Skip to content

Commit c1538fd

Browse files
authored
✨ Update code for login API (fastapi#571)
* ✨ Update models for login API * ✨ Add authenticate simplified CRUD * ♻️ Refactor get_current_user dependency, integrate is_active * ✨ Refactor and upgrade login API code
1 parent 5679d04 commit c1538fd

File tree

4 files changed

+52
-47
lines changed

4 files changed

+52
-47
lines changed
Lines changed: 32 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
from datetime import timedelta
2-
from typing import Any
2+
from typing import Annotated, Any
33

4-
from fastapi import APIRouter, Body, Depends, HTTPException
4+
from fastapi import APIRouter, Depends, HTTPException
55
from fastapi.security import OAuth2PasswordRequestForm
6-
from sqlalchemy.orm import Session
76

8-
from app import crud, models, schemas
9-
from app.api import deps
7+
from app import crud
8+
from app.api.deps import CurrentUser, SessionDep
109
from app.core import security
1110
from app.core.config import settings
1211
from app.core.security import get_password_hash
12+
from app.models import Message, NewPassword, Token, UserOut
1313
from app.utils import (
1414
generate_password_reset_token,
1515
send_reset_password_email,
@@ -19,43 +19,42 @@
1919
router = APIRouter()
2020

2121

22-
@router.post("/login/access-token", response_model=schemas.Token)
22+
@router.post("/login/access-token")
2323
def login_access_token(
24-
db: Session = Depends(deps.get_db), form_data: OAuth2PasswordRequestForm = Depends()
25-
) -> Any:
24+
session: SessionDep, form_data: Annotated[OAuth2PasswordRequestForm, Depends()]
25+
) -> Token:
2626
"""
2727
OAuth2 compatible token login, get an access token for future requests
2828
"""
29-
user = crud.user.authenticate(
30-
db, email=form_data.username, password=form_data.password
29+
user = crud.authenticate(
30+
session=session, email=form_data.username, password=form_data.password
3131
)
3232
if not user:
3333
raise HTTPException(status_code=400, detail="Incorrect email or password")
34-
elif not crud.user.is_active(user):
34+
elif not user.is_active:
3535
raise HTTPException(status_code=400, detail="Inactive user")
3636
access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
37-
return {
38-
"access_token": security.create_access_token(
37+
return Token(
38+
access_token=security.create_access_token(
3939
user.id, expires_delta=access_token_expires
40-
),
41-
"token_type": "bearer",
42-
}
40+
)
41+
)
4342

4443

45-
@router.post("/login/test-token", response_model=schemas.User)
46-
def test_token(current_user: models.User = Depends(deps.get_current_user)) -> Any:
44+
@router.post("/login/test-token", response_model=UserOut)
45+
def test_token(current_user: CurrentUser) -> Any:
4746
"""
4847
Test access token
4948
"""
5049
return current_user
5150

5251

53-
@router.post("/password-recovery/{email}", response_model=schemas.Msg)
54-
def recover_password(email: str, db: Session = Depends(deps.get_db)) -> Any:
52+
@router.post("/password-recovery/{email}")
53+
def recover_password(email: str, session: SessionDep) -> Message:
5554
"""
5655
Password Recovery
5756
"""
58-
user = crud.user.get_by_email(db, email=email)
57+
user = crud.get_user_by_email(session=session, email=email)
5958

6059
if not user:
6160
raise HTTPException(
@@ -66,31 +65,30 @@ def recover_password(email: str, db: Session = Depends(deps.get_db)) -> Any:
6665
send_reset_password_email(
6766
email_to=user.email, email=email, token=password_reset_token
6867
)
69-
return {"msg": "Password recovery email sent"}
68+
return Message(message="Password recovery email sent")
7069

7170

72-
@router.post("/reset-password/", response_model=schemas.Msg)
71+
@router.post("/reset-password/")
7372
def reset_password(
74-
token: str = Body(...),
75-
new_password: str = Body(...),
76-
db: Session = Depends(deps.get_db),
77-
) -> Any:
73+
session: SessionDep,
74+
body: NewPassword,
75+
) -> Message:
7876
"""
7977
Reset password
8078
"""
81-
email = verify_password_reset_token(token)
79+
email = verify_password_reset_token(token=body.token)
8280
if not email:
8381
raise HTTPException(status_code=400, detail="Invalid token")
84-
user = crud.user.get_by_email(db, email=email)
82+
user = crud.get_user_by_email(session=session, email=email)
8583
if not user:
8684
raise HTTPException(
8785
status_code=404,
8886
detail="The user with this username does not exist in the system.",
8987
)
90-
elif not crud.user.is_active(user):
88+
elif not user.is_active:
9189
raise HTTPException(status_code=400, detail="Inactive user")
92-
hashed_password = get_password_hash(new_password)
90+
hashed_password = get_password_hash(password=body.new_password)
9391
user.hashed_password = hashed_password
94-
db.add(user)
95-
db.commit()
96-
return {"msg": "Password updated successfully"}
92+
session.add(user)
93+
session.commit()
94+
return Message(message="Password updated successfully")

src/backend/app/app/api/deps.py

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -39,18 +39,12 @@ def get_current_user(session: SessionDep, token: TokenDep) -> User:
3939
user = session.get(User, token_data.sub)
4040
if not user:
4141
raise HTTPException(status_code=404, detail="User not found")
42-
return user
43-
44-
45-
def get_current_active_user(
46-
current_user: Annotated[User, Depends(get_current_user)]
47-
) -> User:
48-
if not current_user.is_active:
42+
if not user.is_active:
4943
raise HTTPException(status_code=400, detail="Inactive user")
50-
return current_user
44+
return user
5145

5246

53-
CurrentUser = Annotated[User, Depends(get_current_active_user)]
47+
CurrentUser = Annotated[User, Depends(get_current_user)]
5448

5549

5650
def get_current_active_superuser(current_user: CurrentUser) -> User:

src/backend/app/app/crud/__init__.py

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
# item = CRUDBase[Item, ItemCreate, ItemUpdate](Item)
1111
from sqlmodel import Session, select
12-
from app.core.security import get_password_hash
12+
from app.core.security import get_password_hash, verify_password
1313
from app.models import UserCreate, User
1414

1515

@@ -27,3 +27,12 @@ def get_user_by_email(*, session: Session, email: str) -> User | None:
2727
statement = select(User).where(User.email == email)
2828
session_user = session.exec(statement).first()
2929
return session_user
30+
31+
32+
def authenticate(*, session: Session, email: str, password: str) -> User | None:
33+
user = get_user_by_email(session=session, email=email)
34+
if not user:
35+
return None
36+
if not verify_password(password, user.hashed_password):
37+
return None
38+
return user

src/backend/app/app/models.py

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,16 +73,20 @@ class ItemOut(ItemBase):
7373

7474

7575
# Generic message
76-
class Msg(BaseModel):
77-
msg: str
76+
class Message(BaseModel):
77+
message: str
7878

7979

8080
# JSON payload containing access token
8181
class Token(BaseModel):
8282
access_token: str
83-
token_type: str
83+
token_type: str = "bearer"
8484

8585

8686
# Contents of JWT token
8787
class TokenPayload(BaseModel):
8888
sub: Union[int, None] = None
89+
90+
class NewPassword(BaseModel):
91+
token: str
92+
new_password: str

0 commit comments

Comments
 (0)