Skip to content

Commit 24503f0

Browse files
Merge pull request #2 from soufianechalouh/develop
Authentication
2 parents d0c6f14 + b0cf1c6 commit 24503f0

File tree

17 files changed

+479
-0
lines changed

17 files changed

+479
-0
lines changed

django_drf_auth_plus/authentication/__init__.py

Whitespace-only changes.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
from django.contrib import admin
2+
3+
# Register your models here.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
from django.apps import AppConfig
2+
3+
4+
class AuthenticationConfig(AppConfig):
5+
default_auto_field = 'django.db.models.BigAutoField'
6+
name = 'authentication'

django_drf_auth_plus/authentication/migrations/__init__.py

Whitespace-only changes.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
from django.db import models
2+
3+
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager, PermissionsMixin
4+
5+
from django.db import models
6+
from rest_framework_simplejwt.tokens import RefreshToken
7+
8+
9+
class UserManager(BaseUserManager):
10+
"""Custom user manager"""
11+
12+
def create_user(self, username, email, password=None):
13+
14+
if username is None:
15+
raise TypeError("User should have Username")
16+
17+
if email is None:
18+
raise TypeError("User should have email")
19+
20+
user = self.model(username=username, email=self.normalize_email(email))
21+
user.set_password(password)
22+
user.save()
23+
return user
24+
25+
def create_superuser(self, username, email, password=None):
26+
27+
if password is None:
28+
raise TypeError("User should have Password")
29+
30+
31+
user = self.create_user(username, email, password)
32+
user.is_superuser = True
33+
user.is_staff = True
34+
user.save()
35+
return user
36+
37+
38+
class User(AbstractBaseUser, PermissionsMixin):
39+
username = models.CharField(max_length=255, unique=True, db_index=True)
40+
email = models.EmailField(max_length=255, unique=True, db_index=True)
41+
is_verified = models.BooleanField(default=False)
42+
is_active = models.BooleanField(default=True)
43+
is_staff = models.BooleanField(default=False)
44+
created_at = models.DateTimeField(auto_now_add=True)
45+
updated_at = models.DateTimeField(auto_now=True)
46+
47+
USERNAME_FIELD = "email"
48+
REQUIRED_FIELDS = ["username"]
49+
50+
object = UserManager()
51+
52+
def __str__(self):
53+
return self.email
54+
55+
def tokens(self):
56+
refresh = RefreshToken.for_user(self)
57+
return {
58+
"refresh": str(refresh),
59+
"access": str(refresh.access_token)
60+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
from rest_framework import serializers
2+
from .models import User
3+
from django.contrib import auth
4+
from rest_framework.exceptions import AuthenticationFailed
5+
6+
7+
class RegisterSerializer(serializers.ModelSerializer):
8+
password = serializers.CharField(max_length=68, min_length=6, write_only=True)
9+
10+
class Meta:
11+
model = User
12+
fields = ["email", "username", "password"]
13+
14+
def validate(self, attrs):
15+
username = attrs.get("username", "")
16+
17+
if not str(username).isalnum():
18+
raise serializers.ValidationError("username should be alphanumeric")
19+
return super().validate(attrs)
20+
21+
def create(self, validated_data):
22+
return User.object.create_user(**validated_data)
23+
24+
25+
class EmailValidationSerializer(serializers.ModelSerializer):
26+
token = serializers.CharField(max_length=555)
27+
28+
class Meta:
29+
model = User
30+
fields = ["token"]
31+
32+
33+
class LoginSerializer(serializers.ModelSerializer):
34+
email = serializers.EmailField(max_length=255, min_length=3)
35+
password = serializers.CharField(max_length=68, min_length=6, write_only=True)
36+
username = serializers.CharField(max_length=68, min_length=6, read_only=True)
37+
tokens = serializers.SerializerMethodField()
38+
39+
def get_tokens(self, obj):
40+
user = User.object.get(email=obj['email'])
41+
42+
return user.tokens()
43+
44+
class Meta:
45+
model = User
46+
fields = ["email", "password", "username", "tokens"]
47+
48+
def validate(self, attrs):
49+
email = attrs.get("email", "")
50+
password = attrs.get("password", "")
51+
user = auth.authenticate(email=email, password=password)
52+
53+
if not user:
54+
raise AuthenticationFailed("Invalid credentials, try again")
55+
56+
if not user.is_active:
57+
raise AuthenticationFailed("Account disabled, contact admin")
58+
59+
if not user.is_verified:
60+
raise AuthenticationFailed("Email not verified")
61+
return {
62+
"email": user.email,
63+
"username": user.username,
64+
"token": user.tokens,
65+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
from django.test import TestCase
2+
3+
# Create your tests here.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
from django.urls import path
2+
from .views import RegisterView, VerifyEmail, LoginAPIView
3+
4+
urlpatterns = [
5+
path("register/", RegisterView.as_view(), name="register"),
6+
path("login/", LoginAPIView.as_view(), name="login"),
7+
path("email-verify/", VerifyEmail.as_view(), name="email-verify"),
8+
]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
from django.core.mail import EmailMessage
2+
3+
4+
class Util:
5+
@staticmethod
6+
def send_email(data):
7+
email = EmailMessage(data["email_subject"], data["email_body"], from_email="[email protected]", to=[data["to"]])
8+
email.send()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
from rest_framework.generics import GenericAPIView
2+
from rest_framework.response import Response
3+
from rest_framework import status, views
4+
from .serializers import RegisterSerializer, EmailValidationSerializer, LoginSerializer
5+
from rest_framework_simplejwt.tokens import RefreshToken
6+
from .models import User
7+
from .utils import Util
8+
from django.contrib.sites.shortcuts import get_current_site
9+
from django.urls import reverse
10+
import jwt
11+
from django.conf import settings
12+
from drf_yasg.utils import swagger_auto_schema
13+
from drf_yasg import openapi
14+
15+
16+
class RegisterView(GenericAPIView):
17+
serializer_class = RegisterSerializer
18+
19+
def post(self, request):
20+
user = self.serializer_class(data=request.data)
21+
user.is_valid(raise_exception=True)
22+
user.save()
23+
24+
user_data = user.data
25+
user = User.object.get(email=user_data["email"])
26+
27+
token = RefreshToken.for_user(user).access_token
28+
29+
current_site = get_current_site(request).domain
30+
relative_link = reverse("email-verify")
31+
abs_url = "http://" + current_site + relative_link + "?token=" + str(token)
32+
email_body = "Hi " + user.username + ", Use link bellow to verify your emai \n" + abs_url
33+
data = {"email_body": email_body, "to": user.email, "email_subject": "Verify your account", "domain": current_site}
34+
35+
Util.send_email(data)
36+
return Response(user_data, status=status.HTTP_201_CREATED)
37+
38+
39+
class VerifyEmail(views.APIView):
40+
serializer_class = EmailValidationSerializer
41+
token_param_config = openapi.Parameter("token", in_=openapi.IN_QUERY, description="Desc", type=openapi.TYPE_STRING)
42+
43+
@swagger_auto_schema(manual_parameters=[token_param_config])
44+
def get(self, request):
45+
token = request.GET.get("token")
46+
47+
try:
48+
49+
payload = jwt.decode(token, settings.SECRET_KEY)
50+
user = User.object.get(id=payload["user_id"])
51+
if not user.is_verified:
52+
user.is_verified = True
53+
user.save()
54+
return Response({"email": "Successfully activated"}, status=status.HTTP_201_CREATED)
55+
56+
except jwt.ExpiredSignatureError as expired:
57+
return Response({"error": "Activation expired"}, status=status.HTTP_400_BAD_REQUEST)
58+
except jwt.exceptions.DecodeError:
59+
return Response({"error": "Invalid token, request a new one"}, status=status.HTTP_400_BAD_REQUEST)
60+
except Exception as e:
61+
return Response({"error", f"Unexpected error {str(e)}"}, status=status.HTTP_400_BAD_REQUEST)
62+
63+
64+
class LoginAPIView(GenericAPIView):
65+
serializer_class = LoginSerializer
66+
67+
def post(self, request):
68+
serializer = self.serializer_class(data=request.data)
69+
serializer.is_valid(raise_exception=True)
70+
71+
return Response(serializer.data, status=status.HTTP_200_OK)
72+

django_drf_auth_plus/django_drf_auth_plus/__init__.py

Whitespace-only changes.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
"""
2+
ASGI config for django_drf_auth_plus project.
3+
4+
It exposes the ASGI callable as a module-level variable named ``application``.
5+
6+
For more information on this file, see
7+
https://docs.djangoproject.com/en/3.2/howto/deployment/asgi/
8+
"""
9+
10+
import os
11+
12+
from django.core.asgi import get_asgi_application
13+
14+
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'django_drf_auth_plus.settings')
15+
16+
application = get_asgi_application()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
"""
2+
Django settings for django_drf_auth_plus project.
3+
4+
Generated by 'django-admin startproject' using Django 3.2.
5+
6+
For more information on this file, see
7+
https://docs.djangoproject.com/en/3.2/topics/settings/
8+
9+
For the full list of settings and their values, see
10+
https://docs.djangoproject.com/en/3.2/ref/settings/
11+
"""
12+
import os
13+
from pathlib import Path
14+
15+
# Build paths inside the project like this: BASE_DIR / 'subdir'.
16+
BASE_DIR = Path(__file__).resolve().parent.parent
17+
18+
# Quick-start development settings - unsuitable for production
19+
# See https://docs.djangoproject.com/en/3.2/howto/deployment/checklist/
20+
21+
# SECURITY WARNING: keep the secret key used in production secret!
22+
SECRET_KEY = 'django-insecure-h(-f!xtv1&ax2*dr=&tzm59-+j_s_6^g=9y3g2batpsj5v1l2f'
23+
24+
# SECURITY WARNING: don't run with debug turned on in production!
25+
DEBUG = True
26+
27+
ALLOWED_HOSTS = []
28+
29+
AUTH_USER_MODEL = "authentication.User"
30+
31+
# Application definition
32+
33+
INSTALLED_APPS = [
34+
'django.contrib.admin',
35+
'django.contrib.auth',
36+
'django.contrib.contenttypes',
37+
'django.contrib.sessions',
38+
'django.contrib.messages',
39+
'django.contrib.staticfiles',
40+
'rest_framework',
41+
'authentication',
42+
'drf_yasg',
43+
]
44+
45+
REST_FRAMEWORK = {
46+
'DEFAULT_AUTHENTICATION_CLASSES': (
47+
'rest_framework_simplejwt.authentication.JWTAuthentication',
48+
)
49+
}
50+
51+
MIDDLEWARE = [
52+
'django.middleware.security.SecurityMiddleware',
53+
'django.contrib.sessions.middleware.SessionMiddleware',
54+
'django.middleware.common.CommonMiddleware',
55+
'django.middleware.csrf.CsrfViewMiddleware',
56+
'django.contrib.auth.middleware.AuthenticationMiddleware',
57+
'django.contrib.messages.middleware.MessageMiddleware',
58+
'django.middleware.clickjacking.XFrameOptionsMiddleware',
59+
]
60+
61+
ROOT_URLCONF = 'django_drf_auth_plus.urls'
62+
63+
TEMPLATES = [
64+
{
65+
'BACKEND': 'django.template.backends.django.DjangoTemplates',
66+
'DIRS': [],
67+
'APP_DIRS': True,
68+
'OPTIONS': {
69+
'context_processors': [
70+
'django.template.context_processors.debug',
71+
'django.template.context_processors.request',
72+
'django.contrib.auth.context_processors.auth',
73+
'django.contrib.messages.context_processors.messages',
74+
],
75+
},
76+
},
77+
]
78+
79+
WSGI_APPLICATION = 'django_drf_auth_plus.wsgi.application'
80+
81+
# Database
82+
# https://docs.djangoproject.com/en/3.2/ref/settings/#databases
83+
84+
DATABASES = {
85+
'default': {
86+
'ENGINE': 'django.db.backends.sqlite3',
87+
'NAME': BASE_DIR / 'db.sqlite3',
88+
}
89+
}
90+
91+
# Password validation
92+
# https://docs.djangoproject.com/en/3.2/ref/settings/#auth-password-validators
93+
94+
AUTH_PASSWORD_VALIDATORS = [
95+
{
96+
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
97+
},
98+
{
99+
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
100+
},
101+
{
102+
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
103+
},
104+
{
105+
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
106+
},
107+
]
108+
109+
# Internationalization
110+
# https://docs.djangoproject.com/en/3.2/topics/i18n/
111+
112+
LANGUAGE_CODE = 'en-us'
113+
114+
TIME_ZONE = 'UTC'
115+
116+
USE_I18N = True
117+
118+
USE_L10N = True
119+
120+
USE_TZ = True
121+
122+
# Static files (CSS, JavaScript, Images)
123+
# https://docs.djangoproject.com/en/3.2/howto/static-files/
124+
125+
STATIC_URL = '/static/'
126+
127+
# Default primary key field type
128+
# https://docs.djangoproject.com/en/3.2/ref/settings/#default-auto-field
129+
130+
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
131+
132+
EMAIL_USE_TLS = True
133+
EMAIL_HOST = "smtp.gmail.com"
134+
EMAIL_PORT = 587
135+
EMAIL_HOST_USER = os.getenv("EMAIL_HOST_USER", "[email protected]")
136+
EMAIL_HOST_PASSWORD = os.getenv("EMAIL_HOST_PASSWORD", "******")

0 commit comments

Comments
 (0)