2025-07-17 21:25:27 +02:00
|
|
|
# ================================================================
|
2025-10-27 16:33:26 +01:00
|
|
|
# gateway/app/routes/auth.py
|
2025-07-17 21:25:27 +02:00
|
|
|
# ================================================================
|
2025-07-17 13:09:24 +02:00
|
|
|
"""
|
2025-10-27 16:33:26 +01:00
|
|
|
Authentication and User Management Routes for API Gateway
|
|
|
|
|
Unified proxy to auth microservice
|
2025-07-17 13:09:24 +02:00
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
import logging
|
2025-07-17 21:25:27 +02:00
|
|
|
import httpx
|
|
|
|
|
from fastapi import APIRouter, Request, Response, HTTPException, status
|
|
|
|
|
from fastapi.responses import JSONResponse
|
|
|
|
|
from typing import Dict, Any
|
2025-07-17 13:09:24 +02:00
|
|
|
|
|
|
|
|
from app.core.config import settings
|
|
|
|
|
from app.core.service_discovery import ServiceDiscovery
|
2025-07-17 21:25:27 +02:00
|
|
|
from shared.monitoring.metrics import MetricsCollector
|
2025-07-17 13:09:24 +02:00
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
router = APIRouter()
|
|
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Initialize service discovery and metrics
|
2025-07-17 13:09:24 +02:00
|
|
|
service_discovery = ServiceDiscovery()
|
2025-07-17 21:25:27 +02:00
|
|
|
metrics = MetricsCollector("gateway")
|
2025-07-17 13:09:24 +02:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Auth service configuration
|
|
|
|
|
AUTH_SERVICE_URL = settings.AUTH_SERVICE_URL or "http://auth-service:8000"
|
|
|
|
|
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
class AuthProxy:
|
|
|
|
|
"""Authentication service proxy with enhanced error handling"""
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
def __init__(self):
|
|
|
|
|
self.client = httpx.AsyncClient(
|
|
|
|
|
timeout=httpx.Timeout(30.0),
|
|
|
|
|
limits=httpx.Limits(max_connections=100, max_keepalive_connections=20)
|
|
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
async def forward_request(
|
2025-10-27 16:33:26 +01:00
|
|
|
self,
|
|
|
|
|
method: str,
|
|
|
|
|
path: str,
|
2025-07-17 21:25:27 +02:00
|
|
|
request: Request
|
|
|
|
|
) -> Response:
|
|
|
|
|
"""Forward request to auth service with proper error handling"""
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-22 23:01:34 +02:00
|
|
|
# Handle OPTIONS requests directly for CORS
|
|
|
|
|
if request.method == "OPTIONS":
|
|
|
|
|
return Response(
|
|
|
|
|
status_code=200,
|
|
|
|
|
headers={
|
|
|
|
|
"Access-Control-Allow-Origin": settings.CORS_ORIGINS_LIST,
|
|
|
|
|
"Access-Control-Allow-Methods": "GET, POST, PUT, DELETE, OPTIONS",
|
|
|
|
|
"Access-Control-Allow-Headers": "Content-Type, Authorization, X-Tenant-ID",
|
|
|
|
|
"Access-Control-Allow-Credentials": "true",
|
|
|
|
|
"Access-Control-Max-Age": "86400" # Cache preflight for 24 hours
|
|
|
|
|
}
|
|
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
try:
|
|
|
|
|
# Get auth service URL (with service discovery if available)
|
|
|
|
|
auth_url = await self._get_auth_service_url()
|
2025-10-27 16:33:26 +01:00
|
|
|
target_url = f"{auth_url}/{path}"
|
|
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Prepare headers (remove hop-by-hop headers)
|
2026-01-12 14:24:14 +01:00
|
|
|
# IMPORTANT: Use request.headers directly to get headers added by middleware
|
|
|
|
|
# Also check request.state for headers injected by middleware
|
|
|
|
|
headers = self._prepare_headers(request.headers, request)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Get request body
|
|
|
|
|
body = await request.body()
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Forward request
|
2025-10-27 16:33:26 +01:00
|
|
|
logger.info(f"Forwarding {method} /{path} to auth service")
|
|
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
response = await self.client.request(
|
|
|
|
|
method=method,
|
|
|
|
|
url=target_url,
|
|
|
|
|
headers=headers,
|
2025-07-17 13:09:24 +02:00
|
|
|
content=body,
|
2025-07-17 21:25:27 +02:00
|
|
|
params=dict(request.query_params)
|
2025-07-17 13:09:24 +02:00
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Record metrics
|
|
|
|
|
metrics.increment_counter("gateway_auth_requests_total")
|
|
|
|
|
metrics.increment_counter(
|
2025-10-27 16:33:26 +01:00
|
|
|
"gateway_auth_responses_total",
|
2025-07-17 21:25:27 +02:00
|
|
|
labels={"status_code": str(response.status_code)}
|
2025-07-17 13:09:24 +02:00
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Prepare response headers
|
|
|
|
|
response_headers = self._prepare_response_headers(dict(response.headers))
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
return Response(
|
|
|
|
|
content=response.content,
|
2025-07-17 13:09:24 +02:00
|
|
|
status_code=response.status_code,
|
2025-07-17 21:25:27 +02:00
|
|
|
headers=response_headers,
|
|
|
|
|
media_type=response.headers.get("content-type")
|
2025-07-17 13:09:24 +02:00
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
except httpx.TimeoutException:
|
2025-10-27 16:33:26 +01:00
|
|
|
logger.error(f"Timeout forwarding {method} /{path} to auth service")
|
2025-07-17 21:25:27 +02:00
|
|
|
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "timeout"})
|
|
|
|
|
raise HTTPException(
|
|
|
|
|
status_code=status.HTTP_504_GATEWAY_TIMEOUT,
|
|
|
|
|
detail="Authentication service timeout"
|
2025-07-17 13:09:24 +02:00
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
except httpx.ConnectError:
|
2025-10-27 16:33:26 +01:00
|
|
|
logger.error(f"Connection error forwarding {method} /{path} to auth service")
|
2025-07-17 21:25:27 +02:00
|
|
|
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "connection"})
|
|
|
|
|
raise HTTPException(
|
|
|
|
|
status_code=status.HTTP_503_SERVICE_UNAVAILABLE,
|
|
|
|
|
detail="Authentication service unavailable"
|
2025-07-17 13:09:24 +02:00
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
except Exception as e:
|
2025-10-27 16:33:26 +01:00
|
|
|
logger.error(f"Error forwarding {method} /{path} to auth service: {e}")
|
2025-07-17 21:25:27 +02:00
|
|
|
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "unknown"})
|
|
|
|
|
raise HTTPException(
|
|
|
|
|
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
|
|
|
|
|
detail="Internal gateway error"
|
|
|
|
|
)
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
async def _get_auth_service_url(self) -> str:
|
|
|
|
|
"""Get auth service URL with service discovery"""
|
|
|
|
|
try:
|
|
|
|
|
# Try service discovery first
|
|
|
|
|
service_url = await service_discovery.get_service_url("auth-service")
|
|
|
|
|
if service_url:
|
|
|
|
|
return service_url
|
|
|
|
|
except Exception as e:
|
|
|
|
|
logger.warning(f"Service discovery failed: {e}")
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Fall back to configured URL
|
|
|
|
|
return AUTH_SERVICE_URL
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2026-01-12 14:24:14 +01:00
|
|
|
def _prepare_headers(self, headers, request=None) -> Dict[str, str]:
|
2025-07-17 21:25:27 +02:00
|
|
|
"""Prepare headers for forwarding (remove hop-by-hop headers)"""
|
|
|
|
|
# Remove hop-by-hop headers
|
|
|
|
|
hop_by_hop_headers = {
|
|
|
|
|
'connection', 'keep-alive', 'proxy-authenticate',
|
|
|
|
|
'proxy-authorization', 'te', 'trailers', 'upgrade'
|
|
|
|
|
}
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2026-01-12 14:24:14 +01:00
|
|
|
# Convert headers to dict - get ALL headers including those added by middleware
|
|
|
|
|
# Middleware adds headers to _list, so we need to read from there
|
|
|
|
|
logger.debug(f"DEBUG: headers type: {type(headers)}, has _list: {hasattr(headers, '_list')}, has raw: {hasattr(headers, 'raw')}")
|
|
|
|
|
logger.debug(f"DEBUG: headers.__dict__ keys: {list(headers.__dict__.keys())}")
|
|
|
|
|
logger.debug(f"DEBUG: '_list' in headers.__dict__: {'_list' in headers.__dict__}")
|
|
|
|
|
|
|
|
|
|
if hasattr(headers, '_list'):
|
|
|
|
|
logger.debug(f"DEBUG: Entering _list branch")
|
|
|
|
|
logger.debug(f"DEBUG: headers object id: {id(headers)}, _list id: {id(headers.__dict__.get('_list', []))}")
|
|
|
|
|
# Get headers from the _list where middleware adds them
|
|
|
|
|
all_headers_list = headers.__dict__.get('_list', [])
|
|
|
|
|
logger.debug(f"DEBUG: _list length: {len(all_headers_list)}")
|
|
|
|
|
|
|
|
|
|
# Debug: Show first few headers in the list
|
|
|
|
|
debug_headers = []
|
|
|
|
|
for i, (k, v) in enumerate(all_headers_list):
|
|
|
|
|
if i < 5: # Show first 5 headers for debugging
|
|
|
|
|
key = k.decode() if isinstance(k, bytes) else k
|
|
|
|
|
value = v.decode() if isinstance(v, bytes) else v
|
|
|
|
|
debug_headers.append(f"{key}: {value}")
|
|
|
|
|
logger.debug(f"DEBUG: First headers in _list: {debug_headers}")
|
|
|
|
|
|
|
|
|
|
# Convert to dict for easier processing
|
|
|
|
|
all_headers = {}
|
|
|
|
|
for k, v in all_headers_list:
|
|
|
|
|
key = k.decode() if isinstance(k, bytes) else k
|
|
|
|
|
value = v.decode() if isinstance(v, bytes) else v
|
|
|
|
|
all_headers[key] = value
|
|
|
|
|
|
|
|
|
|
# Debug: Show if x-user-id and x-is-demo are in the dict
|
|
|
|
|
logger.debug(f"DEBUG: x-user-id in all_headers: {'x-user-id' in all_headers}, x-is-demo in all_headers: {'x-is-demo' in all_headers}")
|
|
|
|
|
logger.debug(f"DEBUG: all_headers keys: {list(all_headers.keys())[:10]}...") # Show first 10 keys
|
|
|
|
|
|
|
|
|
|
logger.info(f"📤 Forwarding headers to auth service - x_user_id: {all_headers.get('x-user-id', 'MISSING')}, x_is_demo: {all_headers.get('x-is-demo', 'MISSING')}, x_demo_session_id: {all_headers.get('x-demo-session-id', 'MISSING')}, headers: {list(all_headers.keys())}")
|
|
|
|
|
|
|
|
|
|
# Check if headers are missing and try to get them from request.state
|
|
|
|
|
if request and hasattr(request, 'state') and hasattr(request.state, 'injected_headers'):
|
|
|
|
|
logger.debug(f"DEBUG: Found injected_headers in request.state: {request.state.injected_headers}")
|
|
|
|
|
# Add missing headers from request.state
|
|
|
|
|
if 'x-user-id' not in all_headers and 'x-user-id' in request.state.injected_headers:
|
|
|
|
|
all_headers['x-user-id'] = request.state.injected_headers['x-user-id']
|
|
|
|
|
logger.debug(f"DEBUG: Added x-user-id from request.state: {all_headers['x-user-id']}")
|
|
|
|
|
if 'x-user-email' not in all_headers and 'x-user-email' in request.state.injected_headers:
|
|
|
|
|
all_headers['x-user-email'] = request.state.injected_headers['x-user-email']
|
|
|
|
|
logger.debug(f"DEBUG: Added x-user-email from request.state: {all_headers['x-user-email']}")
|
|
|
|
|
if 'x-user-role' not in all_headers and 'x-user-role' in request.state.injected_headers:
|
|
|
|
|
all_headers['x-user-role'] = request.state.injected_headers['x-user-role']
|
|
|
|
|
logger.debug(f"DEBUG: Added x-user-role from request.state: {all_headers['x-user-role']}")
|
|
|
|
|
|
|
|
|
|
# Add is_demo flag if this is a demo session
|
|
|
|
|
if hasattr(request.state, 'is_demo_session') and request.state.is_demo_session:
|
|
|
|
|
all_headers['x-is-demo'] = 'true'
|
|
|
|
|
logger.debug(f"DEBUG: Added x-is-demo from request.state.is_demo_session")
|
|
|
|
|
|
|
|
|
|
# Filter out hop-by-hop headers
|
|
|
|
|
filtered_headers = {
|
|
|
|
|
k: v for k, v in all_headers.items()
|
|
|
|
|
if k.lower() not in hop_by_hop_headers
|
|
|
|
|
}
|
|
|
|
|
elif hasattr(headers, 'raw'):
|
|
|
|
|
logger.debug(f"DEBUG: Entering raw branch")
|
|
|
|
|
|
|
|
|
|
# Filter out hop-by-hop headers
|
|
|
|
|
filtered_headers = {
|
|
|
|
|
k: v for k, v in all_headers.items()
|
|
|
|
|
if k.lower() not in hop_by_hop_headers
|
|
|
|
|
}
|
|
|
|
|
elif hasattr(headers, 'raw'):
|
|
|
|
|
# Fallback to raw headers if _list not available
|
|
|
|
|
all_headers = {
|
|
|
|
|
k.decode() if isinstance(k, bytes) else k: v.decode() if isinstance(v, bytes) else v
|
|
|
|
|
for k, v in headers.raw
|
|
|
|
|
}
|
|
|
|
|
logger.info(f"📤 Forwarding headers to auth service - x_user_id: {all_headers.get('x-user-id', 'MISSING')}, x_is_demo: {all_headers.get('x-is-demo', 'MISSING')}, x_demo_session_id: {all_headers.get('x-demo-session-id', 'MISSING')}, headers: {list(all_headers.keys())}")
|
|
|
|
|
|
|
|
|
|
filtered_headers = {
|
|
|
|
|
k.decode() if isinstance(k, bytes) else k: v.decode() if isinstance(v, bytes) else v
|
|
|
|
|
for k, v in headers.raw
|
|
|
|
|
if (k.decode() if isinstance(k, bytes) else k).lower() not in hop_by_hop_headers
|
|
|
|
|
}
|
|
|
|
|
else:
|
|
|
|
|
# Handle case where headers is already a dict
|
|
|
|
|
logger.info(f"📤 Forwarding headers to auth service - x_user_id: {headers.get('x-user-id', 'MISSING')}, x_is_demo: {headers.get('x-is-demo', 'MISSING')}, x_demo_session_id: {headers.get('x-demo-session-id', 'MISSING')}, headers: {list(headers.keys())}")
|
|
|
|
|
|
|
|
|
|
filtered_headers = {
|
|
|
|
|
k: v for k, v in headers.items()
|
|
|
|
|
if k.lower() not in hop_by_hop_headers
|
|
|
|
|
}
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Add gateway identifier
|
|
|
|
|
filtered_headers['X-Forwarded-By'] = 'bakery-gateway'
|
|
|
|
|
filtered_headers['X-Gateway-Version'] = '1.0.0'
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
return filtered_headers
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
def _prepare_response_headers(self, headers: Dict[str, str]) -> Dict[str, str]:
|
|
|
|
|
"""Prepare response headers"""
|
|
|
|
|
# Remove server-specific headers
|
|
|
|
|
filtered_headers = {
|
|
|
|
|
k: v for k, v in headers.items()
|
|
|
|
|
if k.lower() not in {'server', 'date'}
|
|
|
|
|
}
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Add CORS headers if needed
|
|
|
|
|
if settings.CORS_ORIGINS:
|
|
|
|
|
filtered_headers['Access-Control-Allow-Origin'] = '*'
|
|
|
|
|
filtered_headers['Access-Control-Allow-Methods'] = 'GET, POST, PUT, DELETE, OPTIONS'
|
|
|
|
|
filtered_headers['Access-Control-Allow-Headers'] = 'Content-Type, Authorization'
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
return filtered_headers
|
|
|
|
|
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
# Initialize proxy
|
|
|
|
|
auth_proxy = AuthProxy()
|
|
|
|
|
|
|
|
|
|
# ================================================================
|
2025-10-27 16:33:26 +01:00
|
|
|
# CATCH-ALL ROUTE for all auth and user endpoints
|
2025-07-17 21:25:27 +02:00
|
|
|
# ================================================================
|
|
|
|
|
|
2025-10-06 15:27:01 +02:00
|
|
|
@router.api_route("/{path:path}", methods=["GET", "POST", "PUT", "DELETE", "PATCH"])
|
2025-07-17 21:25:27 +02:00
|
|
|
async def proxy_auth_requests(path: str, request: Request):
|
2025-10-27 16:33:26 +01:00
|
|
|
"""Catch-all proxy for all auth and user requests"""
|
|
|
|
|
return await auth_proxy.forward_request(request.method, f"api/v1/auth/{path}", request)
|
2025-07-17 21:25:27 +02:00
|
|
|
|
|
|
|
|
# ================================================================
|
|
|
|
|
# HEALTH CHECK for auth service
|
|
|
|
|
# ================================================================
|
|
|
|
|
|
2025-10-27 16:33:26 +01:00
|
|
|
@router.get("/health")
|
2025-07-17 21:25:27 +02:00
|
|
|
async def auth_service_health():
|
|
|
|
|
"""Check auth service health"""
|
2025-07-17 13:09:24 +02:00
|
|
|
try:
|
|
|
|
|
async with httpx.AsyncClient(timeout=5.0) as client:
|
2025-07-17 21:25:27 +02:00
|
|
|
response = await client.get(f"{AUTH_SERVICE_URL}/health")
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 21:25:27 +02:00
|
|
|
if response.status_code == 200:
|
|
|
|
|
return {
|
|
|
|
|
"status": "healthy",
|
|
|
|
|
"auth_service": "available",
|
|
|
|
|
"response_time_ms": response.elapsed.total_seconds() * 1000
|
|
|
|
|
}
|
|
|
|
|
else:
|
|
|
|
|
return {
|
2025-10-27 16:33:26 +01:00
|
|
|
"status": "unhealthy",
|
2025-07-17 21:25:27 +02:00
|
|
|
"auth_service": "error",
|
|
|
|
|
"status_code": response.status_code
|
|
|
|
|
}
|
2025-10-27 16:33:26 +01:00
|
|
|
|
2025-07-17 13:09:24 +02:00
|
|
|
except Exception as e:
|
2025-07-17 21:25:27 +02:00
|
|
|
logger.error(f"Auth service health check failed: {e}")
|
|
|
|
|
return {
|
|
|
|
|
"status": "unhealthy",
|
2025-10-27 16:33:26 +01:00
|
|
|
"auth_service": "unavailable",
|
2025-07-17 21:25:27 +02:00
|
|
|
"error": str(e)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
# ================================================================
|
|
|
|
|
# CLEANUP
|
|
|
|
|
# ================================================================
|
|
|
|
|
|
|
|
|
|
@router.on_event("shutdown")
|
|
|
|
|
async def cleanup():
|
|
|
|
|
"""Cleanup resources"""
|
|
|
|
|
await auth_proxy.client.aclose()
|