sso.py 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. # -*- coding: utf-8 -*-
  2. from fastapi import APIRouter, Depends, Request, Header, Form, Body
  3. from fastapi.responses import FileResponse, StreamingResponse
  4. from sqlalchemy.orm import Session
  5. from fastapi.responses import JSONResponse
  6. from database import get_db
  7. from utils import *
  8. from utils.vcode import *
  9. from utils.redis_util import *
  10. import base64
  11. from common.const import *
  12. from io import BytesIO
  13. from utils.StripTagsHTMLParser import *
  14. from common import security
  15. from datetime import timedelta
  16. from common.security import valid_access_token
  17. from common.auth_user import *
  18. from common import YzyApi
  19. from models import *
  20. from urllib.parse import quote
  21. import requests
  22. import jwt
  23. import traceback
  24. from common.enc import mpfun
  25. router = APIRouter()
  26. # 提供给数科使用的单点登录token
  27. @router.get('/token/create')
  28. def sso_token(request: Request,
  29. user_id: int = Depends(valid_access_token),
  30. db: Session = Depends(get_db)):
  31. sso_token_expires = timedelta(seconds = 3600 * 24)
  32. sso_token = security.create_access_token(
  33. data={"sub": user_id}, expires_delta = sso_token_expires
  34. )
  35. return {
  36. "code": 200,
  37. "msg": "操作成功",
  38. "data": {
  39. "sso_token": sso_token
  40. }
  41. }
  42. # token校验
  43. @router.get('/token/valid')
  44. def sso_token(request: Request,
  45. sso_token: str,
  46. db: Session = Depends(get_db)):
  47. try:
  48. payload = jwt.decode(sso_token, settings.SECRET_KEY, algorithms=[settings.ALGORITHM])
  49. print(payload,payload.get("sub"))
  50. user_id: str = payload.get("sub")
  51. row = db.query(SysUser).filter(SysUser.user_id == int(user_id)).first()
  52. if row is None:
  53. return {
  54. "code": 500,
  55. "msg": "token异常"
  56. }
  57. # 角色信息
  58. roles = []
  59. role_ids = db.query(SysUserRole).filter(SysUserRole.user_id == int(user_id)).all()
  60. for role in role_ids:
  61. role_info = db.query(SysRole).filter(SysRole.role_id == role.role_id).first()
  62. roles.append(
  63. {
  64. "roleId": role_info.role_id,
  65. "roleName": role_info.role_name,
  66. "roleKey": role_info.role_key
  67. }
  68. )
  69. role_keys = [
  70. n['roleKey']
  71. for n in roles
  72. ]
  73. data = {
  74. "userId": row.user_id,
  75. "userName": mpfun.dec_data(row.user_name),
  76. "nickName": row.nick_name,
  77. "roles": role_keys
  78. }
  79. return {
  80. "code": 200,
  81. "msg": "操作成功",
  82. "data": data
  83. }
  84. except Exception:
  85. traceback.print_exc()
  86. return {
  87. "code": 500,
  88. "msg": "token异常"
  89. }