2024-01-04 11:43:24 +00:00
|
|
|
import nacl
|
|
|
|
import base64
|
|
|
|
|
2024-01-04 15:27:27 +00:00
|
|
|
from nacl import pwhash
|
2023-10-25 15:49:17 +00:00
|
|
|
from django.db import models
|
2024-01-04 11:43:24 +00:00
|
|
|
from django.core.cache import cache
|
2023-12-14 16:59:40 +00:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
2023-10-25 15:49:17 +00:00
|
|
|
from django.contrib.auth.models import BaseUserManager, AbstractBaseUser
|
|
|
|
|
|
|
|
|
|
|
|
class UserManager(BaseUserManager):
|
|
|
|
def create_user(self, email, password=None):
|
|
|
|
"""
|
|
|
|
Creates and saves a User with the given email, date of
|
|
|
|
birth and password.
|
|
|
|
"""
|
|
|
|
if not email:
|
|
|
|
raise ValueError("Users must have an email address")
|
|
|
|
|
|
|
|
user = self.model(
|
|
|
|
email=self.normalize_email(email),
|
|
|
|
)
|
|
|
|
|
|
|
|
user.set_password(password)
|
|
|
|
user.save(using=self._db)
|
|
|
|
return user
|
|
|
|
|
|
|
|
def create_superuser(self, email, password=None):
|
|
|
|
"""
|
|
|
|
Creates and saves a superuser with the given email, date of
|
|
|
|
birth and password.
|
|
|
|
"""
|
|
|
|
user = self.create_user(
|
|
|
|
email,
|
|
|
|
password=password,
|
|
|
|
)
|
|
|
|
user.is_admin = True
|
|
|
|
user.save(using=self._db)
|
|
|
|
return user
|
|
|
|
|
|
|
|
|
|
|
|
class User(AbstractBaseUser):
|
|
|
|
email = models.EmailField(
|
2023-12-14 16:59:40 +00:00
|
|
|
_('Email address'),
|
2023-10-25 15:49:17 +00:00
|
|
|
max_length=255,
|
|
|
|
unique=True,
|
|
|
|
)
|
|
|
|
is_active = models.BooleanField(default=True)
|
|
|
|
is_admin = models.BooleanField(default=False)
|
2023-12-14 16:59:40 +00:00
|
|
|
first_name = models.CharField(_("First name"), max_length=255, blank=True, null=True)
|
|
|
|
last_name = models.CharField(_("Last name"), max_length=255, blank=True, null=True)
|
2024-01-04 11:43:24 +00:00
|
|
|
encrypted_sensitive_data = models.CharField(max_length=255)
|
|
|
|
salt = models.CharField(max_length=255)
|
2023-10-25 15:49:17 +00:00
|
|
|
|
|
|
|
objects = UserManager()
|
|
|
|
|
|
|
|
USERNAME_FIELD = "email"
|
|
|
|
REQUIRED_FIELDS = []
|
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return self.email
|
|
|
|
|
|
|
|
def has_perm(self, perm, obj=None):
|
|
|
|
"Does the user have a specific permission?"
|
|
|
|
# Simplest possible answer: Yes, always
|
|
|
|
return True
|
|
|
|
|
|
|
|
def has_module_perms(self, app_label):
|
|
|
|
"Does the user have permissions to view the app `app_label`?"
|
|
|
|
# Simplest possible answer: Yes, always
|
|
|
|
return True
|
|
|
|
|
|
|
|
@property
|
|
|
|
def is_staff(self):
|
|
|
|
"Is the user a member of staff?"
|
|
|
|
# Simplest possible answer: All admins are staff
|
|
|
|
return self.is_admin
|
|
|
|
|
|
|
|
@property
|
|
|
|
def username(self):
|
|
|
|
"Is the email of the user"
|
|
|
|
return self.email
|
2023-11-13 17:09:37 +00:00
|
|
|
|
|
|
|
def get_memberships(self):
|
|
|
|
members = set(
|
|
|
|
str(dict(x.Types.choices)[x.type]) for x in self.memberships.all()
|
|
|
|
)
|
|
|
|
return ", ".join(members)
|
|
|
|
|
|
|
|
def get_roles(self):
|
|
|
|
roles = []
|
|
|
|
for s in self.roles.all():
|
|
|
|
for r in s.service.rol.all():
|
|
|
|
roles.append(r.name)
|
|
|
|
return ", ".join(set(roles))
|
2023-12-01 05:39:26 +00:00
|
|
|
|
|
|
|
def derive_key_from_password(self, password):
|
2024-01-04 15:27:27 +00:00
|
|
|
kdf = pwhash.argon2i.kdf
|
|
|
|
ops = pwhash.argon2i.OPSLIMIT_INTERACTIVE
|
|
|
|
mem = pwhash.argon2i.MEMLIMIT_INTERACTIVE
|
2024-01-04 11:43:24 +00:00
|
|
|
return kdf(
|
|
|
|
nacl.secret.SecretBox.KEY_SIZE,
|
|
|
|
password,
|
|
|
|
self.get_salt(),
|
|
|
|
opslimit=ops,
|
|
|
|
memlimit=mem
|
|
|
|
)
|
|
|
|
|
|
|
|
def decrypt_sensitive_data(self, password, data=None):
|
|
|
|
sb_key = self.derive_key_from_password(password.encode('utf-8'))
|
|
|
|
sb = nacl.secret.SecretBox(sb_key)
|
|
|
|
if not data:
|
|
|
|
data = self.get_encrypted_sensitive_data()
|
|
|
|
if not isinstance(data, bytes):
|
|
|
|
data = data.encode('utf-8')
|
|
|
|
|
|
|
|
return sb.decrypt(data).decode('utf-8')
|
|
|
|
|
|
|
|
def encrypt_sensitive_data(self, password, data):
|
|
|
|
sb_key = self.derive_key_from_password(password.encode('utf-8'))
|
|
|
|
sb = nacl.secret.SecretBox(sb_key)
|
|
|
|
if not isinstance(data, bytes):
|
|
|
|
data = data.encode('utf-8')
|
|
|
|
|
2024-01-04 15:27:27 +00:00
|
|
|
return base64.b64encode(sb.encrypt(data)).decode('utf-8')
|
2024-01-04 11:43:24 +00:00
|
|
|
|
|
|
|
def get_salt(self):
|
|
|
|
return base64.b64decode(self.salt.encode('utf-8'))
|
|
|
|
|
|
|
|
def set_salt(self):
|
|
|
|
self.salt = base64.b64encode(nacl.utils.random(16)).decode('utf-8')
|
|
|
|
|
|
|
|
def get_encrypted_sensitive_data(self):
|
|
|
|
return base64.b64decode(self.encrypted_sensitive_data.encode('utf-8'))
|
|
|
|
|
|
|
|
def set_encrypted_sensitive_data(self, password):
|
|
|
|
key = base64.b64encode(nacl.utils.random(64))
|
2024-01-17 12:43:40 +00:00
|
|
|
self.set_salt()
|
2024-01-04 11:43:24 +00:00
|
|
|
|
|
|
|
key_crypted = self.encrypt_sensitive_data(password, key)
|
2024-01-04 15:27:27 +00:00
|
|
|
self.encrypted_sensitive_data = key_crypted
|
2024-01-04 11:43:24 +00:00
|
|
|
|
2024-01-06 18:18:59 +00:00
|
|
|
def encrypt_data(self, data, password):
|
|
|
|
sb = self.get_secret_box(password)
|
2024-01-04 18:17:18 +00:00
|
|
|
value_enc = sb.encrypt(data.encode('utf-8'))
|
|
|
|
return base64.b64encode(value_enc).decode('utf-8')
|
2023-12-01 05:39:26 +00:00
|
|
|
|
2024-01-06 18:18:59 +00:00
|
|
|
def decrypt_data(self, data, password):
|
|
|
|
sb = self.get_secret_box(password)
|
2024-01-04 17:00:24 +00:00
|
|
|
value = base64.b64decode(data.encode('utf-8'))
|
2024-01-04 18:17:18 +00:00
|
|
|
return sb.decrypt(value).decode('utf-8')
|
2024-01-04 17:00:24 +00:00
|
|
|
|
2024-01-06 18:18:59 +00:00
|
|
|
def get_secret_box(self, password):
|
2024-01-17 12:43:40 +00:00
|
|
|
pw = base64.b64decode(password.encode('utf-8')*4)
|
2024-01-04 18:17:18 +00:00
|
|
|
sb_key = self.derive_key_from_password(pw)
|
|
|
|
return nacl.secret.SecretBox(sb_key)
|