Skip to main content

A powerful, simple, and async security library for Sanic.

Project description

Contributors Forks Stargazers Issues


Sanic Security

A powerful, simple, and async security library for Sanic.
Documentation · Report Bug · Request Feature

Table of Contents

About The Project

Sanic Security is an authentication and authorization library made easy, designed for use with Sanic. This library is intended to be easy, convenient, and contains a variety of features:

  • Easy login and registering
  • Captcha
  • SMS and email verification
  • JWT
  • Password recovery
  • Wildcard permissions
  • Role permissions
  • IP2Proxy support
  • Easy database integration
  • Completely async

This repository has been starred by Sanic's core maintainer:

alt text

Getting Started

In order to get started, please install pip.

Prerequisites

  • pip
sudo apt-get install python3-pip

Installation

  • Install pip packages
pip3 install sanic-security

Usage

Once Sanic Security is configured and good to go, implementing is easy as pie.

Initial Setup

Familiarity with Sanic and Tortoise ORM is recommended.

First you have to create a configuration file called auth.ini in the project directory. Make sure Python's working directory is the project directory. Below is an example of its contents:

WARNING: You must set a custom secret, or you will compromise your encoded sessions.

[AUTH]
name=ExampleProject
secret=05jF8cSMAdjlXcXeS2ZJUHg7Tbyu
captcha_font=source-sans-pro.light.ttf

[TORTOISE]
username=admin
password=8UVbijLUGYfUtItAi
endpoint=website.cweAenuBY6b.us-north-1.rds.amazonaws.com
schema=webschema
models=sanic_security.core.models
engine=mysql
generate=true

[TWILIO]
from=12058469963
token=1bcioi878ygO8fi766Fb34750e82a5ab
sid=AC6156Jg67OOYe75c26dgtoTICifIe51cbf

[SMTP]
host=smtp.gmail.com
port=465
from=test@gmail.com
username=test@gmail.com
password=wfrfouwiurhwlnj
tls=true
start_tls=false

[IP2PROXY]
key=iohuyg87UGYOFijoTYG8HOuhuZJsdXwjqbhuyghuiBUYG8yvo6J
code=PX1LITEBIN
bin=IP2PROXY-LITE-PX1.BIN

You may remove each section in the configuration you aren't using.

Once you've configured Sanic Security, you can initialize Sanic with the example below:

if __name__ == '__main__':
    initialize_security(app)
    app.run(host='0.0.0.0', port=8000, debug=True)

WARNING: First time initialization may take up to a minute.

All request bodies must be sent as form-data. For my below examples, I use my own custom json method:

from sanic.response import json as sanic_json
def json(message, content, status_code=200):
    payload = {
        'message': message,
        'status_code': status_code,
        'content': content
    }
    return sanic_json(payload, status=status_code)

Authentication

  • Registration (With all verification requirements)

Phone can be null or empty. A captcha request must be made.

Key Value
username test
email test@test.com
phone 19811354186
password testpass
captcha Aj8HgD
@app.post('api/register')
@requires_captcha()
async def on_register(request, captcha_session):
    verification_session = await register(request)
    await verification_session.text_code() # Text verification code.
    await verification_session.email_code() # Or email verification code.
    response = json('Registration successful', verification_session.account.json())
    verification_session.encode(response)
    return response
  • Registration (Without verification requirements)

Phone can be null or empty.

Key Value
username test
email test@test.com
phone 19811354186
password testpass
@app.post('api/register')
async def on_register(request):
    account = await register(request, verified=True)
    return json('Registration Successful!', account.json())
  • Login
Key Value
email test@test.com
password testpass
@app.post('api/login')
async def on_login(request):
    authentication_session = await login(request)
    response = json('Login successful!', authentication_session.account.json())
    authentication_session.encode(response)
    return response
  • Logout
@app.post('api/logout')
async def on_logout(request):
    authentication_session = await logout(request)
    response = json('Logout successful', authentication_session.account.json())
    return response
  • Requires Authentication
@app.get('api/client')
@requires_authentication()
async def on_authenticated(request, authentication_session):
    return json('Hello ' + authentication_session.account.username + '! You are now authenticated.', 
                authentication_session.account.json())

Recovery

  • Account Recovery Request
Key Value
email test@test.com
captcha Aj8HgD
@app.post('api/recovery/attempt')
@requires_captcha()
async def on_recovery_request(request, captcha_session):
    verification_session = await request_account_recovery(request)
    await verification_session.text_code() # Text verification code.
    await verification_session.email_code() # Or email verification code.
    response = json('Recovery request successful', verification_session.json())
    verification_session.encode(response)
    return response
  • Account Recovery
Key Value
code G8ha9nVa
password newpass
@app.post('api/recovery')
@requires_verification()
async def on_recovery(request):
    await account_recovery(request, verification_session)
    return json('Account recovered successfully', verification_session.account.json())

Captcha

You must download a .ttf font for captcha challenges and define the file's path in auth.ini.

1001 Free Fonts

Recommended Font

Captcha challenge example:

alt text

  • Request Captcha
@app.get('api/captcha')
async def on_request_captcha(request):
    captcha_session = await request_captcha(request)
    response = json('Captcha request successful!', captcha_session.json())
    captcha_session.encode(response)
    return response
  • Captcha Image
@app.get('api/captcha/img')
async def on_captcha_img(request):
    img_path = await CaptchaSession().captcha_img(request)
    return await file(img_path)
  • Require Captcha
Key Value
captcha Aj8HgD
@app.post('api/captcha/attempt')
@requires_captcha()
async def on_captcha_attempt(request, captcha_session):
    response = json('Your captcha attempt was correct!', captcha_session.json())
    return response

Verification

  • Request Verification (Creates and encodes a new verification code, useful for when a verification session may be invalid or expired.)
@app.get('api/verification/request')
async def on_request_verification(request):
    verification_session = await request_verification(request)
    await verification_session.text_code() # Text verification code.
    await verification_session.email_code() # Or email verification code.
    response = json('Verification request successful', verification_session.json())
    verification_session.encode(response)
    return response
  • Resend Verification (Does not create new verification code, only resends current session code.)
@app.get('api/verification/resend')
async def on_resend_verification(request):
    verification_session = await VerificationSession().decode(request)
    await verification_session.text_code() # Text verification code.
    await verification_session.email_code() # Or email verification code.
    return json('Verification code resend successful', verification_session.json())
  • Requires Verification
Key Value
code G8ha9nVa
@app.post('api/client')
@requires_verification()
async def on_verified(request, verification_session):
    return json('Hello ' + verification_session.account.username + '! You have verified yourself and may continue. ', 
                authentication_session.account.json())
  • Verify Account
Key Value
code G8ha9nVae
@app.post('api/register/verify')
@requires_verification()
async def on_verify(request, verification_session):
    await verify_account(verification_session)
    return json('Verification successful!', verification_session.json())

Authorization

Sanic Security comes with two protocols for authorization: role based and wildcard based permissions.

Role-based access control (RBAC) is a policy-neutral access-control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.

Wildcard permissions support the concept of multiple levels or parts. For example, you could grant a user the permission printer:query. The colon in this example is a special character used to delimit the next part in the permission string. In this example, the first part is the domain that is being operated on (printer), and the second part is the action (query) being performed. This concept was inspired by Apache Shiro's implementation of wildcard based permissions.

Examples of wildcard permissions are:

admin:add,update,delete
admin:add
admin:*
employee:add,delete
employee:delete
employee:*
  • Require Permissions
@app.post('api/account/update')
@require_permissions('admin:update', 'employee:add')
async def on_require_perms(request, authentication_session):
    return text('Admin successfully updated account!')
  • Require Roles
@app.get('api/dashboard/admin')
@require_roles('Admin', 'Moderator')
async def on_require_roles(request, authentication_session):
    return text('Admin gained access!')

IP2Proxy

IP2Location

IP2Location LITE

IP2Proxy Proxy Detection Database contains IP addresses which are used as VPN anonymizer, open proxies, web proxies and Tor exits, data center, web hosting (DCH) range, search engine robots (SES) and residential proxies (RES).

Anonymous proxy servers are intermediate servers meant to hide the real identity or IP address of the requestor. Studies found that a large number of anonymous proxy users are generally responsible for online credit card fraud, forums and blogs spamming.

IP2Proxy database is based on a proprietary detection algorithm in parallel with evaluation of anonymous open proxy servers which are actively in use. Then it generates an up-to-date list of anonymous proxy IP address in the download area every 24 hours.

DISCLAIMER: There is no real good “out-of-the-box” solution against fake IP addresses, aka “IP Address Spoofing”. Do not rely on IP2Proxy to provide 100% protection against malicious actors utilizing proxies/vpns.

  • Detect Proxy
@app.get('api/recovery/request')
@detect_proxy()
@requires_captcha()
async def on_recovery_request(request, captcha_session):
    verification_session = await request_account_recovery(request)
    await verification_session.text_code() # Text verification code.
    await verification_session.email_code() # Or email verification code.
    response = json('Recovery request successful', verification_session.json())
    verification_session.encode(response)
    return response

Error Handling

@app.exception(AuthError)
async def on_error(request, exception):
    return json('An error has occurred!', {
        'error': type(exception).__name__,
        'summary': str(exception)
    }, status_code=exception.status_code)

Middleware

@app.middleware('response')
async def xxs_middleware(request, response):
    xss_prevention_middleware(request, response)


@app.middleware('request')
async def https_middleware(request):
    return https_redirect_middleware(request)


@app.middleware('request')
async def ip2proxy_middleware(request):
    await proxy_detection_middleware(request)

Roadmap

Keep up with Sanic Security's Trello board for a list of proposed features, known issues, and in progress development.

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

Distributed under the GNU General Public License v3.0. See LICENSE for more information.

Acknowledgements

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sanic-security-0.8.2.4.tar.gz (35.4 kB view details)

Uploaded Source

Built Distribution

sanic_security-0.8.2.4-py3-none-any.whl (33.9 kB view details)

Uploaded Python 3

File details

Details for the file sanic-security-0.8.2.4.tar.gz.

File metadata

  • Download URL: sanic-security-0.8.2.4.tar.gz
  • Upload date:
  • Size: 35.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.8.5

File hashes

Hashes for sanic-security-0.8.2.4.tar.gz
Algorithm Hash digest
SHA256 9f37a7cec135d86c1c455d164d819c029674e5ed4bcf9218eeed3f9d7e60f2e4
MD5 f9aba7afb3c49e555d8794cb098f3ad8
BLAKE2b-256 a3e88f2437aa8a1b044eb7ed284ebcfe33eb87befe047a6eb136c18b888e0d06

See more details on using hashes here.

File details

Details for the file sanic_security-0.8.2.4-py3-none-any.whl.

File metadata

  • Download URL: sanic_security-0.8.2.4-py3-none-any.whl
  • Upload date:
  • Size: 33.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.8.5

File hashes

Hashes for sanic_security-0.8.2.4-py3-none-any.whl
Algorithm Hash digest
SHA256 72fd2ab018bfa0ca34513e4c1ea6b3b1b0692812ca6326642d1cba486cf151ac
MD5 4a87fc2f8359bed954f8dcb641c0cf8e
BLAKE2b-256 1e9ed1128a792b4db48db3df9d75d0a89e48224a86c28b7b763d0eb539ce4109

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page