Source code for oauth_dropins.medium

"""Medium OAuth drop-in.

API docs:
https://github.com/Medium/medium-api-docs#contents
https://medium.com/developers/welcome-to-the-medium-api-3418f956552

Medium doesn't let you use a localhost redirect URL. :/ A common workaround is
to map an arbitrary host to localhost in your /etc/hosts, e.g.:

127.0.0.1 my.dev.com

You can then test on your local machine by running dev_appserver and opening
http://my.dev.com:8080/ instead of http://localhost:8080/ .
"""
import logging
import urllib.parse

from flask import request
from google.cloud import ndb

from . import views
from .models import BaseAuth
from .webutil import flask_util, util
from .webutil.util import json_dumps, json_loads

logger = logging.getLogger(__name__)

MEDIUM_CLIENT_ID = util.read('medium_client_id')
MEDIUM_CLIENT_SECRET = util.read('medium_client_secret')

# URL templates. Can't (easily) use urlencode() because I want to keep the
# %(...)s placeholders as is and fill them in later in code.
GET_AUTH_CODE_URL = '&'.join((
  'https://medium.com/m/oauth/authorize?'
  'client_id=%(client_id)s',
  # https://github.com/Medium/medium-api-docs#user-content-21-browser-based-authentication
  # basicProfile, listPublications, publishPost, uploadImage
  'scope=%(scope)s',
  # redirect_uri here must be the same in the access token request!
  'redirect_uri=%(redirect_uri)s',
  'state=%(state)s',
  'response_type=code',
))

API_BASE = 'https://api.medium.com/v1/'
GET_ACCESS_TOKEN_URL = API_BASE + 'tokens'
API_USER_URL = API_BASE + 'me'


[docs] class MediumAuth(BaseAuth): """An authenticated Medium user. Provides methods that return information about this user and make OAuth-signed requests to the Medium REST API. Stores OAuth credentials in the datastore. See models.BaseAuth for usage details. Medium-specific details: implements get() but not urlopen() or api(). The key name is the user id (*not* username). """ access_token_str = ndb.StringProperty(required=True) user_json = ndb.TextProperty() # used by bridgy in # https://github.com/snarfed/bridgy/commit/58cce60790e746d300e7e5dac331543c56bd9108 # background: https://github.com/snarfed/bridgy/issues/506 publications_json = ndb.TextProperty()
[docs] def site_name(self): return 'Medium'
[docs] def user_display_name(self): """Returns the user's full name or username. """ if self.user_json: data = json_loads(self.user_json).get('data') if data: return data.get('name') or data.get('username') return self.key_id()
[docs] def access_token(self): """Returns the OAuth access token string. """ return self.access_token_str
[docs] def get(self, *args, **kwargs): """Wraps requests.get() and adds the Bearer token header. """ headers = kwargs.setdefault('headers', {}) headers['Authorization'] = 'Bearer ' + self.access_token_str resp = util.requests_get(*args, **kwargs) try: resp.raise_for_status() except BaseException as e: util.interpret_http_exception(e) raise return resp
[docs] class Start(views.Start): """Starts Medium auth. Requests an auth code and expects a redirect back. """ NAME = 'medium' LABEL = 'Medium' DEFAULT_SCOPE = 'basicProfile'
[docs] def redirect_url(self, state=None): assert MEDIUM_CLIENT_ID and MEDIUM_CLIENT_SECRET, \ "Please fill in the medium_client_id and medium_client_secret files in your app's root directory." return GET_AUTH_CODE_URL % { 'client_id': MEDIUM_CLIENT_ID, 'redirect_uri': urllib.parse.quote_plus(self.to_url()), # Medium requires non-empty state 'state': urllib.parse.quote_plus(state or 'unused'), 'scope': self.scope, }
[docs] class Callback(views.Callback): """The OAuth callback. Fetches an access token and stores it. """
[docs] def dispatch_request(self): # handle errors error = request.values.get('error') if error: if error == 'access_denied': logger.info('User declined') return self.finish(None, state=request.values.get('state')) else: flask_util.error(error) # extract auth code and request access token auth_code = request.values['code'] data = { 'code': auth_code, 'client_id': MEDIUM_CLIENT_ID, 'client_secret': MEDIUM_CLIENT_SECRET, # redirect_uri here must be the same in the oauth code request! # (the value here doesn't actually matter since it's requested server side.) 'redirect_uri': request.base_url, 'grant_type': 'authorization_code', } resp = util.requests_post(GET_ACCESS_TOKEN_URL, data=data) resp.raise_for_status() logger.debug(f'Access token response: {resp.text}') try: resp = json_loads(resp.text) except: logger.error('Could not decode JSON', exc_info=True) raise errors = resp.get('errors') or resp.get('error') if errors: logger.info(f'Errors: {errors}') flask_util.error(errors[0].get('message')) # TODO: handle refresh token access_token = resp['access_token'] user_json = MediumAuth(access_token_str=access_token).get(API_USER_URL).text id = json_loads(user_json)['data']['id'] auth = MediumAuth(id=id, access_token_str=access_token, user_json=user_json) auth.put() return self.finish(auth, state=request.values.get('state'))