aboutsummaryrefslogtreecommitdiffstats
path: root/mediagoblin/plugins/oauth/__init__.py
blob: 82c1f38093f3e004a2865530a6f7e330e41f37ed (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
# GNU MediaGoblin -- federated, autonomous media hosting
# Copyright (C) 2011, 2012 MediaGoblin contributors.  See AUTHORS.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os
import logging

from mediagoblin.tools import pluginapi
from mediagoblin.plugins.oauth.models import OAuthToken, OAuthClient, \
        OAuthUserClient
from mediagoblin.plugins.api.tools import Auth

_log = logging.getLogger(__name__)

PLUGIN_DIR = os.path.dirname(__file__)


def setup_plugin():
    config = pluginapi.get_config('mediagoblin.plugins.oauth')

    _log.info('Setting up OAuth...')
    _log.debug('OAuth config: {0}'.format(config))

    routes = [
        ('mediagoblin.plugins.oauth.authorize',
            '/oauth-2/authorize',
            'mediagoblin.plugins.oauth.views:authorize'),
        ('mediagoblin.plugins.oauth.authorize_client',
            '/oauth-2/client/authorize',
            'mediagoblin.plugins.oauth.views:authorize_client'),
        ('mediagoblin.plugins.oauth.access_token',
            '/oauth-2/access_token',
            'mediagoblin.plugins.oauth.views:access_token'),
        ('mediagoblin.plugins.oauth.list_connections',
            '/oauth-2/client/connections',
            'mediagoblin.plugins.oauth.views:list_connections'),
        ('mediagoblin.plugins.oauth.register_client',
            '/oauth-2/client/register',
            'mediagoblin.plugins.oauth.views:register_client'),
        ('mediagoblin.plugins.oauth.list_clients',
            '/oauth-2/client/list',
            'mediagoblin.plugins.oauth.views:list_clients')]

    pluginapi.register_routes(routes)
    pluginapi.register_template_path(os.path.join(PLUGIN_DIR, 'templates'))


class OAuthAuth(Auth):
    def trigger(self, request):
        if 'access_token' in request.GET:
            return True

        return False

    def __call__(self, request, *args, **kw):
        self.errors = []
        # TODO: Add suport for client credentials authorization
        client_id = request.GET.get('client_id')  # TODO: Not used
        client_secret = request.GET.get('client_secret')  # TODO: Not used
        access_token = request.GET.get('access_token')

        _log.debug('Authorizing request {0}'.format(request.url))

        if access_token:
            token = OAuthToken.query.filter(OAuthToken.token == access_token)\
                    .first()

            if not token:
                self.errors.append('Invalid access token')
                return False

            _log.debug('Access token: {0}'.format(token))
            _log.debug('Client: {0}'.format(token.client))

            relation = OAuthUserClient.query.filter(
                    (OAuthUserClient.user == token.user)
                    & (OAuthUserClient.client == token.client)
                    & (OAuthUserClient.state == u'approved')).first()

            _log.debug('Relation: {0}'.format(relation))

            if not relation:
                self.errors.append(
                        u'Client has not been approved by the resource owner')
                return False

            request.user = token.user
            return True

        self.errors.append(u'No access_token specified')

        return False

hooks = {
    'setup': setup_plugin,
    'auth': OAuthAuth()
    }