IdHub/oidc4vp/models.py

224 lines
6.4 KiB
Python
Raw Normal View History

2023-12-11 14:39:50 +00:00
import json
2023-11-24 15:36:05 +00:00
import requests
2023-11-24 16:53:43 +00:00
import secrets
2023-11-24 15:36:05 +00:00
2023-11-24 16:53:43 +00:00
from django.conf import settings
2023-11-24 15:36:05 +00:00
from django.http import QueryDict
from django.utils.translation import gettext_lazy as _
2023-12-07 17:10:04 +00:00
from django.shortcuts import get_object_or_404
2023-11-24 15:36:05 +00:00
from idhub_auth.models import User
2023-11-24 16:53:43 +00:00
from django.db import models
2023-12-07 17:10:04 +00:00
from utils.idhub_ssikit import verify_presentation
2023-11-24 16:53:43 +00:00
SALT_CHARS = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
def gen_salt(length: int) -> str:
"""Generate a random string of SALT_CHARS with specified ``length``."""
if length <= 0:
raise ValueError("Salt length must be positive")
return "".join(secrets.choice(SALT_CHARS) for _ in range(length))
def set_client_id():
return gen_salt(24)
def set_client_secret():
return gen_salt(48)
def set_code():
return gen_salt(24)
2023-11-24 15:36:05 +00:00
class Organization(models.Model):
2023-11-24 16:53:43 +00:00
"""
2023-11-29 09:54:05 +00:00
This class represent a member of one net trust or federated host.
Client_id and client_secret are the credentials of this organization
get a connection to my. (receive a request)
My_client_id and my_client_secret are my credentials than to use if I
want to connect to this organization. (send a request)
For use the packages requests we need use my_client_id
For use in the get or post method of a View, then we need use client_id
and secret_id
2023-11-24 16:53:43 +00:00
"""
2023-11-24 15:36:05 +00:00
name = models.CharField(max_length=250)
2023-11-24 17:10:43 +00:00
client_id = models.CharField(
max_length=24,
default=set_client_id,
unique=True
)
client_secret = models.CharField(
max_length=48,
default=set_client_secret
)
2023-11-29 09:54:05 +00:00
my_client_id = models.CharField(
max_length=24,
)
my_client_secret = models.CharField(
max_length=48,
)
2023-11-24 15:36:05 +00:00
response_uri = models.URLField(
2023-11-24 16:53:43 +00:00
help_text=_("Url where to send the verificable presentation"),
2023-11-24 15:36:05 +00:00
max_length=250
)
2023-12-07 17:10:04 +00:00
def send(self, vp, code):
2023-11-24 16:53:43 +00:00
"""
Send the verificable presentation to Verifier
"""
2023-11-29 11:27:20 +00:00
url = "{url}/verify".format(
url=self.response_uri.strip("/"),
)
2023-12-04 08:51:08 +00:00
auth = (self.my_client_id, self.my_client_secret)
2023-12-04 14:47:48 +00:00
data = {"vp_token": vp}
2023-12-07 17:10:04 +00:00
if code:
data["code"] = code
2023-12-04 14:47:48 +00:00
return requests.post(url, data=data, auth=auth)
2023-11-24 16:53:43 +00:00
2023-11-28 08:39:02 +00:00
def demand_authorization(self):
"""
Send the a request for start a process of Verifier
"""
2023-11-29 11:27:20 +00:00
url = "{url}/verify?demand_uri={redirect_uri}".format(
2023-11-28 08:39:02 +00:00
url=self.response_uri.strip("/"),
redirect_uri=settings.RESPONSE_URI
)
2023-11-29 10:50:24 +00:00
auth = (self.my_client_id, self.my_client_secret)
2023-11-28 08:39:02 +00:00
return requests.get(url, auth=auth)
2023-11-24 15:36:05 +00:00
def __str__(self):
return self.name
2023-11-24 16:53:43 +00:00
###################
# Verifier clases #
###################
2023-11-24 15:36:05 +00:00
class Authorization(models.Model):
2023-11-24 16:53:43 +00:00
"""
This class represent a query through browser the client to the wallet.
The Verifier need to do a redirection to the user to Wallet.
The code we use as a soft foreing key between Authorization and OAuth2VPToken.
"""
code = models.CharField(max_length=24, default=set_code)
2023-12-11 13:06:43 +00:00
code_used = models.BooleanField(default=False)
2023-11-24 15:36:05 +00:00
created = models.DateTimeField(auto_now=True)
2023-11-24 16:53:43 +00:00
presentation_definition = models.CharField(max_length=250)
2023-11-24 15:36:05 +00:00
organization = models.ForeignKey(
Organization,
on_delete=models.CASCADE,
2023-11-24 16:53:43 +00:00
related_name='authorizations',
2023-11-24 15:36:05 +00:00
null=True,
)
user = models.ForeignKey(
User,
on_delete=models.CASCADE,
null=True,
)
2023-12-07 17:10:04 +00:00
def authorize(self, path=None):
2023-11-24 15:36:05 +00:00
data = {
"response_type": "vp_token",
"response_mode": "direct_post",
2023-11-29 10:18:12 +00:00
"client_id": self.organization.my_client_id,
2023-11-28 16:33:24 +00:00
"presentation_definition": self.presentation_definition,
2023-12-07 17:10:04 +00:00
"code": self.code,
2023-11-24 16:53:43 +00:00
"nonce": gen_salt(5),
2023-11-24 15:36:05 +00:00
}
query_dict = QueryDict('', mutable=True)
query_dict.update(data)
2023-12-07 17:10:04 +00:00
response_uri = self.organization.response_uri.strip("/")
if path:
response_uri = "{}/{}".format(response_uri, path.strip("/"))
2023-11-24 15:36:05 +00:00
url = '{response_uri}/authorize?{params}'.format(
2023-12-07 17:10:04 +00:00
response_uri=response_uri,
2023-11-24 15:36:05 +00:00
params=query_dict.urlencode()
)
2023-11-24 16:53:43 +00:00
return url
2023-11-24 15:36:05 +00:00
class OAuth2VPToken(models.Model):
2023-11-24 16:53:43 +00:00
"""
This class represent the response of Wallet to Verifier
and the result of verify.
"""
2023-11-24 15:36:05 +00:00
created = models.DateTimeField(auto_now=True)
2023-12-07 17:10:04 +00:00
result_verify = models.CharField(max_length=255)
vp_token = models.TextField()
2023-11-24 15:36:05 +00:00
organization = models.ForeignKey(
Organization,
on_delete=models.CASCADE,
related_name='vp_tokens',
null=True,
)
user = models.ForeignKey(
User,
on_delete=models.CASCADE,
related_name='vp_tokens',
null=True,
)
2023-11-24 16:53:43 +00:00
authorization = models.ForeignKey(
Authorization,
on_delete=models.SET_NULL,
2023-12-11 17:40:37 +00:00
related_name='vp_tokens',
2023-11-24 16:53:43 +00:00
null=True,
)
2023-12-07 17:10:04 +00:00
def __init__(self, *args, **kwargs):
code = kwargs.pop("code", None)
super().__init__(*args, **kwargs)
2023-12-11 17:40:37 +00:00
self.authorization = Authorization.objects.filter(code=code).first()
2023-12-07 17:10:04 +00:00
2023-11-24 16:53:43 +00:00
def verifing(self):
2023-12-07 17:10:04 +00:00
self.result_verify = verify_presentation(self.vp_token)
def get_response_verify(self):
response = {
"verify": ',',
"redirect_uri": "",
"response": "",
}
verification = json.loads(self.result_verify)
if verification.get('errors') or verification.get('warnings'):
response["verify"] = "Error, Verification Failed"
return response
response["verify"] = "Ok, Verification correct"
2024-01-21 10:35:24 +00:00
url = self.get_redirect_url()
if url:
response["redirect_uri"] = url
2023-12-07 17:10:04 +00:00
return response
def get_redirect_url(self):
2024-01-21 10:35:24 +00:00
if not settings.ALLOW_CODE_URI:
return
2023-12-07 17:10:04 +00:00
data = {
"code": self.authorization.code,
}
query_dict = QueryDict('', mutable=True)
query_dict.update(data)
2023-11-24 15:36:05 +00:00
2023-12-07 17:10:04 +00:00
response_uri = settings.ALLOW_CODE_URI
2023-11-27 09:59:30 +00:00
2023-12-07 17:10:04 +00:00
url = '{response_uri}?{params}'.format(
response_uri=response_uri,
params=query_dict.urlencode()
)
return url
def get_user_info(self):
tk = json.loads(self.vp_token)
self.user_info = tk.get(
"verifiableCredential", [{}]
)[-1].get("credentialSubject")