add firebase
Browse files
.env
CHANGED
@@ -27,6 +27,7 @@ BEDROCK_PROVIDER=anthropic
|
|
27 |
AWS_ACCESS_KEY=
|
28 |
AWS_SECRET_KEY=
|
29 |
AWS_REGION=us-east-1
|
|
|
30 |
|
31 |
|
32 |
|
|
|
27 |
AWS_ACCESS_KEY=
|
28 |
AWS_SECRET_KEY=
|
29 |
AWS_REGION=us-east-1
|
30 |
+
FIREBASE_API_KEY=AIzaSyDGHPfzwPiVGWccTnnyPcEoS-FU6He6tDs
|
31 |
|
32 |
|
33 |
|
app/api/endpoints/v1/firebaseauth/__pycache__/app.cpython-312.pyc
CHANGED
Binary files a/app/api/endpoints/v1/firebaseauth/__pycache__/app.cpython-312.pyc and b/app/api/endpoints/v1/firebaseauth/__pycache__/app.cpython-312.pyc differ
|
|
app/api/endpoints/v1/firebaseauth/app.py
CHANGED
@@ -1,4 +1,6 @@
|
|
|
|
1 |
import datetime
|
|
|
2 |
from app import router
|
3 |
from fastapi import FastAPI, Depends, HTTPException, status, Request, APIRouter
|
4 |
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
@@ -6,13 +8,12 @@ import firebase_admin
|
|
6 |
from firebase_admin import credentials, auth
|
7 |
from sqlalchemy.ext.asyncio import AsyncSession
|
8 |
from sqlalchemy import select
|
9 |
-
from app.models.api.user import UserCreate, UserSignIn, PasswordReset, TokenVerify, UserResponse,EmailVerifyRequest
|
10 |
from app.models.database.DBUser import DBUser
|
11 |
from app.core.database.session_manager import get_db_session as get_db
|
12 |
-
import os
|
13 |
|
14 |
|
15 |
-
router=APIRouter(prefix="/FirebaseAuth", tags=["Firebase Auth"])
|
16 |
|
17 |
# Initialize OAuth2 scheme
|
18 |
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/FirebaseAuth/token")
|
@@ -42,7 +43,6 @@ async def verify_firebase_token(token: str = Depends(oauth2_scheme)) -> dict:
|
|
42 |
|
43 |
# Initialize Firebase Admin SDK with better error handling
|
44 |
try:
|
45 |
-
|
46 |
current_dir = os.path.dirname(os.path.abspath(__file__))
|
47 |
# Try multiple possible paths for the service account file
|
48 |
service_account_paths = [
|
@@ -148,15 +148,41 @@ async def create_user(user_data: UserCreate, db: AsyncSession = Depends(get_db))
|
|
148 |
async def signin_user(user_data: UserSignIn, db: AsyncSession = Depends(get_db)):
|
149 |
"""Sign in user and return token"""
|
150 |
try:
|
151 |
-
#
|
152 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
153 |
|
154 |
-
#
|
155 |
-
|
|
|
|
|
|
|
|
|
156 |
|
157 |
# Update last login in database
|
158 |
result = await db.execute(
|
159 |
-
select(DBUser).filter(DBUser.firebase_uid ==
|
160 |
)
|
161 |
db_user = result.scalar_one_or_none()
|
162 |
|
@@ -165,7 +191,7 @@ async def signin_user(user_data: UserSignIn, db: AsyncSession = Depends(get_db))
|
|
165 |
await db.commit()
|
166 |
|
167 |
return {
|
168 |
-
"access_token":
|
169 |
"token_type": "bearer",
|
170 |
"user": {
|
171 |
"firebase_uid": firebase_user.uid,
|
@@ -175,6 +201,8 @@ async def signin_user(user_data: UserSignIn, db: AsyncSession = Depends(get_db))
|
|
175 |
}
|
176 |
}
|
177 |
except Exception as e:
|
|
|
|
|
178 |
raise HTTPException(
|
179 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
180 |
detail=f"Authentication failed: {str(e)}"
|
@@ -218,7 +246,7 @@ async def get_current_user(
|
|
218 |
@router.post("/resend-verification", status_code=status.HTTP_200_OK)
|
219 |
async def resend_verification_email(
|
220 |
email_data: EmailVerifyRequest = None,
|
221 |
-
current_user:
|
222 |
):
|
223 |
"""
|
224 |
Resend verification email to a user
|
@@ -229,7 +257,7 @@ async def resend_verification_email(
|
|
229 |
try:
|
230 |
# If email is provided in request body, use that
|
231 |
# Otherwise use logged in user's email
|
232 |
-
email = email_data.email if email_data else current_user
|
233 |
|
234 |
# Check if user exists
|
235 |
try:
|
@@ -266,9 +294,6 @@ async def resend_verification_email(
|
|
266 |
detail=f"Failed to resend verification email: {str(e)}"
|
267 |
)
|
268 |
|
269 |
-
|
270 |
-
email: EmailStr
|
271 |
-
|
272 |
@router.post("/check-email-verified")
|
273 |
async def check_email_verified(email_data: EmailVerifyRequest):
|
274 |
"""Check if a user's email is verified"""
|
@@ -354,24 +379,60 @@ async def verify_token(token_data: TokenVerify, db: AsyncSession = Depends(get_d
|
|
354 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
355 |
detail=f"Token verification failed: {str(e)}"
|
356 |
)
|
|
|
357 |
@router.post("/token")
|
358 |
-
async def get_token(form_data: OAuth2PasswordRequestForm = Depends()):
|
359 |
-
"""Get access token"""
|
360 |
try:
|
361 |
-
# Get Firebase
|
362 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
363 |
|
364 |
-
|
365 |
-
|
|
|
366 |
|
367 |
return {
|
368 |
-
"access_token":
|
369 |
"token_type": "bearer"
|
370 |
}
|
371 |
except Exception as e:
|
|
|
|
|
372 |
raise HTTPException(
|
373 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
374 |
-
detail="
|
375 |
)
|
376 |
|
377 |
# Function to verify token
|
@@ -388,5 +449,5 @@ async def verify_token(token: str = Depends(oauth2_scheme)):
|
|
388 |
|
389 |
# Example protected route
|
390 |
@router.get("/protected")
|
391 |
-
async def protected_route(token:
|
392 |
return {"message": "You have access!", "token_info": token}
|
|
|
1 |
+
import os
|
2 |
import datetime
|
3 |
+
import requests
|
4 |
from app import router
|
5 |
from fastapi import FastAPI, Depends, HTTPException, status, Request, APIRouter
|
6 |
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
|
|
|
8 |
from firebase_admin import credentials, auth
|
9 |
from sqlalchemy.ext.asyncio import AsyncSession
|
10 |
from sqlalchemy import select
|
11 |
+
from app.models.api.user import UserCreate, UserSignIn, PasswordReset, TokenVerify, UserResponse, EmailVerifyRequest
|
12 |
from app.models.database.DBUser import DBUser
|
13 |
from app.core.database.session_manager import get_db_session as get_db
|
|
|
14 |
|
15 |
|
16 |
+
router = APIRouter(prefix="/FirebaseAuth", tags=["Firebase Auth"])
|
17 |
|
18 |
# Initialize OAuth2 scheme
|
19 |
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/FirebaseAuth/token")
|
|
|
43 |
|
44 |
# Initialize Firebase Admin SDK with better error handling
|
45 |
try:
|
|
|
46 |
current_dir = os.path.dirname(os.path.abspath(__file__))
|
47 |
# Try multiple possible paths for the service account file
|
48 |
service_account_paths = [
|
|
|
148 |
async def signin_user(user_data: UserSignIn, db: AsyncSession = Depends(get_db)):
|
149 |
"""Sign in user and return token"""
|
150 |
try:
|
151 |
+
# Get Firebase API key from environment variable
|
152 |
+
api_key = os.getenv("FIREBASE_API_KEY")
|
153 |
+
if not api_key:
|
154 |
+
raise ValueError("FIREBASE_API_KEY environment variable is not set")
|
155 |
+
|
156 |
+
# Call Firebase Auth REST API to sign in with email/password
|
157 |
+
response = requests.post(
|
158 |
+
f"https://identitytoolkit.googleapis.com/v1/accounts:signInWithPassword?key={api_key}",
|
159 |
+
json={
|
160 |
+
"email": user_data.email,
|
161 |
+
"password": user_data.password,
|
162 |
+
"returnSecureToken": True
|
163 |
+
}
|
164 |
+
)
|
165 |
+
|
166 |
+
if response.status_code != 200:
|
167 |
+
error_data = response.json()
|
168 |
+
raise HTTPException(
|
169 |
+
status_code=status.HTTP_401_UNAUTHORIZED,
|
170 |
+
detail=f"Authentication failed: {error_data.get('error', {}).get('message', 'Invalid credentials')}"
|
171 |
+
)
|
172 |
+
|
173 |
+
auth_data = response.json()
|
174 |
+
id_token = auth_data["idToken"]
|
175 |
|
176 |
+
# Verify the ID token
|
177 |
+
decoded_token = auth.verify_id_token(id_token)
|
178 |
+
user_id = decoded_token["uid"]
|
179 |
+
|
180 |
+
# Get user from Firebase
|
181 |
+
firebase_user = auth.get_user(user_id)
|
182 |
|
183 |
# Update last login in database
|
184 |
result = await db.execute(
|
185 |
+
select(DBUser).filter(DBUser.firebase_uid == user_id)
|
186 |
)
|
187 |
db_user = result.scalar_one_or_none()
|
188 |
|
|
|
191 |
await db.commit()
|
192 |
|
193 |
return {
|
194 |
+
"access_token": id_token,
|
195 |
"token_type": "bearer",
|
196 |
"user": {
|
197 |
"firebase_uid": firebase_user.uid,
|
|
|
201 |
}
|
202 |
}
|
203 |
except Exception as e:
|
204 |
+
if isinstance(e, HTTPException):
|
205 |
+
raise e
|
206 |
raise HTTPException(
|
207 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
208 |
detail=f"Authentication failed: {str(e)}"
|
|
|
246 |
@router.post("/resend-verification", status_code=status.HTTP_200_OK)
|
247 |
async def resend_verification_email(
|
248 |
email_data: EmailVerifyRequest = None,
|
249 |
+
current_user: dict = Depends(verify_firebase_token)
|
250 |
):
|
251 |
"""
|
252 |
Resend verification email to a user
|
|
|
257 |
try:
|
258 |
# If email is provided in request body, use that
|
259 |
# Otherwise use logged in user's email
|
260 |
+
email = email_data.email if email_data and email_data.email else current_user["email"]
|
261 |
|
262 |
# Check if user exists
|
263 |
try:
|
|
|
294 |
detail=f"Failed to resend verification email: {str(e)}"
|
295 |
)
|
296 |
|
|
|
|
|
|
|
297 |
@router.post("/check-email-verified")
|
298 |
async def check_email_verified(email_data: EmailVerifyRequest):
|
299 |
"""Check if a user's email is verified"""
|
|
|
379 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
380 |
detail=f"Token verification failed: {str(e)}"
|
381 |
)
|
382 |
+
|
383 |
@router.post("/token")
|
384 |
+
async def get_token(form_data: OAuth2PasswordRequestForm = Depends(), db: AsyncSession = Depends(get_db)):
|
385 |
+
"""Get access token using OAuth2 form"""
|
386 |
try:
|
387 |
+
# Get Firebase API key from environment variable
|
388 |
+
api_key = os.getenv("FIREBASE_API_KEY")
|
389 |
+
if not api_key:
|
390 |
+
raise ValueError("FIREBASE_API_KEY environment variable is not set")
|
391 |
+
|
392 |
+
# Call Firebase Auth REST API to sign in with email/password
|
393 |
+
response = requests.post(
|
394 |
+
f"https://identitytoolkit.googleapis.com/v1/accounts:signInWithPassword?key={api_key}",
|
395 |
+
json={
|
396 |
+
"email": form_data.username, # Username field contains email
|
397 |
+
"password": form_data.password,
|
398 |
+
"returnSecureToken": True
|
399 |
+
}
|
400 |
+
)
|
401 |
+
|
402 |
+
if response.status_code != 200:
|
403 |
+
error_data = response.json()
|
404 |
+
raise HTTPException(
|
405 |
+
status_code=status.HTTP_401_UNAUTHORIZED,
|
406 |
+
detail=f"Authentication failed: {error_data.get('error', {}).get('message', 'Invalid credentials')}"
|
407 |
+
)
|
408 |
+
|
409 |
+
auth_data = response.json()
|
410 |
+
id_token = auth_data["idToken"]
|
411 |
+
|
412 |
+
# Verify the ID token
|
413 |
+
decoded_token = auth.verify_id_token(id_token)
|
414 |
+
user_id = decoded_token["uid"]
|
415 |
+
|
416 |
+
# Update last login in database
|
417 |
+
result = await db.execute(
|
418 |
+
select(DBUser).filter(DBUser.firebase_uid == user_id)
|
419 |
+
)
|
420 |
+
db_user = result.scalar_one_or_none()
|
421 |
|
422 |
+
if db_user:
|
423 |
+
db_user.last_login = datetime.datetime.utcnow()
|
424 |
+
await db.commit()
|
425 |
|
426 |
return {
|
427 |
+
"access_token": id_token,
|
428 |
"token_type": "bearer"
|
429 |
}
|
430 |
except Exception as e:
|
431 |
+
if isinstance(e, HTTPException):
|
432 |
+
raise e
|
433 |
raise HTTPException(
|
434 |
status_code=status.HTTP_401_UNAUTHORIZED,
|
435 |
+
detail=f"Authentication failed: {str(e)}"
|
436 |
)
|
437 |
|
438 |
# Function to verify token
|
|
|
449 |
|
450 |
# Example protected route
|
451 |
@router.get("/protected")
|
452 |
+
async def protected_route(token: dict = Depends(verify_token)):
|
453 |
return {"message": "You have access!", "token_info": token}
|
logs/app.log
CHANGED
@@ -18,3 +18,11 @@
|
|
18 |
[2m2025-04-18T15:44:43.336345Z[0m [[32m[1minfo [0m] [1mStarted server process [8] [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mserver.py[0m [36mfunc_name[0m=[35mserve[0m [36mlineno[0m=[35m76[0m
|
19 |
[2m2025-04-18T15:44:43.338237Z[0m [[32m[1minfo [0m] [1mWaiting for application startup.[0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m48[0m
|
20 |
[2m2025-04-18T15:44:43.342127Z[0m [[32m[1minfo [0m] [1mApplication startup complete. [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m62[0m
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
18 |
[2m2025-04-18T15:44:43.336345Z[0m [[32m[1minfo [0m] [1mStarted server process [8] [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mserver.py[0m [36mfunc_name[0m=[35mserve[0m [36mlineno[0m=[35m76[0m
|
19 |
[2m2025-04-18T15:44:43.338237Z[0m [[32m[1minfo [0m] [1mWaiting for application startup.[0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m48[0m
|
20 |
[2m2025-04-18T15:44:43.342127Z[0m [[32m[1minfo [0m] [1mApplication startup complete. [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m62[0m
|
21 |
+
[2m2025-04-18T16:13:09.189653Z[0m [[32m[1minfo [0m] [1mShutting down [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mserver.py[0m [36mfunc_name[0m=[35mshutdown[0m [36mlineno[0m=[35m265[0m
|
22 |
+
[2m2025-04-18T16:13:09.329875Z[0m [[32m[1minfo [0m] [1mWaiting for application shutdown.[0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mshutdown[0m [36mlineno[0m=[35m67[0m
|
23 |
+
[2m2025-04-18T16:13:09.363708Z[0m [[32m[1minfo [0m] [1mApplication shutdown complete.[0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mshutdown[0m [36mlineno[0m=[35m78[0m
|
24 |
+
[2m2025-04-18T16:13:09.375566Z[0m [[32m[1minfo [0m] [1mFinished server process [8] [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mserver.py[0m [36mfunc_name[0m=[35mserve[0m [36mlineno[0m=[35m86[0m
|
25 |
+
[2m2025-04-18T16:13:31.420177Z[0m [[32m[1minfo [0m] [1mApplication started [0m [[0m[1m[34mapp.main[0m][0m [36mfilename[0m=[35mmain.py[0m [36mfunc_name[0m=[35m<module>[0m [36mlineno[0m=[35m37[0m [36mproject[0m=[35mMailPilot_ai_agents[0m [36mversion[0m=[35m0.1.0-alpha[0m
|
26 |
+
[2m2025-04-18T16:13:31.425990Z[0m [[32m[1minfo [0m] [1mStarted server process [11] [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mserver.py[0m [36mfunc_name[0m=[35mserve[0m [36mlineno[0m=[35m76[0m
|
27 |
+
[2m2025-04-18T16:13:31.427509Z[0m [[32m[1minfo [0m] [1mWaiting for application startup.[0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m48[0m
|
28 |
+
[2m2025-04-18T16:13:31.430441Z[0m [[32m[1minfo [0m] [1mApplication startup complete. [0m [[0m[1m[34muvicorn.error[0m][0m [36mfilename[0m=[35mon.py[0m [36mfunc_name[0m=[35mstartup[0m [36mlineno[0m=[35m62[0m
|