simple_auth.py 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901
  1. from typing import Optional, List
  2. import json
  3. from datetime import timedelta
  4. import logging
  5. from fastapi import APIRouter, Depends, HTTPException, Body, Request
  6. from fastapi.responses import RedirectResponse
  7. from sqlalchemy.orm import Session
  8. from pydantic import BaseModel
  9. from urllib.parse import urlencode, urlparse, parse_qs, urlunparse
  10. from app.api.v1 import deps
  11. from app.core import security
  12. from app.core.config import settings
  13. from app.core.utils import generate_english_name, get_client_ip
  14. from app.core.cache import redis_client
  15. from app.models.user import User, UserRole, UserStatus
  16. from app.models.application import Application, ProtocolType
  17. from app.models.mapping import AppUserMapping
  18. from app.schemas.simple_auth import (
  19. TicketExchangeRequest, TicketExchangeResponse,
  20. TicketValidateRequest, TicketValidateResponse,
  21. PasswordLoginRequest, PasswordLoginResponse,
  22. SmsLoginRequest,
  23. UserRegisterRequest, AdminPasswordResetRequest, AdminPasswordResetResponse,
  24. ChangePasswordRequest, MyMappingsResponse, UserMappingResponse,
  25. UserPromoteRequest, SsoLoginRequest, SsoLoginResponse,
  26. LaunchpadAppsResponse, LaunchpadAppResponse
  27. )
  28. from app.services.signature_service import SignatureService
  29. from app.services.ticket_service import TicketService
  30. from app.services.log_service import LogService
  31. from app.services.login_log_service import LoginLogService
  32. from app.services.system_config_service import SystemConfigService
  33. from app.schemas.operation_log import ActionType
  34. from app.schemas.login_log import LoginLogCreate, LoginMethod, AuthType
  35. router = APIRouter()
  36. logger = logging.getLogger(__name__)
  37. @router.post("/login", response_model=PasswordLoginResponse, summary="密码登录")
  38. def login_with_password(
  39. req: PasswordLoginRequest,
  40. request: Request,
  41. db: Session = Depends(deps.get_db),
  42. ):
  43. """
  44. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  45. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  46. """
  47. # --- Platform Login ---
  48. if not req.app_id:
  49. # Prepare Log
  50. log_create = LoginLogCreate(
  51. mobile=req.identifier,
  52. ip_address=get_client_ip(request),
  53. login_method=LoginMethod.UNIFIED_PAGE,
  54. auth_type=AuthType.PASSWORD,
  55. user_agent=request.headers.get("user-agent")
  56. )
  57. # Find user by mobile only
  58. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  59. if not user:
  60. log_create.is_success = 0
  61. log_create.failure_reason = "用户未找到"
  62. LoginLogService.create_log(db, log_create)
  63. logger.warning(f"平台登录失败: 用户 {req.identifier} 未找到")
  64. raise HTTPException(status_code=404, detail="用户未找到")
  65. log_create.user_id = user.id
  66. is_valid = security.verify_password(req.password, user.password_hash)
  67. if not is_valid:
  68. logger.warning(f"平台登录失败: 用户 {user.mobile} 密码错误")
  69. log_create.is_success = 0
  70. log_create.failure_reason = "密码错误"
  71. LoginLogService.create_log(db, log_create)
  72. raise HTTPException(status_code=401, detail="密码错误")
  73. if user.status != UserStatus.ACTIVE:
  74. logger.warning(f"平台登录失败: 用户 {user.mobile} 已被禁用")
  75. log_create.is_success = 0
  76. log_create.failure_reason = "用户已禁用"
  77. LoginLogService.create_log(db, log_create)
  78. raise HTTPException(status_code=400, detail="用户已禁用")
  79. # Generate JWT Access Token
  80. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  81. if req.remember_me:
  82. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES_LONG)
  83. access_token = security.create_access_token(
  84. user.id,
  85. expires_delta=access_token_expires,
  86. is_long_term=req.remember_me
  87. )
  88. # Log Success
  89. LoginLogService.create_log(db, log_create)
  90. logger.info(f"平台登录成功: 用户 {user.mobile} (ID: {user.id})")
  91. return {
  92. "access_token": access_token,
  93. "token_type": "bearer",
  94. "role": user.role
  95. }
  96. # --- App SSO Login ---
  97. log_create = LoginLogCreate(
  98. mobile=req.identifier,
  99. ip_address=get_client_ip(request),
  100. login_method=LoginMethod.CUSTOM_PAGE, # 假设应用自定义页面调用此接口
  101. auth_type=AuthType.PASSWORD,
  102. user_agent=request.headers.get("user-agent")
  103. )
  104. # 1. Verify App
  105. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  106. if not app:
  107. log_create.is_success = 0
  108. log_create.failure_reason = "应用未找到"
  109. LoginLogService.create_log(db, log_create)
  110. logger.warning(f"应用登录失败: 应用ID {req.app_id} 未找到")
  111. raise HTTPException(status_code=404, detail="应用未找到")
  112. # 2. Verify Signature (Optional but recommended for server-side calls)
  113. if req.sign and req.timestamp:
  114. params = {
  115. "app_id": req.app_id,
  116. "identifier": req.identifier,
  117. "password": req.password,
  118. "timestamp": req.timestamp,
  119. "sign": req.sign
  120. }
  121. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  122. log_create.is_success = 0
  123. log_create.failure_reason = "签名无效"
  124. LoginLogService.create_log(db, log_create)
  125. logger.warning(f"应用登录失败: 应用 {req.app_id} 签名验证失败")
  126. raise HTTPException(status_code=400, detail="签名无效")
  127. # 3. Find User
  128. user = None
  129. # Auto-trim password to prevent common copy-paste errors
  130. if req.password:
  131. req.password = req.password.strip()
  132. # Try by mobile
  133. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  134. if not user:
  135. # Try by mapping
  136. mapping = db.query(AppUserMapping).filter(
  137. AppUserMapping.app_id == app.id,
  138. (AppUserMapping.mapped_key == req.identifier) | (AppUserMapping.mapped_email == req.identifier)
  139. ).first()
  140. if mapping:
  141. user = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  142. if not user:
  143. log_create.is_success = 0
  144. log_create.failure_reason = "用户未找到"
  145. LoginLogService.create_log(db, log_create)
  146. logger.warning(f"应用登录失败: 用户 {req.identifier} 在应用 {req.app_id} 中未找到")
  147. raise HTTPException(status_code=404, detail="用户未找到")
  148. log_create.user_id = user.id
  149. if user.status != UserStatus.ACTIVE:
  150. log_create.is_success = 0
  151. log_create.failure_reason = "用户已禁用"
  152. LoginLogService.create_log(db, log_create)
  153. logger.warning(f"应用登录失败: 用户 {user.mobile} 已被禁用")
  154. raise HTTPException(status_code=400, detail="用户已禁用")
  155. # 4. Verify Password
  156. # DEBUG: Log password verification details
  157. is_valid = security.verify_password(req.password, user.password_hash)
  158. if not is_valid:
  159. logger.warning(f"应用登录失败: 用户 {user.mobile} 密码验证失败 (App: {req.app_id})")
  160. log_create.is_success = 0
  161. log_create.failure_reason = "密码错误"
  162. LoginLogService.create_log(db, log_create)
  163. raise HTTPException(status_code=401, detail="密码错误")
  164. # 5. Generate Ticket (Self-Targeting)
  165. ticket = TicketService.generate_ticket(user.id, req.app_id)
  166. # Log Success (AuthType is PASSWORD leading to TICKET generation, keeping PASSWORD is fine or TICKET)
  167. # User requirement: "包括...认证方式". Here the auth method was PASSWORD.
  168. LoginLogService.create_log(db, log_create)
  169. logger.info(f"应用登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  170. return {"ticket": ticket}
  171. @router.post("/sms-login", response_model=PasswordLoginResponse, summary="短信验证码登录")
  172. def login_with_sms(
  173. req: SmsLoginRequest,
  174. request: Request,
  175. db: Session = Depends(deps.get_db),
  176. ):
  177. """
  178. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  179. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  180. """
  181. # 0. Check Config (Assuming PC enabled for API access, or check both)
  182. # Since this is an API used by external apps (likely web), we default to checking PC config
  183. # or we can check if EITHER is enabled.
  184. pc_enabled = SystemConfigService.get_config(db, "sms_login_pc_enabled")
  185. mobile_enabled = SystemConfigService.get_config(db, "sms_login_mobile_enabled")
  186. if pc_enabled != "true" and mobile_enabled != "true":
  187. logger.warning("短信登录尝试失败: 短信登录功能未开启")
  188. raise HTTPException(status_code=403, detail="短信登录功能未开启")
  189. # --- Platform Login ---
  190. if not req.app_id:
  191. # Prepare Log
  192. log_create = LoginLogCreate(
  193. mobile=req.mobile,
  194. ip_address=get_client_ip(request),
  195. login_method=LoginMethod.UNIFIED_PAGE,
  196. auth_type=AuthType.SMS,
  197. user_agent=request.headers.get("user-agent")
  198. )
  199. # 1. Verify Code
  200. key = f"SMS:{req.mobile}"
  201. stored_code = redis_client.get(key)
  202. if not stored_code or stored_code != req.code:
  203. log_create.is_success = 0
  204. log_create.failure_reason = "验证码错误或已过期"
  205. LoginLogService.create_log(db, log_create)
  206. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 验证码无效")
  207. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  208. # 2. Find user
  209. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  210. if not user:
  211. log_create.is_success = 0
  212. log_create.failure_reason = "用户未找到"
  213. LoginLogService.create_log(db, log_create)
  214. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 未注册")
  215. raise HTTPException(status_code=404, detail="用户未找到")
  216. log_create.user_id = user.id
  217. if user.status != UserStatus.ACTIVE:
  218. log_create.is_success = 0
  219. log_create.failure_reason = "用户已禁用"
  220. LoginLogService.create_log(db, log_create)
  221. logger.warning(f"平台短信登录失败: 用户 {user.mobile} 已被禁用")
  222. raise HTTPException(status_code=400, detail="用户已禁用")
  223. # 3. Generate JWT Access Token
  224. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  225. if req.remember_me:
  226. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES_LONG)
  227. access_token = security.create_access_token(
  228. user.id,
  229. expires_delta=access_token_expires,
  230. is_long_term=req.remember_me,
  231. )
  232. # Clear Code
  233. redis_client.delete(key)
  234. # Log Success
  235. LoginLogService.create_log(db, log_create)
  236. logger.info(f"平台短信登录成功: 用户 {user.mobile} (ID: {user.id})")
  237. return {
  238. "access_token": access_token,
  239. "token_type": "bearer",
  240. "role": user.role
  241. }
  242. # --- App SSO Login ---
  243. log_create = LoginLogCreate(
  244. mobile=req.mobile,
  245. ip_address=get_client_ip(request),
  246. login_method=LoginMethod.CUSTOM_PAGE,
  247. auth_type=AuthType.SMS,
  248. user_agent=request.headers.get("user-agent")
  249. )
  250. # 1. Verify App
  251. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  252. if not app:
  253. log_create.is_success = 0
  254. log_create.failure_reason = "应用未找到"
  255. LoginLogService.create_log(db, log_create)
  256. logger.warning(f"应用短信登录失败: 应用ID {req.app_id} 未找到")
  257. raise HTTPException(status_code=404, detail="应用未找到")
  258. # 2. Verify Signature (Optional)
  259. if req.sign and req.timestamp:
  260. params = {
  261. "app_id": req.app_id,
  262. "mobile": req.mobile,
  263. "code": req.code,
  264. "timestamp": req.timestamp,
  265. "sign": req.sign
  266. }
  267. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  268. log_create.is_success = 0
  269. log_create.failure_reason = "签名无效"
  270. LoginLogService.create_log(db, log_create)
  271. logger.warning(f"应用短信登录失败: 应用 {req.app_id} 签名无效")
  272. raise HTTPException(status_code=400, detail="签名无效")
  273. # 3. Verify Code
  274. key = f"SMS:{req.mobile}"
  275. stored_code = redis_client.get(key)
  276. if not stored_code or stored_code != req.code:
  277. log_create.is_success = 0
  278. log_create.failure_reason = "验证码错误或已过期"
  279. LoginLogService.create_log(db, log_create)
  280. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 验证码无效")
  281. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  282. # 4. Find User
  283. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  284. if not user:
  285. log_create.is_success = 0
  286. log_create.failure_reason = "用户未找到"
  287. LoginLogService.create_log(db, log_create)
  288. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 未注册")
  289. raise HTTPException(status_code=404, detail="用户未找到")
  290. log_create.user_id = user.id
  291. if user.status != UserStatus.ACTIVE:
  292. log_create.is_success = 0
  293. log_create.failure_reason = "用户已禁用"
  294. LoginLogService.create_log(db, log_create)
  295. logger.warning(f"应用短信登录失败: 用户 {user.mobile} 已被禁用")
  296. raise HTTPException(status_code=400, detail="用户已禁用")
  297. # 5. Generate Ticket (Self-Targeting)
  298. ticket = TicketService.generate_ticket(user.id, req.app_id)
  299. # Clear Code
  300. redis_client.delete(key)
  301. # Log Success
  302. LoginLogService.create_log(db, log_create)
  303. logger.info(f"应用短信登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  304. return {"ticket": ticket}
  305. @router.post("/register", response_model=PasswordLoginResponse, summary="用户注册")
  306. def register_user(
  307. req: UserRegisterRequest,
  308. db: Session = Depends(deps.get_db),
  309. ):
  310. """
  311. 注册新用户 (默认为普通用户)。
  312. """
  313. # Force role to ORDINARY_USER
  314. role = UserRole.ORDINARY_USER
  315. # Auto-login after registration (return token)
  316. if req.password:
  317. req.password = req.password.strip()
  318. if not security.validate_password_strength(req.password):
  319. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  320. existing_user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  321. if existing_user:
  322. logger.info(f"用户注册失败: 手机号 {req.mobile} 已存在")
  323. raise HTTPException(status_code=400, detail="手机号已注册")
  324. english_name = generate_english_name(req.name)
  325. new_user = User(
  326. mobile=req.mobile,
  327. name=req.name,
  328. english_name=english_name,
  329. password_hash=security.get_password_hash(req.password),
  330. status=UserStatus.ACTIVE,
  331. role=role
  332. )
  333. db.add(new_user)
  334. db.commit()
  335. db.refresh(new_user)
  336. logger.info(f"用户注册成功: {req.mobile} (ID: {new_user.id})")
  337. # Auto-login after registration (return token)
  338. access_token = security.create_access_token(new_user.id)
  339. return {
  340. "access_token": access_token,
  341. "token_type": "bearer",
  342. "role": new_user.role
  343. }
  344. @router.post("/admin/reset-password", response_model=AdminPasswordResetResponse, summary="管理员重置密码")
  345. def admin_reset_password(
  346. req: AdminPasswordResetRequest,
  347. request: Request,
  348. db: Session = Depends(deps.get_db),
  349. current_user: User = Depends(deps.get_current_active_user),
  350. ):
  351. """
  352. 超级管理员重置用户密码。
  353. 随机生成8位密码,只显示一次。
  354. """
  355. if current_user.role != UserRole.SUPER_ADMIN:
  356. raise HTTPException(status_code=403, detail="权限不足")
  357. # Verify Admin Password
  358. if not security.verify_password(req.admin_password, current_user.password_hash):
  359. logger.warning(f"管理员重置密码失败: 管理员 {current_user.mobile} 密码验证错误")
  360. raise HTTPException(status_code=403, detail="管理员密码错误")
  361. target_user = db.query(User).filter(User.id == req.user_id).first()
  362. if not target_user:
  363. raise HTTPException(status_code=404, detail="用户未找到")
  364. # Generate random password (alphanumeric only)
  365. new_pwd = security.generate_alphanumeric_password(8)
  366. target_user.password_hash = security.get_password_hash(new_pwd)
  367. db.add(target_user)
  368. db.commit()
  369. # Log Operation
  370. LogService.create_log(
  371. db=db,
  372. operator_id=current_user.id,
  373. action_type=ActionType.RESET_PASSWORD,
  374. target_user_id=target_user.id,
  375. target_mobile=target_user.mobile,
  376. ip_address=get_client_ip(request),
  377. details={}
  378. )
  379. logger.info(f"管理员重置用户密码成功: 目标用户 {target_user.mobile} (ID: {target_user.id})")
  380. return {"new_password": new_pwd}
  381. @router.post("/admin/promote", summary="提升用户角色")
  382. def promote_user(
  383. req: UserPromoteRequest,
  384. db: Session = Depends(deps.get_db),
  385. current_user: User = Depends(deps.get_current_active_user),
  386. ):
  387. if current_user.role != UserRole.SUPER_ADMIN:
  388. raise HTTPException(status_code=403, detail="权限不足")
  389. if req.new_role not in [UserRole.SUPER_ADMIN, UserRole.DEVELOPER]:
  390. raise HTTPException(status_code=400, detail="只能提升为管理员 or 开发者")
  391. target_user = db.query(User).filter(User.id == req.user_id).first()
  392. if not target_user:
  393. raise HTTPException(status_code=404, detail="用户未找到")
  394. old_role = target_user.role
  395. target_user.role = req.new_role
  396. db.add(target_user)
  397. db.commit()
  398. logger.info(f"用户角色变更: 用户 {target_user.mobile} 从 {old_role} 变更为 {req.new_role} (操作者: {current_user.mobile})")
  399. return {"message": "success"}
  400. @router.get("/me/mappings", response_model=MyMappingsResponse, summary="我的映射")
  401. def get_my_mappings(
  402. skip: int = 0,
  403. limit: int = 10,
  404. app_name: str = None,
  405. db: Session = Depends(deps.get_db),
  406. current_user: User = Depends(deps.get_current_active_user),
  407. ):
  408. query = db.query(AppUserMapping).join(Application).filter(AppUserMapping.user_id == current_user.id)
  409. if app_name:
  410. query = query.filter(Application.app_name.ilike(f"%{app_name}%"))
  411. total = query.count()
  412. mappings = query.order_by(AppUserMapping.id.desc()).offset(skip).limit(limit).all()
  413. result = []
  414. for m in mappings:
  415. result.append(UserMappingResponse(
  416. app_name=m.application.app_name if m.application else "Unknown",
  417. app_id=m.application.app_id if m.application else "",
  418. protocol_type=m.application.protocol_type if m.application else "",
  419. mapped_key=m.mapped_key,
  420. mapped_email=m.mapped_email,
  421. is_active=m.is_active
  422. ))
  423. return {"total": total, "items": result}
  424. @router.get("/me/launchpad-apps", response_model=LaunchpadAppsResponse, summary="快捷导航应用列表")
  425. def get_launchpad_apps(
  426. db: Session = Depends(deps.get_db),
  427. current_user: User = Depends(deps.get_current_active_user),
  428. ):
  429. """
  430. 获取当前用户的快捷导航应用列表(包含分类和描述)
  431. 仅返回已激活且协议类型为 SIMPLE_API 或 OIDC 的应用
  432. """
  433. from app.models.app_category import AppCategory
  434. # 查询用户的应用映射,join Application 和 AppCategory
  435. query = (
  436. db.query(AppUserMapping)
  437. .join(Application, AppUserMapping.app_id == Application.id)
  438. .outerjoin(AppCategory, Application.category_id == AppCategory.id)
  439. .filter(
  440. AppUserMapping.user_id == current_user.id,
  441. AppUserMapping.is_active == True,
  442. Application.protocol_type.in_([ProtocolType.SIMPLE_API, ProtocolType.OIDC]),
  443. Application.is_deleted == False
  444. )
  445. )
  446. mappings = query.order_by(Application.category_id.asc(), Application.app_name.asc()).all()
  447. result = []
  448. for m in mappings:
  449. app = m.application
  450. result.append(LaunchpadAppResponse(
  451. app_name=app.app_name if app else "Unknown",
  452. app_id=app.app_id if app else "",
  453. protocol_type=app.protocol_type.value if app else "",
  454. mapped_key=m.mapped_key,
  455. mapped_email=m.mapped_email,
  456. is_active=m.is_active,
  457. description=app.description if app else None,
  458. category_id=app.category_id if app else None,
  459. category_name=app.category.name if app and app.category else None
  460. ))
  461. return {"total": len(result), "items": result}
  462. @router.post("/me/change-password", summary="修改密码")
  463. def change_my_password(
  464. req: ChangePasswordRequest,
  465. db: Session = Depends(deps.get_db),
  466. current_user: User = Depends(deps.get_current_active_user),
  467. ):
  468. if not security.verify_password(req.old_password, current_user.password_hash):
  469. logger.warning(f"用户修改密码失败: 用户 {current_user.mobile} 旧密码验证错误")
  470. raise HTTPException(status_code=400, detail="旧密码错误")
  471. if req.new_password:
  472. req.new_password = req.new_password.strip()
  473. if not security.validate_password_strength(req.new_password):
  474. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  475. current_user.password_hash = security.get_password_hash(req.new_password)
  476. db.add(current_user)
  477. db.commit()
  478. logger.info(f"用户修改密码成功: {current_user.mobile}")
  479. return {"message": "密码修改成功"}
  480. @router.post("/exchange", response_model=TicketExchangeResponse, summary="票据交换")
  481. def exchange_ticket(
  482. req: TicketExchangeRequest,
  483. db: Session = Depends(deps.get_db),
  484. ):
  485. """
  486. 源应用调用以获取目标应用的票据。
  487. """
  488. # 1. Verify Source App
  489. source_app = db.query(Application).filter(Application.app_id == req.app_id).first()
  490. if not source_app:
  491. logger.warning(f"票据交换失败: 源应用 {req.app_id} 未找到")
  492. raise HTTPException(status_code=404, detail="源应用未找到")
  493. # 2. Verify Signature
  494. params = {
  495. "app_id": req.app_id,
  496. "target_app_id": req.target_app_id,
  497. "user_mobile": req.user_mobile,
  498. "timestamp": req.timestamp,
  499. "sign": req.sign
  500. }
  501. # Use the stored secret to verify
  502. if not SignatureService.verify_signature(source_app.app_secret, params, req.sign):
  503. logger.warning(f"票据交换失败: 源应用 {req.app_id} 签名无效")
  504. raise HTTPException(status_code=400, detail="签名无效")
  505. # 3. Verify User Existence (Optional: Do we trust source app completely? Usually yes if signed.)
  506. # But we need user_id to generate ticket.
  507. # We query by mobile.
  508. user = db.query(User).filter(User.mobile == req.user_mobile, User.is_deleted == 0).first()
  509. if not user:
  510. # If user doesn't exist, we might auto-create OR fail.
  511. # Requirement: "Returns redirect_url".
  512. # For simplicity, if user not found, we cannot map.
  513. logger.warning(f"票据交换失败: 用户 {req.user_mobile} 未找到")
  514. raise HTTPException(status_code=404, detail="用户在 UAP 中未找到")
  515. # 4. Generate Ticket for Target App
  516. # Logic: The ticket allows the user to log in to Target App.
  517. ticket = TicketService.generate_ticket(user.id, req.target_app_id)
  518. # 5. Get Target App URL
  519. target_app = db.query(Application).filter(Application.app_id == req.target_app_id).first()
  520. if not target_app:
  521. logger.warning(f"票据交换失败: 目标应用 {req.target_app_id} 未找到")
  522. raise HTTPException(status_code=404, detail="目标应用未找到")
  523. # Construct redirect URL
  524. # Assuming target app handles /callback?ticket=...
  525. # We use the first redirect_uri or notification_url or custom logic.
  526. # Simplicity: We return the ticket and let the Source App handle the redirect,
  527. # OR we return a full redirect URL if target_app has a base URL configured.
  528. # Let's assume redirect_uris is a JSON list.
  529. redirect_base = ""
  530. if target_app.redirect_uris:
  531. try:
  532. # 尝试作为 JSON 数组解析
  533. uris = json.loads(target_app.redirect_uris)
  534. if isinstance(uris, list) and len(uris) > 0:
  535. redirect_base = uris[0]
  536. elif isinstance(uris, str):
  537. redirect_base = uris
  538. except (json.JSONDecodeError, TypeError):
  539. # 如果不是 JSON 格式,直接作为字符串使用
  540. redirect_base = target_app.redirect_uris.strip()
  541. if not redirect_base:
  542. # Fallback or error
  543. redirect_base = "http://unknown-target-url"
  544. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  545. logger.info(f"票据交换成功: 用户 {req.user_mobile} 从 {req.app_id} -> {req.target_app_id}")
  546. return {
  547. "ticket": ticket,
  548. "redirect_url": full_redirect_url
  549. }
  550. @router.post("/sso-login", response_model=SsoLoginResponse, summary="SSO 登录")
  551. def sso_login(
  552. req: SsoLoginRequest,
  553. request: Request,
  554. db: Session = Depends(deps.get_db),
  555. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  556. ):
  557. """
  558. SSO 登录入口,支持:
  559. - SIMPLE_API 应用:返回带有 Ticket 的业务系统重定向 URL
  560. - OIDC 应用:直接返回回调地址
  561. 前端只需要拿到 redirect_url 后跳转即可。
  562. """
  563. # 1. Verify App
  564. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  565. # Prepare Log
  566. log_create = LoginLogCreate(
  567. ip_address=get_client_ip(request),
  568. login_method=LoginMethod.DIRECT_JUMP,
  569. auth_type=AuthType.SSO,
  570. user_agent=request.headers.get("user-agent"),
  571. mobile=req.username
  572. )
  573. if not app:
  574. log_create.is_success = 0
  575. log_create.failure_reason = "应用未找到"
  576. LoginLogService.create_log(db, log_create)
  577. logger.warning(f"SSO登录失败: 应用 {req.app_id} 未找到")
  578. raise HTTPException(status_code=404, detail="应用未找到")
  579. # 仅支持 SIMPLE_API 与 OIDC,其它协议直接拒绝
  580. if app.protocol_type not in ("SIMPLE_API", "OIDC"):
  581. log_create.is_success = 0
  582. log_create.failure_reason = "协议不支持"
  583. LoginLogService.create_log(db, log_create)
  584. logger.warning(
  585. f"SSO登录失败: 应用 {req.app_id} 协议类型不支持 ({app.protocol_type})"
  586. )
  587. raise HTTPException(status_code=400, detail="协议类型不支持该 SSO 登录方式")
  588. user = None
  589. # 2. Try Session Login first
  590. if current_user:
  591. user = current_user
  592. log_create.user_id = user.id
  593. log_create.mobile = user.mobile
  594. log_create.auth_type = AuthType.TOKEN # Used existing session
  595. # 3. If no session, try Credentials Login
  596. if not user and req.username and req.password:
  597. log_create.auth_type = AuthType.PASSWORD
  598. # Verify User Credentials
  599. user_query = db.query(User).filter(User.mobile == req.username, User.is_deleted == 0).first()
  600. if not user_query:
  601. # Check mapping
  602. mapping = db.query(AppUserMapping).filter(
  603. AppUserMapping.app_id == app.id,
  604. (AppUserMapping.mapped_key == req.username) | (AppUserMapping.mapped_email == req.username)
  605. ).first()
  606. if mapping:
  607. user_query = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  608. if user_query and security.verify_password(req.password, user_query.password_hash):
  609. user = user_query
  610. log_create.user_id = user.id
  611. if not user:
  612. log_create.is_success = 0
  613. log_create.failure_reason = "认证失败"
  614. LoginLogService.create_log(db, log_create)
  615. logger.warning(f"SSO登录失败: 用户认证失败 (Username: {req.username})")
  616. raise HTTPException(status_code=401, detail="认证失败")
  617. if user.status != "ACTIVE":
  618. log_create.is_success = 0
  619. log_create.failure_reason = "用户已禁用"
  620. LoginLogService.create_log(db, log_create)
  621. logger.warning(f"SSO登录失败: 用户 {user.mobile} 已被禁用")
  622. raise HTTPException(status_code=400, detail="用户已禁用")
  623. # 4. 解析重定向基础地址(SIMPLE_API 与 OIDC 都会用到)
  624. redirect_base = ""
  625. if app.redirect_uris:
  626. try:
  627. # 尝试作为 JSON 数组解析
  628. uris = json.loads(app.redirect_uris)
  629. if isinstance(uris, list) and len(uris) > 0:
  630. redirect_base = uris[0]
  631. elif isinstance(uris, str):
  632. redirect_base = uris
  633. except (json.JSONDecodeError, TypeError):
  634. # 如果不是 JSON 格式,直接作为字符串使用
  635. redirect_base = app.redirect_uris.strip()
  636. if not redirect_base:
  637. logger.error(f"SSO登录配置错误: 应用 {req.app_id} 未配置回调地址")
  638. raise HTTPException(status_code=400, detail="应用未配置重定向 URI")
  639. # 5. 根据协议类型构造最终 redirect_url
  640. if app.protocol_type == "SIMPLE_API":
  641. # 5.1 SIMPLE_API: 生成 Ticket,拼接到业务系统回调地址上
  642. ticket = TicketService.generate_ticket(user.id, req.app_id)
  643. LoginLogService.create_log(db, log_create)
  644. logger.info(f"SSO登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  645. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  646. return {"redirect_url": full_redirect_url}
  647. if app.protocol_type == "OIDC":
  648. # 5.2 OIDC: 直接跳转到回调地址(只保留到端口为止,去掉路径部分)
  649. # 例如:https://api.hnyunzhu.com:9003/oauth_callback -> https://api.hnyunzhu.com:9003
  650. parsed_uri = urlparse(redirect_base)
  651. # 只保留 scheme 和 netloc(包含端口),去掉 path、params、query、fragment
  652. redirect_url = f"{parsed_uri.scheme}://{parsed_uri.netloc}"
  653. LoginLogService.create_log(db, log_create)
  654. logger.info(
  655. f"OIDC SSO 登录成功: 用户 {user.mobile} 将跳转到回调地址 (App: {req.app_id}, URL: {redirect_url})"
  656. )
  657. return {"redirect_url": redirect_url}
  658. # 理论上不会走到这里,防御性返回
  659. logger.error(
  660. f"SSO登录异常: 未处理的协议类型 {app.protocol_type} (App: {req.app_id})"
  661. )
  662. raise HTTPException(status_code=500, detail="未处理的协议类型")
  663. @router.post("/validate", response_model=TicketValidateResponse, summary="验证票据")
  664. def validate_ticket(
  665. req: TicketValidateRequest,
  666. db: Session = Depends(deps.get_db),
  667. ):
  668. """
  669. 目标应用调用以消费票据。
  670. """
  671. # 1. Verify App
  672. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  673. if not app:
  674. logger.warning(f"票据验证失败: 应用 {req.app_id} 未找到")
  675. raise HTTPException(status_code=404, detail="应用未找到")
  676. # 2. Verify Signature
  677. params = {
  678. "ticket": req.ticket,
  679. "app_id": req.app_id,
  680. "timestamp": req.timestamp,
  681. "sign": req.sign
  682. }
  683. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  684. logger.warning(f"票据验证失败: 应用 {req.app_id} 签名无效")
  685. raise HTTPException(status_code=400, detail="签名无效")
  686. # 3. Consume Ticket
  687. ticket_data = TicketService.consume_ticket(req.ticket, req.app_id)
  688. if not ticket_data:
  689. logger.warning(f"票据验证失败: Ticket 无效或已过期 (App: {req.app_id})")
  690. return {"valid": False}
  691. user_id = ticket_data["user_id"]
  692. # 4. Get User Info & Mapping
  693. user = db.query(User).filter(User.id == user_id).first()
  694. mapping = db.query(AppUserMapping).filter(
  695. AppUserMapping.app_id == app.id,
  696. AppUserMapping.user_id == user_id
  697. ).first()
  698. mapped_key = mapping.mapped_key if mapping else None
  699. mapped_email = mapping.mapped_email if mapping else None
  700. logger.info(f"票据验证成功: 用户 {user.mobile} (App: {req.app_id})")
  701. return {
  702. "valid": True,
  703. "user_id": user.id,
  704. "mobile": user.mobile,
  705. "mapped_key": mapped_key,
  706. "mapped_email": mapped_email
  707. }
  708. @router.get("/sso/jump", summary="通知跳转 SSO")
  709. def sso_jump(
  710. app_id: str, # 应用 ID
  711. redirect_to: str, # 最终目标页面
  712. request: Request,
  713. db: Session = Depends(deps.get_db),
  714. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  715. ):
  716. """
  717. 用于消息通知的 SSO 跳转接口。
  718. """
  719. # 1. 检查应用是否存在
  720. app = db.query(Application).filter(Application.app_id == app_id).first()
  721. if not app:
  722. raise HTTPException(status_code=404, detail="应用未找到")
  723. # 2. 检查用户是否登录
  724. if not current_user:
  725. # 未登录 -> 跳转到统一登录页
  726. # 假设前端部署在 HTTP_REFERER 或配置的 FRONTEND_HOST (暂用相对路径)
  727. login_page = "/login"
  728. params = {"redirect": str(request.url)}
  729. return RedirectResponse(f"{login_page}?{urlencode(params)}")
  730. # 3. 用户已登录 -> 生成 Ticket
  731. ticket = TicketService.generate_ticket(current_user.id, app_id)
  732. # 4. 获取应用回调地址
  733. redirect_base = ""
  734. if app.redirect_uris:
  735. try:
  736. uris = json.loads(app.redirect_uris)
  737. if isinstance(uris, list) and len(uris) > 0:
  738. redirect_base = uris[0]
  739. elif isinstance(uris, str):
  740. redirect_base = uris
  741. except:
  742. redirect_base = app.redirect_uris.strip()
  743. if not redirect_base:
  744. raise HTTPException(status_code=400, detail="应用未配置回调地址")
  745. # 5. 构造最终跳转 URL
  746. parsed_uri = urlparse(redirect_base)
  747. query_params = parse_qs(parsed_uri.query)
  748. query_params['ticket'] = [ticket]
  749. query_params['next'] = [redirect_to]
  750. new_query = urlencode(query_params, doseq=True)
  751. full_redirect_url = urlunparse((
  752. parsed_uri.scheme,
  753. parsed_uri.netloc,
  754. parsed_uri.path,
  755. parsed_uri.params,
  756. new_query,
  757. parsed_uri.fragment
  758. ))
  759. return RedirectResponse(full_redirect_url)