* fix(chalice): fixed Math-operators validation refactor(chalice): search for sessions that have events for heatmaps * refactor(chalice): search for sessions that have at least 1 location event for heatmaps * fix(chalice): fixed Math-operators validation refactor(chalice): search for sessions that have events for heatmaps * refactor(chalice): search for sessions that have at least 1 location event for heatmaps * feat(chalice): autocomplete return top 10 with stats * fix(chalice): fixed autocomplete top 10 meta-filters * refactor(chalice): always generate spot-jwt refactor(chalice): generate spot-jwt on password change refactor(chalice): generate spot-jwt on accept invitation
749 lines
32 KiB
Python
749 lines
32 KiB
Python
import json
|
|
import secrets
|
|
|
|
from decouple import config
|
|
from fastapi import BackgroundTasks
|
|
from pydantic import BaseModel
|
|
|
|
import schemas
|
|
from chalicelib.core import authorizers, metadata
|
|
from chalicelib.core import tenants, spot, scope
|
|
from chalicelib.utils import email_helper
|
|
from chalicelib.utils import helper
|
|
from chalicelib.utils import pg_client
|
|
from chalicelib.utils.TimeUTC import TimeUTC
|
|
|
|
AUDIENCE = "front:OpenReplay"
|
|
|
|
|
|
def __generate_invitation_token():
|
|
return secrets.token_urlsafe(64)
|
|
|
|
|
|
def create_new_member(email, invitation_token, admin, name, owner=False):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""\
|
|
WITH u AS (INSERT INTO public.users (email, role, name, data)
|
|
VALUES (%(email)s, %(role)s, %(name)s, %(data)s)
|
|
RETURNING user_id,email,role,name,created_at
|
|
),
|
|
au AS (INSERT INTO public.basic_authentication (user_id, invitation_token, invited_at)
|
|
VALUES ((SELECT user_id FROM u), %(invitation_token)s, timezone('utc'::text, now()))
|
|
RETURNING invitation_token
|
|
)
|
|
SELECT u.user_id,
|
|
u.email,
|
|
u.role,
|
|
u.name,
|
|
u.created_at,
|
|
(CASE WHEN u.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN u.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN u.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
au.invitation_token
|
|
FROM u,au;""",
|
|
{"email": email, "role": "owner" if owner else "admin" if admin else "member", "name": name,
|
|
"data": json.dumps({"lastAnnouncementView": TimeUTC.now()}),
|
|
"invitation_token": invitation_token})
|
|
cur.execute(query)
|
|
row = helper.dict_to_camel_case(cur.fetchone())
|
|
if row:
|
|
row["createdAt"] = TimeUTC.datetime_to_timestamp(row["createdAt"])
|
|
return row
|
|
|
|
|
|
def restore_member(user_id, email, invitation_token, admin, name, owner=False):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""\
|
|
WITH ua AS (UPDATE public.basic_authentication
|
|
SET invitation_token = %(invitation_token)s,
|
|
invited_at = timezone('utc'::text, now()),
|
|
change_pwd_expire_at = NULL,
|
|
change_pwd_token = NULL
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING invitation_token)
|
|
UPDATE public.users
|
|
SET name= %(name)s,
|
|
role = %(role)s,
|
|
deleted_at= NULL,
|
|
created_at = timezone('utc'::text, now()),
|
|
api_key= generate_api_key(20)
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING
|
|
user_id,
|
|
email,
|
|
role,
|
|
name,
|
|
(CASE WHEN role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
created_at,
|
|
(SELECT invitation_token FROM ua) AS invitation_token;""",
|
|
{"user_id": user_id, "email": email,
|
|
"role": "owner" if owner else "admin" if admin else "member",
|
|
"name": name, "invitation_token": invitation_token})
|
|
cur.execute(query)
|
|
result = cur.fetchone()
|
|
cur.execute(query)
|
|
result["created_at"] = TimeUTC.datetime_to_timestamp(result["created_at"])
|
|
return helper.dict_to_camel_case(result)
|
|
|
|
|
|
def generate_new_invitation(user_id):
|
|
invitation_token = __generate_invitation_token()
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""\
|
|
UPDATE public.basic_authentication
|
|
SET invitation_token = %(invitation_token)s,
|
|
invited_at = timezone('utc'::text, now()),
|
|
change_pwd_expire_at = NULL,
|
|
change_pwd_token = NULL
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING invitation_token;""",
|
|
{"user_id": user_id, "invitation_token": invitation_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
return __get_invitation_link(cur.fetchone().pop("invitation_token"))
|
|
|
|
|
|
def reset_member(tenant_id, editor_id, user_id_to_update):
|
|
admin = get(tenant_id=tenant_id, user_id=editor_id)
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
user = get(tenant_id=tenant_id, user_id=user_id_to_update)
|
|
if not user:
|
|
return {"errors": ["user not found"]}
|
|
return {"data": {"invitationLink": generate_new_invitation(user_id_to_update)}}
|
|
|
|
|
|
def update(tenant_id, user_id, changes, output=True):
|
|
AUTH_KEYS = ["password", "invitationToken", "invitedAt", "changePwdExpireAt", "changePwdToken"]
|
|
if len(changes.keys()) == 0:
|
|
return None
|
|
|
|
sub_query_users = []
|
|
sub_query_bauth = []
|
|
for key in changes.keys():
|
|
if key in AUTH_KEYS:
|
|
if key == "password":
|
|
sub_query_bauth.append("password = crypt(%(password)s, gen_salt('bf', 12))")
|
|
sub_query_bauth.append("changed_at = timezone('utc'::text, now())")
|
|
else:
|
|
sub_query_bauth.append(f"{helper.key_to_snake_case(key)} = %({key})s")
|
|
else:
|
|
sub_query_users.append(f"{helper.key_to_snake_case(key)} = %({key})s")
|
|
|
|
with pg_client.PostgresClient() as cur:
|
|
if len(sub_query_users) > 0:
|
|
query = cur.mogrify(f"""\
|
|
UPDATE public.users
|
|
SET {" ,".join(sub_query_users)}
|
|
WHERE users.user_id = %(user_id)s;""",
|
|
{"user_id": user_id, **changes})
|
|
cur.execute(query)
|
|
if len(sub_query_bauth) > 0:
|
|
query = cur.mogrify(f"""\
|
|
UPDATE public.basic_authentication
|
|
SET {" ,".join(sub_query_bauth)}
|
|
WHERE basic_authentication.user_id = %(user_id)s;""",
|
|
{"user_id": user_id, **changes})
|
|
cur.execute(query)
|
|
if not output:
|
|
return None
|
|
return get(user_id=user_id, tenant_id=tenant_id)
|
|
|
|
|
|
def create_member(tenant_id, user_id, data: schemas.CreateMemberSchema, background_tasks: BackgroundTasks):
|
|
admin = get(tenant_id=tenant_id, user_id=user_id)
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
if data.user_id is not None:
|
|
return {"errors": ["please use POST/PUT /client/members/{memberId} for update"]}
|
|
user = get_by_email_only(email=data.email)
|
|
if user:
|
|
return {"errors": ["user already exists"]}
|
|
|
|
if data.name is None or len(data.name) == 0:
|
|
data.name = data.email
|
|
invitation_token = __generate_invitation_token()
|
|
user = get_deleted_user_by_email(email=data.email)
|
|
if user is not None:
|
|
new_member = restore_member(email=data.email, invitation_token=invitation_token,
|
|
admin=data.admin, name=data.name, user_id=user["userId"])
|
|
else:
|
|
new_member = create_new_member(email=data.email, invitation_token=invitation_token,
|
|
admin=data.admin, name=data.name)
|
|
new_member["invitationLink"] = __get_invitation_link(new_member.pop("invitationToken"))
|
|
background_tasks.add_task(email_helper.send_team_invitation, **{
|
|
"recipient": data.email,
|
|
"invitation_link": new_member["invitationLink"],
|
|
"client_id": tenants.get_by_tenant_id(tenant_id)["name"],
|
|
"sender_name": admin["name"]
|
|
})
|
|
return {"data": new_member}
|
|
|
|
|
|
def __get_invitation_link(invitation_token):
|
|
return config("SITE_URL") + config("invitation_link") % invitation_token
|
|
|
|
|
|
def allow_password_change(user_id, delta_min=10):
|
|
pass_token = secrets.token_urlsafe(8)
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""UPDATE public.basic_authentication
|
|
SET change_pwd_expire_at = timezone('utc'::text, now()+INTERVAL '%(delta)s MINUTES'),
|
|
change_pwd_token = %(pass_token)s
|
|
WHERE user_id = %(user_id)s""",
|
|
{"user_id": user_id, "delta": delta_min, "pass_token": pass_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
return pass_token
|
|
|
|
|
|
def get(user_id, tenant_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
email,
|
|
role,
|
|
users.name,
|
|
(CASE WHEN role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
TRUE AS has_password,
|
|
settings
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE
|
|
users.user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def generate_new_api_key(user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""UPDATE public.users
|
|
SET api_key=generate_api_key(20)
|
|
WHERE users.user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
RETURNING api_key;""",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def __get_account_info(tenant_id, user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT users.name,
|
|
tenants.name AS tenant_name,
|
|
tenants.opt_out
|
|
FROM public.users INNER JOIN public.tenants ON(TRUE)
|
|
WHERE users.user_id = %(userId)s
|
|
AND users.deleted_at IS NULL;""",
|
|
{"tenantId": tenant_id, "userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def edit_account(user_id, tenant_id, changes: schemas.EditAccountSchema):
|
|
if changes.opt_out is not None or changes.tenantName is not None and len(changes.tenantName) > 0:
|
|
user = get(user_id=user_id, tenant_id=tenant_id)
|
|
if not user["superAdmin"] and not user["admin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
|
|
if changes.name is not None and len(changes.name) > 0:
|
|
update(tenant_id=tenant_id, user_id=user_id, changes={"name": changes.name})
|
|
|
|
_tenant_changes = {}
|
|
if changes.tenantName is not None and len(changes.tenantName) > 0:
|
|
_tenant_changes["name"] = changes.tenantName
|
|
|
|
if changes.opt_out is not None:
|
|
_tenant_changes["opt_out"] = changes.opt_out
|
|
if len(_tenant_changes.keys()) > 0:
|
|
tenants.edit_tenant(tenant_id=tenant_id, changes=_tenant_changes)
|
|
|
|
return {"data": __get_account_info(tenant_id=tenant_id, user_id=user_id)}
|
|
|
|
|
|
def edit_member(user_id_to_update, tenant_id, changes: schemas.EditMemberSchema, editor_id):
|
|
user = get_member(user_id=user_id_to_update, tenant_id=tenant_id)
|
|
_changes = {}
|
|
if editor_id != user_id_to_update:
|
|
admin = get_user_role(tenant_id=tenant_id, user_id=editor_id)
|
|
if not admin["superAdmin"] and not admin["admin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
if admin["admin"] and user["superAdmin"]:
|
|
return {"errors": ["only the owner can edit his own details"]}
|
|
else:
|
|
if user["superAdmin"]:
|
|
changes.admin = None
|
|
elif changes.admin != user["admin"]:
|
|
return {"errors": ["cannot change your own admin privileges"]}
|
|
|
|
if changes.name and len(changes.name) > 0:
|
|
_changes["name"] = changes.name
|
|
|
|
if changes.admin is not None:
|
|
_changes["role"] = "admin" if changes.admin else "member"
|
|
|
|
if len(_changes.keys()) > 0:
|
|
update(tenant_id=tenant_id, user_id=user_id_to_update, changes=_changes, output=False)
|
|
return {"data": get_member(user_id=user_id_to_update, tenant_id=tenant_id)}
|
|
return {"data": user}
|
|
|
|
|
|
def get_by_email_only(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
1 AS tenant_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
TRUE AS has_password
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE users.email = %(email)s
|
|
AND users.deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def get_member(tenant_id, user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
users.created_at,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
DATE_PART('day',timezone('utc'::text, now()) \
|
|
- COALESCE(basic_authentication.invited_at,'2000-01-01'::timestamp ))>=1 AS expired_invitation,
|
|
basic_authentication.password IS NOT NULL AS joined,
|
|
invitation_token
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE users.deleted_at IS NULL AND users.user_id=%(user_id)s
|
|
ORDER BY name, user_id""",
|
|
{"user_id": user_id})
|
|
)
|
|
u = helper.dict_to_camel_case(cur.fetchone())
|
|
if u:
|
|
u["createdAt"] = TimeUTC.datetime_to_timestamp(u["createdAt"])
|
|
if u["invitationToken"]:
|
|
u["invitationLink"] = __get_invitation_link(u.pop("invitationToken"))
|
|
else:
|
|
u["invitationLink"] = None
|
|
|
|
return u
|
|
|
|
|
|
def get_members(tenant_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
f"""SELECT
|
|
users.user_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
users.created_at,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
DATE_PART('day',timezone('utc'::text, now()) \
|
|
- COALESCE(basic_authentication.invited_at,'2000-01-01'::timestamp ))>=1 AS expired_invitation,
|
|
basic_authentication.password IS NOT NULL AS joined,
|
|
invitation_token
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE users.deleted_at IS NULL
|
|
ORDER BY name, user_id"""
|
|
)
|
|
r = cur.fetchall()
|
|
if len(r):
|
|
r = helper.list_to_camel_case(r)
|
|
for u in r:
|
|
u["createdAt"] = TimeUTC.datetime_to_timestamp(u["createdAt"])
|
|
if u["invitationToken"]:
|
|
u["invitationLink"] = __get_invitation_link(u.pop("invitationToken"))
|
|
else:
|
|
u["invitationLink"] = None
|
|
return r
|
|
|
|
return []
|
|
|
|
|
|
def delete_member(user_id, tenant_id, id_to_delete):
|
|
if user_id == id_to_delete:
|
|
return {"errors": ["unauthorized, cannot delete self"]}
|
|
|
|
admin = get(user_id=user_id, tenant_id=tenant_id)
|
|
if admin["member"]:
|
|
return {"errors": ["unauthorized"]}
|
|
|
|
to_delete = get(user_id=id_to_delete, tenant_id=tenant_id)
|
|
if to_delete is None:
|
|
return {"errors": ["not found"]}
|
|
|
|
if to_delete["superAdmin"]:
|
|
return {"errors": ["cannot delete super admin"]}
|
|
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(f"""UPDATE public.users
|
|
SET deleted_at = timezone('utc'::text, now()),
|
|
jwt_iat= NULL, jwt_refresh_jti= NULL,
|
|
jwt_refresh_iat= NULL
|
|
WHERE user_id=%(user_id)s;""",
|
|
{"user_id": id_to_delete}))
|
|
cur.execute(
|
|
cur.mogrify(f"""UPDATE public.basic_authentication
|
|
SET password= NULL, invitation_token= NULL,
|
|
invited_at= NULL, changed_at= NULL,
|
|
change_pwd_expire_at= NULL, change_pwd_token= NULL
|
|
WHERE user_id=%(user_id)s;""",
|
|
{"user_id": id_to_delete}))
|
|
return {"data": get_members(tenant_id=tenant_id)}
|
|
|
|
|
|
def change_password(tenant_id, user_id, email, old_password, new_password):
|
|
item = get(tenant_id=tenant_id, user_id=user_id)
|
|
if item is None:
|
|
return {"errors": ["access denied"]}
|
|
if old_password == new_password:
|
|
return {"errors": ["old and new password are the same"]}
|
|
auth = authenticate(email, old_password, for_change_password=True)
|
|
if auth is None:
|
|
return {"errors": ["wrong password"]}
|
|
changes = {"password": new_password}
|
|
user = update(tenant_id=tenant_id, user_id=user_id, changes=changes)
|
|
r = authenticate(user['email'], new_password)
|
|
|
|
return {
|
|
'jwt': r.pop('jwt')
|
|
}
|
|
|
|
|
|
def set_password_invitation(user_id, new_password):
|
|
changes = {"password": new_password}
|
|
user = update(tenant_id=-1, user_id=user_id, changes=changes)
|
|
r = authenticate(user['email'], new_password)
|
|
|
|
tenant_id = r.pop("tenantId")
|
|
r["limits"] = {
|
|
"teamMember": -1,
|
|
"projects": -1,
|
|
"metadata": metadata.get_remaining_metadata_with_count(tenant_id)}
|
|
|
|
return {
|
|
"jwt": r.pop("jwt"),
|
|
"refreshToken": r.pop("refreshToken"),
|
|
"refreshTokenMaxAge": r.pop("refreshTokenMaxAge"),
|
|
"spotJwt": r.pop("spotJwt"),
|
|
"spotRefreshToken": r.pop("spotRefreshToken"),
|
|
"spotRefreshTokenMaxAge": r.pop("spotRefreshTokenMaxAge"),
|
|
'data': {
|
|
"scopeState": scope.get_scope(-1),
|
|
"user": r
|
|
}
|
|
}
|
|
|
|
|
|
def email_exists(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
count(user_id)
|
|
FROM public.users
|
|
WHERE
|
|
email = %(email)s
|
|
AND deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchone()
|
|
return r["count"] > 0
|
|
|
|
|
|
def get_deleted_user_by_email(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
*
|
|
FROM public.users
|
|
WHERE
|
|
email = %(email)s
|
|
AND deleted_at NOTNULL
|
|
LIMIT 1;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def get_by_invitation_token(token, pass_token=None):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
*,
|
|
DATE_PART('day',timezone('utc'::text, now()) \
|
|
- COALESCE(basic_authentication.invited_at,'2000-01-01'::timestamp ))>=1 AS expired_invitation,
|
|
change_pwd_expire_at <= timezone('utc'::text, now()) AS expired_change,
|
|
(EXTRACT(EPOCH FROM current_timestamp-basic_authentication.change_pwd_expire_at))::BIGINT AS change_pwd_age
|
|
FROM public.users INNER JOIN public.basic_authentication USING(user_id)
|
|
WHERE invitation_token = %(token)s {"AND change_pwd_token = %(pass_token)s" if pass_token else ""}
|
|
LIMIT 1;""",
|
|
{"token": token, "pass_token": pass_token})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def auth_exists(user_id, jwt_iat) -> bool:
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(f"""SELECT user_id, EXTRACT(epoch FROM jwt_iat)::BIGINT AS jwt_iat
|
|
FROM public.users
|
|
WHERE user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return r is not None \
|
|
and r.get("jwt_iat") is not None \
|
|
and abs(jwt_iat - r["jwt_iat"]) <= 1
|
|
|
|
|
|
def refresh_auth_exists(user_id, jwt_jti=None):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(f"""SELECT user_id
|
|
FROM public.users
|
|
WHERE user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
AND jwt_refresh_jti = %(jwt_jti)s
|
|
LIMIT 1;""",
|
|
{"userId": user_id, "jwt_jti": jwt_jti})
|
|
)
|
|
r = cur.fetchone()
|
|
return r is not None
|
|
|
|
|
|
class ChangeJwt(BaseModel):
|
|
jwt_iat: int
|
|
jwt_refresh_jti: int
|
|
jwt_refresh_iat: int
|
|
spot_jwt_iat: int
|
|
spot_jwt_refresh_jti: int
|
|
spot_jwt_refresh_iat: int
|
|
|
|
|
|
def change_jwt_iat_jti(user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""UPDATE public.users
|
|
SET jwt_iat = timezone('utc'::text, now()-INTERVAL '10s'),
|
|
jwt_refresh_jti = 0,
|
|
jwt_refresh_iat = timezone('utc'::text, now()-INTERVAL '10s'),
|
|
spot_jwt_iat = timezone('utc'::text, now()-INTERVAL '10s'),
|
|
spot_jwt_refresh_jti = 0,
|
|
spot_jwt_refresh_iat = timezone('utc'::text, now()-INTERVAL '10s')
|
|
WHERE user_id = %(user_id)s
|
|
RETURNING EXTRACT (epoch FROM jwt_iat)::BIGINT AS jwt_iat,
|
|
jwt_refresh_jti,
|
|
EXTRACT (epoch FROM jwt_refresh_iat)::BIGINT AS jwt_refresh_iat,
|
|
EXTRACT (epoch FROM spot_jwt_iat)::BIGINT AS spot_jwt_iat,
|
|
spot_jwt_refresh_jti,
|
|
EXTRACT (epoch FROM spot_jwt_refresh_iat)::BIGINT AS spot_jwt_refresh_iat;""",
|
|
{"user_id": user_id})
|
|
cur.execute(query)
|
|
row = cur.fetchone()
|
|
return ChangeJwt(**row)
|
|
|
|
|
|
def refresh_jwt_iat_jti(user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""UPDATE public.users
|
|
SET jwt_iat = timezone('utc'::text, now()-INTERVAL '10s'),
|
|
jwt_refresh_jti = jwt_refresh_jti + 1
|
|
WHERE user_id = %(user_id)s
|
|
RETURNING EXTRACT (epoch FROM jwt_iat)::BIGINT AS jwt_iat,
|
|
jwt_refresh_jti,
|
|
EXTRACT (epoch FROM jwt_refresh_iat)::BIGINT AS jwt_refresh_iat;""",
|
|
{"user_id": user_id})
|
|
cur.execute(query)
|
|
row = cur.fetchone()
|
|
return row.get("jwt_iat"), row.get("jwt_refresh_jti"), row.get("jwt_refresh_iat")
|
|
|
|
|
|
def authenticate(email, password, for_change_password=False) -> dict | bool | None:
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
1 AS tenant_id,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member
|
|
FROM public.users INNER JOIN public.basic_authentication USING(user_id)
|
|
WHERE users.email = %(email)s
|
|
AND basic_authentication.password = crypt(%(password)s, basic_authentication.password)
|
|
AND basic_authentication.user_id = (SELECT su.user_id FROM public.users AS su WHERE su.email=%(email)s AND su.deleted_at IS NULL LIMIT 1)
|
|
LIMIT 1;""",
|
|
{"email": email, "password": password})
|
|
|
|
cur.execute(query)
|
|
r = cur.fetchone()
|
|
|
|
if r is not None:
|
|
if for_change_password:
|
|
return True
|
|
r = helper.dict_to_camel_case(r)
|
|
j_r = change_jwt_iat_jti(user_id=r['userId'])
|
|
response = {
|
|
"jwt": authorizers.generate_jwt(user_id=r['userId'], tenant_id=r['tenantId'], iat=j_r.jwt_iat,
|
|
aud=AUDIENCE),
|
|
"refreshToken": authorizers.generate_jwt_refresh(user_id=r['userId'], tenant_id=r['tenantId'],
|
|
iat=j_r.jwt_refresh_iat, aud=AUDIENCE,
|
|
jwt_jti=j_r.jwt_refresh_jti),
|
|
"refreshTokenMaxAge": config("JWT_REFRESH_EXPIRATION", cast=int),
|
|
"email": email,
|
|
"spotJwt": authorizers.generate_jwt(user_id=r['userId'], tenant_id=r['tenantId'],
|
|
iat=j_r.spot_jwt_iat, aud=spot.AUDIENCE, for_spot=True),
|
|
"spotRefreshToken": authorizers.generate_jwt_refresh(user_id=r['userId'],
|
|
tenant_id=r['tenantId'],
|
|
iat=j_r.spot_jwt_refresh_iat,
|
|
aud=spot.AUDIENCE,
|
|
jwt_jti=j_r.spot_jwt_refresh_jti,
|
|
for_spot=True),
|
|
"spotRefreshTokenMaxAge": config("JWT_SPOT_REFRESH_EXPIRATION", cast=int),
|
|
**r
|
|
}
|
|
return response
|
|
|
|
return None
|
|
|
|
|
|
def logout(user_id: int):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(
|
|
"""UPDATE public.users
|
|
SET jwt_iat = NULL, jwt_refresh_jti = NULL, jwt_refresh_iat = NULL,
|
|
spot_jwt_iat = NULL, spot_jwt_refresh_jti = NULL, spot_jwt_refresh_iat = NULL
|
|
WHERE user_id = %(user_id)s;""",
|
|
{"user_id": user_id})
|
|
cur.execute(query)
|
|
|
|
|
|
def refresh(user_id: int, tenant_id: int = -1) -> dict:
|
|
jwt_iat, jwt_r_jti, jwt_r_iat = refresh_jwt_iat_jti(user_id=user_id)
|
|
return {
|
|
"jwt": authorizers.generate_jwt(user_id=user_id, tenant_id=tenant_id, iat=jwt_iat,
|
|
aud=AUDIENCE),
|
|
"refreshToken": authorizers.generate_jwt_refresh(user_id=user_id, tenant_id=tenant_id, iat=jwt_r_iat,
|
|
aud=AUDIENCE, jwt_jti=jwt_r_jti),
|
|
"refreshTokenMaxAge": config("JWT_REFRESH_EXPIRATION", cast=int) - (jwt_iat - jwt_r_iat)
|
|
}
|
|
|
|
|
|
def get_user_role(tenant_id, user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
users.created_at,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member
|
|
FROM public.users
|
|
WHERE users.deleted_at IS NULL
|
|
AND users.user_id=%(user_id)s
|
|
LIMIT 1""",
|
|
{"user_id": user_id})
|
|
)
|
|
return helper.dict_to_camel_case(cur.fetchone())
|
|
|
|
|
|
def get_user_settings(user_id):
|
|
# read user settings from users.settings:jsonb column
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
settings
|
|
FROM public.users
|
|
WHERE users.deleted_at IS NULL
|
|
AND users.user_id=%(user_id)s
|
|
LIMIT 1""",
|
|
{"user_id": user_id})
|
|
)
|
|
return helper.dict_to_camel_case(cur.fetchone())
|
|
|
|
|
|
def update_user_module(user_id, data: schemas.ModuleStatus):
|
|
# example data = {"settings": {"modules": ['ASSIST', 'METADATA']}
|
|
# update user settings from users.settings:jsonb column only update settings.modules
|
|
# if module property is not exists, it will be created
|
|
# if module property exists, it will be updated, modify here and call update_user_settings
|
|
# module is a single element to be added or removed
|
|
settings = get_user_settings(user_id)["settings"]
|
|
if settings is None:
|
|
settings = {}
|
|
|
|
if settings.get("modules") is None:
|
|
settings["modules"] = []
|
|
|
|
if data.status and data.module not in settings["modules"]:
|
|
settings["modules"].append(data.module)
|
|
|
|
elif not data.status and data.module in settings["modules"]:
|
|
settings["modules"].remove(data.module)
|
|
|
|
return update_user_settings(user_id, settings)
|
|
|
|
|
|
def update_user_settings(user_id, settings):
|
|
# update user settings from users.settings:jsonb column
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""UPDATE public.users
|
|
SET settings = %(settings)s
|
|
WHERE users.user_id = %(user_id)s
|
|
AND deleted_at IS NULL
|
|
RETURNING settings;""",
|
|
{"user_id": user_id, "settings": json.dumps(settings)})
|
|
)
|
|
return helper.dict_to_camel_case(cur.fetchone())
|