Skip to main content

Pyramid OAuthLib integration

Project description

Pyramid OAuthLib

https://travis-ci.org/tilgovi/pyramid-oauthlib.svg?branch=master http://img.shields.io/coveralls/tilgovi/pyramid-oauthlib.svg

Pyramid OAuthLib is a library to integrate the excellent OAuthLib library easily into Pyramid applications. It is designed to ease development of OAuth applications, provide smooth migration possibilites to legacy codebases using other authentication or authorization schemes, and configuration patterns for creating pluggable OAuth components for Pyramid.

NOTICE: Pyramid OAuthLib is not feature complete! It is missing the hooks for token revocation. While this shouldn’t be hard to add, it wasn’t a priority to get the initial version released.

Usage Overview

Configuration:

def includeme(config):
    """Integration with OAuthLib is as smooth as possible."""
    from oauthlib.oauth2 import BearerToken, AuthorizationCodeGrant

    # Validator callback functions are passed Pyramid request objects so
    # you can access your request properties, database sessions, etc.
    # The request object is populated with accessors for the properties
    # referred to in the OAuthLib docs and used by its built in types.
    validator = MyRequestValidator()

    # Register response types to create grants.
    config.add_response_type('oauthlib.oauth2.AuthorizationCodeGrant',
                             name='code',
                             request_validator=validator)

    # Register grant types to validate token requests.
    config.add_grant_type('oauthlib.oauth2.AuthorizationCodeGrant',
                          name='authorization_code',
                          request_validator=validator)

    # Register the token types to use at token endpoints.
    # The second parameter to all registrations may be left out to set it
    # as default to use when no corresponding request parameter specifies
    # the grant, response or token type. Be aware that the built in types
    # will fail if a matching request parameter is missing, though.
    config.add_token_type('oauthlib.oauth2.BearerToken',
                          request_validator=validator)

Token response:

def access_token(request):
    """Core functionality is available directly from the request.

    Responses from OAuthLib are wrapped in a response object of type
    :class:`pyramid.response.Response` so they can be returned directly
    from views.
    """
    userid = request.authenticated_userid
    if userid is not None:
        credentials = dict(userId=userid)
    else:
        credentials = None

    return request.create_token_response(credentials=credentials)

Custom grant type:

from oauthlib.oauth2 import ClientCredentialsGrant, InvalidClientError
from pyramid.authentication import BadCSRFToken
from pyramid.session import check_csrf_token

class SessionGrant(ClientCredentialsGrant):

    """A combined authentication and authorization session assertion grant.

    When the Authorization Server and the Token Service are the same server
    this grant type uses a single assertion, the CSRF token, for client
    authentication and an authorization grant.[1] This works particularly
    well with :class:`pyramid.authentication.SessionAuthenticationPolicy`.

    [1] http://tools.ietf.org/html/draft-ietf-oauth-assertions-01#section-3
    """

    def validate_token_request(self, request):
        try:
            check_csrf_token(request, token='assertion')
        except BadCSRFToken:
            raise InvalidClientError(request=request)

        # An object with the confidential client_id and client_secret.
        request.client = LOCAL_CLIENT

        if request.client is None:
            raise InvalidClientError(request=request)

        request.client_id = request.client_id or request.client.client_id


def includeme(config):
    config.add_grant_type(SessionGrant, 'assertion')

License

Pyramid OAuthLib is released under the 2-Clause BSD License, sometimes referred to as the “Simplified BSD License” or the “FreeBSD License”. More license information can be found in the included LICENSE.txt file.

0.3.0 (2018-03-10)

Features

  • Python 3 support.

  • Support for password credential flow parameters.

0.2.0 (2014-11-21)

Features

  • Expose add_oauth_param as a directive on Configurator instances. OAuthLib code typically assumes these attributes exist on the request instance. Exposing this directive allows custom extensions to be more portable to non-Pyramid code by avoiding the use of request.params in favor of the transparent attribute access pattern of OAuthLib request instances.

0.1.1 (2014-08-04)

Features

  • Request methods for easy integration of OAuth flows.

  • Request parameters to integrate with OAuthLib modules.

  • Registration of new grant, response, and token types, (optionally) using dotted name resolution.

  • Introspectable configuration.

  • Full unit test coverage

Missing in this release

  • Support for revocation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pyramid_oauthlib-0.3.0.tar.gz (8.3 kB view details)

Uploaded Source

Built Distribution

pyramid_oauthlib-0.3.0-py2.py3-none-any.whl (9.6 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file pyramid_oauthlib-0.3.0.tar.gz.

File metadata

File hashes

Hashes for pyramid_oauthlib-0.3.0.tar.gz
Algorithm Hash digest
SHA256 a6b7853bfc8ac601a7e9c1981556d6502c57cb173f15ce07138e60592f26a042
MD5 f7403d1e9aa21afcaa64d4a091dd0e0a
BLAKE2b-256 4b206ede10945212dc5c159d1ddf7925e5954c8c68d089e8ffe4b771e7af7e5c

See more details on using hashes here.

File details

Details for the file pyramid_oauthlib-0.3.0-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for pyramid_oauthlib-0.3.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 94dea5ac867840a6126cf02f57fc0e7b92669f0bf9a649ee06a6499585082350
MD5 5dbaa583c3b95f6b3d02c5158f79f446
BLAKE2b-256 aef4101939795cb6a0b43293fa416cd4c956633931cfa54b278ec3970ff64143

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page