ticketfrei/user.py

164 lines
6.2 KiB
Python
Raw Normal View History

from bottle import response
2018-03-28 15:36:35 +00:00
from db import db
import jwt
from mastodon import Mastodon
2018-03-28 15:36:35 +00:00
from pylibscrypt import scrypt_mcf, scrypt_mcf_check
class User(object):
2018-03-28 15:36:35 +00:00
def __init__(self, uid):
# set cookie
response.set_cookie('uid', uid, secret=db.secret, path='/')
self.uid = uid
2018-03-28 15:36:35 +00:00
def check_password(self, password):
db.execute("SELECT passhash FROM user WHERE id=?;", (self.uid, ))
passhash, = db.cur.fetchone()
return scrypt_mcf_check(passhash.encode('ascii'),
password.encode('utf-8'))
def password(self, password):
passhash = scrypt_mcf(password.encode('utf-8')).decode('ascii')
db.execute("UPDATE user SET passhash=? WHERE id=?;",
(passhash, self.uid))
db.commit()
password = property(None, password) # setter only, can't read back
@property
def enabled(self):
db.execute("SELECT enabled FROM user WHERE user_id=?;", (self.uid, ))
return bool(db.cur.fetchone()[0])
@enabled.setter
def enabled(self, enabled):
db.execute("UPDATE user SET enabled=? WHERE id=?",
(1 if enabled else 0, self.uid))
db.commit()
@property
def emails(self):
db.execute("SELECT email FROM email WHERE user_id=?;", (self.uid, ))
return (*db.cur.fetchall(), )
def delete_email(self, email):
db.execute("SELECT COUNT(*) FROM email WHERE user_id=?", (self.uid, ))
if db.cur.fetchone()[0] == 1:
return False # don't allow to delete last email
db.execute("DELETE FROM email WHERE user_id=? AND email=?;",
(self.uid, email))
db.commit()
return True
def email_token(self, email):
return jwt.encode({
'email': email,
'uid': self.uid
2018-03-28 18:24:21 +00:00
}, db.secret).decode('ascii')
2018-03-28 15:36:35 +00:00
def is_appropriate(self, report):
db.execute("SELECT pattern FROM triggerpatterns WHERE user_id=?;",
(self.uid, ))
for pattern, in db.cur.fetchall():
if pattern.search(report.text) is not None:
break
else:
# no pattern matched
return False
db.execute("SELECT word FROM badwords WHERE user_id=?;",
(self.uid, ))
badwords = [word.lower() for word, in db.cur.fetchall()]
for word in report.text.lower().split():
if word in badwords:
return False
return True
def get_masto_credentials(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT access_token, instance_id FROM mastodon_accounts WHERE user_id = ? AND active = 1;",
(self.uid, ))
row = db.cur.fetchone()
db.execute("SELECT instance, client_id, client_secret FROM mastodon_instances WHERE id = ?;",
(row[1], ))
instance = db.cur.fetchone()
return instance[1], instance[2], row[0], instance[0]
def get_seen_toot(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT toot_id FROM seen_toots WHERE user_id = ?;",
(self.uid, ))
return db.cur.fetchone()[0]
def save_seen_toot(self, toot_id):
2018-03-28 15:36:35 +00:00
db.execute("UPDATE seen_toots SET toot_id = ? WHERE user_id = ?;",
(toot_id, self.uid))
2018-03-23 16:35:04 +00:00
def get_seen_tweet(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT tweet_id FROM seen_tweets WHERE user_id = ?;",
(self.uid, ))
return db.cur.fetchone()[0]
2018-03-23 16:35:04 +00:00
def save_seen_tweet(self, tweet_id):
2018-03-28 15:36:35 +00:00
db.execute("UPDATE seen_tweets SET tweet_id = ? WHERE user_id = ?;",
(tweet_id, self.uid))
2018-03-23 16:35:04 +00:00
def get_mail(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT email FROM mail WHERE user_id = ?;", (self.uid, ))
def get_seen_mail(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT mail_date FROM seen_mails WHERE user_id = ?;", (self.uid, ))
return db.cur.fetchone()[0]
def save_seen_mail(self, mail_date):
2018-03-28 15:36:35 +00:00
db.execute("UPDATE seen_mail SET mail_date = ? WHERE user_id = ?;",
(mail_date, self.uid))
2018-03-23 17:00:05 +00:00
def get_trigger_words(self, table):
2018-03-28 15:36:35 +00:00
db.execute("SELECT words FROM ? WHERE user_id = ?;", (table, self.uid,))
return db.cur.fetchone()[0]
2018-03-23 17:00:05 +00:00
def state(self):
return dict(foo='bar')
def save_request_token(self, token):
2018-03-28 15:36:35 +00:00
db.execute("INSERT INTO twitter_request_tokens(user_id, request_token) VALUES(?, ?);",
(self.uid, token))
db.commit()
def get_request_token(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT request_token FROM twitter_request_tokens WHERE user_id = ?;", (id,))
request_token = db.cur.fetchone()[0]
db.execute("DELETE FROM twitter_request_tokens WHERE user_id = ?;", (id,))
db.commit()
return request_token
def save_twitter_token(self, access_token, access_token_secret):
2018-03-28 15:36:35 +00:00
db.execute(
"INSERT INTO twitter_accounts(user_id, access_token_key, access_token_secret) VALUES(?, ?, ?);",
(id, access_token, access_token_secret))
2018-03-28 15:36:35 +00:00
db.commit()
2018-03-23 16:35:04 +00:00
def get_twitter_token(self):
2018-03-28 15:36:35 +00:00
db.execute("SELECT access_token, access_token_secret FROM twitter_accouts WHERE user_id = ?;",
(self.uid, ))
return db.cur.fetchall()
2018-03-23 16:35:04 +00:00
def get_mastodon_app_keys(self, instance):
2018-03-28 15:36:35 +00:00
db.execute("SELECT client_id, client_secret FROM mastodon_instances WHERE instance = ?;", (instance, ))
try:
2018-03-28 15:36:35 +00:00
row = db.cur.fetchone()
client_id = row[0]
client_secret = row[1]
return client_id, client_secret
except TypeError:
2018-03-28 15:36:35 +00:00
app_name = "ticketfrei" + str(db.secret)[0:4]
client_id, client_secret = Mastodon.create_app(app_name, api_base_url=instance)
2018-03-28 15:36:35 +00:00
db.execute("INSERT INTO mastodon_instances(instance, client_id, client_secret) VALUES(?, ?, ?);",
(instance, client_id, client_secret))
db.commit()
return client_id, client_secret
def save_masto_token(self, access_token, instance):
2018-03-28 15:36:35 +00:00
db.execute("SELECT id FROM mastodon_instances WHERE instance = ?;", (instance, ))
instance_id = db.cur.fetchone()[0]
db.execute("INSERT INTO mastodon_accounts(user_id, access_token, instance_id, active) "
"VALUES(?, ?, ?, ?);", (self.uid, access_token, instance_id, 1))
db.commit()