Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/simonw/datasette-auth-github
Datasette plugin that authenticates users against GitHub
https://github.com/simonw/datasette-auth-github
asgi datasette datasette-io datasette-plugin
Last synced: about 2 months ago
JSON representation
Datasette plugin that authenticates users against GitHub
- Host: GitHub
- URL: https://github.com/simonw/datasette-auth-github
- Owner: simonw
- License: apache-2.0
- Created: 2019-07-03T16:02:53.000Z (over 5 years ago)
- Default Branch: main
- Last Pushed: 2022-11-22T17:20:25.000Z (about 2 years ago)
- Last Synced: 2024-10-18T07:53:47.390Z (2 months ago)
- Topics: asgi, datasette, datasette-io, datasette-plugin
- Language: Python
- Homepage: https://datasette-auth-github-demo.datasette.io/
- Size: 116 KB
- Stars: 41
- Watchers: 3
- Forks: 7
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# datasette-auth-github
[![PyPI](https://img.shields.io/pypi/v/datasette-auth-github.svg)](https://pypi.org/project/datasette-auth-github/)
[![Changelog](https://img.shields.io/github/v/release/simonw/datasette-auth-github?include_prereleases&label=changelog)](https://github.com/simonw/datasette-auth-github/releases)
[![Tests](https://github.com/simonw/datasette-auth-github/workflows/Test/badge.svg)](https://github.com/simonw/datasette-auth-github/actions?query=workflow%3ATest)
[![License](https://img.shields.io/badge/license-Apache%202.0-blue.svg)](https://github.com/simonw/datasette-auth-github/blob/main/LICENSE)Datasette plugin that authenticates users against GitHub.
- [Setup instructions](#setup-instructions)
- [The authenticated actor](#the-authenticated-actor)
- [Restricting access to specific users](#restricting-access-to-specific-users)
- [Restricting access to specific GitHub organizations or teams](#restricting-access-to-specific-github-organizations-or-teams)
- [What to do if a user is removed from an organization or team](#what-to-do-if-a-user-is-removed-from-an-organization-or-team)## Setup instructions
* Install the plugin: `datasette install datasette-auth-github`
* Create a GitHub OAuth app: https://github.com/settings/applications/new
* Set the Authorization callback URL to `http://127.0.0.1:8001/-/github-auth-callback`
* Create a `metadata.json` file with the following structure:```json
{
"title": "datasette-auth-github demo",
"plugins": {
"datasette-auth-github": {
"client_id": {"$env": "GITHUB_CLIENT_ID"},
"client_secret": {"$env": "GITHUB_CLIENT_SECRET"}
}
}
}
```Now you can start Datasette like this, passing in the secrets as environment variables:
$ GITHUB_CLIENT_ID=XXX GITHUB_CLIENT_SECRET=YYY datasette \
fixtures.db -m metadata.jsonNote that hard-coding secrets in `metadata.json` is a bad idea as they will be visible to anyone who can navigate to `/-/metadata`. Instead, we use Datasette's mechanism for [adding secret plugin configuration options](https://docs.datasette.io/en/stable/plugins.html#secret-configuration-values).
By default anonymous users will still be able to interact with Datasette. If you wish all users to have to sign in with a GitHub account first, add this to your ``metadata.json``:
```json
{
"allow": {
"id": "*"
},
"plugins": {
"datasette-auth-github": {
"...": "..."
}
}
}
```
## The authenticated actorVisit `/-/actor` when signed in to see the shape of the authenticated actor. It should look something like this:
```json
{
"actor": {
"display": "simonw",
"gh_id": "9599",
"gh_name": "Simon Willison",
"gh_login": "simonw",
"gh_email": "...",
"gh_orgs": [
"dogsheep",
"datasette-project"
],
"gh_teams": [
"dogsheep/test"
]
}
}
```The `gh_orgs` and `gh_teams` properties will only be present if you used `load_teams` or `load_orgs`, documented below.
## Restricting access to specific users
You can use Datasette's [permissions mechanism](https://docs.datasette.io/en/stable/authentication.html) to specify which user or users are allowed to access your instance. Here's how to restrict access to just GitHub user `simonw`:
```json
{
"allow": {
"gh_login": "simonw"
},
"plugins": {
"datasette-auth-github": {
"...": "..."
}
}
}
```This `"allow"` block can be positioned at the database, table or query level instead: see [Configuring permissions in metadata.json](https://docs.datasette.io/en/stable/authentication.html#configuring-permissions-in-metadata-json) for details.
Note that GitHub allows users to change their username, and it is possible for other people to claim old usernames. If you are concerned that your users may change their usernames you can key the allow blocks against GitHub user IDs instead, which do not change:
```json
{
"allow": {
"gh_id": "9599"
}
}
```## Restricting access to specific GitHub organizations or teams
You can also restrict access to users who are members of a specific GitHub organization.
You'll need to configure the plugin to check if the user is a member of that organization when they first sign in. You can do that using the `"load_orgs"` plugin configuration option.
Then you can use `"allow": {"gh_orgs": [...]}` to specify which organizations are allowed access.
```json
{
"plugins": {
"datasette-auth-github": {
"...": "...",
"load_orgs": ["your-organization"]
}
},
"allow": {
"gh_orgs": "your-organization"
}
}
```If your organization is [arranged into teams](https://help.github.com/en/articles/organizing-members-into-teams) you can restrict access to a specific team like this:
```json
{
"plugins": {
"datasette-auth-github": {
"...": "...",
"load_teams": [
"your-organization/staff",
"your-organization/engineering",
]
}
},
"allows": {
"gh_team": "your-organization/engineering"
}
}
```## What to do if a user is removed from an organization or team
A user's organization and team memberships are checked once, when they first sign in. Those teams and organizations are then persisted in the user's signed `ds_actor` cookie.
This means that if a user is removed from an organization or team but still has a Datasette cookie, they will still be able to access that Datasette instance.
You can remedy this by rotating the `DATASETTE_SECRET` environment variable any time you make changes to your GitHub organization members.
Changing this value will cause all of your existing users to be signed out, by invalidating their cookies. When they sign back in again their new memberships will be recorded in a new cookie.
See [Configuring the secret](https://docs.datasette.io/en/stable/settings.html?highlight=secret#configuring-the-secret) in the Datasette documentation for more details.