1 # Copyright 2011-2012 GRNET S.A. All rights reserved.
3 # Redistribution and use in source and binary forms, with or
4 # without modification, are permitted provided that the following
7 # 1. Redistributions of source code must retain the above
8 # copyright notice, this list of conditions and the following
11 # 2. Redistributions in binary form must reproduce the above
12 # copyright notice, this list of conditions and the following
13 # disclaimer in the documentation and/or other materials
14 # provided with the distribution.
16 # THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17 # OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18 # WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23 # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 # AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26 # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 # POSSIBILITY OF SUCH DAMAGE.
29 # The views and conclusions contained in the software and
30 # documentation are those of the authors and should not be
31 # interpreted as representing official policies, either expressed
32 # or implied, of GRNET S.A.
34 from django.http import HttpResponseRedirect
35 from django.shortcuts import render_to_response
36 from django.template import RequestContext
37 from django.contrib import messages
38 from django.utils.translation import ugettext as _
39 from django.views.decorators.csrf import csrf_exempt
40 from django.views.decorators.http import require_http_methods
41 from django.core.urlresolvers import reverse
42 from django.contrib.auth.decorators import login_required
44 from astakos.im.util import prepare_response, get_query
45 from astakos.im.views import requires_anonymous, signed_terms_required
46 from astakos.im.models import PendingThirdPartyUser
47 from astakos.im.forms import LoginForm, ExtendedPasswordChangeForm, \
48 ExtendedSetPasswordForm
49 from astakos.im.settings import (RATELIMIT_RETRIES_ALLOWED,
50 ENABLE_LOCAL_ACCOUNT_MIGRATION)
51 import astakos.im.messages as astakos_messages
52 from astakos.im.views import requires_auth_provider
53 from astakos.im import settings
55 from ratelimit.decorators import ratelimit
57 retries = RATELIMIT_RETRIES_ALLOWED - 1
58 rate = str(retries) + '/m'
61 @requires_auth_provider('local', login=True)
62 @require_http_methods(["GET", "POST"])
65 @ratelimit(field='username', method='POST', rate=rate)
66 def login(request, on_failure='im/login.html'):
68 on_failure: the template name to render on login failure
70 was_limited = getattr(request, 'limited', False)
71 form = LoginForm(data=request.POST,
72 was_limited=was_limited,
74 next = get_query(request).get('next', '')
75 third_party_token = get_query(request).get('key', False)
77 if not form.is_valid():
79 messages.info(request, astakos_messages.AUTH_PROVIDER_LOGIN_TO_ADD)
81 return render_to_response(
85 'key': third_party_token},
86 context_instance=RequestContext(request))
88 # get the user from the cache
89 user = form.user_cache
93 message = _(astakos_messages.ACCOUNT_AUTHENTICATION_FAILED)
94 elif not user.is_active:
95 message = user.get_inactive_message()
97 elif not user.can_login_with_auth_provider('local'):
98 # valid user logged in with no auth providers set, add local provider
100 if user.auth_providers.count() == 0:
101 user.add_auth_provider('local')
103 message = _(astakos_messages.NO_LOCAL_AUTH)
106 messages.error(request, message)
107 return render_to_response(on_failure,
108 {'login_form': form},
109 context_instance=RequestContext(request))
111 response = prepare_response(request, user, next)
112 if third_party_token:
113 # use requests to assign the account he just authenticated with with
114 # a third party provider account
116 request.user.add_pending_auth_provider(third_party_token)
117 messages.success(request, _(astakos_messages.AUTH_PROVIDER_ADDED))
118 except PendingThirdPartyUser.DoesNotExist:
119 messages.error(request, _(astakos_messages.AUTH_PROVIDER_ADD_FAILED))
121 messages.success(request, _(astakos_messages.LOGIN_SUCCESS))
125 @require_http_methods(["GET"])
126 def password_reset_done(request, *args, **kwargs):
127 messages.success(request, _(astakos_messages.PASSWORD_RESET_DONE))
128 return HttpResponseRedirect(reverse('index'))
131 @require_http_methods(["GET"])
132 def password_reset_confirm_done(request, *args, **kwargs):
133 messages.success(request, _(astakos_messages.PASSWORD_RESET_CONFIRM_DONE))
134 return HttpResponseRedirect(reverse('index'))
137 @require_http_methods(["GET", "POST"])
138 @signed_terms_required
140 @requires_auth_provider('local', login=True)
141 def password_change(request, template_name='registration/password_change_form.html',
142 post_change_redirect=None, password_change_form=ExtendedPasswordChangeForm):
144 create_password = False
146 # no local backend user wants to create a password
147 if not request.user.has_auth_provider('local'):
148 create_password = True
149 password_change_form = ExtendedSetPasswordForm
151 if post_change_redirect is None:
152 post_change_redirect = reverse('edit_profile')
154 if request.method == "POST":
159 if not create_password:
160 form_kwargs['session_key'] = session_key=request.session.session_key
162 form = password_change_form(**form_kwargs)
165 return HttpResponseRedirect(post_change_redirect)
167 form = password_change_form(user=request.user)
168 return render_to_response(template_name, {
170 }, context_instance=RequestContext(request))