from datetime import datetime, timedelta from typing import Any, Optional, Union from jose import jwt from passlib.context import CryptContext from fastapi.security import OAuth2PasswordBearer from app.core.config import settings pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") oauth2_scheme = OAuth2PasswordBearer(tokenUrl=f"{settings.API_V1_STR}/users/token") ALGORITHM = "HS256" def create_access_token(subject: Union[str, Any], expires_delta: Optional[timedelta] = None) -> str: """ Create a JWT access token. Args: subject: The subject of the token, typically a user ID. expires_delta: An optional timedelta for when the token should expire. Returns: A JWT token as a string. """ if expires_delta: expire = datetime.utcnow() + expires_delta else: expire = datetime.utcnow() + timedelta( minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES ) to_encode = {"exp": expire, "sub": str(subject)} encoded_jwt = jwt.encode(to_encode, settings.SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt def verify_password(plain_password: str, hashed_password: str) -> bool: """ Verify a password against a hash. Args: plain_password: The plaintext password. hashed_password: The hashed password. Returns: True if the password matches the hash, False otherwise. """ return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password: str) -> str: """ Hash a password. Args: password: The plaintext password. Returns: The hashed password. """ return pwd_context.hash(password)