auth.py 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. from django.contrib import auth
  2. from django.contrib.auth.password_validation import validate_password
  3. from django.core.exceptions import ValidationError
  4. from django.utils.translation import ugettext as _
  5. from django.views.decorators.csrf import csrf_protect
  6. from rest_framework import status
  7. from rest_framework.decorators import api_view, permission_classes
  8. from rest_framework.response import Response
  9. from misago.conf import settings
  10. from misago.core.mail import mail_user
  11. from misago.users.bans import get_user_ban
  12. from misago.users.forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  13. from misago.users.serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  14. from misago.users.tokens import is_password_change_token_valid, make_activation_token, make_password_change_token
  15. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  16. UserModel = auth.get_user_model()
  17. def gateway(request):
  18. if request.method == 'POST':
  19. return login(request)
  20. else:
  21. return session_user(request)
  22. """
  23. POST /auth/ with CSRF, username and password
  24. will attempt to authenticate new user
  25. """
  26. @api_view(['POST'])
  27. @permission_classes((UnbannedAnonOnly,))
  28. @csrf_protect
  29. def login(request):
  30. form = AuthenticationForm(request, data=request.data)
  31. if form.is_valid():
  32. auth.login(request, form.user_cache)
  33. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  34. else:
  35. return Response(form.get_errors_dict(),
  36. status=status.HTTP_400_BAD_REQUEST)
  37. """
  38. GET /auth/ will return current auth user, either User or AnonymousUser
  39. """
  40. @api_view()
  41. def session_user(request):
  42. if request.user.is_authenticated:
  43. UserSerializer = AuthenticatedUserSerializer
  44. else:
  45. UserSerializer = AnonymousUserSerializer
  46. return Response(UserSerializer(request.user).data)
  47. """
  48. GET /auth/criteria/ will return password and username criteria for accounts
  49. """
  50. @api_view(['GET'])
  51. def get_criteria(request):
  52. criteria = {
  53. 'username': {
  54. 'min_length': settings.username_length_min,
  55. 'max_length': settings.username_length_max,
  56. },
  57. 'password': [],
  58. }
  59. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  60. validator_dict = {
  61. 'name': validator['NAME'].split('.')[-1]
  62. }
  63. validator_dict.update(validator.get('OPTIONS', {}))
  64. criteria['password'].append(validator_dict)
  65. return Response(criteria)
  66. """
  67. POST /auth/send-activation/ with CSRF token and email
  68. will mail account activation link to requester
  69. """
  70. @api_view(['POST'])
  71. @permission_classes((UnbannedAnonOnly,))
  72. @csrf_protect
  73. def send_activation(request):
  74. form = ResendActivationForm(request.data)
  75. if form.is_valid():
  76. requesting_user = form.user_cache
  77. mail_subject = _("Activate %(user)s account on %(forum_name)s forums")
  78. subject_formats = {
  79. 'user': requesting_user.username,
  80. 'forum_name': settings.forum_name,
  81. }
  82. mail_subject = mail_subject % subject_formats
  83. mail_user(request, requesting_user, mail_subject,
  84. 'misago/emails/activation/by_user',
  85. {'activation_token': make_activation_token(requesting_user)})
  86. return Response({
  87. 'username': form.user_cache.username,
  88. 'email': form.user_cache.email
  89. })
  90. else:
  91. return Response(form.get_errors_dict(),
  92. status=status.HTTP_400_BAD_REQUEST)
  93. """
  94. POST /auth/send-password-form/ with CSRF token and email
  95. will mail change password form link to requester
  96. """
  97. @api_view(['POST'])
  98. @permission_classes((UnbannedOnly,))
  99. @csrf_protect
  100. def send_password_form(request):
  101. form = ResetPasswordForm(request.data)
  102. if form.is_valid():
  103. requesting_user = form.user_cache
  104. mail_subject = _("Change %(user)s password on %(forum_name)s forums")
  105. subject_formats = {
  106. 'user': requesting_user.username,
  107. 'forum_name': settings.forum_name,
  108. }
  109. mail_subject = mail_subject % subject_formats
  110. confirmation_token = make_password_change_token(requesting_user)
  111. mail_user(request, requesting_user, mail_subject,
  112. 'misago/emails/change_password_form_link',
  113. {'confirmation_token': confirmation_token})
  114. return Response({
  115. 'username': form.user_cache.username,
  116. 'email': form.user_cache.email
  117. })
  118. else:
  119. return Response(form.get_errors_dict(),
  120. status=status.HTTP_400_BAD_REQUEST)
  121. """
  122. POST /auth/change-password/user/token/ with CSRF and new password
  123. will change forgotten password
  124. """
  125. class PasswordChangeFailed(Exception):
  126. pass
  127. @api_view(['POST'])
  128. @permission_classes((UnbannedOnly,))
  129. @csrf_protect
  130. def change_forgotten_password(request, pk, token):
  131. invalid_message = _("Form link is invalid. Please try again.")
  132. expired_message = _("Your link has expired. Please request new one.")
  133. try:
  134. try:
  135. user = UserModel.objects.get(pk=pk, is_active=True)
  136. except UserModel.DoesNotExist:
  137. raise PasswordChangeFailed(invalid_message)
  138. if request.user.is_authenticated and request.user.id != user.id:
  139. raise PasswordChangeFailed(invalid_message)
  140. if not is_password_change_token_valid(user, token):
  141. raise PasswordChangeFailed(invalid_message)
  142. if user.requires_activation:
  143. raise PasswordChangeFailed(expired_message)
  144. if get_user_ban(user):
  145. raise PasswordChangeFailed(expired_message)
  146. except PasswordChangeFailed as e:
  147. return Response({
  148. 'detail': e.args[0]
  149. }, status=status.HTTP_400_BAD_REQUEST)
  150. try:
  151. new_password = request.data.get('password', '').strip()
  152. validate_password(new_password, user=user)
  153. user.set_password(new_password)
  154. user.save()
  155. except ValidationError as e:
  156. return Response({
  157. 'detail': e.messages[0]
  158. }, status=status.HTTP_400_BAD_REQUEST)
  159. return Response({
  160. 'username': user.username
  161. })