Skip to content

Commit a453cdf

Browse files
authored
Merge pull request #193 from authzed/89-manual-credential-setup
Add Insecure Client for Convenience
2 parents 9580864 + e667577 commit a453cdf

11 files changed

+203
-67
lines changed

.github/workflows/test.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141
- name: "Pytest"
4242
run: |
4343
source ~/.cache/virtualenv/authzedpy/bin/activate
44-
pytest -vv .
44+
pytest -vv
4545
4646
protobuf:
4747
name: "Generate & Diff Protobuf"

README.md

+18
Original file line numberDiff line numberDiff line change
@@ -97,3 +97,21 @@ resp = client.CheckPermission(CheckPermissionRequest(
9797
))
9898
assert resp.permissionship == CheckPermissionResponse.PERMISSIONSHIP_HAS_PERMISSION
9999
```
100+
101+
### Insecure Client Usage
102+
When running in a context like `docker compose`, because of Docker's virtual networking,
103+
the gRPC client sees the SpiceDB container as "remote." It has built-in safeguards to prevent
104+
calling a remote client in an insecure manner, such as using client credentials without TLS.
105+
106+
However, this is a pain when setting up a development or testing environment, so we provide
107+
the `InsecureClient` as a convenience:
108+
109+
```py
110+
from authzed.api.v1 import Client
111+
from grpcutil import bearer_token_credentials
112+
113+
client = Client(
114+
"spicedb:50051",
115+
"my super secret token"
116+
)
117+
```

authzed/api/v1/__init__.py

+70-19
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
import asyncio
2+
from typing import Any, Callable
23

34
import grpc
45
import grpc.aio
6+
from grpc_interceptor import ClientCallDetails, ClientInterceptor
57

68
from authzed.api.v1.core_pb2 import (
79
AlgebraicSubjectSet,
@@ -70,47 +72,95 @@ class Client(SchemaServiceStub, PermissionsServiceStub, ExperimentalServiceStub,
7072
"""
7173

7274
def __init__(self, target, credentials, options=None, compression=None):
75+
channel = self.create_channel(target, credentials, options, compression)
76+
self.init_stubs(channel)
77+
78+
def init_stubs(self, channel):
79+
SchemaServiceStub.__init__(self, channel)
80+
PermissionsServiceStub.__init__(self, channel)
81+
ExperimentalServiceStub.__init__(self, channel)
82+
WatchServiceStub.__init__(self, channel)
83+
84+
def create_channel(self, target, credentials, options=None, compression=None):
7385
try:
7486
asyncio.get_running_loop()
7587
channelfn = grpc.aio.secure_channel
7688
except RuntimeError:
7789
channelfn = grpc.secure_channel
7890

79-
channel = channelfn(target, credentials, options, compression)
80-
SchemaServiceStub.__init__(self, channel)
81-
PermissionsServiceStub.__init__(self, channel)
82-
ExperimentalServiceStub.__init__(self, channel)
83-
WatchServiceStub.__init__(self, channel)
91+
return channelfn(target, credentials, options, compression)
8492

8593

86-
class AsyncClient(
87-
SchemaServiceStub, PermissionsServiceStub, ExperimentalServiceStub, WatchServiceStub
88-
):
94+
class AsyncClient(Client):
8995
"""
9096
v1 Authzed gRPC API client, for use with asyncio.
9197
"""
9298

9399
def __init__(self, target, credentials, options=None, compression=None):
94100
channel = grpc.aio.secure_channel(target, credentials, options, compression)
95-
SchemaServiceStub.__init__(self, channel)
96-
PermissionsServiceStub.__init__(self, channel)
97-
ExperimentalServiceStub.__init__(self, channel)
98-
WatchServiceStub.__init__(self, channel)
101+
self.init_stubs(channel)
99102

100103

101-
class SyncClient(
102-
SchemaServiceStub, PermissionsServiceStub, ExperimentalServiceStub, WatchServiceStub
103-
):
104+
class SyncClient(Client):
104105
"""
105106
v1 Authzed gRPC API client, running synchronously.
106107
"""
107108

108109
def __init__(self, target, credentials, options=None, compression=None):
109110
channel = grpc.secure_channel(target, credentials, options, compression)
110-
SchemaServiceStub.__init__(self, channel)
111-
PermissionsServiceStub.__init__(self, channel)
112-
ExperimentalServiceStub.__init__(self, channel)
113-
WatchServiceStub.__init__(self, channel)
111+
self.init_stubs(channel)
112+
113+
114+
class TokenAuthorization(ClientInterceptor):
115+
def __init__(self, token: str):
116+
self._token = token
117+
118+
def intercept(
119+
self,
120+
method: Callable,
121+
request_or_iterator: Any,
122+
call_details: grpc.ClientCallDetails,
123+
):
124+
metadata: list[tuple[str, str | bytes]] = [("authorization", f"Bearer {self._token}")]
125+
if call_details.metadata is not None:
126+
metadata = [*metadata, *call_details.metadata]
127+
128+
new_details = ClientCallDetails(
129+
call_details.method,
130+
call_details.timeout,
131+
metadata,
132+
call_details.credentials,
133+
call_details.wait_for_ready,
134+
call_details.compression,
135+
)
136+
137+
return method(request_or_iterator, new_details)
138+
139+
140+
class InsecureClient(Client):
141+
"""
142+
An insecure client variant for non-TLS contexts.
143+
144+
The default behavior of the python gRPC client is to restrict non-TLS
145+
calls to `localhost` only, which is frustrating in contexts like docker-compose,
146+
so we provide this as a convenience.
147+
"""
148+
149+
def __init__(
150+
self,
151+
target: str,
152+
token: str,
153+
options=None,
154+
compression=None,
155+
):
156+
fake_credentials = grpc.local_channel_credentials()
157+
channel = self.create_channel(target, fake_credentials, options, compression)
158+
auth_interceptor = TokenAuthorization(token)
159+
160+
insecure_channel = grpc.insecure_channel(target, options, compression)
161+
channel = grpc.intercept_channel(insecure_channel, auth_interceptor)
162+
163+
self.init_stubs(channel)
114164

115165

116166
__all__ = [
@@ -140,6 +190,7 @@ def __init__(self, target, credentials, options=None, compression=None):
140190
"DeleteRelationshipsResponse",
141191
"ExpandPermissionTreeRequest",
142192
"ExpandPermissionTreeResponse",
193+
"InsecureClient",
143194
"LookupResourcesRequest",
144195
"LookupResourcesResponse",
145196
"LookupSubjectsRequest",

poetry.lock

+18-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pyproject.toml

+1
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ grpcio = "^1.63"
1919
protobuf = ">=5.26,<6"
2020
python = "^3.8"
2121
typing-extensions = ">=3.7.4,<5"
22+
grpc-interceptor = "^0.15.4"
2223

2324
[tool.poetry.group.dev.dependencies]
2425
black = ">=23.3,<25.0"

tests/__init__.py

Whitespace-only changes.

tests/calls.py

+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
from authzed.api.v1 import WriteSchemaRequest
2+
3+
from .utils import maybe_await
4+
5+
6+
async def write_test_schema(client):
7+
schema = """
8+
caveat likes_harry_potter(likes bool) {
9+
likes == true
10+
}
11+
12+
definition post {
13+
relation writer: user
14+
relation reader: user
15+
relation caveated_reader: user with likes_harry_potter
16+
17+
permission write = writer
18+
permission view = reader + writer
19+
permission view_as_fan = caveated_reader + writer
20+
}
21+
definition user {}
22+
"""
23+
await maybe_await(client.WriteSchema(WriteSchemaRequest(schema=schema)))

tests/conftest.py

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
import uuid
2+
3+
import pytest
4+
5+
6+
@pytest.fixture(scope="function")
7+
def token():
8+
return str(uuid.uuid4())

tests/insecure_client_test.py

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
import grpc
2+
import pytest
3+
4+
from authzed.api.v1 import AsyncClient, InsecureClient, SyncClient
5+
from grpcutil import insecure_bearer_token_credentials
6+
7+
from .calls import write_test_schema
8+
9+
## NOTE: these tests aren't usually run. They theoretically could and theoretically
10+
# should be run in CI, but getting an appropriate "remote" container is difficult with
11+
# github actions; this will happen at some point in the future.
12+
# To run them: `poetry run pytest -m ""`
13+
14+
# NOTE: this is the name of the "remote" binding of the service container
15+
# in CI. These tests are only run in CI because otherwise setup is fiddly.
16+
# If you want to see these tests run locally, figure out your computer's
17+
# network-local IP address (typically 192.168.x.x) and make that the `remote_host`
18+
# string below, and then start up a testing container bound to that interface:
19+
# docker run --rm -p 192.168.x.x:50051:50051 authzed/spicedb serve-testing
20+
remote_host = "192.168.something.something"
21+
22+
23+
@pytest.mark.skip(reason="Makes a remote call that we haven't yet supported in CI")
24+
async def test_normal_async_client_raises_error_on_insecure_remote_call(token):
25+
with pytest.raises(grpc.RpcError):
26+
client = AsyncClient(f"{remote_host}:50051", insecure_bearer_token_credentials(token))
27+
await write_test_schema(client)
28+
29+
30+
@pytest.mark.skip(reason="Makes a remote call that we haven't yet supported in CI")
31+
async def test_normal_sync_client_raises_error_on_insecure_remote_call(token):
32+
with pytest.raises(grpc.RpcError):
33+
client = SyncClient(f"{remote_host}:50051", insecure_bearer_token_credentials(token))
34+
await write_test_schema(client)
35+
36+
37+
@pytest.mark.skip(reason="Makes a remote call that we haven't yet supported in CI")
38+
async def test_insecure_client_makes_insecure_remote_call(token):
39+
insecure_client = InsecureClient(f"{remote_host}:50051", token)
40+
await write_test_schema(insecure_client)

tests/utils.py

+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
from inspect import isawaitable
2+
from typing import AsyncIterable, Iterable, List, TypeVar, Union
3+
4+
T = TypeVar("T")
5+
6+
7+
async def maybe_async_iterable_to_list(iterable: Union[Iterable[T], AsyncIterable[T]]) -> List[T]:
8+
items = []
9+
if isinstance(iterable, AsyncIterable):
10+
async for item in iterable:
11+
items.append(item)
12+
else:
13+
for item in iterable:
14+
items.append(item)
15+
return items
16+
17+
18+
async def maybe_await(resp: T) -> T:
19+
if isawaitable(resp):
20+
resp = await resp
21+
return resp

tests/v1_test.py

+3-46
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
import asyncio
22
import uuid
3-
from inspect import isawaitable
4-
from typing import Any, AsyncIterable, Iterable, List, Literal, TypeVar, Union
3+
from typing import Any, List, Literal
54

65
import pytest
76
from google.protobuf.struct_pb2 import Struct
@@ -30,10 +29,8 @@
3029
)
3130
from grpcutil import insecure_bearer_token_credentials
3231

33-
34-
@pytest.fixture()
35-
def token():
36-
return str(uuid.uuid4())
32+
from .calls import write_test_schema
33+
from .utils import maybe_async_iterable_to_list, maybe_await
3734

3835

3936
@pytest.fixture()
@@ -389,43 +386,3 @@ async def write_test_tuples(client):
389386
)
390387
)
391388
return beatrice, emilia, post_one, post_two
392-
393-
394-
async def write_test_schema(client):
395-
schema = """
396-
caveat likes_harry_potter(likes bool) {
397-
likes == true
398-
}
399-
400-
definition post {
401-
relation writer: user
402-
relation reader: user
403-
relation caveated_reader: user with likes_harry_potter
404-
405-
permission write = writer
406-
permission view = reader + writer
407-
permission view_as_fan = caveated_reader + writer
408-
}
409-
definition user {}
410-
"""
411-
await maybe_await(client.WriteSchema(WriteSchemaRequest(schema=schema)))
412-
413-
414-
T = TypeVar("T")
415-
416-
417-
async def maybe_await(resp: T) -> T:
418-
if isawaitable(resp):
419-
resp = await resp
420-
return resp
421-
422-
423-
async def maybe_async_iterable_to_list(iterable: Union[Iterable[T], AsyncIterable[T]]) -> List[T]:
424-
items = []
425-
if isinstance(iterable, AsyncIterable):
426-
async for item in iterable:
427-
items.append(item)
428-
else:
429-
for item in iterable:
430-
items.append(item)
431-
return items

0 commit comments

Comments
 (0)