"""Security utilities - JWT, password hashing, RBAC.""" from datetime import datetime, timedelta from typing import Optional, Any from jose import jwt, JWTError from passlib.context import CryptContext from .config import settings pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") # Roles hierarchy class Role: VIEWER = "viewer" ANALYST = "analyst" MANAGER = "manager" ADMIN = "admin" OWNER = "owner" ROLE_HIERARCHY = { Role.VIEWER: 1, Role.ANALYST: 2, Role.MANAGER: 3, Role.ADMIN: 4, Role.OWNER: 5, } def verify_password(plain_password: str, hashed_password: str) -> bool: return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password: str) -> str: return pwd_context.hash(password) def create_access_token(data: dict, expires_delta: Optional[timedelta] = None) -> str: to_encode = data.copy() expire = datetime.utcnow() + (expires_delta or timedelta(minutes=settings.JWT_EXPIRE_MINUTES)) to_encode.update({"exp": expire, "type": "access"}) return jwt.encode(to_encode, settings.JWT_SECRET, algorithm=settings.JWT_ALGORITHM) def create_refresh_token(data: dict) -> str: to_encode = data.copy() expire = datetime.utcnow() + timedelta(days=settings.JWT_REFRESH_DAYS) to_encode.update({"exp": expire, "type": "refresh"}) return jwt.encode(to_encode, settings.JWT_SECRET, algorithm=settings.JWT_ALGORITHM) def decode_token(token: str) -> Optional[dict]: try: payload = jwt.decode(token, settings.JWT_SECRET, algorithms=[settings.JWT_ALGORITHM]) return payload except JWTError: return None def has_permission(user_role: str, required_role: str) -> bool: """Check if user_role has at least the required_role level.""" return ROLE_HIERARCHY.get(user_role, 0) >= ROLE_HIERARCHY.get(required_role, 0)