This module provides OAuth2 social authentication support for applications in Django REST Framework.
The aim of this package is to help set up social authentication for your REST API. It also helps setting up your OAuth2 provider.
This package relies on python-social-auth and django-oauth-toolkit. You should probably read their docs if you were to go further than what is done here. If you have some hard time understanding OAuth2, you can read a simple explanation here.
If you would like to test out this framework but you do not want to spend time at setting it up in your local environment, you can visit my facebook_setup repo. It contains all the configuration necessary for you to try. It's missing database configuration, however all you have to do is set up a database in the settings.py file.
This framework is published at the PyPI, install it with pip:
pip install drf_social_oauth2
Add the following to your INSTALLED_APPS
:
INSTALLED_APPS = (
...
'oauth2_provider',
'social_django',
'drf_social_oauth2',
)
Include social auth urls to your urls.py:
from django.conf.urls import url
urlpatterns = patterns(
...
url(r'^auth/', include('drf_social_oauth2.urls', namespace='drf'))
)
For versions of Django 4.0 or higher, use:
from django.urls import re_path
urlpatterns = patterns(
...
re_path(r'^auth/', include('drf_social_oauth2.urls', namespace='drf'))
)
Add these context processors to your TEMPLATE_CONTEXT_PROCESSORS
:
TEMPLATE_CONTEXT_PROCESSORS = (
...
'social_django.context_processors.backends',
'social_django.context_processors.login_redirect',
)
NB: since Django version 1.8, the TEMPLATE_CONTEXT_PROCESSORS
is deprecated, set the 'context_processors'
option
in the 'OPTIONS'
of a DjangoTemplates backend instead:
TEMPLATES = [
{
...
'OPTIONS': {
'context_processors': [
...
'social_django.context_processors.backends',
'social_django.context_processors.login_redirect',
],
},
}
]
You can then enable the authentication classes for Django REST Framework by default or per view (add or update the
REST_FRAMEWORK
and AUTHENTICATION_BACKENDS
entries in your settings.py)
REST_FRAMEWORK = {
...
'DEFAULT_AUTHENTICATION_CLASSES': (
...
# 'oauth2_provider.ext.rest_framework.OAuth2Authentication', # django-oauth-toolkit < 1.0.0
'oauth2_provider.contrib.rest_framework.OAuth2Authentication', # django-oauth-toolkit >= 1.0.0
'drf_social_oauth2.authentication.SocialAuthentication',
),
}
AUTHENTICATION_BACKENDS = (
...
'drf_social_oauth2.backends.DjangoOAuth2',
'django.contrib.auth.backends.ModelBackend',
)
The settings of this app are:
DRFSO2_PROPRIETARY_BACKEND_NAME
: name of your OAuth2 social backend (e.g"Facebook"
), defaults to"Django"
DRFSO2_URL_NAMESPACE
: namespace for reversing URLsACTIVATE_JWT
: If set to True the access and refresh tokens will be JWTed. Default is False.
Go to Django admin and add a new Application with the following configuration:
client_id
andclient_secret
should be left unchangeduser
should be your superuserredirect_uris
should be left blankclient_type
should be set toconfidential
authorization_grant_type
should be set to'Resource owner password-based'
name
can be set to whatever you'd like
The installation is done, you can now test the newly configured application.
It is recommended that you read the docs from python-social-auth and django-oauth-toolkit if you would like to go further. If you want to enable a social backend (e.g. Facebook), check the docs of python-social-auth on supported backends and django-social-auth on backend configuration.
Now that the installation is done, let's try out the various functionality.
We will assume for the following examples that the REST API is reachable on http://localhost:8000
.
Retrieve a token for a user using
curl
:curl -X POST -d "client_id=<client_id>&client_secret=<client_secret>&grant_type=password&username=<user_name>&password=<password>" http://localhost:8000/auth/token
<client_id>
and <client_secret>
are the keys generated automatically. you can find in the model Application you created.
Refresh token:
curl -X POST -d "grant_type=refresh_token&client_id=<client_id>&client_secret=<client_secret>&refresh_token=<your_refresh_token>" http://localhost:8000/auth/token
Exchange an external token for a token linked to your app:
curl -X POST -d "grant_type=convert_token&client_id=<client_id>&client_secret=<client_secret>&backend=<backend>&token=<backend_token>" http://localhost:8000/auth/convert-token
<backend>
here needs to be replaced by the name of an enabled backend (e.g. "Facebook"). Note that PROPRIETARY_BACKEND_NAME
is a valid backend name, but there is no use to do that here.
<backend_token>
is for the token you got from the service utilizing an iOS app for example.
Revoke tokens:
Revoke a single token:
curl -X POST -d "client_id=<client_id>&client_secret=<client_secret>&token=<your_token>" http://localhost:8000/auth/revoke-token
Revoke all tokens for a user:
curl -H "Authorization: Bearer <token>" -X POST -d "client_id=<client_id>" http://localhost:8000/auth/invalidate-sessions
As you have probably noticed, we enabled a default authentication backend called SocialAuthentication
.
This backend lets you register and authenticate your users seamlessly with your REST API.
The class simply retrieves the backend name and token from the Authorization header and tries to authenticate the user using the corresponding external provider. If the user was not yet registered on your app, it will automatically create a new user for this purpose.
Example authenticated request:
curl -H "Authorization: Bearer <backend_name> <backend_token>" http://localhost:8000/route/to/your/view
For each authentication provider, the top portion of your REST API settings.py file should look like this:
INSTALLED_APPS = (
...
# OAuth
'oauth2_provider',
'social_django',
'drf_social_oauth2',
)
TEMPLATES = [
{
...
'OPTIONS': {
'context_processors': [
...
# OAuth
'social_django.context_processors.backends',
'social_django.context_processors.login_redirect',
],
},
}
]
REST_FRAMEWORK = {
...
'DEFAULT_AUTHENTICATION_CLASSES': (
...
# OAuth
# 'oauth2_provider.ext.rest_framework.OAuth2Authentication', # django-oauth-toolkit < 1.0.0
'oauth2_provider.contrib.rest_framework.OAuth2Authentication', # django-oauth-toolkit >= 1.0.0
'drf_social_oauth2.authentication.SocialAuthentication',
)
}
Listed below are a few examples of supported backends that can be used for social authentication.
To use Facebook as the authorization backend of your REST API, your settings.py file should look like this:
AUTHENTICATION_BACKENDS = (
# Others auth providers (e.g. Google, OpenId, etc)
...
# Facebook OAuth2
'social_core.backends.facebook.FacebookAppOAuth2',
'social_core.backends.facebook.FacebookOAuth2',
# drf_social_oauth2
'drf_social_oauth2.backends.DjangoOAuth2',
# Django
'django.contrib.auth.backends.ModelBackend',
)
# Facebook configuration
SOCIAL_AUTH_FACEBOOK_KEY = '<your app id goes here>'
SOCIAL_AUTH_FACEBOOK_SECRET = '<your app secret goes here>'
# Define SOCIAL_AUTH_FACEBOOK_SCOPE to get extra permissions from Facebook.
# Email is not sent by default, to get it, you must request the email permission.
SOCIAL_AUTH_FACEBOOK_SCOPE = ['email']
SOCIAL_AUTH_FACEBOOK_PROFILE_EXTRA_PARAMS = {
'fields': 'id, name, email'
}
Remember to add this new Application in your Django admin (see section "Setting up Application").
You can test these settings by running the following command:
curl -X POST -d "grant_type=convert_token&client_id=<client_id>&client_secret=<client_secret>&backend=facebook&token=<facebook_token>" http://localhost:8000/auth/convert-token
This request returns the "access_token" that you should use with every HTTP request to your REST API. What is happening
here is that we are converting a third-party access token (<user_access_token>
) to an access token to use with your
API and its clients ("access_token"). You should use this token on each and further communications between your
system/application and your api to authenticate each request and avoid authenticating with Facebook every time.
You can get the ID (SOCIAL_AUTH_FACEBOOK_KEY
) and secret (SOCIAL_AUTH_FACEBOOK_SECRET
) of your app at
https://developers.facebook.com/apps/.
For testing purposes, you can use the access token <user_access_token>
from https://developers.facebook.com/tools/accesstoken/.
For more information on how to configure python-social-auth with Facebook visit http://python-social-auth.readthedocs.io/en/latest/backends/facebook.html.
To use Google OAuth2 as the authorization backend of your REST API, your settings.py file should look like this:
AUTHENTICATION_BACKENDS = (
# Others auth providers (e.g. Facebook, OpenId, etc)
...
# Google OAuth2
'social_core.backends.google.GoogleOAuth2',
# drf-social-oauth2
'drf_social_oauth2.backends.DjangoOAuth2',
# Django
'django.contrib.auth.backends.ModelBackend',
)
# Google configuration
SOCIAL_AUTH_GOOGLE_OAUTH2_KEY = <your app id goes here>
SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET = <your app secret goes here>
# Define SOCIAL_AUTH_GOOGLE_OAUTH2_SCOPE to get extra permissions from Google.
SOCIAL_AUTH_GOOGLE_OAUTH2_SCOPE = [
'https://www.googleapis.com/auth/userinfo.email',
'https://www.googleapis.com/auth/userinfo.profile',
]
Remember to add the new Application in your Django admin (see section "Setting up Application").
You can test these settings by running the following command:
curl -X POST -d "grant_type=convert_token&client_id=<django-oauth-generated-client_id>&client_secret=<django-oauth-generated-client_secret>&backend=google-oauth2&token=<google_token>" http://localhost:8000/auth/convert-token
This request returns an "access_token" that you should use with every HTTP requests to your REST API.
What is happening here is that we are converting a third-party access token (<user_access_token>
)
to an access token to use with your API and its clients ("access_token"). You should use this token on
each and further communications between your system/application and your API to authenticate each request
and avoid authenticating with Google every time.
You can get the ID (SOCIAL_AUTH_GOOGLE_OAUTH2_KEY
) and secret (SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET
)
of your app at https://console.developers.google.com/apis/credentials
and more information on how to create one on https://developers.google.com/identity/protocols/OAuth2.
For testing purposes, you can use the access token <user_access_token>
from
https://developers.google.com/oauthplayground/.
For more information on how to configure python-social-auth with Google visit https://python-social-auth.readthedocs.io/en/latest/backends/google.html#google-oauth2.
You may find drf-social-oauth2's unit tests in the tests/ directory. In order to run the tests locally, you can either use pytest directly or coverage itself. Prior to running the test cases you need to install the local dependencies by:
$ pip3 install -r requirements.tests.txt
Then you can just run pytest in your terminal:
$ pytest
or call coverage to get the most updated test coverage:
$ coverage run --source='.' -m pytest && coverage html
You can set the expiry time for tokens as follows:
# in your settings.py file.
from oauth2_provider import settings as oauth2_settings
# expires in 6 months
oauth2_settings.DEFAULTS['ACCESS_TOKEN_EXPIRE_SECONDS'] = 1.577e7
Run the Swagger Editor's and interact with the API:
On Mac and Linux:
$ docker run --rm -p 8080:8080 -v $(pwd):/tmp -e SWAGGER_FILE=/tmp/api.yaml swaggerapi/swagger-editor
On Windows:
$ docker run --rm -p 8080:8080 -v ${pwd}:/tmp -e SWAGGER_FILE=/tmp/api.yaml swaggerapi/swagger-editor
I will be working on the issues below. Anyone is welcome to contribute.
- Add OAS for endpoints
- Prevent token recreation if they are still valid
- There is currently a Draft PR I opened in the django-oauth-toolkit: jazzband/django-oauth-toolkit#1058
- Dockerize test execution
- Add CI/CD for tests