My fork of airsonic with experimental fixes and improvements. See branch "custom"
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
airsonic-custom/airsonic-main/src/main/java/org/airsonic/player/validator/UserSettingsValidator.java

104 lines
4.0 KiB

/*
This file is part of Airsonic.
Airsonic is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
Airsonic is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with Airsonic. If not, see <http://www.gnu.org/licenses/>.
Copyright 2016 (C) Airsonic Authors
Based upon Subsonic, Copyright 2009 (C) Sindre Mehus
*/
package org.airsonic.player.validator;
import org.airsonic.player.command.UserSettingsCommand;
import org.airsonic.player.controller.UserSettingsController;
import org.airsonic.player.service.SecurityService;
import org.airsonic.player.service.SettingsService;
import org.apache.commons.lang.StringUtils;
import org.springframework.validation.Errors;
import org.springframework.validation.Validator;
import javax.servlet.http.HttpServletRequest;
/**
* Validator for {@link UserSettingsController}.
*
* @author Sindre Mehus
*/
public class UserSettingsValidator implements Validator {
private SecurityService securityService;
private SettingsService settingsService;
private HttpServletRequest request;
public UserSettingsValidator(SecurityService securityService, SettingsService settingsService, HttpServletRequest request) {
this.securityService = securityService;
this.settingsService = settingsService;
this.request = request;
}
/**
* {@inheritDoc}
*/
public boolean supports(Class clazz) {
return clazz.equals(UserSettingsCommand.class);
}
/**
* {@inheritDoc}
*/
public void validate(Object obj, Errors errors) {
UserSettingsCommand command = (UserSettingsCommand) obj;
String username = command.getUsername();
String email = StringUtils.trimToNull(command.getEmail());
String password = StringUtils.trimToNull(command.getPassword());
String confirmPassword = command.getConfirmPassword();
if (command.isNewUser()) {
if (username == null || username.isEmpty()) {
errors.rejectValue("username", "usersettings.nousername");
} else if (securityService.getUserByName(username) != null) {
errors.rejectValue("username", "usersettings.useralreadyexists");
} else if (email == null) {
errors.rejectValue("email", "usersettings.noemail");
} else if (command.isLdapAuthenticated() && !settingsService.isLdapEnabled()) {
errors.rejectValue("password", "usersettings.ldapdisabled");
} else if (command.isLdapAuthenticated() && password != null) {
errors.rejectValue("password", "usersettings.passwordnotsupportedforldap");
}
}
if ((command.isNewUser() || command.isPasswordChange()) && !command.isLdapAuthenticated()) {
if (password == null) {
errors.rejectValue("password", "usersettings.nopassword");
} else if (!password.equals(confirmPassword)) {
errors.rejectValue("password", "usersettings.wrongpassword");
}
}
if (command.isPasswordChange() && command.isLdapAuthenticated()) {
errors.rejectValue("password", "usersettings.passwordnotsupportedforldap");
}
if (securityService.getCurrentUser(request).getUsername().equals(username)) {
// These errors don't need translation since the option isn't exposed to the user
if (command.isDeleteUser()) {
errors.rejectValue("deleteUser", null, "Cannot delete the current user");
}
if (! command.isAdminRole()) {
errors.rejectValue("adminRole", null, "Cannot remove admin from the current user");
}
}
}
}