2024-02-09 23:04:20 +11:00
|
|
|
import time
|
2024-06-19 14:07:05 +10:00
|
|
|
import datetime as dt
|
2024-02-09 23:04:20 +11:00
|
|
|
from .varo_auth import flask_login as varo_auth_flask_login
|
2024-06-15 13:29:25 +10:00
|
|
|
from flask import Blueprint, request, session, url_for, make_response
|
2024-02-09 23:04:20 +11:00
|
|
|
from flask import render_template, redirect, jsonify, send_from_directory
|
|
|
|
from werkzeug.security import gen_salt
|
|
|
|
from authlib.integrations.flask_oauth2 import current_token
|
|
|
|
from authlib.oauth2 import OAuth2Error
|
2024-06-19 14:07:05 +10:00
|
|
|
from .models import db, User, OAuth2Client, AuthTokens
|
2024-02-09 23:04:20 +11:00
|
|
|
from .oauth2 import authorization, require_oauth
|
2024-06-13 16:53:25 +10:00
|
|
|
import os
|
|
|
|
import requests
|
|
|
|
import dns.message
|
|
|
|
import dns.query
|
|
|
|
import dns.rdatatype
|
|
|
|
from requests_doh import DNSOverHTTPSSession, add_dns_provider
|
2024-06-14 15:32:04 +10:00
|
|
|
from datetime import timedelta
|
|
|
|
from eth_account.messages import encode_defunct
|
|
|
|
from eth_account import Account
|
2024-06-17 17:46:03 +10:00
|
|
|
import json
|
2024-06-14 15:32:04 +10:00
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
bp = Blueprint("home", __name__)
|
2024-06-14 15:32:04 +10:00
|
|
|
openSeaAPIKey = os.getenv("OPENSEA_API_KEY")
|
|
|
|
|
2024-06-15 15:47:22 +10:00
|
|
|
restricted_keys = [
|
|
|
|
"id",
|
|
|
|
"uid",
|
|
|
|
"username",
|
|
|
|
"sub",
|
|
|
|
"email_verified",
|
|
|
|
"roles",
|
|
|
|
"role",
|
2024-06-20 20:39:02 +10:00
|
|
|
"admin",
|
|
|
|
"hemail"
|
2024-06-15 15:47:22 +10:00
|
|
|
]
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:53:25 +10:00
|
|
|
if not os.path.exists("website/avatars"):
|
|
|
|
os.makedirs("website/avatars")
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
def current_user():
|
2024-06-13 16:07:38 +10:00
|
|
|
if "id" in session:
|
|
|
|
uid = session["id"]
|
2024-02-09 23:04:20 +11:00
|
|
|
return User.query.get(uid)
|
|
|
|
return None
|
|
|
|
|
2024-06-20 20:48:04 +10:00
|
|
|
def urlParse(url):
|
|
|
|
if url.startswith("https://"):
|
|
|
|
return url
|
|
|
|
if 'localhost' in url or '127.0.0.1' in url:
|
|
|
|
return url
|
|
|
|
return url.replace('http://','https://')
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
def split_by_crlf(s):
|
|
|
|
return [v for v in s.splitlines() if v]
|
|
|
|
|
2024-06-15 15:47:22 +10:00
|
|
|
def get_idns_records(domain:str) -> list:
|
|
|
|
query = dns.message.make_query(domain, dns.rdatatype.TXT)
|
|
|
|
dns_request = query.to_wire()
|
|
|
|
# Send the DNS query over HTTPS
|
|
|
|
response = requests.post('https://hnsdoh.com/dns-query', data=dns_request, headers={'Content-Type': 'application/dns-message'})
|
|
|
|
# Parse the DNS response
|
|
|
|
dns_response = dns.message.from_wire(response.content)
|
|
|
|
# Loop over TXT records and look for profile
|
|
|
|
idns_records = []
|
|
|
|
for record in dns_response.answer:
|
|
|
|
if record.rdtype == dns.rdatatype.TXT:
|
|
|
|
for txt in record:
|
|
|
|
txt_value:str = txt.to_text().strip('"')
|
|
|
|
if txt_value.startswith("IDNS1"):
|
|
|
|
print(txt_value)
|
|
|
|
idns = txt_value.removeprefix("IDNS1 ")
|
|
|
|
idns = idns.split(" ")
|
|
|
|
for r in idns:
|
|
|
|
idns_records.append(r)
|
|
|
|
return idns_records
|
|
|
|
|
|
|
|
def get_user_info(user:User) -> dict:
|
|
|
|
picture = f"https://login.hns.au/u/{user.username}/avatar.png"
|
|
|
|
|
|
|
|
if user.profile_picture:
|
|
|
|
picture = user.profile_picture
|
|
|
|
|
|
|
|
userInfo = {
|
|
|
|
"id": user.id,
|
|
|
|
"uid": user.id,
|
|
|
|
"username": user.username,
|
|
|
|
"email": f"{user.username}@login.hns.au",
|
2024-06-20 20:39:02 +10:00
|
|
|
"hemail": f"{user.username}@login.hns.au",
|
2024-06-15 15:47:22 +10:00
|
|
|
"displayName": user.username + "/",
|
|
|
|
"sub": user.id,
|
|
|
|
"name": user.username,
|
|
|
|
"given_name": user.username,
|
|
|
|
"family_name": user.username,
|
|
|
|
"nickname": user.username,
|
|
|
|
"preferred_username": user.username,
|
|
|
|
"profile": f"https://login.hns.au/u/{user.username}",
|
|
|
|
"picture": picture,
|
|
|
|
"website": f"https://{user.username}",
|
|
|
|
"email_verified": True
|
|
|
|
}
|
|
|
|
|
|
|
|
idns_info = get_idns_records(user.username)
|
|
|
|
for record in idns_info:
|
|
|
|
type = record.split(":")[0]
|
|
|
|
content = record.split(":")
|
|
|
|
if len(content) > 2:
|
|
|
|
content = ":".join(content[1:])
|
|
|
|
else:
|
|
|
|
content = content[1]
|
|
|
|
key = content.split("=")[0].lower()
|
|
|
|
value = content.split("=")[1]
|
|
|
|
if type == "profile":
|
|
|
|
if key == "avatar":
|
|
|
|
userInfo["picture"] = value
|
|
|
|
elif key == "email":
|
|
|
|
userInfo["email"] = value
|
|
|
|
userInfo["email_verified"] = False
|
|
|
|
elif key == "name":
|
|
|
|
userInfo["name"] = value
|
|
|
|
userInfo["nickname"] = value
|
|
|
|
userInfo["displayName"] = value
|
|
|
|
else:
|
|
|
|
if key in restricted_keys:
|
|
|
|
continue
|
|
|
|
userInfo[key] = value
|
|
|
|
|
|
|
|
return userInfo
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/", methods=("GET", "POST"))
|
2024-02-09 23:04:20 +11:00
|
|
|
def home():
|
2024-06-13 16:07:38 +10:00
|
|
|
next_page = request.args.get("next")
|
2024-06-15 13:29:25 +10:00
|
|
|
|
|
|
|
# Check if session exists
|
|
|
|
if "uuid" not in session:
|
|
|
|
session["uuid"] = gen_salt(24)
|
|
|
|
session.permanent = True
|
|
|
|
|
|
|
|
uuid = session["uuid"]
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
if request.method == "POST":
|
2024-02-09 23:04:20 +11:00
|
|
|
auth = varo_auth_flask_login(request)
|
|
|
|
if auth == False:
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/?error=login_failed")
|
2024-02-09 23:04:20 +11:00
|
|
|
print(auth)
|
|
|
|
user = User.query.filter_by(username=auth).first()
|
|
|
|
if not user:
|
|
|
|
user = User(username=auth)
|
|
|
|
db.session.add(user)
|
|
|
|
db.session.commit()
|
2024-06-13 16:07:38 +10:00
|
|
|
session["id"] = user.id
|
2024-06-14 15:32:04 +10:00
|
|
|
# Make sure the session is permanent
|
|
|
|
session.permanent = True
|
2024-02-09 23:04:20 +11:00
|
|
|
# if user is not just to log in, but need to head back to the auth page, then go for it
|
|
|
|
if next_page:
|
|
|
|
return redirect(next_page)
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/")
|
2024-02-09 23:04:20 +11:00
|
|
|
user = current_user()
|
2024-06-14 16:39:58 +10:00
|
|
|
users = []
|
2024-02-09 23:04:20 +11:00
|
|
|
if user:
|
|
|
|
clients = OAuth2Client.query.filter_by(user_id=user.id).all()
|
2024-06-14 16:19:08 +10:00
|
|
|
|
|
|
|
if user.id == 1:
|
|
|
|
clients = OAuth2Client.query.all()
|
2024-06-14 16:39:58 +10:00
|
|
|
users = User.query.all()
|
|
|
|
users = [{"id": user.id, "username": user.username} for user in users]
|
2024-06-14 16:19:08 +10:00
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
if next_page:
|
|
|
|
return redirect(next_page)
|
|
|
|
else:
|
|
|
|
clients = []
|
|
|
|
|
2024-06-14 15:32:04 +10:00
|
|
|
# Check if the user has signed in with HNS ID
|
|
|
|
hnsid=''
|
|
|
|
address=''
|
|
|
|
if "address" in session:
|
|
|
|
address = session["address"]
|
2024-06-14 15:43:06 +10:00
|
|
|
openseaInfo = requests.get(f"https://api.opensea.io/api/v2/chain/optimism/account/{address}/nfts?collection=handshake-slds",
|
2024-06-14 15:32:04 +10:00
|
|
|
headers={"Accept": "application/json",
|
|
|
|
"x-api-key":openSeaAPIKey})
|
|
|
|
if openseaInfo.status_code == 200:
|
|
|
|
hnsid = openseaInfo.json()
|
|
|
|
|
2024-06-15 13:29:25 +10:00
|
|
|
domains = []
|
|
|
|
if 'domains' in session:
|
|
|
|
domains = session['domains']
|
|
|
|
|
2024-06-14 15:32:04 +10:00
|
|
|
|
|
|
|
|
2024-06-15 13:29:25 +10:00
|
|
|
return render_template("home.html", user=user, clients=clients,
|
|
|
|
address=address, hnsid=hnsid, users=users,
|
|
|
|
uuid=uuid, next=next_page, domains=domains)
|
2024-06-14 15:32:04 +10:00
|
|
|
|
|
|
|
@bp.route("/hnsid", methods=["POST"])
|
|
|
|
def hnsid():
|
|
|
|
# Get address and signature from the request
|
|
|
|
address = request.json.get("address")
|
|
|
|
signature = request.json.get("signature")
|
|
|
|
message = request.json.get("message")
|
|
|
|
# Verify the signature
|
|
|
|
msg = encode_defunct(text=message)
|
|
|
|
signer = Account.recover_message(msg, signature=signature).lower()
|
|
|
|
if signer != address:
|
|
|
|
print("Signature verification failed")
|
|
|
|
print(signer, address)
|
|
|
|
return jsonify({"success": False})
|
|
|
|
|
|
|
|
# Save the address in the session
|
|
|
|
session["address"] = address
|
|
|
|
session.permanent = True
|
|
|
|
|
|
|
|
return jsonify({"success": True})
|
|
|
|
|
|
|
|
@bp.route("/hnsid/<domain>")
|
|
|
|
def hnsid_domain(domain):
|
|
|
|
# Get the address from the session
|
|
|
|
address = session.get("address")
|
|
|
|
if not address:
|
|
|
|
return jsonify({"error": "No address found in session"})
|
|
|
|
|
|
|
|
# Get domain info from Opensea
|
|
|
|
openseaInfo = requests.get(f"https://api.opensea.io/api/v2/chain/optimism/account/{address}/nfts?collection=handshake-slds",
|
|
|
|
headers={"Accept": "application/json",
|
|
|
|
"x-api-key":openSeaAPIKey})
|
|
|
|
if openseaInfo.status_code != 200:
|
|
|
|
return jsonify({"error": "Failed to get domain info from Opensea"})
|
|
|
|
hnsid = openseaInfo.json()
|
|
|
|
for nft in hnsid["nfts"]:
|
|
|
|
if nft["name"] == domain:
|
|
|
|
# Add domain to the session
|
|
|
|
user = User.query.filter_by(username=domain).first()
|
|
|
|
if not user:
|
2024-06-14 16:10:18 +10:00
|
|
|
# Create user with username and profile picture
|
|
|
|
user = User(username=domain, profile_picture=nft["image_url"])
|
2024-06-14 15:32:04 +10:00
|
|
|
db.session.add(user)
|
|
|
|
db.session.commit()
|
|
|
|
session["id"] = user.id
|
|
|
|
session.permanent = True
|
2024-06-14 15:51:28 +10:00
|
|
|
|
|
|
|
# Check if next page is specified
|
|
|
|
next_page = request.args.get("next")
|
|
|
|
if next_page:
|
|
|
|
return redirect(next_page)
|
|
|
|
|
2024-06-14 15:32:04 +10:00
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
return jsonify({"success": False, "error": "Domain not found"})
|
2024-06-13 16:07:38 +10:00
|
|
|
|
2024-06-15 13:29:25 +10:00
|
|
|
|
|
|
|
@bp.route("/txt", methods=["POST"])
|
|
|
|
def txtLogin():
|
|
|
|
# Get domain from form
|
|
|
|
domain = request.form.get("domain")
|
|
|
|
# Get uuid
|
|
|
|
uuid = session["uuid"]
|
|
|
|
|
|
|
|
query = dns.message.make_query(domain, dns.rdatatype.TXT)
|
|
|
|
dns_request = query.to_wire()
|
|
|
|
|
|
|
|
# Send the DNS query over HTTPS
|
|
|
|
response = requests.post('https://hnsdoh.com/dns-query', data=dns_request, headers={'Content-Type': 'application/dns-message'})
|
|
|
|
|
|
|
|
# Parse the DNS response
|
|
|
|
dns_response = dns.message.from_wire(response.content)
|
|
|
|
|
|
|
|
# Loop over TXT records and look for profile avatar
|
|
|
|
idns_records = []
|
|
|
|
for record in dns_response.answer:
|
|
|
|
if record.rdtype == dns.rdatatype.TXT:
|
|
|
|
for txt in record:
|
|
|
|
txt_value:str = txt.to_text().strip('"')
|
|
|
|
if txt_value.startswith("IDNS1"):
|
|
|
|
print(txt_value)
|
|
|
|
idns = txt_value.removeprefix("IDNS1 ")
|
|
|
|
idns = idns.split(" ")
|
|
|
|
for r in idns:
|
|
|
|
idns_records.append(r)
|
|
|
|
|
|
|
|
for record in idns_records:
|
|
|
|
print(record)
|
|
|
|
type = record.split(":")[0]
|
|
|
|
content = record.split(":")[1]
|
|
|
|
key = content.split("=")[0]
|
|
|
|
value = content.split("=")[1]
|
|
|
|
print(f"Type: {type}, Key: {key}, Value: {value}")
|
|
|
|
if type == "auth" and key == "login.hns.au":
|
|
|
|
if value == uuid:
|
|
|
|
# Add domain to user
|
|
|
|
user = User.query.filter_by(username=domain).first()
|
|
|
|
if not user:
|
|
|
|
# Create user with username and profile picture
|
|
|
|
user = User(username=domain)
|
|
|
|
db.session.add(user)
|
|
|
|
db.session.commit()
|
|
|
|
session["id"] = user.id
|
|
|
|
session.permanent = True
|
|
|
|
if "domains" not in session:
|
|
|
|
session["domains"] = []
|
|
|
|
|
|
|
|
if domain not in session["domains"]:
|
|
|
|
session["domains"].append(domain)
|
|
|
|
print("User logged in with TXT")
|
|
|
|
|
|
|
|
# Check if next page is specified
|
|
|
|
next_page = request.args.get("next")
|
|
|
|
print(next_page)
|
|
|
|
if next_page and next_page != "None":
|
|
|
|
return redirect(next_page)
|
2024-06-15 13:43:50 +10:00
|
|
|
return redirect("/")
|
2024-06-15 13:29:25 +10:00
|
|
|
|
2024-06-15 13:40:46 +10:00
|
|
|
return render_template("error.html",error="The domain wasn't able to be authenticated.",
|
|
|
|
message="<br>Double check the TXT record and try again",
|
|
|
|
custom="<button onclick='window.location.reload();'>Try again</button>"), 200
|
2024-06-15 13:29:25 +10:00
|
|
|
|
|
|
|
@bp.route("/txt/<domain>")
|
|
|
|
def txtLoginDomain(domain):
|
|
|
|
# Get uuid
|
|
|
|
uuid = session["uuid"]
|
|
|
|
|
2024-06-15 15:47:22 +10:00
|
|
|
idns_records = get_idns_records(domain)
|
|
|
|
|
2024-06-15 13:29:25 +10:00
|
|
|
|
|
|
|
for record in idns_records:
|
|
|
|
print(record)
|
|
|
|
type = record.split(":")[0]
|
|
|
|
content = record.split(":")[1]
|
|
|
|
key = content.split("=")[0]
|
|
|
|
value = content.split("=")[1]
|
|
|
|
print(f"Type: {type}, Key: {key}, Value: {value}")
|
|
|
|
if type == "auth" and key == "login.hns.au":
|
|
|
|
if value == uuid:
|
|
|
|
# Add domain to user
|
|
|
|
user = User.query.filter_by(username=domain).first()
|
|
|
|
if not user:
|
|
|
|
# Create user with username and profile picture
|
|
|
|
user = User(username=domain)
|
|
|
|
db.session.add(user)
|
|
|
|
db.session.commit()
|
|
|
|
session["id"] = user.id
|
|
|
|
session.permanent = True
|
|
|
|
if "domains" not in session:
|
|
|
|
session["domains"] = []
|
|
|
|
|
|
|
|
if domain not in session["domains"]:
|
|
|
|
session["domains"].append(domain)
|
|
|
|
print("User logged in with TXT")
|
|
|
|
|
|
|
|
# Check if next page is specified
|
|
|
|
next_page = request.args.get("next")
|
|
|
|
print(next_page)
|
|
|
|
if next_page and next_page != "None":
|
|
|
|
return redirect(next_page)
|
2024-06-15 13:43:50 +10:00
|
|
|
return redirect("/")
|
2024-06-15 13:29:25 +10:00
|
|
|
|
2024-06-15 13:40:46 +10:00
|
|
|
return render_template("error.html",error="The domain wasn't able to be authenticated.",
|
|
|
|
message="<br>Double check the TXT record and try again",
|
|
|
|
custom="<button onclick='window.location.reload();'>Try again</button>"), 200
|
2024-06-15 13:29:25 +10:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/logout")
|
2024-02-09 23:04:20 +11:00
|
|
|
def logout():
|
2024-06-13 16:07:38 +10:00
|
|
|
del session["id"]
|
|
|
|
next = request.args.get("next")
|
2024-02-09 23:04:20 +11:00
|
|
|
if next:
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect(url_for("home.home", next=next))
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/")
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/create_client", methods=("GET", "POST"))
|
2024-02-09 23:04:20 +11:00
|
|
|
def create_client():
|
|
|
|
user = current_user()
|
|
|
|
if not user:
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/")
|
|
|
|
if request.method == "GET":
|
|
|
|
return render_template("create_client.html")
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
client_id = gen_salt(24)
|
|
|
|
client_id_issued_at = int(time.time())
|
|
|
|
client = OAuth2Client(
|
|
|
|
client_id=client_id,
|
|
|
|
client_id_issued_at=client_id_issued_at,
|
|
|
|
user_id=user.id,
|
|
|
|
)
|
|
|
|
|
|
|
|
form = request.form
|
|
|
|
client_metadata = {
|
|
|
|
"client_name": form["client_name"],
|
|
|
|
"client_uri": form["client_uri"],
|
|
|
|
"grant_types": split_by_crlf(form["grant_type"]),
|
|
|
|
"redirect_uris": split_by_crlf(form["redirect_uri"]),
|
|
|
|
"response_types": split_by_crlf(form["response_type"]),
|
2024-06-17 17:46:03 +10:00
|
|
|
"scope": " ".join(form.getlist("scope")),
|
2024-06-13 16:07:38 +10:00
|
|
|
"token_endpoint_auth_method": form["token_endpoint_auth_method"],
|
2024-02-09 23:04:20 +11:00
|
|
|
}
|
|
|
|
client.set_client_metadata(client_metadata)
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
if form["token_endpoint_auth_method"] == "none":
|
|
|
|
client.client_secret = ""
|
2024-02-09 23:04:20 +11:00
|
|
|
else:
|
|
|
|
client.client_secret = gen_salt(48)
|
|
|
|
|
|
|
|
db.session.add(client)
|
|
|
|
db.session.commit()
|
2024-06-17 17:46:03 +10:00
|
|
|
return redirect("/client/" + client_id)
|
|
|
|
|
|
|
|
@bp.route("/client/<client_id>")
|
|
|
|
def client(client_id):
|
|
|
|
user = current_user()
|
|
|
|
if not user:
|
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
client:OAuth2Client = OAuth2Client.query.filter_by(client_id=client_id).first()
|
|
|
|
if not client:
|
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
if client.user_id != user.id and user.id != 1:
|
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
metadata = client.client_metadata
|
|
|
|
# Convert metadata to json
|
|
|
|
metadata = json.dumps(metadata, indent=4)
|
|
|
|
|
|
|
|
return render_template("client.html", client=metadata,id=client_id,
|
|
|
|
secret=client.client_secret)
|
2024-06-13 16:07:38 +10:00
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/delete_client")
|
2024-02-13 22:46:46 +11:00
|
|
|
def delete_client():
|
|
|
|
user = current_user()
|
|
|
|
if not user:
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/")
|
2024-02-13 22:46:46 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
client_id = request.args.get("client_id")
|
2024-06-17 17:46:03 +10:00
|
|
|
client:OAuth2Client = OAuth2Client.query.filter_by(client_id=client_id).first()
|
|
|
|
|
|
|
|
if not client:
|
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
if client.user_id != user.id and user.id != 1:
|
|
|
|
return redirect("/")
|
|
|
|
|
|
|
|
db.session.delete(client)
|
|
|
|
db.session.commit()
|
2024-06-13 16:07:38 +10:00
|
|
|
return redirect("/")
|
2024-02-13 22:46:46 +11:00
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/oauth/authorize", methods=["GET", "POST"])
|
2024-02-09 23:04:20 +11:00
|
|
|
def authorize():
|
|
|
|
user = current_user()
|
|
|
|
# if user log status is not true (Auth server), then to log it in
|
|
|
|
if not user:
|
2024-06-20 20:48:04 +10:00
|
|
|
return redirect(url_for("home.home", next=urlParse(request.url))) # Force HTTPS
|
2024-06-13 16:07:38 +10:00
|
|
|
if request.method == "GET":
|
2024-02-09 23:04:20 +11:00
|
|
|
try:
|
|
|
|
grant = authorization.get_consent_grant(end_user=user)
|
|
|
|
except OAuth2Error as error:
|
2024-06-20 12:36:47 +10:00
|
|
|
print(json.dumps({
|
|
|
|
"error": error.error,
|
|
|
|
"description": error.description,
|
|
|
|
"uri": error.uri,
|
|
|
|
}, indent=4),flush=True)
|
2024-06-20 12:28:50 +10:00
|
|
|
return jsonify({
|
|
|
|
"error": error.error,
|
|
|
|
"description": error.description,
|
|
|
|
"uri": error.uri,
|
|
|
|
})
|
2024-06-13 16:07:38 +10:00
|
|
|
return render_template("authorize.html", user=user, grant=grant)
|
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
grant_user = user
|
2024-06-13 16:07:38 +10:00
|
|
|
|
2024-02-09 23:04:20 +11:00
|
|
|
return authorization.create_authorization_response(grant_user=grant_user)
|
|
|
|
|
2024-06-19 14:07:05 +10:00
|
|
|
@bp.route("/auth", methods=["GET", "POST"])
|
|
|
|
def plainAuth():
|
|
|
|
user:User = current_user()
|
|
|
|
if not user:
|
2024-06-20 20:48:04 +10:00
|
|
|
return redirect(url_for("home.home", next=urlParse(request.url)))
|
2024-06-19 14:07:05 +10:00
|
|
|
|
|
|
|
# Check for return URL
|
|
|
|
return_url = request.args.get("return")
|
|
|
|
if not return_url:
|
|
|
|
return render_template("error.html",error="No return URL specified")
|
|
|
|
|
|
|
|
# Get host from return URL
|
|
|
|
host = return_url.split("/")[2]
|
|
|
|
|
|
|
|
|
|
|
|
if request.method == "GET":
|
|
|
|
# Custom grant
|
|
|
|
grant = {
|
|
|
|
"client":{
|
|
|
|
"client_name": host,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return render_template("authorize.html", user=user, grant=grant)
|
|
|
|
|
|
|
|
# Create a hex token for the user
|
|
|
|
token = gen_salt(24)
|
|
|
|
|
|
|
|
expiry = dt.datetime.now() + timedelta(days=7)
|
|
|
|
# Save the token in the database
|
|
|
|
auth_token = AuthTokens(service=host, user_name=user.username, access_token=token, refresh_token="", expires_at=expiry)
|
|
|
|
db.session.add(auth_token)
|
|
|
|
db.session.commit()
|
|
|
|
|
|
|
|
# Remove any stale tokens
|
|
|
|
AuthTokens.query.filter(AuthTokens.expires_at < time.time()).delete()
|
|
|
|
|
|
|
|
|
|
|
|
return redirect(return_url+"?username="+user.username+"&token="+token)
|
|
|
|
|
|
|
|
@bp.route("/auth/user")
|
|
|
|
def authUser():
|
|
|
|
if "token" not in request.args:
|
|
|
|
return jsonify({"error": "No token specified"})
|
|
|
|
|
|
|
|
token = request.args.get("token")
|
|
|
|
# Remove any stale tokens
|
|
|
|
AuthTokens.query.filter(AuthTokens.expires_at < time.time()).delete()
|
|
|
|
|
|
|
|
username = AuthTokens.query.filter_by(access_token=token).first()
|
|
|
|
if not username:
|
|
|
|
return jsonify({"error": "Invalid token"})
|
|
|
|
|
|
|
|
user = User.query.filter_by(username=username.user_name).first()
|
|
|
|
|
|
|
|
return jsonify(get_user_info(user))
|
2024-02-09 23:04:20 +11:00
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/oauth/token", methods=["POST"])
|
2024-02-09 23:04:20 +11:00
|
|
|
def issue_token():
|
2024-06-20 12:36:47 +10:00
|
|
|
try:
|
2024-06-20 12:42:33 +10:00
|
|
|
resp = authorization.create_token_response()
|
|
|
|
return resp
|
2024-06-20 12:36:47 +10:00
|
|
|
except OAuth2Error as error:
|
|
|
|
print(json.dumps({
|
|
|
|
"error": error.error,
|
|
|
|
"description": error.description,
|
|
|
|
"uri": error.uri,
|
|
|
|
}, indent=4),flush=True)
|
|
|
|
return jsonify({
|
|
|
|
"error": error.error,
|
|
|
|
"description": error.description,
|
|
|
|
"uri": error.uri,
|
|
|
|
})
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/oauth/revoke", methods=["POST"])
|
2024-02-09 23:04:20 +11:00
|
|
|
def revoke_token():
|
2024-06-13 16:07:38 +10:00
|
|
|
return authorization.create_endpoint_response("revocation")
|
2024-02-09 23:04:20 +11:00
|
|
|
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/discovery")
|
2024-02-20 22:32:24 +11:00
|
|
|
def autodiscovery():
|
|
|
|
host = request.host
|
|
|
|
discovery = {
|
2024-06-13 16:07:38 +10:00
|
|
|
"issuer": f"https://{host}/",
|
|
|
|
"authorization_endpoint": f"https://{host}/oauth/authorize",
|
|
|
|
"token_endpoint": f"https://{host}/oauth/token",
|
|
|
|
"userinfo_endpoint": f"https://{host}/api/me",
|
|
|
|
"revocation_endpoint": f"https://{host}/oauth/revoke",
|
|
|
|
"response_types_supported": ["code"],
|
|
|
|
"subject_types_supported": ["public"],
|
|
|
|
"id_token_signing_alg_values_supported": ["RS256"],
|
|
|
|
"scopes_supported": ["openid", "email", "profile"],
|
|
|
|
"token_endpoint_auth_methods_supported": [
|
|
|
|
"client_secret_basic",
|
|
|
|
"client_secret_post",
|
|
|
|
],
|
|
|
|
"grant_types_supported": ["authorization_code"],
|
|
|
|
}
|
2024-02-20 22:32:24 +11:00
|
|
|
|
|
|
|
return jsonify(discovery)
|
|
|
|
|
2024-06-15 15:47:22 +10:00
|
|
|
@bp.route("/api/me")
|
|
|
|
@require_oauth(["profile", "openid"])
|
|
|
|
def api_me():
|
|
|
|
user = current_token.user
|
|
|
|
return jsonify(get_user_info(user))
|
|
|
|
|
|
|
|
|
2024-06-13 16:53:25 +10:00
|
|
|
@bp.route("/u/<username>")
|
|
|
|
def profile(username):
|
|
|
|
user = User.query.filter_by(username=username).first()
|
2024-06-14 16:10:18 +10:00
|
|
|
if not user:
|
|
|
|
return jsonify({"error": "User not found"})
|
2024-06-15 15:47:22 +10:00
|
|
|
|
|
|
|
return jsonify(get_user_info(user))
|
2024-06-13 16:53:25 +10:00
|
|
|
|
|
|
|
@bp.route("/u/<username>/avatar.png")
|
|
|
|
def avatar(username):
|
2024-06-14 16:10:18 +10:00
|
|
|
user = User.query.filter_by(username=username).first()
|
|
|
|
if not user:
|
|
|
|
print("User not found")
|
|
|
|
return send_from_directory("templates", "favicon.png", mimetype="image/png")
|
|
|
|
|
2024-06-13 16:53:25 +10:00
|
|
|
# Check if file exists
|
|
|
|
if os.path.exists(f"website/avatars/{username}.png"):
|
|
|
|
return send_from_directory("avatars", f"{username}.png", mimetype="image/png")
|
|
|
|
# If not, download from HNS info
|
|
|
|
query = dns.message.make_query(username, dns.rdatatype.TXT)
|
|
|
|
dns_request = query.to_wire()
|
|
|
|
|
|
|
|
# Send the DNS query over HTTPS
|
|
|
|
response = requests.post('https://hnsdoh.com/dns-query', data=dns_request, headers={'Content-Type': 'application/dns-message'})
|
|
|
|
|
|
|
|
# Parse the DNS response
|
|
|
|
dns_response = dns.message.from_wire(response.content)
|
|
|
|
|
|
|
|
# Loop over TXT records and look for profile avatar
|
|
|
|
avatar_url=""
|
|
|
|
for record in dns_response.answer:
|
|
|
|
if record.rdtype == dns.rdatatype.TXT:
|
|
|
|
for txt in record:
|
|
|
|
txt_value = txt.to_text().strip('"')
|
|
|
|
if txt_value.startswith("profile avatar="):
|
|
|
|
avatar_url = txt_value.split("profile avatar=")[1]
|
|
|
|
break
|
|
|
|
|
|
|
|
if avatar_url != "":
|
|
|
|
# Download the avatar using DNS-over-HTTPS
|
|
|
|
add_dns_provider("hns", "https://hnsdoh.com/dns-query")
|
|
|
|
session = DNSOverHTTPSSession(provider="hns")
|
|
|
|
response = session.get(avatar_url)
|
|
|
|
with open(f"website/avatars/{username}.png", "wb") as f:
|
|
|
|
f.write(response.content)
|
|
|
|
return send_from_directory("avatars", f"{username}.png", mimetype="image/png")
|
|
|
|
|
|
|
|
return send_from_directory("templates", "favicon.png", mimetype="image/png")
|
|
|
|
|
2024-06-13 16:07:38 +10:00
|
|
|
@bp.route("/favicon.png")
|
2024-02-09 23:04:20 +11:00
|
|
|
def favicon():
|
2024-06-13 16:07:38 +10:00
|
|
|
return send_from_directory("templates", "favicon.png", mimetype="image/png")
|
2024-06-15 13:29:25 +10:00
|
|
|
|
|
|
|
|
|
|
|
@bp.errorhandler(404)
|
|
|
|
@bp.app_errorhandler(404)
|
|
|
|
def page_not_found(e):
|
2024-06-15 13:40:46 +10:00
|
|
|
return render_template("error.html",error="404 - Page Not Found"), 404
|