mirror of
https://github.com/fastapi-users/fastapi-users.git
synced 2025-08-15 03:04:27 +08:00

* Move users router in sub-module * Factorize UserRouter into EventHandlersRouter * Implement OAuth registration/login router * Apply isort/black * Remove temporary pytest marker * Fix httpx-oauth version in lock file * Ensure ON_AFTER_REGISTER event is triggered on OAuth registration * Add API on FastAPIUsers to generate an OAuth router * Improve test coverage of FastAPIUsers * Small fixes * Write the OAuth documentation * Fix SQL unit-tests by avoiding collisions in SQLite db files
202 lines
7.0 KiB
Python
202 lines
7.0 KiB
Python
from typing import Any, Dict, List, Type, cast
|
|
|
|
import jwt
|
|
from fastapi import Body, Depends, HTTPException
|
|
from fastapi.security import OAuth2PasswordRequestForm
|
|
from pydantic import EmailStr
|
|
from starlette import status
|
|
from starlette.responses import Response
|
|
|
|
from fastapi_users import models
|
|
from fastapi_users.authentication import Authenticator, BaseAuthentication
|
|
from fastapi_users.db import BaseUserDatabase
|
|
from fastapi_users.password import get_password_hash
|
|
from fastapi_users.router.common import ErrorCode, Event, EventHandlersRouter
|
|
from fastapi_users.utils import JWT_ALGORITHM, generate_jwt
|
|
|
|
|
|
def _add_login_route(
|
|
router: EventHandlersRouter,
|
|
user_db: BaseUserDatabase,
|
|
auth_backend: BaseAuthentication,
|
|
):
|
|
@router.post(f"/login/{auth_backend.name}")
|
|
async def login(
|
|
response: Response, credentials: OAuth2PasswordRequestForm = Depends()
|
|
):
|
|
user = await user_db.authenticate(credentials)
|
|
|
|
if user is None or not user.is_active:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.LOGIN_BAD_CREDENTIALS,
|
|
)
|
|
|
|
return await auth_backend.get_login_response(user, response)
|
|
|
|
|
|
def get_user_router(
|
|
user_db: BaseUserDatabase[models.BaseUserDB],
|
|
user_model: Type[models.BaseUser],
|
|
user_create_model: Type[models.BaseUserCreate],
|
|
user_update_model: Type[models.BaseUserUpdate],
|
|
user_db_model: Type[models.BaseUserDB],
|
|
authenticator: Authenticator,
|
|
reset_password_token_secret: str,
|
|
reset_password_token_lifetime_seconds: int = 3600,
|
|
) -> EventHandlersRouter:
|
|
"""Generate a router with the authentication routes."""
|
|
router = EventHandlersRouter()
|
|
|
|
reset_password_token_audience = "fastapi-users:reset"
|
|
|
|
get_current_active_user = authenticator.get_current_active_user
|
|
get_current_superuser = authenticator.get_current_superuser
|
|
|
|
async def _get_or_404(id: str) -> models.BaseUserDB:
|
|
user = await user_db.get(id)
|
|
if user is None:
|
|
raise HTTPException(status_code=status.HTTP_404_NOT_FOUND)
|
|
return user
|
|
|
|
async def _update_user(user: models.BaseUserDB, update_dict: Dict[str, Any]):
|
|
for field in update_dict:
|
|
if field == "password":
|
|
hashed_password = get_password_hash(update_dict[field])
|
|
user.hashed_password = hashed_password
|
|
else:
|
|
setattr(user, field, update_dict[field])
|
|
return await user_db.update(user)
|
|
|
|
for auth_backend in authenticator.backends:
|
|
_add_login_route(router, user_db, auth_backend)
|
|
|
|
@router.post(
|
|
"/register", response_model=user_model, status_code=status.HTTP_201_CREATED
|
|
)
|
|
async def register(user: user_create_model): # type: ignore
|
|
user = cast(models.BaseUserCreate, user) # Prevent mypy complain
|
|
existing_user = await user_db.get_by_email(user.email)
|
|
|
|
if existing_user is not None:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.REGISTER_USER_ALREADY_EXISTS,
|
|
)
|
|
|
|
hashed_password = get_password_hash(user.password)
|
|
db_user = user_db_model(
|
|
**user.create_update_dict(), hashed_password=hashed_password
|
|
)
|
|
created_user = await user_db.create(db_user)
|
|
|
|
await router.run_handlers(Event.ON_AFTER_REGISTER, created_user)
|
|
|
|
return created_user
|
|
|
|
@router.post("/forgot-password", status_code=status.HTTP_202_ACCEPTED)
|
|
async def forgot_password(email: EmailStr = Body(..., embed=True)):
|
|
user = await user_db.get_by_email(email)
|
|
|
|
if user is not None and user.is_active:
|
|
token_data = {"user_id": user.id, "aud": reset_password_token_audience}
|
|
token = generate_jwt(
|
|
token_data,
|
|
reset_password_token_lifetime_seconds,
|
|
reset_password_token_secret,
|
|
)
|
|
await router.run_handlers(Event.ON_AFTER_FORGOT_PASSWORD, user, token)
|
|
|
|
return None
|
|
|
|
@router.post("/reset-password")
|
|
async def reset_password(token: str = Body(...), password: str = Body(...)):
|
|
try:
|
|
data = jwt.decode(
|
|
token,
|
|
reset_password_token_secret,
|
|
audience=reset_password_token_audience,
|
|
algorithms=[JWT_ALGORITHM],
|
|
)
|
|
user_id = data.get("user_id")
|
|
if user_id is None:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.RESET_PASSWORD_BAD_TOKEN,
|
|
)
|
|
|
|
user = await user_db.get(user_id)
|
|
if user is None or not user.is_active:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.RESET_PASSWORD_BAD_TOKEN,
|
|
)
|
|
|
|
user.hashed_password = get_password_hash(password)
|
|
await user_db.update(user)
|
|
except jwt.PyJWTError:
|
|
raise HTTPException(
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
detail=ErrorCode.RESET_PASSWORD_BAD_TOKEN,
|
|
)
|
|
|
|
@router.get("/me", response_model=user_model)
|
|
async def me(
|
|
user: user_db_model = Depends(get_current_active_user), # type: ignore
|
|
):
|
|
return user
|
|
|
|
@router.patch("/me", response_model=user_model)
|
|
async def update_me(
|
|
updated_user: user_update_model, # type: ignore
|
|
user: user_db_model = Depends(get_current_active_user), # type: ignore
|
|
):
|
|
updated_user = cast(
|
|
models.BaseUserUpdate, updated_user,
|
|
) # Prevent mypy complain
|
|
updated_user_data = updated_user.create_update_dict()
|
|
return await _update_user(user, updated_user_data)
|
|
|
|
@router.get(
|
|
"/",
|
|
response_model=List[user_model], # type: ignore
|
|
dependencies=[Depends(get_current_superuser)],
|
|
)
|
|
async def list_users():
|
|
return await user_db.list()
|
|
|
|
@router.get(
|
|
"/{id}",
|
|
response_model=user_model,
|
|
dependencies=[Depends(get_current_superuser)],
|
|
)
|
|
async def get_user(id: str,):
|
|
return await _get_or_404(id)
|
|
|
|
@router.patch(
|
|
"/{id}",
|
|
response_model=user_model,
|
|
dependencies=[Depends(get_current_superuser)],
|
|
)
|
|
async def update_user(
|
|
id: str, updated_user: user_update_model, # type: ignore
|
|
):
|
|
updated_user = cast(
|
|
models.BaseUserUpdate, updated_user,
|
|
) # Prevent mypy complain
|
|
user = await _get_or_404(id)
|
|
updated_user_data = updated_user.create_update_dict_superuser()
|
|
return await _update_user(user, updated_user_data)
|
|
|
|
@router.delete(
|
|
"/{id}",
|
|
status_code=status.HTTP_204_NO_CONTENT,
|
|
dependencies=[Depends(get_current_superuser)],
|
|
)
|
|
async def delete_user(id: str):
|
|
user = await _get_or_404(id)
|
|
await user_db.delete(user)
|
|
return None
|
|
|
|
return router
|