users.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. from fastapi import APIRouter, Form, Depends, HTTPException, Body
  2. from fastapi.security import OAuth2PasswordRequestForm, OAuth2PasswordBearer
  3. from app.models.models import User, UserPydantic
  4. from app.api import deps
  5. from sqlalchemy.orm import Session
  6. from typing import Any, Dict, Optional
  7. import secrets
  8. from fastapi_login.exceptions import InvalidCredentialsException
  9. from fastapi_login import LoginManager
  10. from datetime import timedelta,datetime
  11. from app.config import settings
  12. from pathlib import Path
  13. from jose import jwt
  14. import emails
  15. from emails.template import JinjaTemplate
  16. import logging
  17. import bcrypt
  18. from app.crud import crud_users
  19. import smtplib
  20. from email.mime.text import MIMEText
  21. from google.oauth2 import id_token
  22. from google.auth.transport import requests
  23. from fastapi.openapi.models import OAuthFlows as OAuthFlowsModel
  24. from fastapi.security.utils import get_authorization_scheme_param
  25. users = APIRouter()
  26. SECRET: str = secrets.token_urlsafe(32)
  27. manager = LoginManager(SECRET, '/login',default_expiry=timedelta(hours=72))
  28. @manager.user_loader()
  29. async def query_user(user_id: str):
  30. """
  31. Get a user from the db
  32. :param user_id: E-Mail of the user
  33. :return: None or the user object
  34. """
  35. # result = await User.filter(email=user_id,is_active=1).first()
  36. result = await User.filter(email=user_id).first()
  37. if not result:
  38. print('無此筆資料')
  39. return None
  40. return result
  41. #@manager.user_loader()
  42. async def query_user_username(user_id: str):
  43. """
  44. Get a user from the db
  45. :param user_id: E-Mail of the user
  46. :return: None or the user object
  47. """
  48. result = await User.filter(username=user_id).first()
  49. if not result:
  50. print('無此筆資料')
  51. return None
  52. return result
  53. @users.post("/login")
  54. async def login(data: OAuth2PasswordRequestForm = Depends(), db: Session = Depends(deps.get_db), position: str=Form(default='')):
  55. email = data.username
  56. password = data.password
  57. user = await query_user(email)
  58. user_pydantic = UserPydantic.from_orm(user)
  59. user_dict = user_pydantic.dict(exclude_unset=True)
  60. access_token = manager.create_access_token(
  61. data={'sub': email}
  62. )
  63. if not user:
  64. # you can return any response or error of your choice
  65. return {"message":"查無此人"}
  66. # elif password != user.password:
  67. # raise InvalidCredentialsException
  68. else:
  69. user_dict.update({"token":access_token})
  70. token_update = user.update_from_dict(user_dict)
  71. await user.save()
  72. stored_hashed_password = user.password.encode('utf-8')
  73. if bcrypt.checkpw(password.encode('utf-8'),stored_hashed_password):
  74. return {'msg':'登入成功','code':'200','access_token': access_token,'username':user.username,'email':user.email,'points':user.points}
  75. else:
  76. return {"message": "Invalid username or password"}
  77. oauth2_scheme = OAuth2PasswordBearer(tokenUrl="https://oauth2.googleapis.com/token")
  78. CLIENT_ID = settings.CLIENT_ID
  79. @users.post("/login/google/access-token")
  80. async def login(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default=''), position: str = Form(default=''),
  81. ) -> Any:
  82. """
  83. OAuth2 compatible token login, get an access token for future requests
  84. """
  85. access_token = manager.create_access_token(
  86. data={'sub': username}
  87. )
  88. user = await User.filter(email=email).first() # 確認信箱是否已存在
  89. if not user:
  90. u = await User.create(username=username, password=password, email=email,token=access_token, is_superuser=0, points=0,is_active =1)
  91. create_user = u
  92. # if user:
  93. # print('已用相同信箱註冊過,再開一個GMAIL帳號')
  94. # u = await User.create(username=username, password=password,email=email)
  95. user_pydantic = UserPydantic.from_orm(user)
  96. user_dict = user_pydantic.dict(exclude_unset=True)
  97. user_dict.update({"token": access_token})
  98. token_update = user.update_from_dict(user_dict)
  99. await user.save()
  100. return_msg = {
  101. "access_token": access_token,
  102. "token_type": "bearer",
  103. 'code':'200',
  104. }
  105. return return_msg
  106. # if add_time_code:
  107. # available_ser_no = crud.serial_number.available(db, ser_no=add_time_code)
  108. # print(available_ser_no)
  109. # if available_ser_no:
  110. # user_in = schemas.UserUpdate(available_time=user.available_time + available_ser_no.time)
  111. # crud.user.update(db, db_obj=user, obj_in=user_in)
  112. #
  113. # ser_no_in = schemas.SerialNumberUpdate(code=available_ser_no.code, is_used=True,
  114. # used_datetime=str(datetime.now()), owner_id=user.id)
  115. # crud.serial_number.update(db, db_obj=available_ser_no, obj_in=ser_no_in)
  116. # print(available_ser_no.time, type(available_ser_no.time))
  117. # return_msg['time_added'] = available_ser_no.time
  118. # else:
  119. # return_msg['time_added'] = -1
  120. # return return_msg
  121. @users.post("/logout")
  122. async def logout():
  123. return {"msg":"logout success","code":200}
  124. @users.post("/add") # 寄認證信
  125. async def add(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default=''), re_password: str = Form(default='')):
  126. if username and password and email:
  127. user_email = await query_user(email)
  128. user_username = await query_user_username(username)
  129. if user_email or user_username:
  130. return {"msg":"該信箱或使用者名稱已存在","code":403}
  131. # elif user_username:
  132. # return {"msg":"該使用者名稱已存在","code":403}
  133. else:
  134. if password == re_password:
  135. # access_token = manager.create_access_token(
  136. # data={'sub': email}
  137. # )
  138. print('前',settings.SECRET_KEY)
  139. expiration_time = datetime.utcnow() + timedelta(hours=0.5)
  140. access_token = jwt.encode({'email':email,'exp':expiration_time}, settings.SECRET_KEY, algorithm="HS256")
  141. hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  142. u = await User.create(username=username, password=hashed_password, email=email,is_superuser=0,token=access_token,points=0,is_active=1)
  143. if u:
  144. # message = '註冊認證'
  145. message = f"請點擊以下連結完成註冊流程:\n\nhttps://cmm.ai:8088/api/verify?token={access_token}"
  146. subject = '註冊信'
  147. print(message)
  148. send_email(email,access_token,subject,message)
  149. return {"msg": "已寄送註冊信", "code": 200}
  150. else:
  151. return {"msg": "未寄出註冊信", "code":403}
  152. else:
  153. return {"msg":"確認密碼錯誤","code":403}
  154. return {"msg": "create user failed", "code": 403}
  155. @users.get("/verify") # 註冊認證確認
  156. async def verify_email(token:str):
  157. try:
  158. print(token)
  159. print('後',settings.SECRET_KEY)
  160. payload = jwt.decode(token, settings.SECRET_KEY, algorithms=["HS256"])
  161. print('解密結果',payload)
  162. email = payload["email"]
  163. # is_active True
  164. user = await User.filter(email=email,is_active=0).first()
  165. if user:
  166. user_pydantic = UserPydantic.from_orm(user)
  167. user_dict = user_pydantic.dict(exclude_unset=True)
  168. user_dict.update({"is_active": 1})
  169. is_active_update = user.update_from_dict(user_dict)
  170. await user.save()
  171. result = '信箱驗證成功'
  172. else:
  173. result = '信箱驗證失敗'
  174. return {"message": result}
  175. except:
  176. raise HTTPException(status_code=400)
  177. # except jwt.ExpiredSignatureError:
  178. # raise HTTPException(status_code=400, detail="token已失效")
  179. # except jwt.DecodeError:
  180. # raise HTTPException(status_code=400, detail="無效token")
  181. def generate_password_reset_token(email: str) -> str:
  182. delta = timedelta(hours=settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS)
  183. now = datetime.utcnow()
  184. expires = now + delta
  185. exp = expires.timestamp()
  186. encoded_jwt = jwt.encode(
  187. {"exp": exp, "nbf": now, "sub": email}, settings.SECRET_KEY, algorithm="HS256",)
  188. print(encoded_jwt)
  189. return encoded_jwt
  190. def verify_password_reset_token(token: str):
  191. try:
  192. decoded_token = jwt.decode(token, settings.SECRET_KEY, algorithms=["HS256"])
  193. print(decoded_token)
  194. return decoded_token["sub"]
  195. except jwt.JWTError:
  196. return None
  197. def send_email(
  198. email_to: str,
  199. token: str,
  200. subject_template: str = "",
  201. html_template: str = "",
  202. environment: Dict[str, Any] = {},
  203. ):
  204. # message = emails.Message(
  205. # subject=JinjaTemplate(subject_template),
  206. # html=JinjaTemplate(html_template),
  207. # mail_from=(settings.EMAILS_FROM_NAME, settings.EMAILS_FROM_EMAIL),
  208. # )
  209. message = emails.Message(
  210. subject=JinjaTemplate(subject_template),
  211. html=JinjaTemplate(html_template),
  212. mail_from=(settings.EMAILS_FROM_NAME, settings.EMAILS_FROM_EMAIL),
  213. )
  214. smtp_options = {"host": settings.SMTP_HOST, "port": settings.SMTP_PORT}
  215. if settings.SMTP_TLS:
  216. smtp_options["tls"] = True
  217. if settings.SMTP_USER:
  218. smtp_options["user"] = settings.SMTP_USER
  219. if settings.SMTP_PASSWORD:
  220. smtp_options["password"] = settings.SMTP_PASSWORD
  221. response = message.send(to=email_to, render=environment, smtp=smtp_options)
  222. print('RResponse',response)
  223. return {"message":f"send email result: {response}"}
  224. # logging.info(f"send email result: {response}")
  225. # email_content = MIMEText(message)
  226. # email_content["Subject"] = subject
  227. # email_content["From"] = 'zooey@choozmo.com'
  228. # email_content["To"] = email_to
  229. # try:
  230. # print('測試成功')
  231. # # Connect to the SMTP server
  232. # smtp_server = smtplib.SMTP(settings.SMTP_HOST, settings.SMTP_PORT)
  233. # smtp_server.starttls()
  234. #
  235. # # Login to the email account
  236. # smtp_server.login(settings.SMTP_HOST, settings.SMTP_PASSWORD)
  237. #
  238. # # Send the email
  239. # smtp_server.sendmail(settings.SMTP_HOST, email_to, email_content.as_string())
  240. #
  241. # # Close the connection
  242. # smtp_server.quit()
  243. #
  244. # return {"message": "Email sent successfully."}
  245. # except Exception as e:
  246. # print('測試失敗')
  247. def create_singup_url():
  248. url=''
  249. return url
  250. def send_reset_password_email(email_to: str, email: str, token: str) -> None:
  251. subject = f"Password recovery for user {email}"
  252. with open(Path(settings.EMAIL_TEMPLATES_DIR) / "reset_password.html") as f:
  253. template_str = f.read()
  254. server_host = settings.SERVER_HOST
  255. link = f"{server_host}/reset-password?token={token}"
  256. message = '重新設定密碼'
  257. send_email(
  258. email_to=email_to,
  259. subject_template=subject,
  260. html_template=template_str,
  261. environment={
  262. "project_name": settings.PROJECT_NAME,
  263. "username": email,
  264. "email": email_to,
  265. "valid_hours": settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS,
  266. "link": link,
  267. },
  268. )
  269. @users.post("/password-recovery/{email}")
  270. async def recover_password(email:str):
  271. user = await User.filter(email=email).first()
  272. if not user:
  273. raise HTTPException(
  274. status_code=404,
  275. detail="The user with this username does not exist in the system.",
  276. )
  277. password_reset_token = generate_password_reset_token(email=email)
  278. send_reset_password_email(
  279. email_to=user.email, email=email, token=password_reset_token
  280. )
  281. return {"msg": "Password recovery email sent"}
  282. from pydantic import BaseModel
  283. class Msg(BaseModel):
  284. msg: str
  285. @users.post("/reset-password/", response_model=Msg)
  286. async def reset_password(
  287. token: str = Body(...),
  288. new_password: str = Body(...),
  289. db: Session = Depends(deps.get_db),
  290. ) -> Any:
  291. """
  292. Reset password
  293. """
  294. email = verify_password_reset_token(token)
  295. print(email)
  296. if not email:
  297. raise HTTPException(status_code=400, detail="Invalid token")
  298. # user = await query_user(email)
  299. user = await User.filter(email=email).first()
  300. if not user:
  301. raise HTTPException(
  302. status_code=404,
  303. detail="The user with this username does not exist in the system.",
  304. )
  305. # elif not crud.user.is_active(user):
  306. # raise HTTPException(status_code=400, detail="Inactive user")
  307. hashed_password = bcrypt.hashpw(new_password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  308. user.password = hashed_password
  309. # db.add(user)
  310. db.commit()
  311. print(user.password)
  312. db.close()
  313. return {"msg": "Password updated successfully"}
  314. @users.get("/delete_user/{id}")
  315. async def delete(id: int):
  316. if id:
  317. await User.filter(id=id).delete()
  318. return {"msg": "success", "code": 200}
  319. return {"msg": "failed", "code": 400}
  320. @users.get("/information")
  321. async def get_information(token:str):
  322. result = await User.filter(token=token).first()
  323. return {"msg":result, "code":200}
  324. @users.get("/protect")
  325. def protected_route(user=Depends(manager)):
  326. if user is None:
  327. return {'message': "no access"}
  328. return {'user': user}