Secure Scaffold for Google App Engine
Project description
Secure GAE Scaffold (Python 3)
Introduction
Please note: this is not an official Google product.
This is a secure scaffold package designed primarily to work with Google App Engine (although it is not limited to this).
It is built using Python 3 and Flask.
The scaffold provides the following basic security guarantees by default through
a flask app factory found in secure_scaffold/factories.py. This app will:
- Set assorted security headers (Strict-Transport-Security, X-Frame-Options,
X-XSS-Protection, X-Content-Type-Options, Content-Security-Policy) with
strong default values to help avoid attacks like Cross-Site Scripting (XSS)
and Cross-Site Script Inclusion. See
add_csp_headersandsettings.CSP_CONFIG. - Verify XSRF tokens by default on authenticated requests using any verb other
that GET, HEAD, or OPTIONS. See the
secure_scaffold/xsrf.pyfor more information.
Usage
Installation
As this is currently in beta we have a beta pypi package.
This project can be installed via
pip install toaster-secure-scaffold-beta
For your convenience we also have the option to install with various other dependencies for the contrib APIs such as cloud-tasks, Datastore and Firestore.
These can be included with the [] syntax. For example all of them can be installed
via:
pip install toaster-secure-scaffold-beta[datastore,firestore,tasks]
Setup
Once installed you can easily begin a new project by running:
secure_scaffold start-project PROJECT_NAME GCLOUD_PROJECT_NAME
More details about this command can be found by running:
secure_scaffold start-project --help
App Factory
To use the secure scaffold in your app, use our app generator.
from secure_scaffold import factories
app = factories.AppFactory().generate()
This will automatically set all the needed CSP headers.
XSRF
To enable XSRF protection add the decorator to the endpoints you need it for. This needs to be set after the route decorator e.g.
from secure_scaffold import factories
from secure_scaffold import xsrf
app = factories.AppFactory().generate()
@app.route('/', methods=['GET', 'POST'])
@xsrf.xsrf_protected()
def index():
return 'Hello World!'
We use Flask Sessions for XSRF, for this you should set up a unique Secret Key for your application.
A random one is set in the app factory, but you should overwrite this yourself, see Flask Sessions
Settings Config
Similar to django settings, to enable multiple settings files you need to set an environment variable. Your folder structure should include a settings folder containing your settings files, for example:
my_project/
settings/
__init__.py
base.py
development.py
production.py
You should then set the environment variable (SETTINGS_MODULE) to the settings you require in that environment.
export SETTINGS_MODULE=settings.development
You can then import your settings in your project like this:
from secure_scaffold.config import settings
Authentication
The Secure Scaffold provides two methods of authentication. One is an in built authentication system relying on Googles OAuth2 system. The alternative is a system relying on IAP
OAuth2 Users
Second generation App Engine systems have had the Users API removed so the majority of the original functionality isn't available. As a result it is now recommended to use separate systems such as Googles OAuth2. The Secure Scaffold provides a wrapper for this based heavily on this guide.
For this to work there is some minimal setup.
The first is to provide an OAuth Client ID. To do this go to the GCloud console and create
an OAuth Client ID here. Ensure you add
the domains you are using to the Authorised JavaScript Origins and Authorised redirect URIs.
You can include localhost:5000 in these to enable using this system in development.
Once you have a Client ID add it to your settings file like so:
AUTH_OAUTH_CLIENT_ID = 'my-client-id'
Once done all that is required is to register the auth blueprint to your project like so:
from secure_scaffold import factories
from secure_scaffold.contrib.users.auth import auth_handler
app = factories.AppFactory().generate()
app.register_blueprint(auth_handler.blueprint)
This creates two enpoints at /auth/login and /auth/authenticate. Login provides a frontend
with a Google sign in button. This sends an API request to /auth/authenticate which validates
the login procedure and returns an endpoint to redirect to. By default this is /.
If you want to force a user to be logged in to access a URL you can use the provided
requires_login decorator like so:
from secure_scaffold import factories
from secure_scaffold.contrib.users.auth import auth_handler
app = factories.AppFactory().generate()
app.register_blueprint(auth_handler.blueprint)
@app.route('/')
@auth_handler.requires_login
def private_view():
return "You can't see this unless you are logged in."
If a user is logged in they will be able to see the page. If they are not they will
automatically be redirected to /auth/login.
Extending the OAuth2 system.
The OAuth2 system is built using a class at secure_scaffold.contrib.users.auth.AuthHandler.
This class is designed to be easy to subclass and override. For instance if you wanted to change the URL which the user is redirected to on logging in you can do it like so:
from secure_scaffold import factories
from secure_scaffold.contrib.users.auth import AuthHandler
app = factories.AppFactory().generate()
class MyAuthHandler(AuthHandler):
redirect_url = '/after-login'
auth_handler = MyAuthHandler()
app.register_blueprint(auth_handler.blueprint)
IAP Users
This is available at secure_scaffold.contrib.appengine.users. It provides a User
class which has a few useful methods providing the details of the current user.
It also provides requires_auth and requires_admin decorators which enforce the need
for authentication and admin rights respectively on the views they are applied to.
These work almost identically to how they do in the first generation App Engine APIs.
To use these you will need to enable IAP on your App Engine instance. This is provides the app with the correct headers for this functionality.
Datastore/Firestore
The Secure Scaffold comes with a built in API for both Datastore and Firestore.
This is a partial ORM - it allows you to simply define data models, to create, retrieve, update and delete them (CRUD). However it does not work with relations or nested entities/documents.
To use this API you must create a settings file with a variable called DATABASE_SETTINGS.
This has to be a dict with two fields, an engine field and a settings field.
enginemust reference a module with the appropriate database engine, this allows the code to switch between databases such as firestore and datastore with a single setting change.settingsare the settings that will be passed to the database engine client. As a minimum these should containprojectpointing to the gcloud project.
The settings should something like this:
DATABASE_SETTINGS = {
'engine': 'secure_scaffold.contrib.db.engine.firestore',
'settings': {
'project': 'my-gcloud-project-id'
}
}
The above uses the firestore engine. To use Datastore instead you should replace
secure_scaffold.contrib.db.engine.firestore with
secure_scaffold.contrib.db.engine.datastore. There are no other code changes required.
The API can be used like so:
from secure_scaffold.contrib.db import models
class Person(models.Model):
name = models.Field(str, primary=True)
age = models.Field(int)
arms = models.Field(int, default=2)
social_security = models.Field(str, unique=True)
data = models.Field(dict, required=False)
# Create some people.
Person(name='John', age=30, social_security='111-11-1111').save()
Person(name='Jane', age=30, social_security='222-22-2222').save()
janes = Person.get(name='Jane') # Returns a generator which yields all objects with a name of 'Jane'
for jane in janes:
jane.age = 28
jane.save() # Updates Jane to have an age of 28 in the database.
people = Person.get_all() # Gives a generator which will yield all the people
for person in people:
print(person.name) # Prints 'John' and then 'Jane'
print(person.age) # Prints 30 and then 28
print(person.arms) # Prints 2 and then 2
person.delete() # Deletes the entry in the database.
The API operates a basic validation system - you define fields within a model class, each field has a type and some optional args. If the field receives an object of the wrong type it will raise an error.
Tasks
The Secure Scaffold comes with a system for setting up tasks with Google Cloud Tasks.
This system works by creating a TaskRunner class instance and registering functions
as Task objects using a decorator provided by the TaskRunner instance.
This creates a view in a Flask blueprint
stored in the TaskRunner instance and adds a delay method to the registered
function - allowing the function to be run later by the task queue.
Setup
For this module to work you must first install google-cloud-tasks:
pip install google-cloud-tasks
You must also add a CLOUD_TASKS_QUEUE_CONFIG object to your settings file.
It should look like this:
CLOUD_TASKS_QUEUE_CONFIG = {
'project': 'YOUR GCLOUD PROJECT NAME',
'location': 'YOUR TASKE QUEUE LOCATION',
'queue': 'YOUR TASK QUEUE NAME'
}
Using
A basic example of the task system is as follows:
from flask import request
from secure_scaffold import factories
from secure_scaffold.contrib.cloud_tasks import tasks
app = factories.AppFactory().generate()
task_runner = tasks.TaskRunner('tasks', __name__, url_prefix='/tasks')
app.register_blueprint(task_runner.blueprint)
@task_runner.task(route='/print_task', methods=['POST'])
def print_task():
arg = request.json().get('arg')
print(arg)
return 'OK'
@app.route('/')
def main():
print_task.delay(arg='Hello, World!')
return 'OK'
This sets up a Secure Scaffold app as well as a task runner. It then registers the blueprint of the task runner in the app.
We create a task function, which gets an argument called arg from
the global request object and prints it. This is registered as a task
using the task_runner.task decorator.
Finally we create a flask route called main which calls the delay method
of our task.
Behind the scenes what happens is our task_runner creates a Task object
containing this function and a delay method. It then registers the object
as a flask route at /tasks/print_task/. The Task objects delay method
makes a request to the cloud tasks API to create a task for this method in
the queue. It takes any arbitrary arguments and keyword arguments and adds
them to the body of this request - making them accessible via the
flask.request global variable within the task.
Scaffold Development
Structure:
secure_scaffold/
- Top level directory
secure_scaffold/contrib
- Contains non-essential but useful libraries.
- Holds several alternatives to App Engine APIs which are no longer available in second generation instances
secure_scaffold/tests
- Tests for the secure scaffold
secure_scaffold/config.py
- Similar to django settings set up
- Looks for the "SETTINGS_MODULE" environment variable to be set
- See Settings Config below on how to use this
secure_scaffold/factories.py
- The main Flask app factory that applies the security defaults
- See App Factory below on how to use this
secure_scaffold/settings.py
- Security settings
- Defines our CSP headers and other specifics
secure_scaffold/xsrf.py
- Defines XSRF decorators to be used with your flask app
- See XSRF below on how to use this
Dependency Setup
We recommend setting up a virtual env to install dependencies:
virtualenv env --python=python3
source env/bin/activate
pip install -r dev_requirements.txt
There are some extra dependencies required for the development on specific submodules.
These include:
google-cloud-firestorefor development on `secure_scaffold.contrib.db.engine.firestoregoogle-cloud-datastorefor development on `secure_scaffold.contrib.db.engine.datastoregoogle-cloud-tasksfor development on `secure_scaffold.contrib.cloud_tasks.tasks
Testing
To run unit tests:
pytest
Third Party Credits
- Flask
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file Toaster Secure Scaffold Beta-0.8.tar.gz.
File metadata
- Download URL: Toaster Secure Scaffold Beta-0.8.tar.gz
- Upload date:
- Size: 32.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.32.2 CPython/3.7.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4493abf4990bbfe1b3fd5553c6a71d7c9dbbd40abc5e0a4191570ec6f3d1dc7e
|
|
| MD5 |
46d33f6511d0f978fc0ff27e5f201a74
|
|
| BLAKE2b-256 |
13292ada43832b8630fe926957f5e86d81d192865e90a9c6eb7237885d8460d5
|
File details
Details for the file Toaster_Secure_Scaffold_Beta-0.8-py3-none-any.whl.
File metadata
- Download URL: Toaster_Secure_Scaffold_Beta-0.8-py3-none-any.whl
- Upload date:
- Size: 43.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.32.2 CPython/3.7.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a04b1089b6c2857ba90e5ba9745fc5ecd9212ec5cebd916cfd04e4f769b62b68
|
|
| MD5 |
ebcf624fedbc3824ee9e9d13e3134bab
|
|
| BLAKE2b-256 |
9f57bd924921509c9d9ddeae2a65a9389979d0d8a710fdc299c555866ce6bb29
|