aboutsummaryrefslogtreecommitdiff
path: root/api/auth/token.py
blob: e94b01444b8f2b84a019a72f7c9cd1eb3d9d149d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
from db import cursor, connection
import hashlib
import secrets
import json
import time


# get valid token hashes for a given user_id
def valid_tokens(user_id):
	tokens = json.loads(
		cursor.execute(
			"select valid_tokens from users where user_id = ?", [user_id]
		).fetchone()[0]
	)
	# return only tokens that aren't expired
	return [
		token for token in tokens
		if token["expirationDate"] > int(time.time() * 1000)
	]


def validate_token(user_id, token):
	tokens = valid_tokens(user_id)
	return hashlib.sha256(str(token).encode()).hexdigest() in [
		t["token"] for t in tokens
		if t["expirationDate"] > int(time.time() * 1000)
	]


def modify_tokens(user_id, formatted_token, remove):
	temp_tokens = valid_tokens(user_id)
	temp_tokens.remove(formatted_token
						) if remove else temp_tokens.append(formatted_token)
	cursor.execute(
		"update users set valid_tokens = ? where user_id = ?",
		[json.dumps(temp_tokens), user_id]
	)
	connection.commit()


def add_token(user_id, formatted_token):
	modify_tokens(user_id, formatted_token, False)


def revoke_token(user_id, formatted_token):
	modify_tokens(user_id, formatted_token, True)


def hash_token(token):
	return {
		"token": hashlib.sha256(str(token["token"]).encode()).hexdigest(),
		"expirationDate": token["expirationDate"]
	}


def generate_token():
	return {
		"token": secrets.token_hex(128),
		"expirationDate": int(time.time() * 1000) + (24 * 60 * 60 * 1000)
	}