diff --git a/docs/en/docs/advanced/security/api-key.md b/docs/en/docs/advanced/security/api-key.md new file mode 100644 index 000000000..470c4a3d7 --- /dev/null +++ b/docs/en/docs/advanced/security/api-key.md @@ -0,0 +1,81 @@ +# API Key Auth + +A common alternative to HTTP Basic Auth is using API Keys. + +In API Key Auth, the application expects the secret key, in header, or cookie, query or parameter, depending on setup. + +If header isn't received it, FastAPI can return an HTTP 403 "Forbidden" error. + +## Simple API Key Auth using header + +We'll protect the entire API under a Key (rather than single endpoints). + +* Import `APIKeyHeader`. +* Create an `APIKeyHeader`, specifying what header to parse as API key. +* Create a `get_api_key` function to check the key +* Create a `security` from the `get_api_key` function, used as a dependency in your FastAPI `app`. + +{* ../../docs_src/security/tutorial008.py hl=[5,7,14,23] *} + +This API now requires authentication to hit any endpoint: + + + + +!!! tip + In the simplest case of a single, static API Key secret, you likely want it to be sourced from an environment variable or config file. + + Have a look at [Pydantic settings](../../settings){.internal-link target=_blank} to do it. + +## A look at the Header + +Note how the `APIKeyHeader` describes the expected header name, and the +description ends up on the documentation for the authentication: the description +is a perfect place to link to your developer documentation's "Generate a token" +section. + +{* ../../docs_src/security/tutorial008.py hl=[8:9] *} + +As for the `auto_error` parameter, it can be set to `True` so that missing the +header returns automatic HTTP 403 "Forbidden". + +## Protecting single endpoints + +Alternatively, the `Security` dependency can be defined at path level to protect +not the whole API, but specific, sensitive endpoints. + +```Python +@app.post("/admin/password_reset", dependencies=[Security(get_api_key)] +def password_reset(user: int, new_password: str): +``` + +## API Key in Cookies + +For convenience, API Keys can be pushed in cookies instead. + + + +{* ../../docs_src/security/tutorial009.py hl=[2,7,14] *} + +Users can call this via: + +```Python +response = client.get("/users/me", cookies={"key": "secret"}) +``` + +## API Key in Query + +To round up the multiple ways to use API Keys, one can set the API key as query parameter. + + +{* ../../docs_src/security/tutorial010.py hl=[2,7,14] *} + +Users can call this via: + +```Python +response = client.get("/users/me?key=secret") +``` + +Note that setting `auto_error` to `False` can useful to support multiple +methods for providing API Key, checking successively for Cookie, falling back to +header, etc. diff --git a/docs/en/docs/img/tutorial/security/image13.png b/docs/en/docs/img/tutorial/security/image13.png new file mode 100644 index 000000000..a69a84f1f Binary files /dev/null and b/docs/en/docs/img/tutorial/security/image13.png differ diff --git a/docs/en/mkdocs.yml b/docs/en/mkdocs.yml index bfa88c06e..72206821a 100644 --- a/docs/en/mkdocs.yml +++ b/docs/en/mkdocs.yml @@ -171,6 +171,7 @@ nav: - advanced/security/index.md - advanced/security/oauth2-scopes.md - advanced/security/http-basic-auth.md + - advanced/security/api-key.md - advanced/using-request-directly.md - advanced/dataclasses.md - advanced/middleware.md diff --git a/docs_src/security/tutorial008.py b/docs_src/security/tutorial008.py new file mode 100644 index 000000000..e976ad137 --- /dev/null +++ b/docs_src/security/tutorial008.py @@ -0,0 +1,28 @@ +import secrets + +from fastapi import FastAPI, Security, status +from fastapi.exceptions import HTTPException +from fastapi.security.api_key import APIKeyHeader + +api_key_header_auth = APIKeyHeader( + name="X-API-KEY", + description="Mandatory API Token, required for all endpoints", + auto_error=True, +) + + +async def get_api_key(api_key_header: str = Security(api_key_header_auth)): + correct_api_key = secrets.compare_digest(api_key_header, "randomized-string-1234") + if not correct_api_key: + raise HTTPException( + status_code=status.HTTP_403_FORBIDDEN, + detail="Invalid API Key", + ) + + +app = FastAPI(dependencies=[Security(get_api_key)]) + + +@app.get("/health") +async def endpoint(): + return {"Hello": "World"} diff --git a/docs_src/security/tutorial009.py b/docs_src/security/tutorial009.py new file mode 100644 index 000000000..0912f43f4 --- /dev/null +++ b/docs_src/security/tutorial009.py @@ -0,0 +1,21 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security import APIKeyCookie +from pydantic import BaseModel + +app = FastAPI() + +api_key = APIKeyCookie(name="key") + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(api_key)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user diff --git a/docs_src/security/tutorial010.py b/docs_src/security/tutorial010.py new file mode 100644 index 000000000..86c595fac --- /dev/null +++ b/docs_src/security/tutorial010.py @@ -0,0 +1,21 @@ +from fastapi import Depends, FastAPI, Security +from fastapi.security import APIKeyQuery +from pydantic import BaseModel + +app = FastAPI() + +api_key = APIKeyQuery(name="key") + + +class User(BaseModel): + username: str + + +def get_current_user(oauth_header: str = Security(api_key)): + user = User(username=oauth_header) + return user + + +@app.get("/users/me") +def read_current_user(current_user: User = Depends(get_current_user)): + return current_user diff --git a/tests/test_tutorial/test_security/test_tutorial008.py b/tests/test_tutorial/test_security/test_tutorial008.py new file mode 100644 index 000000000..0450375af --- /dev/null +++ b/tests/test_tutorial/test_security/test_tutorial008.py @@ -0,0 +1,61 @@ +from fastapi.testclient import TestClient + +from docs_src.security.tutorial008 import app + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.1.0", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/health": { + "get": { + "summary": "Endpoint", + "operationId": "endpoint_health_get", + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "security": [{"APIKeyHeader": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyHeader": { + "type": "apiKey", + "description": "Mandatory API Token, required for all endpoints", + "in": "header", + "name": "X-API-KEY", + } + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_apikey_header(): + auth = {"X-API-KEY": "randomized-string-1234"} + response = client.get("/health", headers=auth) + assert response.status_code == 200, response.text + assert response.json() == {"Hello": "World"} + + +def test_security_apikey_header_no_credentials(): + response = client.get("/health", headers={}) + assert response.json() == {"detail": "Not authenticated"} + assert response.status_code == 403, response.text + + +def test_security_apikey_header_invalid_credentials(): + auth = {"X-API-KEY": "totally-wrong-api-key"} + response = client.get("/health", headers=auth) + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Invalid API Key"} diff --git a/tests/test_tutorial/test_security/test_tutorial009.py b/tests/test_tutorial/test_security/test_tutorial009.py new file mode 100644 index 000000000..d9dba2748 --- /dev/null +++ b/tests/test_tutorial/test_security/test_tutorial009.py @@ -0,0 +1,53 @@ +from fastapi.testclient import TestClient + +from docs_src.security.tutorial009 import app + +# IDENTICAL COPY of tests/test_security_api_key_cookie.py + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.1.0", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"APIKeyCookie": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyCookie": {"type": "apiKey", "name": "key", "in": "cookie"} + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_api_key(): + client.cookies = {"key": "secret"} + response = client.get("/users/me") # , cookies={"key": "secret"}) + assert response.status_code == 200, response.text + assert response.json() == {"username": "secret"} + + +def test_security_api_key_no_key(): + client.cookies = None + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"} diff --git a/tests/test_tutorial/test_security/test_tutorial010.py b/tests/test_tutorial/test_security/test_tutorial010.py new file mode 100644 index 000000000..d65dd3dad --- /dev/null +++ b/tests/test_tutorial/test_security/test_tutorial010.py @@ -0,0 +1,51 @@ +from fastapi.testclient import TestClient + +from docs_src.security.tutorial010 import app + +# IDENTICAL COPY of tests/test_security_api_key_query.py + + +client = TestClient(app) + +openapi_schema = { + "openapi": "3.1.0", + "info": {"title": "FastAPI", "version": "0.1.0"}, + "paths": { + "/users/me": { + "get": { + "responses": { + "200": { + "description": "Successful Response", + "content": {"application/json": {"schema": {}}}, + } + }, + "summary": "Read Current User", + "operationId": "read_current_user_users_me_get", + "security": [{"APIKeyQuery": []}], + } + } + }, + "components": { + "securitySchemes": { + "APIKeyQuery": {"type": "apiKey", "name": "key", "in": "query"} + } + }, +} + + +def test_openapi_schema(): + response = client.get("/openapi.json") + assert response.status_code == 200, response.text + assert response.json() == openapi_schema + + +def test_security_api_key(): + response = client.get("/users/me?key=secret") + assert response.status_code == 200, response.text + assert response.json() == {"username": "secret"} + + +def test_security_api_key_no_key(): + response = client.get("/users/me") + assert response.status_code == 403, response.text + assert response.json() == {"detail": "Not authenticated"}