1616 You should have received a copy of the GNU General Public License
1717 along with this program. If not, see <https://www.gnu.org/licenses/>.
1818"""
19+ import logging
20+
1921from flask import Blueprint
20- from flask import current_app
2122from flask import render_template
2223from flask import request
2324from itsdangerous import BadSignature
@@ -46,15 +47,15 @@ def forgot_password():
4647 try :
4748 get_user (data ["email" ])
4849 except NotFoundError :
49- current_app . logger .debug ("User not found, no email sent" )
50+ logging .debug ("User not found, no email sent" )
5051 pass
5152 else :
5253 token = generate_confirmation_token (email = data ["email" ], token_type = "reset" )
5354 link = FRONTEND_PASSWORD_RESET_URL + token
5455 rendered_html = render_template ("password_reset.html" , link = link )
55- current_app . logger .debug ("Sending worker request to send email" )
56+ logging .debug ("Sending worker request to send email" )
5657 send_mail_html .delay (dest = data ["email" ], subject = "Reset your password on PyMatcha" , html = rendered_html )
57- current_app . logger .debug ("Password reset mail sent successfully for user." )
58+ logging .debug ("Password reset mail sent successfully for user." )
5859 return Success ("Password reset mail sent successfully if user exists in DB." )
5960
6061
@@ -67,26 +68,26 @@ def reset_password():
6768 email , token_type = confirm_token (token , expiration = 7200 )
6869 except (SignatureExpired , BadSignature ) as e :
6970 if e == SignatureExpired :
70- current_app . logger .debug (f"Signature Expired for { token } " )
71+ logging .debug (f"Signature Expired for { token } " )
7172 raise BadRequestError ("Signature Expired." , "Request another password reset and try again." )
7273 else :
73- current_app . logger .debug (f"Bad Signature for { token } " )
74+ logging .debug (f"Bad Signature for { token } " )
7475 raise BadRequestError ("Bad Signature." , "Request another password reset and try again." )
7576 else :
7677 if token_type != "reset" :
77- current_app . logger .debug (f"Wrong token type for { token } " )
78+ logging .debug (f"Wrong token type for { token } " )
7879 raise BadRequestError ("Wrong token type." )
7980 try :
8081 u = get_user (email )
8182 except NotFoundError :
8283 raise NotFoundError ("User not found." )
8384 if u .previous_reset_token == token :
84- current_app . logger .debug ("Token already used" )
85+ logging .debug ("Token already used" )
8586 raise BadRequestError ("Token already used" , "Please request a new one." )
8687 u .password = hash_password (data ["password" ])
8788 u .previous_reset_token = token
8889 u .save ()
89- current_app . logger .debug ("Password reset successfully" )
90+ logging .debug ("Password reset successfully" )
9091 return Success ("Password reset successful." )
9192
9293
@@ -99,17 +100,17 @@ def check_token_validity():
99100 email , token_type = confirm_token (token , expiration = 7200 )
100101 except (SignatureExpired , BadSignature ) as e :
101102 if e == SignatureExpired :
102- current_app . logger .debug (f"Signature Expired for { token } " )
103+ logging .debug (f"Signature Expired for { token } " )
103104 raise BadRequestError ("Signature Expired." , "Request another password reset and try again." )
104105 else :
105- current_app . logger .debug (f"Bad Signature for { token } " )
106+ logging .debug (f"Bad Signature for { token } " )
106107 raise BadRequestError ("Bad Signature." , "Request another password reset and try again." )
107108 else :
108109 try :
109110 u = get_user (email )
110111 except NotFoundError :
111112 raise NotFoundError ("User not found." )
112113 if u .previous_reset_token == token :
113- current_app . logger .debug ("Token already used" )
114+ logging .debug ("Token already used" )
114115 raise BadRequestError ("Token already used" , "Please request a new one." )
115116 return Success ("Reset token is correct." )
0 commit comments