|
| 1 | +from functools import lru_cache |
| 2 | +from typing import Any, Dict |
| 3 | + |
| 4 | +from django.conf import settings |
| 5 | +from django.urls import reverse_lazy |
| 6 | + |
| 7 | +from django_pyoidc.exceptions import InvalidOIDCConfigurationException |
| 8 | + |
| 9 | + |
| 10 | +class OIDCSettingsFactory: |
| 11 | + @lru_cache |
| 12 | + def get(op_name, *args, **kwargs): |
| 13 | + """ |
| 14 | + lru_cache will return a singleton for each argument value. |
| 15 | + So this is a memoized function |
| 16 | + """ |
| 17 | + |
| 18 | + # FIXME: Not good, too much args, needs to memoize only on op_name |
| 19 | + |
| 20 | + return OIDCSettings(op_name, *args, **kwargs) |
| 21 | + |
| 22 | + |
| 23 | +class OIDCSettings: |
| 24 | + |
| 25 | + GLOBAL_SETTINGS = { |
| 26 | + "CACHE_PROVIDER_TTL": 60, |
| 27 | + "DRF_CLIENT_ID": None, |
| 28 | + "DRF_USE_INTROSPECTION": True, |
| 29 | + } |
| 30 | + OP_SETTINGS = { |
| 31 | + "POST_LOGIN_URI_FAILURE": "/", |
| 32 | + "POST_LOGIN_URI_SUCCESS": "/", |
| 33 | + "POST_LOGOUT_REDIRECT_URI": "/", |
| 34 | + "OIDC_CALLBACK_PATH": "/oidc", |
| 35 | + "REDIRECT_REQUIRES_HTTPS": True, |
| 36 | + "LOGIN_URIS_REDIRECT_ALLOWED_HOSTS": [], |
| 37 | + "OIDC_CLIENT_SECRET": None, |
| 38 | + "OIDC_CLIENT_ID": None, |
| 39 | + "OIDC_PROVIDER_DISCOVERY_URI": None, |
| 40 | + "OIDC_LOGOUT_REDIRECT_PARAMETER_NAME": "post_logut_redirect", |
| 41 | + "CACHE_DJANGO_BACKEND": None, |
| 42 | + } |
| 43 | + |
| 44 | + def init(self, op_name: str, *args, **kwargs): |
| 45 | + # provider_discovery_uri: str, |
| 46 | + # logout_redirect: str, |
| 47 | + # failure_redirect: str, |
| 48 | + # success_redirect: str, |
| 49 | + # redirect_requires_https: bool, |
| 50 | + # client_secret: str, |
| 51 | + # client_id: str, |
| 52 | + # ): |
| 53 | + |
| 54 | + # provider_discovery_uri = kwargs["provider_discovery_uri"] |
| 55 | + logout_redirect = kwargs["logout_redirect"] |
| 56 | + failure_redirect = kwargs["failure_redirect"] |
| 57 | + success_redirect = kwargs["success_redirect"] |
| 58 | + redirect_requires_https = kwargs["redirect_requires_https"] |
| 59 | + client_secret = kwargs["client_secret"] |
| 60 | + client_id = kwargs["client_id"] |
| 61 | + if op_name == "__default": |
| 62 | + raise InvalidOIDCConfigurationException( |
| 63 | + "'__default' is a reserved word that you cannot use for the provide name" |
| 64 | + ) |
| 65 | + self.op_name = op_name |
| 66 | + # self.attrs = |
| 67 | + # NEW !! |
| 68 | + # if 'provider_name' in kwargs: |
| 69 | + # FIXME: load provider by name, to get all defaults from that |
| 70 | + if "provider_discovery_uri" in kwargs: |
| 71 | + self.provider_discovery_uri = kwargs["provider_discovery_uri"] |
| 72 | + else: |
| 73 | + self.provider_discovery_uri = kwargs["provider_discovery_uri"] |
| 74 | + self.init("POST_LOGOUT_REDIRECT_URI", logout_redirect) |
| 75 | + # if settings.DJANGO_PYOIDC[op_name] |
| 76 | + self.OP_SETTINGS["POST_LOGOUT_REDIRECT_URI"] = logout_redirect |
| 77 | + self.OP_SETTINGS["POST_LOGIN_URI_FAILURE"] = failure_redirect |
| 78 | + self.success_redirect = success_redirect |
| 79 | + self.redirect_requires_https = redirect_requires_https |
| 80 | + self.client_secret = client_secret |
| 81 | + self.client_id = client_id |
| 82 | + |
| 83 | + def get(self, name, default=None): |
| 84 | + return self.get_op_setting(self.op_name, name, default) |
| 85 | + |
| 86 | + def set(self, key: str, value=None): |
| 87 | + self.OP_SETTINGS[key] = value |
| 88 | + |
| 89 | + def _get_attr(self, key): |
| 90 | + if key in self.OP_SETTINGS and self.OP_SETTINGS[key] is not None: |
| 91 | + return self.OP_SETTINGS[key] |
| 92 | + else: |
| 93 | + if key in self.GLOBAL_SETTINGS: |
| 94 | + return self.GLOBAL_SETTINGS[key] |
| 95 | + else: |
| 96 | + raise InvalidOIDCConfigurationException( |
| 97 | + f"{key} is not a valid setting." |
| 98 | + ) |
| 99 | + |
| 100 | + def get_op_setting(self, key: str, default=None): |
| 101 | + res = self._get_attr(key) |
| 102 | + if res is None: |
| 103 | + return default |
| 104 | + |
| 105 | + def get_op_settings(op_name: str): |
| 106 | + # FALSE |
| 107 | + return settings.DJANGO_PYOIDC[op_name] |
| 108 | + |
| 109 | + def get_op_config(self) -> Dict[str, Dict[str, Any]]: |
| 110 | + """ |
| 111 | + Parameters: |
| 112 | + allowed_hosts(:obj:`list`) : A list of allowed domains that can be redirected to. A good idea is to this to |
| 113 | + :setting:`ALLOWED_HOSTS <django:ALLOWED_HOSTS>`. See :ref:`Redirect the user after login` for more details. |
| 114 | + cache_backend(:obj:`str`, optional): Defaults to 'default'. The cache backend that should be used to store |
| 115 | + this provider sessions. Take a look at :ref:`Cache Management` |
| 116 | +
|
| 117 | + Returns: |
| 118 | + dict: A dictionary with all the settings that `django-pyoidc` expects to work properly |
| 119 | + """ |
| 120 | + return { |
| 121 | + self.op_name: { |
| 122 | + "POST_LOGIN_URI_FAILURE": self.failure_redirect, |
| 123 | + "POST_LOGIN_URI_SUCCESS": self.success_redirect, |
| 124 | + "POST_LOGOUT_REDIRECT_URI": self.logout_redirect, |
| 125 | + "OIDC_CALLBACK_PATH": reverse_lazy(self.callback_uri_name), |
| 126 | + "REDIRECT_REQUIRES_HTTPS": self.redirect_requires_https, |
| 127 | + "OIDC_CLIENT_SECRET": self.attrs["client_secret"], |
| 128 | + "OIDC_CLIENT_ID": self.attrs["client_id"], |
| 129 | + "OIDC_PROVIDER_DISCOVERY_URI": self.provider_discovery_uri, |
| 130 | + "OIDC_LOGOUT_REDIRECT_PARAMETER_NAME": None, |
| 131 | + "CACHE_PROVIDER_TTL": self.GLOBAL_SETTINGS["CACHE_PROVIDER_TTL"], |
| 132 | + } |
| 133 | + } |
0 commit comments