File size: 6,457 Bytes
16c033c
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
from typing import Dict, List, Any, Optional
from pydantic import BaseModel
from datetime import datetime, timedelta
import jwt
from passlib.hash import bcrypt
from enum import Enum
import uuid

class UserRole(Enum):
    ADMIN = "admin"
    USER = "user"
    VIEWER = "viewer"

class Permission(Enum):
    READ = "read"
    WRITE = "write"
    EXECUTE = "execute"
    MANAGE = "manage"

class User(BaseModel):
    """User model"""
    id: str
    username: str
    email: str
    hashed_password: str
    role: UserRole
    tenant_id: str
    permissions: List[Permission]
    metadata: Dict[str, Any]
    created_at: datetime
    last_login: Optional[datetime]
    is_active: bool = True

class Tenant(BaseModel):
    """Tenant model for multi-tenancy"""
    id: str
    name: str
    config: Dict[str, Any]
    created_at: datetime
    features: List[str]
    is_active: bool = True

class AuthManager:
    """Handles authentication and authorization"""
    
    def __init__(self, config: Dict[str, Any]):
        self.config = config
        self.secret_key = config['secret_key']
        self.token_expiry = config.get('token_expiry', 3600)  # 1 hour default
    
    async def create_user(
        self,
        username: str,
        email: str,
        password: str,
        role: UserRole,
        tenant_id: str,
        permissions: List[Permission]
    ) -> User:
        """Create new user"""
        hashed_password = bcrypt.hash(password)
        
        user = User(
            id=str(uuid.uuid4()),
            username=username,
            email=email,
            hashed_password=hashed_password,
            role=role,
            tenant_id=tenant_id,
            permissions=permissions,
            metadata={},
            created_at=datetime.now()
        )
        
        # Store user in database
        await self.store_user(user)
        
        return user
    
    async def authenticate(self, username: str, password: str) -> Optional[str]:
        """Authenticate user and return JWT token"""
        user = await self.get_user_by_username(username)
        if not user or not user.is_active:
            return None
        
        if not bcrypt.verify(password, user.hashed_password):
            return None
        
        # Update last login
        user.last_login = datetime.now()
        await self.update_user(user)
        
        # Generate JWT token
        token_data = {
            'sub': user.id,
            'username': user.username,
            'role': user.role.value,
            'tenant_id': user.tenant_id,
            'permissions': [p.value for p in user.permissions],
            'exp': datetime.utcnow() + timedelta(seconds=self.token_expiry)
        }
        
        return jwt.encode(token_data, self.secret_key, algorithm='HS256')
    
    async def verify_token(self, token: str) -> Optional[Dict[str, Any]]:
        """Verify JWT token and return payload"""
        try:
            payload = jwt.decode(token, self.secret_key, algorithms=['HS256'])
            return payload
        except jwt.ExpiredSignatureError:
            return None
        except jwt.InvalidTokenError:
            return None
    
    async def has_permission(
        self,
        user_id: str,
        permission: Permission,
        resource: str
    ) -> bool:
        """Check if user has specific permission"""
        user = await self.get_user(user_id)
        if not user or not user.is_active:
            return False
        
        # Admin role has all permissions
        if user.role == UserRole.ADMIN:
            return True
        
        # Check specific permission
        return permission in user.permissions

class AuditLogger:
    """Handles audit logging"""
    
    def __init__(self, storage_manager: Any):
        self.storage = storage_manager
    
    async def log_event(
        self,
        event_type: str,
        user_id: str,
        tenant_id: str,
        resource: str,
        action: str,
        status: str,
        details: Dict[str, Any]
    ):
        """Log audit event"""
        event = {
            'event_type': event_type,
            'user_id': user_id,
            'tenant_id': tenant_id,
            'resource': resource,
            'action': action,
            'status': status,
            'details': details,
            'timestamp': datetime.now().isoformat()
        }
        
        await self.storage.store(
            type=StorageType.AUDIT,
            data=event,
            tenant_id=tenant_id
        )

class SecurityManager:
    """Main security manager"""
    
    def __init__(self, config: Dict[str, Any], storage_manager: Any):
        self.config = config
        self.auth_manager = AuthManager(config)
        self.audit_logger = AuditLogger(storage_manager)
    
    async def initialize_tenant(
        self,
        name: str,
        features: List[str],
        config: Dict[str, Any]
    ) -> Tenant:
        """Initialize new tenant"""
        tenant = Tenant(
            id=str(uuid.uuid4()),
            name=name,
            config=config,
            features=features,
            created_at=datetime.now()
        )
        
        # Store tenant
        await self.store_tenant(tenant)
        
        return tenant
    
    async def handle_request(
        self,
        token: str,
        resource: str,
        action: Permission
    ) -> Optional[Dict[str, Any]]:
        """Handle authenticated request"""
        # Verify token
        payload = await self.auth_manager.verify_token(token)
        if not payload:
            return None
        
        # Check permission
        has_permission = await self.auth_manager.has_permission(
            payload['sub'],
            action,
            resource
        )
        
        if not has_permission:
            return None
        
        # Log access
        await self.audit_logger.log_event(
            event_type="access",
            user_id=payload['sub'],
            tenant_id=payload['tenant_id'],
            resource=resource,
            action=action.value,
            status="success",
            details={}
        )
        
        return payload

# Example usage:
security_config = {
    'secret_key': 'your-secret-key',
    'token_expiry': 3600,
    'password_policy': {
        'min_length': 8,
        'require_special': True
    }
}

security_manager = SecurityManager(security_config, storage_manager)