# -*- coding: utf-8 -*- # Copyright (c) 2007, 2008, BenoĆ®t Chesneau # Copyright (c) 2007 Simon Willison, original work on django-openid # # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are # met: # # * Redistributions of source code must retain the above copyright # * notice, this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright # * notice, this list of conditions and the following disclaimer in the # * documentation and/or other materials provided with the # * distribution. Neither the name of the nor the names # * of its contributors may be used to endorse or promote products # * derived from this software without specific prior written # * permission. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS # IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, # OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF # THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. import datetime from django.http import HttpResponseRedirect, Http404 from django.http import HttpResponse from django.http import HttpResponseBadRequest from django.template import RequestContext, Context from django.conf import settings as django_settings from askbot.conf import settings as askbot_settings from django.contrib.auth.models import User from django.contrib.auth.decorators import login_required from django.contrib.auth import authenticate from django.core.urlresolvers import reverse from django.forms.util import ErrorList from django.shortcuts import render from django.template.loader import get_template from django.views.decorators import csrf from django.utils.encoding import smart_unicode from askbot.utils.functions import generate_random_key from django.utils.html import escape from django.utils.translation import ugettext as _ from django.utils.safestring import mark_safe from askbot.mail import send_mail from recaptcha_works.decorators import fix_recaptcha_remote_ip from askbot.deps.django_authopenid.ldap_auth import ldap_create_user from askbot.deps.django_authopenid.ldap_auth import ldap_authenticate from askbot.utils.loading import load_module from sanction.client import Client as OAuth2Client from urlparse import urlparse from openid.consumer.consumer import Consumer, \ SUCCESS, CANCEL, FAILURE, SETUP_NEEDED from openid.consumer.discover import DiscoveryFailure from openid.extensions import sreg # needed for some linux distributions like debian try: from openid.yadis import xri except ImportError: from yadis import xri try: from xmlrpclib import Fault as WpFault from wordpress_xmlrpc import Client from wordpress_xmlrpc.methods.users import GetUserInfo except ImportError: pass import urllib from askbot import forms as askbot_forms from askbot.deps.django_authopenid import util from askbot.deps.django_authopenid import decorators from askbot.deps.django_authopenid.models import UserAssociation from askbot.deps.django_authopenid import forms from askbot.deps.django_authopenid.backends import AuthBackend import logging from askbot.utils.forms import get_next_url from askbot.utils.http import get_request_info from askbot.models.signals import user_logged_in, user_registered def create_authenticated_user_account( username=None, email=None, password=None, user_identifier=None, login_provider_name=None ): """creates a user account, user association with the login method and the the default email subscriptions """ user = User.objects.create_user(username, email) user_registered.send(None, user=user) logging.debug('creating new openid user association for %s', username) if password: user.set_password(password) user.save() else: UserAssociation( openid_url = user_identifier, user = user, provider_name = login_provider_name, last_used_timestamp = datetime.datetime.now() ).save() subscribe_form = askbot_forms.SimpleEmailSubscribeForm({'subscribe': 'y'}) subscribe_form.full_clean() logging.debug('saving email feed settings') subscribe_form.save(user) logging.debug('logging the user in') user = authenticate(method='force', user_id=user.id) if user is None: error_message = 'please make sure that ' + \ 'askbot.deps.django_authopenid.backends.AuthBackend' + \ 'is in your settings.AUTHENTICATION_BACKENDS' raise Exception(error_message) return user def cleanup_post_register_session(request): """delete keys from session after registration is complete""" keys = ( 'user_identifier', 'login_provider_name', 'username', 'email', 'password', 'validation_code' ) for key in keys: if key in request.session: del request.session[key] #todo: decouple from askbot def login(request, user): from django.contrib.auth import login as _login # get old session key session_key = request.session.session_key # login and get new session key _login(request, user) # send signal with old session key as argument logging.debug('logged in user %s with session key %s' % (user.username, session_key)) #todo: move to auth app user_logged_in.send( request = request, user = user, session_key=session_key, sender=None ) #todo: uncouple this from askbot def logout(request): from django.contrib.auth import logout as _logout#for login I've added wrapper below - called login _logout(request) def logout_page(request): data = { 'page_class': 'meta', 'have_federated_login_methods': util.have_enabled_federated_login_methods() } return render(request, 'authopenid/logout.html', data) def get_url_host(request): if request.is_secure(): protocol = 'https' else: protocol = 'http' host = escape(request.get_host()) return '%s://%s' % (protocol, host) def get_full_url(request): return get_url_host(request) + request.get_full_path() def ask_openid( request, openid_url, redirect_to, on_failure=None, sreg_request=None ): """ basic function to ask openid and return response """ on_failure = on_failure or signin_failure trust_root = getattr( django_settings, 'OPENID_TRUST_ROOT', get_url_host(request) + '/' ) if xri.identifierScheme(openid_url) == 'XRI' and getattr( django_settings, 'OPENID_DISALLOW_INAMES', False ): msg = _("i-names are not supported") logging.debug('openid failed because i-names are not supported') return on_failure(request, msg) consumer = Consumer(request.session, util.DjangoOpenIDStore()) try: auth_request = consumer.begin(openid_url) except DiscoveryFailure: msg = _(u"OpenID %(openid_url)s is invalid" % {'openid_url':openid_url}) logging.debug(msg) return on_failure(request, msg) logging.debug('openid seemed to work') if sreg_request: logging.debug('adding sreg_request - wtf it is?') auth_request.addExtension(sreg_request) redirect_url = auth_request.redirectURL(trust_root, redirect_to) logging.debug('redirecting to %s' % redirect_url) return HttpResponseRedirect(redirect_url) def complete(request, on_success=None, on_failure=None, return_to=None): """ complete openid signin """ assert(on_success is not None) assert(on_failure is not None) logging.debug('in askbot.deps.django_authopenid.complete') consumer = Consumer(request.session, util.DjangoOpenIDStore()) # make sure params are encoded in utf8 params = dict((k,smart_unicode(v)) for k, v in request.GET.items()) openid_response = consumer.complete(params, return_to) try: logging.debug(u'returned openid parameters were: %s' % unicode(params)) except Exception, e: logging.critical(u'fix logging statement above ' + unicode(e)) if openid_response.status == SUCCESS: logging.debug('openid response status is SUCCESS') return on_success( request, openid_response.identity_url, openid_response ) elif openid_response.status == CANCEL: logging.debug('CANCEL') return on_failure(request, 'The request was canceled') elif openid_response.status == FAILURE: logging.debug('FAILURE') return on_failure(request, openid_response.message) elif openid_response.status == SETUP_NEEDED: logging.debug('SETUP NEEDED') return on_failure(request, 'Setup needed') else: logging.debug('BAD OPENID STATUS') assert False, "Bad openid status: %s" % openid_response.status def not_authenticated(func): """ decorator that redirect user to next page if he/she is already logged in.""" def decorated(request, *args, **kwargs): if request.user.is_authenticated(): return HttpResponseRedirect(get_next_url(request)) return func(request, *args, **kwargs) return decorated def complete_oauth2_signin(request): if 'next_url' in request.session: next_url = request.session['next_url'] del request.session['next_url'] else: next_url = reverse('index') if 'error' in request.GET: return HttpResponseRedirect(reverse('index')) csrf_token = request.GET.get('state', None) if csrf_token is None or csrf_token != request.session.pop('oauth2_csrf_token'): return HttpResponseBadRequest() providers = util.get_enabled_login_providers() provider_name = request.session.pop('provider_name') params = providers[provider_name] assert(params['type'] == 'oauth2') client_id = getattr( askbot_settings, provider_name.upper() + '_KEY' ) client_secret = getattr( askbot_settings, provider_name.upper() + '_SECRET' ) client = OAuth2Client( token_endpoint=params['token_endpoint'], resource_endpoint=params['resource_endpoint'], redirect_uri=askbot_settings.APP_URL + reverse('user_complete_oauth2_signin'), client_id=client_id, client_secret=client_secret ) client.request_token( code=request.GET['code'], parser=params['response_parser'] ) #todo: possibly set additional parameters here user_id = params['get_user_id_function'](client) user = authenticate( oauth_user_id = user_id, provider_name = provider_name, method = 'oauth' ) logging.debug('finalizing oauth signin') request.session['email'] = ''#todo: pull from profile request.session['username'] = ''#todo: pull from profile return finalize_generic_signin( request = request, user = user, user_identifier = user_id, login_provider_name = provider_name, redirect_url = next_url ) def complete_oauth_signin(request): if 'next_url' in request.session: next_url = request.session['next_url'] del request.session['next_url'] else: next_url = reverse('index') if 'denied' in request.GET: return HttpResponseRedirect(next_url) if 'oauth_problem' in request.GET: return HttpResponseRedirect(next_url) try: oauth_token = request.GET['oauth_token'] logging.debug('have token %s' % oauth_token) oauth_verifier = request.GET['oauth_verifier'] logging.debug('have verifier %s' % oauth_verifier) session_oauth_token = request.session['oauth_token'] logging.debug('have token from session') assert(oauth_token == session_oauth_token['oauth_token']) oauth_provider_name = request.session['oauth_provider_name'] logging.debug('have saved provider name') del request.session['oauth_provider_name'] oauth = util.OAuthConnection(oauth_provider_name) user_id = oauth.get_user_id( oauth_token = session_oauth_token, oauth_verifier = oauth_verifier ) logging.debug('have %s user id=%s' % (oauth_provider_name, user_id)) user = authenticate( oauth_user_id = user_id, provider_name = oauth_provider_name, method = 'oauth' ) logging.debug('finalizing oauth signin') request.session['email'] = ''#todo: pull from profile request.session['username'] = ''#todo: pull from profile return finalize_generic_signin( request = request, user = user, user_identifier = user_id, login_provider_name = oauth_provider_name, redirect_url = next_url ) except Exception, e: logging.critical(e) msg = _('Unfortunately, there was some problem when ' 'connecting to %(provider)s, please try again ' 'or use another provider' ) % {'provider': oauth_provider_name} request.user.message_set.create(message = msg) return HttpResponseRedirect(next_url) #@not_authenticated @csrf.csrf_protect def signin(request, template_name='authopenid/signin.html'): """ signin page. It manages the legacy authentification (user/password) and openid authentification url: /signin/ template : authopenid/signin.htm """ logging.debug('in signin view') on_failure = signin_failure #we need a special priority on where to redirect on successful login #here: #1) url parameter "next" - if explicitly set #2) url from django setting LOGIN_REDIRECT_URL #3) home page of the forum login_redirect_url = getattr(django_settings, 'LOGIN_REDIRECT_URL', None) next_url = get_next_url(request, default = login_redirect_url) logging.debug('next url is %s' % next_url) if askbot_settings.ALLOW_ADD_REMOVE_LOGIN_METHODS == False \ and request.user.is_authenticated(): return HttpResponseRedirect(next_url) if next_url == reverse('user_signin'): next_url = '%(next)s?next=%(next)s' % {'next': next_url} login_form = forms.LoginForm(initial = {'next': next_url}) #todo: get next url make it sticky if next is 'user_signin' if request.method == 'POST': login_form = forms.LoginForm(request.POST) if login_form.is_valid(): provider_name = login_form.cleaned_data['login_provider_name'] if login_form.cleaned_data['login_type'] == 'password': password_action = login_form.cleaned_data['password_action'] if askbot_settings.USE_LDAP_FOR_PASSWORD_LOGIN: assert(password_action == 'login') username = login_form.cleaned_data['username'] password = login_form.cleaned_data['password'] user = authenticate( username=username, password=password, method = 'ldap' ) if user: login(request, user) return HttpResponseRedirect(next_url) else: #try to login again via LDAP user_info = ldap_authenticate(username, password) if user_info['success']: if askbot_settings.LDAP_AUTOCREATE_USERS: #create new user or user = ldap_create_user(user_info).user user = authenticate(method='force', user_id=user.id) assert(user is not None) login(request, user) return HttpResponseRedirect(next_url) else: #continue with proper registration ldap_username = user_info['ldap_username'] request.session['email'] = user_info['email'] request.session['ldap_user_info'] = user_info if askbot_settings.AUTOFILL_USER_DATA: request.session['username'] = ldap_username request.session['first_name'] = \ user_info['first_name'] request.session['last_name'] = \ user_info['last_name'] return finalize_generic_signin( request, login_provider_name = 'ldap', user_identifier = ldap_username + '@ldap', redirect_url = next_url ) else: auth_fail_func_path = getattr( django_settings, 'LDAP_AUTHENTICATE_FAILURE_FUNCTION', None ) if auth_fail_func_path: auth_fail_func = load_module(auth_fail_func_path) auth_fail_func(user_info, login_form) else: login_form.set_password_login_error() #return HttpResponseRedirect(request.path) else: if password_action == 'login': user = authenticate( username = login_form.cleaned_data['username'], password = login_form.cleaned_data['password'], provider_name = provider_name, method = 'password' ) if user is None: login_form.set_password_login_error() else: login(request, user) #todo: here we might need to set cookies #for external login sites return HttpResponseRedirect(next_url) elif password_action == 'change_password': if request.user.is_authenticated(): new_password = \ login_form.cleaned_data['new_password'] AuthBackend.set_password( user=request.user, password=new_password, provider_name=provider_name ) request.user.message_set.create( message = _('Your new password saved') ) return HttpResponseRedirect(next_url) else: logging.critical( 'unknown password action %s' % password_action ) raise Http404 elif login_form.cleaned_data['login_type'] == 'openid': #initiate communication process logging.debug('processing signin with openid submission') #todo: make a simple-use wrapper for openid protocol sreg_req = sreg.SRegRequest(optional=['nickname', 'email']) redirect_to = "%s%s?%s" % ( get_url_host(request), reverse('user_complete_signin'), urllib.urlencode({'next':next_url}) ) return ask_openid( request, login_form.cleaned_data['openid_url'], redirect_to, on_failure=signin_failure, sreg_request=sreg_req ) elif login_form.cleaned_data['login_type'] == 'oauth': try: #this url may need to have "next" piggibacked onto connection = util.OAuthConnection( provider_name, callback_url=reverse('user_complete_oauth_signin') ) connection.start() request.session['oauth_token'] = connection.get_token() request.session['oauth_provider_name'] = provider_name request.session['next_url'] = next_url#special case for oauth oauth_url = connection.get_auth_url(login_only=True) return HttpResponseRedirect(oauth_url) except util.OAuthError, e: logging.critical(unicode(e)) msg = _('Unfortunately, there was some problem when ' 'connecting to %(provider)s, please try again ' 'or use another provider' ) % {'provider': provider_name} request.user.message_set.create(message = msg) elif login_form.cleaned_data['login_type'] == 'oauth2': try: csrf_token = generate_random_key(length=32) redirect_url = util.get_oauth2_starter_url(provider_name, csrf_token) request.session['oauth2_csrf_token'] = csrf_token request.session['provider_name'] = provider_name return HttpResponseRedirect(redirect_url) except util.OAuthError, e: logging.critical(unicode(e)) msg = _('Unfortunately, there was some problem when ' 'connecting to %(provider)s, please try again ' 'or use another provider' ) % {'provider': provider_name} request.user.message_set.create(message = msg) elif login_form.cleaned_data['login_type'] == 'wordpress_site': #here wordpress_site means for a self hosted wordpress blog not a wordpress.com blog wp = Client( askbot_settings.WORDPRESS_SITE_URL, login_form.cleaned_data['username'], login_form.cleaned_data['password'] ) try: wp_user = wp.call(GetUserInfo()) custom_wp_openid_url = '%s?user_id=%s' % (wp.url, wp_user.user_id) user = authenticate( method = 'wordpress_site', wordpress_url = wp.url, wp_user_id = wp_user.user_id ) return finalize_generic_signin( request = request, user = user, user_identifier = custom_wp_openid_url, login_provider_name = provider_name, redirect_url = next_url ) except WpFault, e: logging.critical(unicode(e)) msg = _('The login password combination was not correct') request.user.message_set.create(message = msg) else: #raise 500 error - unknown login type pass else: logging.debug('login form is not valid') logging.debug(login_form.errors) logging.debug(request.REQUEST) if request.method == 'GET' and request.user.is_authenticated(): view_subtype = 'change_openid' else: view_subtype = 'default' return show_signin_view( request, login_form = login_form, view_subtype = view_subtype, template_name=template_name ) @csrf.csrf_protect def show_signin_view( request, login_form = None, account_recovery_form = None, account_recovery_message = None, sticky = False, view_subtype = 'default', template_name='authopenid/signin.html' ): """url-less utility function that populates context of template 'authopenid/signin.html' and returns its rendered output """ allowed_subtypes = ( 'default', 'add_openid', 'email_sent', 'change_openid', 'bad_key' ) assert(view_subtype in allowed_subtypes) if sticky: next_url = reverse('user_signin') else: next_url = get_next_url(request) if login_form is None: login_form = forms.LoginForm(initial = {'next': next_url}) if account_recovery_form is None: account_recovery_form = forms.AccountRecoveryForm()#initial = initial_data) #if request is GET if request.method == 'GET': logging.debug('request method was GET') #todo: this sthuff must be executed on some signal #because askbot should have nothing to do with the login app from askbot.models import AnonymousQuestion as AQ session_key = request.session.session_key logging.debug('retrieving anonymously posted question associated with session %s' % session_key) qlist = AQ.objects.filter(session_key=session_key).order_by('-added_at') if len(qlist) > 0: question = qlist[0] else: question = None from askbot.models import AnonymousAnswer as AA session_key = request.session.session_key logging.debug('retrieving posted answer associated with session %s' % session_key) alist = AA.objects.filter(session_key=session_key).order_by('-added_at') if len(alist) > 0: answer = alist[0] else: answer = None if request.user.is_authenticated(): existing_login_methods = UserAssociation.objects.filter(user = request.user) #annotate objects with extra data providers = util.get_enabled_login_providers() for login_method in existing_login_methods: try: provider_data = providers[login_method.provider_name] if provider_data['type'] == 'password': #only external password logins will not be deletable #this is because users with those can lose access to their accounts permanently login_method.is_deletable = provider_data.get('password_changeable', False) else: login_method.is_deletable = True except KeyError: logging.critical( 'login method %s is no longer available ' 'please delete records for this login method ' 'from the UserAssociation table', login_method.provider_name ) continue if view_subtype == 'default': page_title = _('Please click any of the icons below to sign in') elif view_subtype == 'email_sent': page_title = _('Account recovery email sent') elif view_subtype == 'change_openid': if len(existing_login_methods) == 0: page_title = _('Please add one or more login methods.') else: page_title = _('If you wish, please add, remove or re-validate your login methods') elif view_subtype == 'add_openid': page_title = _('Please wait a second! Your account is recovered, but ...') elif view_subtype == 'bad_key': page_title = _('Sorry, this account recovery key has expired or is invalid') logging.debug('showing signin view') data = { 'page_class': 'openid-signin', 'view_subtype': view_subtype, #add_openid|default 'page_title': page_title, 'question':question, 'answer':answer, 'login_form': login_form, 'use_password_login': util.use_password_login(), 'account_recovery_form': account_recovery_form, 'openid_error_message': request.REQUEST.get('msg',''), 'account_recovery_message': account_recovery_message, 'use_password_login': util.use_password_login(), } major_login_providers = util.get_enabled_major_login_providers() minor_login_providers = util.get_enabled_minor_login_providers() #determine if we are only using password login active_provider_names = [p['name'] for p in major_login_providers.values()] active_provider_names.extend([p['name'] for p in minor_login_providers.values()]) have_buttons = True if (len(active_provider_names) == 1 and active_provider_names[0] == 'local'): if askbot_settings.SIGNIN_ALWAYS_SHOW_LOCAL_LOGIN == True: #in this case the form is not using javascript, so set initial values #here have_buttons = False login_form.initial['login_provider_name'] = 'local' if request.user.is_authenticated(): login_form.initial['password_action'] = 'change_password' else: login_form.initial['password_action'] = 'login' data['have_buttons'] = have_buttons if request.user.is_authenticated(): data['existing_login_methods'] = existing_login_methods active_provider_names = [ item.provider_name for item in existing_login_methods ] util.set_login_provider_tooltips( major_login_providers, active_provider_names = active_provider_names ) util.set_login_provider_tooltips( minor_login_providers, active_provider_names = active_provider_names ) data['major_login_providers'] = major_login_providers.values() data['minor_login_providers'] = minor_login_providers.values() return render(request, template_name, data) @login_required def delete_login_method(request): if askbot_settings.ALLOW_ADD_REMOVE_LOGIN_METHODS == False: raise Http404 if request.is_ajax() and request.method == 'POST': provider_name = request.POST['provider_name'] try: login_method = UserAssociation.objects.get( user = request.user, provider_name = provider_name ) login_method.delete() return HttpResponse('', mimetype = 'application/json') except UserAssociation.DoesNotExist: #error response message = _('Login method %(provider_name)s does not exist') return HttpResponse(message, status=500, mimetype = 'application/json') except UserAssociation.MultipleObjectsReturned: logging.critical( 'have multiple %(provider)s logins for user %(id)s' ) % {'provider':provider_name, 'id': request.user.id} message = _('Oops, sorry - there was some error - please try again') return HttpResponse(message, status=500, mimetype = 'application/json') else: raise Http404 def complete_signin(request): """ in case of complete signin with openid """ logging.debug('')#blank log just for the trace return complete( request, on_success = signin_success, on_failure = signin_failure, return_to = get_url_host(request) + reverse('user_complete_signin') ) def signin_success(request, identity_url, openid_response): """ this is not a view, has no url pointing to this this function is called when OpenID provider returns successful response to user authentication Does actual authentication in Django site and redirects to the registration page, if necessary or adds another login method. """ logging.debug('') openid_data = util.from_openid_response(openid_response) #create janrain OpenID object request.session['openid'] = openid_data openid_url = str(openid_data) user = authenticate( openid_url = openid_url, method = 'openid' ) next_url = get_next_url(request) provider_name = util.get_provider_name(openid_url) request.session['email'] = openid_data.sreg.get('email', '') request.session['username'] = openid_data.sreg.get('nickname', '') return finalize_generic_signin( request = request, user = user, user_identifier = openid_url, login_provider_name = provider_name, redirect_url = next_url ) def finalize_generic_signin( request = None, user = None, login_provider_name = None, user_identifier = None, redirect_url = None ): """non-view function generic signin, run after all protocol-dependent details have been resolved """ if request.user.is_authenticated(): #this branch is for adding a new association if user is None: try: #see if currently logged in user has login with the given provider assoc = UserAssociation.objects.get( user=request.user, provider_name=login_provider_name ) logging.critical('switching account or open id changed???') #did openid url change? or we are dealing with a brand new open id? message1 = _( 'If you are trying to sign in to another account, ' 'please sign out first.' ) request.user.message_set.create(message=message1) message2 = _( 'Otherwise, please report the incident ' 'to the site administrator.' ) request.user.message_set.create(message=message2) return HttpResponseRedirect(redirect_url) except UserAssociation.DoesNotExist: #register new association UserAssociation( user=request.user, provider_name=login_provider_name, openid_url=user_identifier, last_used_timestamp=datetime.datetime.now() ).save() return HttpResponseRedirect(redirect_url) elif user != request.user: #prevent theft of account by another pre-existing user logging.critical( 'possible account theft attempt by %s,%d to %s %d' % \ ( request.user.username, request.user.id, user.username, user.id ) ) logout(request)#log out current user login(request, user)#login freshly authenticated user return HttpResponseRedirect(redirect_url) else: #user just checks if another login still works msg = _('Your %(provider)s login works fine') % \ {'provider': login_provider_name} request.user.message_set.create(message = msg) return HttpResponseRedirect(redirect_url) elif user: #login branch login(request, user) logging.debug('login success') return HttpResponseRedirect(redirect_url) else: #need to register request.method = 'GET'#this is not a good thing to do #but necessary at the moment to reuse the register() #method return register( request, login_provider_name=login_provider_name, user_identifier=user_identifier ) @not_authenticated @csrf.csrf_protect def register(request, login_provider_name=None, user_identifier=None): """ this function is used via it's own url with request.method=POST or as a simple function call from "finalize_generic_signin" in which case request.method must ge 'GET' and login_provider_name and user_identifier arguments must not be None user_identifier will be stored in the UserAssociation as openid_url login_provider_name - as provider_name this function may need to be refactored to simplify the usage pattern template : authopenid/complete.html """ logging.debug('') next_url = get_next_url(request) user = None username = request.session.get('username', '') email = request.session.get('email', '') logging.debug('request method is %s' % request.method) form_class = forms.get_registration_form_class() register_form = form_class( initial={ 'next': next_url, 'username': request.session.get('username', ''), 'email': request.session.get('email', ''), } ) if request.method == 'GET': assert(login_provider_name is not None) assert(user_identifier is not None) #store this data into the session #to persist for the post request request.session['login_provider_name'] = login_provider_name request.session['user_identifier'] = user_identifier elif request.method == 'POST': if 'login_provider_name' not in request.session \ or 'user_identifier' not in request.session: logging.critical('illegal attempt to register') return HttpResponseRedirect(reverse('user_signin')) #load this data from the session user_identifier = request.session['user_identifier'] login_provider_name = request.session['login_provider_name'] logging.debug('trying to create new account associated with openid') form_class = forms.get_registration_form_class() register_form = form_class(request.POST) if not register_form.is_valid(): logging.debug('registration form is INVALID') else: username = register_form.cleaned_data['username'] email = register_form.cleaned_data['email'] if 'ldap_user_info' in request.session: user_info = request.session['ldap_user_info'] #we take this info from the user input where #they can override the default provided by LDAP user_info['django_username'] = username user_info['email'] = email user = ldap_create_user(user_info).user user = authenticate(user_id=user.id, method='force') del request.session['ldap_user_info'] login(request, user) cleanup_post_register_session(request) return HttpResponseRedirect(next_url) elif askbot_settings.REQUIRE_VALID_EMAIL_FOR == 'nothing': user = create_authenticated_user_account( username=username, email=email, user_identifier=user_identifier, login_provider_name=login_provider_name, ) login(request, user) cleanup_post_register_session(request) return HttpResponseRedirect(next_url) else: request.session['username'] = username request.session['email'] = email key = generate_random_key() email = request.session['email'] send_email_key(email, key, handler_url_name='verify_email_and_register') request.session['validation_code'] = key redirect_url = reverse('verify_email_and_register') + '?next=' + next_url return HttpResponseRedirect(redirect_url) providers = { 'yahoo':'Yahoo!', 'flickr':'flickr™', 'google':'Google™', 'aol':'AOL', 'myopenid':'MyOpenID', } if login_provider_name not in providers: provider_logo = login_provider_name logging.error('openid provider named "%s" has no pretty customized logo' % login_provider_name) else: provider_logo = providers[login_provider_name] logging.debug('printing authopenid/complete.html output') data = { 'openid_register_form': register_form, 'default_form_action': django_settings.LOGIN_URL, 'provider':mark_safe(provider_logo), 'username': username, 'email': email, 'login_type':'openid', 'gravatar_faq_url':reverse('faq') + '#gravatar', } return render(request, 'authopenid/complete.html', data) def signin_failure(request, message): """ falure with openid signin. Go back to signin page. """ request.user.message_set.create(message = message) return show_signin_view(request) @not_authenticated @csrf.csrf_protect def verify_email_and_register(request): """for POST request - check the validation code, and if correct - create an account an log in the user for GET - give a field to paste the activation code and a button to send another validation email. """ presented_code = request.REQUEST.get('validation_code', None) if presented_code: try: #we get here with post if button is pushed #or with "get" if emailed link is clicked expected_code = request.session['validation_code'] assert(presented_code == expected_code) #create an account! username = request.session['username'] email = request.session['email'] password = request.session.get('password', None) user_identifier = request.session.get('user_identifier', None) login_provider_name = request.session.get('login_provider_name', None) if password: user = create_authenticated_user_account( username=username, email=email, password=password, ) elif user_identifier and login_provider_name: user = create_authenticated_user_account( username=username, email=email, user_identifier=user_identifier, login_provider_name=login_provider_name, ) else: raise NotImplementedError() login(request, user) cleanup_post_register_session(request) return HttpResponseRedirect(get_next_url(request)) except Exception, e: message = _( 'Sorry, registration failed. ' 'Please ask the site administrator for help.' ) request.user.message_set.create(message=message) return HttpResponseRedirect(reverse('index')) else: data = {'page_class': 'validate-email-page'} return render(request, 'authopenid/verify_email.html', data) @not_authenticated @decorators.valid_password_login_provider_required @csrf.csrf_protect @fix_recaptcha_remote_ip def signup_with_password(request): """Create a password-protected account template: authopenid/signup_with_password.html """ logging.debug(get_request_info(request)) login_form = forms.LoginForm(initial = {'next': get_next_url(request)}) #this is safe because second decorator cleans this field provider_name = request.REQUEST['login_provider'] if askbot_settings.USE_RECAPTCHA: RegisterForm = forms.SafeClassicRegisterForm else: RegisterForm = forms.ClassicRegisterForm logging.debug('request method was %s' % request.method) if request.method == 'POST': form = RegisterForm(request.POST) #validation outside if to remember form values logging.debug('validating classic register form') form1_is_valid = form.is_valid() if form1_is_valid: logging.debug('classic register form validated') else: logging.debug('classic register form is not valid') if form1_is_valid: logging.debug('both forms are valid') next = form.cleaned_data['next'] username = form.cleaned_data['username'] password = form.cleaned_data['password1'] email = form.cleaned_data['email'] if askbot_settings.REQUIRE_VALID_EMAIL_FOR == 'nothing': user = create_authenticated_user_account( username=username, email=email, password=password, ) login(request, user) cleanup_post_register_session(request) return HttpResponseRedirect(get_next_url(request)) else: request.session['username'] = username request.session['email'] = email request.session['password'] = password #todo: generate a key and save it in the session key = generate_random_key() email = request.session['email'] send_email_key(email, key, handler_url_name='verify_email_and_register') request.session['validation_code'] = key redirect_url = reverse('verify_email_and_register') + \ '?next=' + get_next_url(request) return HttpResponseRedirect(redirect_url) else: #todo: this can be solved with a decorator, maybe form.initial['login_provider'] = provider_name logging.debug('create classic account forms were invalid') else: #todo: here we have duplication of get_password_login_provider... form = RegisterForm( initial={ 'next': get_next_url(request), 'login_provider': provider_name } ) logging.debug('printing legacy signup form') major_login_providers = util.get_enabled_major_login_providers() minor_login_providers = util.get_enabled_minor_login_providers() context_data = { 'form': form, 'page_class': 'openid-signin', 'major_login_providers': major_login_providers.values(), 'minor_login_providers': minor_login_providers.values(), 'login_form': login_form } return render( request, 'authopenid/signup_with_password.html', context_data ) #what if request is not posted? @login_required def signout(request): """ signout from the website. Remove openid from session and kill it. url : /signout/" """ logging.debug('') try: logging.debug('deleting openid session var') del request.session['openid'] except KeyError: logging.debug('failed') pass logout(request) logging.debug('user logged out') return HttpResponseRedirect(get_next_url(request)) XRDF_TEMPLATE = """ http://specs.openid.net/auth/2.0/return_to %(return_to)s """ def xrdf(request): url_host = get_url_host(request) return_to = "%s%s" % (url_host, reverse('user_complete_signin')) return HttpResponse(XRDF_TEMPLATE % {'return_to': return_to}) def set_new_email(user, new_email): if new_email != user.email: user.email = new_email user.email_isvalid = False user.save() def send_email_key(email, key, handler_url_name='user_account_recover'): """private function. sends email containing validation key to user's email address """ subject = _("Recover your %(site)s account") % \ {'site': askbot_settings.APP_SHORT_NAME} url = urlparse(askbot_settings.APP_URL) data = { 'validation_link': url.scheme + '://' + url.netloc + \ reverse(handler_url_name) +\ '?validation_code=' + key } template = get_template('authopenid/email_validation.html') message = template.render(data)#todo: inject language preference send_mail(subject, message, django_settings.DEFAULT_FROM_EMAIL, [email]) def send_user_new_email_key(user): user.email_key = generate_random_key() user.save() send_email_key(user.email, user.email_key) def account_recover(request): """view similar to send_email_key, except it allows user to recover an account by entering his/her email address this view will both - send the recover link and process it url name 'user_account_recover' """ if not askbot_settings.ALLOW_ACCOUNT_RECOVERY_BY_EMAIL: raise Http404 if request.method == 'POST': form = forms.AccountRecoveryForm(request.POST) if form.is_valid(): user = form.cleaned_data['user'] send_user_new_email_key(user) message = _( 'Please check your email and visit the enclosed link.' ) return show_signin_view( request, account_recovery_message = message, view_subtype = 'email_sent' ) else: return show_signin_view( request, account_recovery_form = form ) else: key = request.GET.get('validation_code', None) if key is None: return HttpResponseRedirect(reverse('user_signin')) user = authenticate(email_key = key, method = 'email') if user: if request.user.is_authenticated(): if user != request.user: logout(request) login(request, user) else: login(request, user) #need to show "sticky" signin view here return show_signin_view( request, view_subtype = 'add_openid', sticky = True ) else: return show_signin_view(request, view_subtype = 'bad_key') #internal server view used as return value by other views def validation_email_sent(request): """this function is called only if EMAIL_VALIDATION setting is set to True bolean value, basically dead now""" assert(askbot_settings.EMAIL_VALIDATION == True) logging.debug('') data = { 'email': request.user.email, 'change_email_url': reverse('user_changeemail'), 'action_type': 'validate' } return render(request, 'authopenid/changeemail.html', data)