mirror of
https://github.com/fastapi-users/fastapi-users.git
synced 2025-08-16 03:40:23 +08:00
Use snake case for user_db variable 😱
This commit is contained in:
@ -8,10 +8,10 @@ from fastapi_users.models import UserDB
|
|||||||
|
|
||||||
class BaseAuthentication:
|
class BaseAuthentication:
|
||||||
|
|
||||||
userDB: BaseUserDatabase
|
user_db: BaseUserDatabase
|
||||||
|
|
||||||
def __init__(self, userDB: BaseUserDatabase):
|
def __init__(self, user_db: BaseUserDatabase):
|
||||||
self.userDB = userDB
|
self.user_db = user_db
|
||||||
|
|
||||||
async def get_login_response(self, user: UserDB, response: Response):
|
async def get_login_response(self, user: UserDB, response: Response):
|
||||||
raise NotImplementedError()
|
raise NotImplementedError()
|
||||||
|
@ -50,7 +50,7 @@ class JWTAuthentication(BaseAuthentication):
|
|||||||
except jwt.PyJWTError:
|
except jwt.PyJWTError:
|
||||||
raise credentials_exception
|
raise credentials_exception
|
||||||
|
|
||||||
user = await self.userDB.get(user_id)
|
user = await self.user_db.get(user_id)
|
||||||
if user is None or not user.is_active:
|
if user is None or not user.is_active:
|
||||||
raise credentials_exception
|
raise credentials_exception
|
||||||
|
|
||||||
|
@ -10,21 +10,21 @@ from fastapi_users.password import get_password_hash
|
|||||||
|
|
||||||
|
|
||||||
class UserRouter:
|
class UserRouter:
|
||||||
def __new__(cls, userDB: BaseUserDatabase, auth: BaseAuthentication) -> APIRouter:
|
def __new__(cls, user_db: BaseUserDatabase, auth: BaseAuthentication) -> APIRouter:
|
||||||
router = APIRouter()
|
router = APIRouter()
|
||||||
|
|
||||||
@router.post("/register", response_model=User)
|
@router.post("/register", response_model=User)
|
||||||
async def register(user: UserCreate):
|
async def register(user: UserCreate):
|
||||||
hashed_password = get_password_hash(user.password)
|
hashed_password = get_password_hash(user.password)
|
||||||
db_user = UserDB(**user.dict(), hashed_password=hashed_password)
|
db_user = UserDB(**user.dict(), hashed_password=hashed_password)
|
||||||
created_user = await userDB.create(db_user)
|
created_user = await user_db.create(db_user)
|
||||||
return created_user
|
return created_user
|
||||||
|
|
||||||
@router.post("/login")
|
@router.post("/login")
|
||||||
async def login(
|
async def login(
|
||||||
response: Response, credentials: OAuth2PasswordRequestForm = Depends()
|
response: Response, credentials: OAuth2PasswordRequestForm = Depends()
|
||||||
):
|
):
|
||||||
user = await userDB.authenticate(credentials)
|
user = await user_db.authenticate(credentials)
|
||||||
|
|
||||||
if user is None:
|
if user is None:
|
||||||
raise HTTPException(status_code=status.HTTP_400_BAD_REQUEST)
|
raise HTTPException(status_code=status.HTTP_400_BAD_REQUEST)
|
||||||
|
@ -61,7 +61,7 @@ class MockAuthentication(BaseAuthentication):
|
|||||||
return {"token": user.id}
|
return {"token": user.id}
|
||||||
|
|
||||||
async def authenticate(self, token: str) -> UserDB:
|
async def authenticate(self, token: str) -> UserDB:
|
||||||
user = await self.userDB.get(token)
|
user = await self.user_db.get(token)
|
||||||
if user is None or not user.is_active:
|
if user is None or not user.is_active:
|
||||||
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED)
|
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED)
|
||||||
return user
|
return user
|
||||||
|
Reference in New Issue
Block a user