@weirdfingers/baseboards 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (139) hide show
  1. package/README.md +191 -0
  2. package/dist/index.d.ts +1 -0
  3. package/dist/index.js +887 -0
  4. package/dist/index.js.map +1 -0
  5. package/package.json +64 -0
  6. package/templates/README.md +120 -0
  7. package/templates/api/.env.example +62 -0
  8. package/templates/api/Dockerfile +32 -0
  9. package/templates/api/README.md +132 -0
  10. package/templates/api/alembic/env.py +106 -0
  11. package/templates/api/alembic/script.py.mako +28 -0
  12. package/templates/api/alembic/versions/20250101_000000_initial_schema.py +448 -0
  13. package/templates/api/alembic/versions/20251022_174729_remove_provider_name_from_generations.py +71 -0
  14. package/templates/api/alembic/versions/20251023_165852_switch_to_declarative_base_and_mapping.py +411 -0
  15. package/templates/api/alembic/versions/2025925_62735_add_seed_data_for_default_tenant.py +85 -0
  16. package/templates/api/alembic.ini +36 -0
  17. package/templates/api/config/generators.yaml +25 -0
  18. package/templates/api/config/storage_config.yaml +26 -0
  19. package/templates/api/docs/ADDING_GENERATORS.md +409 -0
  20. package/templates/api/docs/GENERATORS_API.md +502 -0
  21. package/templates/api/docs/MIGRATIONS.md +472 -0
  22. package/templates/api/docs/storage_providers.md +337 -0
  23. package/templates/api/pyproject.toml +165 -0
  24. package/templates/api/src/boards/__init__.py +10 -0
  25. package/templates/api/src/boards/api/app.py +171 -0
  26. package/templates/api/src/boards/api/auth.py +75 -0
  27. package/templates/api/src/boards/api/endpoints/__init__.py +3 -0
  28. package/templates/api/src/boards/api/endpoints/jobs.py +76 -0
  29. package/templates/api/src/boards/api/endpoints/setup.py +505 -0
  30. package/templates/api/src/boards/api/endpoints/sse.py +129 -0
  31. package/templates/api/src/boards/api/endpoints/storage.py +74 -0
  32. package/templates/api/src/boards/api/endpoints/tenant_registration.py +296 -0
  33. package/templates/api/src/boards/api/endpoints/webhooks.py +13 -0
  34. package/templates/api/src/boards/auth/__init__.py +15 -0
  35. package/templates/api/src/boards/auth/adapters/__init__.py +20 -0
  36. package/templates/api/src/boards/auth/adapters/auth0.py +220 -0
  37. package/templates/api/src/boards/auth/adapters/base.py +73 -0
  38. package/templates/api/src/boards/auth/adapters/clerk.py +172 -0
  39. package/templates/api/src/boards/auth/adapters/jwt.py +122 -0
  40. package/templates/api/src/boards/auth/adapters/none.py +102 -0
  41. package/templates/api/src/boards/auth/adapters/oidc.py +284 -0
  42. package/templates/api/src/boards/auth/adapters/supabase.py +110 -0
  43. package/templates/api/src/boards/auth/context.py +35 -0
  44. package/templates/api/src/boards/auth/factory.py +115 -0
  45. package/templates/api/src/boards/auth/middleware.py +221 -0
  46. package/templates/api/src/boards/auth/provisioning.py +129 -0
  47. package/templates/api/src/boards/auth/tenant_extraction.py +278 -0
  48. package/templates/api/src/boards/cli.py +354 -0
  49. package/templates/api/src/boards/config.py +116 -0
  50. package/templates/api/src/boards/database/__init__.py +7 -0
  51. package/templates/api/src/boards/database/cli.py +110 -0
  52. package/templates/api/src/boards/database/connection.py +252 -0
  53. package/templates/api/src/boards/database/models.py +19 -0
  54. package/templates/api/src/boards/database/seed_data.py +182 -0
  55. package/templates/api/src/boards/dbmodels/__init__.py +455 -0
  56. package/templates/api/src/boards/generators/__init__.py +57 -0
  57. package/templates/api/src/boards/generators/artifacts.py +53 -0
  58. package/templates/api/src/boards/generators/base.py +140 -0
  59. package/templates/api/src/boards/generators/implementations/__init__.py +12 -0
  60. package/templates/api/src/boards/generators/implementations/audio/__init__.py +3 -0
  61. package/templates/api/src/boards/generators/implementations/audio/whisper.py +66 -0
  62. package/templates/api/src/boards/generators/implementations/image/__init__.py +3 -0
  63. package/templates/api/src/boards/generators/implementations/image/dalle3.py +93 -0
  64. package/templates/api/src/boards/generators/implementations/image/flux_pro.py +85 -0
  65. package/templates/api/src/boards/generators/implementations/video/__init__.py +3 -0
  66. package/templates/api/src/boards/generators/implementations/video/lipsync.py +70 -0
  67. package/templates/api/src/boards/generators/loader.py +253 -0
  68. package/templates/api/src/boards/generators/registry.py +114 -0
  69. package/templates/api/src/boards/generators/resolution.py +515 -0
  70. package/templates/api/src/boards/generators/testmods/class_gen.py +34 -0
  71. package/templates/api/src/boards/generators/testmods/import_side_effect.py +35 -0
  72. package/templates/api/src/boards/graphql/__init__.py +7 -0
  73. package/templates/api/src/boards/graphql/access_control.py +136 -0
  74. package/templates/api/src/boards/graphql/mutations/root.py +136 -0
  75. package/templates/api/src/boards/graphql/queries/root.py +116 -0
  76. package/templates/api/src/boards/graphql/resolvers/__init__.py +8 -0
  77. package/templates/api/src/boards/graphql/resolvers/auth.py +12 -0
  78. package/templates/api/src/boards/graphql/resolvers/board.py +1055 -0
  79. package/templates/api/src/boards/graphql/resolvers/generation.py +889 -0
  80. package/templates/api/src/boards/graphql/resolvers/generator.py +50 -0
  81. package/templates/api/src/boards/graphql/resolvers/user.py +25 -0
  82. package/templates/api/src/boards/graphql/schema.py +81 -0
  83. package/templates/api/src/boards/graphql/types/board.py +102 -0
  84. package/templates/api/src/boards/graphql/types/generation.py +130 -0
  85. package/templates/api/src/boards/graphql/types/generator.py +17 -0
  86. package/templates/api/src/boards/graphql/types/user.py +47 -0
  87. package/templates/api/src/boards/jobs/repository.py +104 -0
  88. package/templates/api/src/boards/logging.py +195 -0
  89. package/templates/api/src/boards/middleware.py +339 -0
  90. package/templates/api/src/boards/progress/__init__.py +4 -0
  91. package/templates/api/src/boards/progress/models.py +25 -0
  92. package/templates/api/src/boards/progress/publisher.py +64 -0
  93. package/templates/api/src/boards/py.typed +0 -0
  94. package/templates/api/src/boards/redis_pool.py +118 -0
  95. package/templates/api/src/boards/storage/__init__.py +52 -0
  96. package/templates/api/src/boards/storage/base.py +363 -0
  97. package/templates/api/src/boards/storage/config.py +187 -0
  98. package/templates/api/src/boards/storage/factory.py +278 -0
  99. package/templates/api/src/boards/storage/implementations/__init__.py +27 -0
  100. package/templates/api/src/boards/storage/implementations/gcs.py +340 -0
  101. package/templates/api/src/boards/storage/implementations/local.py +201 -0
  102. package/templates/api/src/boards/storage/implementations/s3.py +294 -0
  103. package/templates/api/src/boards/storage/implementations/supabase.py +218 -0
  104. package/templates/api/src/boards/tenant_isolation.py +446 -0
  105. package/templates/api/src/boards/validation.py +262 -0
  106. package/templates/api/src/boards/workers/__init__.py +1 -0
  107. package/templates/api/src/boards/workers/actors.py +201 -0
  108. package/templates/api/src/boards/workers/cli.py +125 -0
  109. package/templates/api/src/boards/workers/context.py +188 -0
  110. package/templates/api/src/boards/workers/middleware.py +58 -0
  111. package/templates/api/src/py.typed +0 -0
  112. package/templates/compose.dev.yaml +39 -0
  113. package/templates/compose.yaml +109 -0
  114. package/templates/docker/env.example +23 -0
  115. package/templates/web/.env.example +28 -0
  116. package/templates/web/Dockerfile +51 -0
  117. package/templates/web/components.json +22 -0
  118. package/templates/web/imageLoader.js +18 -0
  119. package/templates/web/next-env.d.ts +5 -0
  120. package/templates/web/next.config.js +36 -0
  121. package/templates/web/package.json +37 -0
  122. package/templates/web/postcss.config.mjs +7 -0
  123. package/templates/web/public/favicon.ico +0 -0
  124. package/templates/web/src/app/boards/[boardId]/page.tsx +232 -0
  125. package/templates/web/src/app/globals.css +120 -0
  126. package/templates/web/src/app/layout.tsx +21 -0
  127. package/templates/web/src/app/page.tsx +35 -0
  128. package/templates/web/src/app/providers.tsx +18 -0
  129. package/templates/web/src/components/boards/ArtifactInputSlots.tsx +142 -0
  130. package/templates/web/src/components/boards/ArtifactPreview.tsx +125 -0
  131. package/templates/web/src/components/boards/GenerationGrid.tsx +45 -0
  132. package/templates/web/src/components/boards/GenerationInput.tsx +251 -0
  133. package/templates/web/src/components/boards/GeneratorSelector.tsx +89 -0
  134. package/templates/web/src/components/header.tsx +30 -0
  135. package/templates/web/src/components/ui/button.tsx +58 -0
  136. package/templates/web/src/components/ui/card.tsx +92 -0
  137. package/templates/web/src/components/ui/navigation-menu.tsx +168 -0
  138. package/templates/web/src/lib/utils.ts +6 -0
  139. package/templates/web/tsconfig.json +47 -0
@@ -0,0 +1,284 @@
1
+ """Generic OIDC authentication adapter."""
2
+
3
+ from __future__ import annotations
4
+
5
+ import time
6
+ from typing import Any
7
+ from uuid import UUID
8
+
9
+ import httpx
10
+ import jwt
11
+
12
+ from ...logging import get_logger
13
+ from .base import AuthenticationError, Principal
14
+
15
+ logger = get_logger(__name__)
16
+
17
+
18
+ class OIDCAdapter:
19
+ """Generic OIDC authentication adapter."""
20
+
21
+ def __init__(
22
+ self,
23
+ issuer: str,
24
+ client_id: str,
25
+ client_secret: str | None = None,
26
+ audience: str | None = None,
27
+ jwks_url: str | None = None,
28
+ jwks_cache_ttl: int = 3600, # 1 hour default TTL
29
+ ):
30
+ """
31
+ Initialize OIDC adapter.
32
+
33
+ Args:
34
+ issuer: OIDC issuer URL (e.g., "https://accounts.google.com")
35
+ client_id: OIDC client ID
36
+ client_secret: Optional client secret for API calls
37
+ audience: Optional audience/client_id for token validation
38
+ jwks_url: Optional JWKS URL (auto-discovered if not provided)
39
+ jwks_cache_ttl: JWKS cache TTL in seconds (default: 3600 = 1 hour)
40
+ """
41
+ self.issuer = issuer.rstrip("/")
42
+ self.client_id = client_id
43
+ self.client_secret = client_secret
44
+ self.audience = audience or client_id
45
+ self.jwks_url = jwks_url
46
+ self.jwks_cache_ttl = jwks_cache_ttl
47
+ self._oidc_config: dict[str, Any] = {}
48
+ # Cache structure: {"data": jwks_data, "expires_at": timestamp}
49
+ self._jwks_cache: dict[str, Any] = {}
50
+ self._http_client = httpx.AsyncClient()
51
+
52
+ async def verify_token(self, token: str) -> Principal:
53
+ """Verify an OIDC JWT token and return the principal."""
54
+ try:
55
+ # JWT library already imported
56
+ from jwt.exceptions import InvalidTokenError
57
+
58
+ # Get OIDC configuration and JWKS
59
+ await self._ensure_oidc_config()
60
+ jwks = await self._get_jwks()
61
+
62
+ # Decode JWT header to get key ID
63
+ unverified_header = jwt.get_unverified_header(token)
64
+ kid = unverified_header.get("kid")
65
+
66
+ if not kid:
67
+ raise AuthenticationError("Missing 'kid' in JWT header")
68
+
69
+ # Find the matching key
70
+ key = None
71
+ for jwk in jwks.get("keys", []):
72
+ if jwk.get("kid") == kid:
73
+ # Store the JWK - PyJWT handles RSA/EC conversion internally
74
+ key = jwk
75
+ break
76
+
77
+ if not key:
78
+ raise AuthenticationError(f"Unable to find key with kid: {kid}")
79
+
80
+ # Determine algorithm from JWK
81
+ alg = jwk.get("alg", "RS256")
82
+
83
+ # Verify and decode the token
84
+ payload = jwt.decode(
85
+ token,
86
+ key,
87
+ algorithms=[alg],
88
+ issuer=self.issuer,
89
+ audience=self.audience,
90
+ options={
91
+ "verify_exp": True,
92
+ "verify_nbf": True,
93
+ "verify_iat": True,
94
+ "verify_aud": True,
95
+ "verify_iss": True,
96
+ },
97
+ )
98
+
99
+ # Extract required claims
100
+ subject = payload.get("sub")
101
+ if not subject:
102
+ raise AuthenticationError("Missing 'sub' claim in token")
103
+
104
+ # Build principal from OIDC claims
105
+ principal = Principal(
106
+ provider="oidc",
107
+ subject=subject,
108
+ )
109
+
110
+ # Add optional standard OIDC claims
111
+ if email := payload.get("email"):
112
+ principal["email"] = email
113
+
114
+ # Extract name information
115
+ if name := payload.get("name"):
116
+ principal["display_name"] = name
117
+ elif given_name := payload.get("given_name"):
118
+ family_name = payload.get("family_name", "")
119
+ principal["display_name"] = f"{given_name} {family_name}".strip()
120
+ elif preferred_username := payload.get("preferred_username"):
121
+ principal["display_name"] = preferred_username
122
+
123
+ if picture := payload.get("picture"):
124
+ principal["avatar_url"] = picture
125
+
126
+ # Store all claims for additional context
127
+ principal["claims"] = payload
128
+
129
+ return principal
130
+
131
+ except ImportError as e:
132
+ raise AuthenticationError("PyJWT is required for OIDC authentication") from e
133
+ except InvalidTokenError as e:
134
+ logger.warning(f"OIDC JWT token validation failed: {e}")
135
+ raise AuthenticationError(f"Invalid token: {e}") from e
136
+ except Exception as e:
137
+ logger.error(f"Unexpected error verifying OIDC token: {e}")
138
+ raise AuthenticationError("Token verification failed") from e
139
+
140
+ async def issue_token(self, user_id: UUID | None = None, claims: dict | None = None) -> str:
141
+ """
142
+ Issue a new token via OIDC provider (rarely supported).
143
+
144
+ Most OIDC providers handle token issuance via client libraries.
145
+ """
146
+ raise NotImplementedError("Token issuance should be handled by OIDC client libraries")
147
+
148
+ async def get_user_info(self, token: str) -> dict:
149
+ """Get additional user information from OIDC userinfo endpoint."""
150
+ try:
151
+ await self._ensure_oidc_config()
152
+ userinfo_endpoint = self._oidc_config.get("userinfo_endpoint")
153
+
154
+ if not userinfo_endpoint:
155
+ logger.warning("No userinfo_endpoint in OIDC configuration")
156
+ return {}
157
+
158
+ response = await self._http_client.get(
159
+ userinfo_endpoint,
160
+ headers={
161
+ "Authorization": f"Bearer {token}",
162
+ "Content-Type": "application/json",
163
+ },
164
+ )
165
+
166
+ if response.status_code == 200:
167
+ return response.json()
168
+ else:
169
+ logger.warning(f"Failed to get OIDC user info: {response.status_code}")
170
+ return {}
171
+
172
+ except Exception as e:
173
+ logger.warning(f"Failed to get OIDC user info: {e}")
174
+ return {}
175
+
176
+ async def _ensure_oidc_config(self) -> None:
177
+ """Ensure OIDC discovery configuration is loaded."""
178
+ if self._oidc_config:
179
+ return
180
+
181
+ try:
182
+ # OIDC Discovery
183
+ discovery_url = f"{self.issuer}/.well-known/openid_configuration"
184
+ response = await self._http_client.get(discovery_url)
185
+ response.raise_for_status()
186
+
187
+ self._oidc_config = response.json()
188
+
189
+ # Set JWKS URL if not provided
190
+ if not self.jwks_url:
191
+ self.jwks_url = self._oidc_config.get("jwks_uri")
192
+
193
+ if not self.jwks_url:
194
+ raise AuthenticationError("Unable to determine JWKS URL")
195
+
196
+ except Exception as e:
197
+ logger.error(f"Failed to load OIDC configuration: {e}")
198
+ raise AuthenticationError("Unable to load OIDC configuration") from e
199
+
200
+ async def _get_jwks(self) -> dict[str, Any]:
201
+ """Get JWKS from OIDC provider for JWT verification with TTL caching."""
202
+ try:
203
+ # Ensure we have JWKS URL
204
+ if not self.jwks_url:
205
+ await self._ensure_oidc_config()
206
+
207
+ current_time = time.time()
208
+
209
+ # Check cache first with TTL
210
+ if (
211
+ self._jwks_cache
212
+ and "data" in self._jwks_cache
213
+ and "expires_at" in self._jwks_cache
214
+ and current_time < self._jwks_cache["expires_at"]
215
+ ):
216
+ logger.debug(
217
+ "Returning cached JWKS",
218
+ cache_expires_in=int(self._jwks_cache["expires_at"] - current_time),
219
+ )
220
+ return self._jwks_cache["data"]
221
+
222
+ # Cache expired or empty, fetch fresh JWKS
223
+ if self._jwks_cache:
224
+ logger.info(
225
+ "JWKS cache expired, fetching fresh data",
226
+ cache_age=int(
227
+ current_time
228
+ - (self._jwks_cache.get("expires_at", current_time) - self.jwks_cache_ttl)
229
+ ),
230
+ )
231
+
232
+ # Ensure jwks_url is available after config check
233
+ if not self.jwks_url:
234
+ raise AuthenticationError("JWKS URL not available after configuration")
235
+
236
+ logger.debug("Fetching JWKS from provider", jwks_url=self.jwks_url)
237
+ response = await self._http_client.get(self.jwks_url)
238
+ response.raise_for_status()
239
+
240
+ jwks = response.json()
241
+
242
+ # Determine TTL from cache-control header or use default
243
+ cache_ttl = self.jwks_cache_ttl
244
+ cache_control = response.headers.get("cache-control", "")
245
+ if "max-age=" in cache_control:
246
+ try:
247
+ # Extract max-age value from cache-control header
248
+ max_age_str = cache_control.split("max-age=")[1].split(",")[0].split(";")[0]
249
+ header_ttl = int(max_age_str)
250
+ # Use the smaller of header TTL and configured TTL for security
251
+ cache_ttl = min(header_ttl, self.jwks_cache_ttl)
252
+ logger.debug(
253
+ "Using cache-control max-age",
254
+ header_ttl=header_ttl,
255
+ effective_ttl=cache_ttl,
256
+ )
257
+ except (ValueError, IndexError):
258
+ logger.debug(
259
+ "Could not parse cache-control max-age, using default TTL",
260
+ default_ttl=cache_ttl,
261
+ )
262
+
263
+ # Update cache with TTL
264
+ expires_at = current_time + cache_ttl
265
+ self._jwks_cache = {"data": jwks, "expires_at": expires_at}
266
+
267
+ logger.info(
268
+ "Updated JWKS cache",
269
+ cache_ttl=cache_ttl,
270
+ expires_at=int(expires_at),
271
+ keys_count=len(jwks.get("keys", [])),
272
+ )
273
+
274
+ return jwks
275
+
276
+ except Exception as e:
277
+ logger.error("Failed to fetch JWKS from OIDC provider", error=str(e))
278
+ raise AuthenticationError("Unable to verify token - JWKS unavailable") from e
279
+
280
+ async def __aenter__(self):
281
+ return self
282
+
283
+ async def __aexit__(self, exc_type, exc_val, exc_tb):
284
+ await self._http_client.aclose()
@@ -0,0 +1,110 @@
1
+ """Supabase authentication adapter."""
2
+
3
+ from __future__ import annotations
4
+
5
+ from uuid import UUID
6
+
7
+ import jwt
8
+ from supabase import Client, create_client
9
+
10
+ from ...logging import get_logger
11
+ from .base import AuthenticationError, Principal
12
+
13
+ logger = get_logger(__name__)
14
+
15
+
16
+ class SupabaseAuthAdapter:
17
+ """Supabase authentication adapter."""
18
+
19
+ def __init__(self, url: str, service_role_key: str):
20
+ """
21
+ Initialize Supabase adapter.
22
+
23
+ Args:
24
+ url: Supabase project URL
25
+ service_role_key: Service role key for admin operations
26
+ """
27
+ self.url = url
28
+ self.service_role_key = service_role_key
29
+ self.client: Client = create_client(url, service_role_key)
30
+
31
+ async def verify_token(self, token: str) -> Principal:
32
+ """Verify a Supabase JWT token and return the principal."""
33
+ try:
34
+ # Get user info from Supabase auth
35
+ user_response = self.client.auth.get_user(token)
36
+
37
+ if not user_response or not user_response.user:
38
+ raise AuthenticationError("Invalid or expired token")
39
+
40
+ user = user_response.user
41
+
42
+ # Build principal from Supabase user
43
+ principal = Principal(
44
+ provider="supabase",
45
+ subject=user.id,
46
+ )
47
+
48
+ # Add optional user data
49
+ if user.email:
50
+ principal["email"] = user.email
51
+
52
+ # Extract display name from user metadata
53
+ if user.user_metadata:
54
+ if display_name := user.user_metadata.get("display_name") or user.user_metadata.get(
55
+ "full_name"
56
+ ):
57
+ principal["display_name"] = display_name
58
+ if avatar_url := user.user_metadata.get("avatar_url"):
59
+ principal["avatar_url"] = avatar_url
60
+
61
+ # Store raw claims for additional context
62
+ try:
63
+ # Decode JWT without verification to get all claims
64
+ # (we already verified via Supabase API)
65
+ decoded = jwt.decode(token, options={"verify_signature": False})
66
+ principal["claims"] = decoded
67
+ except Exception as e:
68
+ logger.debug("Could not decode JWT claims", error=str(e))
69
+
70
+ return principal
71
+
72
+ except Exception as e:
73
+ logger.warning("Supabase token validation failed", error=str(e))
74
+ raise AuthenticationError(f"Invalid token: {e}") from e
75
+
76
+ async def issue_token(self, user_id: UUID | None = None, claims: dict | None = None) -> str:
77
+ """
78
+ Issue a new token via Supabase (not commonly used).
79
+
80
+ Note: Supabase typically handles token issuance on the client side.
81
+ This method is provided for completeness but may not be used in practice.
82
+ """
83
+ # Supabase doesn't provide a direct server-side token issuance API
84
+ # This would typically be done on the client side
85
+ raise NotImplementedError("Token issuance should be handled by Supabase client libraries")
86
+
87
+ async def get_user_info(self, token: str) -> dict:
88
+ """Get additional user information from Supabase."""
89
+ try:
90
+ user_response = self.client.auth.get_user(token)
91
+
92
+ if not user_response or not user_response.user:
93
+ return {}
94
+
95
+ user = user_response.user
96
+
97
+ return {
98
+ "id": user.id,
99
+ "email": user.email,
100
+ "email_confirmed_at": user.email_confirmed_at,
101
+ "phone": user.phone,
102
+ "created_at": user.created_at,
103
+ "updated_at": user.updated_at,
104
+ "user_metadata": user.user_metadata,
105
+ "app_metadata": user.app_metadata,
106
+ }
107
+
108
+ except Exception as e:
109
+ logger.warning("Failed to get Supabase user info", error=str(e))
110
+ return {}
@@ -0,0 +1,35 @@
1
+ """Authentication context for request handling."""
2
+
3
+ from __future__ import annotations
4
+
5
+ from dataclasses import dataclass
6
+ from uuid import UUID
7
+
8
+ from .adapters.base import Principal
9
+
10
+ # Default tenant UUID for single-tenant deployments or when tenant resolution fails
11
+ # This null UUID (00000000-0000-0000-0000-000000000000) is used when:
12
+ # - Running in single-tenant mode
13
+ # - Local development without multi-tenant setup
14
+ # - Tenant slug resolution fails
15
+ DEFAULT_TENANT_UUID = UUID("00000000-0000-0000-0000-000000000000")
16
+
17
+
18
+ @dataclass
19
+ class AuthContext:
20
+ """Runtime authentication context for a request."""
21
+
22
+ user_id: UUID | None
23
+ tenant_id: UUID
24
+ principal: Principal | None
25
+ token: str | None
26
+
27
+ @property
28
+ def is_authenticated(self) -> bool:
29
+ """Check if the request is authenticated."""
30
+ return self.user_id is not None and self.principal is not None
31
+
32
+ @property
33
+ def provider(self) -> str | None:
34
+ """Get the authentication provider name."""
35
+ return self.principal["provider"] if self.principal else None
@@ -0,0 +1,115 @@
1
+ """Factory for creating auth adapters based on configuration."""
2
+
3
+ from __future__ import annotations
4
+
5
+ import json
6
+ import os
7
+
8
+ from .adapters.auth0 import Auth0OIDCAdapter
9
+ from .adapters.base import AuthAdapter
10
+ from .adapters.clerk import ClerkAuthAdapter
11
+ from .adapters.jwt import JWTAuthAdapter
12
+ from .adapters.none import NoAuthAdapter
13
+ from .adapters.oidc import OIDCAdapter
14
+ from .adapters.supabase import SupabaseAuthAdapter
15
+
16
+
17
+ def get_auth_adapter() -> AuthAdapter:
18
+ """Create and return the configured auth adapter."""
19
+ provider = os.getenv("BOARDS_AUTH_PROVIDER", "none") # Default to no-auth for dev
20
+ config_str = os.getenv("BOARDS_AUTH_CONFIG", "{}")
21
+
22
+ try:
23
+ config = json.loads(config_str)
24
+ except json.JSONDecodeError:
25
+ config = {}
26
+
27
+ if provider == "none":
28
+ # No-auth mode for local development
29
+ return NoAuthAdapter(
30
+ default_user_id=config.get("default_user_id", "dev-user"),
31
+ default_tenant=config.get("default_tenant", "default"),
32
+ )
33
+
34
+ elif provider == "jwt":
35
+ secret_key = config.get("secret_key") or os.getenv("BOARDS_JWT_SECRET")
36
+ if not secret_key:
37
+ raise ValueError(
38
+ "JWT secret key is required. Set BOARDS_JWT_SECRET or provide in config."
39
+ )
40
+
41
+ return JWTAuthAdapter(
42
+ secret_key=secret_key,
43
+ algorithm=config.get("algorithm", "HS256"),
44
+ issuer=config.get("issuer", "boards"),
45
+ audience=config.get("audience", "boards-api"),
46
+ )
47
+
48
+ elif provider == "supabase":
49
+ url = config.get("url") or os.getenv("SUPABASE_URL")
50
+ service_role_key = config.get("service_role_key") or os.getenv("SUPABASE_SERVICE_ROLE_KEY")
51
+
52
+ if not url or not service_role_key:
53
+ raise ValueError(
54
+ "Supabase URL and service role key are required. "
55
+ "Set SUPABASE_URL and SUPABASE_SERVICE_ROLE_KEY or provide in config."
56
+ )
57
+
58
+ return SupabaseAuthAdapter(url=url, service_role_key=service_role_key)
59
+
60
+ elif provider == "clerk":
61
+ secret_key = config.get("secret_key") or os.getenv("CLERK_SECRET_KEY")
62
+ if not secret_key:
63
+ raise ValueError(
64
+ "Clerk secret key is required. " "Set CLERK_SECRET_KEY or provide in config."
65
+ )
66
+
67
+ return ClerkAuthAdapter(
68
+ secret_key=secret_key,
69
+ jwks_url=config.get("jwks_url"),
70
+ )
71
+
72
+ elif provider == "auth0":
73
+ domain = config.get("domain") or os.getenv("AUTH0_DOMAIN")
74
+ audience = config.get("audience") or os.getenv("AUTH0_AUDIENCE")
75
+
76
+ if not domain or not audience:
77
+ raise ValueError(
78
+ "Auth0 domain and audience are required. "
79
+ "Set AUTH0_DOMAIN and AUTH0_AUDIENCE or provide in config."
80
+ )
81
+
82
+ return Auth0OIDCAdapter(
83
+ domain=domain,
84
+ audience=audience,
85
+ client_id=config.get("client_id") or os.getenv("AUTH0_CLIENT_ID"),
86
+ client_secret=config.get("client_secret") or os.getenv("AUTH0_CLIENT_SECRET"),
87
+ )
88
+
89
+ elif provider == "oidc":
90
+ issuer = config.get("issuer") or os.getenv("OIDC_ISSUER")
91
+ client_id = config.get("client_id") or os.getenv("OIDC_CLIENT_ID")
92
+
93
+ if not issuer or not client_id:
94
+ raise ValueError(
95
+ "OIDC issuer and client_id are required. "
96
+ "Set OIDC_ISSUER and OIDC_CLIENT_ID or provide in config."
97
+ )
98
+
99
+ return OIDCAdapter(
100
+ issuer=issuer,
101
+ client_id=client_id,
102
+ client_secret=config.get("client_secret") or os.getenv("OIDC_CLIENT_SECRET"),
103
+ audience=config.get("audience") or os.getenv("OIDC_AUDIENCE"),
104
+ jwks_url=config.get("jwks_url") or os.getenv("OIDC_JWKS_URL"),
105
+ )
106
+
107
+ else:
108
+ raise ValueError(f"Unsupported auth provider: {provider}")
109
+
110
+
111
+ def get_auth_adapter_cached() -> AuthAdapter:
112
+ """Get the auth adapter instance (no global caching for thread safety)."""
113
+ # Create fresh adapter each time to avoid global state issues
114
+ # The cost of adapter creation is minimal and this ensures thread/test safety
115
+ return get_auth_adapter()