Skip to main content

Add an API to your Django app using token-based authentication.

Project description

django-tokenapi

This is a Django application which allows you to create simple APIs that use token-based authentication. You can easily open up existing views to the API by adding a single decorator.

This is useful if you want to create applications on mobile devices which connect to your Django website, but where only your clients are expected to access the API.

If instead you are looking to open up an API to the public, you are better off going with a framework with OAuth support, of which there exist some really good implementations.

Requirements

  • Django 1.9+
  • Python 2.7 or 3+

Installation

First obtain tokenapi package and place it somewhere on your PYTHONPATH, for example in your project directory (where settings.py is).

Alternatively, if you are using some sort of virtual environment, like virtualenv, you can perform a regular installation or use pip:

python setup.py install

# or ...

pip install django-tokenapi

Add tokenapi to your INSTALLED_APPS.

Ensure that django.contrib.auth.backends.ModelBackend is in your AUTHENTICATION_BACKENDS.

Add tokenapi.backends.TokenBackend to your AUTHENTICATION_BACKENDS.

Include tokenapi.urls in your urls.py. It will look something like this:

urlpatterns = [
    url(r'^token/', include('tokenapi.urls')),
]

Configuration

You can change the number of days that a token is valid for by setting TOKEN_TIMEOUT_DAYS in settings.py. The default is 7.

Usage

Obtaining a Token

You can obtain a token for a specific user by sending a POST request with a username and password parameter to the api_token_new view. Using curl, the request would look like:

curl -d "username=jpulgarin&password=GGGGGG" http://www.yourdomain.com/token/new.json

If the request is successful, you will receive a JSON response like so:

{"success": true, "token": "2uy-420a8efff7f882afc20d", "user": 1}

An invalid username and password pair will produce a response like so:

{"success": false, "errors": "Unable to log you in, please try again"}

Note that if you User model has an is_active flag, the authentication logic will not allow inactive users to obtain or use tokens.

You should store the user and token that are returned on the client accessing the API, as all subsequent calls will require that the request have a valid token and user pair.

Verifying a Token

You can verify that a token matches a given user by sending a GET request to the api_token view, and sending the token and user as part of the URL. Using curl it would look like:

curl http://www.yourdomain.com/token/2uy-420a8efff7f882afc20d/1.json

If valid, you will receive the following JSON response:

{"success": true}

Writing API Compatible Views

To allow a view to be accessed through token-based auth, use the tokenapi.decorators.token_required decorator. There are also JSON helper functions to make it easier to deal with JSON. This is an example of an API compatible view:

from tokenapi.decorators import token_required
from tokenapi.http import JsonResponse, JsonError, JsonResponseBadRequest, JsonResponseUnauthorized, JsonResponseForbidden, JsonResponseNotFound, JsonResponseNotAllowed, JsonResponseNotAcceptable


@token_required
def index(request):
    if request.method == 'POST':
        data = {
            'test1': 49,
            'test2': 'awesome',
        }
        return JsonResponse(data)
    else:
        return JsonError("Only POST is allowed")

Using a Token

Request Parameters

The client can access any API compatible view by sending a request to it, and including user and token as request parameters (either GET or POST). Accessing the example view above using curl might look like:

curl -d "user=1&token=2uy-420a8efff7f882afc20d" http://www.yourdomain.com/index.json

You would receive the following response:

{"success": true, "test1": 49, "test2": "awesome"}

Basic authentication

Alternately, you can access any API compatible view by including the user and token in the Authorization header according to the basic access authentication scheme. To construct the Authorization header:

  1. Combine user id and token into string "user:token"
  2. Encode resulting string using Base64
  3. Prepend "Basic " (including the trailing space) to the resulting Base64 encoded string

If, in the same request, you provide credentials via both request parameters and the Authorization header, the request parameters will be used for authentication.

Acknowledgements

The token generating code is from django.contrib.auth.tokens, but modified so that it does not hash on a user's last login.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-tokenapi-1.3.tar.gz (5.9 kB view details)

Uploaded Source

Built Distribution

django_tokenapi-1.3-py3-none-any.whl (7.9 kB view details)

Uploaded Python 3

File details

Details for the file django-tokenapi-1.3.tar.gz.

File metadata

  • Download URL: django-tokenapi-1.3.tar.gz
  • Upload date:
  • Size: 5.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/46.0.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.7.7

File hashes

Hashes for django-tokenapi-1.3.tar.gz
Algorithm Hash digest
SHA256 dc02dbe996fc5060d2ee6c334e2293f444432a902be1ef0e16472ed5cab1e10e
MD5 c08ca377deeae3b983e0d498b5a07b9b
BLAKE2b-256 823bd7f029455b3ac8e7adcc018ef55b91f73c341d3cc17bda2aafe21252342a

See more details on using hashes here.

File details

Details for the file django_tokenapi-1.3-py3-none-any.whl.

File metadata

  • Download URL: django_tokenapi-1.3-py3-none-any.whl
  • Upload date:
  • Size: 7.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/46.0.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.7.7

File hashes

Hashes for django_tokenapi-1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 df63f8d20f828803b6f622e9806298348988b27b36182147110e4abc93bf0ccc
MD5 a520ab107acba1dc3923c49d68d7406b
BLAKE2b-256 31ffdb9ecdb57d9b33028b69e14727b051fc6d9804ffb081dcefa6e119882005

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page