from datetime import datetime, timedelta from typing import Any, Union from jose import jwt from passlib.context import CryptContext from app.core.config import settings pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") def create_access_token( subject: Union[str, Any], expires_delta: timedelta = None ) -> str: """ Create a new access token for a user. Args: subject: The subject of the token (typically the user ID) expires_delta: Optional expiration time for the token Returns: The encoded JWT token """ if expires_delta: expire = datetime.utcnow() + expires_delta else: expire = datetime.utcnow() + timedelta( minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES ) to_encode = {"exp": expire, "sub": str(subject)} encoded_jwt = jwt.encode(to_encode, settings.SECRET_KEY, algorithm="HS256") return encoded_jwt def verify_password(plain_password: str, hashed_password: str) -> bool: """ Verify that a plain password matches a hashed password. Args: plain_password: The plain text password to check hashed_password: The hashed password to compare against Returns: True if the passwords match, False otherwise """ return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password: str) -> str: """ Hash a password using the configured password context. Args: password: The plain text password to hash Returns: The hashed password """ return pwd_context.hash(password)