summaryrefslogtreecommitdiffstats
path: root/accounts/__init__.py
blob: afa348b1d4f561558b675b953102a35744b933d2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# -*- coding: utf-8 -*-

import account
import ldap
import os
from flask import Flask, g, session
from utils import *

from views import default, admin


app = Flask(__name__)
app.register_blueprint(default.bp)
app.register_blueprint(admin.bp, url_prefix='/admin')
app.config.from_object('accounts.default_settings')
if 'SPLINE_ACCOUNT_WEB_SETTINGS' in os.environ:
    app.config.from_envvar('SPLINE_ACCOUNT_WEB_SETTINGS')

app.all_services = account.SERVICES #TODO: take that from our json file or so
app.user_backend = get_backend(app.config['USER_BACKEND'], app)
app.mail_backend = get_backend(app.config['MAIL_BACKEND'], app)

app.username_blacklist = list()
if app.config.get('USERNAME_BLACKLIST_FILE'):
    with open(app.config['USERNAME_BLACKLIST_FILE']) as f:
        app.username_blacklist = f.read().split('\n')

@app.before_request
def session_permanent():
    if app.config.get('PERMANENT_SESSION_LIFETIME'):
        session.permanent = True
    else:
        session.permanent = False

@app.before_request
def initialize_user():
    g.user = None

    if 'username' in session and 'password' in session:
        username = ensure_utf8(session['username'])
        password = ensure_utf8(decrypt_password(session['password']))
        try:
            g.user = current_app.user_backend.auth(username, password)
        except ldap.INVALID_CREDENTIALS:
            # we had crap in the session, delete it
            logout_user()