Source code for airflow.providers.keycloak.auth_manager.routes.login

# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements.  See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership.  The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License.  You may obtain a copy of the License at
#
#   http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied.  See the License for the
# specific language governing permissions and limitations
# under the License.

from __future__ import annotations

import logging
from typing import cast

from fastapi import Request  # noqa: TC002
from fastapi.responses import HTMLResponse, RedirectResponse

from airflow.api_fastapi.app import get_auth_manager
from airflow.api_fastapi.auth.managers.base_auth_manager import COOKIE_NAME_JWT_TOKEN
from airflow.providers.keycloak.version_compat import AIRFLOW_V_3_1_1_PLUS

try:
    from airflow.api_fastapi.auth.managers.exceptions import AuthManagerRefreshTokenExpiredException
except ImportError:

[docs] class AuthManagerRefreshTokenExpiredException(Exception): # type: ignore[no-redef] """In case it is using a version of Airflow without ``AuthManagerRefreshTokenExpiredException``.""" pass
from airflow.api_fastapi.common.router import AirflowRouter from airflow.providers.common.compat.sdk import conf from airflow.providers.keycloak.auth_manager.keycloak_auth_manager import KeycloakAuthManager from airflow.providers.keycloak.auth_manager.user import KeycloakAuthManagerUser
[docs] log = logging.getLogger(__name__)
[docs] login_router = AirflowRouter(tags=["KeycloakAuthManagerLogin"])
@login_router.get("/login")
[docs] def login(request: Request) -> RedirectResponse: """Initiate the authentication.""" client = KeycloakAuthManager.get_keycloak_client() redirect_uri = request.url_for("login_callback") auth_url = client.auth_url(redirect_uri=str(redirect_uri), scope="openid") return RedirectResponse(auth_url)
@login_router.get("/login_callback")
[docs] def login_callback(request: Request): """Authenticate the user.""" code = request.query_params.get("code") if not code: return HTMLResponse("Missing code", status_code=400) client = KeycloakAuthManager.get_keycloak_client() redirect_uri = request.url_for("login_callback") tokens = client.token( grant_type="authorization_code", code=code, redirect_uri=str(redirect_uri), ) userinfo = client.userinfo(tokens["access_token"]) user = KeycloakAuthManagerUser( user_id=userinfo["sub"], name=userinfo["preferred_username"], access_token=tokens["access_token"], refresh_token=tokens["refresh_token"], ) token = get_auth_manager().generate_jwt(user) response = RedirectResponse(url=conf.get("api", "base_url", fallback="/"), status_code=303) secure = bool(conf.get("api", "ssl_cert", fallback="")) # In Airflow 3.1.1 authentication changes, front-end no longer handle the token # See https://github.com/apache/airflow/pull/55506 if AIRFLOW_V_3_1_1_PLUS: response.set_cookie(COOKIE_NAME_JWT_TOKEN, token, secure=secure, httponly=True) else: response.set_cookie(COOKIE_NAME_JWT_TOKEN, token, secure=secure) # Save id token as separate cookie. # Cookies have a size limit (usually 4k), saving all the tokens in a same cookie goes beyond this limit response.set_cookie(COOKIE_NAME_ID_TOKEN, tokens["id_token"], secure=secure, httponly=True) return response
@login_router.get("/logout")
[docs] def logout(request: Request): """Log out the user from Keycloak.""" auth_manager = cast("KeycloakAuthManager", get_auth_manager()) keycloak_config = auth_manager.get_keycloak_client().well_known() end_session_endpoint = keycloak_config["end_session_endpoint"] id_token = request.cookies.get(COOKIE_NAME_ID_TOKEN) post_logout_redirect_uri = request.url_for("logout_callback") if id_token: logout_url = f"{end_session_endpoint}?post_logout_redirect_uri={post_logout_redirect_uri}&id_token_hint={id_token}" else: logout_url = str(post_logout_redirect_uri) return RedirectResponse(logout_url)
@login_router.get("/logout_callback")
[docs] def logout_callback(request: Request): """ Complete the log-out. This callback is redirected by Keycloak after the user has been logged out from Keycloak. """ login_url = get_auth_manager().get_url_login() secure = request.base_url.scheme == "https" or bool(conf.get("api", "ssl_cert", fallback="")) response = RedirectResponse(login_url) response.delete_cookie( key=COOKIE_NAME_JWT_TOKEN, secure=secure, httponly=True, ) response.delete_cookie( key=COOKIE_NAME_ID_TOKEN, secure=secure, httponly=True, ) return response

Was this entry helpful?