1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
|
# -*- coding: utf-8 -*-
# Copyright (c) 2007, 2008, Benoît Chesneau
#
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
#
# * Redistributions of source code must retain the above copyright
# * notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above copyright
# * notice, this list of conditions and the following disclaimer in the
# * documentation and/or other materials provided with the
# * distribution. Neither the name of the <ORGANIZATION> nor the names
# * of its contributors may be used to endorse or promote products
# * derived from this software without specific prior written
# * permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
# IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
# EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
# OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
from django import forms
from django.contrib.auth.models import User
from django.contrib.auth import authenticate
from django.utils.translation import ugettext as _
from django.conf import settings
import types
import re
from django.utils.safestring import mark_safe
from recaptcha_django import ReCaptchaField
from forum.utils.forms import NextUrlField, UserNameField, UserEmailField, SetPasswordForm
EXTERNAL_LOGIN_APP = settings.LOAD_EXTERNAL_LOGIN_APP()
# needed for some linux distributions like debian
try:
from openid.yadis import xri
except ImportError:
from yadis import xri
from forum.utils.forms import clean_next
from django_authopenid.models import ExternalLoginData
__all__ = ['OpenidSigninForm', 'ClassicLoginForm', 'OpenidVerifyForm',
'OpenidRegisterForm', 'ClassicRegisterForm', 'ChangePasswordForm',
'ChangeEmailForm', 'EmailPasswordForm', 'DeleteForm',
'ChangeOpenidForm']
class OpenidSigninForm(forms.Form):
""" signin form """
openid_url = forms.CharField(max_length=255, widget=forms.widgets.TextInput(attrs={'class': 'openid-login-input', 'size':80}))
next = NextUrlField()
def clean_openid_url(self):
""" test if openid is accepted """
if 'openid_url' in self.cleaned_data:
openid_url = self.cleaned_data['openid_url']
if xri.identifierScheme(openid_url) == 'XRI' and getattr(
settings, 'OPENID_DISALLOW_INAMES', False
):
raise forms.ValidationError(_('i-names are not supported'))
return self.cleaned_data['openid_url']
class ClassicLoginForm(forms.Form):
""" legacy account signin form """
next = NextUrlField()
username = UserNameField(required=False,skip_clean=True)
password = forms.CharField(max_length=128,
widget=forms.widgets.PasswordInput(attrs={'class':'required login'}),
required=False)
def __init__(self, data=None, files=None, auto_id='id_%s',
prefix=None, initial=None):
super(ClassicLoginForm, self).__init__(data, files, auto_id,
prefix, initial)
self.user_cache = None
def _clean_nonempty_field(self,field):
value = None
if field in self.cleaned_data:
value = str(self.cleaned_data[field]).strip()
if value == '':
value = None
self.cleaned_data[field] = value
return value
def clean_username(self):
return self._clean_nonempty_field('username')
def clean_password(self):
return self._clean_nonempty_field('password')
def clean(self):
"""
this clean function actually cleans username and password
test if password is valid for this username
this is really the "authenticate" function
also openid_auth is not an authentication backend
since it's written in a way that does not comply with
the Django convention
"""
error_list = []
username = self.cleaned_data['username']
password = self.cleaned_data['password']
self.user_cache = None
if username and password:
if settings.USE_EXTERNAL_LEGACY_LOGIN == True:
pw_ok = False
try:
pw_ok = EXTERNAL_LOGIN_APP.api.check_password(username,password)
except forms.ValidationError, e:
error_list.extend(e.messages)
if pw_ok:
external_user = ExternalLoginData.objects.get(external_username=username)
if external_user.user == None:
return self.cleaned_data
user = external_user.user
openid_logins = user.userassociation_set.all()
if len(openid_logins) > 0:
msg1 = _('Account with this name already exists on the forum')
msg2 = _('can\'t have two logins to the same account yet, sorry.')
error_list.append(msg1)
error_list.append(msg2)
self._errors['__all__'] = forms.util.ErrorList(error_list)
return self.cleaned_data
else:
#synchronize password with external login
user.set_password(password)
user.save()
#this auth will always succeed
self.user_cache = authenticate(username=user.username,\
password=password)
else:
#keep self.user_cache == None
#nothing to do, error message will be set below
pass
else:
self.user_cache = authenticate(username=username, password=password)
if self.user_cache is None:
del self.cleaned_data['username']
del self.cleaned_data['password']
error_list.insert(0,(_("Please enter valid username and password "
"(both are case-sensitive).")))
elif self.user_cache.is_active == False:
error_list.append(_("This account is inactive."))
if len(error_list) > 0:
error_list.insert(0,_('Login failed.'))
elif password == None and username == None:
error_list.append(_('Please enter username and password'))
elif password == None:
error_list.append(_('Please enter your password'))
elif username == None:
error_list.append(_('Please enter user name'))
if len(error_list) > 0:
self._errors['__all__'] = forms.util.ErrorList(error_list)
return self.cleaned_data
def get_user(self):
""" get authenticated user """
return self.user_cache
class OpenidRegisterForm(forms.Form):
""" openid signin form """
next = NextUrlField()
username = UserNameField()
email = UserEmailField()
class OpenidVerifyForm(forms.Form):
""" openid verify form (associate an openid with an account) """
next = NextUrlField()
username = UserNameField(must_exist=True)
password = forms.CharField(max_length=128,
widget=forms.widgets.PasswordInput(attrs={'class':'required login'}))
def __init__(self, data=None, files=None, auto_id='id_%s',
prefix=None, initial=None):
super(OpenidVerifyForm, self).__init__(data, files, auto_id,
prefix, initial)
self.user_cache = None
def clean_password(self):
""" test if password is valid for this user """
if 'username' in self.cleaned_data and \
'password' in self.cleaned_data:
self.user_cache = authenticate(
username = self.cleaned_data['username'],
password = self.cleaned_data['password']
)
if self.user_cache is None:
raise forms.ValidationError(_("Please enter a valid \
username and password. Note that both fields are \
case-sensitive."))
elif self.user_cache.is_active == False:
raise forms.ValidationError(_("This account is inactive."))
return self.cleaned_data['password']
def get_user(self):
""" get authenticated user """
return self.user_cache
class ClassicRegisterForm(SetPasswordForm):
""" legacy registration form """
next = NextUrlField()
username = UserNameField()
email = UserEmailField()
#fields password1 and password2 are inherited
recaptcha = ReCaptchaField()
class ChangePasswordForm(SetPasswordForm):
""" change password form """
oldpw = forms.CharField(widget=forms.PasswordInput(attrs={'class':'required'}),
label=mark_safe(_('Current password')))
def __init__(self, data=None, user=None, *args, **kwargs):
if user is None:
raise TypeError("Keyword argument 'user' must be supplied")
super(ChangePasswordForm, self).__init__(data, *args, **kwargs)
self.user = user
def clean_oldpw(self):
""" test old password """
if not self.user.check_password(self.cleaned_data['oldpw']):
raise forms.ValidationError(_("Old password is incorrect. \
Please enter the correct password."))
return self.cleaned_data['oldpw']
class ChangeEmailForm(forms.Form):
""" change email form """
email = UserEmailField(skip_clean=True)
def __init__(self, data=None, files=None, auto_id='id_%s', prefix=None, \
initial=None, user=None):
super(ChangeEmailForm, self).__init__(data, files, auto_id,
prefix, initial)
self.user = user
def clean_email(self):
""" check if email don't exist """
if 'email' in self.cleaned_data:
if settings.EMAIL_UNIQUE == True:
try:
user = User.objects.get(email = self.cleaned_data['email'])
if self.user and self.user == user:
return self.cleaned_data['email']
except User.DoesNotExist:
return self.cleaned_data['email']
except User.MultipleObjectsReturned:
raise forms.ValidationError(u'There is already more than one \
account registered with that e-mail address. Please try \
another.')
raise forms.ValidationError(u'This email is already registered \
in our database. Please choose another.')
else:
return self.cleaned_data['email']
class ChangeopenidForm(forms.Form):
""" change openid form """
openid_url = forms.CharField(max_length=255,
widget=forms.TextInput(attrs={'class': "required" }))
def __init__(self, data=None, user=None, *args, **kwargs):
if user is None:
raise TypeError("Keyword argument 'user' must be supplied")
super(ChangeopenidForm, self).__init__(data, *args, **kwargs)
self.user = user
class DeleteForm(forms.Form):
""" confirm form to delete an account """
confirm = forms.CharField(widget=forms.CheckboxInput(attrs={'class':'required'}))
password = forms.CharField(widget=forms.PasswordInput(attrs={'class':'required'}))
def __init__(self, data=None, files=None, auto_id='id_%s',
prefix=None, initial=None, user=None):
super(DeleteForm, self).__init__(data, files, auto_id, prefix, initial)
self.test_openid = False
self.user = user
def clean_password(self):
""" check if we have to test a legacy account or not """
if 'password' in self.cleaned_data:
if not self.user.check_password(self.cleaned_data['password']):
self.test_openid = True
return self.cleaned_data['password']
class EmailPasswordForm(forms.Form):
""" send new password form """
username = UserNameField(skip_clean=True,label=mark_safe(_('Your user name (<i>required</i>)')))
def __init__(self, data=None, files=None, auto_id='id_%s', prefix=None,
initial=None):
super(EmailPasswordForm, self).__init__(data, files, auto_id,
prefix, initial)
self.user_cache = None
def clean_username(self):
""" get user for this username """
if 'username' in self.cleaned_data:
try:
self.user_cache = User.objects.get(
username = self.cleaned_data['username'])
except:
raise forms.ValidationError(_("Incorrect username."))
return self.cleaned_data['username']
|