Coverage for docs_src / security / tutorial003_py310.py: 100%
44 statements
« prev ^ index » next coverage.py v7.13.3, created at 2026-04-06 01:24 +0000
« prev ^ index » next coverage.py v7.13.3, created at 2026-04-06 01:24 +0000
1from fastapi import Depends, FastAPI, HTTPException, status 1aefbcd
2from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm 1aefbcd
3from pydantic import BaseModel 1aefbcd
5fake_users_db = { 1aefbcd
6 "johndoe": {
7 "username": "johndoe",
8 "full_name": "John Doe",
9 "email": "[email protected]",
10 "hashed_password": "fakehashedsecret",
11 "disabled": False,
12 },
13 "alice": {
14 "username": "alice",
15 "full_name": "Alice Wonderson",
16 "email": "[email protected]",
17 "hashed_password": "fakehashedsecret2",
18 "disabled": True,
19 },
20}
22app = FastAPI() 1aefbcd
25def fake_hash_password(password: str): 1aefbcd
26 return "fakehashed" + password 1nopqrst
29oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") 1aefbcd
32class User(BaseModel): 1aefbcd
33 username: str 1abcd
34 email: str | None = None 1aefbcd
35 full_name: str | None = None 1aefbcd
36 disabled: bool | None = None 1aefbcd
39class UserInDB(User): 1aefbcd
40 hashed_password: str 1abcd
43def get_user(db, username: str): 1aefbcd
44 if username in db: 1kughlvimwj
45 user_dict = db[username] 1kghlimj
46 return UserInDB(**user_dict) 1kghlimj
49def fake_decode_token(token): 1aefbcd
50 # This doesn't provide any security at all
51 # Check the next version
52 user = get_user(fake_users_db, token) 1kughlvimwj
53 return user 1kughlvimwj
56async def get_current_user(token: str = Depends(oauth2_scheme)): 1aefbcd
57 user = fake_decode_token(token) 1kughlvimwj
58 if not user: 1kughlvimwj
59 raise HTTPException( 1uBvw
60 status_code=status.HTTP_401_UNAUTHORIZED,
61 detail="Not authenticated",
62 headers={"WWW-Authenticate": "Bearer"},
63 )
64 return user 1kghlimj
67async def get_current_active_user(current_user: User = Depends(get_current_user)): 1aefbcd
68 if current_user.disabled: 1kghlimj
69 raise HTTPException(status_code=400, detail="Inactive user") 1kClm
70 return current_user 1ghij
73@app.post("/token") 1aefbcd
74async def login(form_data: OAuth2PasswordRequestForm = Depends()): 1aefbcd
75 user_dict = fake_users_db.get(form_data.username) 1noxpyqrzstA
76 if not user_dict: 1noxpyqrzstA
77 raise HTTPException(status_code=400, detail="Incorrect username or password") 1xyzA
78 user = UserInDB(**user_dict) 1nopqrst
79 hashed_password = fake_hash_password(form_data.password) 1nopqrst
80 if not hashed_password == user.hashed_password: 1nopqrst
81 raise HTTPException(status_code=400, detail="Incorrect username or password") 1oDrt
83 return {"access_token": user.username, "token_type": "bearer"} 1npqs
86@app.get("/users/me") 1aefbcd
87async def read_users_me(current_user: User = Depends(get_current_active_user)): 1aefbcd
88 return current_user 1ghij