admin login

This commit is contained in:
2026-02-21 14:56:19 +08:00
parent a6d54b24f9
commit 6ad5256df9
16 changed files with 560 additions and 1 deletions

6
app/core/config.py Normal file
View File

@@ -0,0 +1,6 @@
from pydantic_settings import BaseSettings, SettingsConfigDict
class Settings(BaseSettings):
database_url: str = "sqlite:///db.sqlite"
settings = Settings()

9
app/core/database.py Normal file
View File

@@ -0,0 +1,9 @@
from sqlmodel import Session, create_engine
from app.core.config import settings
connect_args = {"check_same_thread": False} # SQLite-specific argument for multithreading
engine = create_engine(settings.database_url, echo=True, connect_args=connect_args)
def get_session():
with Session(engine) as session:
yield session

0
app/core/security.py Normal file
View File

View File

@@ -0,0 +1,9 @@
from sqlmodel import Session, create_engine
db_url = "sqlite:///db.sqlite"
connect_args = {"check_same_thread": False} # SQLite-specific argument for multithreading
engine = create_engine(db_url, echo=True, connect_args=connect_args)
def get_session():
with Session(engine) as session:
yield session

53
app/internal/auth.py Normal file
View File

@@ -0,0 +1,53 @@
from datetime import datetime, timedelta, timezone
from pwdlib import PasswordHash
import jwt
from jwt.exceptions import InvalidTokenError
from fastapi import Depends, HTTPException, status
from fastapi.security import OAuth2PasswordBearer
from sqlmodel import Session, select
from app.core.database import get_session
from app.internal.models import Admin
SECRET_KEY = "CHANGE_THIS_IN_PRODUCTION"
ALGORITHM = "HS256"
ACCESS_TOKEN_EXPIRE_MINUTES = 30
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="admin/login")
def verify_password(plain_password: str, hashed_password: str) -> bool:
return PasswordHash.recommended().verify(plain_password, hashed_password)
def hash_password(password: str) -> str:
return PasswordHash.recommended().hash(password)
def create_access_token(data: dict, expires_delta: timedelta | None = None) -> str:
to_encode = data.copy()
expire = datetime.now(timezone.utc) + (expires_delta or timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES))
to_encode.update({"exp": expire})
return jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
def get_current_admin_user(
token: str = Depends(oauth2_scheme),
session: Session = Depends(get_session)
):
credentials_exception = HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
try:
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
username: str = payload.get("sub")
if username is None:
raise credentials_exception
except InvalidTokenError:
raise credentials_exception
admin_user = session.exec(select(Admin).where(Admin.username == username)).first()
if not admin_user:
raise credentials_exception
return admin_user

31
app/internal/models.py Normal file
View File

@@ -0,0 +1,31 @@
from datetime import datetime, timezone
from sqlmodel import SQLModel, Field
class Admin(SQLModel, table=True):
id: int | None = Field(default=None, primary_key=True)
username: str = Field(index=True, unique=True)
password: str = Field(nullable=False)
created_at: datetime = Field(default_factory=lambda: datetime.now(timezone.utc))
class AdminCreate(SQLModel):
username: str
password: str
class TokenResponse(SQLModel):
access_token: str
token_type: str = "bearer"
class AdminCredential(SQLModel, table=True):
id: int | None = Field(default=None, primary_key=True)
admin_id: int = Field(foreign_key="admin.id")
credential_id: bytes = Field(index=True, unique=True)
public_key: bytes
sign_count: int
class AdminFIDO2Challenge(SQLModel, table=True):
id: int | None = Field(default=None, primary_key=True)
admin_id: int = Field(foreign_key="admin.id")
challenge: str
type: str # "registration" or "authentication"
created_at: datetime = Field(default_factory=lambda: datetime.now(timezone.utc))

181
app/internal/routers.py Normal file
View File

@@ -0,0 +1,181 @@
from datetime import datetime, timezone
from fastapi.responses import JSONResponse
from fastapi.security import OAuth2PasswordRequestForm
from sqlmodel import SQLModel, Field, Session, select
from fastapi import APIRouter, Depends, HTTPException, Request
from fido2.server import Fido2Server
from fido2.webauthn import PublicKeyCredentialDescriptor, PublicKeyCredentialRpEntity, AttestationObject, AuthenticatorData
from fido2 import cbor
import secrets
from app.core.database import get_session
from typing import Any
from app.internal.auth import create_access_token, get_current_admin_user, hash_password, verify_password
from app.internal.models import Admin, AdminCreate, AdminCredential, AdminFIDO2Challenge, TokenResponse
from app.internal.security import fido2_server
from app.utils.webauthn import convert_bytes_to_base64
router = APIRouter(prefix="/admin", tags=["admin"])
@router.post("/register")
async def register(
user: AdminCreate,
session: Session = Depends(get_session)
):
existing = session.exec(select(Admin).where(Admin.username == user.username)).first()
if existing is not None:
raise HTTPException(status_code=400, detail="Username already exists")
new_admin = Admin(
username=user.username,
password=hash_password(user.password)
)
session.add(new_admin)
session.commit()
session.refresh(new_admin)
return JSONResponse(content={"message": "Admin registered successfully"}, status_code=201)
@router.post("/login")
async def login(
form_data: OAuth2PasswordRequestForm = Depends(),
session: Session = Depends(get_session)
) -> TokenResponse:
admin_user = session.exec(select(Admin).where(Admin.username == form_data.username)).first()
if not admin_user or not verify_password(form_data.password, admin_user.password):
raise HTTPException(status_code=400, detail="Incorrect username or password")
access_token = create_access_token(data={"sub": admin_user.username})
return TokenResponse(access_token=access_token, token_type="bearer")
@router.post("/register/begin")
async def register_begin(
current_admin: Admin = Depends(get_current_admin_user),
session: Session = Depends(get_session)
):
registration_data, state = fido2_server.register_begin(
user={
"id": current_admin.id.to_bytes(16, "big"),
"name": current_admin.username,
"displayName": current_admin.username
},
credentials=session.exec(select(AdminCredential).where(AdminCredential.admin_id == current_admin.id)).all(),
)
challenge = AdminFIDO2Challenge(
admin_id = current_admin.id,
challenge = state["challenge"],
type = "registration"
)
session.add(challenge)
session.commit()
print("Registration data:", registration_data)
return cbor.encode(registration_data).decode("utf-8")
@router.post("/register/complete")
async def register_complete(
admin_id: str,
credential: dict,
session: Session = Depends(get_session)
):
challenge = session.exec(
select(AdminFIDO2Challenge)
.where(AdminFIDO2Challenge.admin_id == int(admin_id), AdminFIDO2Challenge.type == "registration")
).first()
if not challenge:
raise HTTPException(status_code=400, detail="No registration challenge found")
auth_data = fido2_server.register_complete(
state={"challenge": challenge.challenge},
client_data=credential,
)
user = session.exec(select(Admin).where(Admin.id == int(admin_id))).first()
new_credential = AdminCredential(
admin_id=user.id,
credential_id=auth_data.credential_id,
public_key=auth_data.credential_public_key,
sign_count=auth_data.sign_count
)
session.add(new_credential)
session.delete(challenge)
session.commit()
return JSONResponse(content={"message": "FIDO2 registration successful"}, status_code=200)
@router.post("/login/begin")
async def login_begin(username: str, session: Session = Depends(get_session)):
admin_user = session.exec(select(Admin).where(Admin.username == username)).first()
if not admin_user:
raise HTTPException(status_code=400, detail="User not found")
credentials = session.exec(select(AdminCredential).where(AdminCredential.admin_id == admin_user.id)).all()
allow_credentials = [
PublicKeyCredentialDescriptor(id=cred.credential_id)
for cred in credentials
]
authentication_data, state = fido2_server.authenticate_begin(
allow_credentials=allow_credentials,
user_verification="preferred"
)
challenge = AdminFIDO2Challenge(
admin_id=admin_user.id,
challenge=state["challenge"],
type="authentication"
)
session.add(challenge)
session.commit()
return authentication_data
@router.post("/login/complete")
async def login_complete(admin_id: str, credential: dict, session: Session = Depends(get_session)):
challenge = session.exec(
select(AdminFIDO2Challenge)
.where(AdminFIDO2Challenge.admin_id == int(admin_id))
.where(AdminFIDO2Challenge.type == "authentication")
).first()
if not challenge:
raise HTTPException(status_code=400, detail="No authentication challenge found")
user = session.exec(select(Admin).where(Admin.id == int(admin_id))).first()
credentials = session.exec(select(AdminCredential).where(AdminCredential.admin_id == user.id)).all()
auth_data = fido2_server.authenticate_complete(
state={"challenge": challenge.challenge},
credentials=[
{
"id": cred.credential_id,
"public_key": cred.public_key,
"sign_count": cred.sign_count
}
for cred in credentials
],
)
credential = session.exec(
select(AdminCredential)
.where(AdminCredential.credential_id == auth_data.credential_id)
).first()
credential.sign_count = auth_data.sign_count
session.delete(challenge)
session.commit()
return JSONResponse(content={"message": "FIDO2 authentication successful"}, status_code=200)

10
app/internal/security.py Normal file
View File

@@ -0,0 +1,10 @@
from fido2.server import Fido2Server
from fido2.webauthn import PublicKeyCredentialRpEntity
from app.core.config import settings
rp = PublicKeyCredentialRpEntity(
id="admin.example.com",
name="Admin"
)
fido2_server = Fido2Server(rp)

View File

@@ -1,10 +1,12 @@
from fastapi import FastAPI
from app.routers import users
from app.internal.routers import router as admin_router
app = FastAPI()
app.include_router(users.router)
app.include_router(admin_router)
@app.get("/")
async def root():

0
app/utils/__init__.py Normal file
View File

36
app/utils/webauthn.py Normal file
View File

@@ -0,0 +1,36 @@
from fido2.utils import websafe_encode, websafe_decode
def convert_bytes_to_base64(obj):
"""
递归将 dict/list 中的 bytes 转为 base64url
"""
if isinstance(obj, dict):
return {
k: convert_bytes_to_base64(v)
for k, v in obj.items()
}
elif isinstance(obj, list):
return [convert_bytes_to_base64(i) for i in obj]
elif isinstance(obj, bytes):
return websafe_encode(obj).decode("ascii")
else:
return obj
def convert_base64_to_bytes(obj):
"""
递归将 dict/list 中的 base64url 转回 bytes
"""
if isinstance(obj, dict):
return {
k: convert_base64_to_bytes(v)
for k, v in obj.items()
}
elif isinstance(obj, list):
return [convert_base64_to_bytes(i) for i in obj]
elif isinstance(obj, str):
try:
return websafe_decode(obj.encode("ascii"))
except Exception:
return obj
else:
return obj