From bde5797004bfb040003c1495027c4ae99d8f9f9a Mon Sep 17 00:00:00 2001 From: zhaoqingang <zhaoqg0118@163.com> Date: 星期二, 31 十二月 2024 16:59:05 +0800 Subject: [PATCH] tmp --- app/service/auth.py | 46 +++++++++++++++++++++++++++++++++++++--------- 1 files changed, 37 insertions(+), 9 deletions(-) diff --git a/app/service/auth.py b/app/service/auth.py index 4353fcd..8c6544c 100644 --- a/app/service/auth.py +++ b/app/service/auth.py @@ -1,6 +1,10 @@ +锘縤mport os.path import re +import uuid +import base64 from datetime import datetime, timedelta from typing import Type +from uuid import uuid4 from jwt import encode, decode, exceptions from passlib.context import CryptContext @@ -9,12 +13,16 @@ from Log import logger from app.config.config import settings -from app.config.const import RAGFLOW, BISHENG, DIFY +from app.config.const import RAGFLOW, BISHENG, DIFY, USER_STATSU_DELETE, APP_SERVICE_PATH from app.models import RoleModel, GroupModel, TokenModel from app.models.user_model import UserModel, UserAppModel # from app.service.ragflow import RagflowService # from app.service.service_token import get_new_token from app.service.v2.app_register import AppRegisterDao + +from cryptography.hazmat.backends import default_backend +from cryptography.hazmat.primitives import serialization +from cryptography.hazmat.primitives.asymmetric import padding SECRET_KEY = settings.secret_key ALGORITHM = "HS256" @@ -32,7 +40,7 @@ def authenticate_user(db, username: str, password: str): - user = db.query(UserModel).filter(UserModel.username == username).first() + user = db.query(UserModel).filter(UserModel.username == username, UserModel.status != USER_STATSU_DELETE).first() if not user: return False if not verify_password(password, user.hashed_password): @@ -60,7 +68,7 @@ def is_valid_password(password: str) -> bool: - if len(password) <= 8: + if len(password) < 8: return False has_digit = re.search(r'[0-9]', password) has_letter = re.search(r'[A-Za-z]', password) @@ -69,12 +77,13 @@ return has_digit is not None and has_letter is not None -async def save_register_user(db, username, password, email, register_dict): +async def save_register_user(db, username, password, email, app_password, register_dict): user_id = "" + sync_flag = str(uuid.uuid4()) try: hashed_password = pwd_context.hash(password) - db_user = UserModel(username=username, hashed_password=hashed_password, email=email) - pwd = db_user.encrypted_password(password) + db_user = UserModel(username=username, hashed_password=hashed_password, email=email, sync_flag=sync_flag) + pwd = db_user.encrypted_password(app_password) db_user.password = pwd db_user.roles = [db.query(RoleModel).filter(RoleModel.role_type == 2).first()] db_user.groups = [db.query(GroupModel).filter(GroupModel.group_type == 2).first()] @@ -92,7 +101,7 @@ db.query(UserModel).filter(UserModel.id == user_id).delete() db.commit return False - return user_id + return sync_flag async def update_user_token(db, user_id, token_dict): @@ -139,7 +148,7 @@ # db.commit() # db.refresh(db_user) - is_sava = await save_register_user(db, user.username, user.password, user.email, register_dict) + # is_sava = await save_register_user(db, user.username, user.password, user.email, register_dict) class UserAppDao: def __init__(self, db: Session): @@ -193,6 +202,25 @@ return self.db.query(UserAppModel).filter_by(user_id=user_id).all() - +async def password_rsa(password): + with open(os.path.join(APP_SERVICE_PATH, "pom/private_key.pem"), "rb") as key_file: + private_key = serialization.load_pem_private_key( + key_file.read(), + password=None, # 濡傛灉绉侀挜鍔犲瘑锛岃鎻愪緵瀵嗙爜 + backend=default_backend() + ) + # Base64 瑙g爜 + try: + # 瑙e瘑娑堟伅 + ciphertext = base64.b64decode(password) + # 浣跨敤 PKCS#1 v1.5 濉厖瑙e瘑 + plaintext = private_key.decrypt( + ciphertext, + padding.PKCS1v15() # 鏀逛负 PKCS#1 v1.5 濉厖 + ) + return plaintext.decode() + except Exception as e: + print(e) + return "" -- Gitblit v1.8.0