Newer
Older
# -*- coding: utf-8 -*-
from __future__ import division
__copyright__ = "Copyright (C) 2014 Andreas Kloeckner"
__license__ = """
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
"""
from django.utils.translation import ugettext_lazy as _, string_concat
render, get_object_or_404, redirect, resolve_url)
from django.contrib import messages
import django.forms as forms
from django.core.exceptions import (PermissionDenied, SuspiciousOperation,
ObjectDoesNotExist)
from crispy_forms.helper import FormHelper
from crispy_forms.layout import Submit, Layout, Div
from django.db.models import Q
from django.contrib.auth import (get_user_model, REDIRECT_FIELD_NAME,
from django.contrib.auth.forms import \
AuthenticationForm as AuthenticationFormBase
from django.contrib.sites.shortcuts import get_current_site
from django.contrib.auth.decorators import user_passes_test
from django.core.urlresolvers import reverse
from django.utils.http import is_safe_url
from django.template.response import TemplateResponse
from django.views.decorators.debug import sensitive_post_parameters
from django.views.decorators.cache import never_cache
from django.views.decorators.csrf import csrf_protect
from djangosaml2.backends import Saml2Backend as Saml2BackendBase
Participation, participation_role, participation_status,
)
def may_impersonate(user):
return user.is_staff
def whom_may_impersonate(impersonator):
return set(get_user_model().objects.filter(
participations__status=participation_status.active))
my_privileged_participations = Participation.objects.filter(
user=impersonator,
status=participation_status.active,
role__in=(
participation_role.instructor,
participation_role.teaching_assistant))
q_object = None
for part in my_privileged_participations:
if part.role == participation_role.instructor:
impersonable_roles = (
participation_role.teaching_assistant,
participation_role.observer,
participation_role.auditor,
participation_role.student)
elif part.role == participation_role.teaching_assistant:
impersonable_roles = (
participation_role.student,
participation_role.auditor,
)
part_q_object = Q(
participations__course=part.course,
participations__status=participation_status.active,
participations__role__in=impersonable_roles)
if q_object is None:
q_object = part_q_object
q_object = q_object | part_q_object
return set(get_user_model().objects.filter(q_object).order_by("last_name"))
class ImpersonateMiddleware(object):
def process_request(self, request):
if request.user.is_staff and 'impersonate_id' in request.session:
imp_id = request.session['impersonate_id']
request.relate_impersonate_original_user = request.user
impersonees = whom_may_impersonate(request.user)
if any(u.id == imp_id for u in impersonees):
request.user = get_user_model().objects.get(id=imp_id)
class ImpersonateForm(StyledForm):
def __init__(self, impersonator, *args, **kwargs):
super(ImpersonateForm, self).__init__(*args, **kwargs)
impersonees = whom_may_impersonate(impersonator)
# Translators: information displayed when selecting
# userfor impersonating. Customize how the name is
# shown, but leave email first to retain usability
# of form sorted by last name.
u.id, "%(full_name)s (%(username)s - %(email)s)"
"full_name": u.get_full_name(),
"email": u.email,
"username": u.username
for u in sorted(impersonees,
key=lambda user: user.last_name.lower())
],
widget=Select2Widget(),
self.helper.add_input(Submit("submit", _("Impersonate")))
if hasattr(request, "relate_impersonate_original_user"):
messages.add_message(request, messages.ERROR,
return redirect("relate-stop_impersonating")
form = ImpersonateForm(request.user, request.POST)
user = get_user_model().objects.get(id=form.cleaned_data["user"])
request.session['impersonate_id'] = user.id
# Because we'll likely no longer have access to this page.
return redirect("relate-home")
form = ImpersonateForm(request.user)
"form_description": _("Impersonate user"),
"form": form
})
class StopImpersonatingForm(forms.Form):
def __init__(self, *args, **kwargs):
self.helper = FormHelper()
super(StopImpersonatingForm, self).__init__(*args, **kwargs)
self.helper.add_input(Submit("submit", _("Stop impersonating")))
if not hasattr(request, "relate_impersonate_original_user"):
return redirect("relate-home")
if request.method == 'POST':
form = StopImpersonatingForm(request.POST)
if form.is_valid():
messages.add_message(request, messages.INFO,
del request.session['impersonate_id']
# Because otherwise the header will show stale data.
return redirect("relate-home")
else:
form = StopImpersonatingForm()
return render(request, "generic-form.html", {
"form_description": _("Stop impersonating user"),
"form": form
})
def impersonation_context_processor(request):
def make_sign_in_key(user):
# Try to ensure these hashes aren't guessable.
import random
import hashlib
from time import time
m = hashlib.sha1()
m.update(user.email)
m.update(hex(random.getrandbits(128)))
m.update(str(time()))
return m.hexdigest()
def check_sign_in_key(user_id, token):
users = get_user_model().objects.filter(
id=user_id, sign_in_key=token)
assert users.count() <= 1
if users.count() == 0:
return False
return True
class TokenBackend(object):
def authenticate(self, user_id=None, token=None):
users = get_user_model().objects.filter(
id=user_id, sign_in_key=token)
assert users.count() <= 1
if users.count() == 0:
user.status = user_status.active
user.sign_in_key = None
user.save()
def get_user(self, user_id):
try:
return get_user_model().objects.get(pk=user_id)
except get_user_model().DoesNotExist:
def sign_in_choice(request, redirect_field_name=REDIRECT_FIELD_NAME):
redirect_to = request.POST.get(redirect_field_name,
request.GET.get(redirect_field_name, ''))
if redirect_to:
next_uri = "?%s=%s" % (redirect_field_name, redirect_to)
return render(request, "sign-in-choice.html", {"next_uri": next_uri})
# {{{ conventional login
class LoginForm(AuthenticationFormBase):
def __init__(self, *args, **kwargs):
self.helper = FormHelper()
self.helper.form_tag = False
self.helper.label_class = "col-lg-2"
self.helper.field_class = "col-lg-8"
self.helper.add_input(Submit("submit", _("Sign in")))
super(LoginForm, self).__init__(*args, **kwargs)
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
@sensitive_post_parameters()
@csrf_protect
@never_cache
def sign_in_by_user_pw(request, redirect_field_name=REDIRECT_FIELD_NAME):
"""
Displays the login form and handles the login action.
"""
redirect_to = request.POST.get(redirect_field_name,
request.GET.get(redirect_field_name, ''))
if request.method == "POST":
form = LoginForm(request, data=request.POST)
if form.is_valid():
# Ensure the user-originating redirection url is safe.
if not is_safe_url(url=redirect_to, host=request.get_host()):
redirect_to = resolve_url(settings.LOGIN_REDIRECT_URL)
user = form.get_user()
# Okay, security check complete. Log the user in.
auth_login(request, user)
return HttpResponseRedirect(redirect_to)
else:
form = LoginForm(request)
current_site = get_current_site(request)
next_uri = ""
if redirect_to:
next_uri = "?%s=%s" % (redirect_field_name, redirect_to)
context = {
'form': form,
redirect_field_name: redirect_to,
'site': current_site,
'site_name': current_site.name,
}
return TemplateResponse(request, "course/login.html", context)
class SignUpForm(StyledModelForm):
username = forms.CharField(required=True, max_length=30,
validators.RegexValidator('^[\\w.@+-]+$',
_('Enter a valid username.'), (' '),
Dong Zhuang
committed
_('This value may contain only letters, '
'numbers and @/./+/-/_ characters.')
fields = ("email",)
def __init__(self, *args, **kwargs):
super(SignUpForm, self).__init__(*args, **kwargs)
self.fields["email"].required = True
if not settings.RELATE_REGISTRATION_ENABLED:
raise SuspiciousOperation(
_("self-registration is not enabled"))
if request.method == 'POST':
form = SignUpForm(request.POST)
if form.is_valid():
username=form.cleaned_data["username"]).count():
messages.add_message(request, messages.ERROR,
_("A user with that username already exists."))
email__iexact=form.cleaned_data["email"]).count():
messages.add_message(request, messages.ERROR,
"relate-reset_password")),
else:
email = form.cleaned_data["email"]
email=email,
username=form.cleaned_data["username"])
user.set_unusable_password()
user.status = user_status.unconfirmed
user.sign_in_key = make_sign_in_key(user)
user.save()
from django.template.loader import render_to_string
message = render_to_string("course/sign-in-email.txt", {
"user": user,
"sign_in_uri": request.build_absolute_uri(
reverse(
"relate-reset_password_stage2",
+ "?to_profile=1"),
"home_uri": request.build_absolute_uri(
reverse("relate-home"))
})
from django.core.mail import send_mail
send_mail(
string_concat("[", _("RELATE"), "] ",
_("Verify your email")),
message,
settings.ROBOT_EMAIL_FROM,
recipient_list=[email])
messages.add_message(request, messages.INFO,
_("Email sent. Please check your email and click "
"the link."))
return redirect("relate-home")
else:
form = SignUpForm()
return render(request, "generic-form.html", {
email = forms.EmailField(required=True, label=_("Email"))
def __init__(self, *args, **kwargs):
super(ResetPasswordFormByEmail, self).__init__(*args, **kwargs)
class ResetPasswordFormByInstid(StyledForm):
instid = forms.CharField(max_length=100,
required=True,
label=_("Institutional ID"))
def __init__(self, *args, **kwargs):
super(ResetPasswordFormByInstid, self).__init__(*args, **kwargs)
self.helper.add_input(
Submit("submit", _("Send email")))
def masked_email(email):
# return a masked email address
at = email.find('@')
return email[:2] + "*" * (len(email[3:at])-1) + email[at-1:]
def reset_password(request, field="email"):
if not settings.RELATE_REGISTRATION_ENABLED:
raise SuspiciousOperation(
_("self-registration is not enabled"))
# return form class by string of class name
ResetPasswordForm = globals()["ResetPasswordFormBy" + field.title()]
if request.method == 'POST':
form = ResetPasswordForm(request.POST)
if form.is_valid():
if field == "instid":
inst_id = form.cleaned_data["instid"]
try:
user = get_user_model().objects.get(
institutional_id__iexact=inst_id)
except ObjectDoesNotExist:
user = None
if field == "email":
email = form.cleaned_data["email"]
try:
user = get_user_model().objects.get(email__iexact=email)
except ObjectDoesNotExist:
user = None
FIELD_DICT = {
"email": _("email address"),
"instid": _("institutional ID")
}
messages.add_message(request, messages.ERROR,
_("That %(field)s doesn't have an "
"associated user account. Are you "
"sure you've registered?")
else:
if not user.email:
# happens when a user have an inst_id but have no email.
messages.add_message(request, messages.ERROR,
_("The account with that institution ID "
"doesn't have an associated email."))
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
else:
email = user.email
user.sign_in_key = make_sign_in_key(user)
user.save()
from django.template.loader import render_to_string
message = render_to_string("course/sign-in-email.txt", {
"user": user,
"sign_in_uri": request.build_absolute_uri(
reverse(
"relate-reset_password_stage2",
args=(user.id, user.sign_in_key,))),
"home_uri": request.build_absolute_uri(
reverse("relate-home"))
})
from django.core.mail import send_mail
send_mail(
string_concat("[", _("RELATE"), "] ",
_("Password reset")),
message,
settings.ROBOT_EMAIL_FROM,
recipient_list=[email])
if field == "instid":
messages.add_message(request, messages.INFO,
_("The email address associated with that "
"account is %s.")
% masked_email(email))
messages.add_message(request, messages.INFO,
_("Email sent. Please check your email and "
"click the link."))
return redirect("relate-home")
else:
form = ResetPasswordForm()
return render(request, "reset-passwd-form.html", {
"field": field,
"form_description":
_("Password reset on %(site_name)s")
% {"site_name": _("RELATE")},
"form": form
})
class ResetPasswordStage2Form(StyledForm):
password = forms.CharField(widget=forms.PasswordInput(),
label=_("Password"))
password_repeat = forms.CharField(widget=forms.PasswordInput(),
label=_("Password confirmation"))
def __init__(self, *args, **kwargs):
super(ResetPasswordStage2Form, self).__init__(*args, **kwargs)
self.helper.add_input(
def clean(self):
cleaned_data = super(ResetPasswordStage2Form, self).clean()
password = cleaned_data.get("password")
password_repeat = cleaned_data.get("password_repeat")
if password and password != password_repeat:
_("The two password fields didn't match."))
def reset_password_stage2(request, user_id, sign_in_key):
if not settings.RELATE_REGISTRATION_ENABLED:
raise SuspiciousOperation(
_("self-registration is not enabled"))
if not check_sign_in_key(user_id=int(user_id), token=sign_in_key):
messages.add_message(request, messages.ERROR,
_("Invalid sign-in token. Perhaps you've used an old token "
"email?"))
raise PermissionDenied(_("invalid sign-in token"))
if request.method == 'POST':
form = ResetPasswordStage2Form(request.POST)
if form.is_valid():
from django.contrib.auth import authenticate, login
user = authenticate(user_id=int(user_id), token=sign_in_key)
if user is None:
raise PermissionDenied(_("invalid sign-in token"))
if not user.is_active:
messages.add_message(request, messages.ERROR,
raise PermissionDenied(_("invalid sign-in token"))
user.set_password(form.cleaned_data["password"])
user.save()
login(request, user)
if (not (user.first_name and user.last_name)
or "to_profile" in request.GET):
messages.add_message(request, messages.INFO,
_("Successfully signed in. "
"Please complete your registration information below."))
reverse("relate-user_profile")+"?first_login=1")
else:
messages.add_message(request, messages.INFO,
return redirect("relate-home")
else:
form = ResetPasswordStage2Form()
return render(request, "generic-form.html", {
"form_description":
_("Password reset on %(site_name)s")
% {"site_name": _("RELATE")},
# }}}
# {{{ email sign-in flow
class SignInByEmailForm(StyledForm):
email = forms.EmailField(required=True, label=_("Email"),
# For now, until we upgrade to a custom user model.
max_length=30)
super(SignInByEmailForm, self).__init__(*args, **kwargs)
Submit("submit", _("Send sign-in email")))
if not settings.RELATE_SIGN_IN_BY_EMAIL_ENABLED:
messages.add_message(request, messages.ERROR,
_("Email-based sign-in is not being used"))
return redirect("relate-sign_in_choice")
if request.method == 'POST':
form = SignInByEmailForm(request.POST)
if form.is_valid():
email = form.cleaned_data["email"]
user, created = get_user_model().objects.get_or_create(
user.status = user_status.unconfirmed,
user.sign_in_key = make_sign_in_key(user)
user.save()
from django.template.loader import render_to_string
message = render_to_string("course/sign-in-email.txt", {
"user": user,
"sign_in_uri": request.build_absolute_uri(
reverse(
"relate-sign_in_stage2_with_token",
"home_uri": request.build_absolute_uri(reverse("relate-home"))
})
from django.core.mail import send_mail
send_mail(
_("Your %(RELATE)s sign-in link") % {"RELATE": _("RELATE")},
message,
settings.ROBOT_EMAIL_FROM,
recipient_list=[email])
messages.add_message(request, messages.INFO,
_("Email sent. Please check your email and click the link."))
return redirect("relate-home")
else:
form = SignInByEmailForm()
return render(request, "course/login-by-email.html", {
"form_description": "",
"form": form
})
def sign_in_stage2_with_token(request, user_id, sign_in_key):
if not settings.RELATE_SIGN_IN_BY_EMAIL_ENABLED:
messages.add_message(request, messages.ERROR,
_("Email-based sign-in is not being used"))
return redirect("relate-sign_in_choice")
from django.contrib.auth import authenticate, login
user = authenticate(user_id=int(user_id), token=sign_in_key)
messages.add_message(request, messages.ERROR,
_("Invalid sign-in token. Perhaps you've used an old "
"token email?"))
raise PermissionDenied(_("invalid sign-in token"))
if not user.is_active:
messages.add_message(request, messages.ERROR,
_("Account disabled."))
raise PermissionDenied(_("invalid sign-in token"))
login(request, user)
if not (user.first_name and user.last_name):
messages.add_message(request, messages.INFO,
_("Successfully signed in. "
"Please complete your registration information below."))
Andreas Klöckner
committed
return redirect(
reverse("relate-user_profile")+"?first_login=1")
else:
messages.add_message(request, messages.INFO,
return redirect("relate-home")
EDITABLE_INST_ID_BEFORE_VERIFICATION = \
settings.RELATE_EDITABLE_INST_ID_BEFORE_VERIFICATION
class UserForm(StyledModelForm):
institutional_id_confirm = forms.CharField(
max_length=100,
label=_("Institutional ID Confirmation"),
required=False)
no_institutional_id = forms.BooleanField(
label=_("I have no Institutional ID"),
help_text=_("Check the checkbox if you are not a student "
"or you forget your institutional id."),
required=False,
initial=False)
fields = ("first_name", "last_name", "institutional_id",
"editor_mode")
self.is_inst_id_locked = is_inst_id_locked =\
kwargs.pop('is_inst_id_locked')
Andreas Klöckner
committed
super(UserForm, self).__init__(*args, **kwargs)
self.helper.layout = Layout(
Div("last_name", "first_name", css_class="well"),
Div("institutional_id", css_class="well"),
Div("editor_mode", css_class="well hidden-xs hidden-sm")
)
self.fields["institutional_id"].help_text = (
_("The unique ID your university or school provided, "
"which may be used by some courses to verify "
"eligibility to enroll. "
"<b>Once %(submitted_or_verified)s, it cannot be "
% {"submitted_or_verified":
EDITABLE_INST_ID_BEFORE_VERIFICATION
and _("verified") or _("submitted")})
def adjust_layout(is_inst_id_locked):
if not is_inst_id_locked:
self.helper.layout[1].insert(1, "institutional_id_confirm")
self.helper.layout[1].insert(0, "no_institutional_id")
self.fields["institutional_id_confirm"].initial = \
self.fields["institutional_id"].widget.\
attrs['disabled'] = True
if self.instance.name_verified:
self.fields["first_name"].widget.attrs['disabled'] = True
self.fields["last_name"].widget.attrs['disabled'] = True
adjust_layout(is_inst_id_locked)
Andreas Klöckner
committed
def clean_institutional_id(self):
inst_id = self.cleaned_data['institutional_id'].strip()
if self.is_inst_id_locked:
# Disabled fields are not part of form submit--so simply
# assume old value. At the same time, prevent smuggled-in
# POST parameters.
return self.instance.institutional_id
else:
return inst_id
def clean_first_name(self):
first_name = self.cleaned_data['first_name']
if self.instance.name_verified:
# Disabled fields are not part of form submit--so simply
# assume old value. At the same time, prevent smuggled-in
# POST parameters.
return self.instance.first_name
else:
return first_name
def clean_last_name(self):
last_name = self.cleaned_data['last_name']
if self.instance.name_verified:
# Disabled fields are not part of form submit--so simply
# assume old value. At the same time, prevent smuggled-in
# POST parameters.
return self.instance.last_name
else:
return last_name
def clean_institutional_id_confirm(self):
inst_id_confirmed = self.cleaned_data.get(
"institutional_id_confirm")
if not self.is_inst_id_locked:
inst_id = self.cleaned_data.get("institutional_id")
if inst_id and not inst_id_confirmed:
raise forms.ValidationError(_("This field is required."))
if not inst_id == inst_id_confirmed:
raise forms.ValidationError(_("Inputs do not match."))
return inst_id_confirmed
Andreas Klöckner
committed
if not request.user.is_authenticated():
raise PermissionDenied()
def is_inst_id_locked(user):
if EDITABLE_INST_ID_BEFORE_VERIFICATION:
return True if (user.institutional_id
and user.institutional_id_verified) else False
return True if user.institutional_id else False
if request.method == "POST":
if "submit_user" in request.POST:
user_form = UserForm(
request.POST,
instance=request.user,
is_inst_id_locked=is_inst_id_locked(request.user),
if user_form.is_valid():
user_form.save()
messages.add_message(request, messages.INFO,
_("Profile data saved."))
if request.GET.get("first_login"):
return redirect("relate-home")
if (request.GET.get("set_inst_id")
and request.GET["referer"]):
return redirect(request.GET["referer"])
user_form = UserForm(
instance=request.user,
is_inst_id_locked=is_inst_id_locked(request.user))
if user_form is None:
user_form = UserForm(
instance=request.user,
is_inst_id_locked=is_inst_id_locked(request.user),
return render(request, "user-profile-form.html", {
"is_inst_id_locked": is_inst_id_locked(request.user),
"enable_inst_id_if_not_locked": (
request.GET.get("first_login")
or (request.GET.get("set_inst_id")
and request.GET["referer"])
),
def get_role_and_participation(request, course):
# "wake up" lazy object
# http://stackoverflow.com/questions/20534577/int-argument-must-be-a-string-or-a-number-not-simplelazyobject # noqa
user = (request.user._wrapped
if hasattr(request.user, '_wrapped')
else request.user)
if not user.is_authenticated():
return participation_role.unenrolled, None
participations = list(Participation.objects.filter(
user=user,
course=course,
status=participation_status.active
))
# The uniqueness constraint should have ensured that.
assert len(participations) <= 1
if len(participations) == 0:
return participation_role.unenrolled, None
participation = participations[0]
if participation.status != participation_status.active:
return participation_role.unenrolled, participation
else:
return participation.role, participation
# {{{ SAML auth backend
# This ticks the 'verified' boxes once we've receive attribute assertions
# through SAML2.
class Saml2Backend(Saml2BackendBase):
def _set_attribute(self, obj, attr, value):
mod = super(Saml2Backend, self)._set_attribute(obj, attr, value)
if attr == "institutional_id":
if not obj.institutional_id_verified:
obj.institutional_id_verified = True
mod = True
if attr in ["first_name", "last_name"]:
if not obj.name_verified:
obj.name_verified = True
mod = True
if attr == "email":
from course.constants import user_status
if obj.status != user_status.active:
obj.status = user_status.active
mod = True
return mod
# }}}
# {{{ sign-out
@never_cache
def sign_out(request):
if settings.RELATE_SIGN_IN_BY_SAML2_ENABLED:
from djangosaml2.views import _get_subject_id, logout as saml2_logout
if _get_subject_id(request.session) is not None:
return saml2_logout(request)
auth_logout(request)
return redirect("relate-home")
# }}}