Coverage for docs_src/security/tutorial003_py310.py: 100%

44 statements  

« prev     ^ index     » next       coverage.py v7.6.1, created at 2025-05-05 00:03 +0000

1from fastapi import Depends, FastAPI, HTTPException, status 1abcd

2from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm 1abcd

3from pydantic import BaseModel 1abcd

4 

5fake_users_db = { 1abcd

6 "johndoe": { 

7 "username": "johndoe", 

8 "full_name": "John Doe", 

9 "email": "johndoe@example.com", 

10 "hashed_password": "fakehashedsecret", 

11 "disabled": False, 

12 }, 

13 "alice": { 

14 "username": "alice", 

15 "full_name": "Alice Wonderson", 

16 "email": "alice@example.com", 

17 "hashed_password": "fakehashedsecret2", 

18 "disabled": True, 

19 }, 

20} 

21 

22app = FastAPI() 1abcd

23 

24 

25def fake_hash_password(password: str): 1abcd

26 return "fakehashed" + password 1mnopqrst

27 

28 

29oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") 1abcd

30 

31 

32class User(BaseModel): 1abcd

33 username: str 1abcd

34 email: str | None = None 1abcd

35 full_name: str | None = None 1abcd

36 disabled: bool | None = None 1abcd

37 

38 

39class UserInDB(User): 1abcd

40 hashed_password: str 1abcd

41 

42 

43def get_user(db, username: str): 1abcd

44 if username in db: 1iuejvfkwglxh

45 user_dict = db[username] 1iejfkglh

46 return UserInDB(**user_dict) 1iejfkglh

47 

48 

49def fake_decode_token(token): 1abcd

50 # This doesn't provide any security at all 

51 # Check the next version 

52 user = get_user(fake_users_db, token) 1iuejvfkwglxh

53 return user 1iuejvfkwglxh

54 

55 

56async def get_current_user(token: str = Depends(oauth2_scheme)): 1abcd

57 user = fake_decode_token(token) 1iuejvfkwglxh

58 if not user: 1iuejvfkwglxh

59 raise HTTPException( 1uvwx

60 status_code=status.HTTP_401_UNAUTHORIZED, 

61 detail="Invalid authentication credentials", 

62 headers={"WWW-Authenticate": "Bearer"}, 

63 ) 

64 return user 1iejfkglh

65 

66 

67async def get_current_active_user(current_user: User = Depends(get_current_user)): 1abcd

68 if current_user.disabled: 1iejfkglh

69 raise HTTPException(status_code=400, detail="Inactive user") 1ijkl

70 return current_user 1efgh

71 

72 

73@app.post("/token") 1abcd

74async def login(form_data: OAuth2PasswordRequestForm = Depends()): 1abcd

75 user_dict = fake_users_db.get(form_data.username) 1mnyopzqrAstB

76 if not user_dict: 1mnyopzqrAstB

77 raise HTTPException(status_code=400, detail="Incorrect username or password") 1yzAB

78 user = UserInDB(**user_dict) 1mnopqrst

79 hashed_password = fake_hash_password(form_data.password) 1mnopqrst

80 if not hashed_password == user.hashed_password: 1mnopqrst

81 raise HTTPException(status_code=400, detail="Incorrect username or password") 1nprt

82 

83 return {"access_token": user.username, "token_type": "bearer"} 1moqs

84 

85 

86@app.get("/users/me") 1abcd

87async def read_users_me(current_user: User = Depends(get_current_active_user)): 1abcd

88 return current_user 1efgh