Skip to main content

👮 Role-Based-Access-Control module for Orwynn framework

Project description

👮 Role-Based-Access-Control module for Orwynn framework

Gives controls to roles and their permissions in your backend application.

Installation

Via Poetry:

poetry add orwynn_rbac

Usage

Define default roles in your application:

DefaultRoles = [
    DefaultRole(
        name="sergeant",
        title="Sergeant",
        description="Flexible policeman",
        permission_names=set(
            "get:lowlifes",
            "post:issue-tax",
            "post:start-pursue"
        )
    ),
    ...
]

NOTE: Default roles are initialized only once per fresh database.

In your Boot setup, initialize a RBACBoot class and get a bootscript from it:

from orwynn_rbac import RBACBoot

Boot(
    ...,
    bootscripts=[
        ...,
        RBACBoot(
            default_roles=DefaultRoles
        ).get_bootscript()
    ]
)

In any module, where RBAC functionality is required (e.g. user access checkers), import orwynn_rbac.module:

import orwynn_rbac

your_module = Module(
    ...,
    imports=[
        ...,
        orwynn_rbac.module
    ]
)

Checking access

To check an access to your controller you are free to implement own middleware, retrieve an user id, e.g. from HTTP authorization header, and pass it to our AccessService.check_user() method. A minimal middleware might look like this:

class AccessMiddleware(HttpMiddleware):
    def __init__(
        self,
        covered_routes: list[str],
        service: AccessService,
    ) -> None:
        super().__init__(covered_routes)
        self.service: AccessService = service

    async def process(
        self,
        request: HttpRequest,
        call_next: Callable,
    ) -> HttpResponse:
        user_id: str | None = request.headers.get("user-id", None)
        self.service.check_user(
            user_id, str(request.url.components.path), request.method
        )

        response: HttpResponse = await call_next(request)

        return response

The method AccessService.check_user() will raise a ForbiddenError if an user with given id has no access to the route and method, so you just need to call it with these arguments.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

orwynn_rbac-0.1.0.tar.gz (17.3 kB view details)

Uploaded Source

Built Distribution

orwynn_rbac-0.1.0-py3-none-any.whl (21.5 kB view details)

Uploaded Python 3

File details

Details for the file orwynn_rbac-0.1.0.tar.gz.

File metadata

  • Download URL: orwynn_rbac-0.1.0.tar.gz
  • Upload date:
  • Size: 17.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.5.1 CPython/3.11.5 Linux/6.5.9-zen2-1-zen

File hashes

Hashes for orwynn_rbac-0.1.0.tar.gz
Algorithm Hash digest
SHA256 37ef13e85a2ede78620bb725078e4cc1ad97313792f729e8124ef140249d739c
MD5 b9c9b6933dc860205dafd54c10bba618
BLAKE2b-256 0f96a26b58877e94e2073a875ab0ea5c0b5fdd5c2f22b0ef9906c0e4d55048f2

See more details on using hashes here.

File details

Details for the file orwynn_rbac-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: orwynn_rbac-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 21.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.5.1 CPython/3.11.5 Linux/6.5.9-zen2-1-zen

File hashes

Hashes for orwynn_rbac-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 6108f3580cbfa20cc83391cc851811abdf013864273da27fa3b424faf879e357
MD5 0a4d93bb6889ded8f44e79b2bec55a9f
BLAKE2b-256 1c849602255615fdda6c6cad7d33112ccc8201b7433cf9212dcf6071363fc135

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page