app-MAIL-temp/app/dashboard/views/enter_sudo.py

81 lines
2.6 KiB
Python
Raw Normal View History

2020-10-15 16:45:28 +02:00
from functools import wraps
2020-05-18 11:14:40 +02:00
from time import time
from flask import render_template, flash, redirect, url_for, session, request
from flask_login import login_required, current_user
from flask_wtf import FlaskForm
from wtforms import PasswordField, validators
2024-03-13 14:30:00 +01:00
from app.config import CONNECT_WITH_PROTON, OIDC_CLIENT_ID, CONNECT_WITH_OIDC_ICON
2020-05-18 11:14:40 +02:00
from app.dashboard.base import dashboard_bp
from app.extensions import limiter
2020-05-18 11:14:40 +02:00
from app.log import LOG
2024-03-13 14:30:00 +01:00
from app.models import PartnerUser, SocialAuth
from app.proton.utils import get_proton_partner
2022-03-29 18:03:18 +02:00
from app.utils import sanitize_next_url
2020-05-18 11:14:40 +02:00
2020-05-18 22:46:13 +02:00
_SUDO_GAP = 900
2020-05-18 11:14:40 +02:00
2020-05-18 22:54:05 +02:00
2020-05-18 11:14:40 +02:00
class LoginForm(FlaskForm):
password = PasswordField("Password", validators=[validators.DataRequired()])
@dashboard_bp.route("/enter_sudo", methods=["GET", "POST"])
@limiter.limit("3/minute")
2020-05-18 11:14:40 +02:00
@login_required
def enter_sudo():
password_check_form = LoginForm()
if password_check_form.validate_on_submit():
password = password_check_form.password.data
if current_user.check_password(password):
session["sudo_time"] = int(time())
# User comes to sudo page from another page
2022-03-29 18:03:18 +02:00
next_url = sanitize_next_url(request.args.get("next"))
2020-05-18 11:14:40 +02:00
if next_url:
2021-09-08 11:29:55 +02:00
LOG.d("redirect user to %s", next_url)
2020-05-18 11:14:40 +02:00
return redirect(next_url)
else:
2021-09-08 11:29:55 +02:00
LOG.d("redirect user to dashboard")
2020-05-18 11:14:40 +02:00
return redirect(url_for("dashboard.index"))
else:
flash("Incorrect password", "warning")
proton_enabled = CONNECT_WITH_PROTON
if proton_enabled:
# Only for users that have the account linked
partner_user = PartnerUser.get_by(user_id=current_user.id)
if not partner_user or partner_user.partner_id != get_proton_partner().id:
proton_enabled = False
2024-03-13 14:30:00 +01:00
oidc_enabled = OIDC_CLIENT_ID is not None
if oidc_enabled:
oidc_enabled = (
SocialAuth.get_by(user_id=current_user.id, social="oidc") is not None
)
2020-05-18 11:14:40 +02:00
return render_template(
"dashboard/enter_sudo.html",
password_check_form=password_check_form,
next=request.args.get("next"),
connect_with_proton=proton_enabled,
2024-03-13 14:30:00 +01:00
connect_with_oidc=oidc_enabled,
connect_with_oidc_icon=CONNECT_WITH_OIDC_ICON,
2020-05-18 11:14:40 +02:00
)
2020-05-18 11:15:52 +02:00
2020-05-18 11:14:40 +02:00
def sudo_required(f):
@wraps(f)
def wrap(*args, **kwargs):
2020-05-18 11:15:52 +02:00
if (
"sudo_time" not in session
2020-05-18 22:46:13 +02:00
or (time() - int(session["sudo_time"])) > _SUDO_GAP
2020-05-18 11:15:52 +02:00
):
return redirect(url_for("dashboard.enter_sudo", next=request.path))
2020-05-18 11:14:40 +02:00
return f(*args, **kwargs)
2020-05-18 11:15:52 +02:00
return wrap