init commit

This commit is contained in:
prod-tech
2024-11-17 02:31:42 +03:00
commit cf933c770c
217 changed files with 19340 additions and 0 deletions
View File
+26
View File
@@ -0,0 +1,26 @@
import secrets
import pydantic
import pydantic_settings
class Config(pydantic_settings.BaseSettings):
model_config = pydantic_settings.SettingsConfigDict(
env_file='../.env',
env_ignore_empty=True,
extra='ignore',
)
DATABASE_URL: str = pydantic.fields.Field(default=None)
TOKEN_TELEGRAM_API: str = pydantic.fields.Field(default=None)
JWT_SECRET_KEY: str = secrets.token_urlsafe(32)
JWT_ALGORITHM: str = 'HS256'
SAMPLE_PAYLOAD: dict[str, str] = pydantic.fields.Field(
default={}, exclude=True
)
TOKEN_TELEGRAM_API: str = pydantic.fields.Field(default=None)
DEBUG: bool = pydantic.fields.Field(default=False)
config = Config()
+20
View File
@@ -0,0 +1,20 @@
import sqlmodel
from app.core.config import config
from app.utils.factories import UserFactory
engine = sqlmodel.create_engine(config.DATABASE_URL)
def fill_with_sample_data():
users = [
{'id': 0, 'username': 'petr'},
{'id': 1, 'username': 'aleksandr'},
{'id': 2, 'username': 'seva'},
{'id': 3, 'username': 'maksim'},
{'id': 4, 'username': 'timur'},
{'id': 5, 'username': 'roman'},
]
UserFactory.bulk_new_users(users)
events = []
+11
View File
@@ -0,0 +1,11 @@
import passlib.context
pwd_context = passlib.context.CryptContext(schemes=['bcrypt'])
def verify_password(plain_password: str, hashed_password: str) -> bool:
return pwd_context.verify(plain_password, hashed_password)
def get_password_hash(password: str) -> str:
return pwd_context.hash(password)
+51
View File
@@ -0,0 +1,51 @@
import datetime
import typing
import jwt
import sqlmodel
from app.core.config import config
import app.models
from app.models.user import User
def generate_token(
payload: dict[typing.Any, typing.Any],
expires_delta: datetime.timedelta | None = None,
) -> str:
to_encode = payload.copy()
if expires_delta:
expire = datetime.datetime.now() + expires_delta
else:
expire = datetime.datetime.now() + datetime.timedelta(minutes=15)
to_encode.update({'exp': expire})
encoded_jwt = jwt.encode(
to_encode, config.JWT_SECRET_KEY, algorithm=config.JWT_ALGORITHM
)
return encoded_jwt
def user_by_token(token: str) -> User | None:
"""Expects user_id to be in token payload"""
try:
payload: dict = jwt.decode(
token, config.JWT_SECRET_KEY, [config.JWT_ALGORITHM]
)
except (jwt.InvalidTokenError, jwt.InvalidSignatureError):
return None
user_id: str = payload.get('user_id')
if not user_id.isdigit():
return None
with sqlmodel.Session(app.core.db.engine) as session:
user = session.get(User, user_id)
return user