sys_user_role_data.py 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. #!/usr/bin/env python3
  2. # -*- coding: utf-8 -*-
  3. from . import mpfun
  4. from models import *
  5. from sqlalchemy.orm import Session
  6. from database import get_local_db
  7. # 系统用户角色表
  8. # 加密和HMAC签名
  9. def sign_row(db: Session, row: SysUserRole) -> None:
  10. if row.sign != '':
  11. return
  12. user_id = str(row.user_id) # 用户ID
  13. role_id = str(row.role_id) # 角色ID
  14. sign_data = ",".join([user_id, role_id])
  15. sign_hmac = mpfun.sign_data(sign_data)
  16. # print('sign_tbl_user sign_data:', sign_data)
  17. # print('sign_tbl_user sign_hmac:', sign_hmac)
  18. row.sign = sign_hmac
  19. db.commit()
  20. # 比较字段合并字符串是否和MAC值匹配上,调用密码服务器[验证HMAC]接口
  21. def sign_valid_row(row: SysUserRole) -> bool:
  22. if row.sign == '':
  23. return True
  24. # 关键字段合并字符串
  25. sign_data = get_sign_str(row)
  26. # print('sys_user sign_data:', sign_data)
  27. # 原HMACSM3数值
  28. sign_hmac = row.sign
  29. # print('sign_hmac:', sign_hmac)
  30. return mpfun.hmac_verify(sign_data, sign_hmac)
  31. # 生成待签名的字符串
  32. def get_sign_str(row: SysUserRole) -> str:
  33. user_id = str(row.user_id) # 用户ID
  34. role_id = str(row.role_id) # 角色ID
  35. # 关键字段合并字符串
  36. sign_data = ",".join([user_id, role_id])
  37. return sign_data
  38. # 生成HAMC签名值
  39. def get_sign_hmac(row: SysUserRole) -> str:
  40. sign_data = get_sign_str(row)
  41. return mpfun.sign_data(sign_data)
  42. # 对所有数据进行签名
  43. def sign_table():
  44. print('sign_sys_user_role table =====>>>')
  45. with get_local_db() as db:
  46. rows = db.query(SysUserRole).filter(SysUserRole.sign == '').all()
  47. for row in rows:
  48. sign_row(db, row)