Skip to content
This repository was archived by the owner on Jun 1, 2023. It is now read-only.

Commit 240b4f2

Browse files
committed
MAde sure oidcrp works with oidcservice 0.6.4
1 parent 1d34b9a commit 240b4f2

8 files changed

Lines changed: 567 additions & 166 deletions

File tree

flask_rp/application.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
from flask.app import Flask
44

55
from cryptojwt.key_jar import init_key_jar
6-
from oidcservice.service_factory import service_factory
76

87
from oidcrp import RPHandler
98

@@ -27,8 +26,7 @@ def init_oidc_rp_handler(app):
2726
keyjar=_kj, jwks_path=_path,
2827
client_configs=app.config.get('CLIENTS'),
2928
services=app.config.get('SERVICES'),
30-
verify_ssl=verify_ssl, service_factory=service_factory,
31-
module_dirs=['oidc'])
29+
verify_ssl=verify_ssl)
3230

3331
return rph
3432

flask_rp/conf.yaml

Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
BASEURL: "https://127.0.0.1:8090"
2+
3+
# If BASE is https these has to be specified
4+
SERVER_CERT: "certs/cert.pem"
5+
SERVER_KEY: "certs/key.pem"
6+
CA_BUNDLE: ''
7+
8+
# This is just for testing an local usage. In all other cases it MUST be True
9+
VERIFY_SSL: false
10+
11+
KEYDEFS: &keydef
12+
-
13+
"type": "RSA"
14+
"key": ''
15+
"use": ["sig"]
16+
-
17+
"type": "EC"
18+
"crv": "P-256"
19+
"use": ["sig"]
20+
21+
HTML_HOME: 'html'
22+
SECRET_KEY: 'secret_key'
23+
SESSION_COOKIE_NAME: 'rp_session'
24+
PREFERRED_URL_SCHEME: 'https'
25+
26+
OIDC_KEYS:
27+
'private_path': "./priv/jwks.json"
28+
'key_defs': *keydef
29+
'public_path': './static/jwks.json'
30+
31+
PUBLIC_JWKS_PATH: 'https://127.0.0.1:8090/static/jwks.json'
32+
33+
client_preferences: &id001
34+
application_name: rphandler
35+
application_type: web
36+
contacts: [ops@example.com]
37+
response_types: [code]
38+
scope: [openid, profile, email, address, phone]
39+
token_endpoint_auth_method: [client_secret_basic, client_secret_post]
40+
41+
services: &id002
42+
discovery:
43+
class: oidcservice.rp.provider_info_discovery.ProviderInfoDiscovery
44+
kwargs: {}
45+
registration:
46+
class: oidcservice.rp.registration.Registration
47+
kwargs: {}
48+
authorization:
49+
class: oidcservice.oidc.authorization.Authorization
50+
kwargs: {}
51+
accesstoken:
52+
class: oidcservice.oidc.accesstoken.Accesstoken
53+
kwargs: {}
54+
refresh_accesstoken:
55+
class: oidcservice.oidc.refresh_access_token.RefreshAccessToken
56+
kwargs: {}
57+
userinfo:
58+
class: oidcservice.oidc.userinfo.UserInfo
59+
kwargs: {}
60+
end_session:
61+
class: oidcservice.oidc.session.EndSession
62+
kwargs: {}
63+
64+
65+
client:
66+
bobcat:
67+
client_id: client3
68+
client_preferences:
69+
response_types: [code]
70+
scope: [openid, offline_access]
71+
token_endpoint_auth_method: client_secret_basic
72+
client_secret: '2222222222222222222222222222222222222222'
73+
issuer: https://127.0.0.1:8443/
74+
redirect_uris: [['https://127.0.0.1:8090/authz_cb/bobcat', '']]
75+
services:
76+
authorization:
77+
class: oidcservice.oidc.authorization.Authorization
78+
kwargs: {}
79+
accesstoken:
80+
class: oidcservice.oidc.accesstoken.Accesstoken
81+
kwargs: {}
82+
discovery:
83+
class: oidcservice.rp.provider_info_discovery.ProviderInfoDiscovery
84+
kwargs: {}
85+
refresh_accesstoken:
86+
class: oidcservice.oidc.refresh_access_token.RefreshAccessToken
87+
kwargs: {}
88+
filip:
89+
backchannel_logout_uri: https://127.0.0.1:8090/bc_logout
90+
client_preferences: *id001
91+
issuer: https://guarded-cliffs-8635.herokuapp.com/
92+
post_logout_redirect_uris: ['https://127.0.0.1:8090/session_logout']
93+
redirect_uris: ['https://127.0.0.1:8090/authz_cb/filip']
94+
services: *id002
95+
filip_local:
96+
backchannel_logout_uri: https://127.0.0.1:8090/bc_logout
97+
client_preferences: *id001
98+
issuer: http://localhost:3000/
99+
post_logout_redirect_uris: ['https://127.0.0.1:8090/session_logout']
100+
redirect_uris: ['https://127.0.0.1:8090/authz_cb/filip_local']
101+
services: *id002
102+
flop:
103+
backchannel_logout_uri: https://127.0.0.1:8090/bc_logout/flop
104+
client_preferences: *id001
105+
issuer: https://127.0.0.1:5000/
106+
post_logout_redirect_uris: ['https://127.0.0.1:8090/session_logout']
107+
redirect_uris: ['https://127.0.0.1:8090/authz_cb/flop']
108+
services: *id002
109+
110+
# Whether an attempt to fetch the userinfo should be made
111+
USERINFO: true

0 commit comments

Comments
 (0)