]>
git.ipfire.org Git - ipfire.org.git/blob - src/web/auth.py
8 from . import ui_modules
10 class AuthenticationMixin(object):
11 def login(self
, account
):
12 # User has logged in, create a session
13 session_id
, session_expires
= self
.backend
.accounts
.create_session(
14 account
, self
.request
.host
)
16 # Check if a new session was created
18 raise tornado
.web
.HTTPError(500, "Could not create session")
20 # Send session cookie to the client
21 self
.set_cookie("session_id", session_id
,
22 domain
=self
.request
.host
, expires
=session_expires
, secure
=True)
25 session_id
= self
.get_cookie("session_id")
29 success
= self
.backend
.accounts
.destroy_session(session_id
, self
.request
.host
)
31 self
.clear_cookie("session_id")
34 class LoginHandler(AuthenticationMixin
, base
.BaseHandler
):
36 next
= self
.get_argument("next", None)
38 self
.render("auth/login.html", next
=next
,
39 incorrect
=False, username
=None)
41 @base.ratelimit(minutes
=15, requests
=10)
43 username
= self
.get_argument("username")
44 password
= self
.get_argument("password")
45 next
= self
.get_argument("next", "/")
48 account
= self
.backend
.accounts
.auth(username
, password
)
50 logging
.error("Unknown user or invalid password: %s" % username
)
55 # Render login page again
56 return self
.render("auth/login.html",
57 incorrect
=True, username
=username
, next
=next
,
61 with self
.db
.transaction():
65 return self
.redirect(next
)
68 class LogoutHandler(AuthenticationMixin
, base
.BaseHandler
):
70 with self
.db
.transaction():
73 # Get back to the start page
77 class RegisterHandler(base
.BaseHandler
):
79 # Redirect logged in users away
84 self
.render("auth/register.html")
86 @base.ratelimit(minutes
=15, requests
=5)
88 uid
= self
.get_argument("uid")
89 email
= self
.get_argument("email")
91 first_name
= self
.get_argument("first_name")
92 last_name
= self
.get_argument("last_name")
96 with self
.db
.transaction():
97 self
.backend
.accounts
.register(uid
, email
,
98 first_name
=first_name
, last_name
=last_name
,
99 country_code
=self
.current_country_code
)
100 except ValueError as e
:
101 raise tornado
.web
.HTTPError(400, "%s" % e
) from e
103 self
.render("auth/register-success.html")
106 class ActivateHandler(AuthenticationMixin
, base
.BaseHandler
):
107 def get(self
, uid
, activation_code
):
108 self
.render("auth/activate.html")
110 def post(self
, uid
, activation_code
):
111 password1
= self
.get_argument("password1")
112 password2
= self
.get_argument("password2")
114 if not password1
== password2
:
115 raise tornado
.web
.HTTPError(400, "Passwords do not match")
117 with self
.db
.transaction():
118 account
= self
.backend
.accounts
.activate(uid
, activation_code
)
120 raise tornado
.web
.HTTPError(400, "Account not found: %s" % uid
)
122 # Set the new password
123 account
.passwd(password1
)
128 # Redirect to success page
129 self
.render("auth/activated.html", account
=account
)
132 class PasswordResetInitiationHandler(base
.BaseHandler
):
134 username
= self
.get_argument("username", None)
136 self
.render("auth/password-reset-initiation.html", username
=username
)
138 @base.ratelimit(minutes
=15, requests
=10)
140 username
= self
.get_argument("username")
142 # Fetch account and submit password reset
143 account
= self
.backend
.accounts
.get_by_uid(username
)
145 with self
.db
.transaction():
146 account
.request_password_reset()
148 self
.render("auth/password-reset-successful.html")
151 class PasswordResetHandler(AuthenticationMixin
, base
.BaseHandler
):
152 def get(self
, uid
, reset_code
):
153 account
= self
.backend
.accounts
.get_by_uid(uid
)
155 raise tornado
.web
.HTTPError(404, "Could not find account: %s" % uid
)
157 self
.render("auth/password-reset.html", account
=account
)
159 def post(self
, uid
, reset_code
):
160 account
= self
.backend
.accounts
.get_by_uid(uid
)
162 raise tornado
.web
.HTTPError(404, "Could not find account: %s" % uid
)
164 password1
= self
.get_argument("password1")
165 password2
= self
.get_argument("password2")
167 if not password1
== password2
:
168 raise tornado
.web
.HTTPError(400, "Passwords do not match")
170 # Try to perform password reset
171 with self
.db
.transaction():
172 account
.reset_password(reset_code
, password1
)
174 # Login the user straight away after reset was successful
181 class WellKnownChangePasswordHandler(base
.BaseHandler
):
182 @tornado.web
.authenticated
185 Implements https://web.dev/articles/change-password-url
187 self
.redirect("/users/%s/passwd" % self
.current_user
.uid
)
190 class SSODiscourse(base
.BaseHandler
):
191 @base.ratelimit(minutes
=24*60, requests
=100)
192 @tornado.web
.authenticated
194 # Fetch Discourse's parameters
195 sso
= self
.get_argument("sso")
196 sig
= self
.get_argument("sig")
200 params
= self
.accounts
.decode_discourse_payload(sso
, sig
)
202 # Raise bad request if the signature is invalid
204 raise tornado
.web
.HTTPError(400)
206 # Redirect back if user is already logged in
208 "nonce" : params
.get("nonce"),
209 "external_id" : self
.current_user
.uid
,
212 "email" : self
.current_user
.email
,
213 "require_activation" : "false",
215 # More details about the user
216 "username" : self
.current_user
.uid
,
217 "name" : "%s" % self
.current_user
,
218 "bio" : self
.current_user
.description
or "",
221 "avatar_url" : self
.current_user
.avatar_url(absolute
=True),
222 "avatar_force_update" : "true",
224 # Send a welcome message
225 "suppress_welcome_message" : "false",
228 "admin" : "true" if self
.current_user
.is_admin() else "false",
229 "moderator" : "true" if self
.current_user
.is_moderator() else "false",
232 # Format payload and sign it
233 payload
= self
.accounts
.encode_discourse_payload(**args
)
234 signature
= self
.accounts
.sign_discourse_payload(payload
)
236 qs
= urllib
.parse
.urlencode({
242 self
.redirect("%s?%s" % (params
.get("return_sso_url"), qs
))
245 class PasswordModule(ui_modules
.UIModule
):
246 def render(self
, account
=None):
247 return self
.render_string("auth/modules/password.html", account
=account
)
249 def javascript_files(self
):
250 return "js/zxcvbn.js"
252 def embedded_javascript(self
):
253 return self
.render_string("auth/modules/password.js")
256 class APICheckUID(base
.APIHandler
):
257 @base.ratelimit(minutes
=1, requests
=100)
259 uid
= self
.get_argument("uid")
265 # Check if the username is syntactically valid
266 elif not self
.backend
.accounts
.uid_is_valid(uid
):
269 # Check if the username is already taken
270 elif self
.backend
.accounts
.uid_exists(uid
):
273 # Username seems to be okay
274 self
.finish({ "result" : result
or "ok" })
277 class APICheckEmail(base
.APIHandler
):
278 @base.ratelimit(minutes
=1, requests
=100)
280 email
= self
.get_argument("email")
286 elif not self
.backend
.accounts
.mail_is_valid(email
):
289 # Check if this email address is blacklisted
290 elif self
.backend
.accounts
.mail_is_blacklisted(email
):
291 result
= "blacklisted"
293 # Check if this email address is already useed
294 elif self
.backend
.accounts
.get_by_mail(email
):
297 self
.finish({ "result" : result
or "ok" })