-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
ca5d82a
commit 39e2527
Showing
10 changed files
with
377 additions
and
17 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,124 @@ | ||
from datetime import timedelta | ||
from typing import Annotated, Any | ||
|
||
from fastapi import APIRouter, Depends, HTTPException | ||
from fastapi.responses import HTMLResponse | ||
from fastapi.security import OAuth2PasswordRequestForm | ||
|
||
from app import crud | ||
from app.api.deps import CurrentUser, SessionDep, get_current_active_superuser | ||
from app.core import security | ||
from app.core.config import settings | ||
from app.core.security import get_password_hash | ||
from app.models import Message, NewPassword, Token, UserOut | ||
from app.utils import ( | ||
generate_password_reset_token, | ||
generate_reset_password_email, | ||
send_email, | ||
verify_password_reset_token, | ||
) | ||
|
||
router = APIRouter() | ||
|
||
|
||
@router.post("/login/access-token") | ||
def login_access_token( | ||
session: SessionDep, form_data: Annotated[OAuth2PasswordRequestForm, Depends()] | ||
) -> Token: | ||
""" | ||
OAuth2 compatible token login, get an access token for future requests | ||
""" | ||
user = crud.authenticate( | ||
session=session, email=form_data.username, password=form_data.password | ||
) | ||
if not user: | ||
raise HTTPException(status_code=400, detail="Incorrect email or password") | ||
elif not user.is_active: | ||
raise HTTPException(status_code=400, detail="Inactive user") | ||
access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES) | ||
return Token( | ||
access_token=security.create_access_token( | ||
user.id, expires_delta=access_token_expires | ||
) | ||
) | ||
|
||
|
||
@router.post("/login/test-token", response_model=UserOut) | ||
def test_token(current_user: CurrentUser) -> Any: | ||
""" | ||
Test access token | ||
""" | ||
return current_user | ||
|
||
|
||
@router.post("/password-recovery/{email}") | ||
def recover_password(email: str, session: SessionDep) -> Message: | ||
""" | ||
Password Recovery | ||
""" | ||
user = crud.get_user_by_email(session=session, email=email) | ||
|
||
if not user: | ||
raise HTTPException( | ||
status_code=404, | ||
detail="The user with this email does not exist in the system.", | ||
) | ||
password_reset_token = generate_password_reset_token(email=email) | ||
email_data = generate_reset_password_email( | ||
email_to=user.email, email=email, token=password_reset_token | ||
) | ||
send_email( | ||
email_to=user.email, | ||
subject=email_data.subject, | ||
html_content=email_data.html_content, | ||
) | ||
return Message(message="Password recovery email sent") | ||
|
||
|
||
@router.post("/reset-password/") | ||
def reset_password(session: SessionDep, body: NewPassword) -> Message: | ||
""" | ||
Reset password | ||
""" | ||
email = verify_password_reset_token(token=body.token) | ||
if not email: | ||
raise HTTPException(status_code=400, detail="Invalid token") | ||
user = crud.get_user_by_email(session=session, email=email) | ||
if not user: | ||
raise HTTPException( | ||
status_code=404, | ||
detail="The user with this email does not exist in the system.", | ||
) | ||
elif not user.is_active: | ||
raise HTTPException(status_code=400, detail="Inactive user") | ||
hashed_password = get_password_hash(password=body.new_password) | ||
user.hashed_password = hashed_password | ||
session.add(user) | ||
session.commit() | ||
return Message(message="Password updated successfully") | ||
|
||
|
||
@router.post( | ||
"/password-recovery-html-content/{email}", | ||
dependencies=[Depends(get_current_active_superuser)], | ||
response_class=HTMLResponse, | ||
) | ||
def recover_password_html_content(email: str, session: SessionDep) -> Any: | ||
""" | ||
HTML Content for Password Recovery | ||
""" | ||
user = crud.get_user_by_email(session=session, email=email) | ||
|
||
if not user: | ||
raise HTTPException( | ||
status_code=404, | ||
detail="The user with this username does not exist in the system.", | ||
) | ||
password_reset_token = generate_password_reset_token(email=email) | ||
email_data = generate_reset_password_email( | ||
email_to=user.email, email=email, token=password_reset_token | ||
) | ||
|
||
return HTMLResponse( | ||
content=email_data.html_content, headers={"subject:": email_data.subject} | ||
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.