2021-03-10 13:55:06 +00:00
from flask import _request_ctx_stack , current_app , g , request
from gds_metrics import Histogram
from notifications_python_client . authentication import (
decode_jwt_token ,
get_token_issuer ,
)
2019-12-11 16:04:38 +00:00
from notifications_python_client . errors import (
2021-03-10 13:55:06 +00:00
TokenAlgorithmError ,
TokenDecodeError ,
TokenError ,
TokenExpiredError ,
TokenIssuerError ,
2019-12-11 16:04:38 +00:00
)
2018-03-27 17:37:09 +01:00
from notifications_utils import request_helper
2017-09-13 17:23:23 +01:00
from sqlalchemy . exc import DataError
from sqlalchemy . orm . exc import NoResultFound
2016-06-29 14:15:32 +01:00
2020-06-26 14:10:12 +01:00
from app . serialised_models import SerialisedService
2016-01-15 16:22:03 +00:00
2020-01-24 17:32:41 +00:00
GENERAL_TOKEN_ERROR_MESSAGE = ' Invalid token: make sure your API token matches the example at https://docs.notifications.service.gov.uk/rest-api.html#authorisation-header ' # noqa
2020-06-15 16:19:00 +01:00
AUTH_DB_CONNECTION_DURATION_SECONDS = Histogram (
' auth_db_connection_duration_seconds ' ,
' Time taken to get DB connection and fetch service from database ' ,
)
2020-01-24 17:32:41 +00:00
2016-06-29 17:37:20 +01:00
class AuthError ( Exception ) :
2017-12-12 18:13:31 +00:00
def __init__ ( self , message , code , service_id = None , api_key_id = None ) :
2016-06-29 17:37:20 +01:00
self . message = { " token " : [ message ] }
2016-11-01 10:33:34 +00:00
self . short_message = message
2016-06-29 17:37:20 +01:00
self . code = code
2017-12-12 18:13:31 +00:00
self . service_id = service_id
self . api_key_id = api_key_id
def __str__ ( self ) :
return ' AuthError( {message} , {code} , service_id= {service_id} , api_key_id= {api_key_id} ) ' . format ( * * self . __dict__ )
2015-12-15 10:47:20 +00:00
2016-11-01 10:33:34 +00:00
def to_dict_v2 ( self ) :
2016-11-02 14:58:39 +00:00
return {
' status_code ' : self . code ,
2016-11-09 14:56:54 +00:00
" errors " : [
{
" error " : " AuthError " ,
" message " : self . short_message
}
]
2016-11-02 14:58:39 +00:00
}
2016-11-01 10:33:34 +00:00
2015-12-15 10:47:20 +00:00
2016-06-29 17:37:20 +01:00
def get_auth_token ( req ) :
auth_header = req . headers . get ( ' Authorization ' , None )
2015-12-15 10:47:20 +00:00
if not auth_header :
2020-01-24 17:32:41 +00:00
raise AuthError ( ' Unauthorized: authentication token must be provided ' , 401 )
2015-12-15 10:47:20 +00:00
2016-11-07 10:45:18 +00:00
auth_scheme = auth_header [ : 7 ] . title ( )
2015-12-15 10:47:20 +00:00
if auth_scheme != ' Bearer ' :
2020-01-24 17:32:41 +00:00
raise AuthError ( ' Unauthorized: authentication bearer scheme must be used ' , 401 )
2016-06-29 17:37:20 +01:00
return auth_header [ 7 : ]
2015-12-15 10:47:20 +00:00
2017-03-16 18:15:49 +00:00
def requires_no_auth ( ) :
pass
2017-03-15 16:52:44 +00:00
def requires_admin_auth ( ) :
2018-03-27 17:37:09 +01:00
request_helper . check_proxy_header_before_request ( )
2017-03-15 16:52:44 +00:00
auth_token = get_auth_token ( request )
2017-03-16 18:15:49 +00:00
client = __get_token_issuer ( auth_token )
2017-03-15 16:52:44 +00:00
if client == current_app . config . get ( ' ADMIN_CLIENT_USER_NAME ' ) :
g . service_id = current_app . config . get ( ' ADMIN_CLIENT_USER_NAME ' )
2020-02-19 16:42:40 +00:00
2020-02-20 15:16:37 +00:00
for secret in current_app . config . get ( ' API_INTERNAL_SECRETS ' ) :
try :
decode_jwt_token ( auth_token , secret )
return
except TokenExpiredError :
raise AuthError ( " Invalid token: expired, check that your system clock is accurate " , 403 )
except TokenDecodeError :
# TODO: Change this so it doesn't also catch `TokenIssuerError` or `TokenIssuedAtError` exceptions
# (which are children of `TokenDecodeError`) as these should cause an auth error immediately rather
# than continue on to check the next admin client secret
continue
2020-02-19 17:50:00 +00:00
# Either there are no admin client secrets or their token didn't match one of them so error
raise AuthError ( " Unauthorized: admin authentication token not found " , 401 )
2017-03-15 16:52:44 +00:00
else :
2020-01-24 17:32:41 +00:00
raise AuthError ( ' Unauthorized: admin authentication token required ' , 401 )
2017-03-15 16:52:44 +00:00
2016-06-29 17:37:20 +01:00
def requires_auth ( ) :
2018-03-27 17:37:09 +01:00
request_helper . check_proxy_header_before_request ( )
2016-06-29 17:37:20 +01:00
auth_token = get_auth_token ( request )
2020-01-24 17:32:41 +00:00
issuer = __get_token_issuer ( auth_token ) # ie the `iss` claim which should be a service ID
2016-06-29 17:37:20 +01:00
2016-09-23 11:07:49 +01:00
try :
2020-06-15 16:19:00 +01:00
with AUTH_DB_CONNECTION_DURATION_SECONDS . time ( ) :
2020-06-26 14:10:12 +01:00
service = SerialisedService . from_id ( issuer )
2016-09-23 11:07:49 +01:00
except DataError :
raise AuthError ( " Invalid token: service id is not the right data type " , 403 )
2016-11-10 11:07:12 +00:00
except NoResultFound :
raise AuthError ( " Invalid token: service not found " , 403 )
if not service . api_keys :
2017-12-12 18:13:31 +00:00
raise AuthError ( " Invalid token: service has no API keys " , 403 , service_id = service . id )
2016-11-10 11:07:12 +00:00
if not service . active :
2017-12-12 18:13:31 +00:00
raise AuthError ( " Invalid token: service is archived " , 403 , service_id = service . id )
2016-11-10 11:07:12 +00:00
for api_key in service . api_keys :
2016-06-29 17:37:20 +01:00
try :
2017-12-12 18:13:31 +00:00
decode_jwt_token ( auth_token , api_key . secret )
except TokenExpiredError :
2019-12-11 16:04:38 +00:00
err_msg = " Error: Your system clock must be accurate to within 30 seconds "
raise AuthError ( err_msg , 403 , service_id = service . id , api_key_id = api_key . id )
except TokenAlgorithmError :
err_msg = " Invalid token: algorithm used is not HS256 "
2017-12-12 18:13:31 +00:00
raise AuthError ( err_msg , 403 , service_id = service . id , api_key_id = api_key . id )
2019-12-11 16:04:38 +00:00
except TokenDecodeError :
2020-01-24 17:32:41 +00:00
# we attempted to validate the token but it failed meaning it was not signed using this api key.
# Let's try the next one
# TODO: Change this so it doesn't also catch `TokenIssuerError` or `TokenIssuedAtError` exceptions (which
# are children of `TokenDecodeError`) as these should cause an auth error immediately rather than
# continue on to check the next API key
2019-12-11 16:04:38 +00:00
continue
2020-01-24 17:29:43 +00:00
except TokenError :
2020-01-24 17:32:41 +00:00
# General error when trying to decode and validate the token
raise AuthError ( GENERAL_TOKEN_ERROR_MESSAGE , 403 , service_id = service . id , api_key_id = api_key . id )
2016-06-29 17:37:20 +01:00
if api_key . expiry_date :
2017-12-12 18:13:31 +00:00
raise AuthError ( " Invalid token: API key revoked " , 403 , service_id = service . id , api_key_id = api_key . id )
2016-06-29 17:37:20 +01:00
2020-06-26 14:10:12 +01:00
g . service_id = service . id
2017-05-05 15:19:57 +01:00
_request_ctx_stack . top . authenticated_service = service
2016-06-29 17:37:20 +01:00
_request_ctx_stack . top . api_user = api_key
2020-03-04 17:04:11 +00:00
current_app . logger . info ( ' API authorised for service {} with api key {} , using issuer {} for URL: {} ' . format (
2017-12-14 17:12:26 +00:00
service . id ,
api_key . id ,
2020-03-04 17:04:11 +00:00
request . headers . get ( ' User-Agent ' ) ,
request . base_url
2017-12-14 17:12:26 +00:00
) )
2016-06-29 17:37:20 +01:00
return
else :
2016-11-10 11:07:12 +00:00
# service has API keys, but none matching the one the user provided
2020-01-24 17:32:41 +00:00
raise AuthError ( " Invalid token: API key not found " , 403 , service_id = service . id )
2016-06-29 17:37:20 +01:00
2017-03-16 18:15:49 +00:00
def __get_token_issuer ( auth_token ) :
try :
2020-01-24 17:32:41 +00:00
issuer = get_token_issuer ( auth_token )
2017-03-16 18:15:49 +00:00
except TokenIssuerError :
raise AuthError ( " Invalid token: iss field not provided " , 403 )
2018-11-07 13:39:08 +00:00
except TokenDecodeError :
2020-01-24 17:32:41 +00:00
raise AuthError ( GENERAL_TOKEN_ERROR_MESSAGE , 403 )
return issuer