auth.py 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218
  1. from django.contrib import auth
  2. from django.core.exceptions import ValidationError
  3. from django.utils.translation import ugettext as _
  4. from django.views.decorators.csrf import csrf_protect
  5. from rest_framework import status
  6. from rest_framework.decorators import api_view, permission_classes
  7. from rest_framework.response import Response
  8. from misago.conf import settings
  9. from misago.core.mail import mail_user
  10. from misago.users.forms.auth import (AuthenticationForm, ResendActivationForm,
  11. ResetPasswordForm)
  12. from misago.users.rest_permissions import UnbannedAnonOnly
  13. from misago.users.serializers import (AuthenticatedUserSerializer,
  14. AnonymousUserSerializer)
  15. from misago.users.tokens import (make_activation_token,
  16. is_activation_token_valid,
  17. make_password_change_token,
  18. is_password_change_token_valid)
  19. from misago.users.validators import validate_password
  20. def gateway(request):
  21. if request.method == 'POST':
  22. return login(request)
  23. else:
  24. return session_user(request)
  25. """
  26. POST /auth/ with CSRF, username and password
  27. will attempt to authenticate new user
  28. """
  29. @api_view(['POST'])
  30. @permission_classes((UnbannedAnonOnly,))
  31. @csrf_protect
  32. def login(request):
  33. form = AuthenticationForm(request, data=request.data)
  34. if form.is_valid():
  35. auth.login(request, form.user_cache)
  36. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  37. else:
  38. return Response(form.get_errors_dict(),
  39. status=status.HTTP_400_BAD_REQUEST)
  40. """
  41. GET /auth/ will return current auth user, either User or AnonymousUser
  42. """
  43. @api_view()
  44. def session_user(request):
  45. if request.user.is_authenticated():
  46. UserSerializer = AuthenticatedUserSerializer
  47. else:
  48. UserSerializer = AnonymousUserSerializer
  49. return Response(UserSerializer(request.user).data)
  50. """
  51. POST /auth/send-activation/ with CSRF token and email
  52. will mail account activation link to requester
  53. """
  54. @api_view(['POST'])
  55. @permission_classes((UnbannedAnonOnly,))
  56. @csrf_protect
  57. def send_activation(request):
  58. form = ResendActivationForm(request.data)
  59. if form.is_valid():
  60. requesting_user = form.user_cache
  61. mail_subject = _("Activate %(user)s account "
  62. "on %(forum_title)s forums")
  63. subject_formats = {'user': requesting_user.username,
  64. 'forum_title': settings.forum_name}
  65. mail_subject = mail_subject % subject_formats
  66. mail_user(request, requesting_user, mail_subject,
  67. 'misago/emails/activation/by_user',
  68. {'activation_token': make_activation_token(requesting_user)})
  69. return Response({
  70. 'username': form.user_cache.username,
  71. 'email': form.user_cache.email
  72. })
  73. else:
  74. return Response(form.get_errors_dict(),
  75. status=status.HTTP_400_BAD_REQUEST)
  76. """
  77. POST /auth/activate-account/ with CSRF token, user ID and activation token
  78. will activate account
  79. """
  80. @api_view(['POST'])
  81. @permission_classes((UnbannedAnonOnly,))
  82. @csrf_protect
  83. def activate_account(request, user_id, token):
  84. User = auth.get_user_model()
  85. try:
  86. user = User.objects.get(pk=user_id)
  87. except User.DoesNotExist:
  88. message = _("Activation link is invalid. Please try again.")
  89. return Response({'detail': message}, status=status.HTTP_400_BAD_REQUEST)
  90. if not is_activation_token_valid(user, token):
  91. message = _("Activation link is invalid. Please try again.")
  92. return Response({'detail': message},
  93. status=status.HTTP_400_BAD_REQUEST)
  94. form = ResendActivationForm()
  95. try:
  96. form.confirm_user_not_banned(user)
  97. except ValidationError:
  98. message = _("Activation link has expired. Please request new one.")
  99. return Response({'detail': message},
  100. status=status.HTTP_400_BAD_REQUEST)
  101. try:
  102. form.confirm_can_be_activated(user)
  103. except ValidationError as e:
  104. return Response({'detail': e.messages[0]},
  105. status=status.HTTP_400_BAD_REQUEST)
  106. user.requires_activation = False
  107. user.save(update_fields=['requires_activation'])
  108. message = _("%(user)s, your account has been activated.")
  109. return Response({
  110. 'detail': message % {'user': user.username}
  111. })
  112. """
  113. POST /auth/send-password-form/ with CSRF token and email
  114. will mail change password form link to requester
  115. """
  116. @api_view(['POST'])
  117. @permission_classes((UnbannedAnonOnly,))
  118. @csrf_protect
  119. def send_password_form(request):
  120. form = ResetPasswordForm(request.data)
  121. if form.is_valid():
  122. requesting_user = form.user_cache
  123. mail_subject = _("Change %(user)s password "
  124. "on %(forum_title)s forums")
  125. subject_formats = {'user': requesting_user.username,
  126. 'forum_title': settings.forum_name}
  127. mail_subject = mail_subject % subject_formats
  128. confirmation_token = make_password_change_token(requesting_user)
  129. mail_user(request, requesting_user, mail_subject,
  130. 'misago/emails/change_password_form_link',
  131. {'confirmation_token': confirmation_token})
  132. return Response({
  133. 'username': form.user_cache.username,
  134. 'email': form.user_cache.email
  135. })
  136. else:
  137. return Response(form.get_errors_dict(),
  138. status=status.HTTP_400_BAD_REQUEST)
  139. """
  140. GET /auth/change-password/user/token/ will validate change password link
  141. POST /auth/change-password/user/token/ with CSRF and new password
  142. will change forgotten password
  143. """
  144. @api_view(['GET', 'POST'])
  145. @permission_classes((UnbannedAnonOnly,))
  146. @csrf_protect
  147. def change_forgotten_password(request, user_id, token):
  148. User = auth.get_user_model()
  149. try:
  150. user = User.objects.get(pk=user_id)
  151. except User.DoesNotExist:
  152. message = _("Form link is invalid. Please try again.")
  153. return Response({'detail': message}, status=status.HTTP_400_BAD_REQUEST)
  154. if not is_password_change_token_valid(user, token):
  155. message = _("Form link is invalid. Please try again.")
  156. return Response({'detail': message},
  157. status=status.HTTP_400_BAD_REQUEST)
  158. try:
  159. form = ResetPasswordForm()
  160. form.confirm_allowed(user)
  161. except ValidationError:
  162. message = _("Your link has expired. Please request new one.")
  163. return Response({'detail': message},
  164. status=status.HTTP_400_BAD_REQUEST)
  165. if request.method == 'POST':
  166. return process_forgotten_password_form(request, user)
  167. else:
  168. return Response({
  169. 'username': user.username,
  170. 'email': user.email
  171. })
  172. def process_forgotten_password_form(request, user):
  173. new_password = request.data.get('password', '').strip()
  174. try:
  175. validate_password(new_password)
  176. user.set_password(new_password)
  177. user.save()
  178. except ValidationError as e:
  179. return Response({'detail': e.messages[0]},
  180. status=status.HTTP_400_BAD_REQUEST)
  181. return Response({'detail': 'ok'})