Removing the "enter your password to change your email" bit.
[mediagoblin.git] / mediagoblin / edit / views.py
1 # GNU MediaGoblin -- federated, autonomous media hosting
2 # Copyright (C) 2011, 2012 MediaGoblin contributors. See AUTHORS.
3 #
4 # This program is free software: you can redistribute it and/or modify
5 # it under the terms of the GNU Affero General Public License as published by
6 # the Free Software Foundation, either version 3 of the License, or
7 # (at your option) any later version.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU Affero General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16
17 from datetime import datetime
18
19 from itsdangerous import BadSignature
20 from werkzeug.exceptions import Forbidden
21 from werkzeug.utils import secure_filename
22
23 from mediagoblin import messages
24 from mediagoblin import mg_globals
25
26 from mediagoblin.auth import lib as auth_lib
27 from mediagoblin.auth import tools as auth_tools
28 from mediagoblin.auth.views import email_debug_message
29 from mediagoblin.edit import forms
30 from mediagoblin.edit.lib import may_edit_media
31 from mediagoblin.decorators import (require_active_login, active_user_from_url,
32 get_media_entry_by_id, user_may_alter_collection,
33 get_user_collection)
34 from mediagoblin.tools.crypto import get_timed_signer_url
35 from mediagoblin.tools.response import (render_to_response,
36 redirect, redirect_obj, render_404)
37 from mediagoblin.tools.translate import pass_to_ugettext as _
38 from mediagoblin.tools.template import render_template
39 from mediagoblin.tools.text import (
40 convert_to_tag_list_of_dicts, media_tags_as_string)
41 from mediagoblin.tools.url import slugify
42 from mediagoblin.db.util import check_media_slug_used, check_collection_slug_used
43 from mediagoblin.db.models import User
44
45 import mimetypes
46
47
48 @get_media_entry_by_id
49 @require_active_login
50 def edit_media(request, media):
51 if not may_edit_media(request, media):
52 raise Forbidden("User may not edit this media")
53
54 defaults = dict(
55 title=media.title,
56 slug=media.slug,
57 description=media.description,
58 tags=media_tags_as_string(media.tags),
59 license=media.license)
60
61 form = forms.EditForm(
62 request.form,
63 **defaults)
64
65 if request.method == 'POST' and form.validate():
66 # Make sure there isn't already a MediaEntry with such a slug
67 # and userid.
68 slug = slugify(form.slug.data)
69 slug_used = check_media_slug_used(media.uploader, slug, media.id)
70
71 if slug_used:
72 form.slug.errors.append(
73 _(u'An entry with that slug already exists for this user.'))
74 else:
75 media.title = form.title.data
76 media.description = form.description.data
77 media.tags = convert_to_tag_list_of_dicts(
78 form.tags.data)
79
80 media.license = unicode(form.license.data) or None
81 media.slug = slug
82 media.save()
83
84 return redirect_obj(request, media)
85
86 if request.user.is_admin \
87 and media.uploader != request.user.id \
88 and request.method != 'POST':
89 messages.add_message(
90 request, messages.WARNING,
91 _("You are editing another user's media. Proceed with caution."))
92
93 return render_to_response(
94 request,
95 'mediagoblin/edit/edit.html',
96 {'media': media,
97 'form': form})
98
99
100 # Mimetypes that browsers parse scripts in.
101 # Content-sniffing isn't taken into consideration.
102 UNSAFE_MIMETYPES = [
103 'text/html',
104 'text/svg+xml']
105
106
107 @get_media_entry_by_id
108 @require_active_login
109 def edit_attachments(request, media):
110 if mg_globals.app_config['allow_attachments']:
111 form = forms.EditAttachmentsForm()
112
113 # Add any attachements
114 if 'attachment_file' in request.files \
115 and request.files['attachment_file']:
116
117 # Security measure to prevent attachments from being served as
118 # text/html, which will be parsed by web clients and pose an XSS
119 # threat.
120 #
121 # TODO
122 # This method isn't flawless as some browsers may perform
123 # content-sniffing.
124 # This method isn't flawless as we do the mimetype lookup on the
125 # machine parsing the upload form, and not necessarily the machine
126 # serving the attachments.
127 if mimetypes.guess_type(
128 request.files['attachment_file'].filename)[0] in \
129 UNSAFE_MIMETYPES:
130 public_filename = secure_filename('{0}.notsafe'.format(
131 request.files['attachment_file'].filename))
132 else:
133 public_filename = secure_filename(
134 request.files['attachment_file'].filename)
135
136 attachment_public_filepath \
137 = mg_globals.public_store.get_unique_filepath(
138 ['media_entries', unicode(media.id), 'attachment',
139 public_filename])
140
141 attachment_public_file = mg_globals.public_store.get_file(
142 attachment_public_filepath, 'wb')
143
144 try:
145 attachment_public_file.write(
146 request.files['attachment_file'].stream.read())
147 finally:
148 request.files['attachment_file'].stream.close()
149
150 media.attachment_files.append(dict(
151 name=form.attachment_name.data \
152 or request.files['attachment_file'].filename,
153 filepath=attachment_public_filepath,
154 created=datetime.utcnow(),
155 ))
156
157 media.save()
158
159 messages.add_message(
160 request, messages.SUCCESS,
161 _("You added the attachment %s!") \
162 % (form.attachment_name.data
163 or request.files['attachment_file'].filename))
164
165 return redirect(request,
166 location=media.url_for_self(request.urlgen))
167 return render_to_response(
168 request,
169 'mediagoblin/edit/attachments.html',
170 {'media': media,
171 'form': form})
172 else:
173 raise Forbidden("Attachments are disabled")
174
175 @require_active_login
176 def legacy_edit_profile(request):
177 """redirect the old /edit/profile/?username=USER to /u/USER/edit/"""
178 username = request.GET.get('username') or request.user.username
179 return redirect(request, 'mediagoblin.edit.profile', user=username)
180
181
182 @require_active_login
183 @active_user_from_url
184 def edit_profile(request, url_user=None):
185 # admins may edit any user profile
186 if request.user.username != url_user.username:
187 if not request.user.is_admin:
188 raise Forbidden(_("You can only edit your own profile."))
189
190 # No need to warn again if admin just submitted an edited profile
191 if request.method != 'POST':
192 messages.add_message(
193 request, messages.WARNING,
194 _("You are editing a user's profile. Proceed with caution."))
195
196 user = url_user
197
198 form = forms.EditProfileForm(request.form,
199 url=user.url,
200 bio=user.bio)
201
202 if request.method == 'POST' and form.validate():
203 user.url = unicode(form.url.data)
204 user.bio = unicode(form.bio.data)
205
206 user.save()
207
208 messages.add_message(request,
209 messages.SUCCESS,
210 _("Profile changes saved"))
211 return redirect(request,
212 'mediagoblin.user_pages.user_home',
213 user=user.username)
214
215 return render_to_response(
216 request,
217 'mediagoblin/edit/edit_profile.html',
218 {'user': user,
219 'form': form})
220
221 EMAIL_VERIFICATION_TEMPLATE = (
222 u'{uri}?'
223 u'token={verification_key}')
224
225
226 @require_active_login
227 def edit_account(request):
228 user = request.user
229 form = forms.EditAccountForm(request.form,
230 wants_comment_notification=user.wants_comment_notification,
231 license_preference=user.license_preference)
232
233 if request.method == 'POST' and form.validate():
234 user.wants_comment_notification = form.wants_comment_notification.data
235
236 user.license_preference = form.license_preference.data
237
238 if form.new_email.data:
239 new_email = form.new_email.data
240 users_with_email = User.query.filter_by(
241 email=new_email).count()
242 if users_with_email:
243 form.new_email.errors.append(
244 _('Sorry, a user with that email address'
245 ' already exists.'))
246 else:
247 verification_key = get_timed_signer_url(
248 'mail_verification_token').dumps({
249 'user': user.id,
250 'email': new_email})
251
252 rendered_email = render_template(
253 request, 'mediagoblin/edit/verification.txt',
254 {'username': user.username,
255 'verification_url': EMAIL_VERIFICATION_TEMPLATE.format(
256 uri=request.urlgen('mediagoblin.edit.verify_email',
257 qualified=True),
258 verification_key=verification_key)})
259
260 email_debug_message(request)
261 auth_tools.send_verification_email(user, request, new_email,
262 rendered_email)
263
264 if not form.errors:
265 user.save()
266 messages.add_message(request,
267 messages.SUCCESS,
268 _("Account settings saved"))
269 return redirect(request,
270 'mediagoblin.user_pages.user_home',
271 user=user.username)
272
273 return render_to_response(
274 request,
275 'mediagoblin/edit/edit_account.html',
276 {'user': user,
277 'form': form})
278
279
280 @require_active_login
281 def delete_account(request):
282 """Delete a user completely"""
283 user = request.user
284 if request.method == 'POST':
285 if request.form.get(u'confirmed'):
286 # Form submitted and confirmed. Actually delete the user account
287 # Log out user and delete cookies etc.
288 # TODO: Should we be using MG.auth.views.py:logout for this?
289 request.session.delete()
290
291 # Delete user account and all related media files etc....
292 request.user.delete()
293
294 # We should send a message that the user has been deleted
295 # successfully. But we just deleted the session, so we
296 # can't...
297 return redirect(request, 'index')
298
299 else: # Did not check the confirmation box...
300 messages.add_message(
301 request, messages.WARNING,
302 _('You need to confirm the deletion of your account.'))
303
304 # No POST submission or not confirmed, just show page
305 return render_to_response(
306 request,
307 'mediagoblin/edit/delete_account.html',
308 {'user': user})
309
310
311 @require_active_login
312 @user_may_alter_collection
313 @get_user_collection
314 def edit_collection(request, collection):
315 defaults = dict(
316 title=collection.title,
317 slug=collection.slug,
318 description=collection.description)
319
320 form = forms.EditCollectionForm(
321 request.form,
322 **defaults)
323
324 if request.method == 'POST' and form.validate():
325 # Make sure there isn't already a Collection with such a slug
326 # and userid.
327 slug_used = check_collection_slug_used(collection.creator,
328 form.slug.data, collection.id)
329
330 # Make sure there isn't already a Collection with this title
331 existing_collection = request.db.Collection.find_one({
332 'creator': request.user.id,
333 'title':form.title.data})
334
335 if existing_collection and existing_collection.id != collection.id:
336 messages.add_message(
337 request, messages.ERROR,
338 _('You already have a collection called "%s"!') % \
339 form.title.data)
340 elif slug_used:
341 form.slug.errors.append(
342 _(u'A collection with that slug already exists for this user.'))
343 else:
344 collection.title = unicode(form.title.data)
345 collection.description = unicode(form.description.data)
346 collection.slug = unicode(form.slug.data)
347
348 collection.save()
349
350 return redirect_obj(request, collection)
351
352 if request.user.is_admin \
353 and collection.creator != request.user.id \
354 and request.method != 'POST':
355 messages.add_message(
356 request, messages.WARNING,
357 _("You are editing another user's collection. Proceed with caution."))
358
359 return render_to_response(
360 request,
361 'mediagoblin/edit/edit_collection.html',
362 {'collection': collection,
363 'form': form})
364
365
366 @require_active_login
367 def change_pass(request):
368 form = forms.ChangePassForm(request.form)
369 user = request.user
370
371 if request.method == 'POST' and form.validate():
372
373 if not auth_lib.bcrypt_check_password(
374 form.old_password.data, user.pw_hash):
375 form.old_password.errors.append(
376 _('Wrong password'))
377
378 return render_to_response(
379 request,
380 'mediagoblin/edit/change_pass.html',
381 {'form': form,
382 'user': user})
383
384 # Password matches
385 user.pw_hash = auth_lib.bcrypt_gen_password_hash(
386 form.new_password.data)
387 user.save()
388
389 messages.add_message(
390 request, messages.SUCCESS,
391 _('Your password was changed successfully'))
392
393 return redirect(request, 'mediagoblin.edit.account')
394
395 return render_to_response(
396 request,
397 'mediagoblin/edit/change_pass.html',
398 {'form': form,
399 'user': user})
400
401
402 def verify_email(request):
403 """
404 Email verification view for changing email address
405 """
406 # If no token, we can't do anything
407 if not 'token' in request.GET:
408 return render_404(request)
409
410 # Catch error if token is faked or expired
411 token = None
412 try:
413 token = get_timed_signer_url("mail_verification_token") \
414 .loads(request.GET['token'], max_age=10*24*3600)
415 except BadSignature:
416 messages.add_message(
417 request,
418 messages.ERROR,
419 _('The verification key or user id is incorrect.'))
420
421 return redirect(
422 request,
423 'index')
424
425 user = User.query.filter_by(id=int(token['user'])).first()
426
427 if user:
428 user.email = token['email']
429 user.save()
430
431 messages.add_message(
432 request,
433 messages.SUCCESS,
434 _('Your email address has been verified.'))
435
436 else:
437 messages.add_message(
438 request,
439 messages.ERROR,
440 _('The verification key or user id is incorrect.'))
441
442 return redirect(
443 request, 'mediagoblin.user_pages.user_home',
444 user=user.username)