discourse/app/controllers/users_controller.rb

620 lines
18 KiB
Ruby
Raw Normal View History

require_dependency 'discourse_hub'
require_dependency 'user_name_suggester'
require_dependency 'avatar_upload_service'
require_dependency 'rate_limiter'
2013-02-05 14:16:51 -05:00
class UsersController < ApplicationController
skip_before_filter :authorize_mini_profiler, only: [:avatar]
skip_before_filter :check_xhr, only: [:show, :password_reset, :update, :account_created, :activate_account, :perform_account_activation, :authorize_email, :user_preferences_redirect, :avatar, :my_redirect]
2013-02-05 14:16:51 -05:00
before_filter :ensure_logged_in, only: [:username, :update, :change_email, :user_preferences_redirect, :upload_user_image, :pick_avatar, :destroy_user_image, :destroy, :check_emails]
before_filter :respond_to_suspicious_request, only: [:create]
2013-02-07 10:45:24 -05:00
# we need to allow account creation with bad CSRF tokens, if people are caching, the CSRF token on the
# page is going to be empty, this means that server will see an invalid CSRF and blow the session
# once that happens you can't log in with social
skip_before_filter :verify_authenticity_token, only: [:create]
skip_before_filter :redirect_to_login_if_required, only: [:check_username,
:create,
:get_honeypot_value,
:account_created,
:activate_account,
:perform_account_activation,
:send_activation_email,
:authorize_email,
:password_reset]
2013-02-07 10:45:24 -05:00
def show
2013-02-05 14:16:51 -05:00
@user = fetch_user_from_params
user_serializer = UserSerializer.new(@user, scope: guardian, root: 'user')
respond_to do |format|
format.html do
@restrict_fields = guardian.restrict_user_fields?(@user)
store_preloaded("user_#{@user.username}", MultiJson.dump(user_serializer))
end
format.json do
render_json_dump(user_serializer)
end
2013-02-05 14:16:51 -05:00
end
end
def card_badge
end
def update_card_badge
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
user_badge = UserBadge.find_by(id: params[:user_badge_id].to_i)
if user_badge && user_badge.user == user && user_badge.badge.image.present?
user.user_profile.update_column(:card_image_badge_id, user_badge.badge.id)
else
user.user_profile.update_column(:card_image_badge_id, nil)
end
render nothing: true
end
2013-02-05 14:16:51 -05:00
def user_preferences_redirect
redirect_to email_preferences_path(current_user.username_lower)
end
def update
user = fetch_user_from_params
2013-02-05 14:16:51 -05:00
guardian.ensure_can_edit!(user)
if params[:user_fields].present?
params[:custom_fields] ||= {}
UserField.where(editable: true).each do |f|
val = params[:user_fields][f.id.to_s]
val = nil if val === "false"
return render_json_error(I18n.t("login.missing_user_field")) if val.blank? && f.required?
params[:custom_fields]["user_field_#{f.id}"] = val
end
end
json_result(user, serializer: UserSerializer, additional_errors: [:user_profile]) do |u|
updater = UserUpdater.new(current_user, user)
updater.update(params)
2013-02-07 10:45:24 -05:00
end
2013-02-05 14:16:51 -05:00
end
def username
params.require(:new_username)
2013-02-05 14:16:51 -05:00
user = fetch_user_from_params
guardian.ensure_can_edit_username!(user)
2013-02-07 10:45:24 -05:00
2013-02-05 14:16:51 -05:00
result = user.change_username(params[:new_username])
raise Discourse::InvalidParameters.new(:new_username) unless result
2013-02-07 10:45:24 -05:00
render nothing: true
2013-02-05 14:16:51 -05:00
end
def check_emails
user = fetch_user_from_params(include_inactive: true)
guardian.ensure_can_check_emails!(user)
StaffActionLogger.new(current_user).log_check_email(user, context: params[:context])
render json: {
email: user.email,
associated_accounts: user.associated_accounts
}
rescue Discourse::InvalidAccess
render json: failed_json, status: 403
end
def badge_title
params.require(:user_badge_id)
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
2014-07-14 04:06:50 -04:00
user_badge = UserBadge.find_by(id: params[:user_badge_id])
if user_badge && user_badge.user == user && user_badge.badge.allow_title?
user.title = user_badge.badge.name
user.user_profile.badge_granted_title = true
user.save!
user.user_profile.save!
2014-07-14 04:06:50 -04:00
else
user.title = ''
user.save!
end
render nothing: true
end
2013-02-05 14:16:51 -05:00
def preferences
render nothing: true
end
def my_redirect
if current_user.present? && params[:path] =~ /^[a-z\-\/]+$/
redirect_to "/users/#{current_user.username}/#{params[:path]}"
return
end
raise Discourse::NotFound.new
end
2013-02-05 14:16:51 -05:00
def invited
inviter = fetch_user_from_params
2014-08-01 07:06:31 -04:00
offset = params[:offset].to_i || 0
invites = if guardian.can_see_invite_details?(inviter)
2014-08-01 07:06:31 -04:00
Invite.find_all_invites_from(inviter, offset)
else
2014-08-01 07:06:31 -04:00
Invite.find_redeemed_invites_from(inviter, offset)
end
invites = invites.filter_by(params[:filter])
render_json_dump invites: serialize_data(invites.to_a, InviteSerializer),
can_see_invite_details: guardian.can_see_invite_details?(inviter)
2013-02-05 14:16:51 -05:00
end
def is_local_username
params.require(:username)
2013-02-05 14:16:51 -05:00
u = params[:username].downcase
r = User.exec_sql('select 1 from users where username_lower = ?', u).values
render json: {valid: r.length == 1}
end
def render_available_true
render(json: { available: true })
end
def changing_case_of_own_username(target_user, username)
target_user and username.downcase == target_user.username.downcase
end
# Used for checking availability of a username and will return suggestions
# if the username is not available.
2013-02-05 14:16:51 -05:00
def check_username
if !params[:username].present?
params.require(:username) if !params[:email].present?
2014-07-16 12:25:24 -04:00
return render(json: success_json)
end
username = params[:username]
2013-02-05 14:16:51 -05:00
target_user = user_from_params_or_current_user
# The special case where someone is changing the case of their own username
return render_available_true if changing_case_of_own_username(target_user, username)
checker = UsernameCheckerService.new
email = params[:email] || target_user.try(:email)
render json: checker.check_username(username, email)
end
2013-02-05 14:16:51 -05:00
def user_from_params_or_current_user
params[:for_user_id] ? User.find(params[:for_user_id]) : current_user
end
2013-02-05 14:16:51 -05:00
def create
params.permit(:user_fields)
unless SiteSetting.allow_new_registrations
return fail_with("login.new_registrations_disabled")
end
if params[:password] && params[:password].length > User.max_password_length
return fail_with("login.password_too_long")
end
user = User.new(user_params)
# Handle custom fields
user_fields = UserField.all
if user_fields.present?
if params[:user_fields].blank? && UserField.where(required: true).exists?
return fail_with("login.missing_user_field")
else
fields = user.custom_fields
user_fields.each do |f|
field_val = params[:user_fields][f.id.to_s]
if field_val.blank?
return fail_with("login.missing_user_field") if f.required?
else
fields["user_field_#{f.id}"] = field_val
end
end
user.custom_fields = fields
end
end
authentication = UserAuthenticator.new(user, session)
if !authentication.has_authenticator? && !SiteSetting.enable_local_logins
return render nothing: true, status: 500
end
authentication.start
2013-02-05 14:16:51 -05:00
activation = UserActivator.new(user, request, session, cookies)
activation.start
2013-02-05 14:16:51 -05:00
# just assign a password if we have an authenticator and no password
# this is the case for Twitter
user.password = SecureRandom.hex if user.password.blank? && authentication.has_authenticator?
if user.save
authentication.finish
activation.finish
2014-10-01 13:33:49 -04:00
# save user email in session, to show on account-created page
session["user_created_message"] = activation.message
render json: {
success: true,
active: user.active?,
message: activation.message,
user_id: user.id
}
else
render json: {
success: false,
message: I18n.t(
'login.errors',
errors: user.errors.full_messages.join("\n")
),
errors: user.errors.to_hash,
values: user.attributes.slice('name', 'username', 'email')
}
end
rescue ActiveRecord::StatementInvalid
render json: {
success: false,
message: I18n.t("login.something_already_taken")
}
2013-02-05 14:16:51 -05:00
rescue RestClient::Forbidden
render json: { errors: [I18n.t("discourse_hub.access_token_problem")] }
2013-02-05 14:16:51 -05:00
end
def get_honeypot_value
render json: {value: honeypot_value, challenge: challenge_value}
end
2013-02-05 14:16:51 -05:00
def password_reset
expires_now()
if EmailToken.valid_token_format?(params[:token])
@user = EmailToken.confirm(params[:token])
if @user
session["password-#{params[:token]}"] = @user.id
else
user_id = session["password-#{params[:token]}"]
@user = User.find(user_id) if user_id
end
else
@invalid_token = true
end
if !@user
2013-02-05 14:16:51 -05:00
flash[:error] = I18n.t('password_reset.no_token')
2013-11-11 06:28:26 -05:00
elsif request.put?
@invalid_password = params[:password].blank? || params[:password].length > User.max_password_length
if @invalid_password
@user.errors.add(:password, :invalid)
else
@user.password = params[:password]
@user.password_required!
if @user.save
Invite.invalidate_for_email(@user.email) # invite link can't be used to log in anymore
logon_after_password_reset
end
end
2013-02-05 14:16:51 -05:00
end
render layout: 'no_js'
2013-02-05 14:16:51 -05:00
end
2013-02-07 10:45:24 -05:00
def logon_after_password_reset
message = if Guardian.new(@user).can_access_forum?
# Log in the user
log_on_user(@user)
'password_reset.success'
else
@requires_approval = true
'password_reset.success_unapproved'
end
flash[:success] = I18n.t(message)
end
2013-02-05 14:16:51 -05:00
def change_email
params.require(:email)
2013-02-05 14:16:51 -05:00
user = fetch_user_from_params
guardian.ensure_can_edit_email!(user)
lower_email = Email.downcase(params[:email]).strip
2013-02-05 14:16:51 -05:00
RateLimiter.new(user, "change-email-hr-#{request.remote_ip}", 6, 1.hour).performed!
RateLimiter.new(user, "change-email-min-#{request.remote_ip}", 3, 1.minute).performed!
2013-02-05 14:16:51 -05:00
# Raise an error if the email is already in use
2014-07-14 10:16:24 -04:00
if User.find_by_email(lower_email)
raise Discourse::InvalidParameters.new(:email)
end
2013-02-05 14:16:51 -05:00
email_token = user.email_tokens.create(email: lower_email)
Jobs.enqueue(
:user_email,
to_address: lower_email,
type: :authorize_email,
user_id: user.id,
email_token: email_token.token
)
2013-02-05 14:16:51 -05:00
2013-02-07 10:45:24 -05:00
render nothing: true
rescue RateLimiter::LimitExceeded
render_json_error(I18n.t("rate_limiter.slow_down"))
2013-02-05 14:16:51 -05:00
end
def authorize_email
expires_now()
if @user = EmailToken.confirm(params[:token])
log_on_user(@user)
else
flash[:error] = I18n.t('change_email.error')
end
render layout: 'no_js'
2013-02-05 14:16:51 -05:00
end
def account_created
@message = session['user_created_message']
expires_now
render layout: 'no_js'
end
2013-02-05 14:16:51 -05:00
def activate_account
expires_now
render layout: 'no_js'
end
def perform_account_activation
raise Discourse::InvalidAccess.new if honeypot_or_challenge_fails?(params)
2013-02-05 14:16:51 -05:00
if @user = EmailToken.confirm(params[:token])
# Log in the user unless they need to be approved
if Guardian.new(@user).can_access_forum?
2013-02-05 14:16:51 -05:00
@user.enqueue_welcome_message('welcome_user') if @user.send_welcome_message
log_on_user(@user)
else
@needs_approval = true
2013-02-05 14:16:51 -05:00
end
else
flash[:error] = I18n.t('activation.already_done')
end
render layout: 'no_js'
2013-02-05 14:16:51 -05:00
end
def send_activation_email
RateLimiter.new(nil, "activate-hr-#{request.remote_ip}", 30, 1.hour).performed!
RateLimiter.new(nil, "activate-min-#{request.remote_ip}", 6, 1.minute).performed!
@user = User.find_by_username_or_email(params[:username].to_s)
2014-09-25 03:45:45 -04:00
raise Discourse::NotFound unless @user
@email_token = @user.email_tokens.unconfirmed.active.first
enqueue_activation_email if @user
render nothing: true
end
def enqueue_activation_email
@email_token ||= @user.email_tokens.create(email: @user.email)
Jobs.enqueue(:user_email, type: :signup, user_id: @user.id, email_token: @email_token.token)
end
2013-02-05 14:16:51 -05:00
def search_users
2013-02-07 05:59:25 -05:00
term = params[:term].to_s.strip
2013-02-05 14:16:51 -05:00
topic_id = params[:topic_id]
topic_id = topic_id.to_i if topic_id
results = UserSearch.new(term, topic_id: topic_id, searching_user: current_user).search
2013-02-05 14:16:51 -05:00
user_fields = [:username, :upload_avatar_template, :uploaded_avatar_id]
user_fields << :name if SiteSetting.enable_names?
to_render = { users: results.as_json(only: user_fields, methods: :avatar_template) }
if params[:include_groups] == "true"
to_render[:groups] = Group.search_group(term, current_user).map {|m| {:name=>m.name, :usernames=> m.usernames.split(",")} }
end
render json: to_render
2013-02-05 14:16:51 -05:00
end
# [LEGACY] avatars in quotes/oneboxes might still be pointing to this route
# fixing it requires a rebake of all the posts
2013-08-13 16:08:29 -04:00
def avatar
user = User.find_by(username_lower: params[:username].downcase)
if user.present?
size = determine_avatar_size(params[:size])
url = user.avatar_template.gsub("{size}", size.to_s)
expires_in 1.day
redirect_to url
else
raise ActiveRecord::RecordNotFound
end
end
def determine_avatar_size(size)
size = size.to_i
size = 64 if size == 0
size = 10 if size < 10
size = 128 if size > 128
size
end
2014-04-14 16:55:57 -04:00
# LEGACY: used by the API
def upload_avatar
params[:image_type] = "avatar"
upload_user_image
end
2014-04-14 16:55:57 -04:00
def upload_user_image
params.require(:image_type)
2013-08-13 16:08:29 -04:00
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
file = params[:file] || params[:files].first
2014-04-14 16:55:57 -04:00
begin
image = build_user_image_from(file)
rescue Discourse::InvalidParameters
return render status: 422, text: I18n.t("upload.images.unknown_image_type")
end
2013-08-13 16:08:29 -04:00
2014-04-14 16:55:57 -04:00
upload = Upload.create_for(user.id, image.file, image.filename, image.filesize)
if upload.errors.empty?
case params[:image_type]
2014-04-14 16:55:57 -04:00
when "avatar"
upload_avatar_for(user, upload)
when "profile_background"
upload_profile_background_for(user.user_profile, upload)
when "card_background"
upload_card_background_for(user.user_profile, upload)
2014-04-14 16:55:57 -04:00
end
else
2014-04-14 16:55:57 -04:00
render status: 422, text: upload.errors.full_messages
end
2013-08-13 16:08:29 -04:00
end
def pick_avatar
2013-08-13 16:08:29 -04:00
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
upload_id = params[:upload_id]
2013-08-13 16:08:29 -04:00
user.uploaded_avatar_id = upload_id
# ensure we associate the custom avatar properly
2014-05-30 00:37:12 -04:00
if upload_id && !user.user_avatar.contains_upload?(upload_id)
user.user_avatar.custom_upload_id = upload_id
end
2013-08-13 16:08:29 -04:00
user.save!
2013-08-16 18:29:54 -04:00
render nothing: true
2013-08-13 16:08:29 -04:00
end
2014-04-14 16:55:57 -04:00
def destroy_user_image
user = fetch_user_from_params
guardian.ensure_can_edit!(user)
2014-04-14 16:55:57 -04:00
image_type = params.require(:image_type)
if image_type == 'profile_background'
user.user_profile.clear_profile_background
elsif image_type == 'card_background'
user.user_profile.clear_card_background
else
raise Discourse::InvalidParameters.new(:image_type)
end
2014-04-14 16:55:57 -04:00
render nothing: true
end
2014-04-14 16:55:57 -04:00
def destroy
@user = fetch_user_from_params
guardian.ensure_can_delete_user!(@user)
2014-04-14 16:55:57 -04:00
UserDestroyer.new(current_user).destroy(@user, { delete_posts: true, context: params[:context] })
2014-04-14 16:55:57 -04:00
render json: success_json
end
2014-07-11 03:32:29 -04:00
def read_faq
if(user = current_user)
user.user_stat.read_faq = 1.second.ago
user.user_stat.save
end
render json: success_json
end
2013-02-05 14:16:51 -05:00
private
def honeypot_value
Digest::SHA1::hexdigest("#{Discourse.current_hostname}:#{Discourse::Application.config.secret_token}")[0,15]
end
def challenge_value
challenge = $redis.get('SECRET_CHALLENGE')
unless challenge && challenge.length == 16*2
challenge = SecureRandom.hex(16)
$redis.set('SECRET_CHALLENGE',challenge)
end
challenge
end
def build_user_image_from(file)
source = if file.is_a?(String)
2014-04-14 16:55:57 -04:00
is_api? ? :url : (raise Discourse::InvalidParameters)
else
:image
end
2014-04-14 16:55:57 -04:00
AvatarUploadService.new(file, source)
end
2014-04-14 16:55:57 -04:00
def upload_avatar_for(user, upload)
render json: { upload_id: upload.id, url: upload.url, width: upload.width, height: upload.height }
end
2014-04-14 16:55:57 -04:00
def upload_profile_background_for(user_profile, upload)
user_profile.upload_profile_background(upload)
render json: { url: upload.url, width: upload.width, height: upload.height }
end
2014-04-14 16:55:57 -04:00
def upload_card_background_for(user_profile, upload)
user_profile.upload_card_background(upload)
render json: { url: upload.url, width: upload.width, height: upload.height }
end
2014-04-14 16:55:57 -04:00
def respond_to_suspicious_request
if suspicious?(params)
render(
json: {
success: true,
active: false,
message: I18n.t("login.activate_email", email: params[:email])
}
)
end
end
def suspicious?(params)
return false if current_user && is_api? && current_user.admin?
honeypot_or_challenge_fails?(params) || SiteSetting.invite_only?
end
def honeypot_or_challenge_fails?(params)
return false if is_api?
params[:password_confirmation] != honeypot_value ||
params[:challenge] != challenge_value.try(:reverse)
end
def user_params
params.permit(
:name,
:email,
:password,
:username,
:active
).merge(ip_address: request.ip, registration_ip_address: request.ip)
end
def fail_with(key)
render json: { success: false, message: I18n.t(key) }
end
2013-02-05 14:16:51 -05:00
end