|
| 1 | +import logging |
| 2 | +from abc import ABC |
| 3 | +from typing import Any |
| 4 | + |
| 5 | +from fastapi import APIRouter, Depends, Request, Response |
| 6 | +from fastapi.responses import RedirectResponse |
| 7 | +from fastapi_sso.sso.base import OpenID, SSOBase |
| 8 | +from fastapi_sso.sso.github import GithubSSO |
| 9 | +from fastapi_sso.sso.google import GoogleSSO |
| 10 | +from fastapi_sso.sso.microsoft import MicrosoftSSO |
| 11 | +from sqlalchemy.ext.asyncio import AsyncSession |
| 12 | + |
| 13 | +from ...core.config import settings |
| 14 | +from ...core.db.database import async_get_db |
| 15 | +from ...core.exceptions.http_exceptions import UnauthorizedException |
| 16 | +from ...core.security import ( |
| 17 | + create_access_token, |
| 18 | + create_refresh_token, |
| 19 | +) |
| 20 | +from ...crud.crud_users import crud_users |
| 21 | +from ...schemas.user import UserCreateInternal, UserRead |
| 22 | +from .users import write_user_internal |
| 23 | + |
| 24 | +router = APIRouter(tags=["login", "oauth"]) |
| 25 | +logger = logging.getLogger(__name__) |
| 26 | + |
| 27 | + |
| 28 | +class BaseOAuthProvider(ABC): |
| 29 | + provider_config: dict[str, Any] |
| 30 | + sso_provider: type[SSOBase] |
| 31 | + |
| 32 | + def __init__(self, router: Any): |
| 33 | + self.router = router |
| 34 | + self.provider_name: str = self.sso_provider.provider |
| 35 | + if self.is_enabled: |
| 36 | + self.sso = self.sso_provider(redirect_uri=self.redirect_uri, **self.provider_config) |
| 37 | + tag = f"{self.sso_provider.provider.title()} OAuth" |
| 38 | + self.router.add_api_route( |
| 39 | + f"/login/{self.provider_name}", |
| 40 | + self._login_handler, |
| 41 | + methods=["GET"], |
| 42 | + tags=[tag], |
| 43 | + summary=f"Login with {self.provider_name.title()} OAuth", |
| 44 | + ) |
| 45 | + self.router.add_api_route( |
| 46 | + f"/callback/{self.provider_name}", |
| 47 | + self._callback_handler, |
| 48 | + methods=["GET"], |
| 49 | + tags=[tag], |
| 50 | + summary=f"Callback for {self.provider_name.title()} OAuth", |
| 51 | + ) |
| 52 | + |
| 53 | + @property |
| 54 | + def redirect_uri(self) -> str: |
| 55 | + return f"{settings.APP_BACKEND_HOST}/api/v1/callback/{self.provider_name}" |
| 56 | + |
| 57 | + @property |
| 58 | + def is_enabled(self) -> bool: |
| 59 | + is_enabled = all(self.provider_config.values()) |
| 60 | + if settings.ENABLE_PASSWORD_AUTH and is_enabled: |
| 61 | + logger.warning( |
| 62 | + f"Both password authentication and {self.provider_name} OAuth are enabled. " |
| 63 | + "For enterprise or B2B deployments, it is recommended to disable password authentication " |
| 64 | + "by setting ENABLE_PASSWORD_AUTH=false and relying solely on OAuth." |
| 65 | + ) |
| 66 | + return is_enabled |
| 67 | + |
| 68 | + async def _create_and_set_token(self, response: Response, user: dict[str, Any]) -> str: |
| 69 | + access_token = await create_access_token(data={"sub": user["username"]}) |
| 70 | + refresh_token = await create_refresh_token(data={"sub": user["username"]}) |
| 71 | + max_age = settings.REFRESH_TOKEN_EXPIRE_DAYS * 24 * 60 * 60 |
| 72 | + response.set_cookie( |
| 73 | + key="refresh_token", value=refresh_token, httponly=True, secure=True, samesite="lax", max_age=max_age |
| 74 | + ) |
| 75 | + return access_token |
| 76 | + |
| 77 | + async def _login_handler(self) -> RedirectResponse: |
| 78 | + async with self.sso: |
| 79 | + return await self.sso.get_login_redirect() |
| 80 | + |
| 81 | + async def _callback_handler(self, request: Request, response: Response, db: AsyncSession = Depends(async_get_db)): |
| 82 | + async with self.sso: |
| 83 | + oauth_user: OpenID | None = await self.sso.verify_and_process(request) |
| 84 | + if not oauth_user or not oauth_user.email: |
| 85 | + raise UnauthorizedException(f"Invalid response from {self.provider_name.title()} OAuth.") |
| 86 | + |
| 87 | + db_user = await crud_users.get(db=db, email=oauth_user.email, is_deleted=False, schema_to_select=UserRead) |
| 88 | + if not db_user: |
| 89 | + user = await self._get_user_details(oauth_user) |
| 90 | + db_user = await write_user_internal(user=user, db=db) |
| 91 | + |
| 92 | + access_token = await self._create_and_set_token(response, db_user) |
| 93 | + return {"access_token": access_token, "token_type": "bearer"} |
| 94 | + |
| 95 | + async def _get_user_details(self, oauth_user: OpenID) -> UserCreateInternal: |
| 96 | + if not oauth_user.email: |
| 97 | + raise UnauthorizedException(f"Invalid response from {self.provider_name.title()} OAuth.") |
| 98 | + username = oauth_user.email.split("@")[0].lower() |
| 99 | + name = oauth_user.display_name or username |
| 100 | + |
| 101 | + return UserCreateInternal( |
| 102 | + email=oauth_user.email, |
| 103 | + name=name, |
| 104 | + username=username, |
| 105 | + hashed_password=None, |
| 106 | + ) |
| 107 | + |
| 108 | + |
| 109 | +class GoogleOAuthProvider(BaseOAuthProvider): |
| 110 | + sso_provider = GoogleSSO |
| 111 | + provider_config = { |
| 112 | + "client_id": settings.GOOGLE_CLIENT_ID, |
| 113 | + "client_secret": settings.GOOGLE_CLIENT_SECRET, |
| 114 | + } |
| 115 | + |
| 116 | + |
| 117 | +class MicrosoftOAuthProvider(BaseOAuthProvider): |
| 118 | + sso_provider = MicrosoftSSO |
| 119 | + provider_config = { |
| 120 | + "client_id": settings.MICROSOFT_CLIENT_ID, |
| 121 | + "client_secret": settings.MICROSOFT_CLIENT_SECRET, |
| 122 | + "tenant": settings.MICROSOFT_TENANT, |
| 123 | + } |
| 124 | + |
| 125 | + |
| 126 | +class GithubOAuthProvider(BaseOAuthProvider): |
| 127 | + sso_provider = GithubSSO |
| 128 | + provider_config = { |
| 129 | + "client_id": settings.GITHUB_CLIENT_ID, |
| 130 | + "client_secret": settings.GITHUB_CLIENT_SECRET, |
| 131 | + } |
| 132 | + |
| 133 | + |
| 134 | +GoogleOAuthProvider(router) |
| 135 | +MicrosoftOAuthProvider(router) |
| 136 | +GithubOAuthProvider(router) |
0 commit comments