verify_password / get_password_hash are CPU-bound and take ~250ms each at rounds=12. Called directly from async endpoints, they stall every other coroutine for that window — the single biggest single-worker bottleneck on the login path. Adds averify_password / ahash_password that wrap the sync versions in asyncio.to_thread. Sync versions stay put because _ensure_admin_user and tests still use them. 5 call sites updated: login, change-password, create-user, reset-password. tests/test_auth_async.py asserts parallel averify runs concurrently (~1x of a single verify, not 2x).
49 lines
1.6 KiB
Python
49 lines
1.6 KiB
Python
import asyncio
|
|
from datetime import datetime, timedelta, timezone
|
|
from typing import Optional, Any
|
|
import jwt
|
|
import bcrypt
|
|
|
|
from decnet.env import DECNET_JWT_SECRET
|
|
|
|
SECRET_KEY: str = DECNET_JWT_SECRET
|
|
ALGORITHM: str = "HS256"
|
|
ACCESS_TOKEN_EXPIRE_MINUTES: int = 1440
|
|
|
|
|
|
def verify_password(plain_password: str, hashed_password: str) -> bool:
|
|
return bcrypt.checkpw(
|
|
plain_password.encode("utf-8")[:72],
|
|
hashed_password.encode("utf-8")
|
|
)
|
|
|
|
|
|
def get_password_hash(password: str) -> str:
|
|
# Use a cost factor of 12 (default for passlib/bcrypt)
|
|
_salt: bytes = bcrypt.gensalt(rounds=12)
|
|
_hashed: bytes = bcrypt.hashpw(password.encode("utf-8")[:72], _salt)
|
|
return _hashed.decode("utf-8")
|
|
|
|
|
|
async def averify_password(plain_password: str, hashed_password: str) -> bool:
|
|
# bcrypt is CPU-bound and ~250ms/call; keep it off the event loop.
|
|
return await asyncio.to_thread(verify_password, plain_password, hashed_password)
|
|
|
|
|
|
async def ahash_password(password: str) -> str:
|
|
return await asyncio.to_thread(get_password_hash, password)
|
|
|
|
|
|
def create_access_token(data: dict[str, Any], expires_delta: Optional[timedelta] = None) -> str:
|
|
_to_encode: dict[str, Any] = data.copy()
|
|
_expire: datetime
|
|
if expires_delta:
|
|
_expire = datetime.now(timezone.utc) + expires_delta
|
|
else:
|
|
_expire = datetime.now(timezone.utc) + timedelta(minutes=15)
|
|
|
|
_to_encode.update({"exp": _expire})
|
|
_to_encode.update({"iat": datetime.now(timezone.utc)})
|
|
_encoded_jwt: str = jwt.encode(_to_encode, SECRET_KEY, algorithm=ALGORITHM)
|
|
return _encoded_jwt
|