passport.py 1.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364
  1. # -*- coding:utf-8 -*-
  2. import uuid
  3. from controllers.web import api
  4. from flask_restful import Resource
  5. from flask import request
  6. from werkzeug.exceptions import Unauthorized, NotFound
  7. from models.model import Site, EndUser, App
  8. from extensions.ext_database import db
  9. from libs.passport import PassportService
  10. class PassportResource(Resource):
  11. """Base resource for passport."""
  12. def get(self):
  13. app_id = request.headers.get('X-App-Code')
  14. if app_id is None:
  15. raise Unauthorized('X-App-Code header is missing.')
  16. # get site from db and check if it is normal
  17. site = db.session.query(Site).filter(
  18. Site.code == app_id,
  19. Site.status == 'normal'
  20. ).first()
  21. if not site:
  22. raise NotFound()
  23. # get app from db and check if it is normal and enable_site
  24. app_model = db.session.query(App).filter(App.id == site.app_id).first()
  25. if not app_model or app_model.status != 'normal' or not app_model.enable_site:
  26. raise NotFound()
  27. end_user = EndUser(
  28. tenant_id=app_model.tenant_id,
  29. app_id=app_model.id,
  30. type='browser',
  31. is_anonymous=True,
  32. session_id=generate_session_id(),
  33. )
  34. db.session.add(end_user)
  35. db.session.commit()
  36. payload = {
  37. "iss": site.app_id,
  38. 'sub': 'Web API Passport',
  39. 'app_id': site.app_id,
  40. 'end_user_id': end_user.id,
  41. }
  42. tk = PassportService().issue(payload)
  43. return {
  44. 'access_token': tk,
  45. }
  46. api.add_resource(PassportResource, '/passport')
  47. def generate_session_id():
  48. """
  49. Generate a unique session ID.
  50. """
  51. while True:
  52. session_id = str(uuid.uuid4())
  53. existing_count = db.session.query(EndUser) \
  54. .filter(EndUser.session_id == session_id).count()
  55. if existing_count == 0:
  56. return session_id