validators.py 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. import json
  2. import re
  3. from importlib import import_module
  4. import requests
  5. from django.contrib.auth import get_user_model
  6. from django.core.exceptions import ValidationError
  7. from django.core.validators import validate_email as validate_email_content
  8. from django.utils.encoding import force_str
  9. from django.utils.translation import ugettext_lazy as _
  10. from django.utils.translation import ungettext
  11. from misago.conf import settings
  12. from .bans import get_email_ban, get_username_ban
  13. USERNAME_RE = re.compile(r'^[0-9a-z]+$', re.IGNORECASE)
  14. """
  15. Email validators
  16. """
  17. def validate_email_available(value, exclude=None):
  18. User = get_user_model()
  19. try:
  20. user = User.objects.get_by_email(value)
  21. if not exclude or user.pk != exclude.pk:
  22. raise ValidationError(_("This e-mail address is not available."))
  23. except User.DoesNotExist:
  24. pass
  25. def validate_email_banned(value):
  26. ban = get_email_ban(value)
  27. if ban:
  28. if ban.user_message:
  29. raise ValidationError(ban.user_message)
  30. else:
  31. raise ValidationError(_("This e-mail address is not allowed."))
  32. def validate_email(value, exclude=None):
  33. """shortcut function that does complete validation of email"""
  34. validate_email_content(value)
  35. validate_email_available(value, exclude)
  36. validate_email_banned(value)
  37. """
  38. Password validators
  39. """
  40. def validate_password(value):
  41. from misago.core.deprecations import warn
  42. warn("misago.users.validators.validate_password has been deprecated!")
  43. """
  44. Username validators
  45. """
  46. def validate_username_available(value, exclude=None):
  47. User = get_user_model()
  48. try:
  49. user = User.objects.get_by_username(value)
  50. if not exclude or user.pk != exclude.pk:
  51. raise ValidationError(_("This username is not available."))
  52. except User.DoesNotExist:
  53. pass
  54. def validate_username_banned(value):
  55. ban = get_username_ban(value)
  56. if ban:
  57. if ban.user_message:
  58. raise ValidationError(ban.user_message)
  59. else:
  60. raise ValidationError(_("This username is not allowed."))
  61. def validate_username_content(value):
  62. if not USERNAME_RE.match(value):
  63. raise ValidationError(
  64. _("Username can only contain latin alphabet letters and digits."))
  65. def validate_username_length(value):
  66. if len(value) < settings.username_length_min:
  67. message = ungettext(
  68. "Username must be at least %(limit_value)s character long.",
  69. "Username must be at least %(limit_value)s characters long.",
  70. settings.username_length_min)
  71. message = message % {'limit_value': settings.username_length_min}
  72. raise ValidationError(message)
  73. if len(value) > settings.username_length_max:
  74. message = ungettext(
  75. "Username cannot be longer than %(limit_value)s characters.",
  76. "Username cannot be longer than %(limit_value)s characters.",
  77. settings.username_length_max)
  78. message = message % {'limit_value': settings.username_length_max}
  79. raise ValidationError(message)
  80. def validate_username(value, exclude=None):
  81. """shortcut function that does complete validation of username"""
  82. validate_username_length(value)
  83. validate_username_content(value)
  84. validate_username_available(value, exclude)
  85. validate_username_banned(value)
  86. """
  87. New account validators
  88. """
  89. SFS_API_URL = u'http://api.stopforumspam.org/api?email=%(email)s&ip=%(ip)s&f=json&confidence' # noqa
  90. def validate_with_sfs(request, form, cleaned_data):
  91. if settings.MISAGO_USE_STOP_FORUM_SPAM and cleaned_data.get('email'):
  92. _real_validate_with_sfs(request.user_ip, cleaned_data['email'])
  93. def _real_validate_with_sfs(ip, email):
  94. try:
  95. r = requests.get(SFS_API_URL % {
  96. 'email': email,
  97. 'ip': ip
  98. }, timeout=5)
  99. r.raise_for_status()
  100. api_response = json.loads(force_str(r.content))
  101. ip_score = api_response.get('ip', {}).get('confidence', 0)
  102. email_score = api_response.get('email', {}).get('confidence', 0)
  103. api_score = max((ip_score, email_score))
  104. if api_score > settings.MISAGO_STOP_FORUM_SPAM_MIN_CONFIDENCE:
  105. raise ValidationError(_("Data entered was found in spammers database."))
  106. except requests.exceptions.RequestException:
  107. pass # todo: log those somewhere
  108. def validate_gmail_email(request, form, cleaned_data):
  109. email = cleaned_data.get('email', '')
  110. if '@' not in email:
  111. return
  112. username, domain = email.lower().split('@')
  113. if domain == 'gmail.com' and username.count('.') > 5:
  114. form.add_error('email', ValidationError(_("This email is not allowed.")))
  115. """
  116. Registration validation
  117. """
  118. def load_registration_validators(validators_list):
  119. loaded_validators = []
  120. for path in validators_list:
  121. module = import_module('.'.join(path.split('.')[:-1]))
  122. loaded_validators.append(getattr(module, path.split('.')[-1]))
  123. return loaded_validators
  124. validators_list = settings.MISAGO_NEW_REGISTRATIONS_VALIDATORS
  125. REGISTRATION_VALIDATORS = load_registration_validators(validators_list)
  126. def validate_new_registration(request, form, cleaned_data, validators=None):
  127. validators = validators or REGISTRATION_VALIDATORS
  128. for validator in validators:
  129. validator(request, form, cleaned_data)