File size: 7,584 Bytes
67f8819 bc4db2c 67f8819 bc4db2c 67f8819 bc4db2c 67f8819 bc4db2c 67f8819 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 | """
FastAPI application entry point.
Per @specs/001-auth-api-bridge/plan.md and @specs/001-auth-api-bridge/quickstart.md
Includes password reset functionality.
"""
from datetime import datetime, timedelta
from uuid import uuid4, UUID
from fastapi import FastAPI, HTTPException
from fastapi.middleware.cors import CORSMiddleware
from pydantic import BaseModel
from config import settings
from api.routes import tasks_router, health_router, chat_router
from services.auth import create_token, create_password_reset_token, verify_password_reset_token, consume_password_reset_token
from services.email import send_password_reset_email
# Create FastAPI application
app = FastAPI(
title="Task Management API",
description="FastAPI backend for task management with JWT authentication",
version="1.0.0",
docs_url="/docs",
redoc_url="/redoc"
)
# =============================================================================
# CORS Middleware
# Per @specs/001-auth-api-bridge/quickstart.md
# =============================================================================
app.add_middleware(
CORSMiddleware,
allow_origins=[
"http://localhost:3000",
"http://localhost:3001",
"http://localhost:3002",
"http://127.0.0.1:3000",
"http://127.0.0.1:3001",
"http://127.0.0.1:3002",
"https://taskflow-app-frontend-4kmp-emsultiio-mawbs-projects.vercel.app",
], # Frontend URLs
allow_credentials=True,
allow_methods=["*"],
allow_headers=["*"],
)
# =============================================================================
# Register Routes
# =============================================================================
app.include_router(health_router)
app.include_router(tasks_router)
app.include_router(chat_router)
# =============================================================================
# Startup Event
# =============================================================================
@app.on_event("startup")
async def startup_event():
"""
Initialize database tables and MCP server on startup.
Per @specs/001-chatbot-mcp/plan.md, MCP server lifecycle is tied to FastAPI app.
"""
from config import init_db
from services.mcp import mcp_service
import logging
logger = logging.getLogger(__name__)
# Initialize database tables
try:
init_db()
logger.info("Database initialized successfully")
except Exception as e:
logger.error(f"Database initialization failed: {e}")
# Don't fail startup - database might be available later
# Initialize MCP server with all tools registered
try:
await mcp_service.initialize()
logger.info("MCP server initialized successfully")
except Exception as e:
logger.error(f"MCP server initialization failed: {e}")
# Don't fail startup - MCP might not be critical for basic functionality
@app.on_event("shutdown")
async def shutdown_event():
"""
Shutdown MCP server gracefully.
Per @specs/001-chatbot-mcp/plan.md, MCP server lifecycle is tied to FastAPI app.
"""
from services.mcp import mcp_service
await mcp_service.shutdown()
@app.get("/")
async def root():
"""Root endpoint."""
return {
"message": "Task Management API",
"version": "1.0.0",
"docs": "/docs"
}
# =============================================================================
# Demo Token Generation (for testing login page)
# =============================================================================
class TokenRequest(BaseModel):
email: str
@app.post("/generate-token")
async def generate_token(request: TokenRequest):
"""
Generate a test JWT token for demo purposes.
In production, this would be replaced by Better Auth's actual authentication.
Uses consistent user_id generation based on email hash to ensure
users always get the same user_id when logging in with the same email.
This fixes the issue where tasks appeared "lost" after logout/login.
"""
import hashlib
import uuid
# Generate a consistent user ID based on email hash
# This ensures the same email always gets the same user_id
email_bytes = request.email.encode('utf-8')
hash_bytes = hashlib.sha256(email_bytes).digest()
# Convert first 16 bytes to a UUID (UUID v5 style but using SHA256)
user_id = str(uuid.UUID(bytes=hash_bytes[:16]))
# Ensure user exists in database (create if not)
from sqlmodel import Session
from models.user import UserTable
from config import engine
with Session(engine) as session:
existing_user = session.get(UserTable, user_id)
if not existing_user:
# Create new user with this email
from datetime import datetime
user = UserTable(
id=user_id,
email=request.email,
created_at=datetime.utcnow(),
updated_at=datetime.utcnow()
)
session.add(user)
session.commit()
print(f"Created new user: {user_id} with email: {request.email}")
# Create JWT token
token = create_token(user_id)
return {
"token": token,
"userId": user_id,
"email": request.email
}
# =============================================================================
# Password Reset (Demo Mode)
# =============================================================================
class ForgotPasswordRequest(BaseModel):
email: str
class ResetPasswordRequest(BaseModel):
token: str
new_password: str
@app.post("/forgot-password")
async def forgot_password(request: ForgotPasswordRequest):
"""
Initiate password reset process.
Sends an email with a password reset link.
In demo mode (without email configured), the token is logged and can be used directly.
"""
# Create a password reset token
reset_token = create_password_reset_token(request.email)
# Send password reset email
email_sent = await send_password_reset_email(
email=request.email,
reset_token=reset_token,
frontend_url="http://localhost:3002" # In production, use settings.better_auth_url
)
# For demo mode, include token in response if email wasn't actually sent
# In production with real email, never include the token in the response
include_token = not settings.emails_enabled or not settings.email_username
response_data = {
"message": "If an account exists with that email, a password reset link has been sent.",
"email": request.email
}
if include_token:
response_data["reset_token"] = reset_token
response_data["demo_mode"] = True
return response_data
@app.post("/reset-password")
async def reset_password(request: ResetPasswordRequest):
"""
Reset password using the token received from forgot-password.
In production, this would update the user's password in the database.
For demo purposes, it just validates the token.
"""
# Verify the reset token
email = verify_password_reset_token(request.token)
if email is None:
raise HTTPException(
status_code=400,
detail="Invalid or expired reset token"
)
# In production, you would update the password in the database here
# For demo, we just consume the token
consume_password_reset_token(request.token)
return {
"message": "Password reset successfully",
"email": email
}
|