| #!/usr/bin/perl -T |
| # This Source Code Form is subject to the terms of the Mozilla Public |
| # License, v. 2.0. If a copy of the MPL was not distributed with this |
| # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
| # |
| # This Source Code Form is "Incompatible With Secondary Licenses", as |
| # defined by the Mozilla Public License, v. 2.0. |
| |
| use 5.10.1; |
| use strict; |
| use warnings; |
| |
| use lib qw(. lib); |
| |
| use Bugzilla; |
| use Bugzilla::Constants; |
| use Bugzilla::Util; |
| use Bugzilla::Error; |
| use Bugzilla::Token; |
| use Bugzilla::User; |
| |
| use Date::Format; |
| use Date::Parse; |
| |
| local our $cgi = Bugzilla->cgi; |
| local our $template = Bugzilla->template; |
| local our $vars = {}; |
| |
| my $action = $cgi->param('a'); |
| my $token = $cgi->param('t'); |
| |
| Bugzilla->login(LOGIN_OPTIONAL); |
| |
| # Throw an error if the form does not contain an "action" field specifying |
| # what the user wants to do. |
| $action || ThrowUserError('unknown_action'); |
| |
| Bugzilla::Token::CleanTokenTable(); |
| my ($user_id, $date, $data, $tokentype) = Bugzilla::Token::GetTokenData($token); |
| |
| # Requesting a new password is the single action which doesn't require a token. |
| # XXX Ideally, these checks should be done inside the subroutines themselves. |
| unless ($action eq 'reqpw') { |
| $tokentype || ThrowUserError("token_does_not_exist"); |
| |
| # Make sure the token is the correct type for the action being taken. |
| # The { user_error => 'wrong_token_for_*' } trick is to make 012throwables.t happy. |
| my $error = {}; |
| if (grep($action eq $_ , qw(cfmpw cxlpw chgpw)) && $tokentype ne 'password') { |
| $error = { user_error => 'wrong_token_for_changing_passwd' }; |
| } |
| elsif ($action eq 'cxlem' |
| && ($tokentype ne 'emailold' && $tokentype ne 'emailnew')) |
| { |
| $error = { user_error => 'wrong_token_for_cancelling_email_change' }; |
| } |
| elsif (grep($action eq $_ , qw(cfmem chgem)) && $tokentype ne 'emailnew') { |
| $error = { user_error => 'wrong_token_for_confirming_email_change' }; |
| } |
| elsif ($action =~ /^(request|confirm|cancel)_new_account$/ |
| && $tokentype ne 'account') |
| { |
| $error = { user_error => 'wrong_token_for_creating_account' }; |
| } |
| |
| if (my $user_error = $error->{user_error}) { |
| Bugzilla::Token::Cancel($token, $user_error); |
| ThrowUserError($user_error); |
| } |
| } |
| |
| if ($action eq 'reqpw') { |
| requestChangePassword(); |
| } |
| elsif ($action eq 'cfmpw') { |
| confirmChangePassword($token); |
| } |
| elsif ($action eq 'cxlpw') { |
| cancelChangePassword($token); |
| } |
| elsif ($action eq 'chgpw') { |
| changePassword($user_id, $token); |
| } |
| elsif ($action eq 'cfmem') { |
| confirmChangeEmail($token); |
| } |
| elsif ($action eq 'cxlem') { |
| cancelChangeEmail($user_id, $data, $tokentype, $token); |
| } |
| elsif ($action eq 'chgem') { |
| changeEmail($user_id, $data, $token); |
| } |
| elsif ($action eq 'request_new_account') { |
| request_create_account($date, $data, $token); |
| } |
| elsif ($action eq 'confirm_new_account') { |
| confirm_create_account($data, $token); |
| } |
| elsif ($action eq 'cancel_new_account') { |
| cancel_create_account($data, $token); |
| } |
| else { |
| ThrowUserError('unknown_action', {action => $action}); |
| } |
| |
| exit; |
| |
| ################################################################################ |
| # Functions |
| ################################################################################ |
| |
| # If the user is requesting a password change, make sure they submitted |
| # their login name and it exists in the database, and that the DB module is in |
| # the list of allowed verification methods. |
| sub requestChangePassword { |
| # check verification methods |
| Bugzilla->user->authorizer->can_change_password |
| || ThrowUserError("password_change_requests_not_allowed"); |
| |
| # Check the hash token to make sure this user actually submitted |
| # the forgotten password form. |
| my $token = $cgi->param('token'); |
| check_hash_token($token, ['reqpw']); |
| |
| my $login_name = $cgi->param('loginname') |
| or ThrowUserError("login_needed_for_password_change"); |
| |
| check_email_syntax($login_name); |
| my $user = new Bugzilla::User({ name => $login_name }); |
| |
| # Make sure the user account is active. |
| if ($user && !$user->is_enabled) { |
| ThrowUserError('account_disabled', |
| {disabled_reason => get_text('account_disabled', {account => $login_name})}); |
| } |
| |
| Bugzilla::Token::IssuePasswordToken($user) if $user; |
| |
| $vars->{'message'} = "password_change_request"; |
| $vars->{'login_name'} = $login_name; |
| |
| print $cgi->header(); |
| $template->process("global/message.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub confirmChangePassword { |
| my $token = shift; |
| $vars->{'token'} = $token; |
| |
| print $cgi->header(); |
| $template->process("account/password/set-forgotten-password.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub cancelChangePassword { |
| my $token = shift; |
| $vars->{'message'} = "password_change_canceled"; |
| Bugzilla::Token::Cancel($token, $vars->{'message'}); |
| |
| print $cgi->header(); |
| $template->process("global/message.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| # If the user is changing their password, make sure they submitted a new |
| # password and that the new password is valid. |
| sub changePassword { |
| my ($user_id, $token) = @_; |
| my $dbh = Bugzilla->dbh; |
| |
| my $password = $cgi->param('password'); |
| (defined $password && defined $cgi->param('matchpassword')) |
| || ThrowUserError("require_new_password"); |
| |
| validate_password($password, $cgi->param('matchpassword')); |
| # Make sure that these never show up in the UI under any circumstances. |
| $cgi->delete('password', 'matchpassword'); |
| |
| my $user = Bugzilla::User->check({ id => $user_id }); |
| $user->set_password($password); |
| $user->update(); |
| delete_token($token); |
| $dbh->do(q{DELETE FROM tokens WHERE userid = ? |
| AND tokentype = 'password'}, undef, $user_id); |
| |
| Bugzilla->logout_user_by_id($user_id); |
| |
| $vars->{'message'} = "password_changed"; |
| |
| print $cgi->header(); |
| $template->process("global/message.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub confirmChangeEmail { |
| my $token = shift; |
| $vars->{'token'} = $token; |
| |
| print $cgi->header(); |
| $template->process("account/email/confirm.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub changeEmail { |
| my ($userid, $eventdata, $token) = @_; |
| my $dbh = Bugzilla->dbh; |
| my ($old_email, $new_email) = split(/:/,$eventdata); |
| |
| $dbh->bz_start_transaction(); |
| |
| my $user = Bugzilla::User->check({ id => $userid }); |
| my $realpassword = $user->cryptpassword; |
| my $cgipassword = $cgi->param('password'); |
| |
| # Make sure the user who wants to change the email address |
| # is the real account owner. |
| if (bz_crypt($cgipassword, $realpassword) ne $realpassword) { |
| ThrowUserError("old_password_incorrect"); |
| } |
| |
| # The new email address should be available as this was |
| # confirmed initially so cancel token if it is not still available |
| if (! is_available_username($new_email,$old_email)) { |
| $vars->{'email'} = $new_email; # Needed for Bugzilla::Token::Cancel's mail |
| Bugzilla::Token::Cancel($token, "account_exists", $vars); |
| ThrowUserError("account_exists", { email => $new_email } ); |
| } |
| |
| # Update the user's login name in the profiles table. |
| $user->set_login($new_email); |
| $user->update({ keep_session => 1, keep_tokens => 1 }); |
| delete_token($token); |
| $dbh->do(q{DELETE FROM tokens WHERE userid = ? |
| AND tokentype = 'emailnew'}, undef, $userid); |
| |
| $dbh->bz_commit_transaction(); |
| |
| # Return HTTP response headers. |
| print $cgi->header(); |
| |
| # Let the user know their email address has been changed. |
| $vars->{'message'} = "login_changed"; |
| |
| $template->process("global/message.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub cancelChangeEmail { |
| my ($userid, $eventdata, $tokentype, $token) = @_; |
| my $dbh = Bugzilla->dbh; |
| |
| $dbh->bz_start_transaction(); |
| |
| my ($old_email, $new_email) = split(/:/,$eventdata); |
| |
| if ($tokentype eq "emailold") { |
| $vars->{'message'} = "emailold_change_canceled"; |
| my $user = Bugzilla::User->check({ id => $userid }); |
| |
| # check to see if it has been altered |
| if ($user->login ne $old_email) { |
| $user->set_login($old_email); |
| $user->update({ keep_tokens => 1 }); |
| |
| $vars->{'message'} = "email_change_canceled_reinstated"; |
| } |
| } |
| else { |
| $vars->{'message'} = 'email_change_canceled' |
| } |
| |
| $vars->{'old_email'} = $old_email; |
| $vars->{'new_email'} = $new_email; |
| Bugzilla::Token::Cancel($token, $vars->{'message'}, $vars); |
| |
| $dbh->do(q{DELETE FROM tokens WHERE userid = ? |
| AND tokentype = 'emailold' OR tokentype = 'emailnew'}, |
| undef, $userid); |
| |
| $dbh->bz_commit_transaction(); |
| |
| # Return HTTP response headers. |
| print $cgi->header(); |
| |
| $template->process("global/message.html.tmpl", $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub request_create_account { |
| my ($date, $login_name, $token) = @_; |
| |
| Bugzilla->user->check_account_creation_enabled; |
| |
| $vars->{'token'} = $token; |
| $vars->{'email'} = $login_name . Bugzilla->params->{'emailsuffix'}; |
| $vars->{'expiration_ts'} = ctime(str2time($date) + MAX_TOKEN_AGE * 86400); |
| |
| print $cgi->header(); |
| $template->process('account/email/confirm-new.html.tmpl', $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub confirm_create_account { |
| my ($login_name, $token) = @_; |
| |
| Bugzilla->user->check_account_creation_enabled; |
| |
| my $password = $cgi->param('passwd1') || ''; |
| validate_password($password, $cgi->param('passwd2') || ''); |
| # Make sure that these never show up anywhere in the UI. |
| $cgi->delete('passwd1', 'passwd2'); |
| |
| my $otheruser = Bugzilla::User->create({ |
| login_name => $login_name, |
| realname => scalar $cgi->param('realname'), |
| cryptpassword => $password}); |
| |
| # Now delete this token. |
| delete_token($token); |
| |
| # Let the user know that their user account has been successfully created. |
| $vars->{'message'} = 'account_created'; |
| $vars->{'otheruser'} = $otheruser; |
| |
| # Log in the new user using credentials they just gave. |
| $cgi->param('Bugzilla_login', $otheruser->login); |
| $cgi->param('Bugzilla_password', $password); |
| Bugzilla->login(LOGIN_OPTIONAL); |
| |
| print $cgi->header(); |
| |
| $template->process('index.html.tmpl', $vars) |
| || ThrowTemplateError($template->error()); |
| } |
| |
| sub cancel_create_account { |
| my ($login_name, $token) = @_; |
| |
| $vars->{'message'} = 'account_creation_canceled'; |
| $vars->{'account'} = $login_name; |
| Bugzilla::Token::Cancel($token, $vars->{'message'}); |
| |
| print $cgi->header(); |
| $template->process('global/message.html.tmpl', $vars) |
| || ThrowTemplateError($template->error()); |
| } |