usso 0.27.1__tar.gz → 0.27.4__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {usso-0.27.1/src/usso.egg-info → usso-0.27.4}/PKG-INFO +9 -3
- {usso-0.27.1 → usso-0.27.4}/README.md +8 -2
- {usso-0.27.1 → usso-0.27.4}/pyproject.toml +1 -1
- usso-0.27.4/src/usso/client/__init__.py +4 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/client/async_api.py +32 -52
- {usso-0.27.1 → usso-0.27.4}/src/usso/django/middleware.py +1 -0
- usso-0.27.4/src/usso/session/__init__.py +4 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/session/async_session.py +17 -13
- usso-0.27.4/src/usso/session/base_session.py +69 -0
- usso-0.27.4/src/usso/session/session.py +71 -0
- {usso-0.27.1 → usso-0.27.4/src/usso.egg-info}/PKG-INFO +9 -3
- {usso-0.27.1 → usso-0.27.4}/src/usso.egg-info/SOURCES.txt +1 -0
- usso-0.27.1/src/usso/django/__init__.py +0 -0
- usso-0.27.1/src/usso/session/__init__.py +0 -0
- usso-0.27.1/src/usso/session/session.py +0 -118
- {usso-0.27.1 → usso-0.27.4}/LICENSE.txt +0 -0
- {usso-0.27.1 → usso-0.27.4}/setup.cfg +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/__init__.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/b64tools.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/client/api.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/core.py +0 -0
- {usso-0.27.1/src/usso/client → usso-0.27.4/src/usso/django}/__init__.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/exceptions.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/fastapi/__init__.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso/fastapi/integration.py +1 -1
- {usso-0.27.1 → usso-0.27.4}/src/usso/schemas.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso.egg-info/dependency_links.txt +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso.egg-info/entry_points.txt +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso.egg-info/requires.txt +0 -0
- {usso-0.27.1 → usso-0.27.4}/src/usso.egg-info/top_level.txt +0 -0
- {usso-0.27.1 → usso-0.27.4}/tests/test_api.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/tests/test_core.py +0 -0
- {usso-0.27.1 → usso-0.27.4}/tests/test_simple.py +0 -0
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: usso
|
3
|
-
Version: 0.27.
|
3
|
+
Version: 0.27.4
|
4
4
|
Summary: A plug-and-play client for integrating universal single sign-on (SSO) with Python frameworks, enabling secure and seamless authentication across microservices.
|
5
5
|
Author-email: Mahdi Kiani <mahdikiany@gmail.com>
|
6
6
|
Maintainer-email: Mahdi Kiani <mahdikiany@gmail.com>
|
@@ -81,7 +81,7 @@ The USSO-Client provides a universal single sign-on (SSO) integration for micros
|
|
81
81
|
Install the USSO client using pip:
|
82
82
|
|
83
83
|
```bash
|
84
|
-
pip install usso
|
84
|
+
pip install usso
|
85
85
|
```
|
86
86
|
|
87
87
|
To add framework-specific support, use the following commands:
|
@@ -89,7 +89,13 @@ To add framework-specific support, use the following commands:
|
|
89
89
|
For FastAPI:
|
90
90
|
|
91
91
|
```bash
|
92
|
-
pip install "usso
|
92
|
+
pip install "usso[fastapi]"
|
93
|
+
```
|
94
|
+
|
95
|
+
For Django:
|
96
|
+
|
97
|
+
```bash
|
98
|
+
pip install "usso[django]"
|
93
99
|
```
|
94
100
|
|
95
101
|
## Quick Start
|
@@ -14,7 +14,7 @@ The USSO-Client provides a universal single sign-on (SSO) integration for micros
|
|
14
14
|
Install the USSO client using pip:
|
15
15
|
|
16
16
|
```bash
|
17
|
-
pip install usso
|
17
|
+
pip install usso
|
18
18
|
```
|
19
19
|
|
20
20
|
To add framework-specific support, use the following commands:
|
@@ -22,7 +22,13 @@ To add framework-specific support, use the following commands:
|
|
22
22
|
For FastAPI:
|
23
23
|
|
24
24
|
```bash
|
25
|
-
pip install "usso
|
25
|
+
pip install "usso[fastapi]"
|
26
|
+
```
|
27
|
+
|
28
|
+
For Django:
|
29
|
+
|
30
|
+
```bash
|
31
|
+
pip install "usso[django]"
|
26
32
|
```
|
27
33
|
|
28
34
|
## Quick Start
|
@@ -4,7 +4,7 @@ build-backend = "setuptools.build_meta"
|
|
4
4
|
|
5
5
|
[project]
|
6
6
|
name = "usso"
|
7
|
-
version = "0.27.
|
7
|
+
version = "0.27.4"
|
8
8
|
description = "A plug-and-play client for integrating universal single sign-on (SSO) with Python frameworks, enabling secure and seamless authentication across microservices."
|
9
9
|
readme = "README.md"
|
10
10
|
requires-python = ">=3.9"
|
@@ -1,6 +1,6 @@
|
|
1
1
|
import logging
|
2
2
|
|
3
|
-
import
|
3
|
+
import httpx
|
4
4
|
from singleton import Singleton
|
5
5
|
|
6
6
|
from usso.core import UserData, Usso
|
@@ -28,18 +28,16 @@ class AsyncUssoAPI(metaclass=Singleton):
|
|
28
28
|
return
|
29
29
|
|
30
30
|
url = f"{self.url}/auth/refresh"
|
31
|
+
headers = {
|
32
|
+
"Authorization": f"Bearer {self.refresh_token}",
|
33
|
+
"Content-Type": "application/json",
|
34
|
+
}
|
31
35
|
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
async with aiohttp.ClientSession() as session:
|
39
|
-
async with session.post(url, headers=headers) as resp:
|
40
|
-
if kwargs.get("raise_exception", True):
|
41
|
-
resp.raise_for_status()
|
42
|
-
self.access_token = (await resp.json()).get("access_token")
|
36
|
+
async with httpx.AsyncClient() as client:
|
37
|
+
resp = await client.post(url, headers=headers)
|
38
|
+
if kwargs.get("raise_exception", True):
|
39
|
+
resp.raise_for_status()
|
40
|
+
self.access_token = resp.json().get("access_token")
|
43
41
|
|
44
42
|
def _access_valid(self) -> bool:
|
45
43
|
if not self.access_token:
|
@@ -48,9 +46,7 @@ class AsyncUssoAPI(metaclass=Singleton):
|
|
48
46
|
user_data = Usso(
|
49
47
|
jwks_url=f"{self.url}/website/jwks.json?"
|
50
48
|
).user_data_from_token(self.access_token)
|
51
|
-
|
52
|
-
return True
|
53
|
-
return False
|
49
|
+
return bool(user_data)
|
54
50
|
|
55
51
|
async def _request(
|
56
52
|
self,
|
@@ -60,7 +56,7 @@ class AsyncUssoAPI(metaclass=Singleton):
|
|
60
56
|
**kwargs,
|
61
57
|
) -> dict:
|
62
58
|
url = f"{self.url}/{endpoint}"
|
63
|
-
headers = {"
|
59
|
+
headers = {"Content-Type": "application/json"}
|
64
60
|
if self.api_key:
|
65
61
|
headers["x-api-key"] = self.api_key
|
66
62
|
elif self.refresh_token:
|
@@ -68,54 +64,41 @@ class AsyncUssoAPI(metaclass=Singleton):
|
|
68
64
|
await self._refresh()
|
69
65
|
headers["Authorization"] = f"Bearer {self.access_token}"
|
70
66
|
|
71
|
-
async with
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
logging.error(f"Response: {resp.text}")
|
88
|
-
raise e
|
89
|
-
return await resp.json()
|
67
|
+
async with httpx.AsyncClient() as client:
|
68
|
+
try:
|
69
|
+
resp = await client.request(
|
70
|
+
method,
|
71
|
+
url,
|
72
|
+
headers=headers,
|
73
|
+
json=data,
|
74
|
+
)
|
75
|
+
resp.raise_for_status()
|
76
|
+
return resp.json()
|
77
|
+
except httpx.HTTPStatusError as e:
|
78
|
+
logging.error(f"HTTP error: {e.response.status_code} {e.response.text}")
|
79
|
+
raise e
|
80
|
+
except Exception as e:
|
81
|
+
logging.error(f"Unexpected error: {e}")
|
82
|
+
raise e
|
90
83
|
|
91
84
|
async def get_users(self, **kwargs) -> list[UserData]:
|
92
85
|
users_dict = await self._request(endpoint="website/users", **kwargs)
|
93
|
-
|
94
86
|
return [UserData(user_id=user.get("uid"), **user) for user in users_dict]
|
95
87
|
|
96
88
|
async def get_user(self, user_id: str, **kwargs) -> UserData:
|
97
|
-
user_dict = await self._request(
|
98
|
-
endpoint=f"website/users/{user_id}",
|
99
|
-
**kwargs,
|
100
|
-
)
|
89
|
+
user_dict = await self._request(endpoint=f"website/users/{user_id}", **kwargs)
|
101
90
|
return UserData(user_id=user_dict.get("uid"), **user_dict)
|
102
91
|
|
103
92
|
async def get_user_by_credentials(self, credentials: dict, **kwargs) -> UserData:
|
104
93
|
user_dict = await self._request(
|
105
|
-
endpoint="website/users/credentials",
|
106
|
-
data=credentials,
|
107
|
-
**kwargs,
|
94
|
+
endpoint="website/users/credentials", data=credentials, **kwargs
|
108
95
|
)
|
109
96
|
return UserData(user_id=user_dict.get("uid"), **user_dict)
|
110
97
|
|
111
98
|
async def create_user(self, user_data: dict, **kwargs) -> UserData:
|
112
99
|
user_dict = await self._request(
|
113
|
-
method="post",
|
114
|
-
endpoint="website/users",
|
115
|
-
data=user_data,
|
116
|
-
**kwargs,
|
100
|
+
method="post", endpoint="website/users", data=user_data, **kwargs
|
117
101
|
)
|
118
|
-
|
119
102
|
return UserData(user_id=user_dict.get("uid"), **user_dict)
|
120
103
|
|
121
104
|
async def create_user_credentials(
|
@@ -139,10 +122,7 @@ class AsyncUssoAPI(metaclass=Singleton):
|
|
139
122
|
if credentials:
|
140
123
|
user_data["authenticators"] = [credentials]
|
141
124
|
user_dict = await self._request(
|
142
|
-
method="post",
|
143
|
-
endpoint="website/users",
|
144
|
-
data=credentials,
|
145
|
-
**kwargs,
|
125
|
+
method="post", endpoint="website/users", data=credentials, **kwargs
|
146
126
|
)
|
147
127
|
return UserData(user_id=user_dict.get("uid"), **user_dict)
|
148
128
|
|
@@ -6,6 +6,7 @@ from django.db.utils import IntegrityError
|
|
6
6
|
from django.http import JsonResponse
|
7
7
|
from django.http.request import HttpRequest
|
8
8
|
from django.utils.deprecation import MiddlewareMixin
|
9
|
+
|
9
10
|
from usso import UserData, Usso, USSOException
|
10
11
|
|
11
12
|
logger = logging.getLogger("usso")
|
@@ -1,29 +1,33 @@
|
|
1
|
+
import os
|
2
|
+
|
1
3
|
import httpx
|
2
4
|
|
3
5
|
from ..core import is_expired
|
4
|
-
from .
|
6
|
+
from .base_session import BaseUssoSession
|
5
7
|
|
6
8
|
|
7
9
|
class AsyncUssoSession(httpx.AsyncClient, BaseUssoSession):
|
10
|
+
|
8
11
|
def __init__(
|
9
12
|
self,
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
13
|
+
*,
|
14
|
+
usso_base_url: str | None = os.getenv("USSO_URL"),
|
15
|
+
api_key: str | None = os.getenv("USSO_API_KEY"),
|
16
|
+
usso_refresh_url: str | None = os.getenv("USSO_REFRESH_URL"),
|
17
|
+
refresh_token: str | None = os.getenv("USSO_REFRESH_TOKEN"),
|
18
|
+
usso_api_key: str | None = os.getenv("USSO_ADMIN_API_KEY"),
|
15
19
|
user_id: str | None = None,
|
16
20
|
):
|
21
|
+
httpx.AsyncClient.__init__(self)
|
17
22
|
BaseUssoSession.__init__(
|
18
23
|
self,
|
19
|
-
usso_base_url,
|
20
|
-
api_key,
|
21
|
-
usso_refresh_url,
|
22
|
-
refresh_token,
|
23
|
-
usso_api_key,
|
24
|
-
user_id,
|
24
|
+
usso_base_url=usso_base_url,
|
25
|
+
api_key=api_key,
|
26
|
+
usso_refresh_url=usso_refresh_url,
|
27
|
+
refresh_token=refresh_token,
|
28
|
+
usso_api_key=usso_api_key,
|
29
|
+
user_id=user_id,
|
25
30
|
)
|
26
|
-
httpx.AsyncClient.__init__(self, headers=self.headers)
|
27
31
|
|
28
32
|
async def _refresh_api(self):
|
29
33
|
params = {"user_id": self.user_id} if self.user_id else {}
|
@@ -0,0 +1,69 @@
|
|
1
|
+
import os
|
2
|
+
from urllib.parse import urlparse
|
3
|
+
from usso.core import is_expired
|
4
|
+
|
5
|
+
|
6
|
+
class BaseUssoSession:
|
7
|
+
|
8
|
+
def __init__(
|
9
|
+
self,
|
10
|
+
usso_base_url: str | None = os.getenv("USSO_URL"),
|
11
|
+
api_key: str | None = os.getenv("USSO_API_KEY"),
|
12
|
+
usso_refresh_url: str | None = os.getenv("USSO_REFRESH_URL"),
|
13
|
+
refresh_token: str | None = os.getenv("USSO_REFRESH_TOKEN"),
|
14
|
+
usso_api_key: str | None = os.getenv("USSO_ADMIN_API_KEY"),
|
15
|
+
user_id: str | None = None,
|
16
|
+
):
|
17
|
+
assert (
|
18
|
+
usso_base_url or usso_refresh_url
|
19
|
+
), "usso_base_url or usso_refresh_url is required"
|
20
|
+
assert (
|
21
|
+
refresh_token or api_key or usso_api_key
|
22
|
+
), "refresh_token or api_key or usso_api_key is required"
|
23
|
+
|
24
|
+
if not usso_base_url:
|
25
|
+
url_parts = urlparse(usso_refresh_url)
|
26
|
+
usso_base_url = f"{url_parts.scheme}://{url_parts.netloc}"
|
27
|
+
if usso_base_url.endswith("/"):
|
28
|
+
usso_base_url = usso_base_url[:-1]
|
29
|
+
|
30
|
+
self.usso_refresh_url = usso_refresh_url or f"{usso_base_url}/auth/refresh"
|
31
|
+
self._refresh_token = refresh_token
|
32
|
+
self.access_token = None
|
33
|
+
self.api_key = api_key
|
34
|
+
self.usso_api_key = usso_api_key
|
35
|
+
self.user_id = user_id
|
36
|
+
self.headers = getattr(self, "headers", {})
|
37
|
+
if api_key:
|
38
|
+
self.headers.update({"x-api-key": api_key})
|
39
|
+
|
40
|
+
@property
|
41
|
+
def refresh_token(self):
|
42
|
+
if self._refresh_token and is_expired(self._refresh_token):
|
43
|
+
self._refresh_token = None
|
44
|
+
|
45
|
+
return self._refresh_token
|
46
|
+
|
47
|
+
def request(self, method: str, url: str, **kwargs):
|
48
|
+
return self._request(method, url, **kwargs)
|
49
|
+
|
50
|
+
def get(self, url: str, **kwargs):
|
51
|
+
return self._request("GET", url, **kwargs)
|
52
|
+
|
53
|
+
def post(self, url: str, **kwargs):
|
54
|
+
return self._request("POST", url, **kwargs)
|
55
|
+
|
56
|
+
def put(self, url: str, **kwargs):
|
57
|
+
return self._request("PUT", url, **kwargs)
|
58
|
+
|
59
|
+
def patch(self, url: str, **kwargs):
|
60
|
+
return self._request("PATCH", url, **kwargs)
|
61
|
+
|
62
|
+
def delete(self, url: str, **kwargs):
|
63
|
+
return self._request("DELETE", url, **kwargs)
|
64
|
+
|
65
|
+
def head(self, url: str, **kwargs):
|
66
|
+
return self._request("HEAD", url, **kwargs)
|
67
|
+
|
68
|
+
def options(self, url: str, **kwargs):
|
69
|
+
return self._request("OPTIONS", url, **kwargs)
|
@@ -0,0 +1,71 @@
|
|
1
|
+
import os
|
2
|
+
|
3
|
+
import requests
|
4
|
+
from usso.core import is_expired
|
5
|
+
|
6
|
+
from .base_session import BaseUssoSession
|
7
|
+
|
8
|
+
|
9
|
+
class UssoSession(BaseUssoSession, requests.Session):
|
10
|
+
|
11
|
+
def __init__(
|
12
|
+
self,
|
13
|
+
*,
|
14
|
+
usso_base_url: str | None = os.getenv("USSO_URL"),
|
15
|
+
api_key: str | None = os.getenv("USSO_API_KEY"),
|
16
|
+
usso_refresh_url: str | None = os.getenv("USSO_REFRESH_URL"),
|
17
|
+
refresh_token: str | None = os.getenv("USSO_REFRESH_TOKEN"),
|
18
|
+
usso_api_key: str | None = os.getenv("USSO_ADMIN_API_KEY"),
|
19
|
+
user_id: str | None = None,
|
20
|
+
):
|
21
|
+
requests.Session.__init__(self)
|
22
|
+
BaseUssoSession.__init__(
|
23
|
+
self,
|
24
|
+
usso_base_url=usso_base_url,
|
25
|
+
api_key=api_key,
|
26
|
+
usso_refresh_url=usso_refresh_url,
|
27
|
+
refresh_token=refresh_token,
|
28
|
+
usso_api_key=usso_api_key,
|
29
|
+
user_id=user_id,
|
30
|
+
)
|
31
|
+
self.headers.update(self.headers)
|
32
|
+
|
33
|
+
def _refresh_api(self):
|
34
|
+
assert self.usso_api_key, "usso_api_key is required"
|
35
|
+
params = {"user_id": self.user_id} if self.user_id else {}
|
36
|
+
response = requests.get(
|
37
|
+
f"{self.usso_refresh_url}/api",
|
38
|
+
headers={"x-api-key": self.usso_api_key},
|
39
|
+
params=params,
|
40
|
+
)
|
41
|
+
response.raise_for_status()
|
42
|
+
data: dict = response.json()
|
43
|
+
self._refresh_token = data.get("token", {}).get("refresh_token")
|
44
|
+
|
45
|
+
def _refresh(self):
|
46
|
+
assert (
|
47
|
+
self.refresh_token or self.usso_api_key
|
48
|
+
), "refresh_token or usso_api_key is required"
|
49
|
+
|
50
|
+
if self.usso_api_key and not self.refresh_token:
|
51
|
+
self._refresh_api()
|
52
|
+
|
53
|
+
response = requests.post(
|
54
|
+
self.usso_refresh_url, json={"refresh_token": f"{self.refresh_token}"}
|
55
|
+
)
|
56
|
+
response.raise_for_status()
|
57
|
+
self.access_token = response.json().get("access_token")
|
58
|
+
self.headers.update({"Authorization": f"Bearer {self.access_token}"})
|
59
|
+
return response.json()
|
60
|
+
|
61
|
+
def get_session(self):
|
62
|
+
if self.api_key:
|
63
|
+
return self
|
64
|
+
|
65
|
+
if not self.access_token or is_expired(self.access_token):
|
66
|
+
self._refresh()
|
67
|
+
return self
|
68
|
+
|
69
|
+
def _request(self, method: str, url: str, **kwargs):
|
70
|
+
self.get_session()
|
71
|
+
return requests.Session.request(self, method, url, **kwargs)
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: usso
|
3
|
-
Version: 0.27.
|
3
|
+
Version: 0.27.4
|
4
4
|
Summary: A plug-and-play client for integrating universal single sign-on (SSO) with Python frameworks, enabling secure and seamless authentication across microservices.
|
5
5
|
Author-email: Mahdi Kiani <mahdikiany@gmail.com>
|
6
6
|
Maintainer-email: Mahdi Kiani <mahdikiany@gmail.com>
|
@@ -81,7 +81,7 @@ The USSO-Client provides a universal single sign-on (SSO) integration for micros
|
|
81
81
|
Install the USSO client using pip:
|
82
82
|
|
83
83
|
```bash
|
84
|
-
pip install usso
|
84
|
+
pip install usso
|
85
85
|
```
|
86
86
|
|
87
87
|
To add framework-specific support, use the following commands:
|
@@ -89,7 +89,13 @@ To add framework-specific support, use the following commands:
|
|
89
89
|
For FastAPI:
|
90
90
|
|
91
91
|
```bash
|
92
|
-
pip install "usso
|
92
|
+
pip install "usso[fastapi]"
|
93
|
+
```
|
94
|
+
|
95
|
+
For Django:
|
96
|
+
|
97
|
+
```bash
|
98
|
+
pip install "usso[django]"
|
93
99
|
```
|
94
100
|
|
95
101
|
## Quick Start
|
File without changes
|
File without changes
|
@@ -1,118 +0,0 @@
|
|
1
|
-
from urllib.parse import urlparse
|
2
|
-
|
3
|
-
import requests
|
4
|
-
from singleton import Singleton
|
5
|
-
|
6
|
-
from ..core import is_expired
|
7
|
-
|
8
|
-
|
9
|
-
class BaseUssoSession(metaclass=Singleton):
|
10
|
-
|
11
|
-
def __init__(
|
12
|
-
self,
|
13
|
-
usso_base_url: str | None = None,
|
14
|
-
api_key: str | None = None,
|
15
|
-
usso_refresh_url: str | None = None,
|
16
|
-
refresh_token: str | None = None,
|
17
|
-
usso_api_key: str | None = None,
|
18
|
-
user_id: str | None = None,
|
19
|
-
):
|
20
|
-
assert (
|
21
|
-
usso_base_url or usso_refresh_url
|
22
|
-
), "usso_base_url or usso_refresh_url is required"
|
23
|
-
assert (
|
24
|
-
refresh_token or api_key or usso_api_key
|
25
|
-
), "refresh_token or api_key or usso_api_key is required"
|
26
|
-
|
27
|
-
if not usso_base_url:
|
28
|
-
url_parts = urlparse(usso_refresh_url)
|
29
|
-
usso_base_url = f"{url_parts.scheme}://{url_parts.netloc}"
|
30
|
-
if usso_base_url.endswith("/"):
|
31
|
-
usso_base_url = usso_base_url[:-1]
|
32
|
-
|
33
|
-
self.usso_refresh_url = usso_refresh_url or f"{usso_base_url}/auth/refresh"
|
34
|
-
self._refresh_token = refresh_token
|
35
|
-
self.session = requests.Session()
|
36
|
-
self.access_token = None
|
37
|
-
self.api_key = api_key
|
38
|
-
self.usso_api_key = usso_api_key
|
39
|
-
self.user_id = user_id
|
40
|
-
self.headers = {}
|
41
|
-
if api_key:
|
42
|
-
self.headers = {"x-api-key": api_key}
|
43
|
-
self.session.headers.update(self.headers)
|
44
|
-
|
45
|
-
@property
|
46
|
-
def refresh_token(self):
|
47
|
-
if self._refresh_token and is_expired(self._refresh_token):
|
48
|
-
self._refresh_token = None
|
49
|
-
|
50
|
-
return self._refresh_token
|
51
|
-
|
52
|
-
def request(self, method: str, url: str, **kwargs):
|
53
|
-
return self._request(method, url, **kwargs)
|
54
|
-
|
55
|
-
def get(self, url: str, **kwargs):
|
56
|
-
return self._request("GET", url, **kwargs)
|
57
|
-
|
58
|
-
def post(self, url: str, **kwargs):
|
59
|
-
return self._request("POST", url, **kwargs)
|
60
|
-
|
61
|
-
def put(self, url: str, **kwargs):
|
62
|
-
return self._request("PUT", url, **kwargs)
|
63
|
-
|
64
|
-
def patch(self, url: str, **kwargs):
|
65
|
-
return self._request("PATCH", url, **kwargs)
|
66
|
-
|
67
|
-
def delete(self, url: str, **kwargs):
|
68
|
-
return self._request("DELETE", url, **kwargs)
|
69
|
-
|
70
|
-
def head(self, url: str, **kwargs):
|
71
|
-
return self._request("HEAD", url, **kwargs)
|
72
|
-
|
73
|
-
def options(self, url: str, **kwargs):
|
74
|
-
return self._request("OPTIONS", url, **kwargs)
|
75
|
-
|
76
|
-
|
77
|
-
class UssoSession(BaseUssoSession):
|
78
|
-
def _refresh_api(self):
|
79
|
-
params = {"user_id": self.user_id} if self.user_id else {}
|
80
|
-
response = requests.get(
|
81
|
-
f"{self.usso_refresh_url}/api",
|
82
|
-
headers={"x-api-key": self.usso_api_key},
|
83
|
-
params=params,
|
84
|
-
)
|
85
|
-
response.raise_for_status()
|
86
|
-
data: dict = response.json()
|
87
|
-
self._refresh_token = data.get("token", {}).get("refresh_token")
|
88
|
-
|
89
|
-
def _refresh(self):
|
90
|
-
assert (
|
91
|
-
self.refresh_token or self.usso_api_key
|
92
|
-
), "refresh_token or usso_api_key is required"
|
93
|
-
|
94
|
-
if self.usso_api_key and not self.refresh_token:
|
95
|
-
self._refresh_api()
|
96
|
-
|
97
|
-
response = requests.post(
|
98
|
-
self.usso_refresh_url, json={"refresh_token": f"{self.refresh_token}"}
|
99
|
-
)
|
100
|
-
response.raise_for_status()
|
101
|
-
self.access_token = response.json().get("access_token")
|
102
|
-
self.session.headers.update({"Authorization": f"Bearer {self.access_token}"})
|
103
|
-
return response.json()
|
104
|
-
|
105
|
-
def get_session(self):
|
106
|
-
if self.api_key:
|
107
|
-
return self.session
|
108
|
-
|
109
|
-
if not self.access_token or is_expired(self.access_token):
|
110
|
-
self._refresh()
|
111
|
-
return self.session
|
112
|
-
|
113
|
-
def _request(self, method: str, url: str, **kwargs):
|
114
|
-
session = self.get_session()
|
115
|
-
return session.request(method, url, **kwargs)
|
116
|
-
|
117
|
-
def close(self):
|
118
|
-
self.session.close()
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
@@ -1,8 +1,8 @@
|
|
1
1
|
import logging
|
2
2
|
|
3
|
+
from fastapi import Request, WebSocket
|
3
4
|
from starlette.status import HTTP_401_UNAUTHORIZED
|
4
5
|
|
5
|
-
from fastapi import Request, WebSocket
|
6
6
|
from usso.exceptions import USSOException
|
7
7
|
|
8
8
|
from ..core import UserData, Usso, get_authorization_scheme_param
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|