auths.py 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. from fastapi import Response
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union
  5. from fastapi import APIRouter
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. from apps.web.models.auths import (
  10. SigninForm,
  11. SignupForm,
  12. UpdatePasswordForm,
  13. UserResponse,
  14. SigninResponse,
  15. Auths,
  16. )
  17. from apps.web.models.users import Users
  18. from utils.utils import (
  19. get_password_hash,
  20. get_current_user,
  21. create_token,
  22. )
  23. from utils.misc import get_gravatar_url
  24. from constants import ERROR_MESSAGES
  25. router = APIRouter()
  26. ############################
  27. # GetSessionUser
  28. ############################
  29. @router.get("/", response_model=UserResponse)
  30. async def get_session_user(user=Depends(get_current_user)):
  31. return {
  32. "id": user.id,
  33. "email": user.email,
  34. "name": user.name,
  35. "role": user.role,
  36. "profile_image_url": user.profile_image_url,
  37. }
  38. ############################
  39. # Update Password
  40. ############################
  41. @router.post("/update/password", response_model=bool)
  42. async def update_password(form_data: UpdatePasswordForm, cred=Depends(bearer_scheme)):
  43. token = cred.credentials
  44. session_user = Users.get_user_by_token(token)
  45. if session_user:
  46. user = Auths.authenticate_user(session_user.email, form_data.password)
  47. if user:
  48. hashed = get_password_hash(form_data.new_password)
  49. return Auths.update_user_password_by_id(user.id, hashed)
  50. else:
  51. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_PASSWORD)
  52. else:
  53. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  54. ############################
  55. # SignIn
  56. ############################
  57. @router.post("/signin", response_model=SigninResponse)
  58. async def signin(form_data: SigninForm):
  59. user = Auths.authenticate_user(form_data.email.lower(), form_data.password)
  60. if user:
  61. token = create_token(data={"email": user.email})
  62. return {
  63. "token": token,
  64. "token_type": "Bearer",
  65. "id": user.id,
  66. "email": user.email,
  67. "name": user.name,
  68. "role": user.role,
  69. "profile_image_url": user.profile_image_url,
  70. }
  71. else:
  72. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  73. ############################
  74. # SignUp
  75. ############################
  76. @router.post("/signup", response_model=SigninResponse)
  77. async def signup(form_data: SignupForm):
  78. if not Users.get_user_by_email(form_data.email.lower()):
  79. try:
  80. role = "admin" if Users.get_num_users() == 0 else "pending"
  81. hashed = get_password_hash(form_data.password)
  82. user = Auths.insert_new_auth(
  83. form_data.email.lower(), hashed, form_data.name, role
  84. )
  85. if user:
  86. token = create_token(data={"email": user.email})
  87. # response.set_cookie(key='token', value=token, httponly=True)
  88. return {
  89. "token": token,
  90. "token_type": "Bearer",
  91. "id": user.id,
  92. "email": user.email,
  93. "name": user.name,
  94. "role": user.role,
  95. "profile_image_url": user.profile_image_url,
  96. }
  97. else:
  98. raise HTTPException(500, detail=ERROR_MESSAGES.CREATE_USER_ERROR)
  99. except Exception as err:
  100. raise HTTPException(500, detail=ERROR_MESSAGES.DEFAULT(err))
  101. else:
  102. raise HTTPException(400, detail=ERROR_MESSAGES.EMAIL_TAKEN)