from fastapi import Depends, HTTPException, status from fastapi.security import OAuth2PasswordBearer from jose import JWTError, jwt from pydantic import ValidationError from sqlalchemy.orm import Session from app.core.config import settings from app.core.security import TOKEN_TYPE_ACCESS from app.crud.user import get_user from app.db.session import get_db from app.models.user import User from app.schemas.token import TokenPayload # Define OAuth2 scheme for token authentication oauth2_scheme = OAuth2PasswordBearer( tokenUrl=f"{settings.API_V1_STR}/auth/login" ) def get_current_user( db: Session = Depends(get_db), token: str = Depends(oauth2_scheme) ) -> User: """ Get the current user from the provided JWT token. Args: db: Database session token: JWT token from Authorization header Returns: Current user Raises: HTTPException: If token is invalid or user not found """ try: # Decode the JWT token payload = jwt.decode( token, settings.SECRET_KEY, algorithms=[settings.ALGORITHM] ) token_data = TokenPayload(**payload) # Check if token is expired if token_data.exp is None: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Token is missing expiration claim", headers={"WWW-Authenticate": "Bearer"}, ) # Check if token is the correct type (access token) if token_data.type != TOKEN_TYPE_ACCESS: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid token type", headers={"WWW-Authenticate": "Bearer"}, ) except (JWTError, ValidationError): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) # Get the user from the database user = get_user(db, user_id=int(token_data.sub)) if not user: raise HTTPException( status_code=status.HTTP_404_NOT_FOUND, detail="User not found", ) # Check if user is active if not user.is_active: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Inactive user", ) return user def get_current_active_user( current_user: User = Depends(get_current_user), ) -> User: """ Get the current active user. Args: current_user: Current user from get_current_user Returns: Current active user Raises: HTTPException: If user is inactive """ if not current_user.is_active: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Inactive user", ) return current_user def get_current_active_superuser( current_user: User = Depends(get_current_active_user), ) -> User: """ Get the current active superuser. Args: current_user: Current user from get_current_active_user Returns: Current active superuser Raises: HTTPException: If user is not a superuser """ if not current_user.is_superuser: raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail="The user doesn't have enough privileges", ) return current_user