Tigrbl-native authentication and authorization package for the Tigrbl ecosystem.
This checkpoint is a Step 12 final certification aggregation checkpoint with follow-up target/profile truth reconciliation and clean-room executor / validated-evidence contract hardening layered on top of the earlier certification-target, clean-room-matrix, published-dependency, runtime-validation, test-graph, production-grade operator-control-plane, migration-portability, fail-closed-gates, and Tier 4 peer-program work.
The current repository truth is:
fully_certifiable_now = falsefully_rfc_compliant_now = falsestrict_independent_claims_ready = falseprofile_scope_mismatch_set_empty = truealignment_only_checkpoint_no_new_certification_evidence = falseclean_room_executor_matrix_declared_complete = truevalidated_manifest_identity_contract_installed = true- the package is not yet certifiably fully featured
- the package is not yet certifiably fully RFC/spec compliant
Final package-level certification is still blocked because the fail-closed validated execution gates remain incomplete for the clean-room runtime matrix, in-scope certification lanes, migration portability preservation, Tier 3 evidence rebuilt from validated runs, and preserved Tier 4 external peer bundles.
This update keeps the retained target/profile mismatch set empty for RFC 7516, RFC 7592, and RFC 9207, and it also hardens the preserved evidence model so runtime, test-lane, and migration manifests only count as passing when they carry identity, install-substrate linkage, environment identity, and the expected runtime / pytest / revision-aware backend artifacts.
Start with:
.ssot/specs/SPEC-1052-ssot-document-authority.yaml.ssot/registry.jsondocs/compliance/truth_chain.mddocs/compliance/AUTHORITATIVE_CURRENT_DOCS.mdCURRENT_STATE.mdCERTIFICATION_STATUS.mddocs/compliance/current_state_report.mddocs/compliance/certification_state_report.mddocs/compliance/release_gate_report.mddocs/compliance/runtime_profile_report.mddocs/compliance/validated_execution_report.mddocs/compliance/PEER_MATRIX_REPORT.mddocs/compliance/TIER4_PROMOTION_MATRIX.mddocs/compliance/RELEASE_DECISION_RECORD.md
Historical planning and scaffold-layout documents are retained under docs/archive/ and are non-authoritative for the current repository state.
- standalone gateway/application export:
tigrbl_auth.gateway:app - application factory export:
tigrbl_auth.app:app - plugin installation:
tigrbl_auth.plugin:TigrblAuthPlugin
The package is treated as an ASGI 3 application package, not as a single bundled server. Runtime-serving claims are separated into runner profiles. Uvicorn, Hypercorn, and Tigrcorn are declared as runner-qualified certification targets, and the serve operator can launch runtime when the selected runner profile is installed and the Tigrbl runtime stack is importable in the active environment.
This checkpoint remains intentionally aligned to Tigrbl guidance:
- prefer Tigrbl exports and Tigrbl type exports,
- use Tigrbl ops and surfaces rather than ad-hoc framework routes,
- avoid direct FastAPI or Starlette imports and dependencies in verified release scopes.
pip install -c constraints/base.txt .pip install -c constraints/base.txt '.[postgres]'
pip install -c constraints/base.txt '.[sqlite]'pip install -c constraints/base.txt -c constraints/runner-uvicorn.txt '.[uvicorn]'
pip install -c constraints/base.txt -c constraints/runner-hypercorn.txt '.[hypercorn]'
pip install -c constraints/base.txt -c constraints/runner-tigrcorn.txt '.[tigrcorn]'
pip install -c constraints/base.txt -c constraints/runner-uvicorn.txt -c constraints/runner-hypercorn.txt -c constraints/runner-tigrcorn.txt '.[servers]'The tigrcorn extra is pinned to a published Tigrcorn runner package for Python 3.11 and 3.12. Final certification is still blocked until preserved clean-room execution evidence exists for the full supported runtime/test/migration matrix and the Tier 4 external peer bundles are complete.
tigrbl-auth claims lintLaunch the standalone app on Tigrcorn through uv:
uv run tigrbl-auth serve --server tigrcorn --profile production --host 127.0.0.1 --port 8000 --no-require-tlsOr bring up the checked-in Docker example:
docker compose up -d --buildThe compose example publishes the service on http://127.0.0.1:8001 to avoid
clobbering an existing local listener on 8000.
This repo includes a separate sample Python package at examples/acme_notes_cli/
that demonstrates how another CLI can implement a login command on top of
tigrbl_auth device authorization. The flow uses issuer discovery plus the
canonical POST /device_authorization and POST /token endpoints.
See docs/examples/python-cli-device-login.md.
or embed as a plugin:
from tigrbl import TigrblApp
from tigrbl_auth.plugin import TigrblAuthPlugin
app = TigrblApp()
plugin = TigrblAuthPlugin()
plugin.install(app)- OAuth 2.1 alignment is tracked as a profile, not as a formal RFC claim.
keysis the canonical certified command family;keyis no longer part of the certified operator surface.- public "independent" wording remains disallowed until preserved Tier 4 external peer bundles exist and promote the retained boundary.
- The authoritative executable CLI surface is
tigrbl_auth/cli/metadata.pyplus the generateddocs/reference/CLI_SURFACE.md. - A current checkpoint gap review remains published at
docs/compliance/PACKAGE_REVIEW_GAP_ANALYSIS.md. - Supplemental supporting review/plan docs remain available at
docs/compliance/INDEPENDENT_PACKAGE_REVIEW_2026-03-27.mdanddocs/compliance/CERTIFIABLE_DELIVERY_PLAN_2026-03-27.md; the authoritative active document is the SSOT, and the generated reports and top-level current-state docs are its current projections. - Dependency provenance for this checkpoint is preserved in
pyproject.toml,constraints/*.txt, andconstraints/dependency-lock.json.
- preserved Tier 4 external peer bundles are still absent and
strict_independent_claims_readyremainsfalse - the package is still not truthfully certifiably fully featured or fully RFC/spec compliant because the fail-closed validated execution gates remain red
- validated clean-room runtime matrix evidence is not yet fully preserved as passing
- validated in-scope certification lane evidence is not yet fully preserved as passing
- SQLite and PostgreSQL migration portability has not yet been preserved as passing in the final validated execution report
- Tier 3 evidence has not yet been explicitly rebuilt from validated-run manifests in a fully green final gate set
- the supported interpreter range remains Python
3.10–3.12; this local checkpoint container only provides Python3.13, so it cannot truthfully generate the required preserved supported-matrix evidence by itself - release bundles and attestation verification can be rebuilt from this checkpoint, but the result remains a final-release candidate, not a truthful final certification release
Apache-2.0
Use tox.ini for the same profile commands locally and in CI.
Examples:
tox -e py310-basetox -e py311-sqlite-uvicorntox -e py312-postgres-hypercorntox -e py311-tigrcorntox -e py312-devtesttox -e py311-gates
The Tier 4 peer-execution handoff package for the full supported peer-profile set is emitted under dist/tier4-external-handoff/, but preserved independent external bundles are still absent in this checkpoint, so strict independent public claims remain blocked.
