All checks were successful
CI / test (push) Successful in 9m2s
Security hardening: - Added IP/user rate limiting with Redis-backed counters and fail-open behavior. - Added message anti-spam controls (per-chat rate + duplicate cooldown). - Implemented refresh token rotation with JTI tracking and revoke support. Notification pipeline: - Added Celery app and async notification tasks for mention/offline delivery. - Added Redis-based presence tracking and integrated it into realtime connect/disconnect. - Added notification dispatch from message flow and notifications listing endpoint. Quality gates and CI: - Added pytest async integration tests for auth and chat/message lifecycle. - Added pytest config, test fixtures, and GitHub Actions CI workflow. - Fixed bcrypt/passlib compatibility by pinning bcrypt version. - Documented worker and quality-gate commands in README.
56 lines
1.6 KiB
Python
56 lines
1.6 KiB
Python
from datetime import datetime, timedelta, timezone
|
|
from secrets import token_urlsafe
|
|
from uuid import uuid4
|
|
|
|
from jose import JWTError, jwt
|
|
from passlib.context import CryptContext
|
|
|
|
from app.config.settings import settings
|
|
|
|
|
|
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
|
|
|
|
|
|
def hash_password(password: str) -> str:
|
|
return pwd_context.hash(password)
|
|
|
|
|
|
def verify_password(password: str, hashed_password: str) -> bool:
|
|
return pwd_context.verify(password, hashed_password)
|
|
|
|
|
|
def _create_token(subject: str, token_type: str, expires_delta: timedelta, jti: str | None = None) -> str:
|
|
now = datetime.now(timezone.utc)
|
|
expire = datetime.now(timezone.utc) + expires_delta
|
|
payload = {"sub": subject, "type": token_type, "exp": expire, "iat": now}
|
|
payload["jti"] = jti or str(uuid4())
|
|
return jwt.encode(payload, settings.secret_key, algorithm=settings.jwt_algorithm)
|
|
|
|
|
|
def create_access_token(subject: str) -> str:
|
|
return _create_token(
|
|
subject=subject,
|
|
token_type="access",
|
|
expires_delta=timedelta(minutes=settings.access_token_expire_minutes),
|
|
)
|
|
|
|
|
|
def create_refresh_token(subject: str, *, jti: str | None = None) -> str:
|
|
return _create_token(
|
|
subject=subject,
|
|
token_type="refresh",
|
|
expires_delta=timedelta(days=settings.refresh_token_expire_days),
|
|
jti=jti,
|
|
)
|
|
|
|
|
|
def decode_token(token: str) -> dict:
|
|
try:
|
|
return jwt.decode(token, settings.secret_key, algorithms=[settings.jwt_algorithm])
|
|
except JWTError as exc:
|
|
raise ValueError("Invalid token") from exc
|
|
|
|
|
|
def generate_random_token() -> str:
|
|
return token_urlsafe(48)
|