core/resolvers/auth.py

91 lines
2.7 KiB
Python
Raw Normal View History

from graphql import GraphQLResolveInfo
2021-07-30 13:22:37 +00:00
from datetime import datetime, timedelta
2021-10-24 10:33:45 +00:00
from transliterate import translit
from urllib.parse import quote_plus
from auth.authenticate import login_required
from auth.authorize import Authorize
from auth.identity import Identity
from auth.password import Password
2021-08-26 09:24:46 +00:00
from auth.email import send_confirm_email, send_auth_email
from orm import User, UserStorage
2021-08-05 16:49:08 +00:00
from orm.base import local_session
2021-08-04 13:38:56 +00:00
from resolvers.base import mutation, query
2021-08-01 11:40:24 +00:00
from exceptions import InvalidPassword
from settings import JWT_AUTH_HEADER
2021-07-30 12:53:22 +00:00
@mutation.field("confirmEmail")
2021-07-30 13:22:37 +00:00
async def confirm(*_, confirm_token):
auth_token, user = await Authorize.confirm(confirm_token)
if auth_token:
user.emailConfirmed = True
2021-07-30 13:24:54 +00:00
user.save()
2021-08-04 13:38:56 +00:00
return { "token": auth_token, "user" : user}
2021-07-30 13:22:37 +00:00
else:
2021-08-04 13:38:56 +00:00
return { "error": "Email not confirmed"}
2021-07-30 13:22:37 +00:00
2021-07-30 12:53:22 +00:00
@mutation.field("registerUser")
2021-07-30 13:22:37 +00:00
async def register(*_, email: str, password: str = ""):
2021-10-24 10:33:45 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
if user:
return {"error" : "user already exist"}
user_dict = { "email": email }
username = email.split('@')[0]
user_dict["username"] = username
user_dict["slug"] = quote_plus(translit(username, 'ru', reversed=True).replace('.', '-').lower())
2021-07-30 13:22:37 +00:00
if not password:
2021-10-24 10:33:45 +00:00
user = User.create(**user_dict)
2021-08-26 09:24:46 +00:00
await send_confirm_email(user)
await UserStorage.add_user(user)
2021-08-01 11:40:24 +00:00
return { "user": user }
2021-11-24 12:56:09 +00:00
user_dict["password"] = Password.encode(password)
user = User.create(**user_dict)
token = await Authorize.authorize(user)
await UserStorage.add_user(user)
2021-11-24 12:56:09 +00:00
return {"user": user, "token": token }
2021-08-01 11:40:24 +00:00
@query.field("signIn")
2021-08-25 17:12:01 +00:00
async def login(_, info: GraphQLResolveInfo, email: str, password: str = ""):
2021-08-05 16:49:08 +00:00
with local_session() as session:
orm_user = session.query(User).filter(User.email == email).first()
2021-07-14 14:45:31 +00:00
if orm_user is None:
2021-08-04 13:38:56 +00:00
return {"error" : "invalid email"}
2021-07-14 14:45:31 +00:00
2021-08-25 17:12:01 +00:00
if not password:
await send_auth_email(orm_user)
2021-08-26 09:24:46 +00:00
return {}
2021-08-25 17:12:01 +00:00
2021-07-13 09:15:15 +00:00
try:
device = info.context["request"].headers['device']
except KeyError:
device = "pc"
2021-07-30 06:59:42 +00:00
auto_delete = False if device == "mobile" else True # why autodelete with mobile?
2021-08-01 11:40:24 +00:00
try:
2021-10-24 14:13:32 +00:00
user = Identity.identity(orm_user, password)
2021-08-01 11:40:24 +00:00
except InvalidPassword:
2021-08-04 13:38:56 +00:00
return {"error" : "invalid password"}
2021-08-01 11:40:24 +00:00
2021-07-13 09:15:15 +00:00
token = await Authorize.authorize(user, device=device, auto_delete=auto_delete)
2021-10-24 14:13:32 +00:00
return {"token" : token, "user": orm_user}
2021-08-01 11:40:24 +00:00
@query.field("signOut")
@login_required
async def sign_out(_, info: GraphQLResolveInfo):
2021-07-13 09:15:15 +00:00
token = info.context["request"].headers[JWT_AUTH_HEADER]
status = await Authorize.revoke(token)
2021-08-09 15:45:51 +00:00
return True
2021-07-14 14:45:31 +00:00
@query.field("isEmailFree")
async def is_email_free(_, info, email):
2021-08-05 16:49:08 +00:00
with local_session() as session:
user = session.query(User).filter(User.email == email).first()
2021-08-04 13:38:56 +00:00
return user is None