auth.py 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. from django.contrib import auth
  2. from django.core.exceptions import ValidationError
  3. from django.utils.translation import ugettext as _
  4. from django.views.decorators.csrf import csrf_protect, ensure_csrf_cookie
  5. from rest_framework import status
  6. from rest_framework.decorators import api_view, permission_classes
  7. from rest_framework.response import Response
  8. from misago.conf import settings
  9. from misago.core.mail import mail_user
  10. from ..bans import get_user_ban
  11. from ..forms.auth import AuthenticationForm, ResendActivationForm, ResetPasswordForm
  12. from ..serializers import AnonymousUserSerializer, AuthenticatedUserSerializer
  13. from ..tokens import is_password_change_token_valid, make_activation_token, make_password_change_token
  14. from ..validators import validate_password
  15. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  16. def gateway(request):
  17. if request.method == 'POST':
  18. return login(request)
  19. else:
  20. return session_user(request)
  21. """
  22. POST /auth/ with CSRF, username and password
  23. will attempt to authenticate new user
  24. """
  25. @api_view(['POST'])
  26. @permission_classes((UnbannedAnonOnly,))
  27. @csrf_protect
  28. def login(request):
  29. form = AuthenticationForm(request, data=request.data)
  30. if form.is_valid():
  31. auth.login(request, form.user_cache)
  32. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  33. else:
  34. return Response(form.get_errors_dict(),
  35. status=status.HTTP_400_BAD_REQUEST)
  36. """
  37. GET /auth/ will return current auth user, either User or AnonymousUser
  38. """
  39. @api_view()
  40. def session_user(request):
  41. if request.user.is_authenticated():
  42. UserSerializer = AuthenticatedUserSerializer
  43. else:
  44. UserSerializer = AnonymousUserSerializer
  45. return Response(UserSerializer(request.user).data)
  46. """
  47. GET /auth/token/ will return cookie with current auth token
  48. """
  49. @api_view(['GET'])
  50. @ensure_csrf_cookie
  51. def get_token(request):
  52. return Response({'detail': 'ok'})
  53. """
  54. POST /auth/send-activation/ with CSRF token and email
  55. will mail account activation link to requester
  56. """
  57. @api_view(['POST'])
  58. @permission_classes((UnbannedAnonOnly,))
  59. @csrf_protect
  60. def send_activation(request):
  61. form = ResendActivationForm(request.data)
  62. if form.is_valid():
  63. requesting_user = form.user_cache
  64. mail_subject = _("Activate %(user)s account on %(forum_name)s forums")
  65. subject_formats = {
  66. 'user': requesting_user.username,
  67. 'forum_name': settings.forum_name,
  68. }
  69. mail_subject = mail_subject % subject_formats
  70. mail_user(request, requesting_user, mail_subject,
  71. 'misago/emails/activation/by_user',
  72. {'activation_token': make_activation_token(requesting_user)})
  73. return Response({
  74. 'username': form.user_cache.username,
  75. 'email': form.user_cache.email
  76. })
  77. else:
  78. return Response(form.get_errors_dict(),
  79. status=status.HTTP_400_BAD_REQUEST)
  80. """
  81. POST /auth/send-password-form/ with CSRF token and email
  82. will mail change password form link to requester
  83. """
  84. @api_view(['POST'])
  85. @permission_classes((UnbannedOnly,))
  86. @csrf_protect
  87. def send_password_form(request):
  88. form = ResetPasswordForm(request.data)
  89. if form.is_valid():
  90. requesting_user = form.user_cache
  91. mail_subject = _("Change %(user)s password on %(forum_name)s forums")
  92. subject_formats = {
  93. 'user': requesting_user.username,
  94. 'forum_name': settings.forum_name,
  95. }
  96. mail_subject = mail_subject % subject_formats
  97. confirmation_token = make_password_change_token(requesting_user)
  98. mail_user(request, requesting_user, mail_subject,
  99. 'misago/emails/change_password_form_link',
  100. {'confirmation_token': confirmation_token})
  101. return Response({
  102. 'username': form.user_cache.username,
  103. 'email': form.user_cache.email
  104. })
  105. else:
  106. return Response(form.get_errors_dict(),
  107. status=status.HTTP_400_BAD_REQUEST)
  108. """
  109. POST /auth/change-password/user/token/ with CSRF and new password
  110. will change forgotten password
  111. """
  112. class PasswordChangeFailed(Exception):
  113. pass
  114. @api_view(['POST'])
  115. @permission_classes((UnbannedOnly,))
  116. @csrf_protect
  117. def change_forgotten_password(request, pk, token):
  118. User = auth.get_user_model()
  119. invalid_message = _("Form link is invalid. Please try again.")
  120. expired_message = _("Your link has expired. Please request new one.")
  121. try:
  122. try:
  123. user = User.objects.get(pk=pk, is_active=True)
  124. except User.DoesNotExist:
  125. raise PasswordChangeFailed(invalid_message)
  126. if request.user.is_authenticated() and request.user.id != user.id:
  127. raise PasswordChangeFailed(invalid_message)
  128. if not is_password_change_token_valid(user, token):
  129. raise PasswordChangeFailed(invalid_message)
  130. if user.requires_activation:
  131. raise PasswordChangeFailed(expired_message)
  132. if get_user_ban(user):
  133. raise PasswordChangeFailed(expired_message)
  134. except PasswordChangeFailed as e:
  135. return Response({
  136. 'detail': e.args[0]
  137. }, status=status.HTTP_400_BAD_REQUEST)
  138. try:
  139. new_password = request.data.get('password', '').strip()
  140. validate_password(new_password)
  141. user.set_password(new_password)
  142. user.save()
  143. except ValidationError as e:
  144. return Response({
  145. 'detail': e.messages[0]
  146. }, status=status.HTTP_400_BAD_REQUEST)
  147. return Response({
  148. 'username': user.username
  149. })