2022-12-17 16:02:42 -08:00
|
|
|
import markdown_it
|
2022-11-17 18:16:34 -08:00
|
|
|
from django import forms
|
2022-11-18 07:28:15 -08:00
|
|
|
from django.conf import settings
|
2022-12-15 15:23:54 -08:00
|
|
|
from django.contrib.auth.forms import AuthenticationForm
|
2022-11-17 18:16:34 -08:00
|
|
|
from django.contrib.auth.password_validation import validate_password
|
2022-11-05 13:17:27 -07:00
|
|
|
from django.contrib.auth.views import LoginView, LogoutView
|
2022-12-21 23:03:21 -08:00
|
|
|
from django.http import Http404
|
2022-11-17 18:16:34 -08:00
|
|
|
from django.shortcuts import get_object_or_404, render
|
2022-12-17 16:02:42 -08:00
|
|
|
from django.utils.safestring import mark_safe
|
2022-12-15 15:23:54 -08:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
2022-11-17 18:16:34 -08:00
|
|
|
from django.views.generic import FormView
|
|
|
|
|
2022-11-17 23:09:04 -08:00
|
|
|
from core.models import Config
|
|
|
|
from users.models import Invite, PasswordReset, User
|
2022-11-05 13:17:27 -07:00
|
|
|
|
|
|
|
|
|
|
|
class Login(LoginView):
|
2022-12-15 15:23:54 -08:00
|
|
|
class form_class(AuthenticationForm):
|
|
|
|
error_messages = {
|
|
|
|
"invalid_login": _("No account was found with that email and password."),
|
|
|
|
"inactive": _("This account is inactive."),
|
|
|
|
}
|
2022-11-05 13:17:27 -07:00
|
|
|
|
|
|
|
template_name = "auth/login.html"
|
|
|
|
|
|
|
|
|
|
|
|
class Logout(LogoutView):
|
|
|
|
pass
|
2022-11-17 18:16:34 -08:00
|
|
|
|
|
|
|
|
|
|
|
class Signup(FormView):
|
|
|
|
|
|
|
|
template_name = "auth/signup.html"
|
|
|
|
|
|
|
|
class form_class(forms.Form):
|
|
|
|
|
|
|
|
email = forms.EmailField(
|
2022-12-22 13:06:35 -08:00
|
|
|
help_text="We will send a link to this email to create your account.",
|
2022-11-17 18:16:34 -08:00
|
|
|
)
|
|
|
|
|
2022-11-17 23:09:04 -08:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
super().__init__(*args, **kwargs)
|
2022-12-05 18:21:00 -08:00
|
|
|
# Add the policies if they're defined
|
|
|
|
policies = []
|
|
|
|
if Config.system.policy_rules:
|
|
|
|
policies.append("<a href='/pages/rules/'>Server Rules</a>")
|
|
|
|
if Config.system.policy_terms:
|
|
|
|
policies.append("<a href='/pages/terms/'>Terms of Service</a>")
|
|
|
|
if Config.system.policy_privacy:
|
|
|
|
policies.append("<a href='/pages/privacy/'>Privacy Policy</a>")
|
|
|
|
if policies:
|
|
|
|
links = ""
|
|
|
|
for i, policy in enumerate(policies):
|
|
|
|
if i == 0:
|
|
|
|
links += policy
|
|
|
|
elif i == len(policies) - 1:
|
|
|
|
if len(policies) > 2:
|
|
|
|
links += ", and "
|
|
|
|
else:
|
|
|
|
links += " and "
|
|
|
|
links += policy
|
|
|
|
else:
|
|
|
|
links += ", "
|
|
|
|
links += policy
|
|
|
|
self.fields["policy"] = forms.BooleanField(
|
|
|
|
label="Policies",
|
|
|
|
help_text=f"Have you read the {links}, and agree to them?",
|
|
|
|
widget=forms.Select(
|
|
|
|
choices=[(False, "I do not agree"), (True, "I agree")]
|
|
|
|
),
|
|
|
|
)
|
2022-11-17 23:09:04 -08:00
|
|
|
|
2022-11-17 18:16:34 -08:00
|
|
|
def clean_email(self):
|
|
|
|
email = self.cleaned_data.get("email").lower()
|
|
|
|
if not email:
|
|
|
|
return
|
|
|
|
if User.objects.filter(email=email).exists():
|
|
|
|
raise forms.ValidationError("This email already has an account")
|
|
|
|
return email
|
|
|
|
|
2022-12-21 23:03:21 -08:00
|
|
|
def dispatch(self, request, token=None, *args, **kwargs):
|
|
|
|
if token:
|
|
|
|
self.invite = get_object_or_404(Invite, token=token)
|
|
|
|
if not self.invite.valid:
|
|
|
|
raise Http404()
|
|
|
|
else:
|
|
|
|
self.invite = None
|
|
|
|
return super().dispatch(request, *args, **kwargs)
|
2022-11-20 15:03:09 -08:00
|
|
|
|
2022-11-17 18:16:34 -08:00
|
|
|
def form_valid(self, form):
|
2022-12-21 23:03:21 -08:00
|
|
|
# Don't allow anything if there's no invite and no signup allowed
|
|
|
|
if not Config.system.signup_allowed and not self.invite:
|
|
|
|
return self.render_to_response(self.get_context_data())
|
|
|
|
# Make the new user
|
2022-11-17 18:16:34 -08:00
|
|
|
user = User.objects.create(email=form.cleaned_data["email"])
|
2022-11-18 07:28:15 -08:00
|
|
|
# Auto-promote the user to admin if that setting is set
|
|
|
|
if settings.AUTO_ADMIN_EMAIL and user.email == settings.AUTO_ADMIN_EMAIL:
|
|
|
|
user.admin = True
|
|
|
|
user.save()
|
2022-11-17 18:16:34 -08:00
|
|
|
PasswordReset.create_for_user(user)
|
2022-12-21 23:03:21 -08:00
|
|
|
# Drop invite uses down if it has them
|
|
|
|
if self.invite and self.invite.uses is not None:
|
|
|
|
self.invite.uses -= 1
|
|
|
|
if self.invite.uses <= 0:
|
|
|
|
self.invite.delete()
|
|
|
|
else:
|
|
|
|
self.invite.save()
|
2022-11-17 18:16:34 -08:00
|
|
|
return render(
|
|
|
|
self.request,
|
|
|
|
"auth/signup_success.html",
|
|
|
|
{"email": user.email},
|
|
|
|
)
|
|
|
|
|
2022-12-17 16:02:42 -08:00
|
|
|
def get_context_data(self, **kwargs):
|
|
|
|
context = super().get_context_data(**kwargs)
|
2022-12-21 23:03:21 -08:00
|
|
|
if not Config.system.signup_allowed and not self.invite:
|
|
|
|
del context["form"]
|
2022-12-17 16:02:42 -08:00
|
|
|
if Config.system.signup_text:
|
|
|
|
context["signup_text"] = mark_safe(
|
|
|
|
markdown_it.MarkdownIt().render(Config.system.signup_text)
|
|
|
|
)
|
|
|
|
return context
|
|
|
|
|
2022-11-17 18:16:34 -08:00
|
|
|
|
2022-11-17 18:36:25 -08:00
|
|
|
class TriggerReset(FormView):
|
2022-11-17 18:16:34 -08:00
|
|
|
|
2022-11-17 18:36:25 -08:00
|
|
|
template_name = "auth/trigger_reset.html"
|
|
|
|
|
|
|
|
class form_class(forms.Form):
|
|
|
|
|
|
|
|
email = forms.EmailField(
|
|
|
|
help_text="We will send a reset link to this email",
|
|
|
|
)
|
|
|
|
|
|
|
|
def clean_email(self):
|
|
|
|
email = self.cleaned_data.get("email").lower()
|
|
|
|
if not email:
|
|
|
|
return
|
|
|
|
if not User.objects.filter(email=email).exists():
|
|
|
|
raise forms.ValidationError("This email does not have an account")
|
|
|
|
return email
|
|
|
|
|
|
|
|
def form_valid(self, form):
|
|
|
|
PasswordReset.create_for_user(
|
|
|
|
User.objects.get(email=form.cleaned_data["email"])
|
|
|
|
)
|
|
|
|
return render(
|
|
|
|
self.request,
|
|
|
|
"auth/trigger_reset_success.html",
|
|
|
|
{"email": form.cleaned_data["email"]},
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class PerformReset(FormView):
|
|
|
|
|
|
|
|
template_name = "auth/perform_reset.html"
|
2022-11-17 18:16:34 -08:00
|
|
|
|
|
|
|
class form_class(forms.Form):
|
|
|
|
|
|
|
|
password = forms.CharField(
|
|
|
|
widget=forms.PasswordInput,
|
|
|
|
help_text="Must be at least 8 characters, and contain both letters and numbers.",
|
|
|
|
)
|
|
|
|
|
|
|
|
repeat_password = forms.CharField(
|
|
|
|
widget=forms.PasswordInput,
|
|
|
|
)
|
|
|
|
|
|
|
|
def clean_password(self):
|
|
|
|
password = self.cleaned_data["password"]
|
|
|
|
validate_password(password)
|
|
|
|
return password
|
|
|
|
|
|
|
|
def clean_repeat_password(self):
|
|
|
|
if self.cleaned_data.get("password") != self.cleaned_data.get(
|
|
|
|
"repeat_password"
|
|
|
|
):
|
|
|
|
raise forms.ValidationError("Passwords do not match")
|
|
|
|
return self.cleaned_data.get("repeat_password")
|
|
|
|
|
|
|
|
def dispatch(self, request, token):
|
|
|
|
self.reset = get_object_or_404(PasswordReset, token=token)
|
|
|
|
return super().dispatch(request)
|
|
|
|
|
|
|
|
def form_valid(self, form):
|
|
|
|
self.reset.user.set_password(form.cleaned_data["password"])
|
|
|
|
self.reset.user.save()
|
|
|
|
self.reset.delete()
|
|
|
|
return render(
|
|
|
|
self.request,
|
2022-11-17 18:36:25 -08:00
|
|
|
"auth/perform_reset_success.html",
|
2022-11-17 18:16:34 -08:00
|
|
|
{"email": self.reset.user.email},
|
|
|
|
)
|
|
|
|
|
|
|
|
def get_context_data(self, *args, **kwargs):
|
|
|
|
context = super().get_context_data(*args, **kwargs)
|
|
|
|
context["reset"] = self.reset
|
|
|
|
return context
|