Update auth.py
Browse files
auth.py
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
# app/auth.py
|
2 |
-
from fastapi import
|
3 |
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
4 |
from fastapi.templating import Jinja2Templates
|
5 |
from fastapi.responses import HTMLResponse
|
@@ -113,24 +113,13 @@ def login(self, form_data: OAuth2PasswordRequestForm = Depends()):
|
|
113 |
|
114 |
auth_views = AuthViews()
|
115 |
|
116 |
-
@app.get("/login", response_class=HTMLResponse)
|
117 |
-
async def login(request: Request):
|
118 |
-
return templates.TemplateResponse("login.html", {"request": request})
|
119 |
|
120 |
-
@app.get("/register", response_class=HTMLResponse)
|
121 |
-
async def register(request: Request):
|
122 |
-
return templates.TemplateResponse("register.html", {"request": request})
|
123 |
-
|
124 |
-
@app.get("/verify/{verification_token}", response_class=HTMLResponse)
|
125 |
-
async def verify_email(verification_token: str, request: Request):
|
126 |
-
# Perform verification and return an appropriate template
|
127 |
-
return templates.TemplateResponse("verify.html", {"request": request})
|
128 |
|
129 |
# User authentication (protected route)
|
130 |
@app.get("/protected", response_model=str)
|
131 |
-
async def protected_route(request: Request, token: str = Depends(oauth2_scheme), db: Session = Depends(get_db)):
|
132 |
# Verify the access token
|
133 |
-
user = verify_token(token, SECRET_KEY, ALGORITHM)
|
134 |
if user is None:
|
135 |
raise HTTPException(status_code=401, detail="Invalid or expired token")
|
136 |
|
|
|
1 |
# app/auth.py
|
2 |
+
from fastapi import Depends, HTTPException, Form, Response, status
|
3 |
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
4 |
from fastapi.templating import Jinja2Templates
|
5 |
from fastapi.responses import HTMLResponse
|
|
|
113 |
|
114 |
auth_views = AuthViews()
|
115 |
|
|
|
|
|
|
|
116 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
117 |
|
118 |
# User authentication (protected route)
|
119 |
@app.get("/protected", response_model=str)
|
120 |
+
async def protected_route(self,request: Request, token: str = Depends(oauth2_scheme), db: Session = Depends(get_db)):
|
121 |
# Verify the access token
|
122 |
+
user = verify_token(token, self.SECRET_KEY, self.ALGORITHM)
|
123 |
if user is None:
|
124 |
raise HTTPException(status_code=401, detail="Invalid or expired token")
|
125 |
|