diff --git a/Pipfile b/Pipfile new file mode 100644 index 0000000..b2baccf --- /dev/null +++ b/Pipfile @@ -0,0 +1,16 @@ +[[source]] +url = "https://pypi.org/simple" +verify_ssl = true +name = "pypi" + +[packages] +django = "*" +djangorestframework = "*" +django-environ = "*" +requests = "*" + +[dev-packages] + +[requires] +python_version = "3.10" +python_full_version = "3.10.12" diff --git a/Pipfile.lock b/Pipfile.lock new file mode 100644 index 0000000..9212dc3 --- /dev/null +++ b/Pipfile.lock @@ -0,0 +1,202 @@ +{ + "_meta": { + "hash": { + "sha256": "ae17eca47351a77c42194bbeb7a4e962efb8eb639c7761eb635b68ab54033660" + }, + "pipfile-spec": 6, + "requires": { + "python_full_version": "3.10.12", + "python_version": "3.10" + }, + "sources": [ + { + "name": "pypi", + "url": "https://pypi.org/simple", + "verify_ssl": true + } + ] + }, + "default": { + "asgiref": { + "hashes": [ + "sha256:89b2ef2247e3b562a16eef663bc0e2e703ec6468e2fa8a5cd61cd449786d4f6e", + "sha256:9e0ce3aa93a819ba5b45120216b23878cf6e8525eb3848653452b4192b92afed" + ], + "markers": "python_version >= '3.7'", + "version": "==3.7.2" + }, + "certifi": { + "hashes": [ + "sha256:0569859f95fc761b18b45ef421b1290a0f65f147e92a1e5eb3e635f9a5e4e66f", + "sha256:dc383c07b76109f368f6106eee2b593b04a011ea4d55f652c6ca24a754d1cdd1" + ], + "markers": "python_version >= '3.6'", + "version": "==2024.2.2" + }, + "charset-normalizer": { + "hashes": [ + "sha256:06435b539f889b1f6f4ac1758871aae42dc3a8c0e24ac9e60c2384973ad73027", + "sha256:06a81e93cd441c56a9b65d8e1d043daeb97a3d0856d177d5c90ba85acb3db087", + "sha256:0a55554a2fa0d408816b3b5cedf0045f4b8e1a6065aec45849de2d6f3f8e9786", + "sha256:0b2b64d2bb6d3fb9112bafa732def486049e63de9618b5843bcdd081d8144cd8", + "sha256:10955842570876604d404661fbccbc9c7e684caf432c09c715ec38fbae45ae09", + "sha256:122c7fa62b130ed55f8f285bfd56d5f4b4a5b503609d181f9ad85e55c89f4185", + "sha256:1ceae2f17a9c33cb48e3263960dc5fc8005351ee19db217e9b1bb15d28c02574", + "sha256:1d3193f4a680c64b4b6a9115943538edb896edc190f0b222e73761716519268e", + "sha256:1f79682fbe303db92bc2b1136016a38a42e835d932bab5b3b1bfcfbf0640e519", + "sha256:2127566c664442652f024c837091890cb1942c30937add288223dc895793f898", + "sha256:22afcb9f253dac0696b5a4be4a1c0f8762f8239e21b99680099abd9b2b1b2269", + "sha256:25baf083bf6f6b341f4121c2f3c548875ee6f5339300e08be3f2b2ba1721cdd3", + "sha256:2e81c7b9c8979ce92ed306c249d46894776a909505d8f5a4ba55b14206e3222f", + "sha256:3287761bc4ee9e33561a7e058c72ac0938c4f57fe49a09eae428fd88aafe7bb6", + "sha256:34d1c8da1e78d2e001f363791c98a272bb734000fcef47a491c1e3b0505657a8", + "sha256:37e55c8e51c236f95b033f6fb391d7d7970ba5fe7ff453dad675e88cf303377a", + "sha256:3d47fa203a7bd9c5b6cee4736ee84ca03b8ef23193c0d1ca99b5089f72645c73", + "sha256:3e4d1f6587322d2788836a99c69062fbb091331ec940e02d12d179c1d53e25fc", + "sha256:42cb296636fcc8b0644486d15c12376cb9fa75443e00fb25de0b8602e64c1714", + "sha256:45485e01ff4d3630ec0d9617310448a8702f70e9c01906b0d0118bdf9d124cf2", + "sha256:4a78b2b446bd7c934f5dcedc588903fb2f5eec172f3d29e52a9096a43722adfc", + "sha256:4ab2fe47fae9e0f9dee8c04187ce5d09f48eabe611be8259444906793ab7cbce", + "sha256:4d0d1650369165a14e14e1e47b372cfcb31d6ab44e6e33cb2d4e57265290044d", + "sha256:549a3a73da901d5bc3ce8d24e0600d1fa85524c10287f6004fbab87672bf3e1e", + "sha256:55086ee1064215781fff39a1af09518bc9255b50d6333f2e4c74ca09fac6a8f6", + "sha256:572c3763a264ba47b3cf708a44ce965d98555f618ca42c926a9c1616d8f34269", + "sha256:573f6eac48f4769d667c4442081b1794f52919e7edada77495aaed9236d13a96", + "sha256:5b4c145409bef602a690e7cfad0a15a55c13320ff7a3ad7ca59c13bb8ba4d45d", + "sha256:6463effa3186ea09411d50efc7d85360b38d5f09b870c48e4600f63af490e56a", + "sha256:65f6f63034100ead094b8744b3b97965785388f308a64cf8d7c34f2f2e5be0c4", + "sha256:663946639d296df6a2bb2aa51b60a2454ca1cb29835324c640dafb5ff2131a77", + "sha256:6897af51655e3691ff853668779c7bad41579facacf5fd7253b0133308cf000d", + "sha256:68d1f8a9e9e37c1223b656399be5d6b448dea850bed7d0f87a8311f1ff3dabb0", + "sha256:6ac7ffc7ad6d040517be39eb591cac5ff87416c2537df6ba3cba3bae290c0fed", + "sha256:6b3251890fff30ee142c44144871185dbe13b11bab478a88887a639655be1068", + "sha256:6c4caeef8fa63d06bd437cd4bdcf3ffefe6738fb1b25951440d80dc7df8c03ac", + "sha256:6ef1d82a3af9d3eecdba2321dc1b3c238245d890843e040e41e470ffa64c3e25", + "sha256:753f10e867343b4511128c6ed8c82f7bec3bd026875576dfd88483c5c73b2fd8", + "sha256:7cd13a2e3ddeed6913a65e66e94b51d80a041145a026c27e6bb76c31a853c6ab", + "sha256:7ed9e526742851e8d5cc9e6cf41427dfc6068d4f5a3bb03659444b4cabf6bc26", + "sha256:7f04c839ed0b6b98b1a7501a002144b76c18fb1c1850c8b98d458ac269e26ed2", + "sha256:802fe99cca7457642125a8a88a084cef28ff0cf9407060f7b93dca5aa25480db", + "sha256:80402cd6ee291dcb72644d6eac93785fe2c8b9cb30893c1af5b8fdd753b9d40f", + "sha256:8465322196c8b4d7ab6d1e049e4c5cb460d0394da4a27d23cc242fbf0034b6b5", + "sha256:86216b5cee4b06df986d214f664305142d9c76df9b6512be2738aa72a2048f99", + "sha256:87d1351268731db79e0f8e745d92493ee2841c974128ef629dc518b937d9194c", + "sha256:8bdb58ff7ba23002a4c5808d608e4e6c687175724f54a5dade5fa8c67b604e4d", + "sha256:8c622a5fe39a48f78944a87d4fb8a53ee07344641b0562c540d840748571b811", + "sha256:8d756e44e94489e49571086ef83b2bb8ce311e730092d2c34ca8f7d925cb20aa", + "sha256:8f4a014bc36d3c57402e2977dada34f9c12300af536839dc38c0beab8878f38a", + "sha256:9063e24fdb1e498ab71cb7419e24622516c4a04476b17a2dab57e8baa30d6e03", + "sha256:90d558489962fd4918143277a773316e56c72da56ec7aa3dc3dbbe20fdfed15b", + "sha256:923c0c831b7cfcb071580d3f46c4baf50f174be571576556269530f4bbd79d04", + "sha256:95f2a5796329323b8f0512e09dbb7a1860c46a39da62ecb2324f116fa8fdc85c", + "sha256:96b02a3dc4381e5494fad39be677abcb5e6634bf7b4fa83a6dd3112607547001", + "sha256:9f96df6923e21816da7e0ad3fd47dd8f94b2a5ce594e00677c0013018b813458", + "sha256:a10af20b82360ab00827f916a6058451b723b4e65030c5a18577c8b2de5b3389", + "sha256:a50aebfa173e157099939b17f18600f72f84eed3049e743b68ad15bd69b6bf99", + "sha256:a981a536974bbc7a512cf44ed14938cf01030a99e9b3a06dd59578882f06f985", + "sha256:a9a8e9031d613fd2009c182b69c7b2c1ef8239a0efb1df3f7c8da66d5dd3d537", + "sha256:ae5f4161f18c61806f411a13b0310bea87f987c7d2ecdbdaad0e94eb2e404238", + "sha256:aed38f6e4fb3f5d6bf81bfa990a07806be9d83cf7bacef998ab1a9bd660a581f", + "sha256:b01b88d45a6fcb69667cd6d2f7a9aeb4bf53760d7fc536bf679ec94fe9f3ff3d", + "sha256:b261ccdec7821281dade748d088bb6e9b69e6d15b30652b74cbbac25e280b796", + "sha256:b2b0a0c0517616b6869869f8c581d4eb2dd83a4d79e0ebcb7d373ef9956aeb0a", + "sha256:b4a23f61ce87adf89be746c8a8974fe1c823c891d8f86eb218bb957c924bb143", + "sha256:bd8f7df7d12c2db9fab40bdd87a7c09b1530128315d047a086fa3ae3435cb3a8", + "sha256:beb58fe5cdb101e3a055192ac291b7a21e3b7ef4f67fa1d74e331a7f2124341c", + "sha256:c002b4ffc0be611f0d9da932eb0f704fe2602a9a949d1f738e4c34c75b0863d5", + "sha256:c083af607d2515612056a31f0a8d9e0fcb5876b7bfc0abad3ecd275bc4ebc2d5", + "sha256:c180f51afb394e165eafe4ac2936a14bee3eb10debc9d9e4db8958fe36afe711", + "sha256:c235ebd9baae02f1b77bcea61bce332cb4331dc3617d254df3323aa01ab47bd4", + "sha256:cd70574b12bb8a4d2aaa0094515df2463cb429d8536cfb6c7ce983246983e5a6", + "sha256:d0eccceffcb53201b5bfebb52600a5fb483a20b61da9dbc885f8b103cbe7598c", + "sha256:d965bba47ddeec8cd560687584e88cf699fd28f192ceb452d1d7ee807c5597b7", + "sha256:db364eca23f876da6f9e16c9da0df51aa4f104a972735574842618b8c6d999d4", + "sha256:ddbb2551d7e0102e7252db79ba445cdab71b26640817ab1e3e3648dad515003b", + "sha256:deb6be0ac38ece9ba87dea880e438f25ca3eddfac8b002a2ec3d9183a454e8ae", + "sha256:e06ed3eb3218bc64786f7db41917d4e686cc4856944f53d5bdf83a6884432e12", + "sha256:e27ad930a842b4c5eb8ac0016b0a54f5aebbe679340c26101df33424142c143c", + "sha256:e537484df0d8f426ce2afb2d0f8e1c3d0b114b83f8850e5f2fbea0e797bd82ae", + "sha256:eb00ed941194665c332bf8e078baf037d6c35d7c4f3102ea2d4f16ca94a26dc8", + "sha256:eb6904c354526e758fda7167b33005998fb68c46fbc10e013ca97f21ca5c8887", + "sha256:eb8821e09e916165e160797a6c17edda0679379a4be5c716c260e836e122f54b", + "sha256:efcb3f6676480691518c177e3b465bcddf57cea040302f9f4e6e191af91174d4", + "sha256:f27273b60488abe721a075bcca6d7f3964f9f6f067c8c4c605743023d7d3944f", + "sha256:f30c3cb33b24454a82faecaf01b19c18562b1e89558fb6c56de4d9118a032fd5", + "sha256:fb69256e180cb6c8a894fee62b3afebae785babc1ee98b81cdf68bbca1987f33", + "sha256:fd1abc0d89e30cc4e02e4064dc67fcc51bd941eb395c502aac3ec19fab46b519", + "sha256:ff8fa367d09b717b2a17a052544193ad76cd49979c805768879cb63d9ca50561" + ], + "markers": "python_full_version >= '3.7.0'", + "version": "==3.3.2" + }, + "django": { + "hashes": [ + "sha256:5c7d748ad113a81b2d44750ccc41edc14e933f56581683db548c9257e078cc83", + "sha256:5fb37580dcf4a262f9258c1f4373819aacca906431f505e4688e37f3a99195df" + ], + "index": "pypi", + "markers": "python_version >= '3.10'", + "version": "==5.0.3" + }, + "django-environ": { + "hashes": [ + "sha256:0ff95ab4344bfeff693836aa978e6840abef2e2f1145adff7735892711590c05", + "sha256:f32a87aa0899894c27d4e1776fa6b477e8164ed7f6b3e410a62a6d72caaf64be" + ], + "index": "pypi", + "markers": "python_version >= '3.6' and python_version < '4'", + "version": "==0.11.2" + }, + "djangorestframework": { + "hashes": [ + "sha256:3f4a263012e1b263bf49a4907eb4cfe14de840a09b1ba64596d01a9c54835919", + "sha256:5fa616048a7ec287fdaab3148aa5151efb73f7f8be1e23a9d18484e61e672695" + ], + "index": "pypi", + "markers": "python_version >= '3.6'", + "version": "==3.15.0" + }, + "idna": { + "hashes": [ + "sha256:9ecdbbd083b06798ae1e86adcbfe8ab1479cf864e4ee30fe4e46a003d12491ca", + "sha256:c05567e9c24a6b9faaa835c4821bad0590fbb9d5779e7caa6e1cc4978e7eb24f" + ], + "markers": "python_version >= '3.5'", + "version": "==3.6" + }, + "requests": { + "hashes": [ + "sha256:58cd2187c01e70e6e26505bca751777aa9f2ee0b7f4300988b709f44e013003f", + "sha256:942c5a758f98d790eaed1a29cb6eefc7ffb0d1cf7af05c3d2791656dbd6ad1e1" + ], + "index": "pypi", + "markers": "python_version >= '3.7'", + "version": "==2.31.0" + }, + "sqlparse": { + "hashes": [ + "sha256:5430a4fe2ac7d0f93e66f1efc6e1338a41884b7ddf2a350cedd20ccc4d9d28f3", + "sha256:d446183e84b8349fa3061f0fe7f06ca94ba65b426946ffebe6e3e8295332420c" + ], + "markers": "python_version >= '3.5'", + "version": "==0.4.4" + }, + "typing-extensions": { + "hashes": [ + "sha256:69b1a937c3a517342112fb4c6df7e72fc39a38e7891a5730ed4985b5214b5475", + "sha256:b0abd7c89e8fb96f98db18d86106ff1d90ab692004eb746cf6eda2682f91b3cb" + ], + "markers": "python_version < '3.11'", + "version": "==4.10.0" + }, + "urllib3": { + "hashes": [ + "sha256:450b20ec296a467077128bff42b73080516e71b56ff59a60a02bef2232c4fa9d", + "sha256:d0570876c61ab9e520d776c38acbbb5b05a776d3f9ff98a5c8fd5162a444cf19" + ], + "markers": "python_version >= '3.8'", + "version": "==2.2.1" + } + }, + "develop": {} +} diff --git a/core/__init__.py b/core/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/core/__pycache__/__init__.cpython-310.pyc b/core/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000..814c975 Binary files /dev/null and b/core/__pycache__/__init__.cpython-310.pyc differ diff --git a/core/__pycache__/admin.cpython-310.pyc b/core/__pycache__/admin.cpython-310.pyc new file mode 100644 index 0000000..ff1bb0f Binary files /dev/null and b/core/__pycache__/admin.cpython-310.pyc differ diff --git a/core/__pycache__/apps.cpython-310.pyc b/core/__pycache__/apps.cpython-310.pyc new file mode 100644 index 0000000..4f4615c Binary files /dev/null and b/core/__pycache__/apps.cpython-310.pyc differ diff --git a/core/__pycache__/models.cpython-310.pyc b/core/__pycache__/models.cpython-310.pyc new file mode 100644 index 0000000..4568901 Binary files /dev/null and b/core/__pycache__/models.cpython-310.pyc differ diff --git a/core/__pycache__/serializers.cpython-310.pyc b/core/__pycache__/serializers.cpython-310.pyc new file mode 100644 index 0000000..e839a54 Binary files /dev/null and b/core/__pycache__/serializers.cpython-310.pyc differ diff --git a/core/__pycache__/utils.cpython-310.pyc b/core/__pycache__/utils.cpython-310.pyc new file mode 100644 index 0000000..aca2c36 Binary files /dev/null and b/core/__pycache__/utils.cpython-310.pyc differ diff --git a/core/__pycache__/views.cpython-310.pyc b/core/__pycache__/views.cpython-310.pyc new file mode 100644 index 0000000..3766761 Binary files /dev/null and b/core/__pycache__/views.cpython-310.pyc differ diff --git a/core/admin.py b/core/admin.py new file mode 100644 index 0000000..508f426 --- /dev/null +++ b/core/admin.py @@ -0,0 +1,5 @@ +from django.contrib import admin +from core.models import UserModel + +# Register your models here. +admin.site.register(UserModel) \ No newline at end of file diff --git a/core/apps.py b/core/apps.py new file mode 100644 index 0000000..8115ae6 --- /dev/null +++ b/core/apps.py @@ -0,0 +1,6 @@ +from django.apps import AppConfig + + +class CoreConfig(AppConfig): + default_auto_field = 'django.db.models.BigAutoField' + name = 'core' diff --git a/core/migrations/0001_initial.py b/core/migrations/0001_initial.py new file mode 100644 index 0000000..ac7a6b5 --- /dev/null +++ b/core/migrations/0001_initial.py @@ -0,0 +1,39 @@ +# Generated by Django 5.0.3 on 2024-03-17 01:08 + +import django.core.validators +from django.db import migrations, models + + +class Migration(migrations.Migration): + + initial = True + + dependencies = [ + ('auth', '0012_alter_user_first_name_max_length'), + ] + + operations = [ + migrations.CreateModel( + name='UserModel', + fields=[ + ('id', models.BigAutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), + ('password', models.CharField(max_length=128, verbose_name='password')), + ('last_login', models.DateTimeField(blank=True, null=True, verbose_name='last login')), + ('is_superuser', models.BooleanField(default=False, help_text='Designates that this user has all permissions without explicitly assigning them.', verbose_name='superuser status')), + ('phone_number', models.CharField(max_length=10, unique=True, validators=[django.core.validators.RegexValidator(message='Phone number must be 10 digits only.', regex='^\\d{10}')])), + ('email', models.EmailField(blank=True, max_length=50, null=True, validators=[django.core.validators.EmailValidator()])), + ('otp', models.CharField(max_length=6)), + ('otp_expiry', models.DateTimeField(blank=True, null=True)), + ('max_otp_try', models.CharField(default=3, max_length=2)), + ('otp_max_out', models.DateTimeField(blank=True, null=True)), + ('is_active', models.BooleanField(default=False)), + ('is_staff', models.BooleanField(default=False)), + ('user_registered_at', models.DateTimeField(auto_now_add=True)), + ('groups', models.ManyToManyField(blank=True, help_text='The groups this user belongs to. A user will get all permissions granted to each of their groups.', related_name='user_set', related_query_name='user', to='auth.group', verbose_name='groups')), + ('user_permissions', models.ManyToManyField(blank=True, help_text='Specific permissions for this user.', related_name='user_set', related_query_name='user', to='auth.permission', verbose_name='user permissions')), + ], + options={ + 'abstract': False, + }, + ), + ] diff --git a/core/migrations/__init__.py b/core/migrations/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/core/migrations/__pycache__/0001_initial.cpython-310.pyc b/core/migrations/__pycache__/0001_initial.cpython-310.pyc new file mode 100644 index 0000000..b589f03 Binary files /dev/null and b/core/migrations/__pycache__/0001_initial.cpython-310.pyc differ diff --git a/core/migrations/__pycache__/__init__.cpython-310.pyc b/core/migrations/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000..308594e Binary files /dev/null and b/core/migrations/__pycache__/__init__.cpython-310.pyc differ diff --git a/core/models.py b/core/models.py new file mode 100644 index 0000000..f2dc641 --- /dev/null +++ b/core/models.py @@ -0,0 +1,50 @@ +from django.db import models +from django.conf import settings +from django.contrib.auth.models import ( + AbstractBaseUser, + BaseUserManager, + PermissionsMixin +) +from django.core.validators import RegexValidator, validate_email + +phone_regex = RegexValidator( + regex=r"^\d{10}", message="Phone number must be 10 digits only." +) + + +class UserManager(BaseUserManager): + def create_user(self, phone_number, password=None): + if not phone_number: + raise ValueError("Phone number is required.") + user = self.model(phone_number=phone_number) + user.set_password(password) + user.save(using=self._db) + return user + + def create_superuser(self, phone_number, password): + user = self.create_user(phone_number, password) + user.is_staff = True + user.is_active = True + user.is_superuser = True + user.save(using=self._db) + return user + + +class UserModel(AbstractBaseUser, PermissionsMixin): + phone_number = models.CharField(validators=[phone_regex], unique=True, max_length=10, blank=False, null=False) + email = models.EmailField(max_length=50, blank=True, null=True, validators=[validate_email]) + otp = models.CharField(max_length=6) + otp_expiry = models.DateTimeField(blank=True, null=True) + max_otp_try = models.CharField(max_length=2, default=settings.MAX_OTP_TRY) + otp_max_out = models.DateTimeField(blank=True, null=True) + + is_active = models.BooleanField(default=False) + is_staff = models.BooleanField(default=False) + user_registered_at = models.DateTimeField(auto_now_add=True) + + USERNAME_FIELD = 'phone_number' + + objects = UserManager() + + def __str__(self): + return self.phone_number diff --git a/core/serializers.py b/core/serializers.py new file mode 100644 index 0000000..4213b3e --- /dev/null +++ b/core/serializers.py @@ -0,0 +1,56 @@ +from datetime import datetime, timedelta +import random +from django.conf import settings +from rest_framework import serializers +from core.utils import send_otp + + +from core.models import UserModel + + +class UserSerializer(serializers.ModelSerializer): + password1 = serializers.CharField( + write_only=True, + min_length=settings.MIN_PASSWORD_LENGTH, + error_messages={ + 'min_length': f'Password must be longer than {settings.MIN_PASSWORD_LENGTH} characters.' + } + ) + + password2 = serializers.CharField( + write_only=True, + min_length=settings.MIN_PASSWORD_LENGTH, + error_messages={ + 'min_length': f'Password must be longer than {settings.MIN_PASSWORD_LENGTH} characters.' + } + ) + + class Meta: + model = UserModel + fields = ( + 'phone_number', + 'email', + 'password1', + 'password2', + ) + + def validate(self, data): + if data['password1'] != data['password2']: + raise serializers.ValidationError("Passwords do not match.") + return data + + def create(self, validated_data): + otp = random.randint(1000, 9999) + otp_expiry = datetime.now() + timedelta(minutes=10) + + user = UserModel( + phone_number=validated_data['phone_number'], + email=validated_data['email'], + otp=otp, + otp_expiry=otp_expiry, + max_otp_try=settings.MAX_OTP_TRY + ) + user.set_password(validated_data['password1']) + user.save() + send_otp(validated_data['phone_number'], otp) + return user \ No newline at end of file diff --git a/core/tests.py b/core/tests.py new file mode 100644 index 0000000..7ce503c --- /dev/null +++ b/core/tests.py @@ -0,0 +1,3 @@ +from django.test import TestCase + +# Create your tests here. diff --git a/core/utils.py b/core/utils.py new file mode 100644 index 0000000..b009c8b --- /dev/null +++ b/core/utils.py @@ -0,0 +1,11 @@ +import requests +from django.conf import settings + +def send_otp(mobile, otp): + url = f'https://2factor.in/API/V1/{settings.SMS_API_KEY}/SMS/{mobile}/{otp}/Your OTP is' + payload = '' + headers = {'Content-Type': 'application/x-www-form-urlencoded'} + + response = requests.get(url, data=payload, headers=headers) + + return bool(response.ok) \ No newline at end of file diff --git a/core/views.py b/core/views.py new file mode 100644 index 0000000..b6d7e3e --- /dev/null +++ b/core/views.py @@ -0,0 +1,71 @@ +import datetime +import random + +from rest_framework import viewsets, status +from core.models import UserModel +from core.serializers import UserSerializer +from django.utils import timezone +from rest_framework.decorators import action +from rest_framework.response import Response +from django.conf import settings +from core.utils import send_otp + + +class UserViewSet(viewsets.ModelViewSet): + queryset = UserModel.objects.all() + serializer_class = UserSerializer + + @action(detail=True, methods=['PATCH']) + def verify_otp(self, request, pk=None): + instance = self.get_object() + + if ( + not instance.is_active + and instance.otp == request.data.get('otp') + and instance.otp_expiry + and timezone.now() < instance.otp_expiry + ): + instance.is_active = True + instance.otp_expiry = None + instance.max_otp_try = settings.MAX_OTP_TRY + instance.otp_max_out = None + instance.save() + + return Response( + 'Successfully verified the user.', status=status.HTTP_200_OK + ) + return Response( + 'User active or please enter the correct OTP.', + status=status.HTTP_400_BAD_REQUEST + ) + + @action(detail=True, methods=['PATCH']) + def regenerate_otp(self, request, pk=None): + instance = self.get_object() + + if int(instance.max_otp_try) == 0 and timezone.now() < instance.otp_max_out: + return Response( + 'Max OTP try reached. Try after an hour.', + status=status.HTTP_400_BAD_REQUEST + ) + + otp = random.randint(1000,9999) + otp_expiry = timezone.now() + datetime.timedelta(minutes=10) + max_otp_try = int(instance.max_otp_try) - 1 + + instance.otp = otp + instance.otp_expiry = otp_expiry + instance.max_otp_try = max_otp_try + + if max_otp_try == 0: + instance.otp_max_out = timezone.now() + datetime.timedelta(hours=1) + elif max_otp_try == -1: + instance.max_otp_try = settings.MAX_OTP_TRY + else: + instance.otp_max_out = None + instance.max_otp_try = max_otp_try + + instance.save() + send_otp(instance.phone_number, otp) + + return Response('Successfully re-generated the new OTP', status=status.HTTP_200_OK) \ No newline at end of file diff --git a/manage.py b/manage.py new file mode 100644 index 0000000..bfabda5 --- /dev/null +++ b/manage.py @@ -0,0 +1,22 @@ +#!/usr/bin/env python +"""Django's command-line utility for administrative tasks.""" +import os +import sys + + +def main(): + """Run administrative tasks.""" + os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'otpauth.settings') + try: + from django.core.management import execute_from_command_line + except ImportError as exc: + raise ImportError( + "Couldn't import Django. Are you sure it's installed and " + "available on your PYTHONPATH environment variable? Did you " + "forget to activate a virtual environment?" + ) from exc + execute_from_command_line(sys.argv) + + +if __name__ == '__main__': + main() diff --git a/otpauth/__init__.py b/otpauth/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/otpauth/__pycache__/__init__.cpython-310.pyc b/otpauth/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000..4866631 Binary files /dev/null and b/otpauth/__pycache__/__init__.cpython-310.pyc differ diff --git a/otpauth/__pycache__/settings.cpython-310.pyc b/otpauth/__pycache__/settings.cpython-310.pyc new file mode 100644 index 0000000..f06ccf9 Binary files /dev/null and b/otpauth/__pycache__/settings.cpython-310.pyc differ diff --git a/otpauth/__pycache__/urls.cpython-310.pyc b/otpauth/__pycache__/urls.cpython-310.pyc new file mode 100644 index 0000000..6a082f3 Binary files /dev/null and b/otpauth/__pycache__/urls.cpython-310.pyc differ diff --git a/otpauth/__pycache__/wsgi.cpython-310.pyc b/otpauth/__pycache__/wsgi.cpython-310.pyc new file mode 100644 index 0000000..9bb85fd Binary files /dev/null and b/otpauth/__pycache__/wsgi.cpython-310.pyc differ diff --git a/otpauth/asgi.py b/otpauth/asgi.py new file mode 100644 index 0000000..865ac8a --- /dev/null +++ b/otpauth/asgi.py @@ -0,0 +1,16 @@ +""" +ASGI config for otpauth project. + +It exposes the ASGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/5.0/howto/deployment/asgi/ +""" + +import os + +from django.core.asgi import get_asgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'otpauth.settings') + +application = get_asgi_application() diff --git a/otpauth/settings.py b/otpauth/settings.py new file mode 100644 index 0000000..16b26f8 --- /dev/null +++ b/otpauth/settings.py @@ -0,0 +1,135 @@ +""" +Django settings for otpauth project. + +Generated by 'django-admin startproject' using Django 5.0.3. + +For more information on this file, see +https://docs.djangoproject.com/en/5.0/topics/settings/ + +For the full list of settings and their values, see +https://docs.djangoproject.com/en/5.0/ref/settings/ +""" + +from pathlib import Path +import environ + +# Build paths inside the project like this: BASE_DIR / 'subdir'. +BASE_DIR = Path(__file__).resolve().parent.parent + +env = environ.Env() +environ.Env.read_env(BASE_DIR / '.env') + +SMS_API_KEY = env('SMS_API_KEY') + +MAX_OTP_TRY = 3 +AUTH_USER_MODEL = 'core.UserModel' +MIN_PASSWORD_LENGTH = 8 + + +# Quick-start development settings - unsuitable for production +# See https://docs.djangoproject.com/en/5.0/howto/deployment/checklist/ + +# SECURITY WARNING: keep the secret key used in production secret! +SECRET_KEY = 'django-insecure-^gjq8rs*21da9_i#^wn%-*1l#7h$s8kgw6tzpir7-qmx+vtp3m' + +# SECURITY WARNING: don't run with debug turned on in production! +DEBUG = True + +ALLOWED_HOSTS = [] + + +# Application definition + +INSTALLED_APPS = [ + 'django.contrib.admin', + 'django.contrib.auth', + 'django.contrib.contenttypes', + 'django.contrib.sessions', + 'django.contrib.messages', + 'django.contrib.staticfiles', + 'core', + 'rest_framework' +] + +MIDDLEWARE = [ + 'django.middleware.security.SecurityMiddleware', + 'django.contrib.sessions.middleware.SessionMiddleware', + 'django.middleware.common.CommonMiddleware', + 'django.middleware.csrf.CsrfViewMiddleware', + 'django.contrib.auth.middleware.AuthenticationMiddleware', + 'django.contrib.messages.middleware.MessageMiddleware', + 'django.middleware.clickjacking.XFrameOptionsMiddleware', +] + +ROOT_URLCONF = 'otpauth.urls' + +TEMPLATES = [ + { + 'BACKEND': 'django.template.backends.django.DjangoTemplates', + 'DIRS': [], + 'APP_DIRS': True, + 'OPTIONS': { + 'context_processors': [ + 'django.template.context_processors.debug', + 'django.template.context_processors.request', + 'django.contrib.auth.context_processors.auth', + 'django.contrib.messages.context_processors.messages', + ], + }, + }, +] + +WSGI_APPLICATION = 'otpauth.wsgi.application' + + +# Database +# https://docs.djangoproject.com/en/5.0/ref/settings/#databases + +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.sqlite3', + 'NAME': BASE_DIR / 'db.sqlite3', + } +} + + +# Password validation +# https://docs.djangoproject.com/en/5.0/ref/settings/#auth-password-validators + +AUTH_PASSWORD_VALIDATORS = [ + { + 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator', + }, +] + + +# Internationalization +# https://docs.djangoproject.com/en/5.0/topics/i18n/ + +LANGUAGE_CODE = 'en-us' + +TIME_ZONE = 'UTC' + +USE_I18N = True + +USE_TZ = True + + +# Static files (CSS, JavaScript, Images) +# https://docs.djangoproject.com/en/5.0/howto/static-files/ + +STATIC_URL = 'static/' + +# Default primary key field type +# https://docs.djangoproject.com/en/5.0/ref/settings/#default-auto-field + +DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField' diff --git a/otpauth/urls.py b/otpauth/urls.py new file mode 100644 index 0000000..783bc23 --- /dev/null +++ b/otpauth/urls.py @@ -0,0 +1,30 @@ +""" +URL configuration for otpauth project. + +The `urlpatterns` list routes URLs to views. For more information please see: + https://docs.djangoproject.com/en/5.0/topics/http/urls/ +Examples: +Function views + 1. Add an import: from my_app import views + 2. Add a URL to urlpatterns: path('', views.home, name='home') +Class-based views + 1. Add an import: from other_app.views import Home + 2. Add a URL to urlpatterns: path('', Home.as_view(), name='home') +Including another URLconf + 1. Import the include() function: from django.urls import include, path + 2. Add a URL to urlpatterns: path('blog/', include('blog.urls')) +""" +from django.contrib import admin +from django.urls import path, include +from rest_framework.routers import DefaultRouter +from core import views + +router = DefaultRouter() +router.register('user', views.UserViewSet, basename='user') + +urlpatterns = [ + path('admin/', admin.site.urls), + path('api/auth/', include('rest_framework.urls')) +] + +urlpatterns += router.urls \ No newline at end of file diff --git a/otpauth/wsgi.py b/otpauth/wsgi.py new file mode 100644 index 0000000..77e5182 --- /dev/null +++ b/otpauth/wsgi.py @@ -0,0 +1,16 @@ +""" +WSGI config for otpauth project. + +It exposes the WSGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/5.0/howto/deployment/wsgi/ +""" + +import os + +from django.core.wsgi import get_wsgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'otpauth.settings') + +application = get_wsgi_application()