
* root: initial rename * web: rename custom element prefix * root: rename external functions with pb_ prefix * root: fix formatting * root: replace domain with goauthentik.io * proxy: update path * root: rename remaining prefixes * flows: rename file extension * root: pbadmin -> akadmin * docs: fix image filenames * lifecycle: ignore migration files * ci: copy default config from current source before loading last tagged * *: new sentry dsn * tests: fix missing python3.9-dev package * root: add additional migrations for service accounts created by outposts * core: mark system-created service accounts with attribute * policies/expression: fix pb_ replacement not working * web: fix last linting errors, add lit-analyse * policies/expressions: fix lint errors * web: fix sidebar display on screens where not all items fit * proxy: attempt to fix proxy pipeline * proxy: use go env GOPATH to get gopath * lib: fix user_default naming inconsistency * docs: add upgrade docs * docs: update screenshots to use authentik * admin: fix create button on empty-state of outpost * web: fix modal submit not refreshing SiteShell and Table * web: fix height of app-card and height of generic icon * web: fix rendering of subtext * admin: fix version check error not being caught * web: fix worker count not being shown * docs: update screenshots * root: new icon * web: fix lint error * admin: fix linting error * root: migrate coverage config to pyproject
63 lines
2.1 KiB
Python
63 lines
2.1 KiB
Python
"""authentik password_expiry_policy Models"""
|
|
from datetime import timedelta
|
|
from typing import Type
|
|
|
|
from django.db import models
|
|
from django.forms import ModelForm
|
|
from django.utils.timezone import now
|
|
from django.utils.translation import gettext as _
|
|
from rest_framework.serializers import BaseSerializer
|
|
from structlog import get_logger
|
|
|
|
from authentik.policies.models import Policy
|
|
from authentik.policies.types import PolicyRequest, PolicyResult
|
|
|
|
LOGGER = get_logger()
|
|
|
|
|
|
class PasswordExpiryPolicy(Policy):
|
|
"""If password change date is more than x days in the past, invalidate the user's password
|
|
and show a notice"""
|
|
|
|
deny_only = models.BooleanField(default=False)
|
|
days = models.IntegerField()
|
|
|
|
@property
|
|
def serializer(self) -> BaseSerializer:
|
|
from authentik.policies.expiry.api import PasswordExpiryPolicySerializer
|
|
|
|
return PasswordExpiryPolicySerializer
|
|
|
|
@property
|
|
def form(self) -> Type[ModelForm]:
|
|
from authentik.policies.expiry.forms import PasswordExpiryPolicyForm
|
|
|
|
return PasswordExpiryPolicyForm
|
|
|
|
def passes(self, request: PolicyRequest) -> PolicyResult:
|
|
"""If password change date is more than x days in the past, call set_unusable_password
|
|
and show a notice"""
|
|
actual_days = (now() - request.user.password_change_date).days
|
|
days_since_expiry = (
|
|
now() - (request.user.password_change_date + timedelta(days=self.days))
|
|
).days
|
|
if actual_days >= self.days:
|
|
if not self.deny_only:
|
|
request.user.set_unusable_password()
|
|
request.user.save()
|
|
message = _(
|
|
(
|
|
"Password expired %(days)d days ago. "
|
|
"Please update your password."
|
|
)
|
|
% {"days": days_since_expiry}
|
|
)
|
|
return PolicyResult(False, message)
|
|
return PolicyResult(False, _("Password has expired."))
|
|
return PolicyResult(True)
|
|
|
|
class Meta:
|
|
|
|
verbose_name = _("Password Expiry Policy")
|
|
verbose_name_plural = _("Password Expiry Policies")
|