-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathapi.py
More file actions
278 lines (214 loc) · 9.82 KB
/
api.py
File metadata and controls
278 lines (214 loc) · 9.82 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
import hashlib
from django.conf import settings
from django.core.cache import cache
from django.utils.decorators import method_decorator
from django.views.decorators.cache import cache_page
from django.contrib import auth
from django.contrib.auth import get_user_model
from django.db import IntegrityError
from django.db.models import Q
from django.shortcuts import get_object_or_404
from django.template.loader import render_to_string
from django.http import HttpResponse, HttpResponseRedirect
from django.utils.encoding import force_bytes
from django.utils.http import urlsafe_base64_encode
from django.urls import reverse_lazy
from django.views.generic import View
from rest_framework import status, viewsets
from rest_framework.exceptions import AuthenticationFailed, ValidationError
from rest_framework.permissions import AllowAny, IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
from rest_framework.viewsets import ModelViewSet
from oauth2_provider.models import AccessToken
from social_django.models import UserSocialAuth
from api import serializers
from api.exceptions import ServiceUnavailable, DryccException
from api.utils import get_local_host, get_user_socials, token_generator
User = get_user_model()
class NormalUserViewSet(viewsets.ModelViewSet):
permission_classes = [IsAuthenticated]
class ReadinessCheckView(View):
"""Simple readiness check view to determine DB connection / query."""
def get(self, request):
try:
import django.db
with django.db.connection.cursor() as c:
c.execute("SELECT 0")
except django.db.Error as e:
raise ServiceUnavailable("Database health check failed") from e
return HttpResponse("OK")
head = get
class LivenessCheckView(View):
"""Simple liveness check view to determine if the server is alive."""
def get(self, request):
return HttpResponse("OK")
head = get
class IdentityProviderView(APIView):
permission_classes = (AllowAny, )
def get(self, request, *args, **kwargs):
from api.apps_extra.social_core import backends
results = []
for backend_cls in backends.__all__:
key_setting = f'SOCIAL_AUTH_{backend_cls.name.upper()}_KEY'
secret_setting = f'SOCIAL_AUTH_{backend_cls.name.upper()}_SECRET'
if getattr(settings, key_setting, None) and getattr(settings, secret_setting, None):
results.append({
'name': backend_cls.name,
'icon': backend_cls.icon,
'login_url': reverse_lazy('social:begin', args=(backend_cls.name,)),
})
return Response({'count': len(results), 'results': results})
class UserIdentityView(APIView):
def get(self, request, *args, **kwargs):
results = get_user_socials(request.user)
return Response({'count': len(results), 'results': results})
def delete(self, request, identity_id, *args, **kwargs):
identity = get_object_or_404(UserSocialAuth, id=identity_id, user=request.user)
identity.delete()
return Response(status=status.HTTP_204_NO_CONTENT)
class OAuthPendingView(APIView):
permission_classes = (AllowAny, )
def get(self, request, *args, **kwargs):
pending = request.session.get('oauth_pending')
if not pending:
return Response(
{'detail': 'No pending OAuth request'}, status=status.HTTP_404_NOT_FOUND
)
from api.apps_extra.social_core import backends
backend_map = {backend_cls.name: backend_cls for backend_cls in backends.__all__}
backend_cls = backend_map.get(pending.get('provider'))
return Response({
'provider': pending.get('provider'),
'email': pending.get('email'),
'icon': backend_cls.icon if backend_cls else '',
'display_name': pending.get('provider', '').title(),
})
class OAuthCreateUserView(APIView):
permission_classes = (AllowAny, )
def _create_oauth_user(self, request, username, password):
pending = request.session.get('oauth_pending')
if not pending:
raise ValidationError('No pending OAuth request')
if not username:
raise ValidationError('username is a required field')
if not password:
raise ValidationError('password is a required field')
if len(password) < 8:
raise ValidationError('password must be 8 or more characters')
email = pending.get('email')
if not email:
raise ValidationError('email is missing from oauth provider')
if User.objects.filter(email=email).exists():
raise ValidationError('email is already registered')
provider = pending.get('provider')
uid = pending.get('uid')
extra_data = pending.get('extra_data') or {}
if not provider or not uid:
request.session.pop('oauth_pending', None)
raise ValidationError('invalid oauth pending data')
existing = UserSocialAuth.objects.filter(provider=provider, uid=uid).first()
if existing:
request.session.pop('oauth_pending', None)
raise ValidationError('identity is already linked to another account')
try:
user = User.objects.create_user(username=username, email=email, password=password)
except IntegrityError:
raise ValidationError('username is already taken')
UserSocialAuth.objects.create(
user=user,
provider=provider,
uid=uid,
extra_data=extra_data,
)
auth.login(request, user, backend='django.contrib.auth.backends.ModelBackend')
request.session.pop('oauth_pending', None)
return user
def post(self, request, *args, **kwargs):
username = request.data.get('username')
password = request.data.get('password')
self._create_oauth_user(request, username, password)
return Response({'status': 'created'}, status=status.HTTP_201_CREATED)
class UserDetailView(NormalUserViewSet):
serializer_class = serializers.UserSerializer
required_scopes = ['openid']
email_template_name = 'user/account_update_email.html'
def get_object(self):
return self.request.user
def update(self, request, *args, **kwargs):
user_serializer = self.serializer_class(
data=request.data,
instance=request.user,
partial=True,
)
if user_serializer.is_valid():
if settings.EMAIL_HOST:
user = self.get_object()
mail_subject = 'Update your account.'
uid = urlsafe_base64_encode(force_bytes(user.pk))
token = token_generator.make_token(user)
message = render_to_string(
self.email_template_name,
{
'uid': uid,
'user': user,
'token': token,
'domain': get_local_host(request),
},
)
cache_key = "user:serializer:%s" % user.pk
cache.set(cache_key, request.data, 60 * 30)
user.email_user(mail_subject, message, fail_silently=True)
else:
user_serializer.save()
return Response(status=status.HTTP_204_NO_CONTENT)
class UserAvatarViewSet(NormalUserViewSet):
@method_decorator(cache_page(60 * 5))
def avatar(self, request, *args, **kwargs):
user = User.objects.filter(username=kwargs["username"]).first()
size = request.GET.get("s", "80")
md5 = hashlib.md5()
if user:
md5.update(user.email.encode("utf8"))
return HttpResponseRedirect(settings.AVATAR_URL + md5.hexdigest() + "?s=" + size)
class UserEmailView(NormalUserViewSet):
serializer_class = serializers.UserEmailSerializer
required_scopes = ['openid']
def get_object(self):
return self.request.user
class ListViewSet(ModelViewSet):
def get_queryset(self, *args, **kwargs):
serializer = self.serializer_class(data=self.request.query_params)
serializer.is_valid(raise_exception=True)
serializerlist = serializers.ListSerializer(data=self.request.query_params)
serializerlist.is_valid(raise_exception=True)
q = Q(user=self.request.user)
if serializerlist.validated_data.get('section'):
q &= Q(created__range=serializerlist.validated_data.get('section'))
return self.model.objects.filter(
q, **serializer.validated_data
).order_by(self.order_by)[0:100]
class UserTokensView(ListViewSet):
model = AccessToken
serializer_class = serializers.UserTokensSerializer
order_by = '-created'
def destroy(self, request, *args, **kwargs):
token = get_object_or_404(self.model, id=self.kwargs['pk'], user=request.user)
token.delete()
return Response(status=status.HTTP_204_NO_CONTENT)
class UserAccountPasswordView(ListViewSet):
def update(self, request, *args, **kwargs):
if settings.LDAP_ENDPOINT:
raise DryccException("You cannot change user info when ldap is enabled.")
if not request.data.get('new_password'):
raise DryccException("new_password is a required field")
if not request.data.get('password'):
raise DryccException("password is a required field")
if len(request.data.get('new_password')) < 8:
raise DryccException("password must be 8 or more characters. ")
if not request.user.check_password(request.data['password']):
raise AuthenticationFailed('Current password does not match')
request.user.set_password(request.data['new_password'])
request.user.save()
auth.logout(request)
return HttpResponse(status=204)