login.py 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. from datetime import timedelta
  2. from typing import Annotated, Any
  3. from app.api.deps import CurrentUser, SessionDep, get_current_active_superuser
  4. from app.common import security
  5. from app.common.security import get_password_hash
  6. from app.config import settings
  7. from app.models import crud
  8. from app.models.models import Message, NewPassword, Token
  9. from app.models.user import UserOut
  10. from app.utils.mail_util import (generate_password_reset_token,
  11. generate_reset_password_email, send_email,
  12. verify_password_reset_token)
  13. from fastapi import APIRouter, Depends, HTTPException
  14. from fastapi.responses import HTMLResponse
  15. from fastapi.security import OAuth2PasswordRequestForm
  16. router = APIRouter()
  17. @router.post("/login/access-token")
  18. def login_access_token(
  19. session: SessionDep, form_data: Annotated[OAuth2PasswordRequestForm, Depends()]
  20. ) -> Token:
  21. """
  22. OAuth2 compatible token login, get an access token for future requests
  23. """
  24. user = crud.authenticate(
  25. session=session, email=form_data.username, password=form_data.password
  26. )
  27. if not user:
  28. raise HTTPException(status_code=400, detail="Incorrect email or password")
  29. elif not user.is_active:
  30. raise HTTPException(status_code=400, detail="Inactive user")
  31. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  32. return Token(
  33. access_token=security.create_access_token(
  34. user.id, expires_delta=access_token_expires
  35. )
  36. )
  37. @router.post("/login/test-token", response_model=UserOut)
  38. def test_token(current_user: CurrentUser) -> Any:
  39. """
  40. Test access token
  41. """
  42. return current_user
  43. @router.post("/password-recovery/{email}")
  44. def recover_password(email: str, session: SessionDep) -> Message:
  45. """
  46. Password Recovery
  47. """
  48. user = crud.get_user_by_email(session=session, email=email)
  49. if not user:
  50. raise HTTPException(
  51. status_code=404,
  52. detail="The user with this email does not exist in the system.",
  53. )
  54. password_reset_token = generate_password_reset_token(email=email)
  55. email_data = generate_reset_password_email(
  56. email_to=user.email, email=email, token=password_reset_token
  57. )
  58. send_email(
  59. email_to=user.email,
  60. subject=email_data.subject,
  61. html_content=email_data.html_content,
  62. )
  63. return Message(message="Password recovery email sent")
  64. @router.post("/reset-password/")
  65. def reset_password(session: SessionDep, body: NewPassword) -> Message:
  66. """
  67. Reset password
  68. """
  69. # STRONG_PASSWORD_PATTERN = re.compile(r"^(?=.*[\d])(?=.*[!@#$%^&*])[\w!@#$%^&*]{6,128}$")
  70. email = verify_password_reset_token(token=body.token)
  71. if not email:
  72. raise HTTPException(status_code=400, detail="Invalid token")
  73. user = crud.get_user_by_email(session=session, email=email)
  74. if not user:
  75. raise HTTPException(
  76. status_code=404,
  77. detail="The user with this email does not exist in the system.",
  78. )
  79. elif not user.is_active:
  80. raise HTTPException(status_code=400, detail="Inactive user")
  81. hashed_password = get_password_hash(password=body.new_password)
  82. user.hashed_password = hashed_password
  83. session.add(user)
  84. session.commit()
  85. return Message(message="Password updated successfully")
  86. @router.post(
  87. "/password-recovery-html-content/{email}",
  88. dependencies=[Depends(get_current_active_superuser)],
  89. response_class=HTMLResponse,
  90. )
  91. def recover_password_html_content(email: str, session: SessionDep) -> Any:
  92. """
  93. HTML Content for Password Recovery
  94. """
  95. user = crud.get_user_by_email(session=session, email=email)
  96. if not user:
  97. raise HTTPException(
  98. status_code=404,
  99. detail="The user with this username does not exist in the system.",
  100. )
  101. password_reset_token = generate_password_reset_token(email=email)
  102. email_data = generate_reset_password_email(
  103. email_to=user.email, email=email, token=password_reset_token
  104. )
  105. return HTMLResponse(
  106. content=email_data.html_content, headers={"subject:": email_data.subject}
  107. )
  108. @router.get("/healthcheck", include_in_schema=False)
  109. async def healthcheck() -> dict[str, str]:
  110. return {"status": "ok"}
  111. # @router.post("/signup", response_model=UserOut)
  112. # async def signup(user: UserOut = Body(...)):
  113. # admin_exists = await User.find_one(User.email ==user.email)
  114. # if admin_exists:
  115. # raise HTTPException(
  116. # status_code=409, detail = "user is exists."
  117. # )
  118. # admin.password =
  119. # new_admin = await add_user(admin)
  120. # return new_admin