users.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325
  1. from fastapi import APIRouter, Form, Depends, HTTPException, Body
  2. from fastapi.security import OAuth2PasswordRequestForm, OAuth2PasswordBearer
  3. from app.models.models import User, UserPydantic
  4. from app.api import deps
  5. from sqlalchemy.orm import Session
  6. from typing import Any, Dict, Optional
  7. import secrets
  8. from fastapi_login.exceptions import InvalidCredentialsException
  9. from fastapi_login import LoginManager
  10. from datetime import timedelta,datetime
  11. from app.config import settings
  12. from pathlib import Path
  13. from jose import jwt
  14. import emails
  15. from emails.template import JinjaTemplate
  16. import logging
  17. import bcrypt
  18. from app.crud import crud_users
  19. import smtplib
  20. from email.mime.text import MIMEText
  21. from google.oauth2 import id_token
  22. from google.auth.transport import requests
  23. from fastapi.openapi.models import OAuthFlows as OAuthFlowsModel
  24. from fastapi.security.utils import get_authorization_scheme_param
  25. users = APIRouter()
  26. SECRET: str = secrets.token_urlsafe(32)
  27. manager = LoginManager(SECRET, '/login',default_expiry=timedelta(hours=72))
  28. @manager.user_loader()
  29. async def query_user(user_id: str):
  30. """
  31. Get a user from the db
  32. :param user_id: E-Mail of the user
  33. :return: None or the user object
  34. """
  35. result = await User.filter(email=user_id,is_gmail=0).first()
  36. if not result:
  37. print('無此筆資料')
  38. return None
  39. return result
  40. #@manager.user_loader()
  41. async def query_user_username(user_id: str):
  42. """
  43. Get a user from the db
  44. :param user_id: E-Mail of the user
  45. :return: None or the user object
  46. """
  47. result = await User.filter(username=user_id).first()
  48. if not result:
  49. print('無此筆資料')
  50. return None
  51. return result
  52. @users.post("/login")
  53. async def login(data: OAuth2PasswordRequestForm = Depends(), db: Session = Depends(deps.get_db)):
  54. email = data.username
  55. password = data.password
  56. user = await query_user(email)
  57. user_pydantic = UserPydantic.from_orm(user)
  58. user_dict = user_pydantic.dict(exclude_unset=True)
  59. access_token = manager.create_access_token(
  60. data={'sub': email}
  61. )
  62. if not user:
  63. # you can return any response or error of your choice
  64. return {"message":"查無此人"}
  65. # elif password != user.password:
  66. # raise InvalidCredentialsException
  67. else:
  68. user_dict.update({"token":access_token})
  69. token_update = user.update_from_dict(user_dict)
  70. await user.save()
  71. stored_hashed_password = user.password.encode('utf-8')
  72. if bcrypt.checkpw(password.encode('utf-8'),stored_hashed_password):
  73. return {'msg':'登入成功','code':'200','access_token': access_token,'username':user.username,'email':user.email,'points':user.points}
  74. else:
  75. return {"message": "Invalid username or password"}
  76. oauth2_scheme = OAuth2PasswordBearer(tokenUrl="https://oauth2.googleapis.com/token")
  77. CLIENT_ID = settings.CLIENT_ID
  78. @users.post("/login/google/access-token")
  79. async def login(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default='')
  80. ) -> Any:
  81. """
  82. OAuth2 compatible token login, get an access token for future requests
  83. """
  84. access_token = manager.create_access_token(
  85. data={'sub': username}
  86. )
  87. user = await User.filter(email=email,is_gmail=1).first() # 確認信箱是否已存在
  88. if not user:
  89. u = await User.create(username=username, password=password, email=email, is_gmail=1,token=access_token)
  90. # if user:
  91. # print('已用相同信箱註冊過,再開一個GMAIL帳號')
  92. # u = await User.create(username=username, password=password,email=email,is_gmail=1)
  93. user_pydantic = UserPydantic.from_orm(user)
  94. user_dict = user_pydantic.dict(exclude_unset=True)
  95. user_dict.update({"token": access_token})
  96. token_update = user.update_from_dict(user_dict)
  97. await user.save()
  98. return_msg = {
  99. "access_token": access_token,
  100. "token_type": "bearer",
  101. }
  102. return return_msg
  103. # if add_time_code:
  104. # available_ser_no = crud.serial_number.available(db, ser_no=add_time_code)
  105. # print(available_ser_no)
  106. # if available_ser_no:
  107. # user_in = schemas.UserUpdate(available_time=user.available_time + available_ser_no.time)
  108. # crud.user.update(db, db_obj=user, obj_in=user_in)
  109. #
  110. # ser_no_in = schemas.SerialNumberUpdate(code=available_ser_no.code, is_used=True,
  111. # used_datetime=str(datetime.now()), owner_id=user.id)
  112. # crud.serial_number.update(db, db_obj=available_ser_no, obj_in=ser_no_in)
  113. # print(available_ser_no.time, type(available_ser_no.time))
  114. # return_msg['time_added'] = available_ser_no.time
  115. # else:
  116. # return_msg['time_added'] = -1
  117. # return return_msg
  118. @users.post("/logout")
  119. async def logout():
  120. return {"msg":"logout success","code":200}
  121. @users.post("/add")
  122. async def add(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default=''), re_password: str = Form(default='')):
  123. if username and password and email:
  124. user_email = await query_user(email)
  125. user_username = await query_user_username(username)
  126. if user_email and user_username:
  127. return {"msg":"該信箱或使用者名稱已存在","code":403}
  128. # elif user_username:
  129. # return {"msg":"該使用者名稱已存在","code":403}
  130. else:
  131. if password == re_password:
  132. hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  133. u = await User.create(username=username, password=hashed_password, email=email,is_superuser=0,is_gmail=0,token='')
  134. if u:
  135. message = '註冊成功'
  136. subject = '註冊信'
  137. print(message)
  138. send_email(email,message,subject)
  139. return {"msg": "已寄送註冊信", "code": 200}
  140. else:
  141. return {"msg":"確認密碼錯誤","code":403}
  142. return {"msg": "create user failed", "code": 403}
  143. def generate_password_reset_token(email: str) -> str:
  144. delta = timedelta(hours=settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS)
  145. now = datetime.utcnow()
  146. expires = now + delta
  147. exp = expires.timestamp()
  148. encoded_jwt = jwt.encode(
  149. {"exp": exp, "nbf": now, "sub": email}, settings.SECRET_KEY, algorithm="HS256",)
  150. print(encoded_jwt)
  151. return encoded_jwt
  152. def verify_password_reset_token(token: str):
  153. try:
  154. decoded_token = jwt.decode(token, settings.SECRET_KEY, algorithms=["HS256"])
  155. print(decoded_token)
  156. return decoded_token["sub"]
  157. except jwt.JWTError:
  158. return None
  159. def send_email(
  160. email_to: str,
  161. subject_template: str = "",
  162. html_template: str = "",
  163. environment: Dict[str, Any] = {},
  164. ):
  165. message = emails.Message(
  166. subject=JinjaTemplate(subject_template),
  167. html=JinjaTemplate(html_template),
  168. mail_from=(settings.EMAILS_FROM_NAME, settings.EMAILS_FROM_EMAIL),
  169. )
  170. smtp_options = {"host": settings.SMTP_HOST, "port": settings.SMTP_PORT}
  171. if settings.SMTP_TLS:
  172. smtp_options["tls"] = True
  173. if settings.SMTP_USER:
  174. smtp_options["user"] = settings.SMTP_USER
  175. if settings.SMTP_PASSWORD:
  176. smtp_options["password"] = settings.SMTP_PASSWORD
  177. response = message.send(to=email_to, render=environment, smtp=smtp_options)
  178. return {"message":f"send email result: {response}"}
  179. # logging.info(f"send email result: {response}")
  180. # email_content = MIMEText(message)
  181. # email_content["Subject"] = subject
  182. # email_content["From"] = 'zooey@choozmo.com'
  183. # email_content["To"] = email_to
  184. # try:
  185. # print('測試成功')
  186. # # Connect to the SMTP server
  187. # smtp_server = smtplib.SMTP(settings.SMTP_HOST, settings.SMTP_PORT)
  188. # smtp_server.starttls()
  189. #
  190. # # Login to the email account
  191. # smtp_server.login(settings.SMTP_HOST, settings.SMTP_PASSWORD)
  192. #
  193. # # Send the email
  194. # smtp_server.sendmail(settings.SMTP_HOST, email_to, email_content.as_string())
  195. #
  196. # # Close the connection
  197. # smtp_server.quit()
  198. #
  199. # return {"message": "Email sent successfully."}
  200. # except Exception as e:
  201. # print('測試失敗')
  202. def send_reset_password_email(email_to: str, email: str, token: str) -> None:
  203. subject = f"Password recovery for user {email}"
  204. with open(Path(settings.EMAIL_TEMPLATES_DIR) / "reset_password.html") as f:
  205. template_str = f.read()
  206. server_host = settings.SERVER_HOST
  207. link = f"{server_host}/reset-password?token={token}"
  208. message = '重新設定密碼'
  209. send_email(
  210. email_to=email_to,
  211. subject_template=subject,
  212. html_template=template_str,
  213. environment={
  214. "project_name": settings.PROJECT_NAME,
  215. "username": email,
  216. "email": email_to,
  217. "valid_hours": settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS,
  218. "link": link,
  219. },
  220. )
  221. @users.post("/password-recovery/{email}")
  222. async def recover_password(email:str):
  223. user = await User.filter(email=email).first()
  224. if not user:
  225. raise HTTPException(
  226. status_code=404,
  227. detail="The user with this username does not exist in the system.",
  228. )
  229. password_reset_token = generate_password_reset_token(email=email)
  230. send_reset_password_email(
  231. email_to=user.email, email=email, token=password_reset_token
  232. )
  233. return {"msg": "Password recovery email sent"}
  234. from pydantic import BaseModel
  235. class Msg(BaseModel):
  236. msg: str
  237. @users.post("/reset-password/", response_model=Msg)
  238. async def reset_password(
  239. token: str = Body(...),
  240. new_password: str = Body(...),
  241. db: Session = Depends(deps.get_db),
  242. ) -> Any:
  243. """
  244. Reset password
  245. """
  246. email = verify_password_reset_token(token)
  247. print(email)
  248. if not email:
  249. raise HTTPException(status_code=400, detail="Invalid token")
  250. # user = await query_user(email)
  251. user = await User.filter(email=email).first()
  252. if not user:
  253. raise HTTPException(
  254. status_code=404,
  255. detail="The user with this username does not exist in the system.",
  256. )
  257. # elif not crud.user.is_active(user):
  258. # raise HTTPException(status_code=400, detail="Inactive user")
  259. hashed_password = bcrypt.hashpw(new_password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  260. user.password = hashed_password
  261. # db.add(user)
  262. db.commit()
  263. print(user.password)
  264. db.close()
  265. return {"msg": "Password updated successfully"}
  266. @users.get("/delete_user/{id}")
  267. async def delete(id: int):
  268. if id:
  269. await User.filter(id=id).delete()
  270. return {"msg": "success", "code": 200}
  271. return {"msg": "failed", "code": 400}
  272. @users.get("/information")
  273. async def get_information(email:str,is_gmail:int):
  274. result = await User.filter(email=email, is_gmail=is_gmail).first()
  275. return {"msg":result, "code":200}
  276. @users.get("/protect")
  277. def protected_route(user=Depends(manager)):
  278. if user is None:
  279. return {'message': "no access"}
  280. return {'user': user}