File size: 2,584 Bytes
a291087
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
import logging
from datetime import datetime, timedelta, timezone
from typing import Any, Optional, Union

from jose import jwt
from pwdlib import PasswordHash
from fastapi.security import OAuth2PasswordBearer
from .config import settings

# Configure logger for security events
logger = logging.getLogger(__name__)

password_hash = PasswordHash.recommended()

oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/auth/login")

def hash_password(password: str) -> str:
    return password_hash.hash(password)

def verify_password(plain_password: str, hashed_password: str) -> bool:
    """
    Verify a plain password against a hashed password.

    Logs successful and failed verification attempts for security monitoring.
    """
    try:
        is_valid = password_hash.verify(plain_password, hashed_password)
        if is_valid:
            logger.info("Successful password verification for user")
        else:
            logger.warning("Failed password verification attempt")
        return is_valid
    except Exception as e:
        logger.error(f"Error during password verification: {str(e)}")
        return False

def create_access_token(subject: Union[str, Any], expires_delta: Optional[timedelta] = None) -> str:
    """
    Create an access token with the given subject and expiration.

    Logs successful token creation for audit purposes.
    """
    if expires_delta:
        expire = datetime.now(timezone.utc) + expires_delta
    else:
        expire = datetime.now(timezone.utc) + timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)

    to_encode = {"exp": expire, "sub": str(subject)}
    encoded_jwt = jwt.encode(to_encode, settings.JWT_SECRET, algorithm=settings.JWT_ALGORITHM)

    logger.info(f"JWT token created for subject: {str(subject)[:10]}...")
    return encoded_jwt

def decode_token(token: str) -> Optional[str]:
    """
    Decode a JWT token and return the subject.

    Logs successful and failed token verification attempts for security monitoring.
    """
    try:
        payload = jwt.decode(token, settings.JWT_SECRET, algorithms=[settings.JWT_ALGORITHM])
        subject = payload.get("sub")

        if subject:
            logger.info(f"Successful JWT verification for subject: {subject}")
        else:
            logger.warning("JWT token decoded but no subject found")

        return subject
    except jwt.JWTError as e:
        logger.warning(f"JWT verification failed: {str(e)}")
        return None
    except Exception as e:
        logger.error(f"Unexpected error during JWT verification: {str(e)}")
        return None