-
-
Save xcdr/f0bb777de7a2e40449e5b06df7ac9605 to your computer and use it in GitHub Desktop.
Auth0 Token Validation and Authorisation as Django Middleware
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from django.http import JsonResponse | |
from jose import jwt | |
AUTH0_DOMAIN = {YOUR_AUTH0_DOMAIN} | |
API_AUDIENCE = {YOUR_API_AUDIENCE} | |
ALGORITHMS = ["RS256"] | |
""" | |
Cache the key available at https://{AUTH0_DOMAIN}/.well-known/jwks.json as a python dict | |
""" | |
AUTH0_PUBLIC_KEY = {} | |
class Auth0Middleware(object): | |
def __init__(self, get_response): | |
self.get_response = get_response | |
def __call__(self, request): | |
# GET TOKEN | |
auth = request.META.get('HTTP_AUTHORIZATION') | |
if not auth: | |
return JsonResponse(data={"code": "authorization_header_missing", | |
"description": | |
"Authorization header is expected"}, status=401) | |
parts = auth.split() | |
if parts[0].lower() != "bearer": | |
return JsonResponse(data={"code": "invalid_header", | |
"description": | |
"Authorization header must start with" | |
"Bearer"}, status=401) | |
elif len(parts) == 1: | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Token not found"}, status=401) | |
elif len(parts) > 2: | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Authorization header must be" | |
"Bearer token"}, status=401) | |
token = parts[1] | |
# VALIDATE TOKEN | |
jwks = AUTH0_PUBLIC_KEY | |
try: | |
unverified_header = jwt.get_unverified_header(token) | |
except jwt.JWTError: | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Invalid header. " | |
"Use an RS256 signed JWT Access Token"}, status=401) | |
if unverified_header["alg"] == "HS256": | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Invalid header. " | |
"Use an RS256 signed JWT Access Token"}, status=401) | |
rsa_key = {} | |
for key in jwks["keys"]: | |
if key["kid"] == unverified_header["kid"]: | |
rsa_key = { | |
"kty": key["kty"], | |
"kid": key["kid"], | |
"use": key["use"], | |
"n": key["n"], | |
"e": key["e"] | |
} | |
if rsa_key: | |
try: | |
jwt.decode( | |
token, | |
rsa_key, | |
algorithms=ALGORITHMS, | |
audience=API_AUDIENCE, | |
issuer="https://" + AUTH0_DOMAIN + "/" | |
) | |
except jwt.ExpiredSignatureError: | |
return JsonResponse(data={"code": "token_expired", | |
"description": "token is expired"}, status=401) | |
except jwt.JWTClaimsError: | |
return JsonResponse(data={"code": "invalid_claims", | |
"description": "incorrect claims," | |
" please check the audience and issuer"}, status=401) | |
except Exception: | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Unable to parse authentication" | |
" token."}, status=400) | |
else: | |
return JsonResponse(data={"code": "invalid_header", | |
"description": "Unable to find appropriate key"}, status=401) | |
response = self.get_response(request) | |
return response |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment