1 # GNU MediaGoblin -- federated, autonomous media hosting
2 # Copyright (C) 2011, 2012 MediaGoblin contributors. See AUTHORS.
4 # This program is free software: you can redistribute it and/or modify
5 # it under the terms of the GNU Affero General Public License as published by
6 # the Free Software Foundation, either version 3 of the License, or
7 # (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU Affero General Public License for more details.
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18 from cgi
import FieldStorage
19 from datetime
import datetime
21 from werkzeug
.utils
import secure_filename
23 from mediagoblin
import messages
24 from mediagoblin
import mg_globals
26 from mediagoblin
.auth
import lib
as auth_lib
27 from mediagoblin
.edit
import forms
28 from mediagoblin
.edit
.lib
import may_edit_media
29 from mediagoblin
.decorators
import require_active_login
, get_user_media_entry
30 from mediagoblin
.tools
.response
import render_to_response
, redirect
31 from mediagoblin
.tools
.translate
import pass_to_ugettext
as _
32 from mediagoblin
.tools
.text
import (
33 convert_to_tag_list_of_dicts
, media_tags_as_string
)
34 from mediagoblin
.db
.util
import check_media_slug_used
41 def edit_media(request
, media
):
42 if not may_edit_media(request
, media
):
43 return exc
.HTTPForbidden()
48 description
=media
.description
,
49 tags
=media_tags_as_string(media
.tags
),
50 license
=media
.license
)
52 form
= forms
.EditForm(
56 if request
.method
== 'POST' and form
.validate():
57 # Make sure there isn't already a MediaEntry with such a slug
59 slug_used
= check_media_slug_used(request
.db
, media
.uploader
,
60 request
.POST
['slug'], media
.id)
63 form
.slug
.errors
.append(
64 _(u
'An entry with that slug already exists for this user.'))
66 media
.title
= unicode(request
.POST
['title'])
67 media
.description
= unicode(request
.POST
.get('description'))
68 media
.tags
= convert_to_tag_list_of_dicts(
69 request
.POST
.get('tags'))
71 media
.license
= unicode(request
.POST
.get('license', '')) or None
73 media
.slug
= unicode(request
.POST
['slug'])
78 location
=media
.url_for_self(request
.urlgen
))
80 if request
.user
.is_admin \
81 and media
.uploader
!= request
.user
._id \
82 and request
.method
!= 'POST':
84 request
, messages
.WARNING
,
85 _("You are editing another user's media. Proceed with caution."))
87 return render_to_response(
89 'mediagoblin/edit/edit.html',
94 # Mimetypes that browsers parse scripts in.
95 # Content-sniffing isn't taken into consideration.
101 @get_user_media_entry
102 @require_active_login
103 def edit_attachments(request
, media
):
104 if mg_globals
.app_config
['allow_attachments']:
105 form
= forms
.EditAttachmentsForm()
107 # Add any attachements
108 if ('attachment_file' in request
.POST
109 and isinstance(request
.POST
['attachment_file'], FieldStorage
)
110 and request
.POST
['attachment_file'].file):
112 # Security measure to prevent attachments from being served as
113 # text/html, which will be parsed by web clients and pose an XSS
117 # This method isn't flawless as some browsers may perform
119 # This method isn't flawless as we do the mimetype lookup on the
120 # machine parsing the upload form, and not necessarily the machine
121 # serving the attachments.
122 if mimetypes
.guess_type(
123 request
.POST
['attachment_file'].filename
)[0] in \
125 public_filename
= secure_filename('{0}.notsafe'.format(
126 request
.POST
['attachment_file'].filename
))
128 public_filename
= secure_filename(
129 request
.POST
['attachment_file'].filename
)
131 attachment_public_filepath \
132 = mg_globals
.public_store
.get_unique_filepath(
133 ['media_entries', unicode(media
._id
), 'attachment',
136 attachment_public_file
= mg_globals
.public_store
.get_file(
137 attachment_public_filepath
, 'wb')
140 attachment_public_file
.write(
141 request
.POST
['attachment_file'].file.read())
143 request
.POST
['attachment_file'].file.close()
145 media
.attachment_files
.append(dict(
146 name
=request
.POST
['attachment_name'] \
147 or request
.POST
['attachment_file'].filename
,
148 filepath
=attachment_public_filepath
,
149 created
=datetime
.utcnow(),
154 messages
.add_message(
155 request
, messages
.SUCCESS
,
156 "You added the attachment %s!" \
157 % (request
.POST
['attachment_name']
158 or request
.POST
['attachment_file'].filename
))
160 return exc
.HTTPFound(
161 location
=media
.url_for_self(request
.urlgen
))
162 return render_to_response(
164 'mediagoblin/edit/attachments.html',
168 return exc
.HTTPForbidden()
171 @require_active_login
172 def edit_profile(request
):
173 # admins may edit any user profile given a username in the querystring
174 edit_username
= request
.GET
.get('username')
175 if request
.user
.is_admin
and request
.user
.username
!= edit_username
:
176 user
= request
.db
.User
.find_one({'username': edit_username
})
177 # No need to warn again if admin just submitted an edited profile
178 if request
.method
!= 'POST':
179 messages
.add_message(
180 request
, messages
.WARNING
,
181 _("You are editing a user's profile. Proceed with caution."))
185 form
= forms
.EditProfileForm(request
.POST
,
189 if request
.method
== 'POST' and form
.validate():
190 user
.url
= unicode(request
.POST
['url'])
191 user
.bio
= unicode(request
.POST
['bio'])
195 messages
.add_message(request
,
197 _("Profile changes saved"))
198 return redirect(request
,
199 'mediagoblin.user_pages.user_home',
202 return render_to_response(
204 'mediagoblin/edit/edit_profile.html',
209 @require_active_login
210 def edit_account(request
):
212 form
= forms
.EditAccountForm(request
.POST
,
213 wants_comment_notification
=user
.get('wants_comment_notification'))
215 if request
.method
== 'POST':
216 form_validated
= form
.validate()
218 #if the user has not filled in the new or old password fields
219 if not form
.new_password
.data
and not form
.old_password
.data
:
220 if form
.wants_comment_notification
.validate(form
):
221 user
.wants_comment_notification
= \
222 form
.wants_comment_notification
.data
224 messages
.add_message(request
,
226 _("Account settings saved"))
227 return redirect(request
,
228 'mediagoblin.user_pages.user_home',
231 #so the user has filled in one or both of the password fields
234 password_matches
= auth_lib
.bcrypt_check_password(
235 form
.old_password
.data
,
238 #the entire form validates and the password matches
239 user
.pw_hash
= auth_lib
.bcrypt_gen_password_hash(
240 form
.new_password
.data
)
241 user
.wants_comment_notification
= \
242 form
.wants_comment_notification
.data
244 messages
.add_message(request
,
246 _("Account settings saved"))
247 return redirect(request
,
248 'mediagoblin.user_pages.user_home',
251 form
.old_password
.errors
.append(_('Wrong password'))
253 return render_to_response(
255 'mediagoblin/edit/edit_account.html',