| """ |
| SPARKNET Authentication Module |
| JWT-based authentication with OAuth2 support. |
| """ |
|
|
| from fastapi import Depends, HTTPException, status |
| from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm |
| from jose import JWTError, jwt |
| from passlib.context import CryptContext |
| from pydantic import BaseModel |
| from datetime import datetime, timedelta |
| from typing import Optional, List |
| from pathlib import Path |
| import os |
| import json |
| import uuid |
|
|
| |
| SECRET_KEY = os.getenv("SPARKNET_SECRET_KEY", "sparknet-super-secret-key-change-in-production") |
| ALGORITHM = "HS256" |
| ACCESS_TOKEN_EXPIRE_MINUTES = 30 |
|
|
| |
| pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") |
|
|
| |
| oauth2_scheme = OAuth2PasswordBearer(tokenUrl="api/auth/token", auto_error=False) |
|
|
| |
| USERS_FILE = Path(__file__).parent.parent / "data" / "users.json" |
| USERS_FILE.parent.mkdir(parents=True, exist_ok=True) |
|
|
|
|
| class User(BaseModel): |
| """User model.""" |
| user_id: str |
| username: str |
| email: str |
| hashed_password: str |
| is_active: bool = True |
| is_admin: bool = False |
| scopes: List[str] = [] |
| created_at: datetime = None |
|
|
| class Config: |
| json_encoders = { |
| datetime: lambda v: v.isoformat() if v else None |
| } |
|
|
|
|
| class UserInDB(User): |
| """User model with password hash.""" |
| pass |
|
|
|
|
| class TokenData(BaseModel): |
| """JWT token payload.""" |
| username: Optional[str] = None |
| user_id: Optional[str] = None |
| scopes: List[str] = [] |
|
|
|
|
| def _load_users() -> dict: |
| """Load users from file.""" |
| if USERS_FILE.exists(): |
| try: |
| with open(USERS_FILE) as f: |
| data = json.load(f) |
| return {u["username"]: User(**u) for u in data} |
| except Exception: |
| pass |
| return {} |
|
|
|
|
| def _save_users(users: dict): |
| """Save users to file.""" |
| with open(USERS_FILE, "w") as f: |
| json.dump([u.dict() for u in users.values()], f, default=str, indent=2) |
|
|
|
|
| def verify_password(plain_password: str, hashed_password: str) -> bool: |
| """Verify a password against its hash.""" |
| return pwd_context.verify(plain_password, hashed_password) |
|
|
|
|
| def get_password_hash(password: str) -> str: |
| """Hash a password.""" |
| return pwd_context.hash(password) |
|
|
|
|
| def get_user(username: str) -> Optional[UserInDB]: |
| """Get a user by username.""" |
| users = _load_users() |
| if username in users: |
| return UserInDB(**users[username].dict()) |
| return None |
|
|
|
|
| def authenticate_user(username: str, password: str) -> Optional[UserInDB]: |
| """Authenticate a user.""" |
| user = get_user(username) |
| if not user: |
| return None |
| if not verify_password(password, user.hashed_password): |
| return None |
| return user |
|
|
|
|
| def create_access_token(data: dict, expires_delta: Optional[timedelta] = None) -> str: |
| """Create a JWT access token.""" |
| to_encode = data.copy() |
| if expires_delta: |
| expire = datetime.utcnow() + expires_delta |
| else: |
| expire = datetime.utcnow() + timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES) |
| to_encode.update({"exp": expire}) |
| encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) |
| return encoded_jwt |
|
|
|
|
| async def get_current_user(token: str = Depends(oauth2_scheme)) -> Optional[UserInDB]: |
| """Get the current user from JWT token.""" |
| if not token: |
| return None |
|
|
| try: |
| payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) |
| username: str = payload.get("sub") |
| if username is None: |
| return None |
| token_data = TokenData( |
| username=username, |
| user_id=payload.get("user_id"), |
| scopes=payload.get("scopes", []) |
| ) |
| except JWTError: |
| return None |
|
|
| user = get_user(token_data.username) |
| return user |
|
|
|
|
| async def get_current_active_user( |
| current_user: Optional[UserInDB] = Depends(get_current_user) |
| ) -> Optional[UserInDB]: |
| """Get current active user (authentication optional).""" |
| if current_user and not current_user.is_active: |
| return None |
| return current_user |
|
|
|
|
| async def require_auth( |
| current_user: Optional[UserInDB] = Depends(get_current_user) |
| ) -> UserInDB: |
| """Require authentication (raises exception if not authenticated).""" |
| credentials_exception = HTTPException( |
| status_code=status.HTTP_401_UNAUTHORIZED, |
| detail="Could not validate credentials", |
| headers={"WWW-Authenticate": "Bearer"}, |
| ) |
| if not current_user: |
| raise credentials_exception |
| if not current_user.is_active: |
| raise HTTPException(status_code=400, detail="Inactive user") |
| return current_user |
|
|
|
|
| async def require_admin( |
| current_user: UserInDB = Depends(require_auth) |
| ) -> UserInDB: |
| """Require admin privileges.""" |
| if not current_user.is_admin: |
| raise HTTPException( |
| status_code=status.HTTP_403_FORBIDDEN, |
| detail="Admin privileges required" |
| ) |
| return current_user |
|
|
|
|
| def create_user(username: str, email: str, password: str, is_admin: bool = False) -> User: |
| """Create a new user.""" |
| users = _load_users() |
|
|
| if username in users: |
| raise ValueError(f"User {username} already exists") |
|
|
| user = User( |
| user_id=str(uuid.uuid4()), |
| username=username, |
| email=email, |
| hashed_password=get_password_hash(password), |
| is_active=True, |
| is_admin=is_admin, |
| scopes=["read", "write"] if not is_admin else ["read", "write", "admin"], |
| created_at=datetime.now() |
| ) |
|
|
| users[username] = user |
| _save_users(users) |
| return user |
|
|
|
|
| def delete_user(username: str) -> bool: |
| """Delete a user.""" |
| users = _load_users() |
| if username in users: |
| del users[username] |
| _save_users(users) |
| return True |
| return False |
|
|
|
|
| |
| def init_default_admin(): |
| """Create default admin user if no users exist.""" |
| users = _load_users() |
| if not users: |
| try: |
| create_user( |
| username="admin", |
| email="[email protected]", |
| password="admin123", |
| is_admin=True |
| ) |
| print("Default admin user created: admin / admin123") |
| except Exception as e: |
| print(f"Could not create default admin: {e}") |
|
|
|
|
| |
| from fastapi import APIRouter |
|
|
| auth_router = APIRouter() |
|
|
|
|
| @auth_router.post("/token") |
| async def login_for_access_token(form_data: OAuth2PasswordRequestForm = Depends()): |
| """OAuth2 compatible token login.""" |
| user = authenticate_user(form_data.username, form_data.password) |
| if not user: |
| raise HTTPException( |
| status_code=status.HTTP_401_UNAUTHORIZED, |
| detail="Incorrect username or password", |
| headers={"WWW-Authenticate": "Bearer"}, |
| ) |
| access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES) |
| access_token = create_access_token( |
| data={ |
| "sub": user.username, |
| "user_id": user.user_id, |
| "scopes": user.scopes |
| }, |
| expires_delta=access_token_expires |
| ) |
| return { |
| "access_token": access_token, |
| "token_type": "bearer", |
| "expires_in": ACCESS_TOKEN_EXPIRE_MINUTES * 60 |
| } |
|
|
|
|
| @auth_router.post("/register") |
| async def register_user( |
| username: str, |
| email: str, |
| password: str, |
| ): |
| """Register a new user.""" |
| try: |
| user = create_user(username, email, password) |
| return { |
| "user_id": user.user_id, |
| "username": user.username, |
| "email": user.email, |
| "message": "User created successfully" |
| } |
| except ValueError as e: |
| raise HTTPException(status_code=400, detail=str(e)) |
|
|
|
|
| @auth_router.get("/me") |
| async def read_users_me(current_user: UserInDB = Depends(require_auth)): |
| """Get current user information.""" |
| return { |
| "user_id": current_user.user_id, |
| "username": current_user.username, |
| "email": current_user.email, |
| "is_active": current_user.is_active, |
| "is_admin": current_user.is_admin, |
| "scopes": current_user.scopes |
| } |
|
|
|
|
| @auth_router.get("/users") |
| async def list_users(current_user: UserInDB = Depends(require_admin)): |
| """List all users (admin only).""" |
| users = _load_users() |
| return [ |
| { |
| "user_id": u.user_id, |
| "username": u.username, |
| "email": u.email, |
| "is_active": u.is_active, |
| "is_admin": u.is_admin |
| } |
| for u in users.values() |
| ] |
|
|
|
|
| @auth_router.delete("/users/{username}") |
| async def delete_user_endpoint( |
| username: str, |
| current_user: UserInDB = Depends(require_admin) |
| ): |
| """Delete a user (admin only).""" |
| if username == current_user.username: |
| raise HTTPException(status_code=400, detail="Cannot delete yourself") |
| if delete_user(username): |
| return {"status": "deleted", "username": username} |
| raise HTTPException(status_code=404, detail=f"User not found: {username}") |
|
|