Python fastapi.security.OAuth2PasswordRequestForm() Examples
The following are 7
code examples of fastapi.security.OAuth2PasswordRequestForm().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
fastapi.security
, or try the search function
.
Example #1
Source File: login.py From full-stack-fastapi-couchbase with MIT License | 6 votes |
def login(form_data: OAuth2PasswordRequestForm = Depends()): """ OAuth2 compatible token login, get an access token for future requests. """ bucket = get_default_bucket() user = crud.user.authenticate( bucket, username=form_data.username, password=form_data.password ) if not user: raise HTTPException(status_code=400, detail="Incorrect email or password") elif not crud.user.is_active(user): raise HTTPException(status_code=400, detail="Inactive user") access_token_expires = timedelta(minutes=config.ACCESS_TOKEN_EXPIRE_MINUTES) return { "access_token": create_access_token( data={"username": user.username}, expires_delta=access_token_expires ), "token_type": "bearer", }
Example #2
Source File: login.py From full-stack-fastapi-postgresql with MIT License | 6 votes |
def login_access_token( db: Session = Depends(deps.get_db), form_data: OAuth2PasswordRequestForm = Depends() ) -> Any: """ OAuth2 compatible token login, get an access token for future requests """ user = crud.user.authenticate( db, email=form_data.username, password=form_data.password ) if not user: raise HTTPException(status_code=400, detail="Incorrect email or password") elif not crud.user.is_active(user): raise HTTPException(status_code=400, detail="Inactive user") access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES) return { "access_token": security.create_access_token( user.id, expires_delta=access_token_expires ), "token_type": "bearer", }
Example #3
Source File: tutorial004.py From fastapi with MIT License | 5 votes |
def login_for_access_token(form_data: OAuth2PasswordRequestForm = Depends()): user = authenticate_user(fake_users_db, form_data.username, form_data.password) if not user: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Incorrect username or password", headers={"WWW-Authenticate": "Bearer"}, ) access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES) access_token = create_access_token( data={"sub": user.username}, expires_delta=access_token_expires ) return {"access_token": access_token, "token_type": "bearer"}
Example #4
Source File: tutorial003.py From fastapi with MIT License | 5 votes |
def login(form_data: OAuth2PasswordRequestForm = Depends()): user_dict = fake_users_db.get(form_data.username) if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"}
Example #5
Source File: test_login_manager.py From fastapi_login with MIT License | 5 votes |
def login(data: OAuth2PasswordRequestForm = Depends()): user_identifier = data.username password = data.password user = load_user(user_identifier) if not user: raise InvalidCredentialsException elif password != user['password']: raise InvalidCredentialsException access_token = lm.create_access_token( data=dict(sub=user_identifier) ) return {'access_token': access_token, 'token_type': 'bearer'}
Example #6
Source File: test_db_base.py From fastapi-users with MIT License | 5 votes |
def create_oauth2_password_request_form(): def _create_oauth2_password_request_form(username, password): return OAuth2PasswordRequestForm(username=username, password=password, scope="") return _create_oauth2_password_request_form
Example #7
Source File: auth.py From fastapi-users with MIT License | 5 votes |
def get_auth_router( backend: BaseAuthentication, user_db: BaseUserDatabase[models.BaseUserDB], authenticator: Authenticator, ) -> APIRouter: """Generate a router with login/logout routes for an authentication backend.""" router = APIRouter() @router.post("/login") async def login( response: Response, credentials: OAuth2PasswordRequestForm = Depends() ): user = await user_db.authenticate(credentials) if user is None or not user.is_active: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail=ErrorCode.LOGIN_BAD_CREDENTIALS, ) return await backend.get_login_response(user, response) if backend.logout: @router.post("/logout") async def logout( response: Response, user=Depends(authenticator.get_current_active_user) ): return await backend.get_logout_response(user, response) return router