Skip to main content

Authorization and authentication middleware plugin for aiohttp.

Project description

aiohttp_auth_autz

https://travis-ci.org/ilex/aiohttp_auth_autz.svg?branch=master Documentation Status

This library provides authorization and authentication middleware plugins for aiohttp servers.

These plugins are designed to be lightweight, simple, and extensible, allowing the library to be reused regardless of the backend authentication mechanism. This provides a familiar framework across projects.

There are three middleware plugins provided by the library. The auth_middleware plugin provides a simple system for authenticating a users credentials, and ensuring that the user is who they say they are.

The autz_middleware plugin provides a generic way of authorization using different authorization policies. There is the ACL authorization policy as a part of the plugin.

The acl_middleware plugin provides a simple access control list authorization mechanism, where users are provided access to different view handlers depending on what groups the user is a member of. It is recomended to use autz_middleware with ACL policy instead of this middleware.

This is a fork of aiohttp_auth library that fixes some bugs and security issues and also introduces a generic authorization autz middleware with built in ACL authorization policy.

Documentation

http://aiohttp-auth-autz.readthedocs.io/

Install

Install aiohttp_auth_autz using pip:

$ pip install aiohttp_auth_autz

Getting Started

A simple example how to use authentication and authorization middleware with an aiohttp application.

import asyncio

from os import urandom

import aiohttp_auth

from aiohttp import web
from aiohttp_auth import auth, autz
from aiohttp_auth.auth import auth_required
from aiohttp_auth.autz import autz_required
from aiohttp_auth.autz.policy import acl
from aiohttp_auth.permissions import Permission, Group

db = {
    'bob': {
        'password': 'bob_password',
        'groups': ['guest', 'staff']
    },
    'alice': {
        'password': 'alice_password',
        'groups': ['guest']
    }
}

# global ACL context
context = [(Permission.Allow, 'guest', {'view', }),
           (Permission.Deny, 'guest', {'edit', }),
           (Permission.Allow, 'staff', {'view', 'edit', 'admin_view'}),
           (Permission.Allow, Group.Everyone, {'view_home', })]


# create an ACL authorization policy class
class ACLAutzPolicy(acl.AbstractACLAutzPolicy):
    """The concrete ACL authorization policy."""

    def __init__(self, db, context=None):
        # do not forget to call parent __init__
        super().__init__(context)

        self.db = db

    async def acl_groups(self, user_identity):
        """Return acl groups for given user identity.

        This method should return a sequence of groups for given user_identity.

        Args:
            user_identity: User identity returned by auth.get_auth.

        Returns:
            Sequence of acl groups for the user identity.
        """
        # implement application specific logic here
        user = self.db.get(user_identity, None)
        if user is None:
            # return empty tuple in order to give a chance
            # to Group.Everyone
            return tuple()

        return user['groups']


async def login(request):
    # http://127.0.0.1:8080/login?username=bob&password=bob_password
    user_identity = request.GET.get('username', None)
    password = request.GET.get('password', None)
    if user_identity in db and password == db[user_identity]['password']:
        # remember user identity
        await auth.remember(request, user_identity)
        return web.Response(text='Ok')

    raise web.HTTPUnauthorized()


# only authenticated users can logout
# if user is not authenticated auth_required decorator
# will raise a web.HTTPUnauthorized
@auth_required
async def logout(request):
    # forget user identity
    await auth.forget(request)
    return web.Response(text='Ok')


# user should have a group with 'admin_view' permission allowed
# if he does not autz_required will raise a web.HTTPForbidden
@autz_required('admin_view')
async def admin(request):
    return web.Response(text='Admin Page')


@autz_required('view_home')
async def home(request):
    text = 'Home page.'
    # check if current user is permitted with 'admin_view' permission
    if await autz.permit(request, 'admin_view'):
        text += ' Admin page: http://127.0.0.1:8080/admin'
    # get current user identity
    user_identity = await auth.get_auth(request)
    if user_identity is not None:
        # user is authenticated
        text += ' Logout: http://127.0.0.1:8080/logout'
    return web.Response(text=text)


# decorators can work with class based views
class MyView(web.View):
    """Class based view."""

    @autz_required('view')
    async def get(self):
        # example of permit using
        if await autz.permit(self.request, 'view'):
            return web.Response(text='View Page')
        return web.Response(text='View is not permitted')


def init_app(loop):
    app = web.Application()

    # Create an auth ticket mechanism that expires after 1 minute (60
    # seconds), and has a randomly generated secret. Also includes the
    # optional inclusion of the users IP address in the hash
    auth_policy = auth.CookieTktAuthentication(urandom(32), 60,
                                               include_ip=True)

    # Create an ACL authorization policy
    autz_policy = ACLAutzPolicy(db, context)

    # setup middlewares in aiohttp fashion
    aiohttp_auth.setup(app, auth_policy, autz_policy)

    app.router.add_get('/', home)
    app.router.add_get('/login', login)
    app.router.add_get('/logout', logout)
    app.router.add_get('/admin', admin)
    app.router.add_route('*', '/view', MyView)

    return app


loop = asyncio.get_event_loop()
app = init_app(loop)

web.run_app(app, host='127.0.0.1', loop=loop)

License

The library is licensed under a MIT license.

Changelog

0.2.2 (2017-04-18)

  • Move to aiohttp 2.x.

  • Add support of middlewares decorators for aiohttp.web.View handlers.

  • Add uvloop as IO loop for tests.

0.2.1 (2017-02-16)

  • autz middleware:

    • Simplify acl authorization policy by moving permit logic into policy.acl.AbstractACLAutzPolicy.

    • Remove policy.acl.AbstractACLContext class.

    • Remove policy.acl.NaiveACLContext class.

    • Remove policy.acl.ACLContext class.

0.2.0 (2017-02-14)

  • acl middleware:

    • Add setup function for acl middleware to install it in aiohttp fashion.

    • Fix bug in acl_required decorator.

    • Fix a possible security issue with acl groups. The issue is follow: the default behavior is to add user_id to groups for authenticated users by the acl middleware, but if user_id is equal to some of acl groups that user suddenly has the permissions he is not allowed for. So to avoid this kind of issue user_id is not added to groups any more.

    • Introduce AbstractACLGroupsCallback class in acl middleware to make it possible easily create callable object by inheriting from the abstract class and implementing acl_groups method. It can be useful to store additional information (such database connection etc.) within such class. An instance of this subclass can be used in place of acl_groups_callback parameter.

  • auth middleware:

    • Add setup function for auth middleware to install it in aiohttp fashion.

    • auth.auth_required raised now a web.HTTPUnauthorized instead of a web.HTTPForbidden.

  • Introduce generic authorization middleware autz that performs authorization through the same interface (autz.permit coroutine and autz_required decorator) but using different policies. Middleware has the ACL authorization as the built in policy which works in the same way as acl middleware. Users are free to add their own custom policies or to modify ACL one.

  • Add global aiohttp_auth.setup function to install auth and autz middlewares at once in aiohttp fashion.

  • Add docs.

  • Rewrite tests using pytest and pytest-aiohttp.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aiohttp_auth_autz-0.2.2.tar.gz (14.5 kB view details)

Uploaded Source

Built Distribution

aiohttp_auth_autz-0.2.2-py3-none-any.whl (24.3 kB view details)

Uploaded Python 3

File details

Details for the file aiohttp_auth_autz-0.2.2.tar.gz.

File metadata

File hashes

Hashes for aiohttp_auth_autz-0.2.2.tar.gz
Algorithm Hash digest
SHA256 e02aab24f671dde3cbfa863e71df9f83cbe8c15c4eb5114110b47856f4a0f799
MD5 c9527e96af1a40ddc60c7187aa6d6816
BLAKE2b-256 19506544b92f48c07e3af2c165e36b07167dcc5b7f1c4eec2e0c1cde998a54e3

See more details on using hashes here.

File details

Details for the file aiohttp_auth_autz-0.2.2-py3-none-any.whl.

File metadata

File hashes

Hashes for aiohttp_auth_autz-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 922c6602d0c7ab79037aaa51479851bb89e6f34fbd112eb4eec7db5f864c4c21
MD5 edbd6c6978bdcedce32bfd53ab8340b8
BLAKE2b-256 04d051634d8758e25fe41587ecb624995ddf3c98a5a08a60466de12dfa334d48

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page