Skip to main content

Eve JWT authentication, rs/eve-auth-jwt's fork.

Project description

Eve Auth JWT's fork
============

.. image:: https://img.shields.io/pypi/v/eve-auth-jwt-fork.svg
:target: https://pypi.python.org/pypi/eve-auth-jwt-fork

.. image:: https://travis-ci.org/rs/eve-auth-jwt.svg?branch=master
:target: https://travis-ci.org/rs/eve-auth-jwt

An OAuth 2 JWT token validation module for `Eve <http://python-eve.org>`_.

Installation
------------

To install eve-auth-jwt, simply:

$ pip install eve-auth-jwt-fork

At Eve initialization::

from eve import Eve
from eve_auth_jwt import JWTAuth

app = Eve(auth=JWTAuth, settings=SETTINGS)

Configuration
-------------

This module reads its configuration form Eve settings. Here is the list of new directives:

* ``JWT_SECRET`` (required): Defines the symetric secret token secret used to de/encode the token (async keys support is a TODO).
* ``JWT_ISSUER`` (required): Defines the required token issuer (``iss`` claim).
* ``JWT_AUDIENCES``: Defines a list of accepted audiences (``aud`` claim). If not provided, only tokens with no audience set will be accepted. The resource level ``audiences`` parameter is also available.
* ``JWT_ROLES_CLAIM``: Defines the claim name for roles. If set, Eve roles check will be activated, and any resources with ``allowed_roles`` set will require to have those roles present in the defined token's claim.
* ``JWT_SCOPE_CLAIM``: Defines the claim name for scope. If set and the token has a claim of the same name containing the string ``viewer``, only ``GET`` and ``HEAD`` methods will be granted. All other values are ignored and added to the list of exposed roles with the ``scope:`` prefix.

Reading Roles
-------------

If access is granted, the authentication module exposes roles and token's claims thru ``get_authen_roles()`` and ``get_authen_claims()`` methods. You may access those values from your event hook as follow::

def my_hook(...)
resource_def = app.config['DOMAIN'][resource_name]
auth = resource_def['authentication']
if 'somerole' in auth.get_authen_roles():
# grant some finer access


Securing custom routes
----------------------

JWT Authorization can be applied to any custom routes using the `@requires_token` wrapper. This annotation will only provide *audience and role access control*. User level access must be written manually.

Example of audience access control::

from eve_auth_jwt import requires_token, get_request_auth_value

@app.route('/my_resource/download', methods=['GET'])
@requires_token(audiences=['myAudience'])
def csv_download():
# Allows all users with myAudience to access download
account_id = get_request_auth_value()
if check_user(account_id):

abort(401)

return generateCSV(account_id)

Example of `myAdmin` access control::

from eve_auth_jwt import requires_token

@app.route('/admin/my_resource/download', methods=['GET'])
@requires_token(audiences=['myAudience'], allowed_roles=['myAdmin'])
def csv_download():
account_id = request.args.get('account_id', None)
return generateCSV(account_id)


Access the parsed JWT token values
----------------------------------

The parsed JWT token values are stored in the `flask.g` dict, but custom functions exist to aid in reading the values. The values are only available after the JWT token integrity check and user authorization occurs.

Example of access the parse JWT token fields::

from eve_auth_jwt import get_request_auth_value, get_authen_claims, get_authen_roles

def my_fn():
# Request authentication value as a str
account_id = get_request_auth_value()

# JWT claims as a dict[str]
payload = get_authen_claims()

# Roles as arr[str]
roles = get_authen_roles()


Different JWTAuth on different endpoints
----------------------------------------

Eve supports both global authentication of the whole API, and endpoint-level authentication. If one wish to use different secret keys and/or issuers on certain endpoints, it is possible to create instances of JWTAuth which overrides the global config values of ``JWT_SECRET`` and ``JWT_ISSUER``.

The secret key and issuer can be set through the JWTAuth constructor or as properties on instances of JWTAuth.

Example usage::

from eve import Eve
from eve_auth_jwt import JWTAuth

second_auth = JWTAuth('custom secret', 'specific issuer')

app = Eve(auth=JWTAuth, settings=SETTINGS)

@app.route('/second')
@second_auth.requires_token()
def different_secret():
return 'Success with custom secret!'


Licenses
--------

All source code is licensed under the `MIT License <https://raw.githubusercontent.com/rs/eve-auth-jwt/master/LICENSE>`_.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

eve-auth-jwt-fork-1.2.1.tar.gz (5.8 kB view details)

Uploaded Source

File details

Details for the file eve-auth-jwt-fork-1.2.1.tar.gz.

File metadata

  • Download URL: eve-auth-jwt-fork-1.2.1.tar.gz
  • Upload date:
  • Size: 5.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/39.0.1 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/2.7.15rc1

File hashes

Hashes for eve-auth-jwt-fork-1.2.1.tar.gz
Algorithm Hash digest
SHA256 60ff4876f827b5d0690db6b8004b78fe35830c3b616acd39cd8e81e23dc3a670
MD5 c399b5a288fd26b5733dda48b22e5e73
BLAKE2b-256 8baf244dd04bd88ae4bf53141e473d866c4d45a3af8328c8b43a1920e3e2e315

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page