Skip to main content

A module to simplify working with HMAC auth in Flask apps

Project description

Flask-HmacAuth
==============

`|Build Status| <https://travis-ci.org/Phillipmartin/flask-hmacauth>`_ A
module to simplify HMAC-style authentication for RESTful APIs in Flask,
which also builds in a simple RBAC concept and anti-replay via a
timestamp. For GET requests, the path section and all parameters are
hashed. For POST requests, the request body is added as well. By
default, the module expects authentication via an X-Auth-Signature
header and ACCOUNT\_ID and TIMESTAMP parameters (holding the obvious
values) to be present in the query string or request body. TIMESTAMP can
be in any format datetime.fromtimestamp() can parse. ACCOUNT\_ID will be
used to lookup a given account's secret and roles via an AccountBroker.
If auth fails, the application throws a 403 back to the client. All of
that can be changed, however.

The concept of an AccountBroker is used to separate this module from any
actual user/role management logic. 2 trivial AccountBroker
implementations have been provided.

Example
=======

Server
------

::

from flask import Flask
from flask.ext.hmacauth import hmac_auth, DictAccountBroker, HmacManager

app = Flask(__name__)
accountmgr = DictAccountBroker(
accounts={
"admin": {"secret": ";hi^897t7utf", "rights": ["create", "edit", "delete", "view"]},
"editor": {"secret": "afstr5afewr", "rights": ["create", "edit", "view"]},
"guest": {"secret": "ASDFjoiu%i", "rights": ["view"]}
})
hmacmgr = HmacManager(accountmgr, app)
...
@app.route('/api/v1/create')
@hmac_auth("create")
def create_thing():
...

Client
------

::

import requests
import time
import hashlib

path_and_query = "/api/v1/create?TIMESTAMP="+str(int(time.time()))+"&ACCOUNT_ID=admin&foo=bar"
host = "https://example.com"
sig=hmac.new(";hi^897t7utf", digestmod=hashlib.sha1, msg=path_and_query).hexdigest()
req = requests.get(host+path_and_query, headers={'X-Auth-Signature': sig})

AccountBroker
=============

An AccountBroker is an object that intermediates between the HMAC
authentication and your user/account store. It does this by exposing the
following methods:

- get\_secret(account\_id) - returns a string secret given an account
ID. If the account does not exist, returns None
- has\_rights(account\_id, rights) - returns True if account\_id has
all of the rights in the list rights, otherwise returns False.
Returns False if the account does not exist.
- is\_active(account\_id) - returns True if account\_id is active (for
whatever definition you want to define for active), otherwise returns
False.

Flask-Hmacauth ships with 2 trivial AccountBroker implementations, a
Dict-based AccountBroker (DictAccountBroker) and a static AccountBroker
(StaticAccountBroker).

DictAccountBroker
-----------------

Takes a dict of format:

::

{
"accountID": {
secret: "blahblah",
rights: ["right1", "right2", "right3", ...]
}
...
}

it also exposes the add\_accounts and del\_accounts methods to modify
accounts on the fly.

StaticAccountBroker
-------------------

Essentially disables all of the user and role management, and sets a
static key for use in HMAC. NOTE, if you use this class you need to pass
StaticAccountBroker.GET\_ACCOUNT to HmacManager as the account\_id
parameter OR supply a dummy value for ACCOUNT\_ID in the query string

Write your own
--------------

A very common case for larger applications will be user management via a
database. In that case, your AuthenticationBroker class just needs to
perform the requisite SQL queries to satisfy the the methods above and
you're good to go.

HmacManager
===========

This is the meat of the module. This object contains the is\_authorized
method, which actually does the HMAC verification and role checks.

In the simple case, you just need to pass this object's constructor the
flask application object and an AccountBroker object. In more complex
cases, where you want to change defaults, you have the following
options:

- app - this is the Flask application container
- account\_broker - this is the ApplicationBroker object
- account\_id - this is a callable, which when fed a request object
will return the request's account ID. The default value for this is
lambda x: x.values.get('ACCOUNT\_ID')
- signature - this is a callable, which when fed a request object will
return the request's signature. The default value for this is
GET\_SIGNATURE = lambda x: x.headers.get('X-Auth-Signature').
- timestamp - this is a callable, which when fed a request object will
return the request's timestamp. The default value for this is lambda
x: x.values.get('TIMESTAMP')
- valid\_time - number of seconds that a signed request is valid (based
on the signed timestamp). defaults to 5
- digest - digest type, defaults to hashlib.sha1

.. |Build
Status| image:: https://travis-ci.org/Phillipmartin/flask-hmacauth.svg?branch=master

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

flask-hmacauth-0.3.9.tar.gz (6.3 kB view details)

Uploaded Source

File details

Details for the file flask-hmacauth-0.3.9.tar.gz.

File metadata

File hashes

Hashes for flask-hmacauth-0.3.9.tar.gz
Algorithm Hash digest
SHA256 793309b3ba3424508742baacd08a8cb77edcf5859ec75d53014e450947f668de
MD5 8efad25d941282263de9d9ef3fc2753d
BLAKE2b-256 b1c0b273f6ab86360b548e75ba1741f8abcca160d1c52a6b27f5aa38ef7d3b2b

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page