auths.py 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239
  1. from fastapi import Response, Request
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union
  5. from fastapi import APIRouter, status
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. import re
  10. from apps.web.models.auths import (
  11. SigninForm,
  12. SignupForm,
  13. UpdateProfileForm,
  14. UpdatePasswordForm,
  15. UserResponse,
  16. SigninResponse,
  17. Auths,
  18. )
  19. from apps.web.models.users import Users
  20. from utils.utils import (
  21. get_password_hash,
  22. get_current_user,
  23. get_admin_user,
  24. create_token,
  25. )
  26. from utils.misc import parse_duration, validate_email_format
  27. from constants import ERROR_MESSAGES
  28. router = APIRouter()
  29. ############################
  30. # GetSessionUser
  31. ############################
  32. @router.get("/", response_model=UserResponse)
  33. async def get_session_user(user=Depends(get_current_user)):
  34. return {
  35. "id": user.id,
  36. "email": user.email,
  37. "name": user.name,
  38. "role": user.role,
  39. "profile_image_url": user.profile_image_url,
  40. }
  41. ############################
  42. # Update Profile
  43. ############################
  44. @router.post("/update/profile", response_model=UserResponse)
  45. async def update_profile(
  46. form_data: UpdateProfileForm, session_user=Depends(get_current_user)
  47. ):
  48. if session_user:
  49. user = Users.update_user_by_id(
  50. session_user.id,
  51. {"profile_image_url": form_data.profile_image_url, "name": form_data.name},
  52. )
  53. if user:
  54. return user
  55. else:
  56. raise HTTPException(400, detail=ERROR_MESSAGES.DEFAULT())
  57. else:
  58. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  59. ############################
  60. # Update Password
  61. ############################
  62. @router.post("/update/password", response_model=bool)
  63. async def update_password(
  64. form_data: UpdatePasswordForm, session_user=Depends(get_current_user)
  65. ):
  66. if session_user:
  67. user = Auths.authenticate_user(session_user.email, form_data.password)
  68. if user:
  69. hashed = get_password_hash(form_data.new_password)
  70. return Auths.update_user_password_by_id(user.id, hashed)
  71. else:
  72. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_PASSWORD)
  73. else:
  74. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  75. ############################
  76. # SignIn
  77. ############################
  78. @router.post("/signin", response_model=SigninResponse)
  79. async def signin(request: Request, form_data: SigninForm):
  80. user = Auths.authenticate_user(form_data.email.lower(), form_data.password)
  81. if user:
  82. token = create_token(
  83. data={"id": user.id},
  84. expires_delta=parse_duration(request.app.state.JWT_EXPIRES_IN),
  85. )
  86. return {
  87. "token": token,
  88. "token_type": "Bearer",
  89. "id": user.id,
  90. "email": user.email,
  91. "name": user.name,
  92. "role": user.role,
  93. "profile_image_url": user.profile_image_url,
  94. }
  95. else:
  96. raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED)
  97. ############################
  98. # SignUp
  99. ############################
  100. @router.post("/signup", response_model=SigninResponse)
  101. async def signup(request: Request, form_data: SignupForm):
  102. if not request.app.state.ENABLE_SIGNUP:
  103. raise HTTPException(
  104. status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.ACCESS_PROHIBITED
  105. )
  106. if not validate_email_format(form_data.email.lower()):
  107. raise HTTPException(
  108. status.HTTP_400_BAD_REQUEST, detail=ERROR_MESSAGES.INVALID_EMAIL_FORMAT
  109. )
  110. if Users.get_user_by_email(form_data.email.lower()):
  111. raise HTTPException(400, detail=ERROR_MESSAGES.EMAIL_TAKEN)
  112. try:
  113. role = (
  114. "admin"
  115. if Users.get_num_users() == 0
  116. else request.app.state.DEFAULT_USER_ROLE
  117. )
  118. hashed = get_password_hash(form_data.password)
  119. user = Auths.insert_new_auth(
  120. form_data.email.lower(), hashed, form_data.name, role
  121. )
  122. if user:
  123. token = create_token(
  124. data={"id": user.id},
  125. expires_delta=parse_duration(request.app.state.JWT_EXPIRES_IN),
  126. )
  127. # response.set_cookie(key='token', value=token, httponly=True)
  128. return {
  129. "token": token,
  130. "token_type": "Bearer",
  131. "id": user.id,
  132. "email": user.email,
  133. "name": user.name,
  134. "role": user.role,
  135. "profile_image_url": user.profile_image_url,
  136. }
  137. else:
  138. raise HTTPException(500, detail=ERROR_MESSAGES.CREATE_USER_ERROR)
  139. except Exception as err:
  140. raise HTTPException(500, detail=ERROR_MESSAGES.DEFAULT(err))
  141. ############################
  142. # ToggleSignUp
  143. ############################
  144. @router.get("/signup/enabled", response_model=bool)
  145. async def get_sign_up_status(request: Request, user=Depends(get_admin_user)):
  146. return request.app.state.ENABLE_SIGNUP
  147. @router.get("/signup/enabled/toggle", response_model=bool)
  148. async def toggle_sign_up(request: Request, user=Depends(get_admin_user)):
  149. request.app.state.ENABLE_SIGNUP = not request.app.state.ENABLE_SIGNUP
  150. return request.app.state.ENABLE_SIGNUP
  151. ############################
  152. # Default User Role
  153. ############################
  154. @router.get("/signup/user/role")
  155. async def get_default_user_role(request: Request, user=Depends(get_admin_user)):
  156. return request.app.state.DEFAULT_USER_ROLE
  157. class UpdateRoleForm(BaseModel):
  158. role: str
  159. @router.post("/signup/user/role")
  160. async def update_default_user_role(
  161. request: Request, form_data: UpdateRoleForm, user=Depends(get_admin_user)
  162. ):
  163. if form_data.role in ["pending", "user", "admin"]:
  164. request.app.state.DEFAULT_USER_ROLE = form_data.role
  165. return request.app.state.DEFAULT_USER_ROLE
  166. ############################
  167. # JWT Expiration
  168. ############################
  169. @router.get("/token/expires")
  170. async def get_token_expires_duration(request: Request, user=Depends(get_admin_user)):
  171. return request.app.state.JWT_EXPIRES_IN
  172. class UpdateJWTExpiresDurationForm(BaseModel):
  173. duration: str
  174. @router.post("/token/expires/update")
  175. async def update_token_expires_duration(
  176. request: Request,
  177. form_data: UpdateJWTExpiresDurationForm,
  178. user=Depends(get_admin_user),
  179. ):
  180. pattern = r"^(-1|0|(-?\d+(\.\d+)?)(ms|s|m|h|d|w))$"
  181. # Check if the input string matches the pattern
  182. if re.match(pattern, form_data.duration):
  183. request.app.state.JWT_EXPIRES_IN = form_data.duration
  184. return request.app.state.JWT_EXPIRES_IN
  185. else:
  186. return request.app.state.JWT_EXPIRES_IN