from __future__ import annotations from functools import wraps from typing import Any from urllib.parse import urlparse from flask import abort, jsonify, redirect, request, session, url_for from werkzeug.security import check_password_hash, generate_password_hash from ..config import AUTH_ENABLE from ..db import connect, default_user_id, utcnow PUBLIC_ENDPOINTS = {"main.login", "main.logout", "api.auth_login", "api.auth_me", "static"} RTORRENT_WRITE_PREFIXES = ( "/api/torrents/", "/api/speed/limits", "/api/labels", "/api/ratio-groups", "/api/rss", "/api/smart-queue", "/api/automations", "/api/jobs", ) RTORRENT_CONFIG_PREFIXES = ("/api/rtorrent-config",) ADMIN_PREFIXES = ("/api/auth/users", "/api/profiles") # Note: API reads that expose rTorrent/profile data must also respect profile permissions. PROFILE_READ_PREFIXES = ( "/api/torrents", "/api/torrent-stats", "/api/system/status", "/api/app/status", "/api/port-check", "/api/path", "/api/labels", "/api/ratio-groups", "/api/rss", "/api/rtorrent-config", "/api/smart-queue", "/api/traffic/history", "/api/automations", ) def enabled() -> bool: return bool(AUTH_ENABLE) def password_hash(password: str) -> str: return generate_password_hash(password or "") def current_user_id() -> int: if not enabled(): return default_user_id() try: return int(session.get("user_id") or 0) except Exception: return 0 def current_user() -> dict[str, Any] | None: uid = current_user_id() if not uid: return None with connect() as conn: return conn.execute( "SELECT id, username, role, is_active, created_at, updated_at FROM users WHERE id=?", (uid,), ).fetchone() def is_admin(user: dict[str, Any] | None = None) -> bool: if not enabled(): return True user = user or current_user() return bool(user and user.get("role") == "admin" and int(user.get("is_active") or 0)) def _permissions(user_id: int | None = None) -> list[dict[str, Any]]: if not enabled(): return [{"profile_id": 0, "access_level": "full"}] uid = user_id or current_user_id() if not uid: return [] with connect() as conn: return conn.execute( "SELECT profile_id, access_level FROM user_profile_permissions WHERE user_id=?", (uid,), ).fetchall() def can_access_profile(profile_id: int | None, user_id: int | None = None) -> bool: if not enabled(): return True uid = user_id or current_user_id() if not uid: return False with connect() as conn: user = conn.execute("SELECT role, is_active FROM users WHERE id=?", (uid,)).fetchone() if not user or not int(user.get("is_active") or 0): return False if user.get("role") == "admin": return True pid = int(profile_id or 0) row = conn.execute( "SELECT 1 FROM user_profile_permissions WHERE user_id=? AND (profile_id=0 OR profile_id=?) LIMIT 1", (uid, pid), ).fetchone() return bool(row) def can_write_profile(profile_id: int | None, user_id: int | None = None) -> bool: if not enabled(): return True uid = user_id or current_user_id() if not uid: return False with connect() as conn: user = conn.execute("SELECT role, is_active FROM users WHERE id=?", (uid,)).fetchone() if not user or not int(user.get("is_active") or 0): return False if user.get("role") == "admin": return True pid = int(profile_id or 0) row = conn.execute( "SELECT access_level FROM user_profile_permissions WHERE user_id=? AND (profile_id=0 OR profile_id=?) ORDER BY profile_id DESC LIMIT 1", (uid, pid), ).fetchone() return bool(row and row.get("access_level") == "full") def visible_profile_ids(user_id: int | None = None) -> set[int] | None: if not enabled(): return None uid = user_id or current_user_id() if not uid: return set() with connect() as conn: user = conn.execute("SELECT role, is_active FROM users WHERE id=?", (uid,)).fetchone() if not user or not int(user.get("is_active") or 0): return set() if user.get("role") == "admin": return None rows = conn.execute("SELECT profile_id FROM user_profile_permissions WHERE user_id=?", (uid,)).fetchall() if any(int(row.get("profile_id") or 0) == 0 for row in rows): return None return {int(row.get("profile_id") or 0) for row in rows} def same_origin_request() -> bool: """Return False only when an unsafe request clearly comes from another origin.""" origin = request.headers.get("Origin") or request.headers.get("Referer") if not origin: return True try: parsed = urlparse(origin) return parsed.scheme == request.scheme and parsed.netloc == request.host except Exception: return False def writable_profile_ids(user_id: int | None = None) -> set[int] | None: if not enabled(): return None uid = user_id or current_user_id() if not uid: return set() with connect() as conn: user = conn.execute("SELECT role, is_active FROM users WHERE id=?", (uid,)).fetchone() if not user or not int(user.get("is_active") or 0): return set() if user.get("role") == "admin": return None rows = conn.execute("SELECT profile_id FROM user_profile_permissions WHERE user_id=? AND access_level='full'", (uid,)).fetchall() if any(int(row.get("profile_id") or 0) == 0 for row in rows): return None return {int(row.get("profile_id") or 0) for row in rows} def require_admin() -> None: if enabled() and not is_admin(): abort(403) def require_profile_read(profile_id: int | None) -> None: if enabled() and not can_access_profile(profile_id): abort(403) def require_profile_write(profile_id: int | None) -> None: if enabled() and not can_write_profile(profile_id): abort(403) def login_user(username: str, password: str) -> dict[str, Any] | None: if not enabled(): return {"id": default_user_id(), "username": "default", "role": "admin", "is_active": 1} with connect() as conn: user = conn.execute("SELECT * FROM users WHERE username=?", (username.strip(),)).fetchone() if not user or not int(user.get("is_active") or 0): return None if not user.get("password_hash") or not check_password_hash(user.get("password_hash"), password or ""): return None session.clear() session["user_id"] = int(user["id"]) session["username"] = user["username"] session["role"] = user.get("role") or "user" return current_user() def logout_user() -> None: session.clear() def ensure_admin_user() -> None: if not enabled(): return now = utcnow() with connect() as conn: row = conn.execute("SELECT id FROM users WHERE username='admin'").fetchone() if not row: conn.execute( "INSERT INTO users(username,password_hash,role,is_active,created_at,updated_at) VALUES(?,?,?,?,?,?)", ("admin", password_hash("admin"), "admin", 1, now, now), ) else: conn.execute("UPDATE users SET role='admin', is_active=1, updated_at=? WHERE username='admin'", (now,)) def list_users() -> list[dict[str, Any]]: require_admin() with connect() as conn: users = conn.execute( "SELECT id, username, role, is_active, created_at, updated_at FROM users ORDER BY username COLLATE NOCASE" ).fetchall() perms = conn.execute( "SELECT user_id, profile_id, access_level FROM user_profile_permissions ORDER BY user_id, profile_id" ).fetchall() by_user: dict[int, list[dict[str, Any]]] = {} for perm in perms: by_user.setdefault(int(perm["user_id"]), []).append({ "profile_id": int(perm.get("profile_id") or 0), "access_level": perm.get("access_level") or "ro", }) for user in users: user["permissions"] = by_user.get(int(user["id"]), []) return users def save_user(data: dict[str, Any], user_id: int | None = None) -> dict[str, Any]: require_admin() now = utcnow() username = str(data.get("username") or "").strip() role = "admin" if data.get("role") == "admin" else "user" is_active = 1 if data.get("is_active", True) else 0 if not username: raise ValueError("Username is required") with connect() as conn: if user_id: row = conn.execute("SELECT id FROM users WHERE id=?", (user_id,)).fetchone() if not row: raise ValueError("User does not exist") conn.execute( "UPDATE users SET username=?, role=?, is_active=?, updated_at=? WHERE id=?", (username, role, is_active, now, user_id), ) else: cur = conn.execute( "INSERT INTO users(username,password_hash,role,is_active,created_at,updated_at) VALUES(?,?,?,?,?,?)", (username, password_hash(str(data.get("password") or username)), role, is_active, now, now), ) user_id = int(cur.lastrowid) if data.get("password"): conn.execute("UPDATE users SET password_hash=?, updated_at=? WHERE id=?", (password_hash(str(data.get("password"))), now, user_id)) if role != "admin": conn.execute("DELETE FROM user_profile_permissions WHERE user_id=?", (user_id,)) for item in data.get("permissions") or []: profile_id = int(item.get("profile_id") or 0) access = "full" if item.get("access_level") == "full" else "ro" conn.execute( "INSERT OR REPLACE INTO user_profile_permissions(user_id,profile_id,access_level,created_at,updated_at) VALUES(?,?,?,?,?)", (user_id, profile_id, access, now, now), ) else: conn.execute("DELETE FROM user_profile_permissions WHERE user_id=?", (user_id,)) return conn.execute("SELECT id, username, role, is_active, created_at, updated_at FROM users WHERE id=?", (user_id,)).fetchone() def delete_user(user_id: int) -> None: require_admin() if int(user_id) == current_user_id(): raise ValueError("Cannot delete current user") with connect() as conn: conn.execute("DELETE FROM user_profile_permissions WHERE user_id=?", (user_id,)) conn.execute("DELETE FROM users WHERE id=? AND username <> 'admin'", (user_id,)) def install_guards(app) -> None: @app.before_request def _auth_guard(): if not enabled(): return None endpoint = request.endpoint or "" if endpoint in PUBLIC_ENDPOINTS or endpoint.startswith("static"): return None if not current_user_id(): if request.path.startswith("/api/"): return jsonify({"ok": False, "error": "Authentication required"}), 401 return redirect(url_for("main.login", next=request.full_path if request.query_string else request.path)) user = current_user() if not user or not int(user.get("is_active") or 0): logout_user() return jsonify({"ok": False, "error": "Authentication required"}), 401 if request.path.startswith("/api/") else redirect(url_for("main.login")) if request.path.startswith("/api/auth/users") and not is_admin(user): return jsonify({"ok": False, "error": "Admin only"}), 403 if request.path.startswith(PROFILE_READ_PREFIXES): profile_id = _request_profile_id() if profile_id and not can_access_profile(profile_id): return jsonify({"ok": False, "error": "Profile access denied"}), 403 if request.method not in {"GET", "HEAD", "OPTIONS"}: if request.path.startswith("/api/") and not same_origin_request(): return jsonify({"ok": False, "error": "Cross-origin API request blocked"}), 403 if request.path.startswith("/api/profiles") and not request.path.endswith("/activate") and not is_admin(user): return jsonify({"ok": False, "error": "Admin only"}), 403 profile_id = _request_profile_id() if request.path.startswith(RTORRENT_CONFIG_PREFIXES) and not can_write_profile(profile_id): return jsonify({"ok": False, "error": "Read-only profile access"}), 403 if request.path.startswith(RTORRENT_WRITE_PREFIXES) and not can_write_profile(profile_id): return jsonify({"ok": False, "error": "Read-only profile access"}), 403 return None def _request_profile_id() -> int | None: if request.view_args and request.view_args.get("profile_id"): return int(request.view_args["profile_id"]) try: payload = request.get_json(silent=True) or {} if payload.get("profile_id"): return int(payload.get("profile_id")) except Exception: pass from . import preferences profile = preferences.active_profile() return int(profile["id"]) if profile else None