sumaq/backend/app/core/security.py

39 lines
1.5 KiB
Python

from datetime import datetime, timedelta
from typing import Optional, Union, Any
from jose import jwt
from passlib.context import CryptContext
import hashlib
from app.core.config import settings
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
def verify_password(plain_password: str, hashed_password: str) -> bool:
# Pre-hash the password with SHA-256 to ensure it's within bcrypt's 72-byte limit
pre_hashed = hashlib.sha256(plain_password.encode()).hexdigest()
# Try verifying the pre-hashed password first
if pwd_context.verify(pre_hashed, hashed_password):
return True
# Fallback: Try verifying the raw password (legacy)
try:
return pwd_context.verify(plain_password, hashed_password)
except ValueError:
return False
def get_password_hash(password: str) -> str:
# Pre-hash with SHA-256 to handle any length and stay under bcrypt's 72-byte limit
pre_hashed = hashlib.sha256(password.encode()).hexdigest()
return pwd_context.hash(pre_hashed)
def create_access_token(subject: Union[str, Any], expires_delta: Optional[timedelta] = None) -> str:
if expires_delta:
expire = datetime.utcnow() + expires_delta
else:
expire = datetime.utcnow() + timedelta(
minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES
)
to_encode = {"exp": expire, "sub": str(subject)}
encoded_jwt = jwt.encode(to_encode, settings.SECRET_KEY, algorithm=settings.ALGORITHM)
return encoded_jwt