Skip to main content

The python RBAC authorization library for projects where SQLAlchemy is a valid option.

Project description

Logo: PyPermission - RBAC for Python

PyPermission - The python RBAC authorization library for projects where SQLAlchemy is a valid option.

repository mirror License: LGPLv3 pipeline status coverage report Code style: black Imports: isort

pkgversion versionsupport Downloads Week Downloads Total

PyPermission keeps authorization simple. It avoids framework lock-ins, skips Policy DSL complexity, and gives developers a clean, Python-native way to express Subjects, Roles, Resources, and Permissions across any application architecture.


If you find the PyPermission library beneficial, please consider supporting the project by starring it on GitHub.

GitHub Repo stars

PyPermission - RBAC for Python

Features

Installing PyPermission with pip

The PyPermission library can be installed directly from the PyPI repositories with:

pip install PyPermission

If you want to use PostgreSQL, you need to install the postgres dependency group:

pip install 'PyPermission[postgres]'

Usage Example

from sqlalchemy.engine import create_engine
from sqlalchemy.orm import sessionmaker
from sqlalchemy.event import listen

engine = create_engine("sqlite:///:memory:", future=True)
db_factory = sessionmaker(bind=engine, autoflush=False, autocommit=False)

from pypermission import RBAC, Permission, create_rbac_database_table, set_sqlite_pragma

listen(engine, "connect", set_sqlite_pragma) # needed for foreign key constraints (sqlite only)
create_rbac_database_table(engine=engine)

with db_factory() as db:
    # Create an 'admin' Role
    RBAC.role.create(role="admin", db=db)

    # Allow all Members of the 'admin' Role, to edit any user
    RBAC.role.grant_permission(
        role="admin",
        permission=Permission(
            resource_type="user",
            resource_id="*",
            action="edit",
        ),
        db=db,
    )

    # Create a Subject for the user 'Alex'
    RBAC.subject.create(subject="Alex", db=db)

    # Assign Subject 'Alex' to the 'admin' Role
    RBAC.subject.assign_role(
        subject="Alex", role="admin", db=db
    )

    # Test if user 'Alex' can edit user 'Max'
    RBAC.subject.assert_permission(
        subject="Alex",
        permission=Permission(
            resource_type="user",
            resource_id="Max",
            action="edit",
        ),
        db=db,
    )

Auditing

PyPermission supports a variety of review functions for auditing of the RBAC system and even comes with some tooling for visualization out of the box.

Auditing graph for RBAC in Python

The Core API surface on a glance

pypermission.service.role.RoleService

Methods
create(*, role: str, db: Session) -> None
delete(*, role: str, db: Session) -> None
list(*, db: Session) -> tuple[str, ...]
add_hierarchy(*, parent_role: str, child_role: str, db: Session) -> None
remove_hierarchy(*, parent_role: str, child_role: str, db: Session) -> None
children(*, role: str, db: Session) -> tuple[str, ...]
ascendants(*, role: str, db: Session) -> tuple[str, ...]
descendants(*, role: str, db: Session) -> tuple[str, ...]
subjects(*, role: str, include_descendant_subjects: bool = False, db: Session) -> tuple[str, ...]
grant_permission(*, role: str, permission: Permission, db: Session) -> None
revoke_permission(*, role: str, permission: Permission, db: Session) -> None
check_permission(*, role: str, permission: Permission, db: Session) -> bool
assert_permission(*, role: str, permission: Permission, db: Session) -> None
permissions(*, role: str, inherited: bool = True, db: Session) -> tuple[Permission, ...]
policies(*, role: str, inherited: bool = True, db: Session) -> tuple[Policy, ...]
actions_on_resource(*, role: str, resource_type: str, resource_id: str, inherited: bool = True, db: Session) -> tuple[str, ...]

pypermission.service.role.SubjectService

Methods
create(*, subject: str, db: Session) -> None
delete(*, subject: str, db: Session) -> None
list(*, db: Session) -> tuple[str, ...]
assign_role(*, subject: str, role: str, db: Session) -> None
deassign_role(*, subject: str, role: str, db: Session) -> None
roles(*, subject: str, include_ascendant_roles: bool = False, db: Session) -> tuple[str, ...]
check_permission(*, subject: str, permission: Permission, db: Session) -> bool
assert_permission(*, subject: str, permission: Permission, db: Session) -> None
permissions(*, subject: str, db: Session) -> tuple[Permission, ...]
policies(*, subject: str, db: Session) -> tuple[Policy, ...]
actions_on_resource(*, subject: str, resource_type: str, resource_id: str, inherited: bool = True, db: Session) -> tuple[str, ...]

Resources

Sponsor

Digon.IO GmbH Logo

Fine-Tuned AI services for developers.

Digon.IO provides end-to-end consulting and development for SMEs and software companies building data-driven solutions - with a focus on supply chain optimization and text processing. (Website) (Technical Blog)

The sponsor logo is the property of Digon.IO GmbH. Standard trademark and copyright restrictions apply to any use outside this repository.

License

  • Library source code: Licensed under LGPLv3.
  • Library logo: The library logo is a trademark of the project (unregistered). You are permitted to use the logo only in contexts that directly reference, document, or promote this library. For example, in a dependent project or in a blog post discussing this library. Any other use is prohibited.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pypermission-0.4.0.tar.gz (16.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

pypermission-0.4.0-py3-none-any.whl (21.3 kB view details)

Uploaded Python 3

File details

Details for the file pypermission-0.4.0.tar.gz.

File metadata

  • Download URL: pypermission-0.4.0.tar.gz
  • Upload date:
  • Size: 16.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.8

File hashes

Hashes for pypermission-0.4.0.tar.gz
Algorithm Hash digest
SHA256 20996d82f83ee368aa9a88a0b662f6733d3f7a7e036a50ed5b55b5a560a986fb
MD5 f46f53cacb39e64c9f0cd5ab27bf8f28
BLAKE2b-256 8051837ec81d474d34b75e1f4d501bd74e65a1f1119f879e38599e3d67571459

See more details on using hashes here.

File details

Details for the file pypermission-0.4.0-py3-none-any.whl.

File metadata

File hashes

Hashes for pypermission-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 2359ca2237f00caff9599e3c7f69b0ea649fd503d4ae8c1a215defdc98b41f0b
MD5 94b7e2a8d542744cda2a6c1507985f6a
BLAKE2b-256 f39b0ba3485ae766b1639d1fdcb5851dc28c645f94a14a25d7e08eae61abd651

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page