Skip to main content

user management

Project description

emeis

Build Status Coverage Black License: GPL-3.0-or-later

A generic user management service.

The word emeis ([e̞ˈmis]) comes from greek (εμείς) and means we.

Original RFC that led to emeis

Configuration

It's important to configure the app before the first start. When running for the first time, there is a data migration, that depends on settings from the config.

emeis is a 12factor app which means that configuration is stored in environment variables. Different environment variable types are explained at django-environ.

Common

A list of configuration options which you might need to configure to get emeis started in your environment.

General
  • SECRET_KEY: A secret key used for cryptography. This needs to be a random string of a certain length. See more.
  • ALLOWED_HOSTS: A list of hosts/domains your service will be served from. See more.
Database
  • DATABASE_ENGINE: Database backend to use. See more. (default: django.db.backends.postgresql)
  • DATABASE_HOST: Host to use when connecting to database (default: localhost)
  • DATABASE_PORT: Port to use when connecting to database (default: 5432)
  • DATABASE_NAME: Name of database to use (default: emeis)
  • DATABASE_USER: Username to use when connecting to the database (default: emeis)
  • DATABASE_PASSWORD: Password to use when connecting to database
i18n
  • LANGUAGE_CODE: Language code of the default language (default: en)
  • LANGUAGES: A list of supported languages (default: [en])
Bootstrapping
  • ADMIN_USERNAME: Username of the admin user (will be created on first run - default: admin)
  • ADMIN_ROLE_SLUG: Slug of the admin role (will be created on first run - default: admin)
  • ADMIN_SCOPE_NAME: Name of the admin scope (will be created on first run - default: admin)

Additional options

Additional options you might want to configure

OIDC

For OIDC, a customized mozilla-django-oidc is used.

Most of the settings below are documented in it's respective documentation.

  • OIDC_OP_USER_ENDPOINT: Url of userinfo endpoint (see spec)
  • OIDC_VERIFY_SSL: Bool (default: true)
  • OIDC_BEARER_TOKEN_REVALIDATION_TIME: Time in seconds before bearer token validity is verified again. For best security, token is validated on each request per default. It might be helpful though in case of slow Open ID Connect provider to cache it. It uses cache mechanism for memorizing userinfo result. Number has to be lower than access token expiration time. (default: 0)
  • OIDC_CREATE_USER: Enables or disables automatic user creation during authentication (default: false). If set to false, users have to be created manually in emeis with the username set to the value that will be received in the OIDC_USERNAME_CLAIM.
  • OIDC_UPDATE_USER: Enables or disables updating of the user email address based on the email claim (default: false)
  • OIDC_USERNAME_CLAIM: Name of claim that contains the username (default: sub). This is needed for matching users from the received claims.
  • OIDC_EMAIL_CLAIM: Name of claim that contains the email address (default: email). This is only needed if OIDC_CREATE_USER or OIDC_UPDATE_USER are true
  • OIDC_OP_INTROSPECT_ENDPOINT: Url of introspection endpoint (optionally needed for Client Credentials Grant)
  • OIDC_RP_CLIENT_ID: ID of the client (optionally needed for Client Credentials Grant)
  • OIDC_RP_CLIENT_SECRET: Secret of the client (optionally needed for Client Credentials Grant)
Cache
  • CACHE_BACKEND: cache backend to use (default: django.core.cache.backends.locmem.LocMemCache)
  • CACHE_LOCATION: location of cache to use
CORS headers

Per default no CORS headers are set but can be configured with following options.

  • CORS_ORIGIN_ALLOW_ALL: If True, the whitelist will not be used and all origins will be accepted. (default: False)
  • CORS_ORIGIN_WHITELIST: A list of origin hostnames (including the scheme and with optional port) that are authorized to make cross-site HTTP requests.
Logging
  • LOG_LEVEL: The logging level of the console logging handler (default: INFO)
Anonymous write
  • ALLOW_ANONYMOUS_WRITE: If set to true, unauthenticated users are allowed to write data (default: false)

Their request will also go through the permission layer and access can be restricted/denied from there.

This setting can be handy when setting up emeis or during development, when no OIDC provider is available.

This should always be false in production environments.

Installation

Requirements

  • docker
  • docker-compose

After installing and configuring those, download docker-compose.yml and run the following command:

docker-compose up -d

This will build the containers, start the services and run the database migrations. Additionally, it creates a user, scope, role and and ACL for administration based on the settings documented above

Getting started

You can now access the api at http://localhost:8000/api/v1/.

Extension points

For customization some clear extension points are defined. In case a customization is needed where no extension point is defined, best open an issue for discussion.

Visibility classes

The visibility part defines what you can see at all. Anything you cannot see, you're implicitly also not allowed to modify. The visibility classes define what you see depending on your roles, permissions, etc. Building on top of this follow the permission classes (see below) that define what you can do with the data you see.

Visibility classes are configured as VISIBILITY_CLASSES.

Following pre-defined classes are available:

  • emeis.core.visibilities.Any: Allow any user without any filtering
  • emeis.core.visibilities.Union: Union result of a list of configured visibility classes. May only be used as base class.
  • emeis.user.visibilities.OwnAndAdmin: Only show data that belongs to the current user. For admin show all data

In case this default classes do not cover your use case, it is also possible to create your custom visibility class defining per node how to filter.

Example:

from emeis.core.visibilities import BaseVisibility, filter_queryset_for
from emeis.core.models import BaseModel, Scope


class CustomVisibility(BaseVisibility):
    @filter_queryset_for(BaseModel)
    def filter_queryset_for_all(self, queryset, request):
        return queryset.filter(created_by_user=request.user.username)
    @filter_queryset_for(Scope)
    def filter_queryset_for_scope(self, queryset, request):
        return queryset.exclude(slug='protected-scope')

Arguments:

Save your visibility module as visibilities.py and inject it as Docker volume to path /app/caluma/extensions/visibilities.py,

Afterwards you can configure it in VISIBILITY_CLASSES as emeis.extensions.visibilities.CustomVisibility.

Permission classes

Permission classes define who may perform which data mutation. Such can be configured as PERMISSION_CLASSES.

Following pre-defined classes are available:

  • emeis.core.permissions.AllowAny: allow any users to perform any mutation.

In case this default classes do not cover your use case, it is also possible to create your custom permission class defining per mutation and mutation object what is allowed.

Example:

from emeis.core.permissions import BasePermission, object_permission_for, permission_for
from emeis.core.models import BaseModel, User

class CustomPermission(BasePermission):
    @permission_for(BaseModel)
    def has_permission_default(self, request):
        # change default permission to False when no more specific
        # permission is defined.
        return False

    @permission_for(User)
    def has_permission_for_user(self, request):
        return True

    @object_permission_for(User)
    def has_object_permission_for_user(self, request, instance):
        return request.user.username == 'admin'

Arguments:

  • request: holds the http request
  • instance: instance being edited by specific request

Save your permission module as permissions.py and inject it as Docker volume to path /app/caluma/extensions/permissions.py,

Afterwards you can configure it in PERMISSION_CLASSES as emeis.extensions.permissions.CustomPermission.

Contributing

Look at our contributing guidelines to start with your first contribution.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

emeis-0.1.0.tar.gz (48.5 kB view hashes)

Uploaded Source

Built Distribution

emeis-0.1.0-py3-none-any.whl (52.3 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page