All-in-One JWT Authentication plugin for Graphene
Project description
Chowkidar
JWT Authentication for Django Graphene
An JWT-based authentication package for Django Graphene GraphQL APIs.
Features
- Support for Graphene GraphQL APIs
- Token & Refresh Token based JWT Authentication
- Tokens stored as server-side cookie
- Support for security measures - disable graphql introspection, get requests etc. on production
- Support for restricting 1 device / 1 login for a user
- Support for logging IP & User-Agent of user
- Ability to Auto-Refresh JWT Token if the Refresh Token Exists
- Support for Social Auth via Google Identity Service
- Support for Social Auth with social-app-django
- Support for Authenticated GraphQL Subscriptions with Django Channels
- Support for file uploads adhering to GraphQL Multipart Request Spec
- Get current logged-in user instance in info.context of resolvers
Installation
Install the package -
pip install chowkidar-graphene
Add chowkidar
to INSTALLED_APPS
and run migrations to apply required db changes to the database.
In urls.py
, replace the GraphQLView coming from the Ariadne with the one from this package
from chowkidar.graphql import GraphQLView
urlpatterns = [
path('admin/', admin.site.urls),
path('graphql/', GraphQLView.as_view(schema=schema), name='graphql'),
...
]
Add the package to Graphene Middleware in settings.py
GRAPHENE = {
'SCHEMA': 'framework.graphql.schema.schema',
'MIDDLEWARE': [
'chowkidar.auth.ChowkidarAuthMiddleware',
'graphene_django.debug.DjangoDebugMiddleware'
],
}
Add the mutations to your schema
from chowkidar.graphql import AuthMutations, SocialAuthMutations
class Mutation(
AuthMutations,
SocialAuthMutations,
...
):
pass
schema = graphene.Schema(mutation=Mutation, query=Query)
Auth Decorators
Chowkidar supports 2 decorators that you can use in your API resolvers
from chowkidar.graphql import login_required, fingerprint_required, resolve_user
@login_required
def resolve_field(self, info, sport=None, state=None, count=5, after=None):
userID: str = info.context.userID
some_function()
@fingerprint_required
def resolve_field(self, info, sport=None, state=None, count=5, after=None):
refreshToken = info.context.refreshToken
userID: str = info.context.userID
some_function()
@resolve_user()
def mutate(self, info):
user: User = info.context.user
userID: str = info.context.userID
some_update()
-
@login_required
- checks if user is authenticated, and passes down his/her userID at info.context.userID. Does not hit the db. -
@fingerprint_required
- checks the refresh token of the user against db after validating its fingerprint and returns info.context.userID & info.context.refreshToken -
@resolve_user
- checks if user is authenticated, and passes down his/her instance at info.context.user as well as his ID at info.context.userID. Hits the db to get the user instance.
Both of these decorators, when wrapped around a query/mutation/type resolver, ensures that only logged-in users
can access it, when it is an unauthenticated request it shall
throw exception - PermissionDenied(message='User not authenticated', code='AUTHENTICATION_REQUIRED')
GraphQL Subscriptions with Django Channels
In your routing.py
-
from django.urls import path
from channels.routing import URLRouter, ProtocolTypeRouter
from chowkidar.graphql import AuthenticatedChannel
from .graphql.schema import schema # replace this with your schema
application = ProtocolTypeRouter(
{
"websocket": (
URLRouter(
[path("ws/", AuthenticatedChannel(schema, debug=True))]
)
),
}
)
Doing this, you will get the logged-in user instance at info.context['user']
,
which you can handle as per your wish. You can also use the @login_required
decorator
that comes along with this package.
Mutations
Our Mutations (& GraphQL APIs) for auth may be not implemented according to basic graphql standards, primarily because of technicalities involved in doing certain procedures (like setting up the cookie).
Login a user
success
, andid
+username
of the user are compulsory for the mutations to work.
mutation {
authenticateUser(email: "aswinshenoy65@gmail.com", password: "<MY_PASSWORD>") {
success
user {
id
username
}
}
}
- note:
user { id username }
is a required selection for the authentication to happen. Without id & username fields, it will not resolve & return 500.
You may use username
variable to send email as well. However, you cannot do vice-versa.
mutation {
authenticateUser(username: "aswinshenoy65@gmail.com", password: "<MY_PASSWORD>") {
success
user {
id
username
}
}
}
on success the following is returned, and 3 cookies (REFRESH_TOKEN & ACCESS_TOKEN) are set -
{
"data": {
"authenticateUser": {
"success": true,
"user": {
"id": "2441264196336223233",
"username": "aswinshenoy"
},
"refreshExpiresIn": "2020-11-21T01:21:51.848Z"
}
}
}
Social Auth
- mostly same as
authenticateUser
but sendsaccessToken
+provider
instead ofemail/username
+password
mutation {
socialAuth(accessToken: "<SOME TOKEN>", provider: "<SOCIAL_AUTH_PROVIDER>"){
success
user
{
id
username
}
}
}
Google Auth
- mostly same as
authenticateUser
but sendsaccessToken
instead ofemail/username
+password
mutation {
gAuth(accessToken: "<SOME TOKEN>"){
success
user
{
id
username
}
}
}
Logout a user
This is required since the cookies are server-side, and needs to be removed.
mutation {
logoutUser
}
View sessions of a user
{
mySessions{
isActive
token
userAgent
ip
issued
revoked
}
}
Revoke Token Revoke a given refresh token of the user
mutation ($token: String!){
revokeToken(token: $token)
}
Revoke Other Tokens Revoke all tokens except the current token. Useful to logout user from all other devices
mutation {
revokeOtherTokens
}
Available Settings
The following are the settings variables for the plugin to be defined in your project's settings.py
.
All the setting variables along with their defaults values are listed below -
PROTECT_GRAPHQL = settings.DEBUG
JWT_SECRET_KEY = settings.SECRET_KEY
JWT_PUBLIC_KEY = None
JWT_PRIVATE_KEY = None
JWT_REFRESH_TOKEN_N_BYTES = 20
JWT_ALGORITHM = HS256
JWT_EXPIRATION_DELTA = timedelta(seconds=60)
JWT_REFRESH_TOKEN_EXPIRATION_DELTA = timedelta(seconds=60 * 60 * 24 * 7)
JWT_LEEWAY = 0
JWT_ISSUER = None
JWT_COOKIE_SAME_SITE = 'Lax'
JWT_COOKIE_SECURE = False
JWT_COOKIE_HTTP_ONLY = True
JWT_COOKIE_DOMAIN = 'example.com'
ENABLE_FINGERPRINTING = False
# function with spec (user: User): bool, defaults to True
ALLOW_USER_TO_LOGIN_ON_AUTH = 'chowkidar.auth.rules.check_if_user_is_allowed_to_login'
# function with spec (user: User): bool, defaults to False
REVOKE_OTHER_TOKENS_ON_AUTH_FOR_USER = 'chowkidar.auth.rules.check_if_other_tokens_need_to_be_revoked'
# function that gets called with auth object after a successful GAuth
CHOWKIDAR_GAUTH_CALLBACK = 'chowkidar.auth.rules.handle_gauth'
UPDATE_USER_LAST_LOGIN_ON_AUTH = True
UPDATE_USER_LAST_LOGIN_ON_REFRESH = True
USER_GRAPHENE_OBJECT = 'user.graphql.types.user.PersonalProfile'
LOG_USER_IP_IN_REFRESH_TOKEN = True
LOG_USER_AGENT_IN_REFRESH_TOKEN = True
GOOGLE_AUTH_CLIENT_ID = 'blah1blah2.apps.googleusercontent.com'
FAQ
1. How to know whether RefreshToken has expired in the frontend?
- When you do login using the API, we send back
refreshExpiresIn
on success. - Create a local cookie with expire time set to this
refreshExpiresIn
, with some value. - Before you send any authentication required requests (or before you open a auth required page), check whether this cookie exists.
2. Do I need to refresh the access token?
No, as long as you send both refresh token and the access token in the request (which you should automatically, since its a server side cookie) the server will perform the refresh if a valid refresh token exists either when approaching expiry of access token, or when having an expired access token. In both cases, the actual query shall also be properly resolved and not failed. :)
Contributing
Contributions are welcome! Feel free to open issues, and work on PRs to fix them.
Building & Publishing the package
python setup.py sdist
twine upload dist/*
Credits
This project is heavily inspired by django-graphql-jwt
& django-graphql-social-auth
by flavors,
and is loosely forked from its implementation.
License
This project is licensed under the GNU General Public License V3.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file chowkidar-graphene-0.8.5.tar.gz
.
File metadata
- Download URL: chowkidar-graphene-0.8.5.tar.gz
- Upload date:
- Size: 36.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.5.0 importlib_metadata/4.8.2 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.8.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 656e82dd39d76e293fbf8834c37fd62a13ef467bfea5b85be1637fa42c00f856 |
|
MD5 | 5296f08d65c7d743a848a2914311b4e8 |
|
BLAKE2b-256 | 0fc4859d4edaf6babe6bc779c3f6b57dcf811b470773f7597f64456e60cbb873 |