mirror of
https://github.com/jupyterhub/jupyterhub.git
synced 2025-10-07 18:14:10 +00:00
103 lines
3.4 KiB
Python
103 lines
3.4 KiB
Python
"""Authorization handlers"""
|
|
|
|
# Copyright (c) Jupyter Development Team.
|
|
# Distributed under the terms of the Modified BSD License.
|
|
|
|
import json
|
|
from urllib.parse import quote
|
|
|
|
from oauth2.web.tornado import OAuth2Handler
|
|
from tornado import web, gen
|
|
|
|
from .. import orm
|
|
from ..utils import token_authenticated
|
|
from .base import BaseHandler, APIHandler
|
|
|
|
|
|
class TokenAPIHandler(APIHandler):
|
|
@token_authenticated
|
|
def get(self, token):
|
|
orm_token = orm.APIToken.find(self.db, token)
|
|
if orm_token is None:
|
|
orm_token = orm.OAuthAccessToken.find(self.db, token)
|
|
if orm_token is None:
|
|
raise web.HTTPError(404)
|
|
if orm_token.user:
|
|
model = self.user_model(self.users[orm_token.user])
|
|
elif orm_token.service:
|
|
model = self.service_model(orm_token.service)
|
|
else:
|
|
self.log.warning("%s has no user or service. Deleting..." % orm_token)
|
|
self.db.delete(orm_token)
|
|
self.db.commit()
|
|
raise web.HTTPError(404)
|
|
self.write(json.dumps(model))
|
|
|
|
@gen.coroutine
|
|
def post(self):
|
|
user = self.get_current_user()
|
|
if user is None:
|
|
# allow requesting a token with username and password
|
|
# for authenticators where that's possible
|
|
data = self.get_json_body()
|
|
try:
|
|
user = yield self.login_user(data)
|
|
except Exception as e:
|
|
self.log.error("Failure trying to authenticate with form data: %s" % e)
|
|
user = None
|
|
if user is None:
|
|
raise web.HTTPError(403)
|
|
else:
|
|
data = self.get_json_body()
|
|
# admin users can request
|
|
if data and data.get('username') != user.name:
|
|
if user.admin:
|
|
user = self.find_user(data['username'])
|
|
if user is None:
|
|
raise web.HTTPError(400, "No such user '%s'" % data['username'])
|
|
else:
|
|
raise web.HTTPError(403, "Only admins can request tokens for other users.")
|
|
api_token = user.new_api_token()
|
|
self.write(json.dumps({
|
|
'token': api_token,
|
|
'user': self.user_model(user),
|
|
}))
|
|
|
|
|
|
class CookieAPIHandler(APIHandler):
|
|
@token_authenticated
|
|
def get(self, cookie_name, cookie_value=None):
|
|
cookie_name = quote(cookie_name, safe='')
|
|
if cookie_value is None:
|
|
self.log.warning("Cookie values in request body is deprecated, use `/cookie_name/cookie_value`")
|
|
cookie_value = self.request.body
|
|
else:
|
|
cookie_value = cookie_value.encode('utf8')
|
|
user = self._user_for_cookie(cookie_name, cookie_value)
|
|
if user is None:
|
|
raise web.HTTPError(404)
|
|
self.write(json.dumps(self.user_model(user)))
|
|
|
|
|
|
class OAuthHandler(BaseHandler, OAuth2Handler):
|
|
"""Implement OAuth provider handlers
|
|
|
|
OAuth2Handler sets `self.provider` in initialize,
|
|
but we are already passing the Provider object via settings.
|
|
"""
|
|
@property
|
|
def provider(self):
|
|
return self.settings['oauth_provider']
|
|
|
|
def initialize(self):
|
|
pass
|
|
|
|
|
|
default_handlers = [
|
|
(r"/api/authorizations/cookie/([^/]+)(?:/([^/]+))?", CookieAPIHandler),
|
|
(r"/api/authorizations/token/([^/]+)", TokenAPIHandler),
|
|
(r"/api/authorizations/token", TokenAPIHandler),
|
|
(r"/api/oauth2/authorize", OAuthHandler),
|
|
(r"/api/oauth2/token", OAuthHandler),
|
|
]
|