|
| 1 | +import requests |
| 2 | + |
| 3 | +import office365.logger |
| 4 | +from office365.runtime.auth.base_token_provider import BaseTokenProvider |
| 5 | + |
| 6 | + |
| 7 | +class ACSTokenProvider(BaseTokenProvider, office365.logger.LoggerContext): |
| 8 | + """ Provider to acquire the access token from a Microsoft Azure Access Control Service (ACS)""" |
| 9 | + |
| 10 | + def __init__(self, url, client_id, client_secret): |
| 11 | + self.url = url |
| 12 | + self.client_id = client_id |
| 13 | + self.client_secret = client_secret |
| 14 | + self.redirect_url = None |
| 15 | + self.access_token = None |
| 16 | + self.error = None |
| 17 | + self.SharePointPrincipal = "00000003-0000-0ff1-ce00-000000000000" |
| 18 | + |
| 19 | + def acquire_token(self): |
| 20 | + try: |
| 21 | + realm = self.get_realm_from_target_url() |
| 22 | + try: |
| 23 | + from urlparse import urlparse # Python 2.X |
| 24 | + except ImportError: |
| 25 | + from urllib.parse import urlparse # Python 3+ |
| 26 | + url_info = urlparse(self.url) |
| 27 | + self.access_token = self.get_app_only_access_token(url_info.hostname, realm) |
| 28 | + return True |
| 29 | + except requests.exceptions.RequestException as e: |
| 30 | + self.error = "Error: {}".format(e) |
| 31 | + return False |
| 32 | + |
| 33 | + def get_realm_from_target_url(self): |
| 34 | + response = requests.head(url=self.url, headers={'Authorization': 'Bearer'}) |
| 35 | + return self.process_realm_response(response) |
| 36 | + |
| 37 | + def get_app_only_access_token(self, target_host, target_realm): |
| 38 | + resource = self.get_formatted_principal(self.SharePointPrincipal, target_host, target_realm) |
| 39 | + client_id = self.get_formatted_principal(self.client_id, None, target_realm) |
| 40 | + sts_url = self.get_security_token_service_url(target_realm) |
| 41 | + oauth2_request = self.create_access_token_request(client_id, self.client_secret, resource) |
| 42 | + response = requests.post(url=sts_url, headers={'Content-Type': 'application/x-www-form-urlencoded'}, data=oauth2_request) |
| 43 | + return response.json() |
| 44 | + |
| 45 | + @staticmethod |
| 46 | + def process_realm_response(response): |
| 47 | + header_key = "WWW-Authenticate" |
| 48 | + if header_key in response.headers: |
| 49 | + auth_values = response.headers[header_key].split(",") |
| 50 | + bearer = auth_values[0].split("=") |
| 51 | + return bearer[1].replace('"', '') |
| 52 | + return None |
| 53 | + |
| 54 | + @staticmethod |
| 55 | + def get_formatted_principal(principal_name, host_name, realm): |
| 56 | + if host_name: |
| 57 | + return "{0}/{1}@{2}".format(principal_name, host_name, realm) |
| 58 | + return "{0}@{1}".format(principal_name, realm) |
| 59 | + |
| 60 | + @staticmethod |
| 61 | + def get_security_token_service_url(realm): |
| 62 | + return "https://accounts.accesscontrol.windows.net/{0}/tokens/OAuth/2".format(realm) |
| 63 | + |
| 64 | + @staticmethod |
| 65 | + def create_access_token_request(client_id, client_secret, scope): |
| 66 | + data = { |
| 67 | + 'grant_type': 'client_credentials', |
| 68 | + 'client_id': client_id, |
| 69 | + 'client_secret': client_secret, |
| 70 | + 'scope': scope, |
| 71 | + 'resource': scope |
| 72 | + } |
| 73 | + return data |
| 74 | + |
| 75 | + def get_authorization_header(self): |
| 76 | + return 'Bearer {0}'.format(self.access_token["access_token"]) |
0 commit comments