mirror of
https://github.com/GNS3/gns3-server.git
synced 2024-12-22 22:22:25 +00:00
76 lines
2.5 KiB
Python
76 lines
2.5 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2020 GNS3 Technologies Inc.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
import bcrypt
|
|
from jose import JWTError, jwt
|
|
from datetime import datetime, timedelta
|
|
from passlib.context import CryptContext
|
|
|
|
from typing import Optional
|
|
from fastapi import HTTPException, status
|
|
from gns3server.schemas.tokens import TokenData
|
|
from pydantic import ValidationError
|
|
|
|
# FIXME: temporary variables to move to config
|
|
SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
|
|
ALGORITHM = "HS256"
|
|
ACCESS_TOKEN_EXPIRE_MINUTES = 30
|
|
|
|
|
|
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
|
|
|
|
|
|
class AuthService:
|
|
|
|
def hash_password(self, password: str) -> str:
|
|
|
|
return pwd_context.hash(password)
|
|
|
|
def verify_password(self, password, hashed_password) -> bool:
|
|
|
|
return pwd_context.verify(password, hashed_password)
|
|
|
|
def create_access_token(
|
|
self,
|
|
username,
|
|
secret_key: str = SECRET_KEY,
|
|
expires_in: int = ACCESS_TOKEN_EXPIRE_MINUTES
|
|
) -> str:
|
|
|
|
expire = datetime.utcnow() + timedelta(minutes=expires_in)
|
|
to_encode = {"sub": username, "exp": expire}
|
|
encoded_jwt = jwt.encode(to_encode, secret_key, algorithm=ALGORITHM)
|
|
return encoded_jwt
|
|
|
|
def get_username_from_token(self, token: str, secret_key: str = SECRET_KEY) -> Optional[str]:
|
|
|
|
credentials_exception = HTTPException(
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
detail="Could not validate credentials",
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
)
|
|
try:
|
|
payload = jwt.decode(token, secret_key, algorithms=[ALGORITHM])
|
|
username: str = payload.get("sub")
|
|
if username is None:
|
|
raise credentials_exception
|
|
token_data = TokenData(username=username)
|
|
except (JWTError, ValidationError):
|
|
raise credentials_exception
|
|
return token_data.username
|