Skip to main content

Secure, DIP-based reusable RBAC infrastructure

Project description

rbac_infra

A reusable, framework-friendly Role-Based Access Control (RBAC) infrastructure package with:

  • A clean core service based on abstractions (Dependency Inversion Principle).
  • Pluggable repositories for roles and permissions.
  • Policy fallback hooks for contextual authorization rules.
  • Optional caching backends (in-memory and Redis).
  • A ready-to-use Django adapter (models, repositories, auth backend).

Features

  • Multi-tenant permission keys in the form: tenant:action:resource
  • Strict tenant isolation during permission matching
  • Wildcard support for action/resource (*) with safe matching
  • Extensible policy interface for custom checks (e.g., owner-based access)
  • Adapter-friendly architecture for integrating with any persistence layer
  • Django integration out of the box

Project structure

rbac_infra/
├── core/
│   ├── entities.py        # Permission entity + key generation
│   ├── interfaces.py      # RoleRepository, PermissionRepository, Policy
│   ├── service.py         # RBACService permission engine
│   └── exceptions.py      # AccessDenied
├── caching/
│   ├── interfaces.py      # CacheBackend interface
│   └── memory_cache.py    # InMemoryCache + RedisCache
└── adapter/
    ├── models.py          # Django models for Tenant/Role/Permission/UserRole
    ├── repository.py      # Django repository implementations
    ├── backend.py         # Django auth backend using RBACService
    └── migrations/

Installation

Base package

pip install rbac_infra

Add required variable

REDIS_URL=redis://localhost:6379/0 # (Use your production redis url.)

Development dependencies (includes Django + test tools)

pip install -e .[dev]

Core concepts

1. Permission model

Permissions are represented as:

  • tenant_id
  • action
  • resource

Canonical key format:

tenant:action:resource

Examples:

  • tenant1:read:invoice
  • tenant2:update:user
  • tenant1:*:invoice (all actions on invoice)
  • tenant1:read:* (read any resource)

2. Repository abstraction

The core service does not know about Django, SQLAlchemy, or any DB directly. You inject:

  • RoleRepository → returns role names for a user in a tenant
  • PermissionRepository → returns permissions for a role in a tenant

This keeps your domain logic portable and testable.

3. Policy fallback

If role/permission checks fail, the service evaluates optional policies.

Use policies for contextual rules such as:

  • ownership
  • time-based access
  • business workflow constraints

Using the core service directly

from rbac_infra.core.service import RBACService
from rbac_infra.core.interfaces import RoleRepository, PermissionRepository
from rbac_infra.core.entities import Permission

class MyRoleRepo(RoleRepository):
    def get_user_roles(self, user_id, tenant_id):
        return ["admin"]

class MyPermissionRepo(PermissionRepository):
    def get_role_permissions(self, role_name, tenant_id):
        return [Permission(action="read", resource="invoice", tenant_id=tenant_id)]

service = RBACService(
    role_repo=MyRoleRepo(),
    permission_repo=MyPermissionRepo(),
)

allowed = service.check(
    user_id="user-1",
    tenant_id="tenant1",
    action="read",
    resource="invoice",
)

If access is denied, RBACService.check(...) raises AccessDenied.


Caching

You can provide any cache implementation that satisfies CacheBackend.

Built-ins:

  • InMemoryCache — simple process-local cache
  • RedisCache — Redis-backed cache using REDIS_URL (default redis://localhost:6379/0)

Example:

from rbac_infra.caching.memory_cache import InMemoryCache
from rbac_infra.core.service import RBACService

service = RBACService(
    role_repo=role_repo,
    permission_repo=permission_repo,
    cache=InMemoryCache(),
)

Django adapter (ready to use)

The project includes a Django adapter with:

  • Models: Tenant, Role, Permission, UserRole
  • Repositories: DjangoRoleRepository, DjangoPermissionRepository
  • Backend: RBACBackend

1) Add app and backend

# settings.py
INSTALLED_APPS = [
    # ...
    "rbac_infra.adapter.apps.RBACAdapterConfig",
]

AUTHENTICATION_BACKENDS = [
    "django.contrib.auth.backends.ModelBackend",
    "rbac_infra.adapter.backend.RBACBackend",
]

2) Run migrations

python manage.py migrate

3) Check permissions

user.has_perm("tenant1:read:invoice")

Permission string format must always be:

tenant:action:resource

Create custom policies

Implement Policy.evaluate(user_id, action, resource, context) -> bool.

from rbac_infra.core.interfaces import Policy

class OwnerPolicy(Policy):
    def evaluate(self, user_id, action, resource, context):
        return context.get("owner_id") == user_id

Inject into the service:

service = RBACService(
    role_repo=role_repo,
    permission_repo=permission_repo,
    policies=[OwnerPolicy()],
)

You can pass context at runtime:

service.check(
    user_id="u1",
    tenant_id="tenant1",
    action="update",
    resource="invoice",
    context={"owner_id": "u1"},
)

Build your own adapter/repository (beyond Django)

If you want to support another framework (Flask/FastAPI/custom service) or data store (SQLAlchemy/Mongo/HTTP API), follow the same adapter pattern used in rbac_infra/adapter:

  1. Implement a RoleRepository.
  2. Implement a PermissionRepository.
  3. Map your storage records to rbac_infra.core.entities.Permission.
  4. Inject these into RBACService.
  5. (Optional) wrap service calls in your framework-specific authorization hook/middleware.

Example: custom SQLAlchemy-style adapter skeleton

from rbac_infra.core.interfaces import RoleRepository, PermissionRepository
from rbac_infra.core.entities import Permission

class SQLARoleRepository(RoleRepository):
    def __init__(self, session):
        self.session = session

    def get_user_roles(self, user_id, tenant_id):
        # Query your own tables
        # return list[str]
        ...

class SQLAPermissionRepository(PermissionRepository):
    def __init__(self, session):
        self.session = session

    def get_role_permissions(self, role_name, tenant_id):
        # Query your own tables
        rows = ...
        return [
            Permission(
                action=row.action,
                resource=row.resource,
                tenant_id=tenant_id,
            )
            for row in rows
        ]

Then use it:

service = RBACService(
    role_repo=SQLARoleRepository(session),
    permission_repo=SQLAPermissionRepository(session),
)

This keeps your authorization rules centralized while letting your persistence and framework vary.


Testing

Run tests:

pytest

The test suite covers:

  • core permission checks
  • wildcard matching
  • tenant isolation
  • policy fallback
  • Django repository/backend behavior
  • Redis cache behavior

Security notes

  • Tenant matching is strict: tenant IDs must match exactly.
  • Invalid permission string formats are denied.
  • Backend behavior is fail-closed for inactive/anonymous users.

Contributing

  • Fork the repo
  • Create a feature branch
git checkout -b feature/awesome
  • Run test after implementing your feature
pytest
  • Commit changes
git commit -m 'Add awesome feature'
  • Push branch and open a PR

Support

For enterprise inquiries, please contact offsideint@gmail.com

For bugs, open an issue on GitHub.

Built with ❤️ by OFFSIDE INTEGRATED TECHNOLOGY — because developers do not need hassle wiring RBAC.

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rbac_infra-0.1.3.tar.gz (13.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

rbac_infra-0.1.3-py3-none-any.whl (13.6 kB view details)

Uploaded Python 3

File details

Details for the file rbac_infra-0.1.3.tar.gz.

File metadata

  • Download URL: rbac_infra-0.1.3.tar.gz
  • Upload date:
  • Size: 13.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for rbac_infra-0.1.3.tar.gz
Algorithm Hash digest
SHA256 e342b18e0d6135c0e1ae7bd5ce423aebfa29f37cbbe3f1600fdce3d5a6dc91f2
MD5 bc1a9d40a2e5e0314303f84bbb5c6e5e
BLAKE2b-256 025a86fe59a40330e7f915dadc408eb5960ce4c120012a5ba1c31f74bc1782c7

See more details on using hashes here.

Provenance

The following attestation bundles were made for rbac_infra-0.1.3.tar.gz:

Publisher: publish.yml on 0FFSIDE1/rbac_infra

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file rbac_infra-0.1.3-py3-none-any.whl.

File metadata

  • Download URL: rbac_infra-0.1.3-py3-none-any.whl
  • Upload date:
  • Size: 13.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for rbac_infra-0.1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 3a31cbf8cdda46ca96c1bb566aff6a5ef79ade983ebe6b6f35a389b6cf2bd596
MD5 809a1771d28fe552b75411dbee2c5f72
BLAKE2b-256 6007d635913c114bc9fd691fd9b6a92e49117c126c1c20285b9e32a07f59e28b

See more details on using hashes here.

Provenance

The following attestation bundles were made for rbac_infra-0.1.3-py3-none-any.whl:

Publisher: publish.yml on 0FFSIDE1/rbac_infra

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page