added a server.py, which does google api handling via google auth oauthlib flow. works
This commit is contained in:
		
							
								
								
									
										169
									
								
								server.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										169
									
								
								server.py
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,169 @@
 | 
				
			|||||||
 | 
					# -*- coding: utf-8 -*-
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import os
 | 
				
			||||||
 | 
					import flask
 | 
				
			||||||
 | 
					import requests
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import google.oauth2.credentials
 | 
				
			||||||
 | 
					import google_auth_oauthlib.flow
 | 
				
			||||||
 | 
					import googleapiclient.discovery
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This variable specifies the name of a file that contains the OAuth 2.0
 | 
				
			||||||
 | 
					# information for this application, including its client_id and client_secret.
 | 
				
			||||||
 | 
					CLIENT_SECRETS_FILE = "client_secret.json"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This OAuth 2.0 access scope allows for full read/write access to the
 | 
				
			||||||
 | 
					# authenticated user's account and requires requests to use an SSL connection.
 | 
				
			||||||
 | 
					SCOPES = ['https://www.googleapis.com/auth/calendar.readonly']
 | 
				
			||||||
 | 
					API_SERVICE_NAME = 'drive'
 | 
				
			||||||
 | 
					API_VERSION = 'v2'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					app = flask.Flask(__name__)
 | 
				
			||||||
 | 
					# Note: A secret key is included in the sample so that it works.
 | 
				
			||||||
 | 
					# If you use this code in your application, replace this with a truly secret
 | 
				
			||||||
 | 
					# key. See https://flask.palletsprojects.com/quickstart/#sessions.
 | 
				
			||||||
 | 
					app.secret_key = 'REPLACE ME - this value is here as a placeholder.'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/')
 | 
				
			||||||
 | 
					def index():
 | 
				
			||||||
 | 
					  return print_index_table()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/test')
 | 
				
			||||||
 | 
					def test_api_request():
 | 
				
			||||||
 | 
					  if 'credentials' not in flask.session:
 | 
				
			||||||
 | 
					    return flask.redirect('authorize')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Load credentials from the session.
 | 
				
			||||||
 | 
					  credentials = google.oauth2.credentials.Credentials(
 | 
				
			||||||
 | 
					      **flask.session['credentials'])
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  drive = googleapiclient.discovery.build(
 | 
				
			||||||
 | 
					      API_SERVICE_NAME, API_VERSION, credentials=credentials)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  files = drive.files().list().execute()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Save credentials back to session in case access token was refreshed.
 | 
				
			||||||
 | 
					  # ACTION ITEM: In a production app, you likely want to save these
 | 
				
			||||||
 | 
					  #              credentials in a persistent database instead.
 | 
				
			||||||
 | 
					  flask.session['credentials'] = credentials_to_dict(credentials)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  return flask.jsonify(**files)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/authorize')
 | 
				
			||||||
 | 
					def authorize():
 | 
				
			||||||
 | 
					  # Create flow instance to manage the OAuth 2.0 Authorization Grant Flow steps.
 | 
				
			||||||
 | 
					  flow = google_auth_oauthlib.flow.Flow.from_client_secrets_file(
 | 
				
			||||||
 | 
					      CLIENT_SECRETS_FILE, scopes=SCOPES)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # The URI created here must exactly match one of the authorized redirect URIs
 | 
				
			||||||
 | 
					  # for the OAuth 2.0 client, which you configured in the API Console. If this
 | 
				
			||||||
 | 
					  # value doesn't match an authorized URI, you will get a 'redirect_uri_mismatch'
 | 
				
			||||||
 | 
					  # error.
 | 
				
			||||||
 | 
					  flow.redirect_uri = flask.url_for('oauth2callback', _external=True)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  authorization_url, state = flow.authorization_url(
 | 
				
			||||||
 | 
					      # Enable offline access so that you can refresh an access token without
 | 
				
			||||||
 | 
					      # re-prompting the user for permission. Recommended for web server apps.
 | 
				
			||||||
 | 
					      access_type='offline',
 | 
				
			||||||
 | 
					      # Enable incremental authorization. Recommended as a best practice.
 | 
				
			||||||
 | 
					      include_granted_scopes='true')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Store the state so the callback can verify the auth server response.
 | 
				
			||||||
 | 
					  flask.session['state'] = state
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  return flask.redirect(authorization_url)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/oauth2callback')
 | 
				
			||||||
 | 
					def oauth2callback():
 | 
				
			||||||
 | 
					  # Specify the state when creating the flow in the callback so that it can
 | 
				
			||||||
 | 
					  # verified in the authorization server response.
 | 
				
			||||||
 | 
					  state = flask.session['state']
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  flow = google_auth_oauthlib.flow.Flow.from_client_secrets_file(
 | 
				
			||||||
 | 
					      CLIENT_SECRETS_FILE, scopes=SCOPES, state=state)
 | 
				
			||||||
 | 
					  flow.redirect_uri = flask.url_for('oauth2callback', _external=True)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Use the authorization server's response to fetch the OAuth 2.0 tokens.
 | 
				
			||||||
 | 
					  authorization_response = flask.request.url
 | 
				
			||||||
 | 
					  flow.fetch_token(authorization_response=authorization_response)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Store credentials in the session.
 | 
				
			||||||
 | 
					  # ACTION ITEM: In a production app, you likely want to save these
 | 
				
			||||||
 | 
					  #              credentials in a persistent database instead.
 | 
				
			||||||
 | 
					  credentials = flow.credentials
 | 
				
			||||||
 | 
					  flask.session['credentials'] = credentials_to_dict(credentials)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  return flask.redirect(flask.url_for('test_api_request'))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/revoke')
 | 
				
			||||||
 | 
					def revoke():
 | 
				
			||||||
 | 
					  if 'credentials' not in flask.session:
 | 
				
			||||||
 | 
					    return ('You need to <a href="/authorize">authorize</a> before ' +
 | 
				
			||||||
 | 
					            'testing the code to revoke credentials.')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  credentials = google.oauth2.credentials.Credentials(
 | 
				
			||||||
 | 
					    **flask.session['credentials'])
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  revoke = requests.post('https://oauth2.googleapis.com/revoke',
 | 
				
			||||||
 | 
					      params={'token': credentials.token},
 | 
				
			||||||
 | 
					      headers = {'content-type': 'application/x-www-form-urlencoded'})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  status_code = getattr(revoke, 'status_code')
 | 
				
			||||||
 | 
					  if status_code == 200:
 | 
				
			||||||
 | 
					    return('Credentials successfully revoked.' + print_index_table())
 | 
				
			||||||
 | 
					  else:
 | 
				
			||||||
 | 
					    return('An error occurred.' + print_index_table())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@app.route('/clear')
 | 
				
			||||||
 | 
					def clear_credentials():
 | 
				
			||||||
 | 
					  if 'credentials' in flask.session:
 | 
				
			||||||
 | 
					    del flask.session['credentials']
 | 
				
			||||||
 | 
					  return ('Credentials have been cleared.<br><br>' +
 | 
				
			||||||
 | 
					          print_index_table())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def credentials_to_dict(credentials):
 | 
				
			||||||
 | 
					  return {'token': credentials.token,
 | 
				
			||||||
 | 
					          'refresh_token': credentials.refresh_token,
 | 
				
			||||||
 | 
					          'token_uri': credentials.token_uri,
 | 
				
			||||||
 | 
					          'client_id': credentials.client_id,
 | 
				
			||||||
 | 
					          'client_secret': credentials.client_secret,
 | 
				
			||||||
 | 
					          'scopes': credentials.scopes}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def print_index_table():
 | 
				
			||||||
 | 
					  return ('<table>' +
 | 
				
			||||||
 | 
					          '<tr><td><a href="/test">Test an API request</a></td>' +
 | 
				
			||||||
 | 
					          '<td>Submit an API request and see a formatted JSON response. ' +
 | 
				
			||||||
 | 
					          '    Go through the authorization flow if there are no stored ' +
 | 
				
			||||||
 | 
					          '    credentials for the user.</td></tr>' +
 | 
				
			||||||
 | 
					          '<tr><td><a href="/authorize">Test the auth flow directly</a></td>' +
 | 
				
			||||||
 | 
					          '<td>Go directly to the authorization flow. If there are stored ' +
 | 
				
			||||||
 | 
					          '    credentials, you still might not be prompted to reauthorize ' +
 | 
				
			||||||
 | 
					          '    the application.</td></tr>' +
 | 
				
			||||||
 | 
					          '<tr><td><a href="/revoke">Revoke current credentials</a></td>' +
 | 
				
			||||||
 | 
					          '<td>Revoke the access token associated with the current user ' +
 | 
				
			||||||
 | 
					          '    session. After revoking credentials, if you go to the test ' +
 | 
				
			||||||
 | 
					          '    page, you should see an <code>invalid_grant</code> error.' +
 | 
				
			||||||
 | 
					          '</td></tr>' +
 | 
				
			||||||
 | 
					          '<tr><td><a href="/clear">Clear Flask session credentials</a></td>' +
 | 
				
			||||||
 | 
					          '<td>Clear the access token currently stored in the user session. ' +
 | 
				
			||||||
 | 
					          '    After clearing the token, if you <a href="/test">test the ' +
 | 
				
			||||||
 | 
					          '    API request</a> again, you should go back to the auth flow.' +
 | 
				
			||||||
 | 
					          '</td></tr></table>')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if __name__ == '__main__':
 | 
				
			||||||
 | 
					  # When running locally, disable OAuthlib's HTTPs verification.
 | 
				
			||||||
 | 
					  # ACTION ITEM for developers:
 | 
				
			||||||
 | 
					  #     When running in production *do not* leave this option enabled.
 | 
				
			||||||
 | 
					  os.environ['OAUTHLIB_INSECURE_TRANSPORT'] = '1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Specify a hostname and port that are set as a valid redirect URI
 | 
				
			||||||
 | 
					  # for your API project in the Google API Console.
 | 
				
			||||||
 | 
					  app.run('192.168.68.103.xip.io', 1234 , debug=True)
 | 
				
			||||||
							
								
								
									
										29
									
								
								website.py
									
									
									
									
									
								
							
							
						
						
									
										29
									
								
								website.py
									
									
									
									
									
								
							@@ -1,11 +1,21 @@
 | 
				
			|||||||
from google.oauth2 import id_token
 | 
					from google.oauth2 import id_token
 | 
				
			||||||
from google.auth.transport import requests
 | 
					from google.auth.transport import requests
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import pickle
 | 
				
			||||||
 | 
					import os.path
 | 
				
			||||||
 | 
					from googleapiclient.discovery import build
 | 
				
			||||||
 | 
					
 | 
				
			||||||
from http.server import HTTPServer, SimpleHTTPRequestHandler, BaseHTTPRequestHandler
 | 
					from http.server import HTTPServer, SimpleHTTPRequestHandler, BaseHTTPRequestHandler
 | 
				
			||||||
import socketserver
 | 
					import socketserver
 | 
				
			||||||
import logging
 | 
					import logging
 | 
				
			||||||
import json
 | 
					import json
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# some_file.py
 | 
				
			||||||
 | 
					import sys
 | 
				
			||||||
 | 
					# insert at 1, 0 is the script path (or '' in REPL)
 | 
				
			||||||
 | 
					sys.path.insert(1, '../calenderwatch_server/')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Handler = SimpleHTTPRequestHandler
 | 
					Handler = SimpleHTTPRequestHandler
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class S(BaseHTTPRequestHandler):
 | 
					class S(BaseHTTPRequestHandler):
 | 
				
			||||||
@@ -27,7 +37,8 @@ class S(BaseHTTPRequestHandler):
 | 
				
			|||||||
        print("in post method")
 | 
					        print("in post method")
 | 
				
			||||||
        self.data_string = self.rfile.read(int(self.headers['Content-Length']))
 | 
					        self.data_string = self.rfile.read(int(self.headers['Content-Length']))
 | 
				
			||||||
        print('checking client id')
 | 
					        print('checking client id')
 | 
				
			||||||
        checkClientId(self.data_string)
 | 
					        if checkClientId(self.data_string):
 | 
				
			||||||
 | 
					            getApiAuth(self.data_string)
 | 
				
			||||||
        self.send_response(200)
 | 
					        self.send_response(200)
 | 
				
			||||||
        self.end_headers()
 | 
					        self.end_headers()
 | 
				
			||||||
        self.wfile.write("Hello".encode('utf-8'))
 | 
					        self.wfile.write("Hello".encode('utf-8'))
 | 
				
			||||||
@@ -66,10 +77,24 @@ def checkClientId(token):
 | 
				
			|||||||
        # ID token is valid. Get the user's Google Account ID from the decoded token.
 | 
					        # ID token is valid. Get the user's Google Account ID from the decoded token.
 | 
				
			||||||
        userid = idinfo['sub']
 | 
					        userid = idinfo['sub']
 | 
				
			||||||
        print(f"valid user id: {userid}")
 | 
					        print(f"valid user id: {userid}")
 | 
				
			||||||
 | 
					        return True
 | 
				
			||||||
    except ValueError:
 | 
					    except ValueError:
 | 
				
			||||||
        # ID token is invalid
 | 
					        # ID token is invalid
 | 
				
			||||||
        print('invalid token')
 | 
					        print('invalid token')
 | 
				
			||||||
        pass
 | 
					        return False
 | 
				
			||||||
 | 
					    
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def getApiAuth(token):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    with open('client_secret.json', 'r') as json_file:
 | 
				
			||||||
 | 
					        clientSecret = json.load(json_file)
 | 
				
			||||||
 | 
					        CLIENT_ID = clientSecret["web"]["client_id"]
 | 
				
			||||||
 | 
					        # Specify the CLIENT_ID of the app that accesses the backend:
 | 
				
			||||||
 | 
					        idinfo = id_token.verify_oauth2_token(token, requests.Request(), CLIENT_ID)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # creds = pickle.load(idinfo)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    service = build('calendar', 'v3', credentials=idinfo)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
if __name__ == '__main__':
 | 
					if __name__ == '__main__':
 | 
				
			||||||
    from sys import argv
 | 
					    from sys import argv
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user