* [ISSUE #27494] fix type issue caused by connector builder logging
* [ISSUE #21014] log request/response for oauth as 'global_requests'
* formatcdk
* [ISSUE #21014] support DeclarativeOauth2Authenticator as well
* [ISSUE #21014] improving message grouper tests
* formatcdk
* Test solution with logic in MessageRepository (#27990)
* Test solution with logic in MessageRepository
* Solution without creating a new ModelToComponentFactory
* [ISSUE #21014] adding tests
* [ISSUE #21014] add title and description to global requests
* Revert "Solution without creating a new ModelToComponentFactory"
This reverts commit f17799ecff.
* Automated Commit - Formatting Changes
* [ISSUE #21014] code review
* [ISSUE #21014] do not break on log appender conflict
* Automated Commit - Formatting Changes
* [ISSUE #21014] code review
* formatcdk
* [ISSUE #21014] moving is_global to is_auxiliary
157 lines
8.2 KiB
Python
157 lines
8.2 KiB
Python
#
|
|
# Copyright (c) 2023 Airbyte, Inc., all rights reserved.
|
|
#
|
|
|
|
from dataclasses import InitVar, dataclass, field
|
|
from typing import Any, List, Mapping, Optional, Tuple, Union
|
|
|
|
import pendulum
|
|
from airbyte_cdk.sources.declarative.auth.declarative_authenticator import DeclarativeAuthenticator
|
|
from airbyte_cdk.sources.declarative.interpolation.interpolated_mapping import InterpolatedMapping
|
|
from airbyte_cdk.sources.declarative.interpolation.interpolated_string import InterpolatedString
|
|
from airbyte_cdk.sources.message import MessageRepository, NoopMessageRepository
|
|
from airbyte_cdk.sources.streams.http.requests_native_auth.abstract_oauth import AbstractOauth2Authenticator
|
|
from airbyte_cdk.sources.streams.http.requests_native_auth.oauth import SingleUseRefreshTokenOauth2Authenticator
|
|
|
|
|
|
@dataclass
|
|
class DeclarativeOauth2Authenticator(AbstractOauth2Authenticator, DeclarativeAuthenticator):
|
|
"""
|
|
Generates OAuth2.0 access tokens from an OAuth2.0 refresh token and client credentials based on
|
|
a declarative connector configuration file. Credentials can be defined explicitly or via interpolation
|
|
at runtime. The generated access token is attached to each request via the Authorization header.
|
|
|
|
Attributes:
|
|
token_refresh_endpoint (Union[InterpolatedString, str]): The endpoint to refresh the access token
|
|
client_id (Union[InterpolatedString, str]): The client id
|
|
client_secret (Union[InterpolatedString, str]): Client secret
|
|
refresh_token (Union[InterpolatedString, str]): The token used to refresh the access token
|
|
access_token_name (Union[InterpolatedString, str]): THe field to extract access token from in the response
|
|
expires_in_name (Union[InterpolatedString, str]): The field to extract expires_in from in the response
|
|
config (Mapping[str, Any]): The user-provided configuration as specified by the source's spec
|
|
scopes (Optional[List[str]]): The scopes to request
|
|
token_expiry_date (Optional[Union[InterpolatedString, str]]): The access token expiration date
|
|
token_expiry_date_format str: format of the datetime; provide it if expires_in is returned in datetime instead of seconds
|
|
refresh_request_body (Optional[Mapping[str, Any]]): The request body to send in the refresh request
|
|
grant_type: The grant_type to request for access_token. If set to refresh_token, the refresh_token parameter has to be provided
|
|
message_repository (MessageRepository): the message repository used to emit logs on HTTP requests
|
|
"""
|
|
|
|
token_refresh_endpoint: Union[InterpolatedString, str]
|
|
client_id: Union[InterpolatedString, str]
|
|
client_secret: Union[InterpolatedString, str]
|
|
config: Mapping[str, Any]
|
|
parameters: InitVar[Mapping[str, Any]]
|
|
refresh_token: Optional[Union[InterpolatedString, str]] = None
|
|
scopes: Optional[List[str]] = None
|
|
token_expiry_date: Optional[Union[InterpolatedString, str]] = None
|
|
_token_expiry_date: pendulum.DateTime = field(init=False, repr=False, default=None)
|
|
token_expiry_date_format: str = None
|
|
access_token_name: Union[InterpolatedString, str] = "access_token"
|
|
expires_in_name: Union[InterpolatedString, str] = "expires_in"
|
|
refresh_request_body: Optional[Mapping[str, Any]] = None
|
|
grant_type: Union[InterpolatedString, str] = "refresh_token"
|
|
message_repository: MessageRepository = NoopMessageRepository()
|
|
|
|
def __post_init__(self, parameters: Mapping[str, Any]):
|
|
self.token_refresh_endpoint = InterpolatedString.create(self.token_refresh_endpoint, parameters=parameters)
|
|
self.client_id = InterpolatedString.create(self.client_id, parameters=parameters)
|
|
self.client_secret = InterpolatedString.create(self.client_secret, parameters=parameters)
|
|
if self.refresh_token is not None:
|
|
self.refresh_token = InterpolatedString.create(self.refresh_token, parameters=parameters)
|
|
self.access_token_name = InterpolatedString.create(self.access_token_name, parameters=parameters)
|
|
self.expires_in_name = InterpolatedString.create(self.expires_in_name, parameters=parameters)
|
|
self.grant_type = InterpolatedString.create(self.grant_type, parameters=parameters)
|
|
self._refresh_request_body = InterpolatedMapping(self.refresh_request_body or {}, parameters=parameters)
|
|
self._token_expiry_date = (
|
|
pendulum.parse(InterpolatedString.create(self.token_expiry_date, parameters=parameters).eval(self.config))
|
|
if self.token_expiry_date
|
|
else pendulum.now().subtract(days=1)
|
|
)
|
|
self._access_token = None
|
|
|
|
if self.get_grant_type() == "refresh_token" and self.refresh_token is None:
|
|
raise ValueError("OAuthAuthenticator needs a refresh_token parameter if grant_type is set to `refresh_token`")
|
|
|
|
def get_token_refresh_endpoint(self) -> str:
|
|
return self.token_refresh_endpoint.eval(self.config)
|
|
|
|
def get_client_id(self) -> str:
|
|
return self.client_id.eval(self.config)
|
|
|
|
def get_client_secret(self) -> str:
|
|
return self.client_secret.eval(self.config)
|
|
|
|
def get_refresh_token(self) -> Optional[str]:
|
|
return None if self.refresh_token is None else self.refresh_token.eval(self.config)
|
|
|
|
def get_scopes(self) -> [str]:
|
|
return self.scopes
|
|
|
|
def get_access_token_name(self) -> InterpolatedString:
|
|
return self.access_token_name.eval(self.config)
|
|
|
|
def get_expires_in_name(self) -> InterpolatedString:
|
|
return self.expires_in_name.eval(self.config)
|
|
|
|
def get_grant_type(self) -> InterpolatedString:
|
|
return self.grant_type.eval(self.config)
|
|
|
|
def get_refresh_request_body(self) -> Mapping[str, Any]:
|
|
return self._refresh_request_body.eval(self.config)
|
|
|
|
def refresh_access_token(self) -> Tuple[str, Any]:
|
|
"""
|
|
This overrides the parent class method because the parent class assumes the "expires_in" field is always an int representing
|
|
seconds till token expiry.
|
|
|
|
However, this class provides the ability to determine the expiry date of an access token either by using (pseudocode):
|
|
* expiry_datetime = datetime.now() + seconds_till_access_token_expiry # in this option we have to calculate expiry timestamp, OR
|
|
* expiry_datetime = parse(response.body["expires_at"]) # in this option the API tells us exactly when access token expires
|
|
|
|
:return: a tuple of (access_token, either token_lifespan_in_seconds or datetime_of_token_expiry)
|
|
|
|
# TODO this is a hack and should be better encapsulated/enabled by the AbstractOAuthAuthenticator i.e: that class should have
|
|
a method which takes the HTTP response and returns a timestamp for when the access token will expire which subclasses
|
|
such as this one can override or just configure directly.
|
|
"""
|
|
response_json = self._get_refresh_access_token_response()
|
|
return response_json[self.get_access_token_name()], response_json[self.get_expires_in_name()]
|
|
|
|
def get_token_expiry_date(self) -> pendulum.DateTime:
|
|
return self._token_expiry_date
|
|
|
|
def set_token_expiry_date(self, value: Union[str, int]):
|
|
if self.token_expiry_date_format:
|
|
self._token_expiry_date = pendulum.from_format(value, self.token_expiry_date_format)
|
|
else:
|
|
try:
|
|
self._token_expiry_date = pendulum.now().add(seconds=int(float(value)))
|
|
except ValueError:
|
|
raise ValueError(f"Invalid token expiry value {value}; a number is required.")
|
|
|
|
@property
|
|
def access_token(self) -> str:
|
|
return self._access_token
|
|
|
|
@access_token.setter
|
|
def access_token(self, value: str):
|
|
self._access_token = value
|
|
|
|
@property
|
|
def _message_repository(self) -> MessageRepository:
|
|
"""
|
|
Overriding AbstractOauth2Authenticator._message_repository to allow for HTTP request logs
|
|
"""
|
|
return self.message_repository
|
|
|
|
|
|
@dataclass
|
|
class DeclarativeSingleUseRefreshTokenOauth2Authenticator(SingleUseRefreshTokenOauth2Authenticator, DeclarativeAuthenticator):
|
|
"""
|
|
Declarative version of SingleUseRefreshTokenOauth2Authenticator which can be used in declarative connectors.
|
|
"""
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|