""" Authentication service - password hashing and JWT token management """ from datetime import datetime, timedelta from typing import Optional import bcrypt from jose import JWTError, jwt from app.config import get_settings settings = get_settings() def hash_password(password: str) -> str: """Hash a password using bcrypt directly (passlib-free, bcrypt>=4.0 compatible)""" password_bytes = password.encode("utf-8") salt = bcrypt.gensalt() hashed = bcrypt.hashpw(password_bytes, salt) return hashed.decode("utf-8") def verify_password(plain_password: str, hashed_password: str) -> bool: """Verify a password against its bcrypt hash""" try: return bcrypt.checkpw( plain_password.encode("utf-8"), hashed_password.encode("utf-8") ) except Exception: return False def create_access_token(data: dict, expires_delta: Optional[timedelta] = None) -> str: """ Create a JWT access token Args: data: Payload to encode (should include 'sub' with user ID) expires_delta: Token expiry time Returns: Encoded JWT token """ to_encode = data.copy() if expires_delta: expire = datetime.utcnow() + expires_delta else: expire = datetime.utcnow() + timedelta(hours=settings.jwt_expiry_hours) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode( to_encode, settings.jwt_secret, algorithm=settings.jwt_algorithm ) return encoded_jwt def decode_access_token(token: str) -> Optional[dict]: """ Decode and validate a JWT token Args: token: JWT token string Returns: Token payload if valid, None otherwise """ try: payload = jwt.decode( token, settings.jwt_secret, algorithms=[settings.jwt_algorithm] ) return payload except JWTError: return None