2023-10-26 20:38:31 +00:00
|
|
|
from binascii import hexlify
|
|
|
|
from hashlib import sha256
|
2025-05-16 06:23:48 +00:00
|
|
|
from typing import Any, Dict, TypeVar, TYPE_CHECKING
|
2023-10-26 21:07:35 +00:00
|
|
|
|
2023-10-26 20:38:31 +00:00
|
|
|
from passlib.hash import bcrypt
|
2023-10-26 21:07:35 +00:00
|
|
|
|
2025-05-16 06:23:48 +00:00
|
|
|
from auth.exceptions import ExpiredToken, InvalidToken, InvalidPassword
|
2023-10-26 21:07:35 +00:00
|
|
|
from auth.jwtcodec import JWTCodec
|
|
|
|
from auth.tokenstorage import TokenStorage
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2025-02-11 09:00:35 +00:00
|
|
|
from services.db import local_session
|
|
|
|
|
2025-05-16 06:23:48 +00:00
|
|
|
# Для типизации
|
|
|
|
if TYPE_CHECKING:
|
|
|
|
from auth.orm import Author
|
|
|
|
|
|
|
|
AuthorType = TypeVar("AuthorType", bound="Author")
|
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
class Password:
|
|
|
|
@staticmethod
|
2022-11-10 21:47:19 +00:00
|
|
|
def _to_bytes(data: str) -> bytes:
|
|
|
|
return bytes(data.encode())
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def _get_sha256(cls, password: str) -> bytes:
|
|
|
|
bytes_password = cls._to_bytes(password)
|
|
|
|
return hexlify(sha256(bytes_password).digest())
|
2022-11-08 15:50:28 +00:00
|
|
|
|
2022-11-10 21:47:19 +00:00
|
|
|
@staticmethod
|
|
|
|
def encode(password: str) -> str:
|
2025-05-16 06:23:48 +00:00
|
|
|
"""
|
|
|
|
Кодирует пароль пользователя
|
|
|
|
|
|
|
|
Args:
|
|
|
|
password (str): Пароль пользователя
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
str: Закодированный пароль
|
|
|
|
"""
|
2022-11-10 21:47:19 +00:00
|
|
|
password_sha256 = Password._get_sha256(password)
|
|
|
|
return bcrypt.using(rounds=10).hash(password_sha256)
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
@staticmethod
|
2022-11-08 15:50:28 +00:00
|
|
|
def verify(password: str, hashed: str) -> bool:
|
2022-11-10 21:47:19 +00:00
|
|
|
"""
|
|
|
|
Verify that password hash is equal to specified hash. Hash format:
|
|
|
|
|
|
|
|
$2a$10$Ro0CUfOqk6cXEKf3dyaM7OhSCvnwM9s4wIX9JeLapehKK5YdLxKcm
|
2023-10-30 21:00:55 +00:00
|
|
|
\__/\/ \____________________/\_____________________________/ # noqa: W605
|
2022-11-10 21:47:19 +00:00
|
|
|
| | Salt Hash
|
|
|
|
| Cost
|
|
|
|
Version
|
|
|
|
|
|
|
|
More info: https://passlib.readthedocs.io/en/stable/lib/passlib.hash.bcrypt.html
|
|
|
|
|
|
|
|
:param password: clear text password
|
|
|
|
:param hashed: hash of the password
|
|
|
|
:return: True if clear text password matches specified hash
|
|
|
|
"""
|
|
|
|
hashed_bytes = Password._to_bytes(hashed)
|
|
|
|
password_sha256 = Password._get_sha256(password)
|
|
|
|
|
|
|
|
return bcrypt.verify(password_sha256, hashed_bytes)
|
2021-07-14 14:45:31 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
|
|
|
class Identity:
|
2022-09-03 10:50:14 +00:00
|
|
|
@staticmethod
|
2025-05-16 06:23:48 +00:00
|
|
|
def password(orm_author: Any, password: str) -> Any:
|
|
|
|
"""
|
|
|
|
Проверяет пароль пользователя
|
|
|
|
|
|
|
|
Args:
|
|
|
|
orm_author (Author): Объект пользователя
|
|
|
|
password (str): Пароль пользователя
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Author: Объект автора при успешной проверке
|
|
|
|
|
|
|
|
Raises:
|
|
|
|
InvalidPassword: Если пароль не соответствует хешу или отсутствует
|
|
|
|
"""
|
|
|
|
# Импортируем внутри функции для избежания циклических импортов
|
|
|
|
from auth.orm import Author
|
|
|
|
from utils.logger import root_logger as logger
|
|
|
|
|
|
|
|
# Проверим исходный пароль в orm_author
|
|
|
|
if not orm_author.password:
|
|
|
|
logger.warning(
|
|
|
|
f"[auth.identity] Пароль в исходном объекте автора пуст: email={orm_author.email}"
|
|
|
|
)
|
|
|
|
raise InvalidPassword("Пароль не установлен для данного пользователя")
|
|
|
|
|
2025-05-20 22:34:02 +00:00
|
|
|
# Проверяем пароль напрямую, не используя dict()
|
|
|
|
if not Password.verify(password, orm_author.password):
|
2025-05-16 06:23:48 +00:00
|
|
|
logger.warning(f"[auth.identity] Неверный пароль для {orm_author.email}")
|
|
|
|
raise InvalidPassword("Неверный пароль пользователя")
|
|
|
|
|
|
|
|
# Возвращаем исходный объект, чтобы сохранить все связи
|
|
|
|
return orm_author
|
2021-07-14 14:45:31 +00:00
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
@staticmethod
|
2025-05-16 06:23:48 +00:00
|
|
|
def oauth(inp: Dict[str, Any]) -> Any:
|
|
|
|
"""
|
|
|
|
Создает нового пользователя OAuth, если он не существует
|
|
|
|
|
|
|
|
Args:
|
|
|
|
inp (dict): Данные OAuth пользователя
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Author: Объект пользователя
|
|
|
|
"""
|
|
|
|
# Импортируем внутри функции для избежания циклических импортов
|
|
|
|
from auth.orm import Author
|
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
2025-05-16 06:23:48 +00:00
|
|
|
author = session.query(Author).filter(Author.email == inp["email"]).first()
|
|
|
|
if not author:
|
|
|
|
author = Author(**inp)
|
|
|
|
author.email_verified = True
|
|
|
|
session.add(author)
|
2022-09-03 10:50:14 +00:00
|
|
|
session.commit()
|
|
|
|
|
2025-05-16 06:23:48 +00:00
|
|
|
return author
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
@staticmethod
|
2025-05-16 06:23:48 +00:00
|
|
|
async def onetime(token: str) -> Any:
|
|
|
|
"""
|
|
|
|
Проверяет одноразовый токен
|
|
|
|
|
|
|
|
Args:
|
|
|
|
token (str): Одноразовый токен
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Author: Объект пользователя
|
|
|
|
"""
|
|
|
|
# Импортируем внутри функции для избежания циклических импортов
|
|
|
|
from auth.orm import Author
|
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
try:
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[auth.identity] using one time token")
|
2022-09-17 18:12:14 +00:00
|
|
|
payload = JWTCodec.decode(token)
|
2023-01-31 06:57:35 +00:00
|
|
|
if not await TokenStorage.exist(f"{payload.user_id}-{payload.username}-{token}"):
|
2023-01-10 08:15:28 +00:00
|
|
|
# raise InvalidToken("Login token has expired, please login again")
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"error": "Token has expired"}
|
2025-02-09 19:26:50 +00:00
|
|
|
except ExpiredToken:
|
2023-01-10 08:15:28 +00:00
|
|
|
# raise InvalidToken("Login token has expired, please try again")
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"error": "Token has expired"}
|
2025-02-09 19:26:50 +00:00
|
|
|
except InvalidToken:
|
2023-01-10 08:15:28 +00:00
|
|
|
# raise InvalidToken("token format error") from e
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"error": "Token format error"}
|
2022-09-17 18:12:14 +00:00
|
|
|
with local_session() as session:
|
2025-05-16 06:23:48 +00:00
|
|
|
author = session.query(Author).filter_by(id=payload.user_id).first()
|
|
|
|
if not author:
|
2023-01-10 08:15:28 +00:00
|
|
|
# raise Exception("user not exist")
|
2025-05-16 06:23:48 +00:00
|
|
|
return {"error": "Author does not exist"}
|
|
|
|
if not author.email_verified:
|
|
|
|
author.email_verified = True
|
2022-09-17 18:12:14 +00:00
|
|
|
session.commit()
|
2025-05-16 06:23:48 +00:00
|
|
|
return author
|