diff --git a/idhub/management/commands/send_mail_admins.py b/idhub/management/commands/send_mail_admins.py index ea3b790..a58bfd1 100644 --- a/idhub/management/commands/send_mail_admins.py +++ b/idhub/management/commands/send_mail_admins.py @@ -1,7 +1,5 @@ import logging -from urllib.parse import urlparse - from django.conf import settings from django.template import loader from django.core.mail import EmailMultiAlternatives diff --git a/oidc4vp/models.py b/oidc4vp/models.py index 916e1d6..2ed3d30 100644 --- a/oidc4vp/models.py +++ b/oidc4vp/models.py @@ -264,9 +264,20 @@ class OAuth2VPToken(models.Model): self.authorization = Authorization.objects.filter(code=code).first() + @property + def code(self): + if not self.authorization: + return '' + return self.authorization.code + def verifing(self): self.result_verify = verify_presentation(self.vp_token) + def get_result_verify(self): + if not self.result_verify: + return {} + return json.loads(self.result_verify) + def get_response_verify(self): response = { "verify": ',', @@ -307,3 +318,4 @@ class OAuth2VPToken(models.Model): self.user_info = tk.get( "verifiableCredential", [{}] )[-1].get("credentialSubject") + return json.dumps(self.user_info, indent=2) diff --git a/oidc4vp/views.py b/oidc4vp/views.py index 5da6e2e..359a638 100644 --- a/oidc4vp/views.py +++ b/oidc4vp/views.py @@ -1,6 +1,9 @@ import json import base64 +import logging +from django.template import loader +from django.core.mail import EmailMultiAlternatives from django.conf import settings from django.views.generic.edit import View, FormView from django.http import HttpResponse, Http404, JsonResponse @@ -10,6 +13,7 @@ from django.utils.decorators import method_decorator from django.utils.translation import gettext_lazy as _ from django.urls import reverse_lazy from django.contrib import messages +from django.contrib.auth import get_user_model from oidc4vp.models import Authorization, Organization, OAuth2VPToken from idhub.mixins import UserView @@ -18,6 +22,11 @@ from idhub.models import Event from oidc4vp.forms import AuthorizeForm + +User = get_user_model() +logger = logging.getLogger(__name__) + + class AuthorizeView(UserView, FormView): title = _("My wallet") section = "MyWallet" @@ -101,6 +110,10 @@ class AuthorizeView(UserView, FormView): @method_decorator(csrf_exempt, name='dispatch') class VerifyView(View): + subject_template_name = 'email/verify_subject.txt' + email_template_name = 'email/verify_email.txt' + html_email_template_name = 'email/verify_email.html' + def get(self, request, *args, **kwargs): org = self.validate(request) presentation_definition = json.dumps(settings.SUPPORTED_CREDENTIALS) @@ -121,19 +134,23 @@ class VerifyView(View): org = self.validate(request) - vp_token = OAuth2VPToken( + self.vp_token = OAuth2VPToken( vp_token = vp_tk, organization=org, code=code ) - if not vp_token.authorization: + + if not self.vp_token.authorization: raise Http404("Page not Found!") - vp_token.verifing() - response = vp_token.get_response_verify() - vp_token.save() - response["response"] = "Validation Code {}".format(code) + self.vp_token.verifing() + response = self.vp_token.get_response_verify() + self.vp_token.save() + for user in User.objects.filter(is_admin=True): + self.send_email(user) + + response["response"] = "Validation Code {}".format(code) return JsonResponse(response) def validate(self, request): @@ -152,6 +169,57 @@ class VerifyView(View): raise Http404("Page not Found!") + def send_email(self, user): + """ + Send a email when a user is activated. + """ + verification = self.vp_token.get_result_verify() + if not verification: + return + + if verification.get('errors') or verification.get('warnings'): + return + + email = self.get_email(user) + try: + if settings.ENABLE_EMAIL: + email.send() + return + + logger.warning(user.email) + logger.warning(email.body) + + except Exception as err: + logger.error(err) + return + + def get_context(self): + url_domain = "https://{}/".format(settings.DOMAIN) + context = { + "domain": settings.DOMAIN, + "url_domain": url_domain, + "verification": self.get_verification(), + "code": self.vp_token.code, + } + return context + + def get_email(self, user): + context = self.get_context() + subject = loader.render_to_string(self.subject_template_name, context) + # Email subject *must not* contain newlines + subject = ''.join(subject.splitlines()) + body = loader.render_to_string(self.email_template_name, context) + from_email = settings.DEFAULT_FROM_EMAIL + to_email = user.email + + email_message = EmailMultiAlternatives( + subject, body, from_email, [to_email]) + html_email = loader.render_to_string(self.html_email_template_name, context) + email_message.attach_alternative(html_email, 'text/html') + return email_message + + def get_verification(self): + return self.vp_token.get_user_info() class AllowCodeView(View): def get(self, request, *args, **kwargs):