Files
GNX-mailEnterprise/venv/lib/python3.12/site-packages/allauth/socialaccount/providers/google/views.py
Iliyan Angelov c67067a2a4 Mail
2025-09-14 23:24:25 +03:00

67 lines
2.1 KiB
Python

from django.conf import settings
import jwt
from allauth.socialaccount.providers.oauth2.client import OAuth2Error
from allauth.socialaccount.providers.oauth2.views import (
OAuth2Adapter,
OAuth2CallbackView,
OAuth2LoginView,
)
from .provider import GoogleProvider
ACCESS_TOKEN_URL = (
getattr(settings, "SOCIALACCOUNT_PROVIDERS", {})
.get("google", {})
.get("ACCESS_TOKEN_URL", "https://oauth2.googleapis.com/token")
)
AUTHORIZE_URL = (
getattr(settings, "SOCIALACCOUNT_PROVIDERS", {})
.get("google", {})
.get("AUTHORIZE_URL", "https://accounts.google.com/o/oauth2/v2/auth")
)
ID_TOKEN_ISSUER = (
getattr(settings, "SOCIALACCOUNT_PROVIDERS", {})
.get("google", {})
.get("ID_TOKEN_ISSUER", "https://accounts.google.com")
)
class GoogleOAuth2Adapter(OAuth2Adapter):
provider_id = GoogleProvider.id
access_token_url = ACCESS_TOKEN_URL
authorize_url = AUTHORIZE_URL
id_token_issuer = ID_TOKEN_ISSUER
def complete_login(self, request, app, token, response, **kwargs):
try:
identity_data = jwt.decode(
response["id_token"],
# Since the token was received by direct communication
# protected by TLS between this library and Google, we
# are allowed to skip checking the token signature
# according to the OpenID Connect Core 1.0
# specification.
# https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
options={
"verify_signature": False,
"verify_iss": True,
"verify_aud": True,
"verify_exp": True,
},
issuer=self.id_token_issuer,
audience=app.client_id,
)
except jwt.PyJWTError as e:
raise OAuth2Error("Invalid id_token") from e
login = self.get_provider().sociallogin_from_response(request, identity_data)
return login
oauth2_login = OAuth2LoginView.adapter_view(GoogleOAuth2Adapter)
oauth2_callback = OAuth2CallbackView.adapter_view(GoogleOAuth2Adapter)