Merge branch 'feature/56-refresh-token-on-password-change' into 'develop'

Fixed #56: invalidate tokens on password change, also added change password form

Closes #56

See merge request funkwhale/funkwhale!37
This commit is contained in:
Eliot Berriot 2017-12-26 14:56:56 +00:00
commit 60d8ca52de
11 changed files with 195 additions and 3 deletions

View File

@ -280,8 +280,9 @@ JWT_AUTH = {
'JWT_EXPIRATION_DELTA': datetime.timedelta(days=7), 'JWT_EXPIRATION_DELTA': datetime.timedelta(days=7),
'JWT_REFRESH_EXPIRATION_DELTA': datetime.timedelta(days=30), 'JWT_REFRESH_EXPIRATION_DELTA': datetime.timedelta(days=30),
'JWT_AUTH_HEADER_PREFIX': 'JWT', 'JWT_AUTH_HEADER_PREFIX': 'JWT',
'JWT_GET_USER_SECRET_KEY': lambda user: user.secret_key
} }
OLD_PASSWORD_FIELD_ENABLED = True
ACCOUNT_ADAPTER = 'funkwhale_api.users.adapters.FunkwhaleAccountAdapter' ACCOUNT_ADAPTER = 'funkwhale_api.users.adapters.FunkwhaleAccountAdapter'
CORS_ORIGIN_ALLOW_ALL = True CORS_ORIGIN_ALLOW_ALL = True
# CORS_ORIGIN_WHITELIST = ( # CORS_ORIGIN_WHITELIST = (

View File

@ -0,0 +1,24 @@
# Generated by Django 2.0 on 2017-12-26 13:57
from django.db import migrations, models
import uuid
class Migration(migrations.Migration):
dependencies = [
('users', '0002_auto_20171214_2205'),
]
operations = [
migrations.AddField(
model_name='user',
name='secret_key',
field=models.UUIDField(default=uuid.uuid4, null=True),
),
migrations.AlterField(
model_name='user',
name='last_name',
field=models.CharField(blank=True, max_length=150, verbose_name='last name'),
),
]

View File

@ -1,6 +1,8 @@
# -*- coding: utf-8 -*- # -*- coding: utf-8 -*-
from __future__ import unicode_literals, absolute_import from __future__ import unicode_literals, absolute_import
import uuid
from django.contrib.auth.models import AbstractUser from django.contrib.auth.models import AbstractUser
from django.urls import reverse from django.urls import reverse
from django.db import models from django.db import models
@ -15,6 +17,8 @@ class User(AbstractUser):
# around the globe. # around the globe.
name = models.CharField(_("Name of User"), blank=True, max_length=255) name = models.CharField(_("Name of User"), blank=True, max_length=255)
# updated on logout or password change, to invalidate JWT
secret_key = models.UUIDField(default=uuid.uuid4, null=True)
# permissions that are used for API access and that worth serializing # permissions that are used for API access and that worth serializing
relevant_permissions = { relevant_permissions = {
# internal_codename : {external_codename} # internal_codename : {external_codename}
@ -31,3 +35,11 @@ class User(AbstractUser):
def get_absolute_url(self): def get_absolute_url(self):
return reverse('users:detail', kwargs={'username': self.username}) return reverse('users:detail', kwargs={'username': self.username})
def update_secret_key(self):
self.secret_key = uuid.uuid4()
return self.secret_key
def set_password(self, raw_password):
super().set_password(raw_password)
self.update_secret_key()

View File

@ -2,11 +2,15 @@ from django.views.generic import TemplateView
from django.conf.urls import url from django.conf.urls import url
from rest_auth.registration.views import VerifyEmailView from rest_auth.registration.views import VerifyEmailView
from rest_auth.views import PasswordChangeView
from .views import RegisterView from .views import RegisterView
urlpatterns = [ urlpatterns = [
url(r'^$', RegisterView.as_view(), name='rest_register'), url(r'^$', RegisterView.as_view(), name='rest_register'),
url(r'^verify-email/$', VerifyEmailView.as_view(), name='rest_verify_email'), url(r'^verify-email/$', VerifyEmailView.as_view(), name='rest_verify_email'),
url(r'^change-password/$', PasswordChangeView.as_view(), name='change_password'),
# This url is used by django-allauth and empty TemplateView is # This url is used by django-allauth and empty TemplateView is
# defined just to allow reverse() call inside app, for example when email # defined just to allow reverse() call inside app, for example when email

View File

@ -0,0 +1,27 @@
import pytest
import uuid
from jwt.exceptions import DecodeError
from rest_framework_jwt.settings import api_settings
from funkwhale_api.users.models import User
def test_can_invalidate_token_when_changing_user_secret_key(factories):
user = factories['users.User']()
u1 = user.secret_key
jwt_payload_handler = api_settings.JWT_PAYLOAD_HANDLER
jwt_encode_handler = api_settings.JWT_ENCODE_HANDLER
payload = jwt_payload_handler(user)
payload = jwt_encode_handler(payload)
# this should work
api_settings.JWT_DECODE_HANDLER(payload)
# now we update the secret key
user.update_secret_key()
user.save()
assert user.secret_key != u1
# token should be invalid
with pytest.raises(DecodeError):
api_settings.JWT_DECODE_HANDLER(payload)

View File

@ -97,3 +97,22 @@ def test_can_refresh_token_via_api(client, factories):
assert '"token":' in response.content.decode('utf-8') assert '"token":' in response.content.decode('utf-8')
# a different token should be returned # a different token should be returned
assert token in response.content.decode('utf-8') assert token in response.content.decode('utf-8')
def test_changing_password_updates_secret_key(logged_in_client):
user = logged_in_client.user
password = user.password
secret_key = user.secret_key
payload = {
'old_password': 'test',
'new_password1': 'new',
'new_password2': 'new',
}
url = reverse('change_password')
response = logged_in_client.post(url, payload)
user.refresh_from_db()
assert user.secret_key != secret_key
assert user.password != password

View File

@ -17,6 +17,10 @@
<i class="star icon"></i> <i class="star icon"></i>
Staff member Staff member
</div> </div>
<router-link class="ui tiny basic button" :to="{path: '/settings'}">
<i class="setting icon"> </i>Settings...
</router-link>
</div> </div>
</template> </template>
</div> </div>

View File

@ -0,0 +1,84 @@
<template>
<div class="main pusher">
<div class="ui vertical stripe segment">
<div class="ui small text container">
<h2>Change my password</h2>
<form class="ui form" @submit.prevent="submit()">
<div v-if="error" class="ui negative message">
<div class="header">Cannot change your password</div>
<ul class="list">
<li v-if="error == 'invalid_credentials'">Please double-check your password is correct</li>
</ul>
</div>
<div class="field">
<label>Old password</label>
<input
required
type="password"
autofocus
placeholder="Enter your old password"
v-model="old_password">
</div>
<div class="field">
<label>New password</label>
<input
required
type="password"
autofocus
placeholder="Enter your new password"
v-model="new_password">
</div>
<button :class="['ui', {'loading': isLoading}, 'button']" type="submit">Change password</button>
</form>
</div>
</div>
</div>
</template>
<script>
import Vue from 'vue'
import config from '@/config'
import logger from '@/logging'
export default {
data () {
return {
// We need to initialize the component with any
// properties that will be used in it
old_password: '',
new_password: '',
error: '',
isLoading: false
}
},
methods: {
submit () {
var self = this
self.isLoading = true
this.error = ''
var credentials = {
old_password: this.old_password,
new_password1: this.new_password,
new_password2: this.new_password
}
let resource = Vue.resource(config.BACKEND_URL + 'api/auth/registration/change-password/')
return resource.save({}, credentials).then(response => {
logger.default.info('Password successfully changed')
self.$router.push('/profile/me')
}, response => {
if (response.status === 400) {
self.error = 'invalid_credentials'
} else {
self.error = 'unknown_error'
}
self.isLoading = false
})
}
}
}
</script>
<!-- Add "scoped" attribute to limit CSS to this component only -->
<style scoped>
</style>

View File

@ -31,6 +31,7 @@ Vue.http.interceptors.push(function (request, next) {
next(function (response) { next(function (response) {
// redirect to login form when we get unauthorized response from server // redirect to login form when we get unauthorized response from server
if (response.status === 401) { if (response.status === 401) {
store.commit('auth/authenticated', false)
logger.default.warn('Received 401 response from API, redirecting to login form') logger.default.warn('Received 401 response from API, redirecting to login form')
router.push({name: 'login', query: {next: router.currentRoute.fullPath}}) router.push({name: 'login', query: {next: router.currentRoute.fullPath}})
} }

View File

@ -4,6 +4,7 @@ import PageNotFound from '@/components/PageNotFound'
import Home from '@/components/Home' import Home from '@/components/Home'
import Login from '@/components/auth/Login' import Login from '@/components/auth/Login'
import Profile from '@/components/auth/Profile' import Profile from '@/components/auth/Profile'
import Settings from '@/components/auth/Settings'
import Logout from '@/components/auth/Logout' import Logout from '@/components/auth/Logout'
import Library from '@/components/library/Library' import Library from '@/components/library/Library'
import LibraryHome from '@/components/library/Home' import LibraryHome from '@/components/library/Home'
@ -39,6 +40,11 @@ export default new Router({
name: 'logout', name: 'logout',
component: Logout component: Logout
}, },
{
path: '/settings',
name: 'settings',
component: Settings
},
{ {
path: '/@:username', path: '/@:username',
name: 'profile', name: 'profile',

View File

@ -29,13 +29,24 @@ export default {
}, },
authenticated: (state, value) => { authenticated: (state, value) => {
state.authenticated = value state.authenticated = value
if (value === false) {
state.username = null
state.token = null
state.tokenData = null
state.profile = null
state.availablePermissions = {}
}
}, },
username: (state, value) => { username: (state, value) => {
state.username = value state.username = value
}, },
token: (state, value) => { token: (state, value) => {
state.token = value state.token = value
state.tokenData = jwtDecode(value) if (value) {
state.tokenData = jwtDecode(value)
} else {
state.tokenData = {}
}
}, },
permission: (state, {key, status}) => { permission: (state, {key, status}) => {
state.availablePermissions[key] = status state.availablePermissions[key] = status
@ -60,7 +71,6 @@ export default {
}, },
logout ({commit}) { logout ({commit}) {
commit('authenticated', false) commit('authenticated', false)
commit('profile', null)
logger.default.info('Log out, goodbye!') logger.default.info('Log out, goodbye!')
router.push({name: 'index'}) router.push({name: 'index'})
}, },