2021-10-24 10:33:45 +00:00
|
|
|
from urllib.parse import quote_plus
|
2022-09-19 13:50:43 +00:00
|
|
|
from datetime import datetime
|
2022-09-17 18:12:14 +00:00
|
|
|
|
|
|
|
from graphql.type import GraphQLResolveInfo
|
|
|
|
from transliterate import translit
|
|
|
|
|
2022-09-19 13:50:43 +00:00
|
|
|
from auth.tokenstorage import TokenStorage
|
2022-09-17 18:12:14 +00:00
|
|
|
from auth.authenticate import login_required
|
|
|
|
from auth.email import send_auth_email
|
|
|
|
from auth.identity import Identity, Password
|
|
|
|
from base.exceptions import (
|
|
|
|
InvalidPassword,
|
|
|
|
InvalidToken,
|
|
|
|
ObjectNotExist,
|
|
|
|
OperationNotAllowed,
|
|
|
|
)
|
2022-08-11 05:53:14 +00:00
|
|
|
from base.orm import local_session
|
|
|
|
from base.resolvers import mutation, query
|
2022-09-17 18:12:14 +00:00
|
|
|
from orm import User, Role
|
2022-05-03 12:55:29 +00:00
|
|
|
from resolvers.profile import get_user_info
|
2022-09-17 18:12:14 +00:00
|
|
|
from settings import SESSION_TOKEN_HEADER
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
|
2022-09-19 13:50:43 +00:00
|
|
|
@mutation.field("refreshSession")
|
|
|
|
@login_required
|
|
|
|
async def get_current_user(_, info):
|
|
|
|
user = info.context["request"].user
|
|
|
|
user.lastSeen = datetime.now()
|
|
|
|
with local_session() as session:
|
|
|
|
session.add(user)
|
|
|
|
session.commit()
|
|
|
|
token = await TokenStorage.create_session(user)
|
|
|
|
return {
|
|
|
|
"token": token,
|
|
|
|
"user": user,
|
|
|
|
"info": await get_user_info(user.slug),
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-07-30 12:53:22 +00:00
|
|
|
@mutation.field("confirmEmail")
|
2022-10-01 08:39:56 +00:00
|
|
|
async def confirm_email(_, confirm_token):
|
2022-09-03 10:50:14 +00:00
|
|
|
"""confirm owning email address"""
|
2022-09-17 18:12:14 +00:00
|
|
|
user_id = None
|
|
|
|
try:
|
|
|
|
user_id = await TokenStorage.get(confirm_token)
|
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).where(User.id == user_id).first()
|
|
|
|
session_token = TokenStorage.create_session(user)
|
|
|
|
user.emailConfirmed = True
|
|
|
|
session.add(user)
|
|
|
|
session.commit()
|
|
|
|
return {"token": session_token, "user": user}
|
|
|
|
except InvalidToken as e:
|
|
|
|
raise InvalidToken(e.message)
|
|
|
|
except Exception as e:
|
|
|
|
print(e) # FIXME: debug only
|
2022-10-01 08:39:56 +00:00
|
|
|
return {"error": "email is not confirmed"}
|
|
|
|
|
|
|
|
|
|
|
|
async def confirm_email_handler(request):
|
|
|
|
token = request.path_params["token"]
|
|
|
|
request.session["token"] = token
|
|
|
|
res = confirm_email(None, token)
|
|
|
|
return res
|
2021-07-30 13:22:37 +00:00
|
|
|
|
2021-07-30 12:53:22 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@mutation.field("registerUser")
|
2021-07-30 13:22:37 +00:00
|
|
|
async def register(*_, email: str, password: str = ""):
|
2022-09-03 10:50:14 +00:00
|
|
|
"""creates new user account"""
|
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
|
|
|
if user:
|
2022-09-05 16:12:49 +00:00
|
|
|
raise OperationNotAllowed("User already exist")
|
|
|
|
# return {"error": "user already exist"}
|
2022-09-03 10:50:14 +00:00
|
|
|
|
|
|
|
user_dict = {"email": email}
|
|
|
|
username = email.split("@")[0]
|
|
|
|
user_dict["username"] = username
|
|
|
|
user_dict["slug"] = quote_plus(
|
|
|
|
translit(username, "ru", reversed=True).replace(".", "-").lower()
|
|
|
|
)
|
|
|
|
if password:
|
|
|
|
user_dict["password"] = Password.encode(password)
|
|
|
|
user = User(**user_dict)
|
|
|
|
user.roles.append(Role.default_role)
|
|
|
|
with local_session() as session:
|
|
|
|
session.add(user)
|
|
|
|
session.commit()
|
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
token = await TokenStorage.create_onetime(user)
|
|
|
|
await send_auth_email(user, token)
|
2022-09-03 10:50:14 +00:00
|
|
|
|
|
|
|
return {"user": user}
|
|
|
|
|
2021-08-01 11:40:24 +00:00
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
@mutation.field("sendLink")
|
|
|
|
async def auth_send_link(_, info, email):
|
|
|
|
"""send link with confirm code to email"""
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
|
|
|
if not user:
|
2022-09-05 16:12:49 +00:00
|
|
|
raise ObjectNotExist("User not found")
|
2022-09-17 18:12:14 +00:00
|
|
|
token = await TokenStorage.create_onetime(user)
|
|
|
|
await send_auth_email(user, token)
|
2022-09-03 10:50:14 +00:00
|
|
|
return {}
|
2022-01-13 12:16:35 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@query.field("signIn")
|
2021-08-25 17:12:01 +00:00
|
|
|
async def login(_, info: GraphQLResolveInfo, email: str, password: str = ""):
|
2022-06-19 17:54:39 +00:00
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
orm_user = session.query(User).filter(User.email == email).first()
|
2022-09-17 18:12:14 +00:00
|
|
|
if orm_user is None:
|
|
|
|
print(f"[auth] {email}: email not found")
|
|
|
|
# return {"error": "email not found"}
|
|
|
|
raise ObjectNotExist("User not found") # contains webserver status
|
|
|
|
|
|
|
|
if not password:
|
|
|
|
print(f"[auth] send confirm link to {email}")
|
|
|
|
token = await TokenStorage.create_onetime(orm_user)
|
|
|
|
await send_auth_email(orm_user, token)
|
|
|
|
# FIXME: not an error, warning
|
|
|
|
return {"error": "no password, email link was sent"}
|
|
|
|
|
|
|
|
else:
|
|
|
|
# sign in using password
|
|
|
|
if not orm_user.emailConfirmed:
|
|
|
|
# not an error, warns users
|
|
|
|
return {"error": "please, confirm email"}
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
user = Identity.password(orm_user, password)
|
|
|
|
session_token = await TokenStorage.create_session(user)
|
|
|
|
print(f"[auth] user {email} authorized")
|
|
|
|
return {
|
|
|
|
"token": session_token,
|
|
|
|
"user": user,
|
|
|
|
"info": await get_user_info(user.slug),
|
|
|
|
}
|
|
|
|
except InvalidPassword:
|
|
|
|
print(f"[auth] {email}: invalid password")
|
|
|
|
raise InvalidPassword("invalid passoword") # contains webserver status
|
|
|
|
# return {"error": "invalid password"}
|
2021-08-01 11:40:24 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@query.field("signOut")
|
2021-06-28 09:08:09 +00:00
|
|
|
@login_required
|
2021-06-29 10:26:46 +00:00
|
|
|
async def sign_out(_, info: GraphQLResolveInfo):
|
2022-09-17 18:12:14 +00:00
|
|
|
token = info.context["request"].headers[SESSION_TOKEN_HEADER]
|
|
|
|
status = await TokenStorage.revoke(token)
|
2022-09-04 17:20:38 +00:00
|
|
|
return status
|
2022-09-03 10:50:14 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2022-06-15 12:41:28 +00:00
|
|
|
@query.field("isEmailUsed")
|
|
|
|
async def is_email_used(_, info, email):
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
2022-09-04 17:20:38 +00:00
|
|
|
return user is not None
|