awacke1 commited on
Commit
a35b868
Β·
verified Β·
1 Parent(s): 5e96818

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +113 -119
app.py CHANGED
@@ -2,140 +2,134 @@ import os
2
  import streamlit as st
3
  import requests
4
  import msal
5
- import base64
6
- import hashlib
7
  import secrets
 
 
8
 
9
- # πŸ€“ Load environment variables (Ensure these are set!)
10
- APPLICATION_ID_KEY = os.getenv('APPLICATION_ID_KEY')
11
- CLIENT_SECRET_KEY = os.getenv('CLIENT_SECRET_KEY')
12
- AUTHORITY_URL = 'https://login.microsoftonline.com/common' # Use 'common' for multi-tenant apps
13
- REDIRECT_URI = 'https://huggingface.co/spaces/awacke1/MSGraphAPI' # Update this to match your app's redirect URI
 
14
 
15
- # 🎯 Define the scopes your app will need
16
- SCOPES = ['User.Read']
 
 
 
 
 
17
 
18
- # New function to generate PKCE code verifier and challenge
19
- def generate_pkce_codes():
20
- code_verifier = secrets.token_urlsafe(128)[:128]
21
- code_challenge = base64.urlsafe_b64encode(hashlib.sha256(code_verifier.encode()).digest()).decode().rstrip('=')
22
- return code_verifier, code_challenge
 
 
 
 
 
 
 
 
23
 
24
- # πŸ› οΈ Initialize the MSAL client for Public Client App (PKCE support)
25
- def get_msal_app():
26
- return msal.PublicClientApplication(
27
- client_id=APPLICATION_ID_KEY,
28
- authority=AUTHORITY_URL
 
29
  )
 
 
 
 
30
 
31
- # πŸ” Acquire access token using authorization code
32
- def get_access_token(code, code_verifier=None):
33
- client_instance = get_msal_app()
34
-
35
- st.write("Debug: MSAL App Configuration:")
36
- st.write(f"Client ID: {APPLICATION_ID_KEY[:5]}...")
37
- st.write(f"Authority: {AUTHORITY_URL}")
38
- st.write(f"Redirect URI: {REDIRECT_URI}")
39
-
40
- try:
41
- # Attempt to acquire token, use PKCE code_verifier if provided
42
- result = client_instance.acquire_token_by_authorization_code(
43
- code=code,
44
- scopes=SCOPES,
45
- redirect_uri=REDIRECT_URI,
46
- code_verifier=code_verifier # Include only if PKCE is enabled
47
- )
48
-
49
- if 'access_token' in result:
50
- return result['access_token']
51
- else:
52
- error_description = result.get('error_description', 'No error description provided')
53
- raise Exception(f"Error acquiring token: {error_description}")
54
- except Exception as e:
55
- st.error(f"Exception in get_access_token: {str(e)}")
56
- raise
57
 
58
- # πŸƒβ€β™‚οΈ Main function to process the query parameters and handle the token exchange
59
- def process_query_params():
60
- try:
61
- query_params = st.experimental_get_query_params()
62
- st.write("Debug: All query parameters:", query_params)
63
 
64
- if 'error' in query_params:
65
- error = query_params.get('error')
66
- error_description = query_params.get('error_description', 'No description provided')
67
- st.error(f"Authentication Error: {error}")
68
- st.error(f"Error Description: {error_description}")
69
- st.stop()
70
 
71
- if 'code' in query_params:
72
- code = query_params.get('code')[0] # MS Graph returns the code as a list
73
- st.write('πŸ”‘ Authorization Code Obtained:', code[:10] + '...')
74
-
75
- try:
76
- # Retrieve code_verifier from session state
77
- code_verifier = st.session_state.get('code_verifier')
78
- if not code_verifier:
79
- st.error("Code verifier not found in session state.")
80
- st.stop()
81
-
82
- # Acquire the access token
83
- access_token = get_access_token(code, code_verifier)
84
- st.session_state['access_token'] = access_token
85
- st.success("Access token acquired successfully!")
86
-
87
- # Clear the query parameters from the URL
88
- st.experimental_set_query_params()
89
- st.experimental_rerun()
90
- except Exception as e:
91
- st.error(f"Error acquiring access token: {str(e)}")
92
- st.stop()
93
- else:
94
- st.warning("No authorization code found in the query parameters.")
95
- except Exception as e:
96
- st.error(f"Error processing query parameters: {str(e)}")
97
- st.stop()
98
 
99
- # Main application function
100
- def main():
101
- st.title("πŸ¦„ MS Graph API with AI & Cloud Integration with M365")
 
 
102
 
103
- if 'access_token' not in st.session_state:
104
- if 'code_verifier' not in st.session_state:
105
- # Generate PKCE codes and store code_verifier in session
106
- code_verifier, code_challenge = generate_pkce_codes()
107
- st.session_state['code_verifier'] = code_verifier
108
- else:
109
- code_verifier = st.session_state['code_verifier']
110
- code_challenge = base64.urlsafe_b64encode(hashlib.sha256(code_verifier.encode()).digest()).decode().rstrip('=')
111
 
112
- # Get MSAL app and construct the authorization URL
113
- client_instance = get_msal_app()
114
- auth_url = client_instance.get_authorization_request_url(
115
- scopes=SCOPES,
116
- redirect_uri=REDIRECT_URI,
117
- code_challenge=code_challenge,
118
- code_challenge_method="S256"
119
- )
120
- st.write('πŸ‘‹ Please [click here]({}) to log in and authorize the app.'.format(auth_url))
121
- st.stop()
122
 
123
- # Process query parameters to acquire token
124
- process_query_params()
 
 
 
 
 
125
 
126
- # If access token is present, greet the user
127
- if 'access_token' in st.session_state:
128
- access_token = st.session_state['access_token']
129
- headers = {'Authorization': 'Bearer ' + access_token}
 
 
 
130
 
131
- response = requests.get('https://graph.microsoft.com/v1.0/me', headers=headers)
132
- if response.status_code == 200:
133
- user_info = response.json()
134
- st.write(f"πŸ‘‹ Hello, {user_info['displayName']}!")
135
- else:
136
- st.error("Failed to fetch user info.")
137
- st.write(response.text)
138
 
139
- # πŸš€ Run the main function
140
  if __name__ == "__main__":
141
- main()
 
2
  import streamlit as st
3
  import requests
4
  import msal
 
 
5
  import secrets
6
+ import time
7
+ from urllib.parse import urlencode
8
 
9
+ # Configuration
10
+ APPLICATION_ID = os.getenv('APPLICATION_ID_KEY')
11
+ CLIENT_SECRET = os.getenv('CLIENT_SECRET_KEY')
12
+ AUTHORITY = 'https://login.microsoftonline.com/common'
13
+ REDIRECT_URI = 'https://huggingface.co/spaces/awacke1/MSGraphAPI'
14
+ SCOPES = ['User.Read', 'Calendars.ReadWrite', 'Mail.ReadWrite']
15
 
16
+ # MSAL setup
17
+ def get_msal_app():
18
+ return msal.ConfidentialClientApplication(
19
+ client_id=APPLICATION_ID,
20
+ client_credential=CLIENT_SECRET,
21
+ authority=AUTHORITY
22
+ )
23
 
24
+ # Authentication functions
25
+ def generate_auth_url():
26
+ msal_app = get_msal_app()
27
+ state = secrets.token_urlsafe(32)
28
+ auth_url = msal_app.get_authorization_request_url(
29
+ scopes=SCOPES,
30
+ redirect_uri=REDIRECT_URI,
31
+ state=state
32
+ )
33
+ # Store the state in query params
34
+ new_query_params = st.query_params.to_dict()
35
+ new_query_params['auth_state'] = state
36
+ return f"{auth_url}&{urlencode(new_query_params)}"
37
 
38
+ def get_token_from_code(code):
39
+ msal_app = get_msal_app()
40
+ result = msal_app.acquire_token_by_authorization_code(
41
+ code=code,
42
+ scopes=SCOPES,
43
+ redirect_uri=REDIRECT_URI
44
  )
45
+ if 'access_token' in result:
46
+ return result
47
+ else:
48
+ raise Exception(f"Error acquiring token: {result.get('error_description')}")
49
 
50
+ # API call function
51
+ def make_api_call(endpoint, token):
52
+ headers = {'Authorization': f'Bearer {token}'}
53
+ response = requests.get(f'https://graph.microsoft.com/v1.0/{endpoint}', headers=headers)
54
+ if response.status_code == 200:
55
+ return response.json()
56
+ else:
57
+ st.error(f"API call failed: {response.status_code} - {response.text}")
58
+ return None
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
59
 
60
+ # Main application
61
+ def main():
62
+ st.title("πŸ¦„ MS Graph API Integration")
 
 
63
 
64
+ # Debug information
65
+ st.sidebar.write("Debug Info:")
66
+ st.sidebar.write(f"Query Params: {st.query_params.to_dict()}")
 
 
 
67
 
68
+ if 'code' in st.query_params and 'state' in st.query_params:
69
+ received_state = st.query_params['state']
70
+ expected_state = st.query_params.get('auth_state')
71
+
72
+ if received_state != expected_state:
73
+ st.error(f"Invalid state parameter. Expected {expected_state}, got {received_state}")
74
+ st.error("Please try logging in again.")
75
+ st.query_params.clear()
76
+ st.rerun()
77
+
78
+ try:
79
+ token = get_token_from_code(st.query_params['code'])
80
+ st.session_state['token'] = token
81
+ st.query_params.clear()
82
+ st.success("Successfully authenticated!")
83
+ st.rerun()
84
+ except Exception as e:
85
+ st.error(f"Authentication failed: {str(e)}")
86
+ st.query_params.clear()
87
+ st.rerun()
 
 
 
 
 
 
 
88
 
89
+ if 'token' not in st.session_state:
90
+ auth_url = generate_auth_url()
91
+ st.write("Please log in to continue:")
92
+ st.markdown(f"[Login with Microsoft]({auth_url})")
93
+ return
94
 
95
+ # User is authenticated, show the main app
96
+ token = st.session_state['token']
97
+ st.sidebar.success("Authenticated successfully!")
98
+
99
+ # Display user info
100
+ user_info = make_api_call('me', token['access_token'])
101
+ if user_info:
102
+ st.sidebar.write(f"Welcome, {user_info.get('displayName', 'User')}!")
103
 
104
+ # App functionality
105
+ option = st.sidebar.selectbox(
106
+ "Choose a function",
107
+ ["View Emails", "View Calendar", "View OneDrive Files"]
108
+ )
 
 
 
 
 
109
 
110
+ if option == "View Emails":
111
+ emails = make_api_call('me/messages?$top=10', token['access_token'])
112
+ if emails:
113
+ for email in emails['value']:
114
+ st.write(f"Subject: {email['subject']}")
115
+ st.write(f"From: {email['from']['emailAddress']['name']}")
116
+ st.write("---")
117
 
118
+ elif option == "View Calendar":
119
+ events = make_api_call('me/events?$top=10', token['access_token'])
120
+ if events:
121
+ for event in events['value']:
122
+ st.write(f"Event: {event['subject']}")
123
+ st.write(f"Start: {event['start']['dateTime']}")
124
+ st.write("---")
125
 
126
+ elif option == "View OneDrive Files":
127
+ files = make_api_call('me/drive/root/children', token['access_token'])
128
+ if files:
129
+ for file in files['value']:
130
+ st.write(f"File: {file['name']}")
131
+ st.write(f"Type: {file['file']['mimeType'] if 'file' in file else 'Folder'}")
132
+ st.write("---")
133
 
 
134
  if __name__ == "__main__":
135
+ main()