You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

195 lines
6.3 KiB

  1. from datetime import datetime
  2. import hashlib
  3. from werkzeug.security import generate_password_hash, check_password_hash
  4. from itsdangerous import TimedJSONWebSignatureSerializer as Serializer
  5. from itsdangerous import BadSignature
  6. from flask import current_app
  7. from flask_login import UserMixin, AnonymousUserMixin
  8. from . import db, login_manager
  9. class Permission:
  10. FOLLOW = 1
  11. COMMENT = 2
  12. WRITE = 4
  13. MODERATE = 8
  14. ADMIN = 16
  15. class Role(db.Model):
  16. __tablename__ = 'roles'
  17. id = db.Column(db.Integer, primary_key=True)
  18. name = db.Column(db.String(64), unique=True)
  19. default = db.Column(db.Boolean, default=False, index=True)
  20. permissions = db.Column(db.Integer)
  21. users = db.relationship('User', backref='role', lazy='dynamic')
  22. def __init__(self, **kwargs):
  23. super(Role, self).__init__(**kwargs)
  24. if self.permissions is None:
  25. self.permissions = 0
  26. @staticmethod
  27. def insert_roles():
  28. roles = {
  29. 'User': [Permission.FOLLOW, Permission.COMMENT, Permission.WRITE],
  30. 'Moderator': [Permission.FOLLOW, Permission.COMMENT,
  31. Permission.WRITE, Permission.MODERATE],
  32. 'Administrator': [Permission.FOLLOW, Permission.COMMENT,
  33. Permission.WRITE, Permission.MODERATE,
  34. Permission.ADMIN]
  35. }
  36. default_role = 'User'
  37. for r in roles:
  38. role = Role.query.filter_by(name=r).first()
  39. if role is None:
  40. role = Role(name=r)
  41. role.reset_permissions()
  42. for perm in roles[r]:
  43. role.add_permission(perm)
  44. role.default = (role.name == default_role)
  45. db.session.add(role)
  46. db.session.commit()
  47. def add_permission(self, perm):
  48. if not self.has_permission(perm):
  49. self.permissions += perm
  50. def remove_permission(self, perm):
  51. if self.has_permission(perm):
  52. self.permissions -= perm
  53. def reset_permissions(self):
  54. self.permissions = 0
  55. def has_permission(self, perm):
  56. return self.permissions & perm == perm
  57. def __repr__(self):
  58. return '<Role %r>' % self.name
  59. class User(UserMixin, db.Model):
  60. __tablename__ = 'users'
  61. id = db.Column(db.Integer, primary_key=True)
  62. email = db.Column(db.String(64), unique=True, index=True)
  63. username = db.Column(db.String(64), unique=True, index=True)
  64. role_id = db.Column(db.Integer, db.ForeignKey('roles.id'))
  65. password_hash = db.Column(db.String(128))
  66. confirmed = db.Column(db.Boolean, default=False)
  67. name = db.Column(db.String(64))
  68. location = db.Column(db.String(64))
  69. about_me = db.Column(db.Text())
  70. member_since = db.Column(db.DateTime(), default=datetime.utcnow)
  71. last_seen = db.Column(db.DateTime(), default=datetime.utcnow)
  72. def __init__(self, **kwargs):
  73. super(User, self).__init__(**kwargs)
  74. if self.role is None:
  75. if self.email == current_app.config['FLASKY_ADMIN']:
  76. self.role = Role.query.filter_by(name='Administrator').first()
  77. else:
  78. self.role = Role.query.filter_by(default=True).first()
  79. @property
  80. def password(self):
  81. raise AttributeError('Password is not a readable attribute')
  82. @password.setter
  83. def password(self, password):
  84. self.password_hash = generate_password_hash(password)
  85. def verify_password(self, password):
  86. return check_password_hash(self.password_hash, password)
  87. def generate_confirmation_token(self, expiration=3600):
  88. s = Serializer(current_app.config['SECRET_KEY'], expiration)
  89. return s.dumps({'confirm': self.id}).decode('utf-8')
  90. def confirm(self, token):
  91. s = Serializer(current_app.config['SECRET_KEY'])
  92. try:
  93. data = s.loads(token.encode('utf-8'))
  94. except BadSignature:
  95. return False
  96. if data.get('confirm') != self.id:
  97. return False
  98. self.confirmed = True
  99. db.session.add(self)
  100. return True
  101. def generate_reset_token(self, expiration=3600):
  102. s = Serializer(current_app.config['SECRET_KEY'], expiration)
  103. return s.dumps({'reset': self.id}).decode('utf-8')
  104. @staticmethod
  105. def reset_password(token, new_password):
  106. s = Serializer(current_app.config['SECRET_KEY'])
  107. try:
  108. data = s.loads(token.encode('utf-8'))
  109. except BadSignature:
  110. return False
  111. user = User.query.get(data.get('reset'))
  112. if user is None:
  113. return False
  114. user.password = new_password
  115. db.session.add(user)
  116. return True
  117. def generate_email_change_token(self, new_email, expiration=3600):
  118. s = Serializer(current_app.config['SECRET_KEY'], expiration)
  119. return s.dumps(
  120. {'change_email': self.id, 'new_email': new_email}).decode('utf-8')
  121. def change_email(self, token):
  122. s = Serializer(current_app.config['SECRET_KEY'])
  123. try:
  124. data = s.loads(token.encode('utf-8'))
  125. except BadSignature:
  126. return False
  127. if data.get('change_email') != self.id:
  128. return False
  129. new_email = data.get('new_email')
  130. if new_email is None:
  131. return False
  132. if self.query.filter_by(email=new_email).first() is not None:
  133. return False
  134. self.email = new_email
  135. db.session.add(self)
  136. return True
  137. def can(self, perm):
  138. return self.role is not None and self.role.has_permission(perm)
  139. def is_administrator(self):
  140. return self.can(Permission.ADMIN)
  141. def ping(self):
  142. self.last_seen = datetime.utcnow()
  143. db.session.add(self)
  144. db.session.commit()
  145. def gravatar(self, size=100, default='identicon', rating='g'):
  146. url = 'https://secure.gravatar.com/avatar'
  147. hash = hashlib.md5(self.email.lower().encode('utf-8')).hexdigest()
  148. return '{url}/{hash}?s={size}&d={default}&r={rating}'.format(
  149. url=url, hash=hash, size=size, default=default, rating=rating)
  150. def __repr__(self):
  151. return '<User %r>' % self.username
  152. class AnonymousUser(AnonymousUserMixin):
  153. def can(self, perm):
  154. return False
  155. def is_administrator(self):
  156. return False
  157. login_manager.anonymous_user = AnonymousUser
  158. @login_manager.user_loader
  159. def load_user(user_id):
  160. return User.query.get(int(user_id))