Authorization library for A+ services
Project description
An authentication/authorization library for A+ services
Provides convenience functions and classes for authentication/authorization between A+ and its services.
Modules
aplus_auth
contains the library settingsaplus_auth.requests
provides a Session class and get, post, etc. functions that work the same as therequests
ones but include a JWT in the requests.aplus_auth.payload
contains the classes for payload and permission handling.aplus_auth.exceptions
contains the possible custom exceptions raised by the library.aplus_auth.auth
contains convenience functions for getting a JWT from the headers and verifying it.aplus_auth.auth.django
contains convenience functions and classes for handling JWT authentication/authorization in Django apps.
Config
Possible settings:
<setting key>, <default>
<explanation>
UID,
The unique identifier of the service.
Always required.
PUBLIC_KEY, None
A string containing the public key (RSA)
Required if JWT requests or authentication is used
PRIVATE_KEY, None
A string containing the private key (RSA)
Required if JWT requests or authentication is used
AUTH_CLASS, None
The dotted path to a authentication class to be used by the authentication middleware
Required only if the library's authentication middleware is used
REMOTE_AUTHENTICATOR_UID, None
UID of the service that check permissions and signs tokens with a trusted key (A+).
Required for non-A+ services connecting to other services. More precisely,
it is required if JWT requests are used, the target services do not trust UID and
the Request class isn't overridden to use a different token.
REMOTE_AUTHENTICATOR_URL, None
URL of the service that check permissions and signs tokens with a trusted key (A+).
Required if REMOTE_AUTHENTICATOR_UID is required.
REMOTE_AUTHENTICATOR_KEY, None
The public key of the remote authentication service.
Required if REMOTE_AUTHENTICATOR_UID is required.
UID_TO_KEY, {}*
A mapping of service UIDs to their public keys. Used for determining
whether a JWT was signed using the correct private key.
*The following are also added if they are not specified and the UID and
key are not None in the settings:
<UID>: <PUBLIC_KEY>
<REMOTE_AUTHENTICATOR_UID>: <REMOTE_AUTHENTICATOR_KEY>
TRUSTING_REMOTES, {<netloc of REMOTE_AUTHENTICATOR_URL>: <REMOTE_AUTHENTICATOR_UID>}
A mapping of URLs to the UIDs of the services that do not require a remotely signed JWT.
That is, the services that have UID in their TRUSTED_UIDS. The URL can contain the scheme
(optional), netloc of the service and a path (optional). E.g. http://example.com/example/path where
http:// and /example/path are optional. The scheme and netloc must be lowercase. Note that
http://example.com/example/path will match any URL that starts with that: e.g.
http://example.com/example/pathmorepath and http://example.com/example/path/more/path will both
match it. Use of a trailing / is recommended. If a URL matches multiple keys, the UID with
longest key will be taken.
This makes it possible to skip the remote token signing.
DEFAULT_AUD_UID, None
The default UID if the request URL isn't found in TRUSTING_REMOTES.
Meant to be used if all services trust this service, e.g. A+ itself.
TRUSTED_UIDS, [<REMOTE_AUTHENTICATOR_UID>]
Issuer UIDs in JWT tokens that are trusted. This means that any JWT signed with
the private key of a service with its UID in the list is trusted to be correct.
The key corresponding to an UID is determined through UID_TO_KEY.
The service's own public key is always trusted even without it being in this list.
DISABLE_LOGIN_CHECKS, False*
Skips login check in the login_required decorator if True. Should be False in production.
* If used as a django app, this defaults to the DEBUG value in django settings
DISABLE_JWT_SIGNING, False*
Do not sign JWTs in requests if True. Should be False in production.
* If used as a django app, this defaults to True if DEBUG (django settings) is True and
PUBLIC_KEY is None, otherwise to False
Django
Add aplus_auth
to INSTALLED_APPS
and add the settings to the django settings file inside
an APLUS_AUTH dict. E.g.
# settings.py
APLUS_AUTH = {
"PRIVATE_KEY": <private key>,
"PUBLIC_KEY": <public key>,
...
}
Others
Call init_settings
(from the main package: aplus_auth.init_settings
) with the settings as
keyword arguments.
The RSA keys
The RSA keys need to be either in PEM or SSH format. Example commands on how to generate them:
# generate private key
openssl genrsa -out private.pem 2048
# extract public key
openssl rsa -in private.pem -out public.pem -pubout
Generating a JWT with Django
You can use the management command gentoken:
python3 manage.py gentoken -h
This requires aplus_auth
to be in INSTALLED_APPS
and the private key to be set.
Adding JWT login to a Django app
For non-DRF use
- Create an authentication class by subclassing
aplus_auth.auth.django.ServiceAuthentication
. See the class description for implementation details. - Add
aplus_auth.auth.django.AuthenticationMiddleware
to middlewares and setAUTH_CLASS
to the dotted path of the new class. - If authentication succeeds, request.user is the user returned by the class and request.auth is
the payload of the JWT. Otherwise, they are
AnonymousUser
andNone
, respectively.
Additionally, aplus_auth.auth.django.login_required
can be used to decorate a view function to
return 501 or redirect if the user hasn't logged in (!!! request.user.is_authenticated
is used to
check whether they are logged in). The login check can also be disabled with the
DISABLE_LOGIN_CHECKS
setting for debugging purposes.
For DRF use
- Create an authentication class by subclassing
aplus_auth.auth.django.ServiceAuthentication
and DRF'sBaseAuthentication
. See the class description for implementation details. - Add the new class to the DRF authentication classes
- If authentication succeeds, request.user is the user returned by the class and request.auth is the payload of the JWT.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file aplus-auth-0.2.3.tar.gz
.
File metadata
- Download URL: aplus-auth-0.2.3.tar.gz
- Upload date:
- Size: 16.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | f83b730e98fc37599c99f4f2ea4fff276f6abacb1f790e20ddff21856099ee65 |
|
MD5 | 28118bcbdfd7b82b858288cae6029635 |
|
BLAKE2b-256 | 5a9dc07d0137710e2468f726cb77d32bde56f347bfd0c1689c675c74e1a7fdfc |
File details
Details for the file aplus_auth-0.2.3-py3-none-any.whl
.
File metadata
- Download URL: aplus_auth-0.2.3-py3-none-any.whl
- Upload date:
- Size: 16.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 96bd513eabd96761c8da928f6819a845802374407bad0e99ff710edffcf186db |
|
MD5 | 5e554324f115161a2b86d91a163b54bb |
|
BLAKE2b-256 | 9b15785e10e4d5e274c6dd6a3a60cba05ae751ba1256757330a4642517571c80 |