Module for securing API endpoints based on policies.
Project description
inuits_policy_based_auth
inuits_policy_based_auth is a python package for securing API endpoints based on policies.
Installation
Install inuits_policy_based_auth as follows:
pip install inuits-policy-based-auth
Getting Started
Instantiate the PolicyFactory in you app, for example in app.py (all examples given are based on a Python Flask app).
from inuits_policy_based_auth import PolicyFactory
policy_factory = PolicyFactory()
Manually loading policies
Importing and registering policies can be done manually. Don't forget to set a fallback key, this ensures that policies of a specific app are applied when the app cannot be determined automatically.
from inuits_policy_based_auth.authentication.policies.token_based_policies.authlib_flask_oauth2_policy import (
AuthlibFlaskOauth2Policy,
)
from inuits_policy_based_auth.authorization.policies.super_admin_policy import (
SuperAdminPolicy,
)
policy_factory.register_authentication_policy("apps.[app_name]", AuthlibFlaskOauth2Policy(...))
policy_factory.register_authorization_policy("apps.[app_name]", SuperAdminPolicy())
policy_factory.set_fallback_key_for_policy_mapping("apps.[app_name]")
However, it is recommended to load policies dynamically as this will allow you to make use of the full potential of this package.
Dynamically loading policies
You can write a loader which loads policies dynamically based on a configuration file.
Example configuration file:
{
"[app_name_1]": {
"policies": {
"authentication": [
"token_based_policies.authlib_flask_oauth2_policy"
],
"authorization": [
"super_admin_policy",
"scope_based_policy"
]
}
},
"[app_name_2]": {
"policies": {
"authentication": [
"token_based_policies.authlib_flask_oauth2_policy"
],
"authorization": [
"super_admin_policy",
"open_data_policy"
]
}
}
}
Example policy_loader.py:
import json
import os
from importlib import import_module
from inuits_policy_based_auth import PolicyFactory
from inuits_policy_based_auth.exceptions import (
PolicyFactoryException,
)
from logging import Logger
def load_policies(policy_factory: PolicyFactory, logger: Logger):
apps = {}
configuration_file_name = os.getenv("[CONFIGURATION_FILE_NAME]") or ""
with open(configuration_file_name) as configuration_file:
apps = json.load(configuration_file)
for app in apps:
try:
auth_type = "authentication"
for policy_module_name in apps[app]["policies"].get(auth_type):
policy = __get_class(app, auth_type, policy_module_name)
policy = __instantiate_authentication_policy(
policy_module_name, policy, logger
)
policy_factory.register_authentication_policy(
f"apps.{app}", policy
)
auth_type = "authorization"
for policy_module_name in apps[app]["policies"].get(auth_type):
policy = __get_class(app, auth_type, policy_module_name)
policy_factory.register_authorization_policy(
f"apps.{app}", policy()
)
except Exception as error:
raise PolicyFactoryException(
f"Policy factory was not configured correctly: {str(error)}"
).with_traceback(error.__traceback__)
policy_factory.set_fallback_key_for_policy_mapping("apps.[app_name]")
def __get_class(app, auth_type, policy_module_name):
module = None
try:
module = import_module(f"apps.{app}.policies.{auth_type}.{policy_module_name}")
except:
module = import_module(
f"inuits_policy_based_auth.{auth_type}.policies.{policy_module_name}"
)
policy_class_name = module.__name__.split(".")[-1].title().replace("_", "")
policy = getattr(module, policy_class_name)
return policy
def __instantiate_authentication_policy(policy_module_name, policy, logger: Logger):
if policy_module_name == "token_based_policies.authlib_flask_oauth2_policy":
return policy(
logger,
os.getenv("STATIC_ISSUER", False),
os.getenv("STATIC_PUBLIC_KEY", False),
os.getenv("REALMS", "").split(","),
os.getenv("ROLE_SCOPE_MAPPING", os.getenv("TEST_API_SCOPES")),
os.getenv("REMOTE_TOKEN_VALIDATION", False) in ["True", "true", True],
os.getenv("REMOTE_PUBLIC_KEY", False),
)
return policy()
Now you can import the loader in app.py and pass policy_factory
as an argument to it.
from apps.policy_loader import load_policies
from logging import Logger
load_policies(policy_factory, Logger(""))
As you can see in these examples, dynamically loading policies will allow you to add new policies and override existing ones, which makes this package highly customizable and generic.
Custom policies
Continuing from the examples above, you can make a custom authorization policy by creating a folder policies
within a specific app. Here you should create the folders authentication
and authorization
that will contain custom policies which you can add to your configuration. In this case we name our new policy the same as an existing one, which will override it. Each authentication policy must inherit from BaseAuthenticationPolicy and implement the abstract method authenticate
, while each authorization policy must inherit from BaseAuthorizationPolicy and implement the abstract method authorize
.
Example folder structure:
api
├── apps
│ ├── [app_name]
│ │ ├── policies
│ │ │ ├── authentication
│ │ │ └── authorization
│ │ │ └── open_data_policy.py
│ │ ├── ...
...
│ ├── configuration.json
│ └── policy_loader.py
...
└── app.py
Example custom open_data_policy.py:
from inuits_policy_based_auth import BaseAuthorizationPolicy
class OpenDataPolicy(BaseAuthorizationPolicy):
def authorize(self, policy_context, user_context, request_context):
request = request_context.http_request
if request.method == "GET" and user_context.tenant == "inuits":
policy_context.access_verdict = True
return policy_context
Usage
If everything is set up correctly, you can use the apply_policies
decorator as follows:
from app import policy_factory
from flask import request
from inuits_policy_based_auth import RequestContext
class Entity():
@policy_factory.apply_policies(
RequestContext(request, ["[scope_1]", "[scope_2]"])
)
def get(self):
...
You can also use the authenticate
decorator to only apply authentication policies:
from app import policy_factory
class Entity():
@policy_factory.authenticate()
def get(self):
...
Contributing
Do not hesitate to open issues and create pull requests.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for inuits_policy_based_auth-3.0.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9d6cd31943615cd65470b0fc5c24aec981e2baf5a766130d9a6096c66a3b8483 |
|
MD5 | 94b8a339f5275dcb651fd7740e31e61a |
|
BLAKE2b-256 | 253f8b34796a89ec0005ff2a7e12479438b837355219c27e49ff8b8f5fae41d4 |
Hashes for inuits_policy_based_auth-3.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | baaa5d891c1ba3351cc7ebe5316a9cb89ac3252bb2b695963a8acd26b1edd952 |
|
MD5 | 5863a95784127bd44b35e15b96f64666 |
|
BLAKE2b-256 | 4f714395a5cc59473b3e38c0a4bcd9053a6cf10a305a38fed326351ec87713bc |