created dummy fastapi
This commit is contained in:
parent
6fc7704f6a
commit
5d258bf67f
|
|
@ -0,0 +1,33 @@
|
|||
# Use Python 3.12 slim image
|
||||
FROM python:3.12-slim
|
||||
|
||||
# Set working directory
|
||||
WORKDIR /app
|
||||
|
||||
# Set environment variables
|
||||
ENV PYTHONDONTWRITEBYTECODE=1 \
|
||||
PYTHONUNBUFFERED=1
|
||||
|
||||
# Install system dependencies
|
||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||
gcc \
|
||||
&& rm -rf /var/lib/apt/lists/*
|
||||
|
||||
# Copy requirements first for better caching
|
||||
COPY requirements.txt .
|
||||
|
||||
# Install Python dependencies
|
||||
RUN pip install --no-cache-dir -r requirements.txt
|
||||
|
||||
# Copy application code
|
||||
COPY . .
|
||||
|
||||
# Create non-root user
|
||||
RUN useradd -m -u 1000 appuser && chown -R appuser:appuser /app
|
||||
USER appuser
|
||||
|
||||
# Expose port
|
||||
EXPOSE 8000
|
||||
|
||||
# Run the application
|
||||
CMD ["uvicorn", "app:app", "--host", "0.0.0.0", "--port", "8000"]
|
||||
|
|
@ -0,0 +1,71 @@
|
|||
from datetime import timedelta
|
||||
from fastapi import FastAPI, Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordRequestForm
|
||||
from fastapi.middleware.cors import CORSMiddleware
|
||||
from users import Token, User, fake_users_db
|
||||
from auth_utils import (
|
||||
authenticate_user,
|
||||
create_access_token,
|
||||
get_current_active_user,
|
||||
ACCESS_TOKEN_EXPIRE_MINUTES
|
||||
)
|
||||
|
||||
|
||||
app = FastAPI(title="Trading Agents API", version="1.0.0")
|
||||
|
||||
# Configure CORS
|
||||
origins = [
|
||||
"http://localhost",
|
||||
"http://localhost:3000",
|
||||
"http://localhost:8000",
|
||||
"http://localhost:8080",
|
||||
]
|
||||
|
||||
app.add_middleware(
|
||||
CORSMiddleware,
|
||||
allow_origins=origins,
|
||||
allow_credentials=True,
|
||||
allow_methods=["*"],
|
||||
allow_headers=["*"],
|
||||
)
|
||||
|
||||
|
||||
@app.post("/token", response_model=Token)
|
||||
async def login(form_data: OAuth2PasswordRequestForm = Depends()):
|
||||
"""Login endpoint to get access token."""
|
||||
user = authenticate_user(fake_users_db, form_data.username, form_data.password)
|
||||
if not user:
|
||||
raise HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Incorrect username or password",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)
|
||||
access_token = create_access_token(
|
||||
data={"sub": user.username}, expires_delta=access_token_expires
|
||||
)
|
||||
return {"access_token": access_token, "token_type": "bearer"}
|
||||
|
||||
|
||||
@app.get("/users/me", response_model=User)
|
||||
async def read_users_me(current_user: User = Depends(get_current_active_user)):
|
||||
"""Get current user information."""
|
||||
return current_user
|
||||
|
||||
|
||||
@app.get("/protected")
|
||||
async def protected_route(current_user: User = Depends(get_current_active_user)):
|
||||
"""Example protected route."""
|
||||
return {"message": f"Hello {current_user.username}, this is a protected route!"}
|
||||
|
||||
|
||||
@app.get("/")
|
||||
async def root():
|
||||
"""Root endpoint."""
|
||||
return {"message": "Trading Agents API with OAuth2"}
|
||||
|
||||
|
||||
@app.get("/health")
|
||||
async def health_check():
|
||||
"""Health check endpoint."""
|
||||
return {"status": "healthy"}
|
||||
|
|
@ -0,0 +1,87 @@
|
|||
from datetime import datetime, timedelta
|
||||
from typing import Optional
|
||||
from fastapi import Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordBearer
|
||||
from jose import JWTError, jwt
|
||||
from passlib.context import CryptContext
|
||||
from users import UserInDB, TokenData, fake_users_db
|
||||
|
||||
|
||||
# Configuration
|
||||
SECRET_KEY = "your-secret-key-here-change-in-production"
|
||||
ALGORITHM = "HS256"
|
||||
ACCESS_TOKEN_EXPIRE_MINUTES = 30
|
||||
|
||||
# Password hashing
|
||||
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
|
||||
|
||||
# OAuth2 scheme
|
||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
|
||||
|
||||
|
||||
def verify_password(plain_password: str, hashed_password: str) -> bool:
|
||||
"""Verify a plain password against its hash."""
|
||||
return pwd_context.verify(plain_password, hashed_password)
|
||||
|
||||
|
||||
def get_password_hash(password: str) -> str:
|
||||
"""Hash a password."""
|
||||
return pwd_context.hash(password)
|
||||
|
||||
|
||||
def get_user(db: dict, username: str) -> Optional[UserInDB]:
|
||||
"""Get a user from the database."""
|
||||
if username in db:
|
||||
user_dict = db[username]
|
||||
return UserInDB(**user_dict)
|
||||
return None
|
||||
|
||||
|
||||
def authenticate_user(fake_db: dict, username: str, password: str) -> Optional[UserInDB]:
|
||||
"""Authenticate a user."""
|
||||
user = get_user(fake_db, username)
|
||||
if not user:
|
||||
return None
|
||||
if not verify_password(password, user.hashed_password):
|
||||
return None
|
||||
return user
|
||||
|
||||
|
||||
def create_access_token(data: dict, expires_delta: Optional[timedelta] = None) -> str:
|
||||
"""Create a JWT access token."""
|
||||
to_encode = data.copy()
|
||||
if expires_delta:
|
||||
expire = datetime.utcnow() + expires_delta
|
||||
else:
|
||||
expire = datetime.utcnow() + timedelta(minutes=15)
|
||||
to_encode.update({"exp": expire})
|
||||
encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
|
||||
return encoded_jwt
|
||||
|
||||
|
||||
async def get_current_user(token: str = Depends(oauth2_scheme)) -> UserInDB:
|
||||
"""Get the current authenticated user from JWT token."""
|
||||
credentials_exception = HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Could not validate credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
try:
|
||||
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
|
||||
username: str = payload.get("sub")
|
||||
if username is None:
|
||||
raise credentials_exception
|
||||
token_data = TokenData(username=username)
|
||||
except JWTError:
|
||||
raise credentials_exception
|
||||
user = get_user(fake_users_db, username=token_data.username)
|
||||
if user is None:
|
||||
raise credentials_exception
|
||||
return user
|
||||
|
||||
|
||||
async def get_current_active_user(current_user: UserInDB = Depends(get_current_user)) -> UserInDB:
|
||||
"""Get the current active user."""
|
||||
if current_user.disabled:
|
||||
raise HTTPException(status_code=400, detail="Inactive user")
|
||||
return current_user
|
||||
|
|
@ -0,0 +1,5 @@
|
|||
fastapi==0.104.1
|
||||
uvicorn[standard]==0.24.0
|
||||
python-jose[cryptography]==3.3.0
|
||||
passlib[bcrypt]==1.7.4
|
||||
python-multipart==0.0.6
|
||||
|
|
@ -0,0 +1,52 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Script to build and run the FastAPI web server using Docker
|
||||
|
||||
# Set variables
|
||||
IMAGE_NAME="tradingagents-api-web"
|
||||
CONTAINER_NAME="tradingagents-api-web-container"
|
||||
PORT=8000
|
||||
|
||||
# Colors for output
|
||||
GREEN='\033[0;32m'
|
||||
YELLOW='\033[1;33m'
|
||||
RED='\033[0;31m'
|
||||
NC='\033[0m' # No Color
|
||||
|
||||
echo -e "${YELLOW}Building Docker image...${NC}"
|
||||
docker build -t ${IMAGE_NAME} .
|
||||
|
||||
if [ $? -eq 0 ]; then
|
||||
echo -e "${GREEN}Docker image built successfully!${NC}"
|
||||
else
|
||||
echo -e "${RED}Failed to build Docker image${NC}"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Stop and remove existing container if it exists
|
||||
echo -e "${YELLOW}Checking for existing container...${NC}"
|
||||
if [ "$(docker ps -aq -f name=${CONTAINER_NAME})" ]; then
|
||||
echo -e "${YELLOW}Stopping and removing existing container...${NC}"
|
||||
docker stop ${CONTAINER_NAME}
|
||||
docker rm ${CONTAINER_NAME}
|
||||
fi
|
||||
|
||||
# Run the container
|
||||
echo -e "${YELLOW}Starting container...${NC}"
|
||||
docker run -d \
|
||||
--name ${CONTAINER_NAME} \
|
||||
-p ${PORT}:8000 \
|
||||
-e SECRET_KEY="${SECRET_KEY:-your-secret-key-here-change-in-production}" \
|
||||
${IMAGE_NAME}
|
||||
|
||||
if [ $? -eq 0 ]; then
|
||||
echo -e "${GREEN}Container started successfully!${NC}"
|
||||
echo -e "${GREEN}API is available at: http://localhost:${PORT}${NC}"
|
||||
echo -e "${GREEN}API documentation: http://localhost:${PORT}/docs${NC}"
|
||||
echo ""
|
||||
echo -e "${YELLOW}To view logs:${NC} docker logs -f ${CONTAINER_NAME}"
|
||||
echo -e "${YELLOW}To stop:${NC} docker stop ${CONTAINER_NAME}"
|
||||
else
|
||||
echo -e "${RED}Failed to start container${NC}"
|
||||
exit 1
|
||||
fi
|
||||
|
|
@ -0,0 +1,96 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Test commands for the Trading Agents API
|
||||
|
||||
# Colors for output
|
||||
GREEN='\033[0;32m'
|
||||
YELLOW='\033[1;33m'
|
||||
RED='\033[0;31m'
|
||||
BLUE='\033[0;34m'
|
||||
NC='\033[0m' # No Color
|
||||
|
||||
API_URL="http://localhost:8000"
|
||||
|
||||
echo -e "${BLUE}=== Trading Agents API Test Commands ===${NC}\n"
|
||||
|
||||
# 1. Health check
|
||||
echo -e "${YELLOW}1. Health Check:${NC}"
|
||||
echo "curl -X GET ${API_URL}/health"
|
||||
echo -e "${GREEN}Expected: {\"status\":\"healthy\"}${NC}\n"
|
||||
|
||||
# 2. Root endpoint
|
||||
echo -e "${YELLOW}2. Root Endpoint:${NC}"
|
||||
echo "curl -X GET ${API_URL}/"
|
||||
echo -e "${GREEN}Expected: {\"message\":\"Trading Agents API with OAuth2\"}${NC}\n"
|
||||
|
||||
# 3. Get token (login)
|
||||
echo -e "${YELLOW}3. Login (Get Access Token):${NC}"
|
||||
echo "curl -X POST ${API_URL}/token \\"
|
||||
echo " -H \"Content-Type: application/x-www-form-urlencoded\" \\"
|
||||
echo " -d \"username=testuser&password=secret\""
|
||||
echo -e "${GREEN}Expected: {\"access_token\":\"<token>\",\"token_type\":\"bearer\"}${NC}\n"
|
||||
|
||||
# 4. Access protected endpoint without token (should fail)
|
||||
echo -e "${YELLOW}4. Access Protected Route (No Token - Should Fail):${NC}"
|
||||
echo "curl -X GET ${API_URL}/protected"
|
||||
echo -e "${RED}Expected: 401 Unauthorized${NC}\n"
|
||||
|
||||
# 5. Access protected endpoint with token
|
||||
echo -e "${YELLOW}5. Access Protected Route (With Token):${NC}"
|
||||
echo "# First get the token:"
|
||||
echo "TOKEN=\$(curl -s -X POST ${API_URL}/token \\"
|
||||
echo " -H \"Content-Type: application/x-www-form-urlencoded\" \\"
|
||||
echo " -d \"username=testuser&password=secret\" | jq -r '.access_token')"
|
||||
echo ""
|
||||
echo "# Then use it:"
|
||||
echo "curl -X GET ${API_URL}/protected \\"
|
||||
echo " -H \"Authorization: Bearer \$TOKEN\""
|
||||
echo -e "${GREEN}Expected: {\"message\":\"Hello testuser, this is a protected route!\"}${NC}\n"
|
||||
|
||||
# 6. Get current user info
|
||||
echo -e "${YELLOW}6. Get Current User Info:${NC}"
|
||||
echo "curl -X GET ${API_URL}/users/me \\"
|
||||
echo " -H \"Authorization: Bearer \$TOKEN\""
|
||||
echo -e "${GREEN}Expected: User information JSON${NC}\n"
|
||||
|
||||
# 7. View API documentation
|
||||
echo -e "${YELLOW}7. API Documentation:${NC}"
|
||||
echo "Open in browser: ${API_URL}/docs"
|
||||
echo "or"
|
||||
echo "curl -X GET ${API_URL}/openapi.json | jq ."
|
||||
echo ""
|
||||
|
||||
# One-liner test script
|
||||
echo -e "${BLUE}=== Quick Test Script ===${NC}"
|
||||
echo -e "${YELLOW}Run this to test all endpoints:${NC}\n"
|
||||
cat << 'EOF'
|
||||
#!/bin/bash
|
||||
API_URL="http://localhost:8000"
|
||||
|
||||
# Test health
|
||||
echo "Testing health endpoint..."
|
||||
curl -s ${API_URL}/health | jq .
|
||||
|
||||
# Get token
|
||||
echo -e "\nGetting access token..."
|
||||
TOKEN=$(curl -s -X POST ${API_URL}/token \
|
||||
-H "Content-Type: application/x-www-form-urlencoded" \
|
||||
-d "username=testuser&password=secret" | jq -r '.access_token')
|
||||
|
||||
if [ -z "$TOKEN" ] || [ "$TOKEN" = "null" ]; then
|
||||
echo "Failed to get token!"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "Token obtained successfully!"
|
||||
|
||||
# Test protected endpoint
|
||||
echo -e "\nTesting protected endpoint..."
|
||||
curl -s -X GET ${API_URL}/protected \
|
||||
-H "Authorization: Bearer $TOKEN" | jq .
|
||||
|
||||
# Get user info
|
||||
echo -e "\nGetting user info..."
|
||||
curl -s -X GET ${API_URL}/users/me \
|
||||
-H "Authorization: Bearer $TOKEN" | jq .
|
||||
EOF
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
from typing import Optional
|
||||
from pydantic import BaseModel
|
||||
|
||||
|
||||
class Token(BaseModel):
|
||||
access_token: str
|
||||
token_type: str
|
||||
|
||||
|
||||
class TokenData(BaseModel):
|
||||
username: Optional[str] = None
|
||||
|
||||
|
||||
class User(BaseModel):
|
||||
username: str
|
||||
email: Optional[str] = None
|
||||
full_name: Optional[str] = None
|
||||
disabled: Optional[bool] = None
|
||||
|
||||
|
||||
class UserInDB(User):
|
||||
hashed_password: str
|
||||
|
||||
|
||||
# Fake database for demonstration
|
||||
fake_users_db = {
|
||||
"testuser": {
|
||||
"username": "testuser",
|
||||
"full_name": "Test User",
|
||||
"email": "test@example.com",
|
||||
"hashed_password": "$2b$12$EixZaYVK1fsbw1ZfbX3OXePaWxn96p36WQoeG6Lruj3vjPGga31lW", # secret
|
||||
"disabled": False,
|
||||
}
|
||||
}
|
||||
Loading…
Reference in New Issue