Authorization framework for Python-based applications
Project description
🐻Cadurso[^1]
Authorization framework for Python-based applications. Inspired by Oso.
Overview
Cadurso is a lightweight and extensible authorization framework designed to handle access control scenarios by building and querying rules. It enables developers to define rules for actors performing actions on resources, with support for synchronous and asynchronous workflows. This library is inspired by the principles of the Oso framework, emphasizing flexibility and clarity in managing authorization.
Features
- Declarative Rule Definitions: Define who can do what with ease. Rules are just Python functions[^2].
- Support for Sync and Async: Handle both blocking and non-blocking authorization queries seamlessly. Rules can also be async.
- Immutable: Prevent rule additions at runtime by freezing the authorization framework after defining rules.
- Error Handling: Comprehensive exceptions for incomplete queries, operational issues, and rule definition errors.
Use Cases
- Multi-tenant applications requiring fine-grained access control.
- Implementing Role-Based Access Control, Attribute-Based Access Control or anything in between.
Core Concepts
The core concepts of a Cadurso-powered authorization system are Actors, Actions, and Resources. They are combined into Rules which can be added to a Cadurso instance, represent capabilities within a system.
After defining rules, the framework can be marked as "frozen" to prevent further modifications, ensuring the integrity of the authorization system.
Actors
an Actor can be any Python instance. e.g User, ServiceAccount.
Actions
Actions are operations that Actors can attempt on Resources. They can be any hashable object.
Good candidates for Actions are str, Enum, etc.
(But any object that implements __hash__ and __eq__ can be used)
Resources
Resources are entities that Actors interact with. They can be any object that needs to be protected. e.g Document, Post.
Rules
Rules are combinations of Actors, Actions, and Resources. They are expressed as Python functions that return a boolean value.
Cadurso uses the type hints of the rule function to determine the types of the Actor and Resource arguments. The Action is passed as a parameter to the decorator that defines the rule.
Rule format:
cadurso = Cadurso()
@cadurso.add_rule(<ACTION>)
def rule_definition(actor: [ACTOR TYPE], resource: [RESOURCE TYPE]) -> bool:
# Return True or False based on the rule logic
...
State Freezing
Once you are finished defining rules, the framework should be "frozen" to prevent further modifications. This ensures the integrity of the authorization system.
cadurso.freeze()
Quick Start
Installation
pip install cadurso
Complete Example
Defining Rules
# Initialize the authorization framework
from cadurso import Cadurso
cadurso = Cadurso()
# Some Actors and Resources type definitions
class User:
...
class Document:
...
# Some Actions
class DocumentPermission(Enum):
EDIT = auto()
"""Edit a document."""
VIEW = auto()
"""Visualize a document."""
# Define your authorization rules
@cadurso.add_rule(DocumentPermission.EDIT)
def owner_can_edit_own_document(actor: User, resource: Document) -> bool:
return actor == resource.owner
@cadurso.add_rule(DocumentPermission.EDIT)
def admin_can_edit_any_document(actor: User, _resource: Document) -> bool:
return actor.role == Role.ADMIN
@cadurso.add_rule(DocumentPermission.VIEW)
def owner_can_edit_own_document(actor: User, resource: Document) -> bool:
"""Any person who can EDIT a document can also, obviously, VIEW it."""
# Piggyback on the EDIT permission.
# This way we don't need to write VIEW rules for both owners and admins.
return cadurso.can(actor).do(DocumentPermission.EDIT).on(resource)
# Async rules are also okay, if you need them
@cadurso.add_rule(DocumentPermission.VIEW)
async def async_rule(actor: User, resource: Document) -> bool:
return await some_other_async_check(actor, resource)
# Freeze the rules to prevent further modifications
cadurso.freeze()
# (You are ready to query now)
# Use your `cadurso` instance as a singleton throughout your application
Querying
(Instance definitions)
# Some Actors
john = User(name="John", role=Role.USER)
gunnar = User(name="Gunnar", role=Role.ADMIN)
# Some Resources
johns_document = Document(owner=john)
gunnars_document = Document(owner=gunnar)
(Query: Synchronous APIs)
# `.is_allowed()` method to query permissions
cadurso.is_allowed(john, DocumentPermission.EDIT, johns_document) # Output: True
cadurso.is_allowed(john, DocumentPermission.EDIT, gunnars_document) # Output: False
cadurso.is_allowed(gunnar, DocumentPermission.EDIT, johns_document) # Output: True
# Alternate querying syntax with `.can()`.
# This is just syntactic sugar for the above.
cadurso.can(john).do(DocumentPermission.EDIT).on(johns_document) # Output: True
cadurso.can(john).do(DocumentPermission.EDIT).on(gunnars_document) # Output: False
cadurso.can(gunnar).do(DocumentPermission.EDIT).on(johns_document) # Output: True
(Query: Asynchronous APIs)
# `.is_allowed_async()` method to query permissions asynchronously
await cadurso.is_allowed_async(john, DocumentPermission.EDIT, johns_document) # Output: True
# Querying permissions with `.can()` asynchronously
await cadurso.can(john).do(DocumentPermission.EDIT).on_async(johns_document) # Output: True
More examples?
-
ABAC (Attribute-based Access Control) in Cadurso:
- Check
/tests/akira/for a full ABAC implementation set in the Akira universe.
- Check
-
RBAC (Role-based Access Control) in Cadurso:
- The
/tests/brazil/folder shows a full RBAC implementation set in the Brazil universe.
- The
Contributing
Contributions are welcome! Please ensure tests are included for any new features or bug fixes. Follow the standard pull request guidelines for this repository.
License
Cadurso is licensed under the MIT License. See the LICENSE file for details.
[^1]: Oso means "bear" in Spanish. Cadurso is a portmanteau of "Cadu" (my nickname) and "Urso" ("bear", in Portuguese) 😉
[^2]: Important: Rules should be pure functions, and avoid mutating the actors or resources passed to them. As we cannot enforce this at runtime, it is the responsibility of the developer to ensure this.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cadurso-0.0.1.tar.gz.
File metadata
- Download URL: cadurso-0.0.1.tar.gz
- Upload date:
- Size: 9.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.0.1 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1a4edbbcea5ca3c3a288afb7e61a8ae85562854a68189f5fe88ff199b8500344
|
|
| MD5 |
7eb04af591190a121e6e148d1186ed8c
|
|
| BLAKE2b-256 |
f2517e39f82fc0285276e2b58069a2f9d2d120aa1c634c58634a461bac9154a1
|
Provenance
The following attestation bundles were made for cadurso-0.0.1.tar.gz:
Publisher:
publish.yml on flipbit03/cadurso
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cadurso-0.0.1.tar.gz -
Subject digest:
1a4edbbcea5ca3c3a288afb7e61a8ae85562854a68189f5fe88ff199b8500344 - Sigstore transparency entry: 158178391
- Sigstore integration time:
-
Permalink:
flipbit03/cadurso@d2415993cae6015ff44f15fc1a8e916e37905c58 -
Branch / Tag:
refs/tags/v0.0.1 - Owner: https://github.com/flipbit03
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@d2415993cae6015ff44f15fc1a8e916e37905c58 -
Trigger Event:
release
-
Statement type:
File details
Details for the file cadurso-0.0.1-py3-none-any.whl.
File metadata
- Download URL: cadurso-0.0.1-py3-none-any.whl
- Upload date:
- Size: 8.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.0.1 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3c38328f58b0cbf3bca93718e6e7951ae73392b527d657d0c139743502ea81af
|
|
| MD5 |
a32d1326159f30381d982b59a1cc9d82
|
|
| BLAKE2b-256 |
9f15777fbd4310350ecab8069cb50355033346bc1ffc1e491d66d56b629f468a
|
Provenance
The following attestation bundles were made for cadurso-0.0.1-py3-none-any.whl:
Publisher:
publish.yml on flipbit03/cadurso
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cadurso-0.0.1-py3-none-any.whl -
Subject digest:
3c38328f58b0cbf3bca93718e6e7951ae73392b527d657d0c139743502ea81af - Sigstore transparency entry: 158178394
- Sigstore integration time:
-
Permalink:
flipbit03/cadurso@d2415993cae6015ff44f15fc1a8e916e37905c58 -
Branch / Tag:
refs/tags/v0.0.1 - Owner: https://github.com/flipbit03
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@d2415993cae6015ff44f15fc1a8e916e37905c58 -
Trigger Event:
release
-
Statement type: