except InvalidAuthentication, e:
request.session['auth_error'] = e.message
- return HttpResponseRedirect(reverse('auth_signin'))
+ return HttpResponseRedirect(reverse('auth_signin'))
+ else:
+ raise Http404()
def process_provider_signin(request, provider):
uassoc = AuthKeyUserAssociation(user=request.user, key=assoc_key, provider=provider)
uassoc.save()
request.user.message_set.create(message=_('The new credentials are now associated with your account'))
- return HttpResponseRedirect(reverse('user_authsettings'))
+ return HttpResponseRedirect(reverse('user_authsettings', args=[request.user.id]))
return HttpResponseRedirect(reverse('auth_signin'))
else:
del request.session['assoc_key']
del request.session['auth_provider']
- if user_.email_isvalid:
- return login_and_forward(request, user_)
- else:
- return HttpResponseRedirect(reverse('index'))
+ return login_and_forward(request, user_)
else:
provider_class = AUTH_PROVIDERS[request.session['auth_provider']].consumer
user_data = provider_class.get_user_data(request.session['assoc_key'])
+ if not user_data:
+ user_data = request.session.get('auth_consumer_data', {})
+
username = user_data.get('username', '')
email = user_data.get('email', '')
- if not email:
- email = request.session.get('auth_email_request', '')
-
if email:
request.session['auth_validated_email'] = email
user = get_object_or_404(User, id=user)
if (ValidationHash.objects.validate(code, user, 'templogin', [user.id])):
- return login_and_forward(request, user, reverse('user_authsettings'),
+ return login_and_forward(request, user, reverse('user_authsettings', kwargs={'id': user.id}),
_("You are logged in with a temporary access key, please take the time to fix your issue with authentication."))
else:
raise Http404()
raise Http404()
@login_required
-def auth_settings(request):
- """
- change password view.
+def auth_settings(request, id):
+ user_ = get_object_or_404(User, id=id)
+
+ if not (request.user.is_superuser or request.user == user_):
+ return HttpResponseForbidden()
- url : /changepw/
- template: authopenid/changepw.html
- """
- user_ = request.user
auth_keys = user_.auth_keys.all()
if user_.has_usable_password():
user_.set_password(form.cleaned_data['password1'])
user_.save()
- return HttpResponseRedirect(reverse('user_authsettings'))
+ return HttpResponseRedirect(reverse('user_authsettings', kwargs={'id': user_.id}))
form = FormClass(user=user_)
})
return render_to_response('auth/auth_settings.html', {
+ 'view_user': user_,
+ "can_view_private": (user_ == request.user) or request.user.is_superuser,
'form': form,
'has_password': user_.has_usable_password(),
'auth_keys': auth_keys_list,
def remove_external_provider(request, id):
association = get_object_or_404(AuthKeyUserAssociation, id=id)
- if not association.user == request.user:
+ if not (request.user.is_superuser or request.user == association.user):
return HttpResponseForbidden()
+
request.user.message_set.create(message=_("You removed the association with %s") % association.provider)
association.delete()
- return HttpResponseRedirect(reverse('user_authsettings'))
+ return HttpResponseRedirect(reverse('user_authsettings', kwargs={'id': association.user.id}))
def newquestion_signin_action(user):
question = Question.objects.filter(author=user).order_by('-added_at')[0]
user.backend = "django.contrib.auth.backends.ModelBackend"
login(request, user)
- #user_logged_in.send(user=user,old_session=old_session,sender=None)
temp_data = request.session.pop('temp_node_data', None)
if temp_data:
request.POST = temp_data