auth.py 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. from django.contrib import auth
  2. from django.contrib.auth.password_validation import validate_password
  3. from django.core.exceptions import PermissionDenied, ValidationError
  4. from django.utils.translation import gettext as _
  5. from django.views.decorators.csrf import csrf_protect
  6. from rest_framework import status
  7. from rest_framework.decorators import api_view, permission_classes
  8. from rest_framework.response import Response
  9. from ...conf import settings
  10. from ...core.decorators import require_dict_data
  11. from ...core.mail import mail_user
  12. from ..bans import get_user_ban
  13. from ..forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  14. from ..serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  15. from ..tokens import (
  16. is_password_change_token_valid,
  17. make_activation_token,
  18. make_password_change_token,
  19. )
  20. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  21. User = auth.get_user_model()
  22. def gateway(request):
  23. if request.method == "POST":
  24. return login(request)
  25. return session_user(request)
  26. @api_view(["POST"])
  27. @permission_classes((UnbannedAnonOnly,))
  28. @csrf_protect
  29. @require_dict_data
  30. def login(request):
  31. """
  32. POST /auth/ with CSRF, username and password
  33. will attempt to authenticate new user
  34. """
  35. if request.settings.enable_sso:
  36. raise PermissionDenied(_("Please use the 3rd party site to authenticate."))
  37. form = AuthenticationForm(request, data=request.data)
  38. if form.is_valid():
  39. auth.login(request, form.user_cache)
  40. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  41. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  42. @api_view()
  43. def session_user(request):
  44. """GET /auth/ will return current auth user, either User or AnonymousUser"""
  45. if request.user.is_authenticated:
  46. serializer = AuthenticatedUserSerializer
  47. else:
  48. serializer = AnonymousUserSerializer
  49. serialized_user = serializer(request.user, context={"acl": request.user_acl}).data
  50. return Response(serialized_user)
  51. @api_view(["GET"])
  52. def get_criteria(request):
  53. """GET /auth/criteria/ will return password and username criteria for accounts"""
  54. criteria = {
  55. "username": {
  56. "min_length": request.settings.username_length_min,
  57. "max_length": request.settings.username_length_max,
  58. },
  59. "password": [],
  60. }
  61. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  62. validator_dict = {"name": validator["NAME"].split(".")[-1]}
  63. validator_dict.update(validator.get("OPTIONS", {}))
  64. criteria["password"].append(validator_dict)
  65. return Response(criteria)
  66. @api_view(["POST"])
  67. @permission_classes((UnbannedAnonOnly,))
  68. @csrf_protect
  69. @require_dict_data
  70. def send_activation(request):
  71. """
  72. POST /auth/send-activation/ with CSRF token and email
  73. will mail account activation link to requester
  74. """
  75. if request.settings.enable_sso:
  76. raise PermissionDenied(_("Please use the 3rd party site to authenticate."))
  77. form = ResendActivationForm(request.data)
  78. if not form.is_valid():
  79. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  80. requesting_user = form.user_cache
  81. mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
  82. "user": requesting_user.username,
  83. "forum_name": request.settings.forum_name,
  84. }
  85. mail_user(
  86. requesting_user,
  87. mail_subject,
  88. "misago/emails/activation/by_user",
  89. context={
  90. "activation_token": make_activation_token(requesting_user),
  91. "settings": request.settings,
  92. },
  93. )
  94. return Response(
  95. {"username": form.user_cache.username, "email": form.user_cache.email}
  96. )
  97. @api_view(["POST"])
  98. @permission_classes((UnbannedOnly,))
  99. @csrf_protect
  100. @require_dict_data
  101. def send_password_form(request):
  102. """
  103. POST /auth/send-password-form/ with CSRF token and email
  104. will mail change password form link to requester
  105. """
  106. if request.settings.enable_sso:
  107. raise PermissionDenied(_("Please use the 3rd party site to authenticate."))
  108. form = ResetPasswordForm(request.data)
  109. if not form.is_valid():
  110. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  111. requesting_user = form.user_cache
  112. mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
  113. "user": requesting_user.username,
  114. "forum_name": request.settings.forum_name,
  115. }
  116. confirmation_token = make_password_change_token(requesting_user)
  117. mail_user(
  118. requesting_user,
  119. mail_subject,
  120. "misago/emails/change_password_form_link",
  121. context={
  122. "confirmation_token": confirmation_token,
  123. "settings": request.settings,
  124. },
  125. )
  126. return Response(
  127. {"username": form.user_cache.username, "email": form.user_cache.email}
  128. )
  129. class PasswordChangeFailed(Exception):
  130. pass
  131. @api_view(["POST"])
  132. @permission_classes((UnbannedOnly,))
  133. @csrf_protect
  134. @require_dict_data
  135. def change_forgotten_password(request, pk, token):
  136. """
  137. POST /auth/change-password/user/token/ with CSRF and new password
  138. will change forgotten password
  139. """
  140. if request.settings.enable_sso:
  141. raise PermissionDenied(_("Please use the 3rd party site to authenticate."))
  142. invalid_message = _("Form link is invalid. Please try again.")
  143. expired_message = _("Your link has expired. Please request new one.")
  144. try:
  145. try:
  146. user = User.objects.get(pk=pk, is_active=True)
  147. except User.DoesNotExist:
  148. raise PasswordChangeFailed(invalid_message)
  149. if request.user.is_authenticated and request.user.id != user.id:
  150. raise PasswordChangeFailed(invalid_message)
  151. if not is_password_change_token_valid(user, token):
  152. raise PasswordChangeFailed(invalid_message)
  153. if user.requires_activation:
  154. raise PasswordChangeFailed(expired_message)
  155. if get_user_ban(user, request.cache_versions):
  156. raise PasswordChangeFailed(expired_message)
  157. except PasswordChangeFailed as e:
  158. return Response({"detail": e.args[0]}, status=status.HTTP_400_BAD_REQUEST)
  159. try:
  160. new_password = request.data.get("password", "")
  161. validate_password(new_password, user=user)
  162. user.set_password(new_password)
  163. user.save()
  164. except ValidationError as e:
  165. return Response({"detail": e.messages[0]}, status=status.HTTP_400_BAD_REQUEST)
  166. return Response({"username": user.username})