backend_v0.1

This commit is contained in:
lusixing
2026-01-24 11:02:08 -08:00
commit d22fa8a286
26 changed files with 1088 additions and 0 deletions

108
app/auth.py Normal file
View File

@@ -0,0 +1,108 @@
from datetime import datetime, timedelta
from jose import jwt
from passlib.context import CryptContext
SECRET_KEY = "your-secret-key"
ALGORITHM = "HS256"
pwd_context = CryptContext(
schemes=["argon2", "bcrypt"], # 添加 argon2 作为备选方案
default="argon2", # 使用 argon2 作为默认方案
deprecated="auto",
)
def hash_password(password: str) -> str:
return pwd_context.hash(password)
def verify_password(plain_password, hashed_password):
return pwd_context.verify(plain_password, hashed_password)
def create_access_token(data: dict):
to_encode = data.copy()
expire = datetime.utcnow() + timedelta(minutes=30)
to_encode.update({"exp": expire})
return jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
from Crypto.PublicKey import RSA
def generate_key_pair():
key = RSA.generate(2048)
private_key = key.export_key().decode('utf-8')
public_key = key.publickey().export_key().decode('utf-8')
return private_key, public_key
from Crypto.Cipher import PKCS1_OAEP, AES
from Crypto.Hash import SHA256
from Crypto.Random import get_random_bytes
import base64
def encrypt_data(data: str, public_key_pem: str) -> str:
# 1. 准备 RSA 公钥
recipient_key = RSA.import_key(public_key_pem)
cipher_rsa = PKCS1_OAEP.new(recipient_key)
# 2. 生成随机 AES 会话密钥 (32 bytes)
session_key = get_random_bytes(32)
# 3. 用 RSA 加密 AES 密钥
enc_session_key = cipher_rsa.encrypt(session_key)
# 4. 用 AES-GCM 加密实际数据
cipher_aes = AES.new(session_key, AES.MODE_GCM)
ciphertext, tag = cipher_aes.encrypt_and_digest(data.encode('utf-8'))
# 5. 组合结果: [RSA加密的密钥(256B)] + [Nonce(16B)] + [Tag(16B)] + [密文]
combined = enc_session_key + cipher_aes.nonce + tag + ciphertext
return base64.b64encode(combined).decode('utf-8')
def decrypt_data(encrypted_data_b64: str, private_key_pem: str) -> str:
# 1. 解码合并的二进制数据
encrypted_data = base64.b64decode(encrypted_data_b64)
# 2. 分解组件 (RSA 2048位产生的密文固定为 256 字节)
rsa_key_len = 256
enc_session_key = encrypted_data[:rsa_key_len]
nonce = encrypted_data[rsa_key_len : rsa_key_len + 16]
tag = encrypted_data[rsa_key_len + 16 : rsa_key_len + 32]
ciphertext = encrypted_data[rsa_key_len + 32 :]
# 3. 用 RSA 私钥解密 AES 会话密钥
private_key = RSA.import_key(private_key_pem)
cipher_rsa = PKCS1_OAEP.new(private_key)
session_key = cipher_rsa.decrypt(enc_session_key)
# 4. 用 AES 会话密钥解密数据
cipher_aes = AES.new(session_key, AES.MODE_GCM, nonce=nonce)
dec_data = cipher_aes.decrypt_and_verify(ciphertext, tag)
return dec_data.decode('utf-8')
from fastapi import Depends, HTTPException, status
from fastapi.security import OAuth2PasswordBearer
from sqlalchemy.future import select
from sqlalchemy.ext.asyncio import AsyncSession
from jose import JWTError
from . import database, models
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
async def get_current_user(token: str = Depends(oauth2_scheme), db: AsyncSession = Depends(database.get_db)):
credentials_exception = HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Could not validate credentials",
headers={"WWW-Authenticate": "Bearer"},
)
try:
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
username: str = payload.get("sub")
if username is None:
raise credentials_exception
except JWTError:
raise credentials_exception
result = await db.execute(select(models.User).where(models.User.username == username))
user = result.scalars().first()
if user is None:
raise credentials_exception
return user