|
|
@ -10,7 +10,7 @@ from cryptography.fernet import Fernet, InvalidToken |
|
|
|
from frappe.utils import cstr, encode |
|
|
|
from datetime import datetime |
|
|
|
from datetime import timedelta |
|
|
|
|
|
|
|
from smart_service.apis.master_api import rate_limit |
|
|
|
|
|
|
|
current_db_name = frappe.conf.get("db_name") |
|
|
|
|
|
|
@ -30,6 +30,9 @@ def app_user_validation_test(): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=True) |
|
|
|
def app_user_validation(usr=None, pwd=None): |
|
|
|
# rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
# if rate_res != 1: |
|
|
|
# return rate_res |
|
|
|
val = input_validation(usr=usr, pwd=pwd) |
|
|
|
if val != '': |
|
|
|
return {'status': 0, 'error': "Parameter's missing: " + val} |
|
|
@ -174,6 +177,9 @@ def app_user_validation(usr=None, pwd=None): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=True) |
|
|
|
def grant_user_access(userdata=None, iid=None): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
val = input_validation(userdata=userdata, iid=iid) |
|
|
|
if val != '': |
|
|
|
return {'status': 0, 'error': "Parameter's missing: " + val} |
|
|
@ -393,6 +399,9 @@ def grant_user_access(userdata=None, iid=None): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=True) |
|
|
|
def new_app_user_validation(usr=None, pwd=None, iid=None, device_data=None): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
val = input_validation(usr=usr, pwd=pwd, iid=iid, device_data=device_data) |
|
|
|
if val != '': |
|
|
|
return {'status': 0, 'error': "Parameter's missing: " + val} |
|
|
@ -531,6 +540,9 @@ def new_app_user_validation(usr=None, pwd=None, iid=None, device_data=None): |
|
|
|
|
|
|
|
|
|
|
|
def new_grant_user_access(userdata=None, iid=None): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
try: |
|
|
|
user_id = userdata['ID'] |
|
|
|
email = userdata['EmailId'] |
|
|
@ -739,6 +751,10 @@ def new_grant_user_access(userdata=None, iid=None): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=1) |
|
|
|
def generate_keys(user_name): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
|
|
|
|
frappe.set_user("Administrator") |
|
|
|
user_details = frappe.get_doc('User', user_name) |
|
|
|
api_secret = frappe.generate_hash(length=15) |
|
|
@ -753,6 +769,9 @@ def generate_keys(user_name): |
|
|
|
|
|
|
|
@frappe.whitelist() |
|
|
|
def login_generate_token(doc=None, method=None): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
new_tok = generate_keys('cms@guidedsmartservice.com') |
|
|
|
water = frappe.get_doc("Fish", None) |
|
|
|
water.apple = new_tok |
|
|
@ -779,6 +798,9 @@ def xml_to_dict(node): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=True) |
|
|
|
def generate_user_token(user_email): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
access_token = generate_access_token(user_email) |
|
|
|
refresh_token = generate_refresh_token() |
|
|
|
token_details = update_tokens_in_doc( |
|
|
@ -788,6 +810,9 @@ def generate_user_token(user_email): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=True) |
|
|
|
def generate_access_token(user_email): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
frappe.set_user("Administrator") |
|
|
|
user_details = frappe.get_doc('User', user_email) |
|
|
|
|
|
|
@ -814,6 +839,9 @@ def generate_refresh_token(): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=1, methods=['POST']) |
|
|
|
def refresh_token(refresh_token): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
if refresh_token: |
|
|
|
frappe.set_user("Administrator") |
|
|
|
# req = json.loads(frappe.request.data) |
|
|
@ -843,6 +871,9 @@ def refresh_token(refresh_token): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=1, methods=['POST']) |
|
|
|
def invalidate_token(refresh_token): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
if refresh_token: |
|
|
|
frappe.set_user("Administrator") |
|
|
|
ref_token = refresh_token |
|
|
@ -933,6 +964,9 @@ def get_encryption_key(): |
|
|
|
|
|
|
|
@frappe.whitelist(allow_guest=1) |
|
|
|
def deactivate_tokens(): |
|
|
|
rate_res = rate_limit(limit=5, seconds=15) |
|
|
|
if rate_res != 1: |
|
|
|
return rate_res |
|
|
|
frappe.set_user("Administrator") |
|
|
|
doc_details = frappe.db.sql(''' |
|
|
|
SELECT * FROM `tabRefresh Token`;''', as_dict=1) |
|
|
|