sanic-security 1.12.5__py3-none-any.whl → 1.12.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- sanic_security/utils.py +4 -1
- {sanic_security-1.12.5.dist-info → sanic_security-1.12.6.dist-info}/METADATA +15 -15
- {sanic_security-1.12.5.dist-info → sanic_security-1.12.6.dist-info}/RECORD +6 -6
- {sanic_security-1.12.5.dist-info → sanic_security-1.12.6.dist-info}/WHEEL +1 -1
- {sanic_security-1.12.5.dist-info → sanic_security-1.12.6.dist-info}/LICENSE +0 -0
- {sanic_security-1.12.5.dist-info → sanic_security-1.12.6.dist-info}/top_level.txt +0 -0
sanic_security/utils.py
CHANGED
@@ -1,5 +1,6 @@
|
|
1
1
|
import datetime
|
2
2
|
import random
|
3
|
+
import string
|
3
4
|
|
4
5
|
from sanic.request import Request
|
5
6
|
from sanic.response import json as sanic_json, HTTPResponse
|
@@ -47,7 +48,9 @@ def get_code() -> str:
|
|
47
48
|
Returns:
|
48
49
|
code
|
49
50
|
"""
|
50
|
-
return
|
51
|
+
return "".join(
|
52
|
+
random.choice(string.ascii_uppercase + string.digits) for _ in range(6)
|
53
|
+
)
|
51
54
|
|
52
55
|
|
53
56
|
def json(
|
@@ -1,8 +1,8 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: sanic-security
|
3
|
-
Version: 1.12.
|
3
|
+
Version: 1.12.6
|
4
4
|
Summary: An async security library for the Sanic framework.
|
5
|
-
Author-email: Aidan Stewart <na.
|
5
|
+
Author-email: Aidan Stewart <me@na-stewart.com>
|
6
6
|
Project-URL: Documentation, https://security.na-stewart.com/
|
7
7
|
Project-URL: Repository, https://github.com/na-stewart/sanic-security
|
8
8
|
Keywords: security,authentication,authorization,verification,async,sanic
|
@@ -197,7 +197,7 @@ async def on_register(request):
|
|
197
197
|
account = await register(request)
|
198
198
|
two_step_session = await request_two_step_verification(request, account)
|
199
199
|
await email_code(
|
200
|
-
account.email, two_step_session.code # Code =
|
200
|
+
account.email, two_step_session.code # Code = 24KF19
|
201
201
|
) # Custom method for emailing verification code.
|
202
202
|
response = json(
|
203
203
|
"Registration successful! Email verification required.",
|
@@ -213,7 +213,7 @@ Verifies the client's account via two-step session code.
|
|
213
213
|
|
214
214
|
| Key | Value |
|
215
215
|
|----------|--------|
|
216
|
-
| **code** |
|
216
|
+
| **code** | 24KF19 |
|
217
217
|
|
218
218
|
```python
|
219
219
|
@app.post("api/security/verify")
|
@@ -237,7 +237,7 @@ async def on_login(request):
|
|
237
237
|
request, authentication_session.bearer
|
238
238
|
)
|
239
239
|
await email_code(
|
240
|
-
authentication_session.bearer.email, two_step_session.code # Code =
|
240
|
+
authentication_session.bearer.email, two_step_session.code # Code = XGED2U
|
241
241
|
) # Custom method for emailing verification code.
|
242
242
|
response = json(
|
243
243
|
"Login successful! Two-factor authentication required.",
|
@@ -256,7 +256,7 @@ Fulfills client authentication session's second factor requirement via two-step
|
|
256
256
|
|
257
257
|
| Key | Value |
|
258
258
|
|----------|--------|
|
259
|
-
| **code** |
|
259
|
+
| **code** | XGED2U |
|
260
260
|
|
261
261
|
```python
|
262
262
|
@app.post("api/security/fulfill-2fa")
|
@@ -323,8 +323,8 @@ async def on_authenticate(request):
|
|
323
323
|
|
324
324
|
* Refresh Encoder
|
325
325
|
|
326
|
-
A new/refreshed session is returned during authentication
|
327
|
-
requires encoding.
|
326
|
+
A new/refreshed session is returned during authentication when the client's current session expires and it
|
327
|
+
requires encoding. This should be be done automatically via middleware.
|
328
328
|
|
329
329
|
```python
|
330
330
|
attach_refresh_encoder(app)
|
@@ -347,7 +347,7 @@ downloading a .ttf font and defining the file's path in the configuration.
|
|
347
347
|
@app.get("api/security/captcha")
|
348
348
|
async def on_captcha_img_request(request):
|
349
349
|
captcha_session = await request_captcha(request)
|
350
|
-
response = captcha_session.get_image() # Captcha:
|
350
|
+
response = captcha_session.get_image() # Captcha: LJ0F3U
|
351
351
|
captcha_session.encode(response)
|
352
352
|
return response
|
353
353
|
```
|
@@ -356,7 +356,7 @@ async def on_captcha_img_request(request):
|
|
356
356
|
|
357
357
|
| Key | Value |
|
358
358
|
|-------------|--------|
|
359
|
-
| **captcha** |
|
359
|
+
| **captcha** | LJ0F3U |
|
360
360
|
|
361
361
|
```python
|
362
362
|
@app.post("api/security/captcha")
|
@@ -369,7 +369,7 @@ async def on_captcha(request):
|
|
369
369
|
|
370
370
|
| Key | Value |
|
371
371
|
|-------------|--------|
|
372
|
-
| **captcha** |
|
372
|
+
| **captcha** | LJ0F3U |
|
373
373
|
|
374
374
|
```python
|
375
375
|
@app.post("api/security/captcha")
|
@@ -391,7 +391,7 @@ Two-step verification should be integrated with other custom functionality. For
|
|
391
391
|
```python
|
392
392
|
@app.post("api/security/two-step/request")
|
393
393
|
async def on_two_step_request(request):
|
394
|
-
two_step_session = await request_two_step_verification(request) # Code =
|
394
|
+
two_step_session = await request_two_step_verification(request) # Code = T2I58I
|
395
395
|
await email_code(
|
396
396
|
two_step_session.bearer.email, two_step_session.code
|
397
397
|
) # Custom method for emailing verification code.
|
@@ -405,7 +405,7 @@ async def on_two_step_request(request):
|
|
405
405
|
```python
|
406
406
|
@app.post("api/security/two-step/resend")
|
407
407
|
async def on_two_step_resend(request):
|
408
|
-
two_step_session = await TwoStepSession.decode(request) # Code =
|
408
|
+
two_step_session = await TwoStepSession.decode(request) # Code = T2I58I
|
409
409
|
await email_code(
|
410
410
|
two_step_session.bearer.email, two_step_session.code
|
411
411
|
) # Custom method for emailing verification code.
|
@@ -416,7 +416,7 @@ async def on_two_step_resend(request):
|
|
416
416
|
|
417
417
|
| Key | Value |
|
418
418
|
|----------|--------|
|
419
|
-
| **code** |
|
419
|
+
| **code** | T2I58I |
|
420
420
|
|
421
421
|
```python
|
422
422
|
@app.post("api/security/two-step")
|
@@ -430,7 +430,7 @@ async def on_two_step_verification(request):
|
|
430
430
|
|
431
431
|
| Key | Value |
|
432
432
|
|----------|--------|
|
433
|
-
| **code** |
|
433
|
+
| **code** | T2I58I |
|
434
434
|
|
435
435
|
```python
|
436
436
|
@app.post("api/security/two-step")
|
@@ -4,13 +4,13 @@ sanic_security/authorization.py,sha256=aQztMiZG9LDctr_C6QEzO5qScwbxpiLk96XVxwdCC
|
|
4
4
|
sanic_security/configuration.py,sha256=p44nTSrBQQSJZYN6qJEod_Ettf90rRNlmPxmNzxqQ9A,5514
|
5
5
|
sanic_security/exceptions.py,sha256=MTPF4tm_68Nmf_z06RHH_6DTiC_CNiLER1jzEoW1dFk,5398
|
6
6
|
sanic_security/models.py,sha256=nj5iYHzPZzdLs5dc3j6kdeScSk1SASizfK58Sa5YN8E,22527
|
7
|
-
sanic_security/utils.py,sha256=
|
7
|
+
sanic_security/utils.py,sha256=XAUNalcTi53qTz0D8xiDyDyRlq7Z7ffNBzUONJZqe90,2705
|
8
8
|
sanic_security/verification.py,sha256=vrxYborEOBKEirOHczul9WYub5j6T2ldXE1gsoA8iyY,7503
|
9
9
|
sanic_security/test/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
10
10
|
sanic_security/test/server.py,sha256=pwqsDS81joMdxIynivaNPCCMamv9qzAjknfZ01ZxQHc,12380
|
11
11
|
sanic_security/test/tests.py,sha256=6TUp5GVYIR27qCzwIw2qt7DvW7ohxj-seYpnpeMbuno,22407
|
12
|
-
sanic_security-1.12.
|
13
|
-
sanic_security-1.12.
|
14
|
-
sanic_security-1.12.
|
15
|
-
sanic_security-1.12.
|
16
|
-
sanic_security-1.12.
|
12
|
+
sanic_security-1.12.6.dist-info/LICENSE,sha256=sXlJs9_mG-dCkPfWsDnuzydJWagS82E2gYtkVH9enHA,1100
|
13
|
+
sanic_security-1.12.6.dist-info/METADATA,sha256=aiKkOtkYiexSjoB4uysSQwxAVqRGAQnultZKvx5srAs,23382
|
14
|
+
sanic_security-1.12.6.dist-info/WHEEL,sha256=P9jw-gEje8ByB7_hXoICnHtVCrEwMQh-630tKvQWehc,91
|
15
|
+
sanic_security-1.12.6.dist-info/top_level.txt,sha256=ZybkhHXSjfzhmv8XeqLvnNmLmv21Z0oPX6Ep4DJN8b0,15
|
16
|
+
sanic_security-1.12.6.dist-info/RECORD,,
|
File without changes
|
File without changes
|