mirror of
https://github.com/cssgunc/compass.git
synced 2025-04-09 14:00:15 -04:00
CSXL authentication.py for compass
This commit is contained in:
parent
6e3c24f265
commit
b04a37f1df
|
@ -0,0 +1,28 @@
|
|||
import jwt
|
||||
from fastapi import Depends, HTTPException, Header, status
|
||||
from fastapi.security import HTTPBearer, HTTPAuthorizationCredentials
|
||||
from backend.models.user_model import User
|
||||
from ..services import UserService
|
||||
|
||||
JWT_SECRET = "Sample Secret"
|
||||
JWT_ALGORITHM = "HS256"
|
||||
|
||||
def registered_user(
|
||||
token: HTTPAuthorizationCredentials = Depends(HTTPBearer()),
|
||||
user_service: UserService = Depends()
|
||||
) -> User:
|
||||
try:
|
||||
payload = jwt.decode(token.credentials, JWT_SECRET, algorithms=[JWT_ALGORITHM])
|
||||
user = user_service.get(payload["pid"])
|
||||
if not user:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="User not found",
|
||||
)
|
||||
return user
|
||||
except jwt.PyJWTError:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid or expired token",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
|
@ -1,83 +0,0 @@
|
|||
# token_utils.py
|
||||
import jwt
|
||||
from jwt import PyJWTError
|
||||
from datetime import datetime, timedelta
|
||||
from fastapi import HTTPException, status, Depends
|
||||
from backend.models.user_model import User
|
||||
from ..services import UserService
|
||||
from passlib.context import CryptContext
|
||||
|
||||
from supabase import create_client, Client
|
||||
|
||||
# Supabase configuration
|
||||
SUPABASE_URL = "placeholder"
|
||||
SUPABASE_KEY = "sample key"
|
||||
supabase: Client = create_client(SUPABASE_URL, SUPABASE_KEY)
|
||||
|
||||
SECRET = "SECRET_KEY"
|
||||
ALGORITHM = "HS256"
|
||||
|
||||
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
|
||||
|
||||
|
||||
def create_bearer_token(user_uuid: str, expires_delta: timedelta = None) -> str:
|
||||
if expires_delta:
|
||||
expire = datetime.now(datetime.UTC) + expires_delta
|
||||
else:
|
||||
expire = datetime.now(datetime.UTC) + timedelta(minutes=180)
|
||||
|
||||
to_encode = {
|
||||
"sub": user_uuid,
|
||||
"exp": expire,
|
||||
}
|
||||
|
||||
token = jwt.encode(to_encode, SECRET, algorithm=ALGORITHM)
|
||||
|
||||
expires_at = expire.isoformat()
|
||||
token_data = {
|
||||
"user_uuid": user_uuid,
|
||||
"token": token,
|
||||
"expires_at": expires_at,
|
||||
}
|
||||
|
||||
response = supabase.table("user_tokens").insert(token_data).execute()
|
||||
|
||||
|
||||
def decode_token(token: str) -> User:
|
||||
try:
|
||||
payload = jwt.decode(token, SECRET, algorithms=[ALGORITHM])
|
||||
user_uuid = payload.get("sub")
|
||||
if user_uuid is None:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
|
||||
user_data = UserService.get_user_by_uuid(user_uuid)
|
||||
if user_data is None:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="User not found",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
|
||||
user = User(
|
||||
id=user_data.id,
|
||||
username=user_data.username,
|
||||
email=user_data.email,
|
||||
experience=user_data.experience,
|
||||
group=user_data.group,
|
||||
program=user_data.program,
|
||||
role=user_data.role,
|
||||
created_at=user_data.created_at,
|
||||
uuid=user_data.uuid,
|
||||
)
|
||||
|
||||
return user
|
||||
except PyJWTError:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid or expired token",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
|
@ -1,13 +1,11 @@
|
|||
from fastapi import APIRouter, Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordBearer
|
||||
from backend.api.decoder import decode_token
|
||||
|
||||
from backend.models.user_model import User
|
||||
from ..services import ResourceService, UserService
|
||||
from ..models.resource_model import Resource
|
||||
|
||||
from typing import List
|
||||
|
||||
from .authentication import registered_user
|
||||
from backend.models.user_model import User
|
||||
from ..services import ResourceService
|
||||
from ..models.resource_model import Resource
|
||||
|
||||
api = APIRouter(prefix="/api/resource")
|
||||
|
||||
openapi_tags = {
|
||||
|
@ -15,52 +13,33 @@ openapi_tags = {
|
|||
"description": "Resource search and related operations.",
|
||||
}
|
||||
|
||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
|
||||
|
||||
|
||||
def get_current_user(token: str = Depends(oauth2_scheme)) -> User:
|
||||
user = decode_token(token)
|
||||
if not user:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid authentication credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
return user
|
||||
|
||||
|
||||
# TODO: Add security using HTTP Bearer Tokens
|
||||
# TODO: Enable authorization by passing user uuid to API
|
||||
# TODO: Create custom exceptions
|
||||
@api.post("", response_model=Resource, tags=["Resource"])
|
||||
def create(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
resource: Resource = Depends(),
|
||||
resource_svc: ResourceService = Depends(),
|
||||
):
|
||||
return resource_svc.create(subject, resource)
|
||||
|
||||
|
||||
@api.get("", response_model=List[Resource], tags=["Resource"])
|
||||
def get_all(
|
||||
subject: User = Depends(get_current_user), resource_svc: ResourceService = Depends()
|
||||
subject: User = Depends(registered_user),
|
||||
resource_svc: ResourceService = Depends()
|
||||
):
|
||||
return resource_svc.get_resource_by_user(subject)
|
||||
|
||||
|
||||
@api.put("", response_model=Resource, tags=["Resource"])
|
||||
def update(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
resource: Resource = Depends(),
|
||||
resource_svc: ResourceService = Depends(),
|
||||
):
|
||||
return resource_svc.update(subject, resource)
|
||||
|
||||
|
||||
@api.delete("", response_model=None, tags=["Resource"])
|
||||
def delete(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
resource: Resource = Depends(),
|
||||
resource_svc: ResourceService = Depends(),
|
||||
):
|
||||
resource_svc.delete(subject, resource)
|
||||
resource_svc.delete(subject, resource)
|
|
@ -1,13 +1,11 @@
|
|||
from fastapi import APIRouter, Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordBearer
|
||||
from backend.api.decoder import decode_token
|
||||
|
||||
from backend.models.user_model import User
|
||||
from ..services import ServiceService, UserService
|
||||
from ..models.service_model import Service
|
||||
|
||||
from typing import List
|
||||
|
||||
from .authentication import registered_user
|
||||
from backend.models.user_model import User
|
||||
from ..services import ServiceService
|
||||
from ..models.service_model import Service
|
||||
|
||||
api = APIRouter(prefix="/api/service")
|
||||
|
||||
openapi_tags = {
|
||||
|
@ -15,55 +13,33 @@ openapi_tags = {
|
|||
"description": "Service search and related operations.",
|
||||
}
|
||||
|
||||
# Creates an OAuth instance
|
||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
|
||||
|
||||
|
||||
def get_current_user(token: str = Depends(oauth2_scheme)) -> User:
|
||||
user = decode_token(token)
|
||||
if not user:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid authentication credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
return user
|
||||
|
||||
|
||||
# TODO: Add security using HTTP Bearer Tokens
|
||||
# TODO: Enable authorization by passing user uuid to API
|
||||
# TODO: Create custom exceptions
|
||||
|
||||
|
||||
@api.post("", response_model=Service, tags=["Service"])
|
||||
def create(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
service: Service = Depends(),
|
||||
service_svc: ServiceService = Depends(),
|
||||
):
|
||||
return service_svc.create(subject, service)
|
||||
|
||||
|
||||
@api.get("", response_model=List[Service], tags=["Service"])
|
||||
def get_all(
|
||||
subject: User = Depends(get_current_user), service_svc: ServiceService = Depends()
|
||||
subject: User = Depends(registered_user),
|
||||
service_svc: ServiceService = Depends()
|
||||
):
|
||||
return service_svc.get_service_by_user(subject)
|
||||
|
||||
|
||||
@api.put("", response_model=Service, tags=["Service"])
|
||||
def update(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
service: Service = Depends(),
|
||||
service_svc: ServiceService = Depends(),
|
||||
):
|
||||
return service_svc.update(subject, service)
|
||||
|
||||
|
||||
@api.delete("", response_model=None, tags=["Service"])
|
||||
def delete(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
service: Service = Depends(),
|
||||
service_svc: ServiceService = Depends(),
|
||||
):
|
||||
service_svc.delete(subject, service)
|
||||
service_svc.delete(subject, service)
|
|
@ -1,14 +1,10 @@
|
|||
from fastapi import APIRouter, Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordBearer
|
||||
from backend.api.decoder import decode_token
|
||||
from fastapi import APIRouter, Depends
|
||||
from typing import List
|
||||
|
||||
from .authentication import registered_user
|
||||
from backend.models.tag_model import Tag
|
||||
from backend.models.user_model import User
|
||||
from backend.services.tag import TagService
|
||||
from ..services import ResourceService, UserService
|
||||
from ..models.resource_model import Resource
|
||||
|
||||
from typing import List
|
||||
|
||||
api = APIRouter(prefix="/api/tag")
|
||||
|
||||
|
@ -17,50 +13,33 @@ openapi_tags = {
|
|||
"description": "Tag CRUD operations.",
|
||||
}
|
||||
|
||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
|
||||
|
||||
|
||||
def get_current_user(token: str = Depends(oauth2_scheme)) -> User:
|
||||
user = decode_token(token)
|
||||
if not user:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Invalid authentication credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
return user
|
||||
|
||||
|
||||
# TODO: Add security using HTTP Bearer Tokens
|
||||
# TODO: Enable authorization by passing user uuid to API
|
||||
# TODO: Create custom exceptions
|
||||
@api.post("", response_model=Tag, tags=["Tag"])
|
||||
def create(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
tag: Tag = Depends(),
|
||||
tag_service: TagService = Depends(),
|
||||
):
|
||||
return tag_service.create(subject, tag)
|
||||
|
||||
|
||||
@api.get("", response_model=List[Tag], tags=["Tag"])
|
||||
def get_all(subject: User = Depends(get_current_user), tag_svc: TagService = Depends()):
|
||||
def get_all(
|
||||
subject: User = Depends(registered_user),
|
||||
tag_svc: TagService = Depends()
|
||||
):
|
||||
return tag_svc.get_all()
|
||||
|
||||
|
||||
@api.put("", response_model=Tag, tags=["Tag"])
|
||||
def update(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
tag: Tag = Depends(),
|
||||
tag_svc: TagService = Depends(),
|
||||
):
|
||||
return tag_svc.delete(subject, tag)
|
||||
|
||||
return tag_svc.update(subject, tag)
|
||||
|
||||
@api.delete("", response_model=None, tags=["Tag"])
|
||||
def delete(
|
||||
subject: User = Depends(get_current_user),
|
||||
subject: User = Depends(registered_user),
|
||||
tag: Tag = Depends(),
|
||||
tag_svc: TagService = Depends(),
|
||||
):
|
||||
tag_svc.delete(subject, tag)
|
||||
tag_svc.delete(subject, tag)
|
|
@ -21,7 +21,7 @@ def get_all(user_id: str, user_svc: UserService = Depends()):
|
|||
|
||||
if subject.role != UserTypeEnum.ADMIN:
|
||||
raise Exception(f"Insufficient permissions for user {subject.uuid}")
|
||||
|
||||
# create_bearer_token(user_id)
|
||||
return user_svc.all()
|
||||
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user