Python helpers for talking to the google-authz service from popular web frameworks.
Project description
google-authz-client
High-level helpers for calling the google-authz service from Python APIs.
Version 0.5 ships framework integrations for FastAPI, Flask, and Django along with a shared HTTP client powered by httpx.
Installation
Pick the source that matches how you ship code. All of the examples show the fastapi extra, but feel free to swap in flask, django, or omit extras entirely.
From PyPI
pip install "google-authz-client[fastapi]"
This installs the latest published release and is the easiest option for production deployments.
From Git
pip install "google-authz-client[fastapi] @ git+https://github.com/example/google-authz-client.git@main"
Pin to a tag (for example @v0.5.0) when you want a reproducible build while still consuming code directly from Git.
Local Editable Install
pip install -e .[fastapi,flask,django,dev]
Use this when you are hacking on the library itself so your changes are reloaded without reinstalling. The extra groups are optional – install only what your framework needs.
Quick Start (FastAPI)
from fastapi import Depends, FastAPI
from google_authz_client.client import AsyncGoogleAuthzClient
from google_authz_client.fastapi import current_user, require_permission
client = AsyncGoogleAuthzClient()
app = FastAPI()
@app.get("/inventory")
async def read_inventory(
authz=Depends(current_user(client)),
_=Depends(require_permission("inventory:read", client=client)),
):
return {"subject": authz.subject, "perms": authz.permissions}
current_user discovers a token via cookies or the Authorization header, fetches the caller’s effective authorization, and raises HTTP 401/403 when missing or denied.
Flask Example
from flask import Flask
from google_authz_client.client import GoogleAuthzClient
from google_authz_client.flask import register_current_user_middleware, require_permission
app = Flask(__name__)
client = GoogleAuthzClient()
register_current_user_middleware(app, client)
@app.post("/inventory")
@require_permission("inventory:create", client=client)
def create_item():
return {"subject": flask.g.current_user.subject}
Django Middleware
# settings.py
from google_authz_client.client import GoogleAuthzClient
GOOGLE_AUTHZ_CLIENT = GoogleAuthzClient()
MIDDLEWARE.append("google_authz_client.django.GoogleAuthzMiddleware")
Configuration
Use GoogleAuthzSettings to load sensible defaults from environment variables:
from google_authz_client.config import GoogleAuthzSettings
settings = GoogleAuthzSettings()
client = settings.build_async_client()
Key settings include base_url, timeout_seconds, verify_tls, and shared_secret.
Token Type and Authz Requests
The client posts to /authz and /authz/check with a JSON body that includes either
id_token or session_token. By default, the client uses id_token, which matches the
current google-authz server implementation.
from google_authz_client.client import AsyncGoogleAuthzClient
client = AsyncGoogleAuthzClient(token_type="id_token")
If you are using a google-authz session token (for example, after completing the
/login flow), configure the client accordingly:
client = AsyncGoogleAuthzClient(token_type="session_token")
Using a Remote google-authz Service
By default, the client points at http://localhost:8080. If your google-authz service runs
in another environment (container, VM, or a separate host), configure the base URL explicitly
so the client can reach it over the network.
Environment-based configuration:
export GOOGLE_AUTHZ_BASE_URL="https://authz.example.com"
export GOOGLE_AUTHZ_VERIFY_TLS="true"
Code-based configuration:
from google_authz_client.client import AsyncGoogleAuthzClient
client = AsyncGoogleAuthzClient(
base_url="https://authz.example.com",
verify_tls=True,
)
If you are terminating TLS in front of google-authz, keep verify_tls=True and configure
the appropriate certificates on the client host. For local development or self-signed certs,
set verify_tls=False or GOOGLE_AUTHZ_VERIFY_TLS=false with caution.
shared_secret is optional. The core google-authz service relies on network ACLs
(AUTHZ_ALLOWED_NETWORKS) rather than a shared-secret header. Only set
GOOGLE_AUTHZ_SHARED_SECRET (or shared_secret=...) if you have explicitly added a layer
that enforces it (for example, an API gateway or custom fork).
Development
Run linters and tests with:
pip install -e .[dev,fastapi,flask,django]
pytest
The FastAPI sample app lives under examples/fastapi_app.
Release Process
See RELEASING.md for version-bump instructions, changelog expectations, and details on how the GitHub Actions workflow publishes to PyPI.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file google_authz_client-0.6.0.tar.gz.
File metadata
- Download URL: google_authz_client-0.6.0.tar.gz
- Upload date:
- Size: 16.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9f882d1427e2e9d6ca1064f325022e31c275869bea70bb2602bf9c6851e0e2ab
|
|
| MD5 |
145d86d9b81f66509cc962b95727bdd4
|
|
| BLAKE2b-256 |
a4b6fbdfa6b4121f69a9ea2feee1038012a49008e1667cc3739effc030d3e218
|
File details
Details for the file google_authz_client-0.6.0-py3-none-any.whl.
File metadata
- Download URL: google_authz_client-0.6.0-py3-none-any.whl
- Upload date:
- Size: 16.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a258d9f739fbae582ad1f7325663797f8a1df83dd4183b83eceb72b9fd9e6f9b
|
|
| MD5 |
6b04e25adb55cbc5d7983330902fccda
|
|
| BLAKE2b-256 |
478fcced584b1e7d10bf6660481472ed47363a651ce78beb7e8c72d3da92dec5
|