123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216 |
- from functools import wraps
- from django.contrib import auth
- from django.contrib.auth.password_validation import validate_password
- from django.core.exceptions import PermissionDenied, ValidationError
- from django.utils.translation import gettext as _
- from django.views.decorators.csrf import csrf_protect
- from rest_framework import status
- from rest_framework.decorators import api_view, permission_classes
- from rest_framework.response import Response
- from ...conf import settings
- from ...core.decorators import require_dict_data
- from ...core.mail import mail_user
- from ..bans import get_user_ban
- from ..forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
- from ..serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
- from ..tokens import (
- is_password_change_token_valid,
- make_activation_token,
- make_password_change_token,
- )
- from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
- User = auth.get_user_model()
- def gateway(request):
- if request.method == "POST":
- return login(request)
- return session_user(request)
- def check_delegated_auth(f):
- @wraps(f)
- def view_disabled_if_auth_is_delegated(request, *args, **kwargs):
- if request.settings.enable_oauth2_client:
- raise PermissionDenied(
- _(
- "This feature has been disabled. "
- "Please use %(provider)s to sign in."
- )
- % {"provider": request.settings.oauth2_provider}
- )
- return f(request, *args, **kwargs)
- return view_disabled_if_auth_is_delegated
- @api_view(["POST"])
- @permission_classes((UnbannedAnonOnly,))
- @check_delegated_auth
- @csrf_protect
- @require_dict_data
- def login(request):
- """
- POST /auth/ with CSRF, username and password
- will attempt to authenticate new user
- """
- form = AuthenticationForm(request, data=request.data)
- if form.is_valid():
- auth.login(request, form.user_cache)
- return Response(AuthenticatedUserSerializer(form.user_cache).data)
- return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
- @api_view()
- def session_user(request):
- """GET /auth/ will return current auth user, either User or AnonymousUser"""
- if request.user.is_authenticated:
- serializer = AuthenticatedUserSerializer
- else:
- serializer = AnonymousUserSerializer
- serialized_user = serializer(request.user, context={"acl": request.user_acl}).data
- return Response(serialized_user)
- @api_view(["GET"])
- def get_criteria(request):
- """GET /auth/criteria/ will return password and username criteria for accounts"""
- criteria = {
- "username": {
- "min_length": request.settings.username_length_min,
- "max_length": request.settings.username_length_max,
- },
- "password": [],
- }
- for validator in settings.AUTH_PASSWORD_VALIDATORS:
- validator_dict = {"name": validator["NAME"].split(".")[-1]}
- validator_dict.update(validator.get("OPTIONS", {}))
- criteria["password"].append(validator_dict)
- return Response(criteria)
- @api_view(["POST"])
- @permission_classes((UnbannedAnonOnly,))
- @check_delegated_auth
- @csrf_protect
- @require_dict_data
- def send_activation(request):
- """
- POST /auth/send-activation/ with CSRF token and email
- will mail account activation link to requester
- """
- form = ResendActivationForm(request.data)
- if not form.is_valid():
- return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
- requesting_user = form.user_cache
- mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
- "user": requesting_user.username,
- "forum_name": request.settings.forum_name,
- }
- mail_user(
- requesting_user,
- mail_subject,
- "misago/emails/activation/by_user",
- context={
- "activation_token": make_activation_token(requesting_user),
- "settings": request.settings,
- },
- )
- return Response(
- {"username": form.user_cache.username, "email": form.user_cache.email}
- )
- @api_view(["POST"])
- @permission_classes((UnbannedOnly,))
- @check_delegated_auth
- @csrf_protect
- @require_dict_data
- def send_password_form(request):
- """
- POST /auth/send-password-form/ with CSRF token and email
- will mail change password form link to requester
- """
- form = ResetPasswordForm(request.data)
- if not form.is_valid():
- return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
- requesting_user = form.user_cache
- mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
- "user": requesting_user.username,
- "forum_name": request.settings.forum_name,
- }
- confirmation_token = make_password_change_token(requesting_user)
- mail_user(
- requesting_user,
- mail_subject,
- "misago/emails/change_password_form_link",
- context={
- "confirmation_token": confirmation_token,
- "settings": request.settings,
- },
- )
- return Response(
- {"username": form.user_cache.username, "email": form.user_cache.email}
- )
- class PasswordChangeFailed(Exception):
- pass
- @api_view(["POST"])
- @permission_classes((UnbannedOnly,))
- @check_delegated_auth
- @csrf_protect
- @require_dict_data
- def change_forgotten_password(request, pk, token):
- """
- POST /auth/change-password/user/token/ with CSRF and new password
- will change forgotten password
- """
- invalid_message = _("Form link is invalid. Please try again.")
- expired_message = _("Your link has expired. Please request new one.")
- try:
- try:
- user = User.objects.get(pk=pk, is_active=True)
- except User.DoesNotExist:
- raise PasswordChangeFailed(invalid_message)
- if request.user.is_authenticated and request.user.id != user.id:
- raise PasswordChangeFailed(invalid_message)
- if not is_password_change_token_valid(user, token):
- raise PasswordChangeFailed(invalid_message)
- if user.requires_activation:
- raise PasswordChangeFailed(expired_message)
- if get_user_ban(user, request.cache_versions):
- raise PasswordChangeFailed(expired_message)
- except PasswordChangeFailed as e:
- return Response({"detail": e.args[0]}, status=status.HTTP_400_BAD_REQUEST)
- try:
- new_password = request.data.get("password", "")
- validate_password(new_password, user=user)
- user.set_password(new_password)
- user.save()
- except ValidationError as e:
- return Response({"detail": e.messages[0]}, status=status.HTTP_400_BAD_REQUEST)
- return Response({"username": user.username})
|