##// END OF EJS Templates
db: use unicode for some of the defaults to reduce sqlalchemy warnings.
db: use unicode for some of the defaults to reduce sqlalchemy warnings.

File last commit:

r1839:b52a5a91 default
r1967:df3f2899 default
Show More
auth_token.py
102 lines | 3.5 KiB | text/x-python | PythonLexer
project: added all source files and assets
r1 # -*- coding: utf-8 -*-
license: updated copyright year to 2017
r1271 # Copyright (C) 2013-2017 RhodeCode GmbH
project: added all source files and assets
r1 #
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License, version 3
# (only), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# This program is dual-licensed. If you wish to learn more about the
# RhodeCode Enterprise Edition, including its added features, Support services,
# and proprietary license terms, please see https://rhodecode.com/licenses/
"""
authentication tokens model for RhodeCode
"""
import time
import logging
import traceback
from sqlalchemy import or_
from rhodecode.model import BaseModel
from rhodecode.model.db import UserApiKeys
from rhodecode.model.meta import Session
log = logging.getLogger(__name__)
class AuthTokenModel(BaseModel):
cls = UserApiKeys
def create(self, user, description, lifetime=-1, role=UserApiKeys.ROLE_ALL):
"""
:param user: user or user_id
:param description: description of ApiKey
password-reset: strengthten security on password reset logic....
r1471 :param lifetime: expiration time in minutes
project: added all source files and assets
r1 :param role: role for the apikey
"""
from rhodecode.lib.auth import generate_auth_token
user = self._get_user(user)
new_auth_token = UserApiKeys()
new_auth_token.api_key = generate_auth_token(user.username)
new_auth_token.user_id = user.user_id
new_auth_token.description = description
new_auth_token.role = role
auth-tokens: add scope and show consitent token UI for my account and admin.
r1480 new_auth_token.expires = time.time() + (lifetime * 60) \
if lifetime != -1 else -1
project: added all source files and assets
r1 Session().add(new_auth_token)
return new_auth_token
my-account: use audit logs for email and token actions.
r1820 def delete(self, auth_token_id, user=None):
project: added all source files and assets
r1 """
Deletes given api_key, if user is set it also filters the object for
deletion by given user.
"""
my-account: use audit logs for email and token actions.
r1820 auth_token = UserApiKeys.query().filter(
UserApiKeys.user_api_key_id == auth_token_id)
project: added all source files and assets
r1
if user:
user = self._get_user(user)
my-account: use audit logs for email and token actions.
r1820 auth_token = auth_token.filter(UserApiKeys.user_id == user.user_id)
auth_token = auth_token.scalar()
auth-token: only delete token if it exists.
r1839
if auth_token:
try:
Session().delete(auth_token)
except Exception:
log.error(traceback.format_exc())
raise
project: added all source files and assets
r1
def get_auth_tokens(self, user, show_expired=True):
user = self._get_user(user)
user_auth_tokens = UserApiKeys.query()\
.filter(UserApiKeys.user_id == user.user_id)
if not show_expired:
user_auth_tokens = user_auth_tokens\
.filter(or_(UserApiKeys.expires == -1,
UserApiKeys.expires >= time.time()))
auth-tokens: order tokens by creation id.
r1508 user_auth_tokens = user_auth_tokens.order_by(
UserApiKeys.user_api_key_id)
project: added all source files and assets
r1 return user_auth_tokens
password-reset: strengthten security on password reset logic....
r1471
def get_auth_token(self, auth_token):
auth_token = UserApiKeys.query().filter(
UserApiKeys.api_key == auth_token)
auth_token = auth_token \
.filter(or_(UserApiKeys.expires == -1,
UserApiKeys.expires >= time.time()))\
.first()
return auth_token