discourse/app/controllers/users_controller.rb

452 lines
14 KiB
Ruby
Raw Normal View History

require_dependency 'discourse_hub'
require_dependency 'user_name_suggester'
2013-02-06 03:16:51 +08:00
class UsersController < ApplicationController
skip_before_filter :authorize_mini_profiler, only: [:avatar]
skip_before_filter :check_xhr, only: [:show, :password_reset, :update, :activate_account, :authorize_email, :user_preferences_redirect, :avatar]
2013-02-06 03:16:51 +08:00
before_filter :ensure_logged_in, only: [:username, :update, :change_email, :user_preferences_redirect]
2013-02-07 23:45:24 +08:00
# we need to allow account creation with bad CSRF tokens, if people are caching, the CSRF token on the
# page is going to be empty, this means that server will see an invalid CSRF and blow the session
# once that happens you can't log in with social
skip_before_filter :verify_authenticity_token, only: [:create]
skip_before_filter :redirect_to_login_if_required, only: [:check_username,
:create,
:get_honeypot_value,
:activate_account,
:send_activation_email,
:authorize_email,
:password_reset]
2013-02-07 23:45:24 +08:00
def show
2013-02-06 03:16:51 +08:00
@user = fetch_user_from_params
user_serializer = UserSerializer.new(@user, scope: guardian, root: 'user')
respond_to do |format|
format.html do
store_preloaded("user_#{@user.username}", MultiJson.dump(user_serializer))
end
format.json do
render_json_dump(user_serializer)
end
2013-02-06 03:16:51 +08:00
end
end
def user_preferences_redirect
redirect_to email_preferences_path(current_user.username_lower)
end
def update
user = User.where(username_lower: params[:username].downcase).first
2013-02-06 03:16:51 +08:00
guardian.ensure_can_edit!(user)
json_result(user, serializer: UserSerializer) do |u|
2013-02-06 03:16:51 +08:00
website = params[:website]
2013-02-07 23:45:24 +08:00
if website
2013-02-06 03:16:51 +08:00
website = "http://" + website unless website =~ /^http/
end
u.bio_raw = params[:bio_raw] || u.bio_raw
u.name = params[:name] || u.name
u.website = website || u.website
u.digest_after_days = params[:digest_after_days] || u.digest_after_days
u.auto_track_topics_after_msecs = params[:auto_track_topics_after_msecs].to_i if params[:auto_track_topics_after_msecs]
u.new_topic_duration_minutes = params[:new_topic_duration_minutes].to_i if params[:new_topic_duration_minutes]
u.title = params[:title] || u.title if guardian.can_grant_title?(u)
2013-02-06 03:16:51 +08:00
[:email_digests, :email_direct, :email_private_messages,
:external_links_in_new_tab, :enable_quoting, :dynamic_favicon].each do |i|
2013-02-06 03:16:51 +08:00
if params[i].present?
u.send("#{i.to_s}=", params[i] == 'true')
end
end
if u.save
u
else
nil
end
2013-02-07 23:45:24 +08:00
end
2013-02-06 03:16:51 +08:00
end
def username
params.require(:new_username)
2013-02-06 03:16:51 +08:00
user = fetch_user_from_params
guardian.ensure_can_edit_username!(user)
2013-02-07 23:45:24 +08:00
2013-02-06 03:16:51 +08:00
result = user.change_username(params[:new_username])
raise Discourse::InvalidParameters.new(:new_username) unless result
2013-02-07 23:45:24 +08:00
render nothing: true
2013-02-06 03:16:51 +08:00
end
def preferences
render nothing: true
end
def invited
invited_list = InvitedList.new(fetch_user_from_params)
render_serialized(invited_list, InvitedListSerializer)
end
def is_local_username
params.require(:username)
2013-02-06 03:16:51 +08:00
u = params[:username].downcase
r = User.exec_sql('select 1 from users where username_lower = ?', u).values
render json: {valid: r.length == 1}
end
def check_username
params.require(:username)
2013-02-06 03:16:51 +08:00
target_user = params[:for_user_id] ? User.find(params[:for_user_id]) : current_user
# The special case where someone is changing the case of their own username
return render(json: {available: true}) if target_user and params[:username].downcase == target_user.username.downcase
validator = UsernameValidator.new(params[:username])
if !validator.valid_format?
render json: {errors: validator.errors}
elsif !SiteSetting.call_discourse_hub?
2013-02-06 03:16:51 +08:00
if User.username_available?(params[:username])
render json: {available: true}
else
render json: {available: false, suggestion: UserNameSuggester.suggest(params[:username])}
2013-02-06 03:16:51 +08:00
end
else
# Contact the Discourse Hub server
email_given = (params[:email].present? || target_user.present?)
2013-02-06 03:16:51 +08:00
available_locally = User.username_available?(params[:username])
global_match = false
available_globally, suggestion_from_discourse_hub = begin
2013-02-06 03:16:51 +08:00
if email_given
global_match, available, suggestion = DiscourseHub.nickname_match?( params[:username], params[:email] || target_user.email )
2013-02-06 03:16:51 +08:00
[available || global_match, suggestion]
else
DiscourseHub.nickname_available?(params[:username])
2013-02-06 03:16:51 +08:00
end
end
if available_globally && available_locally
2013-02-06 03:16:51 +08:00
render json: {available: true, global_match: (global_match ? true : false)}
elsif available_locally && !available_globally
2013-02-06 03:16:51 +08:00
if email_given
# Nickname and email do not match what's registered on the discourse hub.
render json: {available: false, global_match: false, suggestion: suggestion_from_discourse_hub}
2013-02-06 03:16:51 +08:00
else
# The nickname is available locally, but is registered on the discourse hub.
2013-02-06 03:16:51 +08:00
# We need an email to see if the nickname belongs to this person.
# Don't give a suggestion until we get the email and try to match it with on the discourse hub.
2013-02-06 03:16:51 +08:00
render json: {available: false}
end
elsif available_globally && !available_locally
2013-02-06 03:16:51 +08:00
# Already registered on this site with the matching nickname and email address. Why are you signing up again?
render json: {available: false, suggestion: UserNameSuggester.suggest(params[:username])}
2013-02-06 03:16:51 +08:00
else
# Not available anywhere.
render json: {available: false, suggestion: suggestion_from_discourse_hub}
2013-02-06 03:16:51 +08:00
end
end
rescue RestClient::Forbidden
render json: {errors: [I18n.t("discourse_hub.access_token_problem")]}
2013-02-06 03:16:51 +08:00
end
def create
return fake_success_response if suspicious? params
user = User.new_from_params(params)
2013-02-06 03:16:51 +08:00
auth = session[:authentication]
if valid_session_authentication?(auth, params[:email])
2013-02-06 03:16:51 +08:00
user.active = true
end
user.password_required! unless auth
2013-02-06 03:16:51 +08:00
if user.valid? && SiteSetting.call_discourse_hub?
DiscourseHub.register_nickname(user.username, user.email)
end
2013-02-06 03:16:51 +08:00
if user.save
if SiteSetting.must_approve_users?
message = I18n.t("login.wait_approval")
elsif !user.active?
message = I18n.t("login.activate_email", email: user.email)
Jobs.enqueue(:user_email,
type: :signup,
user_id: user.id,
email_token: user.email_tokens.first.token
)
else
message = I18n.t("login.active")
log_on_user(user)
user.enqueue_welcome_message('welcome_user')
2013-02-06 03:16:51 +08:00
end
create_third_party_auth_records(user, auth) if auth.present?
2013-02-07 23:45:24 +08:00
# Clear authentication session.
2013-02-06 03:16:51 +08:00
session[:authentication] = nil
render json: { success: true, active: user.active?, message: message }
2013-02-06 03:16:51 +08:00
else
render json: {
success: false,
message: I18n.t("login.errors", errors: user.errors.full_messages.join("\n")),
errors: user.errors.to_hash,
values: user.attributes.slice("name", "username", "email")
}
2013-02-06 03:16:51 +08:00
end
rescue ActiveRecord::StatementInvalid
render json: { success: false, message: I18n.t("login.something_already_taken") }
rescue DiscourseHub::NicknameUnavailable
render json: { success: false,
message: I18n.t(
"login.errors",
errors:I18n.t(
"login.not_available", suggestion: UserNameSuggester.suggest(params[:username])
)
)
}
2013-02-06 03:16:51 +08:00
rescue RestClient::Forbidden
render json: { errors: [I18n.t("discourse_hub.access_token_problem")] }
2013-02-06 03:16:51 +08:00
end
def get_honeypot_value
render json: {value: honeypot_value, challenge: challenge_value}
end
2013-02-06 03:16:51 +08:00
def password_reset
expires_now()
@user = EmailToken.confirm(params[:token])
if @user.blank?
flash[:error] = I18n.t('password_reset.no_token')
else
if request.put? && params[:password].present?
2013-02-06 03:16:51 +08:00
@user.password = params[:password]
if @user.save
if Guardian.new(@user).can_access_forum?
2013-02-06 03:16:51 +08:00
# Log in the user
log_on_user(@user)
flash[:success] = I18n.t('password_reset.success')
else
@requires_approval = true
flash[:success] = I18n.t('password_reset.success_unapproved')
2013-02-06 03:16:51 +08:00
end
2013-02-07 23:45:24 +08:00
end
end
2013-02-06 03:16:51 +08:00
end
render layout: 'no_js'
2013-02-06 03:16:51 +08:00
end
2013-02-07 23:45:24 +08:00
2013-02-06 03:16:51 +08:00
def change_email
params.require(:email)
2013-02-06 03:16:51 +08:00
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
lower_email = Email.downcase(params[:email]).strip
2013-02-06 03:16:51 +08:00
# Raise an error if the email is already in use
if User.where("email = ?", lower_email).exists?
raise Discourse::InvalidParameters.new(:email)
end
2013-02-06 03:16:51 +08:00
email_token = user.email_tokens.create(email: lower_email)
Jobs.enqueue(
:user_email,
to_address: lower_email,
type: :authorize_email,
user_id: user.id,
email_token: email_token.token
)
2013-02-06 03:16:51 +08:00
2013-02-07 23:45:24 +08:00
render nothing: true
2013-02-06 03:16:51 +08:00
end
def authorize_email
expires_now()
if @user = EmailToken.confirm(params[:token])
log_on_user(@user)
else
flash[:error] = I18n.t('change_email.error')
end
render layout: 'no_js'
2013-02-06 03:16:51 +08:00
end
def activate_account
expires_now()
if @user = EmailToken.confirm(params[:token])
# Log in the user unless they need to be approved
if Guardian.new(@user).can_access_forum?
2013-02-06 03:16:51 +08:00
@user.enqueue_welcome_message('welcome_user') if @user.send_welcome_message
log_on_user(@user)
else
@needs_approval = true
2013-02-06 03:16:51 +08:00
end
else
flash[:error] = I18n.t('activation.already_done')
end
render layout: 'no_js'
2013-02-06 03:16:51 +08:00
end
def send_activation_email
@user = fetch_user_from_params
@email_token = @user.email_tokens.unconfirmed.active.first
if @user
@email_token ||= @user.email_tokens.create(email: @user.email)
Jobs.enqueue(:user_email, type: :signup, user_id: @user.id, email_token: @email_token.token)
end
render nothing: true
end
2013-02-06 03:16:51 +08:00
def search_users
2013-02-07 18:59:25 +08:00
term = params[:term].to_s.strip
2013-02-06 03:16:51 +08:00
topic_id = params[:topic_id]
topic_id = topic_id.to_i if topic_id
results = UserSearch.search term, topic_id
2013-02-06 03:16:51 +08:00
render json: { users: results.as_json(only: [ :username, :name ],
methods: :avatar_template) }
2013-02-06 03:16:51 +08:00
end
# [LEGACY] avatars in quotes/oneboxes might still be pointing to this route
# fixing it requires a rebake of all the posts
2013-08-14 04:08:29 +08:00
def avatar
user = User.select(:email).where(username_lower: params[:username].downcase).first
if user.present?
size = determine_avatar_size(params[:size])
url = user.avatar_template.gsub("{size}", size.to_s)
expires_in 1.day
redirect_to url
else
raise ActiveRecord::RecordNotFound
end
end
def determine_avatar_size(size)
size = size.to_i
size = 64 if size == 0
size = 10 if size < 10
size = 128 if size > 128
size
end
def upload_avatar
2013-08-14 04:08:29 +08:00
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
file = params[:file] || params[:files].first
# check the file size (note: this might also be done in the web server)
filesize = File.size(file.tempfile)
max_size_kb = SiteSetting.max_image_size_kb * 1024
return render status: 413, text: I18n.t("upload.images.too_large", max_size_kb: max_size_kb) if filesize > max_size_kb
upload = Upload.create_for(user.id, file, filesize)
user.uploaded_avatar = upload
user.use_uploaded_avatar = true
user.save!
Jobs.enqueue(:generate_avatars, upload_id: upload.id)
render json: { url: upload.url }
rescue FastImage::ImageFetchFailure
render status: 422, text: I18n.t("upload.images.fetch_failure")
rescue FastImage::UnknownImageType
render status: 422, text: I18n.t("upload.images.unknown_image_type")
rescue FastImage::SizeNotFound
render status: 422, text: I18n.t("upload.images.size_not_found")
end
def toggle_avatar
params.require(:use_uploaded_avatar)
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
user.use_uploaded_avatar = params[:use_uploaded_avatar]
user.save!
render json: { avatar_template: user.avatar_template }
end
2013-02-06 03:16:51 +08:00
private
def honeypot_value
Digest::SHA1::hexdigest("#{Discourse.current_hostname}:#{Discourse::Application.config.secret_token}")[0,15]
end
def challenge_value
'3019774c067cc2b'
end
def suspicious?(params)
honeypot_or_challenge_fails?(params) || SiteSetting.invite_only?
end
def fake_success_response
render(
json: {
success: true,
active: false,
message: I18n.t("login.activate_email", email: params[:email])
}
)
end
def honeypot_or_challenge_fails?(params)
params[:password_confirmation] != honeypot_value ||
params[:challenge] != challenge_value.try(:reverse)
end
def valid_session_authentication?(auth, email)
auth && auth[:email] == email && auth[:email_valid]
end
def create_third_party_auth_records(user, auth)
if twitter_auth?(auth)
TwitterUserInfo.create(
user_id: user.id,
screen_name: auth[:twitter_screen_name],
twitter_user_id: auth[:twitter_user_id]
)
end
if facebook_auth?(auth)
FacebookUserInfo.create!(auth[:facebook].merge(user_id: user.id))
end
if github_auth?(auth)
GithubUserInfo.create(
user_id: user.id,
screen_name: auth[:github_screen_name],
github_user_id: auth[:github_user_id]
)
end
end
def twitter_auth?(auth)
auth[:twitter_user_id] && auth[:twitter_screen_name] &&
TwitterUserInfo.find_by_twitter_user_id(auth[:twitter_user_id]).nil?
end
def facebook_auth?(auth)
auth[:facebook].present? &&
FacebookUserInfo.find_by_facebook_user_id(auth[:facebook][:facebook_user_id]).nil?
end
def github_auth?(auth)
auth[:github_user_id] && auth[:github_screen_name] &&
GithubUserInfo.find_by_github_user_id(auth[:github_user_id]).nil?
end
2013-02-06 03:16:51 +08:00
end