Skip to main content

Signed cookie manager for communication between multiple trusted services.

Project description

Validate Build

Cookie-Manager

Signed cookie manager for communication between multiple trusted services.

Signs, verifies, and manages multiple cookies from trusted environments. Designed for use by services all within the same secure network (AWS VPC etc).

Wraps itsdangerous for the signing and verification (but this could change in the future).

Specifically, this handles:

  • Managing multiple different cookies - one for every environment or paired service
  • Error correction around sign/verify commands

This package is designed to sign and verify cookies - either ingoing or outgoing. These cookies are not encrypted, so stick to benign data, and only transmit within a trusted environment such as an AWS VPC.

Installation

Install and update using pip:

pip install -U Cookie-Manager

Usage

Import:

from cookie_manager.cookie_manager import CookieManager

Cookie-Manager is designed to use multiple different signing/verifying keys -- one (or more) per environment. Configure your keys in a dict:

keys = {"key1": "SECRET", "key2": "SECRET2"}

Create an instance (and seed it with your keys):

cookie_manager = CookieManager(keys=keys)

Signing

To sign a cookie, start with a dict payload containing your data:

payload = {"key": "value"}

Then sign the payload, making sure to pass a valid key_id as previously configured. The sign method will retrieve your signing key SECRET to sign requests (based on the key_id you pass in). This WILL override any existing key with the name key_id.

signed_cookie = cookie_manager.sign(cookie=payload, key_id="key1")

This will return you a signed cookie (with an additional key_id pair added in):

'{"key": "value", "key_id": "key1"}.XepkCA.CUZtVTCXHbqoalWVCh5xOa4S4WE'

Verifying

When reading in a signed cookie, verification happens through the cookie payload -> whatever comes in needs to have a key_id in the payload, which is used to lookup the verification key (configured during instantiation). This is added for you by sign:

incoming_signed_cookie = '{"key": "value", "key_id", "key1"}.XepkCA.CUZtVTCXHbqoalWVCh5xOa4S4WE'

Verify this cookie (during which Cookie-Manager will extract key_id from the payload, and lookup the key used to sign the cookie):

payload = cookie_manager.verify(signed_cookie=signed_cookie)

Now, you can access data inside the payload object. The verify function will raise errors if it cannot verify.

Configuration

You can pass an optional config dictionary into the constructor to override existing options.

cookie_manager = CookieManager(keys=keys, config={"VERIFY_MAX_COOKIE_AGE": 10})

This example will override the max age of a cookie that is allowed, when verifying.

Custom Logging

This package uses dependency injection to log errors with Python's print. To use your own logger, pass in a logger object which implements critical, error, warning, debug, and info functions. Here's how to patch in the Flask logger, but any object will work providing it meets the Duck Typing rules:

cookie_manager = CookieManager(keys=keys, logger=app.logger)

This will result in logging calls firing to app.logger.<logger-level> with a string passed in.

Custom Exceptions

Like logging, this package uses custom error handling if you need it. By default, all errors will raise as "Exception", but you can pass in a custom object to raise specific errors.

This class will raise Unauthorized, ServiceUnavailable, and BadRequest.

Here's how to pass in a Werkzeug exception object:

from werkzeug import exceptions
cookie_manager = CookieManager(keys=keys, exceptions=exceptions)

Security Decorators

If using this package in flask, you can decorate routes to only allow access to certain cookies.

There are 2 ways of protecting a route, allow any signed cookie or allow cookies signed with specific keys.

To make use of the decorators, you will need to create a cookie manager that has all the keys you want to use for protecting routes and create an instance of the CookieSecurityDecorator.

Decorator instance (e.g. util.py)

from cookie_manager import CookieSecurityDecorator
cookie_security = CookieSecurityDecorator()
from cookie_manager import CookieManager
from project.util import cookie_security
from flask import request
cookie_manager = CookieManager(
    keys={"key_1": "", "key_2": "", "key_3": ""}, # These are the keys that will be used to protect all routes
    exceptions=exceptions,
)
cookie_security.init_app(request=request, cookie_manager=cookie_manager, cookie_name="cookie_name")

The string supplied for cookie_name is the name of the cookie in the request to use for protecting the routes.

Now you are able to use the decorator as detailed below.

Option 1 - Allow access to any signed cookie

Lets say we want to have a route that can be accessed by any cookie that has been signed using one of the keys supplied to the cookie manager used to create the decorator. If we decorate the route like the following example, only signed cookies will be allowed to access this route.

from project.util import cookie_security
@cookie_security.keys_required()
def my_route():
    #...

Option 2 - Allow access to specific signed cookies

Lets say we want to have a route that can only be accessed by a cookie that has been signed using a subset of keys supplied to the cookie manager used to create the decorator. If we decorate the route like the following example, only cookies signed with a provided key will be allowed to access this route.

from project.util import cookie_security
@cookie_security.keys_required(["key_1", "key_2"])
def my_route():
    #...

Developing

The build pipeline require your tests to pass and code to be formatted

Make sure you have Python 3.x installed on your machine (use pyenv).

Install the dependencies with pipenv (making sure to include dev and pre-release packages):

pipenv install --dev --pre

Configure your environment:

pipenv shell && export PYTHONPATH="$PWD"

Run the tests:

pytest

Or with logging:

pytest -s

Or tests with coverage:

pytest --cov=./

Format the code with Black:

black $PWD

Releases

Cleanup the (.gitignored) dist folder (if you have one):

rm -rf dist

Notch up the version number in setup.py and build:

python3 setup.py sdist bdist_wheel

Push to PyPi (using the ScholarPack credentials when prompted)

python3 -m twine upload --repository-url https://upload.pypi.org/legacy/ dist/*

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cookie-manager-1.2.3.tar.gz (9.3 kB view details)

Uploaded Source

Built Distribution

cookie_manager-1.2.3-py3-none-any.whl (9.9 kB view details)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page