2020-12-04 23:05:10 +01:00
|
|
|
# ContentDB
|
|
|
|
# Copyright (C) 2020 rubenwardy
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
2021-01-30 17:59:42 +01:00
|
|
|
# it under the terms of the GNU Affero General Public License as published by
|
2020-12-04 23:05:10 +01:00
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2021-01-30 17:59:42 +01:00
|
|
|
# GNU Affero General Public License for more details.
|
2020-12-04 23:05:10 +01:00
|
|
|
#
|
2021-01-30 17:59:42 +01:00
|
|
|
# You should have received a copy of the GNU Affero General Public License
|
2020-12-04 23:05:10 +01:00
|
|
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
|
|
from flask import *
|
|
|
|
from flask_login import current_user, login_required, logout_user, login_user
|
|
|
|
from flask_wtf import FlaskForm
|
|
|
|
from sqlalchemy import or_
|
|
|
|
from wtforms import *
|
|
|
|
from wtforms.validators import *
|
|
|
|
|
|
|
|
from app.models import *
|
2020-12-06 16:02:02 +01:00
|
|
|
from app.tasks.emails import send_verify_email, send_anon_email, send_unsubscribe_verify, send_user_email
|
2020-12-15 17:24:49 +01:00
|
|
|
from app.utils import randomString, make_flask_login_password, is_safe_url, check_password_hash, addAuditLog, nonEmptyOrNone
|
2020-12-05 01:01:36 +01:00
|
|
|
from passlib.pwd import genphrase
|
|
|
|
|
2020-12-04 23:05:10 +01:00
|
|
|
from . import bp
|
|
|
|
|
|
|
|
|
|
|
|
class LoginForm(FlaskForm):
|
|
|
|
username = StringField("Username or email", [InputRequired()])
|
|
|
|
password = PasswordField("Password", [InputRequired(), Length(6, 100)])
|
2021-02-03 01:56:43 +01:00
|
|
|
remember_me = BooleanField("Remember me", default=True)
|
|
|
|
submit = SubmitField("Sign in")
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
|
2020-12-04 23:21:06 +01:00
|
|
|
def handle_login(form):
|
|
|
|
def show_safe_err(err):
|
|
|
|
if "@" in username:
|
|
|
|
flash("Incorrect email or password", "danger")
|
2020-12-04 23:05:10 +01:00
|
|
|
else:
|
2020-12-04 23:29:10 +01:00
|
|
|
flash(err, "danger")
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2020-12-04 23:29:10 +01:00
|
|
|
|
|
|
|
username = form.username.data.strip()
|
|
|
|
user = User.query.filter(or_(User.username == username, User.email == username)).first()
|
2020-12-04 23:21:06 +01:00
|
|
|
if user is None:
|
|
|
|
return show_safe_err("User {} does not exist".format(username))
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2020-12-04 23:21:06 +01:00
|
|
|
if not check_password_hash(user.password, form.password.data):
|
|
|
|
return show_safe_err("Incorrect password. Did you set one?")
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2020-12-04 23:21:06 +01:00
|
|
|
if not user.is_active:
|
|
|
|
flash("You need to confirm the registration email", "danger")
|
|
|
|
return
|
|
|
|
|
2020-12-09 21:38:36 +01:00
|
|
|
addAuditLog(AuditSeverity.USER, user, "Logged in using password",
|
|
|
|
url_for("users.profile", username=user.username))
|
|
|
|
db.session.commit()
|
2020-12-04 23:21:06 +01:00
|
|
|
|
2020-12-11 00:36:56 +01:00
|
|
|
login_user(user, remember=form.remember_me.data)
|
2020-12-04 23:21:06 +01:00
|
|
|
flash("Logged in successfully.", "success")
|
|
|
|
|
|
|
|
next = request.args.get("next")
|
|
|
|
if next and not is_safe_url(next):
|
|
|
|
abort(400)
|
|
|
|
|
|
|
|
return redirect(next or url_for("homepage.home"))
|
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/user/login/", methods=["GET", "POST"])
|
|
|
|
def login():
|
2020-12-05 00:07:19 +01:00
|
|
|
if current_user.is_authenticated:
|
|
|
|
next = request.args.get("next")
|
|
|
|
if next and not is_safe_url(next):
|
|
|
|
abort(400)
|
|
|
|
|
|
|
|
return redirect(next or url_for("homepage.home"))
|
|
|
|
|
2020-12-04 23:21:06 +01:00
|
|
|
form = LoginForm(request.form)
|
|
|
|
if form.validate_on_submit():
|
|
|
|
ret = handle_login(form)
|
|
|
|
if ret:
|
|
|
|
return ret
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2021-02-03 01:56:43 +01:00
|
|
|
if request.method == "GET":
|
|
|
|
form.remember_me.data = True
|
|
|
|
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
return render_template("users/login.html", form=form)
|
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/user/logout/", methods=["GET", "POST"])
|
|
|
|
def logout():
|
|
|
|
logout_user()
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
|
|
|
|
class RegisterForm(FlaskForm):
|
2021-02-27 20:03:52 +01:00
|
|
|
display_name = StringField("Display Name", [Optional(), Length(1, 20)], filters=[lambda x: nonEmptyOrNone(x)])
|
2021-02-23 00:45:20 +01:00
|
|
|
username = StringField("Username", [InputRequired(),
|
|
|
|
Regexp("^[a-zA-Z0-9._ -]+$", message="Only a-zA-Z0-9._ allowed")])
|
2020-12-04 23:05:10 +01:00
|
|
|
email = StringField("Email", [InputRequired(), Email()])
|
|
|
|
password = PasswordField("Password", [InputRequired(), Length(6, 100)])
|
2021-02-27 20:03:52 +01:00
|
|
|
agree = BooleanField("I agree", [Required()])
|
2020-12-04 23:05:10 +01:00
|
|
|
submit = SubmitField("Register")
|
|
|
|
|
|
|
|
|
2020-12-05 22:23:41 +01:00
|
|
|
def handle_register(form):
|
2020-12-13 15:01:18 +01:00
|
|
|
user_by_name = User.query.filter(or_(
|
|
|
|
User.username == form.username.data,
|
2021-02-27 20:03:52 +01:00
|
|
|
User.display_name == form.display_name.data,
|
2020-12-13 15:01:18 +01:00
|
|
|
User.forums_username == form.username.data,
|
|
|
|
User.github_username == form.username.data)).first()
|
|
|
|
if user_by_name:
|
|
|
|
if user_by_name.rank == UserRank.NOT_JOINED and user_by_name.forums_username:
|
|
|
|
flash("An account already exists for that username but hasn't been claimed yet.", "danger")
|
2020-12-22 11:58:43 +01:00
|
|
|
return redirect(url_for("users.claim_forums", username=user_by_name.forums_username))
|
2020-12-13 15:01:18 +01:00
|
|
|
else:
|
2021-02-27 20:03:52 +01:00
|
|
|
flash("That username/display name is already in use, please choose another.", "danger")
|
2020-12-13 15:01:18 +01:00
|
|
|
return
|
|
|
|
|
|
|
|
|
|
|
|
user_by_email = User.query.filter_by(email=form.email.data).first()
|
|
|
|
if user_by_email:
|
2020-12-05 22:23:41 +01:00
|
|
|
send_anon_email.delay(form.email.data, "Email already in use",
|
|
|
|
"We were unable to create the account as the email is already in use by {}. Try a different email address.".format(
|
2020-12-13 15:01:18 +01:00
|
|
|
user_by_email.display_name))
|
|
|
|
flash("Check your email address to verify your account", "success")
|
|
|
|
return redirect(url_for("homepage.home"))
|
2020-12-05 22:23:41 +01:00
|
|
|
elif EmailSubscription.query.filter_by(email=form.email.data, blacklisted=True).count() > 0:
|
|
|
|
flash("That email address has been unsubscribed/blacklisted, and cannot be used", "danger")
|
|
|
|
return
|
2020-12-04 23:21:06 +01:00
|
|
|
|
2020-12-13 15:01:18 +01:00
|
|
|
user = User(form.username.data, False, form.email.data, make_flask_login_password(form.password.data))
|
|
|
|
user.notification_preferences = UserNotificationPreferences(user)
|
2021-02-27 20:03:52 +01:00
|
|
|
if form.display_name.data:
|
|
|
|
user.display_name = form.display_name.data
|
2020-12-13 15:01:18 +01:00
|
|
|
db.session.add(user)
|
2020-12-05 03:41:53 +01:00
|
|
|
|
2021-02-27 20:03:52 +01:00
|
|
|
addAuditLog(AuditSeverity.USER, user, "Registered with email, display name=" + user.display_name,
|
2020-12-13 15:01:18 +01:00
|
|
|
url_for("users.profile", username=user.username))
|
|
|
|
|
|
|
|
token = randomString(32)
|
2020-12-04 23:21:06 +01:00
|
|
|
|
2020-12-13 15:01:18 +01:00
|
|
|
ver = UserEmailVerification()
|
|
|
|
ver.user = user
|
|
|
|
ver.token = token
|
|
|
|
ver.email = form.email.data
|
|
|
|
db.session.add(ver)
|
|
|
|
db.session.commit()
|
2020-12-04 23:21:06 +01:00
|
|
|
|
2020-12-13 15:01:18 +01:00
|
|
|
send_verify_email.delay(form.email.data, token)
|
2020-12-05 22:23:41 +01:00
|
|
|
|
|
|
|
flash("Check your email address to verify your account", "success")
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/user/register/", methods=["GET", "POST"])
|
|
|
|
def register():
|
|
|
|
form = RegisterForm(request.form)
|
|
|
|
if form.validate_on_submit():
|
|
|
|
ret = handle_register(form)
|
|
|
|
if ret:
|
|
|
|
return ret
|
2020-12-04 23:21:06 +01:00
|
|
|
|
2020-12-05 01:01:36 +01:00
|
|
|
return render_template("users/register.html", form=form, suggested_password=genphrase(entropy=52, wordset="bip39"))
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
|
2020-12-05 01:18:00 +01:00
|
|
|
class ForgotPasswordForm(FlaskForm):
|
2020-12-04 23:29:10 +01:00
|
|
|
email = StringField("Email", [InputRequired(), Email()])
|
|
|
|
submit = SubmitField("Reset Password")
|
|
|
|
|
2020-12-04 23:05:10 +01:00
|
|
|
@bp.route("/user/forgot-password/", methods=["GET", "POST"])
|
|
|
|
def forgot_password():
|
2020-12-05 01:18:00 +01:00
|
|
|
form = ForgotPasswordForm(request.form)
|
2020-12-04 23:29:10 +01:00
|
|
|
if form.validate_on_submit():
|
2020-12-05 01:18:00 +01:00
|
|
|
email = form.email.data
|
|
|
|
user = User.query.filter_by(email=email).first()
|
|
|
|
if user:
|
|
|
|
token = randomString(32)
|
|
|
|
|
2020-12-05 03:41:53 +01:00
|
|
|
addAuditLog(AuditSeverity.USER, user, "(Anonymous) requested a password reset",
|
|
|
|
url_for("users.profile", username=user.username), None)
|
|
|
|
|
2020-12-05 01:18:00 +01:00
|
|
|
ver = UserEmailVerification()
|
|
|
|
ver.user = user
|
|
|
|
ver.token = token
|
|
|
|
ver.email = email
|
|
|
|
ver.is_password_reset = True
|
|
|
|
db.session.add(ver)
|
|
|
|
db.session.commit()
|
2020-12-04 23:29:10 +01:00
|
|
|
|
2020-12-06 16:02:02 +01:00
|
|
|
send_verify_email.delay(form.email.data, token)
|
2020-12-05 01:18:00 +01:00
|
|
|
else:
|
2020-12-05 21:36:09 +01:00
|
|
|
send_anon_email.delay(email, "Unable to find account", """
|
2020-12-05 01:18:00 +01:00
|
|
|
<p>
|
|
|
|
We were unable to perform the password reset as we could not find an account
|
|
|
|
associated with this email.
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
If you weren't expecting to receive this email, then you can safely ignore it.
|
|
|
|
</p>
|
|
|
|
""")
|
|
|
|
|
|
|
|
flash("Check your email address to continue the reset", "success")
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
return render_template("users/forgot_password.html", form=form)
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
|
|
|
|
class SetPasswordForm(FlaskForm):
|
|
|
|
email = StringField("Email", [Optional(), Email()])
|
|
|
|
password = PasswordField("New password", [InputRequired(), Length(8, 100)])
|
2020-12-15 13:56:17 +01:00
|
|
|
password2 = PasswordField("Verify password", [InputRequired(), Length(8, 100), validators.EqualTo('password', message='Passwords must match')])
|
2020-12-04 23:05:10 +01:00
|
|
|
submit = SubmitField("Save")
|
|
|
|
|
2020-12-05 00:07:19 +01:00
|
|
|
class ChangePasswordForm(FlaskForm):
|
|
|
|
old_password = PasswordField("Old password", [InputRequired(), Length(8, 100)])
|
|
|
|
password = PasswordField("New password", [InputRequired(), Length(8, 100)])
|
2020-12-15 13:56:17 +01:00
|
|
|
password2 = PasswordField("Verify password", [InputRequired(), Length(8, 100), validators.EqualTo('password', message='Passwords must match')])
|
2020-12-05 00:07:19 +01:00
|
|
|
submit = SubmitField("Save")
|
|
|
|
|
|
|
|
|
|
|
|
def handle_set_password(form):
|
|
|
|
one = form.password.data
|
|
|
|
two = form.password2.data
|
|
|
|
if one != two:
|
|
|
|
flash("Passwords do not much", "danger")
|
|
|
|
return
|
|
|
|
|
2020-12-05 03:41:53 +01:00
|
|
|
addAuditLog(AuditSeverity.USER, current_user, "Changed their password", url_for("users.profile", username=current_user.username))
|
|
|
|
|
2020-12-05 00:07:19 +01:00
|
|
|
current_user.password = make_flask_login_password(form.password.data)
|
|
|
|
|
|
|
|
if hasattr(form, "email"):
|
2020-12-15 17:24:49 +01:00
|
|
|
newEmail = nonEmptyOrNone(form.email.data)
|
|
|
|
if newEmail and newEmail != current_user.email:
|
2020-12-05 22:23:41 +01:00
|
|
|
if EmailSubscription.query.filter_by(email=form.email.data, blacklisted=True).count() > 0:
|
|
|
|
flash("That email address has been unsubscribed/blacklisted, and cannot be used", "danger")
|
|
|
|
return
|
|
|
|
|
2020-12-05 00:07:19 +01:00
|
|
|
token = randomString(32)
|
|
|
|
|
|
|
|
ver = UserEmailVerification()
|
|
|
|
ver.user = current_user
|
|
|
|
ver.token = token
|
|
|
|
ver.email = newEmail
|
|
|
|
db.session.add(ver)
|
|
|
|
|
2020-12-05 22:23:41 +01:00
|
|
|
db.session.commit()
|
|
|
|
flash("Your password has been changed successfully.", "success")
|
2020-12-05 00:07:19 +01:00
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
|
2020-12-04 23:05:10 +01:00
|
|
|
@bp.route("/user/change-password/", methods=["GET", "POST"])
|
|
|
|
@login_required
|
|
|
|
def change_password():
|
2020-12-05 00:07:19 +01:00
|
|
|
form = ChangePasswordForm(request.form)
|
|
|
|
|
|
|
|
if form.validate_on_submit():
|
|
|
|
if check_password_hash(current_user.password, form.old_password.data):
|
|
|
|
ret = handle_set_password(form)
|
|
|
|
if ret:
|
|
|
|
return ret
|
|
|
|
else:
|
|
|
|
flash("Old password is incorrect", "danger")
|
|
|
|
|
2020-12-05 01:29:57 +01:00
|
|
|
return render_template("users/change_set_password.html", form=form,
|
|
|
|
suggested_password=genphrase(entropy=52, wordset="bip39"))
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/user/set-password/", methods=["GET", "POST"])
|
|
|
|
@login_required
|
|
|
|
def set_password():
|
2020-12-04 23:35:22 +01:00
|
|
|
if current_user.password:
|
2020-12-04 23:05:10 +01:00
|
|
|
return redirect(url_for("users.change_password"))
|
|
|
|
|
|
|
|
form = SetPasswordForm(request.form)
|
|
|
|
if current_user.email is None:
|
|
|
|
form.email.validators = [InputRequired(), Email()]
|
|
|
|
|
2020-12-05 00:07:19 +01:00
|
|
|
if form.validate_on_submit():
|
|
|
|
ret = handle_set_password(form)
|
|
|
|
if ret:
|
|
|
|
return ret
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2020-12-05 01:29:57 +01:00
|
|
|
return render_template("users/change_set_password.html", form=form, optional=request.args.get("optional"),
|
|
|
|
suggested_password=genphrase(entropy=52, wordset="bip39"))
|
2020-12-04 23:05:10 +01:00
|
|
|
|
|
|
|
|
2020-12-04 23:29:10 +01:00
|
|
|
@bp.route("/user/verify/")
|
2020-12-04 23:05:10 +01:00
|
|
|
def verify_email():
|
|
|
|
token = request.args.get("token")
|
2020-12-05 01:18:00 +01:00
|
|
|
ver : UserEmailVerification = UserEmailVerification.query.filter_by(token=token).first()
|
2020-12-04 23:05:10 +01:00
|
|
|
if ver is None:
|
|
|
|
flash("Unknown verification token!", "danger")
|
2020-12-04 23:21:06 +01:00
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
2020-12-05 20:23:43 +01:00
|
|
|
user = ver.user
|
|
|
|
|
|
|
|
addAuditLog(AuditSeverity.USER, user, "Confirmed their email",
|
|
|
|
url_for("users.profile", username=user.username))
|
|
|
|
|
|
|
|
was_activating = not user.is_active
|
|
|
|
|
2020-12-05 22:30:36 +01:00
|
|
|
if ver.email and user.email != ver.email:
|
2020-12-05 22:23:41 +01:00
|
|
|
if User.query.filter_by(email=ver.email).count() > 0:
|
|
|
|
flash("Another user is already using that email", "danger")
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
2020-12-05 22:30:36 +01:00
|
|
|
flash("Confirmed email change", "success")
|
|
|
|
|
|
|
|
if user.email:
|
|
|
|
send_user_email.delay(user.email,
|
|
|
|
"Email address changed",
|
|
|
|
"Your email address has changed. If you didn't request this, please contact an administrator.")
|
|
|
|
|
2020-12-05 20:23:43 +01:00
|
|
|
user.is_active = True
|
|
|
|
user.email = ver.email
|
2020-12-05 03:41:53 +01:00
|
|
|
|
2020-12-04 23:21:06 +01:00
|
|
|
db.session.delete(ver)
|
|
|
|
db.session.commit()
|
2020-12-04 23:05:10 +01:00
|
|
|
|
2020-12-05 01:18:00 +01:00
|
|
|
if ver.is_password_reset:
|
2020-12-05 20:23:43 +01:00
|
|
|
login_user(user)
|
|
|
|
user.password = None
|
2020-12-05 01:18:00 +01:00
|
|
|
db.session.commit()
|
|
|
|
|
|
|
|
return redirect(url_for("users.set_password"))
|
|
|
|
|
2020-12-04 23:05:10 +01:00
|
|
|
if current_user.is_authenticated:
|
|
|
|
return redirect(url_for("users.profile", username=current_user.username))
|
2020-12-04 23:21:06 +01:00
|
|
|
elif was_activating:
|
|
|
|
flash("You may now log in", "success")
|
|
|
|
return redirect(url_for("users.login"))
|
2020-12-04 23:05:10 +01:00
|
|
|
else:
|
|
|
|
return redirect(url_for("homepage.home"))
|
2020-12-05 21:36:09 +01:00
|
|
|
|
|
|
|
|
|
|
|
class UnsubscribeForm(FlaskForm):
|
|
|
|
email = StringField("Email", [InputRequired(), Email()])
|
|
|
|
submit = SubmitField("Send")
|
|
|
|
|
|
|
|
|
|
|
|
def unsubscribe_verify():
|
|
|
|
form = UnsubscribeForm(request.form)
|
|
|
|
if form.validate_on_submit():
|
|
|
|
email = form.email.data
|
|
|
|
sub = EmailSubscription.query.filter_by(email=email).first()
|
|
|
|
if not sub:
|
|
|
|
sub = EmailSubscription(email)
|
|
|
|
db.session.add(sub)
|
|
|
|
|
|
|
|
sub.token = randomString(32)
|
|
|
|
db.session.commit()
|
2020-12-06 16:02:02 +01:00
|
|
|
send_unsubscribe_verify.delay(form.email.data)
|
2020-12-05 21:36:09 +01:00
|
|
|
|
|
|
|
flash("Check your email address to continue the unsubscribe", "success")
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
return render_template("users/unsubscribe.html", form=form)
|
|
|
|
|
|
|
|
|
|
|
|
def unsubscribe_manage(sub: EmailSubscription):
|
|
|
|
user = User.query.filter_by(email=sub.email).first()
|
|
|
|
|
|
|
|
if request.method == "POST":
|
2020-12-05 22:24:14 +01:00
|
|
|
if user:
|
|
|
|
user.email = None
|
|
|
|
|
2020-12-05 21:36:09 +01:00
|
|
|
sub.blacklisted = True
|
|
|
|
db.session.commit()
|
|
|
|
|
|
|
|
flash("That email is now blacklisted. Please contact an admin if you wish to undo this.", "success")
|
|
|
|
return redirect(url_for("homepage.home"))
|
|
|
|
|
|
|
|
return render_template("users/unsubscribe.html", user=user)
|
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/unsubscribe/", methods=["GET", "POST"])
|
|
|
|
def unsubscribe():
|
|
|
|
token = request.args.get("token")
|
|
|
|
if token:
|
|
|
|
sub = EmailSubscription.query.filter_by(token=token).first()
|
|
|
|
if sub:
|
|
|
|
return unsubscribe_manage(sub)
|
|
|
|
|
|
|
|
return unsubscribe_verify()
|