.seconds return jsonify({ 'access_token': token.access_token, 'expires_in': expires_in, 'token_type': 'Bearer', 'refresh_token': token.refresh_token }) elif grant_type == 'client_credentials': """ 게이트웨이에서 토큰 획득 용으로 사용 """ client_id = request.form.get('client_id') client_secret = request.form.get('client_secret') try: gateway = CampusGateway.objects(id=client_id, secret_key=client_secret).get() token = OAuth2AccessToken.create_token('gateway', gateway.id) expires_in = token.expires_at - datetime.utcnow() expires_in = expires_in.days * 86400 + expires_in.seconds return jsonify({ 'access_token': token.access_token, 'expires_in': expires_in, 'token_type': 'Bearer', 'refresh_token': token.refresh_token }) except CampusGateway.DoesNotExist: pass return jsonify({'error': 'invalid_request'}), 400 elif grant_type == 'refresh_token': return jsonify({'error': 'unsupported_response_type'}), 400 else: return jsonify({'error': 'unsupported_grant_type'}), 400