mirror of
https://github.com/imartinez/privateGPT.git
synced 2025-09-15 22:59:53 +00:00
Add simple Basic auth (#1203)
* Add simple Basic auth To enable the basic authentication, one must set `server.auth.enabled` to true. The static string defined in `server.auth.secret` must be set in the header `Authorization`. The health check endpoint will always be accessible, no matter the API auth configuration. * Fix linting and type check * Fighting with mypy being too restrictive Had to disable mypy in the `auth` as we are not using the same signature for the authenticated method. mypy was complaining that the signatures of `authenticated` must be identical, no matter in which logical branch we are. Given that fastapi is accomodating itself of method signatures (it will inject the dependencies in the method call), this warning of mypy is actually preventing us to do something legit. mypy doc: https://mypy.readthedocs.io/en/stable/common_issues.html * Write tests to verify that the simple auth is working
This commit is contained in:
0
private_gpt/server/utils/__init__.py
Normal file
0
private_gpt/server/utils/__init__.py
Normal file
68
private_gpt/server/utils/auth.py
Normal file
68
private_gpt/server/utils/auth.py
Normal file
@@ -0,0 +1,68 @@
|
||||
"""Authentication mechanism for the API.
|
||||
|
||||
Define a simple mechanism to authenticate requests.
|
||||
More complex authentication mechanisms can be defined here, and be placed in the
|
||||
`authenticated` method (being a 'bean' injected in fastapi routers).
|
||||
|
||||
Authorization can also be made after the authentication, and depends on
|
||||
the authentication. Authorization should not be implemented in this file.
|
||||
|
||||
Authorization can be done by following fastapi's guides:
|
||||
* https://fastapi.tiangolo.com/advanced/security/oauth2-scopes/
|
||||
* https://fastapi.tiangolo.com/tutorial/security/
|
||||
* https://fastapi.tiangolo.com/tutorial/dependencies/dependencies-in-path-operation-decorators/
|
||||
"""
|
||||
# mypy: ignore-errors
|
||||
# Disabled mypy error: All conditional function variants must have identical signatures
|
||||
# We are changing the implementation of the authenticated method, based on
|
||||
# the config. If the auth is not enabled, we are not defining the complex method
|
||||
# with its dependencies.
|
||||
import logging
|
||||
import secrets
|
||||
from typing import Annotated
|
||||
|
||||
from fastapi import Depends, Header, HTTPException
|
||||
|
||||
from private_gpt.settings.settings import settings
|
||||
|
||||
# 401 signify that the request requires authentication.
|
||||
# 403 signify that the authenticated user is not authorized to perform the operation.
|
||||
NOT_AUTHENTICATED = HTTPException(
|
||||
status_code=401,
|
||||
detail="Not authenticated",
|
||||
headers={"WWW-Authenticate": 'Basic realm="All the API", charset="UTF-8"'},
|
||||
)
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
|
||||
def _simple_authentication(authorization: Annotated[str, Header()] = "") -> bool:
|
||||
"""Check if the request is authenticated."""
|
||||
if not secrets.compare_digest(authorization, settings.server.auth.secret):
|
||||
# If the "Authorization" header is not the expected one, raise an exception.
|
||||
raise NOT_AUTHENTICATED
|
||||
return True
|
||||
|
||||
|
||||
if not settings.server.auth.enabled:
|
||||
logger.debug(
|
||||
"Defining a dummy authentication mechanism for fastapi, always authenticating requests"
|
||||
)
|
||||
|
||||
# Define a dummy authentication method that always returns True.
|
||||
def authenticated() -> bool:
|
||||
"""Check if the request is authenticated."""
|
||||
return True
|
||||
|
||||
else:
|
||||
logger.info("Defining the given authentication mechanism for the API")
|
||||
|
||||
# Method to be used as a dependency to check if the request is authenticated.
|
||||
def authenticated(
|
||||
_simple_authentication: Annotated[bool, Depends(_simple_authentication)]
|
||||
) -> bool:
|
||||
"""Check if the request is authenticated."""
|
||||
assert settings.server.auth.enabled
|
||||
if not _simple_authentication:
|
||||
raise NOT_AUTHENTICATED
|
||||
return True
|
Reference in New Issue
Block a user