|
| 1 | +import base64 |
| 2 | +import logging |
| 3 | +from typing import Dict, List |
| 4 | + |
| 5 | +from databricks.sql.auth.oauth import OAuthManager |
| 6 | + |
| 7 | +# Private API: this is an evolving interface and it will change in the future. |
| 8 | +# Please must not depend on it in your applications. |
| 9 | +from databricks.sql.experimental.oauth_persistence import OAuthToken, OAuthPersistence |
| 10 | + |
| 11 | + |
| 12 | +class AuthProvider: |
| 13 | + def add_headers(self, request_headers: Dict[str, str]): |
| 14 | + pass |
| 15 | + |
| 16 | + |
| 17 | +# Private API: this is an evolving interface and it will change in the future. |
| 18 | +# Please must not depend on it in your applications. |
| 19 | +class AccessTokenAuthProvider(AuthProvider): |
| 20 | + def __init__(self, access_token: str): |
| 21 | + self.__authorization_header_value = "Bearer {}".format(access_token) |
| 22 | + |
| 23 | + def add_headers(self, request_headers: Dict[str, str]): |
| 24 | + request_headers["Authorization"] = self.__authorization_header_value |
| 25 | + |
| 26 | + |
| 27 | +# Private API: this is an evolving interface and it will change in the future. |
| 28 | +# Please must not depend on it in your applications. |
| 29 | +class BasicAuthProvider(AuthProvider): |
| 30 | + def __init__(self, username: str, password: str): |
| 31 | + auth_credentials = f"{username}:{password}".encode("UTF-8") |
| 32 | + auth_credentials_base64 = base64.standard_b64encode(auth_credentials).decode( |
| 33 | + "UTF-8" |
| 34 | + ) |
| 35 | + |
| 36 | + self.__authorization_header_value = f"Basic {auth_credentials_base64}" |
| 37 | + |
| 38 | + def add_headers(self, request_headers: Dict[str, str]): |
| 39 | + request_headers["Authorization"] = self.__authorization_header_value |
| 40 | + |
| 41 | + |
| 42 | +# Private API: this is an evolving interface and it will change in the future. |
| 43 | +# Please must not depend on it in your applications. |
| 44 | +class DatabricksOAuthProvider(AuthProvider): |
| 45 | + SCOPE_DELIM = " " |
| 46 | + |
| 47 | + def __init__( |
| 48 | + self, |
| 49 | + hostname: str, |
| 50 | + oauth_persistence: OAuthPersistence, |
| 51 | + redirect_port_range: List[int], |
| 52 | + client_id: str, |
| 53 | + scopes: List[str], |
| 54 | + ): |
| 55 | + try: |
| 56 | + self.oauth_manager = OAuthManager( |
| 57 | + port_range=redirect_port_range, client_id=client_id |
| 58 | + ) |
| 59 | + self._hostname = hostname |
| 60 | + self._scopes_as_str = DatabricksOAuthProvider.SCOPE_DELIM.join(scopes) |
| 61 | + self._oauth_persistence = oauth_persistence |
| 62 | + self._client_id = client_id |
| 63 | + self._access_token = None |
| 64 | + self._refresh_token = None |
| 65 | + self._initial_get_token() |
| 66 | + except Exception as e: |
| 67 | + logging.error(f"unexpected error", e, exc_info=True) |
| 68 | + raise e |
| 69 | + |
| 70 | + def add_headers(self, request_headers: Dict[str, str]): |
| 71 | + self._update_token_if_expired() |
| 72 | + request_headers["Authorization"] = f"Bearer {self._access_token}" |
| 73 | + |
| 74 | + def _initial_get_token(self): |
| 75 | + try: |
| 76 | + if self._access_token is None or self._refresh_token is None: |
| 77 | + if self._oauth_persistence: |
| 78 | + token = self._oauth_persistence.read(self._hostname) |
| 79 | + if token: |
| 80 | + self._access_token = token.access_token |
| 81 | + self._refresh_token = token.refresh_token |
| 82 | + |
| 83 | + if self._access_token and self._refresh_token: |
| 84 | + self._update_token_if_expired() |
| 85 | + else: |
| 86 | + (access_token, refresh_token) = self.oauth_manager.get_tokens( |
| 87 | + hostname=self._hostname, scope=self._scopes_as_str |
| 88 | + ) |
| 89 | + self._access_token = access_token |
| 90 | + self._refresh_token = refresh_token |
| 91 | + self._oauth_persistence.persist( |
| 92 | + self._hostname, OAuthToken(access_token, refresh_token) |
| 93 | + ) |
| 94 | + except Exception as e: |
| 95 | + logging.error(f"unexpected error in oauth initialization", e, exc_info=True) |
| 96 | + raise e |
| 97 | + |
| 98 | + def _update_token_if_expired(self): |
| 99 | + try: |
| 100 | + ( |
| 101 | + fresh_access_token, |
| 102 | + fresh_refresh_token, |
| 103 | + is_refreshed, |
| 104 | + ) = self.oauth_manager.check_and_refresh_access_token( |
| 105 | + hostname=self._hostname, |
| 106 | + access_token=self._access_token, |
| 107 | + refresh_token=self._refresh_token, |
| 108 | + ) |
| 109 | + if not is_refreshed: |
| 110 | + return |
| 111 | + else: |
| 112 | + self._access_token = fresh_access_token |
| 113 | + self._refresh_token = fresh_refresh_token |
| 114 | + |
| 115 | + if self._oauth_persistence: |
| 116 | + token = OAuthToken(self._access_token, self._refresh_token) |
| 117 | + self._oauth_persistence.persist(self._hostname, token) |
| 118 | + except Exception as e: |
| 119 | + logging.error(f"unexpected error in oauth token update", e, exc_info=True) |
| 120 | + raise e |
0 commit comments