Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/thorgate/django-esteid
Django-esteid is a package that provides Esteid based authentication and signing for your Django applications.
https://github.com/thorgate/django-esteid
Last synced: about 1 month ago
JSON representation
Django-esteid is a package that provides Esteid based authentication and signing for your Django applications.
- Host: GitHub
- URL: https://github.com/thorgate/django-esteid
- Owner: thorgate
- License: bsd-3-clause
- Created: 2015-10-27T16:43:39.000Z (about 9 years ago)
- Default Branch: master
- Last Pushed: 2023-11-21T14:42:36.000Z (about 1 year ago)
- Last Synced: 2024-11-29T06:09:30.972Z (about 1 month ago)
- Language: Python
- Homepage:
- Size: 1.77 MB
- Stars: 19
- Watchers: 7
- Forks: 2
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# django-esteid
[![pypi Status](https://badge.fury.io/py/django-esteid.png)](https://badge.fury.io/py/django-esteid)
[![CI](https://github.com/thorgate/django-esteid/actions/workflows/test.yml/badge.svg)](https://github.com/thorgate/django-esteid/actions/workflows/test.yml)
[![Coverage Status](https://coveralls.io/repos/github/thorgate/django-esteid/badge.svg?branch=master)](https://coveralls.io/github/thorgate/django-esteid?branch=master)Django-esteid is a package that provides Esteid based authentication and signing for your Django applications.
## Quickstart
Install `django-esteid`:
pip install django-esteid
Add `esteid` to installed apps:
INSTALLED_APPS = [
# ...
'esteid',
# ...
]Please refer to the more detailed guides on [signing](esteid/signing) and [authentication](esteid/authentication).
Be sure to read the [testing](#testing) section below.
Static files such as the services' logos and helper JS are also shipped with this library.
### SmartID
Detailed docs are [here](esteid/smartid/README.md).
### MobileID
Detailed docs are [here](esteid/mobileid/README.md).
### ID Card
Detailed docs are [here](esteid/idcard/README.md).
### Service settings
You can
### Context processors
`esteid.context_processors.esteid_services` adds service enabled/demo statuses to the template context.
This way you can easily manage the necessary services displayed on the auth/signing page.## Testing
For a guide to authentication testing, please refer to [the authentication readme](./esteid/authentication/README.md).
There is a possibility to test the signing flow with ID card, SmartID
and Mobile ID (the demo services) with the test views coming with the library.**NOTE:** you may not be able to use the live Esteid services even with live credentials.
The live services keep an IP address whitelist
which only contains IP addresses as specified in customer's contract.To run the django-esteid test server with the test views,
* install the virtual environment if not installed yet,
* run `./manage.py migrate` to create the SQLite DB for sessions,
* run `./manage.py runserver 8765`, where 8765 is a port of your likingthen visit the URL http://localhost:8765/ and follow the instructions on that page.
### Mobile ID
To test Mobile ID signing, you will need [test phone numbers and ID codes](https://github.com/SK-EID/MID/wiki/Test-number-for-automated-testing-in-DEMO).
You can not use real phone numbers or ID codes with the demo service.
### SmartID
To test signing with SmartID, yoy can use [the test ID codes](https://github.com/SK-EID/smart-id-documentation/wiki/Environment-technical-parameters).
You can also register a demo SmartID account and use a demo SmartID app to enter the PINs; please visit the
[demo SmartID portal](https://sid.demo.sk.ee/portal/login) for the details.### ID card
ID card signing requires SSL to work, even in a testing environment.
Note that the signature will not be valid neither with the real certificates, nor with the test ones.To perform signing with ID card, you would need the `chrome-token-signing` browser plugin installed.
`apt-get install chrome-token-signing`#### Testing with ssl
You can run an HTTPS webserver with `./manage.py runsslserver 127.0.0.1:8765`. It will use a development certificate
coming with the `djangosslserver` package.Note that the cert is self-signed, so you will need to create a security exception in browser.
If you need to create your own cert using openssl:
```
openssl req -x509 -out localhost.crt -keyout localhost.key \
-newkey rsa:2048 -nodes -sha256 \
-subj '/CN=localhost' -extensions EXT -config <( \
printf "[dn]\nCN=localhost\n[req]\ndistinguished_name=dn\n[EXT]\nsubjectAltName=DNS:localhost\nkeyUsage=digitalSignature\nextendedKeyUsage=serverAuth")
```
Then start the HTTPS webserver as follows:`python manage.py runsslserver 127.0.0.1:8765 --certificate localhost.crt --key localhost.key`
A security exception is also necessary as marked above.
#### ngrok
If you don't want to use a self-signed cert you can route the test site through HTTPS with [ngrok](https://ngrok.com/).With `ngrok` installed, and the `./manage.py runserver 8765` started, run
`ngrok http http://127.0.0.1:8765` and it will create a tunnel with an HTTPS URL for your local site.### Verify demo containers with digidoc-tool
It's possible to use the command line utility `digidoc-tool`
from the [libdigidocpp library](https://github.com/open-eid/libdigidocpp/)
to verify containers with signatures created by demo services:
```
digidoc-tool open --tslurl=https://open-eid.github.io/test-TL/tl-mp-test-EE.xml --tslcert=trusted-test-tsl.crt
```
Instructions on setting up the environment
[can be found here](https://github.com/open-eid/libdigidocpp/wiki/Using-test-TSL-lists#digidoc-toolexe-utility-program).