2024-01-25 19:41:27 +00:00
|
|
|
from functools import wraps
|
2024-02-19 09:49:33 +00:00
|
|
|
import httpx
|
2024-02-27 10:49:06 +00:00
|
|
|
import logging
|
2024-02-26 09:52:22 +00:00
|
|
|
from starlette.exceptions import HTTPException
|
2024-01-23 18:59:46 +00:00
|
|
|
|
2024-02-27 10:54:47 +00:00
|
|
|
from services.logger import root_logger as logger
|
2024-02-19 08:10:12 +00:00
|
|
|
from settings import ADMIN_SECRET, AUTH_URL
|
2024-01-13 08:49:12 +00:00
|
|
|
|
2024-02-27 10:54:47 +00:00
|
|
|
trace_logger = logging.getLogger('_trace')
|
|
|
|
trace_logger.setLevel(logging.INFO)
|
|
|
|
|
2024-02-27 10:55:11 +00:00
|
|
|
httpx_logger = logging.getLogger('httpx')
|
2024-02-27 10:56:21 +00:00
|
|
|
httpx_logger.setLevel(logging.INFO)
|
|
|
|
|
2024-02-21 07:27:16 +00:00
|
|
|
|
2024-01-25 19:41:27 +00:00
|
|
|
async def request_data(gql, headers=None):
|
|
|
|
if headers is None:
|
2024-02-21 16:14:58 +00:00
|
|
|
headers = {'Content-Type': 'application/json'}
|
2024-01-10 13:29:49 +00:00
|
|
|
try:
|
2024-02-19 08:10:12 +00:00
|
|
|
async with httpx.AsyncClient() as client:
|
|
|
|
response = await client.post(AUTH_URL, json=gql, headers=headers)
|
|
|
|
if response.status_code == 200:
|
|
|
|
data = response.json()
|
2024-02-21 16:14:58 +00:00
|
|
|
errors = data.get('errors')
|
2024-02-19 08:10:12 +00:00
|
|
|
if errors:
|
2024-02-21 16:14:58 +00:00
|
|
|
logger.error(f'HTTP Errors: {errors}')
|
2024-02-19 08:10:12 +00:00
|
|
|
else:
|
|
|
|
return data
|
2024-01-10 13:29:49 +00:00
|
|
|
except Exception as e:
|
2024-01-23 19:12:22 +00:00
|
|
|
# Handling and logging exceptions during authentication check
|
2024-02-23 12:02:14 +00:00
|
|
|
logger.error(f'request_data error: {e}')
|
2024-02-27 11:16:54 +00:00
|
|
|
return None
|
2024-01-10 13:29:49 +00:00
|
|
|
|
|
|
|
|
2024-02-19 12:51:09 +00:00
|
|
|
async def check_auth(req):
|
2024-02-21 16:14:58 +00:00
|
|
|
token = req.headers.get('Authorization')
|
|
|
|
user_id = ''
|
2024-02-23 21:00:46 +00:00
|
|
|
user_roles = []
|
2024-02-20 15:20:57 +00:00
|
|
|
if token:
|
2024-02-23 11:53:14 +00:00
|
|
|
# Logging the authentication token
|
|
|
|
logger.debug(f'{token}')
|
|
|
|
query_name = 'validate_jwt_token'
|
|
|
|
operation = 'ValidateToken'
|
2024-02-23 16:35:40 +00:00
|
|
|
variables = {'params': {'token_type': 'access_token', 'token': token}}
|
2024-02-23 11:53:14 +00:00
|
|
|
|
|
|
|
gql = {
|
|
|
|
'query': f'query {operation}($params: ValidateJWTTokenInput!) {{'
|
2024-03-06 09:25:55 +00:00
|
|
|
+ f'{query_name}(params: $params) {{ is_valid claims }} '
|
|
|
|
+ '}',
|
2024-02-23 11:53:14 +00:00
|
|
|
'variables': variables,
|
|
|
|
'operationName': operation,
|
|
|
|
}
|
|
|
|
data = await request_data(gql)
|
|
|
|
if data:
|
2024-02-26 09:52:22 +00:00
|
|
|
logger.debug(data)
|
2024-02-23 11:53:14 +00:00
|
|
|
user_data = data.get('data', {}).get(query_name, {}).get('claims', {})
|
2024-02-27 10:40:56 +00:00
|
|
|
user_id = user_data.get('sub', '')
|
|
|
|
user_roles = user_data.get('allowed_roles', [])
|
|
|
|
return user_id, user_roles
|
2024-01-23 19:12:22 +00:00
|
|
|
|
2023-12-24 22:42:39 +00:00
|
|
|
|
2024-01-10 13:29:49 +00:00
|
|
|
async def add_user_role(user_id):
|
2024-02-23 12:02:14 +00:00
|
|
|
logger.info(f'add author role for user_id: {user_id}')
|
2024-02-21 16:14:58 +00:00
|
|
|
query_name = '_update_user'
|
|
|
|
operation = 'UpdateUserRoles'
|
2024-01-25 19:41:27 +00:00
|
|
|
headers = {
|
2024-02-21 16:14:58 +00:00
|
|
|
'Content-Type': 'application/json',
|
|
|
|
'x-authorizer-admin-secret': ADMIN_SECRET,
|
2024-01-25 19:41:27 +00:00
|
|
|
}
|
2024-02-21 16:14:58 +00:00
|
|
|
variables = {'params': {'roles': 'author, reader', 'id': user_id}}
|
2023-12-24 22:42:39 +00:00
|
|
|
gql = {
|
2024-02-21 16:14:58 +00:00
|
|
|
'query': f'mutation {operation}($params: UpdateUserInput!) {{ {query_name}(params: $params) {{ id roles }} }}',
|
|
|
|
'variables': variables,
|
|
|
|
'operationName': operation,
|
2023-12-24 22:42:39 +00:00
|
|
|
}
|
2024-01-10 13:29:49 +00:00
|
|
|
data = await request_data(gql, headers)
|
|
|
|
if data:
|
2024-02-21 16:14:58 +00:00
|
|
|
user_id = data.get('data', {}).get(query_name, {}).get('id')
|
2024-01-10 13:29:49 +00:00
|
|
|
return user_id
|
2023-10-23 14:47:11 +00:00
|
|
|
|
2024-01-25 19:41:27 +00:00
|
|
|
|
2023-10-23 14:47:11 +00:00
|
|
|
def login_required(f):
|
2024-01-23 18:59:46 +00:00
|
|
|
@wraps(f)
|
2023-10-23 14:47:11 +00:00
|
|
|
async def decorated_function(*args, **kwargs):
|
|
|
|
info = args[1]
|
2024-03-05 15:04:47 +00:00
|
|
|
req = info.context.get('request')
|
2024-02-27 11:06:00 +00:00
|
|
|
authorized = await check_auth(req)
|
|
|
|
if authorized:
|
|
|
|
user_id, user_roles = authorized
|
|
|
|
if user_id and user_roles:
|
|
|
|
logger.info(f' got {user_id} roles: {user_roles}')
|
2024-03-05 15:04:47 +00:00
|
|
|
info.context['user_id'] = user_id.strip()
|
|
|
|
info.context['roles'] = user_roles
|
2024-02-27 11:16:54 +00:00
|
|
|
return await f(*args, **kwargs)
|
2023-10-23 14:47:11 +00:00
|
|
|
|
|
|
|
return decorated_function
|
|
|
|
|
2024-01-23 18:59:46 +00:00
|
|
|
|
2023-10-23 14:47:11 +00:00
|
|
|
def auth_request(f):
|
2024-01-23 18:59:46 +00:00
|
|
|
@wraps(f)
|
2023-10-23 14:47:11 +00:00
|
|
|
async def decorated_function(*args, **kwargs):
|
2024-02-23 11:53:14 +00:00
|
|
|
req = args[0]
|
2024-02-27 11:06:00 +00:00
|
|
|
authorized = await check_auth(req)
|
|
|
|
if authorized:
|
|
|
|
user_id, user_roles = authorized
|
|
|
|
if user_id and user_roles:
|
|
|
|
logger.info(f' got {user_id} roles: {user_roles}')
|
|
|
|
req['user_id'] = user_id.strip()
|
|
|
|
req['roles'] = user_roles
|
2024-02-27 11:16:54 +00:00
|
|
|
return await f(*args, **kwargs)
|
2024-02-26 09:52:22 +00:00
|
|
|
else:
|
|
|
|
raise HTTPException(status_code=401, detail='Unauthorized')
|
2023-10-23 14:47:11 +00:00
|
|
|
|
|
|
|
return decorated_function
|