359 lines
12 KiB
Python
359 lines
12 KiB
Python
"""
|
|
Authentication API endpoints
|
|
"""
|
|
from datetime import datetime, timedelta, timezone
|
|
from typing import List
|
|
from fastapi import APIRouter, Depends, HTTPException, status, Request
|
|
from fastapi.security import OAuth2PasswordRequestForm
|
|
from sqlalchemy.orm import Session
|
|
|
|
from app.database.base import get_db
|
|
from app.models.user import User
|
|
from app.auth.security import (
|
|
authenticate_user,
|
|
create_access_token,
|
|
create_refresh_token,
|
|
decode_refresh_token,
|
|
is_refresh_token_revoked,
|
|
revoke_refresh_token,
|
|
get_password_hash,
|
|
get_current_user,
|
|
get_admin_user,
|
|
)
|
|
from app.utils.enhanced_auth import (
|
|
validate_and_authenticate_user,
|
|
PasswordValidator,
|
|
AccountLockoutManager,
|
|
)
|
|
from app.utils.session_manager import SessionManager, get_session_manager
|
|
from app.auth.schemas import (
|
|
Token,
|
|
UserCreate,
|
|
UserResponse,
|
|
LoginRequest,
|
|
ThemePreferenceUpdate,
|
|
RefreshRequest,
|
|
)
|
|
from app.config import settings
|
|
from app.core.logging import get_logger, log_auth_attempt
|
|
|
|
router = APIRouter()
|
|
logger = get_logger("auth")
|
|
|
|
|
|
@router.post("/login", response_model=Token)
|
|
async def login(
|
|
login_data: LoginRequest,
|
|
request: Request,
|
|
db: Session = Depends(get_db),
|
|
session_manager: SessionManager = Depends(get_session_manager)
|
|
):
|
|
"""Enhanced login endpoint with session management and security features"""
|
|
client_ip = request.client.host if request.client else "unknown"
|
|
user_agent = request.headers.get("user-agent", "")
|
|
|
|
logger.info(
|
|
"Login attempt started",
|
|
username=login_data.username,
|
|
client_ip=client_ip,
|
|
user_agent=user_agent
|
|
)
|
|
|
|
# Use enhanced authentication with lockout protection
|
|
user, auth_errors = validate_and_authenticate_user(
|
|
db, login_data.username, login_data.password, request
|
|
)
|
|
|
|
if not user or auth_errors:
|
|
error_message = auth_errors[0] if auth_errors else "Incorrect username or password"
|
|
|
|
logger.warning(
|
|
"Login failed - enhanced auth",
|
|
username=login_data.username,
|
|
client_ip=client_ip,
|
|
errors=auth_errors
|
|
)
|
|
|
|
# Get lockout info for response headers
|
|
lockout_info = AccountLockoutManager.get_lockout_info(db, login_data.username)
|
|
|
|
headers = {"WWW-Authenticate": "Bearer"}
|
|
if lockout_info["is_locked"]:
|
|
headers["X-Account-Locked"] = "true"
|
|
headers["X-Unlock-Time"] = lockout_info["unlock_time"] or ""
|
|
else:
|
|
headers["X-Attempts-Remaining"] = str(lockout_info["attempts_remaining"])
|
|
|
|
raise HTTPException(
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
detail=error_message,
|
|
headers=headers,
|
|
)
|
|
|
|
# Successful authentication - create tokens
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
refresh_token = create_refresh_token(
|
|
user=user,
|
|
user_agent=request.headers.get("user-agent", ""),
|
|
ip_address=request.client.host if request.client else None,
|
|
db=db,
|
|
)
|
|
|
|
logger.info(
|
|
"Login successful - enhanced auth",
|
|
username=login_data.username,
|
|
user_id=user.id,
|
|
client_ip=client_ip
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer", "refresh_token": refresh_token}
|
|
|
|
|
|
@router.post("/register", response_model=UserResponse)
|
|
async def register(
|
|
user_data: UserCreate,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user) # Only admins can create users
|
|
):
|
|
"""Register new user with password validation (admin only)"""
|
|
# Validate password strength
|
|
is_valid, password_errors = PasswordValidator.validate_password_strength(user_data.password)
|
|
if not is_valid:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=f"Password validation failed: {'; '.join(password_errors)}"
|
|
)
|
|
|
|
# Check if username or email already exists
|
|
existing_user = db.query(User).filter(
|
|
(User.username == user_data.username) | (User.email == user_data.email)
|
|
).first()
|
|
|
|
if existing_user:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail="Username or email already registered"
|
|
)
|
|
|
|
# Create new user
|
|
hashed_password = get_password_hash(user_data.password)
|
|
new_user = User(
|
|
username=user_data.username,
|
|
email=user_data.email,
|
|
full_name=user_data.full_name,
|
|
hashed_password=hashed_password
|
|
)
|
|
|
|
db.add(new_user)
|
|
db.commit()
|
|
db.refresh(new_user)
|
|
|
|
logger.info(
|
|
"User registered",
|
|
username=new_user.username,
|
|
created_by=current_user.username
|
|
)
|
|
|
|
return new_user
|
|
|
|
|
|
@router.get("/me", response_model=UserResponse)
|
|
async def read_users_me(current_user: User = Depends(get_current_user)):
|
|
"""Get current user info"""
|
|
logger.debug("User info requested", username=current_user.username, user_id=current_user.id)
|
|
return current_user
|
|
|
|
|
|
@router.post("/refresh", response_model=Token)
|
|
async def refresh_token_endpoint(
|
|
request: Request,
|
|
db: Session = Depends(get_db),
|
|
body: RefreshRequest = None,
|
|
):
|
|
"""Issue a new access token using a valid, non-revoked refresh token.
|
|
|
|
For backwards compatibility with existing clients that may call this without a body,
|
|
consider falling back to Authorization header in the future if needed.
|
|
"""
|
|
# New flow: refresh token in body
|
|
if body and body.refresh_token:
|
|
payload = decode_refresh_token(body.refresh_token)
|
|
if not payload:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid refresh token")
|
|
|
|
jti = payload.get("jti")
|
|
username = payload.get("sub")
|
|
if not jti or not username:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid refresh token payload")
|
|
|
|
# Verify token not revoked/expired
|
|
if is_refresh_token_revoked(jti, db):
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Refresh token revoked or expired")
|
|
|
|
# Load user
|
|
user = db.query(User).filter(User.username == username).first()
|
|
if not user or not user.is_active:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="User not found or inactive")
|
|
|
|
# Rotate refresh token on use
|
|
revoke_refresh_token(jti, db)
|
|
new_refresh_token = create_refresh_token(
|
|
user=user,
|
|
user_agent=request.headers.get("user-agent", ""),
|
|
ip_address=request.client.host if request.client else None,
|
|
db=db,
|
|
)
|
|
|
|
# Issue new access token
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer", "refresh_token": new_refresh_token}
|
|
|
|
# Legacy flow: Authorization header-based refresh
|
|
auth_header = request.headers.get("authorization") or request.headers.get("Authorization")
|
|
if not auth_header or not auth_header.lower().startswith("bearer "):
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Missing credentials")
|
|
|
|
token = auth_header.split(" ", 1)[1].strip()
|
|
from app.auth.security import verify_token # local import to avoid circular
|
|
username = verify_token(token)
|
|
if not username:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid token")
|
|
|
|
user = db.query(User).filter(User.username == username).first()
|
|
if not user or not user.is_active:
|
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="User not found or inactive")
|
|
|
|
user.last_login = datetime.now(timezone.utc)
|
|
db.commit()
|
|
|
|
access_token_expires = timedelta(minutes=settings.access_token_expire_minutes)
|
|
access_token = create_access_token(
|
|
data={"sub": user.username}, expires_delta=access_token_expires
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer"}
|
|
|
|
|
|
@router.get("/users", response_model=List[UserResponse])
|
|
async def list_users(
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user)
|
|
):
|
|
"""List all users (admin only)"""
|
|
users = db.query(User).all()
|
|
return users
|
|
|
|
|
|
@router.post("/logout")
|
|
async def logout(body: RefreshRequest = None, db: Session = Depends(get_db)):
|
|
"""Revoke the provided refresh token. Idempotent and safe to call multiple times.
|
|
|
|
The client should send a JSON body: { "refresh_token": "..." }.
|
|
"""
|
|
try:
|
|
if body and body.refresh_token:
|
|
payload = decode_refresh_token(body.refresh_token)
|
|
if payload and payload.get("jti"):
|
|
revoke_refresh_token(payload["jti"], db)
|
|
except Exception:
|
|
# Don't leak details; logout should be best-effort
|
|
pass
|
|
return {"status": "ok"}
|
|
|
|
|
|
@router.post("/theme-preference")
|
|
async def update_theme_preference(
|
|
theme_data: ThemePreferenceUpdate,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_current_user)
|
|
):
|
|
"""Update user's theme preference"""
|
|
if theme_data.theme_preference not in ['light', 'dark']:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail="Theme preference must be 'light' or 'dark'"
|
|
)
|
|
|
|
current_user.theme_preference = theme_data.theme_preference
|
|
db.commit()
|
|
|
|
return {"message": "Theme preference updated successfully", "theme": theme_data.theme_preference}
|
|
|
|
|
|
@router.post("/validate-password")
|
|
async def validate_password(password_data: dict):
|
|
"""Validate password strength and return detailed feedback"""
|
|
password = password_data.get("password", "")
|
|
|
|
if not password:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail="Password is required"
|
|
)
|
|
|
|
is_valid, errors = PasswordValidator.validate_password_strength(password)
|
|
strength_score = PasswordValidator.generate_password_strength_score(password)
|
|
|
|
return {
|
|
"is_valid": is_valid,
|
|
"errors": errors,
|
|
"strength_score": strength_score,
|
|
"strength_level": (
|
|
"Very Weak" if strength_score < 20 else
|
|
"Weak" if strength_score < 40 else
|
|
"Fair" if strength_score < 60 else
|
|
"Good" if strength_score < 80 else
|
|
"Strong"
|
|
)
|
|
}
|
|
|
|
|
|
@router.get("/account-status/{username}")
|
|
async def get_account_status(
|
|
username: str,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user) # Admin only endpoint
|
|
):
|
|
"""Get account lockout status and security information (admin only)"""
|
|
lockout_info = AccountLockoutManager.get_lockout_info(db, username)
|
|
|
|
# Get recent login attempts
|
|
from app.utils.enhanced_auth import SuspiciousActivityDetector
|
|
is_suspicious, warnings = SuspiciousActivityDetector.is_login_suspicious(
|
|
db, username, "admin-check", "admin-request"
|
|
)
|
|
|
|
return {
|
|
"username": username,
|
|
"lockout_info": lockout_info,
|
|
"suspicious_activity": {
|
|
"is_suspicious": is_suspicious,
|
|
"warnings": warnings
|
|
}
|
|
}
|
|
|
|
|
|
@router.post("/unlock-account/{username}")
|
|
async def unlock_account(
|
|
username: str,
|
|
db: Session = Depends(get_db),
|
|
current_user: User = Depends(get_admin_user) # Admin only endpoint
|
|
):
|
|
"""Manually unlock a user account (admin only)"""
|
|
# Reset failed attempts by recording a successful "admin unlock"
|
|
AccountLockoutManager.reset_failed_attempts(db, username)
|
|
|
|
logger.info(
|
|
"Account manually unlocked",
|
|
username=username,
|
|
unlocked_by=current_user.username
|
|
)
|
|
|
|
return {"message": f"Account '{username}' has been unlocked"} |