|
|
from passlib.context import CryptContext |
|
|
from datetime import datetime, timedelta |
|
|
from jose import JWTError, jwt |
|
|
from typing import Optional |
|
|
import os |
|
|
|
|
|
|
|
|
|
|
|
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") |
|
|
from dotenv import load_dotenv |
|
|
load_dotenv() |
|
|
|
|
|
def hash_password(password: str): |
|
|
return pwd_context.hash(password) |
|
|
|
|
|
def verify_password(password: str, hashed: str): |
|
|
return pwd_context.verify(password, hashed) |
|
|
|
|
|
|
|
|
SECRET_KEY=os.getenv("SECRET_KEY") |
|
|
ALGORITHM = "HS256" |
|
|
ACCESS_TOKEN_EXPIRE_MINUTES = 15 |
|
|
REFRESH_TOKEN_EXPIRE_DAYS = 7 |
|
|
|
|
|
def create_access_token(data: dict, expires_delta: Optional[timedelta] = None): |
|
|
to_encode = data.copy() |
|
|
expire = datetime.utcnow() + (expires_delta or timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)) |
|
|
to_encode.update({"exp": expire}) |
|
|
return jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) |
|
|
|
|
|
def create_refresh_token(data: dict, expires_delta: Optional[timedelta] = None): |
|
|
to_encode = data.copy() |
|
|
expire = datetime.utcnow() + (expires_delta or timedelta(days=REFRESH_TOKEN_EXPIRE_DAYS)) |
|
|
to_encode.update({"exp": expire}) |
|
|
return jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) |
|
|
|
|
|
def decode_token(token: str): |
|
|
try: |
|
|
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) |
|
|
return payload |
|
|
except JWTError: |
|
|
return None |
|
|
|