todo-app / src /core /security.py
SyedFarooqAlii
Update
ca76540
from datetime import datetime, timedelta
from typing import Optional
from sqlmodel import Session
from fastapi import Depends, HTTPException, status
from fastapi.security import HTTPBearer, HTTPAuthorizationCredentials
from jose import JWTError, jwt
from passlib.context import CryptContext
import hashlib
from ..models.user import User
from .config import settings
import uuid
# Password hashing context
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
# Security schemes
security = HTTPBearer()
def verify_password(plain_password: str, hashed_password: str) -> bool:
"""
Verify a plaintext password against a hashed password.
Handles both bcrypt and SHA-256 hashed passwords for environment compatibility.
"""
# Check if this is a SHA-256 hashed password (for environment compatibility)
if hashed_password.startswith('sha256:'):
# Extract the stored hash
stored_hash = hashed_password[7:] # Remove 'sha256:' prefix
# Create SHA-256 hash of the input password
input_hash = hashlib.sha256(plain_password.encode()).hexdigest()
# Compare the hashes
return input_hash == stored_hash
# Otherwise, use bcrypt (if it works in the environment)
try:
# Bcrypt has a 72-byte password length limit
# We need to truncate the password to 72 bytes before verifying
password_bytes = plain_password.encode('utf-8')
if len(password_bytes) > 72:
# Truncate to 72 bytes and decode back to string
plain_password = password_bytes[:72].decode('utf-8', errors='ignore')
return pwd_context.verify(plain_password, hashed_password)
except Exception:
# If bcrypt fails, try SHA-256 fallback
if hashed_password.startswith('sha256:'):
stored_hash = hashed_password[7:]
input_hash = hashlib.sha256(plain_password.encode()).hexdigest()
return input_hash == stored_hash
return False
def get_password_hash(password: str) -> str:
"""
Generate a hash for a plaintext password.
Uses SHA-256 fallback for environment compatibility with bcrypt issues.
"""
try:
# Bcrypt has a 72-byte password length limit
# We need to truncate the password to 72 bytes before hashing
password_bytes = password.encode('utf-8')
if len(password_bytes) > 71: # Using 71 to stay safely under the limit
# Truncate to 71 bytes and decode back to string
password = password_bytes[:71].decode('utf-8', errors='ignore')
return pwd_context.hash(password)
except Exception:
# If bcrypt fails, use SHA-256 as fallback for environment compatibility
password_hash = hashlib.sha256(password.encode()).hexdigest()
return f"sha256:{password_hash}"
def create_access_token(data: dict, expires_delta: Optional[timedelta] = None):
"""
Create a JWT access token with the provided data and expiration.
"""
to_encode = data.copy()
if expires_delta:
expire = datetime.utcnow() + expires_delta
else:
expire = datetime.utcnow() + timedelta(minutes=settings.access_token_expire_minutes)
to_encode.update({"exp": expire, "type": "access"})
encoded_jwt = jwt.encode(to_encode, settings.secret_key, algorithm=settings.algorithm)
return encoded_jwt
def create_refresh_token(data: dict, expires_delta: Optional[timedelta] = None):
"""
Create a JWT refresh token with the provided data and expiration.
"""
to_encode = data.copy()
if expires_delta:
expire = datetime.utcnow() + expires_delta
else:
expire = datetime.utcnow() + timedelta(days=settings.refresh_token_expire_days)
to_encode.update({"exp": expire, "type": "refresh"})
encoded_jwt = jwt.encode(to_encode, settings.secret_key, algorithm=settings.algorithm)
return encoded_jwt
def verify_token(token: str) -> Optional[dict]:
"""
Verify a JWT token and return the payload if valid, None otherwise.
"""
try:
payload = jwt.decode(token, settings.secret_key, algorithms=[settings.algorithm])
return payload
except JWTError:
return None
async def get_current_user_from_token(
credentials: HTTPAuthorizationCredentials = Depends(security)
) -> dict:
"""
Get the current user from the JWT token in the Authorization header.
This function verifies the token and returns the user data from the token payload.
"""
token = credentials.credentials
# Verify the token
payload = verify_token(token)
if payload is None:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
# Check if it's an access token
token_type = payload.get("type")
if token_type != "access":
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Invalid token type",
headers={"WWW-Authenticate": "Bearer"},
)
# Extract user data from the token
user_id = payload.get("sub")
if user_id is None:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
# Convert user_id to UUID if it's a string representation
try:
user_uuid = uuid.UUID(user_id) if isinstance(user_id, str) else user_id
except ValueError:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Invalid user ID format",
headers={"WWW-Authenticate": "Bearer"},
)
# Return user data from the token (no database lookup needed)
return {
"id": user_uuid,
"email": payload.get("email"),
}
def get_user_id_from_token(
credentials: HTTPAuthorizationCredentials = Depends(security)
) -> uuid.UUID:
"""
Extract and return the user_id from the JWT token in the Authorization header.
This is used to enforce that user_id comes from the token, not from request parameters.
"""
token = credentials.credentials
# Verify the token
payload = verify_token(token)
if payload is None:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
# Check if it's an access token
token_type = payload.get("type")
if token_type != "access":
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Invalid token type",
headers={"WWW-Authenticate": "Bearer"},
)
# Extract user_id from the token
user_id = payload.get("sub")
if user_id is None:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
# Convert user_id to UUID if it's a string representation
try:
user_uuid = uuid.UUID(user_id) if isinstance(user_id, str) else user_id
except ValueError:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Invalid user ID format",
headers={"WWW-Authenticate": "Bearer"},
)
return user_uuid