Strong, Simple, (now async!) and Precise security for Sanic APIs
Overview#
This project’s beginning was fully lifted from the awesome Flask-Praetorian.
Why beskar? Why not – what is better than star wars (provided you ignore the fact the mandolorian was almost as lame as book of boba fett)? Superior armour should be used if you want superior protection.
This package aims to provide that. Using token implemented by either PySETO or PyJWT, sanic-beskar uses a very simple interface to make sure that the users accessing your API’s endpoints are provisioned with the correct roles for access.
The goal of this project is to offer simplistic protection, without forcing nonsense, excessivly complicatated implementation, or mandated/opinionated ORM usage. Providing this usability for small scaled Sanic applications, while allowing the flexibility and scalability for enterprise grade solutions, separates this from your other options.
The sanic-beskar package can be used to:
Hash passwords for storing in your database
Verify plaintext passwords against the hashed, stored versions
Generate authorization tokens upon verification of passwords
Check requests to secured endpoints for authorized tokens
Supply expiration of tokens and mechanisms for refreshing them
Ensure that the users associated with tokens have necessary roles for access
Parse user information from request headers for use in client route handlers
Support inclusion of custom user claims in tokens
Register new users using email verification
Support OTP authentication as a dual factor
Provide RBAC based protection of endpoints and resources
All of this is provided in a very simple to configure and initialize flask extension. Though simple, the security provided by sanic-beskar is strong due to the usage of the proven security technology of PASETO or JWT, along with python’s PassLib package.