summaryrefslogtreecommitdiff
path: root/addons/auth_signup/controllers
diff options
context:
space:
mode:
authorstephanchrst <stephanchrst@gmail.com>2022-05-10 21:51:50 +0700
committerstephanchrst <stephanchrst@gmail.com>2022-05-10 21:51:50 +0700
commit3751379f1e9a4c215fb6eb898b4ccc67659b9ace (patch)
treea44932296ef4a9b71d5f010906253d8c53727726 /addons/auth_signup/controllers
parent0a15094050bfde69a06d6eff798e9a8ddf2b8c21 (diff)
initial commit 2
Diffstat (limited to 'addons/auth_signup/controllers')
-rw-r--r--addons/auth_signup/controllers/__init__.py3
-rw-r--r--addons/auth_signup/controllers/main.py145
2 files changed, 148 insertions, 0 deletions
diff --git a/addons/auth_signup/controllers/__init__.py b/addons/auth_signup/controllers/__init__.py
new file mode 100644
index 00000000..65a8c120
--- /dev/null
+++ b/addons/auth_signup/controllers/__init__.py
@@ -0,0 +1,3 @@
+# -*- coding: utf-8 -*-
+
+from . import main
diff --git a/addons/auth_signup/controllers/main.py b/addons/auth_signup/controllers/main.py
new file mode 100644
index 00000000..d4eb9ec7
--- /dev/null
+++ b/addons/auth_signup/controllers/main.py
@@ -0,0 +1,145 @@
+# -*- coding: utf-8 -*-
+# Part of Odoo. See LICENSE file for full copyright and licensing details.
+import logging
+import werkzeug
+
+from odoo import http, _
+from odoo.addons.auth_signup.models.res_users import SignupError
+from odoo.addons.web.controllers.main import ensure_db, Home
+from odoo.addons.base_setup.controllers.main import BaseSetup
+from odoo.exceptions import UserError
+from odoo.http import request
+
+_logger = logging.getLogger(__name__)
+
+
+class AuthSignupHome(Home):
+
+ @http.route()
+ def web_login(self, *args, **kw):
+ ensure_db()
+ response = super(AuthSignupHome, self).web_login(*args, **kw)
+ response.qcontext.update(self.get_auth_signup_config())
+ if request.httprequest.method == 'GET' and request.session.uid and request.params.get('redirect'):
+ # Redirect if already logged in and redirect param is present
+ return http.redirect_with_hash(request.params.get('redirect'))
+ return response
+
+ @http.route('/web/signup', type='http', auth='public', website=True, sitemap=False)
+ def web_auth_signup(self, *args, **kw):
+ qcontext = self.get_auth_signup_qcontext()
+
+ if not qcontext.get('token') and not qcontext.get('signup_enabled'):
+ raise werkzeug.exceptions.NotFound()
+
+ if 'error' not in qcontext and request.httprequest.method == 'POST':
+ try:
+ self.do_signup(qcontext)
+ # Send an account creation confirmation email
+ if qcontext.get('token'):
+ User = request.env['res.users']
+ user_sudo = User.sudo().search(
+ User._get_login_domain(qcontext.get('login')), order=User._get_login_order(), limit=1
+ )
+ template = request.env.ref('auth_signup.mail_template_user_signup_account_created', raise_if_not_found=False)
+ if user_sudo and template:
+ template.sudo().send_mail(user_sudo.id, force_send=True)
+ return self.web_login(*args, **kw)
+ except UserError as e:
+ qcontext['error'] = e.args[0]
+ except (SignupError, AssertionError) as e:
+ if request.env["res.users"].sudo().search([("login", "=", qcontext.get("login"))]):
+ qcontext["error"] = _("Another user is already registered using this email address.")
+ else:
+ _logger.error("%s", e)
+ qcontext['error'] = _("Could not create a new account.")
+
+ response = request.render('auth_signup.signup', qcontext)
+ response.headers['X-Frame-Options'] = 'DENY'
+ return response
+
+ @http.route('/web/reset_password', type='http', auth='public', website=True, sitemap=False)
+ def web_auth_reset_password(self, *args, **kw):
+ qcontext = self.get_auth_signup_qcontext()
+
+ if not qcontext.get('token') and not qcontext.get('reset_password_enabled'):
+ raise werkzeug.exceptions.NotFound()
+
+ if 'error' not in qcontext and request.httprequest.method == 'POST':
+ try:
+ if qcontext.get('token'):
+ self.do_signup(qcontext)
+ return self.web_login(*args, **kw)
+ else:
+ login = qcontext.get('login')
+ assert login, _("No login provided.")
+ _logger.info(
+ "Password reset attempt for <%s> by user <%s> from %s",
+ login, request.env.user.login, request.httprequest.remote_addr)
+ request.env['res.users'].sudo().reset_password(login)
+ qcontext['message'] = _("An email has been sent with credentials to reset your password")
+ except UserError as e:
+ qcontext['error'] = e.args[0]
+ except SignupError:
+ qcontext['error'] = _("Could not reset your password")
+ _logger.exception('error when resetting password')
+ except Exception as e:
+ qcontext['error'] = str(e)
+
+ response = request.render('auth_signup.reset_password', qcontext)
+ response.headers['X-Frame-Options'] = 'DENY'
+ return response
+
+ def get_auth_signup_config(self):
+ """retrieve the module config (which features are enabled) for the login page"""
+
+ get_param = request.env['ir.config_parameter'].sudo().get_param
+ return {
+ 'signup_enabled': request.env['res.users']._get_signup_invitation_scope() == 'b2c',
+ 'reset_password_enabled': get_param('auth_signup.reset_password') == 'True',
+ }
+
+ def get_auth_signup_qcontext(self):
+ """ Shared helper returning the rendering context for signup and reset password """
+ qcontext = request.params.copy()
+ qcontext.update(self.get_auth_signup_config())
+ if not qcontext.get('token') and request.session.get('auth_signup_token'):
+ qcontext['token'] = request.session.get('auth_signup_token')
+ if qcontext.get('token'):
+ try:
+ # retrieve the user info (name, login or email) corresponding to a signup token
+ token_infos = request.env['res.partner'].sudo().signup_retrieve_info(qcontext.get('token'))
+ for k, v in token_infos.items():
+ qcontext.setdefault(k, v)
+ except:
+ qcontext['error'] = _("Invalid signup token")
+ qcontext['invalid_token'] = True
+ return qcontext
+
+ def do_signup(self, qcontext):
+ """ Shared helper that creates a res.partner out of a token """
+ values = { key: qcontext.get(key) for key in ('login', 'name', 'password') }
+ if not values:
+ raise UserError(_("The form was not properly filled in."))
+ if values.get('password') != qcontext.get('confirm_password'):
+ raise UserError(_("Passwords do not match; please retype them."))
+ supported_lang_codes = [code for code, _ in request.env['res.lang'].get_installed()]
+ lang = request.context.get('lang', '')
+ if lang in supported_lang_codes:
+ values['lang'] = lang
+ self._signup_with_values(qcontext.get('token'), values)
+ request.env.cr.commit()
+
+ def _signup_with_values(self, token, values):
+ db, login, password = request.env['res.users'].sudo().signup(values, token)
+ request.env.cr.commit() # as authenticate will use its own cursor we need to commit the current transaction
+ uid = request.session.authenticate(db, login, password)
+ if not uid:
+ raise SignupError(_('Authentication Failed.'))
+
+class AuthBaseSetup(BaseSetup):
+ @http.route('/base_setup/data', type='json', auth='user')
+ def base_setup_data(self, **kwargs):
+ res = super().base_setup_data(**kwargs)
+ res.update({'resend_invitation': True})
+ return res