core/resolvers/auth.py

132 lines
3.8 KiB
Python
Raw Normal View History

from graphql import GraphQLResolveInfo
2021-07-30 13:22:37 +00:00
from datetime import datetime, timedelta
2021-10-24 10:33:45 +00:00
from transliterate import translit
from urllib.parse import quote_plus
2022-01-13 12:16:35 +00:00
from auth.authenticate import login_required, ResetPassword
from auth.authorize import Authorize
from auth.identity import Identity
from auth.password import Password
2022-01-13 12:16:35 +00:00
from auth.email import send_confirm_email, send_auth_email, send_reset_password_email
from orm import User, UserStorage, Role, UserRole
2021-08-05 16:49:08 +00:00
from orm.base import local_session
2021-08-04 13:38:56 +00:00
from resolvers.base import mutation, query
2022-05-03 12:55:29 +00:00
from resolvers.profile import get_user_info
2022-01-13 12:16:35 +00:00
from exceptions import InvalidPassword, InvalidToken
from settings import JWT_AUTH_HEADER
2021-07-30 12:53:22 +00:00
@mutation.field("confirmEmail")
2021-07-30 13:22:37 +00:00
async def confirm(*_, confirm_token):
auth_token, user = await Authorize.confirm(confirm_token)
if auth_token:
user.emailConfirmed = True
2021-07-30 13:24:54 +00:00
user.save()
2021-08-04 13:38:56 +00:00
return { "token": auth_token, "user" : user}
2021-07-30 13:22:37 +00:00
else:
2021-08-04 13:38:56 +00:00
return { "error": "Email not confirmed"}
2021-07-30 13:22:37 +00:00
2021-07-30 12:53:22 +00:00
@mutation.field("registerUser")
2021-07-30 13:22:37 +00:00
async def register(*_, email: str, password: str = ""):
2021-10-24 10:33:45 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
if user:
return {"error" : "user already exist"}
user_dict = { "email": email }
username = email.split('@')[0]
user_dict["username"] = username
user_dict["slug"] = quote_plus(translit(username, 'ru', reversed=True).replace('.', '-').lower())
if password:
user_dict["password"] = Password.encode(password)
user = User(**user_dict)
user.roles.append(Role.default_role)
with local_session() as session:
session.add(user)
session.commit()
await UserStorage.add_user(user)
2021-07-30 13:22:37 +00:00
if not password:
2021-08-26 09:24:46 +00:00
await send_confirm_email(user)
2021-08-01 11:40:24 +00:00
return { "user": user }
2021-11-24 12:56:09 +00:00
token = await Authorize.authorize(user)
return {"user": user, "token": token }
2021-08-01 11:40:24 +00:00
2022-01-13 12:16:35 +00:00
@mutation.field("requestPasswordUpdate")
async def request_password_update(_, info, email):
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
if not user:
return {"error" : "user not exist"}
await send_reset_password_email(user)
return {}
@mutation.field("updatePassword")
async def update_password(_, info, password, token):
try:
user_id = await ResetPassword.verify(token)
except InvalidToken as e:
return {"error" : e.message}
with local_session() as session:
user = session.query(User).filter_by(id = user_id).first()
if not user:
return {"error" : "user not exist"}
user.password = Password.encode(password)
session.commit()
return {}
@query.field("signIn")
2021-08-25 17:12:01 +00:00
async def login(_, info: GraphQLResolveInfo, email: str, password: str = ""):
2021-08-05 16:49:08 +00:00
with local_session() as session:
orm_user = session.query(User).filter(User.email == email).first()
2021-07-14 14:45:31 +00:00
if orm_user is None:
2022-01-28 10:33:16 +00:00
print(f"signIn {email}: invalid email")
2021-08-04 13:38:56 +00:00
return {"error" : "invalid email"}
2021-07-14 14:45:31 +00:00
2021-08-25 17:12:01 +00:00
if not password:
2022-01-28 10:33:16 +00:00
print(f"signIn {email}: send auth email")
2021-08-25 17:12:01 +00:00
await send_auth_email(orm_user)
2021-08-26 09:24:46 +00:00
return {}
2021-08-25 17:12:01 +00:00
2021-07-13 09:15:15 +00:00
try:
device = info.context["request"].headers['device']
except KeyError:
device = "pc"
2021-07-30 06:59:42 +00:00
auto_delete = False if device == "mobile" else True # why autodelete with mobile?
2021-08-01 11:40:24 +00:00
try:
2021-10-24 14:13:32 +00:00
user = Identity.identity(orm_user, password)
2021-08-01 11:40:24 +00:00
except InvalidPassword:
2022-01-28 10:33:16 +00:00
print(f"signIn {email}: invalid password")
2021-08-04 13:38:56 +00:00
return {"error" : "invalid password"}
2021-08-01 11:40:24 +00:00
2021-07-13 09:15:15 +00:00
token = await Authorize.authorize(user, device=device, auto_delete=auto_delete)
2022-01-28 10:33:16 +00:00
print(f"signIn {email}: OK")
2022-05-03 12:55:29 +00:00
return {
"token" : token,
"user": orm_user,
"info": await get_user_info(orm_user.slug)
}
2021-08-01 11:40:24 +00:00
@query.field("signOut")
@login_required
async def sign_out(_, info: GraphQLResolveInfo):
2021-07-13 09:15:15 +00:00
token = info.context["request"].headers[JWT_AUTH_HEADER]
status = await Authorize.revoke(token)
2021-08-09 15:45:51 +00:00
return True
2021-07-14 14:45:31 +00:00
@query.field("isEmailFree")
async def is_email_free(_, info, email):
2021-08-05 16:49:08 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
2021-08-04 13:38:56 +00:00
return user is None