File: authentication.py

package info (click to toggle)
python-hug 2.6.0-2.4
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 4,072 kB
  • sloc: python: 8,938; sh: 99; makefile: 17
file content (86 lines) | stat: -rw-r--r-- 3,104 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
"""A basic example of authentication requests within a hug API"""
import hug
import jwt

# Several authenticators are included in hug/authentication.py. These functions
# accept a verify_user function, which can be either an included function (such
# as the basic username/password function demonstrated below), or logic of your
# own. Verification functions return an object to store in the request context
# on successful authentication. Naturally, this is a trivial demo, and a much
# more robust verification function is recommended. This is for strictly
# illustrative purposes.
authentication = hug.authentication.basic(hug.authentication.verify("User1", "mypassword"))


@hug.get("/public")
def public_api_call():
    return "Needs no authentication"


# Note that the logged in user can be accessed via a built-in directive.
# Directives can provide computed input parameters via an abstraction
# layer so as not to clutter your API functions with access to the raw
# request object.
@hug.get("/authenticated", requires=authentication)
def basic_auth_api_call(user: hug.directives.user):
    return "Successfully authenticated with user: {0}".format(user)


# Here is a slightly less trivial example of how authentication might
# look in an API that uses keys.

# First, the user object stored in the context need not be a string,
# but can be any Python object.
class APIUser(object):
    """A minimal example of a rich User object"""

    def __init__(self, user_id, api_key):
        self.user_id = user_id
        self.api_key = api_key


def api_key_verify(api_key):
    magic_key = "5F00832B-DE24-4CAF-9638-C10D1C642C6C"  # Obviously, this would hit your database
    if api_key == magic_key:
        # Success!
        return APIUser("user_foo", api_key)
    else:
        # Invalid key
        return None


api_key_authentication = hug.authentication.api_key(api_key_verify)


@hug.get("/key_authenticated", requires=api_key_authentication)  # noqa
def basic_auth_api_call(user: hug.directives.user):
    return "Successfully authenticated with user: {0}".format(user.user_id)


def token_verify(token):
    secret_key = "super-secret-key-please-change"
    try:
        return jwt.decode(token, secret_key, algorithm="HS256")
    except jwt.DecodeError:
        return False


token_key_authentication = hug.authentication.token(token_verify)


@hug.get("/token_authenticated", requires=token_key_authentication)  # noqa
def token_auth_call(user: hug.directives.user):
    return "You are user: {0} with data {1}".format(user["user"], user["data"])


@hug.post("/token_generation")  # noqa
def token_gen_call(username, password):
    """Authenticate and return a token"""
    secret_key = "super-secret-key-please-change"
    mockusername = "User2"
    mockpassword = "Mypassword"
    if mockpassword == password and mockusername == username:  # This is an example. Don't do that.
        return {
            "token": jwt.encode({"user": username, "data": "mydata"}, secret_key, algorithm="HS256")
        }
    return "Invalid username and/or password for user: {0}".format(username)