code
stringlengths 41
34.3k
| lang
stringclasses 8
values | review
stringlengths 1
4.74k
|
|---|---|---|
@@ -0,0 +1,103 @@
+import json
+import bcrypt
+import jwt
+
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User, Follow
+from my_settings import SECRET_KEY
+
+class SignupView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ if User.objects.filter(email=data['email']).exists():
+ return JsonResponse({"message": "EMAIL_ERROR"}, status=400)
+
+ if not '@' in data['email'] or not '.' in data['email']:
+ return JsonResponse({"message":"EMAIL_FAIL"}, status=400)
+ if len(data['password']) < 8:
+ return JsonResponse({"message":"PASSWORD_TOO_SHORT"}, status=400)
+
+ byted_password = data['password'].encode('utf-8')
+ hash_password = bcrypt.hashpw(byted_password, bcrypt.gensalt()).decode()
+ password = hash_password
+ user = User.objects.create(
+ email = data['email'],
+ password = password
+ )
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+ except KeyError:
+ return JsonResponse({"message": "KEY_ERROR"}, status=400)
+
+
+class LoginView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ try:
+ user = User.objects.get(email=data['email'])
+ # user๋ ๊ฐ์ฒด๋ค
+ user_id = user.id
+ # ๊ฐ์ฒด์ .~ํ๋ฉด ๋ฐ๋ก ๋ด์ฉ์ ๊บผ๋ผ ์ ์๋ค.
+ except User.DoesNotExist:
+ return JsonResponse({"message":"USER_DOES_NOT_EXIST"}, status=400)
+
+ if bcrypt.checkpw(data['password'].encode('utf-8'), user.password.encode('utf-8')):
+ token = jwt.encode({'user_id' : user_id}, SECRET_KEY, algorithm="HS256")
+ # ์ ์ id๋ฅผ ํ ํฐ ๋ด์ฉ๋ฌผ์ ๋ฃ๋๋ค. ์ด๋ ์ด๋ฏธ ์ซ์๊ฐ ๋์์ผ๋ฏ๋ก data๋ก ํ ํ์ ์์
+ return JsonResponse({'token' : token, "message":"SUCCESS"}, status=200)
+
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+
+class TokenCheckView(View):
+ def post(self,request):
+ data = json.loads(request.body)
+
+ user_token_info = jwt.decode(data['token'], SECRET_KEY, algorithms='HS256')
+
+ if User.objects.filter(email=user_token_info['email']).exists():
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+class FollowView(View):
+ def post(self, request):
+ data = json.loads(request.body)
+ following = User.objects.get(email=data['following'])
+ follower = User.objects.get(email=data['follower'])
+ if following == follower:
+ return JsonResponse({"message":"SAME_PERSON!"})
+ follow = Follow.objects.create(
+ following = following,
+ follower = follower
+ )
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+
+def TokenCheck(func):
+ def wrapper(self, request, *args, **kwargs):
+ # ๋ฆฌํ์คํธํด์ ํ ํฐ ๊น๋ ์
+ # ํ ํฐ์ ํต์ฌ์ ๊ณต๊ฐ๊ฐ ๋์ด๋ ๋๋ค -> ๊ทธ๋์ ์์ ๊ฐ user_id์๋ ๊ฒ.
+ try:
+ token = request.headers.get('Authorization')
+ if token:
+ payload = jwt.decode(token, SECRET_KEY, algorithms="HS256")
+ user_id = payload['user_id']
+ user = User.objects.get(id=user_id)
+ # user_id ๊ฐ์ ธ์จ ๊ฒ์ user๋ผ๋ ๋ณ์์ ๋ด๊ณ
+
+ request.user = user
+ # ๋ณ์์ ๋ด์ ๊ฒ์ ๋ค์์ ๋ถ๋ฅผ request.user์ ๋ ๋ด์์ค๋ค.
+ return func(self, request, *args, **kwargs)
+ # ์๋ returnํ๋ฉด์ request๋ฅผ posting์์ ์ฌ์ฉํ ์์ (.user ๋ง ๋ถ์ด๋ฉด ์ด์ ์๋ ์์ฑ)
+ return JsonResponse({"message":"GIVE_ME_TOKEN"}, status=400)
+ except jwt.InvalidTokenError:
+ return JsonResponse({"message":"YOUR_TOKEN_ERROR"}, status=400)
+
+ # ์ง๊ธ์ ์ซ์๋ง ํ์ธ ์ํฉ(id๊ฐ๋ง ๋ฐ์์ ํ์ธํ ์ํฉ)
+ # ์ถ๊ฐ : ํ ํฐ์ ๋ค์ ์ ๊ฐ๋ค์ค ์ํฉ(๋ฆฌํ์คํธ์ ์ ๋ณด๋ฅผ ๋ฃ์ด์ค๋ค.) ; ๋ฆฌํ์คํธ์ ์ธ์คํด์ค๋ฅผ ๋ง๋ค์ด์ค๋ค.(์์ด๋๊ฐ์ ๋ฃ์ด์ค๋ค.->์ด๊ฑธ ๊บผ๋ด ์ด๋ค.)
+
+ return wrapper
\ No newline at end of file
|
Python
|
์ฌ๊ธฐ์ ์ด๋ ๊ฒ else ๋ก ์ก์์ฃผ์๊ธฐ ๋ณด๋ค๋ checkpw() ์ ๊ฐ์ด Falsy ํ๋ค๋ฉด 401 ์ ๋ฆฌํดํด์ฃผ์๊ณ ,
๋์ด์์ ์ง๊ธ ์์ ๋ณด์๋ If ๋ฌธ์ ๋ก์ง์ ์ฒ๋ฆฌํด์ฃผ์ ๋ค๋ฉด ๋ถํ์ํ else ๋ฌธ์ด ์์ด์ง๊ฒ ์ฃ ?
|
@@ -0,0 +1,103 @@
+import json
+import bcrypt
+import jwt
+
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User, Follow
+from my_settings import SECRET_KEY
+
+class SignupView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ if User.objects.filter(email=data['email']).exists():
+ return JsonResponse({"message": "EMAIL_ERROR"}, status=400)
+
+ if not '@' in data['email'] or not '.' in data['email']:
+ return JsonResponse({"message":"EMAIL_FAIL"}, status=400)
+ if len(data['password']) < 8:
+ return JsonResponse({"message":"PASSWORD_TOO_SHORT"}, status=400)
+
+ byted_password = data['password'].encode('utf-8')
+ hash_password = bcrypt.hashpw(byted_password, bcrypt.gensalt()).decode()
+ password = hash_password
+ user = User.objects.create(
+ email = data['email'],
+ password = password
+ )
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+ except KeyError:
+ return JsonResponse({"message": "KEY_ERROR"}, status=400)
+
+
+class LoginView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ try:
+ user = User.objects.get(email=data['email'])
+ # user๋ ๊ฐ์ฒด๋ค
+ user_id = user.id
+ # ๊ฐ์ฒด์ .~ํ๋ฉด ๋ฐ๋ก ๋ด์ฉ์ ๊บผ๋ผ ์ ์๋ค.
+ except User.DoesNotExist:
+ return JsonResponse({"message":"USER_DOES_NOT_EXIST"}, status=400)
+
+ if bcrypt.checkpw(data['password'].encode('utf-8'), user.password.encode('utf-8')):
+ token = jwt.encode({'user_id' : user_id}, SECRET_KEY, algorithm="HS256")
+ # ์ ์ id๋ฅผ ํ ํฐ ๋ด์ฉ๋ฌผ์ ๋ฃ๋๋ค. ์ด๋ ์ด๋ฏธ ์ซ์๊ฐ ๋์์ผ๋ฏ๋ก data๋ก ํ ํ์ ์์
+ return JsonResponse({'token' : token, "message":"SUCCESS"}, status=200)
+
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+
+class TokenCheckView(View):
+ def post(self,request):
+ data = json.loads(request.body)
+
+ user_token_info = jwt.decode(data['token'], SECRET_KEY, algorithms='HS256')
+
+ if User.objects.filter(email=user_token_info['email']).exists():
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+class FollowView(View):
+ def post(self, request):
+ data = json.loads(request.body)
+ following = User.objects.get(email=data['following'])
+ follower = User.objects.get(email=data['follower'])
+ if following == follower:
+ return JsonResponse({"message":"SAME_PERSON!"})
+ follow = Follow.objects.create(
+ following = following,
+ follower = follower
+ )
+ return JsonResponse({"message": "SUCCESS"}, status=200)
+
+def TokenCheck(func):
+ def wrapper(self, request, *args, **kwargs):
+ # ๋ฆฌํ์คํธํด์ ํ ํฐ ๊น๋ ์
+ # ํ ํฐ์ ํต์ฌ์ ๊ณต๊ฐ๊ฐ ๋์ด๋ ๋๋ค -> ๊ทธ๋์ ์์ ๊ฐ user_id์๋ ๊ฒ.
+ try:
+ token = request.headers.get('Authorization')
+ if token:
+ payload = jwt.decode(token, SECRET_KEY, algorithms="HS256")
+ user_id = payload['user_id']
+ user = User.objects.get(id=user_id)
+ # user_id ๊ฐ์ ธ์จ ๊ฒ์ user๋ผ๋ ๋ณ์์ ๋ด๊ณ
+
+ request.user = user
+ # ๋ณ์์ ๋ด์ ๊ฒ์ ๋ค์์ ๋ถ๋ฅผ request.user์ ๋ ๋ด์์ค๋ค.
+ return func(self, request, *args, **kwargs)
+ # ์๋ returnํ๋ฉด์ request๋ฅผ posting์์ ์ฌ์ฉํ ์์ (.user ๋ง ๋ถ์ด๋ฉด ์ด์ ์๋ ์์ฑ)
+ return JsonResponse({"message":"GIVE_ME_TOKEN"}, status=400)
+ except jwt.InvalidTokenError:
+ return JsonResponse({"message":"YOUR_TOKEN_ERROR"}, status=400)
+
+ # ์ง๊ธ์ ์ซ์๋ง ํ์ธ ์ํฉ(id๊ฐ๋ง ๋ฐ์์ ํ์ธํ ์ํฉ)
+ # ์ถ๊ฐ : ํ ํฐ์ ๋ค์ ์ ๊ฐ๋ค์ค ์ํฉ(๋ฆฌํ์คํธ์ ์ ๋ณด๋ฅผ ๋ฃ์ด์ค๋ค.) ; ๋ฆฌํ์คํธ์ ์ธ์คํด์ค๋ฅผ ๋ง๋ค์ด์ค๋ค.(์์ด๋๊ฐ์ ๋ฃ์ด์ค๋ค.->์ด๊ฑธ ๊บผ๋ด ์ด๋ค.)
+
+ return wrapper
\ No newline at end of file
|
Python
|
ํ ํฐ์์ ์ ์ ์ ๋ณด๋ฅผ ์ฐพ์์์ ํํฐํ๋ ๊ธฐ๋ฅ๊น์ง! ๐ ๐ ๐
๋ค๋ฏผ๋ ์ฒ์์๋ ์ดํดํ๋๋ฐ ์ด๋ ค์ํ์๋ ๊ฒ ๊ฐ์ ๊ฑฑ์ ์ ์กฐ๊ธ ํ์๋๋ฐ, ์ง๊ธ๋ณด๋ฉด ๋ฌธ์ ํด๊ฒฐ๋ฅ๋ ฅ์ด ์ ๋ง ์ข์ผ์ ๊ฒ ๊ฐ์์! ๋๋ฌด ์ํ์
จ์ต๋๋คใ
ใ
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+
+ email = models.EmailField(max_length=50, unique=True)
+ name = models.CharField(max_length=50, unique=True)
+ phone = models.CharField(max_length=50, unique=True)
+ password= models.CharField(max_length=500)
+
+ class Meta:
+ db_table='users'
+
|
Python
|
- email ์ ๊ฐ๋
์ฑ์ ์ํด, ๊ทธ๋ฆฌ๊ณ ์ถํ ์ฅ๊ณ Form ์ด ์ ๊ณตํ๋ validator ๋ฅผ ์ฌ์ฉํ ์๋ ์์ ๊ฒ์ ๊ฐ์ํด์ EmailField ๋ก ์ ์ธํด์ฃผ์ธ์!
- ๊ทธ๋ฆฌ๊ณ email ์ ๊ณ ์ ๊ฐ์ด์ฃ ? ์ด๋ด๋ ์ถ๊ฐํด์ค ์ ์๋ ์ต์
์ด ์์ต๋๋ค! ์ฐพ์์ ์ถ๊ฐํด์ฃผ์ธ์~
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+
+ email = models.EmailField(max_length=50, unique=True)
+ name = models.CharField(max_length=50, unique=True)
+ phone = models.CharField(max_length=50, unique=True)
+ password= models.CharField(max_length=500)
+
+ class Meta:
+ db_table='users'
+
|
Python
|
๋ณดํต ๋ฐ์ดํฐ๋ฒ ์ด์ค ์ปฌ๋ผ๋ช
์ ์ค์ฌ์ฐ์ง์๊ณ ์ต๋ํ ๋ช
ํํ๊ฒ ํ์ด์ ์ ์ธํด์ค๋๋ค. ์ฌ๊ธฐ๋ password ๋ก ํ์ด์ฃผ์ธ์~
๊ทธ๋ฆฌ๊ณ ์ด์ ๋น๋ฐ๋ฒํธ ์ํธํ ๊ณผ์ ์ ์งํํ๋๋งํผ ์ต๋ ๊ธ์์๋ฅผ ์กฐ๊ธ ๋ ๋๋ํ๊ฒ ์ก์์ฃผ์๋๊ฒ ์ข์ต๋๋ค!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
- exists ๋ฉ์๋ ๋๋ฌด ์ ํ์ฉํ์
จ๋ค์!! ๐
- ์ฌ๊ธฐ์ exists ์ ๊ฒฐ๊ณผ๋ฅผ ๋ฐ๋ก ๋ณ์์ ์ ์ฅํด์ค๊ฒ ์์ด ์๋ if ๋ฌธ์ ๋ฐ๋ก ์ ์ฉํด์ฃผ์ ๋ค๋ฉด ๋ถํ์ํ ๋ณ์ ์ ์ธ์ ์์จ ์ ์๊ฒ ์ฃ ?!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
or, not, in ํ์ฉ ๋๋ฌด ์ข์ต๋๋ค ํธ์ด๋!!! ๊ทธ๋ฐ๋ฐ email ์ list ๋ก ํ๋ณํํด์ฃผ์ ์ด์ ๊ฐ ์์๊น์?
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
์์ ๋ฆฌ๋ทฐ ๋ด์ฉ ๋ฐ์ํด์ฃผ์๋ฉด ์ด ๋ถ๋ถ์ ์์ ์ฌํญ์ด ์๊ธฐ๊ฒ ์ฃ !?
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
`or` ๊ณผ `is` ์ค์ ์ด๋ค๊ฒ ์ฐ์ ์์์ผ๊น์? ์กฐ๊ฑด๋ฌธ์์ operator precedence ์ ๋ฐ๋ผ ์กฐ๊ฑด์ด ์์ ํ ๋ฐ๋ ์ ์๊ธฐ ๋๋ฌธ์ ์ ํ์
ํ๊ณ ์ฌ์ฉํ์๋๊ฒ ์ข์ต๋๋ค!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
์ด ๋ถ๋ถ๋ค์์๋ ํ์ด์ฌ์ exception ์ด ๋ฐ์ํ ์ ์์ต๋๋ค. Exception handling ์ ๋ํด์ repl.it ์์ ๋ณด์ ์ ์ด ์์ผ์ ๋ฐ์! ์ค์ ๋ก view ์์ ์ ๋ง์ ๋ง ์ค์ํ ์ญํ ์ ํ๋ ๋งํผ ๊ผญ ์ถ๊ฐ๋์ด์ผ ํ๋ ๋ก์ง์
๋๋ค.
์ด ์ฝ๋๋ค์์ ์ด๋ค exception ์ด ๋ฐ์ํ ์ ์์์ง ํ์ธํด๋ณด์๊ณ ํธ๋ค๋ง ๋ก์ง ์ถ๊ฐํด์ฃผ์ธ์!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
์ด์ bcrypt ๋ฅผ ํ์ฉํ์ฌ ๋น๋ฐ๋ฒํธ ์ํธํ ๋ก์ง ์ถ๊ฐํด์ ์ ์ฅํด์ฃผ์ธ์!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
CREATED ๋ฅผ ์๋ฏธํ๋ 201 ์ฌ์ฉ ๋๋ฌด ์ํ์
จ์ต๋๋ค! ๐
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+
+ email = models.EmailField(max_length=50, unique=True)
+ name = models.CharField(max_length=50, unique=True)
+ phone = models.CharField(max_length=50, unique=True)
+ password= models.CharField(max_length=500)
+
+ class Meta:
+ db_table='users'
+
|
Python
|
ํด๋ํฐ ๋ฒํธ๋ ๊ณ ์ ๊ฐ์ด๋ ์์ฒ๋ผ ๊ณ ์ ๊ฐ์ ๋ปํ๋ ์ต์
์ ์ถ๊ฐํด์ฃผ์
์ผ ํฉ๋๋ค!
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
string / list ์ ๋ํ ์ดํด๊ฐ ๋ถ์กฑํ์ต๋๋ค.
- [x] Strings can be indexed (subscripted), with the first character having index 0. There is no separate character type; a character is simply a string of size one:
- [x] if '.' not in email or '@' not in email:
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
๋ถํ์ํ ์ฃผ์ ์ ์ธํ๊ณ ์ฌ๋ ค์ฃผ์ธ์.
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
else ๋ถํ์
|
@@ -0,0 +1,76 @@
+import json,bcrypt,jwt
+from json.decoder import JSONDecodeError
+
+from django.db.models import Q
+from django.views import View
+from django.http import JsonResponse
+
+from .models import User
+from my_settings import SECRET_KEY, ALGORITHM
+
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ name = data['name']
+ email = data['email']
+ phone = data['phone']
+ password= data['password']
+
+ if '.' not in email or '@' not in email:
+ return JsonResponse({'message':'error_email_form'}, status=401)
+
+ if len(password)<8:
+ return JsonResponse({'message':'error_password_form'}, status=401)
+
+ if User.objects.filter(Q(name=name) | Q(email=email) | Q(phone=phone)).exists:
+ return JsonResponse({'message':'id_exist'}, status = 401)
+
+ hashed_password = bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt())
+ decoded_password= hashed_password.decode('utf-8')
+
+ User.objects.create(email=email, name=name, phone=phone, password=decoded_password)
+ return JsonResponse({'message':'success_signup'}, status = 201)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+ id = data['id']
+ password= data['password']
+ user = User.objects.get(Q(name=id) | Q(email=id) | Q(phone=id))
+
+ if user is not id:
+ return JsonResponse({'message':'error_id_matching'}, status=401)
+
+ if user is id:
+ decoded_password = user.password
+ encoded_password = password.encode('utf-8')
+ bcrypt.checkpw(encoded_password, decoded_password.encode('utf-8'))
+ token = jwt.encode({'user':user.id}, SECRET_KEY, ALGORITHM)
+ return JsonResponse({'message':'success_signin', 'access_token':token}, status=201)
+
+ return JsonResponse({'message':'error_password_matching'}, status = 401)
+
+ except User.MultipleObjectsReturned:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except User.DoesNotExist:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=401)
+
+ except KeyError:
+ return JsonResponse({'message': 'KEY_ERROR'}, status=400)
+
+ except JSONDecodeError:
+ return JsonResponse({'message': 'JSONDecodeError'}, status=400)
+
+
+
|
Python
|
์ฑ๊ณต ์ผ์ด์ค์์ ์ธ ๋ก์ง์ด๊ธฐ ๋๋ฌธ์ ์๋๋ก ์์น์์ผ์ฃผ์ธ์.
|
@@ -0,0 +1,145 @@
+"""
+Django settings for westagram project.
+
+Generated by 'django-admin startproject' using Django 3.1.7.
+
+For more information on this file, see
+https://docs.djangoproject.com/en/3.1/topics/settings/
+
+For the full list of settings and their values, see
+https://docs.djangoproject.com/en/3.1/ref/settings/
+"""
+
+from pathlib import Path
+from my_settings import SECRET_KEY, DATABASES
+
+# Build paths inside the project like this: BASE_DIR / 'subdir'.
+BASE_DIR = Path(__file__).resolve().parent.parent
+
+
+# Quick-start development settings - unsuitable for production
+# See https://docs.djangoproject.com/en/3.1/howto/deployment/checklist/
+
+# SECURITY WARNING: keep the secret key used in production secret!
+SECRET_KEY = SECRET_KEY
+
+# SECURITY WARNING: don't run with debug turned on in production!
+DEBUG = True
+
+ALLOWED_HOSTS = ['*']
+
+
+# Application definition
+
+INSTALLED_APPS = [
+# 'django.contrib.admin',
+# 'django.contrib.auth',
+ 'django.contrib.contenttypes',
+ 'django.contrib.sessions',
+ 'django.contrib.messages',
+ 'django.contrib.staticfiles',
+ 'corsheaders',
+ 'user',
+ 'posting'
+]
+
+MIDDLEWARE = [
+ 'django.middleware.security.SecurityMiddleware',
+ 'django.contrib.sessions.middleware.SessionMiddleware',
+ 'django.middleware.common.CommonMiddleware',
+# 'django.middleware.csrf.CsrfViewMiddleware',
+# 'django.contrib.auth.middleware.AuthenticationMiddleware',
+ 'django.contrib.messages.middleware.MessageMiddleware',
+ 'django.middleware.clickjacking.XFrameOptionsMiddleware',
+ 'corsheaders.middleware.CorsMiddleware',
+]
+
+ROOT_URLCONF = 'westagram.urls'
+
+TEMPLATES = [
+ {
+ 'BACKEND': 'django.template.backends.django.DjangoTemplates',
+ 'DIRS': [],
+ 'APP_DIRS': True,
+ 'OPTIONS': {
+ 'context_processors': [
+ 'django.template.context_processors.debug',
+ 'django.template.context_processors.request',
+ 'django.contrib.auth.context_processors.auth',
+ 'django.contrib.messages.context_processors.messages',
+ ],
+ },
+ },
+]
+
+WSGI_APPLICATION = 'westagram.wsgi.application'
+
+
+# Database
+# https://docs.djangoproject.com/en/3.1/ref/settings/#databases
+
+DATABASES = DATABASES
+
+
+# Password validation
+# https://docs.djangoproject.com/en/3.1/ref/settings/#auth-password-validators
+
+AUTH_PASSWORD_VALIDATORS = [
+ {
+ 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
+ },
+]
+
+
+# Internationalization
+# https://docs.djangoproject.com/en/3.1/topics/i18n/
+
+LANGUAGE_CODE = 'en-us'
+
+TIME_ZONE = 'UTC'
+
+USE_I18N = True
+
+USE_L10N = True
+
+USE_TZ = True
+
+
+# Static files (CSS, JavaScript, Images)
+# https://docs.djangoproject.com/en/3.1/howto/static-files/
+
+STATIC_URL = '/static/'
+
+##CORS
+CORS_ORIGIN_ALLOW_ALL=True
+CORS_ALLOW_CREDENTIALS = True
+
+CORS_ALLOW_METHODS = (
+ 'DELETE',
+ 'GET',
+ 'OPTIONS',
+ 'PATCH',
+ 'POST',
+ 'PUT',
+)
+
+CORS_ALLOW_HEADERS = (
+ 'accept',
+ 'accept-encoding',
+ 'authorization',
+ 'content-type',
+ 'dnt',
+ 'origin',
+ 'user-agent',
+ 'x-csrftoken',
+ 'x-requested-with',
+)
|
Python
|
์๋ฒฝํฉ๋๋ค ๊ตญํ๋! ๐ฏ
|
@@ -0,0 +1,145 @@
+"""
+Django settings for westagram project.
+
+Generated by 'django-admin startproject' using Django 3.1.7.
+
+For more information on this file, see
+https://docs.djangoproject.com/en/3.1/topics/settings/
+
+For the full list of settings and their values, see
+https://docs.djangoproject.com/en/3.1/ref/settings/
+"""
+
+from pathlib import Path
+from my_settings import SECRET_KEY, DATABASES
+
+# Build paths inside the project like this: BASE_DIR / 'subdir'.
+BASE_DIR = Path(__file__).resolve().parent.parent
+
+
+# Quick-start development settings - unsuitable for production
+# See https://docs.djangoproject.com/en/3.1/howto/deployment/checklist/
+
+# SECURITY WARNING: keep the secret key used in production secret!
+SECRET_KEY = SECRET_KEY
+
+# SECURITY WARNING: don't run with debug turned on in production!
+DEBUG = True
+
+ALLOWED_HOSTS = ['*']
+
+
+# Application definition
+
+INSTALLED_APPS = [
+# 'django.contrib.admin',
+# 'django.contrib.auth',
+ 'django.contrib.contenttypes',
+ 'django.contrib.sessions',
+ 'django.contrib.messages',
+ 'django.contrib.staticfiles',
+ 'corsheaders',
+ 'user',
+ 'posting'
+]
+
+MIDDLEWARE = [
+ 'django.middleware.security.SecurityMiddleware',
+ 'django.contrib.sessions.middleware.SessionMiddleware',
+ 'django.middleware.common.CommonMiddleware',
+# 'django.middleware.csrf.CsrfViewMiddleware',
+# 'django.contrib.auth.middleware.AuthenticationMiddleware',
+ 'django.contrib.messages.middleware.MessageMiddleware',
+ 'django.middleware.clickjacking.XFrameOptionsMiddleware',
+ 'corsheaders.middleware.CorsMiddleware',
+]
+
+ROOT_URLCONF = 'westagram.urls'
+
+TEMPLATES = [
+ {
+ 'BACKEND': 'django.template.backends.django.DjangoTemplates',
+ 'DIRS': [],
+ 'APP_DIRS': True,
+ 'OPTIONS': {
+ 'context_processors': [
+ 'django.template.context_processors.debug',
+ 'django.template.context_processors.request',
+ 'django.contrib.auth.context_processors.auth',
+ 'django.contrib.messages.context_processors.messages',
+ ],
+ },
+ },
+]
+
+WSGI_APPLICATION = 'westagram.wsgi.application'
+
+
+# Database
+# https://docs.djangoproject.com/en/3.1/ref/settings/#databases
+
+DATABASES = DATABASES
+
+
+# Password validation
+# https://docs.djangoproject.com/en/3.1/ref/settings/#auth-password-validators
+
+AUTH_PASSWORD_VALIDATORS = [
+ {
+ 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
+ },
+ {
+ 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
+ },
+]
+
+
+# Internationalization
+# https://docs.djangoproject.com/en/3.1/topics/i18n/
+
+LANGUAGE_CODE = 'en-us'
+
+TIME_ZONE = 'UTC'
+
+USE_I18N = True
+
+USE_L10N = True
+
+USE_TZ = True
+
+
+# Static files (CSS, JavaScript, Images)
+# https://docs.djangoproject.com/en/3.1/howto/static-files/
+
+STATIC_URL = '/static/'
+
+##CORS
+CORS_ORIGIN_ALLOW_ALL=True
+CORS_ALLOW_CREDENTIALS = True
+
+CORS_ALLOW_METHODS = (
+ 'DELETE',
+ 'GET',
+ 'OPTIONS',
+ 'PATCH',
+ 'POST',
+ 'PUT',
+)
+
+CORS_ALLOW_HEADERS = (
+ 'accept',
+ 'accept-encoding',
+ 'authorization',
+ 'content-type',
+ 'dnt',
+ 'origin',
+ 'user-agent',
+ 'x-csrftoken',
+ 'x-requested-with',
+)
|
Python
|
๋ต๋ต ํ์ธ ๊ฐ์ฌ๋๋ฆฝ๋๋ค ์นํ๋ ใ
ใ
๐๐
๋ฏธ์
2 ์งํํ๊ฒ ์ต๋๋ค~~~!!๐จโ๐ป
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+ email = models.EmailField(max_length=50, unique=True)
+ phone = models.CharField(max_length=11, null=True, unique=True)
+ full_name = models.CharField(max_length=40, null=True)
+ user_name = models.CharField(max_length=20, null=True, unique=True)
+ password = models.CharField(max_length=70)
+ date_of_birth = models.DateField(null=True)
+
+ class Meta:
+ db_table = 'users'
|
Python
|
๋ถํ์ํ ์ฃผ์ ์์ ์ฃผ์ธ์!
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+ email = models.EmailField(max_length=50, unique=True)
+ phone = models.CharField(max_length=11, null=True, unique=True)
+ full_name = models.CharField(max_length=40, null=True)
+ user_name = models.CharField(max_length=20, null=True, unique=True)
+ password = models.CharField(max_length=70)
+ date_of_birth = models.DateField(null=True)
+
+ class Meta:
+ db_table = 'users'
|
Python
|
์์ฑํ์ ์ฌ๋ฌ๊ฐ์ง ํ๋๋ค ์ค ์ค๋ณต์ ํ์ฉํ๋ฉด ์๋๋ ํ๋๋ค์ด ๋ณด์ด๋๋ฐ ๊ทธ๋ด๋ ์ฌ์ฉํ ์ ์๋ ์ต์
์ด ์์ต๋๋ค!
์ฐพ์์ ์ถ๊ฐํด์ฃผ์ธ์ ๐
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
๊น๋ํฉ๋๋ค!! ๐ฏ ๐ฏ ๐ฏ
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
ํ์ํ๋, `NULL` ํ์ฉํ๋์ ๋ฐ๋ฅธ ์ ๊ทผ ๋ฐฉ์ ๋ค๋ฅด๊ฒ ์ ์ฉ ์ํ์
จ์ต๋๋ค!! ๐๐๐
๊ฐ๋
์ฑ์ ์ํด ์กฐ๊ธ ์์น๋ฅผ ๋ณ๊ฒฝํ ์ ์๊ฒ ๋ค์! ์๋์ ๊ฐ์ด์ใ
ใ
```suggestion
email = data['email']
password = data['password']
phone = data.get('phone', None)
full_name = data.get('full_name', None)
user_name = data.get('user_name', None)
date_of_birth = data.get('date_of_birth', None)
```
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์
๋ ฅ๋ฐ์ ํฐ๋ฒํธ์ `-` ๊ฐ ํฌํจ๋์ด ๋ค์ด์ฌ ์ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฃ๊ณ ์ถ์ ํ์์ ๋ง์ถฐ์ฃผ์๋ ๋ก์ง ์ข์ต๋๋ค!
์์ผ๋ก ํ๋ก ํธ์๋๋ถ๋ค๊ณผ ํ์
์ ํ๋ฉด์ ๊ฒฝํํ์๊ฒ ์ง๋ง, ์ด๋ฐ ๋ถ๋ถ์ ๊ผญ ํ๋ก ํธ/๋ฐฑ ๊ฐ์ ์์๊ฐ ํ์ํฉ๋๋ค.
์ด ์ ์ธ์งํด์ฃผ์๊ณ ๋ค์ ์ฃผ ํ/๋ฐฑ ํต์ ๋ค์ด๊ฐ์๋ฉด ๋์์ด ๋์ค๊ฑฐ์์! ใ
ใ
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ ๊ทํํ์์ผ๋ก email ๊ณผ password validate ํด์ฃผ์๋ ๋ก์ง์ธ๋ฐ ์กฐ๊ธ ์์ํ๊ฒ ๋๋์ด์ ๋น๊ตํ์๋ ค๋ค๋ณด๋ ์กฐ๊ธ ๋ณต์กํด๋ณด์ด๋ค์!
์ฐจ๋ผ๋ฆฌ ์ด๋ฉ์ผ ํ์์ ๋ง๋ ์ ๊ทํํ์์ ํต์งธ๋ก ๊ฐ์ ธ์ ์ ์ฅํด๋๊ณ `re.match()` ๋ฅผ ํ์ฉํ์ฌ ํ๋ฒ์ ํ์ธํ ์ ์์ต๋๋ค. `password` ๋ ๋ง์ฐฌ๊ฐ์ง๊ตฌ์!
๊ทธ๋ ๊ฒ ๋ณ๊ฒฝํด์ฃผ์๋ฉด ์กฐ๊ธ ๋ ๊น๋ํ ์กฐ๊ฑด๋ฌธ์ ๋ง๋ค ์ ์์ต๋๋ค ๐
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ด๋ฏธ ์กด์ฌํ๋ ์ ๋ณด์ธ์ง ํ์ธํ๋ ๋ก์ง์ ์์ฑํด์ฃผ์
จ๋๋ฐ ์์ฑํด์ฃผ์ ๋ก์ง์ ํ๋ฆ๋๋ก ๊ธ๋ก ์ ๋ฆฌํด๋ณด๊ฒ ์ต๋๋ค.
1. ์
๋ ฅ๋ฐ์ `email` ๊ฐ์ผ๋ก ์ ์ ํ
์ด๋ธ์ filter ์ฟผ๋ฆฌ๋ฅผ ๋ ๋ ค ๋ฐํ๋ฐ์ QuerySet ๋ฆฌ์คํธ์ ๊ฐ์ฒด๊ฐ ์กด์ฌํ์ง ์๋๋ค๋ฉด `phone_number` ๊ณผ `user_name` ์ผ๋ก filter ์ฟผ๋ฆฌ๋ฅผ ๋ ๋ ค ์ถ๊ฐ ํ์ธ์ ํ๋ค.
2. ์กด์ฌํ๋ค๋ฉด `400` ์ ๋ฆฌํดํด์ค๋ค.
ํ์ง๋ง ํ์ฌ `SignUp` View ์์๋ `email` ์ ํ์๊ฐ์ผ๋ก ๋ฐ์์ผํ๊ธฐ ๋๋ฌธ์ ์ฌ์ค์ `email` ์กด์ฌ ์ ๋ฌด๋ง ํ์ธํด๋ ๋ฑ๋ก๋ ์ ์ ์ธ์ง ์๋์ง๋ ์ ์๊ฐ ์์ต๋๋ค. `phone_number` ์ `user_name` ์ ๋ถ๊ฐ์ ๋ณด๋ค์ด๋๊น์!
๊ทธ๋ฐ๋ฐ `email` ๋ก ์กด์ฌ์ ๋ฌด๋ ํ์ธํ๋๋ผ๋ `phone_number` ์ `user_name` ์ ์ค๋ณต ๊ฐ๋ฅ ์ฌ๋ถ์ ๋ฐ๋ผ ์ถ๊ฐ ๋ก์ง์ ๋ฌ๋ผ์ง ์ ์์ต๋๋ค. ์ ๊ฐ ๋ชจ๋ธ์ชฝ์ ๋จ๊ฒจ๋๋ฆฐ ๋ฆฌ๋ทฐ๋ฅผ ํ์ธํด๋ณด์ ํ ์๊ฐํ์ ๊ตฌ์กฐ์ ๋ฐ๋ผ ์์ ํด์ฃผ์ ๋ค์ ๋ค์ํ๋ฒ ์ด์ชฝ ๋ถ๋ถ์ ํ์ธํด๋ณด์ธ์!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
๊น๋ํฉ๋๋ค~ ๐ฏ
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
๊ตฌ๋ถ์ ์ํด ์์๋๋ก ํ์ค์ฉ ์ถ๊ฐํด์ฃผ์๋ฉด ๊ฐ๋
์ฑ์ด ๋ ์ข์์ง๊ฒ ๋ค์! ๐
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ด๋ฐ์์ผ๋ก exception ์ ์ฒ๋ฆฌํ์๊ฒ ๋๋ฉด ์ด๋ค exception ์ด ๋ฌด์๋๋ฌธ์ `raise` ๋์๋์ง ํ์ธํ๊ธฐ๊ฐ ์ด๋ ต์ต๋๋ค. ๊ทธ๋์ exception ํธ๋ค๋ฌ ์ถ๊ฐํด์ฃผ์ค๋๋ ์์์ `KeyError` ์ฒ๋ฆฌํด์ฃผ์ ๊ฒ๊ณผ ๊ฐ์ด ๋ช
ํํ๊ฒ ์ง์ ํ์ฌ ์ฒ๋ฆฌํด์ฃผ์
์ผํฉ๋๋ค.
ํ์ง๋ง ์ง๊ธ ๋จ๊ณ์์ ์ด๋ค exception ์ด ๋ฐ์ํ ์ ์๋์ง ๋ชจ๋ฅด๋๊ฒ ๋น์ฐํ๊ธฐ ๋๋ฌธ์ ์ด๋ด๋๋ ๊ทธ๋ฅ ์ฌ๋ฌ๊ฐ์ง ๋ฐฉ๋ฒ์ผ๋ก ํธ์ถํด๋ณด๋ฉด์ ๊ฒฝํํ์ฌ ์ถ๊ฐํด์ฃผ์๋ค๋ณด๋ฉด ๋์ค์๋ ๋ฉ์๋ ํ๋๋ฅผ ์ถ๊ฐํ ๋ ๊ด๋ จํ exception ์ ์ฒ๋ฆฌํด์ฃผ๋ ๋ก์ง์ ๋ฐ๋ก ํจ๊ป ์์ฑํ ์ ์๊ฒ ๋์ค๊ฑฐ์์! ๐
|
@@ -0,0 +1,12 @@
+from django.db import models
+
+class User(models.Model):
+ email = models.EmailField(max_length=50, unique=True)
+ phone = models.CharField(max_length=11, null=True, unique=True)
+ full_name = models.CharField(max_length=40, null=True)
+ user_name = models.CharField(max_length=20, null=True, unique=True)
+ password = models.CharField(max_length=70)
+ date_of_birth = models.DateField(null=True)
+
+ class Meta:
+ db_table = 'users'
|
Python
|
๋ค๋ต!!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ํ ๋ค๋ต!! ๊ถ๊ธํ ์ ํด๊ฒฐ ๋์์ต๋๋ค ใ
ใ
!!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์นํ๋, ๋ง์ํ์ ๋๋ก, ์ด๋ฉ์ผ ์ฃผ์์ ๋น๋ฐ๋ฒํธ ์ ๊ท์ ๊ฒ์ฌ์ ํ์ํ ๊ฐ์ REGEX_EMAIL, REGEX_PASSWORD์๋ค๊ฐ ์ ์ฅํ์ฌ ํ์ฉํ์์ต๋๋ค..! ๋ณด๋ค ์ฝ๋๊ฐ ๊ฐ๊ฒฐํด์ ธ์ ์์ฃผ ์ข๋ค์ ใ
ใ
ใ
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์นํ๋, ์๊น ํด์ฃผ์ ๋ง์ ๋ฃ๊ณ User ํด๋์ค์ ํน์ ์ปฌ๋ผ์ ๊ณ ์ ํ ๊ฐ์ ๊ฐ์ง๋๋ก unique ์ต์
์ ์ค์ ํ์์ต๋๋ค..! ๊ทธ๋ฆฌ๊ณ ๋ง์ํด์ฃผ์ q ํด๋์ค๋ ๊ณต๋ถํ๊ณ ๋ค์ ์์ค์๋ ์ ์ฉํด๋ณด๋๋ก ํ๊ฒ ์ต๋๋ค!!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
Truthy, Falsy values ์ ๋ํด ์์๋ณด์๊ณ ํด๋น ์กฐ๊ฑด๋ฌธ๋ค์ ์ด๋ป๊ฒ ๋ ๊น๋ํ๊ฒ ์ ๋ฆฌํ ์ ์์์ง ๊ณ ๋ฏผํด๋ณด์๊ณ ์ ์ฉํด์ฃผ์ธ์!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ด์ bcrypt ๋ก ๋น๋ฐ๋ฒํธ๋ฅผ ์ํธํํ์ฌ ์ ์ฅํ๋ ๋ก์ง์ ์ถ๊ฐํด์ฃผ์ธ์!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์ฌ๊ธฐ์๋ ๋ฐ์ํ ์ ์๋ exception ์ด ์กด์ฌํฉ๋๋ค!
exception handling ๋ก์ง์ ์ถ๊ฐํด์ฃผ์ธ์!!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
`=` ๊ธฐ์ค ๊ฐ๊ฒฉ ์ ๋ ฌํด์ฃผ์ธ์ ๊ตญํ๋!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
- `|` ์ฌ์ด ๊ฐ๊ฒฉ๋ ํต์ผํด์ฃผ์ธ์~
- ์ด ๋ถ๋ถ ๋ก์ง์ด ์ดํด๊ฐ ์ ์๋๋๋ฐ ์ ๋ถ user_id ๋ฅผ ๋์
ํ์ฌ ํ์ธํ๊ณ ์ถ์๊ฒ ๋ง์ผ์ ๊ฐ์?!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
๋ต๋ต!! ์์ ํด๋ณด๊ฒ ์ต๋๋ค~~
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
๋ต ์นํ๋!
์ ๋ ์ฌ์ฉ์๊ฐ ๋ก๊ทธ์ธํ ๋ ์ด๋ฉ์ผ, ํด๋ํฐ, ์ ์ ๋ค์ ์ด ์ธ๊ฐ์ค์ ํ๋๋ก ๋ก๊ทธ์ธํ ๊บผ๋ผ๊ณ ์๊ฐ์ ํด์ ์ฌ์ฉ์๊ฐ ์
๋ ฅํ ๊ฐ์ ์์ user_id๋ก ๊ฐ์ ๋ฐ์ผ๋ ค ํ์ต๋๋ค..! ๊ทธ๋์ ์ด user_id๊ฐ์ ๊ฐ์ง๊ณ ํ๋๋ผ๋ ์ด๋ฉ์ผ, ํด๋ํฐ, ์ ์ ๋ค์๊ณผ ๊ฐ์๊ฒ ์์ผ๋ฉด ์ ํจํ ์์ด๋๊ฐ์ด๋ผ๊ณ ์๊ฐํ์์ต๋๋ค..!
|
@@ -0,0 +1,87 @@
+import re, json, bcrypt
+
+from django.views import View
+from django.http import JsonResponse, request
+from django.db.models.query_utils import Q
+from json.decoder import JSONDecodeError
+
+from user.utils import LoginCheck
+from user.models import User
+
+class SignUpView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ email = data['email']
+ password = data['password']
+ phone = data.get('phone', None)
+ full_name = data.get('full_name', None)
+ user_name = data.get('user_name', None)
+ date_of_birth = data.get('date_of_birth', None)
+
+ if phone:
+ phone = phone.replace('-','')
+
+ REGEX_EMAIL = '^[a-zA-Z0-9+-_.]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$'
+ REGEX_PASSWORD = '\S{8,20}'
+
+ if not re.match(REGEX_EMAIL,email):
+ return JsonResponse({'message':'EMAIL VALIDATION ERROR'}, status=400)
+ if not re.match(REGEX_PASSWORD,password):
+ return JsonResponse({'message':'PASSWORD VALIDATION ERROR'}, status=400)
+
+ if not User.objects.filter(email=email):
+ if phone and User.objects.filter(phone=phone):
+ return JsonResponse({'message':'PHONE ALREADY EXISTS'}, status=400)
+ elif user_name and User.objects.filter(user_name=user_name):
+ return JsonResponse({'message':'USER_NAME ALREADY EXISTS'}, status=400)
+ else:
+ return JsonResponse({'message':'EMAIL ALREADY EXISTS'}, status=400)
+
+ hashed_password = bcrypt.hashpw(password.encode('UTF-8'), bcrypt.gensalt()).decode()
+
+ User.objects.create(
+ email = email,
+ phone = phone,
+ full_name = full_name,
+ user_name = user_name,
+ password = hashed_password,
+ date_of_birth = date_of_birth,
+ )
+
+ return JsonResponse({'message':'SUCCESS'}, status=200)
+
+ except KeyError:
+ return JsonResponse({'message':'KEY ERROR'}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
+
+
+class SignInView(View):
+ def post(self, request):
+ try:
+ data = json.loads(request.body)
+
+ user_id = data['user_id']
+ password = data['password']
+
+ user= User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id))
+
+ if user:
+ stored_password = User.objects.get(Q(user_name=user_id)|Q(email=user_id)|Q(phone=user_id)).password
+ if not bcrypt.checkpw(password.encode('UTF-8'), stored_password.encode('UTF-8')):
+ return JsonResponse({"message":"INVALID_PASSWORD"}, status=401)
+ else:
+ return JsonResponse({"message":"INVALID_USER"}, status=401)
+
+ return JsonResponse({"message":"SUCCESS", "Authorization":LoginCheck(user.id)}, status=200)
+
+ except KeyError:
+ return JsonResponse({"message":"KEY_ERROR"}, status=400)
+ except JSONDecodeError:
+ return JsonResponse({'message':'JSON DECODE ERROR'}, status=400)
+ except Exception as e:
+ print(e)
\ No newline at end of file
|
Python
|
์นํ๋ ํน์ json ๊ด๋ จ exception ์ด JSONDecodeError ์ธ๊ฒ์ผ๊น์..?
|
@@ -1,26 +1,39 @@
package nextstep.app;
+import jakarta.servlet.http.HttpServletRequest;
+import java.util.ArrayList;
import nextstep.app.domain.Member;
import nextstep.app.domain.MemberRepository;
import nextstep.security.authentication.AuthenticationException;
import nextstep.security.authentication.BasicAuthenticationFilter;
import nextstep.security.authentication.UsernamePasswordAuthenticationFilter;
-import nextstep.security.authorization.CheckAuthenticationFilter;
-import nextstep.security.authorization.SecuredAspect;
+import nextstep.security.authorization.AuthorizationFilter;
+import nextstep.security.authorization.AuthorizationManager;
import nextstep.security.authorization.SecuredMethodInterceptor;
+import nextstep.security.authorization.method.SecuredAuthorizationManager;
+import nextstep.security.authorization.web.AuthenticatedAuthorizationManager;
+import nextstep.security.authorization.web.AuthorityAuthorizationManager;
+import nextstep.security.authorization.web.DenyAllAuthorizationManager;
+import nextstep.security.authorization.web.RequestMatcherDelegatingAuthorizationManager;
import nextstep.security.config.DefaultSecurityFilterChain;
import nextstep.security.config.DelegatingFilterProxy;
import nextstep.security.config.FilterChainProxy;
import nextstep.security.config.SecurityFilterChain;
import nextstep.security.context.SecurityContextHolderFilter;
import nextstep.security.userdetails.UserDetails;
import nextstep.security.userdetails.UserDetailsService;
+import nextstep.security.util.AnyRequestMatcher;
+import nextstep.security.util.MvcRequestMatcher;
+import nextstep.security.util.RequestMatcherEntry;
+import nextstep.security.authorization.web.PermitAllAuthorizationManager;
+import org.aopalliance.intercept.MethodInvocation;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.context.annotation.EnableAspectJAutoProxy;
import java.util.List;
import java.util.Set;
+import org.springframework.http.HttpMethod;
@EnableAspectJAutoProxy
@Configuration
@@ -44,12 +57,26 @@ public FilterChainProxy filterChainProxy(List<SecurityFilterChain> securityFilte
@Bean
public SecuredMethodInterceptor securedMethodInterceptor() {
- return new SecuredMethodInterceptor();
+ return new SecuredMethodInterceptor(securedAuthorizationManager());
+ }
+
+ @Bean
+ public AuthorizationManager<MethodInvocation> securedAuthorizationManager() {
+ return new SecuredAuthorizationManager();
+ }
+
+ @Bean
+ public AuthorizationManager<HttpServletRequest> requestAuthorizationManager() {
+ List<RequestMatcherEntry<AuthorizationManager>> mappings = new ArrayList<>();
+ mappings.add(new RequestMatcherEntry<>(new MvcRequestMatcher(HttpMethod.GET, "/members"),
+ new AuthorityAuthorizationManager<HttpServletRequest>(Set.of("ADMIN"))));
+ mappings.add(new RequestMatcherEntry<>(new MvcRequestMatcher(HttpMethod.GET, "/members/me"),
+ new AuthenticatedAuthorizationManager()));
+ mappings.add(new RequestMatcherEntry<>(new MvcRequestMatcher(HttpMethod.GET, "/search"),
+ new PermitAllAuthorizationManager()));
+ mappings.add(new RequestMatcherEntry<>(AnyRequestMatcher.INSTANCE, new DenyAllAuthorizationManager()));
+ return new RequestMatcherDelegatingAuthorizationManager(mappings);
}
-// @Bean
-// public SecuredAspect securedAspect() {
-// return new SecuredAspect();
-// }
@Bean
public SecurityFilterChain securityFilterChain() {
@@ -58,7 +85,7 @@ public SecurityFilterChain securityFilterChain() {
new SecurityContextHolderFilter(),
new UsernamePasswordAuthenticationFilter(userDetailsService()),
new BasicAuthenticationFilter(userDetailsService()),
- new CheckAuthenticationFilter()
+ new AuthorizationFilter(requestAuthorizationManager())
)
);
}
|
Java
|
์ ์ถ๊ฐํด์ฃผ์
จ๋ค์ ๐
|
@@ -2,7 +2,10 @@
import nextstep.app.domain.Member;
import nextstep.app.domain.MemberRepository;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
import nextstep.security.authorization.Secured;
+import nextstep.security.context.SecurityContextHolder;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.GetMapping;
import org.springframework.web.bind.annotation.RestController;
@@ -30,4 +33,15 @@ public ResponseEntity<List<Member>> search() {
List<Member> members = memberRepository.findAll();
return ResponseEntity.ok(members);
}
+
+ @GetMapping("/members/me")
+ public ResponseEntity<Member> me() {
+ Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
+
+ String email = authentication.getPrincipal().toString();
+ Member member = memberRepository.findByEmail(email)
+ .orElseThrow(RuntimeException::new);
+
+ return ResponseEntity.ok(member);
+ }
}
|
Java
|
์ด๋ฏธ Filter์์ ์ฒ๋ฆฌํ๊ณ ์๋๋ฐ ๋ถํ์ํ ๋ก์ง์ด ์๋๊น์?
|
@@ -0,0 +1,20 @@
+package nextstep.security.util;
+
+import jakarta.servlet.http.HttpServletRequest;
+import org.springframework.http.HttpMethod;
+
+public class MvcRequestMatcher implements RequestMatcher {
+
+ private final HttpMethod method;
+ private final String pattern;
+
+ public MvcRequestMatcher(HttpMethod method, String pattern) {
+ this.method = method;
+ this.pattern = pattern;
+ }
+
+ @Override
+ public boolean matches(HttpServletRequest request) {
+ return this.method.equals(HttpMethod.valueOf(request.getMethod())) && pattern.equals(request.getRequestURI());
+ }
+}
|
Java
|
```suggestion
return this.method.equals(HttpMethod.valueOf(request.getMethod())) && pattern.equals(request.getRequestURI());
```
null-safe ๊ด์ ์์๋ ํ๋ผ๋ฏธํฐ๋ก ๋ค์ด์ค๋ `request.getRequestURI()`๋ null์ผ ์ ์๊ธฐ ๋๋ฌธ์ ๋ณ๋๋ก null ์ฒดํฌ๋ฅผ ํ์ง ์๋ ์ด์ ์์ ๊ฐ์ด ํํํ๋ ๊ฒ์ด npe๊ฐ ๋ฐ์ํ์ง ์๋ ์์ ํ ์ฝ๋๋ฅผ ๋ง๋ค ์ ์์ต๋๋ค.
|
@@ -0,0 +1,14 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.web.AuthorizationResult;
+
+@FunctionalInterface
+public interface AuthorizationManager<T> {
+ @Deprecated
+ AuthorizationDecision check(Authentication authentication, T object);
+
+ default AuthorizationResult authorize(Authentication authentication, T object) {
+ return check(authentication, object);
+ }
+}
|
Java
|
ํ์ฌ spring security๋ฅผ ํ์ธํด๋ณด์๋ฉด `check`๋ deprecated๋์๋๋ฐ์. `AuthorizationDecision`์ด๋ผ๋ ํด๋์ค๋ ๊ตฌํํด์ฃผ์ ๊ฒ์ฒ๋ผ ๊ตฌํ์ฒด๋ก ๋์ด์๊ณ , ๋ณดํต์ ํ๋ ์์ํฌ๋ค์ ๊ท๋ชจ๊ฐ ์ปค์ง์๋ก ๋ง๋ค์ด๋ ๊ตฌํ์ฒด๋ค์ ์ถ์ํํ๋ ํํ๋ก ๊ฐ์ ํด๋๊ฐ๋๋ค.
`check`๊ฐ deprecated๋จ์ ๋ฐ๋ผ ํด๋น ๊ธฐ๋ฅ์ด ๋งํ ๊ฒ์ ์๋๊ณ ์ด๋ฅผ ์ถ์ํํ `AuthorizationResult`๋ฅผ ๋ฐํํ๋ ๋ฉ์๋ ์ฌ์ฉ์ ๊ถ์ฅํ๊ณ ์์ผ๋ ์ฐธ๊ณ ํด์ฃผ์๋ฉด ์ข์ ๊ฒ ๊ฐ์์ :)
https://github.com/franticticktick/spring-security/blob/main/core/src/main/java/org/springframework/security/authorization/AuthorizationManager.java
https://github.com/spring-projects/spring-security/pull/14712
https://github.com/spring-projects/spring-security/pull/14846
|
@@ -0,0 +1,14 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.web.AuthorizationResult;
+
+@FunctionalInterface
+public interface AuthorizationManager<T> {
+ @Deprecated
+ AuthorizationDecision check(Authentication authentication, T object);
+
+ default AuthorizationResult authorize(Authentication authentication, T object) {
+ return check(authentication, object);
+ }
+}
|
Java
|
์คํ๋์ด ์๊ฐํ์๊ธฐ์ ์ ํ์ฌํญ์ผ๋ก ์ฃผ์ด์ง `verfiy`๋ `check`์ ๋น๊ตํ์ฌ ์ด๋ค ์ํฉ์์ ์ฌ์ฉํ๋ฉด ์ข์ ๊ฒ ๊ฐ์ผ์ ๊ฐ์?
|
@@ -0,0 +1,22 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authorization.web.AuthorizationResult;
+
+public class AuthorizationDecision implements AuthorizationResult {
+ public static final AuthorizationDecision ALLOW = new AuthorizationDecision(true);
+ public static final AuthorizationDecision DENY = new AuthorizationDecision(false);
+
+ private final boolean granted;
+
+ public AuthorizationDecision(boolean granted) {
+ this.granted = granted;
+ }
+
+ public boolean isGranted() {
+ return granted;
+ }
+
+ public static AuthorizationDecision of(boolean granted) {
+ return granted ? ALLOW : DENY;
+ }
+}
|
Java
|
true ํน์ false๋ง ๊ฐ์ง๋ `AuthorizationDecision`์ด ์์ฃผ ์ฌ์ฉ๋๋๋ฐ ์ฌ์ฉ๋ ๋๋ง๋ค ์ธ์คํด์คํํ๊ธฐ๋ณด๋ค๋ ๋ถ๋ณ์์ ํ์ฉํ์ฌ ๋ฏธ๋ฆฌ ๋ง๋ค์ด์ค ์์๋ฅผ ์ฌ์ฉํ๋๋ก ์ ๋ํ ์ ์์ ๊ฒ ๊ฐ๋ค์.
|
@@ -0,0 +1,38 @@
+package nextstep.security.authorization.web;
+
+import java.util.Collection;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+
+public class AuthorityAuthorizationManager<T> implements AuthorizationManager<T> {
+
+ private final Collection<String> authorities;
+
+ public AuthorityAuthorizationManager(Collection<String> authorities) {
+ this.authorities = authorities;
+ }
+
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, T object) {
+ if (authentication == null) {
+ throw new AuthenticationException();
+ }
+
+ boolean hasAuthority = isAuthorized(authentication, authorities);
+
+ return AuthorizationDecision.of(hasAuthority);
+ }
+
+
+ private boolean isAuthorized(Authentication authentication, Collection<String> authorities) {
+ for (String authority : authentication.getAuthorities()) {
+ if (authorities.contains(authority)) {
+ return true;
+ }
+ }
+ return false;
+ }
+}
|
Java
|
์ค์ spring security์์๋ ์ฑ๋ฅ์ ๋ฌธ์ ๋ก ์ธํด stream ์ฌ์ฉ์ ์ ํํ๊ณ ์์ต๋๋ค.
https://github.com/spring-projects/spring-security/issues/7154
|
@@ -0,0 +1,28 @@
+package nextstep.security.authorization.web;
+
+import jakarta.servlet.http.HttpServletRequest;
+import java.util.List;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+import nextstep.security.util.RequestMatcher;
+import nextstep.security.util.RequestMatcherEntry;
+
+public class RequestMatcherDelegatingAuthorizationManager implements AuthorizationManager<HttpServletRequest> {
+
+ private final List<RequestMatcherEntry<AuthorizationManager>> mappings;
+
+ public RequestMatcherDelegatingAuthorizationManager(List<RequestMatcherEntry<AuthorizationManager>> mappings) {
+ this.mappings = mappings;
+ }
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, HttpServletRequest request) {
+ for (RequestMatcherEntry<AuthorizationManager> mapping : mappings) {
+ if (mapping.getRequestMatcher().matches(request)) {
+ return mapping.getEntry().check(authentication, request);
+ }
+ }
+ return AuthorizationDecision.DENY;
+ }
+}
|
Java
|
getter๋ก ํธ์ถํ์ฌ ์ผ์น ์ฌ๋ถ๋ฅผ ํ์ธํ๋ ๊ฒ๋ณด๋ค๋ `mapping`์์ ์ฒ๋ฆฌํ๋๋ก ์์ ํ๋ฉด ์ฑ
์์ด ๋ช
ํํ๊ฒ ๋์ด๊ฐ ์ ์๊ฒ ๋ค์ :)
|
@@ -0,0 +1,43 @@
+package nextstep.security.authorization.method;
+
+import java.lang.reflect.Method;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.Set;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+import nextstep.security.authorization.Secured;
+import nextstep.security.authorization.web.AuthorityAuthorizationManager;
+import org.aopalliance.intercept.MethodInvocation;
+
+public class SecuredAuthorizationManager implements AuthorizationManager<MethodInvocation> {
+
+ private AuthorityAuthorizationManager<Collection<String>> authorityAuthorizationManager;
+
+ public void setAuthorityAuthorizationManager(Collection<String> authorities) {
+ authorityAuthorizationManager = new AuthorityAuthorizationManager<>(authorities);
+ }
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, MethodInvocation invocation) {
+ Collection<String> authorities = getAuthorities(invocation);
+
+ if (authorities.isEmpty()) {
+ return null;
+ }
+ setAuthorityAuthorizationManager(authorities);
+ return authorities.isEmpty() ? null : authorityAuthorizationManager.check(authentication, authorities);
+ }
+
+ private Collection<String> getAuthorities(MethodInvocation invocation) {
+ Method method = invocation.getMethod();
+
+ if (!method.isAnnotationPresent(Secured.class)) {
+ return Collections.emptySet();
+ }
+
+ Secured secured = method.getAnnotation(Secured.class);
+ return Set.of(secured.value());
+ }
+}
|
Java
|
`AuthorityAuthorizationManager`์ ๋ก์ง๊ณผ ํจ๊ป๋ณด๋ฉด
```java
boolean hasAuthority = authentication.getAuthorities().stream()
.anyMatch(authorities::contains);
return new AuthorizationDecision(hasAuthority);
```
๋ถ๋ถ์ด ๋์ผํ ๊ฒ์ ํ์ธํด๋ณผ ์ ์์ด์. ๊ฐ `AuthorizatinManager`๋ ๋จ์ผ์์ ๊ฐ๊ฐ ๋ณธ์ธ์ ๊ฒ์ ๋ชจ๋ ๊ตฌ์ฑํ๋ ๊ฒ์ด ์๋ ์๋ก ์ ๊ธฐ์ ์ผ๋ก ๊ฒฐํฉ๋์ด ์ฌ์ฉํ๊ธฐ๋ ํ๋๋ฐ์.
์ฆ, `SecuredAuthorizationManager`๋ `@Secured`์ ์๋ ์ ๋ณด๋ฅผ ๊ฐ์ง๊ณ ์ฒ๋ฆฌํ๋ฉฐ, authority์ ๋ํ ๊ถํ์ฒดํฌ๋ `AuthorizatinManager`๊ฐ ์จ์ ํ ๋ด๋นํ๋๊ฑฐ์ฃ .
https://github.com/spring-projects/spring-security/blob/main/core/src/main/java/org/springframework/security/authorization/method/SecuredAuthorizationManager.java
์ค์ ๋ก๋ ๊ถํ์ฒด๊ณ๊ฐ ๋ค์ํ๊ธฐ ๋๋ฌธ์ `AuthoritiesAuthorizationManager`๋ฅผ ์ฌ์ฉํ๊ณ ์๊ธฐ๋ ํ์ง๋ง ๊ด๋ จํ์ฌ ์ฐธ๊ณ ํ์๋ฉด ์ดํด์ ๋์์ด ๋์ค ๊ฒ ๊ฐ์์.
|
@@ -0,0 +1,18 @@
+package nextstep.security.fixture;
+
+import java.util.Base64;
+import java.util.Set;
+import nextstep.app.domain.Member;
+
+public class MemberTestFixture {
+ public static final Member TEST_ADMIN_MEMBER = new Member("[email protected]", "password", "a", "", Set.of("ADMIN"));
+ public static final Member TEST_USER_MEMBER = new Member("[email protected]", "password", "b", "", Set.of("USER"));
+
+ public static String createAdminToken(){
+ return Base64.getEncoder().encodeToString((TEST_ADMIN_MEMBER.getEmail() + ":" + TEST_ADMIN_MEMBER.getPassword()).getBytes());
+ }
+
+ public static String createMemberToken(){
+ return Base64.getEncoder().encodeToString((TEST_USER_MEMBER.getEmail() + ":" + TEST_USER_MEMBER.getPassword()).getBytes());
+ }
+}
|
Java
|
(๋ฐ์ํ์ง ์์ผ์
๋ ๋ฉ๋๋ค.) ๊ฐ์ธ์ ์ผ๋ก๋ enum์์ ์ง์๋๋ ๋ฉ์๋๋ค์ ํ์ฉํ๋ ๊ฒฝ์ฐ๋ ๋ง์ ํน์ ๋๋ฉ์ธ์ fixture๋ enum ์ผ๋ก ์์ฑํ๋ ํธ์
๋๋ค ๐
|
@@ -2,7 +2,10 @@
import nextstep.app.domain.Member;
import nextstep.app.domain.MemberRepository;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
import nextstep.security.authorization.Secured;
+import nextstep.security.context.SecurityContextHolder;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.GetMapping;
import org.springframework.web.bind.annotation.RestController;
@@ -30,4 +33,15 @@ public ResponseEntity<List<Member>> search() {
List<Member> members = memberRepository.findAll();
return ResponseEntity.ok(members);
}
+
+ @GetMapping("/members/me")
+ public ResponseEntity<Member> me() {
+ Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
+
+ String email = authentication.getPrincipal().toString();
+ Member member = memberRepository.findByEmail(email)
+ .orElseThrow(RuntimeException::new);
+
+ return ResponseEntity.ok(member);
+ }
}
|
Java
|
์ ํด๋น appํจํค์ง์ ์ปจํธ๋กค๋ฌ๋
๊ฐ์์ค์์ ์ค์ต์ดํ ์ฒด๋ฆฌํฝ ํด์จ๊ฒ์ด๋ผ ์ด์ด๋ณผ ์๊ฐ์ ๋ชปํ๋ค์.
์์ ํด๋๊ฒ ์ต๋๋ค!
|
@@ -0,0 +1,20 @@
+package nextstep.security.util;
+
+import jakarta.servlet.http.HttpServletRequest;
+import org.springframework.http.HttpMethod;
+
+public class MvcRequestMatcher implements RequestMatcher {
+
+ private final HttpMethod method;
+ private final String pattern;
+
+ public MvcRequestMatcher(HttpMethod method, String pattern) {
+ this.method = method;
+ this.pattern = pattern;
+ }
+
+ @Override
+ public boolean matches(HttpServletRequest request) {
+ return this.method.equals(HttpMethod.valueOf(request.getMethod())) && pattern.equals(request.getRequestURI());
+ }
+}
|
Java
|
๊ฐ๊ณผํ๊ณ ์์๋ค์. ์์ ํด๋๊ฒ ์ต๋๋ค! ๐
|
@@ -0,0 +1,14 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.web.AuthorizationResult;
+
+@FunctionalInterface
+public interface AuthorizationManager<T> {
+ @Deprecated
+ AuthorizationDecision check(Authentication authentication, T object);
+
+ default AuthorizationResult authorize(Authentication authentication, T object) {
+ return check(authentication, object);
+ }
+}
|
Java
|
์ค.. ๋ถ๊ณผ 4๋ฌ์ ์ ์
๋ฐ์ดํธ๋ ๊ธฐ๋ฅ์ด๊ตฐ์!
ํผ๋๋ฐฑ ์ฃผ์ ๋๋ก ๋ฐ์ํด๋ณด๋ฉด์ ์ด๋ค ์์ผ๋ก
์คํ์์ค๊ฐ ๊ฐ์ ๋์ด ๋๊ฐ๋์ง ์ฒดํ ํด ๋ณผ ์ ์์๋ค์ ๊ฐ์ฌํฉ๋๋ค.
|
@@ -0,0 +1,22 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authorization.web.AuthorizationResult;
+
+public class AuthorizationDecision implements AuthorizationResult {
+ public static final AuthorizationDecision ALLOW = new AuthorizationDecision(true);
+ public static final AuthorizationDecision DENY = new AuthorizationDecision(false);
+
+ private final boolean granted;
+
+ public AuthorizationDecision(boolean granted) {
+ this.granted = granted;
+ }
+
+ public boolean isGranted() {
+ return granted;
+ }
+
+ public static AuthorizationDecision of(boolean granted) {
+ return granted ? ALLOW : DENY;
+ }
+}
|
Java
|
ํ ์ํฉ์์ ๋ฉ๋ชจ๋ฆฌ ํจ์จ์ฑ์ ๋ ๋์ผ ์ ์๊ฒ ๋ค์!
|
@@ -0,0 +1,38 @@
+package nextstep.security.authorization.web;
+
+import java.util.Collection;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+
+public class AuthorityAuthorizationManager<T> implements AuthorizationManager<T> {
+
+ private final Collection<String> authorities;
+
+ public AuthorityAuthorizationManager(Collection<String> authorities) {
+ this.authorities = authorities;
+ }
+
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, T object) {
+ if (authentication == null) {
+ throw new AuthenticationException();
+ }
+
+ boolean hasAuthority = isAuthorized(authentication, authorities);
+
+ return AuthorizationDecision.of(hasAuthority);
+ }
+
+
+ private boolean isAuthorized(Authentication authentication, Collection<String> authorities) {
+ for (String authority : authentication.getAuthorities()) {
+ if (authorities.contains(authority)) {
+ return true;
+ }
+ }
+ return false;
+ }
+}
|
Java
|
๊ฐ๋
์ฑ ๋๋ฌธ์ stream์ ์ ํธํ๋ ํธ์ธ๋ฐ, spring security๊ฐ์ ๋ผ์ด๋ธ๋ฌ๋ฆฌ๋ ์ฑ๋ฅ์ด ์ค์ํ๋ค๋ณด๋ ๊ทธ๋ ๊ฒ ๋๊ฑฐ๊ตฐ์..
๊ตฌํ์ฒด ์ฝ๋ ๋ณด๋ฉด์ ๊ฐ๋
์ฑ์ด ์๊ฐ๋งํผ์ ์๋๊ฒ ๊ฐ์๋๋ฐ, ๊ทธ ์ํ๊ฐ์ด ์ฌ๊ธฐ์ ๊ธฐ์ธํ ๊ฒ ๊ฐ์ต๋๋ค.
|
@@ -0,0 +1,28 @@
+package nextstep.security.authorization.web;
+
+import jakarta.servlet.http.HttpServletRequest;
+import java.util.List;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+import nextstep.security.util.RequestMatcher;
+import nextstep.security.util.RequestMatcherEntry;
+
+public class RequestMatcherDelegatingAuthorizationManager implements AuthorizationManager<HttpServletRequest> {
+
+ private final List<RequestMatcherEntry<AuthorizationManager>> mappings;
+
+ public RequestMatcherDelegatingAuthorizationManager(List<RequestMatcherEntry<AuthorizationManager>> mappings) {
+ this.mappings = mappings;
+ }
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, HttpServletRequest request) {
+ for (RequestMatcherEntry<AuthorizationManager> mapping : mappings) {
+ if (mapping.getRequestMatcher().matches(request)) {
+ return mapping.getEntry().check(authentication, request);
+ }
+ }
+ return AuthorizationDecision.DENY;
+ }
+}
|
Java
|
์.. ์ ์๊ฐ์ผ๋ก๋ `mapping`์ธ `RequestMatcherEntry`๋ `RequestMatcher`๋ `AuthorizationManager`๋ฅผ
๋จ์ํ ๋ฌถ์ด์ฃผ๋ ์ญํ ์ ์ํํ๋ค๊ณ ์๊ฐํด์,
ํด๋น ๊ฐ์ฒด์ `matches()`์ ๋ก์ง๊น์ง ์์ผ๋ฉด ์คํ๋ ค ์ฑ
์์ด ๊ณผํด์ง๊ณ ,
์๋ RequestMatcher์ ์ญํ ์ด ํ๋ ค์ง๊ฒ ๊ฐ์ getter๋ก ํธ์ถํด์ ์ผ์น ์ฌ๋ถ๋ฅผ ํ์ธํ์ต๋๋ค.
์ ๊ฐ ์ ๋๋ก ์ดํดํ๊ฑฐ๋ผ๋ฉด ์ง์๋ ์๊ฐ์ด ๊ถ๊ธํฉ๋๋ค!
|
@@ -0,0 +1,18 @@
+package nextstep.security.fixture;
+
+import java.util.Base64;
+import java.util.Set;
+import nextstep.app.domain.Member;
+
+public class MemberTestFixture {
+ public static final Member TEST_ADMIN_MEMBER = new Member("[email protected]", "password", "a", "", Set.of("ADMIN"));
+ public static final Member TEST_USER_MEMBER = new Member("[email protected]", "password", "b", "", Set.of("USER"));
+
+ public static String createAdminToken(){
+ return Base64.getEncoder().encodeToString((TEST_ADMIN_MEMBER.getEmail() + ":" + TEST_ADMIN_MEMBER.getPassword()).getBytes());
+ }
+
+ public static String createMemberToken(){
+ return Base64.getEncoder().encodeToString((TEST_USER_MEMBER.getEmail() + ":" + TEST_USER_MEMBER.getPassword()).getBytes());
+ }
+}
|
Java
|
3๋จ๊ณ ์ํํ๋ฉด์ ๋ณ๊ฒฝํด ๋ณด๊ฒ ์ต๋๋ค! ๐
|
@@ -0,0 +1,43 @@
+package nextstep.security.authorization.method;
+
+import java.lang.reflect.Method;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.Set;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+import nextstep.security.authorization.Secured;
+import nextstep.security.authorization.web.AuthorityAuthorizationManager;
+import org.aopalliance.intercept.MethodInvocation;
+
+public class SecuredAuthorizationManager implements AuthorizationManager<MethodInvocation> {
+
+ private AuthorityAuthorizationManager<Collection<String>> authorityAuthorizationManager;
+
+ public void setAuthorityAuthorizationManager(Collection<String> authorities) {
+ authorityAuthorizationManager = new AuthorityAuthorizationManager<>(authorities);
+ }
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, MethodInvocation invocation) {
+ Collection<String> authorities = getAuthorities(invocation);
+
+ if (authorities.isEmpty()) {
+ return null;
+ }
+ setAuthorityAuthorizationManager(authorities);
+ return authorities.isEmpty() ? null : authorityAuthorizationManager.check(authentication, authorities);
+ }
+
+ private Collection<String> getAuthorities(MethodInvocation invocation) {
+ Method method = invocation.getMethod();
+
+ if (!method.isAnnotationPresent(Secured.class)) {
+ return Collections.emptySet();
+ }
+
+ Secured secured = method.getAnnotation(Secured.class);
+ return Set.of(secured.value());
+ }
+}
|
Java
|
[83a4efd](https://github.com/next-step/spring-security-authorization/pull/15/commits/83a4efd95662b7e9d2590f72ee5a56173a16477d)
์ผ๋ก ๋ฐ์ํด๋ณด์์ต๋๋ค!
๊ฐ์์ Manager๊ฐ ๋จ์ผ ์ฑ
์์ด ์๋ ๊ฒฐํฉํด์ ์ฌ์ฉํ๊ธฐ๋ ํ๋๊ตฐ์!
์ ๋ ์์
ํ๋ฉด์ ๊ฐ์ ๋ก์ง์ด ๋ค์ด๊ฐ๋ค๊ณ ์๊ฐ์ด ๋ค์๋๋ฐ,
์ด๋ฐ์์ผ๋ก๋ ์ญํ ๊ณผ ์ฑ
์ ๋ถ๋ฐฐ๋ฅผ ๊ฐ์ ธ๊ฐ ์ ์๊ฒ ๋ค์!
ํ์ฌ ๋ง์ํด์ฃผ์ `AuthoritiesAuthorizationManager` ์ฒ๋ผ ๋ค์ํ ๊ถํ ์ฒด๊ณ๋ ์๊ธฐ ๋๋ฌธ์
๊ธฐ์กด `SecuredAuthorizationManager`์์ `AuthorityAuthorizationManager`๋ฅผ ์ฌ์ฉํด๋ณด๋ ๋ฐฉํฅ์ผ๋ก ๋ณ๊ฒฝํด๋ณด์์ต๋๋ค.
|
@@ -0,0 +1,14 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.web.AuthorizationResult;
+
+@FunctionalInterface
+public interface AuthorizationManager<T> {
+ @Deprecated
+ AuthorizationDecision check(Authentication authentication, T object);
+
+ default AuthorizationResult authorize(Authentication authentication, T object) {
+ return check(authentication, object);
+ }
+}
|
Java
|
์.. ๊ฒฐ๊ตญ์ **์ธ๊ฐ์คํจ์ ์์ธ๋ฅผ ๋ฐ์์ํจ๋ค.** ๊ฐ ํต์ฌ์ด๋ผ๊ณ ์๊ฐํด์.
check๋ก๋ null์ด ์ฌ ์๋ ์๊ณ , ๊ถํ์ด ์๋ค ํ ์ง์ด๋ ์๋ฌ์ฝ๋ ๋ฑ์์ ๊ฐ๋ฐ์ ๋ง์๋๋ก ํธ๋ค๋ง ํ ์ ์๋ ๋ฐ๋ฉด์,
verify๋ ์ธ๊ฐ์ ์คํจํ ๊ฒฝ์ฐ ๋์ผํ ์๋ฌ๊ฐ ๋ฐ์๋๋ค. ๋ผ๋ ์ ์์ ์ถ์ ์ ์ฉ์ดํ ๊ฒ ๊ฐ๊ณ , ์ธ์ ์ค๋ฅ๋ฅผ ์ต์ํ ํ ์ ์์ ๊ฒ ๊ฐ๋ค๊ณ ์๊ฐ์ด ๋๋ค์!
๋ฐ๋ผ์ ๊ด๋ฆฌ์ ์ ์ฉ API๋ฑ ๊ถํ์ด ์์ผ๋ฉด ์ถ๊ฐ์ ์ธ ๋ก์ง ์์ด ๋ฐ๋ก ์์ธ๋ฅผ ๋์ง๋ ์ฌ์ฉํ๋ฉด ์ข์ ๊ฒ ๊ฐ์ต๋๋ค~
|
@@ -0,0 +1,14 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.web.AuthorizationResult;
+
+@FunctionalInterface
+public interface AuthorizationManager<T> {
+ @Deprecated
+ AuthorizationDecision check(Authentication authentication, T object);
+
+ default AuthorizationResult authorize(Authentication authentication, T object) {
+ return check(authentication, object);
+ }
+}
|
Java
|
๋ค ์ฌ์ค `verify`๋ฅผ ๋จ์ผ๋ก ์ฐ๋ฉด ์ ํฌ๊ฐ ํํ ์๊ณ ์๋ฏ ์์ธ๋ฅผ ๋ฐ์์ํฌ ์ ์๋ ๊ณณ์์ ์์ธ๋ฅผ ๋ฐ์์ํค๋ ๊ฒ์ด ๋ง๊ธฐ๋ ํฉ๋๋ค.
๋ค๋ง `AuthorizationManager`์ ์๋ ์ฑ
์์ ์ธ๊ฐ๊ฐ ๋ ์ ์ ์ธ์ง๋ฅผ ํ์ธํ๋ ๊ฒ์ด๊ณ ์ด๊ฑด ์ธ๊ฐ๊ฐ ์คํจ๋์๋ค๋ ๊ฒ์ด ์๋ฌ ์ํฉ์ด ์๋ ์ ์์ ์ธ ๋น์ฆ๋์ค์ ํ๋ฆ์ด๋ผ๊ณ ๋ณผ ์ ์์ด์. ์ธ๊ฐ๊ฐ ์คํจํ ๊ฒ์ ๋ํ ๊ฒฐ๊ณผ๊ฐ ์์ธ๊ฐ ๋๋ ๊ฒ์ `AuthorizationFilter`๊ฐ ์ธ๊ฐ ์คํจ์ ๊ฒฐ๊ณผ๊ฐ ์์ธ์ด๋ค๋ผ๋ ๊ฒ์ ์คํํ๋ ๊ฒ์ผ๋ฟ์ธ ๊ฒ์ด๊ตฌ์.
์ค์ `AuthorizationManager`๋ค์ ๊ตฌํ์ฒด๋ฅผ ๋ณด์๋ฉด ์ด๋ฐ ์ด์ ๋ค๋ ๊ฒน์ณ์ `check`์์์ ๊ฑฐ์ ์์ธ๊ฐ ๋ฐ์ํ์ง ์๊ณ ์๋ ๊ฒ์ ํ์ธํ ์ ์์ด์.
|
@@ -0,0 +1,28 @@
+package nextstep.security.authorization.web;
+
+import jakarta.servlet.http.HttpServletRequest;
+import java.util.List;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+import nextstep.security.util.RequestMatcher;
+import nextstep.security.util.RequestMatcherEntry;
+
+public class RequestMatcherDelegatingAuthorizationManager implements AuthorizationManager<HttpServletRequest> {
+
+ private final List<RequestMatcherEntry<AuthorizationManager>> mappings;
+
+ public RequestMatcherDelegatingAuthorizationManager(List<RequestMatcherEntry<AuthorizationManager>> mappings) {
+ this.mappings = mappings;
+ }
+
+ @Override
+ public AuthorizationDecision check(Authentication authentication, HttpServletRequest request) {
+ for (RequestMatcherEntry<AuthorizationManager> mapping : mappings) {
+ if (mapping.getRequestMatcher().matches(request)) {
+ return mapping.getEntry().check(authentication, request);
+ }
+ }
+ return AuthorizationDecision.DENY;
+ }
+}
|
Java
|
```suggestion
if (mapping.matches(request)) {
```
์ ๊ฐ ์๋ ๋๋ ธ๋ ๋ด์ฉ์ getter๋ฅผ ๊บผ๋ด์์ ๋ค์ ํธ์ถํ๋ ๊ฒ์ด ์๋ ํด๋น ๊ฐ์ฒด ๋ด์์ ์ฒ๋ฆฌํ ์ ์๊ฒ ๋ฉ์์ง๋ฅผ ๋์ง๋ ํํ๋ฅผ ๋ง์๋๋ฆฐ ๊ฒ์ด์์ด์. getter๋ฅผ ํธ์ถํด์ ๋ฉ์๋ ์ฒด์ด๋์ด ๋๋ ๊ฒ์ ๊ฐ์ฒด์ ์ญํ ์ด ์๋ค๊ธฐ๋ณด๋จ ๋จ์ํ ๋ํํด๋์ค๊ฐ ๋์ด๋ฒ๋ ค ์ฑ
์๊ณผ ์ญํ ์ด ๋ถ๋ถ๋ช
ํด์ง ์ ์์ต๋๋ค.
```java
public boolean matches(HttpServletRequest request) {
return requestMatcher.matches(request);
}
```
|
@@ -0,0 +1,13 @@
+package nextstep.security.authorization.web;
+
+import jakarta.servlet.http.HttpServletRequest;
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authorization.AuthorizationDecision;
+import nextstep.security.authorization.AuthorizationManager;
+
+public class DenyAllAuthorizationManager implements AuthorizationManager<HttpServletRequest> {
+ @Override
+ public AuthorizationDecision check(Authentication authentication, HttpServletRequest object) {
+ return AuthorizationDecision.DENY;
+ }
+}
|
Java
|
```suggestion
public AuthorizationResult check(Authentication authentication, HttpServletRequest object) {
```
๋ฐํ ํ์
๋ค๋ ์ ์ถ์ํํด์ฃผ์ ํด๋์ค๋ก ๋ง๋ค์ด์ฃผ๋ฉด ์ข๊ฒ ๋ค์ :)
|
@@ -0,0 +1,22 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authorization.web.AuthorizationResult;
+
+public class AuthorizationDecision implements AuthorizationResult {
+ public static final AuthorizationDecision ALLOW = new AuthorizationDecision(true);
+ public static final AuthorizationDecision DENY = new AuthorizationDecision(false);
+
+ private final boolean granted;
+
+ public AuthorizationDecision(boolean granted) {
+ this.granted = granted;
+ }
+
+ public boolean isGranted() {
+ return granted;
+ }
+
+ public static AuthorizationDecision of(boolean granted) {
+ return granted ? ALLOW : DENY;
+ }
+}
|
Java
|
```suggestion
public static AuthorizationDecision from(boolean granted) {
```
๊ด์ต์ ์ผ๋ก ์ ์ ํฉํ ๋ฆฌ ๋ฉ์๋๋ ํ๋ผ๋ฏธํฐ๊ฐ ํ๋์ผ๋ from, ์ฌ๋ฌ๊ฐ์ผ๋ of๋ฅผ ํ์ฉํฉ๋๋ค.
|
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 1,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 2,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 3,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 4,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 5,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 6,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ },
+ {
+ "id": 7,
+ "img": "images/yoonhee/imgg.jpg",
+ "text": "ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ดํ"
+ }
+]
|
Unknown
|
์ ๊ตญ์ ์คํฌ๋์ ๋ป ์ ์๊ฒ ์ต๋๋ค.
|
@@ -1,9 +1,23 @@
import React from 'react';
+import './Login.scss';
+import LoginForm from './LoginForm';
-class Login extends React.Component {
+class LoginYoonHee extends React.Component {
render() {
- return null;
+ return (
+ <article className="login-art">
+ <div className="log-in__main">
+ <h1 className="main-name">westagram</h1>
+ <div className="log-in">
+ <LoginForm />
+ </div>
+ <a className="find-ps" href="#!">
+ ๋น๋ฐ๋ฒํธ๋ฅผ ์์ผ์
จ๋์?
+ </a>
+ </div>
+ </article>
+ );
}
}
-export default Login;
+export default LoginYoonHee;
|
JavaScript
|
props์ ๊ฐ๋
์ ๋ํด ์ ์ดํดํ์
จ๋ค์!
ํ์ง๋ง ์ด๋ ๊ฒ ํ ํ์ ์์ด, `<LoginForm>` ์ปดํฌ๋ํธ์์ withRouter importํด์ ๊ฐ์ธ์ฃผ์๋ ๋ฐฉ์์ผ๋ก ํ์๋ ๊ฒ ์ข์ ๊ฒ ๊ฐ๋ค์!
|
@@ -0,0 +1,75 @@
+.login-art {
+ display: flex;
+ justify-content: center;
+ align-items: center;
+ height: 100vh;
+ background-color: var(--color-boxgray);
+
+ .log-in__main {
+ display: flex;
+ flex-direction: column;
+ justify-content: space-evenly;
+ align-items: center;
+ width: 300px;
+ height: 350px;
+ background-color: white;
+ border: 1px solid var(--color-boxborder);
+ }
+
+ .main-name {
+ font-size: 40px;
+ font-weight: lighter;
+ font-family: 'Lobster', cursive;
+ }
+
+ .log-in {
+ display: flex;
+ flex-direction: column;
+ align-items: center;
+ }
+
+ .log-in__id,
+ .log-in__ps {
+ width: 230px;
+ height: 35px;
+ margin: 3px 0;
+ padding: 3px 10px;
+ border-radius: 5px;
+ border: 1px solid var(--color-boxborder);
+ color: var(--color-textgray);
+ background-color: var(--color-boxgray);
+ }
+
+ .find-ps {
+ text-decoration: none;
+ font-size: 13px;
+ }
+
+ .log-in__btn {
+ width: 230px;
+ height: 30px;
+ margin-top: 10px;
+ margin-bottom: 80px;
+ border-radius: 5px;
+ background-color: var(--color--btn-text);
+ border: none;
+ color: white;
+ font-weight: bold;
+ }
+ .disabled {
+ width: 230px;
+ height: 30px;
+ margin-top: 10px;
+ margin-bottom: 80px;
+ border-radius: 5px;
+ background-color: var(--color--btn-text-yet);
+ border: none;
+ color: white;
+ font-weight: bold;
+ }
+
+ .log-in > form {
+ display: flex;
+ flex-direction: column;
+ }
+}
|
Unknown
|
- ํ๋์ ์์์ ์ฌ๋ฌ๊ฐ์ง ์์ฑ์ ๋ถ์ฌํ๋ ๊ฒฝ์ฐ ์ค์๋, ๊ด๋ จ๋์ ๋ฐ๋ผ์ ๋๋ฆ์ convention์ ์ง์ผ์ ์์ฑํ๋ ๊ฒ์ด ์ข์ต๋๋ค.
- ์ผ๋ฐ์ ์ธ convention ์ ์๋์ ๊ฐ์ต๋๋ค. ์๋์ ๊ฐ์ด ์์ ์ ์ฉํด์ฃผ์ธ์.
[CSS property ์์]
- Layout Properties (position, float, clear, display)
- Box Model Properties (width, height, margin, padding)
- Visual Properties (color, background, border, box-shadow)
- Typography Properties (font-size, font-family, text-align, text-transform)
- Misc Properties (cursor, overflow, z-index)
- ๋ฆฌ๋ทฐํ์ง ์์ ๋ถ๋ถ๋ ์ฐธ๊ณ ํด์ ์์ ํด์ฃผ์ธ์-!
|
@@ -0,0 +1,51 @@
+import React from 'react';
+import { withRouter } from 'react-router-dom';
+
+class LoginForm extends React.Component {
+ constructor() {
+ super();
+ this.state = { id: '', ps: '' };
+ }
+
+ goToMain = e => {
+ this.props.history.push('/main-yoonhee');
+ };
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ render() {
+ const { id, ps } = this.state;
+ const isAble = id.includes('@') && ps.length >= 5;
+ return (
+ <form>
+ <input
+ name="id"
+ className="log-in__id"
+ type="text"
+ placeholder="์ ํ๋ฒํธ, ์ฌ์ฉ์ ์ด๋ฆ ๋๋ ์ด๋ฉ์ผ"
+ onChange={this.handleInput}
+ />
+
+ <input
+ name="ps"
+ className="log-in__ps"
+ type="password"
+ placeholder="๋น๋ฐ๋ฒํธ"
+ onChange={this.handleInput}
+ />
+ <button
+ type="button"
+ className={`log-in__btn ${isAble ? '' : 'disabled'}`}
+ onClick={this.goToMain}
+ disabled={!isAble}
+ >
+ ๋ก๊ทธ์ธ
+ </button>
+ </form>
+ );
+ }
+}
+
+export default withRouter(LoginForm);
|
JavaScript
|
๊ณ์ฐ๋ ์์ฑ๋ช
์ ํ์ฉํด์ฃผ์
จ๋ค์! :)
|
@@ -0,0 +1,10 @@
+import React from 'react';
+
+class Comment extends React.Component {
+ render() {
+ const { innerText } = this.props;
+ return <li>{innerText}</li>;
+ }
+}
+
+export default Comment;
|
JavaScript
|
map ๋ฉ์๋๋ฅผ ์ฌ์ฉํ์๋ ๋ถ๋ถ์์ key prop ๋ถ์ฌํด์ฃผ์๋ฉด ๋ฉ๋๋ค!
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
isKeyEnter๋ผ๋ ํจ์๋ช
์ key๊ฐ enter์ธ์ง ์๋์ง๋ฅผ ํ๋ณํ๋ boolean ๋ณ์๋ช
์ผ๋ก ์ ํฉํ ๊ฒ ๊ฐ๋ค์.
ํจ์์ ๋์์ ๋ํ ๋ด์ฉ์ ์ง๊ด์ ์ผ๋ก ์ ์ ์๋ ๋์ฌํ์ผ๋ก ์์ฑํด์ฃผ์ธ์!
ex) addCommentByEnter
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
๋ฆฌ๋ทฐํ์ง ์์ ๋ถ๋ถ๋ ์์ ํด์ฃผ์ธ์!
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
- `newfeedComment`๋ผ๊ณ ์๋ก ์ ์ธํ๊ณ ํ ๋นํ ํ์ ์์ด, concat ๋ฉ์๋์ feedComment๋ผ๋ state๋ฅผ ์ง์ ๋ฃ์ด์ฃผ์
๋ ๋ ๊ฒ ๊ฐ๋ค์.
- concat ์ ์ฌ์ฉํด์ฃผ์
จ๋๋ฐ, concat ๋์ ์ spread operator๋ฅผ ์ฌ์ฉํด์ ๋์ผํ๊ฒ ๊ตฌํํด๋ณด์ค ์ ์์ต๋๋ค.
์ฐ์ตํ๋ค๊ณ ์๊ฐํ์๊ณ ์ฐพ์์ ๊ตฌํํด๋ณด์ธ์!
```suggestion
const { feedComment, commentList } = this.state;
this.setState({
commentList: commentList.concat(feedComment),
feedComment: '',
});
```
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
์ด ์ปดํฌ๋ํธ์ tag๋ค์์ id์ className์ ๊ฐ์ด ๋ถ์ฌํ์ ์ด์ ๊ฐ ์์๊น์??
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
์์ ๋ฆฌ๋ทฐ๋๋ฆฐ ๋ด์ฉ์ด๋ค์! index๋ฅผ props๋ก ๋๊ฒจ์ฃผ๋ ๊ฒ ์๋๋ผ, ์ด ๋ถ๋ถ์์ key={index}๋ก ๋ถ์ฌํด์ฃผ์๋ฉด ๋ ๊ฒ ๊ฐ์ต๋๋ค!
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
๊ทธ๋ฆฌ๊ณ cur์ด๋ผ๋ ๋ณ์๋ช
์ ์ด๋ค ๋ฐ์ดํฐ๋ฅผ ๊ฐ์ง๊ณ ์๋์ง ๋ช
ํํ์ง ์์๋ฐ, ํด๋น ๋ณ์๊ฐ ๋ด๊ณ ์๋ ๋ฐ์ดํฐ์ ๋ํ ๋ด์ฉ์ด ์ข ๋ ์ง๊ด์ ์ผ๋ก ๋๋ฌ๋ ์ ์๋๋ก ์์ ํด์ฃผ์ธ์!
ex) comment
|
@@ -0,0 +1,32 @@
+import React from 'react';
+import Feed from './Feed';
+
+class Feeds extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ feeds: [],
+ };
+ }
+
+ componentDidMount() {
+ fetch('/data/feed.json')
+ .then(res => res.json())
+ .then(data => {
+ this.setState({ feeds: data });
+ });
+ }
+
+ render() {
+ const { feeds } = this.state;
+ return (
+ <div className="feeds">
+ {feeds.map(feed => (
+ <Feed key={feed.id} img={feed.img} text={feed.text} />
+ ))}
+ </div>
+ );
+ }
+}
+
+export default Feeds;
|
JavaScript
|
- method ์ ์๋ตํด์ฃผ์
จ๋ค์! ๐
- ์ถ๊ฐ์ ์ผ๋ก, `http://localhost:3000` ๋ถ๋ถ๋ ์๋ตํ ์ ์์ต๋๋ค. ํฌํธ ๋ฒํธ๊ฐ ๋ฐ๋ ๋๋ง๋ค ์๋ฌ๊ฐ ๋ฐ์ํ๊ณ ๊ทธ๋๊ทธ๋ ์์ ํด์ค์ผ ํ๋ ๋ฒ๊ฑฐ๋ก์์ด ์๊ธฐ ๋๋ฌธ์, ๋ค์๊ณผ ๊ฐ์ด ์๋ตํด์ ์ฌ์ฉํด์ฃผ์ธ์!
```suggestion
fetch('/data/feed.json')
```
|
@@ -0,0 +1,32 @@
+import React from 'react';
+import Feed from './Feed';
+
+class Feeds extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ feeds: [],
+ };
+ }
+
+ componentDidMount() {
+ fetch('/data/feed.json')
+ .then(res => res.json())
+ .then(data => {
+ this.setState({ feeds: data });
+ });
+ }
+
+ render() {
+ const { feeds } = this.state;
+ return (
+ <div className="feeds">
+ {feeds.map(feed => (
+ <Feed key={feed.id} img={feed.img} text={feed.text} />
+ ))}
+ </div>
+ );
+ }
+}
+
+export default Feeds;
|
JavaScript
|
์ค์ ์ฌ๊ธฐ์๋ key prop ์ ๋ถ์ฌํด์ฃผ์
จ๋ค์!
์ด์ง ํ ์ ์ก์๋ฉด,, ๋งค๊ฐ๋ณ์์ ๋ฐ์ดํฐ๋ ๊ฐ ํผ๋์ ๋ํ ๋ฐ์ดํฐ์ด๊ธฐ ๋๋ฌธ์ feeds -> feed๊ฐ ๋ ์ ์ ํ ๊ฒ ๊ฐ์ต๋๋ค.
|
@@ -1,9 +1,22 @@
+// eslint-disable-next-line
import React from 'react';
+import Nav from './Nav';
+import Feeds from './Feeds';
+import MainR from './MainR';
+import './Main.scss';
-class Main extends React.Component {
+class MainYoonHee extends React.Component {
render() {
- return null;
+ return (
+ <div className="main-body">
+ <Nav />
+ <main>
+ <Feeds />
+ <MainR />
+ </main>
+ </div>
+ );
}
}
-export default Main;
+export default MainYoonHee;
|
JavaScript
|
import ์์ ์์ ํด์ฃผ์ธ์! ์ผ๋ฐ์ ์ธ convention์ ๋ฐ๋ผ ์์๋ง ์ ์ง์ผ์ฃผ์
๋ ๊ฐ๋
์ฑ์ด ์ข์์ง๋๋ค. ์๋ ์์ ์ฐธ๊ณ ํด์ฃผ์ธ์.
- React โ Library(Package) โ Component โ ๋ณ์ / ์ด๋ฏธ์ง โ css ํ์ผ(scss ํ์ผ)
|
@@ -0,0 +1,25 @@
+import React from 'react';
+
+class Recommend extends React.Component {
+ render() {
+ const { nickname, img } = this.props;
+ return (
+ <li className="user main-right__user2">
+ <div className="user-and-botton">
+ <img
+ className="user__img user__img--brder-red"
+ alt={nickname}
+ src={img}
+ />
+ <div className="user-id2">
+ <div className="user__id">{nickname}</div>
+ <div className="text--gray">ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ด</div>
+ </div>
+ </div>
+ <button className="btn btn--hover nnn">ํ๋ก์ฐ</button>
+ </li>
+ );
+ }
+}
+
+export default Recommend;
|
JavaScript
|
`<li>`ํ๊ทธ, `<div>`ํ๊ทธ ๋ ์ค ํ๋๋ก๋ง ๊ฐ์ธ์ฃผ์
๋ ๋ ๊ฒ ๊ฐ์ต๋๋ค!
|
@@ -0,0 +1,22 @@
+import React from 'react';
+
+class Story extends React.Component {
+ render() {
+ const { nickname, img } = this.props;
+ return (
+ <li className="user main-right__user">
+ <img
+ className="user__img user__img--brder-red"
+ alt={nickname}
+ src={img}
+ />
+ <div className="user-id2">
+ <div className="user__id">{nickname}</div>
+ <div className="text--gray">2์๊ฐ ์ </div>
+ </div>
+ </li>
+ );
+ }
+}
+
+export default Story;
|
JavaScript
|
์ฌ๊ธฐ๋ ๋ง์ฐฌ๊ฐ์ง-!
|
@@ -0,0 +1,281 @@
+/*------๊ณตํต-----*/
+/*------๊ณตํต-----*/
+
+.main-body {
+ background-color: var(--color-boxgray);
+}
+
+main {
+ display: flex;
+ margin-left: 100px;
+}
+
+ul > li {
+ margin: 10px 0;
+}
+
+a {
+ text-decoration: none;
+ color: inherit;
+}
+
+.box {
+ background-color: white;
+ border: 1px solid var(--color-boxborder);
+}
+.box-padding {
+ padding: 10px;
+}
+
+.text {
+ font-size: 12px;
+}
+
+.text--gray {
+ margin-top: 3px;
+ font-size: 13px;
+ color: var(--color-textgray);
+}
+
+.icon {
+ border: no;
+}
+
+.btn {
+ padding: 5px 0px;
+ border: none;
+ border-radius: 5px;
+ background-color: transparent;
+ color: var(--color--btn-text);
+ font-weight: bold;
+}
+.btn--hover:hover {
+ color: white;
+ background-color: var(--color--btn-text);
+}
+
+.westagram {
+ font-family: 'Lobster', cursive;
+ font-size: 25px;
+}
+.user {
+ display: flex;
+ align-items: center;
+ justify-content: flex-start;
+}
+
+.user__img {
+ width: 30px;
+ height: 30px;
+ margin-right: 7px;
+ border-radius: 50%;
+ border: 1px solid var(--color-textgray);
+}
+
+.user__img--brder-red {
+ border: 1px solid red;
+ border-spacing: 3px;
+}
+
+.user__img--small {
+ width: 20px;
+ height: 18px;
+ margin-right: 5px;
+}
+
+.user__img--big {
+ width: 40px;
+ height: 40px;
+}
+
+.user__id {
+ font-size: 14px;
+ font-weight: bolder;
+}
+
+.user-text2 {
+ display: flex;
+ flex-direction: column;
+}
+
+.footer {
+ margin-top: 15px;
+}
+
+/*--------nav--------*/
+/*--------nav--------*/
+/*--------nav--------*/
+
+.nav {
+ display: flex;
+ justify-content: space-around;
+ align-items: center;
+ padding: 20px 0;
+ border-bottom: 1px solid var(--color-boxborder);
+ background-color: white;
+
+ .nav__border {
+ height: 30px;
+ border-left: 2px solid black;
+ }
+
+ .nav-left {
+ display: flex;
+ align-items: center;
+ justify-content: space-between;
+ width: 18%;
+ }
+
+ .nav-center {
+ width: 20%;
+ }
+
+ .nav-center > .search-bar {
+ height: 25px;
+ width: 100%;
+ border: 1px solid var(--color-boxborder);
+ background-color: var(--color-boxgray);
+ text-align: center;
+ }
+ .search-bar[value] {
+ color: var(--color-textgray);
+ }
+
+ .nav-right {
+ display: flex;
+ justify-content: space-between;
+ width: 12%;
+ }
+}
+
+/*----------feed----------*/
+/*----------feed----------*/
+/*----------feed----------*/
+
+.feeds {
+ display: flex;
+ flex-direction: column;
+ width: 50%;
+ padding-top: 65px;
+
+ .feed {
+ display: flex;
+ align-items: center;
+ flex-direction: column;
+ width: 100%;
+ margin-bottom: 50px;
+ border: 1px solid var(--color-boxborder);
+ background-color: white;
+ }
+
+ .feed__head {
+ display: flex;
+ align-items: center;
+ justify-content: space-between;
+ width: 95%;
+ margin: 15px 20px;
+ }
+
+ .feed__head > .user {
+ width: 22%;
+ }
+
+ .feed__img {
+ width: 100%;
+ }
+
+ .feed__icons {
+ display: flex;
+ justify-content: space-between;
+ width: 95%;
+ margin: 12px 0px;
+ }
+
+ .feed__icons__left {
+ display: flex;
+ justify-content: space-between;
+ width: 18%;
+ }
+
+ .feed__likes {
+ display: flex;
+ align-items: center;
+ width: 95%;
+ }
+
+ .feed__text {
+ width: 95%;
+ margin-top: 15px;
+ }
+
+ .feed__comment-box {
+ width: 100%;
+ height: 35px;
+ margin-top: 5px;
+ border-top: 1px solid var(--color-boxborder);
+ border-bottom: 1px solid var(--color-boxborder);
+ }
+
+ .comment__input {
+ width: 90%;
+ height: 100%;
+ padding-left: 14px;
+ border: none;
+ }
+
+ .comment__input[placehilder] {
+ color: var(--color-textgray);
+ }
+
+ .comment__btn {
+ width: 8%;
+ height: 80;
+ }
+
+ .feed__comment {
+ width: 100%;
+ }
+ .feed__comment-list {
+ width: 95%;
+ margin: 10px 0;
+ padding: 5px 14px;
+ }
+
+ .feed__comment-list > li {
+ font-size: 13px;
+ }
+}
+
+/*-------------main-right------------*/
+/*-------------main-right------------*/
+/*-------------main-right------------*/
+
+.main-right {
+ position: fixed;
+ right: 40px;
+ width: 25%;
+ margin-top: 65px;
+
+ .main-right__header {
+ display: flex;
+ align-items: flex-end;
+ justify-content: space-between;
+ margin-bottom: 15px;
+ padding: 0 5px;
+ }
+
+ .user-and-botton {
+ width: 70%;
+ display: flex;
+ }
+
+ .main-right__story > .box {
+ margin-top: 15px;
+ }
+
+ .main-right__user2 {
+ display: flex;
+ justify-content: space-between;
+ margin: 2px;
+ }
+}
|
Unknown
|
๊ณตํต์ผ๋ก ์ฌ์ฉํ๋ ์์ฑ์ ํ์๋ค๊ณผ ์์ํ์ฌ common.scss ํ์ผ๋ก ์ฎ๊ฒจ์ฃผ์ธ์!
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
๋ฆฌ์กํธ๋ก ํ์ผ ์ฎ๊ฒจ์ค๊ธฐ์ jsํ์ผ๋ก๋ง ์์
ํ ๋ ๋์ผ๋ก ์ ๊ทผํ๋ ์ฉ๋๋ก ์ฐ๊ณ ์ง์ฐ๋๊ฑธ ๊น๋นกํ๋ค์ โฆ;;;ใ
ใ
์ง์ ์ต๋๋ค!
|
@@ -1,9 +1,23 @@
import React from 'react';
+import './Login.scss';
+import LoginForm from './LoginForm';
-class Login extends React.Component {
+class LoginYoonHee extends React.Component {
render() {
- return null;
+ return (
+ <article className="login-art">
+ <div className="log-in__main">
+ <h1 className="main-name">westagram</h1>
+ <div className="log-in">
+ <LoginForm />
+ </div>
+ <a className="find-ps" href="#!">
+ ๋น๋ฐ๋ฒํธ๋ฅผ ์์ผ์
จ๋์?
+ </a>
+ </div>
+ </article>
+ );
}
}
-export default Login;
+export default LoginYoonHee;
|
JavaScript
|
์์ ํ์ต๋๋น! ๋๋ถ์ ๋ผ์ฐํฐ์ ๋ํด์ ์ข ๋ ์๊ฒ๋๋ค์ฉ ใ
ใ
|
@@ -0,0 +1,10 @@
+import React from 'react';
+
+class Comment extends React.Component {
+ render() {
+ const { innerText } = this.props;
+ return <li>{innerText}</li>;
+ }
+}
+
+export default Comment;
|
JavaScript
|
์์ ํ์ต๋๋ค-! key๊ฐ ๋ฃ๋๊ณณ์ ์ ํํ ๋ชจ๋ฅด๊ณ ์์๋๋ฐ ์ด์ ์ ํํ๊ฒ ์๊ฑฐ๊ฐ์์!
|
@@ -0,0 +1,32 @@
+import React from 'react';
+import Feed from './Feed';
+
+class Feeds extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ feeds: [],
+ };
+ }
+
+ componentDidMount() {
+ fetch('/data/feed.json')
+ .then(res => res.json())
+ .then(data => {
+ this.setState({ feeds: data });
+ });
+ }
+
+ render() {
+ const { feeds } = this.state;
+ return (
+ <div className="feeds">
+ {feeds.map(feed => (
+ <Feed key={feed.id} img={feed.img} text={feed.text} />
+ ))}
+ </div>
+ );
+ }
+}
+
+export default Feeds;
|
JavaScript
|
์์ ํ์ต๋๋ค-! ํฌํธ๋ฒํธ๋ ์๋ต์ผ๋ฃจ! ํ ๊ฐ์ฌํฉ๋๋น!
|
@@ -0,0 +1,32 @@
+import React from 'react';
+import Feed from './Feed';
+
+class Feeds extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ feeds: [],
+ };
+ }
+
+ componentDidMount() {
+ fetch('/data/feed.json')
+ .then(res => res.json())
+ .then(data => {
+ this.setState({ feeds: data });
+ });
+ }
+
+ render() {
+ const { feeds } = this.state;
+ return (
+ <div className="feeds">
+ {feeds.map(feed => (
+ <Feed key={feed.id} img={feed.img} text={feed.text} />
+ ))}
+ </div>
+ );
+ }
+}
+
+export default Feeds;
|
JavaScript
|
feed๋ก ์์ ์๋ฃ ํ์ต๋๋น ๐
|
@@ -1,9 +1,22 @@
+// eslint-disable-next-line
import React from 'react';
+import Nav from './Nav';
+import Feeds from './Feeds';
+import MainR from './MainR';
+import './Main.scss';
-class Main extends React.Component {
+class MainYoonHee extends React.Component {
render() {
- return null;
+ return (
+ <div className="main-body">
+ <Nav />
+ <main>
+ <Feeds />
+ <MainR />
+ </main>
+ </div>
+ );
}
}
-export default Main;
+export default MainYoonHee;
|
JavaScript
|
scssํ์ผ ์๋๋ก ์์น์์ ํ์ต๋๋น !
|
@@ -1,9 +1,22 @@
+// eslint-disable-next-line
import React from 'react';
+import Nav from './Nav';
+import Feeds from './Feeds';
+import MainR from './MainR';
+import './Main.scss';
-class Main extends React.Component {
+class MainYoonHee extends React.Component {
render() {
- return null;
+ return (
+ <div className="main-body">
+ <Nav />
+ <main>
+ <Feeds />
+ <MainR />
+ </main>
+ </div>
+ );
}
}
-export default Main;
+export default MainYoonHee;
|
JavaScript
|
๊ทธ ๋ ๋ง์ํด์ฃผ์
จ๋ ๋ถ๋ถ์ด๋ค์ฉ ใ
ใ
.. <div>๋ก ๋ณ๊ฒฝํ์ต๋๋น.. ์ฝ์์ฐฝ์ ๋จ๋ ์์์๋ ๋นจ๊ฐ์ ๊ธ์จ ์ค๋ฅ๊ฐ ์ด๊ฒ๋๋ฌธ์ด์๊ตฐ์ฉ ใ
ใ
index.html์์๋ body๋ถ๋ถ๊ณผ ์ถฉ๋ํด์์; ๊ธฐ๋ณธ์ ์ธ ๊ตฌ์กฐ๋ฅผ ์๊ฐํ๋ฉด ๋น์ฐํ๊ฑด๋ฐ ์ ๊ฐ ๋๋ฌด ์์ผํ๋ค์..
|
@@ -0,0 +1,25 @@
+import React from 'react';
+
+class Recommend extends React.Component {
+ render() {
+ const { nickname, img } = this.props;
+ return (
+ <li className="user main-right__user2">
+ <div className="user-and-botton">
+ <img
+ className="user__img user__img--brder-red"
+ alt={nickname}
+ src={img}
+ />
+ <div className="user-id2">
+ <div className="user__id">{nickname}</div>
+ <div className="text--gray">ํ๊ตญ์ดํ๊ตญ์ดํ๊ตญ์ด</div>
+ </div>
+ </div>
+ <button className="btn btn--hover nnn">ํ๋ก์ฐ</button>
+ </li>
+ );
+ }
+}
+
+export default Recommend;
|
JavaScript
|
์์ ํ์จ๋ฏธ๋น~!๐
|
@@ -0,0 +1,22 @@
+import React from 'react';
+
+class Story extends React.Component {
+ render() {
+ const { nickname, img } = this.props;
+ return (
+ <li className="user main-right__user">
+ <img
+ className="user__img user__img--brder-red"
+ alt={nickname}
+ src={img}
+ />
+ <div className="user-id2">
+ <div className="user__id">{nickname}</div>
+ <div className="text--gray">2์๊ฐ ์ </div>
+ </div>
+ </li>
+ );
+ }
+}
+
+export default Story;
|
JavaScript
|
์ฌ๊ธฐ๋์ฉ~
|
@@ -0,0 +1,281 @@
+/*------๊ณตํต-----*/
+/*------๊ณตํต-----*/
+
+.main-body {
+ background-color: var(--color-boxgray);
+}
+
+main {
+ display: flex;
+ margin-left: 100px;
+}
+
+ul > li {
+ margin: 10px 0;
+}
+
+a {
+ text-decoration: none;
+ color: inherit;
+}
+
+.box {
+ background-color: white;
+ border: 1px solid var(--color-boxborder);
+}
+.box-padding {
+ padding: 10px;
+}
+
+.text {
+ font-size: 12px;
+}
+
+.text--gray {
+ margin-top: 3px;
+ font-size: 13px;
+ color: var(--color-textgray);
+}
+
+.icon {
+ border: no;
+}
+
+.btn {
+ padding: 5px 0px;
+ border: none;
+ border-radius: 5px;
+ background-color: transparent;
+ color: var(--color--btn-text);
+ font-weight: bold;
+}
+.btn--hover:hover {
+ color: white;
+ background-color: var(--color--btn-text);
+}
+
+.westagram {
+ font-family: 'Lobster', cursive;
+ font-size: 25px;
+}
+.user {
+ display: flex;
+ align-items: center;
+ justify-content: flex-start;
+}
+
+.user__img {
+ width: 30px;
+ height: 30px;
+ margin-right: 7px;
+ border-radius: 50%;
+ border: 1px solid var(--color-textgray);
+}
+
+.user__img--brder-red {
+ border: 1px solid red;
+ border-spacing: 3px;
+}
+
+.user__img--small {
+ width: 20px;
+ height: 18px;
+ margin-right: 5px;
+}
+
+.user__img--big {
+ width: 40px;
+ height: 40px;
+}
+
+.user__id {
+ font-size: 14px;
+ font-weight: bolder;
+}
+
+.user-text2 {
+ display: flex;
+ flex-direction: column;
+}
+
+.footer {
+ margin-top: 15px;
+}
+
+/*--------nav--------*/
+/*--------nav--------*/
+/*--------nav--------*/
+
+.nav {
+ display: flex;
+ justify-content: space-around;
+ align-items: center;
+ padding: 20px 0;
+ border-bottom: 1px solid var(--color-boxborder);
+ background-color: white;
+
+ .nav__border {
+ height: 30px;
+ border-left: 2px solid black;
+ }
+
+ .nav-left {
+ display: flex;
+ align-items: center;
+ justify-content: space-between;
+ width: 18%;
+ }
+
+ .nav-center {
+ width: 20%;
+ }
+
+ .nav-center > .search-bar {
+ height: 25px;
+ width: 100%;
+ border: 1px solid var(--color-boxborder);
+ background-color: var(--color-boxgray);
+ text-align: center;
+ }
+ .search-bar[value] {
+ color: var(--color-textgray);
+ }
+
+ .nav-right {
+ display: flex;
+ justify-content: space-between;
+ width: 12%;
+ }
+}
+
+/*----------feed----------*/
+/*----------feed----------*/
+/*----------feed----------*/
+
+.feeds {
+ display: flex;
+ flex-direction: column;
+ width: 50%;
+ padding-top: 65px;
+
+ .feed {
+ display: flex;
+ align-items: center;
+ flex-direction: column;
+ width: 100%;
+ margin-bottom: 50px;
+ border: 1px solid var(--color-boxborder);
+ background-color: white;
+ }
+
+ .feed__head {
+ display: flex;
+ align-items: center;
+ justify-content: space-between;
+ width: 95%;
+ margin: 15px 20px;
+ }
+
+ .feed__head > .user {
+ width: 22%;
+ }
+
+ .feed__img {
+ width: 100%;
+ }
+
+ .feed__icons {
+ display: flex;
+ justify-content: space-between;
+ width: 95%;
+ margin: 12px 0px;
+ }
+
+ .feed__icons__left {
+ display: flex;
+ justify-content: space-between;
+ width: 18%;
+ }
+
+ .feed__likes {
+ display: flex;
+ align-items: center;
+ width: 95%;
+ }
+
+ .feed__text {
+ width: 95%;
+ margin-top: 15px;
+ }
+
+ .feed__comment-box {
+ width: 100%;
+ height: 35px;
+ margin-top: 5px;
+ border-top: 1px solid var(--color-boxborder);
+ border-bottom: 1px solid var(--color-boxborder);
+ }
+
+ .comment__input {
+ width: 90%;
+ height: 100%;
+ padding-left: 14px;
+ border: none;
+ }
+
+ .comment__input[placehilder] {
+ color: var(--color-textgray);
+ }
+
+ .comment__btn {
+ width: 8%;
+ height: 80;
+ }
+
+ .feed__comment {
+ width: 100%;
+ }
+ .feed__comment-list {
+ width: 95%;
+ margin: 10px 0;
+ padding: 5px 14px;
+ }
+
+ .feed__comment-list > li {
+ font-size: 13px;
+ }
+}
+
+/*-------------main-right------------*/
+/*-------------main-right------------*/
+/*-------------main-right------------*/
+
+.main-right {
+ position: fixed;
+ right: 40px;
+ width: 25%;
+ margin-top: 65px;
+
+ .main-right__header {
+ display: flex;
+ align-items: flex-end;
+ justify-content: space-between;
+ margin-bottom: 15px;
+ padding: 0 5px;
+ }
+
+ .user-and-botton {
+ width: 70%;
+ display: flex;
+ }
+
+ .main-right__story > .box {
+ margin-top: 15px;
+ }
+
+ .main-right__user2 {
+ display: flex;
+ justify-content: space-between;
+ margin: 2px;
+ }
+}
|
Unknown
|
common.scss ํ์ผ์ ์ด๋ฏธ ์์ด์ ํด๋น ๋ถ๋ถ ์ญ์ ํ์ด์ฉ ใ
...๐ฑ
|
@@ -0,0 +1,51 @@
+import React from 'react';
+import { withRouter } from 'react-router-dom';
+
+class LoginForm extends React.Component {
+ constructor() {
+ super();
+ this.state = { id: '', ps: '' };
+ }
+
+ goToMain = e => {
+ this.props.history.push('/main-yoonhee');
+ };
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ render() {
+ const { id, ps } = this.state;
+ const isAble = id.includes('@') && ps.length >= 5;
+ return (
+ <form>
+ <input
+ name="id"
+ className="log-in__id"
+ type="text"
+ placeholder="์ ํ๋ฒํธ, ์ฌ์ฉ์ ์ด๋ฆ ๋๋ ์ด๋ฉ์ผ"
+ onChange={this.handleInput}
+ />
+
+ <input
+ name="ps"
+ className="log-in__ps"
+ type="password"
+ placeholder="๋น๋ฐ๋ฒํธ"
+ onChange={this.handleInput}
+ />
+ <button
+ type="button"
+ className={`log-in__btn ${isAble ? '' : 'disabled'}`}
+ onClick={this.goToMain}
+ disabled={!isAble}
+ >
+ ๋ก๊ทธ์ธ
+ </button>
+ </form>
+ );
+ }
+}
+
+export default withRouter(LoginForm);
|
JavaScript
|
๋์๋ ๊ฐ์ ๋๋ถ์
๋๋น ใ
.ใ
|
@@ -0,0 +1,59 @@
+import React from 'react';
+import Comment from './Comment';
+
+class CommentBox extends React.Component {
+ constructor(props) {
+ super(props);
+ this.state = { feedComment: '', commentList: [] };
+ }
+
+ handleInput = e => {
+ this.setState({ [e.target.name]: e.target.value });
+ };
+
+ addCommentByEnter = e => {
+ if (e.key === 'Enter') {
+ this.addComment();
+ }
+ };
+
+ addComment = () => {
+ const { feedComment, commentList } = this.state;
+ this.setState({
+ commentList: [...commentList, feedComment],
+ feedComment: '',
+ });
+ };
+
+ render() {
+ return (
+ <>
+ <div className="feed__comment-box">
+ <input
+ name="feedComment"
+ className="comment__input"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ onChange={this.handleInput}
+ onKeyDown={this.addCommentByEnter}
+ value={this.state.feedComment}
+ />
+ <button
+ className="btn btn--hover comment__btn"
+ onClick={this.addComment}
+ >
+ ๊ฒ์
+ </button>
+ </div>
+ <div className="feed__comment">
+ <ul className="feed__comment-list">
+ {this.state.commentList.map((comment, index) => {
+ return <Comment key={index} innerText={comment} />;
+ })}
+ </ul>
+ </div>
+ </>
+ );
+ }
+}
+
+export default CommentBox;
|
JavaScript
|
๋ฐ์ดํฐ ๋ด์ฉ์ ๋ป์ ์ ์ ์๊ฒ comment๋ก ๋ณ๊ฒฝํ์ต๋๋ค!
|
@@ -0,0 +1,29 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
+import org.aopalliance.intercept.MethodInvocation;
+
+import java.lang.reflect.Method;
+import java.util.List;
+
+public class SecuredAuthorizationManager implements AuthorizationManager<MethodInvocation> {
+ private final AuthoritiesAuthorizationManager authoritiesAuthorizationManager = new AuthoritiesAuthorizationManager();
+
+ @Override
+ public AuthorizationDecision check(final Authentication authentication, final MethodInvocation invocation) {
+ Method method = invocation.getMethod();
+
+ if (method.isAnnotationPresent(Secured.class)) {
+ Secured secured = method.getAnnotation(Secured.class);
+
+ if (authentication == null) {
+ throw new AuthenticationException();
+ }
+
+ return authoritiesAuthorizationManager.check(authentication, List.of(secured.value()));
+ }
+
+ return new AuthorizationDecision(true);
+ }
+}
|
Java
|
method.getAnnotation(Secured.class)๋ฅผ ์ฌ์ฉํ์ฌ `@Secured` ์ด๋
ธํ
์ด์
์ ์กฐํํ๊ณ ์๋ค์.
Spring AOP ํ๊ฒฝ์์๋ ๋ฉ์๋๊ฐ ํ๋ก์ ๊ฐ์ฒด๋ก ๊ฐ์ธ์ง ์ ์๊ธฐ ๋๋ฌธ์, ํ๋ก์๋ ๋ฉ์๋๋ฅผ ์กฐํํ ๊ฒฝ์ฐ ์ค์ ๊ตฌํ์ฒด์ ๋ฉ์๋์์ ์ ์ธ๋ `@Secured` ์ด๋
ธํ
์ด์
์ ์ฐพ์ง ๋ชปํ ๊ฐ๋ฅ์ฑ์ด ์์ต๋๋ค.
method.getAnnotation ์ AopUtils.getMostSpecificMethod() ์ด๋ค ์ฐจ์ด๊ฐ ์์๊น์? ๐
|
@@ -23,7 +23,7 @@
@AutoConfigureMockMvc
class BasicAuthTest {
private final Member TEST_ADMIN_MEMBER = new Member("[email protected]", "password", "a", "", Set.of("ADMIN"));
- private final Member TEST_USER_MEMBER = new Member("[email protected]", "password", "b", "", Set.of());
+ private final Member TEST_USER_MEMBER = new Member("[email protected]", "password", "b", "", Set.of(""));
@Autowired
private MockMvc mockMvc;
@@ -37,6 +37,33 @@ void setUp() {
memberRepository.save(TEST_USER_MEMBER);
}
+ @DisplayName("์ธ์ฆ๋ ์ฌ์ฉ์๋ ์์ ์ ์ ๋ณด๋ฅผ ์กฐํํ ์ ์๋ค.")
+ @Test
+ void request_success_members_me() throws Exception {
+ String token = Base64.getEncoder().encodeToString((TEST_USER_MEMBER.getEmail() + ":" + TEST_USER_MEMBER.getPassword()).getBytes());
+
+ ResultActions response = mockMvc.perform(get("/members/me")
+ .header("Authorization", "Basic " + token)
+ .contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE)
+ );
+
+ response.andExpect(status().isOk())
+ .andExpect(MockMvcResultMatchers.jsonPath("$.email").value(TEST_USER_MEMBER.getEmail()));
+ }
+
+ @DisplayName("์ธ์ฆ๋์ง ์์ ์ฌ์ฉ์๋ ์์ ์ ์ ๋ณด๋ฅผ ์กฐํํ ์ ์๋ค.")
+ @Test
+ void request_fail_members_me() throws Exception {
+ String token = Base64.getEncoder().encodeToString(("none" + ":" + "none").getBytes());
+
+ ResultActions response = mockMvc.perform(get("/members/me")
+ .header("Authorization", "Basic " + token)
+ .contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE)
+ );
+
+ response.andExpect(status().isUnauthorized());
+ }
+
@DisplayName("ADMIN ๊ถํ์ ๊ฐ์ง ์ฌ์ฉ์๊ฐ ์์ฒญํ ๊ฒฝ์ฐ ๋ชจ๋ ํ์ ์ ๋ณด๋ฅผ ์กฐํํ ์ ์๋ค.")
@Test
void request_success_with_admin_user() throws Exception {
@@ -64,6 +91,20 @@ void request_fail_with_general_user() throws Exception {
response.andExpect(status().isForbidden());
}
+ @DisplayName("ํ์ฉ๋ URI์ด ์๋๊ฒฝ์ฐ ์์ฒญ์ด ์คํจ ํ๋ค.")
+ @Test
+ void request_fail_invalid_uri() throws Exception {
+ String token = Base64.getEncoder().encodeToString((TEST_USER_MEMBER.getEmail() + ":" + TEST_USER_MEMBER.getPassword()).getBytes());
+
+ ResultActions response = mockMvc.perform(get("/invalid-uri")
+ .header("Authorization", "Basic " + token)
+ .contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE)
+ );
+
+ response.andExpect(status().isForbidden());
+ }
+
+
@DisplayName("์ฌ์ฉ์ ์ ๋ณด๊ฐ ์๋ ๊ฒฝ์ฐ ์์ฒญ์ด ์คํจํด์ผ ํ๋ค.")
@Test
void request_fail_with_no_user() throws Exception {
|
Java
|
ํ
์คํธ ์ฝ๋ ๐
|
@@ -0,0 +1,29 @@
+package nextstep.security.authorization;
+
+import nextstep.security.authentication.Authentication;
+import nextstep.security.authentication.AuthenticationException;
+import org.aopalliance.intercept.MethodInvocation;
+
+import java.lang.reflect.Method;
+import java.util.List;
+
+public class SecuredAuthorizationManager implements AuthorizationManager<MethodInvocation> {
+ private final AuthoritiesAuthorizationManager authoritiesAuthorizationManager = new AuthoritiesAuthorizationManager();
+
+ @Override
+ public AuthorizationDecision check(final Authentication authentication, final MethodInvocation invocation) {
+ Method method = invocation.getMethod();
+
+ if (method.isAnnotationPresent(Secured.class)) {
+ Secured secured = method.getAnnotation(Secured.class);
+
+ if (authentication == null) {
+ throw new AuthenticationException();
+ }
+
+ return authoritiesAuthorizationManager.check(authentication, List.of(secured.value()));
+ }
+
+ return new AuthorizationDecision(true);
+ }
+}
|
Java
|
AopUtils.getMostSpecificMethod()๋ฅผ ์ฌ์ฉํ๋ฉด ํ๋ก์ ๊ฐ์ฒด๋ ์๋๋ ์ค์ ๊ฐ์ฒด์ ๋ฉ์๋๋ฅผ ์กฐํํ์ฌ @Secured ์ด๋
ธํ
์ด์
์ ๋ชป์ฐพ๋ ๊ฒฝ์ฐ๊ฐ ๋ฐ์ํ์ง ์๊ฒ ๋ค์!
๊ฐ์ฌํฉ๋๋ค :)
|
@@ -0,0 +1,83 @@
+@import '../../../../../Styles/common.scss';
+
+.navYeseul {
+ position: fixed;
+ top: 0;
+ left: 50%;
+ right: 0;
+ transform: translateX(-50%);
+ padding: 8px 0;
+ border-bottom: 1px solid $main-border;
+ background-color: #fff;
+ z-index: 9999;
+
+ .inner-nav {
+ display: flex;
+ justify-content: space-between;
+ align-items: center;
+ margin: 0 auto;
+ padding: 0 20px;
+ width: 100%;
+ max-width: 975px;
+ box-sizing: border-box;
+
+ h1 {
+ display: flex;
+ align-items: center;
+ margin: 0;
+ font-size: 28px;
+ color: $main-font;
+
+ button {
+ margin-right: 15px;
+ padding: 0 14px 0 0;
+ width: 22px;
+ height: 22px;
+ box-sizing: content-box;
+ border-right: 2px solid $main-font;
+
+ img {
+ margin: 0;
+ }
+ }
+ }
+
+ .nav__search {
+ display: flex;
+ align-items: center;
+ padding: 3px 10px 3px 26px;
+ width: 215px;
+ min-width: 125px;
+ height: 28px;
+ box-sizing: border-box;
+ border: 1px solid $main-border;
+ border-radius: 3px;
+ background-color: $bg-light-grey;
+
+ input {
+ height: 100%;
+ background-color: transparent;
+
+ &::placeholder {
+ text-align: center;
+ }
+ }
+ }
+
+ .nav__menu {
+ display: flex;
+
+ li {
+ margin-left: 22px;
+ width: 22px;
+ height: 22px;
+
+ .like-button {
+ padding: 0;
+ width: 22px;
+ height: 22px;
+ }
+ }
+ }
+ }
+}
|
Unknown
|
css ์์ฑ ์์์ ๋ฐ๋ฅด๋ฉด z-index๊ฐ ๊ฐ์ฅ ์๋์ ์์ผ ํ ๊ฒ ๊ฐ์์ ๐
|
@@ -0,0 +1,83 @@
+@import '../../../../../Styles/common.scss';
+
+.navYeseul {
+ position: fixed;
+ top: 0;
+ left: 50%;
+ right: 0;
+ transform: translateX(-50%);
+ padding: 8px 0;
+ border-bottom: 1px solid $main-border;
+ background-color: #fff;
+ z-index: 9999;
+
+ .inner-nav {
+ display: flex;
+ justify-content: space-between;
+ align-items: center;
+ margin: 0 auto;
+ padding: 0 20px;
+ width: 100%;
+ max-width: 975px;
+ box-sizing: border-box;
+
+ h1 {
+ display: flex;
+ align-items: center;
+ margin: 0;
+ font-size: 28px;
+ color: $main-font;
+
+ button {
+ margin-right: 15px;
+ padding: 0 14px 0 0;
+ width: 22px;
+ height: 22px;
+ box-sizing: content-box;
+ border-right: 2px solid $main-font;
+
+ img {
+ margin: 0;
+ }
+ }
+ }
+
+ .nav__search {
+ display: flex;
+ align-items: center;
+ padding: 3px 10px 3px 26px;
+ width: 215px;
+ min-width: 125px;
+ height: 28px;
+ box-sizing: border-box;
+ border: 1px solid $main-border;
+ border-radius: 3px;
+ background-color: $bg-light-grey;
+
+ input {
+ height: 100%;
+ background-color: transparent;
+
+ &::placeholder {
+ text-align: center;
+ }
+ }
+ }
+
+ .nav__menu {
+ display: flex;
+
+ li {
+ margin-left: 22px;
+ width: 22px;
+ height: 22px;
+
+ .like-button {
+ padding: 0;
+ width: 22px;
+ height: 22px;
+ }
+ }
+ }
+ }
+}
|
Unknown
|
common css์ ์์ด์ ๋นผ์
๋ ๋ ๊ฒ ๊ฐ์์!
|
@@ -0,0 +1,125 @@
+import React, { Component } from 'react';
+import { withRouter } from 'react-router-dom';
+import { API } from '../../../config';
+import './Login.scss';
+
+class LoginYeseul extends Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ inputId: '',
+ inputPw: '',
+ loginMode: true,
+ };
+ }
+
+ handleInput = e => {
+ const { name, value } = e.target;
+ this.setState({ [name]: value });
+ };
+
+ convertMode = () => {
+ this.setState({
+ loginMode: !this.state.loginMode,
+ });
+ };
+
+ signIn = e => {
+ const { inputId, inputPw } = this.state;
+ e.preventDefault();
+ fetch(API.SIGN_IN, {
+ method: 'POST',
+ body: JSON.stringify({
+ email: inputId,
+ password: inputPw,
+ }),
+ })
+ .then(users => users.json())
+ .then(users => {
+ if (users.MESSAGE === 'SUCCESS') {
+ this.setState({
+ inputId: '',
+ inputPw: '',
+ });
+ localStorage.setItem('token', users.ACCESS_TOKEN);
+ this.props.history.push('/main-yeseul');
+ } else if (users.MESSAGE === 'INVALID_USER') {
+ const wantToSignUp = window.confirm(
+ '์๋ชป๋ ์ ๋ณด์
๋๋ค. ํ์๊ฐ์
ํ์๊ฒ ์ต๋๊น?'
+ );
+ wantToSignUp && this.convertMode();
+ }
+ });
+ };
+
+ signUp = e => {
+ const { inputId, inputPw } = this.state;
+ e.preventDefault();
+ fetch(API.SIGN_UP, {
+ method: 'POST',
+ body: JSON.stringify({
+ email: inputId,
+ password: inputPw,
+ }),
+ })
+ .then(users => users.json())
+ .then(users => {
+ if (users.MESSAGE === 'SUCCESS') {
+ this.setState({
+ inputId: '',
+ inputPw: '',
+ });
+ alert(`ํ์๊ฐ์
๋์์ต๋๋ค!๐ ๋ก๊ทธ์ธํด์ฃผ์ธ์`);
+ this.convertMode();
+ } else {
+ alert(users.MESSAGE);
+ }
+ });
+ };
+
+ render() {
+ const { inputId, inputPw, loginMode } = this.state;
+ const checkId = /^\w[\w\-.]*@\w+\.\w{2,}/;
+
+ return (
+ <main className="loginYeseul give-border">
+ <h1 className="logo">westagram</h1>
+ <form
+ className="login-form"
+ onSubmit={loginMode ? this.signIn : this.signUp}
+ >
+ <div className="login-form__input-box">
+ <input
+ type="text"
+ name="inputId"
+ placeholder="์ ํ๋ฒํธ, ์ฌ์ฉ์ ์ด๋ฆ ๋๋ ์ด๋ฉ์ผ"
+ value={inputId}
+ onChange={this.handleInput}
+ />
+ <input
+ type="password"
+ name="inputPw"
+ placeholder="๋น๋ฐ๋ฒํธ"
+ value={inputPw}
+ onChange={this.handleInput}
+ />
+ </div>
+ <button
+ type="submit"
+ disabled={!(checkId.test(inputId) && inputPw.length > 8)}
+ >
+ {loginMode ? '๋ก๊ทธ์ธ' : 'ํ์๊ฐ์
'}
+ </button>
+ </form>
+ <a
+ href="https://www.instagram.com/accounts/password/reset/"
+ className="find-pw"
+ >
+ ๋น๋ฐ๋ฒํธ๋ฅผ ์์ผ์
จ๋์?
+ </a>
+ </main>
+ );
+ }
+}
+
+export default withRouter(LoginYeseul);
|
JavaScript
|
๋ํ
์ผ....๐๐
|
@@ -0,0 +1,140 @@
+import React, { Component } from 'react';
+import { Link } from 'react-router-dom';
+import User from '../User/User';
+import Comment from '../Comment/Comment';
+import IconButton from '../Button/IconButton';
+import { API } from '../../../../../config';
+import './Feed.scss';
+
+class Feed extends Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ inputComment: '',
+ commentId: 0,
+ comments: [],
+ };
+ }
+
+ componentDidMount() {
+ const { feedId } = this.props;
+ fetch(API.COMMENT)
+ .then(comments => comments.json())
+ .then(comments => {
+ this.setState({
+ commentId: comments.length + 1,
+ comments: comments.filter(comment => comment.feedId === feedId),
+ });
+ });
+ }
+
+ handleInput = e => {
+ this.setState({ inputComment: e.target.value });
+ };
+
+ addComment = e => {
+ const { inputComment, commentId, comments } = this.state;
+
+ e.preventDefault();
+ this.setState({
+ inputComment: '',
+ commentId: commentId + 1,
+ comments: [
+ ...comments,
+ {
+ id: commentId.toString(),
+ writer: this.props.userName,
+ content: inputComment,
+ tagId: '',
+ },
+ ],
+ });
+ };
+
+ deleteComment = clickedId => {
+ const { comments } = this.state;
+ this.setState({
+ comments: comments.filter(comment => comment.id !== clickedId),
+ });
+ };
+
+ render() {
+ const { inputComment, comments } = this.state;
+ const { writer, contents } = this.props;
+
+ return (
+ <article className="feed give-border">
+ <header className="feed__header">
+ <User size="small" user={writer}>
+ <IconButton
+ className="feed__header__more-icon align-right"
+ info={{ name: '๋๋ณด๊ธฐ', fileName: 'more.svg' }}
+ />
+ </User>
+ </header>
+ <div className="feed__image">
+ <img
+ alt={`by ${writer.name} on ${contents.date}`}
+ src={contents.postedImage}
+ />
+ </div>
+ <div className="feed__btns">
+ <button type="button">
+ <img
+ alt="์ข์์"
+ src="https://s3.ap-northeast-2.amazonaws.com/cdn.wecode.co.kr/bearu/heart.png"
+ />
+ </button>
+ <IconButton info={{ name: '๋๊ธ', fileName: 'comment.svg' }} />
+ <IconButton info={{ name: '๊ณต์ ํ๊ธฐ', fileName: 'send.svg' }} />
+ <IconButton
+ className="align-right"
+ info={{ name: '๋ถ๋งํฌ', fileName: 'bookmark.svg' }}
+ />
+ </div>
+ <p className="feed__likes-number">
+ <Link to="/main-yeseul">{`์ข์์ ${contents.likesNum}๊ฐ`}</Link>
+ </p>
+ <div className="feed__description">
+ <p>
+ <span className="user-name">{writer.name}</span>
+ <span>{contents.description}</span>
+ </p>
+ </div>
+ <div className="feed__comments">
+ {comments.map(comment => (
+ <Comment
+ key={comment.id}
+ info={comment}
+ handleClick={this.deleteComment}
+ />
+ ))}
+ </div>
+ <form
+ className="feed__form align-item-center space-between"
+ name="commentForm"
+ >
+ <IconButton info={{ name: '์ด๋ชจํฐ์ฝ', fileName: 'emoticon.svg' }} />
+ <input
+ type="text"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ value={inputComment}
+ className="feed__input-comment"
+ name="inputComment"
+ onChange={this.handleInput}
+ />
+ <input
+ type="submit"
+ className="feed__submit-comment"
+ name="submitComment"
+ value="๊ฒ์"
+ disabled={!(inputComment.length > 0)}
+ onClick={this.addComment}
+ />
+ </form>
+ </article>
+ );
+ }
+}
+
+export default Feed;
|
JavaScript
|
์คํ ์์ฌ๋์ filter๋ก ๊ตฌํํ์
จ๋ค์ฌ! :)
|
@@ -0,0 +1,140 @@
+import React, { Component } from 'react';
+import { Link } from 'react-router-dom';
+import User from '../User/User';
+import Comment from '../Comment/Comment';
+import IconButton from '../Button/IconButton';
+import { API } from '../../../../../config';
+import './Feed.scss';
+
+class Feed extends Component {
+ constructor(props) {
+ super(props);
+ this.state = {
+ inputComment: '',
+ commentId: 0,
+ comments: [],
+ };
+ }
+
+ componentDidMount() {
+ const { feedId } = this.props;
+ fetch(API.COMMENT)
+ .then(comments => comments.json())
+ .then(comments => {
+ this.setState({
+ commentId: comments.length + 1,
+ comments: comments.filter(comment => comment.feedId === feedId),
+ });
+ });
+ }
+
+ handleInput = e => {
+ this.setState({ inputComment: e.target.value });
+ };
+
+ addComment = e => {
+ const { inputComment, commentId, comments } = this.state;
+
+ e.preventDefault();
+ this.setState({
+ inputComment: '',
+ commentId: commentId + 1,
+ comments: [
+ ...comments,
+ {
+ id: commentId.toString(),
+ writer: this.props.userName,
+ content: inputComment,
+ tagId: '',
+ },
+ ],
+ });
+ };
+
+ deleteComment = clickedId => {
+ const { comments } = this.state;
+ this.setState({
+ comments: comments.filter(comment => comment.id !== clickedId),
+ });
+ };
+
+ render() {
+ const { inputComment, comments } = this.state;
+ const { writer, contents } = this.props;
+
+ return (
+ <article className="feed give-border">
+ <header className="feed__header">
+ <User size="small" user={writer}>
+ <IconButton
+ className="feed__header__more-icon align-right"
+ info={{ name: '๋๋ณด๊ธฐ', fileName: 'more.svg' }}
+ />
+ </User>
+ </header>
+ <div className="feed__image">
+ <img
+ alt={`by ${writer.name} on ${contents.date}`}
+ src={contents.postedImage}
+ />
+ </div>
+ <div className="feed__btns">
+ <button type="button">
+ <img
+ alt="์ข์์"
+ src="https://s3.ap-northeast-2.amazonaws.com/cdn.wecode.co.kr/bearu/heart.png"
+ />
+ </button>
+ <IconButton info={{ name: '๋๊ธ', fileName: 'comment.svg' }} />
+ <IconButton info={{ name: '๊ณต์ ํ๊ธฐ', fileName: 'send.svg' }} />
+ <IconButton
+ className="align-right"
+ info={{ name: '๋ถ๋งํฌ', fileName: 'bookmark.svg' }}
+ />
+ </div>
+ <p className="feed__likes-number">
+ <Link to="/main-yeseul">{`์ข์์ ${contents.likesNum}๊ฐ`}</Link>
+ </p>
+ <div className="feed__description">
+ <p>
+ <span className="user-name">{writer.name}</span>
+ <span>{contents.description}</span>
+ </p>
+ </div>
+ <div className="feed__comments">
+ {comments.map(comment => (
+ <Comment
+ key={comment.id}
+ info={comment}
+ handleClick={this.deleteComment}
+ />
+ ))}
+ </div>
+ <form
+ className="feed__form align-item-center space-between"
+ name="commentForm"
+ >
+ <IconButton info={{ name: '์ด๋ชจํฐ์ฝ', fileName: 'emoticon.svg' }} />
+ <input
+ type="text"
+ placeholder="๋๊ธ ๋ฌ๊ธฐ..."
+ value={inputComment}
+ className="feed__input-comment"
+ name="inputComment"
+ onChange={this.handleInput}
+ />
+ <input
+ type="submit"
+ className="feed__submit-comment"
+ name="submitComment"
+ value="๊ฒ์"
+ disabled={!(inputComment.length > 0)}
+ onClick={this.addComment}
+ />
+ </form>
+ </article>
+ );
+ }
+}
+
+export default Feed;
|
JavaScript
|
id๊ฐ์ผ๋ก key props ํ ๋น ๐ ๐ฏ ๐ฅ
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.