forked from getredash/redash
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add auth via JWT providers (getredash#2768)
* authentication via JWT providers * add support for IAP JWT auth * remove jwt_auth Blueprint and /headers endpoint * fix pep8: imports
- Loading branch information
1 parent
fa92fec
commit de0089c
Showing
4 changed files
with
135 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
import logging | ||
import json | ||
import jwt | ||
import requests | ||
|
||
logger = logging.getLogger('jwt_auth') | ||
|
||
|
||
def get_public_keys(url): | ||
""" | ||
Returns: | ||
List of RSA public keys usable by PyJWT. | ||
""" | ||
key_cache = get_public_keys.key_cache | ||
if url in key_cache: | ||
return key_cache[url] | ||
else: | ||
r = requests.get(url) | ||
r.raise_for_status() | ||
data = r.json() | ||
if 'keys' in data: | ||
public_keys = [] | ||
for key_dict in data['keys']: | ||
public_key = jwt.algorithms.RSAAlgorithm.from_jwk(json.dumps(key_dict)) | ||
public_keys.append(public_key) | ||
|
||
get_public_keys.key_cache[url] = public_keys | ||
return public_keys | ||
else: | ||
get_public_keys.key_cache[url] = data | ||
return data | ||
|
||
|
||
get_public_keys.key_cache = {} | ||
|
||
|
||
def verify_jwt_token(jwt_token, expected_issuer, expected_audience, algorithms, public_certs_url): | ||
# https://developers.cloudflare.com/access/setting-up-access/validate-jwt-tokens/ | ||
# https://cloud.google.com/iap/docs/signed-headers-howto | ||
# Loop through the keys since we can't pass the key set to the decoder | ||
keys = get_public_keys(public_certs_url) | ||
|
||
key_id = jwt.get_unverified_header(jwt_token).get('kid', '') | ||
if key_id and isinstance(keys, dict): | ||
keys = [keys.get(key_id)] | ||
|
||
valid_token = False | ||
payload = None | ||
for key in keys: | ||
try: | ||
# decode returns the claims which has the email if you need it | ||
payload = jwt.decode( | ||
jwt_token, | ||
key=key, | ||
audience=expected_audience, | ||
algorithms=algorithms | ||
) | ||
issuer = payload['iss'] | ||
if issuer != expected_issuer: | ||
raise Exception('Wrong issuer: {}'.format(issuer)) | ||
valid_token = True | ||
break | ||
except Exception as e: | ||
logging.exception(e) | ||
return payload, valid_token |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters