aboutsummaryrefslogtreecommitdiff
path: root/gn_auth/auth/authorisation/users/views.py
diff options
context:
space:
mode:
authorFrederick Muriuki Muriithi2024-06-03 11:49:12 -0500
committerFrederick Muriuki Muriithi2024-06-03 11:56:16 -0500
commitc3b940f89523d54d2e2baf436122a30fc0aafdd9 (patch)
tree9698d10855d8b2faa3fb9f378eb47f8a8abc4fc5 /gn_auth/auth/authorisation/users/views.py
parent20b4be541b428d330033b5b9616ced3c154ca086 (diff)
downloadgn-auth-c3b940f89523d54d2e2baf436122a30fc0aafdd9.tar.gz
Handle unverified emails
If a user provides the correct credentials to login, but they are unverified, redirect them to the email verification page, where they are provided with a chance to verify their email, or send a new verification code.
Diffstat (limited to 'gn_auth/auth/authorisation/users/views.py')
-rw-r--r--gn_auth/auth/authorisation/users/views.py34
1 files changed, 34 insertions, 0 deletions
diff --git a/gn_auth/auth/authorisation/users/views.py b/gn_auth/auth/authorisation/users/views.py
index 638f0df..cb6775f 100644
--- a/gn_auth/auth/authorisation/users/views.py
+++ b/gn_auth/auth/authorisation/users/views.py
@@ -35,6 +35,7 @@ from gn_auth.auth.errors import (
UserVerificationError,
UserRegistrationError)
+from gn_auth.auth.authentication.users import valid_login, user_by_email
from gn_auth.auth.authentication.oauth2.resource_server import require_oauth
from gn_auth.auth.authentication.users import User, save_user, set_user_password
from gn_auth.auth.authentication.oauth2.models.oauth2token import (
@@ -275,3 +276,36 @@ def list_all_users() -> Response:
with require_oauth.acquire("profile group") as _the_token:
return jsonify(tuple(
asdict(user) for user in with_db_connection(list_users)))
+
+@users.route("/handle-unverified", methods=["POST"])
+def handle_unverified():
+ """Handle case where user tries to login but is unverified"""
+ form = request.form
+ # TODO: Maybe have a GN2_URI setting here?
+ # or pass the client_id here?
+ return render_template(
+ "users/unverified-user.html", email=form.get("user:email"))
+
+@users.route("/send-verification", methods=["POST"])
+def send_verification_code():
+ """Send verification code email."""
+ form = request.form
+ with (db.connection(current_app.config["AUTH_DB"]) as conn,
+ db.cursor(conn) as cursor):
+ user = user_by_email(conn, form["user_email"])
+ if valid_login(conn, user, form.get("user_password", "")):
+ cursor.execute(
+ "DELETE FROM user_verification_codes WHERE user_id=:user_id",
+ {"user_id": str(user.user_id)})
+ send_verification_email(conn, user)
+ return jsonify({
+ "status": "success",
+ "message": "Sent a verification code to your email."
+ })
+
+ resp = jsonify({
+ "error": "InvalidLogin",
+ "error-description": "Invalid email or password."
+ })
+ resp.code = 400
+ return resp