usso 0.28.23__py3-none-any.whl → 0.28.25__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- usso/api_key.py +6 -1
- usso/authorization.py +67 -0
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/METADATA +1 -1
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/RECORD +8 -8
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/WHEEL +0 -0
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/entry_points.txt +0 -0
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/licenses/LICENSE.txt +0 -0
- {usso-0.28.23.dist-info → usso-0.28.25.dist-info}/top_level.txt +0 -0
usso/api_key.py
CHANGED
@@ -1,4 +1,5 @@
|
|
1
1
|
import logging
|
2
|
+
import os
|
2
3
|
|
3
4
|
import cachetools.func
|
4
5
|
import httpx
|
@@ -33,7 +34,11 @@ def fetch_api_key_data(api_key_verify_url: str, api_key: str):
|
|
33
34
|
USSOException: If the API key is invalid or verification fails
|
34
35
|
"""
|
35
36
|
try:
|
36
|
-
response = httpx.post(
|
37
|
+
response = httpx.post(
|
38
|
+
api_key_verify_url,
|
39
|
+
json={"api_key": api_key},
|
40
|
+
proxy=os.getenv("PROXY"),
|
41
|
+
)
|
37
42
|
response.raise_for_status()
|
38
43
|
return UserData(**response.json())
|
39
44
|
except Exception as e:
|
usso/authorization.py
CHANGED
@@ -129,6 +129,73 @@ def is_filter_match(user_filters: dict, requested_filters: dict) -> bool:
|
|
129
129
|
return True
|
130
130
|
|
131
131
|
|
132
|
+
def get_scope_filters(
|
133
|
+
action: str,
|
134
|
+
resource: str,
|
135
|
+
user_scopes: list[str],
|
136
|
+
) -> list[dict]:
|
137
|
+
"""
|
138
|
+
Return filters extracted from user scopes that:
|
139
|
+
|
140
|
+
- Have equal or higher privilege level than the requested action.
|
141
|
+
- Match the requested resource path.
|
142
|
+
"""
|
143
|
+
matched_filters: list[dict] = []
|
144
|
+
action_level = PRIVILEGE_LEVELS.get(action, 0)
|
145
|
+
requested_parts = resource.split("/")
|
146
|
+
|
147
|
+
for scope in user_scopes:
|
148
|
+
scope_action, scope_path, scope_filters = parse_scope(scope)
|
149
|
+
|
150
|
+
scope_level = PRIVILEGE_LEVELS.get(scope_action, 0)
|
151
|
+
if scope_level < action_level:
|
152
|
+
continue
|
153
|
+
|
154
|
+
if not is_path_match(scope_path, requested_parts):
|
155
|
+
continue
|
156
|
+
|
157
|
+
matched_filters.append(scope_filters)
|
158
|
+
|
159
|
+
return matched_filters
|
160
|
+
|
161
|
+
|
162
|
+
def broadest_scope_filter(filters: list[dict]) -> dict:
|
163
|
+
"""
|
164
|
+
Return the broadest scope filter. It is used to select the most
|
165
|
+
restrictive filter from the list of filters. by assigning a score
|
166
|
+
to each filter based on the restriction bits. the filter with the
|
167
|
+
lowest score is the most restrictive.
|
168
|
+
|
169
|
+
filters = [
|
170
|
+
{"tenant_id": "t1"}, # score = 1
|
171
|
+
{"workspace_id": "w1"}, # score = 2
|
172
|
+
{"user_id": "u1"}, # score = 4
|
173
|
+
{"uid": "abc"}, # score = 8
|
174
|
+
{"tenant_id": "t1", "user_id": "u1"}, # score = 1 + 4 = 5
|
175
|
+
{"workspace_id": "w1", "uid": "abc"}, # score = 2 + 8 = 10
|
176
|
+
{}, # score = 0
|
177
|
+
]
|
178
|
+
"""
|
179
|
+
RESTRICTION_BITS = {
|
180
|
+
"tenant_id": 1 << 0, # 1
|
181
|
+
"workspace_id": 1 << 1, # 2
|
182
|
+
"user_id": 1 << 2, # 4
|
183
|
+
"uid": 1 << 3, # 8
|
184
|
+
}
|
185
|
+
|
186
|
+
DEFAULT_BIT = 1 << 4
|
187
|
+
|
188
|
+
if not filters:
|
189
|
+
return {}
|
190
|
+
|
191
|
+
def restriction_score(f: dict) -> int:
|
192
|
+
if not f:
|
193
|
+
return 0
|
194
|
+
return sum(RESTRICTION_BITS.get(k, DEFAULT_BIT) for k in f)
|
195
|
+
|
196
|
+
return min(filters, key=restriction_score)
|
197
|
+
|
198
|
+
|
132
199
|
def is_authorized(
|
133
200
|
user_scope: str,
|
134
201
|
requested_path: str,
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.4
|
2
2
|
Name: usso
|
3
|
-
Version: 0.28.
|
3
|
+
Version: 0.28.25
|
4
4
|
Summary: A plug-and-play client for integrating universal single sign-on (SSO) with Python frameworks, enabling secure and seamless authentication across microservices.
|
5
5
|
Author-email: Mahdi Kiani <mahdikiany@gmail.com>
|
6
6
|
Maintainer-email: Mahdi Kiani <mahdikiany@gmail.com>
|
@@ -1,6 +1,6 @@
|
|
1
1
|
usso/__init__.py,sha256=ot4Q5ouLGe505DGFAxQP4p4yZLLaBLqbHmCF1OvHG1M,585
|
2
|
-
usso/api_key.py,sha256=
|
3
|
-
usso/authorization.py,sha256=
|
2
|
+
usso/api_key.py,sha256=tL5aqrmNHs9GKhCQ5NdbSchvR0qCjdZYZdkHwNONwno,1236
|
3
|
+
usso/authorization.py,sha256=tzGhOy3-avVx0WIRDHADgWR42TxWd4z38X_lDKBdFpo,9022
|
4
4
|
usso/client.py,sha256=9YTyvro3oz24Pr3i1Dit2R2dpIPsGsuIOol66-8VEyI,2636
|
5
5
|
usso/config.py,sha256=7GDAh-yHGYppfkhvrwJykhwJp4HH8P_qPAoGcK8_PZQ,3741
|
6
6
|
usso/exceptions.py,sha256=ggYczQ2eGUH9nBxRYVmOk-6IRSwY8NgEKjMPcE0E5YM,1385
|
@@ -16,9 +16,9 @@ usso/session/base_session.py,sha256=O3tEltMhlwkEz1GGbjE4iXPwSlLaUW2juUt9RDSLrHI,
|
|
16
16
|
usso/session/session.py,sha256=briCgDMoF-b59H6Aie_Lmjy4qnPBBSmKnVhAwef34F0,1637
|
17
17
|
usso/utils/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
18
18
|
usso/utils/string_utils.py,sha256=7tziAa2Cwa7xhwM_NF4DSY3BHoqVaWgJ21VuV8LvhrY,253
|
19
|
-
usso-0.28.
|
20
|
-
usso-0.28.
|
21
|
-
usso-0.28.
|
22
|
-
usso-0.28.
|
23
|
-
usso-0.28.
|
24
|
-
usso-0.28.
|
19
|
+
usso-0.28.25.dist-info/licenses/LICENSE.txt,sha256=ceC9ZJOV9H6CtQDcYmHOS46NA3dHJ_WD4J9blH513pc,1081
|
20
|
+
usso-0.28.25.dist-info/METADATA,sha256=SAquyBkbkvGoVC8QvjrvJrMUkkfXtI6phOUI6qH_xzU,5061
|
21
|
+
usso-0.28.25.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
22
|
+
usso-0.28.25.dist-info/entry_points.txt,sha256=4Zgpm5ELaAWPf0jPGJFz1_X69H7un8ycT3WdGoJ0Vvk,35
|
23
|
+
usso-0.28.25.dist-info/top_level.txt,sha256=g9Jf6h1Oyidh0vPiFni7UHInTJjSvu6cUalpLTIvthg,5
|
24
|
+
usso-0.28.25.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|