Files
bakery-ia/gateway/app/routes/auth.py

236 lines
9.0 KiB
Python
Raw Normal View History

2025-07-17 21:25:27 +02:00
# ================================================================
2025-10-27 16:33:26 +01:00
# gateway/app/routes/auth.py
2025-07-17 21:25:27 +02:00
# ================================================================
"""
2025-10-27 16:33:26 +01:00
Authentication and User Management Routes for API Gateway
Unified proxy to auth microservice
"""
import logging
2025-07-17 21:25:27 +02:00
import httpx
from fastapi import APIRouter, Request, Response, HTTPException, status
from fastapi.responses import JSONResponse
from typing import Dict, Any
from app.core.config import settings
2026-01-12 22:15:11 +01:00
from app.core.header_manager import header_manager
from app.core.service_discovery import ServiceDiscovery
2025-07-17 21:25:27 +02:00
from shared.monitoring.metrics import MetricsCollector
logger = logging.getLogger(__name__)
router = APIRouter()
2025-07-17 21:25:27 +02:00
# Initialize service discovery and metrics
service_discovery = ServiceDiscovery()
2025-07-17 21:25:27 +02:00
metrics = MetricsCollector("gateway")
2025-07-17 21:25:27 +02:00
# Auth service configuration
AUTH_SERVICE_URL = settings.AUTH_SERVICE_URL or "http://auth-service:8000"
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
class AuthProxy:
"""Authentication service proxy with enhanced error handling"""
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
def __init__(self):
self.client = httpx.AsyncClient(
timeout=httpx.Timeout(30.0),
limits=httpx.Limits(max_connections=100, max_keepalive_connections=20)
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
async def forward_request(
2025-10-27 16:33:26 +01:00
self,
method: str,
path: str,
2025-07-17 21:25:27 +02:00
request: Request
) -> Response:
"""Forward request to auth service with proper error handling"""
2025-10-27 16:33:26 +01:00
2025-07-22 23:01:34 +02:00
# Handle OPTIONS requests directly for CORS
if request.method == "OPTIONS":
return Response(
status_code=200,
headers={
"Access-Control-Allow-Origin": settings.CORS_ORIGINS_LIST,
"Access-Control-Allow-Methods": "GET, POST, PUT, DELETE, OPTIONS",
"Access-Control-Allow-Headers": "Content-Type, Authorization, X-Tenant-ID",
"Access-Control-Allow-Credentials": "true",
"Access-Control-Max-Age": "86400" # Cache preflight for 24 hours
}
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
try:
# Get auth service URL (with service discovery if available)
auth_url = await self._get_auth_service_url()
2025-10-27 16:33:26 +01:00
target_url = f"{auth_url}/{path}"
2025-07-17 21:25:27 +02:00
# Prepare headers (remove hop-by-hop headers)
2026-01-12 14:24:14 +01:00
# IMPORTANT: Use request.headers directly to get headers added by middleware
# Also check request.state for headers injected by middleware
headers = self._prepare_headers(request.headers, request)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Get request body
body = await request.body()
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Forward request
2025-10-27 16:33:26 +01:00
logger.info(f"Forwarding {method} /{path} to auth service")
2025-07-17 21:25:27 +02:00
response = await self.client.request(
method=method,
url=target_url,
headers=headers,
content=body,
2025-07-17 21:25:27 +02:00
params=dict(request.query_params)
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Record metrics
metrics.increment_counter("gateway_auth_requests_total")
metrics.increment_counter(
2025-10-27 16:33:26 +01:00
"gateway_auth_responses_total",
2025-07-17 21:25:27 +02:00
labels={"status_code": str(response.status_code)}
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Prepare response headers
response_headers = self._prepare_response_headers(dict(response.headers))
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
return Response(
content=response.content,
status_code=response.status_code,
2025-07-17 21:25:27 +02:00
headers=response_headers,
media_type=response.headers.get("content-type")
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
except httpx.TimeoutException:
2025-10-27 16:33:26 +01:00
logger.error(f"Timeout forwarding {method} /{path} to auth service")
2025-07-17 21:25:27 +02:00
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "timeout"})
raise HTTPException(
status_code=status.HTTP_504_GATEWAY_TIMEOUT,
detail="Authentication service timeout"
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
except httpx.ConnectError:
2025-10-27 16:33:26 +01:00
logger.error(f"Connection error forwarding {method} /{path} to auth service")
2025-07-17 21:25:27 +02:00
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "connection"})
raise HTTPException(
status_code=status.HTTP_503_SERVICE_UNAVAILABLE,
detail="Authentication service unavailable"
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
except Exception as e:
2025-10-27 16:33:26 +01:00
logger.error(f"Error forwarding {method} /{path} to auth service: {e}")
2025-07-17 21:25:27 +02:00
metrics.increment_counter("gateway_auth_errors_total", labels={"error": "unknown"})
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail="Internal gateway error"
)
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
async def _get_auth_service_url(self) -> str:
"""Get auth service URL with service discovery"""
try:
# Try service discovery first
service_url = await service_discovery.get_service_url("auth-service")
if service_url:
return service_url
except Exception as e:
logger.warning(f"Service discovery failed: {e}")
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Fall back to configured URL
return AUTH_SERVICE_URL
2025-10-27 16:33:26 +01:00
2026-01-12 14:24:14 +01:00
def _prepare_headers(self, headers, request=None) -> Dict[str, str]:
2026-01-12 22:15:11 +01:00
"""Prepare headers for forwarding using unified HeaderManager"""
# Use unified HeaderManager to get all headers
if request:
all_headers = header_manager.get_all_headers_for_proxy(request)
logger.debug(f"DEBUG: Added headers from HeaderManager: {list(all_headers.keys())}")
else:
# Fallback: convert headers to dict manually
all_headers = {}
if hasattr(headers, '_list'):
for k, v in headers.__dict__.get('_list', []):
2026-01-12 14:24:14 +01:00
key = k.decode() if isinstance(k, bytes) else k
value = v.decode() if isinstance(v, bytes) else v
2026-01-12 22:15:11 +01:00
all_headers[key] = value
elif hasattr(headers, 'raw'):
for k, v in headers.raw:
key = k.decode() if isinstance(k, bytes) else k
value = v.decode() if isinstance(v, bytes) else v
all_headers[key] = value
else:
# Headers is already a dict
all_headers = dict(headers)
# Debug logging
logger.info(f"📤 Forwarding headers - x_user_id: {all_headers.get('x-user-id', 'MISSING')}, x_is_demo: {all_headers.get('x-is-demo', 'MISSING')}, x_demo_session_id: {all_headers.get('x-demo-session-id', 'MISSING')}, headers: {list(all_headers.keys())}")
return all_headers
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
def _prepare_response_headers(self, headers: Dict[str, str]) -> Dict[str, str]:
"""Prepare response headers"""
# Remove server-specific headers
filtered_headers = {
k: v for k, v in headers.items()
if k.lower() not in {'server', 'date'}
}
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Add CORS headers if needed
if settings.CORS_ORIGINS:
filtered_headers['Access-Control-Allow-Origin'] = '*'
filtered_headers['Access-Control-Allow-Methods'] = 'GET, POST, PUT, DELETE, OPTIONS'
filtered_headers['Access-Control-Allow-Headers'] = 'Content-Type, Authorization'
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
return filtered_headers
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
# Initialize proxy
auth_proxy = AuthProxy()
# ================================================================
2025-10-27 16:33:26 +01:00
# CATCH-ALL ROUTE for all auth and user endpoints
2025-07-17 21:25:27 +02:00
# ================================================================
2025-10-06 15:27:01 +02:00
@router.api_route("/{path:path}", methods=["GET", "POST", "PUT", "DELETE", "PATCH"])
2025-07-17 21:25:27 +02:00
async def proxy_auth_requests(path: str, request: Request):
2025-10-27 16:33:26 +01:00
"""Catch-all proxy for all auth and user requests"""
return await auth_proxy.forward_request(request.method, f"api/v1/auth/{path}", request)
2025-07-17 21:25:27 +02:00
# ================================================================
# HEALTH CHECK for auth service
# ================================================================
2025-10-27 16:33:26 +01:00
@router.get("/health")
2025-07-17 21:25:27 +02:00
async def auth_service_health():
"""Check auth service health"""
try:
async with httpx.AsyncClient(timeout=5.0) as client:
2025-07-17 21:25:27 +02:00
response = await client.get(f"{AUTH_SERVICE_URL}/health")
2025-10-27 16:33:26 +01:00
2025-07-17 21:25:27 +02:00
if response.status_code == 200:
return {
"status": "healthy",
"auth_service": "available",
"response_time_ms": response.elapsed.total_seconds() * 1000
}
else:
return {
2025-10-27 16:33:26 +01:00
"status": "unhealthy",
2025-07-17 21:25:27 +02:00
"auth_service": "error",
"status_code": response.status_code
}
2025-10-27 16:33:26 +01:00
except Exception as e:
2025-07-17 21:25:27 +02:00
logger.error(f"Auth service health check failed: {e}")
return {
"status": "unhealthy",
2025-10-27 16:33:26 +01:00
"auth_service": "unavailable",
2025-07-17 21:25:27 +02:00
"error": str(e)
}
# ================================================================
# CLEANUP
# ================================================================
@router.on_event("shutdown")
async def cleanup():
"""Cleanup resources"""
await auth_proxy.client.aclose()