File size: 10,421 Bytes
76ca861
 
 
0e9cbc7
86d79a3
76ca861
 
 
 
86d79a3
0e9cbc7
86d79a3
76ca861
e673ce2
86d79a3
 
 
 
 
 
 
 
 
 
0e9cbc7
 
 
 
76ca861
 
86d79a3
76ca861
 
0e9cbc7
76ca861
 
 
 
0e9cbc7
 
 
86d79a3
1d89d54
86d79a3
0e9cbc7
 
 
 
 
 
 
 
76ca861
 
86d79a3
 
 
 
 
 
 
 
 
 
e673ce2
76ca861
e673ce2
 
 
 
 
 
76ca861
 
 
 
 
0e9cbc7
 
 
 
 
 
 
 
 
76ca861
 
 
 
 
 
 
0e9cbc7
76ca861
 
 
0e9cbc7
 
 
76ca861
 
 
 
 
0e9cbc7
 
 
 
 
 
 
76ca861
 
 
 
 
 
 
 
 
 
 
 
0e9cbc7
 
 
 
 
 
 
76ca861
 
 
 
 
 
0e9cbc7
 
 
 
 
 
 
 
76ca861
 
86d79a3
0e9cbc7
86d79a3
 
 
0e9cbc7
 
 
86d79a3
 
 
0e9cbc7
 
 
 
 
 
 
 
86d79a3
 
 
 
 
0e9cbc7
 
 
 
 
 
 
 
86d79a3
 
 
 
 
0e9cbc7
 
 
 
 
 
 
 
86d79a3
 
0e9cbc7
 
 
 
 
 
 
 
 
86d79a3
 
 
0e9cbc7
86d79a3
 
76ca861
0e9cbc7
 
 
86d79a3
0e9cbc7
 
 
 
 
 
 
86d79a3
76ca861
86d79a3
 
 
 
0e9cbc7
86d79a3
 
 
0e9cbc7
 
 
 
 
 
86d79a3
 
0e9cbc7
 
 
 
 
 
 
86d79a3
 
0e9cbc7
 
 
 
 
 
 
 
86d79a3
 
e673ce2
 
 
 
 
 
 
 
86d79a3
 
 
 
76ca861
 
 
 
86d79a3
0e9cbc7
 
 
 
 
86d79a3
 
 
 
 
0e9cbc7
 
 
 
 
86d79a3
76ca861
86d79a3
 
0e9cbc7
 
 
 
 
86d79a3
76ca861
0e9cbc7
 
 
 
86d79a3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
"""
Authentication endpoints for token management
"""
from fastapi import APIRouter, HTTPException, Depends, Request
from fastapi.security import HTTPBearer
from datetime import datetime, timedelta
from typing import Dict, Any
import jwt
import os
import uuid
import logging
from ..schemas.auth_schemas import TokenRequest, TokenResponse, UserRegistrationRequest, UserResponse
from ....core.config import settings
from ....core.auth import authenticate_request, require_current_user
from ....services.database import (
    get_user_by_username, 
    get_user_by_email, 
    create_user, 
    verify_password, 
    update_last_login,
    create_user_session,
    get_user_session,
    revoke_user_session
)
from ....services.auth_logger import AuthEventLogger, get_client_info

# Setup logger for authentication events
logger = logging.getLogger(__name__)

router = APIRouter()
security = HTTPBearer(auto_error=False)

@router.post("/auth/token", response_model=TokenResponse)
async def get_access_token(credentials: TokenRequest, request: Request):
    """
    Exchange user credentials for a temporary access token
    This endpoint allows users to authenticate and receive a JWT token
    """
    # Extract client information for logging
    client_ip, user_agent = get_client_info(request)
    
    # Validate user credentials against your Supabase database
    user = await validate_user_credentials(credentials.model_dump())
    if not user:
        # Log failed login attempt
        AuthEventLogger.log_login_attempt(
            username=credentials.username,
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason="Invalid credentials"
        )
        raise HTTPException(status_code=401, detail="Invalid credentials")
    
    # Update last login timestamp
    await update_last_login(user["id"])
    
    # Generate unique JTI (JWT ID) for session tracking
    jti = str(uuid.uuid4())
    expires_at = datetime.utcnow() + timedelta(hours=24)
    
    # Create session in database
    await create_user_session(user["id"], jti, expires_at)
    
    # Generate a temporary JWT token with minimal payload
    payload = {
        "sub": credentials.username,  # Subject (username) - needed for user lookup
        "jti": jti,                   # JWT ID for session tracking
        "exp": expires_at,            # Expiration time
        "iat": datetime.utcnow(),     # Issued at time
        "type": "access_token"        # Token type
        # Note: user_id removed - will be looked up from database using username
    }
    
    secret_key = os.getenv("SECRET_KEY", "your-secret-key-change-this")
    token = jwt.encode(payload, secret_key, algorithm="HS256")
    
    # Log successful login
    AuthEventLogger.log_login_attempt(
        username=credentials.username,
        client_ip=client_ip,
        user_agent=user_agent,
        success=True,
        user_id=user["id"]
    )
    
    return TokenResponse(
        access_token=token,
        token_type="bearer",
        expires_in=86400  # 24 hours
    )

@router.post("/auth/refresh")
async def refresh_access_token(refresh_token: str, request: Request):
    """
    Refresh an expired access token
    """
    # Extract client information for logging
    client_ip, user_agent = get_client_info(request)
    
    try:
        secret_key = os.getenv("SECRET_KEY", "your-secret-key-change-this")
        payload = jwt.decode(refresh_token, secret_key, algorithms=["HS256"])
        
        if payload.get("type") != "refresh_token":
            AuthEventLogger.log_token_refresh(
                username=payload.get("sub", "unknown"),
                client_ip=client_ip,
                user_agent=user_agent,
                success=False,
                failure_reason="Invalid token type"
            )
            raise HTTPException(status_code=401, detail="Invalid token type")
        
        # Generate new access token
        new_payload = {
            "sub": payload["sub"],
            "exp": datetime.utcnow() + timedelta(hours=24),
            "iat": datetime.utcnow(),
            "type": "access_token"
        }
        
        new_token = jwt.encode(new_payload, secret_key, algorithm="HS256")
        
        AuthEventLogger.log_token_refresh(
            username=payload["sub"],
            client_ip=client_ip,
            user_agent=user_agent,
            success=True
        )
        
        return TokenResponse(
            access_token=new_token,
            token_type="bearer",
            expires_in=86400
        )
        
    except jwt.InvalidTokenError as e:
        AuthEventLogger.log_token_refresh(
            username="unknown",
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason=f"Invalid refresh token: {str(e)}"
        )
        raise HTTPException(status_code=401, detail="Invalid refresh token")

@router.post("/auth/register", response_model=UserResponse)
async def register_user(user_data: UserRegistrationRequest, request: Request):
    """
    Register a new user account
    """
    # Extract client information for logging
    client_ip, user_agent = get_client_info(request)
    
    # Check if username already exists
    existing_user = await get_user_by_username(user_data.username)
    if existing_user:
        AuthEventLogger.log_registration_attempt(
            username=user_data.username,
            email=user_data.email,
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason="Username already exists"
        )
        raise HTTPException(status_code=400, detail="Username already exists")
    
    # Check if email already exists
    existing_email = await get_user_by_email(user_data.email)
    if existing_email:
        AuthEventLogger.log_registration_attempt(
            username=user_data.username,
            email=user_data.email,
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason="Email already registered"
        )
        raise HTTPException(status_code=400, detail="Email already registered")
    
    # Create new user
    new_user = await create_user(user_data.username, user_data.email, user_data.password)
    if not new_user:
        AuthEventLogger.log_registration_attempt(
            username=user_data.username,
            email=user_data.email,
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason="Database error - failed to create user"
        )
        raise HTTPException(status_code=500, detail="Failed to create user")
    
    AuthEventLogger.log_registration_attempt(
        username=user_data.username,
        email=user_data.email,
        client_ip=client_ip,
        user_agent=user_agent,
        success=True,
        user_id=new_user["id"]
    )
    
    return UserResponse(**new_user)

@router.post("/auth/logout")
async def logout_user(request: Request, token: str = Depends(security)):
    """
    Logout user by revoking their session
    """
    # Extract client information for logging
    client_ip, user_agent = get_client_info(request)
    
    if not token:
        AuthEventLogger.log_logout(
            username="unknown",
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason="No token provided"
        )
        raise HTTPException(status_code=401, detail="No token provided")
    
    try:
        secret_key = os.getenv("SECRET_KEY", "your-secret-key-change-this")
        payload = jwt.decode(token.credentials, secret_key, algorithms=["HS256"])
        jti = payload.get("jti")
        username = payload.get("sub")
        
        if jti:
            await revoke_user_session(jti)
            AuthEventLogger.log_logout(
                username=username,
                client_ip=client_ip,
                user_agent=user_agent,
                success=True
            )
            return {"message": "Successfully logged out"}
        else:
            AuthEventLogger.log_logout(
                username=username,
                client_ip=client_ip,
                user_agent=user_agent,
                success=False,
                failure_reason="Invalid token format - missing JTI"
            )
            raise HTTPException(status_code=400, detail="Invalid token format")
            
    except jwt.InvalidTokenError as e:
        AuthEventLogger.log_logout(
            username="unknown",
            client_ip=client_ip,
            user_agent=user_agent,
            success=False,
            failure_reason=f"Invalid token: {str(e)}"
        )
        raise HTTPException(status_code=401, detail="Invalid token")

@router.get("/auth/me", response_model=UserResponse)
async def get_current_user_info(current_user: Dict[str, Any] = Depends(require_current_user)):
    """
    Get current authenticated user information
    Requires valid JWT token authentication
    """
    return UserResponse(**current_user)

async def validate_user_credentials(credentials: Dict[str, Any]) -> Dict[str, Any] | None:
    """
    Validate user credentials against your Supabase database
    Returns user data if valid, None if invalid
    """
    username = credentials.get("username")
    password = credentials.get("password")
    
    if not username or not password:
        AuthEventLogger.log_credential_validation(
            username=username or "unknown",
            success=False,
            failure_reason="Missing username or password"
        )
        return None
    
    # Get user from database
    user = await get_user_by_username(username)
    if not user:
        AuthEventLogger.log_credential_validation(
            username=username,
            success=False,
            failure_reason="User not found in database"
        )
        return None
    
    # Verify password
    if not await verify_password(password, user["password_hash"]):
        AuthEventLogger.log_credential_validation(
            username=username,
            success=False,
            failure_reason="Invalid password"
        )
        return None
    
    AuthEventLogger.log_credential_validation(
        username=username,
        success=True
    )
    return user