import hashlib import secrets import uuid from datetime import datetime, timedelta, timezone from jose import JWTError, jwt from passlib.context import CryptContext from app.config import settings pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") ALGORITHM = "HS256" def hash_password(password: str) -> str: return pwd_context.hash(password) def verify_password(plain_password: str, hashed_password: str) -> bool: return pwd_context.verify(plain_password, hashed_password) def create_access_token(user_id: uuid.UUID, role: str) -> str: now = datetime.now(timezone.utc) expire = now + timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES) payload = { "sub": str(user_id), "role": role, "exp": expire, "iat": now, "jti": str(uuid.uuid4()), } return jwt.encode(payload, settings.SECRET_KEY, algorithm=ALGORITHM) def decode_access_token(token: str) -> dict: try: return jwt.decode(token, settings.SECRET_KEY, algorithms=[ALGORITHM]) except JWTError: return {} def generate_refresh_token() -> str: return secrets.token_hex(64) def hash_refresh_token(token: str) -> str: return hashlib.sha256(token.encode()).hexdigest()