This repository was archived by the owner on Sep 12, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmain.py
More file actions
147 lines (121 loc) Β· 4.41 KB
/
main.py
File metadata and controls
147 lines (121 loc) Β· 4.41 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
# IMPORTS
from datetime import datetime
import time
from fastapi import FastAPI, Request, status, Depends, Response
from fastapi.responses import JSONResponse
from starlette.middleware.base import BaseHTTPMiddleware
from starlette.middleware import Middleware
from auth import VerifyToken
from threading import Thread # Not used yet
# Templates
from fastapi.openapi.docs import get_swagger_ui_html
from globals import (
token_auth_scheme,
config,
redis_client,
tags_metadata,
WHITELISTED_IPS,
append_request_log,
append_denied_log,
)
# Import all the endpoints for each table
from surftimer.Map import router as Map
from surftimer.PlayerStats import router as PlayerStats
from surftimer.CurrentRun import router as CurrentRun
from surftimer.Players import router as Players
from surftimer.PersonalBest import router as PersonalBest
class IPValidatorMiddleware(BaseHTTPMiddleware):
"""This will check whether the Request IP is in our `WHITELISTED_IPS` and let it through or return status code `400` if not in `WHITELISTED_IPS`"""
async def dispatch(self, request: Request, call_next):
# Get client IP
ip = str(request.client.host)
# Check if IP is allowed
if ip not in WHITELISTED_IPS:
append_denied_log(request)
data = {"message": "Not Allowed", "ip": ip}
return JSONResponse(status_code=status.HTTP_400_BAD_REQUEST, content=data)
append_request_log(request)
# Proceed if IP is allowed
return await call_next(request)
# Swagger UI configuration - https://swagger.io/docs/open-source-tools/swagger-ui/usage/configuration/
swagger_config = {
"displayOperationId": False, # Show operationId on the UI
"defaultModelsExpandDepth": 1, # The default expansion depth for models (set to -1 completely hide the models)
"defaultModelExpandDepth": 2,
"defaultModelRendering": "example",
"deepLinking": True, # Enables deep linking for tags and operations
"useUnsafeMarkdown": True,
"displayRequestDuration": True,
"filter": True,
"showExtensions": True,
"syntaxHighlight.theme": "arta",
"docExpansion": "none",
"pluginLoadType": "chain",
"tagsSorter": "alpha",
}
app = FastAPI(
title="CS2 SurfTimer API",
description="""by [`tslashd`](https://github.com/tslashd)""",
version="0.0.0",
debug=True,
swagger_ui_parameters=swagger_config,
middleware=[Middleware(IPValidatorMiddleware)],
openapi_tags=tags_metadata,
)
# Attach the routes
app.include_router(Map)
app.include_router(PlayerStats)
app.include_router(CurrentRun)
app.include_router(Players)
app.include_router(PersonalBest)
@app.get("/docs2", include_in_schema=False)
async def custom_swagger_ui_html_cdn():
return get_swagger_ui_html(
openapi_url=app.openapi_url,
title=f"{app.title} - Swagger UI",
# swagger_ui_dark.css CDN link
swagger_css_url="https://cdn.jsdelivr.net/gh/Itz-fork/Fastapi-Swagger-UI-Dark/assets/swagger_ui_dark.min.css",
swagger_ui_parameters=swagger_config,
)
@app.get("/", include_in_schema=False)
async def home():
data = {"message": "Suuuuh duuuud"}
return JSONResponse(status_code=status.HTTP_200_OK, content=data)
@app.get(
"/ping",
name="Ping",
tags=["Utilities"],
summary="Endpoint used for checking connection and latency between clients and API",
)
def ping(client_unix: float):
server_unix = time.time()
latency = server_unix - client_unix
return JSONResponse(
content={
"client_unix": client_unix,
"server_unix": server_unix,
"latency_seconds": latency,
"latency_ms": round(latency * 1000, 2),
}
)
# This is an example of a endpoint locked behind an AUTH token π
@app.get(
"/api/private",
tags=["Private"],
name="Test Authentication Tokens",
include_in_schema=False,
)
async def private(
response: Response, token: str = Depends(token_auth_scheme)
): # π updated code
"""A valid access token is required to access this route"""
result = VerifyToken(token.credentials).verify() # π updated code
# π new code
if result.get("status"):
response.status_code = status.HTTP_400_BAD_REQUEST
return result
# π new code
dt = datetime.fromtimestamp(int(result["exp"]))
formatted_datetime = dt.strftime("%H:%M:%S %d-%m-%Y")
print("expiry:", formatted_datetime)
return result