Skip to content

feat: deprecate OAuth out-of-band flow #175

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Feb 24, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
78 changes: 53 additions & 25 deletions google_auth_oauthlib/flow.py
Original file line number Diff line number Diff line change
Expand Up @@ -15,46 +15,44 @@
"""OAuth 2.0 Authorization Flow

This module provides integration with `requests-oauthlib`_ for running the
`OAuth 2.0 Authorization Flow`_ and acquiring user credentials.
`OAuth 2.0 Authorization Flow`_ and acquiring user credentials. See
`Using OAuth 2.0 to Access Google APIs`_ for an overview of OAuth 2.0
authorization scenarios Google APIs support.

Here's an example of using :class:`Flow` with the installed application
authorization flow::
Here's an example of using :class:`InstalledAppFlow`::

from google_auth_oauthlib.flow import Flow
from google_auth_oauthlib.flow import InstalledAppFlow

# Create the flow using the client secrets file from the Google API
# Console.
flow = Flow.from_client_secrets_file(
'path/to/client_secrets.json',
scopes=['profile', 'email'],
redirect_uri='urn:ietf:wg:oauth:2.0:oob')
flow = InstalledAppFlow.from_client_secrets_file(
'client_secrets.json',
scopes=['profile', 'email'])

# Tell the user to go to the authorization URL.
auth_url, _ = flow.authorization_url(prompt='consent')

print('Please go to this URL: {}'.format(auth_url))

# The user will get an authorization code. This code is used to get the
# access token.
code = input('Enter the authorization code: ')
flow.fetch_token(code=code)
flow.run_local_server()

# You can use flow.credentials, or you can just get a requests session
# using flow.authorized_session.
session = flow.authorized_session()
print(session.get('https://www.googleapis.com/userinfo/v2/me').json())

This particular flow can be handled entirely by using
:class:`InstalledAppFlow`.
profile_info = session.get(
'https://www.googleapis.com/userinfo/v2/me').json()

print(profile_info)
# {'name': '...', 'email': '...', ...}

.. _requests-oauthlib: http://requests-oauthlib.readthedocs.io/en/stable/
.. _OAuth 2.0 Authorization Flow:
https://tools.ietf.org/html/rfc6749#section-1.2
.. _Using OAuth 2.0 to Access Google APIs:
https://developers.google.com/identity/protocols/oauth2

"""
from base64 import urlsafe_b64encode
import hashlib
import json
import logging
import warnings

try:
from secrets import SystemRandom
Expand All @@ -72,6 +70,11 @@


_LOGGER = logging.getLogger(__name__)
_OOB_REDIRECT_URIS = [
"urn:ietf:wg:oauth:2.0:oob",
"urn:ietf:wg:oauth:2.0:oob:auto",
"oob",
]


class Flow(object):
Expand Down Expand Up @@ -211,6 +214,17 @@ def redirect_uri(self):

@redirect_uri.setter
def redirect_uri(self, value):
if value in _OOB_REDIRECT_URIS:
warnings.warn(
"'{}' is an OOB redirect URI. The OAuth out-of-band (OOB) flow is deprecated. "
"New clients will be unable to use this flow starting on Feb 28, 2022. "
"This flow will be deprecated for all clients on Oct 3, 2022. "
"Migrate to an alternative flow. "
"See https://developers.googleblog.com/2022/02/making-oauth-flows-safer.html?m=1#disallowed-oob".format(
value
),
DeprecationWarning,
)
self.oauth2session.redirect_uri = value

def authorization_url(self, **kwargs):
Expand Down Expand Up @@ -325,9 +339,7 @@ class InstalledAppFlow(Flow):
local development or applications that are installed on a desktop operating
system.

This flow has two strategies: The console strategy provided by
:meth:`run_console` and the local server strategy provided by
:meth:`run_local_server`.
This flow uses a local server strategy provided by :meth:`run_local_server`.

Example::

Expand All @@ -348,8 +360,8 @@ class InstalledAppFlow(Flow):
# {'name': '...', 'email': '...', ...}


Note that these aren't the only two ways to accomplish the installed
application flow, they are just the most common ways. You can use the
Note that this isn't the only way to accomplish the installed
application flow, just one of the most common. You can use the
:class:`Flow` class to perform the same flow with different methods of
presenting the authorization URL to the user or obtaining the authorization
response, such as using an embedded web view.
Expand Down Expand Up @@ -381,6 +393,15 @@ def run_console(
):
"""Run the flow using the console strategy.

.. deprecated:: 0.5.0
Use :meth:`run_local_server` instead.

The OAuth out-of-band (OOB) flow is deprecated. New clients will be unable to
use this flow starting on Feb 28, 2022. This flow will be deprecated
for all clients on Oct 3, 2022. Migrate to an alternative flow.

See https://developers.googleblog.com/2022/02/making-oauth-flows-safer.html?m=1#disallowed-oob"

The console strategy instructs the user to open the authorization URL
in their browser. Once the authorization is complete the authorization
server will give the user a code. The user then must copy & paste this
Expand All @@ -399,6 +420,13 @@ def run_console(
for the user.
"""
kwargs.setdefault("prompt", "consent")
warnings.warn(
"New clients will be unable to use `InstalledAppFlow.run_console` "
"starting on Feb 28, 2022. All clients will be unable to use this method starting on Oct 3, 2022. "
"Use `InstalledAppFlow.run_local_server` instead. For details on the OOB flow deprecation, "
"see https://developers.googleblog.com/2022/02/making-oauth-flows-safer.html?m=1#disallowed-oob",
DeprecationWarning,
)

self.redirect_uri = self._OOB_REDIRECT_URI

Expand Down
18 changes: 17 additions & 1 deletion tests/unit/test_flow.py
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,20 @@ def test_from_client_secrets_file_with_redirect_uri(self):
== mock.sentinel.redirect_uri
)

def test_from_client_secrets_file_with_oob_redirect_uri(self):
with pytest.deprecated_call():
instance = flow.Flow.from_client_secrets_file(
CLIENT_SECRETS_FILE,
scopes=mock.sentinel.scopes,
redirect_uri="urn:ietf:wg:oauth:2.0:oob",
)

assert (
instance.redirect_uri
== instance.oauth2session.redirect_uri
== "urn:ietf:wg:oauth:2.0:oob"
)

def test_from_client_config_installed(self):
client_config = {"installed": CLIENT_SECRETS_INFO["web"]}
instance = flow.Flow.from_client_config(
Expand Down Expand Up @@ -286,7 +300,9 @@ def set_token(*args, **kwargs):
def test_run_console(self, input_mock, instance, mock_fetch_token):
input_mock.return_value = mock.sentinel.code
instance.code_verifier = "amanaplanacanalpanama"
credentials = instance.run_console()

with pytest.deprecated_call():
credentials = instance.run_console()

assert credentials.token == mock.sentinel.access_token
assert credentials._refresh_token == mock.sentinel.refresh_token
Expand Down