423 lines
16 KiB
Python
423 lines
16 KiB
Python
|
# Copyright 2018 Google Inc.
|
||
|
#
|
||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
# you may not use this file except in compliance with the License.
|
||
|
# You may obtain a copy of the License at
|
||
|
#
|
||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||
|
#
|
||
|
# Unless required by applicable law or agreed to in writing, software
|
||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
# See the License for the specific language governing permissions and
|
||
|
# limitations under the License.
|
||
|
|
||
|
"""Firebase auth utils."""
|
||
|
|
||
|
import json
|
||
|
import re
|
||
|
from urllib import parse
|
||
|
|
||
|
from firebase_admin import exceptions
|
||
|
from firebase_admin import _utils
|
||
|
|
||
|
|
||
|
MAX_CLAIMS_PAYLOAD_SIZE = 1000
|
||
|
RESERVED_CLAIMS = set([
|
||
|
'acr', 'amr', 'at_hash', 'aud', 'auth_time', 'azp', 'cnf', 'c_hash', 'exp', 'iat',
|
||
|
'iss', 'jti', 'nbf', 'nonce', 'sub', 'firebase',
|
||
|
])
|
||
|
VALID_EMAIL_ACTION_TYPES = set(['VERIFY_EMAIL', 'EMAIL_SIGNIN', 'PASSWORD_RESET'])
|
||
|
|
||
|
|
||
|
class PageIterator:
|
||
|
"""An iterator that allows iterating over a sequence of items, one at a time.
|
||
|
|
||
|
This implementation loads a page of items into memory, and iterates on them. When the whole
|
||
|
page has been traversed, it loads another page. This class never keeps more than one page
|
||
|
of entries in memory.
|
||
|
"""
|
||
|
|
||
|
def __init__(self, current_page):
|
||
|
if not current_page:
|
||
|
raise ValueError('Current page must not be None.')
|
||
|
self._current_page = current_page
|
||
|
self._index = 0
|
||
|
|
||
|
def next(self):
|
||
|
if self._index == len(self.items):
|
||
|
if self._current_page.has_next_page:
|
||
|
self._current_page = self._current_page.get_next_page()
|
||
|
self._index = 0
|
||
|
if self._index < len(self.items):
|
||
|
result = self.items[self._index]
|
||
|
self._index += 1
|
||
|
return result
|
||
|
raise StopIteration
|
||
|
|
||
|
@property
|
||
|
def items(self):
|
||
|
raise NotImplementedError
|
||
|
|
||
|
def __next__(self):
|
||
|
return self.next()
|
||
|
|
||
|
def __iter__(self):
|
||
|
return self
|
||
|
|
||
|
|
||
|
def validate_uid(uid, required=False):
|
||
|
if uid is None and not required:
|
||
|
return None
|
||
|
if not isinstance(uid, str) or not uid or len(uid) > 128:
|
||
|
raise ValueError(
|
||
|
'Invalid uid: "{0}". The uid must be a non-empty string with no more than 128 '
|
||
|
'characters.'.format(uid))
|
||
|
return uid
|
||
|
|
||
|
def validate_email(email, required=False):
|
||
|
if email is None and not required:
|
||
|
return None
|
||
|
if not isinstance(email, str) or not email:
|
||
|
raise ValueError(
|
||
|
'Invalid email: "{0}". Email must be a non-empty string.'.format(email))
|
||
|
parts = email.split('@')
|
||
|
if len(parts) != 2 or not parts[0] or not parts[1]:
|
||
|
raise ValueError('Malformed email address string: "{0}".'.format(email))
|
||
|
return email
|
||
|
|
||
|
def validate_phone(phone, required=False):
|
||
|
"""Validates the specified phone number.
|
||
|
|
||
|
Phone number vlidation is very lax here. Backend will enforce E.164 spec compliance, and
|
||
|
normalize accordingly. Here we check if the number starts with + sign, and contains at
|
||
|
least one alphanumeric character.
|
||
|
"""
|
||
|
if phone is None and not required:
|
||
|
return None
|
||
|
if not isinstance(phone, str) or not phone:
|
||
|
raise ValueError('Invalid phone number: "{0}". Phone number must be a non-empty '
|
||
|
'string.'.format(phone))
|
||
|
if not phone.startswith('+') or not re.search('[a-zA-Z0-9]', phone):
|
||
|
raise ValueError('Invalid phone number: "{0}". Phone number must be a valid, E.164 '
|
||
|
'compliant identifier.'.format(phone))
|
||
|
return phone
|
||
|
|
||
|
def validate_password(password, required=False):
|
||
|
if password is None and not required:
|
||
|
return None
|
||
|
if not isinstance(password, str) or len(password) < 6:
|
||
|
raise ValueError(
|
||
|
'Invalid password string. Password must be a string at least 6 characters long.')
|
||
|
return password
|
||
|
|
||
|
def validate_bytes(value, label, required=False):
|
||
|
if value is None and not required:
|
||
|
return None
|
||
|
if not isinstance(value, bytes) or not value:
|
||
|
raise ValueError('{0} must be a non-empty byte sequence.'.format(label))
|
||
|
return value
|
||
|
|
||
|
def validate_display_name(display_name, required=False):
|
||
|
if display_name is None and not required:
|
||
|
return None
|
||
|
if not isinstance(display_name, str) or not display_name:
|
||
|
raise ValueError(
|
||
|
'Invalid display name: "{0}". Display name must be a non-empty '
|
||
|
'string.'.format(display_name))
|
||
|
return display_name
|
||
|
|
||
|
def validate_provider_id(provider_id, required=True):
|
||
|
if provider_id is None and not required:
|
||
|
return None
|
||
|
if not isinstance(provider_id, str) or not provider_id:
|
||
|
raise ValueError(
|
||
|
'Invalid provider ID: "{0}". Provider ID must be a non-empty '
|
||
|
'string.'.format(provider_id))
|
||
|
return provider_id
|
||
|
|
||
|
def validate_provider_uid(provider_uid, required=True):
|
||
|
if provider_uid is None and not required:
|
||
|
return None
|
||
|
if not isinstance(provider_uid, str) or not provider_uid:
|
||
|
raise ValueError(
|
||
|
'Invalid provider UID: "{0}". Provider UID must be a non-empty '
|
||
|
'string.'.format(provider_uid))
|
||
|
return provider_uid
|
||
|
|
||
|
def validate_photo_url(photo_url, required=False):
|
||
|
"""Parses and validates the given URL string."""
|
||
|
if photo_url is None and not required:
|
||
|
return None
|
||
|
if not isinstance(photo_url, str) or not photo_url:
|
||
|
raise ValueError(
|
||
|
'Invalid photo URL: "{0}". Photo URL must be a non-empty '
|
||
|
'string.'.format(photo_url))
|
||
|
try:
|
||
|
parsed = parse.urlparse(photo_url)
|
||
|
if not parsed.netloc:
|
||
|
raise ValueError('Malformed photo URL: "{0}".'.format(photo_url))
|
||
|
return photo_url
|
||
|
except Exception:
|
||
|
raise ValueError('Malformed photo URL: "{0}".'.format(photo_url))
|
||
|
|
||
|
def validate_timestamp(timestamp, label, required=False):
|
||
|
"""Validates the given timestamp value. Timestamps must be positive integers."""
|
||
|
if timestamp is None and not required:
|
||
|
return None
|
||
|
if isinstance(timestamp, bool):
|
||
|
raise ValueError('Boolean value specified as timestamp.')
|
||
|
try:
|
||
|
timestamp_int = int(timestamp)
|
||
|
except TypeError:
|
||
|
raise ValueError('Invalid type for timestamp value: {0}.'.format(timestamp))
|
||
|
else:
|
||
|
if timestamp_int != timestamp:
|
||
|
raise ValueError('{0} must be a numeric value and a whole number.'.format(label))
|
||
|
if timestamp_int <= 0:
|
||
|
raise ValueError('{0} timestamp must be a positive interger.'.format(label))
|
||
|
return timestamp_int
|
||
|
|
||
|
def validate_int(value, label, low=None, high=None):
|
||
|
"""Validates that the given value represents an integer.
|
||
|
|
||
|
There are several ways to represent an integer in Python (e.g. 2, 2L, 2.0). This method allows
|
||
|
for all such representations except for booleans. Booleans also behave like integers, but
|
||
|
always translate to 1 and 0. Passing a boolean to an API that expects integers is most likely
|
||
|
a developer error.
|
||
|
"""
|
||
|
if value is None or isinstance(value, bool):
|
||
|
raise ValueError('Invalid type for integer value: {0}.'.format(value))
|
||
|
try:
|
||
|
val_int = int(value)
|
||
|
except TypeError:
|
||
|
raise ValueError('Invalid type for integer value: {0}.'.format(value))
|
||
|
else:
|
||
|
if val_int != value:
|
||
|
# This will be True for non-numeric values like '2' and non-whole numbers like 2.5.
|
||
|
raise ValueError('{0} must be a numeric value and a whole number.'.format(label))
|
||
|
if low is not None and val_int < low:
|
||
|
raise ValueError('{0} must not be smaller than {1}.'.format(label, low))
|
||
|
if high is not None and val_int > high:
|
||
|
raise ValueError('{0} must not be larger than {1}.'.format(label, high))
|
||
|
return val_int
|
||
|
|
||
|
def validate_string(value, label):
|
||
|
"""Validates that the given value is a string."""
|
||
|
if not isinstance(value, str):
|
||
|
raise ValueError('Invalid type for {0}: {1}.'.format(label, value))
|
||
|
return value
|
||
|
|
||
|
def validate_boolean(value, label):
|
||
|
"""Validates that the given value is a boolean."""
|
||
|
if not isinstance(value, bool):
|
||
|
raise ValueError('Invalid type for {0}: {1}.'.format(label, value))
|
||
|
return value
|
||
|
|
||
|
def validate_custom_claims(custom_claims, required=False):
|
||
|
"""Validates the specified custom claims.
|
||
|
|
||
|
Custom claims must be specified as a JSON string. The string must not exceed 1000
|
||
|
characters, and the parsed JSON payload must not contain reserved JWT claims.
|
||
|
"""
|
||
|
if custom_claims is None and not required:
|
||
|
return None
|
||
|
claims_str = str(custom_claims)
|
||
|
if len(claims_str) > MAX_CLAIMS_PAYLOAD_SIZE:
|
||
|
raise ValueError(
|
||
|
'Custom claims payload must not exceed {0} characters.'.format(
|
||
|
MAX_CLAIMS_PAYLOAD_SIZE))
|
||
|
try:
|
||
|
parsed = json.loads(claims_str)
|
||
|
except Exception:
|
||
|
raise ValueError('Failed to parse custom claims string as JSON.')
|
||
|
|
||
|
if not isinstance(parsed, dict):
|
||
|
raise ValueError('Custom claims must be parseable as a JSON object.')
|
||
|
invalid_claims = RESERVED_CLAIMS.intersection(set(parsed.keys()))
|
||
|
if len(invalid_claims) > 1:
|
||
|
joined = ', '.join(sorted(invalid_claims))
|
||
|
raise ValueError('Claims "{0}" are reserved, and must not be set.'.format(joined))
|
||
|
if len(invalid_claims) == 1:
|
||
|
raise ValueError(
|
||
|
'Claim "{0}" is reserved, and must not be set.'.format(invalid_claims.pop()))
|
||
|
return claims_str
|
||
|
|
||
|
def validate_action_type(action_type):
|
||
|
if action_type not in VALID_EMAIL_ACTION_TYPES:
|
||
|
raise ValueError('Invalid action type provided action_type: {0}. \
|
||
|
Valid values are {1}'.format(action_type, ', '.join(VALID_EMAIL_ACTION_TYPES)))
|
||
|
return action_type
|
||
|
|
||
|
def build_update_mask(params):
|
||
|
"""Creates an update mask list from the given dictionary."""
|
||
|
mask = []
|
||
|
for key, value in params.items():
|
||
|
if isinstance(value, dict):
|
||
|
child_mask = build_update_mask(value)
|
||
|
for child in child_mask:
|
||
|
mask.append('{0}.{1}'.format(key, child))
|
||
|
else:
|
||
|
mask.append(key)
|
||
|
|
||
|
return sorted(mask)
|
||
|
|
||
|
|
||
|
class UidAlreadyExistsError(exceptions.AlreadyExistsError):
|
||
|
"""The user with the provided uid already exists."""
|
||
|
|
||
|
default_message = 'The user with the provided uid already exists'
|
||
|
|
||
|
def __init__(self, message, cause, http_response):
|
||
|
exceptions.AlreadyExistsError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class EmailAlreadyExistsError(exceptions.AlreadyExistsError):
|
||
|
"""The user with the provided email already exists."""
|
||
|
|
||
|
default_message = 'The user with the provided email already exists'
|
||
|
|
||
|
def __init__(self, message, cause, http_response):
|
||
|
exceptions.AlreadyExistsError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class InsufficientPermissionError(exceptions.PermissionDeniedError):
|
||
|
"""The credential used to initialize the SDK lacks required permissions."""
|
||
|
|
||
|
default_message = ('The credential used to initialize the SDK has insufficient '
|
||
|
'permissions to perform the requested operation. See '
|
||
|
'https://firebase.google.com/docs/admin/setup for details '
|
||
|
'on how to initialize the Admin SDK with appropriate permissions')
|
||
|
|
||
|
def __init__(self, message, cause, http_response):
|
||
|
exceptions.PermissionDeniedError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class InvalidDynamicLinkDomainError(exceptions.InvalidArgumentError):
|
||
|
"""Dynamic link domain in ActionCodeSettings is not authorized."""
|
||
|
|
||
|
default_message = 'Dynamic link domain specified in ActionCodeSettings is not authorized'
|
||
|
|
||
|
def __init__(self, message, cause, http_response):
|
||
|
exceptions.InvalidArgumentError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class InvalidIdTokenError(exceptions.InvalidArgumentError):
|
||
|
"""The provided ID token is not a valid Firebase ID token."""
|
||
|
|
||
|
default_message = 'The provided ID token is invalid'
|
||
|
|
||
|
def __init__(self, message, cause=None, http_response=None):
|
||
|
exceptions.InvalidArgumentError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class PhoneNumberAlreadyExistsError(exceptions.AlreadyExistsError):
|
||
|
"""The user with the provided phone number already exists."""
|
||
|
|
||
|
default_message = 'The user with the provided phone number already exists'
|
||
|
|
||
|
def __init__(self, message, cause, http_response):
|
||
|
exceptions.AlreadyExistsError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class UnexpectedResponseError(exceptions.UnknownError):
|
||
|
"""Backend service responded with an unexpected or malformed response."""
|
||
|
|
||
|
def __init__(self, message, cause=None, http_response=None):
|
||
|
exceptions.UnknownError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class UserNotFoundError(exceptions.NotFoundError):
|
||
|
"""No user record found for the specified identifier."""
|
||
|
|
||
|
default_message = 'No user record found for the given identifier'
|
||
|
|
||
|
def __init__(self, message, cause=None, http_response=None):
|
||
|
exceptions.NotFoundError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class TenantNotFoundError(exceptions.NotFoundError):
|
||
|
"""No tenant found for the specified identifier."""
|
||
|
|
||
|
default_message = 'No tenant found for the given identifier'
|
||
|
|
||
|
def __init__(self, message, cause=None, http_response=None):
|
||
|
exceptions.NotFoundError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
class TenantIdMismatchError(exceptions.InvalidArgumentError):
|
||
|
"""Missing or invalid tenant ID field in the given JWT."""
|
||
|
|
||
|
def __init__(self, message):
|
||
|
exceptions.InvalidArgumentError.__init__(self, message)
|
||
|
|
||
|
|
||
|
class ConfigurationNotFoundError(exceptions.NotFoundError):
|
||
|
"""No auth provider found for the specified identifier."""
|
||
|
|
||
|
default_message = 'No auth provider found for the given identifier'
|
||
|
|
||
|
def __init__(self, message, cause=None, http_response=None):
|
||
|
exceptions.NotFoundError.__init__(self, message, cause, http_response)
|
||
|
|
||
|
|
||
|
_CODE_TO_EXC_TYPE = {
|
||
|
'CONFIGURATION_NOT_FOUND': ConfigurationNotFoundError,
|
||
|
'DUPLICATE_EMAIL': EmailAlreadyExistsError,
|
||
|
'DUPLICATE_LOCAL_ID': UidAlreadyExistsError,
|
||
|
'EMAIL_EXISTS': EmailAlreadyExistsError,
|
||
|
'INSUFFICIENT_PERMISSION': InsufficientPermissionError,
|
||
|
'INVALID_DYNAMIC_LINK_DOMAIN': InvalidDynamicLinkDomainError,
|
||
|
'INVALID_ID_TOKEN': InvalidIdTokenError,
|
||
|
'PHONE_NUMBER_EXISTS': PhoneNumberAlreadyExistsError,
|
||
|
'TENANT_NOT_FOUND': TenantNotFoundError,
|
||
|
'USER_NOT_FOUND': UserNotFoundError,
|
||
|
}
|
||
|
|
||
|
|
||
|
def handle_auth_backend_error(error):
|
||
|
"""Converts a requests error received from the Firebase Auth service into a FirebaseError."""
|
||
|
if error.response is None:
|
||
|
return _utils.handle_requests_error(error)
|
||
|
|
||
|
code, custom_message = _parse_error_body(error.response)
|
||
|
if not code:
|
||
|
msg = 'Unexpected error response: {0}'.format(error.response.content.decode())
|
||
|
return _utils.handle_requests_error(error, message=msg)
|
||
|
|
||
|
exc_type = _CODE_TO_EXC_TYPE.get(code)
|
||
|
msg = _build_error_message(code, exc_type, custom_message)
|
||
|
if not exc_type:
|
||
|
return _utils.handle_requests_error(error, message=msg)
|
||
|
|
||
|
return exc_type(msg, cause=error, http_response=error.response)
|
||
|
|
||
|
|
||
|
def _parse_error_body(response):
|
||
|
"""Parses the given error response to extract Auth error code and message."""
|
||
|
error_dict = {}
|
||
|
try:
|
||
|
parsed_body = response.json()
|
||
|
if isinstance(parsed_body, dict):
|
||
|
error_dict = parsed_body.get('error', {})
|
||
|
except ValueError:
|
||
|
pass
|
||
|
|
||
|
# Auth error response format: {"error": {"message": "AUTH_ERROR_CODE: Optional text"}}
|
||
|
code = error_dict.get('message') if isinstance(error_dict, dict) else None
|
||
|
custom_message = None
|
||
|
if code:
|
||
|
separator = code.find(':')
|
||
|
if separator != -1:
|
||
|
custom_message = code[separator + 1:].strip()
|
||
|
code = code[:separator]
|
||
|
|
||
|
return code, custom_message
|
||
|
|
||
|
|
||
|
def _build_error_message(code, exc_type, custom_message):
|
||
|
default_message = exc_type.default_message if (
|
||
|
exc_type and hasattr(exc_type, 'default_message')) else 'Error while calling Auth service'
|
||
|
ext = ' {0}'.format(custom_message) if custom_message else ''
|
||
|
return '{0} ({1}).{2}'.format(default_message, code, ext)
|