Exemple #1
0
def lockout_response_ext(request):
    """ Переопределённый axes'овый lockout_response, возвращает JSON-ошибку в нужном виде. """
    if request.is_ajax():
        return JsonUserDisplayErrorExt(403, 'auth:floodwait', message=get_lockout_message())

    if settings.AXES_LOCKOUT_TEMPLATE:
        return render(request, settings.AXES_LOCKOUT_TEMPLATE, context={}, status=403)

    if settings.AXES_LOCKOUT_URL:
        return HttpResponseRedirect(settings.AXES_LOCKOUT_URL)

    return HttpResponse(get_lockout_message(), status=403)
Exemple #2
0
    def authenticate(self, request, username=None, password=None, **kwargs):
        """Checks user lock out status and raises PermissionDenied if user is not allowed to log in.

        Inserts errors directly to `return_context` that is supplied as a keyword argument.

        Use this on top of your AUTHENTICATION_BACKENDS list to prevent locked out users
        from being authenticated in the standard Django authentication flow.

        Note that this method does not log your user in and delegates login to other backends.

        :param request: see ModelBackend.authenticate
        :param kwargs: see ModelBackend.authenticate
        :keyword response_context: context dict that will be updated with error information
        :raises PermissionDenied: if user is already locked out
        :return: None
        """

        if request is None:
            raise AxesModelBackend.RequestParameterRequired()

        credentials = get_credentials(username=username,
                                      password=password,
                                      **kwargs)

        if is_already_locked(request, credentials):
            # locked out, don't try to authenticate, just update return_context and return
            # Its a bit weird to pass a context and expect a response value but its nice to get a "why" back.
            error_msg = get_lockout_message()
            response_context = kwargs.get('response_context', {})
            response_context['error'] = error_msg
            raise PermissionDenied(error_msg)
def lockout_response(request):
    context = {
        'failure_limit': settings.AXES_FAILURE_LIMIT,
        'username': request.POST.get(settings.AXES_USERNAME_FORM_FIELD, '')
    }

    cool_off = settings.AXES_COOLOFF_TIME
    if cool_off:
        if isinstance(cool_off, (int, float)):
            cool_off = timedelta(hours=cool_off)

        context.update({
            'cooloff_time': iso8601(cool_off)
        })

    if request.is_ajax():
        return HttpResponse(
            json.dumps(context),
            content_type='application/json',
            status=403,
        )

    elif settings.AXES_LOCKOUT_TEMPLATE:
        return render(
            request, settings.AXES_LOCKOUT_TEMPLATE, context, status=403
        )

    elif settings.AXES_LOCKOUT_URL:
        return HttpResponseRedirect(settings.AXES_LOCKOUT_URL)

    return HttpResponse(get_lockout_message(), status=403)
Exemple #4
0
def lockout_response(request):
    context = {
        'failure_limit': Settings.objects.first().failure_limit,
        'username': get_client_username(request) or ''
    }

    cool_off = settings.AXES_COOLOFF_TIME
    if cool_off:
        if isinstance(cool_off, (int, float)):
            cool_off = timedelta(hours=cool_off)

        context.update({'cooloff_time': iso8601(cool_off)})

    if request.is_ajax():
        return HttpResponse(
            json.dumps(context),
            content_type='application/json',
            status=403,
        )

    elif settings.AXES_LOCKOUT_TEMPLATE:
        return render(request,
                      settings.AXES_LOCKOUT_TEMPLATE,
                      context,
                      status=403)

    elif settings.AXES_LOCKOUT_URL:
        return HttpResponseRedirect(settings.AXES_LOCKOUT_URL)

    return HttpResponse(get_lockout_message(), status=403)
    def authenticate(self, request, username=None, password=None, **kwargs):

        if request is None:
            raise AxesModelBackend.RequestParameterRequired()

        try:
            user = User.objects.get(email__iexact=username)
            if user.check_password(password):
                return
        except User.DoesNotExist:
            if config.ELGG_URL:
                elgg_urls =  config.ELGG_URL.splitlines()

                for url in elgg_urls:
                    # Verify username/password combination
                    valid_user_request = requests.post(
                        url + "/services/api/rest/json/",
                        data={
                            'method': 'pleio.verifyuser',
                            'user': username,
                            'password': password
                        }
                    )
                    valid_user_json = json.loads(valid_user_request.text)
                    valid_user_result = valid_user_json["result"] if 'result' in valid_user_json else []
                    valid_user = valid_user_result["valid"] if 'valid' in valid_user_result else False
                    name = valid_user_result["name"] if 'name' in valid_user_result else username
                    admin = valid_user_result["admin"] if 'admin' in valid_user_result else False

                    # If valid, create new user with Elgg attributes
                    if valid_user is True:
                        user = User.objects.create_user(
                            name=name,
                            email=username.lower(),
                            password=password,
                            accepted_terms=True,
                            receives_newsletter=True
                        )
                        user.is_active = True
                        user.is_admin = admin
                        user.save()
                        service_mesh_message('user.new', json.dumps({
                            'name': user.name,
                            'email': user.email,
                            'gcID': user.id,
                            'isAdmin': user.is_admin
                        }))
                        break

        credentials = get_credentials(username=username, password=password, **kwargs)

        if is_already_locked(request, credentials):
            error_msg = get_lockout_message()
            response_context = kwargs.get('response_context', {})
            response_context['error'] = error_msg
            raise PermissionDenied(error_msg)

        return
Exemple #6
0
    def authenticate(self, request, username=None, password=None, **kwargs):
        """
        Check user lock out status and raises PermissionDenied if user is not allowed to log in.

        Inserts errors directly to `return_context` that is supplied as a keyword argument.

        Use this on top of your AUTHENTICATION_BACKENDS list to prevent locked out users
        from being authenticated in the standard Django authentication flow.

        Note that this method does not log your user in and delegates login to other backends.

        :param request: see django.contrib.auth.backends.ModelBackend.authenticate
        :param username: see django.contrib.auth.backends.ModelBackend.authenticate
        :param password: see django.contrib.auth.backends.ModelBackend.authenticate
        :param kwargs: see django.contrib.auth.backends.ModelBackend.authenticate
        :keyword response_context: context dict that will be updated with error information
        :raises AxesBackendRequestParameterRequired: if request parameter is not given correctly
        :raises AxesBackendPermissionDenied: if user is already locked out
        :return: None
        """

        if request is None:
            raise AxesBackendRequestParameterRequired(
                'AxesBackend requires a request as an argument to authenticate'
            )

        credentials = get_credentials(username=username,
                                      password=password,
                                      **kwargs)

        if is_already_locked(request, credentials):
            # locked out, don't try to authenticate, just update return_context and return
            # Its a bit weird to pass a context and expect a response value but its nice to get a "why" back.
            error_msg = get_lockout_message()
            response_context = kwargs.get('response_context', {})
            response_context['error'] = error_msg

            # Raise an error that stops the authentication flows at django.contrib.auth.authenticate.
            # This error stops bubbling up at the authenticate call which catches backend PermissionDenied errors.
            # After this error is caught by authenticate it emits a signal indicating user login failed,
            # which is processed by axes.signals.log_user_login_failed which logs the attempt and raises
            # a second exception which bubbles up the middleware stack and produces a HTTP 403 Forbidden reply
            # in the axes.middleware.AxesMiddleware.process_exception middleware exception handler.

            raise AxesBackendPermissionDenied(
                'AxesBackend detected that the given user is locked out')
Exemple #7
0
    def authenticate(self, request, username=None, password=None, **kwargs):
        """
        Check user lock out status and raises PermissionDenied if user is not allowed to log in.

        Inserts errors directly to `return_context` that is supplied as a keyword argument.

        Use this on top of your AUTHENTICATION_BACKENDS list to prevent locked out users
        from being authenticated in the standard Django authentication flow.

        Note that this method does not log your user in and delegates login to other backends.

        :param request: see django.contrib.auth.backends.ModelBackend.authenticate
        :param username: see django.contrib.auth.backends.ModelBackend.authenticate
        :param password: see django.contrib.auth.backends.ModelBackend.authenticate
        :param kwargs: see django.contrib.auth.backends.ModelBackend.authenticate
        :keyword response_context: context dict that will be updated with error information
        :raises AxesBackendRequestParameterRequired: if request parameter is not given correctly
        :raises AxesBackendPermissionDenied: if user is already locked out
        :return: None
        """

        if request is None:
            raise AxesBackendRequestParameterRequired('AxesBackend requires a request as an argument to authenticate')

        credentials = get_credentials(username=username, password=password, **kwargs)

        if is_already_locked(request, credentials):
            # locked out, don't try to authenticate, just update return_context and return
            # Its a bit weird to pass a context and expect a response value but its nice to get a "why" back.
            error_msg = get_lockout_message()
            response_context = kwargs.get('response_context', {})
            response_context['error'] = error_msg

            # Raise an error that stops the authentication flows at django.contrib.auth.authenticate.
            # This error stops bubbling up at the authenticate call which catches backend PermissionDenied errors.
            # After this error is caught by authenticate it emits a signal indicating user login failed,
            # which is processed by axes.signals.log_user_login_failed which logs the attempt and raises
            # a second exception which bubbles up the middleware stack and produces a HTTP 403 Forbidden reply
            # in the axes.middleware.AxesMiddleware.process_exception middleware exception handler.

            raise AxesBackendPermissionDenied('AxesBackend detected that the given user is locked out')
Exemple #8
0
    def authenticate(self, request, username=None, password=None, **kwargs):
        """
        Add django-axes handling and add allow adding errors directly to a passed return_context.
        Will never actually authenticate a user, just blocks locked out uses so don't use this as your only back end.
        :param request: see ModelBackend.authenticate
        :param username: see ModelBackend.authenticate
        :param password: see ModelBackend.authenticate
        :keyword response_context: context dict that will be returned/used in the response template.
            NOTE: will overwrite 'error' field in dict
        :param kwargs: see ModelBackend.authenticate
        :raises PermissionDenied: if user is already locked out.
        :return: Nothing, but will update return_context with lockout message if user is locked out.
        """

        if request is None:
            raise AxesModelBackend.RequestParameterRequired()

        if is_already_locked(request):
            # locked out, don't try to authenticate, just update return_context and return
            # Its a bit weird to pass a context and expect a response value but its nice to get a "why" back.
            error_msg = get_lockout_message()
            response_context = kwargs.get('response_context', {})
            response_context['error'] = error_msg
            raise PermissionDenied(error_msg)