simple_auth.py 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854
  1. from typing import Optional, List
  2. import json
  3. from datetime import timedelta
  4. import logging
  5. from fastapi import APIRouter, Depends, HTTPException, Body, Request
  6. from fastapi.responses import RedirectResponse
  7. from sqlalchemy.orm import Session
  8. from pydantic import BaseModel
  9. from urllib.parse import urlencode, urlparse, parse_qs, urlunparse
  10. from app.api.v1 import deps
  11. from app.core import security
  12. from app.core.config import settings
  13. from app.core.utils import generate_english_name, get_client_ip
  14. from app.core.cache import redis_client
  15. from app.models.user import User, UserRole, UserStatus
  16. from app.models.application import Application
  17. from app.models.mapping import AppUserMapping
  18. from app.schemas.simple_auth import (
  19. TicketExchangeRequest, TicketExchangeResponse,
  20. TicketValidateRequest, TicketValidateResponse,
  21. PasswordLoginRequest, PasswordLoginResponse,
  22. SmsLoginRequest,
  23. UserRegisterRequest, AdminPasswordResetRequest, AdminPasswordResetResponse,
  24. ChangePasswordRequest, MyMappingsResponse, UserMappingResponse,
  25. UserPromoteRequest, SsoLoginRequest, SsoLoginResponse
  26. )
  27. from app.services.signature_service import SignatureService
  28. from app.services.ticket_service import TicketService
  29. from app.services.log_service import LogService
  30. from app.services.login_log_service import LoginLogService
  31. from app.services.system_config_service import SystemConfigService
  32. from app.schemas.operation_log import ActionType
  33. from app.schemas.login_log import LoginLogCreate, LoginMethod, AuthType
  34. router = APIRouter()
  35. logger = logging.getLogger(__name__)
  36. @router.post("/login", response_model=PasswordLoginResponse, summary="密码登录")
  37. def login_with_password(
  38. req: PasswordLoginRequest,
  39. request: Request,
  40. db: Session = Depends(deps.get_db),
  41. ):
  42. """
  43. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  44. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  45. """
  46. # --- Platform Login ---
  47. if not req.app_id:
  48. # Prepare Log
  49. log_create = LoginLogCreate(
  50. mobile=req.identifier,
  51. ip_address=get_client_ip(request),
  52. login_method=LoginMethod.UNIFIED_PAGE,
  53. auth_type=AuthType.PASSWORD,
  54. user_agent=request.headers.get("user-agent")
  55. )
  56. # Find user by mobile only
  57. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  58. if not user:
  59. log_create.is_success = 0
  60. log_create.failure_reason = "用户未找到"
  61. LoginLogService.create_log(db, log_create)
  62. logger.warning(f"平台登录失败: 用户 {req.identifier} 未找到")
  63. raise HTTPException(status_code=404, detail="用户未找到")
  64. log_create.user_id = user.id
  65. is_valid = security.verify_password(req.password, user.password_hash)
  66. if not is_valid:
  67. logger.warning(f"平台登录失败: 用户 {user.mobile} 密码错误")
  68. log_create.is_success = 0
  69. log_create.failure_reason = "密码错误"
  70. LoginLogService.create_log(db, log_create)
  71. raise HTTPException(status_code=401, detail="密码错误")
  72. if user.status != UserStatus.ACTIVE:
  73. logger.warning(f"平台登录失败: 用户 {user.mobile} 已被禁用")
  74. log_create.is_success = 0
  75. log_create.failure_reason = "用户已禁用"
  76. LoginLogService.create_log(db, log_create)
  77. raise HTTPException(status_code=400, detail="用户已禁用")
  78. # Generate JWT Access Token
  79. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  80. if req.remember_me:
  81. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES_LONG)
  82. access_token = security.create_access_token(
  83. user.id,
  84. expires_delta=access_token_expires,
  85. is_long_term=req.remember_me
  86. )
  87. # Log Success
  88. LoginLogService.create_log(db, log_create)
  89. logger.info(f"平台登录成功: 用户 {user.mobile} (ID: {user.id})")
  90. return {
  91. "access_token": access_token,
  92. "token_type": "bearer",
  93. "role": user.role
  94. }
  95. # --- App SSO Login ---
  96. log_create = LoginLogCreate(
  97. mobile=req.identifier,
  98. ip_address=get_client_ip(request),
  99. login_method=LoginMethod.CUSTOM_PAGE, # 假设应用自定义页面调用此接口
  100. auth_type=AuthType.PASSWORD,
  101. user_agent=request.headers.get("user-agent")
  102. )
  103. # 1. Verify App
  104. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  105. if not app:
  106. log_create.is_success = 0
  107. log_create.failure_reason = "应用未找到"
  108. LoginLogService.create_log(db, log_create)
  109. logger.warning(f"应用登录失败: 应用ID {req.app_id} 未找到")
  110. raise HTTPException(status_code=404, detail="应用未找到")
  111. # 2. Verify Signature (Optional but recommended for server-side calls)
  112. if req.sign and req.timestamp:
  113. params = {
  114. "app_id": req.app_id,
  115. "identifier": req.identifier,
  116. "password": req.password,
  117. "timestamp": req.timestamp,
  118. "sign": req.sign
  119. }
  120. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  121. log_create.is_success = 0
  122. log_create.failure_reason = "签名无效"
  123. LoginLogService.create_log(db, log_create)
  124. logger.warning(f"应用登录失败: 应用 {req.app_id} 签名验证失败")
  125. raise HTTPException(status_code=400, detail="签名无效")
  126. # 3. Find User
  127. user = None
  128. # Auto-trim password to prevent common copy-paste errors
  129. if req.password:
  130. req.password = req.password.strip()
  131. # Try by mobile
  132. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  133. if not user:
  134. # Try by mapping
  135. mapping = db.query(AppUserMapping).filter(
  136. AppUserMapping.app_id == app.id,
  137. (AppUserMapping.mapped_key == req.identifier) | (AppUserMapping.mapped_email == req.identifier)
  138. ).first()
  139. if mapping:
  140. user = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  141. if not user:
  142. log_create.is_success = 0
  143. log_create.failure_reason = "用户未找到"
  144. LoginLogService.create_log(db, log_create)
  145. logger.warning(f"应用登录失败: 用户 {req.identifier} 在应用 {req.app_id} 中未找到")
  146. raise HTTPException(status_code=404, detail="用户未找到")
  147. log_create.user_id = user.id
  148. if user.status != UserStatus.ACTIVE:
  149. log_create.is_success = 0
  150. log_create.failure_reason = "用户已禁用"
  151. LoginLogService.create_log(db, log_create)
  152. logger.warning(f"应用登录失败: 用户 {user.mobile} 已被禁用")
  153. raise HTTPException(status_code=400, detail="用户已禁用")
  154. # 4. Verify Password
  155. # DEBUG: Log password verification details
  156. is_valid = security.verify_password(req.password, user.password_hash)
  157. if not is_valid:
  158. logger.warning(f"应用登录失败: 用户 {user.mobile} 密码验证失败 (App: {req.app_id})")
  159. log_create.is_success = 0
  160. log_create.failure_reason = "密码错误"
  161. LoginLogService.create_log(db, log_create)
  162. raise HTTPException(status_code=401, detail="密码错误")
  163. # 5. Generate Ticket (Self-Targeting)
  164. ticket = TicketService.generate_ticket(user.id, req.app_id)
  165. # Log Success (AuthType is PASSWORD leading to TICKET generation, keeping PASSWORD is fine or TICKET)
  166. # User requirement: "包括...认证方式". Here the auth method was PASSWORD.
  167. LoginLogService.create_log(db, log_create)
  168. logger.info(f"应用登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  169. return {"ticket": ticket}
  170. @router.post("/sms-login", response_model=PasswordLoginResponse, summary="短信验证码登录")
  171. def login_with_sms(
  172. req: SmsLoginRequest,
  173. request: Request,
  174. db: Session = Depends(deps.get_db),
  175. ):
  176. """
  177. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  178. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  179. """
  180. # 0. Check Config (Assuming PC enabled for API access, or check both)
  181. # Since this is an API used by external apps (likely web), we default to checking PC config
  182. # or we can check if EITHER is enabled.
  183. pc_enabled = SystemConfigService.get_config(db, "sms_login_pc_enabled")
  184. mobile_enabled = SystemConfigService.get_config(db, "sms_login_mobile_enabled")
  185. if pc_enabled != "true" and mobile_enabled != "true":
  186. logger.warning("短信登录尝试失败: 短信登录功能未开启")
  187. raise HTTPException(status_code=403, detail="短信登录功能未开启")
  188. # --- Platform Login ---
  189. if not req.app_id:
  190. # Prepare Log
  191. log_create = LoginLogCreate(
  192. mobile=req.mobile,
  193. ip_address=get_client_ip(request),
  194. login_method=LoginMethod.UNIFIED_PAGE,
  195. auth_type=AuthType.SMS,
  196. user_agent=request.headers.get("user-agent")
  197. )
  198. # 1. Verify Code
  199. key = f"SMS:{req.mobile}"
  200. stored_code = redis_client.get(key)
  201. if not stored_code or stored_code != req.code:
  202. log_create.is_success = 0
  203. log_create.failure_reason = "验证码错误或已过期"
  204. LoginLogService.create_log(db, log_create)
  205. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 验证码无效")
  206. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  207. # 2. Find user
  208. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  209. if not user:
  210. log_create.is_success = 0
  211. log_create.failure_reason = "用户未找到"
  212. LoginLogService.create_log(db, log_create)
  213. logger.warning(f"平台短信登录失败: 手机号 {req.mobile} 未注册")
  214. raise HTTPException(status_code=404, detail="用户未找到")
  215. log_create.user_id = user.id
  216. if user.status != UserStatus.ACTIVE:
  217. log_create.is_success = 0
  218. log_create.failure_reason = "用户已禁用"
  219. LoginLogService.create_log(db, log_create)
  220. logger.warning(f"平台短信登录失败: 用户 {user.mobile} 已被禁用")
  221. raise HTTPException(status_code=400, detail="用户已禁用")
  222. # 3. Generate JWT Access Token
  223. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  224. access_token = security.create_access_token(
  225. user.id,
  226. expires_delta=access_token_expires
  227. )
  228. # Clear Code
  229. redis_client.delete(key)
  230. # Log Success
  231. LoginLogService.create_log(db, log_create)
  232. logger.info(f"平台短信登录成功: 用户 {user.mobile} (ID: {user.id})")
  233. return {
  234. "access_token": access_token,
  235. "token_type": "bearer",
  236. "role": user.role
  237. }
  238. # --- App SSO Login ---
  239. log_create = LoginLogCreate(
  240. mobile=req.mobile,
  241. ip_address=get_client_ip(request),
  242. login_method=LoginMethod.CUSTOM_PAGE,
  243. auth_type=AuthType.SMS,
  244. user_agent=request.headers.get("user-agent")
  245. )
  246. # 1. Verify App
  247. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  248. if not app:
  249. log_create.is_success = 0
  250. log_create.failure_reason = "应用未找到"
  251. LoginLogService.create_log(db, log_create)
  252. logger.warning(f"应用短信登录失败: 应用ID {req.app_id} 未找到")
  253. raise HTTPException(status_code=404, detail="应用未找到")
  254. # 2. Verify Signature (Optional)
  255. if req.sign and req.timestamp:
  256. params = {
  257. "app_id": req.app_id,
  258. "mobile": req.mobile,
  259. "code": req.code,
  260. "timestamp": req.timestamp,
  261. "sign": req.sign
  262. }
  263. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  264. log_create.is_success = 0
  265. log_create.failure_reason = "签名无效"
  266. LoginLogService.create_log(db, log_create)
  267. logger.warning(f"应用短信登录失败: 应用 {req.app_id} 签名无效")
  268. raise HTTPException(status_code=400, detail="签名无效")
  269. # 3. Verify Code
  270. key = f"SMS:{req.mobile}"
  271. stored_code = redis_client.get(key)
  272. if not stored_code or stored_code != req.code:
  273. log_create.is_success = 0
  274. log_create.failure_reason = "验证码错误或已过期"
  275. LoginLogService.create_log(db, log_create)
  276. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 验证码无效")
  277. raise HTTPException(status_code=400, detail="验证码错误或已过期")
  278. # 4. Find User
  279. user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  280. if not user:
  281. log_create.is_success = 0
  282. log_create.failure_reason = "用户未找到"
  283. LoginLogService.create_log(db, log_create)
  284. logger.warning(f"应用短信登录失败: 手机号 {req.mobile} 未注册")
  285. raise HTTPException(status_code=404, detail="用户未找到")
  286. log_create.user_id = user.id
  287. if user.status != UserStatus.ACTIVE:
  288. log_create.is_success = 0
  289. log_create.failure_reason = "用户已禁用"
  290. LoginLogService.create_log(db, log_create)
  291. logger.warning(f"应用短信登录失败: 用户 {user.mobile} 已被禁用")
  292. raise HTTPException(status_code=400, detail="用户已禁用")
  293. # 5. Generate Ticket (Self-Targeting)
  294. ticket = TicketService.generate_ticket(user.id, req.app_id)
  295. # Clear Code
  296. redis_client.delete(key)
  297. # Log Success
  298. LoginLogService.create_log(db, log_create)
  299. logger.info(f"应用短信登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  300. return {"ticket": ticket}
  301. @router.post("/register", response_model=PasswordLoginResponse, summary="用户注册")
  302. def register_user(
  303. req: UserRegisterRequest,
  304. db: Session = Depends(deps.get_db),
  305. ):
  306. """
  307. 注册新用户 (默认为普通用户)。
  308. """
  309. # Force role to ORDINARY_USER
  310. role = UserRole.ORDINARY_USER
  311. # Auto-login after registration (return token)
  312. if req.password:
  313. req.password = req.password.strip()
  314. if not security.validate_password_strength(req.password):
  315. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  316. existing_user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  317. if existing_user:
  318. logger.info(f"用户注册失败: 手机号 {req.mobile} 已存在")
  319. raise HTTPException(status_code=400, detail="手机号已注册")
  320. english_name = generate_english_name(req.name)
  321. new_user = User(
  322. mobile=req.mobile,
  323. name=req.name,
  324. english_name=english_name,
  325. password_hash=security.get_password_hash(req.password),
  326. status=UserStatus.ACTIVE,
  327. role=role
  328. )
  329. db.add(new_user)
  330. db.commit()
  331. db.refresh(new_user)
  332. logger.info(f"用户注册成功: {req.mobile} (ID: {new_user.id})")
  333. # Auto-login after registration (return token)
  334. access_token = security.create_access_token(new_user.id)
  335. return {
  336. "access_token": access_token,
  337. "token_type": "bearer",
  338. "role": new_user.role
  339. }
  340. @router.post("/admin/reset-password", response_model=AdminPasswordResetResponse, summary="管理员重置密码")
  341. def admin_reset_password(
  342. req: AdminPasswordResetRequest,
  343. request: Request,
  344. db: Session = Depends(deps.get_db),
  345. current_user: User = Depends(deps.get_current_active_user),
  346. ):
  347. """
  348. 超级管理员重置用户密码。
  349. 随机生成8位密码,只显示一次。
  350. """
  351. if current_user.role != UserRole.SUPER_ADMIN:
  352. raise HTTPException(status_code=403, detail="权限不足")
  353. # Verify Admin Password
  354. if not security.verify_password(req.admin_password, current_user.password_hash):
  355. logger.warning(f"管理员重置密码失败: 管理员 {current_user.mobile} 密码验证错误")
  356. raise HTTPException(status_code=401, detail="管理员密码错误")
  357. target_user = db.query(User).filter(User.id == req.user_id).first()
  358. if not target_user:
  359. raise HTTPException(status_code=404, detail="用户未找到")
  360. # Generate random password (alphanumeric only)
  361. new_pwd = security.generate_alphanumeric_password(8)
  362. target_user.password_hash = security.get_password_hash(new_pwd)
  363. db.add(target_user)
  364. db.commit()
  365. # Log Operation
  366. LogService.create_log(
  367. db=db,
  368. operator_id=current_user.id,
  369. action_type=ActionType.RESET_PASSWORD,
  370. target_user_id=target_user.id,
  371. target_mobile=target_user.mobile,
  372. ip_address=get_client_ip(request),
  373. details={}
  374. )
  375. logger.info(f"管理员重置用户密码成功: 目标用户 {target_user.mobile} (ID: {target_user.id})")
  376. return {"new_password": new_pwd}
  377. @router.post("/admin/promote", summary="提升用户角色")
  378. def promote_user(
  379. req: UserPromoteRequest,
  380. db: Session = Depends(deps.get_db),
  381. current_user: User = Depends(deps.get_current_active_user),
  382. ):
  383. if current_user.role != UserRole.SUPER_ADMIN:
  384. raise HTTPException(status_code=403, detail="权限不足")
  385. if req.new_role not in [UserRole.SUPER_ADMIN, UserRole.DEVELOPER]:
  386. raise HTTPException(status_code=400, detail="只能提升为管理员 or 开发者")
  387. target_user = db.query(User).filter(User.id == req.user_id).first()
  388. if not target_user:
  389. raise HTTPException(status_code=404, detail="用户未找到")
  390. old_role = target_user.role
  391. target_user.role = req.new_role
  392. db.add(target_user)
  393. db.commit()
  394. logger.info(f"用户角色变更: 用户 {target_user.mobile} 从 {old_role} 变更为 {req.new_role} (操作者: {current_user.mobile})")
  395. return {"message": "success"}
  396. @router.get("/me/mappings", response_model=MyMappingsResponse, summary="我的映射")
  397. def get_my_mappings(
  398. skip: int = 0,
  399. limit: int = 10,
  400. app_name: str = None,
  401. db: Session = Depends(deps.get_db),
  402. current_user: User = Depends(deps.get_current_active_user),
  403. ):
  404. query = db.query(AppUserMapping).join(Application).filter(AppUserMapping.user_id == current_user.id)
  405. if app_name:
  406. query = query.filter(Application.app_name.ilike(f"%{app_name}%"))
  407. total = query.count()
  408. mappings = query.order_by(AppUserMapping.id.desc()).offset(skip).limit(limit).all()
  409. result = []
  410. for m in mappings:
  411. result.append(UserMappingResponse(
  412. app_name=m.application.app_name if m.application else "Unknown",
  413. app_id=m.application.app_id if m.application else "",
  414. protocol_type=m.application.protocol_type if m.application else "",
  415. mapped_key=m.mapped_key,
  416. mapped_email=m.mapped_email,
  417. is_active=m.is_active
  418. ))
  419. return {"total": total, "items": result}
  420. @router.post("/me/change-password", summary="修改密码")
  421. def change_my_password(
  422. req: ChangePasswordRequest,
  423. db: Session = Depends(deps.get_db),
  424. current_user: User = Depends(deps.get_current_active_user),
  425. ):
  426. if not security.verify_password(req.old_password, current_user.password_hash):
  427. logger.warning(f"用户修改密码失败: 用户 {current_user.mobile} 旧密码验证错误")
  428. raise HTTPException(status_code=400, detail="旧密码错误")
  429. if req.new_password:
  430. req.new_password = req.new_password.strip()
  431. if not security.validate_password_strength(req.new_password):
  432. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  433. current_user.password_hash = security.get_password_hash(req.new_password)
  434. db.add(current_user)
  435. db.commit()
  436. logger.info(f"用户修改密码成功: {current_user.mobile}")
  437. return {"message": "密码修改成功"}
  438. @router.post("/exchange", response_model=TicketExchangeResponse, summary="票据交换")
  439. def exchange_ticket(
  440. req: TicketExchangeRequest,
  441. db: Session = Depends(deps.get_db),
  442. ):
  443. """
  444. 源应用调用以获取目标应用的票据。
  445. """
  446. # 1. Verify Source App
  447. source_app = db.query(Application).filter(Application.app_id == req.app_id).first()
  448. if not source_app:
  449. logger.warning(f"票据交换失败: 源应用 {req.app_id} 未找到")
  450. raise HTTPException(status_code=404, detail="源应用未找到")
  451. # 2. Verify Signature
  452. params = {
  453. "app_id": req.app_id,
  454. "target_app_id": req.target_app_id,
  455. "user_mobile": req.user_mobile,
  456. "timestamp": req.timestamp,
  457. "sign": req.sign
  458. }
  459. # Use the stored secret to verify
  460. if not SignatureService.verify_signature(source_app.app_secret, params, req.sign):
  461. logger.warning(f"票据交换失败: 源应用 {req.app_id} 签名无效")
  462. raise HTTPException(status_code=400, detail="签名无效")
  463. # 3. Verify User Existence (Optional: Do we trust source app completely? Usually yes if signed.)
  464. # But we need user_id to generate ticket.
  465. # We query by mobile.
  466. user = db.query(User).filter(User.mobile == req.user_mobile, User.is_deleted == 0).first()
  467. if not user:
  468. # If user doesn't exist, we might auto-create OR fail.
  469. # Requirement: "Returns redirect_url".
  470. # For simplicity, if user not found, we cannot map.
  471. logger.warning(f"票据交换失败: 用户 {req.user_mobile} 未找到")
  472. raise HTTPException(status_code=404, detail="用户在 UAP 中未找到")
  473. # 4. Generate Ticket for Target App
  474. # Logic: The ticket allows the user to log in to Target App.
  475. ticket = TicketService.generate_ticket(user.id, req.target_app_id)
  476. # 5. Get Target App URL
  477. target_app = db.query(Application).filter(Application.app_id == req.target_app_id).first()
  478. if not target_app:
  479. logger.warning(f"票据交换失败: 目标应用 {req.target_app_id} 未找到")
  480. raise HTTPException(status_code=404, detail="目标应用未找到")
  481. # Construct redirect URL
  482. # Assuming target app handles /callback?ticket=...
  483. # We use the first redirect_uri or notification_url or custom logic.
  484. # Simplicity: We return the ticket and let the Source App handle the redirect,
  485. # OR we return a full redirect URL if target_app has a base URL configured.
  486. # Let's assume redirect_uris is a JSON list.
  487. redirect_base = ""
  488. if target_app.redirect_uris:
  489. try:
  490. # 尝试作为 JSON 数组解析
  491. uris = json.loads(target_app.redirect_uris)
  492. if isinstance(uris, list) and len(uris) > 0:
  493. redirect_base = uris[0]
  494. elif isinstance(uris, str):
  495. redirect_base = uris
  496. except (json.JSONDecodeError, TypeError):
  497. # 如果不是 JSON 格式,直接作为字符串使用
  498. redirect_base = target_app.redirect_uris.strip()
  499. if not redirect_base:
  500. # Fallback or error
  501. redirect_base = "http://unknown-target-url"
  502. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  503. logger.info(f"票据交换成功: 用户 {req.user_mobile} 从 {req.app_id} -> {req.target_app_id}")
  504. return {
  505. "ticket": ticket,
  506. "redirect_url": full_redirect_url
  507. }
  508. @router.post("/sso-login", response_model=SsoLoginResponse, summary="SSO 登录")
  509. def sso_login(
  510. req: SsoLoginRequest,
  511. request: Request,
  512. db: Session = Depends(deps.get_db),
  513. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  514. ):
  515. """
  516. SSO 登录入口,支持:
  517. - SIMPLE_API 应用:返回带有 Ticket 的业务系统重定向 URL
  518. - OIDC 应用:直接返回回调地址
  519. 前端只需要拿到 redirect_url 后跳转即可。
  520. """
  521. # 1. Verify App
  522. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  523. # Prepare Log
  524. log_create = LoginLogCreate(
  525. ip_address=get_client_ip(request),
  526. login_method=LoginMethod.DIRECT_JUMP,
  527. auth_type=AuthType.SSO,
  528. user_agent=request.headers.get("user-agent"),
  529. mobile=req.username
  530. )
  531. if not app:
  532. log_create.is_success = 0
  533. log_create.failure_reason = "应用未找到"
  534. LoginLogService.create_log(db, log_create)
  535. logger.warning(f"SSO登录失败: 应用 {req.app_id} 未找到")
  536. raise HTTPException(status_code=404, detail="应用未找到")
  537. # 仅支持 SIMPLE_API 与 OIDC,其它协议直接拒绝
  538. if app.protocol_type not in ("SIMPLE_API", "OIDC"):
  539. log_create.is_success = 0
  540. log_create.failure_reason = "协议不支持"
  541. LoginLogService.create_log(db, log_create)
  542. logger.warning(
  543. f"SSO登录失败: 应用 {req.app_id} 协议类型不支持 ({app.protocol_type})"
  544. )
  545. raise HTTPException(status_code=400, detail="协议类型不支持该 SSO 登录方式")
  546. user = None
  547. # 2. Try Session Login first
  548. if current_user:
  549. user = current_user
  550. log_create.user_id = user.id
  551. log_create.mobile = user.mobile
  552. log_create.auth_type = AuthType.TOKEN # Used existing session
  553. # 3. If no session, try Credentials Login
  554. if not user and req.username and req.password:
  555. log_create.auth_type = AuthType.PASSWORD
  556. # Verify User Credentials
  557. user_query = db.query(User).filter(User.mobile == req.username, User.is_deleted == 0).first()
  558. if not user_query:
  559. # Check mapping
  560. mapping = db.query(AppUserMapping).filter(
  561. AppUserMapping.app_id == app.id,
  562. (AppUserMapping.mapped_key == req.username) | (AppUserMapping.mapped_email == req.username)
  563. ).first()
  564. if mapping:
  565. user_query = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  566. if user_query and security.verify_password(req.password, user_query.password_hash):
  567. user = user_query
  568. log_create.user_id = user.id
  569. if not user:
  570. log_create.is_success = 0
  571. log_create.failure_reason = "认证失败"
  572. LoginLogService.create_log(db, log_create)
  573. logger.warning(f"SSO登录失败: 用户认证失败 (Username: {req.username})")
  574. raise HTTPException(status_code=401, detail="认证失败")
  575. if user.status != "ACTIVE":
  576. log_create.is_success = 0
  577. log_create.failure_reason = "用户已禁用"
  578. LoginLogService.create_log(db, log_create)
  579. logger.warning(f"SSO登录失败: 用户 {user.mobile} 已被禁用")
  580. raise HTTPException(status_code=400, detail="用户已禁用")
  581. # 4. 解析重定向基础地址(SIMPLE_API 与 OIDC 都会用到)
  582. redirect_base = ""
  583. if app.redirect_uris:
  584. try:
  585. # 尝试作为 JSON 数组解析
  586. uris = json.loads(app.redirect_uris)
  587. if isinstance(uris, list) and len(uris) > 0:
  588. redirect_base = uris[0]
  589. elif isinstance(uris, str):
  590. redirect_base = uris
  591. except (json.JSONDecodeError, TypeError):
  592. # 如果不是 JSON 格式,直接作为字符串使用
  593. redirect_base = app.redirect_uris.strip()
  594. if not redirect_base:
  595. logger.error(f"SSO登录配置错误: 应用 {req.app_id} 未配置回调地址")
  596. raise HTTPException(status_code=400, detail="应用未配置重定向 URI")
  597. # 5. 根据协议类型构造最终 redirect_url
  598. if app.protocol_type == "SIMPLE_API":
  599. # 5.1 SIMPLE_API: 生成 Ticket,拼接到业务系统回调地址上
  600. ticket = TicketService.generate_ticket(user.id, req.app_id)
  601. LoginLogService.create_log(db, log_create)
  602. logger.info(f"SSO登录成功: 用户 {user.mobile} 获取 Ticket (App: {req.app_id})")
  603. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  604. return {"redirect_url": full_redirect_url}
  605. if app.protocol_type == "OIDC":
  606. # 5.2 OIDC: 直接跳转到回调地址(只保留到端口为止,去掉路径部分)
  607. # 例如:https://api.hnyunzhu.com:9003/oauth_callback -> https://api.hnyunzhu.com:9003
  608. parsed_uri = urlparse(redirect_base)
  609. # 只保留 scheme 和 netloc(包含端口),去掉 path、params、query、fragment
  610. redirect_url = f"{parsed_uri.scheme}://{parsed_uri.netloc}"
  611. LoginLogService.create_log(db, log_create)
  612. logger.info(
  613. f"OIDC SSO 登录成功: 用户 {user.mobile} 将跳转到回调地址 (App: {req.app_id}, URL: {redirect_url})"
  614. )
  615. return {"redirect_url": redirect_url}
  616. # 理论上不会走到这里,防御性返回
  617. logger.error(
  618. f"SSO登录异常: 未处理的协议类型 {app.protocol_type} (App: {req.app_id})"
  619. )
  620. raise HTTPException(status_code=500, detail="未处理的协议类型")
  621. @router.post("/validate", response_model=TicketValidateResponse, summary="验证票据")
  622. def validate_ticket(
  623. req: TicketValidateRequest,
  624. db: Session = Depends(deps.get_db),
  625. ):
  626. """
  627. 目标应用调用以消费票据。
  628. """
  629. # 1. Verify App
  630. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  631. if not app:
  632. logger.warning(f"票据验证失败: 应用 {req.app_id} 未找到")
  633. raise HTTPException(status_code=404, detail="应用未找到")
  634. # 2. Verify Signature
  635. params = {
  636. "ticket": req.ticket,
  637. "app_id": req.app_id,
  638. "timestamp": req.timestamp,
  639. "sign": req.sign
  640. }
  641. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  642. logger.warning(f"票据验证失败: 应用 {req.app_id} 签名无效")
  643. raise HTTPException(status_code=400, detail="签名无效")
  644. # 3. Consume Ticket
  645. ticket_data = TicketService.consume_ticket(req.ticket, req.app_id)
  646. if not ticket_data:
  647. logger.warning(f"票据验证失败: Ticket 无效或已过期 (App: {req.app_id})")
  648. return {"valid": False}
  649. user_id = ticket_data["user_id"]
  650. # 4. Get User Info & Mapping
  651. user = db.query(User).filter(User.id == user_id).first()
  652. mapping = db.query(AppUserMapping).filter(
  653. AppUserMapping.app_id == app.id,
  654. AppUserMapping.user_id == user_id
  655. ).first()
  656. mapped_key = mapping.mapped_key if mapping else None
  657. mapped_email = mapping.mapped_email if mapping else None
  658. logger.info(f"票据验证成功: 用户 {user.mobile} (App: {req.app_id})")
  659. return {
  660. "valid": True,
  661. "user_id": user.id,
  662. "mobile": user.mobile,
  663. "mapped_key": mapped_key,
  664. "mapped_email": mapped_email
  665. }
  666. @router.get("/sso/jump", summary="通知跳转 SSO")
  667. def sso_jump(
  668. app_id: str, # 应用 ID
  669. redirect_to: str, # 最终目标页面
  670. request: Request,
  671. db: Session = Depends(deps.get_db),
  672. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  673. ):
  674. """
  675. 用于消息通知的 SSO 跳转接口。
  676. """
  677. # 1. 检查应用是否存在
  678. app = db.query(Application).filter(Application.app_id == app_id).first()
  679. if not app:
  680. raise HTTPException(status_code=404, detail="应用未找到")
  681. # 2. 检查用户是否登录
  682. if not current_user:
  683. # 未登录 -> 跳转到统一登录页
  684. # 假设前端部署在 HTTP_REFERER 或配置的 FRONTEND_HOST (暂用相对路径)
  685. login_page = "/login"
  686. params = {"redirect": str(request.url)}
  687. return RedirectResponse(f"{login_page}?{urlencode(params)}")
  688. # 3. 用户已登录 -> 生成 Ticket
  689. ticket = TicketService.generate_ticket(current_user.id, app_id)
  690. # 4. 获取应用回调地址
  691. redirect_base = ""
  692. if app.redirect_uris:
  693. try:
  694. uris = json.loads(app.redirect_uris)
  695. if isinstance(uris, list) and len(uris) > 0:
  696. redirect_base = uris[0]
  697. elif isinstance(uris, str):
  698. redirect_base = uris
  699. except:
  700. redirect_base = app.redirect_uris.strip()
  701. if not redirect_base:
  702. raise HTTPException(status_code=400, detail="应用未配置回调地址")
  703. # 5. 构造最终跳转 URL
  704. parsed_uri = urlparse(redirect_base)
  705. query_params = parse_qs(parsed_uri.query)
  706. query_params['ticket'] = [ticket]
  707. query_params['next'] = [redirect_to]
  708. new_query = urlencode(query_params, doseq=True)
  709. full_redirect_url = urlunparse((
  710. parsed_uri.scheme,
  711. parsed_uri.netloc,
  712. parsed_uri.path,
  713. parsed_uri.params,
  714. new_query,
  715. parsed_uri.fragment
  716. ))
  717. return RedirectResponse(full_redirect_url)