Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add default security to all endpoints #23

Merged
merged 1 commit into from
Oct 22, 2019

Conversation

lieutdan13
Copy link
Contributor

@karec I was able to find a solution to the issue with Swagger not sending the bearer token. As you suggested, I enabled jwt for all endpoints. /auth/login already had security: [] added.

@lieutdan13 lieutdan13 force-pushed the lock-down-api-endpoints branch from e649362 to a69f7bd Compare October 20, 2019 14:27
@lieutdan13
Copy link
Contributor Author

@karec It appears that Marshmallow SqlAlchemy no longer supports Python 3.5 in the latest version. There are a few ways to resolve this.

  • You could remove support for Python 3.5
  • You could pin Marshmallow SqlAlchemy to a version below the latest.
    • When I do this, the build fails for another reason.

@lieutdan13 lieutdan13 force-pushed the lock-down-api-endpoints branch from a69f7bd to ec28b38 Compare October 20, 2019 15:19
@lieutdan13
Copy link
Contributor Author

Ok. @karec I've fixed the dependencies to work with Python 3.5. I can open a different PR to address the issue separately if you wish. Let me know.

@lieutdan13
Copy link
Contributor Author

Fixes #22

@karec
Copy link
Owner

karec commented Oct 21, 2019

@lieutdan13 Thanks for your PR !

For python version, I think dropping python 3.5 support is doable, this project is a boilerplate to start APIs, not a library, so we should encourage using latest python version as much as we can and python 3.8 is out. But don't worry too much about it, pining dependencies for this pull request is OK, I'll take care of updating travis-ci configuration.

I'll do the code review ASAP for the remaining part

@@ -46,11 +46,14 @@ def init_app(self, app):
app.config.setdefault("SWAGGER_UI_URL", "/swagger-ui")
app.config.setdefault("SWAGGER_URL_PREFIX", None)

default_security = [{"jwt": []}]
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since we're in the extension code here, what do you think of passing **kwargs to init_app (and __init__ by extension) instead of setting it directly in the code ? That will require an extra setting to pass on app factory but will allow users to update it directly in app factory instead of updating extension code if they decide to switch from jwt to oauth for example.

Then we can pass our **kwargs to APISpec, this will also allow users to update more settings if required

Copy link
Contributor Author

@lieutdan13 lieutdan13 Oct 21, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure! I can do that. I can also add security_type as an option to #24 and allow the user to choose.

Something like this?

    def __init__(self, app=None, **kwargs):
        self.spec = None
        if app is not None:
            self.init_app(app, **kwargs)

    def init_app(self, app, **kwargs):
        ...
        self.spec = APISpec(
            title=app.config["APISPEC_TITLE"],
            version=app.config["APISPEC_VERSION"],
            openapi_version=app.config["OPENAPI_VERSION"],
            plugins=[MarshmallowPlugin(), FlaskRestfulPlugin()],
            security=kwargs.get('security'),
        )

Then in extension.py:

apispec = APISpecExt(security=[{"jwt": []}])

Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Letting users choose their security_type may conflict with how authentication is implemented actually, but since we declare security scheme in app factory, it makes more sense to only have to update it in one place.

For **kwargs we could also forward them all to APISpec:

    def __init__(self, app=None, **kwargs):
        self.spec = None
        if app is not None:
            self.init_app(app, **kwargs)

    def init_app(self, app, **kwargs):
        ...
        self.spec = APISpec(
            title=app.config["APISPEC_TITLE"],
            version=app.config["APISPEC_VERSION"],
            openapi_version=app.config["OPENAPI_VERSION"],
            plugins=[MarshmallowPlugin(), FlaskRestfulPlugin()],
            **kwargs
        )

So it will allow us to pass any other top-level key at app factory level (https://github.com/OAI/OpenAPI-Specification/blob/master/versions/3.0.2.md#openapi-object) and (https://apispec.readthedocs.io/en/latest/api_core.html#apispec.APISpec)

And then in app.py

def configure_apispec(app):
    """Configure APISpec for swagger support
    """
    apispec.init_app(app, security=[{"jwt": []}])
    apispec.spec.components.security_scheme("jwt", {
        "type": "http",
        "scheme": "bearer",
        "bearerFormat": "JWT",
    })
    apispec.spec.components.schema(
        "PaginatedResult", {
            "properties": {
                "total": {"type": "integer"},
                "pages": {"type": "integer"},
                "next": {"type": "string"},
                "prev": {"type": "string"},
            }})

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it. I'll push up a change soon.

Copy link
Contributor Author

@lieutdan13 lieutdan13 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All changes requested have been made.

@lieutdan13 lieutdan13 force-pushed the lock-down-api-endpoints branch from 59a883e to cb045cd Compare October 22, 2019 00:08
- Define default security as JWT and pass to ApiSpec
- Remove support for Python 3.5
@lieutdan13 lieutdan13 force-pushed the lock-down-api-endpoints branch from cb045cd to eca7e26 Compare October 22, 2019 00:09
@lieutdan13 lieutdan13 mentioned this pull request Oct 22, 2019
@karec
Copy link
Owner

karec commented Oct 22, 2019

@lieutdan13 Thanks again for this PR ! I'm merging it right now

@karec karec merged commit e8042f5 into karec:master Oct 22, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants