aboutsummaryrefslogtreecommitdiff
path: root/app/views/auth.py
diff options
context:
space:
mode:
authorNavan Chauhan <navanchauhan@gmail.com>2021-06-06 15:06:02 +0530
committerNavan Chauhan <navanchauhan@gmail.com>2021-06-06 15:06:02 +0530
commit2c2e1772b23bbd42b99eeedc854f4d7b723e59d1 (patch)
tree54cfcb60686642c3cc8f9694e7965d416f107334 /app/views/auth.py
parent47b68d56d831d234c44da9530373b95dae338ea4 (diff)
add exceptions for confirm token and test for unverified email
Diffstat (limited to 'app/views/auth.py')
-rw-r--r--app/views/auth.py6
1 files changed, 4 insertions, 2 deletions
diff --git a/app/views/auth.py b/app/views/auth.py
index f2cf338..d6f02b8 100644
--- a/app/views/auth.py
+++ b/app/views/auth.py
@@ -5,6 +5,7 @@ from app.misc_func import flash_errors, send, send_async
import flask_login
from sqlalchemy.exc import IntegrityError
from itsdangerous.url_safe import URLSafeSerializer
+from itsdangerous.exc import BadSignature
ts = URLSafeSerializer(app.config["SECRET_KEY"])
@@ -111,8 +112,9 @@ def confirm_email():
try:
email = ts.loads(confirmation_token, salt="email-confirm-key",max_age=86400)
except TypeError:
- return render_template("message.html",message="Expired or Invalid Token")
-
+ return render_template("message.html",message="Token not provided in URL Parameter")
+ except BadSignature:
+ return render_template("message.html",message="Bad Token Provided")
user = models.User.query.filter_by(email=email).first()
print(email)
user.confirmation = True