131 lines
5.0 KiB
Python
131 lines
5.0 KiB
Python
from datetime import datetime, timedelta, timezone
|
|
import uuid
|
|
from typing import Dict, List
|
|
from jose import jwt, JWTError
|
|
from common.config.app_settings import app_settings
|
|
from fastapi import Depends, HTTPException
|
|
from fastapi.security import HTTPAuthorizationCredentials, HTTPBearer
|
|
|
|
from common.constants.jwt_constants import USER_ROLE_NAMES, USER_PERMISSIONS
|
|
|
|
|
|
class CurrentUser:
|
|
def __init__(self, user_id: str, user_role_names: List[str], user_permission_keys: List[str]):
|
|
self.user_id = user_id
|
|
self.user_role_names = user_role_names
|
|
self.user_permission_keys = user_permission_keys
|
|
|
|
def has_all_permissions(self, permissions: List[str]) -> bool:
|
|
"""Check if the user has all the specified permissions"""
|
|
if not permissions:
|
|
return True
|
|
return all(p in self.user_permission_keys for p in permissions)
|
|
|
|
def has_any_permissions(self, permissions: List[str]) -> bool:
|
|
"""Check if the user has at least one of the specified permissions"""
|
|
if not permissions:
|
|
return True
|
|
return any(p in self.user_permission_keys for p in permissions)
|
|
|
|
|
|
security = HTTPBearer()
|
|
|
|
|
|
class TokenManager:
|
|
def __init__(self):
|
|
self.secret_key = app_settings.JWT_SECRET_KEY
|
|
self.algorithm = app_settings.JWT_ALGORITHM
|
|
self.access_token_expire_minutes = app_settings.ACCESS_TOKEN_EXPIRE_MINUTES
|
|
self.refresh_token_expire_days = app_settings.REFRESH_TOKEN_EXPIRE_DAYS
|
|
|
|
def create_access_token(self, subject: Dict[str, str]) -> str:
|
|
"""
|
|
Generates an access token with a short expiration time.
|
|
"""
|
|
expire = datetime.now(timezone.utc) + timedelta(
|
|
minutes=self.access_token_expire_minutes
|
|
)
|
|
to_encode = {
|
|
"exp": expire,
|
|
"subject": subject, # User identity information
|
|
"type": "access", # Indicate token type
|
|
}
|
|
return jwt.encode(to_encode, self.secret_key, algorithm=self.algorithm)
|
|
|
|
def create_refresh_token(self, subject: Dict[str, str]) -> str:
|
|
"""
|
|
Generates a refresh token with a longer expiration time.
|
|
"""
|
|
expire = datetime.now(timezone.utc) + timedelta(
|
|
days=self.refresh_token_expire_days
|
|
)
|
|
to_encode = {
|
|
"exp": expire,
|
|
"subject": subject, # User identity information
|
|
"type": "refresh", # Indicate token type
|
|
"jti": str(uuid.uuid4()), # Unique identifier for the refresh token
|
|
}
|
|
return jwt.encode(to_encode, self.secret_key, algorithm=self.algorithm)
|
|
|
|
def decode_token(self, token: str) -> Dict:
|
|
"""
|
|
Decodes a JWT token and returns the payload.
|
|
"""
|
|
try:
|
|
payload = jwt.decode(token, self.secret_key, algorithms=[self.algorithm])
|
|
return payload
|
|
except JWTError:
|
|
raise ValueError("Invalid token")
|
|
|
|
def verify_refresh_token(self, token: str) -> bool:
|
|
"""
|
|
Verifies a refresh token to ensure it is valid and not expired.
|
|
"""
|
|
try:
|
|
payload = self.decode_token(token)
|
|
return True
|
|
except ValueError:
|
|
return False
|
|
|
|
def refresh_access_token(self, refresh_token: str, subject: Dict[str, str]) -> str:
|
|
"""
|
|
Verifies the refresh token and creates a new access token.
|
|
"""
|
|
if self.verify_refresh_token(refresh_token):
|
|
return self.create_access_token(subject)
|
|
else:
|
|
raise ValueError("Invalid refresh token")
|
|
|
|
async def get_current_user(self, credentials: HTTPAuthorizationCredentials = Depends(security)) -> CurrentUser:
|
|
"""
|
|
Returns the current user object for the given credentials.
|
|
"""
|
|
try:
|
|
payload = self.decode_token(credentials.credentials)
|
|
user = payload.get("subject")
|
|
if not user or "id" not in user:
|
|
raise HTTPException(status_code=401, detail="Invalid authentication token")
|
|
return CurrentUser(user.get("id"), user.get(USER_ROLE_NAMES), user.get(USER_PERMISSIONS))
|
|
except JWTError:
|
|
raise HTTPException(status_code=401, detail="Invalid authentication token")
|
|
|
|
def has_all_permissions(self, permissions: List[str]):
|
|
"""Check if the user has all the specified permissions"""
|
|
|
|
def inner_dependency(current_user: CurrentUser = Depends(self.get_current_user)):
|
|
if not current_user.has_all_permissions(permissions):
|
|
raise HTTPException(status_code=403, detail="Not allowed")
|
|
return True
|
|
|
|
return inner_dependency
|
|
|
|
def has_any_permissions(self, permissions: List[str]):
|
|
"""Check if the user has at least one of the specified permissions"""
|
|
|
|
def inner_dependency(current_user: CurrentUser = Depends(self.get_current_user)):
|
|
if not current_user.has_any_permissions(permissions):
|
|
raise HTTPException(status_code=403, detail="Not allowed")
|
|
return True
|
|
|
|
return inner_dependency
|