login.py 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. from datetime import timedelta
  2. from typing import Annotated, Any
  3. from apps.api.deps import CurrentUser, SessionDep, get_current_active_superuser
  4. from apps.common import security
  5. from apps.common.security import get_password_hash
  6. from apps.config import settings
  7. from apps.models import crud
  8. from apps.models.models import Message, NewPassword, Token
  9. from apps.models.user import UserOut
  10. from apps.utils.mail_util import (generate_password_reset_token,
  11. generate_reset_password_email, send_email,
  12. verify_password_reset_token)
  13. from fastapi import APIRouter, Depends, HTTPException
  14. from fastapi.responses import HTMLResponse
  15. from fastapi.security import OAuth2PasswordRequestForm
  16. router = APIRouter()
  17. @router.post("/login/access-token", summary="登录")
  18. def login_access_token(
  19. session: SessionDep, form_data: Annotated[OAuth2PasswordRequestForm, Depends()]
  20. ) -> Token:
  21. """
  22. OAuth2 compatible token login, get an access token for future requests
  23. """
  24. user = crud.authenticate(
  25. session=session, email=form_data.username, password=form_data.password
  26. )
  27. if not user:
  28. raise HTTPException(status_code=400, detail="Incorrect email or password")
  29. elif not user.is_active:
  30. raise HTTPException(status_code=400, detail="Inactive user")
  31. access_token_expires = timedelta(minutes=settings.ACCESS_TOKEN_EXPIRE_MINUTES)
  32. return Token(
  33. access_token=security.create_access_token(
  34. user.id, expires_delta=access_token_expires
  35. )
  36. )
  37. @router.post("/login/test-token", response_model=UserOut, summary="test")
  38. def test_token(current_user: CurrentUser) -> Any:
  39. """
  40. Test access token
  41. """
  42. return current_user
  43. @router.post("/password-recovery/{email}", summary= "密码找回")
  44. def recover_password(email: str, session: SessionDep) -> Message:
  45. """
  46. Password Recovery
  47. """
  48. user = crud.get_user_by_email(session=session, email=email)
  49. if not user:
  50. raise HTTPException(
  51. status_code=404,
  52. detail="The user with this email does not exist in the system.",
  53. )
  54. password_reset_token = generate_password_reset_token(email=email)
  55. email_data = generate_reset_password_email(
  56. email_to=user.email, email=email, token=password_reset_token
  57. )
  58. send_email(
  59. email_to=user.email,
  60. subject=email_data.subject,
  61. html_content=email_data.html_content,
  62. )
  63. return Message(message="Password recovery email sent")
  64. @router.post("/reset-password/", summary="重置密码")
  65. def reset_password(session: SessionDep, body: NewPassword) -> Message:
  66. """
  67. Reset password
  68. """
  69. # STRONG_PASSWORD_PATTERN = re.compile(r"^(?=.*[\d])(?=.*[!@#$%^&*])[\w!@#$%^&*]{6,128}$")
  70. email = verify_password_reset_token(token=body.token)
  71. if not email:
  72. raise HTTPException(status_code=400, detail="Invalid token")
  73. user = crud.get_user_by_email(session=session, email=email)
  74. if not user:
  75. raise HTTPException(
  76. status_code=404,
  77. detail="The user with this email does not exist in the system.",
  78. )
  79. elif not user.is_active:
  80. raise HTTPException(status_code=400, detail="Inactive user")
  81. hashed_password = get_password_hash(password=body.new_password)
  82. user.hashed_password = hashed_password
  83. session.add(user)
  84. session.commit()
  85. return Message(message="Password updated successfully")
  86. @router.post(
  87. "/password-recovery-html-content/{email}",
  88. dependencies=[Depends(get_current_active_superuser)],
  89. response_class=HTMLResponse,
  90. summary="HTML Content for Password Recovery",
  91. )
  92. def recover_password_html_content(email: str, session: SessionDep) -> Any:
  93. """
  94. HTML Content for Password Recovery
  95. """
  96. user = crud.get_user_by_email(session=session, email=email)
  97. if not user:
  98. raise HTTPException(
  99. status_code=404,
  100. detail="The user with this username does not exist in the system.",
  101. )
  102. password_reset_token = generate_password_reset_token(email=email)
  103. email_data = generate_reset_password_email(
  104. email_to=user.email, email=email, token=password_reset_token
  105. )
  106. return HTMLResponse(
  107. content=email_data.html_content, headers={"subject:": email_data.subject}
  108. )
  109. @router.get("/healthcheck", include_in_schema=False, summary="健康检查")
  110. async def healthcheck() -> dict[str, str]:
  111. return {"status": "ok"}
  112. # @router.post("/signup", response_model=UserOut)
  113. # async def signup(user: UserOut = Body(...)):
  114. # admin_exists = await User.find_one(User.email ==user.email)
  115. # if admin_exists:
  116. # raise HTTPException(
  117. # status_code=409, detail = "user is exists."
  118. # )
  119. # admin.password =
  120. # new_admin = await add_user(admin)
  121. # return new_admin