mini-rbac/backend/core/security.py

92 lines
2.9 KiB
Python
Raw Normal View History

2022-09-11 10:34:18 +00:00
from datetime import datetime, timedelta
from typing import Optional
2022-09-13 05:31:15 +00:00
from fastapi import Depends, Request
2022-09-11 10:34:18 +00:00
from fastapi.security import HTTPAuthorizationCredentials, HTTPBearer
from jose import JWTError, jwt
from passlib.context import CryptContext
2022-09-13 05:31:15 +00:00
from core.exceptions import PermissionsError, TokenAuthFailure
from dbhelper.menu import get_apis
2022-09-13 05:31:15 +00:00
from dbhelper.user import get_user, get_user_info
from models import UserModel
2022-09-11 10:34:18 +00:00
# JWT
SECRET_KEY = "lLNiBWPGiEmCLLR9kRGidgLY7Ac1rpSWwfGzTJpTmCU"
ALGORITHM = "HS256"
2022-09-12 07:11:12 +00:00
ACCESS_TOKEN_EXPIRE_MINUTES = 60 * 24 * 7
2022-09-11 10:34:18 +00:00
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
bearer = HTTPBearer()
def verify_password(plain_password: str, hashed_password: str) -> bool:
"""
验证明文密码 vs hash密码
:param plain_password: 明文密码
:param hashed_password: hash密码
:return:
"""
return pwd_context.verify(plain_password, hashed_password)
def get_password_hash(password: str) -> str:
"""
加密明文
:param password: 明文密码
:return:
"""
return pwd_context.hash(password)
def generate_token(username: str, expires_delta: Optional[timedelta] = None):
"""生成token"""
to_encode = {"sub": username}.copy()
if expires_delta:
expire = datetime.utcnow() + expires_delta
else:
2022-09-12 07:11:12 +00:00
expire = datetime.utcnow() + timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)
2022-09-11 10:34:18 +00:00
to_encode.update(dict(exp=expire))
2022-09-12 07:11:12 +00:00
encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
2022-09-11 10:34:18 +00:00
return encoded_jwt
async def check_token(security: HTTPAuthorizationCredentials = Depends(bearer)):
"""检查用户token"""
token = security.credentials
try:
2022-09-12 07:11:12 +00:00
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
2022-09-11 10:34:18 +00:00
username: str = payload.get("sub")
return await get_user({"username": username})
except JWTError:
2022-09-13 05:31:15 +00:00
raise TokenAuthFailure(403, "认证失败")
async def check_permissions(request: Request, user: UserModel = Depends(check_token)):
"""检查接口权限"""
# 查询当前激活角色
result = await get_user_info(user)
active_rid = result["roles"][0]["id"]
2022-09-19 10:02:37 +00:00
# 白名单 登录用户信息, 登录用户菜单信息
2022-09-13 05:31:15 +00:00
whitelist = [f"/user/{user.id}", f"/role/{active_rid}/menu"]
flag = request.url.path in whitelist and request.method == "GET"
if flag:
2022-09-13 16:39:19 +00:00
return user
2022-09-13 05:31:15 +00:00
api = request.url.path
for k, v in request.path_params.items():
api = api.replace(v, "{%s}" % k)
# 2. 登录之后查一次 后面去结果查 todo 更新权限时需要更新 , 最好结果放redis
cache_key = f"{user.username}_{active_rid}"
# 缓存到fastapi 应用实例中
if not hasattr(request.app.state, cache_key):
setattr(request.app.state, cache_key, await get_apis(active_rid))
if {"api": api, "method": request.method} not in getattr(
request.app.state, cache_key
):
raise PermissionsError(403, detail="无权访问")