diff --git a/README.md b/README.md index e8acfba..357a79e 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,109 @@ -# FastAPI Application +# User Authentication Service -This is a FastAPI application bootstrapped by BackendIM, the AI-powered backend generation platform. +A FastAPI service for user authentication with JWT tokens. + +## Features + +- User registration and login +- JWT token-based authentication +- Token refresh functionality +- Password hashing with bcrypt +- SQLite database with SQLAlchemy ORM +- Alembic migrations +- CORS support +- Health endpoint + +## Prerequisites + +- Python 3.9+ +- pip (Python package manager) + +## Setup + +1. Clone the repository: + +```bash +git clone +cd userauthenticationservice-0fe432 +``` + +2. Create and activate a virtual environment (optional but recommended): + +```bash +python -m venv venv +source venv/bin/activate # On Windows: venv\Scripts\activate +``` + +3. Install dependencies: + +```bash +pip install -r requirements.txt +``` + +4. Create a `.env` file based on the `.env.example`: + +```bash +cp .env.example .env +``` + +5. Edit the `.env` file and set a secure secret key: + +``` +SECRET_KEY=your_secure_secret_key +``` + +6. Run database migrations: + +```bash +alembic upgrade head +``` + +## Running the Service + +Start the service with: + +```bash +uvicorn main:app --reload +``` + +The API will be available at http://localhost:8000 + +API documentation is available at: +- Swagger UI: http://localhost:8000/docs +- ReDoc: http://localhost:8000/redoc + +## API Endpoints + +- `POST /api/v1/auth/register` - Register a new user +- `POST /api/v1/auth/login` - Login and get access token +- `POST /api/v1/auth/refresh` - Refresh access token +- `GET /api/v1/auth/me` - Get current user information +- `PUT /api/v1/auth/me` - Update current user information +- `GET /health` - Health check endpoint + +## Environment Variables + +| Variable | Description | Default | +|----------|-------------|---------| +| SECRET_KEY | JWT signing key | supersecretkey | +| ALGORITHM | JWT algorithm | HS256 | +| ACCESS_TOKEN_EXPIRE_MINUTES | Access token lifetime in minutes | 30 | +| REFRESH_TOKEN_EXPIRE_DAYS | Refresh token lifetime in days | 7 | +| DATABASE_URL | SQLite database URL | sqlite:///app/storage/db/db.sqlite | + +## Authentication Flow + +1. Register a user with `POST /api/v1/auth/register` +2. Login with `POST /api/v1/auth/login` to get access and refresh tokens +3. Use the access token in the `Authorization` header for protected endpoints +4. When the access token expires, use `POST /api/v1/auth/refresh` with the refresh token to get a new access token + +## Development + +This project uses: +- FastAPI for the API framework +- SQLAlchemy for ORM +- Alembic for database migrations +- Pydantic for data validation +- python-jose for JWT handling +- passlib and bcrypt for password hashing \ No newline at end of file diff --git a/alembic.ini b/alembic.ini new file mode 100644 index 0000000..0e75b3b --- /dev/null +++ b/alembic.ini @@ -0,0 +1,105 @@ +# A generic, single database configuration. + +[alembic] +# path to migration scripts +script_location = migrations + +# template used to generate migration file names; The default value is %%(rev)s_%%(slug)s +# Uncomment the line below if you want the files to be prepended with date and time +# see https://alembic.sqlalchemy.org/en/latest/tutorial.html#editing-the-ini-file +# for all available tokens +# file_template = %%(year)d_%%(month).2d_%%(day).2d_%%(hour).2d%%(minute).2d-%%(rev)s_%%(slug)s + +# sys.path path, will be prepended to sys.path if present. +# defaults to the current working directory. +prepend_sys_path = . + +# timezone to use when rendering the date within the migration file +# as well as the filename. +# If specified, requires the python-dateutil library that can be +# installed by adding `alembic[tz]` to the pip requirements +# string value is passed to dateutil.tz.gettz() +# leave blank for localtime +# timezone = + +# max length of characters to apply to the +# "slug" field +# truncate_slug_length = 40 + +# set to 'true' to run the environment during +# the 'revision' command, regardless of autogenerate +# revision_environment = false + +# set to 'true' to allow .pyc and .pyo files without +# a source .py file to be detected as revisions in the +# versions/ directory +# sourceless = false + +# version location specification; This defaults +# to migrations/versions. When using multiple version +# directories, initial revisions must be specified with --version-path. +# The path separator used here should be the separator specified by "version_path_separator" below. +# version_locations = %(here)s/bar:%(here)s/bat:migrations/versions + +# version path separator; As mentioned above, this is the character used to split +# version_locations. The default within new alembic.ini files is "os", which uses os.pathsep. +# If this key is omitted entirely, it falls back to the legacy behavior of splitting on spaces and/or commas. +# Valid values for version_path_separator are: +# +# version_path_separator = : +# version_path_separator = ; +# version_path_separator = space +version_path_separator = os # Use os.pathsep. Default configuration used for new projects. + +# the output encoding used when revision files +# are written from script.py.mako +# output_encoding = utf-8 + +# SQLite URL using absolute path +sqlalchemy.url = sqlite:////app/storage/db/db.sqlite + +[post_write_hooks] +# post_write_hooks defines scripts or Python functions that are run +# on newly generated revision scripts. See the documentation for further +# detail and examples + +# format using "black" - use the console_scripts runner, against the "black" entrypoint +# hooks = black +# black.type = console_scripts +# black.entrypoint = black +# black.options = -l 79 REVISION_SCRIPT_FILENAME + +# Logging configuration +[loggers] +keys = root,sqlalchemy,alembic + +[handlers] +keys = console + +[formatters] +keys = generic + +[logger_root] +level = WARN +handlers = console +qualname = + +[logger_sqlalchemy] +level = WARN +handlers = +qualname = sqlalchemy.engine + +[logger_alembic] +level = INFO +handlers = +qualname = alembic + +[handler_console] +class = StreamHandler +args = (sys.stderr,) +level = NOTSET +formatter = generic + +[formatter_generic] +format = %(levelname)-5.5s [%(name)s] %(message)s +datefmt = %H:%M:%S \ No newline at end of file diff --git a/app/__init__.py b/app/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/app/api/__init__.py b/app/api/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/app/api/v1/__init__.py b/app/api/v1/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/app/api/v1/auth.py b/app/api/v1/auth.py new file mode 100644 index 0000000..842a85c --- /dev/null +++ b/app/api/v1/auth.py @@ -0,0 +1,190 @@ +from typing import Any + +from fastapi import APIRouter, Depends, HTTPException, status +from fastapi.security import OAuth2PasswordRequestForm +from sqlalchemy.orm import Session + +from app.auth import ( + create_access_token, + create_refresh_token, + get_current_user, + get_password_hash, + verify_password, + verify_token +) +from app.db.session import get_db +from app.models.user import User +from app.schemas.token import Token, RefreshToken +from app.schemas.user import User as UserSchema, UserCreate, UserUpdate + +router = APIRouter(prefix="/auth", tags=["Authentication"]) + + +@router.post("/register", response_model=UserSchema) +async def register_user( + user_in: UserCreate, + db: Session = Depends(get_db) +) -> Any: + """ + Register a new user + """ + # Check if user with given email already exists + user = db.query(User).filter(User.email == user_in.email).first() + if user: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="A user with this email already exists", + ) + + # Check if user with given username already exists + user = db.query(User).filter(User.username == user_in.username).first() + if user: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="A user with this username already exists", + ) + + # Create new user + hashed_password = get_password_hash(user_in.password) + db_user = User( + email=user_in.email, + username=user_in.username, + hashed_password=hashed_password, + first_name=user_in.first_name, + last_name=user_in.last_name, + is_active=user_in.is_active, + ) + db.add(db_user) + db.commit() + db.refresh(db_user) + + return db_user + + +@router.post("/login", response_model=Token) +async def login( + form_data: OAuth2PasswordRequestForm = Depends(), + db: Session = Depends(get_db) +) -> Any: + """ + Get access token for user + """ + # Try to find user by username + user = db.query(User).filter(User.username == form_data.username).first() + + # If user not found by username, try by email + if not user: + user = db.query(User).filter(User.email == form_data.username).first() + + # If user still not found or password is incorrect, raise error + if not user or not verify_password(form_data.password, user.hashed_password): + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail="Incorrect username or password", + headers={"WWW-Authenticate": "Bearer"}, + ) + + # If user is not active, raise error + if not user.is_active: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Inactive user", + ) + + # Generate access and refresh tokens + access_token = create_access_token(user.id) + refresh_token = create_refresh_token(user.id) + + return { + "access_token": access_token, + "refresh_token": refresh_token, + "token_type": "bearer", + } + + +@router.post("/refresh", response_model=Token) +async def refresh_token( + refresh_token_data: RefreshToken, + db: Session = Depends(get_db) +) -> Any: + """ + Refresh access token + """ + token_data = verify_token(refresh_token_data.refresh_token) + if not token_data: + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail="Invalid refresh token", + headers={"WWW-Authenticate": "Bearer"}, + ) + + user = db.query(User).filter(User.id == int(token_data.sub)).first() + if not user: + raise HTTPException( + status_code=status.HTTP_404_NOT_FOUND, + detail="User not found", + ) + + if not user.is_active: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Inactive user", + ) + + # Generate new tokens + access_token = create_access_token(user.id) + refresh_token = create_refresh_token(user.id) + + return { + "access_token": access_token, + "refresh_token": refresh_token, + "token_type": "bearer", + } + + +@router.get("/me", response_model=UserSchema) +async def get_me( + current_user: User = Depends(get_current_user) +) -> Any: + """ + Get current user information + """ + return current_user + + +@router.put("/me", response_model=UserSchema) +async def update_me( + user_in: UserUpdate, + current_user: User = Depends(get_current_user), + db: Session = Depends(get_db) +) -> Any: + """ + Update current user information + """ + # Check if email already exists + if user_in.email and user_in.email != current_user.email: + user = db.query(User).filter(User.email == user_in.email).first() + if user: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="A user with this email already exists", + ) + + # Check if username already exists + if user_in.username and user_in.username != current_user.username: + user = db.query(User).filter(User.username == user_in.username).first() + if user: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="A user with this username already exists", + ) + + # Update user data + for field, value in user_in.model_dump(exclude_unset=True).items(): + setattr(current_user, field, value) + + db.add(current_user) + db.commit() + db.refresh(current_user) + + return current_user \ No newline at end of file diff --git a/app/api/v1/health.py b/app/api/v1/health.py new file mode 100644 index 0000000..8db480d --- /dev/null +++ b/app/api/v1/health.py @@ -0,0 +1,18 @@ +from fastapi import APIRouter, Depends +from sqlalchemy.orm import Session +from app.db.session import get_db + +router = APIRouter(tags=["Health"]) + + +@router.get("/health") +async def health_check(db: Session = Depends(get_db)): + """ + Health check endpoint to verify the API and database connection are working + """ + try: + # Check if we can execute a simple query + db.execute("SELECT 1") + return {"status": "healthy", "database": "connected"} + except Exception as e: + return {"status": "unhealthy", "database": str(e)} \ No newline at end of file diff --git a/app/auth/__init__.py b/app/auth/__init__.py new file mode 100644 index 0000000..8017f0b --- /dev/null +++ b/app/auth/__init__.py @@ -0,0 +1,13 @@ +from app.auth.jwt import create_access_token, create_refresh_token, verify_token +from app.auth.password import get_password_hash, verify_password +from app.auth.dependencies import get_current_user, get_current_active_superuser + +__all__ = [ + "create_access_token", + "create_refresh_token", + "verify_token", + "get_password_hash", + "verify_password", + "get_current_user", + "get_current_active_superuser" +] \ No newline at end of file diff --git a/app/auth/dependencies.py b/app/auth/dependencies.py new file mode 100644 index 0000000..d5c9312 --- /dev/null +++ b/app/auth/dependencies.py @@ -0,0 +1,55 @@ +from fastapi import Depends, HTTPException, status +from fastapi.security import OAuth2PasswordBearer +from sqlalchemy.orm import Session + +from app.auth.jwt import verify_token +from app.db.session import get_db +from app.models.user import User + +# Create OAuth2 scheme for token authentication +oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/v1/auth/login") + + +def get_current_user( + db: Session = Depends(get_db), token: str = Depends(oauth2_scheme) +) -> User: + """ + Dependency to get the current authenticated user + """ + token_data = verify_token(token) + if not token_data: + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail="Could not validate credentials", + headers={"WWW-Authenticate": "Bearer"}, + ) + + user = db.query(User).filter(User.id == int(token_data.sub)).first() + if not user: + raise HTTPException( + status_code=status.HTTP_404_NOT_FOUND, + detail="User not found", + ) + + if not user.is_active: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Inactive user" + ) + + return user + + +def get_current_active_superuser( + current_user: User = Depends(get_current_user), +) -> User: + """ + Dependency to get the current authenticated superuser + """ + if not current_user.is_superuser: + raise HTTPException( + status_code=status.HTTP_403_FORBIDDEN, + detail="The user doesn't have enough privileges", + ) + + return current_user \ No newline at end of file diff --git a/app/auth/jwt.py b/app/auth/jwt.py new file mode 100644 index 0000000..8538d58 --- /dev/null +++ b/app/auth/jwt.py @@ -0,0 +1,60 @@ +from datetime import datetime, timedelta +from typing import Any, Optional +import os + +from jose import jwt +from pydantic import ValidationError + +from app.schemas.token import TokenPayload + +# Get JWT settings from environment variables +SECRET_KEY = os.getenv("SECRET_KEY", "supersecretkey") +ALGORITHM = os.getenv("ALGORITHM", "HS256") +ACCESS_TOKEN_EXPIRE_MINUTES = int(os.getenv("ACCESS_TOKEN_EXPIRE_MINUTES", 30)) +REFRESH_TOKEN_EXPIRE_DAYS = int(os.getenv("REFRESH_TOKEN_EXPIRE_DAYS", 7)) + + +def create_access_token(subject: str | Any, expires_delta: Optional[timedelta] = None) -> str: + """ + Create a new JWT access token + """ + if expires_delta: + expire = datetime.utcnow() + expires_delta + else: + expire = datetime.utcnow() + timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES) + + to_encode = {"exp": expire, "sub": str(subject)} + encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) + return encoded_jwt + + +def create_refresh_token(subject: str | Any, expires_delta: Optional[timedelta] = None) -> str: + """ + Create a new JWT refresh token + """ + if expires_delta: + expire = datetime.utcnow() + expires_delta + else: + expire = datetime.utcnow() + timedelta(days=REFRESH_TOKEN_EXPIRE_DAYS) + + to_encode = {"exp": expire, "sub": str(subject)} + encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) + return encoded_jwt + + +def verify_token(token: str) -> Optional[TokenPayload]: + """ + Verify and decode a JWT token + """ + try: + payload = jwt.decode( + token, SECRET_KEY, algorithms=[ALGORITHM] + ) + token_data = TokenPayload(**payload) + + if datetime.fromtimestamp(token_data.exp) < datetime.utcnow(): + return None + + return token_data + except (jwt.JWTError, ValidationError): + return None \ No newline at end of file diff --git a/app/auth/password.py b/app/auth/password.py new file mode 100644 index 0000000..638a129 --- /dev/null +++ b/app/auth/password.py @@ -0,0 +1,18 @@ +from passlib.context import CryptContext + +# Create an instance of CryptContext for password hashing +pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") + + +def verify_password(plain_password: str, hashed_password: str) -> bool: + """ + Verify if the provided plain password matches the hashed password + """ + return pwd_context.verify(plain_password, hashed_password) + + +def get_password_hash(password: str) -> str: + """ + Generate a hashed version of the plain password + """ + return pwd_context.hash(password) \ No newline at end of file diff --git a/app/core/__init__.py b/app/core/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/app/db/__init__.py b/app/db/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/app/db/session.py b/app/db/session.py new file mode 100644 index 0000000..66b27da --- /dev/null +++ b/app/db/session.py @@ -0,0 +1,29 @@ +from pathlib import Path +from sqlalchemy import create_engine +from sqlalchemy.ext.declarative import declarative_base +from sqlalchemy.orm import sessionmaker + +# Create the directory for SQLite database if it doesn't exist +DB_DIR = Path("/app") / "storage" / "db" +DB_DIR.mkdir(parents=True, exist_ok=True) + +SQLALCHEMY_DATABASE_URL = f"sqlite:///{DB_DIR}/db.sqlite" + +engine = create_engine( + SQLALCHEMY_DATABASE_URL, + connect_args={"check_same_thread": False} +) +SessionLocal = sessionmaker(autocommit=False, autoflush=False, bind=engine) + +Base = declarative_base() + + +def get_db(): + """ + Dependency function to get a database session + """ + db = SessionLocal() + try: + yield db + finally: + db.close() \ No newline at end of file diff --git a/app/models/__init__.py b/app/models/__init__.py new file mode 100644 index 0000000..10d6bae --- /dev/null +++ b/app/models/__init__.py @@ -0,0 +1,3 @@ +from app.models.user import User + +__all__ = ["User"] \ No newline at end of file diff --git a/app/models/user.py b/app/models/user.py new file mode 100644 index 0000000..eeebaea --- /dev/null +++ b/app/models/user.py @@ -0,0 +1,18 @@ +from datetime import datetime +from sqlalchemy import Boolean, Column, String, DateTime, Integer +from app.db.session import Base + + +class User(Base): + __tablename__ = "users" + + id = Column(Integer, primary_key=True, index=True) + email = Column(String, unique=True, index=True, nullable=False) + username = Column(String, unique=True, index=True, nullable=False) + hashed_password = Column(String, nullable=False) + first_name = Column(String, nullable=True) + last_name = Column(String, nullable=True) + is_active = Column(Boolean, default=True) + is_superuser = Column(Boolean, default=False) + created_at = Column(DateTime, default=datetime.utcnow) + updated_at = Column(DateTime, default=datetime.utcnow, onupdate=datetime.utcnow) \ No newline at end of file diff --git a/app/schemas/__init__.py b/app/schemas/__init__.py new file mode 100644 index 0000000..e205a38 --- /dev/null +++ b/app/schemas/__init__.py @@ -0,0 +1,4 @@ +from app.schemas.token import Token, TokenPayload, RefreshToken +from app.schemas.user import UserBase, UserCreate, User, UserInDB, UserUpdate + +__all__ = ["Token", "TokenPayload", "RefreshToken", "UserBase", "UserCreate", "User", "UserInDB", "UserUpdate"] \ No newline at end of file diff --git a/app/schemas/token.py b/app/schemas/token.py new file mode 100644 index 0000000..1143808 --- /dev/null +++ b/app/schemas/token.py @@ -0,0 +1,17 @@ +from typing import Optional +from pydantic import BaseModel + + +class Token(BaseModel): + access_token: str + refresh_token: str + token_type: str + + +class TokenPayload(BaseModel): + sub: Optional[str] = None + exp: Optional[int] = None + + +class RefreshToken(BaseModel): + refresh_token: str \ No newline at end of file diff --git a/app/schemas/user.py b/app/schemas/user.py new file mode 100644 index 0000000..28cf805 --- /dev/null +++ b/app/schemas/user.py @@ -0,0 +1,51 @@ +from datetime import datetime +from typing import Optional +from pydantic import BaseModel, EmailStr, Field, validator + + +class UserBase(BaseModel): + email: EmailStr + username: str + first_name: Optional[str] = None + last_name: Optional[str] = None + is_active: Optional[bool] = True + + +class UserCreate(UserBase): + password: str = Field(..., min_length=8) + password_confirm: str + + @validator("password_confirm") + def passwords_match(cls, v, values): + if "password" in values and v != values["password"]: + raise ValueError("Passwords do not match") + return v + + +class UserUpdate(BaseModel): + email: Optional[EmailStr] = None + username: Optional[str] = None + first_name: Optional[str] = None + last_name: Optional[str] = None + is_active: Optional[bool] = None + + +class UserInDB(UserBase): + id: int + created_at: datetime + updated_at: datetime + is_superuser: bool = False + hashed_password: str + + class Config: + from_attributes = True + + +class User(UserBase): + id: int + created_at: datetime + updated_at: datetime + is_superuser: bool = False + + class Config: + from_attributes = True \ No newline at end of file diff --git a/main.py b/main.py new file mode 100644 index 0000000..6715cd0 --- /dev/null +++ b/main.py @@ -0,0 +1,29 @@ +import uvicorn +from fastapi import FastAPI +from fastapi.middleware.cors import CORSMiddleware +from app.api.v1.auth import router as auth_router +from app.api.v1.health import router as health_router + + +app = FastAPI( + title="User Authentication Service", + description="A FastAPI service for user authentication", + version="0.1.0", +) + +# Configure CORS +app.add_middleware( + CORSMiddleware, + allow_origins=["*"], + allow_credentials=True, + allow_methods=["*"], + allow_headers=["*"], +) + +# Include routers +app.include_router(auth_router, prefix="/api/v1") +app.include_router(health_router) + + +if __name__ == "__main__": + uvicorn.run("main:app", host="0.0.0.0", port=8000, reload=True) \ No newline at end of file diff --git a/migrations/README b/migrations/README new file mode 100644 index 0000000..3542e0e --- /dev/null +++ b/migrations/README @@ -0,0 +1 @@ +Generic single-database configuration with SQLite. \ No newline at end of file diff --git a/migrations/env.py b/migrations/env.py new file mode 100644 index 0000000..127949a --- /dev/null +++ b/migrations/env.py @@ -0,0 +1,81 @@ +from logging.config import fileConfig + +from sqlalchemy import engine_from_config +from sqlalchemy import pool + +from alembic import context +from app.db.session import Base + +# this is the Alembic Config object, which provides +# access to the values within the .ini file in use. +config = context.config + +# Interpret the config file for Python logging. +# This line sets up loggers basically. +if config.config_file_name is not None: + fileConfig(config.config_file_name) + +# add your model's MetaData object here +# for 'autogenerate' support +target_metadata = Base.metadata + +# other values from the config, defined by the needs of env.py, +# can be acquired: +# my_important_option = config.get_main_option("my_important_option") +# ... etc. + + +def run_migrations_offline() -> None: + """Run migrations in 'offline' mode. + + This configures the context with just a URL + and not an Engine, though an Engine is acceptable + here as well. By skipping the Engine creation + we don't even need a DBAPI to be available. + + Calls to context.execute() here emit the given string to the + script output. + + """ + url = config.get_main_option("sqlalchemy.url") + context.configure( + url=url, + target_metadata=target_metadata, + literal_binds=True, + dialect_opts={"paramstyle": "named"}, + ) + + with context.begin_transaction(): + context.run_migrations() + + +def run_migrations_online() -> None: + """Run migrations in 'online' mode. + + In this scenario we need to create an Engine + and associate a connection with the context. + + """ + connectable = engine_from_config( + config.get_section(config.config_ini_section, {}), + prefix="sqlalchemy.", + poolclass=pool.NullPool, + ) + + with connectable.connect() as connection: + is_sqlite = connection.dialect.name == 'sqlite' + context.configure( + connection=connection, + target_metadata=target_metadata, + render_as_batch=is_sqlite, # Key configuration for SQLite + # ... other options + ) + + with context.begin_transaction(): + context.run_migrations() + + +if context.is_offline_mode(): + run_migrations_offline() +else: + run_migrations_online() \ No newline at end of file diff --git a/migrations/script.py.mako b/migrations/script.py.mako new file mode 100644 index 0000000..37d0cac --- /dev/null +++ b/migrations/script.py.mako @@ -0,0 +1,24 @@ +"""${message} + +Revision ID: ${up_revision} +Revises: ${down_revision | comma,n} +Create Date: ${create_date} + +""" +from alembic import op +import sqlalchemy as sa +${imports if imports else ""} + +# revision identifiers, used by Alembic. +revision = ${repr(up_revision)} +down_revision = ${repr(down_revision)} +branch_labels = ${repr(branch_labels)} +depends_on = ${repr(depends_on)} + + +def upgrade() -> None: + ${upgrades if upgrades else "pass"} + + +def downgrade() -> None: + ${downgrades if downgrades else "pass"} \ No newline at end of file diff --git a/migrations/versions/initial_migration.py b/migrations/versions/initial_migration.py new file mode 100644 index 0000000..24b40de --- /dev/null +++ b/migrations/versions/initial_migration.py @@ -0,0 +1,49 @@ +"""Initial migration + +Revision ID: 001 +Revises: +Create Date: 2023-09-12 + +""" +from alembic import op +import sqlalchemy as sa + + +# revision identifiers, used by Alembic. +revision = '001' +down_revision = None +branch_labels = None +depends_on = None + + +def upgrade() -> None: + # Create users table + op.create_table( + 'users', + sa.Column('id', sa.Integer(), nullable=False), + sa.Column('email', sa.String(), nullable=False), + sa.Column('username', sa.String(), nullable=False), + sa.Column('hashed_password', sa.String(), nullable=False), + sa.Column('first_name', sa.String(), nullable=True), + sa.Column('last_name', sa.String(), nullable=True), + sa.Column('is_active', sa.Boolean(), nullable=True), + sa.Column('is_superuser', sa.Boolean(), nullable=True), + sa.Column('created_at', sa.DateTime(), nullable=True), + sa.Column('updated_at', sa.DateTime(), nullable=True), + sa.PrimaryKeyConstraint('id') + ) + + # Create indexes + op.create_index(op.f('ix_users_email'), 'users', ['email'], unique=True) + op.create_index(op.f('ix_users_id'), 'users', ['id'], unique=False) + op.create_index(op.f('ix_users_username'), 'users', ['username'], unique=True) + + +def downgrade() -> None: + # Drop indexes + op.drop_index(op.f('ix_users_username'), table_name='users') + op.drop_index(op.f('ix_users_id'), table_name='users') + op.drop_index(op.f('ix_users_email'), table_name='users') + + # Drop table + op.drop_table('users') \ No newline at end of file diff --git a/requirements.txt b/requirements.txt new file mode 100644 index 0000000..82ae57e --- /dev/null +++ b/requirements.txt @@ -0,0 +1,13 @@ +fastapi>=0.103.1 +uvicorn>=0.23.2 +sqlalchemy>=2.0.20 +alembic>=1.12.0 +pydantic>=2.3.0 +pydantic-settings>=2.0.3 +python-jose>=3.3.0 +passlib>=1.7.4 +python-multipart>=0.0.6 +bcrypt>=4.0.1 +email-validator>=2.0.0 +ruff>=0.0.290 +python-dotenv>=1.0.0 \ No newline at end of file