Skip to content

Commit

Permalink
Bump Codebase & UI
Browse files Browse the repository at this point in the history
  • Loading branch information
App Generator committed Oct 22, 2021
1 parent 928ce57 commit 287e0d6
Show file tree
Hide file tree
Showing 369 changed files with 53,879 additions and 0 deletions.
5 changes: 5 additions & 0 deletions .dockerignore
@@ -0,0 +1,5 @@
.git
__pycache__
*.pyc
*.pyo
*.pyd
8 changes: 8 additions & 0 deletions .env
@@ -0,0 +1,8 @@
DEBUG=True
SECRET_KEY=S3cr3t_K#Key
DB_ENGINE=postgresql
DB_NAME=appseed-flask
DB_HOST=localhost
DB_PORT=5432
DB_USERNAME=appseed
DB_PASS=pass
33 changes: 33 additions & 0 deletions .gitignore
@@ -0,0 +1,33 @@
# byte-compiled / optimized / DLL files
__pycache__/
*.py[cod]

# tests and coverage
*.pytest_cache
.coverage

# database & logs
*.db
*.sqlite3
*.log

# venv
env
venv

# other
.DS_Store

# sphinx docs
_build
_static
_templates

# javascript
package-lock.json
.vscode/symbols.json

apps/static/assets/node_modules
apps/static/assets/yarn.lock
apps/static/assets/.temp

14 changes: 14 additions & 0 deletions Dockerfile
@@ -0,0 +1,14 @@
FROM python:3.9

COPY . .

# set environment variables
ENV PYTHONDONTWRITEBYTECODE 1
ENV PYTHONUNBUFFERED 1

# install python dependencies
RUN pip install --upgrade pip
RUN pip install --no-cache-dir -r requirements.txt

# gunicorn
CMD ["gunicorn", "--config", "gunicorn-cfg.py", "run:app"]
1 change: 1 addition & 0 deletions Procfile
@@ -0,0 +1 @@
web: gunicorn run:app --log-file=-
44 changes: 44 additions & 0 deletions apps/__init__.py
@@ -0,0 +1,44 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

from flask import Flask
from flask_login import LoginManager
from flask_sqlalchemy import SQLAlchemy
from importlib import import_module


db = SQLAlchemy()
login_manager = LoginManager()


def register_extensions(app):
db.init_app(app)
login_manager.init_app(app)


def register_blueprints(app):
for module_name in ('authentication', 'home'):
module = import_module('apps.{}.routes'.format(module_name))
app.register_blueprint(module.blueprint)


def configure_database(app):

@app.before_first_request
def initialize_database():
db.create_all()

@app.teardown_request
def shutdown_session(exception=None):
db.session.remove()


def create_app(config):
app = Flask(__name__)
app.config.from_object(config)
register_extensions(app)
register_blueprints(app)
configure_database(app)
return app
12 changes: 12 additions & 0 deletions apps/authentication/__init__.py
@@ -0,0 +1,12 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

from flask import Blueprint

blueprint = Blueprint(
'authentication_blueprint',
__name__,
url_prefix=''
)
31 changes: 31 additions & 0 deletions apps/authentication/forms.py
@@ -0,0 +1,31 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

from flask_wtf import FlaskForm
from wtforms import TextField, PasswordField
from wtforms.validators import Email, DataRequired

# login and registration


class LoginForm(FlaskForm):
username = TextField('Username',
id='username_login',
validators=[DataRequired()])
password = PasswordField('Password',
id='pwd_login',
validators=[DataRequired()])


class CreateAccountForm(FlaskForm):
username = TextField('Username',
id='username_create',
validators=[DataRequired()])
email = TextField('Email',
id='email_create',
validators=[DataRequired(), Email()])
password = PasswordField('Password',
id='pwd_create',
validators=[DataRequired()])
48 changes: 48 additions & 0 deletions apps/authentication/models.py
@@ -0,0 +1,48 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

from flask_login import UserMixin

from apps import db, login_manager

from apps.authentication.util import hash_pass

class Users(db.Model, UserMixin):

__tablename__ = 'Users'

id = db.Column(db.Integer, primary_key=True)
username = db.Column(db.String(64), unique=True)
email = db.Column(db.String(64), unique=True)
password = db.Column(db.LargeBinary)

def __init__(self, **kwargs):
for property, value in kwargs.items():
# depending on whether value is an iterable or not, we must
# unpack it's value (when **kwargs is request.form, some values
# will be a 1-element list)
if hasattr(value, '__iter__') and not isinstance(value, str):
# the ,= unpack of a singleton fails PEP8 (travis flake8 test)
value = value[0]

if property == 'password':
value = hash_pass(value) # we need bytes here (not plain str)

setattr(self, property, value)

def __repr__(self):
return str(self.username)


@login_manager.user_loader
def user_loader(id):
return Users.query.filter_by(id=id).first()


@login_manager.request_loader
def request_loader(request):
username = request.form.get('username')
user = Users.query.filter_by(username=username).first()
return user if user else None
120 changes: 120 additions & 0 deletions apps/authentication/routes.py
@@ -0,0 +1,120 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

from flask import render_template, redirect, request, url_for
from flask_login import (
current_user,
login_user,
logout_user
)

from apps import db, login_manager
from apps.authentication import blueprint
from apps.authentication.forms import LoginForm, CreateAccountForm
from apps.authentication.models import Users

from apps.authentication.util import verify_pass


@blueprint.route('/')
def route_default():
return redirect(url_for('authentication_blueprint.login'))


# Login & Registration

@blueprint.route('/login', methods=['GET', 'POST'])
def login():
login_form = LoginForm(request.form)
if 'login' in request.form:

# read form data
username = request.form['username']
password = request.form['password']

# Locate user
user = Users.query.filter_by(username=username).first()

# Check the password
if user and verify_pass(password, user.password):

login_user(user)
return redirect(url_for('authentication_blueprint.route_default'))

# Something (user or pass) is not ok
return render_template('accounts/login.html',
msg='Wrong user or password',
form=login_form)

if not current_user.is_authenticated:
return render_template('accounts/login.html',
form=login_form)
return redirect(url_for('home_blueprint.index'))


@blueprint.route('/register', methods=['GET', 'POST'])
def register():
create_account_form = CreateAccountForm(request.form)
if 'register' in request.form:

username = request.form['username']
email = request.form['email']

# Check usename exists
user = Users.query.filter_by(username=username).first()
if user:
return render_template('accounts/register.html',
msg='Username already registered',
success=False,
form=create_account_form)

# Check email exists
user = Users.query.filter_by(email=email).first()
if user:
return render_template('accounts/register.html',
msg='Email already registered',
success=False,
form=create_account_form)

# else we can create the user
user = Users(**request.form)
db.session.add(user)
db.session.commit()

return render_template('accounts/register.html',
msg='User created please <a href="/login">login</a>',
success=True,
form=create_account_form)

else:
return render_template('accounts/register.html', form=create_account_form)


@blueprint.route('/logout')
def logout():
logout_user()
return redirect(url_for('authentication_blueprint.login'))


# Errors

@login_manager.unauthorized_handler
def unauthorized_handler():
return render_template('home/page-403.html'), 403


@blueprint.errorhandler(403)
def access_forbidden(error):
return render_template('home/page-403.html'), 403


@blueprint.errorhandler(404)
def not_found_error(error):
return render_template('home/page-404.html'), 404


@blueprint.errorhandler(500)
def internal_error(error):
return render_template('home/page-500.html'), 500
34 changes: 34 additions & 0 deletions apps/authentication/util.py
@@ -0,0 +1,34 @@
# -*- encoding: utf-8 -*-
"""
Copyright (c) 2019 - present AppSeed.us
"""

import os
import hashlib
import binascii

# Inspiration -> https://www.vitoshacademy.com/hashing-passwords-in-python/


def hash_pass(password):
"""Hash a password for storing."""

salt = hashlib.sha256(os.urandom(60)).hexdigest().encode('ascii')
pwdhash = hashlib.pbkdf2_hmac('sha512', password.encode('utf-8'),
salt, 100000)
pwdhash = binascii.hexlify(pwdhash)
return (salt + pwdhash) # return bytes


def verify_pass(provided_password, stored_password):
"""Verify a stored password against one provided by user"""

stored_password = stored_password.decode('ascii')
salt = stored_password[:64]
stored_password = stored_password[64:]
pwdhash = hashlib.pbkdf2_hmac('sha512',
provided_password.encode('utf-8'),
salt.encode('ascii'),
100000)
pwdhash = binascii.hexlify(pwdhash).decode('ascii')
return pwdhash == stored_password

0 comments on commit 287e0d6

Please sign in to comment.