Files
Gogs/internal/route/user/setting.go

736 lines
21 KiB
Go
Raw Permalink Normal View History

2014-03-10 16:54:52 +08:00
package user
import (
2017-04-06 00:14:30 -04:00
"bytes"
gocontext "context"
2017-04-06 00:14:30 -04:00
"encoding/base64"
"fmt"
2017-04-06 00:14:30 -04:00
"html/template"
"image/png"
"io"
"net/http"
2014-08-25 21:07:08 +03:00
"github.com/cockroachdb/errors"
2017-04-06 00:14:30 -04:00
"github.com/pquerna/otp"
"github.com/pquerna/otp/totp"
"gopkg.in/macaron.v1"
log "unknwon.dev/clog/v2"
2014-03-10 20:48:58 -04:00
"gogs.io/gogs/internal/auth"
"gogs.io/gogs/internal/conf"
"gogs.io/gogs/internal/context"
"gogs.io/gogs/internal/cryptoutil"
"gogs.io/gogs/internal/database"
2020-02-25 00:35:35 +08:00
"gogs.io/gogs/internal/email"
"gogs.io/gogs/internal/form"
"gogs.io/gogs/internal/tool"
"gogs.io/gogs/internal/userutil"
2014-03-10 16:54:52 +08:00
)
// SettingsHandler is the handler for users settings endpoints.
type SettingsHandler struct {
store SettingsStore
}
// NewSettingsHandler returns a new SettingsHandler for users settings endpoints.
func NewSettingsHandler(s SettingsStore) *SettingsHandler {
return &SettingsHandler{
store: s,
}
}
2014-06-22 23:11:12 -04:00
const (
tmplUserSettingsProfile = "user/settings/profile"
tmplUserSettingsAvatar = "user/settings/avatar"
tmplUserSettingsPassword = "user/settings/password"
tmplUserSettingsEmail = "user/settings/email"
tmplUserSettingsSSHKeys = "user/settings/sshkeys"
tmplUserSettingsSecurity = "user/settings/security"
tmplUserSettingsTwoFactorEnable = "user/settings/two_factor_enable"
tmplUserSettingsTwoFactorRecoveryCodes = "user/settings/two_factor_recovery_codes"
tmplUserSettingsRepositories = "user/settings/repositories"
tmplUserSettingsOrganizations = "user/settings/organizations"
tmplUserSettingsApplications = "user/settings/applications"
tmplUserSettingsDelete = "user/settings/delete"
tmplUserNotification = "user/notification"
2014-06-22 23:11:12 -04:00
)
func Settings(c *context.Context) {
2017-04-07 00:49:30 -04:00
c.Title("settings.profile")
c.PageIs("SettingsProfile")
c.Data["origin_name"] = c.User.Name
c.Data["name"] = c.User.Name
c.Data["full_name"] = c.User.FullName
c.Data["email"] = c.User.Email
c.Data["website"] = c.User.Website
c.Data["location"] = c.User.Location
c.Success(tmplUserSettingsProfile)
2014-04-10 16:36:50 -04:00
}
2017-04-07 00:49:30 -04:00
func SettingsPost(c *context.Context, f form.UpdateProfile) {
c.Title("settings.profile")
c.PageIs("SettingsProfile")
c.Data["origin_name"] = c.User.Name
2017-04-07 00:49:30 -04:00
if c.HasError() {
c.HTML(http.StatusBadRequest, tmplUserSettingsProfile)
2017-04-07 00:49:30 -04:00
return
}
// Non-local users are not allowed to change their username
if c.User.IsLocal() {
// Check if the username (including cases) had been changed
if c.User.Name != f.Name {
err := database.Handle.Users().ChangeUsername(c.Req.Context(), c.User.ID, f.Name)
if err != nil {
2017-04-07 00:49:30 -04:00
c.FormErr("Name")
switch {
case database.IsErrUserAlreadyExist(errors.Cause(err)):
c.RenderWithErr(c.Tr("form.username_been_taken"), http.StatusUnprocessableEntity, tmplUserSettingsProfile, &f)
case database.IsErrNameNotAllowed(errors.Cause(err)):
c.RenderWithErr(c.Tr("user.form.name_not_allowed", err.(database.ErrNameNotAllowed).Value()), http.StatusBadRequest, tmplUserSettingsProfile, &f)
2017-04-07 00:49:30 -04:00
default:
c.Error(err, "change user name")
2017-04-07 00:49:30 -04:00
}
return
2014-07-26 00:24:27 -04:00
}
2015-12-11 18:52:28 -05:00
2017-04-07 00:49:30 -04:00
log.Trace("Username changed: %s -> %s", c.User.Name, f.Name)
}
2015-12-11 18:52:28 -05:00
}
err := database.Handle.Users().Update(
c.Req.Context(),
c.User.ID,
database.UpdateUserOptions{
FullName: &f.FullName,
Website: &f.Website,
Location: &f.Location,
},
)
if err != nil {
c.Error(err, "update user")
return
}
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.update_profile_success"))
c.RedirectSubpath("/user/settings")
2014-03-10 16:54:52 +08:00
}
// FIXME: limit upload size
func UpdateAvatarSetting(c *context.Context, f form.Avatar, ctxUser *database.User) error {
if f.Source == form.AvatarLookup && f.Gravatar != "" {
avatar := cryptoutil.MD5(f.Gravatar)
err := database.Handle.Users().Update(
c.Req.Context(),
ctxUser.ID,
database.UpdateUserOptions{
Avatar: &avatar,
AvatarEmail: &f.Gravatar,
},
)
if err != nil {
return errors.Wrap(err, "update user")
}
err = database.Handle.Users().DeleteCustomAvatar(c.Req.Context(), c.User.ID)
if err != nil {
return errors.Wrap(err, "delete custom avatar")
}
return nil
Add support for federated avatars (#3320) * Add support for federated avatars Fixes #3105 Removes avatar fetching duplication code Adds an "Enable Federated Avatar" checkbox in user settings (defaults to unchecked) Moves avatar settings all in the same form, making local and remote avatars mutually exclusive Renames UploadAvatarForm to AvatarForm as it's not anymore only for uploading * Run gofmt on all modified files * Move Avatar form in its own page * Add go-libravatar dependency to vendor/ dir Hopefully helps with accepting the contribution. See also #3214 * Revert "Add go-libravatar dependency to vendor/ dir" This reverts commit a8cb93ae640bbb90f7d25012fc257bda9fae9b82. * Make federated avatar setting a global configuration Removes the per-user setting * Move avatar handling back to base tool, disable federated avatar in offline mode * Format, handle error * Properly set fallback host * Use unsupported github.com mirror for importing go-libravatar * Remove comment showing life exists outside of github.com ... pity, but contribution would not be accepted otherwise * Use Combo for Get and Post methods over /avatar * FEDERATED_AVATAR -> ENABLE_FEDERATED_AVATAR * Fix persistance of federated avatar lookup checkbox at install time * Federated Avatars -> Enable Federated Avatars * Use len(string) == 0 instead of string == "" * Move import line where it belong See https://github.com/Unknwon/go-code-convention/blob/master/en-US/import_packages.md Pity the import url is still the unofficial one, but oh well... * Save a line (and waste much more expensive time) * Remove redundant parens * Remove an empty line * Remove empty lines * Reorder lines to make diff smaller * Remove another newline Unknwon review got me start a fight against newlines * Move DISABLE_GRAVATAR and ENABLE_FEDERATED_AVATAR after OFFLINE_MODE On re-reading the diff I figured what Unknwon meant here: https://github.com/gogits/gogs/pull/3320/files#r73741106 * Remove newlines that weren't there before my intervention
2016-08-07 19:27:38 +02:00
}
2014-11-21 12:51:36 -05:00
if f.Avatar != nil && f.Avatar.Filename != "" {
2017-04-07 00:49:30 -04:00
r, err := f.Avatar.Open()
2014-11-21 10:58:08 -05:00
if err != nil {
return errors.Newf("open avatar reader: %v", err)
2014-11-21 10:58:08 -05:00
}
defer func() { _ = r.Close() }()
2014-11-21 10:58:08 -05:00
data, err := io.ReadAll(r)
2014-11-21 10:58:08 -05:00
if err != nil {
return errors.Newf("read avatar content: %v", err)
2014-11-21 10:58:08 -05:00
}
if !tool.IsImageFile(data) {
2017-04-07 00:49:30 -04:00
return errors.New(c.Tr("settings.uploaded_avatar_not_a_image"))
2014-11-21 10:58:08 -05:00
}
2014-11-22 10:22:53 -05:00
err = database.Handle.Users().UseCustomAvatar(c.Req.Context(), ctxUser.ID, data)
if err != nil {
return errors.Wrap(err, "save avatar")
}
return nil
}
return nil
}
2017-04-07 00:49:30 -04:00
func SettingsAvatar(c *context.Context) {
c.Title("settings.avatar")
c.PageIs("SettingsAvatar")
c.Success(tmplUserSettingsAvatar)
Add support for federated avatars (#3320) * Add support for federated avatars Fixes #3105 Removes avatar fetching duplication code Adds an "Enable Federated Avatar" checkbox in user settings (defaults to unchecked) Moves avatar settings all in the same form, making local and remote avatars mutually exclusive Renames UploadAvatarForm to AvatarForm as it's not anymore only for uploading * Run gofmt on all modified files * Move Avatar form in its own page * Add go-libravatar dependency to vendor/ dir Hopefully helps with accepting the contribution. See also #3214 * Revert "Add go-libravatar dependency to vendor/ dir" This reverts commit a8cb93ae640bbb90f7d25012fc257bda9fae9b82. * Make federated avatar setting a global configuration Removes the per-user setting * Move avatar handling back to base tool, disable federated avatar in offline mode * Format, handle error * Properly set fallback host * Use unsupported github.com mirror for importing go-libravatar * Remove comment showing life exists outside of github.com ... pity, but contribution would not be accepted otherwise * Use Combo for Get and Post methods over /avatar * FEDERATED_AVATAR -> ENABLE_FEDERATED_AVATAR * Fix persistance of federated avatar lookup checkbox at install time * Federated Avatars -> Enable Federated Avatars * Use len(string) == 0 instead of string == "" * Move import line where it belong See https://github.com/Unknwon/go-code-convention/blob/master/en-US/import_packages.md Pity the import url is still the unofficial one, but oh well... * Save a line (and waste much more expensive time) * Remove redundant parens * Remove an empty line * Remove empty lines * Reorder lines to make diff smaller * Remove another newline Unknwon review got me start a fight against newlines * Move DISABLE_GRAVATAR and ENABLE_FEDERATED_AVATAR after OFFLINE_MODE On re-reading the diff I figured what Unknwon meant here: https://github.com/gogits/gogs/pull/3320/files#r73741106 * Remove newlines that weren't there before my intervention
2016-08-07 19:27:38 +02:00
}
2017-04-07 00:49:30 -04:00
func SettingsAvatarPost(c *context.Context, f form.Avatar) {
if err := UpdateAvatarSetting(c, f, c.User); err != nil {
c.Flash.Error(err.Error())
} else {
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.update_avatar_success"))
2014-11-22 10:22:53 -05:00
}
c.RedirectSubpath("/user/settings/avatar")
2014-11-21 10:58:08 -05:00
}
2017-04-07 00:49:30 -04:00
func SettingsDeleteAvatar(c *context.Context) {
err := database.Handle.Users().DeleteCustomAvatar(c.Req.Context(), c.User.ID)
if err != nil {
c.Flash.Error(fmt.Sprintf("Failed to delete avatar: %v", err))
}
2016-03-06 17:36:30 +01:00
c.RedirectSubpath("/user/settings/avatar")
}
2017-04-07 00:49:30 -04:00
func SettingsPassword(c *context.Context) {
c.Title("settings.password")
c.PageIs("SettingsPassword")
c.Success(tmplUserSettingsPassword)
2015-09-10 11:40:34 -04:00
}
2017-04-07 00:49:30 -04:00
func SettingsPasswordPost(c *context.Context, f form.ChangePassword) {
c.Title("settings.password")
c.PageIs("SettingsPassword")
2015-09-10 11:40:34 -04:00
2017-04-07 00:49:30 -04:00
if c.HasError() {
c.HTML(http.StatusBadRequest, tmplUserSettingsPassword)
return
}
if !userutil.ValidatePassword(c.User.Password, c.User.Salt, f.OldPassword) {
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("settings.password_incorrect"))
} else if f.Password != f.Retype {
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("form.password_not_match"))
2015-09-10 11:40:34 -04:00
} else {
err := database.Handle.Users().Update(
c.Req.Context(),
c.User.ID,
database.UpdateUserOptions{
Password: &f.Password,
},
)
if err != nil {
c.Errorf(err, "update user")
2015-09-10 11:40:34 -04:00
return
}
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.change_password_success"))
2015-09-10 11:40:34 -04:00
}
c.RedirectSubpath("/user/settings/password")
}
2017-04-07 00:49:30 -04:00
func SettingsEmails(c *context.Context) {
c.Title("settings.emails")
c.PageIs("SettingsEmails")
emails, err := database.Handle.Users().ListEmails(c.Req.Context(), c.User.ID)
if err != nil {
c.Errorf(err, "get email addresses")
return
}
2017-04-07 00:49:30 -04:00
c.Data["Emails"] = emails
c.Success(tmplUserSettingsEmail)
2015-09-10 11:40:34 -04:00
}
2017-04-07 00:49:30 -04:00
func SettingsEmailPost(c *context.Context, f form.AddEmail) {
c.Title("settings.emails")
c.PageIs("SettingsEmails")
2017-04-07 00:49:30 -04:00
if c.Query("_method") == "PRIMARY" {
err := database.Handle.Users().MarkEmailPrimary(c.Req.Context(), c.User.ID, c.Query("email"))
if err != nil {
c.Errorf(err, "make email primary")
return
}
c.RedirectSubpath("/user/settings/email")
return
}
// Add Email address.
emails, err := database.Handle.Users().ListEmails(c.Req.Context(), c.User.ID)
2015-09-10 11:40:34 -04:00
if err != nil {
c.Errorf(err, "get email addresses")
2015-09-10 11:40:34 -04:00
return
}
2017-04-07 00:49:30 -04:00
c.Data["Emails"] = emails
2015-09-10 11:40:34 -04:00
2017-04-07 00:49:30 -04:00
if c.HasError() {
c.HTML(http.StatusBadRequest, tmplUserSettingsEmail)
return
}
err = database.Handle.Users().AddEmail(c.Req.Context(), c.User.ID, f.Email, !conf.Auth.RequireEmailConfirmation)
if err != nil {
if database.IsErrEmailAlreadyUsed(err) {
c.RenderWithErr(c.Tr("form.email_been_used"), http.StatusUnprocessableEntity, tmplUserSettingsEmail, &f)
2017-04-07 00:49:30 -04:00
} else {
c.Errorf(err, "add email address")
}
return
2015-09-10 11:40:34 -04:00
}
// Send confirmation email
if conf.Auth.RequireEmailConfirmation {
email.SendActivateEmailMail(c.Context, database.NewMailerUser(c.User), f.Email)
2017-04-07 00:49:30 -04:00
if err := c.Cache.Put("MailResendLimit_"+c.User.LowerName, c.User.LowerName, 180); err != nil {
log.Error("Set cache 'MailResendLimit' failed: %v", err)
2015-09-10 11:40:34 -04:00
}
c.Flash.Info(c.Tr("settings.add_email_confirmation_sent", f.Email, conf.Auth.ActivateCodeLives/60))
2015-09-10 11:40:34 -04:00
} else {
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.add_email_success"))
}
c.RedirectSubpath("/user/settings/email")
2014-04-10 18:09:57 -04:00
}
2017-04-07 00:49:30 -04:00
func DeleteEmail(c *context.Context) {
email := c.Query("id") // The "id" here is the actual email address
if c.User.Email == email {
c.Flash.Error(c.Tr("settings.email_deletion_primary"))
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/email",
})
return
}
err := database.Handle.Users().DeleteEmail(c.Req.Context(), c.User.ID, email)
if err != nil {
c.Error(err, "delete email address")
2014-03-14 01:12:07 -04:00
return
}
2014-03-13 04:06:35 -04:00
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.email_deletion_success"))
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/email",
2015-09-10 11:40:34 -04:00
})
2014-03-13 04:06:35 -04:00
}
2017-04-07 00:49:30 -04:00
func SettingsSSHKeys(c *context.Context) {
c.Title("settings.ssh_keys")
c.PageIs("SettingsSSHKeys")
keys, err := database.ListPublicKeys(c.User.ID)
if err != nil {
c.Errorf(err, "list public keys")
2014-07-26 00:24:27 -04:00
return
}
2017-04-07 00:49:30 -04:00
c.Data["Keys"] = keys
c.Success(tmplUserSettingsSSHKeys)
}
2017-04-07 00:49:30 -04:00
func SettingsSSHKeysPost(c *context.Context, f form.AddSSHKey) {
c.Title("settings.ssh_keys")
c.PageIs("SettingsSSHKeys")
2014-07-26 00:24:27 -04:00
keys, err := database.ListPublicKeys(c.User.ID)
2014-07-26 00:24:27 -04:00
if err != nil {
c.Errorf(err, "list public keys")
2014-07-26 00:24:27 -04:00
return
}
2017-04-07 00:49:30 -04:00
c.Data["Keys"] = keys
2014-03-10 20:48:58 -04:00
2017-04-07 00:49:30 -04:00
if c.HasError() {
c.HTML(http.StatusBadRequest, tmplUserSettingsSSHKeys)
2015-08-20 17:11:29 +08:00
return
}
2014-03-10 20:48:58 -04:00
content, err := database.CheckPublicKeyString(f.Content)
2015-08-20 17:11:29 +08:00
if err != nil {
if database.IsErrKeyUnableVerify(err) {
2017-04-07 00:49:30 -04:00
c.Flash.Info(c.Tr("form.unable_verify_ssh_key"))
2014-03-10 21:12:49 +08:00
} else {
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("form.invalid_ssh_key", err.Error()))
c.RedirectSubpath("/user/settings/ssh")
2015-08-20 17:11:29 +08:00
return
2014-03-10 21:12:49 +08:00
}
}
2014-03-10 20:48:58 -04:00
if _, err = database.AddPublicKey(c.User.ID, f.Title, content); err != nil {
2017-04-07 00:49:30 -04:00
c.Data["HasError"] = true
2015-08-20 17:11:29 +08:00
switch {
case database.IsErrKeyAlreadyExist(err):
2017-04-07 00:49:30 -04:00
c.FormErr("Content")
c.RenderWithErr(c.Tr("settings.ssh_key_been_used"), http.StatusUnprocessableEntity, tmplUserSettingsSSHKeys, &f)
case database.IsErrKeyNameAlreadyUsed(err):
2017-04-07 00:49:30 -04:00
c.FormErr("Title")
c.RenderWithErr(c.Tr("settings.ssh_key_name_used"), http.StatusUnprocessableEntity, tmplUserSettingsSSHKeys, &f)
2015-08-20 17:11:29 +08:00
default:
c.Errorf(err, "add public key")
2014-03-10 20:48:58 -04:00
}
2015-08-20 17:11:29 +08:00
return
}
2014-03-10 20:48:58 -04:00
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.add_key_success", f.Title))
c.RedirectSubpath("/user/settings/ssh")
2015-08-20 17:11:29 +08:00
}
2014-05-05 16:21:43 -04:00
2017-04-07 00:49:30 -04:00
func DeleteSSHKey(c *context.Context) {
if err := database.DeletePublicKey(c.User, c.QueryInt64("id")); err != nil {
2017-04-07 00:49:30 -04:00
c.Flash.Error("DeletePublicKey: " + err.Error())
2015-08-20 17:11:29 +08:00
} else {
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.ssh_key_deletion_success"))
2014-03-10 16:54:52 +08:00
}
2014-03-10 20:48:58 -04:00
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/ssh",
2015-08-20 17:11:29 +08:00
})
2014-03-10 16:54:52 +08:00
}
2014-03-14 17:12:28 +08:00
2017-04-06 00:14:30 -04:00
func SettingsSecurity(c *context.Context) {
2017-04-07 00:49:30 -04:00
c.Title("settings.security")
c.PageIs("SettingsSecurity")
2017-04-06 00:14:30 -04:00
t, err := database.Handle.TwoFactors().GetByUserID(c.Req.Context(), c.UserID())
if err != nil && !database.IsErrTwoFactorNotFound(err) {
c.Errorf(err, "get two factor by user ID")
2017-04-06 00:14:30 -04:00
return
}
c.Data["TwoFactor"] = t
c.Success(tmplUserSettingsSecurity)
2017-04-06 00:14:30 -04:00
}
func SettingsTwoFactorEnable(c *context.Context) {
if database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
2017-04-06 00:14:30 -04:00
c.NotFound()
return
}
2017-04-07 00:49:30 -04:00
c.Title("settings.two_factor_enable_title")
c.PageIs("SettingsSecurity")
2017-04-06 00:14:30 -04:00
var key *otp.Key
var err error
keyURL := c.Session.Get("twoFactorURL")
if keyURL != nil {
key, _ = otp.NewKeyFromURL(keyURL.(string))
}
if key == nil {
key, err = totp.Generate(totp.GenerateOpts{
Issuer: conf.App.BrandName,
2017-04-06 00:14:30 -04:00
AccountName: c.User.Email,
})
if err != nil {
c.Errorf(err, "generate TOTP")
2017-04-06 00:14:30 -04:00
return
}
}
c.Data["TwoFactorSecret"] = key.Secret()
img, err := key.Image(240, 240)
if err != nil {
c.Errorf(err, "generate image")
2017-04-06 00:14:30 -04:00
return
}
var buf bytes.Buffer
if err = png.Encode(&buf, img); err != nil {
c.Errorf(err, "encode image")
2017-04-06 00:14:30 -04:00
return
}
c.Data["QRCode"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(buf.Bytes()))
_ = c.Session.Set("twoFactorSecret", c.Data["TwoFactorSecret"])
_ = c.Session.Set("twoFactorURL", key.String())
c.Success(tmplUserSettingsTwoFactorEnable)
2017-04-06 00:14:30 -04:00
}
func SettingsTwoFactorEnablePost(c *context.Context) {
secret, ok := c.Session.Get("twoFactorSecret").(string)
if !ok {
c.NotFound()
return
}
if !totp.Validate(c.Query("passcode"), secret) {
c.Flash.Error(c.Tr("settings.two_factor_invalid_passcode"))
c.RedirectSubpath("/user/settings/security/two_factor_enable")
2017-04-06 00:14:30 -04:00
return
}
if err := database.Handle.TwoFactors().Create(c.Req.Context(), c.UserID(), conf.Security.SecretKey, secret); err != nil {
2017-04-06 00:14:30 -04:00
c.Flash.Error(c.Tr("settings.two_factor_enable_error", err))
c.RedirectSubpath("/user/settings/security/two_factor_enable")
2017-04-06 00:14:30 -04:00
return
}
_ = c.Session.Delete("twoFactorSecret")
_ = c.Session.Delete("twoFactorURL")
2017-04-06 00:14:30 -04:00
c.Flash.Success(c.Tr("settings.two_factor_enable_success"))
c.RedirectSubpath("/user/settings/security/two_factor_recovery_codes")
2017-04-06 00:14:30 -04:00
}
func SettingsTwoFactorRecoveryCodes(c *context.Context) {
if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
2017-04-06 00:14:30 -04:00
c.NotFound()
return
}
2017-04-07 00:49:30 -04:00
c.Title("settings.two_factor_recovery_codes_title")
c.PageIs("SettingsSecurity")
2017-04-06 00:14:30 -04:00
recoveryCodes, err := database.GetRecoveryCodesByUserID(c.UserID())
2017-04-06 00:14:30 -04:00
if err != nil {
c.Errorf(err, "get recovery codes by user ID")
2017-04-06 00:14:30 -04:00
return
}
c.Data["RecoveryCodes"] = recoveryCodes
c.Success(tmplUserSettingsTwoFactorRecoveryCodes)
2017-04-06 00:14:30 -04:00
}
func SettingsTwoFactorRecoveryCodesPost(c *context.Context) {
if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
2017-04-06 00:14:30 -04:00
c.NotFound()
return
}
if err := database.RegenerateRecoveryCodes(c.UserID()); err != nil {
2017-04-06 00:14:30 -04:00
c.Flash.Error(c.Tr("settings.two_factor_regenerate_recovery_codes_error", err))
} else {
c.Flash.Success(c.Tr("settings.two_factor_regenerate_recovery_codes_success"))
}
c.RedirectSubpath("/user/settings/security/two_factor_recovery_codes")
2017-04-06 00:14:30 -04:00
}
func SettingsTwoFactorDisable(c *context.Context) {
if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
2017-04-06 00:14:30 -04:00
c.NotFound()
return
}
if err := database.DeleteTwoFactor(c.UserID()); err != nil {
c.Errorf(err, "delete two factor")
2017-04-06 00:14:30 -04:00
return
}
c.Flash.Success(c.Tr("settings.two_factor_disable_success"))
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/security",
2017-04-06 00:14:30 -04:00
})
}
2017-04-07 00:49:30 -04:00
func SettingsRepos(c *context.Context) {
c.Title("settings.repos")
c.PageIs("SettingsRepositories")
2014-11-12 06:48:50 -05:00
repos, err := database.GetUserAndCollaborativeRepositories(c.User.ID)
2014-11-12 06:48:50 -05:00
if err != nil {
c.Errorf(err, "get user and collaborative repositories")
2014-11-12 06:48:50 -05:00
return
}
if err = database.RepositoryList(repos).LoadAttributes(); err != nil {
c.Errorf(err, "load attributes")
2017-04-07 00:49:30 -04:00
return
}
c.Data["Repos"] = repos
2014-11-12 06:48:50 -05:00
c.Success(tmplUserSettingsRepositories)
2014-11-12 06:48:50 -05:00
}
2017-04-07 00:49:30 -04:00
func SettingsLeaveRepo(c *context.Context) {
repo, err := database.GetRepositoryByID(c.QueryInt64("id"))
2017-04-05 09:27:42 -04:00
if err != nil {
c.NotFoundOrError(err, "get repository by ID")
2017-04-05 09:27:42 -04:00
return
}
2017-04-07 00:49:30 -04:00
if err = repo.DeleteCollaboration(c.User.ID); err != nil {
c.Errorf(err, "delete collaboration")
2017-04-05 09:27:42 -04:00
return
}
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.repos.leave_success", repo.FullName()))
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/repositories",
2017-04-07 00:49:30 -04:00
})
2017-04-05 09:27:42 -04:00
}
2017-04-07 00:49:30 -04:00
func SettingsOrganizations(c *context.Context) {
c.Title("settings.orgs")
c.PageIs("SettingsOrganizations")
orgs, err := database.GetOrgsByUserID(c.User.ID, true)
2017-04-05 09:27:42 -04:00
if err != nil {
c.Errorf(err, "get organizations by user ID")
2017-04-07 00:49:30 -04:00
return
}
c.Data["Orgs"] = orgs
c.Success(tmplUserSettingsOrganizations)
2017-04-07 00:49:30 -04:00
}
func SettingsLeaveOrganization(c *context.Context) {
if err := database.RemoveOrgUser(c.QueryInt64("id"), c.User.ID); err != nil {
if database.IsErrLastOrgOwner(err) {
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("form.last_org_owner"))
2017-04-05 09:27:42 -04:00
} else {
c.Errorf(err, "remove organization user")
2017-04-05 09:27:42 -04:00
return
}
}
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/organizations",
2017-04-05 09:27:42 -04:00
})
}
func (h *SettingsHandler) Applications() macaron.Handler {
return func(c *context.Context) {
c.Title("settings.applications")
c.PageIs("SettingsApplications")
2017-04-05 09:27:42 -04:00
tokens, err := h.store.ListAccessTokens(c.Req.Context(), c.User.ID)
if err != nil {
c.Errorf(err, "list access tokens")
return
}
c.Data["Tokens"] = tokens
2017-04-05 09:27:42 -04:00
c.Success(tmplUserSettingsApplications)
}
2017-04-05 09:27:42 -04:00
}
func (h *SettingsHandler) ApplicationsPost() macaron.Handler {
return func(c *context.Context, f form.NewAccessToken) {
c.Title("settings.applications")
c.PageIs("SettingsApplications")
2014-11-12 06:48:50 -05:00
if c.HasError() {
tokens, err := h.store.ListAccessTokens(c.Req.Context(), c.User.ID)
if err != nil {
c.Errorf(err, "list access tokens")
return
}
c.Data["Tokens"] = tokens
c.HTML(http.StatusBadRequest, tmplUserSettingsApplications)
return
}
t, err := h.store.CreateAccessToken(c.Req.Context(), c.User.ID, f.Name)
2015-08-20 17:11:29 +08:00
if err != nil {
if database.IsErrAccessTokenAlreadyExist(err) {
c.Flash.Error(c.Tr("settings.token_name_exists"))
c.RedirectSubpath("/user/settings/applications")
} else {
c.Errorf(err, "new access token")
}
2015-08-20 17:11:29 +08:00
return
}
2017-04-07 00:49:30 -04:00
c.Flash.Success(c.Tr("settings.generate_token_succees"))
c.Flash.Info(t.Sha1)
c.RedirectSubpath("/user/settings/applications")
2015-08-19 03:36:16 +08:00
}
}
2014-11-12 06:48:50 -05:00
func (h *SettingsHandler) DeleteApplication() macaron.Handler {
return func(c *context.Context) {
if err := h.store.DeleteAccessTokenByID(c.Req.Context(), c.User.ID, c.QueryInt64("id")); err != nil {
c.Flash.Error("DeleteAccessTokenByID: " + err.Error())
} else {
c.Flash.Success(c.Tr("settings.delete_token_success"))
}
2014-11-12 06:48:50 -05:00
c.JSONSuccess(map[string]any{
"redirect": conf.Server.Subpath + "/user/settings/applications",
})
2015-08-19 03:36:16 +08:00
}
}
2017-04-07 00:49:30 -04:00
func SettingsDelete(c *context.Context) {
c.Title("settings.delete")
c.PageIs("SettingsDelete")
2014-07-26 00:24:27 -04:00
2017-04-07 00:49:30 -04:00
if c.Req.Method == "POST" {
if _, err := database.Handle.Users().Authenticate(c.Req.Context(), c.User.Name, c.Query("password"), c.User.LoginSource); err != nil {
if auth.IsErrBadCredentials(err) {
c.RenderWithErr(c.Tr("form.enterred_invalid_password"), http.StatusUnauthorized, tmplUserSettingsDelete, nil)
} else {
c.Errorf(err, "authenticate user")
}
return
}
if err := database.Handle.Users().DeleteByID(c.Req.Context(), c.User.ID, false); err != nil {
switch {
case database.IsErrUserOwnRepos(err):
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("form.still_own_repo"))
c.Redirect(conf.Server.Subpath + "/user/settings/delete")
case database.IsErrUserHasOrgs(err):
2017-04-07 00:49:30 -04:00
c.Flash.Error(c.Tr("form.still_has_org"))
c.Redirect(conf.Server.Subpath + "/user/settings/delete")
2014-07-26 00:24:27 -04:00
default:
c.Errorf(err, "delete user")
2014-07-26 00:24:27 -04:00
}
} else {
2017-04-07 00:49:30 -04:00
log.Trace("Account deleted: %s", c.User.Name)
c.Redirect(conf.Server.Subpath + "/")
2014-07-26 00:24:27 -04:00
}
2014-08-14 14:12:21 +08:00
return
2014-07-26 00:24:27 -04:00
}
c.Success(tmplUserSettingsDelete)
2014-03-14 17:12:28 +08:00
}
// SettingsStore is the data layer carrier for user settings endpoints. This
// interface is meant to abstract away and limit the exposure of the underlying
// data layer to the handler through a thin-wrapper.
type SettingsStore interface {
// CreateAccessToken creates a new access token and persist to database. It
// returns database.ErrAccessTokenAlreadyExist when an access token with same
// name already exists for the user.
CreateAccessToken(ctx gocontext.Context, userID int64, name string) (*database.AccessToken, error)
// GetAccessTokenBySHA1 returns the access token with given SHA1. It returns
// database.ErrAccessTokenNotExist when not found.
GetAccessTokenBySHA1(ctx gocontext.Context, sha1 string) (*database.AccessToken, error)
// TouchAccessTokenByID updates the updated time of the given access token to
// the current time.
TouchAccessTokenByID(ctx gocontext.Context, id int64) error
// ListAccessTokens returns all access tokens belongs to given user.
ListAccessTokens(ctx gocontext.Context, userID int64) ([]*database.AccessToken, error)
// DeleteAccessTokenByID deletes the access token by given ID.
DeleteAccessTokenByID(ctx gocontext.Context, userID, id int64) error
}
type settingsStore struct{}
// NewSettingsStore returns a new SettingsStore using the global database
// handle.
func NewSettingsStore() SettingsStore {
return &settingsStore{}
}
func (*settingsStore) CreateAccessToken(ctx gocontext.Context, userID int64, name string) (*database.AccessToken, error) {
return database.Handle.AccessTokens().Create(ctx, userID, name)
}
func (*settingsStore) GetAccessTokenBySHA1(ctx gocontext.Context, sha1 string) (*database.AccessToken, error) {
return database.Handle.AccessTokens().GetBySHA1(ctx, sha1)
}
func (*settingsStore) TouchAccessTokenByID(ctx gocontext.Context, id int64) error {
return database.Handle.AccessTokens().Touch(ctx, id)
}
func (*settingsStore) ListAccessTokens(ctx gocontext.Context, userID int64) ([]*database.AccessToken, error) {
return database.Handle.AccessTokens().List(ctx, userID)
}
func (*settingsStore) DeleteAccessTokenByID(ctx gocontext.Context, userID, id int64) error {
return database.Handle.AccessTokens().DeleteByID(ctx, userID, id)
}