Skip to main content

Python SDK for the Authlib

Project description

AuthLib

A Python authentication library that provides JWT, OAuth2, and API token authentication with PostgreSQL backend. This library is designed for seamless integration with Flask applications and provides a robust set of endpoints and utilities for user management, authentication, and API token handling.

Table of Contents

Installation

pip install -e .

Quick Start

from flask import Flask
from authlib import AuthManager

app = Flask(__name__)

auth = AuthManager(
    app=app,
    db_dsn="postgresql://user:pass@localhost/dbname",
    jwt_secret="your-secret-key",
    oauth_config={
        "google": {
            "client_id": "your-client-id",
            "client_secret": "your-client-secret"
        }
    }
)

@app.route("/protected")
@auth.require_auth(roles=["admin"])
def protected_route():
    return "Protected content"

Configuration

Required Parameters

  • app: Flask application instance
  • db_dsn: PostgreSQL connection string
  • jwt_secret: Secret key for JWT signing

Optional Parameters

  • oauth_config: Dictionary of OAuth provider configurations (see below)
  • token_expiry: JWT token expiry time in seconds (default: 3600)
  • refresh_token_expiry: Refresh token expiry time in seconds (default: 2592000)

Example oauth_config:

{
    "google": {
        "client_id": "...",
        "client_secret": "..."
    },
    "github": {
        "client_id": "...",
        "client_secret": "..."
    }
}

API Endpoints

Authentication

  • POST /api/v1/users/login - Login with username/password
    • Request: { "username": "string", "password": "string" }
    • Response: { "token": "jwt", "refresh_token": "jwt", "user": { ... } }
  • POST /api/v1/users/login/oauth - Get OAuth redirect URL
    • Request: { "provider": "google|github|..." }
    • Response: { "redirect_url": "string" }
  • GET /api/v1/users/login/oauth2callback - OAuth callback
    • Query Params: code, state, provider
    • Response: { "token": "jwt", "refresh_token": "jwt", "user": { ... } }
  • POST /api/v1/users/token-refresh - Refresh JWT token
    • Request: { "refresh_token": "jwt" }
    • Response: { "token": "jwt", "refresh_token": "jwt" }

User Management

  • POST /api/v1/users/register - Register new user
    • Request: { "username": "string", "password": "string", "email": "string", ... }
    • Response: { "user": { ... }, "token": "jwt", "refresh_token": "jwt" }
  • GET /api/v1/users/login/profile - Get user profile
    • Auth: Bearer JWT
    • Response: { "user": { ... } }
  • GET /api/v1/users/roles - Get available roles
    • Response: [ "admin", "user", ... ]

API Tokens

  • POST /api/v1/users/{user}/api-tokens - Create API token
    • Request: { "name": "string", "expires_in_days": number | null }
    • Response: { "token": "string", "id": "uuid", "name": "string", "created_at": "timestamp", "expires_at": "timestamp | null" }
  • GET /api/v1/users/{user}/api-tokens - List API tokens
    • Response: [ { "id": "uuid", "name": "string", ... } ]
  • DELETE /api/v1/users/{user}/api-tokens/{token_id} - Delete API token
    • Response: { "success": true }

Authentication Flow

  1. Login:
    • User submits credentials to /api/v1/users/login.
    • Receives JWT and refresh token.
  2. Token Refresh:
    • Use /api/v1/users/token-refresh with refresh token to get new JWT.
  3. OAuth:
    • Get redirect URL from /api/v1/users/login/oauth.
    • Complete OAuth flow via /api/v1/users/login/oauth2callback.
  4. Protected Routes:
    • Use @auth.require_auth() decorator to protect Flask routes.

User Object

The user object returned by the API typically includes:

{
  "id": "uuid",
  "username": "string",
  "email": "string",
  "roles": ["user", "admin"],
  "created_at": "timestamp",
  "last_login": "timestamp"
}

Token Management

  • JWT: Used for authenticating API requests. Include in Authorization: Bearer <token> header.
  • Refresh Token: Used to obtain new JWTs without re-authenticating.
  • API Tokens: Long-lived tokens for programmatic access, managed per user.

Development

Setup

  1. Clone the repository
  2. Create virtual environment:
python -m venv venv
venv\Scripts\activate
  1. Install dependencies:
pip install -e ".[dev]"

Database Setup

createdb authlib
python -m authlib.cli db init

Running Tests

pytest

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

the37lab_authlib-0.1.1750840380.tar.gz (11.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

the37lab_authlib-0.1.1750840380-py3-none-any.whl (11.0 kB view details)

Uploaded Python 3

File details

Details for the file the37lab_authlib-0.1.1750840380.tar.gz.

File metadata

File hashes

Hashes for the37lab_authlib-0.1.1750840380.tar.gz
Algorithm Hash digest
SHA256 31b190ee0e3174e729d406b6b8d52edf1bcc94b8f1554cbc6ee463b3d897abf2
MD5 df8fd35556116f088fef74e87ffe73b1
BLAKE2b-256 5971c8743b3bcc2bfe60e9f3b729bde535cb14633d88b01124fe2e8dbd537b8e

See more details on using hashes here.

File details

Details for the file the37lab_authlib-0.1.1750840380-py3-none-any.whl.

File metadata

File hashes

Hashes for the37lab_authlib-0.1.1750840380-py3-none-any.whl
Algorithm Hash digest
SHA256 cc33c6b27c62b20f80d59da447bf711dece4aedcb24f70ae5838d47137d5f2b4
MD5 a650fbe58a0bc88256271637b47f3ee2
BLAKE2b-256 32d28e52d374e9db44ed5bde9284db236fcef3167f0e4d9f6582201493a040ba

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page