core/resolvers/auth.py

88 lines
2.7 KiB
Python
Raw Normal View History

from graphql import GraphQLResolveInfo
2021-07-30 13:22:37 +00:00
from datetime import datetime, timedelta
from auth.authenticate import login_required
from auth.authorize import Authorize
from auth.identity import Identity
from auth.password import Password
from auth.validations import CreateUser
from orm import User
2021-08-05 16:49:08 +00:00
from orm.base import local_session
2021-08-04 13:38:56 +00:00
from resolvers.base import mutation, query
2021-08-01 11:40:24 +00:00
from exceptions import InvalidPassword
from settings import JWT_AUTH_HEADER
2021-07-30 12:53:22 +00:00
@mutation.field("confirmEmail")
2021-07-30 13:22:37 +00:00
async def confirm(*_, confirm_token):
auth_token, user = await Authorize.confirm(confirm_token)
if auth_token:
user.emailConfirmed = True
2021-07-30 13:24:54 +00:00
user.save()
2021-08-04 13:38:56 +00:00
return { "token": auth_token, "user" : user}
2021-07-30 13:22:37 +00:00
else:
2021-08-04 13:38:56 +00:00
return { "error": "Email not confirmed"}
2021-07-30 13:22:37 +00:00
2021-07-30 12:53:22 +00:00
@mutation.field("registerUser")
2021-07-30 13:22:37 +00:00
async def register(*_, email: str, password: str = ""):
2021-07-30 07:12:48 +00:00
inp = { "email": email, "password": password}
2021-07-30 07:09:39 +00:00
create_user = CreateUser(**inp)
2021-07-30 07:18:04 +00:00
create_user.username = email.split('@')[0]
2021-07-30 13:22:37 +00:00
if not password:
# NOTE: 1 hour confirm_token expire
confirm_token = Token.encode(create_user, datetime.now() + timedelta(hours = 1) , "email")
# TODO: sendAuthEmail(confirm_token)
2021-07-30 12:53:22 +00:00
# без пароля не возвращаем, а высылаем токен на почту
#
2021-08-01 11:40:24 +00:00
return { "user": user }
2021-07-30 12:53:22 +00:00
else:
2021-07-30 13:22:37 +00:00
create_user.password = Password.encode(create_user.password)
user = User.create(**create_user.dict())
2021-07-30 12:53:22 +00:00
token = await Authorize.authorize(user)
2021-08-01 11:40:24 +00:00
return {"user": user, "token": token }
@query.field("signIn")
2021-08-09 15:45:51 +00:00
async def login(_, info: GraphQLResolveInfo, email: str, password: str):
2021-08-05 16:49:08 +00:00
with local_session() as session:
orm_user = session.query(User).filter(User.email == email).first()
2021-07-14 14:45:31 +00:00
if orm_user is None:
2021-08-04 13:38:56 +00:00
return {"error" : "invalid email"}
2021-07-14 14:45:31 +00:00
2021-07-13 09:15:15 +00:00
try:
device = info.context["request"].headers['device']
except KeyError:
device = "pc"
2021-07-30 06:59:42 +00:00
auto_delete = False if device == "mobile" else True # why autodelete with mobile?
2021-08-01 11:40:24 +00:00
try:
user = Identity.identity(user_id=orm_user.id, password=password)
except InvalidPassword:
2021-08-04 13:38:56 +00:00
return {"error" : "invalid password"}
2021-08-01 11:40:24 +00:00
2021-07-13 09:15:15 +00:00
token = await Authorize.authorize(user, device=device, auto_delete=auto_delete)
2021-08-09 18:58:59 +00:00
return {"token" : token, "user": user}
2021-08-01 11:40:24 +00:00
@query.field("signOut")
@login_required
async def sign_out(_, info: GraphQLResolveInfo):
2021-07-13 09:15:15 +00:00
token = info.context["request"].headers[JWT_AUTH_HEADER]
status = await Authorize.revoke(token)
2021-08-09 15:45:51 +00:00
return True
2021-07-14 14:45:31 +00:00
@query.field("getCurrentUser")
@login_required
async def get_user(_, info):
auth = info.context["request"].auth
user_id = auth.user_id
2021-08-05 16:49:08 +00:00
with local_session() as session:
user = session.query(User).filter(User.id == user_id).first()
2021-08-04 13:38:56 +00:00
return { "user": user }
2021-07-14 14:45:31 +00:00
@query.field("isEmailFree")
async def is_email_free(_, info, email):
2021-08-05 16:49:08 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
2021-08-04 13:38:56 +00:00
return user is None