users.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. from fastapi import APIRouter, Form, Depends, HTTPException, Body
  2. from fastapi.security import OAuth2PasswordRequestForm, OAuth2PasswordBearer
  3. from app.models.models import User, UserPydantic
  4. from app.api import deps
  5. from sqlalchemy.orm import Session
  6. from typing import Any, Dict, Optional
  7. import secrets
  8. from fastapi_login.exceptions import InvalidCredentialsException
  9. from fastapi_login import LoginManager
  10. from datetime import timedelta,datetime
  11. from app.config import settings
  12. from pathlib import Path
  13. from jose import jwt
  14. import emails
  15. from emails.template import JinjaTemplate
  16. import logging
  17. import bcrypt
  18. from app.crud import crud_users
  19. import smtplib
  20. from email.mime.text import MIMEText
  21. from google.oauth2 import id_token
  22. from google.auth.transport import requests
  23. from fastapi.openapi.models import OAuthFlows as OAuthFlowsModel
  24. from fastapi.security.utils import get_authorization_scheme_param
  25. users = APIRouter()
  26. SECRET: str = secrets.token_urlsafe(32)
  27. manager = LoginManager(SECRET, '/login',default_expiry=timedelta(hours=72))
  28. @manager.user_loader()
  29. async def query_user(user_id: str):
  30. """
  31. Get a user from the db
  32. :param user_id: E-Mail of the user
  33. :return: None or the user object
  34. """
  35. result = await User.filter(email=user_id,is_active=1).first()
  36. if not result:
  37. print('無此筆資料')
  38. return None
  39. return result
  40. #@manager.user_loader()
  41. async def query_user_username(user_id: str):
  42. """
  43. Get a user from the db
  44. :param user_id: E-Mail of the user
  45. :return: None or the user object
  46. """
  47. result = await User.filter(username=user_id).first()
  48. if not result:
  49. print('無此筆資料')
  50. return None
  51. return result
  52. @users.post("/login")
  53. async def login(data: OAuth2PasswordRequestForm = Depends(), db: Session = Depends(deps.get_db), position: str=Form(default='')):
  54. email = data.username
  55. password = data.password
  56. user = await query_user(email)
  57. user_pydantic = UserPydantic.from_orm(user)
  58. user_dict = user_pydantic.dict(exclude_unset=True)
  59. access_token = manager.create_access_token(
  60. data={'sub': email}
  61. )
  62. if not user:
  63. # you can return any response or error of your choice
  64. return {"message":"查無此人"}
  65. # elif password != user.password:
  66. # raise InvalidCredentialsException
  67. else:
  68. user_dict.update({"token":access_token})
  69. token_update = user.update_from_dict(user_dict)
  70. await user.save()
  71. stored_hashed_password = user.password.encode('utf-8')
  72. if bcrypt.checkpw(password.encode('utf-8'),stored_hashed_password):
  73. return {'msg':'登入成功','code':'200','access_token': access_token,'username':user.username,'email':user.email,'points':user.points}
  74. else:
  75. return {"message": "Invalid username or password"}
  76. oauth2_scheme = OAuth2PasswordBearer(tokenUrl="https://oauth2.googleapis.com/token")
  77. CLIENT_ID = settings.CLIENT_ID
  78. @users.post("/login/google/access-token")
  79. async def login(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default=''), position: str = Form(default=''),
  80. ) -> Any:
  81. """
  82. OAuth2 compatible token login, get an access token for future requests
  83. """
  84. access_token = manager.create_access_token(
  85. data={'sub': username}
  86. )
  87. user = await User.filter(email=email).first() # 確認信箱是否已存在
  88. if not user:
  89. u = await User.create(username=username, password=password, email=email,token=access_token, is_superuser=0,points=0)
  90. create_user = u
  91. # if user:
  92. # print('已用相同信箱註冊過,再開一個GMAIL帳號')
  93. # u = await User.create(username=username, password=password,email=email)
  94. user_pydantic = UserPydantic.from_orm(user)
  95. user_dict = user_pydantic.dict(exclude_unset=True)
  96. user_dict.update({"token": access_token})
  97. token_update = user.update_from_dict(user_dict)
  98. await user.save()
  99. return_msg = {
  100. "access_token": access_token,
  101. "token_type": "bearer",
  102. 'code':'200',
  103. }
  104. return return_msg
  105. # if add_time_code:
  106. # available_ser_no = crud.serial_number.available(db, ser_no=add_time_code)
  107. # print(available_ser_no)
  108. # if available_ser_no:
  109. # user_in = schemas.UserUpdate(available_time=user.available_time + available_ser_no.time)
  110. # crud.user.update(db, db_obj=user, obj_in=user_in)
  111. #
  112. # ser_no_in = schemas.SerialNumberUpdate(code=available_ser_no.code, is_used=True,
  113. # used_datetime=str(datetime.now()), owner_id=user.id)
  114. # crud.serial_number.update(db, db_obj=available_ser_no, obj_in=ser_no_in)
  115. # print(available_ser_no.time, type(available_ser_no.time))
  116. # return_msg['time_added'] = available_ser_no.time
  117. # else:
  118. # return_msg['time_added'] = -1
  119. # return return_msg
  120. @users.post("/logout")
  121. async def logout():
  122. return {"msg":"logout success","code":200}
  123. @users.post("/add") # 寄認證信
  124. async def add(username: str = Form(default=''), password: str = Form(default=''), email: str = Form(default=''), re_password: str = Form(default=''), position: str = Form(default='')):
  125. if username and password and email:
  126. user_email = await query_user(email)
  127. user_username = await query_user_username(username)
  128. if user_email and user_username:
  129. return {"msg":"該信箱或使用者名稱已存在","code":403}
  130. # elif user_username:
  131. # return {"msg":"該使用者名稱已存在","code":403}
  132. else:
  133. if password == re_password:
  134. # access_token = manager.create_access_token(
  135. # data={'sub': email}
  136. # )
  137. print('前',settings.SECRET_KEY)
  138. access_token = jwt.encode({'email':email}, settings.SECRET_KEY, algorithm="HS256")
  139. hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  140. u = await User.create(username=username, password=hashed_password, email=email,is_superuser=0,token='',points=0,is_active=0)
  141. if u:
  142. # message = '註冊認證'
  143. message = f"請點擊以下連結完成註冊流程:\n\nhttp://127.0.0.1:8000/api/verify?token={access_token}"
  144. subject = '註冊信'
  145. print(message)
  146. send_email(email,access_token,subject,message)
  147. return {"msg": "已寄送註冊信", "code": 200}
  148. else:
  149. return {"msg": "未寄出註冊信", "code":403}
  150. else:
  151. return {"msg":"確認密碼錯誤","code":403}
  152. return {"msg": "create user failed", "code": 403}
  153. @users.get("/verify") # 註冊認證確認
  154. async def verify_email(token:str):
  155. try:
  156. print(token)
  157. print('後',settings.SECRET_KEY)
  158. payload = jwt.decode(token, settings.SECRET_KEY, algorithms=["HS256"])
  159. print('解密結果',payload)
  160. email = payload["email"]
  161. # is_active True
  162. user = await User.filter(email=email,is_active=0).first()
  163. if user:
  164. user_pydantic = UserPydantic.from_orm(user)
  165. user_dict = user_pydantic.dict(exclude_unset=True)
  166. user_dict.update({"is_active": 1})
  167. is_active_update = user.update_from_dict(user_dict)
  168. await user.save()
  169. result = '信箱驗證成功'
  170. else:
  171. result = '信箱驗證失敗'
  172. return {"message": result}
  173. except:
  174. raise HTTPException(status_code=400)
  175. # except jwt.ExpiredSignatureError:
  176. # raise HTTPException(status_code=400, detail="token已失效")
  177. # except jwt.DecodeError:
  178. # raise HTTPException(status_code=400, detail="無效token")
  179. def generate_password_reset_token(email: str) -> str:
  180. delta = timedelta(hours=settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS)
  181. now = datetime.utcnow()
  182. expires = now + delta
  183. exp = expires.timestamp()
  184. encoded_jwt = jwt.encode(
  185. {"exp": exp, "nbf": now, "sub": email}, settings.SECRET_KEY, algorithm="HS256",)
  186. print(encoded_jwt)
  187. return encoded_jwt
  188. def verify_password_reset_token(token: str):
  189. try:
  190. decoded_token = jwt.decode(token, settings.SECRET_KEY, algorithms=["HS256"])
  191. print(decoded_token)
  192. return decoded_token["sub"]
  193. except jwt.JWTError:
  194. return None
  195. def send_email(
  196. email_to: str,
  197. token: str,
  198. subject_template: str = "",
  199. html_template: str = "",
  200. environment: Dict[str, Any] = {},
  201. ):
  202. # message = emails.Message(
  203. # subject=JinjaTemplate(subject_template),
  204. # html=JinjaTemplate(html_template),
  205. # mail_from=(settings.EMAILS_FROM_NAME, settings.EMAILS_FROM_EMAIL),
  206. # )
  207. message = emails.Message(
  208. subject=JinjaTemplate(subject_template),
  209. html=JinjaTemplate(html_template),
  210. mail_from=(settings.EMAILS_FROM_NAME, settings.EMAILS_FROM_EMAIL),
  211. )
  212. smtp_options = {"host": settings.SMTP_HOST, "port": settings.SMTP_PORT}
  213. if settings.SMTP_TLS:
  214. smtp_options["tls"] = True
  215. if settings.SMTP_USER:
  216. smtp_options["user"] = settings.SMTP_USER
  217. if settings.SMTP_PASSWORD:
  218. smtp_options["password"] = settings.SMTP_PASSWORD
  219. response = message.send(to=email_to, render=environment, smtp=smtp_options)
  220. return {"message":f"send email result: {response}"}
  221. # logging.info(f"send email result: {response}")
  222. # email_content = MIMEText(message)
  223. # email_content["Subject"] = subject
  224. # email_content["From"] = 'zooey@choozmo.com'
  225. # email_content["To"] = email_to
  226. # try:
  227. # print('測試成功')
  228. # # Connect to the SMTP server
  229. # smtp_server = smtplib.SMTP(settings.SMTP_HOST, settings.SMTP_PORT)
  230. # smtp_server.starttls()
  231. #
  232. # # Login to the email account
  233. # smtp_server.login(settings.SMTP_HOST, settings.SMTP_PASSWORD)
  234. #
  235. # # Send the email
  236. # smtp_server.sendmail(settings.SMTP_HOST, email_to, email_content.as_string())
  237. #
  238. # # Close the connection
  239. # smtp_server.quit()
  240. #
  241. # return {"message": "Email sent successfully."}
  242. # except Exception as e:
  243. # print('測試失敗')
  244. def create_singup_url():
  245. url=''
  246. return url
  247. def send_reset_password_email(email_to: str, email: str, token: str) -> None:
  248. subject = f"Password recovery for user {email}"
  249. with open(Path(settings.EMAIL_TEMPLATES_DIR) / "reset_password.html") as f:
  250. template_str = f.read()
  251. server_host = settings.SERVER_HOST
  252. link = f"{server_host}/reset-password?token={token}"
  253. message = '重新設定密碼'
  254. send_email(
  255. email_to=email_to,
  256. subject_template=subject,
  257. html_template=template_str,
  258. environment={
  259. "project_name": settings.PROJECT_NAME,
  260. "username": email,
  261. "email": email_to,
  262. "valid_hours": settings.EMAIL_RESET_TOKEN_EXPIRE_HOURS,
  263. "link": link,
  264. },
  265. )
  266. @users.post("/password-recovery/{email}")
  267. async def recover_password(email:str):
  268. user = await User.filter(email=email).first()
  269. if not user:
  270. raise HTTPException(
  271. status_code=404,
  272. detail="The user with this username does not exist in the system.",
  273. )
  274. password_reset_token = generate_password_reset_token(email=email)
  275. send_reset_password_email(
  276. email_to=user.email, email=email, token=password_reset_token
  277. )
  278. return {"msg": "Password recovery email sent"}
  279. from pydantic import BaseModel
  280. class Msg(BaseModel):
  281. msg: str
  282. @users.post("/reset-password/", response_model=Msg)
  283. async def reset_password(
  284. token: str = Body(...),
  285. new_password: str = Body(...),
  286. db: Session = Depends(deps.get_db),
  287. ) -> Any:
  288. """
  289. Reset password
  290. """
  291. email = verify_password_reset_token(token)
  292. print(email)
  293. if not email:
  294. raise HTTPException(status_code=400, detail="Invalid token")
  295. # user = await query_user(email)
  296. user = await User.filter(email=email).first()
  297. if not user:
  298. raise HTTPException(
  299. status_code=404,
  300. detail="The user with this username does not exist in the system.",
  301. )
  302. # elif not crud.user.is_active(user):
  303. # raise HTTPException(status_code=400, detail="Inactive user")
  304. hashed_password = bcrypt.hashpw(new_password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
  305. user.password = hashed_password
  306. # db.add(user)
  307. db.commit()
  308. print(user.password)
  309. db.close()
  310. return {"msg": "Password updated successfully"}
  311. @users.get("/delete_user/{id}")
  312. async def delete(id: int):
  313. if id:
  314. await User.filter(id=id).delete()
  315. return {"msg": "success", "code": 200}
  316. return {"msg": "failed", "code": 400}
  317. @users.get("/information")
  318. async def get_information(token:str):
  319. result = await User.filter(token=token).first()
  320. return {"msg":result, "code":200}
  321. @users.get("/protect")
  322. def protected_route(user=Depends(manager)):
  323. if user is None:
  324. return {'message': "no access"}
  325. return {'user': user}