Fixing unfinished procedure out
This commit is contained in:
		
							parent
							
								
									56e737be3a
								
							
						
					
					
						commit
						4e584c75ec
					
				@ -256,7 +256,8 @@ class auth:
 | 
				
			|||||||
            user_validation 	= procedure_validation.validation().account(APIADDR, allowed_roles, jwt)
 | 
					            user_validation 	= procedure_validation.validation().account(APIADDR, allowed_roles, jwt)
 | 
				
			||||||
            user 		= user_validation['data']
 | 
					            user 		= user_validation['data']
 | 
				
			||||||
            loggorilla.prcss(APIADDR, "Get dependency data")
 | 
					            loggorilla.prcss(APIADDR, "Get dependency data")
 | 
				
			||||||
            self.cursor.execute("call sp_auth_login(%s);", (user['profile']['username'],) )
 | 
					            self.cursor.execute("CALL sp_auth_login(%s, @o_count, @o_token, @o_id, @o_username, @o_password)", (user['profile']['username'],) )
 | 
				
			||||||
 | 
					            self.cursor.execute("SELECT @o_count, @o_token, @o_id, @o_username, @o_password")
 | 
				
			||||||
            result_login = self.cursor.fetchone()
 | 
					            result_login = self.cursor.fetchone()
 | 
				
			||||||
            self.cursor.execute(f"SELECT COUNT(*) AS `count`, auth_profile.token, auth_profile.email FROM auth_profile_verification INNER JOIN auth_profile ON auth_profile.id = auth_profile_verification.profile WHERE auth_profile.email = %s AND auth_profile_verification.type = 'email' ; ", (email,) )
 | 
					            self.cursor.execute(f"SELECT COUNT(*) AS `count`, auth_profile.token, auth_profile.email FROM auth_profile_verification INNER JOIN auth_profile ON auth_profile.id = auth_profile_verification.profile WHERE auth_profile.email = %s AND auth_profile_verification.type = 'email' ; ", (email,) )
 | 
				
			||||||
            result_email = self.cursor.fetchone()
 | 
					            result_email = self.cursor.fetchone()
 | 
				
			||||||
@ -269,7 +270,7 @@ class auth:
 | 
				
			|||||||
                loggorilla.prcss(APIADDR, "Giving response")
 | 
					                loggorilla.prcss(APIADDR, "Giving response")
 | 
				
			||||||
                response["status"	] = "failed"
 | 
					                response["status"	] = "failed"
 | 
				
			||||||
                response["desc"		] = "Invitation roles is not allowed"
 | 
					                response["desc"		] = "Invitation roles is not allowed"
 | 
				
			||||||
            elif not bcrypt.checkpw(password.encode(), result_login['password'].decode().encode() ):
 | 
					            elif not bcrypt.checkpw(password.encode(), result_login['@o_password'].decode().encode() ):
 | 
				
			||||||
                loggorilla.accss(APIADDR, f"{user['profile']['username']} put a wrong password for send invitation")
 | 
					                loggorilla.accss(APIADDR, f"{user['profile']['username']} put a wrong password for send invitation")
 | 
				
			||||||
                loggorilla.prcss(APIADDR, "Giving response")
 | 
					                loggorilla.prcss(APIADDR, "Giving response")
 | 
				
			||||||
                response["status"	] = "failed"
 | 
					                response["status"	] = "failed"
 | 
				
			||||||
@ -413,14 +414,15 @@ class auth:
 | 
				
			|||||||
        self.cursor.execute("BEGIN;")
 | 
					        self.cursor.execute("BEGIN;")
 | 
				
			||||||
        try:
 | 
					        try:
 | 
				
			||||||
            loggorilla.prcss(APIADDR, "Get dependency data")
 | 
					            loggorilla.prcss(APIADDR, "Get dependency data")
 | 
				
			||||||
            self.cursor.execute("call sp_auth_login(%s);", (username,) )
 | 
					            self.cursor.execute("CALL sp_auth_login(%s, @o_count, @o_token, @o_id, @o_username, @o_password)", (username,))
 | 
				
			||||||
 | 
					            self.cursor.execute("SELECT @o_count, @o_token, @o_id, @o_username, @o_password")
 | 
				
			||||||
            result_login = self.cursor.fetchone()
 | 
					            result_login = self.cursor.fetchone()
 | 
				
			||||||
            self.cursor.execute("SELECT `profile`, `type`, `verified` FROM auth_profile_verification WHERE `type` = 'email' AND `profile` = %s ; ", (result_login['id'],) )
 | 
					            self.cursor.execute("SELECT `profile`, `type`, `verified` FROM auth_profile_verification WHERE `type` = 'email' AND `profile` = %s ; ", (result_login['@o_id'],) )
 | 
				
			||||||
            result_verification = self.cursor.fetchone()
 | 
					            result_verification = self.cursor.fetchone()
 | 
				
			||||||
            loggorilla.prcss(APIADDR, "Validation")
 | 
					            loggorilla.prcss(APIADDR, "Validation")
 | 
				
			||||||
            if result_login['count'] == 1 and result_verification['verified'] == 1 and bcrypt.checkpw(password.encode(), result_login['password'].decode().encode() ) :
 | 
					            if result_login['@o_count'] == 1 and result_verification['verified'] == 1 and bcrypt.checkpw(password.encode(), result_login['@o_password'].decode().encode() ) :
 | 
				
			||||||
                loggorilla.prcss(APIADDR, "Add session")
 | 
					                loggorilla.prcss(APIADDR, "Add session")
 | 
				
			||||||
                self.cursor.execute(f"INSERT INTO `auth_session` VALUES (DEFAULT, %s, NOW(), NOW() + INTERVAL 60 DAY)", ( result_login['token'], ) )
 | 
					                self.cursor.execute(f"INSERT INTO `auth_session` VALUES (DEFAULT, %s, NOW(), NOW() + INTERVAL 60 DAY)", ( result_login['@o_token'], ) )
 | 
				
			||||||
                session_last_id = self.cursor.lastrowid
 | 
					                session_last_id = self.cursor.lastrowid
 | 
				
			||||||
                self.cursor.execute(f"SELECT `id`, `start`, `end` FROM `auth_session` WHERE id = %s ; ", ( session_last_id, ) )
 | 
					                self.cursor.execute(f"SELECT `id`, `start`, `end` FROM `auth_session` WHERE id = %s ; ", ( session_last_id, ) )
 | 
				
			||||||
                session         = self.cursor.fetchone()
 | 
					                session         = self.cursor.fetchone()
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										13
									
								
								sql/auth.sql
									
									
									
									
									
								
							
							
						
						
									
										13
									
								
								sql/auth.sql
									
									
									
									
									
								
							@ -109,7 +109,12 @@ DELIMITER ;
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
DELIMITER //
 | 
					DELIMITER //
 | 
				
			||||||
CREATE PROCEDURE sp_auth_login(
 | 
					CREATE PROCEDURE sp_auth_login(
 | 
				
			||||||
	IN p_username varchar(36)
 | 
						IN  p_username VARCHAR(36),
 | 
				
			||||||
 | 
						OUT o_count INT(11),
 | 
				
			||||||
 | 
						OUT o_token BINARY(40),
 | 
				
			||||||
 | 
						OUT o_id INT(11),
 | 
				
			||||||
 | 
						OUT o_username VARCHAR(36),
 | 
				
			||||||
 | 
						OUT o_password BINARY(60)
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
BEGIN
 | 
					BEGIN
 | 
				
			||||||
	SELECT
 | 
						SELECT
 | 
				
			||||||
@ -118,6 +123,12 @@ BEGIN
 | 
				
			|||||||
		auth_profile.id,
 | 
							auth_profile.id,
 | 
				
			||||||
		auth_profile.username,
 | 
							auth_profile.username,
 | 
				
			||||||
		auth.password
 | 
							auth.password
 | 
				
			||||||
 | 
						INTO
 | 
				
			||||||
 | 
							o_count,
 | 
				
			||||||
 | 
							o_token,
 | 
				
			||||||
 | 
							o_id,
 | 
				
			||||||
 | 
							o_username,
 | 
				
			||||||
 | 
							o_password
 | 
				
			||||||
	FROM auth_profile
 | 
						FROM auth_profile
 | 
				
			||||||
	INNER JOIN auth ON auth.token = auth_profile.token
 | 
						INNER JOIN auth ON auth.token = auth_profile.token
 | 
				
			||||||
	WHERE auth_profile.username = p_username ;
 | 
						WHERE auth_profile.username = p_username ;
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
		Reference in New Issue
	
	Block a user