Merge remote-tracking branch 'cweb/master'
[mediagoblin.git] / mediagoblin / edit / views.py
1 # GNU MediaGoblin -- federated, autonomous media hosting
2 # Copyright (C) 2011, 2012 MediaGoblin contributors. See AUTHORS.
3 #
4 # This program is free software: you can redistribute it and/or modify
5 # it under the terms of the GNU Affero General Public License as published by
6 # the Free Software Foundation, either version 3 of the License, or
7 # (at your option) any later version.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU Affero General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16
17 from datetime import datetime
18
19 from itsdangerous import BadSignature
20 from werkzeug.exceptions import Forbidden
21 from werkzeug.utils import secure_filename
22
23 from mediagoblin import messages
24 from mediagoblin import mg_globals
25
26 from mediagoblin import auth
27 from mediagoblin.auth import tools as auth_tools
28 from mediagoblin.edit import forms
29 from mediagoblin.edit.lib import may_edit_media
30 from mediagoblin.decorators import (require_active_login, active_user_from_url,
31 get_media_entry_by_id, user_may_alter_collection,
32 get_user_collection)
33 from mediagoblin.tools.crypto import get_timed_signer_url
34 from mediagoblin.tools.mail import email_debug_message
35 from mediagoblin.tools.response import (render_to_response,
36 redirect, redirect_obj, render_404)
37 from mediagoblin.tools.translate import pass_to_ugettext as _
38 from mediagoblin.tools.template import render_template
39 from mediagoblin.tools.text import (
40 convert_to_tag_list_of_dicts, media_tags_as_string)
41 from mediagoblin.tools.url import slugify
42 from mediagoblin.db.util import check_media_slug_used, check_collection_slug_used
43 from mediagoblin.db.models import User
44
45 import mimetypes
46
47
48 @get_media_entry_by_id
49 @require_active_login
50 def edit_media(request, media):
51 if not may_edit_media(request, media):
52 raise Forbidden("User may not edit this media")
53
54 defaults = dict(
55 title=media.title,
56 slug=media.slug,
57 description=media.description,
58 tags=media_tags_as_string(media.tags),
59 license=media.license)
60
61 form = forms.EditForm(
62 request.form,
63 **defaults)
64
65 if request.method == 'POST' and form.validate():
66 # Make sure there isn't already a MediaEntry with such a slug
67 # and userid.
68 slug = slugify(form.slug.data)
69 slug_used = check_media_slug_used(media.uploader, slug, media.id)
70
71 if slug_used:
72 form.slug.errors.append(
73 _(u'An entry with that slug already exists for this user.'))
74 else:
75 media.title = form.title.data
76 media.description = form.description.data
77 media.tags = convert_to_tag_list_of_dicts(
78 form.tags.data)
79
80 media.license = unicode(form.license.data) or None
81 media.slug = slug
82 media.save()
83
84 return redirect_obj(request, media)
85
86 if request.user.is_admin \
87 and media.uploader != request.user.id \
88 and request.method != 'POST':
89 messages.add_message(
90 request, messages.WARNING,
91 _("You are editing another user's media. Proceed with caution."))
92
93 return render_to_response(
94 request,
95 'mediagoblin/edit/edit.html',
96 {'media': media,
97 'form': form})
98
99
100 # Mimetypes that browsers parse scripts in.
101 # Content-sniffing isn't taken into consideration.
102 UNSAFE_MIMETYPES = [
103 'text/html',
104 'text/svg+xml']
105
106
107 @get_media_entry_by_id
108 @require_active_login
109 def edit_attachments(request, media):
110 if mg_globals.app_config['allow_attachments']:
111 form = forms.EditAttachmentsForm()
112
113 # Add any attachements
114 if 'attachment_file' in request.files \
115 and request.files['attachment_file']:
116
117 # Security measure to prevent attachments from being served as
118 # text/html, which will be parsed by web clients and pose an XSS
119 # threat.
120 #
121 # TODO
122 # This method isn't flawless as some browsers may perform
123 # content-sniffing.
124 # This method isn't flawless as we do the mimetype lookup on the
125 # machine parsing the upload form, and not necessarily the machine
126 # serving the attachments.
127 if mimetypes.guess_type(
128 request.files['attachment_file'].filename)[0] in \
129 UNSAFE_MIMETYPES:
130 public_filename = secure_filename('{0}.notsafe'.format(
131 request.files['attachment_file'].filename))
132 else:
133 public_filename = secure_filename(
134 request.files['attachment_file'].filename)
135
136 attachment_public_filepath \
137 = mg_globals.public_store.get_unique_filepath(
138 ['media_entries', unicode(media.id), 'attachment',
139 public_filename])
140
141 attachment_public_file = mg_globals.public_store.get_file(
142 attachment_public_filepath, 'wb')
143
144 try:
145 attachment_public_file.write(
146 request.files['attachment_file'].stream.read())
147 finally:
148 request.files['attachment_file'].stream.close()
149
150 media.attachment_files.append(dict(
151 name=form.attachment_name.data \
152 or request.files['attachment_file'].filename,
153 filepath=attachment_public_filepath,
154 created=datetime.utcnow(),
155 ))
156
157 media.save()
158
159 messages.add_message(
160 request, messages.SUCCESS,
161 _("You added the attachment %s!") \
162 % (form.attachment_name.data
163 or request.files['attachment_file'].filename))
164
165 return redirect(request,
166 location=media.url_for_self(request.urlgen))
167 return render_to_response(
168 request,
169 'mediagoblin/edit/attachments.html',
170 {'media': media,
171 'form': form})
172 else:
173 raise Forbidden("Attachments are disabled")
174
175 @require_active_login
176 def legacy_edit_profile(request):
177 """redirect the old /edit/profile/?username=USER to /u/USER/edit/"""
178 username = request.GET.get('username') or request.user.username
179 return redirect(request, 'mediagoblin.edit.profile', user=username)
180
181
182 @require_active_login
183 @active_user_from_url
184 def edit_profile(request, url_user=None):
185 # admins may edit any user profile
186 if request.user.username != url_user.username:
187 if not request.user.is_admin:
188 raise Forbidden(_("You can only edit your own profile."))
189
190 # No need to warn again if admin just submitted an edited profile
191 if request.method != 'POST':
192 messages.add_message(
193 request, messages.WARNING,
194 _("You are editing a user's profile. Proceed with caution."))
195
196 user = url_user
197
198 form = forms.EditProfileForm(request.form,
199 url=user.url,
200 bio=user.bio)
201
202 if request.method == 'POST' and form.validate():
203 user.url = unicode(form.url.data)
204 user.bio = unicode(form.bio.data)
205
206 user.save()
207
208 messages.add_message(request,
209 messages.SUCCESS,
210 _("Profile changes saved"))
211 return redirect(request,
212 'mediagoblin.user_pages.user_home',
213 user=user.username)
214
215 return render_to_response(
216 request,
217 'mediagoblin/edit/edit_profile.html',
218 {'user': user,
219 'form': form})
220
221 EMAIL_VERIFICATION_TEMPLATE = (
222 u'{uri}?'
223 u'token={verification_key}')
224
225
226 @require_active_login
227 def edit_account(request):
228 user = request.user
229 form = forms.EditAccountForm(request.form,
230 wants_comment_notification=user.wants_comment_notification,
231 license_preference=user.license_preference)
232
233 if request.method == 'POST' and form.validate():
234 user.wants_comment_notification = form.wants_comment_notification.data
235
236 user.license_preference = form.license_preference.data
237
238 if form.new_email.data:
239 _update_email(request, form, user)
240
241 if not form.errors:
242 user.save()
243 messages.add_message(request,
244 messages.SUCCESS,
245 _("Account settings saved"))
246 return redirect(request,
247 'mediagoblin.user_pages.user_home',
248 user=user.username)
249
250 return render_to_response(
251 request,
252 'mediagoblin/edit/edit_account.html',
253 {'user': user,
254 'form': form})
255
256
257 @require_active_login
258 def delete_account(request):
259 """Delete a user completely"""
260 user = request.user
261 if request.method == 'POST':
262 if request.form.get(u'confirmed'):
263 # Form submitted and confirmed. Actually delete the user account
264 # Log out user and delete cookies etc.
265 # TODO: Should we be using MG.auth.views.py:logout for this?
266 request.session.delete()
267
268 # Delete user account and all related media files etc....
269 request.user.delete()
270
271 # We should send a message that the user has been deleted
272 # successfully. But we just deleted the session, so we
273 # can't...
274 return redirect(request, 'index')
275
276 else: # Did not check the confirmation box...
277 messages.add_message(
278 request, messages.WARNING,
279 _('You need to confirm the deletion of your account.'))
280
281 # No POST submission or not confirmed, just show page
282 return render_to_response(
283 request,
284 'mediagoblin/edit/delete_account.html',
285 {'user': user})
286
287
288 @require_active_login
289 @user_may_alter_collection
290 @get_user_collection
291 def edit_collection(request, collection):
292 defaults = dict(
293 title=collection.title,
294 slug=collection.slug,
295 description=collection.description)
296
297 form = forms.EditCollectionForm(
298 request.form,
299 **defaults)
300
301 if request.method == 'POST' and form.validate():
302 # Make sure there isn't already a Collection with such a slug
303 # and userid.
304 slug_used = check_collection_slug_used(collection.creator,
305 form.slug.data, collection.id)
306
307 # Make sure there isn't already a Collection with this title
308 existing_collection = request.db.Collection.find_one({
309 'creator': request.user.id,
310 'title':form.title.data})
311
312 if existing_collection and existing_collection.id != collection.id:
313 messages.add_message(
314 request, messages.ERROR,
315 _('You already have a collection called "%s"!') % \
316 form.title.data)
317 elif slug_used:
318 form.slug.errors.append(
319 _(u'A collection with that slug already exists for this user.'))
320 else:
321 collection.title = unicode(form.title.data)
322 collection.description = unicode(form.description.data)
323 collection.slug = unicode(form.slug.data)
324
325 collection.save()
326
327 return redirect_obj(request, collection)
328
329 if request.user.is_admin \
330 and collection.creator != request.user.id \
331 and request.method != 'POST':
332 messages.add_message(
333 request, messages.WARNING,
334 _("You are editing another user's collection. Proceed with caution."))
335
336 return render_to_response(
337 request,
338 'mediagoblin/edit/edit_collection.html',
339 {'collection': collection,
340 'form': form})
341
342
343 @require_active_login
344 def change_pass(request):
345 # If no password authentication, no need to change your password
346 if 'pass_auth' not in request.template_env.globals:
347 return redirect(request, 'index')
348
349 form = forms.ChangePassForm(request.form)
350 user = request.user
351
352 if request.method == 'POST' and form.validate():
353
354 if not auth.check_password(
355 form.old_password.data, user.pw_hash):
356 form.old_password.errors.append(
357 _('Wrong password'))
358
359 return render_to_response(
360 request,
361 'mediagoblin/edit/change_pass.html',
362 {'form': form,
363 'user': user})
364
365 # Password matches
366 user.pw_hash = auth.gen_password_hash(
367 form.new_password.data)
368 user.save()
369
370 messages.add_message(
371 request, messages.SUCCESS,
372 _('Your password was changed successfully'))
373
374 return redirect(request, 'mediagoblin.edit.account')
375
376 return render_to_response(
377 request,
378 'mediagoblin/edit/change_pass.html',
379 {'form': form,
380 'user': user})
381
382
383 def verify_email(request):
384 """
385 Email verification view for changing email address
386 """
387 # If no token, we can't do anything
388 if not 'token' in request.GET:
389 return render_404(request)
390
391 # Catch error if token is faked or expired
392 token = None
393 try:
394 token = get_timed_signer_url("mail_verification_token") \
395 .loads(request.GET['token'], max_age=10*24*3600)
396 except BadSignature:
397 messages.add_message(
398 request,
399 messages.ERROR,
400 _('The verification key or user id is incorrect.'))
401
402 return redirect(
403 request,
404 'index')
405
406 user = User.query.filter_by(id=int(token['user'])).first()
407
408 if user:
409 user.email = token['email']
410 user.save()
411
412 messages.add_message(
413 request,
414 messages.SUCCESS,
415 _('Your email address has been verified.'))
416
417 else:
418 messages.add_message(
419 request,
420 messages.ERROR,
421 _('The verification key or user id is incorrect.'))
422
423 return redirect(
424 request, 'mediagoblin.user_pages.user_home',
425 user=user.username)
426
427
428 def _update_email(request, form, user):
429 new_email = form.new_email.data
430 users_with_email = User.query.filter_by(
431 email=new_email).count()
432
433 if users_with_email:
434 form.new_email.errors.append(
435 _('Sorry, a user with that email address'
436 ' already exists.'))
437
438 elif not users_with_email:
439 verification_key = get_timed_signer_url(
440 'mail_verification_token').dumps({
441 'user': user.id,
442 'email': new_email})
443
444 rendered_email = render_template(
445 request, 'mediagoblin/edit/verification.txt',
446 {'username': user.username,
447 'verification_url': EMAIL_VERIFICATION_TEMPLATE.format(
448 uri=request.urlgen('mediagoblin.edit.verify_email',
449 qualified=True),
450 verification_key=verification_key)})
451
452 email_debug_message(request)
453 auth_tools.send_verification_email(user, request, new_email,
454 rendered_email)