simple_auth.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577
  1. from typing import Optional, List
  2. import json
  3. from datetime import timedelta
  4. from fastapi import APIRouter, Depends, HTTPException, Body
  5. from sqlalchemy.orm import Session
  6. from pydantic import BaseModel
  7. from app.api.v1 import deps
  8. from app.core import security
  9. from app.core.config import settings
  10. from app.core.utils import generate_english_name
  11. from app.models.user import User, UserRole, UserStatus
  12. from app.models.application import Application
  13. from app.models.mapping import AppUserMapping
  14. from app.schemas.simple_auth import (
  15. TicketExchangeRequest, TicketExchangeResponse,
  16. TicketValidateRequest, TicketValidateResponse,
  17. PasswordLoginRequest, PasswordLoginResponse,
  18. UserRegisterRequest, AdminPasswordResetRequest, AdminPasswordResetResponse,
  19. ChangePasswordRequest, MyMappingsResponse, UserMappingResponse,
  20. UserPromoteRequest, SsoLoginRequest, SsoLoginResponse
  21. )
  22. from app.services.signature_service import SignatureService
  23. from app.services.ticket_service import TicketService
  24. from app.services.log_service import LogService
  25. from app.services.login_log_service import LoginLogService
  26. from app.schemas.operation_log import ActionType
  27. from app.schemas.login_log import LoginLogCreate, LoginMethod, AuthType
  28. from fastapi import Request
  29. router = APIRouter()
  30. @router.post("/login", response_model=PasswordLoginResponse, summary="密码登录")
  31. def login_with_password(
  32. req: PasswordLoginRequest,
  33. request: Request,
  34. db: Session = Depends(deps.get_db),
  35. ):
  36. """
  37. 1. 如果提供 app_id:应用 SSO 登录,返回 ticket。
  38. 2. 如果未提供 app_id:统一认证平台登录,返回 access_token。
  39. """
  40. # --- Platform Login ---
  41. if not req.app_id:
  42. # Prepare Log
  43. log_create = LoginLogCreate(
  44. mobile=req.identifier,
  45. ip_address=request.client.host,
  46. login_method=LoginMethod.UNIFIED_PAGE,
  47. auth_type=AuthType.PASSWORD,
  48. user_agent=request.headers.get("user-agent")
  49. )
  50. # Find user by mobile only
  51. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  52. if not user:
  53. log_create.is_success = 0
  54. log_create.failure_reason = "用户未找到"
  55. LoginLogService.create_log(db, log_create)
  56. raise HTTPException(status_code=404, detail="用户未找到")
  57. log_create.user_id = user.id
  58. is_valid = security.verify_password(req.password, user.password_hash)
  59. if not is_valid:
  60. import logging
  61. logger = logging.getLogger(__name__)
  62. logger.error(f"Platform Login failed for user {user.mobile}")
  63. log_create.is_success = 0
  64. log_create.failure_reason = "密码错误"
  65. LoginLogService.create_log(db, log_create)
  66. raise HTTPException(status_code=401, detail="密码错误")
  67. if user.status != UserStatus.ACTIVE:
  68. log_create.is_success = 0
  69. log_create.failure_reason = "用户已禁用"
  70. LoginLogService.create_log(db, log_create)
  71. raise HTTPException(status_code=400, detail="用户已禁用")
  72. # Generate JWT Access Token
  73. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  74. if req.remember_me:
  75. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES_LONG)
  76. access_token = security.create_access_token(
  77. user.id,
  78. expires_delta=access_token_expires,
  79. is_long_term=req.remember_me
  80. )
  81. # Log Success
  82. LoginLogService.create_log(db, log_create)
  83. return {
  84. "access_token": access_token,
  85. "token_type": "bearer",
  86. "role": user.role
  87. }
  88. # --- App SSO Login ---
  89. log_create = LoginLogCreate(
  90. mobile=req.identifier,
  91. ip_address=request.client.host,
  92. login_method=LoginMethod.CUSTOM_PAGE, # 假设应用自定义页面调用此接口
  93. auth_type=AuthType.PASSWORD,
  94. user_agent=request.headers.get("user-agent")
  95. )
  96. # 1. Verify App
  97. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  98. if not app:
  99. log_create.is_success = 0
  100. log_create.failure_reason = "应用未找到"
  101. LoginLogService.create_log(db, log_create)
  102. raise HTTPException(status_code=404, detail="应用未找到")
  103. # 2. Verify Signature (Optional but recommended for server-side calls)
  104. if req.sign and req.timestamp:
  105. params = {
  106. "app_id": req.app_id,
  107. "identifier": req.identifier,
  108. "password": req.password,
  109. "timestamp": req.timestamp,
  110. "sign": req.sign
  111. }
  112. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  113. log_create.is_success = 0
  114. log_create.failure_reason = "签名无效"
  115. LoginLogService.create_log(db, log_create)
  116. raise HTTPException(status_code=400, detail="签名无效")
  117. # 3. Find User
  118. user = None
  119. # Auto-trim password to prevent common copy-paste errors
  120. if req.password:
  121. req.password = req.password.strip()
  122. # Try by mobile
  123. user = db.query(User).filter(User.mobile == req.identifier, User.is_deleted == 0).first()
  124. if not user:
  125. # Try by mapping
  126. mapping = db.query(AppUserMapping).filter(
  127. AppUserMapping.app_id == app.id,
  128. (AppUserMapping.mapped_key == req.identifier) | (AppUserMapping.mapped_email == req.identifier)
  129. ).first()
  130. if mapping:
  131. user = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  132. if not user:
  133. log_create.is_success = 0
  134. log_create.failure_reason = "用户未找到"
  135. LoginLogService.create_log(db, log_create)
  136. raise HTTPException(status_code=404, detail="用户未找到")
  137. log_create.user_id = user.id
  138. if user.status != UserStatus.ACTIVE:
  139. log_create.is_success = 0
  140. log_create.failure_reason = "用户已禁用"
  141. LoginLogService.create_log(db, log_create)
  142. raise HTTPException(status_code=400, detail="用户已禁用")
  143. # 4. Verify Password
  144. import logging
  145. logger = logging.getLogger(__name__)
  146. # DEBUG: Log password verification details
  147. is_valid = security.verify_password(req.password, user.password_hash)
  148. if not is_valid:
  149. logger.error(f"Password verification failed for user {user.mobile}")
  150. log_create.is_success = 0
  151. log_create.failure_reason = "密码错误"
  152. LoginLogService.create_log(db, log_create)
  153. raise HTTPException(status_code=401, detail="密码错误")
  154. # 5. Generate Ticket (Self-Targeting)
  155. ticket = TicketService.generate_ticket(user.id, req.app_id)
  156. # Log Success (AuthType is PASSWORD leading to TICKET generation, keeping PASSWORD is fine or TICKET)
  157. # User requirement: "包括...认证方式". Here the auth method was PASSWORD.
  158. LoginLogService.create_log(db, log_create)
  159. return {"ticket": ticket}
  160. @router.post("/register", response_model=PasswordLoginResponse, summary="用户注册")
  161. def register_user(
  162. req: UserRegisterRequest,
  163. db: Session = Depends(deps.get_db),
  164. ):
  165. """
  166. 注册新用户 (默认为普通用户)。
  167. """
  168. # Force role to ORDINARY_USER
  169. role = UserRole.ORDINARY_USER
  170. # Auto-login after registration (return token)
  171. if req.password:
  172. req.password = req.password.strip()
  173. if not security.validate_password_strength(req.password):
  174. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  175. existing_user = db.query(User).filter(User.mobile == req.mobile, User.is_deleted == 0).first()
  176. if existing_user:
  177. raise HTTPException(status_code=400, detail="手机号已注册")
  178. english_name = generate_english_name(req.name)
  179. new_user = User(
  180. mobile=req.mobile,
  181. name=req.name,
  182. english_name=english_name,
  183. password_hash=security.get_password_hash(req.password),
  184. status=UserStatus.ACTIVE,
  185. role=role
  186. )
  187. db.add(new_user)
  188. db.commit()
  189. db.refresh(new_user)
  190. # Auto-login after registration (return token)
  191. access_token = security.create_access_token(new_user.id)
  192. return {
  193. "access_token": access_token,
  194. "token_type": "bearer",
  195. "role": new_user.role
  196. }
  197. @router.post("/admin/reset-password", response_model=AdminPasswordResetResponse, summary="管理员重置密码")
  198. def admin_reset_password(
  199. req: AdminPasswordResetRequest,
  200. request: Request,
  201. db: Session = Depends(deps.get_db),
  202. current_user: User = Depends(deps.get_current_active_user),
  203. ):
  204. """
  205. 超级管理员重置用户密码。
  206. 随机生成8位密码,只显示一次。
  207. """
  208. if current_user.role != UserRole.SUPER_ADMIN:
  209. raise HTTPException(status_code=403, detail="权限不足")
  210. # Verify Admin Password
  211. if not security.verify_password(req.admin_password, current_user.password_hash):
  212. raise HTTPException(status_code=401, detail="管理员密码错误")
  213. target_user = db.query(User).filter(User.id == req.user_id).first()
  214. if not target_user:
  215. raise HTTPException(status_code=404, detail="用户未找到")
  216. # Generate random password (alphanumeric only)
  217. new_pwd = security.generate_alphanumeric_password(8)
  218. target_user.password_hash = security.get_password_hash(new_pwd)
  219. db.add(target_user)
  220. db.commit()
  221. # Log Operation
  222. LogService.create_log(
  223. db=db,
  224. operator_id=current_user.id,
  225. action_type=ActionType.RESET_PASSWORD,
  226. target_user_id=target_user.id,
  227. target_mobile=target_user.mobile,
  228. ip_address=request.client.host,
  229. details={}
  230. )
  231. return {"new_password": new_pwd}
  232. @router.post("/admin/promote", summary="提升用户角色")
  233. def promote_user(
  234. req: UserPromoteRequest,
  235. db: Session = Depends(deps.get_db),
  236. current_user: User = Depends(deps.get_current_active_user),
  237. ):
  238. if current_user.role != UserRole.SUPER_ADMIN:
  239. raise HTTPException(status_code=403, detail="权限不足")
  240. if req.new_role not in [UserRole.SUPER_ADMIN, UserRole.DEVELOPER]:
  241. raise HTTPException(status_code=400, detail="只能提升为管理员 or 开发者")
  242. target_user = db.query(User).filter(User.id == req.user_id).first()
  243. if not target_user:
  244. raise HTTPException(status_code=404, detail="用户未找到")
  245. target_user.role = req.new_role
  246. db.add(target_user)
  247. db.commit()
  248. return {"message": "success"}
  249. @router.get("/me/mappings", response_model=MyMappingsResponse, summary="我的映射")
  250. def get_my_mappings(
  251. skip: int = 0,
  252. limit: int = 10,
  253. app_name: str = None,
  254. db: Session = Depends(deps.get_db),
  255. current_user: User = Depends(deps.get_current_active_user),
  256. ):
  257. query = db.query(AppUserMapping).join(Application).filter(AppUserMapping.user_id == current_user.id)
  258. if app_name:
  259. query = query.filter(Application.app_name.ilike(f"%{app_name}%"))
  260. total = query.count()
  261. mappings = query.order_by(AppUserMapping.id.desc()).offset(skip).limit(limit).all()
  262. result = []
  263. for m in mappings:
  264. result.append(UserMappingResponse(
  265. app_name=m.application.app_name if m.application else "Unknown",
  266. app_id=m.application.app_id if m.application else "",
  267. protocol_type=m.application.protocol_type if m.application else "",
  268. mapped_key=m.mapped_key,
  269. mapped_email=m.mapped_email,
  270. is_active=m.is_active
  271. ))
  272. return {"total": total, "items": result}
  273. @router.post("/me/change-password", summary="修改密码")
  274. def change_my_password(
  275. req: ChangePasswordRequest,
  276. db: Session = Depends(deps.get_db),
  277. current_user: User = Depends(deps.get_current_active_user),
  278. ):
  279. if not security.verify_password(req.old_password, current_user.password_hash):
  280. raise HTTPException(status_code=400, detail="旧密码错误")
  281. if req.new_password:
  282. req.new_password = req.new_password.strip()
  283. if not security.validate_password_strength(req.new_password):
  284. raise HTTPException(status_code=400, detail="密码强度不足,必须包含字母和数字")
  285. current_user.password_hash = security.get_password_hash(req.new_password)
  286. db.add(current_user)
  287. db.commit()
  288. return {"message": "密码修改成功"}
  289. @router.post("/exchange", response_model=TicketExchangeResponse, summary="票据交换")
  290. def exchange_ticket(
  291. req: TicketExchangeRequest,
  292. db: Session = Depends(deps.get_db),
  293. ):
  294. """
  295. 源应用调用以获取目标应用的票据。
  296. """
  297. # 1. Verify Source App
  298. source_app = db.query(Application).filter(Application.app_id == req.app_id).first()
  299. if not source_app:
  300. raise HTTPException(status_code=404, detail="源应用未找到")
  301. # 2. Verify Signature
  302. params = {
  303. "app_id": req.app_id,
  304. "target_app_id": req.target_app_id,
  305. "user_mobile": req.user_mobile,
  306. "timestamp": req.timestamp,
  307. "sign": req.sign
  308. }
  309. # Use the stored secret to verify
  310. if not SignatureService.verify_signature(source_app.app_secret, params, req.sign):
  311. raise HTTPException(status_code=400, detail="签名无效")
  312. # 3. Verify User Existence (Optional: Do we trust source app completely? Usually yes if signed.)
  313. # But we need user_id to generate ticket.
  314. # We query by mobile.
  315. user = db.query(User).filter(User.mobile == req.user_mobile, User.is_deleted == 0).first()
  316. if not user:
  317. # If user doesn't exist, we might auto-create OR fail.
  318. # Requirement: "Returns redirect_url".
  319. # For simplicity, if user not found, we cannot map.
  320. raise HTTPException(status_code=404, detail="用户在 UAP 中未找到")
  321. # 4. Generate Ticket for Target App
  322. # Logic: The ticket allows the user to log in to Target App.
  323. ticket = TicketService.generate_ticket(user.id, req.target_app_id)
  324. # 5. Get Target App URL
  325. target_app = db.query(Application).filter(Application.app_id == req.target_app_id).first()
  326. if not target_app:
  327. raise HTTPException(status_code=404, detail="目标应用未找到")
  328. # Construct redirect URL
  329. # Assuming target app handles /callback?ticket=...
  330. # We use the first redirect_uri or notification_url or custom logic.
  331. # Simplicity: We return the ticket and let the Source App handle the redirect,
  332. # OR we return a full redirect URL if target_app has a base URL configured.
  333. # Let's assume redirect_uris is a JSON list.
  334. redirect_base = ""
  335. if target_app.redirect_uris:
  336. try:
  337. # 尝试作为 JSON 数组解析
  338. uris = json.loads(target_app.redirect_uris)
  339. if isinstance(uris, list) and len(uris) > 0:
  340. redirect_base = uris[0]
  341. elif isinstance(uris, str):
  342. redirect_base = uris
  343. except (json.JSONDecodeError, TypeError):
  344. # 如果不是 JSON 格式,直接作为字符串使用
  345. redirect_base = target_app.redirect_uris.strip()
  346. if not redirect_base:
  347. # Fallback or error
  348. redirect_base = "http://unknown-target-url"
  349. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  350. return {
  351. "ticket": ticket,
  352. "redirect_url": full_redirect_url
  353. }
  354. @router.post("/sso-login", response_model=SsoLoginResponse, summary="SSO 登录 (简易模式)")
  355. def sso_login(
  356. req: SsoLoginRequest,
  357. request: Request,
  358. db: Session = Depends(deps.get_db),
  359. current_user: Optional[User] = Depends(deps.get_current_active_user_optional),
  360. ):
  361. """
  362. 简易 API 应用的 SSO 登录。
  363. 返回带有票据的重定向 URL。
  364. 支持:
  365. 1. 用户名 + 密码登录
  366. 2. 基于会话的自动登录(如果已登录)
  367. """
  368. # 1. Verify App
  369. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  370. # Prepare Log
  371. log_create = LoginLogCreate(
  372. ip_address=request.client.host,
  373. login_method=LoginMethod.DIRECT_JUMP,
  374. auth_type=AuthType.SSO,
  375. user_agent=request.headers.get("user-agent"),
  376. mobile=req.username
  377. )
  378. if not app:
  379. log_create.is_success = 0
  380. log_create.failure_reason = "应用未找到"
  381. LoginLogService.create_log(db, log_create)
  382. raise HTTPException(status_code=404, detail="应用未找到")
  383. if app.protocol_type != "SIMPLE_API":
  384. log_create.is_success = 0
  385. log_create.failure_reason = "协议不支持"
  386. LoginLogService.create_log(db, log_create)
  387. raise HTTPException(status_code=400, detail="SSO 登录仅支持简易 API 应用。OIDC 请使用标准流程。")
  388. user = None
  389. # 2. Try Session Login first
  390. if current_user:
  391. user = current_user
  392. log_create.user_id = user.id
  393. log_create.mobile = user.mobile
  394. log_create.auth_type = AuthType.TOKEN # Used existing session
  395. # 3. If no session, try Credentials Login
  396. if not user and req.username and req.password:
  397. log_create.auth_type = AuthType.PASSWORD
  398. # Verify User Credentials
  399. user_query = db.query(User).filter(User.mobile == req.username, User.is_deleted == 0).first()
  400. if not user_query:
  401. # Check mapping
  402. mapping = db.query(AppUserMapping).filter(
  403. AppUserMapping.app_id == app.id,
  404. (AppUserMapping.mapped_key == req.username) | (AppUserMapping.mapped_email == req.username)
  405. ).first()
  406. if mapping:
  407. user_query = db.query(User).filter(User.id == mapping.user_id, User.is_deleted == 0).first()
  408. if user_query and security.verify_password(req.password, user_query.password_hash):
  409. user = user_query
  410. log_create.user_id = user.id
  411. if not user:
  412. log_create.is_success = 0
  413. log_create.failure_reason = "认证失败"
  414. LoginLogService.create_log(db, log_create)
  415. raise HTTPException(status_code=401, detail="认证失败")
  416. if user.status != "ACTIVE":
  417. log_create.is_success = 0
  418. log_create.failure_reason = "用户已禁用"
  419. LoginLogService.create_log(db, log_create)
  420. raise HTTPException(status_code=400, detail="用户已禁用")
  421. # 4. Generate Ticket
  422. ticket = TicketService.generate_ticket(user.id, req.app_id)
  423. # Log Success
  424. LoginLogService.create_log(db, log_create)
  425. # 5. Get Redirect URL
  426. redirect_base = ""
  427. if app.redirect_uris:
  428. try:
  429. # 尝试作为 JSON 数组解析
  430. uris = json.loads(app.redirect_uris)
  431. if isinstance(uris, list) and len(uris) > 0:
  432. redirect_base = uris[0]
  433. elif isinstance(uris, str):
  434. redirect_base = uris
  435. except (json.JSONDecodeError, TypeError):
  436. # 如果不是 JSON 格式,直接作为字符串使用
  437. redirect_base = app.redirect_uris.strip()
  438. if not redirect_base:
  439. raise HTTPException(status_code=400, detail="应用未配置重定向 URI")
  440. full_redirect_url = f"{redirect_base}?ticket={ticket}"
  441. return {"redirect_url": full_redirect_url}
  442. @router.post("/validate", response_model=TicketValidateResponse, summary="验证票据")
  443. def validate_ticket(
  444. req: TicketValidateRequest,
  445. db: Session = Depends(deps.get_db),
  446. ):
  447. """
  448. 目标应用调用以消费票据。
  449. """
  450. # 1. Verify App
  451. app = db.query(Application).filter(Application.app_id == req.app_id).first()
  452. if not app:
  453. raise HTTPException(status_code=404, detail="应用未找到")
  454. # 2. Verify Signature
  455. params = {
  456. "ticket": req.ticket,
  457. "app_id": req.app_id,
  458. "timestamp": req.timestamp,
  459. "sign": req.sign
  460. }
  461. if not SignatureService.verify_signature(app.app_secret, params, req.sign):
  462. raise HTTPException(status_code=400, detail="签名无效")
  463. # 3. Consume Ticket
  464. ticket_data = TicketService.consume_ticket(req.ticket, req.app_id)
  465. if not ticket_data:
  466. return {"valid": False}
  467. user_id = ticket_data["user_id"]
  468. # 4. Get User Info & Mapping
  469. user = db.query(User).filter(User.id == user_id).first()
  470. mapping = db.query(AppUserMapping).filter(
  471. AppUserMapping.app_id == app.id,
  472. AppUserMapping.user_id == user_id
  473. ).first()
  474. mapped_key = mapping.mapped_key if mapping else None
  475. mapped_email = mapping.mapped_email if mapping else None
  476. return {
  477. "valid": True,
  478. "user_id": user.id,
  479. "mobile": user.mobile,
  480. "mapped_key": mapped_key,
  481. "mapped_email": mapped_email
  482. }