123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398 |
- #!/usr/bin/env perl -wT
- # -*- Mode: perl; indent-tabs-mode: nil -*-
- #
- # The contents of this file are subject to the Mozilla Public
- # License Version 1.1 (the "License"); you may not use this file
- # except in compliance with the License. You may obtain a copy of
- # the License at http://www.mozilla.org/MPL/
- #
- # Software distributed under the License is distributed on an "AS
- # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
- # implied. See the License for the specific language governing
- # rights and limitations under the License.
- #
- # The Original Code is the Bugzilla Bug Tracking System.
- #
- # The Initial Developer of the Original Code is Netscape Communications
- # Corporation. Portions created by Netscape are
- # Copyright (C) 1998 Netscape Communications Corporation. All
- # Rights Reserved.
- #
- # Contributor(s): Myk Melez <myk@mozilla.org>
- # Frédéric Buclin <LpSolit@gmail.com>
- ############################################################################
- # Script Initialization
- ############################################################################
- # Make it harder for us to do dangerous things in Perl.
- use strict;
- use lib qw(. lib);
- use Bugzilla;
- use Bugzilla::Constants;
- use Bugzilla::Util;
- use Bugzilla::Error;
- use Bugzilla::Token;
- use Bugzilla::User;
- use Date::Parse;
- my $dbh = Bugzilla->dbh;
- local our $cgi = Bugzilla->cgi;
- local our $template = Bugzilla->template;
- local our $vars = {};
- Bugzilla->login(LOGIN_OPTIONAL);
- ################################################################################
- # Data Validation / Security Authorization
- ################################################################################
- # Throw an error if the form does not contain an "action" field specifying
- # what the user wants to do.
- $cgi->param('a') || ThrowCodeError("unknown_action");
- # Assign the action to a global variable.
- $::action = $cgi->param('a');
- # If a token was submitted, make sure it is a valid token that exists in the
- # database and is the correct type for the action being taken.
- if ($cgi->param('t')) {
- # Assign the token and its SQL quoted equivalent to global variables.
- $::token = $cgi->param('t');
-
- # Make sure the token contains only valid characters in the right amount.
- # validate_password will throw an error if token is invalid
- validate_password($::token);
- Bugzilla::Token::CleanTokenTable();
- # Make sure the token exists in the database.
- my ($tokentype) = $dbh->selectrow_array('SELECT tokentype FROM tokens
- WHERE token = ?', undef, $::token);
- $tokentype || ThrowUserError("token_does_not_exist");
- # Make sure the token is the correct type for the action being taken.
- if ( grep($::action eq $_ , qw(cfmpw cxlpw chgpw)) && $tokentype ne 'password' ) {
- Bugzilla::Token::Cancel($::token, "wrong_token_for_changing_passwd");
- ThrowUserError("wrong_token_for_changing_passwd");
- }
- if ( ($::action eq 'cxlem')
- && (($tokentype ne 'emailold') && ($tokentype ne 'emailnew')) ) {
- Bugzilla::Token::Cancel($::token, "wrong_token_for_cancelling_email_change");
- ThrowUserError("wrong_token_for_cancelling_email_change");
- }
- if ( grep($::action eq $_ , qw(cfmem chgem))
- && ($tokentype ne 'emailnew') ) {
- Bugzilla::Token::Cancel($::token, "wrong_token_for_confirming_email_change");
- ThrowUserError("wrong_token_for_confirming_email_change");
- }
- if (($::action =~ /^(request|confirm|cancel)_new_account$/)
- && ($tokentype ne 'account'))
- {
- Bugzilla::Token::Cancel($::token, 'wrong_token_for_creating_account');
- ThrowUserError('wrong_token_for_creating_account');
- }
- }
- # If the user is requesting a password change, make sure they submitted
- # their login name and it exists in the database, and that the DB module is in
- # the list of allowed verification methods.
- my $user_account;
- if ( $::action eq 'reqpw' ) {
- my $login_name = $cgi->param('loginname')
- || ThrowUserError("login_needed_for_password_change");
- # check verification methods
- unless (Bugzilla->user->authorizer->can_change_password) {
- ThrowUserError("password_change_requests_not_allowed");
- }
- validate_email_syntax($login_name)
- || ThrowUserError('illegal_email_address', {addr => $login_name});
- $user_account = Bugzilla::User->check($login_name);
- }
- # If the user is changing their password, make sure they submitted a new
- # password and that the new password is valid.
- my $password;
- if ( $::action eq 'chgpw' ) {
- $password = $cgi->param('password');
- defined $password
- && defined $cgi->param('matchpassword')
- || ThrowUserError("require_new_password");
- validate_password($password, $cgi->param('matchpassword'));
- }
- ################################################################################
- # Main Body Execution
- ################################################################################
- # All calls to this script should contain an "action" variable whose value
- # determines what the user wants to do. The code below checks the value of
- # that variable and runs the appropriate code.
- if ($::action eq 'reqpw') {
- requestChangePassword($user_account);
- } elsif ($::action eq 'cfmpw') {
- confirmChangePassword();
- } elsif ($::action eq 'cxlpw') {
- cancelChangePassword();
- } elsif ($::action eq 'chgpw') {
- changePassword($password);
- } elsif ($::action eq 'cfmem') {
- confirmChangeEmail();
- } elsif ($::action eq 'cxlem') {
- cancelChangeEmail();
- } elsif ($::action eq 'chgem') {
- changeEmail();
- } elsif ($::action eq 'request_new_account') {
- request_create_account();
- } elsif ($::action eq 'confirm_new_account') {
- confirm_create_account();
- } elsif ($::action eq 'cancel_new_account') {
- cancel_create_account();
- } else {
- # If the action that the user wants to take (specified in the "a" form field)
- # is none of the above listed actions, display an error telling the user
- # that we do not understand what they would like to do.
- ThrowCodeError("unknown_action", { action => $::action });
- }
- exit;
- ################################################################################
- # Functions
- ################################################################################
- sub requestChangePassword {
- my ($user) = @_;
- Bugzilla::Token::IssuePasswordToken($user);
- $vars->{'message'} = "password_change_request";
- print $cgi->header();
- $template->process("global/message.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub confirmChangePassword {
- $vars->{'token'} = $::token;
-
- print $cgi->header();
- $template->process("account/password/set-forgotten-password.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub cancelChangePassword {
- $vars->{'message'} = "password_change_canceled";
- Bugzilla::Token::Cancel($::token, $vars->{'message'});
- print $cgi->header();
- $template->process("global/message.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub changePassword {
- my ($password) = @_;
- my $dbh = Bugzilla->dbh;
- # Create a crypted version of the new password
- my $cryptedpassword = bz_crypt($password);
- # Get the user's ID from the tokens table.
- my ($userid) = $dbh->selectrow_array('SELECT userid FROM tokens
- WHERE token = ?', undef, $::token);
-
- # Update the user's password in the profiles table and delete the token
- # from the tokens table.
- $dbh->bz_start_transaction();
- $dbh->do(q{UPDATE profiles
- SET cryptpassword = ?
- WHERE userid = ?},
- undef, ($cryptedpassword, $userid) );
- $dbh->do('DELETE FROM tokens WHERE token = ?', undef, $::token);
- $dbh->bz_commit_transaction();
- Bugzilla->logout_user_by_id($userid);
- $vars->{'message'} = "password_changed";
- print $cgi->header();
- $template->process("global/message.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub confirmChangeEmail {
- # Return HTTP response headers.
- print $cgi->header();
- $vars->{'token'} = $::token;
- $template->process("account/email/confirm.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub changeEmail {
- my $dbh = Bugzilla->dbh;
- # Get the user's ID from the tokens table.
- my ($userid, $eventdata) = $dbh->selectrow_array(
- q{SELECT userid, eventdata FROM tokens
- WHERE token = ?}, undef, $::token);
- my ($old_email, $new_email) = split(/:/,$eventdata);
- # Check the user entered the correct old email address
- if(lc($cgi->param('email')) ne lc($old_email)) {
- ThrowUserError("email_confirmation_failed");
- }
- # The new email address should be available as this was
- # confirmed initially so cancel token if it is not still available
- if (! is_available_username($new_email,$old_email)) {
- $vars->{'email'} = $new_email; # Needed for Bugzilla::Token::Cancel's mail
- Bugzilla::Token::Cancel($::token, "account_exists", $vars);
- ThrowUserError("account_exists", { email => $new_email } );
- }
- # Update the user's login name in the profiles table and delete the token
- # from the tokens table.
- $dbh->bz_start_transaction();
- $dbh->do(q{UPDATE profiles
- SET login_name = ?
- WHERE userid = ?},
- undef, ($new_email, $userid));
- $dbh->do('DELETE FROM tokens WHERE token = ?', undef, $::token);
- $dbh->do(q{DELETE FROM tokens WHERE userid = ?
- AND tokentype = 'emailnew'}, undef, $userid);
- $dbh->bz_commit_transaction();
- # The email address has been changed, so we need to rederive the groups
- my $user = new Bugzilla::User($userid);
- $user->derive_regexp_groups;
- # Return HTTP response headers.
- print $cgi->header();
- # Let the user know their email address has been changed.
- $vars->{'message'} = "login_changed";
- $template->process("global/message.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub cancelChangeEmail {
- my $dbh = Bugzilla->dbh;
- # Get the user's ID from the tokens table.
- my ($userid, $tokentype, $eventdata) = $dbh->selectrow_array(
- q{SELECT userid, tokentype, eventdata FROM tokens
- WHERE token = ?}, undef, $::token);
- my ($old_email, $new_email) = split(/:/,$eventdata);
- if($tokentype eq "emailold") {
- $vars->{'message'} = "emailold_change_canceled";
- my $actualemail = $dbh->selectrow_array(
- q{SELECT login_name FROM profiles
- WHERE userid = ?}, undef, $userid);
-
- # check to see if it has been altered
- if($actualemail ne $old_email) {
- $dbh->do(q{UPDATE profiles
- SET login_name = ?
- WHERE userid = ?},
- undef, ($old_email, $userid));
- # email has changed, so rederive groups
- # Note that this is done _after_ the tables are unlocked
- # This is sort of a race condition (given the lack of transactions)
- # but the user had access to it just now, so it's not a security
- # issue
- my $user = new Bugzilla::User($userid);
- $user->derive_regexp_groups;
- $vars->{'message'} = "email_change_canceled_reinstated";
- }
- }
- else {
- $vars->{'message'} = 'email_change_canceled'
- }
- $vars->{'old_email'} = $old_email;
- $vars->{'new_email'} = $new_email;
- Bugzilla::Token::Cancel($::token, $vars->{'message'}, $vars);
- $dbh->do(q{DELETE FROM tokens WHERE userid = ?
- AND tokentype = 'emailold' OR tokentype = 'emailnew'},
- undef, $userid);
- # Return HTTP response headers.
- print $cgi->header();
- $template->process("global/message.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- }
- sub request_create_account {
- my (undef, $date, $login_name) = Bugzilla::Token::GetTokenData($::token);
- $vars->{'token'} = $::token;
- $vars->{'email'} = $login_name . Bugzilla->params->{'emailsuffix'};
- $vars->{'date'} = str2time($date);
- # When 'ssl' equals 'always' or 'authenticated sessions',
- # we want this form to always be over SSL.
- if ($cgi->protocol ne 'https' && Bugzilla->params->{'sslbase'} ne ''
- && Bugzilla->params->{'ssl'} ne 'never')
- {
- $cgi->require_https(Bugzilla->params->{'sslbase'});
- }
- print $cgi->header();
- $template->process('account/email/confirm-new.html.tmpl', $vars)
- || ThrowTemplateError($template->error());
- }
- sub confirm_create_account {
- my (undef, undef, $login_name) = Bugzilla::Token::GetTokenData($::token);
- my $password = $cgi->param('passwd1') || '';
- validate_password($password, $cgi->param('passwd2') || '');
- my $otheruser = Bugzilla::User->create({
- login_name => $login_name,
- realname => $cgi->param('realname'),
- cryptpassword => $password});
- # Now delete this token.
- delete_token($::token);
- # Let the user know that his user account has been successfully created.
- $vars->{'message'} = 'account_created';
- $vars->{'otheruser'} = $otheruser;
- $vars->{'login_info'} = 1;
- print $cgi->header();
- $template->process('global/message.html.tmpl', $vars)
- || ThrowTemplateError($template->error());
- }
- sub cancel_create_account {
- my (undef, undef, $login_name) = Bugzilla::Token::GetTokenData($::token);
- $vars->{'message'} = 'account_creation_canceled';
- $vars->{'account'} = $login_name;
- Bugzilla::Token::Cancel($::token, $vars->{'message'});
- print $cgi->header();
- $template->process('global/message.html.tmpl', $vars)
- || ThrowTemplateError($template->error());
- }
|