260 lines
8.6 KiB
Python
260 lines
8.6 KiB
Python
"""
|
|
Authentication API endpoints
|
|
"""
|
|
from datetime import datetime, timedelta, timezone
|
|
from typing import List
|
|
from fastapi import APIRouter, Depends, HTTPException, status, Request
|
|
from fastapi.security import OAuth2PasswordRequestForm
|
|
from sqlalchemy.orm import Session
|
|
|
|
from app.database.base import get_db
|
|
from app.models.user import User
|
|
from app.auth.security import (
|
|
authenticate_user,
|
|
create_access_token,
|
|
create_refresh_token,
|
|
decode_refresh_token,
|
|
is_refresh_token_revoked,
|
|
revoke_refresh_token,
|
|
get_password_hash,
|
|
get_current_user,
|
|
get_admin_user,
|
|
)
|
|
from app.auth.schemas import (
|
|
Token,
|
|
UserCreate,
|
|
UserResponse,
|
|
LoginRequest,
|
|
ThemePreferenceUpdate,
|
|
RefreshRequest,
|
|
)
|
|
from app.config import settings
|
|
from app.core.logging import get_logger, log_auth_attempt
|
|
|
|
router = APIRouter()
|
|
logger = get_logger("auth")
|
|
|
|
|
|
@router.post("/login", response_model=Token)
|
|
async def login(login_data: LoginRequest, request: Request, db: Session = Depends(get_db)):
|
|
"""Login endpoint"""
|
|
client_ip = request.client.host if request.client else "unknown"
|
|
user_agent = request.headers.get("user-agent", "")
|
|
|
|
logger.info(
|
|
"Login attempt started",
|
|
username=login_data.username,
|
|
client_ip=client_ip,
|
|
user_agent=user_agent
|
|
)
|
|
|
|
user = authenticate_user(db, login_data.username, login_data.password)
|
|
if not user:
|
|
log_auth_attempt(
|
|
username=login_data.username,
|
|
success=False,
|
|
ip_address=client_ip,
|
|
user_agent=user_agent,
|
|
error="Invalid credentials"
|
|
)
|
|
logger.warning(
|
|
"Login failed - invalid credentials",
|
|
username=login_data.username,
|
|
client_ip=client_ip
|
|
)
|
|
raise HTTPException(
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
detail="Incorrect username or password",
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
)
|
|
|
|
# Update last login
|
|
user.last_login = datetime.now(timezone.utc)
|
|
db.commit()
|
|
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
refresh_token = create_refresh_token(
|
|
user=user,
|
|
user_agent=request.headers.get("user-agent", ""),
|
|
ip_address=request.client.host if request.client else None,
|
|
db=db,
|
|
)
|
|
|
|
log_auth_attempt(
|
|
username=login_data.username,
|
|
success=True,
|
|
ip_address=client_ip,
|
|
user_agent=user_agent
|
|
)
|
|
logger.info(
|
|
"Login successful",
|
|
username=login_data.username,
|
|
user_id=user.id,
|
|
client_ip=client_ip
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer", "refresh_token": refresh_token}
|
|
|
|
|
|
@router.post("/register", response_model=UserResponse)
|
|
async def register(
|
|
user_data: UserCreate,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user) # Only admins can create users
|
|
):
|
|
"""Register new user (admin only)"""
|
|
# Check if username or email already exists
|
|
existing_user = db.query(User).filter(
|
|
(User.username == user_data.username) | (User.email == user_data.email)
|
|
).first()
|
|
|
|
if existing_user:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail="Username or email already registered"
|
|
)
|
|
|
|
# Create new user
|
|
hashed_password = get_password_hash(user_data.password)
|
|
new_user = User(
|
|
username=user_data.username,
|
|
email=user_data.email,
|
|
full_name=user_data.full_name,
|
|
hashed_password=hashed_password
|
|
)
|
|
|
|
db.add(new_user)
|
|
db.commit()
|
|
db.refresh(new_user)
|
|
|
|
return new_user
|
|
|
|
|
|
@router.get("/me", response_model=UserResponse)
|
|
async def read_users_me(current_user: User = Depends(get_current_user)):
|
|
"""Get current user info"""
|
|
logger.debug("User info requested", username=current_user.username, user_id=current_user.id)
|
|
return current_user
|
|
|
|
|
|
@router.post("/refresh", response_model=Token)
|
|
async def refresh_token_endpoint(
|
|
request: Request,
|
|
db: Session = Depends(get_db),
|
|
body: RefreshRequest = None,
|
|
):
|
|
"""Issue a new access token using a valid, non-revoked refresh token.
|
|
|
|
For backwards compatibility with existing clients that may call this without a body,
|
|
consider falling back to Authorization header in the future if needed.
|
|
"""
|
|
# New flow: refresh token in body
|
|
if body and body.refresh_token:
|
|
payload = decode_refresh_token(body.refresh_token)
|
|
if not payload:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid refresh token")
|
|
|
|
jti = payload.get("jti")
|
|
username = payload.get("sub")
|
|
if not jti or not username:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid refresh token payload")
|
|
|
|
# Verify token not revoked/expired
|
|
if is_refresh_token_revoked(jti, db):
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Refresh token revoked or expired")
|
|
|
|
# Load user
|
|
user = db.query(User).filter(User.username == username).first()
|
|
if not user or not user.is_active:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="User not found or inactive")
|
|
|
|
# Rotate refresh token on use
|
|
revoke_refresh_token(jti, db)
|
|
new_refresh_token = create_refresh_token(
|
|
user=user,
|
|
user_agent=request.headers.get("user-agent", ""),
|
|
ip_address=request.client.host if request.client else None,
|
|
db=db,
|
|
)
|
|
|
|
# Issue new access token
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer", "refresh_token": new_refresh_token}
|
|
|
|
# Legacy flow: Authorization header-based refresh
|
|
auth_header = request.headers.get("authorization") or request.headers.get("Authorization")
|
|
if not auth_header or not auth_header.lower().startswith("bearer "):
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Missing credentials")
|
|
|
|
token = auth_header.split(" ", 1)[1].strip()
|
|
from app.auth.security import verify_token # local import to avoid circular
|
|
username = verify_token(token)
|
|
if not username:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid token")
|
|
|
|
user = db.query(User).filter(User.username == username).first()
|
|
if not user or not user.is_active:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="User not found or inactive")
|
|
|
|
user.last_login = datetime.now(timezone.utc)
|
|
db.commit()
|
|
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer"}
|
|
|
|
|
|
@router.get("/users", response_model=List[UserResponse])
|
|
async def list_users(
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user)
|
|
):
|
|
"""List all users (admin only)"""
|
|
users = db.query(User).all()
|
|
return users
|
|
|
|
|
|
@router.post("/logout")
|
|
async def logout(body: RefreshRequest = None, db: Session = Depends(get_db)):
|
|
"""Revoke the provided refresh token. Idempotent and safe to call multiple times.
|
|
|
|
The client should send a JSON body: { "refresh_token": "..." }.
|
|
"""
|
|
try:
|
|
if body and body.refresh_token:
|
|
payload = decode_refresh_token(body.refresh_token)
|
|
if payload and payload.get("jti"):
|
|
revoke_refresh_token(payload["jti"], db)
|
|
except Exception:
|
|
# Don't leak details; logout should be best-effort
|
|
pass
|
|
return {"status": "ok"}
|
|
|
|
|
|
@router.post("/theme-preference")
|
|
async def update_theme_preference(
|
|
theme_data: ThemePreferenceUpdate,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_current_user)
|
|
):
|
|
"""Update user's theme preference"""
|
|
if theme_data.theme_preference not in ['light', 'dark']:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail="Theme preference must be 'light' or 'dark'"
|
|
)
|
|
|
|
current_user.theme_preference = theme_data.theme_preference
|
|
db.commit()
|
|
|
|
return {"message": "Theme preference updated successfully", "theme": theme_data.theme_preference} |