Gregniuki commited on
Commit
5f2c74e
·
1 Parent(s): f8adb4d

Update auth.py

Browse files
Files changed (1) hide show
  1. auth.py +3 -14
auth.py CHANGED
@@ -1,5 +1,5 @@
1
  # app/auth.py
2
- from fastapi import APIRouter, Depends, HTTPException, Form, Response, status, FastAPI
3
  from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
4
  from fastapi.templating import Jinja2Templates
5
  from fastapi.responses import HTMLResponse
@@ -113,24 +113,13 @@ def login(self, form_data: OAuth2PasswordRequestForm = Depends()):
113
 
114
  auth_views = AuthViews()
115
 
116
- @app.get("/login", response_class=HTMLResponse)
117
- async def login(request: Request):
118
- return templates.TemplateResponse("login.html", {"request": request})
119
 
120
- @app.get("/register", response_class=HTMLResponse)
121
- async def register(request: Request):
122
- return templates.TemplateResponse("register.html", {"request": request})
123
-
124
- @app.get("/verify/{verification_token}", response_class=HTMLResponse)
125
- async def verify_email(verification_token: str, request: Request):
126
- # Perform verification and return an appropriate template
127
- return templates.TemplateResponse("verify.html", {"request": request})
128
 
129
  # User authentication (protected route)
130
  @app.get("/protected", response_model=str)
131
- async def protected_route(request: Request, token: str = Depends(oauth2_scheme), db: Session = Depends(get_db)):
132
  # Verify the access token
133
- user = verify_token(token, SECRET_KEY, ALGORITHM)
134
  if user is None:
135
  raise HTTPException(status_code=401, detail="Invalid or expired token")
136
 
 
1
  # app/auth.py
2
+ from fastapi import Depends, HTTPException, Form, Response, status
3
  from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
4
  from fastapi.templating import Jinja2Templates
5
  from fastapi.responses import HTMLResponse
 
113
 
114
  auth_views = AuthViews()
115
 
 
 
 
116
 
 
 
 
 
 
 
 
 
117
 
118
  # User authentication (protected route)
119
  @app.get("/protected", response_model=str)
120
+ async def protected_route(self,request: Request, token: str = Depends(oauth2_scheme), db: Session = Depends(get_db)):
121
  # Verify the access token
122
+ user = verify_token(token, self.SECRET_KEY, self.ALGORITHM)
123
  if user is None:
124
  raise HTTPException(status_code=401, detail="Invalid or expired token")
125