views.py 3.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. from django.contrib.auth.decorators import login_required
  2. from django.shortcuts import get_object_or_404, redirect, render
  3. from django.contrib import messages
  4. from django.core.exceptions import PermissionDenied
  5. from django.conf import settings
  6. from django.http import HttpResponse, HttpResponseBadRequest
  7. from django.views.decorators.http import require_POST
  8. from django.views.decorators.csrf import csrf_exempt
  9. from django.contrib.auth import authenticate, get_user_model
  10. from django.contrib.auth.views import LoginView
  11. from django.contrib.auth import login as auth_login
  12. from services.models import IPResource
  13. from djadhere.utils import get_active_filter
  14. from .forms import UserForm, ProfileForm
  15. from ipaddress import ip_address, IPv6Address
  16. from services.utils.ip_conversion import ipv6_to_ipv4
  17. def login(request):
  18. def try_authenticate_from_ip():
  19. x_forwarded_for = request.META.get('HTTP_X_FORWARDED_FOR')
  20. if x_forwarded_for:
  21. ip = x_forwarded_for.split(',')[0]
  22. else:
  23. ip = request.META.get('REMOTE_ADDR')
  24. try:
  25. ip = ip_address(ip)
  26. except ValueError:
  27. return
  28. try:
  29. if type(ip) == IPv6Address:
  30. ip = ipv6_to_ipv4(ip)
  31. ip = IPResource.objects.get(ip=ip.exploded)
  32. except (IPResource.DoesNotExist, ValueError):
  33. return
  34. allocation = ip.allocations.filter(get_active_filter()).first()
  35. if not allocation:
  36. return
  37. user = allocation.service.adhesion.user
  38. if not user: # corporation
  39. return
  40. if user.is_superuser: # superusers must enter password
  41. return
  42. auth_login(request, user, backend='django.contrib.auth.backends.ModelBackend')
  43. try_authenticate_from_ip()
  44. return LoginView.as_view(redirect_authenticated_user=True)(request)
  45. @login_required
  46. def profile(request):
  47. user_form = UserForm(request.POST or None, instance=request.user)
  48. profile_form = ProfileForm(request.POST or None, instance=request.user.profile)
  49. forms = [user_form, profile_form]
  50. if request.method == 'POST' and all(form.is_valid() for form in forms):
  51. for form in forms:
  52. form.save()
  53. messages.success(request, 'Profil mis à jour avec succès !')
  54. return redirect('profile')
  55. return render(request, 'accounts/profile.html', {
  56. 'user_form': user_form,
  57. 'profile_form': profile_form,
  58. })
  59. @require_POST
  60. @csrf_exempt
  61. def auth_api(request, token):
  62. # token could not be None due to url regex
  63. if token != getattr(settings, 'AUTH_API_TOKEN', None):
  64. raise PermissionDenied
  65. username = request.POST.get('username')
  66. if not username:
  67. return HttpResponseBadRequest()
  68. password = request.POST.get('password')
  69. if password:
  70. user = authenticate(username=username, password=password)
  71. if user is None:
  72. return HttpResponse('<h1>401 Unauthorized</h1>', status=401)
  73. else:
  74. user = get_object_or_404(get_user_model(), username=username)
  75. required_groups = request.POST.get('groups')
  76. if required_groups and not user.is_superuser: # skip groups check for superusers
  77. required_groups = set(required_groups.split(' '))
  78. user_groups = set(map(lambda g: g.name, user.groups.all()))
  79. if required_groups - user_groups:
  80. return HttpResponse('<h1>401 Unauthorized</h1>', status=401)
  81. return HttpResponse()