Coverage for docs_src/security/tutorial003_an.py: 100%
46 statements
« prev ^ index » next coverage.py v7.6.1, created at 2024-08-08 03:53 +0000
« prev ^ index » next coverage.py v7.6.1, created at 2024-08-08 03:53 +0000
1from typing import Union 1abcde
3from fastapi import Depends, FastAPI, HTTPException, status 1abcde
4from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm 1abcde
5from pydantic import BaseModel 1abcde
6from typing_extensions import Annotated 1abcde
8fake_users_db = { 1abcde
9 "johndoe": {
10 "username": "johndoe",
11 "full_name": "John Doe",
12 "email": "johndoe@example.com",
13 "hashed_password": "fakehashedsecret",
14 "disabled": False,
15 },
16 "alice": {
17 "username": "alice",
18 "full_name": "Alice Wonderson",
19 "email": "alice@example.com",
20 "hashed_password": "fakehashedsecret2",
21 "disabled": True,
22 },
23}
25app = FastAPI() 1abcde
28def fake_hash_password(password: str): 1abcde
29 return "fakehashed" + password 1abcde
32oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") 1abcde
35class User(BaseModel): 1abcde
36 username: str 1abcde
37 email: Union[str, None] = None 1abcde
38 full_name: Union[str, None] = None 1abcde
39 disabled: Union[bool, None] = None 1abcde
42class UserInDB(User): 1abcde
43 hashed_password: str 1abcde
46def get_user(db, username: str): 1abcde
47 if username in db: 1abcde
48 user_dict = db[username] 1abcde
49 return UserInDB(**user_dict) 1abcde
52def fake_decode_token(token): 1abcde
53 # This doesn't provide any security at all
54 # Check the next version
55 user = get_user(fake_users_db, token) 1abcde
56 return user 1abcde
59async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): 1abcde
60 user = fake_decode_token(token) 1abcde
61 if not user: 1abcde
62 raise HTTPException( 1abcde
63 status_code=status.HTTP_401_UNAUTHORIZED,
64 detail="Invalid authentication credentials",
65 headers={"WWW-Authenticate": "Bearer"},
66 )
67 return user 1abcde
70async def get_current_active_user( 1abcde
71 current_user: Annotated[User, Depends(get_current_user)],
72):
73 if current_user.disabled: 1abcde
74 raise HTTPException(status_code=400, detail="Inactive user") 1abcde
75 return current_user 1abcde
78@app.post("/token") 1abcde
79async def login(form_data: Annotated[OAuth2PasswordRequestForm, Depends()]): 1abcde
80 user_dict = fake_users_db.get(form_data.username) 1abcde
81 if not user_dict: 1abcde
82 raise HTTPException(status_code=400, detail="Incorrect username or password") 1abcde
83 user = UserInDB(**user_dict) 1abcde
84 hashed_password = fake_hash_password(form_data.password) 1abcde
85 if not hashed_password == user.hashed_password: 1abcde
86 raise HTTPException(status_code=400, detail="Incorrect username or password") 1abcde
88 return {"access_token": user.username, "token_type": "bearer"} 1abcde
91@app.get("/users/me") 1abcde
92async def read_users_me( 1abcde
93 current_user: Annotated[User, Depends(get_current_active_user)],
94):
95 return current_user 1abcde