Skip to main content

Datasette plugin that authenticates users based on existing domain cookies

Project description

datasette-auth-existing-cookies

PyPI CircleCI License

Datasette plugin that authenticates users based on existing domain cookies.

STATUS: Work in progress.

When to use this

This plugin allows you to build custom authentication for Datasette when you are hosting a Datasette instance on the same domain as another, authenticated website.

Consider a website on www.example.com which supports user authentication.

You could run Datasette on data.example.com in a way that lets it see cookies that were set for the .example.com domain.

Using this plugin, you could build an API endpoint at www.example.com/user-for-cookies which returns a JSON object representing the currently signed-in user, based on their cookies.

The plugin can protect any hits to any data.example.com pages by passing their cookies through to that API and seeing if the user should be logged in or not.

You can also use subclassing to decode existing cookies using some other mechanism.

Login redirect mechanism

If the user does not have a valid authentication cookie they will be redirected to an existing login page.

This page is specified using the auth_redirect_url setting.

For example:

{
    "plugins": {
        "datasette-auth-existing-cookies": {
            "api_url": "http://www.example.com/user-from-cookies",
            "auth_redirect_url": "http://www.example.com/login",
            "original_cookies": ["sessionid"]
        }
    }
}

The URL that the user should be sent to after they log in will be specified as the ?next= parameter to that page, for example:

http://www.example.com/login?next=http://foo.example.com/

It is up to you to program the login endpoint such that it is not vulnerable to an Unvalidated redirect vulnerability.

One way to do this is by verifying that the URL passed to ?next= is a URL that belongs to a trusted website. Django's own login view does this by verifying that the URL hostname is on an approved list.

Another way to do this is to use the next_secret configuration parameter to set a signing secret for that URL. This signing secret will be used to construct a ?next_sig= signed token using the Python itsdangerous module, like this:

?next_sig=Imh0dHBzOi8vZGVtby5leGFtcGxlLmNvbS9mb28vYmFyIg.7JdhRCoP7Ow1cRF1ZVengC-qk6c

You should use Datasette's secret configuration values mechanism to set this secret from an environment variable, like so:

{
    "plugins": {
        "datasette-auth-existing-cookies": {
            "api_url": "http://www.example.com/user-from-cookies",
            "auth_redirect_url": "http://www.example.com/login",
            "original_cookies": ["sessionid"],
            "next_secret":  {
                "$env": "NEXT_SECRET"
            }
        }
    }
}

You can verify this secret in Python code for your own login form like so:

from itsdangerous import URLSafeSerializer, BadSignature

def verify_next_sig(next_sig):
    signer = URLSafeSerializer(next_secret)
    try:
        decoded = signer.loads(next_sig)
        return True
    except BadSignature:
        return False

If you want to roll your own signing mechanism here you can do so by subclassing ExistingCookiesAuth and over-riding the build_auth_redirect(next_url) method.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

datasette_auth_existing_cookies-0.3b0-py3-none-any.whl (11.2 kB view details)

Uploaded Python 3

File details

Details for the file datasette_auth_existing_cookies-0.3b0-py3-none-any.whl.

File metadata

  • Download URL: datasette_auth_existing_cookies-0.3b0-py3-none-any.whl
  • Upload date:
  • Size: 11.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.2.0 requests-toolbelt/0.9.1 tqdm/4.42.0 CPython/3.7.6

File hashes

Hashes for datasette_auth_existing_cookies-0.3b0-py3-none-any.whl
Algorithm Hash digest
SHA256 acf509ef75842e26d131ccf1882ecc0cd60b03bc032bf87dc00441b15b9ad071
MD5 aa694e87b42b32ffdc7265811d236fe5
BLAKE2b-256 af82c57f70d22b710ea8f6b033bb8de254e884dc0e78fb5c54e65dcb34d3d6c4

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page