from django.utils import httpwrappers from django.core.extensions import DjangoContext from django.core.extensions import render_to_response from django.models.auth import users from django.views.registration import passwords from django.views.auth.login import logout import base64, md5 import cPickle as pickle from django.conf.settings import SECRET_KEY ERROR_MESSAGE = "Please enter a correct username and password. Note that both fields are case-sensitive." class AdminUserRequired: """ Admin middleware. If this is enabled, access to the site will be granted only to valid users with the "is_staff" flag set. """ def process_view(self, request, view_func, param_dict): """ Make sure the user is logged in and is a valid admin user before allowing any access. Done at the view point because we need to know if we're running the password reset function. """ # If this is the password reset view, we don't want to require login # Otherwise the password reset would need its own entry in the httpd # conf, which is a little uglier than this. Same goes for the logout # view. if view_func in (passwords.password_reset, passwords.password_reset_done, logout): return assert hasattr(request, 'session'), "The admin requires session middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 'django.middleware.sessions.SessionMiddleware' before %r." % self.__class__.__name__ # Check for a logged in, valid user if self.user_is_valid(request.user): return # If this isn't already the login page, display it if not request.POST.has_key('this_is_the_login_form'): if request.POST: message = "Please log in again, because your session has expired. "\ "Don't worry: Your submission has been saved." else: message = "" return self.display_login_form(request, message) # Check that the user accepts cookies. if not request.session.test_cookie_worked(): message = "Looks like your browser isn't configured to accept cookies. Please enable cookies, reload this page, and try again." return self.display_login_form(request, message) # Check the password username = request.POST.get('username', '') try: user = users.get_object(username__exact=username) except users.UserDoesNotExist: message = ERROR_MESSAGE if '@' in username: # Mistakenly entered e-mail address instead of username? Look it up. try: user = users.get_object(email__exact=username) except users.UserDoesNotExist: message = "Usernames cannot contain the '@' character." else: message = "Your e-mail address is not your username. Try '%s' instead." % user.username return self.display_login_form(request, message) # The user data is correct; log in the user in and continue else: if self.authenticate_user(user, request.POST.get('password', '')): request.session[users.SESSION_KEY] = user.id if request.POST.has_key('post_data'): post_data = decode_post_data(request.POST['post_data']) if post_data and not post_data.has_key('this_is_the_login_form'): # overwrite request.POST with the saved post_data, and continue request.POST = post_data request.user = user return else: request.session.delete_test_cookie() return httpwrappers.HttpResponseRedirect(request.path) else: return self.display_login_form(request, ERROR_MESSAGE) def display_login_form(self, request, error_message=''): request.session.set_test_cookie() if request.POST and request.POST.has_key('post_data'): # User has failed login BUT has previously saved 'post_data' post_data = request.POST['post_data'] elif request.POST: # User's session must have expired; save their post data post_data = encode_post_data(request.POST) else: post_data = encode_post_data({}) return render_to_response(self.get_login_template_name(), { 'title': 'Log in', 'app_path': request.path, 'post_data': post_data, 'error_message': error_message }, context_instance=DjangoContext(request)) def authenticate_user(self, user, password): return user.check_password(password) and user.is_staff def user_is_valid(self, user): return not user.is_anonymous() and user.is_staff def get_login_template_name(self): return "login" def encode_post_data(post_data): pickled = pickle.dumps(post_data) pickled_md5 = md5.new(pickled + SECRET_KEY).hexdigest() return base64.encodestring(pickled + pickled_md5) def decode_post_data(encoded_data): encoded_data = base64.decodestring(encoded_data) pickled, tamper_check = encoded_data[:-32], encoded_data[-32:] if md5.new(pickled + SECRET_KEY).hexdigest() != tamper_check: from django.core.exceptions import SuspiciousOperation raise SuspiciousOperation, "User may have tampered with session cookie." return pickle.loads(pickled)