#!/usr/bin/perl -wT # The contents of this file are subject to the Mozilla Public # License Version 1.1 (the "License"); you may not use this file # except in compliance with the License. You may obtain a copy of # the License at http://www.mozilla.org/MPL/ # # Software distributed under the License is distributed on an "AS # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or # implied. See the License for the specific language governing # rights and limitations under the License. # # The Original Code is the Bugzilla Bug Tracking System. # # The Initial Developer of the Original Code is Netscape Communications # Corporation. Portions created by Netscape are # Copyright (C) 1998 Netscape Communications Corporation. All # Rights Reserved. # # Contributor(s): Myk Melez # Frédéric Buclin use strict; use lib qw(. lib); use Bugzilla; use Bugzilla::Constants; use Bugzilla::Util; use Bugzilla::Error; use Bugzilla::Token; use Bugzilla::User; use Date::Format; use Date::Parse; local our $ARGS = Bugzilla->input_params; local our $vars = {}; local our $template = Bugzilla->template; my $action = $ARGS->{a}; my $token = $ARGS->{t}; Bugzilla->login(LOGIN_OPTIONAL); # Throw an error if the form does not contain an "action" field specifying # what the user wants to do. $action || ThrowUserError('unknown_action'); # If a token was submitted, make sure it is a valid token that exists in the # database and is the correct type for the action being taken. if ($token) { Bugzilla::Token::CleanTokenTable(); # It's safe to detaint the token as it's used in a placeholder. trick_taint($token); # Make sure the token exists in the database. my ($tokentype) = Bugzilla->dbh->selectrow_array( 'SELECT tokentype FROM tokens WHERE token = ?', undef, $token ); $tokentype || ThrowUserError("token_does_not_exist"); # Make sure the token is the correct type for the action being taken. if (grep ($action eq $_, qw(cfmpw cxlpw chgpw)) && $tokentype ne 'password') { Bugzilla::Token::Cancel($token, "wrong_token_for_changing_passwd"); ThrowUserError("wrong_token_for_changing_passwd"); } if ($action eq 'cxlem' && $tokentype ne 'emailold' && $tokentype ne 'emailnew') { Bugzilla::Token::Cancel($token, "wrong_token_for_cancelling_email_change"); ThrowUserError("wrong_token_for_cancelling_email_change"); } if (grep($action eq $_, qw(cfmem chgem)) && $tokentype ne 'emailnew') { Bugzilla::Token::Cancel($token, "wrong_token_for_confirming_email_change"); ThrowUserError("wrong_token_for_confirming_email_change"); } if ($action =~ /^(request|confirm|cancel)_new_account$/ && $tokentype ne 'account') { Bugzilla::Token::Cancel($token, 'wrong_token_for_creating_account'); ThrowUserError('wrong_token_for_creating_account'); } } ################################################################################ # Main Body Execution ################################################################################ # All calls to this script should contain an "action" variable whose value # determines what the user wants to do. The code below checks the value of # that variable and runs the appropriate code. if ($action eq 'reqpw') { requestChangePassword(); } elsif ($action eq 'cfmpw') { confirmChangePassword($token); } elsif ($action eq 'cxlpw') { cancelChangePassword($token); } elsif ($action eq 'chgpw') { changePassword($token); } elsif ($action eq 'cfmem') { confirmChangeEmail($token); } elsif ($action eq 'cxlem') { cancelChangeEmail($token); } elsif ($action eq 'chgem') { changeEmail($token); } elsif ($action eq 'request_new_account') { request_create_account($token); } elsif ($action eq 'confirm_new_account') { confirm_create_account($token); } elsif ($action eq 'cancel_new_account') { cancel_create_account($token); } else { # If the action that the user wants to take (specified in the "a" form field) # is none of the above listed actions, display an error telling the user # that we do not understand what they would like to do. ThrowCodeError("unknown_action", { action => $action }); } exit; ################################################################################ # Functions ################################################################################ sub requestChangePassword { # If the user is requesting a password change, make sure they submitted # their login name and it exists in the database, and that the DB module is in # the list of allowed verification methods. my $login_name = $ARGS->{loginname} || ThrowUserError("login_needed_for_password_change"); # check verification methods unless (Bugzilla->user->authorizer->can_change_password) { ThrowUserError('password_change_requests_not_allowed'); } validate_email_syntax($login_name) || ThrowUserError('illegal_email_address', { addr => $login_name }); my $user = Bugzilla::User->check($login_name); # Make sure the user account is active. if (!$user->is_enabled) { ThrowUserError('account_disabled', { disabled_reason => get_text('account_disabled', { account => $login_name }), }); } Bugzilla::Token::IssuePasswordToken($user); $vars->{message} = "password_change_request"; $template->process("global/message.html.tmpl", $vars) || ThrowTemplateError($template->error()); } sub confirmChangePassword { my $token = shift; $vars->{token} = $token; $template->process("account/password/set-forgotten-password.html.tmpl", $vars) || ThrowTemplateError($template->error()); } sub cancelChangePassword { my $token = shift; $vars->{message} = "password_change_canceled"; Bugzilla::Token::Cancel($token, $vars->{message}); $template->process("global/message.html.tmpl", $vars) || ThrowTemplateError($template->error()); } sub changePassword { my ($token) = @_; # If the user is changing their password, make sure they submitted a new # password and that the new password is valid. # Make sure that these never show up in the UI under any circumstances. my $password = delete $ARGS->{password}; my $matchpassword = delete $ARGS->{matchpassword}; defined $password && defined $matchpassword || ThrowUserError('require_new_password'); Bugzilla::User::validate_password($password, $matchpassword); my $dbh = Bugzilla->dbh; # Create a crypted version of the new password my $cryptedpassword = bz_crypt($password); # Get the user's ID from the tokens table. my ($userid) = $dbh->selectrow_array('SELECT userid FROM tokens WHERE token = ?', undef, $token); # Update the user's password in the profiles table and delete the token # from the tokens table. $dbh->bz_start_transaction(); $dbh->do( 'UPDATE profiles SET cryptpassword = ? WHERE userid = ?', undef, $cryptedpassword, $userid ); $dbh->do('DELETE FROM tokens WHERE token = ?', undef, $token); $dbh->bz_commit_transaction(); Bugzilla->logout_user_by_id($userid); $template->process("global/message.html.tmpl", { message => 'password_changed' }) || ThrowTemplateError($template->error()); } sub confirmChangeEmail { my $token = shift; $template->process("account/email/confirm.html.tmpl", { token => $token }) || ThrowTemplateError($template->error()); } sub changeEmail { my $token = shift; my $dbh = Bugzilla->dbh; # Get the user's ID from the tokens table. my ($userid, $eventdata) = $dbh->selectrow_array( 'SELECT userid, eventdata FROM tokens WHERE token = ?', undef, $token ); my ($old_email, $new_email) = split /:/, $eventdata; # Check the user entered the correct old email address if (lc Bugzilla->input_params->param('email') ne lc $old_email) { ThrowUserError("email_confirmation_failed"); } # The new email address should be available as this was # confirmed initially so cancel token if it is not still available if (!Bugzilla::User::is_available_username($new_email, $old_email)) { $vars->{email} = $new_email; # Needed for Bugzilla::Token::Cancel's mail Bugzilla::Token::Cancel($token, "account_exists", $vars); ThrowUserError("account_exists", { email => $new_email }); } # Update the user's login name in the profiles table and delete the token # from the tokens table. $dbh->bz_start_transaction(); $dbh->do('UPDATE profiles SET login_name = ? WHERE userid = ?', undef, $new_email, $userid); $dbh->do('DELETE FROM tokens WHERE token = ?', undef, $token); $dbh->do("DELETE FROM tokens WHERE userid = ? AND tokentype = 'emailnew'", undef, $userid); # The email address has been changed, so we need to rederive the groups my $user = new Bugzilla::User($userid); $user->derive_regexp_groups; $dbh->bz_commit_transaction(); # Let the user know their email address has been changed. $vars->{message} = "login_changed"; $template->process("global/message.html.tmpl", $vars) || ThrowTemplateError($template->error()); } sub cancelChangeEmail { my $token = shift; my $dbh = Bugzilla->dbh; $dbh->bz_start_transaction(); # Get the user's ID from the tokens table. my ($userid, $tokentype, $eventdata) = $dbh->selectrow_array( 'SELECT userid, tokentype, eventdata FROM tokens WHERE token = ?', undef, $token ); my ($old_email, $new_email) = split /:/, $eventdata; if ($tokentype eq 'emailold') { $vars->{message} = "emailold_change_canceled"; my $actualemail = $dbh->selectrow_array( 'SELECT login_name FROM profiles WHERE userid = ?', undef, $userid ); # check to see if it has been altered if ($actualemail ne $old_email) { # This is NOT safe - if A has change to B, another profile # could have grabbed A's username in the meantime. # The DB constraint will catch this, though $dbh->do('UPDATE profiles SET login_name=? WHERE userid=?', undef, $old_email, $userid); # email has changed, so rederive groups my $user = new Bugzilla::User($userid); $user->derive_regexp_groups; $vars->{message} = "email_change_canceled_reinstated"; } } else { $vars->{message} = 'email_change_canceled'; } $vars->{old_email} = $old_email; $vars->{new_email} = $new_email; Bugzilla::Token::Cancel($token, $vars->{message}, $vars); $dbh->do( "DELETE FROM tokens WHERE userid = ? AND tokentype = 'emailold' OR tokentype = 'emailnew'", undef, $userid ); $dbh->bz_commit_transaction(); $template->process("global/message.html.tmpl", $vars) || ThrowTemplateError($template->error()); } sub request_create_account { my $token = shift; Bugzilla->user->check_account_creation_enabled; my (undef, $date, $login_name) = Bugzilla::Token::GetTokenData($token); $vars->{token} = $token; $vars->{email} = $login_name . Bugzilla->params->{emailsuffix}; $vars->{expiration_ts} = ctime(str2time($date) + MAX_TOKEN_AGE * 86400); $template->process('account/email/confirm-new.html.tmpl', $vars) || ThrowTemplateError($template->error()); } sub confirm_create_account { my $token = shift; my $ARGS = Bugzilla->input_params; Bugzilla->user->check_account_creation_enabled; my (undef, undef, $login_name) = Bugzilla::Token::GetTokenData($token); my $password = delete $ARGS->{passwd1} || ''; Bugzilla::User::validate_password($password, delete $ARGS->{passwd2} || ''); my $otheruser = Bugzilla::User->create({ login_name => $login_name, realname => $ARGS->{realname}, cryptpassword => $password, }); # Now delete this token. delete_token($token); # Let the user know that his user account has been successfully created. $vars->{message} = 'account_created'; $vars->{otheruser} = $otheruser; # Log in the new user using credentials he just gave. $ARGS->{Bugzilla_login} = $otheruser->login; $ARGS->{Bugzilla_password} = $password; delete Bugzilla->request_cache->{sub_login_to_id}->{$otheruser->login}; Bugzilla->login(LOGIN_OPTIONAL); $template->process('index.html.tmpl', $vars) || ThrowTemplateError($template->error()); } sub cancel_create_account { my $token = shift; my (undef, undef, $login_name) = Bugzilla::Token::GetTokenData($token); $vars->{message} = 'account_creation_canceled'; $vars->{account} = $login_name; Bugzilla::Token::Cancel($token, $vars->{message}); $template->process('global/message.html.tmpl', $vars) || ThrowTemplateError($template->error()); }