auth.py 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. from django.contrib import auth
  2. from django.core.exceptions import ValidationError
  3. from django.utils.translation import ugettext as _
  4. from django.views.decorators.csrf import csrf_protect
  5. from rest_framework import status
  6. from rest_framework.decorators import api_view, permission_classes
  7. from rest_framework.response import Response
  8. from misago.conf import settings
  9. from misago.core.mail import mail_user
  10. from misago.users.forms.auth import (AuthenticationForm, ResendActivationForm,
  11. ResetPasswordForm)
  12. from misago.users.rest_permissions import UnbannedAnonOnly
  13. from misago.users.serializers import AuthenticatedUserSerializer
  14. from misago.users.tokens import (make_activation_token,
  15. is_activation_token_valid,
  16. make_password_change_token,
  17. is_password_change_token_valid)
  18. from misago.users.validators import validate_password
  19. def gateway(request):
  20. if request.method == 'POST':
  21. return login(request)
  22. else:
  23. return session_user(request)
  24. """
  25. POST /auth/ with CSRF, username and password
  26. will attempt to authenticate new user
  27. """
  28. @api_view(['POST'])
  29. @permission_classes((UnbannedAnonOnly,))
  30. @csrf_protect
  31. def login(request):
  32. form = AuthenticationForm(request, data=request.data)
  33. if form.is_valid():
  34. auth.login(request, form.user_cache)
  35. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  36. else:
  37. return Response(form.get_errors_dict(),
  38. status=status.HTTP_400_BAD_REQUEST)
  39. """
  40. GET /auth/ will return current auth user, either User or AnonymousUser
  41. """
  42. @api_view()
  43. def session_user(request):
  44. if request.user.is_authenticated():
  45. serialized_user = AuthenticatedUserSerializer(request.user).data
  46. else:
  47. serialized_user = {
  48. 'id': None,
  49. 'acl': {'is_implemented': False}
  50. }
  51. return Response(serialized_user)
  52. """
  53. POST /auth/send-activation/ with CSRF token and email
  54. will mail account activation link to requester
  55. """
  56. @api_view(['POST'])
  57. @permission_classes((UnbannedAnonOnly,))
  58. @csrf_protect
  59. def send_activation(request):
  60. form = ResendActivationForm(request.data)
  61. if form.is_valid():
  62. requesting_user = form.user_cache
  63. mail_subject = _("Activate %(user)s account "
  64. "on %(forum_title)s forums")
  65. subject_formats = {'user': requesting_user.username,
  66. 'forum_title': settings.forum_name}
  67. mail_subject = mail_subject % subject_formats
  68. mail_user(request, requesting_user, mail_subject,
  69. 'misago/emails/activation/by_user',
  70. {'activation_token': make_activation_token(requesting_user)})
  71. return Response({
  72. 'username': form.user_cache.username,
  73. 'email': form.user_cache.email
  74. })
  75. else:
  76. return Response(form.get_errors_dict(),
  77. status=status.HTTP_400_BAD_REQUEST)
  78. """
  79. POST /auth/activate-account/ with CSRF token, user ID and activation token
  80. will activate account
  81. """
  82. @api_view(['POST'])
  83. @permission_classes((UnbannedAnonOnly,))
  84. @csrf_protect
  85. def activate_account(request, user_id, token):
  86. User = auth.get_user_model()
  87. try:
  88. user = User.objects.get(pk=user_id)
  89. except User.DoesNotExist:
  90. message = _("Activation link is invalid. Please try again.")
  91. return Response({'detail': message}, status=status.HTTP_400_BAD_REQUEST)
  92. if not is_activation_token_valid(user, token):
  93. message = _("Activation link is invalid. Please try again.")
  94. return Response({'detail': message},
  95. status=status.HTTP_400_BAD_REQUEST)
  96. form = ResendActivationForm()
  97. try:
  98. form.confirm_user_not_banned(user)
  99. except ValidationError:
  100. message = _("Activation link has expired. Please request new one.")
  101. return Response({'detail': message},
  102. status=status.HTTP_400_BAD_REQUEST)
  103. try:
  104. form.confirm_can_be_activated(user)
  105. except ValidationError as e:
  106. return Response({'detail': e.messages[0]},
  107. status=status.HTTP_400_BAD_REQUEST)
  108. user.requires_activation = False
  109. user.save(update_fields=['requires_activation'])
  110. message = _("%(user)s, your account has been activated.")
  111. return Response({
  112. 'detail': message % {'user': user.username}
  113. })
  114. """
  115. POST /auth/send-password-form/ with CSRF token and email
  116. will mail change password form link to requester
  117. """
  118. @api_view(['POST'])
  119. @permission_classes((UnbannedAnonOnly,))
  120. @csrf_protect
  121. def send_password_form(request):
  122. form = ResetPasswordForm(request.data)
  123. if form.is_valid():
  124. requesting_user = form.user_cache
  125. mail_subject = _("Change %(user)s password "
  126. "on %(forum_title)s forums")
  127. subject_formats = {'user': requesting_user.username,
  128. 'forum_title': settings.forum_name}
  129. mail_subject = mail_subject % subject_formats
  130. confirmation_token = make_password_change_token(requesting_user)
  131. mail_user(request, requesting_user, mail_subject,
  132. 'misago/emails/change_password_form_link',
  133. {'confirmation_token': confirmation_token})
  134. return Response({
  135. 'username': form.user_cache.username,
  136. 'email': form.user_cache.email
  137. })
  138. else:
  139. return Response(form.get_errors_dict(),
  140. status=status.HTTP_400_BAD_REQUEST)
  141. """
  142. GET /auth/change-password/user/token/ will validate change password link
  143. POST /auth/change-password/user/token/ with CSRF and new password
  144. will change forgotten password
  145. """
  146. @api_view(['GET', 'POST'])
  147. @permission_classes((UnbannedAnonOnly,))
  148. @csrf_protect
  149. def change_forgotten_password(request, user_id, token):
  150. User = auth.get_user_model()
  151. try:
  152. user = User.objects.get(pk=user_id)
  153. except User.DoesNotExist:
  154. message = _("Form link is invalid. Please try again.")
  155. return Response({'detail': message}, status=status.HTTP_400_BAD_REQUEST)
  156. if not is_password_change_token_valid(user, token):
  157. message = _("Form link is invalid. Please try again.")
  158. return Response({'detail': message},
  159. status=status.HTTP_400_BAD_REQUEST)
  160. try:
  161. form = ResetPasswordForm()
  162. form.confirm_allowed(user)
  163. except ValidationError:
  164. message = _("Your link has expired. Please request new one.")
  165. return Response({'detail': message},
  166. status=status.HTTP_400_BAD_REQUEST)
  167. if request.method == 'POST':
  168. return process_forgotten_password_form(request, user)
  169. else:
  170. return Response({
  171. 'username': user.username,
  172. 'email': user.email
  173. })
  174. def process_forgotten_password_form(request, user):
  175. new_password = request.data.get('password', '').strip()
  176. try:
  177. validate_password(new_password)
  178. user.set_password(new_password)
  179. user.save()
  180. except ValidationError as e:
  181. return Response({'detail': e.messages[0]},
  182. status=status.HTTP_400_BAD_REQUEST)
  183. return Response({'detail': 'ok'})