From f80ae5e92e0b51a03d7f5d99232c2f229f3d1920 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Bidoul?= Date: Thu, 15 Jun 2023 17:54:57 +0200 Subject: [PATCH 01/11] [ADD] fastapi_auth_jwt, fastapi_auth_jwt_demo --- fastapi_auth_jwt/README.rst | 0 fastapi_auth_jwt/__init__.py | 0 fastapi_auth_jwt/__manifest__.py | 19 ++ fastapi_auth_jwt/dependencies.py | 234 ++++++++++++++++++++++++ fastapi_auth_jwt/readme/DESCRIPTION.rst | 2 + fastapi_auth_jwt/readme/USAGE.rst | 48 +++++ 6 files changed, 303 insertions(+) create mode 100644 fastapi_auth_jwt/README.rst create mode 100644 fastapi_auth_jwt/__init__.py create mode 100644 fastapi_auth_jwt/__manifest__.py create mode 100644 fastapi_auth_jwt/dependencies.py create mode 100644 fastapi_auth_jwt/readme/DESCRIPTION.rst create mode 100644 fastapi_auth_jwt/readme/USAGE.rst diff --git a/fastapi_auth_jwt/README.rst b/fastapi_auth_jwt/README.rst new file mode 100644 index 000000000..e69de29bb diff --git a/fastapi_auth_jwt/__init__.py b/fastapi_auth_jwt/__init__.py new file mode 100644 index 000000000..e69de29bb diff --git a/fastapi_auth_jwt/__manifest__.py b/fastapi_auth_jwt/__manifest__.py new file mode 100644 index 000000000..b7d81bfa7 --- /dev/null +++ b/fastapi_auth_jwt/__manifest__.py @@ -0,0 +1,19 @@ +# Copyright 2023 ACSONE SA/NV +# License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl). + +{ + "name": "FastAPI Auth JWT support", + "summary": """ + JWT bearer token authentication for FastAPI.""", + "version": "16.0.1.0.0", + "license": "LGPL-3", + "author": "ACSONE SA/NV,Odoo Community Association (OCA)", + "maintainers": ["sbidoul"], + "website": "https://github.com/OCA/rest-framework", + "depends": [ + "fastapi", + "auth_jwt", + ], + "data": [], + "demo": [], +} diff --git a/fastapi_auth_jwt/dependencies.py b/fastapi_auth_jwt/dependencies.py new file mode 100644 index 000000000..2490903d2 --- /dev/null +++ b/fastapi_auth_jwt/dependencies.py @@ -0,0 +1,234 @@ +# Copyright 2023 ACSONE SA/NV +# License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl). + +import logging +from typing import Annotated, Any, Dict, Optional, Tuple, Union + +from starlette.status import HTTP_401_UNAUTHORIZED + +from odoo.api import Environment + +from odoo.addons.auth_jwt.exceptions import ( + ConfigurationError, + Unauthorized, + UnauthorizedCompositeJwtError, + UnauthorizedMissingAuthorizationHeader, + UnauthorizedMissingCookie, +) +from odoo.addons.auth_jwt.models.auth_jwt_validator import AuthJwtValidator +from odoo.addons.base.models.res_partner import Partner +from odoo.addons.fastapi.dependencies import odoo_env + +from fastapi import Depends, HTTPException, Request, Response +from fastapi.security import HTTPAuthorizationCredentials, HTTPBearer + +_logger = logging.getLogger(__name__) + + +Payload = Dict[str, Any] + + +def _get_auth_jwt_validator( + validator_name: Union[str, None], + env: Environment, +) -> AuthJwtValidator: + validator = env["auth.jwt.validator"].sudo()._get_validator_by_name(validator_name) + assert len(validator) == 1 + return validator + + +def _request_has_authentication( + request: Request, + authorization_credentials: Optional[HTTPAuthorizationCredentials], + validator: AuthJwtValidator, +) -> Union[Payload, None]: + if authorization_credentials is not None: + return True + if not validator.cookie_enabled: + # no Authorization header and cookies not enabled + return False + return request.cookies.get(validator.cookie_name) is not None + + +def _get_jwt_payload( + request: Request, + authorization_header: Optional[HTTPAuthorizationCredentials], + validator: AuthJwtValidator, +) -> Payload: + """Obtain and validate the JWT payload from the request authorization header or + cookie (if enabled on the validator).""" + if authorization_header is not None: + return validator._decode(authorization_header.credentials) + if not validator.cookie_enabled: + _logger.info("Missing or malformed authorization header.") + raise UnauthorizedMissingAuthorizationHeader() + assert validator.cookie_name + cookie_token = request.cookies.get(validator.cookie_name) + if not cookie_token: + _logger.info("Missing authorization cookie %s.", validator.cookie_name) + raise UnauthorizedMissingCookie() + return validator._decode(cookie_token, secret=validator._get_jwt_cookie_secret()) + + +def _get_jwt_payload_and_validator( + request: Request, + response: Response, + authorization_header: Optional[HTTPAuthorizationCredentials], + validator: AuthJwtValidator, +) -> Tuple[Payload, AuthJwtValidator]: + try: + payload = None + exceptions = {} + while validator: + try: + payload = _get_jwt_payload(request, authorization_header, validator) + break + except Unauthorized as e: + exceptions[validator.name] = e + validator = validator.next_validator_id + + if not payload: + if len(exceptions) == 1: + raise list(exceptions.values())[0] + raise UnauthorizedCompositeJwtError(exceptions) + + if validator.cookie_enabled: + if not validator.cookie_name: + _logger.info("Cookie name not set for validator %s", validator.name) + raise ConfigurationError() + response.set_cookie( + key=validator.cookie_name, + value=validator._encode( + payload, + secret=validator._get_jwt_cookie_secret(), + expire=validator.cookie_max_age, + ), + max_age=validator.cookie_max_age, + path=validator.cookie_path or "/", + secure=validator.cookie_secure, + httponly=True, + ) + + return payload, validator + except Unauthorized as e: + raise HTTPException(status_code=HTTP_401_UNAUTHORIZED) from e + + +def auth_jwt_default_validator_name() -> Union[str, None]: + return None + + +class BaseAuthJwt: # noqa: B903 + def __init__( + self, validator_name: Optional[str] = None, allow_unauthenticated: bool = False + ): + self.validator_name = validator_name + self.allow_unauthenticated = allow_unauthenticated + + +class AuthJwtPayload(BaseAuthJwt): + def __call__( + self, + request: Request, + response: Response, + authorization_header: Annotated[ + Optional[HTTPAuthorizationCredentials], + Depends(HTTPBearer(auto_error=False)), + ], + default_validator_name: Annotated[ + Union[str, None], + Depends(auth_jwt_default_validator_name), + ], + env: Annotated[ + Environment, + Depends(odoo_env), + ], + ) -> Optional[Payload]: + validator = _get_auth_jwt_validator( + self.validator_name or default_validator_name, env + ) + if self.allow_unauthenticated and not _request_has_authentication( + request, authorization_header, validator + ): + return None + return _get_jwt_payload_and_validator( + request, response, authorization_header, validator + )[0] + + +class AuthJwtPartner(BaseAuthJwt): + def __call__( + self, + request: Request, + response: Response, + authorization_header: Annotated[ + Optional[HTTPAuthorizationCredentials], + Depends(HTTPBearer(auto_error=False)), + ], + default_validator_name: Annotated[ + Union[str, None], + Depends(auth_jwt_default_validator_name), + ], + env: Annotated[ + Environment, + Depends(odoo_env), + ], + ) -> Partner: + validator = _get_auth_jwt_validator( + self.validator_name or default_validator_name, env + ) + if self.allow_unauthenticated and not _request_has_authentication( + request, authorization_header, validator + ): + return env["res.partner"].with_user(env.ref("base.public_user")).browse() + payload, validator = _get_jwt_payload_and_validator( + request, response, authorization_header, validator + ) + try: + uid = validator._get_and_check_uid(payload) + partner_id = validator._get_and_check_partner_id(payload) + except Unauthorized as e: + raise HTTPException(status_code=HTTP_401_UNAUTHORIZED) from e + if not partner_id: + _logger.info("Could not determine partner from JWT payload.") + raise HTTPException(status_code=HTTP_401_UNAUTHORIZED) + return env["res.partner"].with_user(uid).browse(partner_id) + + +class AuthJwtOdooEnv(BaseAuthJwt): + def __call__( + self, + request: Request, + response: Response, + authorization_header: Annotated[ + Optional[HTTPAuthorizationCredentials], + Depends(HTTPBearer(auto_error=False)), + ], + default_validator_name: Annotated[ + Union[str, None], + Depends(auth_jwt_default_validator_name), + ], + env: Annotated[ + Environment, + Depends(odoo_env), + ], + ) -> Environment: + validator = _get_auth_jwt_validator( + self.validator_name or default_validator_name, env + ) + payload, validator = _get_jwt_payload_and_validator( + request, response, authorization_header, validator + ) + uid = validator._get_and_check_uid(payload) + return odoo_env(user=uid) + + +auth_jwt_authenticated_payload = AuthJwtPayload() + +auth_jwt_optionally_authenticated_payload = AuthJwtPayload(allow_unauthenticated=True) + +auth_jwt_authenticated_partner = AuthJwtPartner() + +auth_jwt_optionally_authenticated_partner = AuthJwtPartner(allow_unauthenticated=True) + +auth_jwt_authenticated_odoo_env = AuthJwtOdooEnv() diff --git a/fastapi_auth_jwt/readme/DESCRIPTION.rst b/fastapi_auth_jwt/readme/DESCRIPTION.rst new file mode 100644 index 000000000..9359fdd13 --- /dev/null +++ b/fastapi_auth_jwt/readme/DESCRIPTION.rst @@ -0,0 +1,2 @@ +This module provides ``FastAPI`` ``Depends`` to allow authentication with `auth_jwt +`_. diff --git a/fastapi_auth_jwt/readme/USAGE.rst b/fastapi_auth_jwt/readme/USAGE.rst new file mode 100644 index 000000000..c28c66934 --- /dev/null +++ b/fastapi_auth_jwt/readme/USAGE.rst @@ -0,0 +1,48 @@ +The following FastAPI dependencies are provided and importable from +``odoo.addons.fastapi_auth_jwt.dependencies``: + +``def auth_jwt_authenticated_payload() -> Payload`` + + Return the authenticated JWT payload. Raise a 401 (unauthorized) if absent or invalid. + +``def auth_jwt_optionally_authenticated_payload() -> Payload | None`` + + Return the authenticated JWT payload, or ``None`` if the ``Authorization`` header and + cookie are absent. Raise a 401 (unauthorized) if present and invalid. + +``def auth_jwt_authenticated_partner() -> Partner`` + + Obtain the authenticated partner corresponding to the provided JWT token, according to + the partner strategy defined on the ``auth_jwt`` validator. Raise a 401 (unauthorized) + if the partner could not be determined for any reason. + + This is function suitable and intended to override + ``odoo.addons.fastapi.dependencies.authenticated_partner_impl``. + + The partner record returned by this function is bound to an environment that uses the + Odoo user obtained from the user strategy defined on the ``auth_jwt`` validator. When + used ``authenticated_partner_impl`` this in turn ensures that + ``odoo.addons.fastapi.dependencies.authenticated_partner_env`` is also bound to the + correct Odoo user. + +``def auth_jwt_optionally_authenticated_partner() -> Partner`` + + Same as ``auth_jwt_partner`` except it returns an empty recordset bound to the + ``public`` user if the ``Authorization`` header and cookie are absent, or if the JWT + validator could not find the partner and declares that the partner is not required. + +``def auth_jwt_authenticated_odoo_env() -> Environment`` + + Return an Odoo environment using the the Odoo user obtained from the user strategy + defined on the ``auth_jwt`` validator, if the request could be authenticated using a + JWT validator. Raise a 401 (unauthorized) otherwise. + + This is function suitable and intended to override + ``odoo.addons.fastapi.dependencies.authenticated_odoo_env_impl``. + +``def auth_jwt_default_validator_name() -> str | None`` + + Return the name of the default JWT validator to use. + + The default implementation returns ``None`` meaning only one active JWT validator is + allowed. This dependency is meant to be overridden. From a3684aa85ec042bf9af38e2831a2876ac1483970 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Bidoul?= Date: Fri, 23 Jun 2023 13:06:46 +0200 Subject: [PATCH 02/11] [IMP] fastapi_auth_jwt: improve logging --- fastapi_auth_jwt/dependencies.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/fastapi_auth_jwt/dependencies.py b/fastapi_auth_jwt/dependencies.py index 2490903d2..4e71f06bd 100644 --- a/fastapi_auth_jwt/dependencies.py +++ b/fastapi_auth_jwt/dependencies.py @@ -65,7 +65,10 @@ def _get_jwt_payload( assert validator.cookie_name cookie_token = request.cookies.get(validator.cookie_name) if not cookie_token: - _logger.info("Missing authorization cookie %s.", validator.cookie_name) + _logger.info( + "Missing or malformed authorization header, and %s cookie not present.", + validator.cookie_name, + ) raise UnauthorizedMissingCookie() return validator._decode(cookie_token, secret=validator._get_jwt_cookie_secret()) From 5d9b7a1af6f7e49fad588336c1a1bcecf61f8434 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Bidoul?= Date: Fri, 23 Jun 2023 17:00:15 +0200 Subject: [PATCH 03/11] [IMP] fastapi_auth_jwt: allow overriding bearer token --- fastapi_auth_jwt/dependencies.py | 33 ++++++++++++++++++++----------- fastapi_auth_jwt/readme/USAGE.rst | 8 ++++++++ 2 files changed, 30 insertions(+), 11 deletions(-) diff --git a/fastapi_auth_jwt/dependencies.py b/fastapi_auth_jwt/dependencies.py index 4e71f06bd..21490da1c 100644 --- a/fastapi_auth_jwt/dependencies.py +++ b/fastapi_auth_jwt/dependencies.py @@ -39,10 +39,10 @@ def _get_auth_jwt_validator( def _request_has_authentication( request: Request, - authorization_credentials: Optional[HTTPAuthorizationCredentials], + authorization_header: Optional[str], validator: AuthJwtValidator, ) -> Union[Payload, None]: - if authorization_credentials is not None: + if authorization_header is not None: return True if not validator.cookie_enabled: # no Authorization header and cookies not enabled @@ -52,13 +52,13 @@ def _request_has_authentication( def _get_jwt_payload( request: Request, - authorization_header: Optional[HTTPAuthorizationCredentials], + authorization_header: Optional[str], validator: AuthJwtValidator, ) -> Payload: """Obtain and validate the JWT payload from the request authorization header or cookie (if enabled on the validator).""" if authorization_header is not None: - return validator._decode(authorization_header.credentials) + return validator._decode(authorization_header) if not validator.cookie_enabled: _logger.info("Missing or malformed authorization header.") raise UnauthorizedMissingAuthorizationHeader() @@ -76,7 +76,7 @@ def _get_jwt_payload( def _get_jwt_payload_and_validator( request: Request, response: Response, - authorization_header: Optional[HTTPAuthorizationCredentials], + authorization_header: Optional[str], validator: AuthJwtValidator, ) -> Tuple[Payload, AuthJwtValidator]: try: @@ -121,6 +121,17 @@ def auth_jwt_default_validator_name() -> Union[str, None]: return None +def auth_jwt_http_header_authorization( + credentials: Annotated[ + Optional[HTTPAuthorizationCredentials], + Depends(HTTPBearer(auto_error=False)), + ] +): + if credentials is None: + return None + return credentials.credentials + + class BaseAuthJwt: # noqa: B903 def __init__( self, validator_name: Optional[str] = None, allow_unauthenticated: bool = False @@ -135,8 +146,8 @@ def __call__( request: Request, response: Response, authorization_header: Annotated[ - Optional[HTTPAuthorizationCredentials], - Depends(HTTPBearer(auto_error=False)), + Optional[str], + Depends(auth_jwt_http_header_authorization), ], default_validator_name: Annotated[ Union[str, None], @@ -165,8 +176,8 @@ def __call__( request: Request, response: Response, authorization_header: Annotated[ - Optional[HTTPAuthorizationCredentials], - Depends(HTTPBearer(auto_error=False)), + Optional[str], + Depends(auth_jwt_http_header_authorization), ], default_validator_name: Annotated[ Union[str, None], @@ -204,8 +215,8 @@ def __call__( request: Request, response: Response, authorization_header: Annotated[ - Optional[HTTPAuthorizationCredentials], - Depends(HTTPBearer(auto_error=False)), + Optional[str], + Depends(auth_jwt_http_header_authorization), ], default_validator_name: Annotated[ Union[str, None], diff --git a/fastapi_auth_jwt/readme/USAGE.rst b/fastapi_auth_jwt/readme/USAGE.rst index c28c66934..34198d2a7 100644 --- a/fastapi_auth_jwt/readme/USAGE.rst +++ b/fastapi_auth_jwt/readme/USAGE.rst @@ -46,3 +46,11 @@ The following FastAPI dependencies are provided and importable from The default implementation returns ``None`` meaning only one active JWT validator is allowed. This dependency is meant to be overridden. + +``def auth_jwt_http_header_authorization() -> str | None`` + + By default, return the credentials part of the ``Authorization`` header, or ``None`` + if absent. This dependency is meant to be overridden, in particular with + ``fastapi.security.OAuth2AuthorizationCodeBearer`` to let swagger handle OAuth2 + authorization (such override is only necessary for comfort when using the swagger + interface). From 596386eeecb3be60160f030155a1393a0a682073 Mon Sep 17 00:00:00 2001 From: oca-ci Date: Mon, 26 Jun 2023 16:35:44 +0000 Subject: [PATCH 04/11] [UPD] Update fastapi_auth_jwt.pot --- fastapi_auth_jwt/i18n/fastapi_auth_jwt.pot | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 fastapi_auth_jwt/i18n/fastapi_auth_jwt.pot diff --git a/fastapi_auth_jwt/i18n/fastapi_auth_jwt.pot b/fastapi_auth_jwt/i18n/fastapi_auth_jwt.pot new file mode 100644 index 000000000..78d58d53f --- /dev/null +++ b/fastapi_auth_jwt/i18n/fastapi_auth_jwt.pot @@ -0,0 +1,13 @@ +# Translation of Odoo Server. +# This file contains the translation of the following modules: +# +msgid "" +msgstr "" +"Project-Id-Version: Odoo Server 16.0\n" +"Report-Msgid-Bugs-To: \n" +"Last-Translator: \n" +"Language-Team: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: \n" +"Plural-Forms: \n" From 16ef3e7bf9b4cc447530db3a54ee8da08124eca6 Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Mon, 26 Jun 2023 16:38:51 +0000 Subject: [PATCH 05/11] [UPD] README.rst --- fastapi_auth_jwt/README.rst | 137 +++++ .../static/description/index.html | 466 ++++++++++++++++++ 2 files changed, 603 insertions(+) create mode 100644 fastapi_auth_jwt/static/description/index.html diff --git a/fastapi_auth_jwt/README.rst b/fastapi_auth_jwt/README.rst index e69de29bb..fdb175315 100644 --- a/fastapi_auth_jwt/README.rst +++ b/fastapi_auth_jwt/README.rst @@ -0,0 +1,137 @@ +======================== +FastAPI Auth JWT support +======================== + +.. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! This file is generated by oca-gen-addon-readme !! + !! changes will be overwritten. !! + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + +.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png + :target: https://odoo-community.org/page/development-status + :alt: Beta +.. |badge2| image:: https://img.shields.io/badge/licence-LGPL--3-blue.png + :target: http://www.gnu.org/licenses/lgpl-3.0-standalone.html + :alt: License: LGPL-3 +.. |badge3| image:: https://img.shields.io/badge/github-OCA%2Frest--framework-lightgray.png?logo=github + :target: https://github.com/OCA/rest-framework/tree/16.0/fastapi_auth_jwt + :alt: OCA/rest-framework +.. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png + :target: https://translation.odoo-community.org/projects/rest-framework-16-0/rest-framework-16-0-fastapi_auth_jwt + :alt: Translate me on Weblate +.. |badge5| image:: https://img.shields.io/badge/runbot-Try%20me-875A7B.png + :target: https://runbot.odoo-community.org/runbot/271/16.0 + :alt: Try me on Runbot + +|badge1| |badge2| |badge3| |badge4| |badge5| + +This module provides ``FastAPI`` ``Depends`` to allow authentication with `auth_jwt +`_. + +**Table of contents** + +.. contents:: + :local: + +Usage +===== + +The following FastAPI dependencies are provided and importable from +``odoo.addons.fastapi_auth_jwt.dependencies``: + +``def auth_jwt_authenticated_payload() -> Payload`` + + Return the authenticated JWT payload. Raise a 401 (unauthorized) if absent or invalid. + +``def auth_jwt_optionally_authenticated_payload() -> Payload | None`` + + Return the authenticated JWT payload, or ``None`` if the ``Authorization`` header and + cookie are absent. Raise a 401 (unauthorized) if present and invalid. + +``def auth_jwt_authenticated_partner() -> Partner`` + + Obtain the authenticated partner corresponding to the provided JWT token, according to + the partner strategy defined on the ``auth_jwt`` validator. Raise a 401 (unauthorized) + if the partner could not be determined for any reason. + + This is function suitable and intended to override + ``odoo.addons.fastapi.dependencies.authenticated_partner_impl``. + + The partner record returned by this function is bound to an environment that uses the + Odoo user obtained from the user strategy defined on the ``auth_jwt`` validator. When + used ``authenticated_partner_impl`` this in turn ensures that + ``odoo.addons.fastapi.dependencies.authenticated_partner_env`` is also bound to the + correct Odoo user. + +``def auth_jwt_optionally_authenticated_partner() -> Partner`` + + Same as ``auth_jwt_partner`` except it returns an empty recordset bound to the + ``public`` user if the ``Authorization`` header and cookie are absent, or if the JWT + validator could not find the partner and declares that the partner is not required. + +``def auth_jwt_authenticated_odoo_env() -> Environment`` + + Return an Odoo environment using the the Odoo user obtained from the user strategy + defined on the ``auth_jwt`` validator, if the request could be authenticated using a + JWT validator. Raise a 401 (unauthorized) otherwise. + + This is function suitable and intended to override + ``odoo.addons.fastapi.dependencies.authenticated_odoo_env_impl``. + +``def auth_jwt_default_validator_name() -> str | None`` + + Return the name of the default JWT validator to use. + + The default implementation returns ``None`` meaning only one active JWT validator is + allowed. This dependency is meant to be overridden. + +``def auth_jwt_http_header_authorization() -> str | None`` + + By default, return the credentials part of the ``Authorization`` header, or ``None`` + if absent. This dependency is meant to be overridden, in particular with + ``fastapi.security.OAuth2AuthorizationCodeBearer`` to let swagger handle OAuth2 + authorization (such override is only necessary for comfort when using the swagger + interface). + +Bug Tracker +=========== + +Bugs are tracked on `GitHub Issues `_. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us smashing it by providing a detailed and welcomed +`feedback `_. + +Do not contact contributors directly about support or help with technical issues. + +Credits +======= + +Authors +~~~~~~~ + +* ACSONE SA/NV + +Maintainers +~~~~~~~~~~~ + +This module is maintained by the OCA. + +.. image:: https://odoo-community.org/logo.png + :alt: Odoo Community Association + :target: https://odoo-community.org + +OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use. + +.. |maintainer-sbidoul| image:: https://github.com/sbidoul.png?size=40px + :target: https://github.com/sbidoul + :alt: sbidoul + +Current `maintainer `__: + +|maintainer-sbidoul| + +This module is part of the `OCA/rest-framework `_ project on GitHub. + +You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute. diff --git a/fastapi_auth_jwt/static/description/index.html b/fastapi_auth_jwt/static/description/index.html new file mode 100644 index 000000000..aae95e371 --- /dev/null +++ b/fastapi_auth_jwt/static/description/index.html @@ -0,0 +1,466 @@ + + + + + + +FastAPI Auth JWT support + + + +
+

FastAPI Auth JWT support

+ + +

Beta License: LGPL-3 OCA/rest-framework Translate me on Weblate Try me on Runbot

+

This module provides FastAPI Depends to allow authentication with auth_jwt.

+

Table of contents

+ +
+

Usage

+

The following FastAPI dependencies are provided and importable from +odoo.addons.fastapi_auth_jwt.dependencies:

+

def auth_jwt_authenticated_payload() -> Payload

+
+Return the authenticated JWT payload. Raise a 401 (unauthorized) if absent or invalid.
+

def auth_jwt_optionally_authenticated_payload() -> Payload | None

+
+Return the authenticated JWT payload, or None if the Authorization header and +cookie are absent. Raise a 401 (unauthorized) if present and invalid.
+

def auth_jwt_authenticated_partner() -> Partner

+
+

Obtain the authenticated partner corresponding to the provided JWT token, according to +the partner strategy defined on the auth_jwt validator. Raise a 401 (unauthorized) +if the partner could not be determined for any reason.

+

This is function suitable and intended to override +odoo.addons.fastapi.dependencies.authenticated_partner_impl.

+

The partner record returned by this function is bound to an environment that uses the +Odoo user obtained from the user strategy defined on the auth_jwt validator. When +used authenticated_partner_impl this in turn ensures that +odoo.addons.fastapi.dependencies.authenticated_partner_env is also bound to the +correct Odoo user.

+
+

def auth_jwt_optionally_authenticated_partner() -> Partner

+
+Same as auth_jwt_partner except it returns an empty recordset bound to the +public user if the Authorization header and cookie are absent, or if the JWT +validator could not find the partner and declares that the partner is not required.
+

def auth_jwt_authenticated_odoo_env() -> Environment

+
+

Return an Odoo environment using the the Odoo user obtained from the user strategy +defined on the auth_jwt validator, if the request could be authenticated using a +JWT validator. Raise a 401 (unauthorized) otherwise.

+

This is function suitable and intended to override +odoo.addons.fastapi.dependencies.authenticated_odoo_env_impl.

+
+

def auth_jwt_default_validator_name() -> str | None

+
+

Return the name of the default JWT validator to use.

+

The default implementation returns None meaning only one active JWT validator is +allowed. This dependency is meant to be overridden.

+
+

def auth_jwt_http_header_authorization() -> str | None

+
+By default, return the credentials part of the Authorization header, or None +if absent. This dependency is meant to be overridden, in particular with +fastapi.security.OAuth2AuthorizationCodeBearer to let swagger handle OAuth2 +authorization (such override is only necessary for comfort when using the swagger +interface).
+
+
+

Bug Tracker

+

Bugs are tracked on GitHub Issues. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us smashing it by providing a detailed and welcomed +feedback.

+

Do not contact contributors directly about support or help with technical issues.

+
+
+

Credits

+
+

Authors

+
    +
  • ACSONE SA/NV
  • +
+
+
+

Maintainers

+

This module is maintained by the OCA.

+Odoo Community Association +

OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use.

+

Current maintainer:

+

sbidoul

+

This module is part of the OCA/rest-framework project on GitHub.

+

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.

+
+
+
+ + From 234775556d5bc276dbb81bbff3eb2f74e83e0df6 Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Mon, 26 Jun 2023 16:38:51 +0000 Subject: [PATCH 06/11] [ADD] icon.png --- fastapi_auth_jwt/static/description/icon.png | Bin 0 -> 9455 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 fastapi_auth_jwt/static/description/icon.png diff --git a/fastapi_auth_jwt/static/description/icon.png b/fastapi_auth_jwt/static/description/icon.png new file mode 100644 index 0000000000000000000000000000000000000000..3a0328b516c4980e8e44cdb63fd945757ddd132d GIT binary patch literal 9455 zcmW++2RxMjAAjx~&dlBk9S+%}OXg)AGE&Cb*&}d0jUxM@u(PQx^-s)697TX`ehR4?GS^qbkof1cslKgkU)h65qZ9Oc=ml_0temigYLJfnz{IDzUf>bGs4N!v3=Z3jMq&A#7%rM5eQ#dc?k~! zVpnB`o+K7|Al`Q_U;eD$B zfJtP*jH`siUq~{KE)`jP2|#TUEFGRryE2`i0**z#*^6~AI|YzIWy$Cu#CSLW3q=GA z6`?GZymC;dCPk~rBS%eCb`5OLr;RUZ;D`}um=H)BfVIq%7VhiMr)_#G0N#zrNH|__ zc+blN2UAB0=617@>_u;MPHN;P;N#YoE=)R#i$k_`UAA>WWCcEVMh~L_ zj--gtp&|K1#58Yz*AHCTMziU1Jzt_jG0I@qAOHsk$2}yTmVkBp_eHuY$A9)>P6o~I z%aQ?!(GqeQ-Y+b0I(m9pwgi(IIZZzsbMv+9w{PFtd_<_(LA~0H(xz{=FhLB@(1&qHA5EJw1>>=%q2f&^X>IQ{!GJ4e9U z&KlB)z(84HmNgm2hg2C0>WM{E(DdPr+EeU_N@57;PC2&DmGFW_9kP&%?X4}+xWi)( z;)z%wI5>D4a*5XwD)P--sPkoY(a~WBw;E~AW`Yue4kFa^LM3X`8x|}ZUeMnqr}>kH zG%WWW>3ml$Yez?i%)2pbKPI7?5o?hydokgQyZsNEr{a|mLdt;X2TX(#B1j35xPnPW z*bMSSOauW>o;*=kO8ojw91VX!qoOQb)zHJ!odWB}d+*K?#sY_jqPdg{Sm2HdYzdEx zOGVPhVRTGPtv0o}RfVP;Nd(|CB)I;*t&QO8h zFfekr30S!-LHmV_Su-W+rEwYXJ^;6&3|L$mMC8*bQptyOo9;>Qb9Q9`ySe3%V$A*9 zeKEe+b0{#KWGp$F+tga)0RtI)nhMa-K@JS}2krK~n8vJ=Ngm?R!9G<~RyuU0d?nz# z-5EK$o(!F?hmX*2Yt6+coY`6jGbb7tF#6nHA zuKk=GGJ;ZwON1iAfG$E#Y7MnZVmrY|j0eVI(DN_MNFJmyZ|;w4tf@=CCDZ#5N_0K= z$;R~bbk?}TpfDjfB&aiQ$VA}s?P}xPERJG{kxk5~R`iRS(SK5d+Xs9swCozZISbnS zk!)I0>t=A<-^z(cmSFz3=jZ23u13X><0b)P)^1T_))Kr`e!-pb#q&J*Q`p+B6la%C zuVl&0duN<;uOsB3%T9Fp8t{ED108<+W(nOZd?gDnfNBC3>M8WE61$So|P zVvqH0SNtDTcsUdzaMDpT=Ty0pDHHNL@Z0w$Y`XO z2M-_r1S+GaH%pz#Uy0*w$Vdl=X=rQXEzO}d6J^R6zjM1u&c9vYLvLp?W7w(?np9x1 zE_0JSAJCPB%i7p*Wvg)pn5T`8k3-uR?*NT|J`eS#_#54p>!p(mLDvmc-3o0mX*mp_ zN*AeS<>#^-{S%W<*mz^!X$w_2dHWpcJ6^j64qFBft-o}o_Vx80o0>}Du;>kLts;$8 zC`7q$QI(dKYG`Wa8#wl@V4jVWBRGQ@1dr-hstpQL)Tl+aqVpGpbSfN>5i&QMXfiZ> zaA?T1VGe?rpQ@;+pkrVdd{klI&jVS@I5_iz!=UMpTsa~mBga?1r}aRBm1WS;TT*s0f0lY=JBl66Upy)-k4J}lh=P^8(SXk~0xW=T9v*B|gzIhN z>qsO7dFd~mgxAy4V?&)=5ieYq?zi?ZEoj)&2o)RLy=@hbCRcfT5jigwtQGE{L*8<@Yd{zg;CsL5mvzfDY}P-wos_6PfprFVaeqNE%h zKZhLtcQld;ZD+>=nqN~>GvROfueSzJD&BE*}XfU|H&(FssBqY=hPCt`d zH?@s2>I(|;fcW&YM6#V#!kUIP8$Nkdh0A(bEVj``-AAyYgwY~jB zT|I7Bf@%;7aL7Wf4dZ%VqF$eiaC38OV6oy3Z#TER2G+fOCd9Iaoy6aLYbPTN{XRPz z;U!V|vBf%H!}52L2gH_+j;`bTcQRXB+y9onc^wLm5wi3-Be}U>k_u>2Eg$=k!(l@I zcCg+flakT2Nej3i0yn+g+}%NYb?ta;R?(g5SnwsQ49U8Wng8d|{B+lyRcEDvR3+`O{zfmrmvFrL6acVP%yG98X zo&+VBg@px@i)%o?dG(`T;n*$S5*rnyiR#=wW}}GsAcfyQpE|>a{=$Hjg=-*_K;UtD z#z-)AXwSRY?OPefw^iI+ z)AXz#PfEjlwTes|_{sB?4(O@fg0AJ^g8gP}ex9Ucf*@_^J(s_5jJV}c)s$`Myn|Kd z$6>}#q^n{4vN@+Os$m7KV+`}c%4)4pv@06af4-x5#wj!KKb%caK{A&Y#Rfs z-po?Dcb1({W=6FKIUirH&(yg=*6aLCekcKwyfK^JN5{wcA3nhO(o}SK#!CINhI`-I z1)6&n7O&ZmyFMuNwvEic#IiOAwNkR=u5it{B9n2sAJV5pNhar=j5`*N!Na;c7g!l$ z3aYBqUkqqTJ=Re-;)s!EOeij=7SQZ3Hq}ZRds%IM*PtM$wV z@;rlc*NRK7i3y5BETSKuumEN`Xu_8GP1Ri=OKQ$@I^ko8>H6)4rjiG5{VBM>B|%`&&s^)jS|-_95&yc=GqjNo{zFkw%%HHhS~e=s zD#sfS+-?*t|J!+ozP6KvtOl!R)@@-z24}`9{QaVLD^9VCSR2b`b!KC#o;Ki<+wXB6 zx3&O0LOWcg4&rv4QG0)4yb}7BFSEg~=IR5#ZRj8kg}dS7_V&^%#Do==#`u zpy6{ox?jWuR(;pg+f@mT>#HGWHAJRRDDDv~@(IDw&R>9643kK#HN`!1vBJHnC+RM&yIh8{gG2q zA%e*U3|N0XSRa~oX-3EAneep)@{h2vvd3Xvy$7og(sayr@95+e6~Xvi1tUqnIxoIH zVWo*OwYElb#uyW{Imam6f2rGbjR!Y3`#gPqkv57dB6K^wRGxc9B(t|aYDGS=m$&S!NmCtrMMaUg(c zc2qC=2Z`EEFMW-me5B)24AqF*bV5Dr-M5ig(l-WPS%CgaPzs6p_gnCIvTJ=Y<6!gT zVt@AfYCzjjsMEGi=rDQHo0yc;HqoRNnNFeWZgcm?f;cp(6CNylj36DoL(?TS7eU#+ z7&mfr#y))+CJOXQKUMZ7QIdS9@#-}7y2K1{8)cCt0~-X0O!O?Qx#E4Og+;A2SjalQ zs7r?qn0H044=sDN$SRG$arw~n=+T_DNdSrarmu)V6@|?1-ZB#hRn`uilTGPJ@fqEy zGt(f0B+^JDP&f=r{#Y_wi#AVDf-y!RIXU^0jXsFpf>=Ji*TeqSY!H~AMbJdCGLhC) zn7Rx+sXw6uYj;WRYrLd^5IZq@6JI1C^YkgnedZEYy<&4(z%Q$5yv#Boo{AH8n$a zhb4Y3PWdr269&?V%uI$xMcUrMzl=;w<_nm*qr=c3Rl@i5wWB;e-`t7D&c-mcQl7x! zZWB`UGcw=Y2=}~wzrfLx=uet<;m3~=8I~ZRuzvMQUQdr+yTV|ATf1Uuomr__nDf=X zZ3WYJtHp_ri(}SQAPjv+Y+0=fH4krOP@S&=zZ-t1jW1o@}z;xk8 z(Nz1co&El^HK^NrhVHa-_;&88vTU>_J33=%{if;BEY*J#1n59=07jrGQ#IP>@u#3A z;!q+E1Rj3ZJ+!4bq9F8PXJ@yMgZL;>&gYA0%_Kbi8?S=XGM~dnQZQ!yBSgcZhY96H zrWnU;k)qy`rX&&xlDyA%(a1Hhi5CWkmg(`Gb%m(HKi-7Z!LKGRP_B8@`7&hdDy5n= z`OIxqxiVfX@OX1p(mQu>0Ai*v_cTMiw4qRt3~NBvr9oBy0)r>w3p~V0SCm=An6@3n)>@z!|o-$HvDK z|3D2ZMJkLE5loMKl6R^ez@Zz%S$&mbeoqH5`Bb){Ei21q&VP)hWS2tjShfFtGE+$z zzCR$P#uktu+#!w)cX!lWN1XU%K-r=s{|j?)Akf@q#3b#{6cZCuJ~gCxuMXRmI$nGtnH+-h z+GEi!*X=AP<|fG`1>MBdTb?28JYc=fGvAi2I<$B(rs$;eoJCyR6_bc~p!XR@O-+sD z=eH`-ye})I5ic1eL~TDmtfJ|8`0VJ*Yr=hNCd)G1p2MMz4C3^Mj?7;!w|Ly%JqmuW zlIEW^Ft%z?*|fpXda>Jr^1noFZEwFgVV%|*XhH@acv8rdGxeEX{M$(vG{Zw+x(ei@ zmfXb22}8-?Fi`vo-YVrTH*C?a8%M=Hv9MqVH7H^J$KsD?>!SFZ;ZsvnHr_gn=7acz z#W?0eCdVhVMWN12VV^$>WlQ?f;P^{(&pYTops|btm6aj>_Uz+hqpGwB)vWp0Cf5y< zft8-je~nn?W11plq}N)4A{l8I7$!ks_x$PXW-2XaRFswX_BnF{R#6YIwMhAgd5F9X zGmwdadS6(a^fjHtXg8=l?Rc0Sm%hk6E9!5cLVloEy4eh(=FwgP`)~I^5~pBEWo+F6 zSf2ncyMurJN91#cJTy_u8Y}@%!bq1RkGC~-bV@SXRd4F{R-*V`bS+6;W5vZ(&+I<9$;-V|eNfLa5n-6% z2(}&uGRF;p92eS*sE*oR$@pexaqr*meB)VhmIg@h{uzkk$9~qh#cHhw#>O%)b@+(| z^IQgqzuj~Sk(J;swEM-3TrJAPCq9k^^^`q{IItKBRXYe}e0Tdr=Huf7da3$l4PdpwWDop%^}n;dD#K4s#DYA8SHZ z&1!riV4W4R7R#C))JH1~axJ)RYnM$$lIR%6fIVA@zV{XVyx}C+a-Dt8Y9M)^KU0+H zR4IUb2CJ{Hg>CuaXtD50jB(_Tcx=Z$^WYu2u5kubqmwp%drJ6 z?Fo40g!Qd<-l=TQxqHEOuPX0;^z7iX?Ke^a%XT<13TA^5`4Xcw6D@Ur&VT&CUe0d} z1GjOVF1^L@>O)l@?bD~$wzgf(nxX1OGD8fEV?TdJcZc2KoUe|oP1#=$$7ee|xbY)A zDZq+cuTpc(fFdj^=!;{k03C69lMQ(|>uhRfRu%+!k&YOi-3|1QKB z z?n?eq1XP>p-IM$Z^C;2L3itnbJZAip*Zo0aw2bs8@(s^~*8T9go!%dHcAz2lM;`yp zD=7&xjFV$S&5uDaiScyD?B-i1ze`+CoRtz`Wn+Zl&#s4&}MO{@N!ufrzjG$B79)Y2d3tBk&)TxUTw@QS0TEL_?njX|@vq?Uz(nBFK5Pq7*xj#u*R&i|?7+6# z+|r_n#SW&LXhtheZdah{ZVoqwyT{D>MC3nkFF#N)xLi{p7J1jXlmVeb;cP5?e(=f# zuT7fvjSbjS781v?7{)-X3*?>tq?)Yd)~|1{BDS(pqC zC}~H#WXlkUW*H5CDOo<)#x7%RY)A;ShGhI5s*#cRDA8YgqG(HeKDx+#(ZQ?386dv! zlXCO)w91~Vw4AmOcATuV653fa9R$fyK8ul%rG z-wfS zihugoZyr38Im?Zuh6@RcF~t1anQu7>#lPpb#}4cOA!EM11`%f*07RqOVkmX{p~KJ9 z^zP;K#|)$`^Rb{rnHGH{~>1(fawV0*Z#)}M`m8-?ZJV<+e}s9wE# z)l&az?w^5{)`S(%MRzxdNqrs1n*-=jS^_jqE*5XDrA0+VE`5^*p3CuM<&dZEeCjoz zR;uu_H9ZPZV|fQq`Cyw4nscrVwi!fE6ciMmX$!_hN7uF;jjKG)d2@aC4ropY)8etW=xJvni)8eHi`H$%#zn^WJ5NLc-rqk|u&&4Z6fD_m&JfSI1Bvb?b<*n&sfl0^t z=HnmRl`XrFvMKB%9}>PaA`m-fK6a0(8=qPkWS5bb4=v?XcWi&hRY?O5HdulRi4?fN zlsJ*N-0Qw+Yic@s0(2uy%F@ib;GjXt01Fmx5XbRo6+n|pP(&nodMoap^z{~q ziEeaUT@Mxe3vJSfI6?uLND(CNr=#^W<1b}jzW58bIfyWTDle$mmS(|x-0|2UlX+9k zQ^EX7Nw}?EzVoBfT(-LT|=9N@^hcn-_p&sqG z&*oVs2JSU+N4ZD`FhCAWaS;>|wH2G*Id|?pa#@>tyxX`+4HyIArWDvVrX)2WAOQff z0qyHu&-S@i^MS-+j--!pr4fPBj~_8({~e1bfcl0wI1kaoN>mJL6KUPQm5N7lB(ui1 zE-o%kq)&djzWJ}ob<-GfDlkB;F31j-VHKvQUGQ3sp`CwyGJk_i!y^sD0fqC@$9|jO zOqN!r!8-p==F@ZVP=U$qSpY(gQ0)59P1&t@y?5rvg<}E+GB}26NYPp4f2YFQrQtot5mn3wu_qprZ=>Ig-$ zbW26Ws~IgY>}^5w`vTB(G`PTZaDiGBo5o(tp)qli|NeV( z@H_=R8V39rt5J5YB2Ky?4eJJ#b`_iBe2ot~6%7mLt5t8Vwi^Jy7|jWXqa3amOIoRb zOr}WVFP--DsS`1WpN%~)t3R!arKF^Q$e12KEqU36AWwnCBICpH4XCsfnyrHr>$I$4 z!DpKX$OKLWarN7nv@!uIA+~RNO)l$$w}p(;b>mx8pwYvu;dD_unryX_NhT8*Tj>BTrTTL&!?O+%Rv;b?B??gSzdp?6Uug9{ zd@V08Z$BdI?fpoCS$)t4mg4rT8Q_I}h`0d-vYZ^|dOB*Q^S|xqTV*vIg?@fVFSmMpaw0qtTRbx} z({Pg?#{2`sc9)M5N$*N|4;^t$+QP?#mov zGVC@I*lBVrOU-%2y!7%)fAKjpEFsgQc4{amtiHb95KQEwvf<(3T<9-Zm$xIew#P22 zc2Ix|App^>v6(3L_MCU0d3W##AB0M~3D00EWoKZqsJYT(#@w$Y_H7G22M~ApVFTRHMI_3be)Lkn#0F*V8Pq zc}`Cjy$bE;FJ6H7p=0y#R>`}-m4(0F>%@P|?7fx{=R^uFdISRnZ2W_xQhD{YuR3t< z{6yxu=4~JkeA;|(J6_nv#>Nvs&FuLA&PW^he@t(UwFFE8)|a!R{`E`K`i^ZnyE4$k z;(749Ix|oi$c3QbEJ3b~D_kQsPz~fIUKym($a_7dJ?o+40*OLl^{=&oq$<#Q(yyrp z{J-FAniyAw9tPbe&IhQ|a`DqFTVQGQ&Gq3!C2==4x{6EJwiPZ8zub-iXoUtkJiG{} zPaR&}_fn8_z~(=;5lD-aPWD3z8PZS@AaUiomF!G8I}Mf>e~0g#BelA-5#`cj;O5>N Xviia!U7SGha1wx#SCgwmn*{w2TRX*I literal 0 HcmV?d00001 From 3a37f9307238034acae1c06b675e627be9d9f7dc Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Mon, 26 Jun 2023 16:38:51 +0000 Subject: [PATCH 07/11] fastapi_auth_jwt 16.0.1.0.1 --- fastapi_auth_jwt/__manifest__.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fastapi_auth_jwt/__manifest__.py b/fastapi_auth_jwt/__manifest__.py index b7d81bfa7..2743ad50f 100644 --- a/fastapi_auth_jwt/__manifest__.py +++ b/fastapi_auth_jwt/__manifest__.py @@ -5,7 +5,7 @@ "name": "FastAPI Auth JWT support", "summary": """ JWT bearer token authentication for FastAPI.""", - "version": "16.0.1.0.0", + "version": "16.0.1.0.1", "license": "LGPL-3", "author": "ACSONE SA/NV,Odoo Community Association (OCA)", "maintainers": ["sbidoul"], From 6203767e2826b31b71fbe4eeac33d90032cb9b0a Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Sun, 3 Sep 2023 10:27:12 +0000 Subject: [PATCH 08/11] [UPD] README.rst --- fastapi_auth_jwt/README.rst | 15 ++++---- .../static/description/index.html | 36 ++++++++++--------- 2 files changed, 28 insertions(+), 23 deletions(-) diff --git a/fastapi_auth_jwt/README.rst b/fastapi_auth_jwt/README.rst index fdb175315..f7ab4df88 100644 --- a/fastapi_auth_jwt/README.rst +++ b/fastapi_auth_jwt/README.rst @@ -2,10 +2,13 @@ FastAPI Auth JWT support ======================== -.. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! +.. + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !! This file is generated by oca-gen-addon-readme !! !! changes will be overwritten. !! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! source digest: sha256:2829a34d48a1906819029e7b796d33a1ee2ad2a47693396da96f92ede04ec17d + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! .. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png :target: https://odoo-community.org/page/development-status @@ -19,11 +22,11 @@ FastAPI Auth JWT support .. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png :target: https://translation.odoo-community.org/projects/rest-framework-16-0/rest-framework-16-0-fastapi_auth_jwt :alt: Translate me on Weblate -.. |badge5| image:: https://img.shields.io/badge/runbot-Try%20me-875A7B.png - :target: https://runbot.odoo-community.org/runbot/271/16.0 - :alt: Try me on Runbot +.. |badge5| image:: https://img.shields.io/badge/runboat-Try%20me-875A7B.png + :target: https://runboat.odoo-community.org/builds?repo=OCA/rest-framework&target_branch=16.0 + :alt: Try me on Runboat -|badge1| |badge2| |badge3| |badge4| |badge5| +|badge1| |badge2| |badge3| |badge4| |badge5| This module provides ``FastAPI`` ``Depends`` to allow authentication with `auth_jwt `_. @@ -98,7 +101,7 @@ Bug Tracker Bugs are tracked on `GitHub Issues `_. In case of trouble, please check there if your issue has already been reported. -If you spotted it first, help us smashing it by providing a detailed and welcomed +If you spotted it first, help us to smash it by providing a detailed and welcomed `feedback `_. Do not contact contributors directly about support or help with technical issues. diff --git a/fastapi_auth_jwt/static/description/index.html b/fastapi_auth_jwt/static/description/index.html index aae95e371..221790628 100644 --- a/fastapi_auth_jwt/static/description/index.html +++ b/fastapi_auth_jwt/static/description/index.html @@ -1,20 +1,20 @@ - + - + FastAPI Auth JWT support