Skip to content

Support github OAuth 2.0 backend #116

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 14, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions example/internal_attributes.yaml.example
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,11 @@ attributes:
saml: [postaladdress]
displayname:
openid: [nickname]
github: [login]
saml: [displayName]
edupersontargetedid:
facebook: [id]
github: [id]
openid: [sub]
saml: [eduPersonTargetedID]
givenname:
Expand All @@ -15,10 +17,12 @@ attributes:
saml: [givenName]
mail:
facebook: [email]
github: [email]
openid: [email]
saml: [email, emailAdress, mail]
name:
facebook: [name]
github: [name]
openid: [name]
saml: [cn]
surname:
Expand Down
29 changes: 29 additions & 0 deletions example/plugins/backends/github_backend.yaml.example
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
module: satosa.backends.github.GitHubBackend
name: github
config:
authz_page: github/auth/callback
base_url: https://www.example.org
client_config:
client_id: 123d45g678
client_secret: 3h4h5j67l5k3l3l
scope: [user]
response_type: code
allow_signup: false
server_info: {
authorization_endpoint: 'http://github.com/login/oauth/authorize',
token_endpoint: 'https://github.com/login/oauth/access_token',
user_info: 'https://api.github.com/user'
}
entity_info:
organization:
display_name:
- ["GitHub", "en"]
name:
- ["GitHub", "en"]
url:
- ["https://www.github.com/", "en"]
ui_info:
description:
- ["GitHub oauth", "en"]
display_name:
- ["GitHub", "en"]
111 changes: 111 additions & 0 deletions src/satosa/backends/github.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,111 @@
"""
OAuth backend for LinkedIn
"""
import json
import logging
import requests

from oic.utils.authn.authn_context import UNSPECIFIED
from oic.oauth2.consumer import stateID
from oic.oauth2.message import AuthorizationResponse

from satosa.backends.oauth import _OAuthBackend
from ..internal_data import InternalResponse
from ..internal_data import AuthenticationInformation
from ..response import Redirect
from ..util import rndstr

logger = logging.getLogger(__name__)


class GitHubBackend(_OAuthBackend):
"""GitHub OAuth 2.0 backend"""

def __init__(self, outgoing, internal_attributes, config, base_url, name):
"""GitHub backend constructor
:param outgoing: Callback should be called by the module after the
authorization in the backend is done.
:param internal_attributes: Mapping dictionary between SATOSA internal
attribute names and the names returned by underlying IdP's/OP's as
well as what attributes the calling SP's and RP's expects namevice.
:param config: configuration parameters for the module.
:param base_url: base url of the service
:param name: name of the plugin
:type outgoing:
(satosa.context.Context, satosa.internal_data.InternalResponse) ->
satosa.response.Response
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:type config: dict[str, dict[str, str] | list[str] | str]
:type base_url: str
:type name: str
"""
config.setdefault('response_type', 'code')
config['verify_accesstoken_state'] = False
super().__init__(
outgoing, internal_attributes, config, base_url, name, 'github',
'id')

def start_auth(self, context, internal_request, get_state=stateID):
"""
:param get_state: Generates a state to be used in authentication call

:type get_state: Callable[[str, bytes], str]
:type context: satosa.context.Context
:type internal_request: satosa.internal_data.InternalRequest
:rtype satosa.response.Redirect
"""
oauth_state = get_state(self.config["base_url"], rndstr().encode())
context.state[self.name] = dict(state=oauth_state)

request_args = dict(
client_id=self.config['client_config']['client_id'],
redirect_uri=self.redirect_url,
state=oauth_state,
allow_signup=self.config.get('allow_signup', False))
scope = ' '.join(self.config['scope'])
if scope:
request_args['scope'] = scope

cis = self.consumer.construct_AuthorizationRequest(
request_args=request_args)
return Redirect(cis.request(self.consumer.authorization_endpoint))

def auth_info(self, requrest):
return AuthenticationInformation(
UNSPECIFIED, None,
self.config['server_info']['authorization_endpoint'])

def _authn_response(self, context):
state_data = context.state[self.name]
aresp = self.consumer.parse_response(
AuthorizationResponse, info=json.dumps(context.request))
self._verify_state(aresp, state_data, context.state)
url = self.config['server_info']['token_endpoint']
data = dict(
code=aresp['code'],
redirect_uri=self.redirect_url,
client_id=self.config['client_config']['client_id'],
client_secret=self.config['client_secret'], )
headers = {'Accept': 'application/json'}

r = requests.post(url, data=data, headers=headers)
response = r.json()
if self.config.get('verify_accesstoken_state', True):
self._verify_state(response, state_data, context.state)

user_info = self.user_information(response["access_token"])
auth_info = self.auth_info(context.request)
internal_response = InternalResponse(auth_info=auth_info)
internal_response.attributes = self.converter.to_internal(
self.external_type, user_info)
internal_response.user_id = user_info[self.user_id_attr]
del context.state[self.name]
return self.auth_callback_func(context, internal_response)

def user_information(self, access_token):
url = self.config['server_info']['user_info']
headers = {'Authorization': 'token {}'.format(access_token)}
r = requests.get(url, headers=headers)
ret = r.json()
ret['id'] = str(ret['id'])
return r.json()