auth Package¶
permissions
Module¶
- class lemur.auth.permissions.ApiKeyCreatorPermission
Bases:
Permission
- class lemur.auth.permissions.AuthorityCreator(method, value)
Bases:
tuple
- method
Alias for field number 0
- value
Alias for field number 1
- class lemur.auth.permissions.AuthorityCreatorPermission
Bases:
Permission
- class lemur.auth.permissions.AuthorityOwner(method, value)
Bases:
tuple
- method
Alias for field number 0
- value
Alias for field number 1
- class lemur.auth.permissions.AuthorityPermission(authority_id, roles)
Bases:
Permission
- class lemur.auth.permissions.CertificateOwner(method, value)
Bases:
tuple
- method
Alias for field number 0
- value
Alias for field number 1
- class lemur.auth.permissions.CertificatePermission(owner, roles)
Bases:
Permission
- class lemur.auth.permissions.RoleMember(method, value)
Bases:
tuple
- method
Alias for field number 0
- value
Alias for field number 1
- class lemur.auth.permissions.RoleMemberPermission(role_id)
Bases:
Permission
- class lemur.auth.permissions.SensitiveDomainPermission
Bases:
Permission
- class lemur.auth.permissions.StrictRolePermission
Bases:
Permission
service
Module¶
- class lemur.auth.service.AuthenticatedResource
Bases:
Resource
Inherited by all resources that need to be protected by authentication.
- method_decorators = [<function login_required>]
- lemur.auth.service.create_token(user, aid=None, ttl=None)
Create a valid JWT for a given user/api key, this token is then used to authenticate sessions until the token expires.
- Parameters:
user –
- Returns:
- lemur.auth.service.decode_with_multiple_secrets(encoded_jwt, secrets, algorithms)
- lemur.auth.service.fetch_token_header(token)
Fetch the header out of the JWT token.
- Parameters:
token –
- Returns:
- raise jwt.DecodeError:
- lemur.auth.service.get_rsa_public_key(n, e)
Retrieve an RSA public key based on a module and exponent as provided by the JWKS format.
- Parameters:
n –
e –
- Returns:
a RSA Public Key in PEM format
- lemur.auth.service.login_required(f)
Validates the JWT and ensures that is has not expired and the user is still active.
- Parameters:
f –
- Returns:
- lemur.auth.service.on_identity_loaded(sender, identity)
Sets the identity of a given option, assigns additional permissions based on the role that the user is a part of.
- Parameters:
sender –
identity –
views
Module¶
- class lemur.auth.views.Google
Bases:
Resource
- endpoint = 'google'
- mediatypes()
- methods: t.ClassVar[t.Collection[str] | None] = {'POST'}
The methods this view is registered for. Uses the same default (
["GET", "HEAD", "OPTIONS"]
) asroute
andadd_url_rule
by default.
- post()
- class lemur.auth.views.Login
Bases:
Resource
Provides an endpoint for Lemur’s basic authentication. It takes a username and password combination and returns a JWT token.
This token token is required for each API request and must be provided in the Authorization Header for the request.
Authorization:Bearer <token>
Tokens have a set expiration date. You can inspect the token expiration by base64 decoding the token and inspecting it’s contents.
Note
It is recommended that the token expiration is fairly short lived (hours not days). This will largely depend on your uses cases but. It is important to not that there is currently no build in method to revoke a users token and force re-authentication.
- endpoint = 'login'
- mediatypes()
- methods: t.ClassVar[t.Collection[str] | None] = {'POST'}
The methods this view is registered for. Uses the same default (
["GET", "HEAD", "OPTIONS"]
) asroute
andadd_url_rule
by default.
- post()
- POST /auth/login¶
Login with username:password
Example request:
POST /auth/login HTTP/1.1 Host: example.com Accept: application/json, text/javascript Content-Type: application/json;charset=UTF-8 { "username": "test", "password": "test" }
Example response:
HTTP/1.1 200 OK Vary: Accept Content-Type: text/javascript { "token": "12343243243" }
- Parameters:
username – username
password – password
- Status Codes:
401 Unauthorized – invalid credentials
200 OK – no error
- class lemur.auth.views.OAuth2
Bases:
Resource
- endpoint = 'oauth2'
- get()
- mediatypes()
- methods: t.ClassVar[t.Collection[str] | None] = {'GET', 'POST'}
The methods this view is registered for. Uses the same default (
["GET", "HEAD", "OPTIONS"]
) asroute
andadd_url_rule
by default.
- post()
- class lemur.auth.views.Ping
Bases:
Resource
This class serves as an example of how one might implement an SSO provider for use with Lemur. In this example we use an OpenIDConnect authentication flow, that is essentially OAuth2 underneath. If you have an OAuth2 provider you want to use Lemur there would be two steps:
Define your own class that inherits from
flask_restful.Resource
and create the HTTP methods the provider uses for its callbacks.Add or change the Lemur AngularJS Configuration to point to your new provider
- endpoint = 'ping'
- get()
- mediatypes()
- methods: t.ClassVar[t.Collection[str] | None] = {'GET', 'POST'}
The methods this view is registered for. Uses the same default (
["GET", "HEAD", "OPTIONS"]
) asroute
andadd_url_rule
by default.
- post()
- class lemur.auth.views.Providers
Bases:
Resource
- endpoint = 'providers'
- get()
- mediatypes()
- methods: t.ClassVar[t.Collection[str] | None] = {'GET'}
The methods this view is registered for. Uses the same default (
["GET", "HEAD", "OPTIONS"]
) asroute
andadd_url_rule
by default.
- lemur.auth.views.build_hmac()
- lemur.auth.views.create_user_roles(profile: dict) list[str]
Generate a list of Lemur role names based on the provided user profile.
The function maps the user’s roles from the identity provider to corresponding roles in Lemur, creates roles dynamically based on the profile data, and assigns a unique role for each user.
- Parameters:
profile – A dictionary containing user information, including roles/groups from the identity provider.
- Returns:
A list of Lemur role names corresponding to the provided user profile.
- lemur.auth.views.exchange_for_access_token(code, redirect_uri, client_id, secret, access_token_url=None, verify_cert=True)
Exchanges authorization code for access token.
- Parameters:
code –
redirect_uri –
client_id –
secret –
access_token_url –
verify_cert –
- Returns:
- Returns:
- lemur.auth.views.generate_state_token()
- lemur.auth.views.retrieve_user(user_api_url, access_token)
Fetch user information from provided user api_url.
- Parameters:
user_api_url –
access_token –
- Returns:
- lemur.auth.views.retrieve_user_memberships(user_api_url, user_membership_provider, access_token)
- lemur.auth.views.update_user(user, profile, roles)
Updates user with current profile information and associated roles.
- Parameters:
user –
profile –
roles –
- lemur.auth.views.validate_id_token(id_token, client_id, jwks_url)
Ensures that the token we receive is valid.
- Parameters:
id_token –
client_id –
jwks_url –
- Returns:
- lemur.auth.views.verify_state_token(token)