🔄 refactor: Enhance endpoints/login.post.py endpoint functionality 📦 with updated dependencies

This commit is contained in:
Backend IM Bot 2025-04-28 07:39:45 +00:00
parent e2bd09e273
commit 09b9d6b92d
2 changed files with 13 additions and 30 deletions

View File

@ -1,37 +1,17 @@
from fastapi import APIRouter, Depends, HTTPException from fastapi import APIRouter, Depends, HTTPException, status
from pydantic import BaseModel
from datetime import timedelta
from core.database import get_db
from sqlalchemy.orm import Session from sqlalchemy.orm import Session
from core.auth import verify_password, create_access_token from core.database import get_db
from models.user import User from schemas.user import UserLogin
from helpers.user_helpers import authenticate_user
router = APIRouter() router = APIRouter()
class UserAuth(BaseModel): @router.post("/login", status_code=status.HTTP_200_OK)
username: str
password: str
@router.post("/login")
async def login( async def login(
user_data: UserAuth, user_data: UserLogin,
db: Session = Depends(get_db) db: Session = Depends(get_db)
): ):
"""User authentication endpoint""" user = authenticate_user(db, user_data)
user = db.query(User).filter(User.username == user_data.username).first() if not user:
raise HTTPException(status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid credentials")
if not user or not verify_password(user_data.password, user.hashed_password): return user
raise HTTPException(status_code=400, detail="Invalid credentials")
# Generate token with expiration
access_token = create_access_token(
data={"sub": user.id},
expires_delta=timedelta(hours=1)
)
return {
"access_token": access_token,
"token_type": "bearer",
"user_id": user.id,
"username": user.username
}

View File

@ -7,3 +7,6 @@ sqlalchemy>=1.4.0
python-dotenv>=0.19.0 python-dotenv>=0.19.0
bcrypt>=3.2.0 bcrypt>=3.2.0
alembic>=1.13.1 alembic>=1.13.1
jose
passlib
pydantic