-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathauth_functions.py
More file actions
71 lines (60 loc) · 2.2 KB
/
auth_functions.py
File metadata and controls
71 lines (60 loc) · 2.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
from datetime import datetime, timedelta
from typing import Union, List
from jose import JWTError, jwt
from passlib.context import CryptContext
from sql_app import models, schemas
from fastapi import Depends, FastAPI, HTTPException, status, Request
from sql_app.database import SessionLocal, engine
from sqlalchemy.orm import Session
SECRET_KEY = "c9016987f9e3f17a15782632d908a0ba137d5565d718a6970c9830c7b8a82451"
ALGORITHM = "HS256"
ACCESS_TOKEN_EXPIRE_MINUTES = 30
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
def verify_password(plain_password, hashed_password):
return pwd_context.verify(plain_password, hashed_password)
def get_password_hash(password):
return pwd_context.hash(password)
def get_user(db: Session, username: str):
user = db.query(models.User).filter(models.User.Username == username).first()
return user
def create_user(db: Session, user: schemas.User):
db_user = models.User(
Username = user.Username,
Password = pwd_context.hash(user.Password),
Name = user.Name,
CPF = user.CPF,
Role = user.Role
)
db.add(db_user)
db.commit()
db.refresh(db_user)
return db_user
def authenticate_user(db: Session, username: str, password: str):
user = get_user(db, username)
if not user:
return False
if not verify_password(password, user.Password):
return False
return user
def create_access_token(data: dict, expires_delta: Union[timedelta, None] = None):
to_encode = data.copy()
if expires_delta:
expire = datetime.utcnow() + expires_delta
else:
expire = datetime.utcnow() + timedelta(minutes=15)
to_encode.update({"exp": expire})
encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
return encoded_jwt
def verify_user(db: Session, request: Request):
try:
token = request.cookies.get("access_token")
if token is None:
return None
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
username: str = payload.get("sub")
if username is None:
return None
except JWTError:
return None
user = get_user(db, username=username)
return user