Protect Flask routes with AWS Cognito

A Flask extension that supports protecting routes with AWS Cognito following OAuth 2.1 best practices. That means the full authorization code flow, including Proof Key for Code Exchange (RFC 7636) to prevent Cross Site Request Forgery (CSRF), along with secure storage of access tokens in HTTP only cookies (to prevent Cross Site Scripting attacks), and additional nonce
validation (if using ID tokens) to prevent replay attacks.
Optionally, OAuth refresh flow can be enabled, with the refresh token stored in a HTTP-only cookie with optional Fernet symmetrical encryption using Flask's SECRET_KEY
(encryption is enabled by default).
Documentation: https://mblackgeo.github.io/flask-cognito-lib
Source Code: https://github.com/mblackgeo/flask-cognito-lib
Installation
Use the package manager pip to install:
pip install flask-cognito-lib
Quick start
To get started quickly, a complete example Flask application is provided in /example
including instructions on setting up a Cognito User Pool. A separate repo holds a complete example app, including AWS CDK (Cloud Development Kit) code to deploy the application to API Gateway and Lambda, along with creation of a Cognito User Pool and Client. However, assuming a Cognito user pool has been setup with an app client (with Client ID and Secret), get started as follows:
from flask import Flask, jsonify, redirect, session, url_for
from flask_cognito_lib import CognitoAuth
from flask_cognito_lib.decorators import (
auth_required,
cognito_login,
cognito_login_callback,
cognito_logout,
cognito_refresh_callback,
)
app = Flask(__name__)
app.config["AWS_REGION"] = "eu-west-1"
app.config["AWS_COGNITO_USER_POOL_ID"] = "eu-west-1_qwerty"
app.config["AWS_COGNITO_DOMAIN"] = "https://app.auth.eu-west-1.amazoncognito.com"
app.config["AWS_COGNITO_USER_POOL_CLIENT_ID"] = "asdfghjkl1234asdf"
app.config["AWS_COGNITO_USER_POOL_CLIENT_SECRET"] = "zxcvbnm1234567890"
app.config["AWS_COGNITO_REDIRECT_URL"] = "https://example.com/postlogin"
app.config["AWS_COGNITO_LOGOUT_URL"] = "https://example.com/postlogout"
app.config["AWS_COGNITO_REFRESH_FLOW_ENABLED"] = True
app.config["AWS_COGNITO_REFRESH_COOKIE_ENCRYPTED"] = True
app.config["AWS_COGNITO_REFRESH_COOKIE_AGE_SECONDS"] = 86400
auth = CognitoAuth(app)
@app.route("/login")
@cognito_login
def login():
pass
@app.route("/postlogin")
@cognito_login_callback
def postlogin():
return redirect(url_for("claims"))
@app.route("/refresh", methods=["POST"])
@cognito_refresh_callback
def refresh():
pass
@app.route("/claims")
@auth_required()
def claims():
return jsonify(session)
@app.route("/admin")
@auth_required(groups=["admin"])
def admin():
return jsonify(session["claims"]["cognito:groups"])
@app.route("/edit")
@auth_required(groups=["admin", "editor"], any_group=True)
def edit():
return jsonify(session["claims"]["cognito:groups"])
@app.route("/logout")
@cognito_logout
def logout():
pass
@app.route("/postlogout")
def postlogout():
return redirect(url_for("home"))
if __name__ == "__main__":
app.run()
Config class override
There might be some cases where you want to override the default Config
class to add custom logic. For example, to generate the redirect_url
and logout_redirect
dynamically using url_for
, you can override the Config
class as follows:
from flask import url_for
from flask_cognito_lib.config import Config
class ConfigOverride(Config):
"""
ConfigOverride class to generate URLs dynamically using `url_for`
"""
@property
def redirect_url(self) -> str:
"""Return the Redirect URL (post-login)"""
return url_for(endpoint='auth.cognito', _external=True)
@property
def logout_redirect(self) -> str:
"""Return the Redirect URL (post-logout)"""
return url_for(endpoint='auth.cognito_post_logout', _external=True)
Then, pass the object of ConfigOverride
class when initializing the CognitoAuth
plugin as follows:
CognitoAuth(app, cfg=ConfigOverride())
Or if you are using lazy initialization:
CognitoAuth().init_app(app, cfg=ConfigOverride())
Development
Prerequisites:
The Makefile includes helpful commands setting a development environment, get started by installing the package into a new environment and setting up pre-commit by running make install
. Run make help
to see additional available commands (e.g. linting, testing and so on).
Contributing
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change. Please make sure to update tests as appropriate and ensure 100% test coverage.
Credits
This work started as a fork of the unmaintained Flask-AWSCognito extension, revising the implementation following OAuth 2.1 recommendations, with inspiration from flask-cognito-auth. Whilst there are several Cognito extensions available for Flask, none of those implement OAuth 2.1 recommendations, with some plugins not even actively maintained.