auth.py 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. from rest_framework import status
  2. from rest_framework.decorators import api_view, permission_classes
  3. from rest_framework.response import Response
  4. from django.contrib import auth
  5. from django.contrib.auth.password_validation import validate_password
  6. from django.core.exceptions import ValidationError
  7. from django.utils.translation import gettext as _
  8. from django.views.decorators.csrf import csrf_protect
  9. from misago.conf import settings
  10. from misago.core.decorators import require_dict_data
  11. from misago.core.mail import mail_user
  12. from misago.users.bans import get_user_ban
  13. from misago.users.forms.auth import (
  14. AuthenticationForm,
  15. ResendActivationForm,
  16. ResetPasswordForm,
  17. )
  18. from misago.users.serializers import (
  19. AnonymousUserSerializer,
  20. AuthenticatedUserSerializer,
  21. )
  22. from misago.users.tokens import (
  23. is_password_change_token_valid,
  24. make_activation_token,
  25. make_password_change_token,
  26. )
  27. from .rest_permissions import UnbannedAnonOnly, UnbannedOnly
  28. UserModel = auth.get_user_model()
  29. def gateway(request):
  30. if request.method == "POST":
  31. return login(request)
  32. else:
  33. return session_user(request)
  34. @api_view(["POST"])
  35. @permission_classes((UnbannedAnonOnly,))
  36. @csrf_protect
  37. @require_dict_data
  38. def login(request):
  39. """
  40. POST /auth/ with CSRF, username and password
  41. will attempt to authenticate new user
  42. """
  43. form = AuthenticationForm(request, data=request.data)
  44. if form.is_valid():
  45. auth.login(request, form.user_cache)
  46. return Response(AuthenticatedUserSerializer(form.user_cache).data)
  47. else:
  48. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  49. @api_view()
  50. def session_user(request):
  51. """GET /auth/ will return current auth user, either User or AnonymousUser"""
  52. if request.user.is_authenticated:
  53. serializer = AuthenticatedUserSerializer
  54. else:
  55. serializer = AnonymousUserSerializer
  56. serialized_user = serializer(request.user, context={"acl": request.user_acl}).data
  57. return Response(serialized_user)
  58. @api_view(["GET"])
  59. def get_criteria(request):
  60. """GET /auth/criteria/ will return password and username criteria for accounts"""
  61. criteria = {
  62. "username": {
  63. "min_length": request.settings.username_length_min,
  64. "max_length": request.settings.username_length_max,
  65. },
  66. "password": [],
  67. }
  68. for validator in settings.AUTH_PASSWORD_VALIDATORS:
  69. validator_dict = {"name": validator["NAME"].split(".")[-1]}
  70. validator_dict.update(validator.get("OPTIONS", {}))
  71. criteria["password"].append(validator_dict)
  72. return Response(criteria)
  73. @api_view(["POST"])
  74. @permission_classes((UnbannedAnonOnly,))
  75. @csrf_protect
  76. @require_dict_data
  77. def send_activation(request):
  78. """
  79. POST /auth/send-activation/ with CSRF token and email
  80. will mail account activation link to requester
  81. """
  82. form = ResendActivationForm(request.data)
  83. if form.is_valid():
  84. requesting_user = form.user_cache
  85. mail_subject = _("Activate %(user)s account on %(forum_name)s forums") % {
  86. "user": requesting_user.username,
  87. "forum_name": request.settings.forum_name,
  88. }
  89. mail_user(
  90. requesting_user,
  91. mail_subject,
  92. "misago/emails/activation/by_user",
  93. context={
  94. "activation_token": make_activation_token(requesting_user),
  95. "settings": request.settings,
  96. },
  97. )
  98. return Response(
  99. {"username": form.user_cache.username, "email": form.user_cache.email}
  100. )
  101. else:
  102. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  103. @api_view(["POST"])
  104. @permission_classes((UnbannedOnly,))
  105. @csrf_protect
  106. @require_dict_data
  107. def send_password_form(request):
  108. """
  109. POST /auth/send-password-form/ with CSRF token and email
  110. will mail change password form link to requester
  111. """
  112. form = ResetPasswordForm(request.data)
  113. if form.is_valid():
  114. requesting_user = form.user_cache
  115. mail_subject = _("Change %(user)s password on %(forum_name)s forums") % {
  116. "user": requesting_user.username,
  117. "forum_name": request.settings.forum_name,
  118. }
  119. confirmation_token = make_password_change_token(requesting_user)
  120. mail_user(
  121. requesting_user,
  122. mail_subject,
  123. "misago/emails/change_password_form_link",
  124. context={
  125. "confirmation_token": confirmation_token,
  126. "settings": request.settings,
  127. },
  128. )
  129. return Response(
  130. {"username": form.user_cache.username, "email": form.user_cache.email}
  131. )
  132. else:
  133. return Response(form.get_errors_dict(), status=status.HTTP_400_BAD_REQUEST)
  134. class PasswordChangeFailed(Exception):
  135. pass
  136. @api_view(["POST"])
  137. @permission_classes((UnbannedOnly,))
  138. @csrf_protect
  139. @require_dict_data
  140. def change_forgotten_password(request, pk, token):
  141. """
  142. POST /auth/change-password/user/token/ with CSRF and new password
  143. will change forgotten password
  144. """
  145. invalid_message = _("Form link is invalid. Please try again.")
  146. expired_message = _("Your link has expired. Please request new one.")
  147. try:
  148. try:
  149. user = UserModel.objects.get(pk=pk, is_active=True)
  150. except UserModel.DoesNotExist:
  151. raise PasswordChangeFailed(invalid_message)
  152. if request.user.is_authenticated and request.user.id != user.id:
  153. raise PasswordChangeFailed(invalid_message)
  154. if not is_password_change_token_valid(user, token):
  155. raise PasswordChangeFailed(invalid_message)
  156. if user.requires_activation:
  157. raise PasswordChangeFailed(expired_message)
  158. if get_user_ban(user, request.cache_versions):
  159. raise PasswordChangeFailed(expired_message)
  160. except PasswordChangeFailed as e:
  161. return Response({"detail": e.args[0]}, status=status.HTTP_400_BAD_REQUEST)
  162. try:
  163. new_password = request.data.get("password", "")
  164. validate_password(new_password, user=user)
  165. user.set_password(new_password)
  166. user.save()
  167. except ValidationError as e:
  168. return Response({"detail": e.messages[0]}, status=status.HTTP_400_BAD_REQUEST)
  169. return Response({"username": user.username})