atomatic sign on for deep water users
This commit is contained in:
@@ -8,6 +8,7 @@
|
||||
|
||||
<h1>Load next week</h1>
|
||||
|
||||
<p>
|
||||
<form enctype="multipart/form-data" method="post">
|
||||
<table>
|
||||
{{ form.as_table }}
|
||||
@@ -15,6 +16,9 @@
|
||||
{% csrf_token %}
|
||||
<input type="submit" value="Submit">
|
||||
</form>
|
||||
</p>
|
||||
<p>
|
||||
<a href="http://localhost:8898/{{ rower.training_plan_code }}">Link to plan</a>
|
||||
|
||||
{% endblock %}
|
||||
|
||||
|
||||
@@ -2,37 +2,39 @@ from rowers.views.statements import *
|
||||
from rowers.rower_rules import user_is_not_basic, user_is_coachee
|
||||
from rowers.tokens import create_token
|
||||
from rowers.forms import DeepWaterLoginForm
|
||||
from django.contrib.auth import get_user
|
||||
import jwt
|
||||
|
||||
def deepwatertoken_login(request):
|
||||
if request.method == 'POST':
|
||||
# Check if user is already authenticated
|
||||
if request.user.is_authenticated:
|
||||
user = request.user
|
||||
elif request.method == 'POST':
|
||||
username = request.POST.get('username', '')
|
||||
password = request.POST.get('password', '')
|
||||
user = authenticate(request, username=username, password=password)
|
||||
if user is not None:
|
||||
login(request, user)
|
||||
payload = {
|
||||
'user_id': user.id,
|
||||
'username': user.username,
|
||||
'email': user.email,
|
||||
'exp': timezone.now() + datetime.timedelta(days=1), # Token valid for 1 day
|
||||
'iat': timezone.now(),
|
||||
}
|
||||
else:
|
||||
redirect_url = request.GET.get('redirect', settings.DEEP_WATER_URL)
|
||||
return render(request, "deepwaterlogin.html")
|
||||
|
||||
token = jwt.encode(payload, settings.DEEP_WATER_SECRET_KEY, algorithm='HS256')
|
||||
if user is None:
|
||||
messages.error(request, 'Invalid credentials')
|
||||
return render(request, 'deepwaterlogin.html')
|
||||
|
||||
# Debug: Print the token
|
||||
print(f"Generated token: {token}")
|
||||
print(f"Token length: {len(token)}")
|
||||
print(f"Token parts: {token.split('.')}")
|
||||
# Generate token (same as before)
|
||||
payload = {
|
||||
'user_id': user.id,
|
||||
'username': user.username,
|
||||
'email': user.email,
|
||||
'exp': timezone.now() + datetime.timedelta(days=1),
|
||||
'iat': timezone.now(),
|
||||
}
|
||||
token = jwt.encode(payload, settings.DEEP_WATER_SECRET_KEY, algorithm='HS256')
|
||||
|
||||
redirect_url = request.GET.get('redirect', settings.DEEP_WATER_URL)
|
||||
return HttpResponseRedirect(f"{redirect_url}?token={token}")
|
||||
else:
|
||||
messages.error(request, 'Invalid credentials')
|
||||
return render(request, 'deepwaterlogin.html')
|
||||
# Redirect with token
|
||||
redirect_url = request.GET.get('redirect', settings.DEEP_WATER_URL)
|
||||
return render(request, "deepwaterlogin.html")
|
||||
return HttpResponseRedirect(f"{redirect_url}?token={token}")
|
||||
|
||||
|
||||
@login_required()
|
||||
def get_deepwater_token(request):
|
||||
|
||||
Reference in New Issue
Block a user