auth.py 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. from functools import wraps
  2. from django.contrib import auth
  3. from django.contrib.auth.password_validation import validate_password
  4. from django.core.exceptions import PermissionDenied, ValidationError
  5. from django.utils.translation import gettext as _
  6. from django.views.decorators.csrf import csrf_protect
  7. from rest_framework import status
  8. from rest_framework.decorators import api_view, permission_classes
  9. from rest_framework.response import Response
  10. from ...conf import settings
  11. from ...core.decorators import require_dict_data
  12. from ...core.mail import mail_user
  13. from ..bans import get_user_ban
  14. from ..forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  15. from ..serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  16. from ..tokens import (
  17. is_password_change_token_valid,
  18. make_activation_token,
  19. make_password_change_token,
  20. )
  21. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  22. User = auth.get_user_model()
  23. def gateway(request):
  24. if request.method == "POST":
  25. return login(request)
  26. return session_user(request)
  27. def check_delegated_auth(f):
  28. @wraps(f)
  29. def view_disabled_if_auth_is_delegated(request, *args, **kwargs):
  30. if request.settings.enable_oauth2_client:
  31. raise PermissionDenied(
  32. _(
  33. "This feature has been disabled. "
  34. "Please use %(provider)s to sign in."
  35. )
  36. % {"provider": request.settings.oauth2_provider}
  37. )
  38. return f(request, *args, **kwargs)
  39. return view_disabled_if_auth_is_delegated
  40. @api_view(["POST"])
  41. @permission_classes((UnbannedAnonOnly,))
  42. @check_delegated_auth
  43. @csrf_protect
  44. @require_dict_data
  45. def login(request):
  46. """
  47. POST /auth/ with CSRF, username and password
  48. will attempt to authenticate new user
  49. """
  50. form = AuthenticationForm(request, data=request.data)
  51. if form.is_valid():
  52. auth.login(request, form.user_cache)
  53. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  54. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  55. @api_view()
  56. def session_user(request):
  57. """GET /auth/ will return current auth user, either User or AnonymousUser"""
  58. if request.user.is_authenticated:
  59. serializer = AuthenticatedUserSerializer
  60. else:
  61. serializer = AnonymousUserSerializer
  62. serialized_user = serializer(request.user, context={"acl": request.user_acl}).data
  63. return Response(serialized_user)
  64. @api_view(["GET"])
  65. def get_criteria(request):
  66. """GET /auth/criteria/ will return password and username criteria for accounts"""
  67. criteria = {
  68. "username": {
  69. "min_length": request.settings.username_length_min,
  70. "max_length": request.settings.username_length_max,
  71. },
  72. "password": [],
  73. }
  74. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  75. validator_dict = {"name": validator["NAME"].split(".")[-1]}
  76. validator_dict.update(validator.get("OPTIONS", {}))
  77. criteria["password"].append(validator_dict)
  78. return Response(criteria)
  79. @api_view(["POST"])
  80. @permission_classes((UnbannedAnonOnly,))
  81. @check_delegated_auth
  82. @csrf_protect
  83. @require_dict_data
  84. def send_activation(request):
  85. """
  86. POST /auth/send-activation/ with CSRF token and email
  87. will mail account activation link to requester
  88. """
  89. form = ResendActivationForm(request.data)
  90. if not form.is_valid():
  91. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  92. requesting_user = form.user_cache
  93. mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
  94. "user": requesting_user.username,
  95. "forum_name": request.settings.forum_name,
  96. }
  97. mail_user(
  98. requesting_user,
  99. mail_subject,
  100. "misago/emails/activation/by_user",
  101. context={
  102. "activation_token": make_activation_token(requesting_user),
  103. "settings": request.settings,
  104. },
  105. )
  106. return Response(
  107. {"username": form.user_cache.username, "email": form.user_cache.email}
  108. )
  109. @api_view(["POST"])
  110. @permission_classes((UnbannedOnly,))
  111. @check_delegated_auth
  112. @csrf_protect
  113. @require_dict_data
  114. def send_password_form(request):
  115. """
  116. POST /auth/send-password-form/ with CSRF token and email
  117. will mail change password form link to requester
  118. """
  119. form = ResetPasswordForm(request.data)
  120. if not form.is_valid():
  121. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  122. requesting_user = form.user_cache
  123. mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
  124. "user": requesting_user.username,
  125. "forum_name": request.settings.forum_name,
  126. }
  127. confirmation_token = make_password_change_token(requesting_user)
  128. mail_user(
  129. requesting_user,
  130. mail_subject,
  131. "misago/emails/change_password_form_link",
  132. context={
  133. "confirmation_token": confirmation_token,
  134. "settings": request.settings,
  135. },
  136. )
  137. return Response(
  138. {"username": form.user_cache.username, "email": form.user_cache.email}
  139. )
  140. class PasswordChangeFailed(Exception):
  141. pass
  142. @api_view(["POST"])
  143. @permission_classes((UnbannedOnly,))
  144. @check_delegated_auth
  145. @csrf_protect
  146. @require_dict_data
  147. def change_forgotten_password(request, pk, token):
  148. """
  149. POST /auth/change-password/user/token/ with CSRF and new password
  150. will change forgotten password
  151. """
  152. invalid_message = _("Form link is invalid. Please try again.")
  153. expired_message = _("Your link has expired. Please request new one.")
  154. try:
  155. try:
  156. user = User.objects.get(pk=pk, is_active=True)
  157. except User.DoesNotExist:
  158. raise PasswordChangeFailed(invalid_message)
  159. if request.user.is_authenticated and request.user.id != user.id:
  160. raise PasswordChangeFailed(invalid_message)
  161. if not is_password_change_token_valid(user, token):
  162. raise PasswordChangeFailed(invalid_message)
  163. if user.requires_activation:
  164. raise PasswordChangeFailed(expired_message)
  165. if get_user_ban(user, request.cache_versions):
  166. raise PasswordChangeFailed(expired_message)
  167. except PasswordChangeFailed as e:
  168. return Response({"detail": e.args[0]}, status=status.HTTP_400_BAD_REQUEST)
  169. try:
  170. new_password = request.data.get("password", "")
  171. validate_password(new_password, user=user)
  172. user.set_password(new_password)
  173. user.save()
  174. except ValidationError as e:
  175. return Response({"detail": e.messages[0]}, status=status.HTTP_400_BAD_REQUEST)
  176. return Response({"username": user.username})