users.py 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392
  1. from datetime import datetime
  2. import json
  3. from logging import getLogger
  4. import re
  5. from uuid import uuid4
  6. from models import user
  7. import redis
  8. from cryptography.fernet import Fernet
  9. from fastapi import APIRouter, Depends, Request
  10. from fastapi.responses import FileResponse, HTMLResponse, JSONResponse
  11. from fastapi.exceptions import HTTPException
  12. from auth.security import generate_token
  13. from auth.security import get_current_user
  14. from config.mails import REGISTER_MAIL, PIN_RECOVERY_MAIL, PIN_SUCCESSFULLY
  15. from config.messages import ErrorResponse, SuccessResponse, UserResponse
  16. from config.settings import APPNAME, DEVELOPMENT, PIN_KEY
  17. from models.user import ForceRegisterUserRequest, LoginRequest, PinRecoveryRequest, PinRecoveryValidateRequest, PinUserRequest, RegisterUserRequest, User, UserIDRequest, UserMail, UserRewardRequest
  18. from services.data_service import BlacklistDataService, UserDataService
  19. from services.email_service import get_email_sender
  20. from services.print_service import print_ticket
  21. import services.recovery_service as recovery_service
  22. from utils.responses import error_response, success_response
  23. from utils.rut import validate_rut
  24. fernet = Fernet(PIN_KEY.encode())
  25. logger = getLogger(__name__)
  26. user_data_service = UserDataService()
  27. blacklist_data_service = BlacklistDataService()
  28. user_router = APIRouter()
  29. redis_client = redis.Redis(host='localhost', port=6379, db=1 if DEVELOPMENT else 0, decode_responses=True)
  30. @user_router.post("/exists")
  31. async def exists_user(request: UserIDRequest):
  32. """Check if user exists"""
  33. user = user_data_service.get_by_id(request.id)
  34. if user:
  35. return success_response(data={"exists": True}, message=UserResponse.USER_EXISTS)
  36. else:
  37. return error_response(error={"exists": False}, message=UserResponse.USER_DOES_NOT_EXIST)
  38. @user_router.post("/register")
  39. async def register_user(request: RegisterUserRequest):
  40. """Register a new user"""
  41. logger.info(f"Registration attempt for email: {request.email}")
  42. # Validate RUT
  43. if not validate_rut(request.rut):
  44. logger.warning(f"Registration failed for {request.email}: invalid RUT {request.rut}")
  45. return error_response(message=ErrorResponse.INVALID_RUT)
  46. # Check if user already exists by email
  47. try:
  48. user = user_data_service.get_by_email(request.email)
  49. if user:
  50. logger.warning(f"Registration failed for {request.email}: user already exists")
  51. return error_response(message=UserResponse.USER_ALREADY_EXISTS)
  52. # Check if RUT already exists
  53. user = user_data_service.get_by_rut(request.rut)
  54. if user:
  55. logger.warning(f"Registration failed for {request.email}: RUT already exists")
  56. return error_response(message=UserResponse.USER_ALREADY_EXISTS)
  57. except Exception as e:
  58. error_msg = f"Database error during user validation: {e}"
  59. logger.error(error_msg)
  60. logger.info(f"Registering user: {request.email}")
  61. try:
  62. verification_code = str(uuid4())
  63. user_data = {
  64. "name": request.name,
  65. "email": request.email,
  66. "rut": request.rut
  67. }
  68. redis_client.set(f"verify:{verification_code}", json.dumps(user_data))
  69. redis_client.expire(f"verify:{verification_code}", 3600) # Expire in 1 hour
  70. logger.info(f"Verification code generated for {request.email}, code: {verification_code}")
  71. # Send verification email
  72. get_email_sender().send_email(
  73. REGISTER_MAIL["subject"],
  74. REGISTER_MAIL["body"],
  75. [request.email],
  76. name=request.name,
  77. app_name=APPNAME,
  78. verification_code=verification_code
  79. )
  80. return success_response(message=SuccessResponse.USER_CREATED_SUCCESS, status_code=201)
  81. except Exception as e:
  82. error_msg = f"Error during registration process for {request.email}: {e}"
  83. logger.error(error_msg)
  84. return error_response(message=f"Error interno del servidor: {e}", status_code=500)
  85. @user_router.post("/create-user")
  86. async def create_user(request: PinUserRequest, q: str):
  87. """Create a new user with PIN"""
  88. data = redis_client.get(f"verify:{q}")
  89. if not redis_client.get(f"verify:{q}"):
  90. return error_response(message=ErrorResponse.INVALID_VERIFICATION_CODE)
  91. else:
  92. data = json.loads(str(data))
  93. name = data.get("name")
  94. email = data.get("email")
  95. rut = data.get("rut")
  96. pin = request.pin
  97. if not request.pin or len(request.pin) != 4:
  98. return error_response(message=ErrorResponse.INVALID_PIN)
  99. userID = user_data_service.create(name, email, rut, pin)
  100. if userID == -1:
  101. return error_response(message=UserResponse.USER_ALREADY_EXISTS)
  102. user = user_data_service.get_by_id(userID)
  103. if not user:
  104. logger.error(f"User creation failed for {email}: user not found after creation")
  105. return error_response(message=ErrorResponse.USER_CREATION_ERROR)
  106. logger.info(f"User created successfully: {email}")
  107. return success_response(data={
  108. **user.model_dump(exclude={"pin_hash"}),
  109. "token": generate_token(user.email)
  110. }, message=SuccessResponse.USER_CREATED_SUCCESS, status_code=201)
  111. @user_router.post("/force-register")
  112. async def force_register_user(request: ForceRegisterUserRequest, current_user: User = Depends(get_current_user)):
  113. """Force register a new user"""
  114. logger.info(f"Force register attempt for email: {request.email}")
  115. if (current_user.permissions or -1) >= 1:
  116. return error_response(message=UserResponse.NOT_PERMITTED)
  117. if not request.pin or len(request.pin) != 4:
  118. return error_response(message=ErrorResponse.INVALID_PIN)
  119. userID = user_data_service.create(request.name, request.email, request.rut, request.pin)
  120. if userID == -1:
  121. return error_response(message=UserResponse.USER_ALREADY_EXISTS)
  122. user = user_data_service.get_by_id(userID)
  123. if not user:
  124. logger.error(f"User creation failed for {request.email}: user not found after creation")
  125. return error_response(message=ErrorResponse.USER_CREATION_ERROR)
  126. logger.info(f"User created successfully: {request.email}")
  127. return success_response(data={
  128. **user.model_dump(exclude={"pin_hash"}),
  129. "token": generate_token(user.email)
  130. }, message=SuccessResponse.USER_CREATED_SUCCESS)
  131. @user_router.post("/login")
  132. async def login_user(request: LoginRequest, http_request: Request):
  133. """Login user with email and PIN"""
  134. logger.info(f"Login attempt for email: {request.email}")
  135. try:
  136. is_blocked = redis_client.get(f"blocked:{request.email}")
  137. if is_blocked:
  138. try:
  139. blocked_time_raw = redis_client.ttl(f"blocked:{request.email}")
  140. blocked_minutes = max(0, int(blocked_time_raw) // 60) if blocked_time_raw and int(blocked_time_raw) > 0 else 0 # type: ignore
  141. except (ValueError, TypeError):
  142. blocked_minutes = 0
  143. logger.warning(f"Login attempt for blocked user: {request.email}, blocked for {blocked_minutes} minutes")
  144. return error_response(
  145. message=UserResponse.USER_FORMAT_BLOCKED.format(time=f"{blocked_minutes} minutos"),
  146. status_code=403
  147. )
  148. # Attempt login
  149. user = user_data_service.login(request.email, request.pin)
  150. if user:
  151. if blacklist_data_service.is_user_blacklisted(user.id):
  152. logger.warning(f"Login attempt for blacklisted user: {request.email}")
  153. return error_response(
  154. message=UserResponse.USER_BLACKLISTED,
  155. status_code=403
  156. )
  157. # Successful login
  158. logger.info(f"Successful login for user: {request.email}")
  159. # Check admin access
  160. referer = http_request.headers.get("Origin", "")
  161. logger.info(f"Login request referer: {referer}")
  162. if referer and "admin" in referer:
  163. user_permissions = user_data_service.permissions(user.id)
  164. if user_permissions == 0:
  165. logger.warning(f"Unauthorized admin access attempt by {request.email}")
  166. return error_response(message=UserResponse.NOT_PERMITTED, status_code=403)
  167. # Clear login attempts and log successful login
  168. redis_client.delete(f"login_attempts:{request.email}")
  169. return success_response({
  170. "id": user.id,
  171. "name": user.name,
  172. "email": user.email,
  173. "kleincoins": user.kleincoins,
  174. "created_at": user.created_at,
  175. "token": generate_token(user.email),
  176. "reward_progress": user.reward_progress,
  177. "permissions": user.permissions
  178. }, message=SuccessResponse.LOGIN_SUCCESS)
  179. else:
  180. # Failed login: increment attempts in Redis
  181. redis_client.incr(f"login_attempts:{request.email}")
  182. redis_client.expire(f"login_attempts:{request.email}", 3600)
  183. redis_attempts = redis_client.get(f"login_attempts:{request.email}")
  184. attempts = int(redis_attempts) if redis_attempts else 0 # type: ignore
  185. if attempts >= 5:
  186. # Too many attempts, block login
  187. redis_client.set(f"blocked:{request.email}", "true")
  188. redis_client.expire(f"blocked:{request.email}", 3600)
  189. logger.warning(f"Too many login attempts for {request.email}. User blocked.")
  190. return error_response(message=ErrorResponse.TOO_MANY_ATTEMPTS, status_code=429)
  191. else:
  192. logger.warning(f"Failed login attempt for {request.email}. Attempts: {attempts}")
  193. # Return unauthorized with attempts remaining
  194. return error_response(
  195. error={"attempts_remaining": 5 - attempts if attempts else 5},
  196. message=ErrorResponse.INVALID_CREDENTIALS,
  197. status_code=401
  198. )
  199. except redis.RedisError as e:
  200. error_msg = f"Redis error during login for {request.email}: {e}"
  201. logger.error(error_msg)
  202. return error_response(message="Error interno del servidor", status_code=500)
  203. except Exception as e:
  204. error_msg = f"Unexpected error during login for {request.email}: {e}"
  205. logger.error(error_msg)
  206. return error_response(message="Error interno del servidor", status_code=500)
  207. @user_router.delete("/delete")
  208. async def delete_user(request: UserIDRequest, current_user: User = Depends(get_current_user)):
  209. if current_user.permissions != 2:
  210. return error_response(message=UserResponse.NOT_PERMITTED, status_code=403)
  211. """Delete a user by ID"""
  212. user = user_data_service.delete(request.id)
  213. if user:
  214. return success_response(message=SuccessResponse.USER_DELETED_SUCCESS)
  215. else:
  216. return error_response(message=UserResponse.USER_NOT_FOUND, status_code=404)
  217. @user_router.post("/pin-recovery")
  218. async def change_pin(request: PinRecoveryRequest):
  219. """Change a user's PIN"""
  220. user = user_data_service.get_by_email(request.email)
  221. if not user:
  222. return error_response(message= UserResponse.USER_NOT_FOUND.format(user_id=request.email), status_code=404)
  223. real_token = recovery_service.get_token(user.id)
  224. if real_token and real_token != request.token:
  225. return error_response(message= "Invalid token")
  226. logger.info(f"Pin change, to {request.new_pin} for user {user.email}")
  227. user_data_service.update(user_id=user.id, pin_hash=request.new_pin)
  228. sender = get_email_sender()
  229. sender.send_email(
  230. to=[user.email],
  231. subject=PIN_SUCCESSFULLY["subject"],
  232. body=PIN_SUCCESSFULLY["body"].format(app_name=APPNAME, date=datetime.now().strftime("%Y-%m-%d"), time=datetime.now().strftime("%H:%M:%S"), name=user.name)
  233. )
  234. return success_response(message= "Recovery email sent")
  235. @user_router.post("/reward")
  236. async def reward_user(request: UserRewardRequest, user: User = Depends(get_current_user)):
  237. """Reward a user with 1 free beer"""
  238. if user.reward_progress < 100:
  239. return error_response(message=UserResponse.REWARD_INSUFFICIENT_PROGRESS.format(progress=user.reward_progress))
  240. if not user:
  241. return error_response(message=UserResponse.USER_NOT_FOUND.format(user_id=request.id), status_code=404)
  242. user_data_service.set_reward_progress(user.id, 0)
  243. print_ticket(request.tableNumber)
  244. return success_response(data={
  245. "id": user.id,
  246. "name": user.name,
  247. "email": user.email,
  248. "reward_progress": 0
  249. }, message=SuccessResponse.REWARD_SUCCESS)
  250. @user_router.get("/user")
  251. async def get_cur_user(current_user:User = Depends(get_current_user)):
  252. """Get current user information"""
  253. return success_response(data=current_user.model_dump(exclude={"pin_hash", "kleincoins", "rut"}))
  254. @user_router.get("/all")
  255. async def get_all_users():
  256. """Get all users"""
  257. users = list(map(lambda u: u.model_dump(), user_data_service.get_all()))
  258. return success_response(data=users)
  259. @user_router.get("/next")
  260. async def get_next_user_id():
  261. """Get the next user ID"""
  262. next_id = user_data_service.get_next_id()
  263. return success_response(data={"next_id": next_id})
  264. from fastapi import Query
  265. verify_router = APIRouter()
  266. @verify_router.get("/")
  267. async def verify_user(q: str = Query(..., description="q parameter")):
  268. """Verify a user by ID"""
  269. # get url params
  270. if not redis_client.get(f"verify:{q}"):
  271. return HTMLResponse(
  272. content="<h1>Invalid verification code</h1>",
  273. status_code=400
  274. )
  275. return FileResponse(
  276. "public/verify.html",
  277. media_type="text/html",
  278. )
  279. recovery_pin_router = APIRouter()
  280. @recovery_pin_router.get("/")
  281. async def pin_forgot_get():
  282. """Render the PIN forgot page"""
  283. return FileResponse(
  284. "public/pin_forgot.html",
  285. media_type="text/html",
  286. )
  287. @recovery_pin_router.post("/")
  288. async def pin_forgot_post(request: UserMail):
  289. """Handle the PIN forgot form submission"""
  290. user = user_data_service.get_by_email(request.email)
  291. if not user:
  292. return error_response(message=UserResponse.USER_NOT_FOUND.format(user_id=request.email), status_code=404)
  293. recovery_key = recovery_service.generate_recovery_key(user.id)
  294. sender = get_email_sender()
  295. sender.send_email(
  296. to=[user.email],
  297. subject=PIN_RECOVERY_MAIL["subject"],
  298. body=PIN_RECOVERY_MAIL["body"].format(app_name=APPNAME, verification_code=recovery_key,name=user.name)
  299. )
  300. # Send recovery_key to user's email
  301. return success_response(message=SuccessResponse.RECOVERY_EMAIL_SENT)
  302. @recovery_pin_router.post("/validate")
  303. async def pin_forgot_validate(request: PinRecoveryValidateRequest):
  304. """Validate the PIN recovery code"""
  305. user = user_data_service.get_by_email(request.email)
  306. if not user:
  307. return error_response(message=UserResponse.USER_NOT_FOUND.format(user_id=request.email), status_code=404)
  308. recovery_data = recovery_service.get_recovery_data(user.id)
  309. logger.info(f"Recovery data for {request.email}: {recovery_data}|{request.code}")
  310. if recovery_data.code == -1:
  311. return error_response(message=UserResponse.USER_NOT_FOUND.format(user_id=request.email), status_code=404)
  312. if recovery_data.code != request.code:
  313. return error_response(message="Invalid recovery code")
  314. token = uuid4().hex
  315. recovery_service.add_token(user.id, token)
  316. return success_response(data={"token": token}, message="Recovery code validated successfully")