-
Notifications
You must be signed in to change notification settings - Fork 329
/
Copy path_auth_client.py
760 lines (623 loc) · 36.2 KB
/
_auth_client.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
# Copyright 2020 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Firebase auth client sub module."""
import time
import firebase_admin
from firebase_admin import _auth_providers
from firebase_admin import _auth_utils
from firebase_admin import _http_client
from firebase_admin import _token_gen
from firebase_admin import _user_identifier
from firebase_admin import _user_import
from firebase_admin import _user_mgt
from firebase_admin import _utils
class Client:
"""Firebase Authentication client scoped to a specific tenant."""
def __init__(self, app, tenant_id=None):
if not app.project_id:
raise ValueError("""A project ID is required to access the auth service.
1. Use a service account credential, or
2. set the project ID explicitly via Firebase App options, or
3. set the project ID via the GOOGLE_CLOUD_PROJECT environment variable.""")
credential = None
version_header = 'Python/Admin/{0}'.format(firebase_admin.__version__)
timeout = app.options.get('httpTimeout', _http_client.DEFAULT_TIMEOUT_SECONDS)
# Non-default endpoint URLs for emulator support are set in this dict later.
endpoint_urls = {}
self.emulated = False
# If an emulator is present, check that the given value matches the expected format and set
# endpoint URLs to use the emulator. Additionally, use a fake credential.
emulator_host = _auth_utils.get_emulator_host()
if emulator_host:
base_url = 'http://{0}/identitytoolkit.googleapis.com'.format(emulator_host)
endpoint_urls['v1'] = base_url + '/v1'
endpoint_urls['v2'] = base_url + '/v2'
credential = _utils.EmulatorAdminCredentials()
self.emulated = True
else:
# Use credentials if provided
credential = app.credential.get_credential()
http_client = _http_client.JsonHttpClient(
credential=credential, headers={'X-Client-Version': version_header}, timeout=timeout)
self._tenant_id = tenant_id
self._token_generator = _token_gen.TokenGenerator(
app, http_client, url_override=endpoint_urls.get('v1'))
self._token_verifier = _token_gen.TokenVerifier(app)
self._user_manager = _user_mgt.UserManager(
http_client, app.project_id, tenant_id, url_override=endpoint_urls.get('v1'))
self._provider_manager = _auth_providers.ProviderConfigClient(
http_client, app.project_id, tenant_id, url_override=endpoint_urls.get('v2'))
@property
def tenant_id(self):
"""Tenant ID associated with this client."""
return self._tenant_id
def create_custom_token(self, uid, developer_claims=None):
"""Builds and signs a Firebase custom auth token.
Args:
uid: ID of the user for whom the token is created.
developer_claims: A dictionary of claims to be included in the token
(optional).
Returns:
bytes: A token minted from the input parameters.
Raises:
ValueError: If input parameters are invalid.
TokenSignError: If an error occurs while signing the token using the remote IAM service.
"""
return self._token_generator.create_custom_token(
uid, developer_claims, tenant_id=self.tenant_id)
def verify_id_token(self, id_token, check_revoked=False, clock_skew_seconds=0):
"""Verifies the signature and data for the provided JWT.
Accepts a signed token string, verifies that it is current, was issued
to this project, and that it was correctly signed by Google.
Args:
id_token: A string of the encoded JWT.
check_revoked: Boolean, If true, checks whether the token has been revoked or
the user disabled (optional).
clock_skew_seconds: The number of seconds to tolerate when checking the token.
Must be between 0-60. Defaults to 0.
Returns:
dict: A dictionary of key-value pairs parsed from the decoded JWT.
Raises:
ValueError: If ``id_token`` is a not a string or is empty.
InvalidIdTokenError: If ``id_token`` is not a valid Firebase ID token.
ExpiredIdTokenError: If the specified ID token has expired.
RevokedIdTokenError: If ``check_revoked`` is ``True`` and the ID token has been
revoked.
TenantIdMismatchError: If ``id_token`` belongs to a tenant that is different than
this ``Client`` instance.
CertificateFetchError: If an error occurs while fetching the public key certificates
required to verify the ID token.
UserDisabledError: If ``check_revoked`` is ``True`` and the corresponding user
record is disabled.
"""
if not isinstance(check_revoked, bool):
# guard against accidental wrong assignment.
raise ValueError('Illegal check_revoked argument. Argument must be of type '
' bool, but given "{0}".'.format(type(check_revoked)))
verified_claims = self._token_verifier.verify_id_token(id_token, clock_skew_seconds)
if self.tenant_id:
token_tenant_id = verified_claims.get('firebase', {}).get('tenant')
if self.tenant_id != token_tenant_id:
raise _auth_utils.TenantIdMismatchError(
'Invalid tenant ID: {0}'.format(token_tenant_id))
if check_revoked:
self._check_jwt_revoked_or_disabled(
verified_claims, _token_gen.RevokedIdTokenError, 'ID token')
return verified_claims
def revoke_refresh_tokens(self, uid):
"""Revokes all refresh tokens for an existing user.
This method updates the user's ``tokens_valid_after_timestamp`` to the current UTC
in seconds since the epoch. It is important that the server on which this is called has its
clock set correctly and synchronized.
While this revokes all sessions for a specified user and disables any new ID tokens for
existing sessions from getting minted, existing ID tokens may remain active until their
natural expiration (one hour). To verify that ID tokens are revoked, use
``verify_id_token(idToken, check_revoked=True)``.
Args:
uid: A user ID string.
Raises:
ValueError: If the user ID is None, empty or malformed.
FirebaseError: If an error occurs while revoking the refresh token.
"""
self._user_manager.update_user(uid, valid_since=int(time.time()))
def get_user(self, uid):
"""Gets the user data corresponding to the specified user ID.
Args:
uid: A user ID string.
Returns:
UserRecord: A user record instance.
Raises:
ValueError: If the user ID is None, empty or malformed.
UserNotFoundError: If the specified user ID does not exist.
FirebaseError: If an error occurs while retrieving the user.
"""
response = self._user_manager.get_user(uid=uid)
return _user_mgt.UserRecord(response)
def get_user_by_email(self, email):
"""Gets the user data corresponding to the specified user email.
Args:
email: A user email address string.
Returns:
UserRecord: A user record instance.
Raises:
ValueError: If the email is None, empty or malformed.
UserNotFoundError: If no user exists for the specified email address.
FirebaseError: If an error occurs while retrieving the user.
"""
response = self._user_manager.get_user(email=email)
return _user_mgt.UserRecord(response)
def get_user_by_phone_number(self, phone_number):
"""Gets the user data corresponding to the specified phone number.
Args:
phone_number: A phone number string.
Returns:
UserRecord: A user record instance.
Raises:
ValueError: If the phone number is ``None``, empty or malformed.
UserNotFoundError: If no user exists for the specified phone number.
FirebaseError: If an error occurs while retrieving the user.
"""
response = self._user_manager.get_user(phone_number=phone_number)
return _user_mgt.UserRecord(response)
def get_users(self, identifiers):
"""Gets the user data corresponding to the specified identifiers.
There are no ordering guarantees; in particular, the nth entry in the
result list is not guaranteed to correspond to the nth entry in the input
parameters list.
A maximum of 100 identifiers may be supplied. If more than 100
identifiers are supplied, this method raises a `ValueError`.
Args:
identifiers (list[Identifier]): A list of ``Identifier`` instances used
to indicate which user records should be returned. Must have <= 100
entries.
Returns:
GetUsersResult: A ``GetUsersResult`` instance corresponding to the
specified identifiers.
Raises:
ValueError: If any of the identifiers are invalid or if more than 100
identifiers are specified.
"""
response = self._user_manager.get_users(identifiers=identifiers)
def _matches(identifier, user_record):
if isinstance(identifier, _user_identifier.UidIdentifier):
return identifier.uid == user_record.uid
if isinstance(identifier, _user_identifier.EmailIdentifier):
return identifier.email == user_record.email
if isinstance(identifier, _user_identifier.PhoneIdentifier):
return identifier.phone_number == user_record.phone_number
if isinstance(identifier, _user_identifier.ProviderIdentifier):
return next((
True
for user_info in user_record.provider_data
if identifier.provider_id == user_info.provider_id
and identifier.provider_uid == user_info.uid
), False)
raise TypeError("Unexpected type: {}".format(type(identifier)))
def _is_user_found(identifier, user_records):
return any(_matches(identifier, user_record) for user_record in user_records)
users = [_user_mgt.UserRecord(user) for user in response]
not_found = [
identifier for identifier in identifiers if not _is_user_found(identifier, users)]
return _user_mgt.GetUsersResult(users=users, not_found=not_found)
def list_users(self, page_token=None, max_results=_user_mgt.MAX_LIST_USERS_RESULTS):
"""Retrieves a page of user accounts from a Firebase project.
The ``page_token`` argument governs the starting point of the page. The ``max_results``
argument governs the maximum number of user accounts that may be included in the returned
page. This function never returns ``None``. If there are no user accounts in the Firebase
project, this returns an empty page.
Args:
page_token: A non-empty page token string, which indicates the starting point of the
page (optional). Defaults to ``None``, which will retrieve the first page of users.
max_results: A positive integer indicating the maximum number of users to include in
the returned page (optional). Defaults to 1000, which is also the maximum number
allowed.
Returns:
ListUsersPage: A page of user accounts.
Raises:
ValueError: If max_results or page_token are invalid.
FirebaseError: If an error occurs while retrieving the user accounts.
"""
def download(page_token, max_results):
return self._user_manager.list_users(page_token, max_results)
return _user_mgt.ListUsersPage(download, page_token, max_results)
def create_user(self, **kwargs): # pylint: disable=differing-param-doc
"""Creates a new user account with the specified properties.
Args:
**kwargs: A series of keyword arguments (optional).
Keyword Args:
uid: User ID to assign to the newly created user (optional).
display_name: The user's display name (optional).
email: The user's primary email (optional).
email_verified: A boolean indicating whether or not the user's primary email is
verified (optional).
phone_number: The user's primary phone number (optional).
photo_url: The user's photo URL (optional).
password: The user's raw, unhashed password. (optional).
disabled: A boolean indicating whether or not the user account is disabled (optional).
Returns:
UserRecord: A UserRecord instance for the newly created user.
Raises:
ValueError: If the specified user properties are invalid.
FirebaseError: If an error occurs while creating the user account.
"""
uid = self._user_manager.create_user(**kwargs)
return self.get_user(uid=uid)
def update_user(self, uid, **kwargs): # pylint: disable=differing-param-doc
"""Updates an existing user account with the specified properties.
Args:
uid: A user ID string.
**kwargs: A series of keyword arguments (optional).
Keyword Args:
display_name: The user's display name (optional). Can be removed by explicitly passing
``auth.DELETE_ATTRIBUTE``.
email: The user's primary email (optional).
email_verified: A boolean indicating whether or not the user's primary email is
verified (optional).
phone_number: The user's primary phone number (optional). Can be removed by explicitly
passing ``auth.DELETE_ATTRIBUTE``.
photo_url: The user's photo URL (optional). Can be removed by explicitly passing
``auth.DELETE_ATTRIBUTE``.
password: The user's raw, unhashed password. (optional).
disabled: A boolean indicating whether or not the user account is disabled (optional).
custom_claims: A dictionary or a JSON string contining the custom claims to be set on
the user account (optional). To remove all custom claims, pass
``auth.DELETE_ATTRIBUTE``.
valid_since: An integer signifying the seconds since the epoch (optional). This field
is set by ``revoke_refresh_tokens`` and it is discouraged to set this field
directly.
providers_to_delete: The list of provider IDs to unlink,
eg: 'google.com', 'password', etc.
Returns:
UserRecord: An updated UserRecord instance for the user.
Raises:
ValueError: If the specified user ID or properties are invalid.
FirebaseError: If an error occurs while updating the user account.
"""
self._user_manager.update_user(uid, **kwargs)
return self.get_user(uid=uid)
def set_custom_user_claims(self, uid, custom_claims):
"""Sets additional claims on an existing user account.
Custom claims set via this function can be used to define user roles and privilege levels.
These claims propagate to all the devices where the user is already signed in (after token
expiration or when token refresh is forced), and next time the user signs in. The claims
can be accessed via the user's ID token JWT. If a reserved OIDC claim is specified (sub,
iat, iss, etc), an error is thrown. Claims payload must also not be larger then 1000
characters when serialized into a JSON string.
Args:
uid: A user ID string.
custom_claims: A dictionary or a JSON string of custom claims. Pass None to unset any
claims set previously.
Raises:
ValueError: If the specified user ID or the custom claims are invalid.
FirebaseError: If an error occurs while updating the user account.
"""
if custom_claims is None:
custom_claims = _user_mgt.DELETE_ATTRIBUTE
self._user_manager.update_user(uid, custom_claims=custom_claims)
def delete_user(self, uid):
"""Deletes the user identified by the specified user ID.
Args:
uid: A user ID string.
Raises:
ValueError: If the user ID is None, empty or malformed.
FirebaseError: If an error occurs while deleting the user account.
"""
self._user_manager.delete_user(uid)
def delete_users(self, uids):
"""Deletes the users specified by the given identifiers.
Deleting a non-existing user does not generate an error (the method is
idempotent.) Non-existing users are considered to be successfully
deleted and are therefore included in the
`DeleteUserResult.success_count` value.
A maximum of 1000 identifiers may be supplied. If more than 1000
identifiers are supplied, this method raises a `ValueError`.
Args:
uids: A list of strings indicating the uids of the users to be deleted.
Must have <= 1000 entries.
Returns:
DeleteUsersResult: The total number of successful/failed deletions, as
well as the array of errors that correspond to the failed
deletions.
Raises:
ValueError: If any of the identifiers are invalid or if more than 1000
identifiers are specified.
"""
result = self._user_manager.delete_users(uids, force_delete=True)
return _user_mgt.DeleteUsersResult(result, len(uids))
def import_users(self, users, hash_alg=None):
"""Imports the specified list of users into Firebase Auth.
At most 1000 users can be imported at a time. This operation is optimized for bulk imports
and ignores checks on identifier uniqueness, which could result in duplications. The
``hash_alg`` parameter must be specified when importing users with passwords. Refer to the
``UserImportHash`` class for supported hash algorithms.
Args:
users: A list of ``ImportUserRecord`` instances to import. Length of the list must not
exceed 1000.
hash_alg: A ``UserImportHash`` object (optional). Required when importing users with
passwords.
Returns:
UserImportResult: An object summarizing the result of the import operation.
Raises:
ValueError: If the provided arguments are invalid.
FirebaseError: If an error occurs while importing users.
"""
result = self._user_manager.import_users(users, hash_alg)
return _user_import.UserImportResult(result, len(users))
def generate_password_reset_link(self, email, action_code_settings=None):
"""Generates the out-of-band email action link for password reset flows for the specified
email address.
Args:
email: The email of the user whose password is to be reset.
action_code_settings: ``ActionCodeSettings`` instance (optional). Defines whether
the link is to be handled by a mobile app and the additional state information to
be passed in the deep link.
Returns:
link: The password reset link created by the API
Raises:
ValueError: If the provided arguments are invalid
EmailNotFoundError: If no user exists for the specified email address.
FirebaseError: If an error occurs while generating the link
"""
return self._user_manager.generate_email_action_link(
'PASSWORD_RESET', email, action_code_settings=action_code_settings)
def generate_email_verification_link(self, email, action_code_settings=None):
"""Generates the out-of-band email action link for email verification flows for the
specified email address.
Args:
email: The email of the user to be verified.
action_code_settings: ``ActionCodeSettings`` instance (optional). Defines whether
the link is to be handled by a mobile app and the additional state information to
be passed in the deep link.
Returns:
link: The email verification link created by the API
Raises:
ValueError: If the provided arguments are invalid
UserNotFoundError: If no user exists for the specified email address.
FirebaseError: If an error occurs while generating the link
"""
return self._user_manager.generate_email_action_link(
'VERIFY_EMAIL', email, action_code_settings=action_code_settings)
def generate_sign_in_with_email_link(self, email, action_code_settings):
"""Generates the out-of-band email action link for email link sign-in flows, using the
action code settings provided.
Args:
email: The email of the user signing in.
action_code_settings: ``ActionCodeSettings`` instance. Defines whether
the link is to be handled by a mobile app and the additional state information to be
passed in the deep link.
Returns:
link: The email sign-in link created by the API
Raises:
ValueError: If the provided arguments are invalid
FirebaseError: If an error occurs while generating the link
"""
return self._user_manager.generate_email_action_link(
'EMAIL_SIGNIN', email, action_code_settings=action_code_settings)
def get_oidc_provider_config(self, provider_id):
"""Returns the ``OIDCProviderConfig`` with the given ID.
Args:
provider_id: Provider ID string.
Returns:
SAMLProviderConfig: An OIDC provider config instance.
Raises:
ValueError: If the provider ID is invalid, empty or does not have ``oidc.`` prefix.
ConfigurationNotFoundError: If no OIDC provider is available with the given identifier.
FirebaseError: If an error occurs while retrieving the OIDC provider.
"""
return self._provider_manager.get_oidc_provider_config(provider_id)
def create_oidc_provider_config(
self, provider_id, client_id, issuer, display_name=None, enabled=None,
client_secret=None, id_token_response_type=None, code_response_type=None):
"""Creates a new OIDC provider config from the given parameters.
OIDC provider support requires Google Cloud's Identity Platform (GCIP). To learn more about
GCIP, including pricing and features, see https://cloud.google.com/identity-platform.
Args:
provider_id: Provider ID string. Must have the prefix ``oidc.``.
client_id: Client ID of the new config.
issuer: Issuer of the new config. Must be a valid URL.
display_name: The user-friendly display name to the current configuration (optional).
This name is also used as the provider label in the Cloud Console.
enabled: A boolean indicating whether the provider configuration is enabled or disabled
(optional). A user cannot sign in using a disabled provider.
client_secret: A string which sets the client secret for the new provider.
This is required for the code flow.
code_response_type: A boolean which sets whether to enable the code response flow for
the new provider. By default, this is not enabled if no response type is
specified. A client secret must be set for this response type.
Having both the code and ID token response flows is currently not supported.
id_token_response_type: A boolean which sets whether to enable the ID token response
flow for the new provider. By default, this is enabled if no response type is
specified.
Having both the code and ID token response flows is currently not supported.
Returns:
OIDCProviderConfig: The newly created OIDC provider config instance.
Raises:
ValueError: If any of the specified input parameters are invalid.
FirebaseError: If an error occurs while creating the new OIDC provider config.
"""
return self._provider_manager.create_oidc_provider_config(
provider_id, client_id=client_id, issuer=issuer, display_name=display_name,
enabled=enabled, client_secret=client_secret,
id_token_response_type=id_token_response_type, code_response_type=code_response_type)
def update_oidc_provider_config(
self, provider_id, client_id=None, issuer=None, display_name=None, enabled=None,
client_secret=None, id_token_response_type=None, code_response_type=None):
"""Updates an existing OIDC provider config with the given parameters.
Args:
provider_id: Provider ID string. Must have the prefix ``oidc.``.
client_id: Client ID of the new config (optional).
issuer: Issuer of the new config (optional). Must be a valid URL.
display_name: The user-friendly display name to the current configuration (optional).
Pass ``auth.DELETE_ATTRIBUTE`` to delete the current display name.
enabled: A boolean indicating whether the provider configuration is enabled or disabled
(optional).
client_secret: A string which sets the client secret for the new provider.
This is required for the code flow.
code_response_type: A boolean which sets whether to enable the code response flow for
the new provider. By default, this is not enabled if no response type is specified.
A client secret must be set for this response type.
Having both the code and ID token response flows is currently not supported.
id_token_response_type: A boolean which sets whether to enable the ID token response
flow for the new provider. By default, this is enabled if no response type is
specified.
Having both the code and ID token response flows is currently not supported.
Returns:
OIDCProviderConfig: The updated OIDC provider config instance.
Raises:
ValueError: If any of the specified input parameters are invalid.
FirebaseError: If an error occurs while updating the OIDC provider config.
"""
return self._provider_manager.update_oidc_provider_config(
provider_id, client_id=client_id, issuer=issuer, display_name=display_name,
enabled=enabled, client_secret=client_secret,
id_token_response_type=id_token_response_type, code_response_type=code_response_type)
def delete_oidc_provider_config(self, provider_id):
"""Deletes the ``OIDCProviderConfig`` with the given ID.
Args:
provider_id: Provider ID string.
Raises:
ValueError: If the provider ID is invalid, empty or does not have ``oidc.`` prefix.
ConfigurationNotFoundError: If no OIDC provider is available with the given identifier.
FirebaseError: If an error occurs while deleting the OIDC provider.
"""
self._provider_manager.delete_oidc_provider_config(provider_id)
def list_oidc_provider_configs(
self, page_token=None, max_results=_auth_providers.MAX_LIST_CONFIGS_RESULTS):
"""Retrieves a page of OIDC provider configs from a Firebase project.
The ``page_token`` argument governs the starting point of the page. The ``max_results``
argument governs the maximum number of configs that may be included in the returned
page. This function never returns ``None``. If there are no OIDC configs in the Firebase
project, this returns an empty page.
Args:
page_token: A non-empty page token string, which indicates the starting point of the
page (optional). Defaults to ``None``, which will retrieve the first page of users.
max_results: A positive integer indicating the maximum number of users to include in
the returned page (optional). Defaults to 100, which is also the maximum number
allowed.
Returns:
ListProviderConfigsPage: A page of OIDC provider config instances.
Raises:
ValueError: If ``max_results`` or ``page_token`` are invalid.
FirebaseError: If an error occurs while retrieving the OIDC provider configs.
"""
return self._provider_manager.list_oidc_provider_configs(page_token, max_results)
def get_saml_provider_config(self, provider_id):
"""Returns the ``SAMLProviderConfig`` with the given ID.
Args:
provider_id: Provider ID string.
Returns:
SAMLProviderConfig: A SAML provider config instance.
Raises:
ValueError: If the provider ID is invalid, empty or does not have ``saml.`` prefix.
ConfigurationNotFoundError: If no SAML provider is available with the given identifier.
FirebaseError: If an error occurs while retrieving the SAML provider.
"""
return self._provider_manager.get_saml_provider_config(provider_id)
def create_saml_provider_config(
self, provider_id, idp_entity_id, sso_url, x509_certificates, rp_entity_id,
callback_url, display_name=None, enabled=None):
"""Creates a new SAML provider config from the given parameters.
SAML provider support requires Google Cloud's Identity Platform (GCIP). To learn more about
GCIP, including pricing and features, see https://cloud.google.com/identity-platform.
Args:
provider_id: Provider ID string. Must have the prefix ``saml.``.
idp_entity_id: The SAML IdP entity identifier.
sso_url: The SAML IdP SSO URL. Must be a valid URL.
x509_certificates: The list of SAML IdP X.509 certificates issued by CA for this
provider. Multiple certificates are accepted to prevent outages during IdP key
rotation (for example ADFS rotates every 10 days). When the Auth server receives a
SAML response, it will match the SAML response with the certificate on record.
Otherwise the response is rejected. Developers are expected to manage the
certificate updates as keys are rotated.
rp_entity_id: The SAML relying party (service provider) entity ID. This is defined by
the developer but needs to be provided to the SAML IdP.
callback_url: Callback URL string. This is fixed and must always be the same as the
OAuth redirect URL provisioned by Firebase Auth, unless a custom authDomain is
used.
display_name: The user-friendly display name to the current configuration (optional).
This name is also used as the provider label in the Cloud Console.
enabled: A boolean indicating whether the provider configuration is enabled or disabled
(optional). A user cannot sign in using a disabled provider.
Returns:
SAMLProviderConfig: The newly created SAML provider config instance.
Raises:
ValueError: If any of the specified input parameters are invalid.
FirebaseError: If an error occurs while creating the new SAML provider config.
"""
return self._provider_manager.create_saml_provider_config(
provider_id, idp_entity_id=idp_entity_id, sso_url=sso_url,
x509_certificates=x509_certificates, rp_entity_id=rp_entity_id,
callback_url=callback_url, display_name=display_name, enabled=enabled)
def update_saml_provider_config(
self, provider_id, idp_entity_id=None, sso_url=None, x509_certificates=None,
rp_entity_id=None, callback_url=None, display_name=None, enabled=None):
"""Updates an existing SAML provider config with the given parameters.
Args:
provider_id: Provider ID string. Must have the prefix ``saml.``.
idp_entity_id: The SAML IdP entity identifier (optional).
sso_url: The SAML IdP SSO URL. Must be a valid URL (optional).
x509_certificates: The list of SAML IdP X.509 certificates issued by CA for this
provider (optional).
rp_entity_id: The SAML relying party entity ID (optional).
callback_url: Callback URL string (optional).
display_name: The user-friendly display name of the current configuration (optional).
Pass ``auth.DELETE_ATTRIBUTE`` to delete the current display name.
enabled: A boolean indicating whether the provider configuration is enabled or disabled
(optional).
Returns:
SAMLProviderConfig: The updated SAML provider config instance.
Raises:
ValueError: If any of the specified input parameters are invalid.
FirebaseError: If an error occurs while updating the SAML provider config.
"""
return self._provider_manager.update_saml_provider_config(
provider_id, idp_entity_id=idp_entity_id, sso_url=sso_url,
x509_certificates=x509_certificates, rp_entity_id=rp_entity_id,
callback_url=callback_url, display_name=display_name, enabled=enabled)
def delete_saml_provider_config(self, provider_id):
"""Deletes the ``SAMLProviderConfig`` with the given ID.
Args:
provider_id: Provider ID string.
Raises:
ValueError: If the provider ID is invalid, empty or does not have ``saml.`` prefix.
ConfigurationNotFoundError: If no SAML provider is available with the given identifier.
FirebaseError: If an error occurs while deleting the SAML provider.
"""
self._provider_manager.delete_saml_provider_config(provider_id)
def list_saml_provider_configs(
self, page_token=None, max_results=_auth_providers.MAX_LIST_CONFIGS_RESULTS):
"""Retrieves a page of SAML provider configs from a Firebase project.
The ``page_token`` argument governs the starting point of the page. The ``max_results``
argument governs the maximum number of configs that may be included in the returned
page. This function never returns ``None``. If there are no SAML configs in the Firebase
project, this returns an empty page.
Args:
page_token: A non-empty page token string, which indicates the starting point of the
page (optional). Defaults to ``None``, which will retrieve the first page of users.
max_results: A positive integer indicating the maximum number of users to include in
the returned page (optional). Defaults to 100, which is also the maximum number
allowed.
Returns:
ListProviderConfigsPage: A page of SAML provider config instances.
Raises:
ValueError: If ``max_results`` or ``page_token`` are invalid.
FirebaseError: If an error occurs while retrieving the SAML provider configs.
"""
return self._provider_manager.list_saml_provider_configs(page_token, max_results)
def _check_jwt_revoked_or_disabled(self, verified_claims, exc_type, label):
user = self.get_user(verified_claims.get('uid'))
if user.disabled:
raise _auth_utils.UserDisabledError('The user record is disabled.')
if verified_claims.get('iat') * 1000 < user.tokens_valid_after_timestamp:
raise exc_type('The Firebase {0} has been revoked.'.format(label))