Phase 1 Complete by Claude Code
This commit is contained in:
@@ -1 +1,47 @@
|
||||
# TODO: JWT verification, role checks
|
||||
from fastapi import Depends
|
||||
from fastapi.security import HTTPBearer, HTTPAuthorizationCredentials
|
||||
from jose import JWTError
|
||||
from auth.utils import decode_access_token
|
||||
from auth.models import TokenPayload, Role
|
||||
from shared.exceptions import AuthenticationError, AuthorizationError
|
||||
|
||||
security = HTTPBearer()
|
||||
|
||||
|
||||
async def get_current_user(
|
||||
credentials: HTTPAuthorizationCredentials = Depends(security),
|
||||
) -> TokenPayload:
|
||||
try:
|
||||
payload = decode_access_token(credentials.credentials)
|
||||
token_data = TokenPayload(
|
||||
sub=payload["sub"],
|
||||
email=payload["email"],
|
||||
role=payload["role"],
|
||||
name=payload["name"],
|
||||
)
|
||||
except (JWTError, KeyError):
|
||||
raise AuthenticationError()
|
||||
return token_data
|
||||
|
||||
|
||||
def require_roles(*allowed_roles: Role):
|
||||
async def role_checker(
|
||||
current_user: TokenPayload = Depends(get_current_user),
|
||||
) -> TokenPayload:
|
||||
if current_user.role == Role.superadmin:
|
||||
return current_user
|
||||
if current_user.role not in [r.value for r in allowed_roles]:
|
||||
raise AuthorizationError()
|
||||
return current_user
|
||||
return role_checker
|
||||
|
||||
|
||||
# Pre-built convenience dependencies
|
||||
require_superadmin = require_roles(Role.superadmin)
|
||||
require_melody_access = require_roles(Role.superadmin, Role.melody_editor)
|
||||
require_device_access = require_roles(Role.superadmin, Role.device_manager)
|
||||
require_user_access = require_roles(Role.superadmin, Role.user_manager)
|
||||
require_viewer = require_roles(
|
||||
Role.superadmin, Role.melody_editor, Role.device_manager,
|
||||
Role.user_manager, Role.viewer,
|
||||
)
|
||||
|
||||
@@ -1 +1,40 @@
|
||||
# TODO: User/token Pydantic schemas
|
||||
from pydantic import BaseModel
|
||||
from typing import Optional
|
||||
from enum import Enum
|
||||
|
||||
|
||||
class Role(str, Enum):
|
||||
superadmin = "superadmin"
|
||||
melody_editor = "melody_editor"
|
||||
device_manager = "device_manager"
|
||||
user_manager = "user_manager"
|
||||
viewer = "viewer"
|
||||
|
||||
|
||||
class AdminUserInDB(BaseModel):
|
||||
uid: str
|
||||
email: str
|
||||
hashed_password: str
|
||||
name: str
|
||||
role: Role
|
||||
is_active: bool = True
|
||||
|
||||
|
||||
class LoginRequest(BaseModel):
|
||||
email: str
|
||||
password: str
|
||||
|
||||
|
||||
class TokenResponse(BaseModel):
|
||||
access_token: str
|
||||
token_type: str = "bearer"
|
||||
role: str
|
||||
name: str
|
||||
|
||||
|
||||
class TokenPayload(BaseModel):
|
||||
sub: str
|
||||
email: str
|
||||
role: str
|
||||
name: str
|
||||
exp: Optional[int] = None
|
||||
|
||||
@@ -1 +1,42 @@
|
||||
# TODO: Login / token endpoints
|
||||
from fastapi import APIRouter
|
||||
from shared.firebase import get_db
|
||||
from auth.models import LoginRequest, TokenResponse
|
||||
from auth.utils import verify_password, create_access_token
|
||||
from shared.exceptions import AuthenticationError
|
||||
|
||||
router = APIRouter(prefix="/api/auth", tags=["auth"])
|
||||
|
||||
|
||||
@router.post("/login", response_model=TokenResponse)
|
||||
async def login(body: LoginRequest):
|
||||
db = get_db()
|
||||
if not db:
|
||||
raise AuthenticationError("Service unavailable")
|
||||
|
||||
users_ref = db.collection("admin_users")
|
||||
query = users_ref.where("email", "==", body.email).limit(1).get()
|
||||
|
||||
if not query:
|
||||
raise AuthenticationError("Invalid email or password")
|
||||
|
||||
doc = query[0]
|
||||
user_data = doc.to_dict()
|
||||
|
||||
if not user_data.get("is_active", True):
|
||||
raise AuthenticationError("Account is disabled")
|
||||
|
||||
if not verify_password(body.password, user_data["hashed_password"]):
|
||||
raise AuthenticationError("Invalid email or password")
|
||||
|
||||
token = create_access_token({
|
||||
"sub": doc.id,
|
||||
"email": user_data["email"],
|
||||
"role": user_data["role"],
|
||||
"name": user_data["name"],
|
||||
})
|
||||
|
||||
return TokenResponse(
|
||||
access_token=token,
|
||||
role=user_data["role"],
|
||||
name=user_data["name"],
|
||||
)
|
||||
|
||||
@@ -1 +1,35 @@
|
||||
# TODO: Password hashing, token creation
|
||||
from datetime import datetime, timedelta, timezone
|
||||
from jose import jwt
|
||||
from passlib.context import CryptContext
|
||||
from config import settings
|
||||
|
||||
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
|
||||
|
||||
|
||||
def hash_password(password: str) -> str:
|
||||
return pwd_context.hash(password)
|
||||
|
||||
|
||||
def verify_password(plain_password: str, hashed_password: str) -> bool:
|
||||
return pwd_context.verify(plain_password, hashed_password)
|
||||
|
||||
|
||||
def create_access_token(data: dict) -> str:
|
||||
to_encode = data.copy()
|
||||
expire = datetime.now(timezone.utc) + timedelta(
|
||||
minutes=settings.jwt_expiration_minutes
|
||||
)
|
||||
to_encode.update({"exp": expire})
|
||||
return jwt.encode(
|
||||
to_encode,
|
||||
settings.jwt_secret_key,
|
||||
algorithm=settings.jwt_algorithm,
|
||||
)
|
||||
|
||||
|
||||
def decode_access_token(token: str) -> dict:
|
||||
return jwt.decode(
|
||||
token,
|
||||
settings.jwt_secret_key,
|
||||
algorithms=[settings.jwt_algorithm],
|
||||
)
|
||||
|
||||
@@ -2,6 +2,7 @@ from fastapi import FastAPI
|
||||
from fastapi.middleware.cors import CORSMiddleware
|
||||
from config import settings
|
||||
from shared.firebase import init_firebase, firebase_initialized
|
||||
from auth.router import router as auth_router
|
||||
|
||||
app = FastAPI(
|
||||
title="BellSystems Admin Panel",
|
||||
@@ -18,6 +19,8 @@ app.add_middleware(
|
||||
allow_headers=["*"],
|
||||
)
|
||||
|
||||
app.include_router(auth_router)
|
||||
|
||||
|
||||
@app.on_event("startup")
|
||||
async def startup():
|
||||
|
||||
60
backend/seed_admin.py
Normal file
60
backend/seed_admin.py
Normal file
@@ -0,0 +1,60 @@
|
||||
"""
|
||||
Seed script to create the first superadmin user in Firestore.
|
||||
|
||||
Usage:
|
||||
python seed_admin.py
|
||||
python seed_admin.py --email admin@bellsystems.com --password secret --name "Admin"
|
||||
"""
|
||||
import argparse
|
||||
import sys
|
||||
from getpass import getpass
|
||||
|
||||
from shared.firebase import init_firebase, get_db
|
||||
from auth.utils import hash_password
|
||||
|
||||
|
||||
def seed_superadmin(email: str, password: str, name: str):
|
||||
init_firebase()
|
||||
db = get_db()
|
||||
if not db:
|
||||
print("ERROR: Firebase initialization failed.")
|
||||
sys.exit(1)
|
||||
|
||||
existing = (
|
||||
db.collection("admin_users")
|
||||
.where("email", "==", email)
|
||||
.limit(1)
|
||||
.get()
|
||||
)
|
||||
if existing:
|
||||
print(f"User with email '{email}' already exists. Aborting.")
|
||||
sys.exit(1)
|
||||
|
||||
user_data = {
|
||||
"email": email,
|
||||
"hashed_password": hash_password(password),
|
||||
"name": name,
|
||||
"role": "superadmin",
|
||||
"is_active": True,
|
||||
}
|
||||
|
||||
doc_ref = db.collection("admin_users").add(user_data)
|
||||
print(f"Superadmin created successfully!")
|
||||
print(f" Email: {email}")
|
||||
print(f" Name: {name}")
|
||||
print(f" Role: superadmin")
|
||||
print(f" Doc ID: {doc_ref[1].id}")
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
parser = argparse.ArgumentParser(description="Seed a superadmin user")
|
||||
parser.add_argument("--email", default=None)
|
||||
parser.add_argument("--password", default=None)
|
||||
parser.add_argument("--name", default=None)
|
||||
args = parser.parse_args()
|
||||
|
||||
email = args.email or input("Email: ")
|
||||
name = args.name or input("Name: ")
|
||||
password = args.password or getpass("Password: ")
|
||||
|
||||
seed_superadmin(email, password, name)
|
||||
@@ -1 +1,20 @@
|
||||
# TODO: Custom error handlers
|
||||
from fastapi import HTTPException
|
||||
|
||||
|
||||
class AuthenticationError(HTTPException):
|
||||
def __init__(self, detail: str = "Could not validate credentials"):
|
||||
super().__init__(
|
||||
status_code=401,
|
||||
detail=detail,
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
|
||||
|
||||
class AuthorizationError(HTTPException):
|
||||
def __init__(self, detail: str = "Insufficient permissions"):
|
||||
super().__init__(status_code=403, detail=detail)
|
||||
|
||||
|
||||
class NotFoundError(HTTPException):
|
||||
def __init__(self, resource: str = "Resource"):
|
||||
super().__init__(status_code=404, detail=f"{resource} not found")
|
||||
|
||||
Reference in New Issue
Block a user