mirror of
https://github.com/GSA/notifications-api.git
synced 2026-01-31 23:26:23 -05:00
First pass at implementing API authentication using new JWT tokens
- NOTE - this does not manage secrets. There is only one URL and there is no functionality implemented - prior to rolling out we need to store secrets properly Uses the JWT libraries in [https://github.com/alphagov/notifications-python-client](https://github.com/alphagov/notifications-python-client) - Tokens are checked on every request and will be rejected if token is invalid as per the rules in the python clients.
This commit is contained in:
@@ -1,82 +0,0 @@
|
||||
from flask import json
|
||||
import jwt
|
||||
import hashlib
|
||||
import hmac
|
||||
import calendar
|
||||
import time
|
||||
import base64
|
||||
|
||||
|
||||
def sign_a_thing(thing_to_sign, secret_key):
|
||||
return base64.b64encode(
|
||||
hmac.new(
|
||||
secret_key.encode(),
|
||||
thing_to_sign.encode(),
|
||||
digestmod=hashlib.sha256
|
||||
).digest()
|
||||
)
|
||||
|
||||
|
||||
def token(request_method, request_url, secret_key, service_id, json_body):
|
||||
|
||||
# request method and resource path - hash of request url - POST /path-to-resource
|
||||
signed_url = sign_a_thing("{} {}".format(request_method, request_url), secret_key)
|
||||
signed_payload = sign_a_thing(json_body, secret_key)
|
||||
|
||||
headers = {
|
||||
"typ": "JWT",
|
||||
"alg": "HS256"
|
||||
}
|
||||
|
||||
claims = {
|
||||
'iss': service_id, # issued by - identified by id of the service
|
||||
'iat': calendar.timegm(time.gmtime()), # issued at in epoch seconds
|
||||
'req': signed_url.decode(),
|
||||
'pay': signed_payload.decode() # signed payload
|
||||
}
|
||||
|
||||
return jwt.encode(payload=claims, key=secret_key, headers=headers).decode()
|
||||
|
||||
|
||||
def test_should_not_allow_request_with_no_token(notify_api):
|
||||
response = notify_api.test_client().get("/")
|
||||
assert response.status_code == 401
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Unauthorized, authentication token must be provided'
|
||||
|
||||
|
||||
def test_should_not_allow_request_with_invalid_token(notify_api):
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={'Authorization': 'Bearer 1234'}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Forbidden, invalid authentication token provided'
|
||||
|
||||
|
||||
def test_should_allow_request_with_valid_token(notify_api):
|
||||
|
||||
body = {
|
||||
"1": "A",
|
||||
"3": "A",
|
||||
"7": "A",
|
||||
"15": "A",
|
||||
"2": "B"
|
||||
}
|
||||
request_body = json.dumps(body)
|
||||
|
||||
request_token = token("POST", "/", "1234", "service1", request_body)
|
||||
|
||||
# from time import sleep
|
||||
# sleep(4)
|
||||
|
||||
response = notify_api.test_client().post(
|
||||
"/",
|
||||
data=request_body,
|
||||
headers={
|
||||
'Authorization': "Bearer {}".format(request_token)
|
||||
},
|
||||
content_type='application/json'
|
||||
)
|
||||
assert response.status_code == 200
|
||||
131
tests/app/main/views/test_authentication.py
Normal file
131
tests/app/main/views/test_authentication.py
Normal file
@@ -0,0 +1,131 @@
|
||||
from flask import json
|
||||
from client.jwt import create_jwt_token
|
||||
|
||||
|
||||
def test_should_not_allow_request_with_no_token(notify_api):
|
||||
response = notify_api.test_client().get("/")
|
||||
assert response.status_code == 401
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Unauthorized, authentication token must be provided'
|
||||
|
||||
|
||||
def test_should_not_allow_request_with_incorrect_header(notify_api):
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': 'Basic 1234'
|
||||
}
|
||||
)
|
||||
assert response.status_code == 401
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Unauthorized, authentication bearer scheme must be used'
|
||||
|
||||
|
||||
def test_should_not_allow_request_with_incorrect_token(notify_api):
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': 'Bearer 1234'
|
||||
}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Invalid token: signature'
|
||||
|
||||
|
||||
def test_should_not_allow_incorrect_path(notify_api):
|
||||
token = create_jwt_token(request_method="GET", request_path="/bad", secret="secret", client_id="client_id")
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': "Bearer {}".format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Invalid token: request'
|
||||
|
||||
|
||||
def test_should_not_allow_incorrect_method(notify_api):
|
||||
token = create_jwt_token(request_method="POST", request_path="/", secret="secret", client_id="client_id")
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': "Bearer {}".format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Invalid token: request'
|
||||
|
||||
|
||||
def test_should_not_allow_invalid_secret(notify_api):
|
||||
token = create_jwt_token(request_method="POST", request_path="/", secret="not-so-secret", client_id="client_id")
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': "Bearer {}".format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Invalid token: signature'
|
||||
|
||||
|
||||
def test_should_allow_valid_token(notify_api):
|
||||
token = create_jwt_token(request_method="GET", request_path="/", secret="secret", client_id="client_id")
|
||||
response = notify_api.test_client().get(
|
||||
"/",
|
||||
headers={
|
||||
'Authorization': 'Bearer {}'.format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 201
|
||||
|
||||
|
||||
def test_should_allow_valid_token_with_post_body(notify_api):
|
||||
json_body = json.dumps({
|
||||
"key1": "value1",
|
||||
"key2": "value2",
|
||||
"key3": "value3"
|
||||
})
|
||||
token = create_jwt_token(
|
||||
request_method="POST",
|
||||
request_path="/",
|
||||
secret="secret",
|
||||
client_id="client_id",
|
||||
request_body=json_body
|
||||
)
|
||||
response = notify_api.test_client().post(
|
||||
"/",
|
||||
data=json_body,
|
||||
headers={
|
||||
'Authorization': 'Bearer {}'.format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 200
|
||||
|
||||
|
||||
def test_should_not_allow_valid_token_with_invalid_post_body(notify_api):
|
||||
json_body = json.dumps({
|
||||
"key1": "value1",
|
||||
"key2": "value2",
|
||||
"key3": "value3"
|
||||
})
|
||||
token = create_jwt_token(
|
||||
request_method="POST",
|
||||
request_path="/",
|
||||
secret="secret",
|
||||
client_id="client_id",
|
||||
request_body=json_body
|
||||
)
|
||||
response = notify_api.test_client().post(
|
||||
"/",
|
||||
data="spurious",
|
||||
headers={
|
||||
'Authorization': 'Bearer {}'.format(token)
|
||||
}
|
||||
)
|
||||
assert response.status_code == 403
|
||||
data = json.loads(response.get_data())
|
||||
assert data['error'] == 'Invalid token: payload'
|
||||
Reference in New Issue
Block a user