inuits_policy_based_auth
inuits_policy_based_auth is a python package for securing API endpoints based on policies.
Installation
Install inuits_policy_based_auth as follows:
pip install inuits-policy-based-auth
Getting Started
Instantiate the PolicyFactory in you app, for example in app.py (all examples given are based on a Python Flask app).
from inuits_policy_based_auth import PolicyFactory
policy_factory = PolicyFactory()
Manually loading policies
Importing and registering policies can be done manually. Don't forget to set a fallback key, this ensures that policies of a specific app are applied when the app cannot be determined automatically.
from inuits_policy_based_auth.authentication.policies.token_based_policies.authlib_flask_oauth2_policy import (
AuthlibFlaskOauth2Policy,
)
from inuits_policy_based_auth.authorization.policies.super_admin_policy import (
SuperAdminPolicy,
)
policy_factory.register_authentication_policy("apps.[app_name]", AuthlibFlaskOauth2Policy(...))
policy_factory.register_authorization_policy("apps.[app_name]", SuperAdminPolicy())
policy_factory.set_fallback_key_for_policy_mapping("apps.[app_name]")
However, it is recommended to load policies dynamically as this will allow you to make use of the full potential of this package.
Dynamically loading policies
You can write a loader which loads policies dynamically based on a configuration file.
Example configuration file:
{
"[app_name_1]": {
"policies": {
"authentication": [
"token_based_policies.authlib_flask_oauth2_policy",
"token_based_policies.tenant_token_roles_policy"
],
"authorization": [
"super_admin_policy",
"scope_based_policy"
]
}
},
"[app_name_2]": {
"policies": {
"authentication": [
"token_based_policies.authlib_flask_oauth2_policy",
"token_based_policies.tenant_token_roles_policy"
],
"authorization": [
"super_admin_policy",
"open_data_policy"
]
}
}
}
Example policy_loader.py:
import json
import os
from importlib import import_module
from inuits_policy_based_auth import PolicyFactory
from inuits_policy_based_auth.exceptions import (
PolicyFactoryException,
)
from logging import Logger
def load_policies(policy_factory: PolicyFactory, logger: Logger):
apps = {}
with open(str(os.getenv("[CONFIGURATION_FILE_NAME]")), "r") as configuration_file:
apps = json.load(configuration_file)
for app in apps:
try:
auth_type = "authentication"
for policy_module_name in apps[app]["policies"].get(auth_type):
policy = __get_class(app, auth_type, policy_module_name)
policy = __instantiate_authentication_policy(
policy_module_name, policy, logger
)
policy_factory.register_authentication_policy(
f"apps.{app}", policy
)
auth_type = "authorization"
for policy_module_name in apps[app]["policies"].get(auth_type):
policy = __get_class(app, auth_type, policy_module_name)
policy_factory.register_authorization_policy(
f"apps.{app}", policy()
)
except Exception as error:
raise PolicyFactoryException(
f"Policy factory was not configured correctly: {str(error)}"
).with_traceback(error.__traceback__)
policy_factory.set_fallback_key_for_policy_mapping("apps.[app_name]")
def __get_class(app, auth_type, policy_module_name):
locations = [
policy_module_name,
f"apps.{app}.policies.{auth_type}.{policy_module_name}",
f"inuits_policy_based_auth.{auth_type}.policies.{policy_module_name}",
]
for location in locations:
try:
module = import_module(location)
break
except ModuleNotFoundError:
pass
else:
raise ModuleNotFoundError(f"Policy {policy_module_name} not found")
policy_class_name = module.__name__.split(".")[-1].title().replace("_", "")
policy = getattr(module, policy_class_name)
return policy
def __instantiate_authentication_policy(policy_module_name, policy, logger: Logger):
token_schema = __load_token_schema()
if policy_module_name == "token_based_policies.authlib_flask_oauth2_policy":
allow_anonymous_users = (
True
if os.getenv("ALLOW_ANONYMOUS_USERS", "false").lower() == "true"
else False
)
return policy(
logger,
token_schema,
os.getenv("STATIC_ISSUER"),
os.getenv("STATIC_PUBLIC_KEY"),
os.getenv("ALLOWED_ISSUERS"),
allow_anonymous_users,
)
if policy_module_name == "token_based_policies.tenant_token_roles_policy":
return policy(
token_schema,
os.getenv("ROLE_SCOPE_MAPPING", os.getenv("API_SCOPES")),
True
if os.getenv("ALLOW_ANONYMOUS_USERS", "false").lower() == "true"
else False,
)
return policy()
def __load_token_schema() -> dict:
token_schema_path = os.getenv(
"TOKEN_SCHEMA", "path/to/token_schema.json"
)
with open(token_schema_path, "r") as token_schema:
return json.load(token_schema)
Now you can import the loader in app.py and pass policy_factory
as an argument to it.
from apps.policy_loader import load_policies
from logging import Logger
load_policies(policy_factory, Logger(""))
As you can see in these examples, dynamically loading policies will allow you to add new policies and override existing ones, which makes this package highly customizable and generic.
Custom policies
Continuing from the examples above, you can make a custom authorization policy by creating a folder policies
within a specific app. Here you should create the folders authentication
and authorization
that will contain custom policies which you can add to your configuration. In this case we name our new policy the same as an existing one, which will override it. Each authentication policy must inherit from BaseAuthenticationPolicy and implement the abstract method authenticate
, while each authorization policy must inherit from BaseAuthorizationPolicy and implement the abstract method authorize
.
Example folder structure:
api
├── apps
│ ├── [app_name]
│ │ ├── policies
│ │ │ ├── authentication
│ │ │ └── authorization
│ │ │ └── open_data_policy.py
│ │ ├── ...
...
│ ├── configuration.json
│ └── policy_loader.py
...
└── app.py
Example custom open_data_policy.py:
from inuits_policy_based_auth import BaseAuthorizationPolicy
class OpenDataPolicy(BaseAuthorizationPolicy):
def authorize(self, policy_context, _, request_context):
request = request_context.http_request
if request.method == "GET":
policy_context.access_verdict = True
return policy_context
Usage
If everything is set up correctly, you can use the apply_policies
decorator as follows:
from app import policy_factory
from flask import request
from inuits_policy_based_auth import RequestContext
class Entity():
@policy_factory.apply_policies(
RequestContext(request, ["[scope_1]", "[scope_2]"])
)
def get(self):
...
You can also use the authenticate
decorator to only apply authentication policies:
from app import policy_factory
from flask import request
from inuits_policy_based_auth import RequestContext
class Entity():
@policy_factory.authenticate(RequestContext(request))
def get(self):
...
Contributing
Do not hesitate to open issues and create pull requests.