2022-10-21 05:47:58 +00:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2023-10-30 21:00:55 +00:00
|
|
|
import re
|
2023-10-26 21:07:35 +00:00
|
|
|
from datetime import datetime, timezone
|
|
|
|
from urllib.parse import quote_plus
|
|
|
|
|
|
|
|
from graphql.type import GraphQLResolveInfo
|
|
|
|
from starlette.responses import RedirectResponse
|
|
|
|
from transliterate import translit
|
2023-10-30 21:00:55 +00:00
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
from auth.authenticate import login_required
|
2022-12-01 14:45:19 +00:00
|
|
|
from auth.credentials import AuthCredentials
|
2022-09-17 18:12:14 +00:00
|
|
|
from auth.email import send_auth_email
|
|
|
|
from auth.identity import Identity, Password
|
2022-11-10 05:40:32 +00:00
|
|
|
from auth.jwtcodec import JWTCodec
|
|
|
|
from auth.tokenstorage import TokenStorage
|
2023-10-30 21:00:55 +00:00
|
|
|
from base.exceptions import (
|
|
|
|
BaseHttpException,
|
|
|
|
InvalidPassword,
|
|
|
|
InvalidToken,
|
|
|
|
ObjectNotExist,
|
|
|
|
Unauthorized,
|
|
|
|
)
|
2022-08-11 05:53:14 +00:00
|
|
|
from base.orm import local_session
|
|
|
|
from base.resolvers import mutation, query
|
2022-11-10 05:40:32 +00:00
|
|
|
from orm import Role, User
|
2023-10-30 21:00:55 +00:00
|
|
|
from settings import FRONTEND_URL, SESSION_TOKEN_HEADER
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2022-09-03 10:50:14 +00:00
|
|
|
|
2022-11-24 15:19:58 +00:00
|
|
|
@mutation.field("getSession")
|
2022-09-19 13:50:43 +00:00
|
|
|
@login_required
|
|
|
|
async def get_current_user(_, info):
|
2022-12-01 14:45:19 +00:00
|
|
|
auth: AuthCredentials = info.context["request"].auth
|
2022-12-01 13:24:05 +00:00
|
|
|
token = info.context["request"].headers.get(SESSION_TOKEN_HEADER)
|
|
|
|
|
2022-12-01 14:45:19 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).where(User.id == auth.user_id).one()
|
|
|
|
user.lastSeen = datetime.now(tz=timezone.utc)
|
|
|
|
session.commit()
|
2022-12-01 13:24:05 +00:00
|
|
|
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"token": token, "user": user}
|
2022-09-19 13:50:43 +00:00
|
|
|
|
|
|
|
|
2021-07-30 12:53:22 +00:00
|
|
|
@mutation.field("confirmEmail")
|
2022-10-23 09:33:28 +00:00
|
|
|
async def confirm_email(_, info, token):
|
2022-09-03 10:50:14 +00:00
|
|
|
"""confirm owning email address"""
|
2022-09-17 18:12:14 +00:00
|
|
|
try:
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[resolvers.auth] confirm email by token")
|
2022-10-23 09:33:28 +00:00
|
|
|
payload = JWTCodec.decode(token)
|
2022-10-21 18:21:24 +00:00
|
|
|
user_id = payload.user_id
|
2023-01-31 06:57:35 +00:00
|
|
|
await TokenStorage.get(f"{user_id}-{payload.username}-{token}")
|
2022-09-17 18:12:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).where(User.id == user_id).first()
|
2022-10-22 12:02:15 +00:00
|
|
|
session_token = await TokenStorage.create_session(user)
|
2022-09-17 18:12:14 +00:00
|
|
|
user.emailConfirmed = True
|
2022-11-23 14:09:35 +00:00
|
|
|
user.lastSeen = datetime.now(tz=timezone.utc)
|
2022-09-17 18:12:14 +00:00
|
|
|
session.add(user)
|
|
|
|
session.commit()
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"token": session_token, "user": user}
|
2022-09-17 18:12:14 +00:00
|
|
|
except InvalidToken as e:
|
|
|
|
raise InvalidToken(e.message)
|
|
|
|
except Exception as e:
|
|
|
|
print(e) # FIXME: debug only
|
2022-10-01 08:39:56 +00:00
|
|
|
return {"error": "email is not confirmed"}
|
|
|
|
|
|
|
|
|
2022-10-05 17:06:29 +00:00
|
|
|
async def confirm_email_handler(request):
|
|
|
|
token = request.path_params["token"] # one time
|
|
|
|
request.session["token"] = token
|
2022-10-23 09:33:28 +00:00
|
|
|
res = await confirm_email(None, {}, token)
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[resolvers.auth] confirm_email request: %r" % request)
|
2022-10-23 09:33:28 +00:00
|
|
|
if "error" in res:
|
2023-10-30 21:00:55 +00:00
|
|
|
raise BaseHttpException(res["error"])
|
2022-10-23 09:33:28 +00:00
|
|
|
else:
|
2022-11-25 23:49:02 +00:00
|
|
|
response = RedirectResponse(url=FRONTEND_URL)
|
2022-10-23 09:33:28 +00:00
|
|
|
response.set_cookie("token", res["token"]) # session token
|
|
|
|
return response
|
2022-10-05 17:06:29 +00:00
|
|
|
|
|
|
|
|
2022-10-04 09:22:27 +00:00
|
|
|
def create_user(user_dict):
|
|
|
|
user = User(**user_dict)
|
|
|
|
with local_session() as session:
|
2022-11-24 08:27:01 +00:00
|
|
|
user.roles.append(session.query(Role).first())
|
2022-10-04 09:22:27 +00:00
|
|
|
session.add(user)
|
|
|
|
session.commit()
|
|
|
|
return user
|
|
|
|
|
|
|
|
|
2022-10-22 12:02:15 +00:00
|
|
|
def generate_unique_slug(src):
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[resolvers.auth] generating slug from: " + src)
|
2022-10-22 12:02:15 +00:00
|
|
|
slug = translit(src, "ru", reversed=True).replace(".", "-").lower()
|
2023-10-30 21:00:55 +00:00
|
|
|
slug = re.sub("[^0-9a-zA-Z]+", "-", slug)
|
2022-10-22 12:02:15 +00:00
|
|
|
if slug != src:
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[resolvers.auth] translited name: " + slug)
|
2022-10-23 09:33:28 +00:00
|
|
|
c = 1
|
2022-10-04 09:22:27 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).where(User.slug == slug).first()
|
|
|
|
while user:
|
|
|
|
user = session.query(User).where(User.slug == slug).first()
|
2023-10-30 21:00:55 +00:00
|
|
|
slug = slug + "-" + str(c)
|
2022-10-04 09:22:27 +00:00
|
|
|
c += 1
|
|
|
|
if not user:
|
|
|
|
unique_slug = slug
|
2023-10-30 21:00:55 +00:00
|
|
|
print("[resolvers.auth] " + unique_slug)
|
|
|
|
return quote_plus(unique_slug.replace("'", "")).replace("+", "-")
|
2021-07-30 13:22:37 +00:00
|
|
|
|
2021-07-30 12:53:22 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@mutation.field("registerUser")
|
2022-10-22 12:02:15 +00:00
|
|
|
async def register_by_email(_, _info, email: str, password: str = "", name: str = ""):
|
2023-08-06 20:01:40 +00:00
|
|
|
email = email.lower()
|
2022-09-03 10:50:14 +00:00
|
|
|
"""creates new user account"""
|
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
|
|
|
if user:
|
2022-12-01 08:12:48 +00:00
|
|
|
raise Unauthorized("User already exist")
|
2022-10-04 09:22:27 +00:00
|
|
|
else:
|
2022-10-23 09:33:28 +00:00
|
|
|
slug = generate_unique_slug(name)
|
|
|
|
user = session.query(User).where(User.slug == slug).first()
|
|
|
|
if user:
|
2023-10-30 21:00:55 +00:00
|
|
|
slug = generate_unique_slug(email.split("@")[0])
|
2022-10-04 09:22:27 +00:00
|
|
|
user_dict = {
|
|
|
|
"email": email,
|
2022-10-22 12:02:15 +00:00
|
|
|
"username": email, # will be used to store phone number or some messenger network id
|
2022-10-20 22:05:37 +00:00
|
|
|
"name": name,
|
2023-10-30 21:00:55 +00:00
|
|
|
"slug": slug,
|
2022-10-04 09:22:27 +00:00
|
|
|
}
|
|
|
|
if password:
|
|
|
|
user_dict["password"] = Password.encode(password)
|
|
|
|
user = create_user(user_dict)
|
2022-10-22 12:02:15 +00:00
|
|
|
user = await auth_send_link(_, _info, email)
|
2022-10-04 14:30:17 +00:00
|
|
|
return {"user": user}
|
2022-09-03 10:50:14 +00:00
|
|
|
|
2021-08-01 11:40:24 +00:00
|
|
|
|
2022-09-17 18:12:14 +00:00
|
|
|
@mutation.field("sendLink")
|
2022-11-27 13:14:17 +00:00
|
|
|
async def auth_send_link(_, _info, email, lang="ru", template="email_confirmation"):
|
2023-08-06 20:01:40 +00:00
|
|
|
email = email.lower()
|
2022-09-17 18:12:14 +00:00
|
|
|
"""send link with confirm code to email"""
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
2022-10-04 09:22:27 +00:00
|
|
|
if not user:
|
|
|
|
raise ObjectNotExist("User not found")
|
|
|
|
else:
|
|
|
|
token = await TokenStorage.create_onetime(user)
|
2022-11-27 13:14:17 +00:00
|
|
|
await send_auth_email(user, token, lang, template)
|
2022-10-04 09:22:27 +00:00
|
|
|
return user
|
2022-01-13 12:16:35 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@query.field("signIn")
|
2022-10-23 09:33:28 +00:00
|
|
|
async def login(_, info, email: str, password: str = "", lang: str = "ru"):
|
2023-08-06 20:01:40 +00:00
|
|
|
email = email.lower()
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
orm_user = session.query(User).filter(User.email == email).first()
|
2022-09-17 18:12:14 +00:00
|
|
|
if orm_user is None:
|
|
|
|
print(f"[auth] {email}: email not found")
|
|
|
|
# return {"error": "email not found"}
|
|
|
|
raise ObjectNotExist("User not found") # contains webserver status
|
|
|
|
|
|
|
|
if not password:
|
|
|
|
print(f"[auth] send confirm link to {email}")
|
|
|
|
token = await TokenStorage.create_onetime(orm_user)
|
2022-10-21 05:47:58 +00:00
|
|
|
await send_auth_email(orm_user, token, lang)
|
2022-09-17 18:12:14 +00:00
|
|
|
# FIXME: not an error, warning
|
|
|
|
return {"error": "no password, email link was sent"}
|
|
|
|
|
|
|
|
else:
|
|
|
|
# sign in using password
|
|
|
|
if not orm_user.emailConfirmed:
|
|
|
|
# not an error, warns users
|
|
|
|
return {"error": "please, confirm email"}
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
user = Identity.password(orm_user, password)
|
|
|
|
session_token = await TokenStorage.create_session(user)
|
|
|
|
print(f"[auth] user {email} authorized")
|
2023-10-30 21:00:55 +00:00
|
|
|
return {"token": session_token, "user": user}
|
2022-09-17 18:12:14 +00:00
|
|
|
except InvalidPassword:
|
|
|
|
print(f"[auth] {email}: invalid password")
|
2022-11-23 11:30:44 +00:00
|
|
|
raise InvalidPassword("invalid password") # contains webserver status
|
2022-09-17 18:12:14 +00:00
|
|
|
# return {"error": "invalid password"}
|
2021-08-01 11:40:24 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2021-06-29 10:26:46 +00:00
|
|
|
@query.field("signOut")
|
2021-06-28 09:08:09 +00:00
|
|
|
@login_required
|
2021-06-29 10:26:46 +00:00
|
|
|
async def sign_out(_, info: GraphQLResolveInfo):
|
2022-11-22 03:11:26 +00:00
|
|
|
token = info.context["request"].headers.get(SESSION_TOKEN_HEADER, "")
|
2022-09-17 18:12:14 +00:00
|
|
|
status = await TokenStorage.revoke(token)
|
2022-09-04 17:20:38 +00:00
|
|
|
return status
|
2022-09-03 10:50:14 +00:00
|
|
|
|
2021-06-28 09:08:09 +00:00
|
|
|
|
2022-06-15 12:41:28 +00:00
|
|
|
@query.field("isEmailUsed")
|
2022-10-04 12:07:41 +00:00
|
|
|
async def is_email_used(_, _info, email):
|
2023-08-06 20:01:40 +00:00
|
|
|
email = email.lower()
|
2022-09-03 10:50:14 +00:00
|
|
|
with local_session() as session:
|
|
|
|
user = session.query(User).filter(User.email == email).first()
|
2022-09-04 17:20:38 +00:00
|
|
|
return user is not None
|