Skip to main content

A Python library for API key validation

Project description

API Key Gateway

A Python library that provides an @apikey_login decorator to validate API keys with service-aware authentication.

Features

  • CLI Decorator: Automatically adds --apikey/-a CLI parameter to decorated functions
  • FastAPI Middleware: Built-in support for FastAPI applications
  • Strong Security: Validates API keys using argon2id hashing algorithm
  • Service-Aware: Keys are scoped to specific services
  • Remote Key Management: Fetches valid public keys from a remote JSON endpoint
  • Caching: Caches valid API key-service pairs for improved performance
  • Retry Mechanism: Automatically retries fetching keys on network failures
  • Flexible Configuration: Supports custom API key URLs and authentication headers

Installation

uv install apikey-gateway

Usage

The library supports two usage modes: CLI Decorator and FastAPI Middleware.

CLI Decorator

The apikey_login decorator automatically adds --apikey/-a CLI parameter to decorated functions.

from apikey_gateway import apikey_login

@apikey_login(service="media-match")
def media_app():
    print("API key validated for media-match service!")
    # Your media application logic here

@apikey_login(service="analytics")
def analytics_app():
    print("API key validated for analytics service!")
    # Your analytics application logic here

if __name__ == "__main__":
    media_app()  # or analytics_app()

Run with:

python app.py --apikey your-secret-key

FastAPI Middleware

The library provides built-in FastAPI middleware for validating API keys on all requests.

from fastapi import FastAPI
from apikey_gateway import add_apikey_gateway_middleware

# Create your FastAPI app
app = FastAPI(title="My API")

# Add API key validation middleware
add_apikey_gateway_middleware(
    app=app,
    service="my-service",
    verbose=True
)

# All endpoints below will require API key validation
@app.get("/protected/resource")
def protected_resource():
    return {"message": "Access granted to protected resource"}

# To run: uvicorn app:app --reload

Test the FastAPI endpoint:

# With X-AKGATEWAY-API-KEY header (default)
curl -H "X-AKGATEWAY-API-KEY: your-secret-key" http://localhost:8000/protected/resource

# With Authorization Bearer header
curl -H "Authorization: Bearer your-secret-key" http://localhost:8000/protected/resource

Middleware Features:

  • Automatically checks X-AKGATEWAY-API-KEY and Authorization Bearer headers
  • Supports custom API key headers
  • Can be configured with a custom public keys URL
  • Supports X-JSONBIN-API-KEY header for JSONBin API key authentication
  • Allows customization of both API key header and JSONBin API key header names

How It Works

For CLI Applications

  1. The application specifies the service name when using the @apikey_login decorator
  2. The user provides a secret API key via the --apikey/-a CLI parameter
  3. Followed by the same validation steps as FastAPI applications...

For FastAPI Applications

  1. The application adds the middleware with a specific service name
  2. The client provides a secret API key via X-AKGATEWAY-API-KEY or Authorization Bearer header
  3. Followed by the same validation steps as CLI applications...

Common Validation Steps

  1. The library computes an argon2id hash (public key) from the secret key
  2. It fetches the list of valid public keys from https://api.jsonbin.io/v3/b/691ec6a543b1c97be9b8ea6d
  3. Valid keys are filtered to only those belonging to the specified service
  4. If the computed public key matches any valid service-specific public key, access is granted

JSON Format

The remote JSON follows a service-aware structure where keys are organized by service name:

Service-Aware Structure

{
  "service1": {
    "key_id_1": "argon2id_hash_here",
    "key_id_2": "another_hash_here"
  },
  "service2": "single_key_hash_here"
}
  • Top-level keys are service names
  • Each service can have either multiple keys (as a dictionary) or a single key (as a string)
  • The library automatically handles both formats when fetching keys

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

apikey_gateway-1.1.1.tar.gz (12.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

apikey_gateway-1.1.1-py3-none-any.whl (10.6 kB view details)

Uploaded Python 3

File details

Details for the file apikey_gateway-1.1.1.tar.gz.

File metadata

  • Download URL: apikey_gateway-1.1.1.tar.gz
  • Upload date:
  • Size: 12.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.7.13

File hashes

Hashes for apikey_gateway-1.1.1.tar.gz
Algorithm Hash digest
SHA256 d16f08ec1622d1075313a335bd9058b40fcaf10626dea49ac51e1d165f368e44
MD5 7861966541a2ef3a334e8af53d6b6fd2
BLAKE2b-256 9342ae9c669903f604f0ce7f84df71d4d2f7949d74bd01f6c0b20fe4095fea65

See more details on using hashes here.

File details

Details for the file apikey_gateway-1.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for apikey_gateway-1.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 cf038dadb8bee70787f48683f320ce6d6ec0c58b6dc034d67f062573f9f56067
MD5 496a745ff912e0f9f668728a6c2b3b0b
BLAKE2b-256 f8d1cefe25775665099a610cac5de1e57539500a6d3a3879d1786a3613ab6bf0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page