from datetime import datetime, timedelta from typing import Optional from jose import JWTError, jwt from passlib.context import CryptContext from fastapi import Depends, HTTPException, status from fastapi.security import OAuth2PasswordBearer from sqlalchemy.orm import Session from app.config import SECRET_KEY, ALGORITHM, ACCESS_TOKEN_EXPIRE_MINUTES from app.models import get_db from app.models.user import User pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/auth/login") def verify_password(plain_password: str, hashed_password: str) -> bool: # bcrypt has a limit of 72 bytes, we truncate to avoid errors # convert to bytes, truncate, then back to string (ignoring errors if cut mid-multibyte char, though unlikely for simple password) # Actually passlib handles string/bytes. If we just slice the string it might not be accurate byte count. # But usually the error comes from "bytes" length. # Safest is to let simple passwords pass, and truncate extremely long ones. # Let's ensure we work with utf-8 bytes password_bytes = plain_password.encode('utf-8') if len(password_bytes) > 72: plain_password = password_bytes[:72].decode('utf-8', errors='ignore') return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password: str) -> str: password_bytes = password.encode('utf-8') if len(password_bytes) > 72: password = password_bytes[:72].decode('utf-8', errors='ignore') return pwd_context.hash(password) def create_access_token(data: dict, expires_delta: Optional[timedelta] = None) -> str: to_encode = data.copy() if expires_delta: expire = datetime.utcnow() + expires_delta else: expire = datetime.utcnow() + timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt def decode_token(token: str) -> Optional[dict]: try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) return payload except JWTError: return None async def get_current_user( token: str = Depends(oauth2_scheme), db: Session = Depends(get_db) ) -> User: credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) payload = decode_token(token) if payload is None: raise credentials_exception user_id_raw = payload.get("sub") if user_id_raw is None: raise credentials_exception try: user_id = int(user_id_raw) except (ValueError, TypeError): raise credentials_exception user = db.query(User).filter(User.id == user_id).first() if user is None: raise credentials_exception return user