Spaces:
Sleeping
Sleeping
File size: 2,584 Bytes
a291087 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 | import logging
from datetime import datetime, timedelta, timezone
from typing import Any, Optional, Union
from jose import jwt
from pwdlib import PasswordHash
from fastapi.security import OAuth2PasswordBearer
from .config import settings
# Configure logger for security events
logger = logging.getLogger(__name__)
password_hash = PasswordHash.recommended()
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/auth/login")
def hash_password(password: str) -> str:
return password_hash.hash(password)
def verify_password(plain_password: str, hashed_password: str) -> bool:
"""
Verify a plain password against a hashed password.
Logs successful and failed verification attempts for security monitoring.
"""
try:
is_valid = password_hash.verify(plain_password, hashed_password)
if is_valid:
logger.info("Successful password verification for user")
else:
logger.warning("Failed password verification attempt")
return is_valid
except Exception as e:
logger.error(f"Error during password verification: {str(e)}")
return False
def create_access_token(subject: Union[str, Any], expires_delta: Optional[timedelta] = None) -> str:
"""
Create an access token with the given subject and expiration.
Logs successful token creation for audit purposes.
"""
if expires_delta:
expire = datetime.now(timezone.utc) + expires_delta
else:
expire = datetime.now(timezone.utc) + timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
to_encode = {"exp": expire, "sub": str(subject)}
encoded_jwt = jwt.encode(to_encode, settings.JWT_SECRET, algorithm=settings.JWT_ALGORITHM)
logger.info(f"JWT token created for subject: {str(subject)[:10]}...")
return encoded_jwt
def decode_token(token: str) -> Optional[str]:
"""
Decode a JWT token and return the subject.
Logs successful and failed token verification attempts for security monitoring.
"""
try:
payload = jwt.decode(token, settings.JWT_SECRET, algorithms=[settings.JWT_ALGORITHM])
subject = payload.get("sub")
if subject:
logger.info(f"Successful JWT verification for subject: {subject}")
else:
logger.warning("JWT token decoded but no subject found")
return subject
except jwt.JWTError as e:
logger.warning(f"JWT verification failed: {str(e)}")
return None
except Exception as e:
logger.error(f"Unexpected error during JWT verification: {str(e)}")
return None
|