Python implementation of the AWS4 compatible Escher HTTP request signing protocol.
Project description
EscherPython - HTTP request signing lib
Escher helps you creating secure HTTP requests (for APIs) by signing HTTP(s) requests. It's both a server side and client side implementation. The status is work in progress.
The algorithm is based on Amazon's AWS Signature Version 4, but we have generalized and extended it.
More details are available at escherauth.io.
Signing a request
Escher works by calculating a cryptographic signature of your request, and adding it (and other authentication information) to said request.
Usually you will want to add the authentication information to the request by appending extra headers to it.
from escherauth import Escher
request = {
'method': 'POST',
'url': '/',
'host': 'example.com',
'headers': [
['X-Foo', 'bar'],
],
'body': '{"this_is": "a_request_body"}',
}
escher = Escher('YOUR_ACCESS_KEY_ID', 'YOUR SECRET', 'example/credential/scope')
signed_request = escher.sign_request(request)
from pprint import pprint
pprint(signed_request)
Signing a Requests request:
import requests
from escherauth import EscherRequestsAuth
auth = EscherRequestsAuth('YOUR_ACCESS_KEY_ID', 'YOUR SECRET', 'example/credential/scope')
response = requests.post('https://httpbin.org/post', json={'this_is': 'a_request_body'}, auth=auth)
from pprint import pprint
pprint(response.json())
Presigning a URL
In some cases you may want to send authenticated requests from a context where you cannot modify the request headers, e.g. when embedding an API generated iframe.
You can however generate a presigned URL, where the authentication information is added to the query string.
from escherauth import Escher
escher = Escher('YOUR_ACCESS_KEY_ID', 'YOUR SECRET', 'example/credential/scope')
presigned_url = escher.presign_url('http://example.com/', expires=300)
print(presigned_url)
Validating a request
You can validate a request signed by the methods described above. For that you will need a database of the access keys and secrets of your clients.
from escherauth import Escher, EscherException
escher = Escher('', '', 'example/credential/scope')
signed_request = {
'body': '{"this_is": "a_request_body"}',
'headers': [
['Host', 'example.com'],
['X-Escher-Date', '20240227T121443Z'],
['X-Escher-Auth', 'ESR-HMAC-SHA256 Credential=YOUR_ACCESS_KEY_ID/20240227/example/credential/scope, SignedHeaders=host;x-escher-date, Signature=5febb099193b8e6c4027ff810e0faa5bc8a275efb46f2d5c1af8810f4332c4cb'],
],
'method': 'POST',
'url': '/',
}
key_db = {
'ACCESS_KEY_OF_CLIENT_1': 'SECRET OF CLIENT 1',
'ACCESS_KEY_OF_CLIENT_42': 'SECRET OF CLIENT 42',
}
try:
escher.authenticate(signed_request, key_db)
print('OK')
except EscherException as e:
print(f'The validation failed: {e}')
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file escherauth-1.0.3.tar.gz
.
File metadata
- Download URL: escherauth-1.0.3.tar.gz
- Upload date:
- Size: 10.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | df90a038005b7aa62579e0000f1f3124a1f30643da68c043e7ccffe99bbcc5a9 |
|
MD5 | 3795974732c50d4d9a045f4d822f40b9 |
|
BLAKE2b-256 | 821cfc7986a339828de400db280e40736f20ae03c823e9e28168aaf4616a8d76 |
File details
Details for the file escherauth-1.0.3-py3-none-any.whl
.
File metadata
- Download URL: escherauth-1.0.3-py3-none-any.whl
- Upload date:
- Size: 7.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e32a2e84f2179bb16908809480feabc99a2e86b18209f7a1205e7892855e836b |
|
MD5 | 6b8255d215fafc12a2019df12865aee1 |
|
BLAKE2b-256 | d934a011e89885a49fb6c844732ebf2f813255670204f8e0434cf6822f986645 |