diff options
Diffstat (limited to 'gn_auth/auth')
-rw-r--r-- | gn_auth/auth/authentication/oauth2/views.py | 8 | ||||
-rw-r--r-- | gn_auth/auth/authorisation/users/views.py | 93 |
2 files changed, 72 insertions, 29 deletions
diff --git a/gn_auth/auth/authentication/oauth2/views.py b/gn_auth/auth/authentication/oauth2/views.py index cf815ea..cb49841 100644 --- a/gn_auth/auth/authentication/oauth2/views.py +++ b/gn_auth/auth/authentication/oauth2/views.py @@ -65,8 +65,12 @@ def authorise(): user = user_by_email(conn, email["email"]) if valid_login(conn, user, form.get("user:password", "")): if not user.verified: - return redirect(url_for( - "oauth2.users.handle_unverified"), code=307) + return redirect( + url_for("oauth2.users.handle_unverified", + response_type=form["response_type"], + client_id=client_id, + redirect_uri=form["redirect_uri"]), + code=307) return server.create_authorization_response(request=request, grant_user=user) flash(email_passwd_msg, "alert-danger") return redirect_response # type: ignore[return-value] diff --git a/gn_auth/auth/authorisation/users/views.py b/gn_auth/auth/authorisation/users/views.py index cb6775f..1d3b128 100644 --- a/gn_auth/auth/authorisation/users/views.py +++ b/gn_auth/auth/authorisation/users/views.py @@ -6,11 +6,15 @@ import traceback from typing import Any from functools import partial from dataclasses import asdict +from urllib.parse import urljoin from email.headerregistry import Address from email_validator import validate_email, EmailNotValidError from flask import ( + flash, request, jsonify, + url_for, + redirect, Response, Blueprint, current_app, @@ -32,9 +36,9 @@ from gn_auth.auth.errors import ( NotFoundError, UsernameError, PasswordError, - UserVerificationError, UserRegistrationError) + from gn_auth.auth.authentication.users import valid_login, user_by_email from gn_auth.auth.authentication.oauth2.resource_server import require_oauth from gn_auth.auth.authentication.users import User, save_user, set_user_password @@ -107,7 +111,13 @@ def user_address(user: User) -> Address: """Compute the `email.headerregistry.Address` from a `User`""" return Address(display_name=user.name, addr_spec=user.email) -def send_verification_email(conn, user: User) -> None: +def send_verification_email( + conn, + user: User, + client_id: str, + response_type: str, + redirect_uri: str +) -> None: """Send an email verification message.""" subject="GeneNetwork: Please Verify Your Email" verification_code = secrets.token_urlsafe(64) @@ -117,7 +127,13 @@ def send_verification_email(conn, user: User) -> None: return render_template(template, subject=subject, verification_code=verification_code, - verification_uri="https://please/change/this/", + verification_uri=urljoin( + request.url, + url_for("oauth2.users.verify_user", + response_type=response_type, + client_id=client_id, + redirect_uri=redirect_uri, + verificationcode=verification_code)), expiration_minutes=expiration_minutes) with db.cursor(conn) as cursor: cursor.execute( @@ -162,7 +178,11 @@ def register_user() -> Response: cursor, save_user( cursor, email["email"], user_name), password) assign_default_roles(cursor, user) - send_verification_email(conn, user) + send_verification_email(conn, + user, + client_id=form["client_id"], + response_type=form["response_type"], + redirect_uri=form["redirect_uri"]) return jsonify(asdict(user)) except sqlite3.IntegrityError as sq3ie: current_app.logger.debug(traceback.format_exc()) @@ -184,40 +204,48 @@ def delete_verification_code(cursor, code: str): @users.route("/verify", methods=["GET", "POST"]) def verify_user(): """Verify users are not bots.""" - code = request.args.get("verificationcode", - request.form.get("verificationcode", - "nosuchcode")) + form = request.form + loginuri = redirect(url_for( + "oauth2.auth.authorise", + response_type=(request.args.get("response_type") + or form["response_type"]), + client_id=(request.args.get("client_id") or form["client_id"]), + redirect_uri=(request.args.get("redirect_uri") + or form["redirect_uri"]))) + verificationcode = (request.args.get("verificationcode") + or form["verificationcode"]) with (db.connection(current_app.config["AUTH_DB"]) as conn, db.cursor(conn) as cursor): cursor.execute("SELECT * FROM user_verification_codes " "WHERE code=:code", - {"code": code}) + {"code": verificationcode}) results = tuple(dict(row) for row in cursor.fetchall()) if not bool(results): - raise UserVerificationError( - "Invalid verification code: code not found.") + flash("Invalid verification code: code not found.", + "alert-danger") + return loginuri if len(results) > 1: - delete_verification_code(cursor, code) - raise UserVerificationError( - "Invalid verification code: code is duplicated.") + delete_verification_code(cursor, verificationcode) + flash("Invalid verification code: code is duplicated.", + "alert-danger") + return loginuri results = results[0] if (datetime.datetime.fromtimestamp( int(results["expires"])) < datetime.datetime.now()): - delete_verification_code(cursor, code) - raise UserVerificationError( - "Invalid verification code: code has expired.") + delete_verification_code(cursor, verificationcode) + flash("Invalid verification code: code has expired.", + "alert-danger") # Code is good! - delete_verification_code(cursor, code) + delete_verification_code(cursor, verificationcode) cursor.execute("UPDATE users SET verified=1 WHERE user_id=:user_id", {"user_id": results["user_id"]}) - return jsonify({ - "status": "success", - "message": "User verification successful!" - }) + flash("E-mail verified successfully! Please login to continue.", + "alert-success") + return loginuri @users.route("/group", methods=["GET"]) @@ -284,7 +312,11 @@ def handle_unverified(): # TODO: Maybe have a GN2_URI setting here? # or pass the client_id here? return render_template( - "users/unverified-user.html", email=form.get("user:email")) + "users/unverified-user.html", + email=form.get("user:email"), + response_type=request.args["response_type"], + client_id=request.args["client_id"], + redirect_uri=request.args["redirect_uri"]) @users.route("/send-verification", methods=["POST"]) def send_verification_code(): @@ -297,11 +329,18 @@ def send_verification_code(): cursor.execute( "DELETE FROM user_verification_codes WHERE user_id=:user_id", {"user_id": str(user.user_id)}) - send_verification_email(conn, user) - return jsonify({ - "status": "success", - "message": "Sent a verification code to your email." - }) + send_verification_email(conn, + user, + client_id=form["client_id"], + response_type=form["response_type"], + redirect_uri=form["redirect_uri"]) + flash(("Sent a verification code to your email. " + "Please login to continue."), + "alert-success") + return redirect(url_for("oauth2.auth.authorise", + response_type=form["response_type"], + client_id=form["client_id"], + redirect_uri=form["redirect_uri"])) resp = jsonify({ "error": "InvalidLogin", |