users.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448
  1. import json
  2. from logging import getLogger
  3. from uuid import uuid4
  4. import redis
  5. from cryptography.fernet import Fernet
  6. from fastapi import APIRouter, Depends, Request
  7. from fastapi.responses import FileResponse, HTMLResponse, JSONResponse
  8. from auth.security import generate_token
  9. from auth.security import get_current_user
  10. from config.mails import REGISTER_MAIL
  11. from config.messages import ErrorResponse, SuccessResponse, UserResponse
  12. from config.settings import APPNAME, PIN_KEY
  13. from models.user import LoginRequest, PinUserRequest, RegisterUserRequest, User, User, UserIDRequest, UserRewardRequest
  14. from services.data_service import UserDataService
  15. from services.email_service import get_email_sender
  16. from services.print_service import print_ticket
  17. from services.logging_service import structured_logger, LogLevel
  18. from utils.rut import validate_rut
  19. fernet = Fernet(PIN_KEY.encode())
  20. logger = getLogger(__name__)
  21. user_data_service = UserDataService()
  22. user_router = APIRouter()
  23. def unique_pin_generate():
  24. """Generate a unique 4-digit PIN"""
  25. import random
  26. pin = str(random.randint(1000, 9999))
  27. return pin
  28. @user_router.post("/exists")
  29. async def exists_user(request: UserIDRequest):
  30. """Check if user exists"""
  31. user = user_data_service.get_by_id(request.id)
  32. if user:
  33. return JSONResponse(status_code=200, content={"exists": True, "message": UserResponse.USER_EXISTS})
  34. else:
  35. return JSONResponse(status_code=404, content={"exists": False, "message": UserResponse.USER_DOES_NOT_EXIST})
  36. @user_router.post("/register")
  37. async def register_user(request: RegisterUserRequest):
  38. """Register a new user"""
  39. logger.info(f"Registration attempt for email: {request.email}")
  40. structured_logger.log_user_event(
  41. f"User registration attempt",
  42. LogLevel.INFO,
  43. {
  44. "email": request.email,
  45. "name": request.name,
  46. "rut": request.rut
  47. },
  48. user_email=request.email
  49. )
  50. # Validate RUT
  51. if not validate_rut(request.rut):
  52. logger.warning(f"Registration failed for {request.email}: invalid RUT {request.rut}")
  53. structured_logger.log_user_event(
  54. "Registration failed: invalid RUT",
  55. LogLevel.WARNING,
  56. {
  57. "email": request.email,
  58. "rut": request.rut,
  59. "reason": "Invalid RUT format"
  60. },
  61. user_email=request.email
  62. )
  63. return JSONResponse(status_code=400, content={"message": ErrorResponse.INVALID_RUT})
  64. # Check if user already exists by email
  65. try:
  66. user = user_data_service.get_by_email(request.email)
  67. if user:
  68. logger.warning(f"Registration failed for {request.email}: user already exists")
  69. structured_logger.log_user_event(
  70. "Registration failed: user already exists",
  71. LogLevel.WARNING,
  72. {
  73. "email": request.email,
  74. "existing_user_id": user.id,
  75. "reason": "Email already registered"
  76. },
  77. user_id=user.id,
  78. user_email=request.email
  79. )
  80. return JSONResponse(status_code=400, content={"message": UserResponse.USER_ALREADY_EXISTS})
  81. # Check if RUT already exists
  82. user = user_data_service.get_by_rut(request.rut)
  83. if user:
  84. logger.warning(f"Registration failed for {request.email}: RUT already exists")
  85. structured_logger.log_user_event(
  86. "Registration failed: RUT already exists",
  87. LogLevel.WARNING,
  88. {
  89. "email": request.email,
  90. "rut": request.rut,
  91. "existing_user_id": user.id,
  92. "reason": "RUT already registered"
  93. },
  94. user_email=request.email
  95. )
  96. return JSONResponse(status_code=400, content={"message": UserResponse.USER_ALREADY_EXISTS})
  97. except Exception as e:
  98. error_msg = f"Database error during user validation: {e}"
  99. logger.error(error_msg)
  100. structured_logger.log_database_event(
  101. "User validation error during registration",
  102. LogLevel.ERROR,
  103. {
  104. "email": request.email,
  105. "error": str(e),
  106. "error_type": type(e).__name__
  107. },
  108. user_email=request.email
  109. )
  110. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  111. logger.info(f"Registering user: {request.email}")
  112. try:
  113. # Setup Redis client and verification code
  114. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  115. verification_code = str(uuid4())
  116. user_data = {
  117. "name": request.name,
  118. "email": request.email,
  119. "rut": request.rut
  120. }
  121. redis_client.set(f"verify:{verification_code}", json.dumps(user_data))
  122. redis_client.expire(f"verify:{verification_code}", 3600) # Expire in 1 hour
  123. structured_logger.log_user_event(
  124. "Verification code generated for user registration",
  125. LogLevel.INFO,
  126. {
  127. "email": request.email,
  128. "verification_code": verification_code,
  129. "expires_in": 3600
  130. },
  131. user_email=request.email
  132. )
  133. # Send verification email
  134. get_email_sender().send_email(
  135. REGISTER_MAIL["subject"],
  136. REGISTER_MAIL["body"],
  137. [request.email],
  138. name=request.name,
  139. app_name=APPNAME,
  140. verification_code=verification_code
  141. )
  142. structured_logger.log_email_event(
  143. "Registration verification email sent",
  144. LogLevel.INFO,
  145. {
  146. "email": request.email,
  147. "verification_code": verification_code
  148. },
  149. user_email=request.email
  150. )
  151. logger.info(f"Registration initiated successfully for {request.email}")
  152. return JSONResponse(status_code=201, content={"message": SuccessResponse.USER_CREATED_SUCCESS})
  153. except Exception as e:
  154. error_msg = f"Error during registration process for {request.email}: {e}"
  155. logger.error(error_msg)
  156. structured_logger.log_user_event(
  157. "Registration process failed",
  158. LogLevel.ERROR,
  159. {
  160. "email": request.email,
  161. "error": str(e),
  162. "error_type": type(e).__name__,
  163. "step": "verification_setup_or_email"
  164. },
  165. user_email=request.email
  166. )
  167. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  168. @user_router.post("/create-user")
  169. async def create_user(request: PinUserRequest, q: str):
  170. """Create a new user with PIN"""
  171. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  172. data = redis_client.get(f"verify:{q}")
  173. if not redis_client.get(f"verify:{q}"):
  174. return JSONResponse(status_code=400, content={"message": ErrorResponse.INVALID_VERIFICATION_CODE})
  175. else:
  176. data = json.loads(str(data))
  177. name = data.get("name")
  178. email = data.get("email")
  179. rut = data.get("rut")
  180. pin = request.pin
  181. if not request.pin or len(request.pin) != 4:
  182. return JSONResponse(status_code=400, content={"message": ErrorResponse.INVALID_PIN})
  183. userID = user_data_service.create(name, email, rut, pin)
  184. if userID == -1:
  185. return JSONResponse(status_code=400, content={"message": UserResponse.USER_ALREADY_EXISTS})
  186. user = user_data_service.get_by_id(userID)
  187. if not user:
  188. return JSONResponse(status_code=500, content={"message": ErrorResponse.USER_CREATION_ERROR})
  189. return JSONResponse(status_code=201, content={"message": SuccessResponse.USER_CREATED_SUCCESS, "data": {
  190. **user.model_dump(exclude={"pin_hash"}),
  191. "token": generate_token(user.email)
  192. }})
  193. @user_router.post("/login")
  194. async def login_user(request: LoginRequest, http_request: Request):
  195. """Login user with email and PIN"""
  196. logger.info(f"Login attempt for email: {request.email}")
  197. structured_logger.log_security_event(
  198. f"Login attempt for user {request.email}",
  199. LogLevel.INFO,
  200. {
  201. "email": request.email,
  202. "user_agent": http_request.headers.get("user-agent", "unknown"),
  203. "referer": http_request.headers.get("referer", "unknown"),
  204. "client_ip": http_request.client.host if http_request.client else "unknown"
  205. },
  206. user_email=request.email
  207. )
  208. try:
  209. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  210. is_blocked = redis_client.get(f"blocked:{request.email}")
  211. if is_blocked:
  212. try:
  213. blocked_time_raw = redis_client.ttl(f"blocked:{request.email}")
  214. blocked_minutes = max(0, int(blocked_time_raw) // 60) if blocked_time_raw and int(blocked_time_raw) > 0 else 0 # type: ignore
  215. except (ValueError, TypeError):
  216. blocked_minutes = 0
  217. logger.warning(f"Login attempt for blocked user: {request.email}, blocked for {blocked_minutes} minutes")
  218. structured_logger.log_security_event(
  219. f"Login attempt by blocked user",
  220. LogLevel.WARNING,
  221. {
  222. "email": request.email,
  223. "blocked_time_remaining_minutes": blocked_minutes,
  224. "user_agent": http_request.headers.get("user-agent", "unknown")
  225. },
  226. user_email=request.email
  227. )
  228. return JSONResponse(
  229. status_code=403,
  230. content={"message": UserResponse.USER_FORMAT_BLOCKED.format(time=f"{blocked_minutes} minutos")}
  231. )
  232. # Attempt login
  233. user = user_data_service.login(request.email, request.pin)
  234. if user:
  235. # Successful login
  236. logger.info(f"Successful login for user: {request.email}")
  237. # Check admin access
  238. referer = http_request.headers.get("referer", "")
  239. if referer and "admin" in referer:
  240. user_permissions = user_data_service.permissions(user.id)
  241. if user_permissions == 0:
  242. logger.warning(f"Unauthorized admin access attempt by {request.email}")
  243. structured_logger.log_security_event(
  244. f"Unauthorized admin access attempt",
  245. LogLevel.WARNING,
  246. {
  247. "email": request.email,
  248. "user_id": user.id,
  249. "permissions": user_permissions,
  250. "referer": referer
  251. },
  252. user_id=user.id,
  253. user_email=request.email
  254. )
  255. return JSONResponse(status_code=403, content={"message": UserResponse.NOT_PERMITTED})
  256. # Clear login attempts and log successful login
  257. redis_client.delete(f"login_attempts:{request.email}")
  258. structured_logger.log_security_event(
  259. f"Successful login",
  260. LogLevel.INFO,
  261. {
  262. "email": request.email,
  263. "user_id": user.id,
  264. "user_name": user.name,
  265. "permissions": user_data_service.permissions(user.id),
  266. "is_admin_login": "admin" in referer,
  267. "reward_progress": user.reward_progress
  268. },
  269. user_id=user.id,
  270. user_email=request.email
  271. )
  272. return JSONResponse(status_code=200, content={
  273. "message": SuccessResponse.LOGIN_SUCCESS,
  274. "data": {
  275. "id": user.id,
  276. "name": user.name,
  277. "email": user.email,
  278. "kleincoins": user.kleincoins,
  279. "created_at": user.created_at,
  280. "token": generate_token(user.email),
  281. "reward_progress": user.reward_progress,
  282. }
  283. })
  284. else:
  285. # Failed login: increment attempts in Redis
  286. redis_client.incr(f"login_attempts:{request.email}")
  287. redis_client.expire(f"login_attempts:{request.email}", 3600)
  288. redis_attempts = redis_client.get(f"login_attempts:{request.email}")
  289. attempts = int(redis_attempts) if redis_attempts else 0 # type: ignore
  290. if attempts >= 5:
  291. # Too many attempts, block login
  292. redis_client.set(f"blocked:{request.email}", "true")
  293. redis_client.expire(f"blocked:{request.email}", 3600)
  294. logger.warning(f"Too many login attempts for {request.email}. User blocked.")
  295. structured_logger.log_security_event(
  296. f"User blocked due to too many failed login attempts",
  297. LogLevel.WARNING,
  298. {
  299. "email": request.email,
  300. "failed_attempts": attempts,
  301. "blocked_duration_seconds": 3600
  302. },
  303. user_email=request.email
  304. )
  305. return JSONResponse(status_code=429, content={"message": ErrorResponse.TOO_MANY_ATTEMPTS})
  306. else:
  307. logger.warning(f"Failed login attempt for {request.email}. Attempts: {attempts}")
  308. structured_logger.log_security_event(
  309. f"Failed login attempt",
  310. LogLevel.WARNING,
  311. {
  312. "email": request.email,
  313. "failed_attempts": attempts,
  314. "attempts_remaining": 5 - attempts,
  315. "reason": "Invalid credentials"
  316. },
  317. user_email=request.email
  318. )
  319. # Return unauthorized with attempts remaining
  320. return JSONResponse(status_code=401, content={
  321. "message": ErrorResponse.INVALID_CREDENTIALS,
  322. "attempts_remaining": 5 - attempts if attempts else 5
  323. })
  324. except redis.RedisError as e:
  325. error_msg = f"Redis error during login for {request.email}: {e}"
  326. logger.error(error_msg)
  327. structured_logger.log_system_event(
  328. "Redis error during login process",
  329. LogLevel.ERROR,
  330. {
  331. "email": request.email,
  332. "error": str(e),
  333. "error_type": "RedisError"
  334. }
  335. )
  336. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  337. except Exception as e:
  338. error_msg = f"Unexpected error during login for {request.email}: {e}"
  339. logger.error(error_msg)
  340. structured_logger.log_security_event(
  341. "Unexpected error during login",
  342. LogLevel.ERROR,
  343. {
  344. "email": request.email,
  345. "error": str(e),
  346. "error_type": type(e).__name__
  347. },
  348. user_email=request.email
  349. )
  350. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  351. @user_router.delete("/delete")
  352. async def delete_user(request: UserIDRequest):
  353. """Delete a user by ID"""
  354. user = user_data_service.delete(request.id)
  355. if user:
  356. return JSONResponse(status_code=200, content={"message": SuccessResponse.USER_DELETED_SUCCESS, "data": user})
  357. else:
  358. return JSONResponse(status_code=404, content={"message": UserResponse.USER_NOT_FOUND})
  359. @user_router.post("/reward")
  360. async def reward_user(request: UserRewardRequest, user: User = Depends(get_current_user)):
  361. """Reward a user with 1 free beer"""
  362. if user.reward_progress < 100:
  363. return JSONResponse(status_code=400, content={"message": UserResponse.REWARD_INSUFFICIENT_PROGRESS.format(progress=user.reward_progress)})
  364. if not user:
  365. return JSONResponse(status_code=404, content={"message": UserResponse.USER_NOT_FOUND.format(user_id=request.id)})
  366. user_data_service.set_reward_progress(user.id, 0)
  367. print_ticket(request.tableNumber)
  368. return JSONResponse(status_code=200, content={"message": SuccessResponse.REWARD_SUCCESS, "data": {
  369. "id": user.id,
  370. "name": user.name,
  371. "email": user.email,
  372. "reward_progress": 0
  373. }})
  374. @user_router.get("/user")
  375. async def get_cur_user(current_user:User = Depends(get_current_user)):
  376. """Get current user information"""
  377. return JSONResponse(status_code=200, content={"data": current_user.model_dump(exclude={"pin_hash", "kleincoins", "rut"})})
  378. @user_router.get("/all")
  379. async def get_all_users():
  380. """Get all users"""
  381. users = list(map(lambda u: u.model_dump(), user_data_service.get_all()))
  382. return JSONResponse(status_code=200, content={"data": users})
  383. from fastapi import Query
  384. verify_router = APIRouter()
  385. @verify_router.get("/")
  386. async def verify_user(q: str = Query(..., description="q parameter")):
  387. """Verify a user by ID"""
  388. # get url params
  389. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  390. if not redis_client.get(f"verify:{q}"):
  391. return HTMLResponse(
  392. content="<h1>Invalid verification code</h1>",
  393. status_code=400
  394. )
  395. return FileResponse(
  396. "public/verify.html",
  397. media_type="text/html",
  398. )