An effective, simple, and async security library for Sanic.
Project description
Sanic Security
An effective, simple, and async security library for Sanic.
Table of Contents
About The Project
Sanic Security is an authentication, authorization, and verification library designed for use with Sanic. This library contains a variety of features including:
- Login, registration, and authentication
- Two-step verification
- Two-factor authentication
- Captcha
- Wildcard and role based authorization
This repository has been starred by Sanic's core maintainer:
Please visit security.sunsetdeveloper.com for more documentation.
Getting Started
In order to get started, please install pip.
Prerequisites
- pip
sudo apt-get install python3-pip
Installation
- Install the Sanic Security pip package.
pip3 install sanic-security
Usage
Sanic Security setup and implementation is easy.
Initial Setup
First you have to create a configuration file called security.ini in the working directory. Below is an example of its contents:
[SECURITY]
secret=05jF8cSMAdjlXcXeS2ZJUHg7Tbyu
captcha_font=captcha.ttf
cache_path = ./resources/security-cache
session_samesite = strict
[TORTOISE]
username=example
password=8UVbijLUGYfUtItAi
endpoint=example.cweAenuBY6b.us-north-1.rds.amazonaws.com
schema=exampleschema
models=sanic_security.models, example.models
engine=mysql
generate=true
Once you've configured Sanic Security, you can initialize Sanic with the example below:
initialize_security_orm(app)
if __name__ == "__main__":
app.run(host="0.0.0.0", port=8000, debug=True)
The tables in the below examples represent example request form-data
.
Authentication
- Registration
Phone can be null or empty.
Key | Value |
---|---|
username | test |
test@test.com | |
phone | 19811354186 |
password | testpass |
captcha | Aj8HgD |
@app.post("api/auth/register")
@requires_captcha()
async def on_register(request, captcha_session):
account = await register(request)
two_step_session = await request_two_step_verification(request, account)
await email_code(two_step_session.code) #Custom method for emailing verification code.
response = json("Registration successful!", two_step_session.account.json())
two_step_session.encode(response)
return response
- Verify Account
Key | Value |
---|---|
code | G8ha9nVae |
@app.post("api/auth/verify")
async def on_verify(request):
two_step_session = await verify_account(request)
return json("You have verified your account and may login!", two_step_session.account.json())
- Login
Key | Value |
---|---|
test@test.com | |
password | testpass |
@app.post("api/auth/login")
async def on_login(request):
authentication_session = await login(request)
response = json("Login successful!", authentication_session.account.json())
authentication_session.encode(response)
return response
- Login (With two-factor authentication)
Key | Value |
---|---|
test@test.com | |
password | testpass |
@app.post("api/auth/login")
async def on_two_factor_login(request):
authentication_session = await login(request, two_factor=True)
two_step_session = await request_two_step_verification(request, authentication_session.account)
await email_code(two_step_session.code) #Custom method for emailing verification code.
response = json("Login successful! A second factor is now required to be authenticated.", authentication_session.account.json())
authentication_session.encode(response)
two_step_session.encode(response)
return response
- Second Factor
Key | Value |
---|---|
code | G8ha9nVae |
@app.post("api/auth/login/second-factor")
@requires_two_step_verification()
async def on_login_second_factor(request, two_step_verification):
authentication_session = await on_second_factor(request)
response = json("Second factor attempt successful! You may now be authenticated!",
authentication_session.account.json())
return response
- Logout
@app.post("api/auth/logout")
@requires_authentication()
async def on_logout(request, authentication_session):
await logout(authentication_session)
response = json("Logout successful!", authentication_session.account.json())
return response
- Requires Authentication
@app.post("api/auth")
@requires_authentication()
async def on_authenticated(request, authentication_session):
return json(f"Hello {authentication_session.account.username}! You have been authenticated.",
authentication_session.account.json())
Captcha
You must download a .ttf font for captcha challenges and define the file's path in security.ini.
Captcha challenge example:
- Request Captcha
@app.post("api/captcha/request")
async def on_request_captcha(request):
captcha_session = await request_captcha(request)
response = json("Captcha request successful!", captcha_session.json())
captcha_session.encode(response)
return response
- Captcha Image
@app.get("api/captcha/img")
async def on_captcha_img(request):
captcha_session = await CaptchaSession.decode(request)
return await captcha_session.get_image()
- Requires Captcha
Key | Value |
---|---|
captcha | Aj8HgD |
@app.post("api/captcha")
@requires_captcha()
async def on_captcha_attempt(request, captcha_session):
return json("Captcha attempt successful!", captcha_session.json())
Two-step Verification
- Request Two-step Verification
Key | Value |
---|---|
test@test.com | |
captcha | Aj8HgD |
@app.post("api/verification/request")
@requires_captcha()
async def on_request_verification(request, captcha_session):
two_step_session = await request_two_step_verification(request)
await email_code(two_step_session.code) #Custom method for emailing verification code.
response = json("Verification request successful!", two_step_session.account.json())
two_step_session.encode(response)
return response
- Resend Two-step Verification Code
@app.post("api/verification/resend")
async def on_resend_verification(request):
two_step_session = await TwoStepSession.decode(request)
await email_code(two_step_session.code) #Custom method for emailing verification code.
return json("Verification code resend successful!", two_step_session.account.json())
- Requires Two-step Verification
Key | Value |
---|---|
code | G8ha9nVa |
@app.post("api/verification")
@requires_two_step_verification()
async def on_verification(request, two_step_session):
response = json("Two-step verification attempt successful!", two_step_session.account.json())
return response
Authorization
Sanic Security comes with two protocols for authorization: role based and wildcard based permissions.
Role-based access control (RBAC) is a policy-neutral access-control mechanism defined around roles and privileges.
Wildcard permissions support the concept of multiple levels or parts. For example, you could grant a user the permission
printer:query
, printer:query,delete
, printer:*
.
- Require Permissions
@app.post("api/auth/perms")
@require_permissions("admin:update", "employee:add")
async def on_require_perms(request, authentication_session):
return text("Account permitted.")
- Require Roles
@app.post("api/auth/roles")
@require_roles("Admin", "Moderator")
async def on_require_roles(request, authentication_session):
return text("Account permitted.")
Testing
- Install httpx:
pip3 install httpx
-
Make sure the test Sanic instance (
test/server.py
) is running on your machine. -
Run the unit test client (
test/client.py
) and wait for results.
Tortoise
Sanic Security uses Tortoise ORM for database operations.
Tortoise ORM is an easy-to-use asyncio ORM (Object Relational Mapper).
- Define your models like so:
from tortoise.models import Model
from tortoise import fields
class Tournament(Model):
id = fields.IntField(pk=True)
name = fields.TextField()
- Use it like so:
# Create instance by save
tournament = Tournament(name='New Tournament')
await tournament.save()
# Or by .create()
await Tournament.create(name='Another Tournament')
# Now search for a record
tour = await Tournament.filter(name__contains='Another').first()
print(tour.name)
Roadmap
Keep up with Sanic Security's Trello board for a list of proposed features, known issues, and in progress development.
Contributing
Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
License
Distributed under the GNU General Public License v3.0. See LICENSE
for more information.
Versioning
0.0.0.0
Major.Minor.Revision.Patch
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file sanic-security-1.0.0.0.tar.gz
.
File metadata
- Download URL: sanic-security-1.0.0.0.tar.gz
- Upload date:
- Size: 32.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 69da3716d03b97cdad88065c9fc50436caa4194583f1f7fdeebc7ddf6a587a39 |
|
MD5 | dd148a18669d8313227cd02d716b91a7 |
|
BLAKE2b-256 | 79147f064f051302458438348a8c4303c51f0c36c14dbf2022b95f6c282e12f8 |