pyhOn/pyhon/connection/auth.py

274 lines
10 KiB
Python
Raw Normal View History

2023-02-13 00:41:38 +00:00
import json
import logging
import re
import secrets
import urllib
2023-04-15 12:37:27 +00:00
from dataclasses import dataclass
from datetime import datetime, timedelta
2023-04-10 04:42:40 +00:00
from pprint import pformat
2023-04-15 12:37:27 +00:00
from typing import Dict, Optional
2023-02-13 00:41:38 +00:00
from urllib import parse
2023-04-12 00:09:41 +00:00
from urllib.parse import quote
2023-02-13 00:41:38 +00:00
2023-04-15 12:22:04 +00:00
from aiohttp import ClientResponse
2023-03-17 00:56:04 +00:00
from yarl import URL
2023-02-13 00:41:38 +00:00
2023-04-12 17:14:14 +00:00
from pyhon import const, exceptions
2023-04-15 12:22:04 +00:00
from pyhon.connection.handler.auth import HonAuthConnectionHandler
2023-02-13 00:41:38 +00:00
2023-04-10 18:31:55 +00:00
_LOGGER = logging.getLogger(__name__)
2023-02-13 00:41:38 +00:00
2023-04-15 12:37:27 +00:00
@dataclass
class HonLoginData:
url: str = ""
email: str = ""
password: str = ""
fw_uid: str = ""
loaded: Optional[Dict] = None
2023-02-13 00:41:38 +00:00
class HonAuth:
_TOKEN_EXPIRES_AFTER_HOURS = 8
_TOKEN_EXPIRE_WARNING_HOURS = 7
2023-04-09 16:13:50 +00:00
def __init__(self, session, email, password, device) -> None:
self._session = session
2023-04-15 12:22:04 +00:00
self._request = HonAuthConnectionHandler(session)
2023-04-15 12:37:27 +00:00
self._login_data = HonLoginData()
self._login_data.email = email
self._login_data.password = password
2023-03-17 00:56:04 +00:00
self._access_token = ""
self._refresh_token = ""
2023-02-13 00:41:38 +00:00
self._cognito_token = ""
self._id_token = ""
2023-04-09 16:13:50 +00:00
self._device = device
self._expires: datetime = datetime.utcnow()
2023-02-13 00:41:38 +00:00
@property
2023-04-15 12:22:04 +00:00
def cognito_token(self) -> str:
2023-02-13 00:41:38 +00:00
return self._cognito_token
@property
2023-04-15 12:22:04 +00:00
def id_token(self) -> str:
2023-02-13 00:41:38 +00:00
return self._id_token
2023-03-17 00:56:04 +00:00
@property
2023-04-15 12:22:04 +00:00
def access_token(self) -> str:
2023-03-17 00:56:04 +00:00
return self._access_token
@property
2023-04-15 12:22:04 +00:00
def refresh_token(self) -> str:
2023-03-17 00:56:04 +00:00
return self._refresh_token
2023-04-15 12:22:04 +00:00
def _check_token_expiration(self, hours: int) -> bool:
return datetime.utcnow() >= self._expires + timedelta(hours=hours)
@property
def token_is_expired(self) -> bool:
return self._check_token_expiration(self._TOKEN_EXPIRES_AFTER_HOURS)
@property
def token_expires_soon(self) -> bool:
return self._check_token_expiration(self._TOKEN_EXPIRE_WARNING_HOURS)
2023-04-15 12:22:04 +00:00
async def _error_logger(self, response: ClientResponse, fail: bool = True) -> None:
output = "hOn Authentication Error\n"
for i, (status, url) in enumerate(self._request.called_urls):
output += f" {i + 1: 2d} {status} - {url}\n"
output += f"ERROR - {response.status} - {response.request_info.url}\n"
output += f"{15 * '='} Response {15 * '='}\n{await response.text()}\n{40 * '='}"
_LOGGER.error(output)
if fail:
2023-04-12 17:14:14 +00:00
raise exceptions.HonAuthenticationError("Can't login")
2023-04-15 12:22:04 +00:00
def _generate_nonce(self) -> str:
2023-03-17 00:56:04 +00:00
nonce = secrets.token_hex(16)
2023-04-15 12:22:04 +00:00
return f"{nonce[:8]}-{nonce[8:12]}-{nonce[12:16]}-{nonce[16:20]}-{nonce[20:]}"
async def _load_login(self):
login_url = await self._introduce()
login_url = await self._handle_redirects(login_url)
2023-04-15 12:37:27 +00:00
await self._login_url(login_url)
2023-04-15 12:22:04 +00:00
async def _introduce(self) -> str:
redirect_uri = urllib.parse.quote(f"{const.APP}://mobilesdk/detect/oauth/done")
2023-03-17 00:56:04 +00:00
params = {
"response_type": "token+id_token",
"client_id": const.CLIENT_ID,
2023-04-15 12:22:04 +00:00
"redirect_uri": redirect_uri,
2023-03-17 00:56:04 +00:00
"display": "touch",
"scope": "api openid refresh_token web",
2023-04-15 12:22:04 +00:00
"nonce": self._generate_nonce(),
2023-03-17 00:56:04 +00:00
}
params = "&".join([f"{k}={v}" for k, v in params.items()])
2023-04-15 12:22:04 +00:00
url = f"{const.AUTH_API}/services/oauth2/authorize/expid_Login?{params}"
async with self._request.get(url) as response:
2023-04-12 17:14:14 +00:00
text = await response.text()
self._expires = datetime.utcnow()
2023-04-12 17:14:14 +00:00
if not (login_url := re.findall("url = '(.+?)'", text)):
if "oauth/done#access_token=" in text:
self._parse_token_data(text)
raise exceptions.HonNoAuthenticationNeeded()
await self._error_logger(response)
2023-04-15 12:22:04 +00:00
return login_url[0]
async def _manual_redirect(self, url: str) -> str:
async with self._request.get(url, allow_redirects=False) as response:
if not (new_location := response.headers.get("Location")):
await self._error_logger(response)
return new_location
async def _handle_redirects(self, login_url) -> str:
redirect1 = await self._manual_redirect(login_url)
redirect2 = await self._manual_redirect(redirect1)
return f"{redirect2}&System=IoT_Mobile_App&RegistrationSubChannel=hOn"
2023-04-15 12:37:27 +00:00
async def _login_url(self, login_url: str) -> bool:
2023-04-15 12:22:04 +00:00
headers = {"user-agent": const.USER_AGENT}
url = URL(login_url, encoded=True)
async with self._request.get(url, headers=headers) as response:
text = await response.text()
if context := re.findall('"fwuid":"(.*?)","loaded":(\\{.*?})', text):
2023-03-17 00:56:04 +00:00
fw_uid, loaded_str = context[0]
2023-04-15 12:37:27 +00:00
self._login_data.fw_uid = fw_uid
self._login_data.loaded = json.loads(loaded_str)
self._login_data.url = login_url.replace(
"/".join(const.AUTH_API.split("/")[:-1]), ""
)
return True
2023-04-15 12:22:04 +00:00
await self._error_logger(response)
2023-03-17 00:56:04 +00:00
2023-04-15 12:37:27 +00:00
async def _login(self):
start_url = parse.unquote(self._login_data.url.split("startURL=")[-1]).split(
"%3D"
)[0]
action = {
"id": "79;a",
"descriptor": "apex://LightningLoginCustomController/ACTION$login",
"callingDescriptor": "markup://c:loginForm",
"params": {
"username": quote(self._login_data.email),
"password": quote(self._login_data.password),
"startUrl": start_url,
2023-02-13 00:41:38 +00:00
},
2023-04-15 12:37:27 +00:00
}
data = {
"message": {"actions": [action]},
2023-02-13 00:41:38 +00:00
"aura.context": {
"mode": "PROD",
2023-04-15 12:37:27 +00:00
"fwuid": self._login_data.fw_uid,
2023-02-13 00:41:38 +00:00
"app": "siteforce:loginApp2",
2023-04-15 12:37:27 +00:00
"loaded": self._login_data.loaded,
2023-02-13 00:41:38 +00:00
"dn": [],
"globals": {},
2023-04-09 18:55:36 +00:00
"uad": False,
},
2023-04-15 12:37:27 +00:00
"aura.pageURI": self._login_data.url,
2023-04-09 18:55:36 +00:00
"aura.token": None,
}
2023-02-13 00:41:38 +00:00
params = {"r": 3, "other.LightningLoginCustom.login": 1}
2023-04-15 12:22:04 +00:00
async with self._request.post(
2023-04-09 18:55:36 +00:00
const.AUTH_API + "/s/sfsites/aura",
headers={"Content-Type": "application/x-www-form-urlencoded"},
data="&".join(f"{k}={json.dumps(v)}" for k, v in data.items()),
params=params,
2023-02-13 00:41:38 +00:00
) as response:
2023-03-17 00:56:04 +00:00
if response.status == 200:
try:
2023-04-10 04:42:40 +00:00
data = await response.json()
return data["events"][0]["attributes"]["values"]["url"]
2023-03-17 00:56:04 +00:00
except json.JSONDecodeError:
pass
2023-04-10 04:42:40 +00:00
except KeyError:
_LOGGER.error(
"Can't get login url - %s", pformat(await response.json())
)
await self._error_logger(response)
2023-03-17 00:56:04 +00:00
return ""
2023-02-13 00:41:38 +00:00
2023-04-12 17:14:14 +00:00
def _parse_token_data(self, text):
if access_token := re.findall("access_token=(.*?)&", text):
self._access_token = access_token[0]
if refresh_token := re.findall("refresh_token=(.*?)&", text):
self._refresh_token = refresh_token[0]
if id_token := re.findall("id_token=(.*?)&", text):
self._id_token = id_token[0]
2023-04-09 16:13:50 +00:00
async def _get_token(self, url):
2023-04-15 12:22:04 +00:00
async with self._request.get(url) as response:
2023-04-10 18:31:55 +00:00
if response.status != 200:
await self._error_logger(response)
2023-03-17 00:56:04 +00:00
return False
2023-04-10 18:31:55 +00:00
url = re.findall("href\\s*=\\s*[\"'](.+?)[\"']", await response.text())
if not url:
await self._error_logger(response)
return False
2023-04-10 18:31:55 +00:00
if "ProgressiveLogin" in url[0]:
2023-04-15 12:22:04 +00:00
async with self._request.get(url[0]) as response:
2023-04-10 18:31:55 +00:00
if response.status != 200:
await self._error_logger(response)
2023-04-10 18:31:55 +00:00
return False
url = re.findall("href\\s*=\\s*[\"'](.*?)[\"']", await response.text())
url = "/".join(const.AUTH_API.split("/")[:-1]) + url[0]
2023-04-15 12:22:04 +00:00
async with self._request.get(url) as response:
2023-04-10 18:31:55 +00:00
if response.status != 200:
await self._error_logger(response)
2023-02-13 00:41:38 +00:00
return False
2023-04-12 17:14:14 +00:00
self._parse_token_data(await response.text())
2023-02-13 00:41:38 +00:00
return True
2023-04-11 15:09:02 +00:00
async def _api_auth(self):
2023-04-09 16:43:57 +00:00
post_headers = {"id-token": self._id_token}
2023-04-09 16:13:50 +00:00
data = self._device.get()
2023-04-15 12:22:04 +00:00
async with self._request.post(
2023-04-09 18:55:36 +00:00
f"{const.API_URL}/auth/v1/login", headers=post_headers, json=data
2023-04-10 18:31:55 +00:00
) as response:
2023-04-09 16:13:50 +00:00
try:
2023-04-10 18:31:55 +00:00
json_data = await response.json()
2023-04-09 16:13:50 +00:00
except json.JSONDecodeError:
await self._error_logger(response)
2023-04-09 16:13:50 +00:00
return False
self._cognito_token = json_data["cognitoUser"]["Token"]
2023-02-13 00:41:38 +00:00
return True
2023-04-09 16:43:57 +00:00
2023-04-12 17:14:14 +00:00
async def authenticate(self):
self.clear()
try:
2023-04-15 12:37:27 +00:00
if not await self._load_login():
2023-04-12 17:14:14 +00:00
raise exceptions.HonAuthenticationError("Can't open login page")
2023-04-15 12:37:27 +00:00
if not (url := await self._login()):
2023-04-12 17:14:14 +00:00
raise exceptions.HonAuthenticationError("Can't login")
if not await self._get_token(url):
raise exceptions.HonAuthenticationError("Can't get token")
if not await self._api_auth():
raise exceptions.HonAuthenticationError("Can't get api token")
except exceptions.HonNoAuthenticationNeeded:
return
2023-04-09 16:43:57 +00:00
async def refresh(self):
params = {
"client_id": const.CLIENT_ID,
"refresh_token": self._refresh_token,
2023-04-09 18:55:36 +00:00
"grant_type": "refresh_token",
2023-04-09 16:43:57 +00:00
}
2023-04-15 12:22:04 +00:00
async with self._request.post(
2023-04-09 18:55:36 +00:00
f"{const.AUTH_API}/services/oauth2/token", params=params
2023-04-10 18:31:55 +00:00
) as response:
if response.status >= 400:
await self._error_logger(response, fail=False)
2023-04-09 16:43:57 +00:00
return False
2023-04-10 18:31:55 +00:00
data = await response.json()
self._expires = datetime.utcnow()
2023-04-10 04:42:40 +00:00
self._id_token = data["id_token"]
self._access_token = data["access_token"]
2023-04-11 15:09:02 +00:00
return await self._api_auth()
2023-04-12 17:14:14 +00:00
def clear(self):
self._session.cookie_jar.clear_domain(const.AUTH_API.split("/")[-2])
2023-04-15 12:22:04 +00:00
self._request.called_urls = []
2023-04-12 17:14:14 +00:00
self._cognito_token = ""
self._id_token = ""
self._access_token = ""
self._refresh_token = ""