2018-12-10 13:05:27 +00:00
|
|
|
"""passbook core signals"""
|
|
|
|
|
|
|
|
from django.core.signals import Signal
|
2019-02-26 14:40:58 +00:00
|
|
|
from django.dispatch import receiver
|
2018-12-10 13:05:27 +00:00
|
|
|
|
2019-02-26 14:40:58 +00:00
|
|
|
from passbook.core.exceptions import PasswordPolicyInvalid
|
2018-12-10 13:05:27 +00:00
|
|
|
|
|
|
|
user_signed_up = Signal(providing_args=['request', 'user'])
|
2018-12-10 13:21:42 +00:00
|
|
|
invitation_created = Signal(providing_args=['request', 'invitation'])
|
|
|
|
invitation_used = Signal(providing_args=['request', 'invitation', 'user'])
|
2019-02-25 14:41:36 +00:00
|
|
|
password_changed = Signal(providing_args=['user', 'password'])
|
2019-02-26 14:40:58 +00:00
|
|
|
|
|
|
|
@receiver(password_changed)
|
|
|
|
# pylint: disable=unused-argument
|
|
|
|
def password_policy_checker(sender, password, **kwargs):
|
|
|
|
"""Run password through all password policies which are applied to the user"""
|
|
|
|
from passbook.core.models import PasswordFactor
|
|
|
|
from passbook.core.policies import PolicyEngine
|
|
|
|
setattr(sender, '__password__', password)
|
|
|
|
_all_factors = PasswordFactor.objects.filter(enabled=True).order_by('order')
|
|
|
|
for factor in _all_factors:
|
2019-02-27 14:49:20 +00:00
|
|
|
policy_engine = PolicyEngine(factor.password_policies.all().select_subclasses())
|
2019-03-03 19:26:25 +00:00
|
|
|
policy_engine.for_user(sender).build()
|
2019-02-27 14:49:20 +00:00
|
|
|
passing, messages = policy_engine.result
|
|
|
|
if not passing:
|
|
|
|
raise PasswordPolicyInvalid(*messages)
|