2022-09-17 18:12:14 +00:00
|
|
|
from jwt import DecodeError, ExpiredSignatureError
|
|
|
|
from sqlalchemy import or_
|
|
|
|
|
|
|
|
from auth.jwtcodec import JWTCodec
|
|
|
|
from auth.tokenstorage import TokenStorage
|
|
|
|
from validations.auth import AuthInput
|
2022-09-05 16:12:49 +00:00
|
|
|
from base.exceptions import InvalidPassword
|
2022-09-17 18:12:14 +00:00
|
|
|
from base.exceptions import InvalidToken
|
2022-08-11 05:53:14 +00:00
|
|
|
from base.orm import local_session
|
2022-09-17 18:12:14 +00:00
|
|
|
from orm import User
|
|
|
|
from passlib.hash import bcrypt
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
class Password:
|
|
|
|
@staticmethod
|
|
|
|
def encode(password: str) -> str:
|
|
|
|
return bcrypt.hash(password)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def verify(password: str, other: str) -> bool:
|
|
|
|
return bcrypt.verify(password, other)
|
2021-07-14 14:45:31 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
|
|
|
class Identity:
|
2022-09-03 10:50:14 +00:00
|
|
|
@staticmethod
|
2022-09-17 18:12:14 +00:00
|
|
|
def password(orm_user: User, password: str) -> User:
|
2022-09-17 19:48:21 +00:00
|
|
|
user = User(**orm_user.dict())
|
2022-09-05 16:12:49 +00:00
|
|
|
if not user.password:
|
|
|
|
raise InvalidPassword("User password is empty")
|
2022-09-03 10:50:14 +00:00
|
|
|
if not Password.verify(password, user.password):
|
|
|
|
raise InvalidPassword("Wrong user password")
|
|
|
|
return user
|
2021-07-14 14:45:31 +00:00
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
@staticmethod
|
2022-09-17 18:12:14 +00:00
|
|
|
def oauth(inp: AuthInput) -> User:
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = (
|
2022-09-17 18:12:14 +00:00
|
|
|
session.query(User)
|
|
|
|
.filter(or_(User.oauth == inp["oauth"], User.email == inp["email"]))
|
2022-09-03 10:50:14 +00:00
|
|
|
.first()
|
|
|
|
)
|
|
|
|
if not user:
|
2022-09-17 18:12:14 +00:00
|
|
|
user = User.create(**inp)
|
2022-09-03 10:50:14 +00:00
|
|
|
if not user.oauth:
|
2022-09-17 18:12:14 +00:00
|
|
|
user.oauth = inp["oauth"]
|
2022-09-03 10:50:14 +00:00
|
|
|
session.commit()
|
|
|
|
|
|
|
|
user = User(**user.dict())
|
|
|
|
return user
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
async def onetime(token: str) -> User:
|
|
|
|
try:
|
|
|
|
payload = JWTCodec.decode(token)
|
|
|
|
if not await TokenStorage.exist(f"{payload.user_id}-{token}"):
|
|
|
|
raise InvalidToken("Login token has expired, please login again")
|
|
|
|
except ExpiredSignatureError:
|
|
|
|
raise InvalidToken("Login token has expired, please try again")
|
|
|
|
except DecodeError as e:
|
|
|
|
raise InvalidToken("token format error") from e
|
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter_by(id=payload.user_id).first()
|
|
|
|
if not user:
|
|
|
|
raise Exception("user not exist")
|
|
|
|
if not user.emailConfirmed:
|
|
|
|
user.emailConfirmed = True
|
|
|
|
session.commit()
|
|
|
|
return user
|