HMAC signature library for http requests signing
Project description
About
SignIt is a helper-library to create and verify HMAC (HMAC-SHA256 by default) signatures that could be used to sign requests to the APIs.
Use cases
On the client side you could
sign your requests using signit.signature.create()
On the server side you could
parse a signature retrieved from request header or query string using signit.signature.parse()
verify retrieved signature using signit.signature.verify()
generate access and secret keys for client using signit.key.generate()
Example of usage (client)
import datetime
import requests
import signit
ACCESS_KEY = 'MY_ACCESS_KEY'
SECRET_KEY = 'MY_SECRET_KEY'
def create_user(user: dict) -> bool:
msg = str(datetime.datetime.utcnow().timestamp())
auth = signit.signature.create(MY_ACCESS_KEY, MY_SECRET_KEY, msg)
headers = {
'Unix-Timestamp': msg,
'Authorization': auth,
}
r = requests.post('http://example.com/users', json=user, headers=headers)
return r.status_code == 201
The Authorization header will look like
Authorization: HMAC-SHA256 MY_ACCESS_KEY:0947c88ce16d078dde4a2aded1fe4627643a378757dccc3428c19569fea99542
Example of usage (server)
The server has issued an access key and a secret key for you. And only you and the server know the secret key.
So that the server could identify you by your public access key and ensure that you used the secret key to produce a hash of the message in this way:
# ...somewhere in my_api/resources/user.py
import signit
from aiohttp import web
from psycopg2 import IntegrityError
async def post(request):
message = request.headers['Unix-Timestamp']
signature = request.headers['Authorization']
prefix, access_key, hmac_digest = signit.signature.parse(signature)
secret_key = await get_secret_key_from_db(access_key)
if not signit.signature.verify(hmac_digest, secret_key, message):
raise web.HTTPUnauthorized('Invalid signature')
try:
await create_user(request)
except IntegrityError:
raise web.HTTPConflict()
return web.HTTPCreated()
Additionally if you use a Unix-Timestamp as a message message the server could check if the request is too old and deny with 401 to protect against “replay attacks”.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file signit-0.3.0.tar.gz
.
File metadata
- Download URL: signit-0.3.0.tar.gz
- Upload date:
- Size: 3.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c97a65dd336b37391d8197b7af0a7a9da856366b62ce35608b20bcf2185ba936 |
|
MD5 | 53ed563efd29f42be8dc1325302d002b |
|
BLAKE2b-256 | 1748a89a63fe7f5b0a7faa093e5cd3bcb95018fb836a6372987988f7c2f7fa36 |
File details
Details for the file signit-0.3.0-py2.py3-none-any.whl
.
File metadata
- Download URL: signit-0.3.0-py2.py3-none-any.whl
- Upload date:
- Size: 6.3 kB
- Tags: Python 2, Python 3
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 61edddf9fb8d925f043b477a63ebcbcfb999c2ddb27726309a08855e6531bf4f |
|
MD5 | b4ce2981bc33b8524f2ed28c5f7f0dd5 |
|
BLAKE2b-256 | 73f909f481e8536cbf43fb2bf90a06742bd4173847eda6108b6857dca6ecb97e |