admin login
This commit is contained in:
6
app/core/config.py
Normal file
6
app/core/config.py
Normal file
@@ -0,0 +1,6 @@
|
||||
from pydantic_settings import BaseSettings, SettingsConfigDict
|
||||
|
||||
class Settings(BaseSettings):
|
||||
database_url: str = "sqlite:///db.sqlite"
|
||||
|
||||
settings = Settings()
|
||||
9
app/core/database.py
Normal file
9
app/core/database.py
Normal file
@@ -0,0 +1,9 @@
|
||||
from sqlmodel import Session, create_engine
|
||||
from app.core.config import settings
|
||||
|
||||
connect_args = {"check_same_thread": False} # SQLite-specific argument for multithreading
|
||||
engine = create_engine(settings.database_url, echo=True, connect_args=connect_args)
|
||||
|
||||
def get_session():
|
||||
with Session(engine) as session:
|
||||
yield session
|
||||
0
app/core/security.py
Normal file
0
app/core/security.py
Normal file
@@ -0,0 +1,9 @@
|
||||
from sqlmodel import Session, create_engine
|
||||
|
||||
db_url = "sqlite:///db.sqlite"
|
||||
connect_args = {"check_same_thread": False} # SQLite-specific argument for multithreading
|
||||
engine = create_engine(db_url, echo=True, connect_args=connect_args)
|
||||
|
||||
def get_session():
|
||||
with Session(engine) as session:
|
||||
yield session
|
||||
53
app/internal/auth.py
Normal file
53
app/internal/auth.py
Normal file
@@ -0,0 +1,53 @@
|
||||
from datetime import datetime, timedelta, timezone
|
||||
from pwdlib import PasswordHash
|
||||
import jwt
|
||||
from jwt.exceptions import InvalidTokenError
|
||||
from fastapi import Depends, HTTPException, status
|
||||
from fastapi.security import OAuth2PasswordBearer
|
||||
from sqlmodel import Session, select
|
||||
|
||||
from app.core.database import get_session
|
||||
from app.internal.models import Admin
|
||||
|
||||
SECRET_KEY = "CHANGE_THIS_IN_PRODUCTION"
|
||||
ALGORITHM = "HS256"
|
||||
ACCESS_TOKEN_EXPIRE_MINUTES = 30
|
||||
|
||||
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="admin/login")
|
||||
|
||||
def verify_password(plain_password: str, hashed_password: str) -> bool:
|
||||
return PasswordHash.recommended().verify(plain_password, hashed_password)
|
||||
|
||||
def hash_password(password: str) -> str:
|
||||
return PasswordHash.recommended().hash(password)
|
||||
|
||||
|
||||
def create_access_token(data: dict, expires_delta: timedelta | None = None) -> str:
|
||||
to_encode = data.copy()
|
||||
expire = datetime.now(timezone.utc) + (expires_delta or timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES))
|
||||
to_encode.update({"exp": expire})
|
||||
return jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
|
||||
|
||||
def get_current_admin_user(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
session: Session = Depends(get_session)
|
||||
):
|
||||
credentials_exception = HTTPException(
|
||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||
detail="Could not validate credentials",
|
||||
headers={"WWW-Authenticate": "Bearer"},
|
||||
)
|
||||
|
||||
try:
|
||||
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
|
||||
username: str = payload.get("sub")
|
||||
if username is None:
|
||||
raise credentials_exception
|
||||
except InvalidTokenError:
|
||||
raise credentials_exception
|
||||
|
||||
admin_user = session.exec(select(Admin).where(Admin.username == username)).first()
|
||||
if not admin_user:
|
||||
raise credentials_exception
|
||||
return admin_user
|
||||
|
||||
31
app/internal/models.py
Normal file
31
app/internal/models.py
Normal file
@@ -0,0 +1,31 @@
|
||||
from datetime import datetime, timezone
|
||||
|
||||
from sqlmodel import SQLModel, Field
|
||||
|
||||
class Admin(SQLModel, table=True):
|
||||
id: int | None = Field(default=None, primary_key=True)
|
||||
username: str = Field(index=True, unique=True)
|
||||
password: str = Field(nullable=False)
|
||||
created_at: datetime = Field(default_factory=lambda: datetime.now(timezone.utc))
|
||||
|
||||
class AdminCreate(SQLModel):
|
||||
username: str
|
||||
password: str
|
||||
|
||||
class TokenResponse(SQLModel):
|
||||
access_token: str
|
||||
token_type: str = "bearer"
|
||||
|
||||
class AdminCredential(SQLModel, table=True):
|
||||
id: int | None = Field(default=None, primary_key=True)
|
||||
admin_id: int = Field(foreign_key="admin.id")
|
||||
credential_id: bytes = Field(index=True, unique=True)
|
||||
public_key: bytes
|
||||
sign_count: int
|
||||
|
||||
class AdminFIDO2Challenge(SQLModel, table=True):
|
||||
id: int | None = Field(default=None, primary_key=True)
|
||||
admin_id: int = Field(foreign_key="admin.id")
|
||||
challenge: str
|
||||
type: str # "registration" or "authentication"
|
||||
created_at: datetime = Field(default_factory=lambda: datetime.now(timezone.utc))
|
||||
181
app/internal/routers.py
Normal file
181
app/internal/routers.py
Normal file
@@ -0,0 +1,181 @@
|
||||
from datetime import datetime, timezone
|
||||
|
||||
from fastapi.responses import JSONResponse
|
||||
from fastapi.security import OAuth2PasswordRequestForm
|
||||
from sqlmodel import SQLModel, Field, Session, select
|
||||
from fastapi import APIRouter, Depends, HTTPException, Request
|
||||
from fido2.server import Fido2Server
|
||||
from fido2.webauthn import PublicKeyCredentialDescriptor, PublicKeyCredentialRpEntity, AttestationObject, AuthenticatorData
|
||||
from fido2 import cbor
|
||||
import secrets
|
||||
from app.core.database import get_session
|
||||
from typing import Any
|
||||
|
||||
from app.internal.auth import create_access_token, get_current_admin_user, hash_password, verify_password
|
||||
from app.internal.models import Admin, AdminCreate, AdminCredential, AdminFIDO2Challenge, TokenResponse
|
||||
from app.internal.security import fido2_server
|
||||
from app.utils.webauthn import convert_bytes_to_base64
|
||||
|
||||
router = APIRouter(prefix="/admin", tags=["admin"])
|
||||
|
||||
@router.post("/register")
|
||||
async def register(
|
||||
user: AdminCreate,
|
||||
session: Session = Depends(get_session)
|
||||
):
|
||||
existing = session.exec(select(Admin).where(Admin.username == user.username)).first()
|
||||
|
||||
if existing is not None:
|
||||
raise HTTPException(status_code=400, detail="Username already exists")
|
||||
|
||||
new_admin = Admin(
|
||||
username=user.username,
|
||||
password=hash_password(user.password)
|
||||
)
|
||||
|
||||
session.add(new_admin)
|
||||
session.commit()
|
||||
session.refresh(new_admin)
|
||||
|
||||
return JSONResponse(content={"message": "Admin registered successfully"}, status_code=201)
|
||||
|
||||
@router.post("/login")
|
||||
async def login(
|
||||
form_data: OAuth2PasswordRequestForm = Depends(),
|
||||
session: Session = Depends(get_session)
|
||||
) -> TokenResponse:
|
||||
admin_user = session.exec(select(Admin).where(Admin.username == form_data.username)).first()
|
||||
|
||||
if not admin_user or not verify_password(form_data.password, admin_user.password):
|
||||
raise HTTPException(status_code=400, detail="Incorrect username or password")
|
||||
|
||||
access_token = create_access_token(data={"sub": admin_user.username})
|
||||
|
||||
return TokenResponse(access_token=access_token, token_type="bearer")
|
||||
|
||||
|
||||
|
||||
@router.post("/register/begin")
|
||||
async def register_begin(
|
||||
current_admin: Admin = Depends(get_current_admin_user),
|
||||
session: Session = Depends(get_session)
|
||||
):
|
||||
|
||||
registration_data, state = fido2_server.register_begin(
|
||||
user={
|
||||
"id": current_admin.id.to_bytes(16, "big"),
|
||||
"name": current_admin.username,
|
||||
"displayName": current_admin.username
|
||||
},
|
||||
credentials=session.exec(select(AdminCredential).where(AdminCredential.admin_id == current_admin.id)).all(),
|
||||
)
|
||||
|
||||
challenge = AdminFIDO2Challenge(
|
||||
admin_id = current_admin.id,
|
||||
challenge = state["challenge"],
|
||||
type = "registration"
|
||||
)
|
||||
|
||||
session.add(challenge)
|
||||
session.commit()
|
||||
|
||||
print("Registration data:", registration_data)
|
||||
return cbor.encode(registration_data).decode("utf-8")
|
||||
|
||||
|
||||
@router.post("/register/complete")
|
||||
async def register_complete(
|
||||
admin_id: str,
|
||||
credential: dict,
|
||||
session: Session = Depends(get_session)
|
||||
):
|
||||
challenge = session.exec(
|
||||
select(AdminFIDO2Challenge)
|
||||
.where(AdminFIDO2Challenge.admin_id == int(admin_id), AdminFIDO2Challenge.type == "registration")
|
||||
).first()
|
||||
|
||||
if not challenge:
|
||||
raise HTTPException(status_code=400, detail="No registration challenge found")
|
||||
|
||||
auth_data = fido2_server.register_complete(
|
||||
state={"challenge": challenge.challenge},
|
||||
client_data=credential,
|
||||
)
|
||||
|
||||
user = session.exec(select(Admin).where(Admin.id == int(admin_id))).first()
|
||||
new_credential = AdminCredential(
|
||||
admin_id=user.id,
|
||||
credential_id=auth_data.credential_id,
|
||||
public_key=auth_data.credential_public_key,
|
||||
sign_count=auth_data.sign_count
|
||||
)
|
||||
session.add(new_credential)
|
||||
session.delete(challenge)
|
||||
session.commit()
|
||||
|
||||
return JSONResponse(content={"message": "FIDO2 registration successful"}, status_code=200)
|
||||
|
||||
@router.post("/login/begin")
|
||||
async def login_begin(username: str, session: Session = Depends(get_session)):
|
||||
admin_user = session.exec(select(Admin).where(Admin.username == username)).first()
|
||||
if not admin_user:
|
||||
raise HTTPException(status_code=400, detail="User not found")
|
||||
|
||||
credentials = session.exec(select(AdminCredential).where(AdminCredential.admin_id == admin_user.id)).all()
|
||||
|
||||
allow_credentials = [
|
||||
PublicKeyCredentialDescriptor(id=cred.credential_id)
|
||||
for cred in credentials
|
||||
]
|
||||
|
||||
authentication_data, state = fido2_server.authenticate_begin(
|
||||
allow_credentials=allow_credentials,
|
||||
user_verification="preferred"
|
||||
)
|
||||
|
||||
challenge = AdminFIDO2Challenge(
|
||||
admin_id=admin_user.id,
|
||||
challenge=state["challenge"],
|
||||
type="authentication"
|
||||
)
|
||||
|
||||
session.add(challenge)
|
||||
session.commit()
|
||||
|
||||
return authentication_data
|
||||
|
||||
@router.post("/login/complete")
|
||||
async def login_complete(admin_id: str, credential: dict, session: Session = Depends(get_session)):
|
||||
challenge = session.exec(
|
||||
select(AdminFIDO2Challenge)
|
||||
.where(AdminFIDO2Challenge.admin_id == int(admin_id))
|
||||
.where(AdminFIDO2Challenge.type == "authentication")
|
||||
).first()
|
||||
|
||||
if not challenge:
|
||||
raise HTTPException(status_code=400, detail="No authentication challenge found")
|
||||
|
||||
user = session.exec(select(Admin).where(Admin.id == int(admin_id))).first()
|
||||
credentials = session.exec(select(AdminCredential).where(AdminCredential.admin_id == user.id)).all()
|
||||
|
||||
auth_data = fido2_server.authenticate_complete(
|
||||
state={"challenge": challenge.challenge},
|
||||
credentials=[
|
||||
{
|
||||
"id": cred.credential_id,
|
||||
"public_key": cred.public_key,
|
||||
"sign_count": cred.sign_count
|
||||
}
|
||||
for cred in credentials
|
||||
],
|
||||
)
|
||||
|
||||
credential = session.exec(
|
||||
select(AdminCredential)
|
||||
.where(AdminCredential.credential_id == auth_data.credential_id)
|
||||
).first()
|
||||
credential.sign_count = auth_data.sign_count
|
||||
session.delete(challenge)
|
||||
session.commit()
|
||||
|
||||
return JSONResponse(content={"message": "FIDO2 authentication successful"}, status_code=200)
|
||||
10
app/internal/security.py
Normal file
10
app/internal/security.py
Normal file
@@ -0,0 +1,10 @@
|
||||
from fido2.server import Fido2Server
|
||||
from fido2.webauthn import PublicKeyCredentialRpEntity
|
||||
from app.core.config import settings
|
||||
|
||||
rp = PublicKeyCredentialRpEntity(
|
||||
id="admin.example.com",
|
||||
name="Admin"
|
||||
)
|
||||
|
||||
fido2_server = Fido2Server(rp)
|
||||
@@ -1,10 +1,12 @@
|
||||
from fastapi import FastAPI
|
||||
|
||||
from app.routers import users
|
||||
from app.internal.routers import router as admin_router
|
||||
|
||||
app = FastAPI()
|
||||
|
||||
app.include_router(users.router)
|
||||
app.include_router(admin_router)
|
||||
|
||||
@app.get("/")
|
||||
async def root():
|
||||
|
||||
0
app/utils/__init__.py
Normal file
0
app/utils/__init__.py
Normal file
36
app/utils/webauthn.py
Normal file
36
app/utils/webauthn.py
Normal file
@@ -0,0 +1,36 @@
|
||||
from fido2.utils import websafe_encode, websafe_decode
|
||||
|
||||
def convert_bytes_to_base64(obj):
|
||||
"""
|
||||
递归将 dict/list 中的 bytes 转为 base64url
|
||||
"""
|
||||
if isinstance(obj, dict):
|
||||
return {
|
||||
k: convert_bytes_to_base64(v)
|
||||
for k, v in obj.items()
|
||||
}
|
||||
elif isinstance(obj, list):
|
||||
return [convert_bytes_to_base64(i) for i in obj]
|
||||
elif isinstance(obj, bytes):
|
||||
return websafe_encode(obj).decode("ascii")
|
||||
else:
|
||||
return obj
|
||||
|
||||
def convert_base64_to_bytes(obj):
|
||||
"""
|
||||
递归将 dict/list 中的 base64url 转回 bytes
|
||||
"""
|
||||
if isinstance(obj, dict):
|
||||
return {
|
||||
k: convert_base64_to_bytes(v)
|
||||
for k, v in obj.items()
|
||||
}
|
||||
elif isinstance(obj, list):
|
||||
return [convert_base64_to_bytes(i) for i in obj]
|
||||
elif isinstance(obj, str):
|
||||
try:
|
||||
return websafe_decode(obj.encode("ascii"))
|
||||
except Exception:
|
||||
return obj
|
||||
else:
|
||||
return obj
|
||||
Reference in New Issue
Block a user