mirror of
https://github.com/fastapi-users/fastapi-users.git
synced 2025-08-14 18:58:10 +08:00
49 lines
1.8 KiB
Python
49 lines
1.8 KiB
Python
from fastapi import APIRouter, Depends, HTTPException, Response, status
|
|
from fastapi.security import OAuth2PasswordRequestForm
|
|
|
|
from fastapi_users import models
|
|
from fastapi_users.authentication import Authenticator, BaseAuthentication
|
|
from fastapi_users.manager import UserManager, UserManagerDependency
|
|
from fastapi_users.router.common import ErrorCode
|
|
|
|
|
|
def get_auth_router(
|
|
backend: BaseAuthentication,
|
|
get_user_manager: UserManagerDependency[models.UC, models.UD],
|
|
authenticator: Authenticator,
|
|
requires_verification: bool = False,
|
|
) -> APIRouter:
|
|
"""Generate a router with login/logout routes for an authentication backend."""
|
|
router = APIRouter()
|
|
get_current_user = authenticator.current_user(
|
|
active=True, verified=requires_verification
|
|
)
|
|
|
|
@router.post("/login")
|
|
async def login(
|
|
response: Response,
|
|
credentials: OAuth2PasswordRequestForm = Depends(),
|
|
user_manager: UserManager[models.UC, models.UD] = Depends(get_user_manager),
|
|
):
|
|
user = await user_manager.authenticate(credentials)
|
|
|
|
if user is None or not user.is_active:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.LOGIN_BAD_CREDENTIALS,
|
|
)
|
|
if requires_verification and not user.is_verified:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.LOGIN_USER_NOT_VERIFIED,
|
|
)
|
|
return await backend.get_login_response(user, response)
|
|
|
|
if backend.logout:
|
|
|
|
@router.post("/logout")
|
|
async def logout(response: Response, user=Depends(get_current_user)):
|
|
return await backend.get_logout_response(user, response)
|
|
|
|
return router
|