users.py 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466
  1. import json
  2. from logging import getLogger
  3. from uuid import uuid4
  4. import redis
  5. from cryptography.fernet import Fernet
  6. from fastapi import APIRouter, Depends, Request
  7. from fastapi.responses import FileResponse, HTMLResponse, JSONResponse
  8. from fastapi.exceptions import HTTPException
  9. from auth.security import generate_token
  10. from auth.security import get_current_user
  11. from config.mails import REGISTER_MAIL
  12. from config.messages import ErrorResponse, SuccessResponse, UserResponse
  13. from config.settings import APPNAME, PIN_KEY
  14. from models.user import LoginRequest, PinUserRequest, RegisterUserRequest, User, User, UserIDRequest, UserRewardRequest
  15. from services.data_service import BlacklistDataService, UserDataService
  16. from services.email_service import get_email_sender
  17. from services.print_service import print_ticket
  18. from services.logging_service import structured_logger, LogLevel
  19. from utils.rut import validate_rut
  20. fernet = Fernet(PIN_KEY.encode())
  21. logger = getLogger(__name__)
  22. user_data_service = UserDataService()
  23. blacklist_data_service = BlacklistDataService()
  24. user_router = APIRouter()
  25. def unique_pin_generate():
  26. """Generate a unique 4-digit PIN"""
  27. import random
  28. pin = str(random.randint(1000, 9999))
  29. return pin
  30. @user_router.post("/exists")
  31. async def exists_user(request: UserIDRequest):
  32. """Check if user exists"""
  33. user = user_data_service.get_by_id(request.id)
  34. if user:
  35. return JSONResponse(status_code=200, content={"exists": True, "message": UserResponse.USER_EXISTS})
  36. else:
  37. return JSONResponse(status_code=404, content={"exists": False, "message": UserResponse.USER_DOES_NOT_EXIST})
  38. @user_router.post("/register")
  39. async def register_user(request: RegisterUserRequest):
  40. """Register a new user"""
  41. logger.info(f"Registration attempt for email: {request.email}")
  42. structured_logger.log_user_event(
  43. f"User registration attempt",
  44. LogLevel.INFO,
  45. {
  46. "email": request.email,
  47. "name": request.name,
  48. "rut": request.rut
  49. },
  50. user_email=request.email
  51. )
  52. # Validate RUT
  53. if not validate_rut(request.rut):
  54. logger.warning(f"Registration failed for {request.email}: invalid RUT {request.rut}")
  55. structured_logger.log_user_event(
  56. "Registration failed: invalid RUT",
  57. LogLevel.WARNING,
  58. {
  59. "email": request.email,
  60. "rut": request.rut,
  61. "reason": "Invalid RUT format"
  62. },
  63. user_email=request.email
  64. )
  65. raise HTTPException(status_code=400, detail=ErrorResponse.INVALID_RUT)
  66. # Check if user already exists by email
  67. try:
  68. user = user_data_service.get_by_email(request.email)
  69. if user:
  70. logger.warning(f"Registration failed for {request.email}: user already exists")
  71. structured_logger.log_user_event(
  72. "Registration failed: user already exists",
  73. LogLevel.WARNING,
  74. {
  75. "email": request.email,
  76. "existing_user_id": user.id,
  77. "reason": "Email already registered"
  78. },
  79. user_id=user.id,
  80. user_email=request.email
  81. )
  82. return HTTPException(status_code=400, detail=UserResponse.USER_ALREADY_EXISTS)
  83. # Check if RUT already exists
  84. user = user_data_service.get_by_rut(request.rut)
  85. if user:
  86. logger.warning(f"Registration failed for {request.email}: RUT already exists")
  87. structured_logger.log_user_event(
  88. "Registration failed: RUT already exists",
  89. LogLevel.WARNING,
  90. {
  91. "email": request.email,
  92. "rut": request.rut,
  93. "existing_user_id": user.id,
  94. "reason": "RUT already registered"
  95. },
  96. user_email=request.email
  97. )
  98. return HTTPException(status_code=400, detail=UserResponse.USER_ALREADY_EXISTS)
  99. except Exception as e:
  100. error_msg = f"Database error during user validation: {e}"
  101. logger.error(error_msg)
  102. structured_logger.log_database_event(
  103. "User validation error during registration",
  104. LogLevel.ERROR,
  105. {
  106. "email": request.email,
  107. "error": str(e),
  108. "error_type": type(e).__name__
  109. },
  110. user_email=request.email
  111. )
  112. raise HTTPException(status_code=500, detail={"message": "Error interno del servidor"})
  113. logger.info(f"Registering user: {request.email}")
  114. try:
  115. # Setup Redis client and verification code
  116. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  117. verification_code = str(uuid4())
  118. user_data = {
  119. "name": request.name,
  120. "email": request.email,
  121. "rut": request.rut
  122. }
  123. redis_client.set(f"verify:{verification_code}", json.dumps(user_data))
  124. redis_client.expire(f"verify:{verification_code}", 3600) # Expire in 1 hour
  125. structured_logger.log_user_event(
  126. "Verification code generated for user registration",
  127. LogLevel.INFO,
  128. {
  129. "email": request.email,
  130. "verification_code": verification_code,
  131. "expires_in": 3600
  132. },
  133. user_email=request.email
  134. )
  135. # Send verification email
  136. get_email_sender().send_email(
  137. REGISTER_MAIL["subject"],
  138. REGISTER_MAIL["body"],
  139. [request.email],
  140. name=request.name,
  141. app_name=APPNAME,
  142. verification_code=verification_code
  143. )
  144. structured_logger.log_email_event(
  145. "Registration verification email sent",
  146. LogLevel.INFO,
  147. {
  148. "email": request.email,
  149. "verification_code": verification_code
  150. },
  151. user_email=request.email
  152. )
  153. logger.info(f"Registration initiated successfully for {request.email}")
  154. return JSONResponse(status_code=201, content={"message": SuccessResponse.USER_CREATED_SUCCESS})
  155. except Exception as e:
  156. error_msg = f"Error during registration process for {request.email}: {e}"
  157. logger.error(error_msg)
  158. structured_logger.log_user_event(
  159. "Registration process failed",
  160. LogLevel.ERROR,
  161. {
  162. "email": request.email,
  163. "error": str(e),
  164. "error_type": type(e).__name__,
  165. "step": "verification_setup_or_email"
  166. },
  167. user_email=request.email
  168. )
  169. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  170. @user_router.post("/create-user")
  171. async def create_user(request: PinUserRequest, q: str):
  172. """Create a new user with PIN"""
  173. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  174. data = redis_client.get(f"verify:{q}")
  175. if not redis_client.get(f"verify:{q}"):
  176. return JSONResponse(status_code=400, content={"message": ErrorResponse.INVALID_VERIFICATION_CODE})
  177. else:
  178. data = json.loads(str(data))
  179. name = data.get("name")
  180. email = data.get("email")
  181. rut = data.get("rut")
  182. pin = request.pin
  183. if not request.pin or len(request.pin) != 4:
  184. return JSONResponse(status_code=400, content={"message": ErrorResponse.INVALID_PIN})
  185. userID = user_data_service.create(name, email, rut, pin)
  186. if userID == -1:
  187. return JSONResponse(status_code=400, content={"message": UserResponse.USER_ALREADY_EXISTS})
  188. user = user_data_service.get_by_id(userID)
  189. if not user:
  190. return JSONResponse(status_code=500, content={"message": ErrorResponse.USER_CREATION_ERROR})
  191. return JSONResponse(status_code=201, content={"message": SuccessResponse.USER_CREATED_SUCCESS, "data": {
  192. **user.model_dump(exclude={"pin_hash"}),
  193. "token": generate_token(user.email)
  194. }})
  195. @user_router.post("/login")
  196. async def login_user(request: LoginRequest, http_request: Request):
  197. """Login user with email and PIN"""
  198. logger.info(f"Login attempt for email: {request.email}")
  199. structured_logger.log_security_event(
  200. f"Login attempt for user {request.email}",
  201. LogLevel.INFO,
  202. {
  203. "email": request.email,
  204. "user_agent": http_request.headers.get("user-agent", "unknown"),
  205. "referer": http_request.headers.get("referer", "unknown"),
  206. "client_ip": http_request.client.host if http_request.client else "unknown"
  207. },
  208. user_email=request.email
  209. )
  210. try:
  211. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  212. is_blocked = redis_client.get(f"blocked:{request.email}")
  213. if is_blocked:
  214. try:
  215. blocked_time_raw = redis_client.ttl(f"blocked:{request.email}")
  216. blocked_minutes = max(0, int(blocked_time_raw) // 60) if blocked_time_raw and int(blocked_time_raw) > 0 else 0 # type: ignore
  217. except (ValueError, TypeError):
  218. blocked_minutes = 0
  219. logger.warning(f"Login attempt for blocked user: {request.email}, blocked for {blocked_minutes} minutes")
  220. structured_logger.log_security_event(
  221. f"Login attempt by blocked user",
  222. LogLevel.WARNING,
  223. {
  224. "email": request.email,
  225. "blocked_time_remaining_minutes": blocked_minutes,
  226. "user_agent": http_request.headers.get("user-agent", "unknown")
  227. },
  228. user_email=request.email
  229. )
  230. return JSONResponse(
  231. status_code=403,
  232. content={"message": UserResponse.USER_FORMAT_BLOCKED.format(time=f"{blocked_minutes} minutos")}
  233. )
  234. # Attempt login
  235. user = user_data_service.login(request.email, request.pin)
  236. if user:
  237. if blacklist_data_service.is_user_blacklisted(user.id):
  238. logger.warning(f"Login attempt for blacklisted user: {request.email}")
  239. structured_logger.log_security_event(
  240. f"Login attempt by blacklisted user",
  241. LogLevel.WARNING,
  242. {
  243. "email": request.email,
  244. "user_agent": http_request.headers.get("user-agent", "unknown"),
  245. "referer": http_request.headers.get("referer", "unknown"),
  246. "client_ip": http_request.client.host if http_request.client else "unknown"
  247. },
  248. user_email=request.email
  249. )
  250. return JSONResponse(
  251. status_code=403,
  252. content={"message": UserResponse.USER_BLACKLISTED}
  253. )
  254. # Successful login
  255. logger.info(f"Successful login for user: {request.email}")
  256. # Check admin access
  257. referer = http_request.headers.get("referer", "")
  258. if referer and "admin" in referer:
  259. user_permissions = user_data_service.permissions(user.id)
  260. if user_permissions == 0:
  261. logger.warning(f"Unauthorized admin access attempt by {request.email}")
  262. structured_logger.log_security_event(
  263. f"Unauthorized admin access attempt",
  264. LogLevel.WARNING,
  265. {
  266. "email": request.email,
  267. "user_id": user.id,
  268. "permissions": user_permissions,
  269. "referer": referer
  270. },
  271. user_id=user.id,
  272. user_email=request.email
  273. )
  274. return JSONResponse(status_code=403, content={"message": UserResponse.NOT_PERMITTED})
  275. # Clear login attempts and log successful login
  276. redis_client.delete(f"login_attempts:{request.email}")
  277. structured_logger.log_security_event(
  278. f"Successful login",
  279. LogLevel.INFO,
  280. {
  281. "email": request.email,
  282. "user_id": user.id,
  283. "user_name": user.name,
  284. "permissions": user_data_service.permissions(user.id),
  285. "is_admin_login": "admin" in referer,
  286. "reward_progress": user.reward_progress
  287. },
  288. user_id=user.id,
  289. user_email=request.email
  290. )
  291. return JSONResponse(status_code=200, content={
  292. "message": SuccessResponse.LOGIN_SUCCESS,
  293. "data": {
  294. "id": user.id,
  295. "name": user.name,
  296. "email": user.email,
  297. "kleincoins": user.kleincoins,
  298. "created_at": user.created_at,
  299. "token": generate_token(user.email),
  300. "reward_progress": user.reward_progress,
  301. }
  302. })
  303. else:
  304. # Failed login: increment attempts in Redis
  305. redis_client.incr(f"login_attempts:{request.email}")
  306. redis_client.expire(f"login_attempts:{request.email}", 3600)
  307. redis_attempts = redis_client.get(f"login_attempts:{request.email}")
  308. attempts = int(redis_attempts) if redis_attempts else 0 # type: ignore
  309. if attempts >= 5:
  310. # Too many attempts, block login
  311. redis_client.set(f"blocked:{request.email}", "true")
  312. redis_client.expire(f"blocked:{request.email}", 3600)
  313. logger.warning(f"Too many login attempts for {request.email}. User blocked.")
  314. structured_logger.log_security_event(
  315. f"User blocked due to too many failed login attempts",
  316. LogLevel.WARNING,
  317. {
  318. "email": request.email,
  319. "failed_attempts": attempts,
  320. "blocked_duration_seconds": 3600
  321. },
  322. user_email=request.email
  323. )
  324. return JSONResponse(status_code=429, content={"message": ErrorResponse.TOO_MANY_ATTEMPTS})
  325. else:
  326. logger.warning(f"Failed login attempt for {request.email}. Attempts: {attempts}")
  327. structured_logger.log_security_event(
  328. f"Failed login attempt",
  329. LogLevel.WARNING,
  330. {
  331. "email": request.email,
  332. "failed_attempts": attempts,
  333. "attempts_remaining": 5 - attempts,
  334. "reason": "Invalid credentials"
  335. },
  336. user_email=request.email
  337. )
  338. # Return unauthorized with attempts remaining
  339. return JSONResponse(status_code=401, content={
  340. "message": ErrorResponse.INVALID_CREDENTIALS,
  341. "attempts_remaining": 5 - attempts if attempts else 5
  342. })
  343. except redis.RedisError as e:
  344. error_msg = f"Redis error during login for {request.email}: {e}"
  345. logger.error(error_msg)
  346. structured_logger.log_system_event(
  347. "Redis error during login process",
  348. LogLevel.ERROR,
  349. {
  350. "email": request.email,
  351. "error": str(e),
  352. "error_type": "RedisError"
  353. }
  354. )
  355. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  356. except Exception as e:
  357. error_msg = f"Unexpected error during login for {request.email}: {e}"
  358. logger.error(error_msg)
  359. structured_logger.log_security_event(
  360. "Unexpected error during login",
  361. LogLevel.ERROR,
  362. {
  363. "email": request.email,
  364. "error": str(e),
  365. "error_type": type(e).__name__
  366. },
  367. user_email=request.email
  368. )
  369. return JSONResponse(status_code=500, content={"message": "Error interno del servidor"})
  370. @user_router.delete("/delete")
  371. async def delete_user(request: UserIDRequest):
  372. """Delete a user by ID"""
  373. user = user_data_service.delete(request.id)
  374. if user:
  375. return JSONResponse(status_code=200, content={"message": SuccessResponse.USER_DELETED_SUCCESS, "data": user})
  376. else:
  377. return JSONResponse(status_code=404, content={"message": UserResponse.USER_NOT_FOUND})
  378. @user_router.post("/reward")
  379. async def reward_user(request: UserRewardRequest, user: User = Depends(get_current_user)):
  380. """Reward a user with 1 free beer"""
  381. if user.reward_progress < 100:
  382. return JSONResponse(status_code=400, content={"message": UserResponse.REWARD_INSUFFICIENT_PROGRESS.format(progress=user.reward_progress)})
  383. if not user:
  384. return JSONResponse(status_code=404, content={"message": UserResponse.USER_NOT_FOUND.format(user_id=request.id)})
  385. user_data_service.set_reward_progress(user.id, 0)
  386. print_ticket(request.tableNumber)
  387. return JSONResponse(status_code=200, content={"message": SuccessResponse.REWARD_SUCCESS, "data": {
  388. "id": user.id,
  389. "name": user.name,
  390. "email": user.email,
  391. "reward_progress": 0
  392. }})
  393. @user_router.get("/user")
  394. async def get_cur_user(current_user:User = Depends(get_current_user)):
  395. """Get current user information"""
  396. return JSONResponse(status_code=200, content={"data": current_user.model_dump(exclude={"pin_hash", "kleincoins", "rut"})})
  397. @user_router.get("/all")
  398. async def get_all_users():
  399. """Get all users"""
  400. users = list(map(lambda u: u.model_dump(), user_data_service.get_all()))
  401. return JSONResponse(status_code=200, content={"data": users})
  402. from fastapi import Query
  403. verify_router = APIRouter()
  404. @verify_router.get("/")
  405. async def verify_user(q: str = Query(..., description="q parameter")):
  406. """Verify a user by ID"""
  407. # get url params
  408. redis_client = redis.Redis(host='localhost', port=6379, db=0, decode_responses=True)
  409. if not redis_client.get(f"verify:{q}"):
  410. return HTMLResponse(
  411. content="<h1>Invalid verification code</h1>",
  412. status_code=400
  413. )
  414. return FileResponse(
  415. "public/verify.html",
  416. media_type="text/html",
  417. )