2018-07-19 12:30:04 +01:00
|
|
|
from itertools import chain
|
|
|
|
|
|
2016-02-23 12:47:48 +00:00
|
|
|
from notifications_python_client.errors import HTTPError
|
2016-01-19 15:50:31 +00:00
|
|
|
|
2018-10-26 15:58:44 +01:00
|
|
|
from app.models.user import (
|
2018-02-28 15:37:49 +00:00
|
|
|
User,
|
2018-03-09 10:47:23 +00:00
|
|
|
roles,
|
2018-02-28 15:37:49 +00:00
|
|
|
translate_permissions_from_admin_roles_to_db,
|
|
|
|
|
)
|
2018-10-26 15:58:44 +01:00
|
|
|
from app.notify_client import NotifyAdminAPIClient, cache
|
2016-01-28 15:34:02 +00:00
|
|
|
|
2016-11-09 15:06:02 +00:00
|
|
|
ALLOWED_ATTRIBUTES = {
|
|
|
|
|
'name',
|
|
|
|
|
'email_address',
|
2017-11-01 15:36:27 +00:00
|
|
|
'mobile_number',
|
|
|
|
|
'auth_type',
|
2016-11-09 15:06:02 +00:00
|
|
|
}
|
|
|
|
|
|
2016-01-19 15:50:31 +00:00
|
|
|
|
2016-11-30 17:01:44 +00:00
|
|
|
class UserApiClient(NotifyAdminAPIClient):
|
2016-01-19 22:47:42 +00:00
|
|
|
|
|
|
|
|
def init_app(self, app):
|
2018-02-09 15:03:32 +00:00
|
|
|
super().init_app(app)
|
|
|
|
|
|
2016-01-22 11:21:30 +00:00
|
|
|
self.max_failed_login_count = app.config["MAX_FAILED_LOGIN_COUNT"]
|
2018-02-09 15:01:20 +00:00
|
|
|
self.admin_url = app.config['ADMIN_BASE_URL']
|
2016-01-19 15:50:31 +00:00
|
|
|
|
2017-11-13 13:39:31 +00:00
|
|
|
def register_user(self, name, email_address, mobile_number, password, auth_type):
|
2016-01-19 15:50:31 +00:00
|
|
|
data = {
|
|
|
|
|
"name": name,
|
|
|
|
|
"email_address": email_address,
|
|
|
|
|
"mobile_number": mobile_number,
|
2017-11-13 13:39:31 +00:00
|
|
|
"password": password,
|
|
|
|
|
"auth_type": auth_type
|
2016-01-19 22:47:42 +00:00
|
|
|
}
|
|
|
|
|
user_data = self.post("/user", data)
|
2016-01-22 11:21:30 +00:00
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
2016-01-19 22:47:42 +00:00
|
|
|
|
Cache `GET /user` response in Redis
In the same way, and for the same reasons that we’re caching the service
object.
Here’s a sample of the data returned by the API – so we should make sure
that any changes to this data invalidate the cache.
If we ever change a user’s phone number (for example) directly in the
database, then we will need to invalidate this cache manually.
```python
{
'data':{
'organisations':[
'4c707b81-4c6d-4d33-9376-17f0de6e0405'
],
'logged_in_at':'2018-04-10T11:41:03.781990Z',
'id':'2c45486e-177e-40b8-997d-5f4f81a461ca',
'email_address':'test@example.gov.uk',
'platform_admin':False,
'password_changed_at':'2018-01-01 10:10:10.100000',
'permissions':{
'42a9d4f2-1444-4e22-9133-52d9e406213f':[
'manage_api_keys',
'send_letters',
'manage_users',
'manage_templates',
'view_activity',
'send_texts',
'send_emails',
'manage_settings'
],
'a928eef8-0f25-41ca-b480-0447f29b2c20':[
'manage_users',
'manage_templates',
'manage_settings',
'send_texts',
'send_emails',
'send_letters',
'manage_api_keys',
'view_activity'
],
},
'state':'active',
'mobile_number':'07700900123',
'failed_login_count':0,
'name':'Example',
'services':[
'6078a8c0-52f5-4c4f-b724-d7d1ff2d3884',
'6afe3c1c-7fda-4d8d-aa8d-769c4bdf7803',
],
'current_session_id':'fea2ade1-db0a-4c90-93e7-c64a877ce83e',
'auth_type':'sms_auth'
}
}
```
2018-04-10 13:30:52 +01:00
|
|
|
def get_user(self, user_id):
|
|
|
|
|
return User(self._get_user(user_id)['data'], max_failed_login_count=self.max_failed_login_count)
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.set('user-{user_id}')
|
Cache `GET /user` response in Redis
In the same way, and for the same reasons that we’re caching the service
object.
Here’s a sample of the data returned by the API – so we should make sure
that any changes to this data invalidate the cache.
If we ever change a user’s phone number (for example) directly in the
database, then we will need to invalidate this cache manually.
```python
{
'data':{
'organisations':[
'4c707b81-4c6d-4d33-9376-17f0de6e0405'
],
'logged_in_at':'2018-04-10T11:41:03.781990Z',
'id':'2c45486e-177e-40b8-997d-5f4f81a461ca',
'email_address':'test@example.gov.uk',
'platform_admin':False,
'password_changed_at':'2018-01-01 10:10:10.100000',
'permissions':{
'42a9d4f2-1444-4e22-9133-52d9e406213f':[
'manage_api_keys',
'send_letters',
'manage_users',
'manage_templates',
'view_activity',
'send_texts',
'send_emails',
'manage_settings'
],
'a928eef8-0f25-41ca-b480-0447f29b2c20':[
'manage_users',
'manage_templates',
'manage_settings',
'send_texts',
'send_emails',
'send_letters',
'manage_api_keys',
'view_activity'
],
},
'state':'active',
'mobile_number':'07700900123',
'failed_login_count':0,
'name':'Example',
'services':[
'6078a8c0-52f5-4c4f-b724-d7d1ff2d3884',
'6afe3c1c-7fda-4d8d-aa8d-769c4bdf7803',
],
'current_session_id':'fea2ade1-db0a-4c90-93e7-c64a877ce83e',
'auth_type':'sms_auth'
}
}
```
2018-04-10 13:30:52 +01:00
|
|
|
def _get_user(self, user_id):
|
|
|
|
|
return self.get("/user/{}".format(user_id))
|
2016-01-20 15:13:15 +00:00
|
|
|
|
2016-02-23 12:47:48 +00:00
|
|
|
def get_user_by_email(self, email_address):
|
2016-03-17 13:07:52 +00:00
|
|
|
user_data = self.get('/user/email', params={'email': email_address})
|
2016-02-23 12:47:48 +00:00
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
|
|
|
|
|
2016-03-21 11:48:16 +00:00
|
|
|
def get_user_by_email_or_none(self, email_address):
|
|
|
|
|
try:
|
|
|
|
|
return self.get_user_by_email(email_address)
|
|
|
|
|
except HTTPError as e:
|
2016-04-29 09:38:59 +01:00
|
|
|
if e.status_code == 404:
|
2016-03-21 11:48:16 +00:00
|
|
|
return None
|
|
|
|
|
|
2016-01-21 11:33:53 +00:00
|
|
|
def get_users(self):
|
2016-01-22 09:22:18 +00:00
|
|
|
users_data = self.get("/user")['data']
|
2016-01-21 11:33:53 +00:00
|
|
|
users = []
|
|
|
|
|
for user in users_data:
|
2016-01-22 11:21:30 +00:00
|
|
|
users.append(User(user, max_failed_login_count=self.max_failed_login_count))
|
2016-01-21 11:33:53 +00:00
|
|
|
return users
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2016-11-09 15:06:02 +00:00
|
|
|
def update_user_attribute(self, user_id, **kwargs):
|
|
|
|
|
data = dict(kwargs)
|
|
|
|
|
disallowed_attributes = set(data.keys()) - ALLOWED_ATTRIBUTES
|
|
|
|
|
if disallowed_attributes:
|
|
|
|
|
raise TypeError('Not allowed to update user attributes: {}'.format(
|
|
|
|
|
", ".join(disallowed_attributes)
|
|
|
|
|
))
|
|
|
|
|
|
2016-11-03 11:20:24 +00:00
|
|
|
data = dict(**kwargs)
|
2016-11-10 12:10:01 +00:00
|
|
|
url = "/user/{}".format(user_id)
|
|
|
|
|
user_data = self.post(url, data=data)
|
2016-01-22 11:21:30 +00:00
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
2016-01-20 15:13:15 +00:00
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2017-02-28 14:41:31 +00:00
|
|
|
def reset_failed_login_count(self, user_id):
|
|
|
|
|
url = "/user/{}/reset-failed-login-count".format(user_id)
|
|
|
|
|
user_data = self.post(url, data={})
|
|
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2017-02-07 13:31:46 +00:00
|
|
|
def update_password(self, user_id, password):
|
|
|
|
|
data = {"_password": password}
|
|
|
|
|
url = "/user/{}/update-password".format(user_id)
|
|
|
|
|
user_data = self.post(url, data=data)
|
|
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2016-01-27 17:26:22 +00:00
|
|
|
def verify_password(self, user_id, password):
|
2016-01-21 11:33:53 +00:00
|
|
|
try:
|
2016-01-27 17:26:22 +00:00
|
|
|
url = "/user/{}/verify/password".format(user_id)
|
|
|
|
|
data = {"password": password}
|
2016-01-27 17:13:56 +00:00
|
|
|
self.post(url, data=data)
|
|
|
|
|
return True
|
2016-01-21 11:33:53 +00:00
|
|
|
except HTTPError as e:
|
|
|
|
|
if e.status_code == 400 or e.status_code == 404:
|
|
|
|
|
return False
|
|
|
|
|
|
2017-11-07 16:11:31 +00:00
|
|
|
def send_verify_code(self, user_id, code_type, to, next_string=None):
|
2016-02-22 12:33:59 +00:00
|
|
|
data = {'to': to}
|
2017-11-07 16:11:31 +00:00
|
|
|
if next_string:
|
|
|
|
|
data['next'] = next_string
|
2018-02-09 15:01:20 +00:00
|
|
|
if code_type == 'email':
|
|
|
|
|
data['email_auth_link_host'] = self.admin_url
|
2016-02-19 16:08:44 +00:00
|
|
|
endpoint = '/user/{0}/{1}-code'.format(user_id, code_type)
|
2016-03-17 13:07:52 +00:00
|
|
|
self.post(endpoint, data=data)
|
|
|
|
|
|
|
|
|
|
def send_verify_email(self, user_id, to):
|
|
|
|
|
data = {'to': to}
|
|
|
|
|
endpoint = '/user/{0}/email-verification'.format(user_id)
|
|
|
|
|
self.post(endpoint, data=data)
|
2016-01-27 12:22:32 +00:00
|
|
|
|
2016-07-12 11:53:30 +01:00
|
|
|
def send_already_registered_email(self, user_id, to):
|
2016-07-08 11:00:23 +01:00
|
|
|
data = {'email': to}
|
|
|
|
|
endpoint = '/user/{0}/email-already-registered'.format(user_id)
|
|
|
|
|
self.post(endpoint, data=data)
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2016-01-27 12:22:32 +00:00
|
|
|
def check_verify_code(self, user_id, code, code_type):
|
|
|
|
|
data = {'code_type': code_type, 'code': code}
|
|
|
|
|
endpoint = '/user/{}/verify/code'.format(user_id)
|
|
|
|
|
try:
|
2017-02-24 16:21:41 +00:00
|
|
|
self.post(endpoint, data=data)
|
2016-01-27 12:22:32 +00:00
|
|
|
return True, ''
|
|
|
|
|
except HTTPError as e:
|
|
|
|
|
if e.status_code == 400 or e.status_code == 404:
|
2019-01-15 16:32:26 +00:00
|
|
|
return False, e.message
|
2016-01-27 12:22:32 +00:00
|
|
|
raise e
|
|
|
|
|
|
2016-02-23 17:51:09 +00:00
|
|
|
def get_users_for_service(self, service_id):
|
|
|
|
|
endpoint = '/service/{}/users'.format(service_id)
|
|
|
|
|
resp = self.get(endpoint)
|
2016-03-01 10:45:13 +00:00
|
|
|
return [User(data) for data in resp['data']]
|
2016-02-29 17:35:21 +00:00
|
|
|
|
2018-02-21 10:18:56 +00:00
|
|
|
def get_count_of_users_with_permission(self, service_id, permission):
|
2018-03-09 10:47:23 +00:00
|
|
|
if permission not in roles.keys():
|
|
|
|
|
raise TypeError('{} is not a valid permission'.format(permission))
|
2018-02-21 10:18:56 +00:00
|
|
|
return len([
|
|
|
|
|
user for user in self.get_users_for_service(service_id)
|
2018-02-28 18:13:29 +00:00
|
|
|
if user.has_permission_for_service(service_id, permission)
|
2018-02-21 10:18:56 +00:00
|
|
|
])
|
|
|
|
|
|
2018-02-19 16:53:29 +00:00
|
|
|
def get_users_for_organisation(self, org_id):
|
|
|
|
|
endpoint = '/organisations/{}/users'.format(org_id)
|
|
|
|
|
resp = self.get(endpoint)
|
|
|
|
|
return [User(data) for data in resp['data']]
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('service-{service_id}')
|
|
|
|
|
@cache.delete('user-{user_id}')
|
2016-03-03 17:53:16 +00:00
|
|
|
def add_user_to_service(self, service_id, user_id, permissions):
|
2018-02-28 15:37:49 +00:00
|
|
|
# permissions passed in are the combined admin roles, not db permissions
|
2016-02-29 17:35:21 +00:00
|
|
|
endpoint = '/service/{}/users/{}'.format(service_id, user_id)
|
2018-02-28 15:37:49 +00:00
|
|
|
data = [{'permission': x} for x in translate_permissions_from_admin_roles_to_db(permissions)]
|
2018-03-01 16:59:01 +00:00
|
|
|
self.post(endpoint, data=data)
|
2016-03-03 10:24:49 +00:00
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2018-02-19 16:53:29 +00:00
|
|
|
def add_user_to_organisation(self, org_id, user_id):
|
|
|
|
|
resp = self.post('/organisations/{}/users/{}'.format(org_id, user_id), data={})
|
|
|
|
|
return User(resp['data'], max_failed_login_count=self.max_failed_login_count)
|
|
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
2016-03-03 10:24:49 +00:00
|
|
|
def set_user_permissions(self, user_id, service_id, permissions):
|
2018-02-28 15:37:49 +00:00
|
|
|
# permissions passed in are the combined admin roles, not db permissions
|
|
|
|
|
data = [{'permission': x} for x in translate_permissions_from_admin_roles_to_db(permissions)]
|
2016-03-03 10:24:49 +00:00
|
|
|
endpoint = '/user/{}/service/{}/permission'.format(user_id, service_id)
|
2016-03-07 18:18:52 +00:00
|
|
|
self.post(endpoint, data=data)
|
|
|
|
|
|
|
|
|
|
def send_reset_password_url(self, email_address):
|
|
|
|
|
endpoint = '/user/reset-password'
|
|
|
|
|
data = {'email': email_address}
|
|
|
|
|
self.post(endpoint, data=data)
|
2016-03-17 13:07:52 +00:00
|
|
|
|
2018-07-06 16:16:21 +01:00
|
|
|
def find_users_by_full_or_partial_email(self, email_address):
|
|
|
|
|
endpoint = '/user/find-users-by-email'
|
|
|
|
|
data = {'email': email_address}
|
|
|
|
|
users = self.post(endpoint, data=data)
|
|
|
|
|
return users
|
|
|
|
|
|
2018-02-19 16:53:29 +00:00
|
|
|
def is_email_already_in_use(self, email_address):
|
2016-03-21 11:48:16 +00:00
|
|
|
if self.get_user_by_email_or_none(email_address):
|
2018-02-19 16:53:29 +00:00
|
|
|
return True
|
|
|
|
|
return False
|
2016-03-17 13:07:52 +00:00
|
|
|
|
|
|
|
|
def activate_user(self, user):
|
2016-09-09 15:22:56 +01:00
|
|
|
if user.state == 'pending':
|
Cache `GET /user` response in Redis
In the same way, and for the same reasons that we’re caching the service
object.
Here’s a sample of the data returned by the API – so we should make sure
that any changes to this data invalidate the cache.
If we ever change a user’s phone number (for example) directly in the
database, then we will need to invalidate this cache manually.
```python
{
'data':{
'organisations':[
'4c707b81-4c6d-4d33-9376-17f0de6e0405'
],
'logged_in_at':'2018-04-10T11:41:03.781990Z',
'id':'2c45486e-177e-40b8-997d-5f4f81a461ca',
'email_address':'test@example.gov.uk',
'platform_admin':False,
'password_changed_at':'2018-01-01 10:10:10.100000',
'permissions':{
'42a9d4f2-1444-4e22-9133-52d9e406213f':[
'manage_api_keys',
'send_letters',
'manage_users',
'manage_templates',
'view_activity',
'send_texts',
'send_emails',
'manage_settings'
],
'a928eef8-0f25-41ca-b480-0447f29b2c20':[
'manage_users',
'manage_templates',
'manage_settings',
'send_texts',
'send_emails',
'send_letters',
'manage_api_keys',
'view_activity'
],
},
'state':'active',
'mobile_number':'07700900123',
'failed_login_count':0,
'name':'Example',
'services':[
'6078a8c0-52f5-4c4f-b724-d7d1ff2d3884',
'6afe3c1c-7fda-4d8d-aa8d-769c4bdf7803',
],
'current_session_id':'fea2ade1-db0a-4c90-93e7-c64a877ce83e',
'auth_type':'sms_auth'
}
}
```
2018-04-10 13:30:52 +01:00
|
|
|
user_data = self._activate_user(user.id)
|
2017-11-09 12:30:12 +00:00
|
|
|
return User(user_data['data'], max_failed_login_count=self.max_failed_login_count)
|
2016-09-09 15:22:56 +01:00
|
|
|
else:
|
|
|
|
|
return user
|
2016-10-13 17:05:37 +01:00
|
|
|
|
2018-04-20 16:32:02 +01:00
|
|
|
@cache.delete('user-{user_id}')
|
Cache `GET /user` response in Redis
In the same way, and for the same reasons that we’re caching the service
object.
Here’s a sample of the data returned by the API – so we should make sure
that any changes to this data invalidate the cache.
If we ever change a user’s phone number (for example) directly in the
database, then we will need to invalidate this cache manually.
```python
{
'data':{
'organisations':[
'4c707b81-4c6d-4d33-9376-17f0de6e0405'
],
'logged_in_at':'2018-04-10T11:41:03.781990Z',
'id':'2c45486e-177e-40b8-997d-5f4f81a461ca',
'email_address':'test@example.gov.uk',
'platform_admin':False,
'password_changed_at':'2018-01-01 10:10:10.100000',
'permissions':{
'42a9d4f2-1444-4e22-9133-52d9e406213f':[
'manage_api_keys',
'send_letters',
'manage_users',
'manage_templates',
'view_activity',
'send_texts',
'send_emails',
'manage_settings'
],
'a928eef8-0f25-41ca-b480-0447f29b2c20':[
'manage_users',
'manage_templates',
'manage_settings',
'send_texts',
'send_emails',
'send_letters',
'manage_api_keys',
'view_activity'
],
},
'state':'active',
'mobile_number':'07700900123',
'failed_login_count':0,
'name':'Example',
'services':[
'6078a8c0-52f5-4c4f-b724-d7d1ff2d3884',
'6afe3c1c-7fda-4d8d-aa8d-769c4bdf7803',
],
'current_session_id':'fea2ade1-db0a-4c90-93e7-c64a877ce83e',
'auth_type':'sms_auth'
}
}
```
2018-04-10 13:30:52 +01:00
|
|
|
def _activate_user(self, user_id):
|
|
|
|
|
return self.post("/user/{}/activate".format(user_id), data=None)
|
|
|
|
|
|
2016-10-13 17:05:37 +01:00
|
|
|
def send_change_email_verification(self, user_id, new_email):
|
|
|
|
|
endpoint = '/user/{}/change-email-verification'.format(user_id)
|
|
|
|
|
data = {'email': new_email}
|
|
|
|
|
self.post(endpoint, data)
|
2018-03-07 18:10:14 +00:00
|
|
|
|
|
|
|
|
def get_organisations_and_services_for_user(self, user):
|
|
|
|
|
endpoint = '/user/{}/organisations-and-services'.format(user.id)
|
|
|
|
|
return self.get(endpoint)
|
2018-07-19 12:30:04 +01:00
|
|
|
|
|
|
|
|
def get_services_for_user(self, user):
|
|
|
|
|
orgs_and_services_for_user = self.get_organisations_and_services_for_user(user)
|
2018-08-09 13:33:08 +01:00
|
|
|
all_services = orgs_and_services_for_user['services_without_organisations'] + next(chain(
|
2018-07-19 12:30:04 +01:00
|
|
|
org['services'] for org in orgs_and_services_for_user['organisations']
|
|
|
|
|
), [])
|
2018-08-09 13:33:08 +01:00
|
|
|
return sorted(all_services, key=lambda service: service['name'])
|
2018-07-19 12:30:04 +01:00
|
|
|
|
2018-12-12 12:22:38 +00:00
|
|
|
def user_has_live_services(self, user):
|
2018-12-13 10:37:44 +00:00
|
|
|
return any(
|
|
|
|
|
not service['restricted'] for service in self.get_services_for_user(user)
|
2018-12-12 12:22:38 +00:00
|
|
|
)
|
|
|
|
|
|
2018-07-19 12:30:04 +01:00
|
|
|
def get_service_ids_for_user(self, user):
|
|
|
|
|
return {
|
|
|
|
|
service['id'] for service in self.get_services_for_user(user)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
def user_belongs_to_service(self, user, service_id):
|
2019-01-07 14:49:33 +00:00
|
|
|
return str(service_id) in self.get_service_ids_for_user(user)
|
2018-10-26 15:39:32 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
user_api_client = UserApiClient()
|