Skip to content

Commit 4018d6a

Browse files
committed
Merge pull request #147 from jgr3go/jwt-support
JWT support
2 parents b22a55b + 9baeb28 commit 4018d6a

File tree

14 files changed

+174
-12
lines changed

14 files changed

+174
-12
lines changed

docs/changelog.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,10 @@
11
Changelog
22
=========
33

4+
0.8.0
5+
-----
6+
- added support for django-rest-framework-jwt
7+
48
0.7.0
59
-----
610
- Wrapped API returned strings in ugettext_lazy

docs/configuration.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ Configuration
1010

1111
- TOKEN_SERIALIZER - response for successful authentication in ``rest_auth.views.LoginView``, default value ``rest_auth.serializers.TokenSerializer``
1212

13+
- JWT_SERIALIZER - (Using REST_USE_JWT=True) response for successful authentication in ``rest_auth.views.LoginView``, default value ``rest_auth.serializers.JWTSerializer``
14+
1315
- USER_DETAILS_SERIALIZER - serializer class in ``rest_auth.views.UserDetailsView``, default value ``rest_auth.serializers.UserDetailsSerializer``
1416

1517
- PASSWORD_RESET_SERIALIZER - serializer class in ``rest_auth.views.PasswordResetView``, default value ``rest_auth.serializers.PasswordResetSerializer``
@@ -42,6 +44,8 @@ Configuration
4244

4345
- **REST_SESSION_LOGIN** - Enable session login in Login API view (default: True)
4446

47+
- **REST_USE_JWT** - Enable JWT Authentication instead of Token/Session based. This is built on top of django-rest-framework-jwt http://getblimp.github.io/django-rest-framework-jwt/ , which much also be installed. (default: False)
48+
4549
- **OLD_PASSWORD_FIELD_ENABLED** - set it to True if you want to have old password verification on password change enpoint (default: False)
4650

4751
- **LOGOUT_ON_PASSWORD_CHANGE** - set to False if you want to keep the current user logged in after a password change

docs/installation.rst

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,3 +140,18 @@ If you are using Twitter for your social authentication, it is a bit different s
140140
url(r'^rest-auth/twitter/$', TwitterLogin.as_view(), name='twitter_login')
141141
)
142142
.. note:: Starting from v0.21.0, django-allauth has dropped support for context processors. Check out http://django-allauth.readthedocs.org/en/latest/changelog.html#from-0-21-0 for more details.
143+
144+
145+
JWT Support (optional)
146+
----------------------
147+
148+
By default, ``django-rest-auth`` uses Django's Token-based authentication. If you want to use JWT authentication, you need to install the following:
149+
150+
1. Install ``django-rest-framework-jwt`` http://getblimp.github.io/django-rest-framework-jwt/ . Right now this is the only supported JWT library.
151+
152+
2. Add the following to your settings
153+
154+
.. code-block:: python
155+
156+
REST_USE_JWT = True
157+

rest_auth/app_settings.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22

33
from rest_auth.serializers import (
44
TokenSerializer as DefaultTokenSerializer,
5+
JWTSerializer as DefaultJWTSerializer,
56
UserDetailsSerializer as DefaultUserDetailsSerializer,
67
LoginSerializer as DefaultLoginSerializer,
78
PasswordResetSerializer as DefaultPasswordResetSerializer,
@@ -17,6 +18,9 @@
1718
TokenSerializer = import_callable(
1819
serializers.get('TOKEN_SERIALIZER', DefaultTokenSerializer))
1920

21+
JWTSerializer = import_callable(
22+
serializers.get('JWT_SERIALIZER', DefaultJWTSerializer))
23+
2024
UserDetailsSerializer = import_callable(
2125
serializers.get('USER_DETAILS_SERIALIZER', DefaultUserDetailsSerializer)
2226
)

rest_auth/registration/views.py

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
from django.utils.translation import ugettext_lazy as _
2+
from django.conf import settings
23

34
from rest_framework.views import APIView
45
from rest_framework.response import Response
@@ -12,13 +13,15 @@
1213
from allauth.account import app_settings as allauth_settings
1314

1415
from rest_auth.app_settings import (TokenSerializer,
16+
JWTSerializer,
1517
create_token)
1618
from rest_auth.registration.serializers import (SocialLoginSerializer,
1719
VerifyEmailSerializer)
1820
from rest_auth.views import LoginView
1921
from rest_auth.models import TokenModel
2022
from .app_settings import RegisterSerializer
2123

24+
from rest_auth.utils import jwt_encode
2225

2326
class RegisterView(CreateAPIView):
2427
serializer_class = RegisterSerializer
@@ -30,7 +33,14 @@ def get_response_data(self, user):
3033
allauth_settings.EmailVerificationMethod.MANDATORY:
3134
return {}
3235

33-
return TokenSerializer(user.auth_token).data
36+
if getattr(settings, 'REST_USE_JWT', False):
37+
data = {
38+
'user': user,
39+
'token': self.token
40+
}
41+
return JWTSerializer(data).data
42+
else:
43+
return TokenSerializer(user.auth_token).data
3444

3545
def create(self, request, *args, **kwargs):
3646
serializer = self.get_serializer(data=request.data)
@@ -42,7 +52,10 @@ def create(self, request, *args, **kwargs):
4252

4353
def perform_create(self, serializer):
4454
user = serializer.save(self.request)
45-
create_token(self.token_model, user, serializer)
55+
if getattr(settings, 'REST_USE_JWT', False):
56+
self.token = jwt_encode(user)
57+
else:
58+
create_token(self.token_model, user, serializer)
4659
complete_signup(self.request._request, user,
4760
allauth_settings.EMAIL_VERIFICATION,
4861
None)

rest_auth/serializers.py

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,6 @@ class Meta:
118118
model = TokenModel
119119
fields = ('key',)
120120

121-
122121
class UserDetailsSerializer(serializers.ModelSerializer):
123122

124123
"""
@@ -129,6 +128,12 @@ class Meta:
129128
fields = ('username', 'email', 'first_name', 'last_name')
130129
read_only_fields = ('email', )
131130

131+
class JWTSerializer(serializers.Serializer):
132+
"""
133+
Serializer for JWT authentication.
134+
"""
135+
token = serializers.CharField()
136+
user = UserDetailsSerializer()
132137

133138
class PasswordResetSerializer(serializers.Serializer):
134139

rest_auth/tests/requirements.pip

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
django-allauth>=0.19.1
22
responses>=0.3.0
33
flake8==2.4.0
4+
djangorestframework-jwt>=1.7.2

rest_auth/tests/settings.py

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,13 @@
4545
"allauth.socialaccount.context_processors.socialaccount",
4646
]
4747

48+
REST_FRAMEWORK = {
49+
'DEFAULT_AUTHENTICATION_CLASSES': (
50+
'rest_framework.authentication.SessionAuthentication',
51+
'rest_framework_jwt.authentication.JSONWebTokenAuthentication',
52+
)
53+
}
54+
4855
INSTALLED_APPS = [
4956
'django.contrib.admin',
5057
'django.contrib.auth',
@@ -64,7 +71,9 @@
6471
'rest_framework.authtoken',
6572

6673
'rest_auth',
67-
'rest_auth.registration'
74+
'rest_auth.registration',
75+
76+
'rest_framework_jwt'
6877
]
6978

7079
SECRET_KEY = "38dh*skf8sjfhs287dh&^hd8&3hdg*j2&sd"

rest_auth/tests/test_api.py

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,19 @@ def test_login(self):
9191
# test empty payload
9292
self.post(self.login_url, data={}, status_code=400)
9393

94+
@override_settings(REST_USE_JWT=True)
95+
def test_login_jwt(self):
96+
payload = {
97+
"username": self.USERNAME,
98+
"password": self.PASS
99+
}
100+
user = get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
101+
102+
self.post(self.login_url, data=payload, status_code=200)
103+
self.assertEqual('token' in self.response.json.keys(), True)
104+
self.token = self.response.json['token']
105+
106+
94107
def test_login_by_email(self):
95108
# starting test without allauth app
96109
settings.INSTALLED_APPS.remove('allauth')
@@ -307,6 +320,22 @@ def test_user_details(self):
307320
self.assertEqual(user.last_name, self.response.json['last_name'])
308321
self.assertEqual(user.email, self.response.json['email'])
309322

323+
@override_settings(REST_USE_JWT=True)
324+
def test_user_details_using_jwt(self):
325+
user = get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
326+
payload = {
327+
"username": self.USERNAME,
328+
"password": self.PASS
329+
}
330+
self.post(self.login_url, data=payload, status_code=200)
331+
self.token = self.response.json['token']
332+
self.get(self.user_url, status_code=200)
333+
334+
self.patch(self.user_url, data=self.BASIC_USER_DATA, status_code=200)
335+
user = get_user_model().objects.get(pk=user.pk)
336+
self.assertEqual(user.email, self.response.json['email'])
337+
338+
310339
def test_registration(self):
311340
user_count = get_user_model().objects.all().count()
312341

@@ -323,6 +352,20 @@ def test_registration(self):
323352
self._login()
324353
self._logout()
325354

355+
@override_settings(REST_USE_JWT=True)
356+
def test_registration_with_jwt(self):
357+
user_count = get_user_model().objects.all().count()
358+
359+
self.post(self.register_url, data={}, status_code=400)
360+
361+
result = self.post(self.register_url, data=self.REGISTRATION_DATA, status_code=201)
362+
self.assertIn('token', result.data)
363+
self.assertEqual(get_user_model().objects.all().count(), user_count + 1)
364+
365+
self._login()
366+
self._logout()
367+
368+
326369
def test_registration_with_invalid_password(self):
327370
data = self.REGISTRATION_DATA.copy()
328371
data['password2'] = 'foobar'

rest_auth/tests/test_base.py

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,10 @@ def send_request(self, request_method, *args, **kwargs):
3737

3838
# check_headers = kwargs.pop('check_headers', True)
3939
if hasattr(self, 'token'):
40-
kwargs['HTTP_AUTHORIZATION'] = 'Token %s' % self.token
40+
if getattr(settings, 'REST_USE_JWT', False):
41+
kwargs['HTTP_AUTHORIZATION'] = 'JWT %s' % self.token
42+
else:
43+
kwargs['HTTP_AUTHORIZATION'] = 'Token %s' % self.token
4144

4245
self.response = request_func(*args, **kwargs)
4346
is_json = bool(

0 commit comments

Comments
 (0)