Skip to content

jcwilson/falcon-authentication

Repository files navigation

falcon-authentication

Build version Documentation status build coverage license

A falcon middleware + authentication backends that adds authentication layer to you app/api service.

Installation

Install the extension with pip, or easy_install.

$ pip install -U falcon-authentication

If you wish to use the optional backends, specify those dependencies, too.

$ pip install -U falcon-authentication[backend-hawk,backend-jwt]

Usage

This package exposes a falcon middleware which takes an authentication backend as an input and use it to authenticate requests. You can specify some routes and methods which are exempted from authentication. Once the middleware authenticates the request using the specified authentication backend, it add the authenticated user to the request context

import falcon
from falcon_authentication import FalconAuthMiddleware, BasicAuthBackend

user_loader = lambda req, resp, resource, username, password: { 'username': username }
auth_backend = BasicAuthBackend(user_loader)
auth_middleware = FalconAuthMiddleware(
    auth_backend,
    exempt_routes=['/exempt'],
    exempt_methods=['HEAD'],
    context_key='auth')
api = falcon.API(middleware=[auth_middleware])

class ApiResource:

    def on_post(self, req, resp):
        # req.context['auth'] is of the form:
        #
        #   {
        #       'backend': <backend instance that performed the authentication>,
        #       'user': <user object retrieved from user_loader()>,
        #       '<backend specific item>': <some extra data from the backend>,
        #       ...
        #   }
        user = req.context['auth']['user']
        resp.body = "User Found: {}".format(user['username'])

If you wish to place the authentication results under a name other than 'auth' in the req.context, provide the context_key argument to the middleware constructor.

Override Authentication for a specific resource

Its possible to customize the exempt routes, exempt methods and authentication backend on a per resource basis as well

import falcon
from falcon_authentication import FalconAuthMiddleware, BasicAuthBackend, TokenAuthBackend

# a loader function to fetch user from username, password
user_loader = lambda req, resp, resource, username, password: { 'username': username }

# basic auth backend
basic_auth = BasicAuthBackend(user_loader)

# Auth Middleware that uses basic_auth for authentication
auth_middleware = FalconAuthMiddleware(basic_auth)
api = falcon.API(middleware=[auth_middleware])


class ApiResource:

    auth = {
        'backend': TokenAuthBackend(user_loader=lambda req, resp, resource, token: { 'id': 5 }),
        'exempt_methods': ['GET']
    }

    # token auth backend

    def on_post(self, req, resp):
        resp.body = "This resource uses token authentication"

    def on_get(self, req, resp):
        resp.body = "This resource doesn't need authentication"


api.add_route("/api", ApiResource())

Disable Authentication for a specific resource

class ApiResource:
    auth = {
        'auth_disabled': True
    }

Accessing Authenticated User (and other artifacts)

Once the middleware authenticates the request using the specified authentication backend, it adds the authenticated user to the request context.

class ApiResource:

    def on_post(self, req, resp):
        # req.context['auth'] is of the form:
        #
        #   {
        #       'backend': <backend instance that performed the authentication>,
        #       'user': <user object retrieved from user_loader()>,
        #       '<backend specific item>': <some extra data from the backend>,
        #       ...
        #   }
        user = req.context['auth']['user']
        resp.body = "User Found: {}".format(user['username'])

Be notified of success or failure to authenticate

The middleware accepts on_success and on_failure callbacks to be invoked upon the completion of the authentication process for a request. They both receive the standard falcon request, response and resource objects. The on_success callback will also receive the results of the authentication (augmented with the AuthBackend that authenticated the user). The on_failure callback will instead receive a BackendAuthenticationFailure exception to indicate the reason for the failure. These exceptions will always have a backend reference to indicate which backend failed the authentication (or a MultiAuthBackend if all nested authentications failed).

Authentication Backends

  • Basic Authentication

Implements HTTP Basic Authentication wherein the HTTP Authorization header contains the user credentials(username and password) encoded using base64 and a prefix (typically Basic)

  • Token Authentication

Implements a Simple Token Based Authentication Scheme where HTTP Authorization header contains a prefix (typically Token) followed by an API Token

  • JWT Authentication (Python 2.7, 3.4+)

Token based authentication using the JSON Web Token standard If you wish to use this backend, be sure to add the optional dependency to your requirements (See Python "extras"):

falcon-authentication[backend-jwt]
  • Hawk Authentication (Python 2.6+, 3.4+)

Token based authentication using the Hawk "Holder-Of-Key Authentication Scheme" If you wish to use this backend, be sure to add the optional dependency to your requirements (See Python "extras"):

falcon-authentication[backend-hawk]

This backend will also provide the mohawk.Receiver object in the req.context['auth'] result under the 'receiver' key.

  • Dummy Authentication

Backend which does not perform any authentication checks

  • Multi Backend Authentication

An AuthBackend which is comprised of multiple backends and requires any of them to authenticate the request successfully.

This backend will iterate over all provided backends until one of the following occurs:

  • A backend returns a successful authentication result, containing at least the user object
  • A backend raises a non-BackendNotApplicable BackendAuthenticationFailure exception and early_exit is true.
  • The end of the list is reached

The BackendNotApplicable exception should be raised by a backend when it determines that it is not the appropriate backend to handle the request. (eg. The BasicAuthBackend doesn't know how to parse a Hawk authorization header). In this way, a list of backends can short-circuit when an appropriate backend is found, rather than traversing the whole list. Any other exceptions will result in authentication stopping, the optional on_failure() callback being invoked, and the exception propagating out of the middleware to be handled by the falcon framework. Any WWW-Authenticate challenges provided by the backends will be collected and sent back to the client.

Custom Backends

It is expected that users will want to write their own backends to work with this middleware. Here are the guidelines to follow when writing your backend:

  • Inherit from AuthBackend.
  • Take care to call the base class AuthBackend.__init__(user_loader) from your __init__() method.
  • Call AuthBackend.load_user() to invoke the provided user_loader callback and retrieve the user object.
  • Return a dictionary from authenticate() which includes at least the 'user' key holding the user object returned from user_loader(). Other backend-specific items can be included as well.
  • Raise a BackendNotApplicable exception if the backend determines that it is not equipped to handle the request and should defer to a more appropriate backend.
  • Prefer raising a BackendAuthenticationFailure in all other cases to potentially take advantage of the MultiAuthBackend early_exit short-circuiting.

Tests

This library comes with a good set of tests which are included in tests/. To run install pytest and simply invoke py.test or python setup.py test to exercise the tests. You can check the test coverage by running py.test --cov falcon_authentication. Note: The test suite makes use of pytest functionality that was deprecated in pytest==4.0.0, so be sure to run tests in an environment that uses a prior version.

API

.. autoclass:: falcon_authentication.FalconAuthMiddleware
    :members:

.. autoclass:: falcon_authentication.BasicAuthBackend
    :members:

.. autoclass:: falcon_authentication.TokenAuthBackend
    :members:

.. autoclass:: falcon_authentication.JWTAuthBackend
    :members:

.. autoclass:: falcon_authentication.HawkAuthBackend
    :members:

.. autoclass:: falcon_authentication.NoneAuthBackend
    :members:

.. autoclass:: falcon_authentication.MultiAuthBackend
    :members:

About

A maintained fork of loanzen/falcon-auth

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages