Files
François Voron 72aa68c462 Native model and generic ID (#971)
* Use a generic Protocol model for User instead of Pydantic

* Remove UserDB Pydantic schema

* Harmonize schema variable naming to avoid confusions

* Revamp OAuth account model management

* Revamp AccessToken DB strategy to adopt generic model approach

* Make ID a generic instead of forcing UUIDs

* Improve generic typing

* Improve Strategy typing

* Tweak base DB typing

* Don't set Pydantic schemas on FastAPIUsers class: pass it directly on router creation

* Add IntegerIdMixin and export related classes

* Start to revamp doc for V10

* Revamp OAuth documentation

* Fix code highlights

* Write the 9.x.x ➡️ 10.x.x migration doc

* Fix pyproject.toml
2022-05-05 14:51:19 +02:00

88 lines
2.9 KiB
Python

from typing import Type
from fastapi import APIRouter, Body, Depends, HTTPException, Request, status
from pydantic import EmailStr
from fastapi_users import models, schemas
from fastapi_users.manager import (
BaseUserManager,
InvalidVerifyToken,
UserAlreadyVerified,
UserInactive,
UserManagerDependency,
UserNotExists,
)
from fastapi_users.router.common import ErrorCode, ErrorModel
def get_verify_router(
get_user_manager: UserManagerDependency[models.UP, models.ID],
user_schema: Type[schemas.U],
):
router = APIRouter()
@router.post(
"/request-verify-token",
status_code=status.HTTP_202_ACCEPTED,
name="verify:request-token",
)
async def request_verify_token(
request: Request,
email: EmailStr = Body(..., embed=True),
user_manager: BaseUserManager[models.UP, models.ID] = Depends(get_user_manager),
):
try:
user = await user_manager.get_by_email(email)
await user_manager.request_verify(user, request)
except (UserNotExists, UserInactive, UserAlreadyVerified):
pass
return None
@router.post(
"/verify",
response_model=user_schema,
name="verify:verify",
responses={
status.HTTP_400_BAD_REQUEST: {
"model": ErrorModel,
"content": {
"application/json": {
"examples": {
ErrorCode.VERIFY_USER_BAD_TOKEN: {
"summary": "Bad token, not existing user or"
"not the e-mail currently set for the user.",
"value": {"detail": ErrorCode.VERIFY_USER_BAD_TOKEN},
},
ErrorCode.VERIFY_USER_ALREADY_VERIFIED: {
"summary": "The user is already verified.",
"value": {
"detail": ErrorCode.VERIFY_USER_ALREADY_VERIFIED
},
},
}
}
},
}
},
)
async def verify(
request: Request,
token: str = Body(..., embed=True),
user_manager: BaseUserManager[models.UP, models.ID] = Depends(get_user_manager),
):
try:
return await user_manager.verify(token, request)
except (InvalidVerifyToken, UserNotExists):
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=ErrorCode.VERIFY_USER_BAD_TOKEN,
)
except UserAlreadyVerified:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=ErrorCode.VERIFY_USER_ALREADY_VERIFIED,
)
return router