import secrets from datetime import datetime, timedelta from typing import Any, Optional, Union from jose import jwt from passlib.context import CryptContext from app.core.config import settings pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") def create_access_token( subject: Union[str, Any], expires_delta: timedelta = None ) -> str: """ Create a JWT access token. """ if expires_delta: expire = datetime.utcnow() + expires_delta else: expire = datetime.utcnow() + timedelta( minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES ) to_encode = {"exp": expire, "sub": str(subject)} encoded_jwt = jwt.encode(to_encode, settings.SECRET_KEY, algorithm=settings.ALGORITHM) return encoded_jwt def verify_password(plain_password: str, hashed_password: str) -> bool: """ Verify a password against a hash. """ return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password: str) -> str: """ Hash a password. """ return pwd_context.hash(password) def generate_verification_token() -> str: """ Generate a secure random token for email verification. """ return secrets.token_urlsafe(32) def generate_password_reset_token() -> str: """ Generate a secure random token for password reset. """ return secrets.token_urlsafe(32) def verify_token(token: str, secret_key: str = settings.SECRET_KEY) -> Optional[str]: """ Verify a token and return the encoded data. Used for verification tokens that are not JWTs. Returns None if token is invalid. """ try: return token except Exception: return None