Authorization and authentication middleware plugin for aiohttp.
Project description
aiohttp_auth_autz
This library provides authorization and authentication middleware plugins for aiohttp servers.
These plugins are designed to be lightweight, simple, and extensible, allowing the library to be reused regardless of the backend authentication mechanism. This provides a familiar framework across projects.
There are three middleware plugins provided by the library. The auth_middleware plugin provides a simple system for authenticating a users credentials, and ensuring that the user is who they say they are.
The autz_middleware plugin provides a generic way of authorization using different authorization policies. There is the ACL authorization policy as a part of the plugin.
The acl_middleware plugin provides a simple access control list authorization mechanism, where users are provided access to different view handlers depending on what groups the user is a member of. It is recomended to use autz_middleware with ACL policy instead of this middleware.
This is a fork of aiohttp_auth library that fixes some bugs and security issues and also introduces a generic authorization autz middleware with built in ACL authorization policy.
Documentation
Install
Install aiohttp_auth_autz using pip:
$ pip install aiohttp_auth_autz
Getting Started
A simple example how to use authentication and authorization middleware with an aiohttp application.
import asyncio
from os import urandom
import aiohttp_auth
from aiohttp import web
from aiohttp_auth import auth, autz
from aiohttp_auth.auth import auth_required
from aiohttp_auth.autz import autz_required
from aiohttp_auth.autz.policy import acl
from aiohttp_auth.permissions import Permission, Group
db = {
'bob': {
'password': 'bob_password',
'groups': ['guest', 'staff']
},
'alice': {
'password': 'alice_password',
'groups': ['guest']
}
}
# global ACL context
context = [(Permission.Allow, 'guest', {'view', }),
(Permission.Deny, 'guest', {'edit', }),
(Permission.Allow, 'staff', {'view', 'edit', 'admin_view'}),
(Permission.Allow, Group.Everyone, {'view_home', })]
# create an ACL authorization policy class
class ACLAutzPolicy(acl.AbstractACLAutzPolicy):
"""The concrete ACL authorization policy."""
def __init__(self, db, context=None):
# do not forget to call parent __init__
super().__init__(context)
self.db = db
async def acl_groups(self, user_identity):
"""Return acl groups for given user identity.
This method should return a sequence of groups for given user_identity.
Args:
user_identity: User identity returned by auth.get_auth.
Returns:
Sequence of acl groups for the user identity.
"""
# implement application specific logic here
user = self.db.get(user_identity, None)
if user is None:
# return empty tuple in order to give a chance
# to Group.Everyone
return tuple()
return user['groups']
async def login(request):
# http://127.0.0.1:8080/login?username=bob&password=bob_password
user_identity = request.GET.get('username', None)
password = request.GET.get('password', None)
if user_identity in db and password == db[user_identity]['password']:
# remember user identity
await auth.remember(request, user_identity)
return web.Response(text='Ok')
raise web.HTTPUnauthorized()
# only authenticated users can logout
# if user is not authenticated auth_required decorator
# will raise a web.HTTPUnauthorized
@auth_required
async def logout(request):
# forget user identity
await auth.forget(request)
return web.Response(text='Ok')
# user should have a group with 'admin_view' permission allowed
# if he does not autz_required will raise a web.HTTPForbidden
@autz_required('admin_view')
async def admin(request):
return web.Response(text='Admin Page')
@autz_required('view_home')
async def home(request):
text = 'Home page.'
# check if current user is permitted with 'admin_view' permission
if await autz.permit(request, 'admin_view'):
text += ' Admin page: http://127.0.0.1:8080/admin'
# get current user identity
user_identity = await auth.get_auth(request)
if user_identity is not None:
# user is authenticated
text += ' Logout: http://127.0.0.1:8080/logout'
return web.Response(text=text)
# decorators can work with class based views
class MyView(web.View):
"""Class based view."""
@autz_required('view')
async def get(self):
# example of permit using
if await autz.permit(self.request, 'view'):
return web.Response(text='View Page')
return web.Response(text='View is not permitted')
def init_app(loop):
app = web.Application()
# Create an auth ticket mechanism that expires after 1 minute (60
# seconds), and has a randomly generated secret. Also includes the
# optional inclusion of the users IP address in the hash
auth_policy = auth.CookieTktAuthentication(urandom(32), 60,
include_ip=True)
# Create an ACL authorization policy
autz_policy = ACLAutzPolicy(db, context)
# setup middlewares in aiohttp fashion
aiohttp_auth.setup(app, auth_policy, autz_policy)
app.router.add_get('/', home)
app.router.add_get('/login', login)
app.router.add_get('/logout', logout)
app.router.add_get('/admin', admin)
app.router.add_route('*', '/view', MyView)
return app
loop = asyncio.get_event_loop()
app = init_app(loop)
web.run_app(app, host='127.0.0.1', loop=loop)
License
The library is licensed under a MIT license.
Changelog
0.2.2 (2017-04-18)
Move to aiohttp 2.x.
Add support of middlewares decorators for aiohttp.web.View handlers.
Add uvloop as IO loop for tests.
0.2.1 (2017-02-16)
autz middleware:
Simplify acl authorization policy by moving permit logic into policy.acl.AbstractACLAutzPolicy.
Remove policy.acl.AbstractACLContext class.
Remove policy.acl.NaiveACLContext class.
Remove policy.acl.ACLContext class.
0.2.0 (2017-02-14)
acl middleware:
Add setup function for acl middleware to install it in aiohttp fashion.
Fix bug in acl_required decorator.
Fix a possible security issue with acl groups. The issue is follow: the default behavior is to add user_id to groups for authenticated users by the acl middleware, but if user_id is equal to some of acl groups that user suddenly has the permissions he is not allowed for. So to avoid this kind of issue user_id is not added to groups any more.
Introduce AbstractACLGroupsCallback class in acl middleware to make it possible easily create callable object by inheriting from the abstract class and implementing acl_groups method. It can be useful to store additional information (such database connection etc.) within such class. An instance of this subclass can be used in place of acl_groups_callback parameter.
auth middleware:
Add setup function for auth middleware to install it in aiohttp fashion.
auth.auth_required raised now a web.HTTPUnauthorized instead of a web.HTTPForbidden.
Introduce generic authorization middleware autz that performs authorization through the same interface (autz.permit coroutine and autz_required decorator) but using different policies. Middleware has the ACL authorization as the built in policy which works in the same way as acl middleware. Users are free to add their own custom policies or to modify ACL one.
Add global aiohttp_auth.setup function to install auth and autz middlewares at once in aiohttp fashion.
Add docs.
Rewrite tests using pytest and pytest-aiohttp.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file aiohttp_auth_autz-0.2.2.tar.gz
.
File metadata
- Download URL: aiohttp_auth_autz-0.2.2.tar.gz
- Upload date:
- Size: 14.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e02aab24f671dde3cbfa863e71df9f83cbe8c15c4eb5114110b47856f4a0f799 |
|
MD5 | c9527e96af1a40ddc60c7187aa6d6816 |
|
BLAKE2b-256 | 19506544b92f48c07e3af2c165e36b07167dcc5b7f1c4eec2e0c1cde998a54e3 |
File details
Details for the file aiohttp_auth_autz-0.2.2-py3-none-any.whl
.
File metadata
- Download URL: aiohttp_auth_autz-0.2.2-py3-none-any.whl
- Upload date:
- Size: 24.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 922c6602d0c7ab79037aaa51479851bb89e6f34fbd112eb4eec7db5f864c4c21 |
|
MD5 | edbd6c6978bdcedce32bfd53ab8340b8 |
|
BLAKE2b-256 | 04d051634d8758e25fe41587ecb624995ddf3c98a5a08a60466de12dfa334d48 |