github-advanced-security[bot] commented on code in PR #38469:
URL: https://github.com/apache/superset/pull/38469#discussion_r2895286430


##########
superset/utils/oauth2.py:
##########
@@ -276,3 +276,102 @@
         if database.is_oauth2_enabled() and 
database.db_engine_spec.needs_oauth2(ex):
             database.db_engine_spec.start_oauth2_dance(database)
         raise
+
+
+def save_user_provider_token(
+    user_id: int,
+    provider: str,
+    token_response: dict[str, Any],
+) -> None:
+    """
+    Upsert an UpstreamOAuthToken row for the given user + provider.
+    """
+    from superset.models.core import UpstreamOAuthToken
+
+    token: UpstreamOAuthToken | None = (
+        db.session.query(UpstreamOAuthToken)
+        .filter_by(user_id=user_id, provider=provider)
+        .one_or_none()
+    )
+    if token is None:
+        token = UpstreamOAuthToken(user_id=user_id, provider=provider)
+
+    token.access_token = token_response.get("access_token")
+    expires_in = token_response.get("expires_in")
+    token.access_token_expiration = (
+        datetime.now() + timedelta(seconds=expires_in) if expires_in else None
+    )
+    token.refresh_token = token_response.get("refresh_token")
+    db.session.add(token)
+    db.session.commit()
+
+
+def get_upstream_provider_token(provider: str, user_id: int) -> str | None:
+    """
+    Retrieve a valid access token for the given provider and user.
+
+    If the token is expired and a refresh token exists, attempt to refresh it.
+    Returns None if no valid token is available.
+    """
+    from superset.models.core import UpstreamOAuthToken
+
+    token: UpstreamOAuthToken | None = (
+        db.session.query(UpstreamOAuthToken)
+        .filter_by(user_id=user_id, provider=provider)
+        .one_or_none()
+    )
+    if token is None:
+        return None
+
+    now = datetime.now()
+    if token.access_token_expiration and token.access_token_expiration > now:
+        return token.access_token
+
+    # Token is expired
+    if token.refresh_token:
+        return _refresh_upstream_provider_token(token, provider)
+
+    db.session.delete(token)
+    db.session.commit()
+    return None
+
+
+def _refresh_upstream_provider_token(
+    token: UpstreamOAuthToken,
+    provider: str,
+) -> str | None:
+    """
+    Use the refresh token to obtain a new access token from the provider.
+    Updates and persists the token if successful; deletes it on failure.
+    """
+    from flask import current_app as flask_app
+
+    try:
+        remote_app = 
flask_app.extensions["authlib.integrations.flask_client"][provider]
+        token_response = remote_app.fetch_access_token(
+            grant_type="refresh_token",
+            refresh_token=token.refresh_token,
+        )
+    except Exception:  # pylint: disable=broad-except
+        logger.warning(
+            "Failed to refresh upstream OAuth token for provider %s", 
provider, exc_info=True

Review Comment:
   ## Clear-text logging of sensitive information
   
   This expression logs [sensitive data (password)](1) as clear text.
   
   [Show more 
details](https://github.com/apache/superset/security/code-scanning/2255)



##########
superset/security/manager.py:
##########
@@ -480,6 +480,59 @@
             return self.get_guest_user_from_request(request)
         return None
 
+    def set_oauth_session(self, provider: str, oauth_response: dict[str, Any]) 
-> None:
+        """
+        Override to persist the full OAuth token response before FAB reduces 
it to
+        ``session["oauth"] = (access_token, secret)`` tuple.
+        """
+        # pylint: disable=import-outside-toplevel
+        from flask import session
+
+        super().set_oauth_session(provider, oauth_response)
+        # FAB stores only (access_token, secret) in session["oauth"].
+        # We need the full response (expires_in, refresh_token, …) for 
upstream forwarding.
+        session["oauth_full_token"] = dict(oauth_response)
+
+    def auth_user_oauth(self, userinfo: dict[str, Any]) -> Any:
+        """
+        Override to save the upstream OAuth token when a user logs in via 
OAuth.
+
+        If ``save_token: True`` is set in the matching OAUTH_PROVIDERS entry 
and
+        ``DATABASE_OAUTH2_UPSTREAM_PROVIDERS`` maps a database to this 
provider,
+        the token will be forwarded to that database instead of triggering a
+        separate OAuth2 dance.
+        """
+        # pylint: disable=import-outside-toplevel
+        from flask import current_app as flask_app, session
+
+        user = super().auth_user_oauth(userinfo)
+        if user:
+            provider = session.get("oauth_provider")
+            # Use the full token dict saved by set_oauth_session, not the
+            # (access_token, secret) tuple that FAB stores in session["oauth"].
+            token = session.get("oauth_full_token")
+            if token and provider:
+                provider_config = next(
+                    (
+                        p
+                        for p in flask_app.config.get("OAUTH_PROVIDERS", [])
+                        if p.get("name") == provider
+                    ),
+                    None,
+                )
+                if provider_config and provider_config.get("save_token"):
+                    from superset.utils.oauth2 import save_user_provider_token
+
+                    try:
+                        save_user_provider_token(user.id, provider, token)
+                    except Exception:  # pylint: disable=broad-except
+                        logger.warning(
+                            "Failed to save upstream OAuth token for provider 
%s",
+                            provider,

Review Comment:
   ## Clear-text logging of sensitive information
   
   This expression logs [sensitive data (password)](1) as clear text.
   
   [Show more 
details](https://github.com/apache/superset/security/code-scanning/2254)



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to