/
login.py
50 lines (41 loc) · 1.68 KB
/
login.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
from fastapi import APIRouter, Response
from fastapi.responses import RedirectResponse
from fastapi import Depends, HTTPException, status, Security
from fastapi.security import OAuth2PasswordRequestForm
from NIPTool.models.server.login import Token, UserInDB, User
from NIPTool.API.external.api.deps import (
get_current_active_user,
authenticate_user,
create_access_token,
temp_get_config,
)
from datetime import timedelta
router = APIRouter()
@router.post("/token", response_model=Token)
def login_for_access_token(
form_data: OAuth2PasswordRequestForm = Depends(), config: dict = Depends(temp_get_config)
):
user: UserInDB = authenticate_user(form_data.username, form_data.password)
if not user:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Incorrect username or password",
headers={"WWW-Authenticate": "Bearer"},
)
access_token_expires = timedelta(minutes=config.get("ACCESS_TOKEN_EXPIRE_MINUTES"))
access_token = create_access_token(
data={"sub": user.username, "scopes": form_data.scopes},
expires_delta=access_token_expires,
)
return {"access_token": access_token, "token_type": "Bearer"}
@router.post("/login")
def login(token: Token = Depends(login_for_access_token)):
if token:
headers = {
"Authorization": f"{token.get('token_type')} {token.get('access_token')}",
"accept": "application/json",
}
return RedirectResponse("../batches", headers=headers)
# @router.post("/login")
# def login(current_user: User = Security(get_current_active_user, scopes=["items", "me"])):
# return RedirectResponse('../batches')