2022-09-14 04:42:31 +00:00
|
|
|
from functools import wraps
|
|
|
|
from typing import Optional, Tuple
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
from graphql.type import GraphQLResolveInfo
|
2022-11-28 22:58:23 +00:00
|
|
|
from sqlalchemy.orm import joinedload, exc
|
2022-09-14 04:42:31 +00:00
|
|
|
from starlette.authentication import AuthenticationBackend
|
|
|
|
from starlette.requests import HTTPConnection
|
2022-09-17 18:12:14 +00:00
|
|
|
|
2022-09-14 04:42:31 +00:00
|
|
|
from auth.credentials import AuthCredentials, AuthUser
|
2022-11-28 22:58:23 +00:00
|
|
|
from base.orm import local_session
|
2022-12-01 13:24:05 +00:00
|
|
|
from orm.user import User, Role
|
2022-11-28 22:58:23 +00:00
|
|
|
|
2022-11-22 03:11:26 +00:00
|
|
|
from settings import SESSION_TOKEN_HEADER
|
2022-11-24 14:31:52 +00:00
|
|
|
from auth.tokenstorage import SessionToken
|
2023-01-10 08:15:28 +00:00
|
|
|
from base.exceptions import InvalidToken, OperationNotAllowed
|
2022-09-14 04:42:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
class JWTAuthenticate(AuthenticationBackend):
|
|
|
|
async def authenticate(
|
|
|
|
self, request: HTTPConnection
|
|
|
|
) -> Optional[Tuple[AuthCredentials, AuthUser]]:
|
2022-11-22 03:11:26 +00:00
|
|
|
|
|
|
|
if SESSION_TOKEN_HEADER not in request.headers:
|
2022-09-14 04:42:31 +00:00
|
|
|
return AuthCredentials(scopes=[]), AuthUser(user_id=None)
|
|
|
|
|
2022-11-24 14:31:52 +00:00
|
|
|
token = request.headers.get(SESSION_TOKEN_HEADER)
|
|
|
|
if not token:
|
|
|
|
print("[auth.authenticate] no token in header %s" % SESSION_TOKEN_HEADER)
|
|
|
|
return AuthCredentials(scopes=[], error_message=str("no token")), AuthUser(
|
|
|
|
user_id=None
|
|
|
|
)
|
2022-11-22 03:11:26 +00:00
|
|
|
|
2022-09-14 04:42:31 +00:00
|
|
|
try:
|
2022-11-24 14:31:52 +00:00
|
|
|
if len(token.split('.')) > 1:
|
|
|
|
payload = await SessionToken.verify(token)
|
2022-11-25 22:35:42 +00:00
|
|
|
if payload is None:
|
|
|
|
return AuthCredentials(scopes=[]), AuthUser(user_id=None)
|
2022-12-02 08:47:55 +00:00
|
|
|
user = None
|
2022-11-28 22:58:23 +00:00
|
|
|
with local_session() as session:
|
|
|
|
try:
|
|
|
|
user = (
|
|
|
|
session.query(User).options(
|
2022-12-01 13:24:05 +00:00
|
|
|
joinedload(User.roles).options(joinedload(Role.permissions)),
|
2022-11-28 22:58:23 +00:00
|
|
|
joinedload(User.ratings)
|
|
|
|
).filter(
|
2022-12-01 13:24:05 +00:00
|
|
|
User.id == payload.user_id
|
2022-11-28 22:58:23 +00:00
|
|
|
).one()
|
|
|
|
)
|
|
|
|
except exc.NoResultFound:
|
|
|
|
user = None
|
|
|
|
|
2022-11-25 22:35:42 +00:00
|
|
|
if not user:
|
|
|
|
return AuthCredentials(scopes=[]), AuthUser(user_id=None)
|
2022-11-28 22:58:23 +00:00
|
|
|
|
2022-12-02 08:47:55 +00:00
|
|
|
scopes = {} # await user.get_permission()
|
2022-11-28 22:58:23 +00:00
|
|
|
|
2022-11-25 22:35:42 +00:00
|
|
|
return (
|
|
|
|
AuthCredentials(
|
|
|
|
user_id=payload.user_id,
|
|
|
|
scopes=scopes,
|
|
|
|
logged_in=True
|
|
|
|
),
|
2022-12-01 13:24:05 +00:00
|
|
|
AuthUser(user_id=user.id),
|
2022-11-25 22:35:42 +00:00
|
|
|
)
|
2022-11-24 14:31:52 +00:00
|
|
|
else:
|
|
|
|
InvalidToken("please try again")
|
2022-11-28 22:58:23 +00:00
|
|
|
except Exception as e:
|
2022-11-23 09:57:58 +00:00
|
|
|
print("[auth.authenticate] session token verify error")
|
2022-11-28 22:58:23 +00:00
|
|
|
print(e)
|
|
|
|
return AuthCredentials(scopes=[], error_message=str(e)), AuthUser(user_id=None)
|
2022-09-14 04:42:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
def login_required(func):
|
|
|
|
@wraps(func)
|
|
|
|
async def wrap(parent, info: GraphQLResolveInfo, *args, **kwargs):
|
2022-10-23 09:33:28 +00:00
|
|
|
# print('[auth.authenticate] login required for %r with info %r' % (func, info)) # debug only
|
2022-09-14 04:42:31 +00:00
|
|
|
auth: AuthCredentials = info.context["request"].auth
|
2022-11-25 22:35:42 +00:00
|
|
|
# print(auth)
|
2022-11-28 14:15:54 +00:00
|
|
|
if not auth or not auth.logged_in:
|
2023-01-10 08:15:28 +00:00
|
|
|
# raise Unauthorized(auth.error_message or "Please login")
|
|
|
|
return {
|
|
|
|
"error": "Please login first"
|
|
|
|
}
|
2022-09-14 04:42:31 +00:00
|
|
|
return await func(parent, info, *args, **kwargs)
|
|
|
|
|
|
|
|
return wrap
|
2022-11-24 08:27:01 +00:00
|
|
|
|
|
|
|
|
|
|
|
def permission_required(resource, operation, func):
|
|
|
|
@wraps(func)
|
|
|
|
async def wrap(parent, info: GraphQLResolveInfo, *args, **kwargs):
|
2022-11-24 15:19:58 +00:00
|
|
|
print('[auth.authenticate] permission_required for %r with info %r' % (func, info)) # debug only
|
2022-11-24 08:27:01 +00:00
|
|
|
auth: AuthCredentials = info.context["request"].auth
|
|
|
|
if not auth.logged_in:
|
2022-12-01 08:12:48 +00:00
|
|
|
raise OperationNotAllowed(auth.error_message or "Please login")
|
2022-11-24 08:27:01 +00:00
|
|
|
|
2022-11-25 22:35:42 +00:00
|
|
|
# TODO: add actual check permission logix here
|
2022-11-24 08:27:01 +00:00
|
|
|
|
|
|
|
return await func(parent, info, *args, **kwargs)
|
|
|
|
|
|
|
|
return wrap
|