def get_test_user(self): account = self.get_test_account() email, password = self.get_test_user_credentials() try: user = User(email=email, account=account, password=password) user.save() except: # Don't care if already created user = User.objects(email=email).first() return user
def get_test_user(self): account = self.get_test_account() account_user_role = Role.objects(name="Account User").first() email, password = self.get_test_user_credentials() try: user = User(email=email, account=account, password=password, roles=[account_user_role]) user.save() except: # Don't care if already created user = User.objects(email=email).first() return user
def get(self, id): query_set = User.objects(id=id) try: u = query_set.first() return loads(u.public_json()) except: return ErrorHandler.not_found()
def verify_auth_token(token): s = Serializer(app.config['SECRET_KEY']) try: data = s.loads(token) except SignatureExpired: return None # valid token, but expired except BadSignature: return None # invalid token user = User.objects(id=data['id']).first() #.query.get(data['id']) return user
def verify_password(username, password): global current_user user = User.verify_auth_token(password) if not user: return False # The next two lines set the current user correctly for the token case, on a # per-request basis, Tthe user still needs to re-authenticate with each # request, so the RESTful statelessness is implemented correctly. user.authenticated = True login_user(user, remember=True) return True
def verify_password(username, password): if username is None or username == '': current_app.logger.error("Username null in verify_password; check value of WSGIPassAuthorization in apache config") user = User.verify_auth_token(password) if not user: return False # The next two lines set the current user correctly for the token case, on a # per-request basis, Tthe user still needs to re-authenticate with each # request, so the RESTful statelessness is implemented correctly. user.authenticated = True login_user(user, remember=True) return True
def test_can_create_and_save_user(self): with self.testHelper.app().app_context(): user = None try: user_data_store = self.security.datastore uTemp = User.objects(email="*****@*****.**").first() if uTemp is not None: uTemp.delete() # -- Should and do really use encrypted password in prod, but slows tests down # encrypted = encrypt_password("WhatsUpDocument") user = user_data_store.create_user(email="*****@*****.**", account=TestObjects().get_test_account(), password="******") user2 = user_data_store.find_user(email="*****@*****.**") assert(user.email == user2.email) assert(user.account == user2.account) # Clean up finally: if(user is not None): user_data_store.delete_user(user)
def test_can_create_and_save_user(self): with self.testHelper.app().app_context(): user = None try: user_data_store = self.security.datastore uTemp = User.objects(email="*****@*****.**").first() if uTemp is not None: uTemp.delete() # -- Should and do really use encrypted password in prod, but slows tests down # encrypted = encrypt_password("WhatsUpDocument") user = user_data_store.create_user( email="*****@*****.**", account=TestObjects().get_test_account(), password="******") user2 = user_data_store.find_user(email="*****@*****.**") assert (user.email == user2.email) assert (user.account == user2.account) # Clean up finally: if (user is not None): user_data_store.delete_user(user)
def load_user_by_id(id): try: return User.get(id) except: return None