Source code for runway.hooks.staticsite.auth_at_edge.client_updater

"""User Pool Client Updater.

Responsible for updating the User Pool Client with the generated
distribution url + callback url paths.

# pylint: disable=unused-argument
import logging
from typing import TYPE_CHECKING, Any, Dict, List, Optional  # noqa pylint: disable=W

    from ....cfngin.context import Context  # pylint: disable=W
    from ....cfngin.providers.base import BaseProvider  # pylint: disable=W

LOGGER = logging.getLogger(__name__)

[docs]def get_redirect_uris(domains, redirect_path_sign_in, redirect_path_sign_out): # type: (List[str], str, str) -> Dict[str, Any] """Create dict of redirect URIs for AppClient.""" return { "sign_in": ["%s%s" % (domain, redirect_path_sign_in) for domain in domains], "sign_out": ["%s%s" % (domain, redirect_path_sign_out) for domain in domains], }
[docs]def update(context, provider, **kwargs): # type: (Context, BaseProvider, Optional[Dict[str, Any]]) -> bool """Update the callback urls for the User Pool Client. Required to match the redirect_uri being sent which contains our distribution and alternate domain names. Args: context (:class:`runway.cfngin.context.Context`): The context instance. provider (:class:`runway.cfngin.providers.base.BaseProvider`): The provider instance. Keyword Args: alternate_domains (List[str]): A list of any alternate domains that need to be listed with the primary distribution domain. redirect_path_sign_in (str): The redirect path after sign in. redirect_path_sign_out (str): The redirect path after sign out. oauth_scopes (List[str]): A list of all available validation scopes for oauth. """ session = context.get_session() cognito_client = session.client("cognito-idp") # Combine alternate domains with main distribution redirect_domains = kwargs["alternate_domains"] + [ "https://" + kwargs["distribution_domain"] ] # Create a list of all domains with their redirect paths redirect_uris = get_redirect_uris( redirect_domains, kwargs["redirect_path_sign_in"], kwargs["redirect_path_sign_out"], ) # Update the user pool client try: cognito_client.update_user_pool_client( AllowedOAuthScopes=kwargs["oauth_scopes"], AllowedOAuthFlows=["code"], SupportedIdentityProviders=kwargs["supported_identity_providers"], AllowedOAuthFlowsUserPoolClient=True, ClientId=kwargs["client_id"], CallbackURLs=redirect_uris["sign_in"], LogoutURLs=redirect_uris["sign_out"], UserPoolId=context.hook_data["aae_user_pool_id_retriever"]["id"], ) return True except Exception: # pylint: disable=broad-except LOGGER.exception("unable to update user pool client callback urls") return False