users.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453
  1. from django.contrib.auth import get_user_model
  2. from django.core.exceptions import PermissionDenied
  3. from django.db import transaction
  4. from django.db.models import F
  5. from django.http import Http404
  6. from django.shortcuts import get_object_or_404
  7. from django.utils.translation import gettext as _
  8. from rest_framework import status, viewsets
  9. from rest_framework.decorators import action
  10. from rest_framework.parsers import FormParser, JSONParser, MultiPartParser
  11. from rest_framework.response import Response
  12. from ...acl.objectacl import add_acl_to_obj
  13. from ...categories.models import Category
  14. from ...core.rest_permissions import IsAuthenticatedOrReadOnly
  15. from ...core.shortcuts import get_int_or_404
  16. from ...threads.moderation import hide_post, hide_thread
  17. from ..bans import get_user_ban
  18. from ..datadownloads import request_user_data_download, user_has_data_download_request
  19. from ..deletesrecord import record_user_deleted_by_staff
  20. from ..online.utils import get_user_status
  21. from ..permissions import (
  22. allow_browse_users_list,
  23. allow_delete_user,
  24. allow_edit_profile_details,
  25. allow_follow_user,
  26. allow_moderate_avatar,
  27. allow_rename_user,
  28. allow_see_ban_details,
  29. )
  30. from ..profilefields import profilefields, serialize_profilefields_data
  31. from ..serializers import (
  32. BanDetailsSerializer,
  33. DataDownloadSerializer,
  34. DeleteOwnAccountSerializer,
  35. ForumOptionsSerializer,
  36. UserSerializer,
  37. )
  38. from ..viewmodels import Followers, Follows, UserPosts, UserThreads
  39. from .rest_permissions import BasePermission, UnbannedAnonOnly
  40. from .userendpoints.avatar import avatar_endpoint, moderate_avatar_endpoint
  41. from .userendpoints.changeemail import change_email_endpoint
  42. from .userendpoints.changepassword import change_password_endpoint
  43. from .userendpoints.create import create_endpoint
  44. from .userendpoints.editdetails import edit_details_endpoint
  45. from .userendpoints.list import list_endpoint
  46. from .userendpoints.signature import signature_endpoint
  47. from .userendpoints.username import moderate_username_endpoint, username_endpoint
  48. User = get_user_model()
  49. class UserViewSetPermission(BasePermission):
  50. def has_permission(self, request, view):
  51. if view.action == "create":
  52. policy = UnbannedAnonOnly()
  53. else:
  54. policy = IsAuthenticatedOrReadOnly()
  55. return policy.has_permission(request, view)
  56. def allow_self_only(user, pk, message):
  57. if user.is_anonymous:
  58. raise PermissionDenied(_("You have to sign in to perform this action."))
  59. if user.pk != int(pk):
  60. raise PermissionDenied(message)
  61. class UserViewSet(viewsets.GenericViewSet):
  62. permission_classes = (UserViewSetPermission,)
  63. parser_classes = (FormParser, JSONParser, MultiPartParser)
  64. queryset = User.objects
  65. def get_queryset(self):
  66. relations = ("rank", "online_tracker", "ban_cache")
  67. return self.queryset.select_related(*relations)
  68. def get_user(self, request, pk):
  69. user = get_object_or_404(self.get_queryset(), pk=get_int_or_404(pk))
  70. if not user.is_active and not request.user.is_staff:
  71. raise Http404()
  72. return user
  73. def list(self, request):
  74. allow_browse_users_list(request.user_acl)
  75. return list_endpoint(request)
  76. def create(self, request):
  77. if request.settings.enable_oauth2_client:
  78. raise PermissionDenied(
  79. _(
  80. "This feature has been disabled. "
  81. "Please use %(provider)s to sign in."
  82. )
  83. % {"provider": request.settings.oauth2_provider}
  84. )
  85. return create_endpoint(request)
  86. def retrieve(self, request, pk=None):
  87. profile = self.get_user(request, pk)
  88. add_acl_to_obj(request.user_acl, profile)
  89. profile.status = get_user_status(request, profile)
  90. serializer = UserProfileSerializer(profile, context={"request": request})
  91. profile_json = serializer.data
  92. if not profile.is_active:
  93. profile_json["is_active"] = False
  94. if profile.is_deleting_account:
  95. profile_json["is_deleting_account"] = True
  96. return Response(profile_json)
  97. @action(methods=["get", "post"], detail=True)
  98. def avatar(self, request, pk=None):
  99. get_int_or_404(pk)
  100. allow_self_only(request.user, pk, _("You can't change other users avatars."))
  101. return avatar_endpoint(request)
  102. @action(
  103. methods=["post"],
  104. detail=True,
  105. url_name="forum-options",
  106. url_path="forum-options",
  107. )
  108. def forum_options(self, request, pk=None):
  109. get_int_or_404(pk)
  110. allow_self_only(request.user, pk, _("You can't change other users options."))
  111. serializer = ForumOptionsSerializer(request.user, data=request.data)
  112. if serializer.is_valid():
  113. serializer.save()
  114. return Response({"detail": _("Your forum options have been changed.")})
  115. return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST)
  116. @action(methods=["get", "post"], detail=True)
  117. def username(self, request, pk=None):
  118. if request.settings.enable_oauth2_client:
  119. raise PermissionDenied(
  120. _(
  121. "This feature has been disabled. "
  122. "Please use %(provider)s to change your name."
  123. )
  124. % {"provider": request.settings.oauth2_provider}
  125. )
  126. get_int_or_404(pk)
  127. allow_self_only(request.user, pk, _("You can't change other users names."))
  128. return username_endpoint(request)
  129. @action(methods=["get", "post"], detail=True)
  130. def signature(self, request, pk=None):
  131. get_int_or_404(pk)
  132. allow_self_only(request.user, pk, _("You can't change other users signatures."))
  133. return signature_endpoint(request)
  134. @action(
  135. methods=["post"],
  136. detail=True,
  137. url_path="change-password",
  138. url_name="change-password",
  139. )
  140. def change_password(self, request, pk=None):
  141. if request.settings.enable_oauth2_client:
  142. raise PermissionDenied(
  143. _(
  144. "This feature has been disabled. "
  145. "Please use %(provider)s to change your password."
  146. )
  147. % {"provider": request.settings.oauth2_provider}
  148. )
  149. get_int_or_404(pk)
  150. allow_self_only(request.user, pk, _("You can't change other users passwords."))
  151. return change_password_endpoint(request)
  152. @action(
  153. methods=["post"], detail=True, url_path="change-email", url_name="change-email"
  154. )
  155. def change_email(self, request, pk=None):
  156. if request.settings.enable_oauth2_client:
  157. raise PermissionDenied(
  158. _(
  159. "This feature has been disabled. "
  160. "Please use %(provider)s to change your e-mail."
  161. )
  162. % {"provider": request.settings.oauth2_provider}
  163. )
  164. get_int_or_404(pk)
  165. allow_self_only(
  166. request.user, pk, _("You can't change other users e-mail addresses.")
  167. )
  168. return change_email_endpoint(request)
  169. @action(methods=["get"], detail=True)
  170. def details(self, request, pk=None):
  171. profile = self.get_user(request, pk)
  172. data = serialize_profilefields_data(request, profilefields, profile)
  173. return Response(data)
  174. @action(
  175. methods=["get", "post"],
  176. detail=True,
  177. url_path="edit-details",
  178. url_name="edit-details",
  179. )
  180. def edit_details(self, request, pk=None):
  181. profile = self.get_user(request, pk)
  182. allow_edit_profile_details(request.user_acl, profile)
  183. return edit_details_endpoint(request, profile)
  184. @action(
  185. methods=["post"],
  186. detail=True,
  187. url_path="delete-own-account",
  188. url_name="delete-own-account",
  189. )
  190. def delete_own_account(self, request, pk=None):
  191. if request.settings.enable_oauth2_client:
  192. raise PermissionDenied(
  193. _(
  194. "This feature has been disabled. "
  195. "Please use %(provider)s to delete your account."
  196. )
  197. % {"provider": request.settings.oauth2_provider}
  198. )
  199. serializer = DeleteOwnAccountSerializer(
  200. data=request.data, context={"user": request.user}
  201. )
  202. serializer.is_valid(raise_exception=True)
  203. serializer.mark_account_for_deletion(request)
  204. return Response({})
  205. @action(methods=["post"], detail=True)
  206. def follow(self, request, pk=None):
  207. profile = self.get_user(request, pk)
  208. allow_follow_user(request.user_acl, profile)
  209. profile_followers = profile.followers
  210. with transaction.atomic():
  211. if request.user.is_following(profile):
  212. request.user.follows.remove(profile)
  213. followed = False
  214. profile_followers -= 1
  215. profile.followers = F("followers") - 1
  216. request.user.following = F("following") - 1
  217. else:
  218. request.user.follows.add(profile)
  219. followed = True
  220. profile_followers += 1
  221. profile.followers = F("followers") + 1
  222. request.user.following = F("following") + 1
  223. profile.save(update_fields=["followers"])
  224. request.user.save(update_fields=["following"])
  225. return Response({"is_followed": followed, "followers": profile_followers})
  226. @action(detail=True)
  227. def ban(self, request, pk=None):
  228. profile = self.get_user(request, pk)
  229. allow_see_ban_details(request.user_acl, profile)
  230. ban = get_user_ban(profile, request.cache_versions)
  231. if ban:
  232. return Response(BanDetailsSerializer(ban).data)
  233. return Response({})
  234. @action(
  235. methods=["get", "post"],
  236. detail=True,
  237. url_path="moderate-avatar",
  238. url_name="moderate-avatar",
  239. )
  240. def moderate_avatar(self, request, pk=None):
  241. profile = self.get_user(request, pk)
  242. allow_moderate_avatar(request.user_acl, profile)
  243. return moderate_avatar_endpoint(request, profile)
  244. @action(
  245. methods=["get", "post"],
  246. detail=True,
  247. url_path="moderate-username",
  248. url_name="moderate-username",
  249. )
  250. def moderate_username(self, request, pk=None):
  251. profile = self.get_user(request, pk)
  252. allow_rename_user(request.user_acl, profile)
  253. return moderate_username_endpoint(request, profile)
  254. @action(
  255. methods=["post"],
  256. detail=True,
  257. url_path="request-data-download",
  258. url_name="request-data-download",
  259. )
  260. def request_data_download(self, request, pk=None):
  261. get_int_or_404(pk)
  262. allow_self_only(
  263. request.user, pk, _("You can't request data downloads for other users.")
  264. )
  265. if not request.settings.allow_data_downloads:
  266. raise PermissionDenied(_("You can't download your data."))
  267. if user_has_data_download_request(request.user):
  268. raise PermissionDenied(
  269. _(
  270. "You can't have more than one data download request at a single time."
  271. )
  272. )
  273. request_user_data_download(request.user)
  274. return Response({"detail": "ok"})
  275. @action(methods=["get", "post"], detail=True)
  276. def delete(self, request, pk=None):
  277. profile = self.get_user(request, pk)
  278. allow_delete_user(request.user_acl, profile)
  279. if request.method == "POST":
  280. with transaction.atomic():
  281. profile.lock()
  282. if request.data.get("with_content"):
  283. profile.delete_content()
  284. else:
  285. categories_to_sync = set()
  286. threads = profile.thread_set.select_related(
  287. "category", "first_post"
  288. )
  289. for thread in threads.filter(is_hidden=False).iterator():
  290. categories_to_sync.add(thread.category_id)
  291. hide_thread(request, thread)
  292. posts = profile.post_set.select_related(
  293. "category", "thread", "thread__category"
  294. )
  295. for post in posts.filter(is_hidden=False).iterator():
  296. categories_to_sync.add(post.category_id)
  297. hide_post(request.user, post)
  298. post.thread.synchronize()
  299. post.thread.save()
  300. categories = Category.objects.filter(id__in=categories_to_sync)
  301. for category in categories.iterator():
  302. category.synchronize()
  303. category.save()
  304. profile.delete(anonymous_username=request.settings.anonymous_username)
  305. record_user_deleted_by_staff()
  306. return Response({})
  307. @action(
  308. methods=["get"],
  309. detail=True,
  310. url_path="data-downloads",
  311. url_name="data-downloads",
  312. )
  313. def data_downloads(self, request, pk=None):
  314. get_int_or_404(pk)
  315. allow_self_only(
  316. request.user, pk, _("You can't see other users data downloads.")
  317. )
  318. queryset = request.user.datadownload_set.all()[:5]
  319. serializer = DataDownloadSerializer(queryset, many=True)
  320. return Response(serializer.data)
  321. @action(methods=["get"], detail=True)
  322. def followers(self, request, pk=None):
  323. profile = self.get_user(request, pk)
  324. page = get_int_or_404(request.query_params.get("page", 0))
  325. if page == 1:
  326. page = 0 # api allows explicit first page
  327. search = request.query_params.get("search")
  328. users = Followers(request, profile, page, search)
  329. return Response(users.get_frontend_context())
  330. @action(methods=["get"], detail=True)
  331. def follows(self, request, pk=None):
  332. profile = self.get_user(request, pk)
  333. page = get_int_or_404(request.query_params.get("page", 0))
  334. if page == 1:
  335. page = 0 # api allows explicit first page
  336. search = request.query_params.get("search")
  337. users = Follows(request, profile, page, search)
  338. return Response(users.get_frontend_context())
  339. @action(methods=["get"], detail=True)
  340. def threads(self, request, pk=None):
  341. profile = self.get_user(request, pk)
  342. start = get_int_or_404(request.query_params.get("start", 0))
  343. feed = UserThreads(request, profile, start)
  344. return Response(feed.get_frontend_context())
  345. @action(methods=["get"], detail=True)
  346. def posts(self, request, pk=None):
  347. profile = self.get_user(request, pk)
  348. start = get_int_or_404(request.query_params.get("start", 0))
  349. feed = UserPosts(request, profile, start)
  350. return Response(feed.get_frontend_context())
  351. UserProfileSerializer = UserSerializer.subset_fields(
  352. "id",
  353. "username",
  354. "slug",
  355. "email",
  356. "joined_on",
  357. "rank",
  358. "title",
  359. "avatars",
  360. "is_avatar_locked",
  361. "signature",
  362. "is_signature_locked",
  363. "followers",
  364. "following",
  365. "threads",
  366. "posts",
  367. "acl",
  368. "is_followed",
  369. "is_blocked",
  370. "real_name",
  371. "status",
  372. "api",
  373. "url",
  374. )