Improved code readability
This commit is contained in:
parent
0e28559149
commit
0cd57c0973
@ -1,10 +1,10 @@
|
|||||||
|
from dotenv import load_dotenv
|
||||||
from flask import Flask
|
from flask import Flask
|
||||||
from flask_jwt_extended import JWTManager
|
from flask_jwt_extended import JWTManager
|
||||||
from models import db, init_db
|
from models import db
|
||||||
from user_views import user_bp
|
|
||||||
from task_views import task_bp
|
|
||||||
from dotenv import load_dotenv
|
|
||||||
import os
|
import os
|
||||||
|
from task_views import task_bp
|
||||||
|
from user_views import user_bp, init_db
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
load_dotenv()
|
load_dotenv()
|
||||||
|
@ -1,19 +1,7 @@
|
|||||||
from flask_sqlalchemy import SQLAlchemy
|
from flask_sqlalchemy import SQLAlchemy
|
||||||
from werkzeug.security import generate_password_hash
|
|
||||||
import os
|
|
||||||
|
|
||||||
db = SQLAlchemy()
|
db = SQLAlchemy()
|
||||||
|
|
||||||
def init_db():
|
|
||||||
"""Create default admin account if database is empty"""
|
|
||||||
with db.session.begin():
|
|
||||||
if not User.query.first(): # Check if user table is empty
|
|
||||||
admin_password = os.getenv("TODOLIST_ADMIN_PASSWORD", "admin")
|
|
||||||
hashed_password = generate_password_hash(admin_password)
|
|
||||||
admin = User(username='admin', email='admin@example.pl', password=hashed_password, role='Administrator')
|
|
||||||
db.session.add(admin)
|
|
||||||
db.session.commit()
|
|
||||||
|
|
||||||
class User(db.Model):
|
class User(db.Model):
|
||||||
id = db.Column(db.Integer, primary_key=True, autoincrement=True)
|
id = db.Column(db.Integer, primary_key=True, autoincrement=True)
|
||||||
username = db.Column(db.String(20), unique=True, nullable=False)
|
username = db.Column(db.String(20), unique=True, nullable=False)
|
||||||
|
@ -6,28 +6,9 @@ from user_views import admin_required, validate_access
|
|||||||
|
|
||||||
task_bp = Blueprint('task_bp', __name__)
|
task_bp = Blueprint('task_bp', __name__)
|
||||||
|
|
||||||
|
# ============================================================
|
||||||
@task_bp.errorhandler(403)
|
# 🚀 1️⃣ API ENDPOINTS (ROUTES)
|
||||||
def forbidden_error(error):
|
# ============================================================
|
||||||
response = jsonify(error.description)
|
|
||||||
response.status_code = 403
|
|
||||||
return response
|
|
||||||
|
|
||||||
|
|
||||||
@task_bp.errorhandler(404)
|
|
||||||
def not_found_error(error):
|
|
||||||
response = jsonify(error.description)
|
|
||||||
response.status_code = 404
|
|
||||||
return response
|
|
||||||
|
|
||||||
|
|
||||||
def check_if_task_exists(task):
|
|
||||||
# Check if task exists or user has permissions to see it
|
|
||||||
if task is None:
|
|
||||||
abort(404, {'error': 'Task not found.'})
|
|
||||||
user_id = task.user_id
|
|
||||||
validate_access(user_id)
|
|
||||||
|
|
||||||
|
|
||||||
@task_bp.route('/tasks', methods=['GET'])
|
@task_bp.route('/tasks', methods=['GET'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
@ -101,3 +82,33 @@ def delete_task(task_id):
|
|||||||
db.session.delete(task)
|
db.session.delete(task)
|
||||||
db.session.commit()
|
db.session.commit()
|
||||||
return jsonify({})
|
return jsonify({})
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================
|
||||||
|
# 🔧 2️⃣ UTILITIES
|
||||||
|
# ============================================================
|
||||||
|
|
||||||
|
def check_if_task_exists(task):
|
||||||
|
# Check if task exists or user has permissions to see it
|
||||||
|
if task is None:
|
||||||
|
abort(404, {'error': 'Task not found.'})
|
||||||
|
user_id = task.user_id
|
||||||
|
validate_access(user_id)
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================
|
||||||
|
# ❌ 3️⃣ ERROR HANDLERS
|
||||||
|
# ============================================================
|
||||||
|
|
||||||
|
@task_bp.errorhandler(403)
|
||||||
|
def forbidden_error(error):
|
||||||
|
response = jsonify(error.description)
|
||||||
|
response.status_code = 403
|
||||||
|
return response
|
||||||
|
|
||||||
|
|
||||||
|
@task_bp.errorhandler(404)
|
||||||
|
def not_found_error(error):
|
||||||
|
response = jsonify(error.description)
|
||||||
|
response.status_code = 404
|
||||||
|
return response
|
@ -1,27 +1,14 @@
|
|||||||
from flask import Blueprint, jsonify, request, abort
|
from flask import Blueprint, jsonify, request, abort
|
||||||
from flask_jwt_extended import create_access_token, set_access_cookies, jwt_required, verify_jwt_in_request, get_jwt_identity, unset_jwt_cookies
|
from flask_jwt_extended import create_access_token, set_access_cookies, jwt_required, verify_jwt_in_request, get_jwt_identity, unset_jwt_cookies
|
||||||
from models import User, db
|
from models import User, db
|
||||||
|
import os
|
||||||
from werkzeug.security import check_password_hash, generate_password_hash
|
from werkzeug.security import check_password_hash, generate_password_hash
|
||||||
|
|
||||||
user_bp = Blueprint('user_bp', __name__)
|
user_bp = Blueprint('user_bp', __name__)
|
||||||
|
|
||||||
def admin_required(user_id, message='Access denied.'):
|
# ============================================================
|
||||||
user = User.query.get(user_id)
|
# 🚀 1. API ENDPOINTS (ROUTES)
|
||||||
if user is None or user.role != "Administrator":
|
# ============================================================
|
||||||
abort(403, {'error': message})
|
|
||||||
|
|
||||||
def validate_access(owner_id, message='Access denied.'):
|
|
||||||
# Check if user try to access or edit resource that does not belong to them
|
|
||||||
logged_user_id = int(get_jwt_identity())
|
|
||||||
logged_user_role = User.query.get(logged_user_id).role
|
|
||||||
if logged_user_role != "Administrator" and logged_user_id != owner_id:
|
|
||||||
abort(403, {'error': message})
|
|
||||||
|
|
||||||
@user_bp.errorhandler(403)
|
|
||||||
def forbidden_error(error):
|
|
||||||
response = jsonify(error.description)
|
|
||||||
response.status_code = 403
|
|
||||||
return response
|
|
||||||
|
|
||||||
@user_bp.route('/users', methods=['GET'])
|
@user_bp.route('/users', methods=['GET'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
@ -30,6 +17,7 @@ def get_all_users():
|
|||||||
users = User.query.all()
|
users = User.query.all()
|
||||||
return jsonify([user.to_dict() for user in users])
|
return jsonify([user.to_dict() for user in users])
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/users/<int:user_id>', methods=['GET'])
|
@user_bp.route('/users/<int:user_id>', methods=['GET'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
def get_user(user_id):
|
def get_user(user_id):
|
||||||
@ -37,6 +25,7 @@ def get_user(user_id):
|
|||||||
user = User.query.get_or_404(user_id)
|
user = User.query.get_or_404(user_id)
|
||||||
return jsonify(user.to_dict())
|
return jsonify(user.to_dict())
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/users', methods=['POST'])
|
@user_bp.route('/users', methods=['POST'])
|
||||||
def create_user():
|
def create_user():
|
||||||
data = request.get_json()
|
data = request.get_json()
|
||||||
@ -50,6 +39,7 @@ def create_user():
|
|||||||
db.session.commit()
|
db.session.commit()
|
||||||
return jsonify(user.to_dict()), 201
|
return jsonify(user.to_dict()), 201
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/users/<int:user_id>', methods=['PUT'])
|
@user_bp.route('/users/<int:user_id>', methods=['PUT'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
def edit_user(user_id):
|
def edit_user(user_id):
|
||||||
@ -66,6 +56,7 @@ def edit_user(user_id):
|
|||||||
else:
|
else:
|
||||||
return abort(400, {'error': 'Incomplete user data.'})
|
return abort(400, {'error': 'Incomplete user data.'})
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/users/<int:user_id>', methods=['DELETE'])
|
@user_bp.route('/users/<int:user_id>', methods=['DELETE'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
def remove_user(user_id):
|
def remove_user(user_id):
|
||||||
@ -75,6 +66,7 @@ def remove_user(user_id):
|
|||||||
db.session.commit()
|
db.session.commit()
|
||||||
return jsonify({"msg": "User removed successfully."})
|
return jsonify({"msg": "User removed successfully."})
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/login', methods=['POST'])
|
@user_bp.route('/login', methods=['POST'])
|
||||||
def user_login():
|
def user_login():
|
||||||
request_data = request.get_json()
|
request_data = request.get_json()
|
||||||
@ -95,9 +87,50 @@ def user_login():
|
|||||||
else:
|
else:
|
||||||
return jsonify({"msg": "User failed login."}), 401
|
return jsonify({"msg": "User failed login."}), 401
|
||||||
|
|
||||||
|
|
||||||
@user_bp.route('/logout', methods=['GET'])
|
@user_bp.route('/logout', methods=['GET'])
|
||||||
@jwt_required()
|
@jwt_required()
|
||||||
def user_logout():
|
def user_logout():
|
||||||
response = jsonify({"msg": "User logged out successfully."})
|
response = jsonify({"msg": "User logged out successfully."})
|
||||||
unset_jwt_cookies(response)
|
unset_jwt_cookies(response)
|
||||||
return response
|
return response
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================
|
||||||
|
# 🔧 2. UTILITIES
|
||||||
|
# ============================================================
|
||||||
|
|
||||||
|
def admin_required(user_id, message='Access denied.'):
|
||||||
|
user = User.query.get(user_id)
|
||||||
|
if user is None or user.role != "Administrator":
|
||||||
|
abort(403, {'error': message})
|
||||||
|
|
||||||
|
|
||||||
|
def validate_access(owner_id, message='Access denied.'):
|
||||||
|
# Check if user try to access or edit resource that does not belong to them
|
||||||
|
logged_user_id = int(get_jwt_identity())
|
||||||
|
logged_user_role = User.query.get(logged_user_id).role
|
||||||
|
if logged_user_role != "Administrator" and logged_user_id != owner_id:
|
||||||
|
abort(403, {'error': message})
|
||||||
|
|
||||||
|
|
||||||
|
def init_db():
|
||||||
|
"""Create default admin account if database is empty"""
|
||||||
|
with db.session.begin():
|
||||||
|
if not User.query.first(): # Check if user table is empty
|
||||||
|
admin_password = os.getenv("TODOLIST_ADMIN_PASSWORD", "admin")
|
||||||
|
hashed_password = generate_password_hash(admin_password)
|
||||||
|
admin = User(username='admin', email='admin@example.pl', password=hashed_password, role='Administrator')
|
||||||
|
db.session.add(admin)
|
||||||
|
db.session.commit()
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================
|
||||||
|
# ❌ 3. ERROR HANDLERS
|
||||||
|
# ============================================================
|
||||||
|
|
||||||
|
@user_bp.errorhandler(403)
|
||||||
|
def forbidden_error(error):
|
||||||
|
response = jsonify(error.description)
|
||||||
|
response.status_code = 403
|
||||||
|
return response
|
||||||
|
Loading…
x
Reference in New Issue
Block a user