-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathapp.py
More file actions
340 lines (271 loc) · 11.9 KB
/
app.py
File metadata and controls
340 lines (271 loc) · 11.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
# test changes
import json
import requests
import datetime
from flask import Flask, redirect, make_response, render_template, request, url_for, session
from flask_jwt_extended import (
JWTManager, jwt_required, get_jwt_identity, create_access_token, create_refresh_token,
set_access_cookies, set_refresh_cookies, unset_jwt_cookies, unset_access_cookies
)
from werkzeug.security import generate_password_hash, check_password_hash
from twilio.rest import Client
from models.user import UserModel
from models.log import LogModel
from twilio_credentials import TWILIO_AUTH_TOKEN, TWILIO_ACCOUNT_SID, SENDER_PHONE_NUMBER
from db import db
app = Flask(__name__)
# configuration settings
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///data.db'
app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False # we don't want Flask's modification tracker
app.config['JWT_SECRET_KEY'] = 'mfa-super-secret-key' # Needs to be super complicated!
app.config['JWT_TOKEN_LOCATION'] = ['cookies']
app.config['JWT_ACCESS_TOKEN_EXPIRES'] = datetime.timedelta(seconds=150)
app.config['JWT_COOKIE_CSRF_PROTECT'] = True # prevents Cross-Site Request Forgery(CSRF) attack
app.config['JWT_CSRF_CHECK_FORM'] = True
app.config['OTP_GENERATION_URL'] = "https://api.generateotp.com/"
app.secret_key = "veryVERYsecret" # Needs to be super complicated!
jwt = JWTManager(app)
# loaders go here
# creates table before any command execution
@app.before_first_request
def create_table():
db.create_all()
# called when NO access tokens are provided
@jwt.unauthorized_loader
def unauthorized_callback(error):
"""no auth header provided"""
print("Unauthorized Token Loaded!!")
# return redirect(app.config['BASE_URL'] + '/', 302)
return redirect(url_for("home"))
# called when wrong tokens are provided
@jwt.invalid_token_loader
def invalid_token_callback(error):
"""Invalid Fresh/Non-Fresh Access token in auth header"""
print("Invalid Token Loaded!!")
resp = make_response(redirect(url_for("home")))
unset_jwt_cookies(resp)
resp.set_cookie('username', max_age=0)
return resp, 302
# called when expired access token is provided
@jwt.expired_token_loader
def expired_token_callback(header, payload):
"""Expired auth header"""
print("Expired Token Loaded!!")
resp = make_response(redirect(url_for("refresh")))
unset_access_cookies(resp)
return resp, 302
# refreshes the access token
@app.route('/token/refresh', methods=['GET'])
@jwt_required(refresh=True)
def refresh():
"""Refreshing expired Access token"""
user_id = get_jwt_identity()
access_token = create_access_token(identity=str(user_id))
resp = make_response(redirect(url_for("home")))
set_access_cookies(resp, access_token)
return resp
def assign_access_refresh_tokens(user_id, url):
"""assigns access & refresh tokens and stores in cookies"""
access_token = create_access_token(identity=str(user_id), fresh=True)
refresh_token = create_refresh_token(identity=str(user_id))
resp = make_response(redirect(url, 302))
set_access_cookies(resp, access_token)
set_refresh_cookies(resp, refresh_token)
# resp.set_cookie('username', str(user_id))
return resp
def unset_jwt():
"""deletes the access and refresh token from cookies"""
resp = make_response(redirect(url_for("home")))
resp.set_cookie('locationData', max_age=0)
unset_jwt_cookies(resp)
return resp
# homepage: displayed at beginning
@app.route("/")
@jwt_required(optional=True)
def home():
username = get_jwt_identity()
if not username:
return render_template("login.html")
else:
return render_template("success.html")
@app.route("/login", methods=['GET', 'POST'])
def login():
"""route for login of user"""
if request.method == "GET":
return render_template("login.html") # showing the login page
if request.method == 'POST':
username = request.form['username'] # fetching data from html page
password = request.form['password']
user = UserModel.find_by_username(username)
if user:
if check_password_hash(user.password, password):
# storing in session; to be stored in db only if otp valid
session['username'] = username
session['password'] = password
session['phone_number'] = user.phone_number
# if password is correct
raw_data = request.cookies.get('locationData')
# fetching location of user
try:
location = json.loads(raw_data)
except:
return render_template("error_page.html")
# fetching IP of user
if request.environ.get('HTTP_X_FORWARDED_FOR') is None:
session['ip'] = request.environ['REMOTE_ADDR']
else:
session['ip'] = request.environ['HTTP_X_FORWARDED_FOR']
session['latitude'] = location['latitude']
session['longitude'] = location['longitude']
session['time'] = location['time']
# --- printing for convenience ---
# print(f"IP Address: {session['ip']}")
# print(f"Latitude : {latitude}")
# print(f"Longitude : {longitude}")
# print(f"Time : {time}")
# --- could be deleted up to here---
# ---- checking for safe zone -----
if safe_zone():
save_data_to_db()
return assign_access_refresh_tokens(session['username'], url_for("success"))
# -------- OTP VERIFICATION ---------
otp_code = request_otp(user.phone_number) # requesting for generation of otp from third party api
msg = send_otp(user.phone_number, otp_code) # sending otp to given number via message
if msg: # invalid phone number
# error = msg
return render_template('register.html',
info="Invalid Phone Number. Please enter valid phone number.")
# if valid phone number
return redirect(url_for('validate', phone_number=user.phone_number))
else:
return render_template("login.html", info="** Wrong Password...")
else:
return render_template("login.html", info="** You are not a registered user. Please Sign Up to continue...")
@app.route("/register", methods=['GET', 'POST'])
def register():
if request.method == "GET":
return render_template("register.html")
# ----- fetching location of user -----
raw_data = request.cookies.get('locationData')
try:
location = json.loads(raw_data)
except:
return render_template("register.html", info="Location access denied. Please enable location to continue...")
if request.environ.get('HTTP_X_FORWARDED_FOR') is None:
session['ip'] = request.environ['REMOTE_ADDR']
else:
session['ip'] = request.environ['HTTP_X_FORWARDED_FOR']
session['latitude'] = location['latitude']
session['longitude'] = location['longitude']
session['time'] = location['time']
if request.method == 'POST':
session['username'] = request.form['username']
session['password'] = request.form['password']
session['phone_number'] = request.form['phone_number']
if UserModel.find_by_username(session['username']):
return render_template("register.html", info="Username already taken. Please try a new username...")
# -------- OTP VERIFICATION ---------
otp_code = request_otp(session['phone_number']) # requesting for generation of otp from third party api
msg = send_otp(session['phone_number'], otp_code) # sending otp to given number via message
if msg: # invalid phone number
return render_template('register.html', info="Invalid Phone Number. Please enter valid phone number.")
# print(f"Username: {username}")
# print(f"Password: {password}")
# print(f"Mobile Number: {phone_number}") # apply all checks in html file
# print(f"IP Address: {ip}")
# print(f"Latitude : {latitude}")
# print(f"Longitude : {longitude}")
# print(f"Time : {time}")
# valid number
return redirect(url_for('validate'))
@app.route("/success")
@jwt_required()
def success():
return render_template("success.html")
@app.route('/logout')
@jwt_required()
def logout():
try:
log_entries = LogModel.find_log(session['username'], session['time'])
except:
return unset_jwt(), 302
for logout_log in log_entries:
logout_log.time_end = str(datetime.datetime.now().time())[:5]
logout_log.save_to_db()
return unset_jwt(), 302
@app.route('/user-logs')
def user_logs():
return {'users': [user.json() for user in UserModel.query.all()]}
@app.route("/validate", methods=['GET', 'POST'])
def validate():
if request.method == "GET":
return render_template('validate.html', phone_number=session['phone_number'])
input_otp = request.form['otp_code']
phone_number = session['phone_number']
is_valid = validate_otp(input_otp, phone_number)
if is_valid:
save_data_to_db()
return assign_access_refresh_tokens(session['username'], url_for("success"))
info = "Invalid OTP. Please try again."
return render_template('validate.html', info=info, phone_number=session['phone_number']) # redirects to the same url u r in
@app.route("/resend")
def resend():
otp_code = request_otp(session['phone_number']) # requesting for generation of otp from third party api
msg = send_otp(session['phone_number'], otp_code) # sending otp to given number via message
if msg: # invalid phone number
# error = msg
return render_template('register.html',
info="Invalid Phone Number. Please enter valid phone number.")
# valid number
return redirect(url_for('validate', phone_number=session['phone_number']))
def safe_zone():
return False
def request_otp(phone_number):
print("inside request_otp")
req = requests.post(f"{app.config['OTP_GENERATION_URL']}/generate", data={"initiator_id": phone_number})
if req.status_code == 201:
# OK
data = req.json() # converting to json
return data['code']
def send_otp(phone_number, otp_code):
print("inside send_otp")
account_sid = TWILIO_ACCOUNT_SID # from own twilio_credentials.py
auth_token = TWILIO_AUTH_TOKEN # from own twilio_credentials.py
client = Client(account_sid, auth_token)
try:
message = client.messages.create(
to=f"+91{phone_number}",
from_=SENDER_PHONE_NUMBER,
body=f"Your OTP is {otp_code}")
print(message.sid)
return None
except:
print("invalid phone number")
return "Invalid phone number"
def validate_otp(otp_code, phone_number):
req = requests.post(f"{app.config['OTP_GENERATION_URL']}/validate/{otp_code}/{phone_number}")
print(f"code: {req.status_code}")
# data = req.json()
# print(data['message'])
if req.status_code == 200:
print("ok")
# OK
data = req.json()
print(data)
return data['status']
def save_data_to_db():
"""function to interact with database"""
if not UserModel.find_by_username(session['username']):
new_user = UserModel(
session['username'], generate_password_hash(session['password']), session['phone_number'],
None, None, None, None, None
)
new_user.save_to_db()
log = LogModel(
session['username'], session['ip'], session['latitude'],
session['longitude'], session['time'], None
)
log.save_to_db()
if __name__ == '__main__':
db.init_app(app)
app.run(port=5000, debug=True)