Files
StarPunk/starpunk/dev_auth.py
Phil Skentelbery 0cca8169ce feat: Implement Phase 4 Web Interface with bugfixes (v0.5.2)
## Phase 4: Web Interface Implementation

Implemented complete web interface with public and admin routes,
templates, CSS, and development authentication.

### Core Features

**Public Routes**:
- Homepage with recent published notes
- Note permalinks with microformats2
- Server-side rendering (Jinja2)

**Admin Routes**:
- Login via IndieLogin
- Dashboard with note management
- Create, edit, delete notes
- Protected with @require_auth decorator

**Development Authentication**:
- Dev login bypass for local testing (DEV_MODE only)
- Security safeguards per ADR-011
- Returns 404 when disabled

**Templates & Frontend**:
- Base layouts (public + admin)
- 8 HTML templates with microformats2
- Custom responsive CSS (114 lines)
- Error pages (404, 500)

### Bugfixes (v0.5.1 → v0.5.2)

1. **Cookie collision fix (v0.5.1)**:
   - Renamed auth cookie from "session" to "starpunk_session"
   - Fixed redirect loop between dev login and admin dashboard
   - Flask's session cookie no longer conflicts with auth

2. **HTTP 404 error handling (v0.5.1)**:
   - Update route now returns 404 for nonexistent notes
   - Delete route now returns 404 for nonexistent notes
   - Follows ADR-012 HTTP Error Handling Policy
   - Pattern consistency across all admin routes

3. **Note model enhancement (v0.5.2)**:
   - Exposed deleted_at field from database schema
   - Enables soft deletion verification in tests
   - Follows ADR-013 transparency principle

### Architecture

**New ADRs**:
- ADR-011: Development Authentication Mechanism
- ADR-012: HTTP Error Handling Policy
- ADR-013: Expose deleted_at Field in Note Model

**Standards Compliance**:
- Uses uv for Python environment
- Black formatted, Flake8 clean
- Follows git branching strategy
- Version incremented per versioning strategy

### Test Results

- 405/406 tests passing (99.75%)
- 87% code coverage
- All security tests passing
- Manual testing confirmed working

### Documentation

- Complete implementation reports in docs/reports/
- Architecture reviews in docs/reviews/
- Design documents in docs/design/
- CHANGELOG updated for v0.5.2

### Files Changed

**New Modules**:
- starpunk/dev_auth.py
- starpunk/routes/ (public, admin, auth, dev_auth)

**Templates**: 10 files (base, pages, admin, errors)
**Static**: CSS and optional JavaScript
**Tests**: 4 test files for routes and templates
**Docs**: 20+ architectural and implementation documents

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-11-18 23:01:53 -07:00

70 lines
1.9 KiB
Python

"""
Development authentication utilities for StarPunk
WARNING: These functions provide authentication bypass for local development.
They should ONLY be used when DEV_MODE=true.
This module contains utilities that should never be used in production.
"""
import logging
from flask import current_app
from starpunk.auth import create_session
logger = logging.getLogger(__name__)
def is_dev_mode() -> bool:
"""
Check if development mode is enabled
Returns:
bool: True if DEV_MODE is explicitly set to True, False otherwise
Security:
This function is used to guard all development authentication features.
It explicitly checks for True (not just truthy values).
"""
return current_app.config.get("DEV_MODE", False) is True
def create_dev_session(me: str) -> str:
"""
Create a development session without authentication
WARNING: This creates an authenticated session WITHOUT any verification.
Only call this function after verifying is_dev_mode() returns True.
Args:
me: The identity URL to create a session for (typically DEV_ADMIN_ME)
Returns:
str: Session token for the created session
Raises:
ValueError: If me is empty or invalid
Logs:
WARNING: Logs that dev authentication was used (for security audit trail)
Security:
- Should only be called when DEV_MODE=true
- Logs warning on every use
- Uses same session creation as production (just skips auth)
"""
if not me:
raise ValueError("Identity (me) is required")
# Log security warning
logger.warning(
f"DEV MODE: Creating session for {me} WITHOUT authentication. "
"This should NEVER happen in production!"
)
# Create session using production session creation
# This ensures dev sessions work exactly like production sessions
session_token = create_session(me)
return session_token