|
| 1 | +import uuid |
1 | 2 | from datetime import datetime, timedelta |
| 3 | +from typing import Any, Dict, Optional, Union |
2 | 4 |
|
3 | | -from jose import jwt |
| 5 | +from jose import ExpiredSignatureError, JWTError, jwt |
4 | 6 | from passlib.context import CryptContext |
5 | 7 |
|
6 | 8 | from core.config import settings |
7 | 9 |
|
8 | 10 | pwd_context = CryptContext(schemes=["argon2"], deprecated="auto") |
9 | 11 |
|
10 | 12 |
|
| 13 | +# Hashing helpers |
11 | 14 | def hash_password(password: str) -> str: |
12 | 15 | return pwd_context.hash(password) |
13 | 16 |
|
14 | 17 |
|
| 18 | +# Verifying helpers |
15 | 19 | def verify_password(plain_password: str, hashed_password: str) -> bool: |
16 | 20 | return pwd_context.verify(plain_password, hashed_password) |
17 | 21 |
|
18 | 22 |
|
19 | | -def create_access_token(data: dict, expires_delta: timedelta | None = None) -> str: |
20 | | - to_encode = data.copy() |
| 23 | +# helpers |
| 24 | +def _now() -> datetime: |
| 25 | + return datetime.utcnow() |
| 26 | + |
| 27 | + |
| 28 | +def _jti() -> str: |
| 29 | + return str(uuid.uuid4()) |
| 30 | + |
| 31 | + |
| 32 | +# Token factories |
| 33 | +def create_access_token( |
| 34 | + subject: Union[str, int, Dict[str, Any]], |
| 35 | + extra: Optional[Dict[str, Any]] = None, |
| 36 | + expires_delta: timedelta | None = None, |
| 37 | +) -> str: |
| 38 | + """ |
| 39 | + Create access token. |
| 40 | + """ |
| 41 | + |
| 42 | + if isinstance(subject, dict): |
| 43 | + payload_access: Dict[str, Any] = subject.copy() |
| 44 | + else: |
| 45 | + payload_access: Dict[str, Any] = {"sub": str(subject)} # type: ignore |
| 46 | + |
| 47 | + payload_access.setdefault("type", "access") |
| 48 | + payload_access.setdefault("jti", _jti()) |
| 49 | + payload_access.setdefault("iat", int(_now().timestamp())) |
| 50 | + |
| 51 | + if extra: |
| 52 | + payload_access.update(extra) |
| 53 | + |
21 | 54 | if expires_delta: |
22 | | - expire = datetime.utcnow() + expires_delta |
| 55 | + exp = _now() + expires_delta |
23 | 56 | else: |
24 | | - expire = datetime.utcnow() + timedelta( |
25 | | - minutes=settings.JWT_ACCESS_TOKEN_EXPIRE_MINUTES |
26 | | - ) |
27 | | - to_encode.update({"exp": expire}) |
28 | | - encoded_jwt = jwt.encode( |
29 | | - to_encode, settings.SECRET_KEY, algorithm=settings.JWT_ALGORITHM |
| 57 | + exp = _now() + timedelta(minutes=settings.JWT_ACCESS_TOKEN_EXPIRE_MINUTES or 15) |
| 58 | + |
| 59 | + payload_access["exp"] = int(exp.timestamp()) |
| 60 | + |
| 61 | + return jwt.encode( |
| 62 | + payload_access, settings.SECRET_KEY, algorithm=settings.JWT_ALGORITHM |
30 | 63 | ) |
31 | | - return encoded_jwt |
32 | 64 |
|
33 | 65 |
|
34 | | -def create_refresh_token(data: dict, expires_delta: timedelta | None = None) -> str: |
35 | | - to_encode = data.copy() |
| 66 | +def create_refresh_token( |
| 67 | + subject: Union[str, int, Dict[str, Any]], |
| 68 | + extra: Optional[Dict[str, Any]] = None, |
| 69 | + expires_delta: timedelta | None = None, |
| 70 | +) -> str: |
| 71 | + """ |
| 72 | + Create refresh token. |
| 73 | + """ |
| 74 | + |
| 75 | + if isinstance(subject, dict): |
| 76 | + payload_refresh: Dict[str, Any] = subject.copy() |
| 77 | + else: |
| 78 | + payload_refresh: Dict[str, Any] = {"sub": str(subject)} # type: ignore |
| 79 | + |
| 80 | + payload_refresh.setdefault("type", "refresh") |
| 81 | + payload_refresh.setdefault("jti", _jti()) |
| 82 | + payload_refresh.setdefault("iat", int(_now().timestamp())) |
| 83 | + |
| 84 | + if extra: |
| 85 | + payload_refresh.update(extra) |
| 86 | + |
36 | 87 | if expires_delta: |
37 | | - expire = datetime.utcnow() + expires_delta |
| 88 | + exp = _now() + expires_delta |
38 | 89 | else: |
39 | | - expire = datetime.utcnow() + timedelta( |
40 | | - days=settings.JWT_REFRESH_TOKEN_EXPIRES_DAYS |
41 | | - ) |
42 | | - to_encode.update({"exp": expire}) |
43 | | - encoded_jwt = jwt.encode( |
44 | | - to_encode, settings.SECRET_KEY, algorithm=settings.JWT_ALGORITHM |
| 90 | + exp = _now() + timedelta(days=settings.JWT_REFRESH_TOKEN_EXPIRES_DAYS or 30) |
| 91 | + |
| 92 | + payload_refresh["exp"] = int(exp.timestamp()) |
| 93 | + |
| 94 | + return jwt.encode( |
| 95 | + payload_refresh, settings.SECRET_KEY, algorithm=settings.JWT_ALGORITHM |
45 | 96 | ) |
46 | | - return encoded_jwt |
| 97 | + |
| 98 | + |
| 99 | +def decode_token(token: str) -> dict: |
| 100 | + try: |
| 101 | + payload = jwt.decode( |
| 102 | + token, settings.SECRET_KEY, algorithms=[settings.JWT_ALGORITHM] |
| 103 | + ) |
| 104 | + return payload |
| 105 | + except ExpiredSignatureError: |
| 106 | + raise ExpiredSignatureError("Token has expired") |
| 107 | + |
| 108 | + except JWTError: |
| 109 | + raise JWTError("Invalid token") |
0 commit comments