|
@@ -5,12 +5,9 @@
|
|
|
package user
|
|
|
|
|
|
import (
|
|
|
- "fmt"
|
|
|
"net/url"
|
|
|
"strings"
|
|
|
|
|
|
- "github.com/go-martini/martini"
|
|
|
-
|
|
|
"github.com/gogits/gogs/models"
|
|
|
"github.com/gogits/gogs/modules/auth"
|
|
|
"github.com/gogits/gogs/modules/base"
|
|
@@ -19,105 +16,72 @@ import (
|
|
|
"github.com/gogits/gogs/modules/middleware"
|
|
|
)
|
|
|
|
|
|
-func Dashboard(ctx *middleware.Context) {
|
|
|
- ctx.Data["Title"] = "Dashboard"
|
|
|
- ctx.Data["PageIsUserDashboard"] = true
|
|
|
- repos, err := models.GetRepositories(&models.User{Id: ctx.User.Id})
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Dashboard", err)
|
|
|
+func SignIn(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Log In"
|
|
|
+
|
|
|
+ if _, ok := ctx.Session.Get("socialId").(int64); ok {
|
|
|
+ ctx.Data["IsSocialLogin"] = true
|
|
|
+ ctx.HTML(200, "user/signin")
|
|
|
return
|
|
|
}
|
|
|
- ctx.Data["MyRepos"] = repos
|
|
|
|
|
|
- feeds, err := models.GetFeeds(ctx.User.Id, 0, false)
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Dashboard", err)
|
|
|
+ if base.OauthService != nil {
|
|
|
+ ctx.Data["OauthEnabled"] = true
|
|
|
+ ctx.Data["OauthService"] = base.OauthService
|
|
|
+ }
|
|
|
+
|
|
|
+ // Check auto-login.
|
|
|
+ userName := ctx.GetCookie(base.CookieUserName)
|
|
|
+ if len(userName) == 0 {
|
|
|
+ ctx.HTML(200, "user/signin")
|
|
|
return
|
|
|
}
|
|
|
- ctx.Data["Feeds"] = feeds
|
|
|
- ctx.HTML(200, "user/dashboard")
|
|
|
-}
|
|
|
|
|
|
-func Profile(ctx *middleware.Context, params martini.Params) {
|
|
|
- ctx.Data["Title"] = "Profile"
|
|
|
+ isSucceed := false
|
|
|
+ defer func() {
|
|
|
+ if !isSucceed {
|
|
|
+ log.Trace("user.SignIn(auto-login cookie cleared): %s", userName)
|
|
|
+ ctx.SetCookie(base.CookieUserName, "", -1)
|
|
|
+ ctx.SetCookie(base.CookieRememberName, "", -1)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ }()
|
|
|
|
|
|
- // TODO: Need to check view self or others.
|
|
|
- user, err := models.GetUserByName(params["username"])
|
|
|
+ user, err := models.GetUserByName(userName)
|
|
|
if err != nil {
|
|
|
- ctx.Handle(200, "user.Profile", err)
|
|
|
+ ctx.HTML(500, "user/signin")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- ctx.Data["Owner"] = user
|
|
|
+ secret := base.EncodeMd5(user.Rands + user.Passwd)
|
|
|
+ value, _ := ctx.GetSecureCookie(secret, base.CookieRememberName)
|
|
|
+ if value != user.Name {
|
|
|
+ ctx.HTML(500, "user/signin")
|
|
|
+ return
|
|
|
+ }
|
|
|
|
|
|
- tab := ctx.Query("tab")
|
|
|
- ctx.Data["TabName"] = tab
|
|
|
+ isSucceed = true
|
|
|
|
|
|
- switch tab {
|
|
|
- case "activity":
|
|
|
- feeds, err := models.GetFeeds(user.Id, 0, true)
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Profile", err)
|
|
|
- return
|
|
|
- }
|
|
|
- ctx.Data["Feeds"] = feeds
|
|
|
- default:
|
|
|
- repos, err := models.GetRepositories(user)
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Profile", err)
|
|
|
- return
|
|
|
- }
|
|
|
- ctx.Data["Repos"] = repos
|
|
|
+ ctx.Session.Set("userId", user.Id)
|
|
|
+ ctx.Session.Set("userName", user.Name)
|
|
|
+ if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 {
|
|
|
+ ctx.SetCookie("redirect_to", "", -1)
|
|
|
+ ctx.Redirect(redirectTo)
|
|
|
+ return
|
|
|
}
|
|
|
|
|
|
- ctx.Data["PageIsUserProfile"] = true
|
|
|
- ctx.HTML(200, "user/profile")
|
|
|
+ ctx.Redirect("/")
|
|
|
}
|
|
|
|
|
|
-func SignIn(ctx *middleware.Context, form auth.LogInForm) {
|
|
|
+func SignInPost(ctx *middleware.Context, form auth.LogInForm) {
|
|
|
ctx.Data["Title"] = "Log In"
|
|
|
|
|
|
- if ctx.Req.Method == "GET" {
|
|
|
- // Check auto-login.
|
|
|
- userName := ctx.GetCookie(base.CookieUserName)
|
|
|
- if len(userName) == 0 {
|
|
|
- ctx.HTML(200, "user/signin")
|
|
|
- return
|
|
|
- }
|
|
|
-
|
|
|
- isSucceed := false
|
|
|
- defer func() {
|
|
|
- if !isSucceed {
|
|
|
- log.Trace("%s auto-login cookie cleared: %s", ctx.Req.RequestURI, userName)
|
|
|
- ctx.SetCookie(base.CookieUserName, "", -1)
|
|
|
- ctx.SetCookie(base.CookieRememberName, "", -1)
|
|
|
- }
|
|
|
- }()
|
|
|
-
|
|
|
- user, err := models.GetUserByName(userName)
|
|
|
- if err != nil {
|
|
|
- ctx.HTML(200, "user/signin")
|
|
|
- return
|
|
|
- }
|
|
|
-
|
|
|
- secret := base.EncodeMd5(user.Rands + user.Passwd)
|
|
|
- value, _ := ctx.GetSecureCookie(secret, base.CookieRememberName)
|
|
|
- if value != user.Name {
|
|
|
- ctx.HTML(200, "user/signin")
|
|
|
- return
|
|
|
- }
|
|
|
-
|
|
|
- isSucceed = true
|
|
|
- ctx.Session.Set("userId", user.Id)
|
|
|
- ctx.Session.Set("userName", user.Name)
|
|
|
- redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to"))
|
|
|
- if len(redirectTo) > 0 {
|
|
|
- ctx.SetCookie("redirect_to", "", -1)
|
|
|
- ctx.Redirect(redirectTo)
|
|
|
- } else {
|
|
|
- ctx.Redirect("/")
|
|
|
- }
|
|
|
- return
|
|
|
+ sid, isOauth := ctx.Session.Get("socialId").(int64)
|
|
|
+ if isOauth {
|
|
|
+ ctx.Data["IsSocialLogin"] = true
|
|
|
+ } else if base.OauthService != nil {
|
|
|
+ ctx.Data["OauthEnabled"] = true
|
|
|
+ ctx.Data["OauthService"] = base.OauthService
|
|
|
}
|
|
|
|
|
|
if ctx.HasError() {
|
|
@@ -133,7 +97,7 @@ func SignIn(ctx *middleware.Context, form auth.LogInForm) {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- ctx.Handle(200, "user.SignIn", err)
|
|
|
+ ctx.Handle(500, "user.SignIn", err)
|
|
|
return
|
|
|
}
|
|
|
|
|
@@ -144,40 +108,116 @@ func SignIn(ctx *middleware.Context, form auth.LogInForm) {
|
|
|
ctx.SetSecureCookie(secret, base.CookieRememberName, user.Name, days)
|
|
|
}
|
|
|
|
|
|
+ // Bind with social account.
|
|
|
+ if isOauth {
|
|
|
+ if err = models.BindUserOauth2(user.Id, sid); err != nil {
|
|
|
+ if err == models.ErrOauth2RecordNotExist {
|
|
|
+ ctx.Handle(404, "user.SignInPost(GetOauth2ById)", err)
|
|
|
+ } else {
|
|
|
+ ctx.Handle(500, "user.SignInPost(GetOauth2ById)", err)
|
|
|
+ }
|
|
|
+ return
|
|
|
+ }
|
|
|
+ ctx.Session.Delete("socialId")
|
|
|
+ log.Trace("%s OAuth binded: %s -> %d", ctx.Req.RequestURI, form.UserName, sid)
|
|
|
+ }
|
|
|
+
|
|
|
ctx.Session.Set("userId", user.Id)
|
|
|
ctx.Session.Set("userName", user.Name)
|
|
|
- redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to"))
|
|
|
- if len(redirectTo) > 0 {
|
|
|
+ if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 {
|
|
|
ctx.SetCookie("redirect_to", "", -1)
|
|
|
ctx.Redirect(redirectTo)
|
|
|
- } else {
|
|
|
- ctx.Redirect("/")
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ ctx.Redirect("/")
|
|
|
+}
|
|
|
+
|
|
|
+func oauthSignInPost(ctx *middleware.Context, sid int64) {
|
|
|
+ ctx.Data["Title"] = "OAuth Sign Up"
|
|
|
+ ctx.Data["PageIsSignUp"] = true
|
|
|
+
|
|
|
+ if _, err := models.GetOauth2ById(sid); err != nil {
|
|
|
+ if err == models.ErrOauth2RecordNotExist {
|
|
|
+ ctx.Handle(404, "user.oauthSignUp(GetOauth2ById)", err)
|
|
|
+ } else {
|
|
|
+ ctx.Handle(500, "user.oauthSignUp(GetOauth2ById)", err)
|
|
|
+ }
|
|
|
+ return
|
|
|
}
|
|
|
+
|
|
|
+ ctx.Data["IsSocialLogin"] = true
|
|
|
+ ctx.Data["username"] = ctx.Session.Get("socialName")
|
|
|
+ ctx.Data["email"] = ctx.Session.Get("socialEmail")
|
|
|
+ log.Trace("user.oauthSignUp(social ID): %v", ctx.Session.Get("socialId"))
|
|
|
+
|
|
|
+ ctx.HTML(200, "user/signup")
|
|
|
}
|
|
|
|
|
|
func SignOut(ctx *middleware.Context) {
|
|
|
ctx.Session.Delete("userId")
|
|
|
ctx.Session.Delete("userName")
|
|
|
+ ctx.Session.Delete("socialId")
|
|
|
+ ctx.Session.Delete("socialName")
|
|
|
+ ctx.Session.Delete("socialEmail")
|
|
|
ctx.SetCookie(base.CookieUserName, "", -1)
|
|
|
ctx.SetCookie(base.CookieRememberName, "", -1)
|
|
|
ctx.Redirect("/")
|
|
|
}
|
|
|
|
|
|
-func SignUp(ctx *middleware.Context, form auth.RegisterForm) {
|
|
|
+func SignUp(ctx *middleware.Context) {
|
|
|
ctx.Data["Title"] = "Sign Up"
|
|
|
ctx.Data["PageIsSignUp"] = true
|
|
|
|
|
|
- if base.Service.DisenableRegisteration {
|
|
|
- ctx.Data["DisenableRegisteration"] = true
|
|
|
+ if base.Service.DisableRegistration {
|
|
|
+ ctx.Data["DisableRegistration"] = true
|
|
|
ctx.HTML(200, "user/signup")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if ctx.Req.Method == "GET" {
|
|
|
- ctx.HTML(200, "user/signup")
|
|
|
+ if sid, ok := ctx.Session.Get("socialId").(int64); ok {
|
|
|
+ oauthSignUp(ctx, sid)
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ ctx.HTML(200, "user/signup")
|
|
|
+}
|
|
|
+
|
|
|
+func oauthSignUp(ctx *middleware.Context, sid int64) {
|
|
|
+ ctx.Data["Title"] = "OAuth Sign Up"
|
|
|
+ ctx.Data["PageIsSignUp"] = true
|
|
|
+
|
|
|
+ if _, err := models.GetOauth2ById(sid); err != nil {
|
|
|
+ if err == models.ErrOauth2RecordNotExist {
|
|
|
+ ctx.Handle(404, "user.oauthSignUp(GetOauth2ById)", err)
|
|
|
+ } else {
|
|
|
+ ctx.Handle(500, "user.oauthSignUp(GetOauth2ById)", err)
|
|
|
+ }
|
|
|
return
|
|
|
}
|
|
|
|
|
|
+ ctx.Data["IsSocialLogin"] = true
|
|
|
+ ctx.Data["username"] = strings.Replace(ctx.Session.Get("socialName").(string), " ", "", -1)
|
|
|
+ ctx.Data["email"] = ctx.Session.Get("socialEmail")
|
|
|
+ log.Trace("user.oauthSignUp(social ID): %v", ctx.Session.Get("socialId"))
|
|
|
+
|
|
|
+ ctx.HTML(200, "user/signup")
|
|
|
+}
|
|
|
+
|
|
|
+func SignUpPost(ctx *middleware.Context, form auth.RegisterForm) {
|
|
|
+ ctx.Data["Title"] = "Sign Up"
|
|
|
+ ctx.Data["PageIsSignUp"] = true
|
|
|
+
|
|
|
+ if base.Service.DisableRegistration {
|
|
|
+ ctx.Handle(403, "user.SignUpPost", nil)
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ sid, isOauth := ctx.Session.Get("socialId").(int64)
|
|
|
+ if isOauth {
|
|
|
+ ctx.Data["IsSocialLogin"] = true
|
|
|
+ }
|
|
|
+
|
|
|
if form.Password != form.RetypePasswd {
|
|
|
ctx.Data["HasError"] = true
|
|
|
ctx.Data["Err_Password"] = true
|
|
@@ -195,7 +235,7 @@ func SignUp(ctx *middleware.Context, form auth.RegisterForm) {
|
|
|
Name: form.UserName,
|
|
|
Email: form.Email,
|
|
|
Passwd: form.Password,
|
|
|
- IsActive: !base.Service.RegisterEmailConfirm,
|
|
|
+ IsActive: !base.Service.RegisterEmailConfirm || isOauth,
|
|
|
}
|
|
|
|
|
|
var err error
|
|
@@ -208,20 +248,30 @@ func SignUp(ctx *middleware.Context, form auth.RegisterForm) {
|
|
|
case models.ErrUserNameIllegal:
|
|
|
ctx.RenderWithErr(models.ErrRepoNameIllegal.Error(), "user/signup", &form)
|
|
|
default:
|
|
|
- ctx.Handle(200, "user.SignUp", err)
|
|
|
+ ctx.Handle(500, "user.SignUp(RegisterUser)", err)
|
|
|
}
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- log.Trace("%s User created: %s", ctx.Req.RequestURI, strings.ToLower(form.UserName))
|
|
|
+ log.Trace("%s User created: %s", ctx.Req.RequestURI, form.UserName)
|
|
|
+
|
|
|
+ // Bind social account.
|
|
|
+ if isOauth {
|
|
|
+ if err = models.BindUserOauth2(u.Id, sid); err != nil {
|
|
|
+ ctx.Handle(500, "user.SignUp(BindUserOauth2)", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ ctx.Session.Delete("socialId")
|
|
|
+ log.Trace("%s OAuth binded: %s -> %d", ctx.Req.RequestURI, form.UserName, sid)
|
|
|
+ }
|
|
|
|
|
|
- // Send confirmation e-mail.
|
|
|
- if base.Service.RegisterEmailConfirm && u.Id > 1 {
|
|
|
+ // Send confirmation e-mail, no need for social account.
|
|
|
+ if !isOauth && base.Service.RegisterEmailConfirm && u.Id > 1 {
|
|
|
mailer.SendRegisterMail(ctx.Render, u)
|
|
|
ctx.Data["IsSendRegisterMail"] = true
|
|
|
ctx.Data["Email"] = u.Email
|
|
|
ctx.Data["Hours"] = base.Service.ActiveCodeLives / 60
|
|
|
- ctx.HTML(200, "user/active")
|
|
|
+ ctx.HTML(200, "user/activate")
|
|
|
|
|
|
if err = ctx.Cache.Put("MailResendLimit_"+u.LowerName, u.LowerName, 180); err != nil {
|
|
|
log.Error("Set cache(MailResendLimit) fail: %v", err)
|
|
@@ -235,25 +285,28 @@ func Delete(ctx *middleware.Context) {
|
|
|
ctx.Data["Title"] = "Delete Account"
|
|
|
ctx.Data["PageIsUserSetting"] = true
|
|
|
ctx.Data["IsUserPageSettingDelete"] = true
|
|
|
+ ctx.HTML(200, "user/delete")
|
|
|
+}
|
|
|
|
|
|
- if ctx.Req.Method == "GET" {
|
|
|
- ctx.HTML(200, "user/delete")
|
|
|
- return
|
|
|
- }
|
|
|
+func DeletePost(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Delete Account"
|
|
|
+ ctx.Data["PageIsUserSetting"] = true
|
|
|
+ ctx.Data["IsUserPageSettingDelete"] = true
|
|
|
|
|
|
- tmpUser := models.User{Passwd: ctx.Query("password")}
|
|
|
+ tmpUser := models.User{
|
|
|
+ Passwd: ctx.Query("password"),
|
|
|
+ Salt: ctx.User.Salt,
|
|
|
+ }
|
|
|
tmpUser.EncodePasswd()
|
|
|
- if len(tmpUser.Passwd) == 0 || tmpUser.Passwd != ctx.User.Passwd {
|
|
|
- ctx.Data["HasError"] = true
|
|
|
- ctx.Data["ErrorMsg"] = "Password is not correct. Make sure you are owner of this account."
|
|
|
+ if tmpUser.Passwd != ctx.User.Passwd {
|
|
|
+ ctx.Flash.Error("Password is not correct. Make sure you are owner of this account.")
|
|
|
} else {
|
|
|
if err := models.DeleteUser(ctx.User); err != nil {
|
|
|
- ctx.Data["HasError"] = true
|
|
|
switch err {
|
|
|
case models.ErrUserOwnRepos:
|
|
|
- ctx.Data["ErrorMsg"] = "Your account still have ownership of repository, you have to delete or transfer them first."
|
|
|
+ ctx.Flash.Error("Your account still have ownership of repository, you have to delete or transfer them first.")
|
|
|
default:
|
|
|
- ctx.Handle(200, "user.Delete", err)
|
|
|
+ ctx.Handle(500, "user.Delete", err)
|
|
|
return
|
|
|
}
|
|
|
} else {
|
|
@@ -262,118 +315,7 @@ func Delete(ctx *middleware.Context) {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- ctx.HTML(200, "user/delete")
|
|
|
-}
|
|
|
-
|
|
|
-const (
|
|
|
- TPL_FEED = `<i class="icon fa fa-%s"></i>
|
|
|
- <div class="info"><span class="meta">%s</span><br>%s</div>`
|
|
|
-)
|
|
|
-
|
|
|
-func Feeds(ctx *middleware.Context, form auth.FeedsForm) {
|
|
|
- actions, err := models.GetFeeds(form.UserId, form.Page*20, false)
|
|
|
- if err != nil {
|
|
|
- ctx.JSON(500, err)
|
|
|
- }
|
|
|
-
|
|
|
- feeds := make([]string, len(actions))
|
|
|
- for i := range actions {
|
|
|
- feeds[i] = fmt.Sprintf(TPL_FEED, base.ActionIcon(actions[i].OpType),
|
|
|
- base.TimeSince(actions[i].Created), base.ActionDesc(actions[i]))
|
|
|
- }
|
|
|
- ctx.JSON(200, &feeds)
|
|
|
-}
|
|
|
-
|
|
|
-func Issues(ctx *middleware.Context) {
|
|
|
- ctx.Data["Title"] = "Your Issues"
|
|
|
- ctx.Data["ViewType"] = "all"
|
|
|
-
|
|
|
- page, _ := base.StrTo(ctx.Query("page")).Int()
|
|
|
- repoId, _ := base.StrTo(ctx.Query("repoid")).Int64()
|
|
|
-
|
|
|
- ctx.Data["RepoId"] = repoId
|
|
|
-
|
|
|
- var posterId int64 = 0
|
|
|
- if ctx.Query("type") == "created_by" {
|
|
|
- posterId = ctx.User.Id
|
|
|
- ctx.Data["ViewType"] = "created_by"
|
|
|
- }
|
|
|
-
|
|
|
- // Get all repositories.
|
|
|
- repos, err := models.GetRepositories(ctx.User)
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Issues(get repositories)", err)
|
|
|
- return
|
|
|
- }
|
|
|
-
|
|
|
- showRepos := make([]models.Repository, 0, len(repos))
|
|
|
-
|
|
|
- isShowClosed := ctx.Query("state") == "closed"
|
|
|
- var closedIssueCount, createdByCount, allIssueCount int
|
|
|
-
|
|
|
- // Get all issues.
|
|
|
- allIssues := make([]models.Issue, 0, 5*len(repos))
|
|
|
- for i, repo := range repos {
|
|
|
- issues, err := models.GetIssues(0, repo.Id, posterId, 0, page, isShowClosed, false, "", "")
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Issues(get issues)", err)
|
|
|
- return
|
|
|
- }
|
|
|
-
|
|
|
- allIssueCount += repo.NumIssues
|
|
|
- closedIssueCount += repo.NumClosedIssues
|
|
|
-
|
|
|
- // Set repository information to issues.
|
|
|
- for j := range issues {
|
|
|
- issues[j].Repo = &repos[i]
|
|
|
- }
|
|
|
- allIssues = append(allIssues, issues...)
|
|
|
-
|
|
|
- repos[i].NumOpenIssues = repo.NumIssues - repo.NumClosedIssues
|
|
|
- if repos[i].NumOpenIssues > 0 {
|
|
|
- showRepos = append(showRepos, repos[i])
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- showIssues := make([]models.Issue, 0, len(allIssues))
|
|
|
- ctx.Data["IsShowClosed"] = isShowClosed
|
|
|
-
|
|
|
- // Get posters and filter issues.
|
|
|
- for i := range allIssues {
|
|
|
- u, err := models.GetUserById(allIssues[i].PosterId)
|
|
|
- if err != nil {
|
|
|
- ctx.Handle(200, "user.Issues(get poster): %v", err)
|
|
|
- return
|
|
|
- }
|
|
|
- allIssues[i].Poster = u
|
|
|
- if u.Id == ctx.User.Id {
|
|
|
- createdByCount++
|
|
|
- }
|
|
|
-
|
|
|
- if repoId > 0 && repoId != allIssues[i].Repo.Id {
|
|
|
- continue
|
|
|
- }
|
|
|
-
|
|
|
- if isShowClosed == allIssues[i].IsClosed {
|
|
|
- showIssues = append(showIssues, allIssues[i])
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- ctx.Data["Repos"] = showRepos
|
|
|
- ctx.Data["Issues"] = showIssues
|
|
|
- ctx.Data["AllIssueCount"] = allIssueCount
|
|
|
- ctx.Data["ClosedIssueCount"] = closedIssueCount
|
|
|
- ctx.Data["OpenIssueCount"] = allIssueCount - closedIssueCount
|
|
|
- ctx.Data["CreatedByCount"] = createdByCount
|
|
|
- ctx.HTML(200, "issue/user")
|
|
|
-}
|
|
|
-
|
|
|
-func Pulls(ctx *middleware.Context) {
|
|
|
- ctx.HTML(200, "user/pulls")
|
|
|
-}
|
|
|
-
|
|
|
-func Stars(ctx *middleware.Context) {
|
|
|
- ctx.HTML(200, "user/stars")
|
|
|
+ ctx.Redirect("/user/delete")
|
|
|
}
|
|
|
|
|
|
func Activate(ctx *middleware.Context) {
|
|
@@ -391,11 +333,15 @@ func Activate(ctx *middleware.Context) {
|
|
|
} else {
|
|
|
ctx.Data["Hours"] = base.Service.ActiveCodeLives / 60
|
|
|
mailer.SendActiveMail(ctx.Render, ctx.User)
|
|
|
+
|
|
|
+ if err := ctx.Cache.Put("MailResendLimit_"+ctx.User.LowerName, ctx.User.LowerName, 180); err != nil {
|
|
|
+ log.Error("Set cache(MailResendLimit) fail: %v", err)
|
|
|
+ }
|
|
|
}
|
|
|
} else {
|
|
|
ctx.Data["ServiceNotEnabled"] = true
|
|
|
}
|
|
|
- ctx.HTML(200, "user/active")
|
|
|
+ ctx.HTML(200, "user/activate")
|
|
|
return
|
|
|
}
|
|
|
|
|
@@ -403,9 +349,12 @@ func Activate(ctx *middleware.Context) {
|
|
|
if user := models.VerifyUserActiveCode(code); user != nil {
|
|
|
user.IsActive = true
|
|
|
user.Rands = models.GetUserSalt()
|
|
|
- models.UpdateUser(user)
|
|
|
+ if err := models.UpdateUser(user); err != nil {
|
|
|
+ ctx.Handle(404, "user.Activate", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
|
|
|
- log.Trace("%s User activated: %s", ctx.Req.RequestURI, user.LowerName)
|
|
|
+ log.Trace("%s User activated: %s", ctx.Req.RequestURI, user.Name)
|
|
|
|
|
|
ctx.Session.Set("userId", user.Id)
|
|
|
ctx.Session.Set("userName", user.Name)
|
|
@@ -414,5 +363,106 @@ func Activate(ctx *middleware.Context) {
|
|
|
}
|
|
|
|
|
|
ctx.Data["IsActivateFailed"] = true
|
|
|
- ctx.HTML(200, "user/active")
|
|
|
+ ctx.HTML(200, "user/activate")
|
|
|
+}
|
|
|
+
|
|
|
+func ForgotPasswd(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Forgot Password"
|
|
|
+
|
|
|
+ if base.MailService == nil {
|
|
|
+ ctx.Data["IsResetDisable"] = true
|
|
|
+ ctx.HTML(200, "user/forgot_passwd")
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ ctx.Data["IsResetRequest"] = true
|
|
|
+ ctx.HTML(200, "user/forgot_passwd")
|
|
|
+}
|
|
|
+
|
|
|
+func ForgotPasswdPost(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Forgot Password"
|
|
|
+
|
|
|
+ if base.MailService == nil {
|
|
|
+ ctx.Handle(403, "user.ForgotPasswdPost", nil)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ ctx.Data["IsResetRequest"] = true
|
|
|
+
|
|
|
+ email := ctx.Query("email")
|
|
|
+ u, err := models.GetUserByEmail(email)
|
|
|
+ if err != nil {
|
|
|
+ if err == models.ErrUserNotExist {
|
|
|
+ ctx.RenderWithErr("This e-mail address does not associate to any account.", "user/forgot_passwd", nil)
|
|
|
+ } else {
|
|
|
+ ctx.Handle(500, "user.ResetPasswd(check existence)", err)
|
|
|
+ }
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ if ctx.Cache.IsExist("MailResendLimit_" + u.LowerName) {
|
|
|
+ ctx.Data["ResendLimited"] = true
|
|
|
+ ctx.HTML(200, "user/forgot_passwd")
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ mailer.SendResetPasswdMail(ctx.Render, u)
|
|
|
+ if err = ctx.Cache.Put("MailResendLimit_"+u.LowerName, u.LowerName, 180); err != nil {
|
|
|
+ log.Error("Set cache(MailResendLimit) fail: %v", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ ctx.Data["Email"] = email
|
|
|
+ ctx.Data["Hours"] = base.Service.ActiveCodeLives / 60
|
|
|
+ ctx.Data["IsResetSent"] = true
|
|
|
+ ctx.HTML(200, "user/forgot_passwd")
|
|
|
+}
|
|
|
+
|
|
|
+func ResetPasswd(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Reset Password"
|
|
|
+
|
|
|
+ code := ctx.Query("code")
|
|
|
+ if len(code) == 0 {
|
|
|
+ ctx.Error(404)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ ctx.Data["Code"] = code
|
|
|
+
|
|
|
+ ctx.Data["IsResetForm"] = true
|
|
|
+ ctx.HTML(200, "user/reset_passwd")
|
|
|
+}
|
|
|
+
|
|
|
+func ResetPasswdPost(ctx *middleware.Context) {
|
|
|
+ ctx.Data["Title"] = "Reset Password"
|
|
|
+
|
|
|
+ code := ctx.Query("code")
|
|
|
+ if len(code) == 0 {
|
|
|
+ ctx.Error(404)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ ctx.Data["Code"] = code
|
|
|
+
|
|
|
+ if u := models.VerifyUserActiveCode(code); u != nil {
|
|
|
+ // Validate password length.
|
|
|
+ passwd := ctx.Query("passwd")
|
|
|
+ if len(passwd) < 6 || len(passwd) > 30 {
|
|
|
+ ctx.Data["IsResetForm"] = true
|
|
|
+ ctx.RenderWithErr("Password length should be in 6 and 30.", "user/reset_passwd", nil)
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ u.Passwd = passwd
|
|
|
+ u.Rands = models.GetUserSalt()
|
|
|
+ u.Salt = models.GetUserSalt()
|
|
|
+ u.EncodePasswd()
|
|
|
+ if err := models.UpdateUser(u); err != nil {
|
|
|
+ ctx.Handle(500, "user.ResetPasswd(UpdateUser)", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ log.Trace("%s User password reset: %s", ctx.Req.RequestURI, u.Name)
|
|
|
+ ctx.Redirect("/user/login")
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ ctx.Data["IsResetFailed"] = true
|
|
|
+ ctx.HTML(200, "user/reset_passwd")
|
|
|
}
|