1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
|
from fastapi import APIRouter, status, Depends, HTTPException
from fastapi.responses import JSONResponse, Response
from typing import Annotated
from datetime import timedelta
from typing import Annotated
from fastapi.security import OAuth2PasswordRequestForm
from app.util.db_dependency import get_db
from app.util.authentication import (
authenticate_user,
create_access_token,
)
from app.schemas.auth_schemas import Token
router = APIRouter(prefix="/token", tags=["token"])
@router.post("/")
async def login_for_access_token(
form_data: Annotated[OAuth2PasswordRequestForm, Depends()],
response: Response,
db=Depends(get_db),
) -> Token:
"""
Return an access token for the user, if the given authentication details are correct
"""
user = authenticate_user(db, form_data.username, form_data.password)
if not user:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Incorrect username or password",
headers={"WWW-Authenticate": "Bearer"},
)
access_token_expires = timedelta(minutes=15)
access_token = create_access_token(
data={"sub": user.username, "refresh": False},
expires_delta=access_token_expires,
)
# Create a refresh token - just an access token with a longer expiry
# and more restrictions ("refresh" is True)
refresh_token_expires = timedelta(days=1)
refresh_token = create_access_token(
data={"sub": user.username, "refresh": True},
expires_delta=refresh_token_expires,
)
# response = JSONResponse(content={"success": True})
# response.set_cookie(
# key="access_token", value=access_token, httponly=True, samesite="lax"
# )
# response.set_cookie(
# key="refresh_token", value=refresh_token, httponly=True, samesite="lax"
# )
# For Swagger UI to work, must return the token
return Token(
access_token=access_token,
refresh_token=refresh_token,
token_type="bearer",
)
|