Made a simple template rendering view and switched a bunch of code over to using it
[mediagoblin.git] / mediagoblin / auth / views.py
CommitLineData
8e1e744d 1# GNU MediaGoblin -- federated, autonomous media hosting
24181820
CAW
2# Copyright (C) 2011 Free Software Foundation, Inc
3#
4# This program is free software: you can redistribute it and/or modify
5# it under the terms of the GNU Affero General Public License as published by
6# the Free Software Foundation, either version 3 of the License, or
7# (at your option) any later version.
8#
9# This program is distributed in the hope that it will be useful,
10# but WITHOUT ANY WARRANTY; without even the implied warranty of
11# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12# GNU Affero General Public License for more details.
13#
14# You should have received a copy of the GNU Affero General Public License
15# along with this program. If not, see <http://www.gnu.org/licenses/>.
16
a77d952a
CAW
17import uuid
18
1c63ad5d 19from webob import exc
24181820 20
9150244a 21from mediagoblin.util import render_to_response, redirect
e0f84870 22from mediagoblin.db.util import ObjectId
24181820
CAW
23from mediagoblin.auth import lib as auth_lib
24from mediagoblin.auth import forms as auth_forms
02d80437 25from mediagoblin.auth.lib import send_verification_email
24181820
CAW
26
27
28def register(request):
29 """
30 Your classic registration view!
31 """
32 register_form = auth_forms.RegistrationForm(request.POST)
33
34 if request.method == 'POST' and register_form.validate():
35 # TODO: Make sure the user doesn't exist already
ce72a1bb 36
24181820 37 users_with_username = \
ce72a1bb
JK
38 request.db.User.find({
39 'username': request.POST['username'].lower()
40 }).count()
24181820
CAW
41
42 if users_with_username:
43 register_form.username.errors.append(
44 u'Sorry, a user with that name already exists.')
45
46 else:
47 # Create the user
48 entry = request.db.User()
ce72a1bb 49 entry['username'] = request.POST['username'].lower()
24181820
CAW
50 entry['email'] = request.POST['email']
51 entry['pw_hash'] = auth_lib.bcrypt_gen_password_hash(
52 request.POST['password'])
53 entry.save(validate=True)
5c42a82c 54
02d80437
AM
55 send_verification_email(entry, request)
56
9150244a 57 return redirect(request, "mediagoblin.auth.register_success")
24181820 58
9038c9f9
CAW
59 return render_to_response(
60 request,
c9c24934
E
61 'mediagoblin/auth/register.html',
62 {'register_form': register_form})
24181820
CAW
63
64
692fd1c9 65def login(request):
a3776717 66 """
8e1e744d 67 MediaGoblin login view.
a3776717
CAW
68
69 If you provide the POST with 'next', it'll redirect to that view.
70 """
692fd1c9
CAW
71 login_form = auth_forms.LoginForm(request.POST)
72
a3776717
CAW
73 login_failed = False
74
692fd1c9 75 if request.method == 'POST' and login_form.validate():
b058cf15 76 user = request.db.User.one(
ce72a1bb 77 {'username': request.POST['username'].lower()})
692fd1c9 78
d1938963 79 if user and user.check_login(request.POST['password']):
692fd1c9
CAW
80 # set up login in session
81 request.session['user_id'] = unicode(user['_id'])
a3776717 82 request.session.save()
692fd1c9 83
574d1511 84 if request.POST.get('next'):
a3776717
CAW
85 return exc.HTTPFound(location=request.POST['next'])
86 else:
9150244a 87 return redirect(request, "index")
692fd1c9
CAW
88
89 else:
90 # Prevent detecting who's on this system by testing login
91 # attempt timings
92 auth_lib.fake_login_attempt()
a3776717 93 login_failed = True
692fd1c9 94
9038c9f9
CAW
95 return render_to_response(
96 request,
c9c24934
E
97 'mediagoblin/auth/login.html',
98 {'login_form': login_form,
99 'next': request.GET.get('next') or request.POST.get('next'),
100 'login_failed': login_failed})
692fd1c9
CAW
101
102
103def logout(request):
b97232fa
CAW
104 # Maybe deleting the user_id parameter would be enough?
105 request.session.delete()
106
9150244a 107 return redirect(request, "index")
db1a438f 108
5866d1a8 109
db1a438f 110def verify_email(request):
4c093e85
JW
111 """
112 Email verification view
113
114 validates GET parameters against database and unlocks the user account, if
115 you are lucky :)
116 """
155f24f9
CAW
117 # If we don't have userid and token parameters, we can't do anything; 404
118 if not request.GET.has_key('userid') or not request.GET.has_key('token'):
119 return exc.HTTPNotFound()
120
db1a438f 121 user = request.db.User.find_one(
e0f84870 122 {'_id': ObjectId(unicode(request.GET['userid']))})
db1a438f 123
155f24f9 124 if user and user['verification_key'] == unicode(request.GET['token']):
db1a438f
JW
125 user['status'] = u'active'
126 user['email_verified'] = True
127 verification_successful = True
128 user.save()
129 else:
130 verification_successful = False
131
9038c9f9
CAW
132 return render_to_response(
133 request,
c9c24934
E
134 'mediagoblin/auth/verify_email.html',
135 {'user': user,
136 'verification_successful': verification_successful})
28afb47c 137
5866d1a8 138
b93a6a22
AM
139def resend_activation(request):
140 """
141 The reactivation view
142
143 Resend the activation email.
144 """
a77d952a
CAW
145 request.user['verification_key'] = unicode(uuid.uuid4())
146 request.user.save()
b93a6a22 147
02d80437 148 send_verification_email(request.user, request)
b93a6a22 149
9150244a 150 return redirect(request, 'mediagoblin.auth.resend_verification_success')