simple_auth.py 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898
  1. from typing import Optional, List
  2. import json
  3. from datetime import timedelta
  4. import logging
  5. from fastapi import APIRouter, Depends, HTTPException, Body, Request
  6. from fastapi.responses import RedirectResponse
  7. from sqlalchemy.orm import Session
  8. from pydantic import BaseModel
  9. from urllib.parse import urlencode, urlparse, parse_qs, urlunparse
  10. from app.api.v1 import deps
  11. from app.core import security
  12. from app.core.config import settings
  13. from app.core.utils import generate_english_name, get_client_ip
  14. from app.core.cache import redis_client
  15. from app.models.user import User, UserRole, UserStatus
  16. from app.models.application import Application, ProtocolType
  17. from app.models.mapping import AppUserMapping
  18. from app.schemas.simple_auth import (
  19. TicketExchangeRequest, TicketExchangeResponse,
  20. TicketValidateRequest, TicketValidateResponse,
  21. PasswordLoginRequest, PasswordLoginResponse,
  22. SmsLoginRequest,
  23. UserRegisterRequest, AdminPasswordResetRequest, AdminPasswordResetResponse,
  24. ChangePasswordRequest, MyMappingsResponse, UserMappingResponse,
  25. UserPromoteRequest, SsoLoginRequest, SsoLoginResponse,
  26. LaunchpadAppsResponse, LaunchpadAppResponse
  27. )
  28. from app.services.signature_service import SignatureService
  29. from app.services.ticket_service import TicketService
  30. from app.services.log_service import LogService
  31. from app.services.login_log_service import LoginLogService
  32. from app.services.system_config_service import SystemConfigService
  33. from app.schemas.operation_log import ActionType
  34. from app.schemas.login_log import LoginLogCreate, LoginMethod, AuthType
  35. router = APIRouter()
  36. logger = logging.getLogger(__name__)
  37. @router.post("/login", response_model=PasswordLoginResponse, summary="密码登录")
  38. def login_with_password(
  39. req: PasswordLoginRequest,
  40. request: Request,
  41. db: Session = Depends(deps.get_db),
  42. ):
  43. """
  44. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  45. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  46. """
  47. # --- Platform Login ---
  48. if not req.app_id:
  49. # Prepare Log
  50. log_create = LoginLogCreate(
  51. mobile=req.identifier,
  52. ip_address=get_client_ip(request),
  53. login_method=LoginMethod.UNIFIED_PAGE,
  54. auth_type=AuthType.PASSWORD,
  55. user_agent=request.headers.get("user-agent")
  56. )
  57. # Find user by mobile only
  58. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  59. if not user:
  60. log_create.is_success = 0
  61. log_create.failure_reason = "用户未找到"
  62. LoginLogService.create_log(db, log_create)
  63. logger.warning(f"平台登录失败: 用户 {req.identifier} 未找到")
  64. raise HTTPException(status_code=404, detail="用户未找到")
  65. log_create.user_id = user.id
  66. is_valid = security.verify_password(req.password, user.password_hash)
  67. if not is_valid:
  68. logger.warning(f"平台登录失败: 用户 {user.mobile} 密码错误")
  69. log_create.is_success = 0
  70. log_create.failure_reason = "密码错误"
  71. LoginLogService.create_log(db, log_create)
  72. raise HTTPException(status_code=401, detail="密码错误")
  73. if user.status != UserStatus.ACTIVE:
  74. logger.warning(f"平台登录失败: 用户 {user.mobile} 已被禁用")
  75. log_create.is_success = 0
  76. log_create.failure_reason = "用户已禁用"
  77. LoginLogService.create_log(db, log_create)
  78. raise HTTPException(status_code=400, detail="用户已禁用")
  79. # Generate JWT Access Token
  80. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  81. if req.remember_me:
  82. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES_LONG)
  83. access_token = security.create_access_token(
  84. user.id,
  85. expires_delta=access_token_expires,
  86. is_long_term=req.remember_me
  87. )
  88. # Log Success
  89. LoginLogService.create_log(db, log_create)
  90. logger.info(f"平台登录成功: 用户 {user.mobile} (ID: {user.id})")
  91. return {
  92. "access_token": access_token,
  93. "token_type": "bearer",
  94. "role": user.role
  95. }
  96. # --- App SSO Login ---
  97. log_create = LoginLogCreate(
  98. mobile=req.identifier,
  99. ip_address=get_client_ip(request),
  100. login_method=LoginMethod.CUSTOM_PAGE, # 假设应用自定义页面调用此接口
  101. auth_type=AuthType.PASSWORD,
  102. user_agent=request.headers.get("user-agent")
  103. )
  104. # 1. Verify App
  105. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  106. if not app:
  107. log_create.is_success = 0
  108. log_create.failure_reason = "应用未找到"
  109. LoginLogService.create_log(db, log_create)
  110. logger.warning(f"应用登录失败: 应用ID {req.app_id} 未找到")
  111. raise HTTPException(status_code=404, detail="应用未找到")
  112. # 2. Verify Signature (Optional but recommended for server-side calls)
  113. if req.sign and req.timestamp:
  114. params = {
  115. "app_id": req.app_id,
  116. "identifier": req.identifier,
  117. "password": req.password,
  118. "timestamp": req.timestamp,
  119. "sign": req.sign
  120. }
  121. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  122. log_create.is_success = 0
  123. log_create.failure_reason = "签名无效"
  124. LoginLogService.create_log(db, log_create)
  125. logger.warning(f"应用登录失败: 应用 {req.app_id} 签名验证失败")
  126. raise HTTPException(status_code=400, detail="签名无效")
  127. # 3. Find User
  128. user = None
  129. # Auto-trim password to prevent common copy-paste errors
  130. if req.password:
  131. req.password = req.password.strip()
  132. # Try by mobile
  133. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  134. if not user:
  135. # Try by mapping
  136. mapping = db.query(AppUserMapping).filter(
  137. AppUserMapping.app_id == app.id,
  138. (AppUserMapping.mapped_key == req.identifier) | (AppUserMapping.mapped_email == req.identifier)
  139. ).first()
  140. if mapping:
  141. user = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  142. if not user:
  143. log_create.is_success = 0
  144. log_create.failure_reason = "用户未找到"
  145. LoginLogService.create_log(db, log_create)
  146. logger.warning(f"应用登录失败: 用户 {req.identifier} 在应用 {req.app_id} 中未找到")
  147. raise HTTPException(status_code=404, detail="用户未找到")
  148. log_create.user_id = user.id
  149. if user.status != UserStatus.ACTIVE:
  150. log_create.is_success = 0
  151. log_create.failure_reason = "用户已禁用"
  152. LoginLogService.create_log(db, log_create)
  153. logger.warning(f"应用登录失败: 用户 {user.mobile} 已被禁用")
  154. raise HTTPException(status_code=400, detail="用户已禁用")
  155. # 4. Verify Password
  156. # DEBUG: Log password verification details
  157. is_valid = security.verify_password(req.password, user.password_hash)
  158. if not is_valid:
  159. logger.warning(f"应用登录失败: 用户 {user.mobile} 密码验证失败 (App: {req.app_id})")
  160. log_create.is_success = 0
  161. log_create.failure_reason = "密码错误"
  162. LoginLogService.create_log(db, log_create)
  163. raise HTTPException(status_code=401, detail="密码错误")
  164. # 5. Generate Ticket (Self-Targeting)
  165. ticket = TicketService.generate_ticket(user.id, req.app_id)
  166. # Log Success (AuthType is PASSWORD leading to TICKET generation, keeping PASSWORD is fine or TICKET)
  167. # User requirement: "包括...认证方式". Here the auth method was PASSWORD.
  168. LoginLogService.create_log(db, log_create)
  169. logger.info(f"应用登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  170. return {"ticket": ticket}
  171. @router.post("/sms-login", response_model=PasswordLoginResponse, summary="短信验证码登录")
  172. def login_with_sms(
  173. req: SmsLoginRequest,
  174. request: Request,
  175. db: Session = Depends(deps.get_db),
  176. ):
  177. """
  178. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  179. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  180. """
  181. # 0. Check Config (Assuming PC enabled for API access, or check both)
  182. # Since this is an API used by external apps (likely web), we default to checking PC config
  183. # or we can check if EITHER is enabled.
  184. pc_enabled = SystemConfigService.get_config(db, "sms_login_pc_enabled")
  185. mobile_enabled = SystemConfigService.get_config(db, "sms_login_mobile_enabled")
  186. if pc_enabled != "true" and mobile_enabled != "true":
  187. logger.warning("短信登录尝试失败: 短信登录功能未开启")
  188. raise HTTPException(status_code=403, detail="短信登录功能未开启")
  189. # --- Platform Login ---
  190. if not req.app_id:
  191. # Prepare Log
  192. log_create = LoginLogCreate(
  193. mobile=req.mobile,
  194. ip_address=get_client_ip(request),
  195. login_method=LoginMethod.UNIFIED_PAGE,
  196. auth_type=AuthType.SMS,
  197. user_agent=request.headers.get("user-agent")
  198. )
  199. # 1. Verify Code
  200. key = f"SMS:{req.mobile}"
  201. stored_code = redis_client.get(key)
  202. if not stored_code or stored_code != req.code:
  203. log_create.is_success = 0
  204. log_create.failure_reason = "验证码错误或已过期"
  205. LoginLogService.create_log(db, log_create)
  206. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 验证码无效")
  207. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  208. # 2. Find user
  209. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  210. if not user:
  211. log_create.is_success = 0
  212. log_create.failure_reason = "用户未找到"
  213. LoginLogService.create_log(db, log_create)
  214. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 未注册")
  215. raise HTTPException(status_code=404, detail="用户未找到")
  216. log_create.user_id = user.id
  217. if user.status != UserStatus.ACTIVE:
  218. log_create.is_success = 0
  219. log_create.failure_reason = "用户已禁用"
  220. LoginLogService.create_log(db, log_create)
  221. logger.warning(f"平台短信登录失败: 用户 {user.mobile} 已被禁用")
  222. raise HTTPException(status_code=400, detail="用户已禁用")
  223. # 3. Generate JWT Access Token
  224. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  225. access_token = security.create_access_token(
  226. user.id,
  227. expires_delta=access_token_expires
  228. )
  229. # Clear Code
  230. redis_client.delete(key)
  231. # Log Success
  232. LoginLogService.create_log(db, log_create)
  233. logger.info(f"平台短信登录成功: 用户 {user.mobile} (ID: {user.id})")
  234. return {
  235. "access_token": access_token,
  236. "token_type": "bearer",
  237. "role": user.role
  238. }
  239. # --- App SSO Login ---
  240. log_create = LoginLogCreate(
  241. mobile=req.mobile,
  242. ip_address=get_client_ip(request),
  243. login_method=LoginMethod.CUSTOM_PAGE,
  244. auth_type=AuthType.SMS,
  245. user_agent=request.headers.get("user-agent")
  246. )
  247. # 1. Verify App
  248. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  249. if not app:
  250. log_create.is_success = 0
  251. log_create.failure_reason = "应用未找到"
  252. LoginLogService.create_log(db, log_create)
  253. logger.warning(f"应用短信登录失败: 应用ID {req.app_id} 未找到")
  254. raise HTTPException(status_code=404, detail="应用未找到")
  255. # 2. Verify Signature (Optional)
  256. if req.sign and req.timestamp:
  257. params = {
  258. "app_id": req.app_id,
  259. "mobile": req.mobile,
  260. "code": req.code,
  261. "timestamp": req.timestamp,
  262. "sign": req.sign
  263. }
  264. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  265. log_create.is_success = 0
  266. log_create.failure_reason = "签名无效"
  267. LoginLogService.create_log(db, log_create)
  268. logger.warning(f"应用短信登录失败: 应用 {req.app_id} 签名无效")
  269. raise HTTPException(status_code=400, detail="签名无效")
  270. # 3. Verify Code
  271. key = f"SMS:{req.mobile}"
  272. stored_code = redis_client.get(key)
  273. if not stored_code or stored_code != req.code:
  274. log_create.is_success = 0
  275. log_create.failure_reason = "验证码错误或已过期"
  276. LoginLogService.create_log(db, log_create)
  277. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 验证码无效")
  278. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  279. # 4. Find User
  280. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  281. if not user:
  282. log_create.is_success = 0
  283. log_create.failure_reason = "用户未找到"
  284. LoginLogService.create_log(db, log_create)
  285. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 未注册")
  286. raise HTTPException(status_code=404, detail="用户未找到")
  287. log_create.user_id = user.id
  288. if user.status != UserStatus.ACTIVE:
  289. log_create.is_success = 0
  290. log_create.failure_reason = "用户已禁用"
  291. LoginLogService.create_log(db, log_create)
  292. logger.warning(f"应用短信登录失败: 用户 {user.mobile} 已被禁用")
  293. raise HTTPException(status_code=400, detail="用户已禁用")
  294. # 5. Generate Ticket (Self-Targeting)
  295. ticket = TicketService.generate_ticket(user.id, req.app_id)
  296. # Clear Code
  297. redis_client.delete(key)
  298. # Log Success
  299. LoginLogService.create_log(db, log_create)
  300. logger.info(f"应用短信登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  301. return {"ticket": ticket}
  302. @router.post("/register", response_model=PasswordLoginResponse, summary="用户注册")
  303. def register_user(
  304. req: UserRegisterRequest,
  305. db: Session = Depends(deps.get_db),
  306. ):
  307. """
  308. 注册新用户 (默认为普通用户)。
  309. """
  310. # Force role to ORDINARY_USER
  311. role = UserRole.ORDINARY_USER
  312. # Auto-login after registration (return token)
  313. if req.password:
  314. req.password = req.password.strip()
  315. if not security.validate_password_strength(req.password):
  316. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  317. existing_user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  318. if existing_user:
  319. logger.info(f"用户注册失败: 手机号 {req.mobile} 已存在")
  320. raise HTTPException(status_code=400, detail="手机号已注册")
  321. english_name = generate_english_name(req.name)
  322. new_user = User(
  323. mobile=req.mobile,
  324. name=req.name,
  325. english_name=english_name,
  326. password_hash=security.get_password_hash(req.password),
  327. status=UserStatus.ACTIVE,
  328. role=role
  329. )
  330. db.add(new_user)
  331. db.commit()
  332. db.refresh(new_user)
  333. logger.info(f"用户注册成功: {req.mobile} (ID: {new_user.id})")
  334. # Auto-login after registration (return token)
  335. access_token = security.create_access_token(new_user.id)
  336. return {
  337. "access_token": access_token,
  338. "token_type": "bearer",
  339. "role": new_user.role
  340. }
  341. @router.post("/admin/reset-password", response_model=AdminPasswordResetResponse, summary="管理员重置密码")
  342. def admin_reset_password(
  343. req: AdminPasswordResetRequest,
  344. request: Request,
  345. db: Session = Depends(deps.get_db),
  346. current_user: User = Depends(deps.get_current_active_user),
  347. ):
  348. """
  349. 超级管理员重置用户密码。
  350. 随机生成8位密码,只显示一次。
  351. """
  352. if current_user.role != UserRole.SUPER_ADMIN:
  353. raise HTTPException(status_code=403, detail="权限不足")
  354. # Verify Admin Password
  355. if not security.verify_password(req.admin_password, current_user.password_hash):
  356. logger.warning(f"管理员重置密码失败: 管理员 {current_user.mobile} 密码验证错误")
  357. raise HTTPException(status_code=401, detail="管理员密码错误")
  358. target_user = db.query(User).filter(User.id == req.user_id).first()
  359. if not target_user:
  360. raise HTTPException(status_code=404, detail="用户未找到")
  361. # Generate random password (alphanumeric only)
  362. new_pwd = security.generate_alphanumeric_password(8)
  363. target_user.password_hash = security.get_password_hash(new_pwd)
  364. db.add(target_user)
  365. db.commit()
  366. # Log Operation
  367. LogService.create_log(
  368. db=db,
  369. operator_id=current_user.id,
  370. action_type=ActionType.RESET_PASSWORD,
  371. target_user_id=target_user.id,
  372. target_mobile=target_user.mobile,
  373. ip_address=get_client_ip(request),
  374. details={}
  375. )
  376. logger.info(f"管理员重置用户密码成功: 目标用户 {target_user.mobile} (ID: {target_user.id})")
  377. return {"new_password": new_pwd}
  378. @router.post("/admin/promote", summary="提升用户角色")
  379. def promote_user(
  380. req: UserPromoteRequest,
  381. db: Session = Depends(deps.get_db),
  382. current_user: User = Depends(deps.get_current_active_user),
  383. ):
  384. if current_user.role != UserRole.SUPER_ADMIN:
  385. raise HTTPException(status_code=403, detail="权限不足")
  386. if req.new_role not in [UserRole.SUPER_ADMIN, UserRole.DEVELOPER]:
  387. raise HTTPException(status_code=400, detail="只能提升为管理员 or 开发者")
  388. target_user = db.query(User).filter(User.id == req.user_id).first()
  389. if not target_user:
  390. raise HTTPException(status_code=404, detail="用户未找到")
  391. old_role = target_user.role
  392. target_user.role = req.new_role
  393. db.add(target_user)
  394. db.commit()
  395. logger.info(f"用户角色变更: 用户 {target_user.mobile} 从 {old_role} 变更为 {req.new_role} (操作者: {current_user.mobile})")
  396. return {"message": "success"}
  397. @router.get("/me/mappings", response_model=MyMappingsResponse, summary="我的映射")
  398. def get_my_mappings(
  399. skip: int = 0,
  400. limit: int = 10,
  401. app_name: str = None,
  402. db: Session = Depends(deps.get_db),
  403. current_user: User = Depends(deps.get_current_active_user),
  404. ):
  405. query = db.query(AppUserMapping).join(Application).filter(AppUserMapping.user_id == current_user.id)
  406. if app_name:
  407. query = query.filter(Application.app_name.ilike(f"%{app_name}%"))
  408. total = query.count()
  409. mappings = query.order_by(AppUserMapping.id.desc()).offset(skip).limit(limit).all()
  410. result = []
  411. for m in mappings:
  412. result.append(UserMappingResponse(
  413. app_name=m.application.app_name if m.application else "Unknown",
  414. app_id=m.application.app_id if m.application else "",
  415. protocol_type=m.application.protocol_type if m.application else "",
  416. mapped_key=m.mapped_key,
  417. mapped_email=m.mapped_email,
  418. is_active=m.is_active
  419. ))
  420. return {"total": total, "items": result}
  421. @router.get("/me/launchpad-apps", response_model=LaunchpadAppsResponse, summary="快捷导航应用列表")
  422. def get_launchpad_apps(
  423. db: Session = Depends(deps.get_db),
  424. current_user: User = Depends(deps.get_current_active_user),
  425. ):
  426. """
  427. 获取当前用户的快捷导航应用列表(包含分类和描述)
  428. 仅返回已激活且协议类型为 SIMPLE_API 或 OIDC 的应用
  429. """
  430. from app.models.app_category import AppCategory
  431. # 查询用户的应用映射,join Application 和 AppCategory
  432. query = (
  433. db.query(AppUserMapping)
  434. .join(Application, AppUserMapping.app_id == Application.id)
  435. .outerjoin(AppCategory, Application.category_id == AppCategory.id)
  436. .filter(
  437. AppUserMapping.user_id == current_user.id,
  438. AppUserMapping.is_active == True,
  439. Application.protocol_type.in_([ProtocolType.SIMPLE_API, ProtocolType.OIDC]),
  440. Application.is_deleted == False
  441. )
  442. )
  443. mappings = query.order_by(Application.category_id.asc(), Application.app_name.asc()).all()
  444. result = []
  445. for m in mappings:
  446. app = m.application
  447. result.append(LaunchpadAppResponse(
  448. app_name=app.app_name if app else "Unknown",
  449. app_id=app.app_id if app else "",
  450. protocol_type=app.protocol_type.value if app else "",
  451. mapped_key=m.mapped_key,
  452. mapped_email=m.mapped_email,
  453. is_active=m.is_active,
  454. description=app.description if app else None,
  455. category_id=app.category_id if app else None,
  456. category_name=app.category.name if app and app.category else None
  457. ))
  458. return {"total": len(result), "items": result}
  459. @router.post("/me/change-password", summary="修改密码")
  460. def change_my_password(
  461. req: ChangePasswordRequest,
  462. db: Session = Depends(deps.get_db),
  463. current_user: User = Depends(deps.get_current_active_user),
  464. ):
  465. if not security.verify_password(req.old_password, current_user.password_hash):
  466. logger.warning(f"用户修改密码失败: 用户 {current_user.mobile} 旧密码验证错误")
  467. raise HTTPException(status_code=400, detail="旧密码错误")
  468. if req.new_password:
  469. req.new_password = req.new_password.strip()
  470. if not security.validate_password_strength(req.new_password):
  471. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  472. current_user.password_hash = security.get_password_hash(req.new_password)
  473. db.add(current_user)
  474. db.commit()
  475. logger.info(f"用户修改密码成功: {current_user.mobile}")
  476. return {"message": "密码修改成功"}
  477. @router.post("/exchange", response_model=TicketExchangeResponse, summary="票据交换")
  478. def exchange_ticket(
  479. req: TicketExchangeRequest,
  480. db: Session = Depends(deps.get_db),
  481. ):
  482. """
  483. 源应用调用以获取目标应用的票据。
  484. """
  485. # 1. Verify Source App
  486. source_app = db.query(Application).filter(Application.app_id == req.app_id).first()
  487. if not source_app:
  488. logger.warning(f"票据交换失败: 源应用 {req.app_id} 未找到")
  489. raise HTTPException(status_code=404, detail="源应用未找到")
  490. # 2. Verify Signature
  491. params = {
  492. "app_id": req.app_id,
  493. "target_app_id": req.target_app_id,
  494. "user_mobile": req.user_mobile,
  495. "timestamp": req.timestamp,
  496. "sign": req.sign
  497. }
  498. # Use the stored secret to verify
  499. if not SignatureService.verify_signature(source_app.app_secret, params, req.sign):
  500. logger.warning(f"票据交换失败: 源应用 {req.app_id} 签名无效")
  501. raise HTTPException(status_code=400, detail="签名无效")
  502. # 3. Verify User Existence (Optional: Do we trust source app completely? Usually yes if signed.)
  503. # But we need user_id to generate ticket.
  504. # We query by mobile.
  505. user = db.query(User).filter(User.mobile == req.user_mobile, User.is_deleted == 0).first()
  506. if not user:
  507. # If user doesn't exist, we might auto-create OR fail.
  508. # Requirement: "Returns redirect_url".
  509. # For simplicity, if user not found, we cannot map.
  510. logger.warning(f"票据交换失败: 用户 {req.user_mobile} 未找到")
  511. raise HTTPException(status_code=404, detail="用户在 UAP 中未找到")
  512. # 4. Generate Ticket for Target App
  513. # Logic: The ticket allows the user to log in to Target App.
  514. ticket = TicketService.generate_ticket(user.id, req.target_app_id)
  515. # 5. Get Target App URL
  516. target_app = db.query(Application).filter(Application.app_id == req.target_app_id).first()
  517. if not target_app:
  518. logger.warning(f"票据交换失败: 目标应用 {req.target_app_id} 未找到")
  519. raise HTTPException(status_code=404, detail="目标应用未找到")
  520. # Construct redirect URL
  521. # Assuming target app handles /callback?ticket=...
  522. # We use the first redirect_uri or notification_url or custom logic.
  523. # Simplicity: We return the ticket and let the Source App handle the redirect,
  524. # OR we return a full redirect URL if target_app has a base URL configured.
  525. # Let's assume redirect_uris is a JSON list.
  526. redirect_base = ""
  527. if target_app.redirect_uris:
  528. try:
  529. # 尝试作为 JSON 数组解析
  530. uris = json.loads(target_app.redirect_uris)
  531. if isinstance(uris, list) and len(uris) > 0:
  532. redirect_base = uris[0]
  533. elif isinstance(uris, str):
  534. redirect_base = uris
  535. except (json.JSONDecodeError, TypeError):
  536. # 如果不是 JSON 格式,直接作为字符串使用
  537. redirect_base = target_app.redirect_uris.strip()
  538. if not redirect_base:
  539. # Fallback or error
  540. redirect_base = "http://unknown-target-url"
  541. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  542. logger.info(f"票据交换成功: 用户 {req.user_mobile} 从 {req.app_id} -> {req.target_app_id}")
  543. return {
  544. "ticket": ticket,
  545. "redirect_url": full_redirect_url
  546. }
  547. @router.post("/sso-login", response_model=SsoLoginResponse, summary="SSO 登录")
  548. def sso_login(
  549. req: SsoLoginRequest,
  550. request: Request,
  551. db: Session = Depends(deps.get_db),
  552. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  553. ):
  554. """
  555. SSO 登录入口,支持:
  556. - SIMPLE_API 应用:返回带有 Ticket 的业务系统重定向 URL
  557. - OIDC 应用:直接返回回调地址
  558. 前端只需要拿到 redirect_url 后跳转即可。
  559. """
  560. # 1. Verify App
  561. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  562. # Prepare Log
  563. log_create = LoginLogCreate(
  564. ip_address=get_client_ip(request),
  565. login_method=LoginMethod.DIRECT_JUMP,
  566. auth_type=AuthType.SSO,
  567. user_agent=request.headers.get("user-agent"),
  568. mobile=req.username
  569. )
  570. if not app:
  571. log_create.is_success = 0
  572. log_create.failure_reason = "应用未找到"
  573. LoginLogService.create_log(db, log_create)
  574. logger.warning(f"SSO登录失败: 应用 {req.app_id} 未找到")
  575. raise HTTPException(status_code=404, detail="应用未找到")
  576. # 仅支持 SIMPLE_API 与 OIDC,其它协议直接拒绝
  577. if app.protocol_type not in ("SIMPLE_API", "OIDC"):
  578. log_create.is_success = 0
  579. log_create.failure_reason = "协议不支持"
  580. LoginLogService.create_log(db, log_create)
  581. logger.warning(
  582. f"SSO登录失败: 应用 {req.app_id} 协议类型不支持 ({app.protocol_type})"
  583. )
  584. raise HTTPException(status_code=400, detail="协议类型不支持该 SSO 登录方式")
  585. user = None
  586. # 2. Try Session Login first
  587. if current_user:
  588. user = current_user
  589. log_create.user_id = user.id
  590. log_create.mobile = user.mobile
  591. log_create.auth_type = AuthType.TOKEN # Used existing session
  592. # 3. If no session, try Credentials Login
  593. if not user and req.username and req.password:
  594. log_create.auth_type = AuthType.PASSWORD
  595. # Verify User Credentials
  596. user_query = db.query(User).filter(User.mobile == req.username, User.is_deleted == 0).first()
  597. if not user_query:
  598. # Check mapping
  599. mapping = db.query(AppUserMapping).filter(
  600. AppUserMapping.app_id == app.id,
  601. (AppUserMapping.mapped_key == req.username) | (AppUserMapping.mapped_email == req.username)
  602. ).first()
  603. if mapping:
  604. user_query = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  605. if user_query and security.verify_password(req.password, user_query.password_hash):
  606. user = user_query
  607. log_create.user_id = user.id
  608. if not user:
  609. log_create.is_success = 0
  610. log_create.failure_reason = "认证失败"
  611. LoginLogService.create_log(db, log_create)
  612. logger.warning(f"SSO登录失败: 用户认证失败 (Username: {req.username})")
  613. raise HTTPException(status_code=401, detail="认证失败")
  614. if user.status != "ACTIVE":
  615. log_create.is_success = 0
  616. log_create.failure_reason = "用户已禁用"
  617. LoginLogService.create_log(db, log_create)
  618. logger.warning(f"SSO登录失败: 用户 {user.mobile} 已被禁用")
  619. raise HTTPException(status_code=400, detail="用户已禁用")
  620. # 4. 解析重定向基础地址(SIMPLE_API 与 OIDC 都会用到)
  621. redirect_base = ""
  622. if app.redirect_uris:
  623. try:
  624. # 尝试作为 JSON 数组解析
  625. uris = json.loads(app.redirect_uris)
  626. if isinstance(uris, list) and len(uris) > 0:
  627. redirect_base = uris[0]
  628. elif isinstance(uris, str):
  629. redirect_base = uris
  630. except (json.JSONDecodeError, TypeError):
  631. # 如果不是 JSON 格式,直接作为字符串使用
  632. redirect_base = app.redirect_uris.strip()
  633. if not redirect_base:
  634. logger.error(f"SSO登录配置错误: 应用 {req.app_id} 未配置回调地址")
  635. raise HTTPException(status_code=400, detail="应用未配置重定向 URI")
  636. # 5. 根据协议类型构造最终 redirect_url
  637. if app.protocol_type == "SIMPLE_API":
  638. # 5.1 SIMPLE_API: 生成 Ticket,拼接到业务系统回调地址上
  639. ticket = TicketService.generate_ticket(user.id, req.app_id)
  640. LoginLogService.create_log(db, log_create)
  641. logger.info(f"SSO登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  642. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  643. return {"redirect_url": full_redirect_url}
  644. if app.protocol_type == "OIDC":
  645. # 5.2 OIDC: 直接跳转到回调地址(只保留到端口为止,去掉路径部分)
  646. # 例如:https://api.hnyunzhu.com:9003/oauth_callback -> https://api.hnyunzhu.com:9003
  647. parsed_uri = urlparse(redirect_base)
  648. # 只保留 scheme 和 netloc(包含端口),去掉 path、params、query、fragment
  649. redirect_url = f"{parsed_uri.scheme}://{parsed_uri.netloc}"
  650. LoginLogService.create_log(db, log_create)
  651. logger.info(
  652. f"OIDC SSO 登录成功: 用户 {user.mobile} 将跳转到回调地址 (App: {req.app_id}, URL: {redirect_url})"
  653. )
  654. return {"redirect_url": redirect_url}
  655. # 理论上不会走到这里,防御性返回
  656. logger.error(
  657. f"SSO登录异常: 未处理的协议类型 {app.protocol_type} (App: {req.app_id})"
  658. )
  659. raise HTTPException(status_code=500, detail="未处理的协议类型")
  660. @router.post("/validate", response_model=TicketValidateResponse, summary="验证票据")
  661. def validate_ticket(
  662. req: TicketValidateRequest,
  663. db: Session = Depends(deps.get_db),
  664. ):
  665. """
  666. 目标应用调用以消费票据。
  667. """
  668. # 1. Verify App
  669. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  670. if not app:
  671. logger.warning(f"票据验证失败: 应用 {req.app_id} 未找到")
  672. raise HTTPException(status_code=404, detail="应用未找到")
  673. # 2. Verify Signature
  674. params = {
  675. "ticket": req.ticket,
  676. "app_id": req.app_id,
  677. "timestamp": req.timestamp,
  678. "sign": req.sign
  679. }
  680. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  681. logger.warning(f"票据验证失败: 应用 {req.app_id} 签名无效")
  682. raise HTTPException(status_code=400, detail="签名无效")
  683. # 3. Consume Ticket
  684. ticket_data = TicketService.consume_ticket(req.ticket, req.app_id)
  685. if not ticket_data:
  686. logger.warning(f"票据验证失败: Ticket 无效或已过期 (App: {req.app_id})")
  687. return {"valid": False}
  688. user_id = ticket_data["user_id"]
  689. # 4. Get User Info & Mapping
  690. user = db.query(User).filter(User.id == user_id).first()
  691. mapping = db.query(AppUserMapping).filter(
  692. AppUserMapping.app_id == app.id,
  693. AppUserMapping.user_id == user_id
  694. ).first()
  695. mapped_key = mapping.mapped_key if mapping else None
  696. mapped_email = mapping.mapped_email if mapping else None
  697. logger.info(f"票据验证成功: 用户 {user.mobile} (App: {req.app_id})")
  698. return {
  699. "valid": True,
  700. "user_id": user.id,
  701. "mobile": user.mobile,
  702. "mapped_key": mapped_key,
  703. "mapped_email": mapped_email
  704. }
  705. @router.get("/sso/jump", summary="通知跳转 SSO")
  706. def sso_jump(
  707. app_id: str, # 应用 ID
  708. redirect_to: str, # 最终目标页面
  709. request: Request,
  710. db: Session = Depends(deps.get_db),
  711. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  712. ):
  713. """
  714. 用于消息通知的 SSO 跳转接口。
  715. """
  716. # 1. 检查应用是否存在
  717. app = db.query(Application).filter(Application.app_id == app_id).first()
  718. if not app:
  719. raise HTTPException(status_code=404, detail="应用未找到")
  720. # 2. 检查用户是否登录
  721. if not current_user:
  722. # 未登录 -> 跳转到统一登录页
  723. # 假设前端部署在 HTTP_REFERER 或配置的 FRONTEND_HOST (暂用相对路径)
  724. login_page = "/login"
  725. params = {"redirect": str(request.url)}
  726. return RedirectResponse(f"{login_page}?{urlencode(params)}")
  727. # 3. 用户已登录 -> 生成 Ticket
  728. ticket = TicketService.generate_ticket(current_user.id, app_id)
  729. # 4. 获取应用回调地址
  730. redirect_base = ""
  731. if app.redirect_uris:
  732. try:
  733. uris = json.loads(app.redirect_uris)
  734. if isinstance(uris, list) and len(uris) > 0:
  735. redirect_base = uris[0]
  736. elif isinstance(uris, str):
  737. redirect_base = uris
  738. except:
  739. redirect_base = app.redirect_uris.strip()
  740. if not redirect_base:
  741. raise HTTPException(status_code=400, detail="应用未配置回调地址")
  742. # 5. 构造最终跳转 URL
  743. parsed_uri = urlparse(redirect_base)
  744. query_params = parse_qs(parsed_uri.query)
  745. query_params['ticket'] = [ticket]
  746. query_params['next'] = [redirect_to]
  747. new_query = urlencode(query_params, doseq=True)
  748. full_redirect_url = urlunparse((
  749. parsed_uri.scheme,
  750. parsed_uri.netloc,
  751. parsed_uri.path,
  752. parsed_uri.params,
  753. new_query,
  754. parsed_uri.fragment
  755. ))
  756. return RedirectResponse(full_redirect_url)