core/resolvers/auth.py

190 lines
6.9 KiB
Python
Raw Normal View History

2022-10-21 05:47:58 +00:00
# -*- coding: utf-8 -*-
2023-10-26 17:56:42 +00:00
import re
2022-11-23 14:09:35 +00:00
from datetime import datetime, timezone
2022-11-10 05:40:32 +00:00
from urllib.parse import quote_plus
from graphql.type import GraphQLResolveInfo
2022-10-05 17:06:29 +00:00
from starlette.responses import RedirectResponse
2022-11-10 05:40:32 +00:00
from transliterate import translit
2023-10-26 17:56:42 +00:00
from auth.authenticate import login_required
2022-12-01 14:45:19 +00:00
from auth.credentials import AuthCredentials
from auth.email import send_auth_email
from auth.identity import Identity, Password
2022-11-10 05:40:32 +00:00
from auth.jwtcodec import JWTCodec
from auth.tokenstorage import TokenStorage
2023-10-26 17:57:17 +00:00
from base.exceptions import BaseHttpException, InvalidPassword, InvalidToken, ObjectNotExist, Unauthorized
2022-08-11 05:53:14 +00:00
from base.orm import local_session
from base.resolvers import mutation, query
2022-11-10 05:40:32 +00:00
from orm import Role, User
2023-10-26 17:56:42 +00:00
from settings import FRONTEND_URL, SESSION_TOKEN_HEADER
2022-09-03 10:50:14 +00:00
2022-11-24 15:19:58 +00:00
@mutation.field("getSession")
2022-09-19 13:50:43 +00:00
@login_required
async def get_current_user(_, info):
2022-12-01 14:45:19 +00:00
auth: AuthCredentials = info.context["request"].auth
2022-12-01 13:24:05 +00:00
token = info.context["request"].headers.get(SESSION_TOKEN_HEADER)
2022-12-01 14:45:19 +00:00
with local_session() as session:
user = session.query(User).where(User.id == auth.user_id).one()
user.lastSeen = datetime.now(tz=timezone.utc)
session.commit()
2022-12-01 13:24:05 +00:00
2023-10-26 17:56:42 +00:00
return {"token": token, "user": user}
2022-09-19 13:50:43 +00:00
2021-07-30 12:53:22 +00:00
@mutation.field("confirmEmail")
2022-10-23 09:33:28 +00:00
async def confirm_email(_, info, token):
2022-09-03 10:50:14 +00:00
"""confirm owning email address"""
try:
2022-11-23 09:57:58 +00:00
print('[resolvers.auth] confirm email by token')
2022-10-23 09:33:28 +00:00
payload = JWTCodec.decode(token)
2022-10-21 18:21:24 +00:00
user_id = payload.user_id
2023-01-31 06:57:35 +00:00
await TokenStorage.get(f"{user_id}-{payload.username}-{token}")
with local_session() as session:
user = session.query(User).where(User.id == user_id).first()
2022-10-22 12:02:15 +00:00
session_token = await TokenStorage.create_session(user)
user.emailConfirmed = True
2022-11-23 14:09:35 +00:00
user.lastSeen = datetime.now(tz=timezone.utc)
session.add(user)
session.commit()
2023-10-26 17:56:42 +00:00
return {"token": session_token, "user": user}
except InvalidToken as e:
raise InvalidToken(e.message)
except Exception as e:
print(e) # FIXME: debug only
2022-10-01 08:39:56 +00:00
return {"error": "email is not confirmed"}
2022-10-05 17:06:29 +00:00
async def confirm_email_handler(request):
token = request.path_params["token"] # one time
request.session["token"] = token
2022-10-23 09:33:28 +00:00
res = await confirm_email(None, {}, token)
2022-10-23 12:48:08 +00:00
print('[resolvers.auth] confirm_email request: %r' % request)
2022-10-23 09:33:28 +00:00
if "error" in res:
raise BaseHttpException(res['error'])
else:
2022-11-25 23:49:02 +00:00
response = RedirectResponse(url=FRONTEND_URL)
2022-10-23 09:33:28 +00:00
response.set_cookie("token", res["token"]) # session token
return response
2022-10-05 17:06:29 +00:00
2022-10-04 09:22:27 +00:00
def create_user(user_dict):
user = User(**user_dict)
with local_session() as session:
2022-11-24 08:27:01 +00:00
user.roles.append(session.query(Role).first())
2022-10-04 09:22:27 +00:00
session.add(user)
session.commit()
return user
2022-10-22 12:02:15 +00:00
def generate_unique_slug(src):
print('[resolvers.auth] generating slug from: ' + src)
slug = translit(src, "ru", reversed=True).replace(".", "-").lower()
2023-02-17 14:30:38 +00:00
slug = re.sub('[^0-9a-zA-Z]+', '-', slug)
2022-10-22 12:02:15 +00:00
if slug != src:
print('[resolvers.auth] translited name: ' + slug)
2022-10-23 09:33:28 +00:00
c = 1
2022-10-04 09:22:27 +00:00
with local_session() as session:
user = session.query(User).where(User.slug == slug).first()
while user:
user = session.query(User).where(User.slug == slug).first()
slug = slug + '-' + str(c)
c += 1
if not user:
unique_slug = slug
2022-10-22 12:02:15 +00:00
print('[resolvers.auth] ' + unique_slug)
2022-11-11 07:07:53 +00:00
return quote_plus(unique_slug.replace('\'', '')).replace('+', '-')
2021-07-30 13:22:37 +00:00
2021-07-30 12:53:22 +00:00
@mutation.field("registerUser")
2022-10-22 12:02:15 +00:00
async def register_by_email(_, _info, email: str, password: str = "", name: str = ""):
email = email.lower()
2022-09-03 10:50:14 +00:00
"""creates new user account"""
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
if user:
2022-12-01 08:12:48 +00:00
raise Unauthorized("User already exist")
2022-10-04 09:22:27 +00:00
else:
2022-10-23 09:33:28 +00:00
slug = generate_unique_slug(name)
user = session.query(User).where(User.slug == slug).first()
if user:
slug = generate_unique_slug(email.split('@')[0])
2022-10-04 09:22:27 +00:00
user_dict = {
"email": email,
2022-10-22 12:02:15 +00:00
"username": email, # will be used to store phone number or some messenger network id
2022-10-20 22:05:37 +00:00
"name": name,
2023-10-26 17:56:42 +00:00
"slug": slug,
2022-10-04 09:22:27 +00:00
}
if password:
user_dict["password"] = Password.encode(password)
user = create_user(user_dict)
2022-10-22 12:02:15 +00:00
user = await auth_send_link(_, _info, email)
2022-10-04 14:30:17 +00:00
return {"user": user}
2022-09-03 10:50:14 +00:00
2021-08-01 11:40:24 +00:00
@mutation.field("sendLink")
2022-11-27 13:14:17 +00:00
async def auth_send_link(_, _info, email, lang="ru", template="email_confirmation"):
email = email.lower()
"""send link with confirm code to email"""
2022-09-03 10:50:14 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
2022-10-04 09:22:27 +00:00
if not user:
raise ObjectNotExist("User not found")
else:
token = await TokenStorage.create_onetime(user)
2022-11-27 13:14:17 +00:00
await send_auth_email(user, token, lang, template)
2022-10-04 09:22:27 +00:00
return user
2022-01-13 12:16:35 +00:00
@query.field("signIn")
2022-10-23 09:33:28 +00:00
async def login(_, info, email: str, password: str = "", lang: str = "ru"):
email = email.lower()
2022-09-03 10:50:14 +00:00
with local_session() as session:
orm_user = session.query(User).filter(User.email == email).first()
if orm_user is None:
print(f"[auth] {email}: email not found")
# return {"error": "email not found"}
raise ObjectNotExist("User not found") # contains webserver status
if not password:
print(f"[auth] send confirm link to {email}")
token = await TokenStorage.create_onetime(orm_user)
2022-10-21 05:47:58 +00:00
await send_auth_email(orm_user, token, lang)
# FIXME: not an error, warning
return {"error": "no password, email link was sent"}
else:
# sign in using password
if not orm_user.emailConfirmed:
# not an error, warns users
return {"error": "please, confirm email"}
else:
try:
user = Identity.password(orm_user, password)
session_token = await TokenStorage.create_session(user)
print(f"[auth] user {email} authorized")
2023-10-26 17:56:42 +00:00
return {"token": session_token, "user": user}
except InvalidPassword:
print(f"[auth] {email}: invalid password")
2022-11-23 11:30:44 +00:00
raise InvalidPassword("invalid password") # contains webserver status
# return {"error": "invalid password"}
2021-08-01 11:40:24 +00:00
@query.field("signOut")
@login_required
async def sign_out(_, info: GraphQLResolveInfo):
2022-11-22 03:11:26 +00:00
token = info.context["request"].headers.get(SESSION_TOKEN_HEADER, "")
status = await TokenStorage.revoke(token)
2022-09-04 17:20:38 +00:00
return status
2022-09-03 10:50:14 +00:00
2022-06-15 12:41:28 +00:00
@query.field("isEmailUsed")
2022-10-04 12:07:41 +00:00
async def is_email_used(_, _info, email):
email = email.lower()
2022-09-03 10:50:14 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
2022-09-04 17:20:38 +00:00
return user is not None