refactored authorization and account app
This commit is contained in:
parent
892159ccb6
commit
1b3eececf2
|
|
@ -106,22 +106,8 @@ class User(ImageMixin, AbstractUser):
|
||||||
self.is_active = True
|
self.is_active = True
|
||||||
self.save()
|
self.save()
|
||||||
|
|
||||||
def remove_access_tokens(self, source: Union[int, Union[tuple, list]]):
|
def revoke_access_token(self):
|
||||||
"""Method to remove user access tokens"""
|
print('Revoke token')
|
||||||
source = source if isinstance(source, list) else [source, ]
|
|
||||||
self.oauth2_provider_accesstoken.filter(application__source__in=source)\
|
|
||||||
.delete()
|
|
||||||
|
|
||||||
def revoke_refresh_tokens(self, source: Union[int, tuple, list]):
|
|
||||||
"""Method to remove user refresh tokens"""
|
|
||||||
source = source if isinstance(source, list) else [source, ]
|
|
||||||
refresh_tokens = self.oauth2_provider_refreshtoken.filter(
|
|
||||||
application__source__in=source,
|
|
||||||
access_token__isnull=False
|
|
||||||
)
|
|
||||||
if refresh_tokens.exists():
|
|
||||||
for token in refresh_tokens:
|
|
||||||
token.revoke()
|
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def confirm_email_token(self):
|
def confirm_email_token(self):
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,6 @@ from fcm_django.models import FCMDevice
|
||||||
from rest_framework import serializers, exceptions
|
from rest_framework import serializers, exceptions
|
||||||
|
|
||||||
from account import models
|
from account import models
|
||||||
from utils import exceptions as utils_exceptions
|
|
||||||
from rest_framework_simplejwt import tokens
|
|
||||||
from django.conf import settings
|
|
||||||
from account import tasks
|
|
||||||
|
|
||||||
|
|
||||||
# User serializers
|
# User serializers
|
||||||
|
|
@ -62,84 +58,3 @@ class FCMDeviceSerializer(serializers.ModelSerializer):
|
||||||
instance.user = None
|
instance.user = None
|
||||||
instance.save()
|
instance.save()
|
||||||
return instance
|
return instance
|
||||||
|
|
||||||
|
|
||||||
class RefreshTokenSerializer(serializers.Serializer):
|
|
||||||
"""Serializer for refresh token view"""
|
|
||||||
refresh_token = serializers.CharField(read_only=True)
|
|
||||||
access_token = serializers.CharField(read_only=True)
|
|
||||||
|
|
||||||
def get_request(self):
|
|
||||||
"""Return request"""
|
|
||||||
return self.context.get('request')
|
|
||||||
|
|
||||||
def validate(self, attrs):
|
|
||||||
"""Override validate method"""
|
|
||||||
refresh_token = self.get_request().COOKIES.get('refresh_token')
|
|
||||||
if not refresh_token:
|
|
||||||
raise utils_exceptions.NotValidRefreshTokenError()
|
|
||||||
|
|
||||||
token = tokens.RefreshToken(token=refresh_token)
|
|
||||||
|
|
||||||
data = {'access_token': str(token.access_token)}
|
|
||||||
|
|
||||||
if settings.SIMPLE_JWT.get('ROTATE_REFRESH_TOKENS'):
|
|
||||||
if settings.SIMPLE_JWT.get('BLACKLIST_AFTER_ROTATION'):
|
|
||||||
try:
|
|
||||||
# Attempt to blacklist the given refresh token
|
|
||||||
token.blacklist()
|
|
||||||
except AttributeError:
|
|
||||||
# If blacklist app not installed, `blacklist` method will
|
|
||||||
# not be present
|
|
||||||
pass
|
|
||||||
|
|
||||||
token.set_jti()
|
|
||||||
token.set_exp()
|
|
||||||
|
|
||||||
data['refresh_token'] = str(token)
|
|
||||||
|
|
||||||
return data
|
|
||||||
|
|
||||||
|
|
||||||
class ChangeEmailSerializer(serializers.ModelSerializer):
|
|
||||||
"""Change user email serializer"""
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
"""Meta class"""
|
|
||||||
model = models.User
|
|
||||||
fields = (
|
|
||||||
'id',
|
|
||||||
'email',
|
|
||||||
)
|
|
||||||
read_only_fields = (
|
|
||||||
'id',
|
|
||||||
)
|
|
||||||
|
|
||||||
def validate_email(self, value):
|
|
||||||
"""Validate email value"""
|
|
||||||
if value == self.instance.email:
|
|
||||||
# todo: add custom exception
|
|
||||||
raise serializers.ValidationError()
|
|
||||||
return value
|
|
||||||
|
|
||||||
def validate(self, attrs):
|
|
||||||
"""Override validate method"""
|
|
||||||
email_confirmed = self.instance.email_confirmed
|
|
||||||
if not email_confirmed:
|
|
||||||
# todo: add custom exception
|
|
||||||
raise serializers.ValidationError()
|
|
||||||
return attrs
|
|
||||||
|
|
||||||
def update(self, instance, validated_data):
|
|
||||||
"""
|
|
||||||
Override update method
|
|
||||||
"""
|
|
||||||
instance.email = validated_data.get('email')
|
|
||||||
instance.email_confirmed = False
|
|
||||||
instance.save()
|
|
||||||
# Send verification link on user email for change email address
|
|
||||||
if settings.USE_CELERY:
|
|
||||||
tasks.confirm_new_email_address.delay(instance.id)
|
|
||||||
else:
|
|
||||||
tasks.confirm_new_email_address(instance.id)
|
|
||||||
return instance
|
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,7 @@
|
||||||
"""Serializers for account web"""
|
"""Serializers for account web"""
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.contrib.auth import password_validation as password_validators
|
from django.contrib.auth import password_validation as password_validators
|
||||||
|
from rest_framework_simplejwt import tokens
|
||||||
from django.db.models import Q
|
from django.db.models import Q
|
||||||
from rest_framework import serializers
|
from rest_framework import serializers
|
||||||
|
|
||||||
|
|
@ -121,3 +122,85 @@ class ChangePasswordSerializer(serializers.ModelSerializer):
|
||||||
instance.set_password(validated_data.get('password'))
|
instance.set_password(validated_data.get('password'))
|
||||||
instance.save()
|
instance.save()
|
||||||
return instance
|
return instance
|
||||||
|
|
||||||
|
|
||||||
|
class ChangeEmailSerializer(serializers.ModelSerializer):
|
||||||
|
"""Change user email serializer"""
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
"""Meta class"""
|
||||||
|
model = models.User
|
||||||
|
fields = (
|
||||||
|
'id',
|
||||||
|
'email',
|
||||||
|
)
|
||||||
|
read_only_fields = (
|
||||||
|
'id',
|
||||||
|
)
|
||||||
|
|
||||||
|
def validate_email(self, value):
|
||||||
|
"""Validate email value"""
|
||||||
|
if value == self.instance.email:
|
||||||
|
# todo: add custom exception
|
||||||
|
raise serializers.ValidationError()
|
||||||
|
return value
|
||||||
|
|
||||||
|
def validate(self, attrs):
|
||||||
|
"""Override validate method"""
|
||||||
|
email_confirmed = self.instance.email_confirmed
|
||||||
|
if not email_confirmed:
|
||||||
|
# todo: add custom exception
|
||||||
|
raise serializers.ValidationError()
|
||||||
|
return attrs
|
||||||
|
|
||||||
|
def update(self, instance, validated_data):
|
||||||
|
"""
|
||||||
|
Override update method
|
||||||
|
"""
|
||||||
|
instance.email = validated_data.get('email')
|
||||||
|
instance.email_confirmed = False
|
||||||
|
instance.save()
|
||||||
|
# Send verification link on user email for change email address
|
||||||
|
if settings.USE_CELERY:
|
||||||
|
tasks.confirm_new_email_address.delay(instance.id)
|
||||||
|
else:
|
||||||
|
tasks.confirm_new_email_address(instance.id)
|
||||||
|
instance.revoke_access_token()
|
||||||
|
return instance
|
||||||
|
|
||||||
|
|
||||||
|
class RefreshTokenSerializer(serializers.Serializer):
|
||||||
|
"""Serializer for refresh token view"""
|
||||||
|
refresh_token = serializers.CharField(read_only=True)
|
||||||
|
access_token = serializers.CharField(read_only=True)
|
||||||
|
|
||||||
|
def get_request(self):
|
||||||
|
"""Return request"""
|
||||||
|
return self.context.get('request')
|
||||||
|
|
||||||
|
def validate(self, attrs):
|
||||||
|
"""Override validate method"""
|
||||||
|
refresh_token = self.get_request().COOKIES.get('refresh_token')
|
||||||
|
if not refresh_token:
|
||||||
|
raise utils_exceptions.NotValidRefreshTokenError()
|
||||||
|
|
||||||
|
token = tokens.RefreshToken(token=refresh_token)
|
||||||
|
|
||||||
|
data = {'access_token': str(token.access_token)}
|
||||||
|
|
||||||
|
if settings.SIMPLE_JWT.get('ROTATE_REFRESH_TOKENS'):
|
||||||
|
if settings.SIMPLE_JWT.get('BLACKLIST_AFTER_ROTATION'):
|
||||||
|
try:
|
||||||
|
# Attempt to blacklist the given refresh token
|
||||||
|
token.blacklist()
|
||||||
|
except AttributeError:
|
||||||
|
# If blacklist app not installed, `blacklist` method will
|
||||||
|
# not be present
|
||||||
|
pass
|
||||||
|
|
||||||
|
token.set_jti()
|
||||||
|
token.set_exp()
|
||||||
|
|
||||||
|
data['refresh_token'] = str(token)
|
||||||
|
|
||||||
|
return data
|
||||||
|
|
|
||||||
|
|
@ -7,7 +7,4 @@ app_name = 'account'
|
||||||
|
|
||||||
urlpatterns = [
|
urlpatterns = [
|
||||||
path('user/', views.UserView.as_view(), name='user-get-update'),
|
path('user/', views.UserView.as_view(), name='user-get-update'),
|
||||||
path('refresh-token/', views.RefreshTokenView.as_view(), name='refresh-token'),
|
|
||||||
path('change-email/', views.ChangeEmailView.as_view(), name='change-email'),
|
|
||||||
path('change-email/confirm/<uidb64>/<token>/', views.ChangeEmailConfirmView.as_view(), name='change-email-confirm'),
|
|
||||||
]
|
]
|
||||||
|
|
|
||||||
|
|
@ -7,15 +7,16 @@ from account.views import web as views
|
||||||
app_name = 'account'
|
app_name = 'account'
|
||||||
|
|
||||||
urlpatterns_api = [
|
urlpatterns_api = [
|
||||||
path('change-password/', views.ChangePasswordView.as_view(),
|
path('change-password/', views.ChangePasswordView.as_view(), name='change-password'),
|
||||||
name='change-password'),
|
path('reset-password/', views.PasswordResetView.as_view(), name='password-reset'),
|
||||||
path('reset-password/', views.PasswordResetView.as_view(),
|
|
||||||
name='password-reset'),
|
|
||||||
path('form/reset-password/<uidb64>/<token>/', views.FormPasswordResetConfirmView.as_view(),
|
path('form/reset-password/<uidb64>/<token>/', views.FormPasswordResetConfirmView.as_view(),
|
||||||
name='form-password-reset-confirm'),
|
name='form-password-reset-confirm'),
|
||||||
# Redirect endpoint after success
|
|
||||||
path('form/reset-password/success/', views.FormPasswordResetSuccessView.as_view(),
|
path('form/reset-password/success/', views.FormPasswordResetSuccessView.as_view(),
|
||||||
name='form-password-reset-success'),
|
name='form-password-reset-success'),
|
||||||
|
path('refresh-token/', views.RefreshTokenView.as_view(), name='refresh-token'),
|
||||||
|
path('change-email/', views.ChangeEmailView.as_view(), name='change-email'),
|
||||||
|
path('change-email/confirm/<uidb64>/<token>/', views.ChangeEmailConfirmView.as_view(),
|
||||||
|
name='change-email-confirm'),
|
||||||
]
|
]
|
||||||
|
|
||||||
urlpatterns = urlpatterns_api + \
|
urlpatterns = urlpatterns_api + \
|
||||||
|
|
|
||||||
|
|
@ -3,14 +3,9 @@ from fcm_django.models import FCMDevice
|
||||||
from rest_framework import generics, status
|
from rest_framework import generics, status
|
||||||
from rest_framework import permissions
|
from rest_framework import permissions
|
||||||
from rest_framework.response import Response
|
from rest_framework.response import Response
|
||||||
from django.utils.encoding import force_text
|
|
||||||
from django.utils.http import urlsafe_base64_decode
|
|
||||||
from utils.models import GMTokenGenerator
|
|
||||||
from utils import exceptions as utils_exceptions
|
|
||||||
|
|
||||||
from account import models
|
from account import models
|
||||||
from account.serializers import common as serializers
|
from account.serializers import common as serializers
|
||||||
from utils.views import JWTGenericViewMixin
|
|
||||||
|
|
||||||
|
|
||||||
# User views
|
# User views
|
||||||
|
|
@ -58,61 +53,3 @@ class FCMDeviceViewSet(generics.GenericAPIView):
|
||||||
obj = queryset.filter(**filter).first()
|
obj = queryset.filter(**filter).first()
|
||||||
obj and self.check_object_permissions(self.request, obj)
|
obj and self.check_object_permissions(self.request, obj)
|
||||||
return obj
|
return obj
|
||||||
|
|
||||||
|
|
||||||
# Refresh access_token
|
|
||||||
class RefreshTokenView(JWTGenericViewMixin):
|
|
||||||
"""Refresh access_token"""
|
|
||||||
permission_classes = (permissions.IsAuthenticated,)
|
|
||||||
serializer_class = serializers.RefreshTokenSerializer
|
|
||||||
|
|
||||||
def post(self, request, *args, **kwargs):
|
|
||||||
serializer = self.get_serializer(data=request.data)
|
|
||||||
serializer.is_valid(raise_exception=True)
|
|
||||||
response = Response(serializer.data, status=status.HTTP_201_CREATED)
|
|
||||||
access_token = serializer.data.get('access_token')
|
|
||||||
refresh_token = serializer.data.get('refresh_token')
|
|
||||||
return self._put_cookies_in_response(
|
|
||||||
cookies=self._put_data_in_cookies(access_token=access_token,
|
|
||||||
refresh_token=refresh_token),
|
|
||||||
response=response)
|
|
||||||
|
|
||||||
|
|
||||||
# Change user email
|
|
||||||
class ChangeEmailView(JWTGenericViewMixin):
|
|
||||||
"""Change user email view"""
|
|
||||||
serializer_class = serializers.ChangeEmailSerializer
|
|
||||||
queryset = models.User.objects.all()
|
|
||||||
|
|
||||||
def patch(self, request, *args, **kwargs):
|
|
||||||
"""Implement POST-method"""
|
|
||||||
# Get user instance
|
|
||||||
instance = self.request.user
|
|
||||||
|
|
||||||
serializer = self.get_serializer(data=request.data, instance=instance)
|
|
||||||
serializer.is_valid(raise_exception=True)
|
|
||||||
serializer.save()
|
|
||||||
return Response(status=status.HTTP_200_OK)
|
|
||||||
|
|
||||||
|
|
||||||
class ChangeEmailConfirmView(JWTGenericViewMixin):
|
|
||||||
"""View for confirm changing email"""
|
|
||||||
|
|
||||||
permission_classes = (permissions.AllowAny, )
|
|
||||||
|
|
||||||
def get(self, request, *args, **kwargs):
|
|
||||||
"""Implement GET-method"""
|
|
||||||
uidb64 = kwargs.get('uidb64')
|
|
||||||
token = kwargs.get('token')
|
|
||||||
uid = force_text(urlsafe_base64_decode(uidb64))
|
|
||||||
user_qs = models.User.objects.filter(pk=uid)
|
|
||||||
if user_qs.exists():
|
|
||||||
user = user_qs.first()
|
|
||||||
if not GMTokenGenerator(GMTokenGenerator.CHANGE_EMAIL).check_token(
|
|
||||||
user, token):
|
|
||||||
raise utils_exceptions.NotValidTokenError()
|
|
||||||
# Approve email status
|
|
||||||
user.confirm_email()
|
|
||||||
return Response(status=status.HTTP_200_OK)
|
|
||||||
else:
|
|
||||||
raise utils_exceptions.UserNotFoundError()
|
|
||||||
|
|
|
||||||
|
|
@ -27,7 +27,6 @@ from utils.views import (JWTCreateAPIView,
|
||||||
JWTGenericViewMixin)
|
JWTGenericViewMixin)
|
||||||
|
|
||||||
|
|
||||||
# Password reset
|
|
||||||
class PasswordResetView(JWTCreateAPIView):
|
class PasswordResetView(JWTCreateAPIView):
|
||||||
"""View for resetting user password"""
|
"""View for resetting user password"""
|
||||||
permission_classes = (permissions.AllowAny, )
|
permission_classes = (permissions.AllowAny, )
|
||||||
|
|
@ -89,6 +88,62 @@ class ChangePasswordView(JWTUpdateAPIView):
|
||||||
return Response(status=status.HTTP_200_OK)
|
return Response(status=status.HTTP_200_OK)
|
||||||
|
|
||||||
|
|
||||||
|
class ChangeEmailView(JWTGenericViewMixin):
|
||||||
|
"""Change user email view"""
|
||||||
|
serializer_class = serializers.ChangeEmailSerializer
|
||||||
|
queryset = models.User.objects.all()
|
||||||
|
|
||||||
|
def patch(self, request, *args, **kwargs):
|
||||||
|
"""Implement POST-method"""
|
||||||
|
# Get user instance
|
||||||
|
instance = self.request.user
|
||||||
|
|
||||||
|
serializer = self.get_serializer(data=request.data, instance=instance)
|
||||||
|
serializer.is_valid(raise_exception=True)
|
||||||
|
serializer.save()
|
||||||
|
return Response(status=status.HTTP_200_OK)
|
||||||
|
|
||||||
|
|
||||||
|
class ChangeEmailConfirmView(JWTGenericViewMixin):
|
||||||
|
"""View for confirm changing email"""
|
||||||
|
|
||||||
|
permission_classes = (permissions.AllowAny,)
|
||||||
|
|
||||||
|
def get(self, request, *args, **kwargs):
|
||||||
|
"""Implement GET-method"""
|
||||||
|
uidb64 = kwargs.get('uidb64')
|
||||||
|
token = kwargs.get('token')
|
||||||
|
uid = force_text(urlsafe_base64_decode(uidb64))
|
||||||
|
user_qs = models.User.objects.filter(pk=uid)
|
||||||
|
if user_qs.exists():
|
||||||
|
user = user_qs.first()
|
||||||
|
if not GMTokenGenerator(GMTokenGenerator.CHANGE_EMAIL).check_token(
|
||||||
|
user, token):
|
||||||
|
raise utils_exceptions.NotValidTokenError()
|
||||||
|
# Approve email status
|
||||||
|
user.confirm_email()
|
||||||
|
return Response(status=status.HTTP_200_OK)
|
||||||
|
else:
|
||||||
|
raise utils_exceptions.UserNotFoundError()
|
||||||
|
|
||||||
|
|
||||||
|
class RefreshTokenView(JWTGenericViewMixin):
|
||||||
|
"""Refresh access_token"""
|
||||||
|
permission_classes = (permissions.IsAuthenticated,)
|
||||||
|
serializer_class = serializers.RefreshTokenSerializer
|
||||||
|
|
||||||
|
def post(self, request, *args, **kwargs):
|
||||||
|
serializer = self.get_serializer(data=request.data)
|
||||||
|
serializer.is_valid(raise_exception=True)
|
||||||
|
response = Response(serializer.data, status=status.HTTP_201_CREATED)
|
||||||
|
access_token = serializer.data.get('access_token')
|
||||||
|
refresh_token = serializer.data.get('refresh_token')
|
||||||
|
return self._put_cookies_in_response(
|
||||||
|
cookies=self._put_data_in_cookies(access_token=access_token,
|
||||||
|
refresh_token=refresh_token),
|
||||||
|
response=response)
|
||||||
|
|
||||||
|
|
||||||
# Form view
|
# Form view
|
||||||
class PasswordContextMixin:
|
class PasswordContextMixin:
|
||||||
extra_context = None
|
extra_context = None
|
||||||
|
|
|
||||||
|
|
@ -161,8 +161,8 @@ class LogoutSerializer(serializers.ModelSerializer):
|
||||||
'jti'
|
'jti'
|
||||||
)
|
)
|
||||||
|
|
||||||
def validate(self, attrs):
|
def create(self, validated_data):
|
||||||
"""Override validated data"""
|
"""Override create method"""
|
||||||
request = self.context.get('request')
|
request = self.context.get('request')
|
||||||
# Get token bytes from cookies (result: b'Bearer <token>')
|
# Get token bytes from cookies (result: b'Bearer <token>')
|
||||||
token_bytes = utils_methods.get_token_from_cookies(request)
|
token_bytes = utils_methods.get_token_from_cookies(request)
|
||||||
|
|
@ -171,10 +171,10 @@ class LogoutSerializer(serializers.ModelSerializer):
|
||||||
# Get access token obj
|
# Get access token obj
|
||||||
access_token = tokens.AccessToken(token)
|
access_token = tokens.AccessToken(token)
|
||||||
# Prepare validated data
|
# Prepare validated data
|
||||||
attrs['user'] = request.user
|
validated_data['user'] = request.user
|
||||||
attrs['token'] = access_token.token
|
validated_data['token'] = access_token.token
|
||||||
attrs['jti'] = access_token.payload.get('jti')
|
validated_data['jti'] = access_token.payload.get('jti')
|
||||||
return attrs
|
return super().create(validated_data)
|
||||||
|
|
||||||
|
|
||||||
# OAuth
|
# OAuth
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue
Block a user