Skip to main content

Authorization library for A+ services

Reason this release was yanked:

Major bug with JWT token size increasing over time

Project description

An authentication/authorization library for A+ services

Provides convenience functions and classes for authentication/authorization between A+ and its services.

Modules

  • aplus_auth contains the library settings
  • aplus_auth.requests provides a Session class and get, post, etc. functions that work the same as the requests ones but include a JWT in the requests.
  • aplus_auth.payload contains the classes for payload and permission handling.
  • aplus_auth.exceptions contains the possible custom exceptions raised by the library.
  • aplus_auth.auth contains convenience functions for getting a JWT from the headers and verifying it.
  • aplus_auth.auth.django contains convenience functions and classes for handling JWT authentication/authorization in Django apps.

Config

Possible settings:

<setting key>, <default>
    <explanation>

PUBLIC_KEY, None
    A string containing the public key (RSA)
    Required if JWT requests or authentication is used
PRIVATE_KEY, None
    A string containing the private key (RSA)
    Required if JWT requests or authentication is used
AUTH_CLASS, None
    The dotted path to a authentication class to be used by the authentication middleware
    Required only if the library's authentication middleware is used
REMOTE_AUTHENTICATOR_URL, None
    URL of the service that check permissions and signs tokens with a trusted key (A+).
    Required for non A+ services connecting to other services. More precisely,
    it is required if JWT requests are used, the target services do not trust PUBLIC_KEY and
    the Request class isn't overridden to use a different token.
REMOTE_AUTHENTICATOR_KEY, None
    The public key of the remote authentication service.
    Required if REMOTE_AUTHENTICATOR_URL is required.
TRUSTING_REMOTES, [<netloc of REMOTE_AUTHENTICATOR_URL>]
    netlocs of the services that do not require a remotely authenticated JWT.
    This makes it possible to skip the remote token signing.
TRUSTED_KEYS, [<REMOTE_AUTHENTICATOR_KEY>]
    Issuer (public) keys in JWT tokens that are trusted. This means that any JWT signed with
    the private counterpart of any of these keys is trusted to be correct. The service's own
    public key is always trusted even without it being in this list.
DISABLE_LOGIN_CHECKS, False*
    Skips login check in the login_required decorator if True. Should be False in production.
    * If used as a django app, this defaults to the DEBUG value in django settings
DISABLE_JWT_SIGNING, False*
    Do not sign JWTs in requests if True. Should be False in production.
    * If used as a django app, this defaults to True if DEBUG (django settings) is True and
    PUBLIC_KEY is None, otherwise to False

Django

Add aplus_auth to INSTALLED_APPS and add the settings to the django settings file inside an APLUS_AUTH dict. E.g.

# settings.py
APLUS_AUTH = {
    "PRIVATE_KEY": <private key>,
    "PUBLIC_KEY": <public key>,
    ...
}

Others

Call init_settings (from the main package: aplus_auth.init_settings) with the settings as keyword arguments.

The RSA keys

The RSA keys need to be either in PEM or SSH format. Example commands on how to generate them:

# generate private key
openssl genrsa -out private.pem 2048
# extract public key
openssl rsa -in private.pem -out public.pem -pubout

Generating a JWT with Django

You can use the management command gentoken:

python3 manage.py gentoken -h

This requires aplus_auth to be in INSTALLED_APPS and the private key to be set.

Adding JWT login to a Django app

For non-DRF use

  1. Create an authentication class by subclassing aplus_auth.auth.django.ServiceAuthentication. See the class description for implementation details.
  2. Add aplus_auth.auth.django.AuthenticationMiddleware to middlewares and set AUTH_CLASS to the dotted path of the new class.
  3. If authentication succeeds, request.user is the user returned by the class and request.auth is the payload of the JWT. Otherwise, they are AnonymousUser and None, respectively.

Additionally, aplus_auth.auth.django.login_required can be used to decorate a view function to return 501 or redirect if the user hasn't logged in (!!! request.user.is_authenticated is used to check whether they are logged in). The login check can also be disabled with the DISABLE_LOGIN_CHECKS setting for debugging purposes.

For DRF use

  1. Create an authentication class by subclassing aplus_auth.auth.django.ServiceAuthentication and DRF's BaseAuthentication. See the class description for implementation details.
  2. Add the new class to the DRF authentication classes
  3. If authentication succeeds, request.user is the user returned by the class and request.auth is the payload of the JWT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aplus-auth-0.1.2.tar.gz (13.9 kB view hashes)

Uploaded Source

Built Distribution

aplus_auth-0.1.2-py3-none-any.whl (14.7 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page