2020-03-19 16:45:31 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
""" AUTH API """
|
|
|
|
|
|
|
|
from __future__ import absolute_import, division, unicode_literals
|
|
|
|
|
|
|
|
import json
|
|
|
|
import logging
|
2020-04-01 11:01:22 +02:00
|
|
|
import os
|
2020-03-19 16:45:31 +01:00
|
|
|
import time
|
|
|
|
|
2020-04-01 12:42:04 +02:00
|
|
|
from resources.lib import kodiutils
|
2020-03-22 10:30:23 +01:00
|
|
|
from resources.lib.viervijfzes.auth_awsidp import AwsIdp, InvalidLoginException, AuthenticationException
|
2020-03-19 16:45:31 +01:00
|
|
|
|
|
|
|
_LOGGER = logging.getLogger('auth-api')
|
|
|
|
|
|
|
|
|
|
|
|
class AuthApi:
|
2020-03-21 20:46:14 +01:00
|
|
|
""" VIER/VIJF/ZES Authentication API """
|
2020-03-19 16:45:31 +01:00
|
|
|
COGNITO_REGION = 'eu-west-1'
|
|
|
|
COGNITO_POOL_ID = 'eu-west-1_dViSsKM5Y'
|
|
|
|
COGNITO_CLIENT_ID = '6s1h851s8uplco5h6mqh1jac8m'
|
|
|
|
|
|
|
|
TOKEN_FILE = 'auth-tokens.json'
|
|
|
|
|
2020-04-01 11:01:22 +02:00
|
|
|
def __init__(self, username, password, token_path):
|
2020-03-19 16:45:31 +01:00
|
|
|
""" Initialise object """
|
|
|
|
self._username = username
|
|
|
|
self._password = password
|
2020-04-01 11:01:22 +02:00
|
|
|
self._token_path = token_path
|
2020-03-19 16:45:31 +01:00
|
|
|
self._id_token = None
|
|
|
|
self._expiry = 0
|
|
|
|
self._refresh_token = None
|
|
|
|
|
2020-03-22 15:37:15 +01:00
|
|
|
# Load tokens from cache
|
|
|
|
try:
|
2020-04-01 11:01:22 +02:00
|
|
|
with open(self._token_path + self.TOKEN_FILE, 'rb') as fdesc:
|
2020-03-25 08:08:15 +01:00
|
|
|
data_json = json.loads(fdesc.read())
|
2020-03-22 15:37:15 +01:00
|
|
|
self._id_token = data_json.get('id_token')
|
|
|
|
self._refresh_token = data_json.get('refresh_token')
|
|
|
|
self._expiry = int(data_json.get('expiry', 0))
|
|
|
|
except (IOError, TypeError, ValueError):
|
2020-03-23 15:04:41 +01:00
|
|
|
_LOGGER.info('We could not use the cache since it is invalid or non-existent.')
|
2020-03-19 16:45:31 +01:00
|
|
|
|
|
|
|
def get_token(self):
|
|
|
|
""" Get a valid token """
|
|
|
|
now = int(time.time())
|
|
|
|
|
|
|
|
if self._id_token and self._expiry > now:
|
|
|
|
# We have a valid id token in memory, use it
|
2020-03-26 11:31:28 +01:00
|
|
|
_LOGGER.debug('Got an id token from memory')
|
2020-03-19 16:45:31 +01:00
|
|
|
return self._id_token
|
|
|
|
|
|
|
|
if self._refresh_token:
|
|
|
|
# We have a valid refresh token, use that to refresh our id token
|
|
|
|
# The refresh token is valid for 30 days. If this refresh fails, we just continue by logging in again.
|
2020-03-22 10:30:23 +01:00
|
|
|
_LOGGER.debug('Getting an id token by refreshing')
|
|
|
|
try:
|
|
|
|
self._id_token = self._refresh(self._refresh_token)
|
2020-03-19 16:45:31 +01:00
|
|
|
self._expiry = now + 3600
|
2020-03-25 08:08:15 +01:00
|
|
|
except (InvalidLoginException, AuthenticationException) as exc:
|
|
|
|
_LOGGER.error('Error logging in: %s', str(exc))
|
2020-03-22 10:30:23 +01:00
|
|
|
self._id_token = None
|
|
|
|
self._refresh_token = None
|
|
|
|
self._expiry = 0
|
|
|
|
# We continue by logging in with username and password
|
2020-03-19 16:45:31 +01:00
|
|
|
|
|
|
|
if not self._id_token:
|
|
|
|
# We have no tokens, or they are all invalid, do a login
|
2020-03-22 10:30:23 +01:00
|
|
|
_LOGGER.debug('Getting an id token by logging in')
|
2020-03-19 16:45:31 +01:00
|
|
|
id_token, refresh_token = self._authenticate(self._username, self._password)
|
|
|
|
self._id_token = id_token
|
|
|
|
self._refresh_token = refresh_token
|
|
|
|
self._expiry = now + 3600
|
|
|
|
|
2020-03-22 15:37:15 +01:00
|
|
|
# Store new tokens in cache
|
2020-04-01 11:01:22 +02:00
|
|
|
if not os.path.exists(self._token_path):
|
|
|
|
os.mkdir(self._token_path)
|
|
|
|
with open(self._token_path + self.TOKEN_FILE, 'wb') as fdesc:
|
2020-03-22 15:37:15 +01:00
|
|
|
data = json.dumps(dict(
|
|
|
|
id_token=self._id_token,
|
|
|
|
refresh_token=self._refresh_token,
|
|
|
|
expiry=self._expiry,
|
|
|
|
))
|
2020-04-01 11:00:06 +02:00
|
|
|
fdesc.write(kodiutils.from_unicode(data))
|
2020-03-19 16:45:31 +01:00
|
|
|
|
|
|
|
return self._id_token
|
|
|
|
|
2020-04-01 11:01:22 +02:00
|
|
|
def clear_tokens(self):
|
2020-03-19 16:45:31 +01:00
|
|
|
""" Remove the cached tokens. """
|
2020-04-01 11:01:22 +02:00
|
|
|
if os.path.exists(self._token_path + AuthApi.TOKEN_FILE):
|
|
|
|
os.unlink(self._token_path + AuthApi.TOKEN_FILE)
|
2020-03-19 16:45:31 +01:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _authenticate(username, password):
|
|
|
|
""" Authenticate with Amazon Cognito and fetch a refresh token and id token. """
|
|
|
|
client = AwsIdp(AuthApi.COGNITO_POOL_ID, AuthApi.COGNITO_CLIENT_ID)
|
|
|
|
return client.authenticate(username, password)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def _refresh(refresh_token):
|
|
|
|
""" Use the refresh token to fetch a new id token. """
|
|
|
|
client = AwsIdp(AuthApi.COGNITO_POOL_ID, AuthApi.COGNITO_CLIENT_ID)
|
|
|
|
return client.renew_token(refresh_token)
|