feat: implement JWT authentication system
- Add register endpoint with bcrypt password hashing - Add login endpoint returning JWT tokens - Add logout endpoint with token blacklisting - Add /me endpoint for current user info - Add rate limiting (5/minute) for login attempts using slowapi - Add user settings GET and PATCH endpoints - Create auth middleware via get_current_user dependency - Add UserSettings and UserSettingsUpdate schemas
This commit is contained in:
@@ -1,7 +1,6 @@
|
|||||||
from fastapi import APIRouter, Depends, HTTPException, status
|
from fastapi import APIRouter, Depends, HTTPException, status, Request
|
||||||
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
||||||
from sqlalchemy.orm import Session
|
from sqlalchemy.orm import Session
|
||||||
from datetime import timedelta
|
|
||||||
from typing import Annotated
|
from typing import Annotated
|
||||||
|
|
||||||
from ..core.database import get_db
|
from ..core.database import get_db
|
||||||
@@ -12,41 +11,133 @@ from ..core.security import (
|
|||||||
verify_token,
|
verify_token,
|
||||||
)
|
)
|
||||||
from ..core.config import get_settings
|
from ..core.config import get_settings
|
||||||
from ..db.schemas import UserCreate, UserResponse, Token
|
from ..core.limiter import limiter
|
||||||
|
from ..db.schemas import (
|
||||||
|
UserCreate,
|
||||||
|
UserResponse,
|
||||||
|
Token,
|
||||||
|
UserSettings,
|
||||||
|
UserSettingsUpdate,
|
||||||
|
)
|
||||||
|
from ..db.models import User
|
||||||
|
|
||||||
router = APIRouter()
|
router = APIRouter()
|
||||||
settings = get_settings()
|
settings = get_settings()
|
||||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/auth/token")
|
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/auth/login")
|
||||||
|
|
||||||
|
TOKEN_BLACKLIST = set()
|
||||||
|
|
||||||
|
|
||||||
@router.post("/register", response_model=UserResponse)
|
def get_current_user(
|
||||||
def register(user: UserCreate, db: Session = Depends(get_db)):
|
token: Annotated[str, Depends(oauth2_scheme)], db: Session = Depends(get_db)
|
||||||
|
) -> User:
|
||||||
|
if token in TOKEN_BLACKLIST:
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
status_code=status.HTTP_501_NOT_IMPLEMENTED, detail="Not implemented"
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="Token has been revoked",
|
||||||
)
|
)
|
||||||
|
payload = verify_token(token)
|
||||||
|
if payload is None:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="Invalid or expired token",
|
||||||
|
)
|
||||||
|
user_id = payload.get("sub")
|
||||||
|
if user_id is None:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="Invalid token payload",
|
||||||
|
)
|
||||||
|
user = db.query(User).filter(User.id == user_id).first()
|
||||||
|
if user is None:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="User not found",
|
||||||
|
)
|
||||||
|
return user
|
||||||
|
|
||||||
|
|
||||||
@router.post("/login")
|
@router.post(
|
||||||
|
"/register", response_model=UserResponse, status_code=status.HTTP_201_CREATED
|
||||||
|
)
|
||||||
|
def register(user: UserCreate, db: Session = Depends(get_db)):
|
||||||
|
existing_user = db.query(User).filter(User.email == user.email).first()
|
||||||
|
if existing_user:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_400_BAD_REQUEST,
|
||||||
|
detail="Email already registered",
|
||||||
|
)
|
||||||
|
hashed_password = get_password_hash(user.password)
|
||||||
|
db_user = User(
|
||||||
|
email=user.email,
|
||||||
|
password_hash=hashed_password,
|
||||||
|
)
|
||||||
|
db.add(db_user)
|
||||||
|
db.commit()
|
||||||
|
db.refresh(db_user)
|
||||||
|
return db_user
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/login", response_model=Token)
|
||||||
|
@limiter.limit("5/minute")
|
||||||
def login(
|
def login(
|
||||||
|
request: Request,
|
||||||
form_data: Annotated[OAuth2PasswordRequestForm, Depends()],
|
form_data: Annotated[OAuth2PasswordRequestForm, Depends()],
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
):
|
):
|
||||||
|
user = db.query(User).filter(User.email == form_data.username).first()
|
||||||
|
if not user or not verify_password(form_data.password, user.password_hash):
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
status_code=status.HTTP_501_NOT_IMPLEMENTED, detail="Not implemented"
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="Incorrect email or password",
|
||||||
)
|
)
|
||||||
|
access_token = create_access_token(data={"sub": user.id})
|
||||||
|
return Token(access_token=access_token, token_type="bearer")
|
||||||
|
|
||||||
|
|
||||||
@router.post("/logout")
|
@router.post("/logout")
|
||||||
def logout(token: Annotated[str, Depends(oauth2_scheme)]):
|
def logout(
|
||||||
raise HTTPException(
|
current_user: Annotated[User, Depends(get_current_user)],
|
||||||
status_code=status.HTTP_501_NOT_IMPLEMENTED, detail="Not implemented"
|
token: Annotated[str, Depends(oauth2_scheme)],
|
||||||
)
|
):
|
||||||
|
TOKEN_BLACKLIST.add(token)
|
||||||
|
return {"message": "Successfully logged out"}
|
||||||
|
|
||||||
|
|
||||||
@router.get("/me", response_model=UserResponse)
|
@router.get("/me", response_model=UserResponse)
|
||||||
def get_me(
|
def get_me(
|
||||||
token: Annotated[str, Depends(oauth2_scheme)], db: Session = Depends(get_db)
|
current_user: Annotated[User, Depends(get_current_user)],
|
||||||
):
|
):
|
||||||
raise HTTPException(
|
return current_user
|
||||||
status_code=status.HTTP_501_NOT_IMPLEMENTED, detail="Not implemented"
|
|
||||||
|
|
||||||
|
@router.get("/settings", response_model=UserSettings)
|
||||||
|
def get_settings_endpoint(
|
||||||
|
current_user: Annotated[User, Depends(get_current_user)],
|
||||||
|
):
|
||||||
|
return UserSettings(email=current_user.email)
|
||||||
|
|
||||||
|
|
||||||
|
@router.patch("/settings", response_model=UserSettings)
|
||||||
|
def update_settings(
|
||||||
|
current_user: Annotated[User, Depends(get_current_user)],
|
||||||
|
settings_update: UserSettingsUpdate,
|
||||||
|
db: Session = Depends(get_db),
|
||||||
|
):
|
||||||
|
if settings_update.email:
|
||||||
|
existing = (
|
||||||
|
db.query(User)
|
||||||
|
.filter(User.email == settings_update.email, User.id != current_user.id)
|
||||||
|
.first()
|
||||||
)
|
)
|
||||||
|
if existing:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_400_BAD_REQUEST,
|
||||||
|
detail="Email already in use",
|
||||||
|
)
|
||||||
|
current_user.email = settings_update.email
|
||||||
|
if settings_update.password:
|
||||||
|
current_user.password_hash = get_password_hash(settings_update.password)
|
||||||
|
db.commit()
|
||||||
|
db.refresh(current_user)
|
||||||
|
return UserSettings(email=current_user.email)
|
||||||
|
|||||||
4
src/backend/app/core/limiter.py
Normal file
4
src/backend/app/core/limiter.py
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
from slowapi import Limiter
|
||||||
|
from slowapi.util import get_remote_address
|
||||||
|
|
||||||
|
limiter = Limiter(key_func=get_remote_address)
|
||||||
@@ -23,6 +23,15 @@ class Token(BaseModel):
|
|||||||
token_type: str
|
token_type: str
|
||||||
|
|
||||||
|
|
||||||
|
class UserSettings(BaseModel):
|
||||||
|
email: EmailStr
|
||||||
|
|
||||||
|
|
||||||
|
class UserSettingsUpdate(BaseModel):
|
||||||
|
email: Optional[EmailStr] = None
|
||||||
|
password: Optional[str] = None
|
||||||
|
|
||||||
|
|
||||||
class BotCreate(BaseModel):
|
class BotCreate(BaseModel):
|
||||||
name: str
|
name: str
|
||||||
description: Optional[str] = None
|
description: Optional[str] = None
|
||||||
|
|||||||
@@ -1,6 +1,9 @@
|
|||||||
from fastapi import FastAPI
|
from fastapi import FastAPI
|
||||||
from fastapi.middleware.cors import CORSMiddleware
|
from fastapi.middleware.cors import CORSMiddleware
|
||||||
|
from slowapi import Limiter
|
||||||
|
from slowapi.util import get_remote_address
|
||||||
from .api import auth, bots, backtest, simulate, config
|
from .api import auth, bots, backtest, simulate, config
|
||||||
|
from .core.limiter import limiter
|
||||||
|
|
||||||
app = FastAPI(
|
app = FastAPI(
|
||||||
title="Randebu Trading Bot API",
|
title="Randebu Trading Bot API",
|
||||||
@@ -8,6 +11,8 @@ app = FastAPI(
|
|||||||
version="0.1.0",
|
version="0.1.0",
|
||||||
)
|
)
|
||||||
|
|
||||||
|
app.state.limiter = limiter
|
||||||
|
|
||||||
app.add_middleware(
|
app.add_middleware(
|
||||||
CORSMiddleware,
|
CORSMiddleware,
|
||||||
allow_origins=["*"],
|
allow_origins=["*"],
|
||||||
|
|||||||
@@ -10,3 +10,4 @@ crewai>=0.1.0
|
|||||||
anthropic>=0.18.0
|
anthropic>=0.18.0
|
||||||
httpx>=0.26.0
|
httpx>=0.26.0
|
||||||
python-multipart>=0.0.6
|
python-multipart>=0.0.6
|
||||||
|
slowapi>=0.1.9
|
||||||
|
|||||||
Reference in New Issue
Block a user