auths.py 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. from fastapi import Response, Request
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union
  5. from fastapi import APIRouter
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. from apps.web.models.auths import (
  10. SigninForm,
  11. SignupForm,
  12. UpdatePasswordForm,
  13. UserResponse,
  14. SigninResponse,
  15. Auths,
  16. )
  17. from apps.web.models.users import Users
  18. from utils.utils import get_password_hash, get_current_user, create_token
  19. from utils.misc import get_gravatar_url, validate_email_format
  20. from constants import ERROR_MESSAGES
  21. router = APIRouter()
  22. ############################
  23. # GetSessionUser
  24. ############################
  25. @router.get("/", response_model=UserResponse)
  26. async def get_session_user(user=Depends(get_current_user)):
  27. return {
  28. "id": user.id,
  29. "email": user.email,
  30. "name": user.name,
  31. "role": user.role,
  32. "profile_image_url": user.profile_image_url,
  33. }
  34. ############################
  35. # Update Password
  36. ############################
  37. @router.post("/update/password", response_model=bool)
  38. async def update_password(form_data: UpdatePasswordForm,
  39. session_user=Depends(get_current_user)):
  40. if session_user:
  41. user = Auths.authenticate_user(session_user.email, form_data.password)
  42. if user:
  43. hashed = get_password_hash(form_data.new_password)
  44. return Auths.update_user_password_by_id(user.id, hashed)
  45. else:
  46. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_PASSWORD)
  47. else:
  48. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  49. ############################
  50. # SignIn
  51. ############################
  52. @router.post("/signin", response_model=SigninResponse)
  53. async def signin(form_data: SigninForm):
  54. user = Auths.authenticate_user(form_data.email.lower(), form_data.password)
  55. if user:
  56. token = create_token(data={"email": user.email})
  57. return {
  58. "token": token,
  59. "token_type": "Bearer",
  60. "id": user.id,
  61. "email": user.email,
  62. "name": user.name,
  63. "role": user.role,
  64. "profile_image_url": user.profile_image_url,
  65. }
  66. else:
  67. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  68. ############################
  69. # SignUp
  70. ############################
  71. @router.post("/signup", response_model=SigninResponse)
  72. async def signup(request: Request, form_data: SignupForm):
  73. if request.app.state.ENABLE_SIGNUP:
  74. if validate_email_format(form_data.email.lower()):
  75. if not Users.get_user_by_email(form_data.email.lower()):
  76. try:
  77. role = "admin" if Users.get_num_users() == 0 else "pending"
  78. hashed = get_password_hash(form_data.password)
  79. user = Auths.insert_new_auth(form_data.email.lower(),
  80. hashed, form_data.name, role)
  81. if user:
  82. token = create_token(data={"email": user.email})
  83. # response.set_cookie(key='token', value=token, httponly=True)
  84. return {
  85. "token": token,
  86. "token_type": "Bearer",
  87. "id": user.id,
  88. "email": user.email,
  89. "name": user.name,
  90. "role": user.role,
  91. "profile_image_url": user.profile_image_url,
  92. }
  93. else:
  94. raise HTTPException(
  95. 500, detail=ERROR_MESSAGES.CREATE_USER_ERROR)
  96. except Exception as err:
  97. raise HTTPException(500,
  98. detail=ERROR_MESSAGES.DEFAULT(err))
  99. else:
  100. raise HTTPException(400, detail=ERROR_MESSAGES.EMAIL_TAKEN)
  101. else:
  102. raise HTTPException(400,
  103. detail=ERROR_MESSAGES.INVALID_EMAIL_FORMAT)
  104. else:
  105. raise HTTPException(400, detail=ERROR_MESSAGES.ACCESS_PROHIBITED)
  106. ############################
  107. # ToggleSignUp
  108. ############################
  109. @router.get("/signup/enabled", response_model=bool)
  110. async def get_sign_up_status(request: Request, user=Depends(get_current_user)):
  111. if user.role == "admin":
  112. return request.app.state.ENABLE_SIGNUP
  113. else:
  114. raise HTTPException(
  115. status_code=status.HTTP_403_FORBIDDEN,
  116. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  117. )
  118. @router.get("/signup/enabled/toggle", response_model=bool)
  119. async def toggle_sign_up(request: Request, user=Depends(get_current_user)):
  120. if user.role == "admin":
  121. request.app.state.ENABLE_SIGNUP = not request.app.state.ENABLE_SIGNUP
  122. return request.app.state.ENABLE_SIGNUP
  123. else:
  124. raise HTTPException(
  125. status_code=status.HTTP_403_FORBIDDEN,
  126. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  127. )