auth.py 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. from rest_framework.decorators import api_view, permission_classes
  2. from rest_framework.response import Response
  3. from django.contrib import auth
  4. from django.contrib.auth.password_validation import validate_password
  5. from django.core.exceptions import ValidationError
  6. from django.utils.translation import ugettext as _
  7. from django.views.decorators.csrf import csrf_protect
  8. from misago.conf import settings
  9. from misago.core.decorators import require_dict_data
  10. from misago.core.mail import mail_user
  11. from misago.users.bans import get_user_ban
  12. from misago.users.forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  13. from misago.users.serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  14. from misago.users.tokens import (
  15. is_password_change_token_valid, make_activation_token, make_password_change_token)
  16. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  17. UserModel = auth.get_user_model()
  18. def gateway(request):
  19. if request.method == 'POST':
  20. return login(request)
  21. else:
  22. return session_user(request)
  23. @api_view(['POST'])
  24. @permission_classes((UnbannedAnonOnly, ))
  25. @csrf_protect
  26. @require_dict_data
  27. def login(request):
  28. """
  29. POST /auth/ with CSRF, username and password
  30. will attempt to authenticate new user
  31. """
  32. form = AuthenticationForm(request, data=request.data)
  33. if form.is_valid():
  34. auth.login(request, form.user_cache)
  35. return Response(
  36. AuthenticatedUserSerializer(form.user_cache).data,
  37. )
  38. else:
  39. return Response(form.get_errors_dict(), status=400)
  40. @api_view()
  41. def session_user(request):
  42. """GET /auth/ will return current auth user, either User or AnonymousUser"""
  43. if request.user.is_authenticated:
  44. UserSerializer = AuthenticatedUserSerializer
  45. else:
  46. UserSerializer = AnonymousUserSerializer
  47. return Response(UserSerializer(request.user).data)
  48. @api_view(['GET'])
  49. def get_criteria(request):
  50. """GET /auth/criteria/ will return password and username criteria for accounts"""
  51. criteria = {
  52. 'username': {
  53. 'min_length': settings.username_length_min,
  54. 'max_length': settings.username_length_max,
  55. },
  56. 'password': [],
  57. }
  58. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  59. validator_dict = {'name': validator['NAME'].split('.')[-1]}
  60. validator_dict.update(validator.get('OPTIONS', {}))
  61. criteria['password'].append(validator_dict)
  62. return Response(criteria)
  63. @api_view(['POST'])
  64. @permission_classes((UnbannedAnonOnly, ))
  65. @csrf_protect
  66. @require_dict_data
  67. def send_activation(request):
  68. """
  69. POST /auth/send-activation/ with CSRF token and email
  70. will mail account activation link to requester
  71. """
  72. form = ResendActivationForm(request.data)
  73. if form.is_valid():
  74. requesting_user = form.user_cache
  75. mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
  76. 'user': requesting_user.username,
  77. 'forum_name': settings.forum_name,
  78. }
  79. mail_user(
  80. request,
  81. requesting_user,
  82. mail_subject,
  83. 'misago/emails/activation/by_user',
  84. {
  85. 'activation_token': make_activation_token(requesting_user),
  86. },
  87. )
  88. return Response({
  89. 'username': form.user_cache.username,
  90. 'email': form.user_cache.email,
  91. })
  92. else:
  93. return Response(
  94. form.get_errors_dict(),
  95. status=400,
  96. )
  97. @api_view(['POST'])
  98. @permission_classes((UnbannedOnly, ))
  99. @csrf_protect
  100. @require_dict_data
  101. def send_password_form(request):
  102. """
  103. POST /auth/send-password-form/ with CSRF token and email
  104. will mail change password form link to requester
  105. """
  106. form = ResetPasswordForm(request.data)
  107. if form.is_valid():
  108. requesting_user = form.user_cache
  109. mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
  110. 'user': requesting_user.username,
  111. 'forum_name': settings.forum_name,
  112. }
  113. confirmation_token = make_password_change_token(requesting_user)
  114. mail_user(
  115. request,
  116. requesting_user,
  117. mail_subject,
  118. 'misago/emails/change_password_form_link',
  119. {
  120. 'confirmation_token': confirmation_token,
  121. },
  122. )
  123. return Response({
  124. 'username': form.user_cache.username,
  125. 'email': form.user_cache.email,
  126. })
  127. else:
  128. return Response(form.get_errors_dict(), status=400)
  129. class PasswordChangeFailed(Exception):
  130. pass
  131. @api_view(['POST'])
  132. @permission_classes((UnbannedOnly, ))
  133. @csrf_protect
  134. @require_dict_data
  135. def change_forgotten_password(request, pk, token):
  136. """
  137. POST /auth/change-password/user/token/ with CSRF and new password
  138. will change forgotten password
  139. """
  140. invalid_message = _("Form link is invalid. Please try again.")
  141. expired_message = _("Your link has expired. Please request new one.")
  142. try:
  143. try:
  144. user = UserModel.objects.get(pk=pk, is_active=True)
  145. except UserModel.DoesNotExist:
  146. raise PasswordChangeFailed(invalid_message)
  147. if request.user.is_authenticated and request.user.id != user.id:
  148. raise PasswordChangeFailed(invalid_message)
  149. if not is_password_change_token_valid(user, token):
  150. raise PasswordChangeFailed(invalid_message)
  151. if user.requires_activation:
  152. raise PasswordChangeFailed(expired_message)
  153. if get_user_ban(user):
  154. raise PasswordChangeFailed(expired_message)
  155. except PasswordChangeFailed as e:
  156. return Response({'detail': e.args}, status=400)
  157. new_password = request.data.get('password', '')
  158. validate_password(new_password, user=user)
  159. user.set_password(new_password)
  160. user.save()
  161. return Response({'username': user.username})