discourse/app/controllers/users_controller.rb

321 lines
10 KiB
Ruby
Raw Normal View History

2013-02-05 14:16:51 -05:00
require_dependency 'mothership'
class UsersController < ApplicationController
skip_before_filter :check_xhr, only: [:password_reset, :update, :activate_account, :avatar, :authorize_email, :user_preferences_redirect]
skip_before_filter :authorize_mini_profiler, only: [:avatar]
skip_before_filter :check_restricted_access, only: [:avatar]
before_filter :ensure_logged_in, only: [:username, :update, :change_email, :user_preferences_redirect]
2013-02-07 10:45:24 -05:00
def show
2013-02-05 14:16:51 -05:00
@user = fetch_user_from_params
anonymous_etag(@user) do
render_serialized(@user, UserSerializer)
end
end
def user_preferences_redirect
redirect_to email_preferences_path(current_user.username_lower)
end
def update
user = User.where(:username_lower => params[:username].downcase).first
guardian.ensure_can_edit!(user)
json_result(user) do |u|
website = params[:website]
2013-02-07 10:45:24 -05:00
if website
2013-02-05 14:16:51 -05:00
website = "http://" + website unless website =~ /^http/
end
u.bio_raw = params[:bio_raw] || u.bio_raw
u.name = params[:name] || u.name
u.website = website || u.website
u.digest_after_days = params[:digest_after_days] || u.digest_after_days
u.auto_track_topics_after_msecs = params[:auto_track_topics_after_msecs].to_i if params[:auto_track_topics_after_msecs]
[:email_digests, :email_direct, :email_private_messages].each do |i|
if params[i].present?
u.send("#{i.to_s}=", params[i] == 'true')
end
end
u.save
2013-02-07 10:45:24 -05:00
end
2013-02-05 14:16:51 -05:00
end
def username
requires_parameter(:new_username)
user = fetch_user_from_params
2013-02-07 10:45:24 -05:00
guardian.ensure_can_edit!(user)
2013-02-05 14:16:51 -05:00
result = user.change_username(params[:new_username])
raise Discourse::InvalidParameters.new(:new_username) unless result
2013-02-07 10:45:24 -05:00
render nothing: true
2013-02-05 14:16:51 -05:00
end
def preferences
render nothing: true
end
def invited
invited_list = InvitedList.new(fetch_user_from_params)
render_serialized(invited_list, InvitedListSerializer)
end
def is_local_username
requires_parameter(:username)
u = params[:username].downcase
r = User.exec_sql('select 1 from users where username_lower = ?', u).values
render json: {valid: r.length == 1}
end
def check_username
requires_parameter(:username)
if !SiteSetting.call_mothership?
if User.username_available?(params[:username])
render json: {available: true}
else
render json: {available: false, suggestion: User.suggest_username(params[:username])}
end
else
# Contact the mothership
email_given = (params[:email].present? or current_user.present?)
available_locally = User.username_available?(params[:username])
global_match = false
available_globally, suggestion_from_mothership = begin
if email_given
global_match, available, suggestion = Mothership.nickname_match?( params[:username], params[:email] || current_user.email )
[available || global_match, suggestion]
else
Mothership.nickname_available?(params[:username])
end
end
if available_globally and available_locally
render json: {available: true, global_match: (global_match ? true : false)}
elsif available_locally and !available_globally
if email_given
# Nickname and email do not match what's registered on the mothership.
render json: {available: false, global_match: false, suggestion: suggestion_from_mothership}
else
# The nickname is available locally, but is registered on the mothership.
# We need an email to see if the nickname belongs to this person.
# Don't give a suggestion until we get the email and try to match it with on the mothership.
render json: {available: false}
end
elsif available_globally and !available_locally
# Already registered on this site with the matching nickname and email address. Why are you signing up again?
render json: {available: false, suggestion: User.suggest_username(params[:username])}
else
# Not available anywhere.
render json: {available: false, suggestion: suggestion_from_mothership}
end
end
rescue RestClient::Forbidden
render json: {errors: [I18n.t("mothership.access_token_problem")]}
end
def create
if params[:password_confirmation] != honeypot_value or params[:challenge] != challenge_value.try(:reverse)
# Don't give any indication that we caught you in the honeypot
return render(:json => {success: true, active: false, message: I18n.t("login.activate_email", email: params[:email]) })
end
2013-02-05 14:16:51 -05:00
user = User.new
user.name = params[:name]
user.email = params[:email]
user.password = params[:password]
user.username = params[:username]
auth = session[:authentication]
if auth && auth[:email] == params[:email] && auth[:email_valid]
user.active = true
end
Mothership.register_nickname( user.username, user.email ) if user.valid? and SiteSetting.call_mothership?
if user.save
2013-02-07 10:45:24 -05:00
msg = nil
2013-02-05 14:16:51 -05:00
active_result = user.active?
if active_result
# If the user is active (remote authorized email)
if SiteSetting.must_approve_users?
msg = I18n.t("login.wait_approval")
active_result = false
else
log_on_user(user)
user.enqueue_welcome_message('welcome_user')
msg = I18n.t("login.active")
end
2013-02-07 10:45:24 -05:00
else
2013-02-05 14:16:51 -05:00
msg = I18n.t("login.activate_email", email: user.email)
Jobs.enqueue(:user_email, type: :signup, user_id: user.id, email_token: user.email_tokens.first.token)
end
# Create auth records
if auth.present?
if auth[:twitter_user_id] && auth[:twitter_screen_name] && TwitterUserInfo.find_by_twitter_user_id(auth[:twitter_user_id]).nil?
TwitterUserInfo.create(:user_id => user.id, :screen_name => auth[:twitter_screen_name], :twitter_user_id => auth[:twitter_user_id])
end
if auth[:facebook].present? and FacebookUserInfo.find_by_facebook_user_id(auth[:facebook][:facebook_user_id]).nil?
FacebookUserInfo.create!(auth[:facebook].merge(user_id: user.id))
end
end
2013-02-07 10:45:24 -05:00
# Clear authentication session.
2013-02-05 14:16:51 -05:00
session[:authentication] = nil
# JSON result
render :json => {success: true, active: active_result, message: msg }
else
render :json => {success: false, message: I18n.t("login.errors", errors: user.errors.full_messages.join("\n"))}
end
rescue Mothership::NicknameUnavailable
render :json => {success: false, message: I18n.t("login.errors", errors:I18n.t("login.not_available", suggestion: User.suggest_username(params[:username])) )}
rescue RestClient::Forbidden
render json: {errors: [I18n.t("mothership.access_token_problem")]}
end
def get_honeypot_value
render json: {value: honeypot_value, challenge: challenge_value}
end
2013-02-05 14:16:51 -05:00
# all avatars are funneled through here
def avatar
2013-02-07 10:45:24 -05:00
2013-02-05 14:16:51 -05:00
# TEMP to catch all missing spots
# raise ActiveRecord::RecordNotFound
2013-02-07 10:45:24 -05:00
2013-02-05 14:16:51 -05:00
user = User.select(:email).where(:username_lower => params[:username].downcase).first
if user
# for now we only support gravatar in square (redirect cached for a day), later we can use x-sendfile and/or a cdn to serve local
size = params[:size].to_i
size = 64 if size == 0
size = 10 if size < 10
2013-02-07 10:45:24 -05:00
size = 128 if size > 128
2013-02-05 14:16:51 -05:00
url = user.avatar_template.gsub("{size}", size.to_s)
expires_in 1.day
2013-02-07 10:45:24 -05:00
redirect_to url
else
2013-02-05 14:16:51 -05:00
raise ActiveRecord::RecordNotFound
end
end
def password_reset
expires_now()
@user = EmailToken.confirm(params[:token])
if @user.blank?
flash[:error] = I18n.t('password_reset.no_token')
else
if request.put? and params[:password].present?
@user.password = params[:password]
if @user.save
if SiteSetting.must_approve_users? and !@user.approved?
@requires_approval = true
flash[:success] = I18n.t('password_reset.success_unapproved')
else
# Log in the user
log_on_user(@user)
flash[:success] = I18n.t('password_reset.success')
end
2013-02-07 10:45:24 -05:00
end
end
2013-02-05 14:16:51 -05:00
end
render :layout => 'no_js'
end
2013-02-07 10:45:24 -05:00
2013-02-05 14:16:51 -05:00
def change_email
requires_parameter(:email)
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
# Raise an error if the email is already in use
raise Discourse::InvalidParameters.new(:email) if User.where("lower(email) = ?", params[:email].downcase).exists?
email_token = user.email_tokens.create(email: params[:email])
2013-02-07 10:45:24 -05:00
Jobs.enqueue(:user_email,
to_address: params[:email],
type: :authorize_email,
user_id: user.id,
2013-02-05 14:16:51 -05:00
email_token: email_token.token)
2013-02-07 10:45:24 -05:00
render nothing: true
2013-02-05 14:16:51 -05:00
end
def authorize_email
expires_now()
if @user = EmailToken.confirm(params[:token])
log_on_user(@user)
else
flash[:error] = I18n.t('change_email.error')
end
render :layout => 'no_js'
end
def activate_account
expires_now()
if @user = EmailToken.confirm(params[:token])
# Log in the user unless they need to be approved
2013-02-07 10:45:24 -05:00
if SiteSetting.must_approve_users?
2013-02-05 14:16:51 -05:00
@needs_approval = true
else
@user.enqueue_welcome_message('welcome_user') if @user.send_welcome_message
log_on_user(@user)
end
else
flash[:error] = I18n.t('activation.already_done')
end
render :layout => 'no_js'
end
def search_users
term = (params[:term] || "").strip.downcase
topic_id = params[:topic_id]
topic_id = topic_id.to_i if topic_id
results = UserSearch.search term, topic_id
2013-02-05 14:16:51 -05:00
2013-02-07 10:45:24 -05:00
render :json => results
2013-02-05 14:16:51 -05:00
end
private
def honeypot_value
Digest::SHA1::hexdigest("#{Discourse.current_hostname}:#{Discourse::Application.config.secret_token}")[0,15]
end
def challenge_value
'3019774c067cc2b'
end
2013-02-05 14:16:51 -05:00
def fetch_user_from_params
username_lower = params[:username].downcase
username_lower.gsub!(/\.json$/, '')
2013-02-07 10:45:24 -05:00
2013-02-05 14:16:51 -05:00
user = User.where(username_lower: username_lower).first
raise Discourse::NotFound.new if user.blank?
guardian.ensure_can_see!(user)
user
2013-02-07 10:45:24 -05:00
end
2013-02-05 14:16:51 -05:00
end