auth.py 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. from rest_framework import status
  2. from rest_framework.decorators import api_view, permission_classes
  3. from rest_framework.response import Response
  4. from django.contrib import auth
  5. from django.contrib.auth.password_validation import validate_password
  6. from django.core.exceptions import ValidationError
  7. from django.utils.translation import gettext as _
  8. from django.views.decorators.csrf import csrf_protect
  9. from misago.conf import settings
  10. from misago.core.decorators import require_dict_data
  11. from misago.core.mail import mail_user
  12. from misago.users.bans import get_user_ban
  13. from misago.users.forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  14. from misago.users.serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  15. from misago.users.tokens import (
  16. is_password_change_token_valid, make_activation_token, make_password_change_token)
  17. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  18. UserModel = auth.get_user_model()
  19. def gateway(request):
  20. if request.method == 'POST':
  21. return login(request)
  22. else:
  23. return session_user(request)
  24. @api_view(['POST'])
  25. @permission_classes((UnbannedAnonOnly, ))
  26. @csrf_protect
  27. @require_dict_data
  28. def login(request):
  29. """
  30. POST /auth/ with CSRF, username and password
  31. will attempt to authenticate new user
  32. """
  33. form = AuthenticationForm(request, data=request.data)
  34. if form.is_valid():
  35. auth.login(request, form.user_cache)
  36. return Response(
  37. AuthenticatedUserSerializer(form.user_cache).data,
  38. )
  39. else:
  40. return Response(
  41. form.get_errors_dict(),
  42. status=status.HTTP_400_BAD_REQUEST,
  43. )
  44. @api_view()
  45. def session_user(request):
  46. """GET /auth/ will return current auth user, either User or AnonymousUser"""
  47. if request.user.is_authenticated:
  48. serializer = AuthenticatedUserSerializer
  49. else:
  50. serializer = AnonymousUserSerializer
  51. serialized_user = serializer(request.user, context={"acl": request.user_acl}).data
  52. return Response(serialized_user)
  53. @api_view(['GET'])
  54. def get_criteria(request):
  55. """GET /auth/criteria/ will return password and username criteria for accounts"""
  56. criteria = {
  57. 'username': {
  58. 'min_length': settings.username_length_min,
  59. 'max_length': settings.username_length_max,
  60. },
  61. 'password': [],
  62. }
  63. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  64. validator_dict = {'name': validator['NAME'].split('.')[-1]}
  65. validator_dict.update(validator.get('OPTIONS', {}))
  66. criteria['password'].append(validator_dict)
  67. return Response(criteria)
  68. @api_view(['POST'])
  69. @permission_classes((UnbannedAnonOnly, ))
  70. @csrf_protect
  71. @require_dict_data
  72. def send_activation(request):
  73. """
  74. POST /auth/send-activation/ with CSRF token and email
  75. will mail account activation link to requester
  76. """
  77. form = ResendActivationForm(request.data)
  78. if form.is_valid():
  79. requesting_user = form.user_cache
  80. mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
  81. 'user': requesting_user.username,
  82. 'forum_name': settings.forum_name,
  83. }
  84. mail_user(
  85. requesting_user,
  86. mail_subject,
  87. 'misago/emails/activation/by_user',
  88. context={
  89. "activation_token": make_activation_token(requesting_user),
  90. "settings": request.settings,
  91. },
  92. )
  93. return Response({
  94. 'username': form.user_cache.username,
  95. 'email': form.user_cache.email,
  96. })
  97. else:
  98. return Response(
  99. form.get_errors_dict(),
  100. status=status.HTTP_400_BAD_REQUEST,
  101. )
  102. @api_view(['POST'])
  103. @permission_classes((UnbannedOnly, ))
  104. @csrf_protect
  105. @require_dict_data
  106. def send_password_form(request):
  107. """
  108. POST /auth/send-password-form/ with CSRF token and email
  109. will mail change password form link to requester
  110. """
  111. form = ResetPasswordForm(request.data)
  112. if form.is_valid():
  113. requesting_user = form.user_cache
  114. mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
  115. 'user': requesting_user.username,
  116. 'forum_name': settings.forum_name,
  117. }
  118. confirmation_token = make_password_change_token(requesting_user)
  119. mail_user(
  120. requesting_user,
  121. mail_subject,
  122. 'misago/emails/change_password_form_link',
  123. context={
  124. "confirmation_token": confirmation_token,
  125. "settings": request.settings,
  126. },
  127. )
  128. return Response({
  129. 'username': form.user_cache.username,
  130. 'email': form.user_cache.email,
  131. })
  132. else:
  133. return Response(
  134. form.get_errors_dict(),
  135. status=status.HTTP_400_BAD_REQUEST,
  136. )
  137. class PasswordChangeFailed(Exception):
  138. pass
  139. @api_view(['POST'])
  140. @permission_classes((UnbannedOnly, ))
  141. @csrf_protect
  142. @require_dict_data
  143. def change_forgotten_password(request, pk, token):
  144. """
  145. POST /auth/change-password/user/token/ with CSRF and new password
  146. will change forgotten password
  147. """
  148. invalid_message = _("Form link is invalid. Please try again.")
  149. expired_message = _("Your link has expired. Please request new one.")
  150. try:
  151. try:
  152. user = UserModel.objects.get(pk=pk, is_active=True)
  153. except UserModel.DoesNotExist:
  154. raise PasswordChangeFailed(invalid_message)
  155. if request.user.is_authenticated and request.user.id != user.id:
  156. raise PasswordChangeFailed(invalid_message)
  157. if not is_password_change_token_valid(user, token):
  158. raise PasswordChangeFailed(invalid_message)
  159. if user.requires_activation:
  160. raise PasswordChangeFailed(expired_message)
  161. if get_user_ban(user, request.cache_versions):
  162. raise PasswordChangeFailed(expired_message)
  163. except PasswordChangeFailed as e:
  164. return Response(
  165. {
  166. 'detail': e.args[0],
  167. },
  168. status=status.HTTP_400_BAD_REQUEST,
  169. )
  170. try:
  171. new_password = request.data.get('password', '')
  172. validate_password(new_password, user=user)
  173. user.set_password(new_password)
  174. user.save()
  175. except ValidationError as e:
  176. return Response(
  177. {
  178. 'detail': e.messages[0],
  179. },
  180. status=status.HTTP_400_BAD_REQUEST,
  181. )
  182. return Response({'username': user.username})