From 0a75877608ce5df8197f372523840c5a1ee17525 Mon Sep 17 00:00:00 2001 From: Jashwant Date: Thu, 14 Apr 2022 09:51:55 +0530 Subject: [PATCH] removed duplicate refresh-token endpoint --- .../app/api/endpoints/auth.py | 41 ------------------- 1 file changed, 41 deletions(-) diff --git a/{{cookiecutter.project_name}}/template_minimal/app/api/endpoints/auth.py b/{{cookiecutter.project_name}}/template_minimal/app/api/endpoints/auth.py index bc8c9ad..287e663 100644 --- a/{{cookiecutter.project_name}}/template_minimal/app/api/endpoints/auth.py +++ b/{{cookiecutter.project_name}}/template_minimal/app/api/endpoints/auth.py @@ -89,44 +89,3 @@ async def refresh_token( "refresh_token": refresh_token, "refresh_expire_at": refresh_expire_at, } - - -@router.post("/refresh-token", response_model=schemas.UserCreate) -async def refresh_token2( - input: schemas.TokenRefresh, session: AsyncSession = Depends(deps.get_session) -): - """ - OAuth2 compatible token, get an access token for future requests using refresh token - """ - try: - payload = jwt.decode( - input.refresh_token, - config.settings.SECRET_KEY, - algorithms=[security.ALGORITHM], - ) - token_data = schemas.TokenPayload(**payload) - except (jwt.JWTError, ValidationError): - raise HTTPException( - status_code=status.HTTP_403_FORBIDDEN, - detail="Could not validate credentials", - ) - if not token_data.refresh: - raise HTTPException( - status_code=status.HTTP_403_FORBIDDEN, - detail="Could not validate credentials", - ) - result = await session.execute(select(User).where(User.id == token_data.sub)) - user: Optional[User] = result.scalars().first() - - if user is None: - raise HTTPException(status_code=404, detail="User not found") - - access_token, expire_at = security.create_access_token(user.id) - refresh_token, refresh_expire_at = security.create_refresh_token(user.id) - return { - "token_type": "bearer", - "access_token": access_token, - "expire_at": expire_at, - "refresh_token": refresh_token, - "refresh_expire_at": refresh_expire_at, - }