users.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "fmt"
  8. "strings"
  9. "time"
  10. "github.com/go-macaron/binding"
  11. "github.com/pkg/errors"
  12. "gorm.io/gorm"
  13. "gogs.io/gogs/internal/auth"
  14. "gogs.io/gogs/internal/cryptoutil"
  15. "gogs.io/gogs/internal/errutil"
  16. )
  17. // UsersStore is the persistent interface for users.
  18. //
  19. // NOTE: All methods are sorted in alphabetical order.
  20. type UsersStore interface {
  21. // Authenticate validates username and password via given login source ID. It
  22. // returns ErrUserNotExist when the user was not found.
  23. //
  24. // When the "loginSourceID" is negative, it aborts the process and returns
  25. // ErrUserNotExist if the user was not found in the database.
  26. //
  27. // When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
  28. // if the user has different login source ID than the "loginSourceID".
  29. //
  30. // When the "loginSourceID" is positive, it tries to authenticate via given
  31. // login source and creates a new user when not yet exists in the database.
  32. Authenticate(ctx context.Context, username, password string, loginSourceID int64) (*User, error)
  33. // Create creates a new user and persists to database. It returns
  34. // ErrUserAlreadyExist when a user with same name already exists, or
  35. // ErrEmailAlreadyUsed if the email has been used by another user.
  36. Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error)
  37. // GetByEmail returns the user (not organization) with given email. It ignores
  38. // records with unverified emails and returns ErrUserNotExist when not found.
  39. GetByEmail(ctx context.Context, email string) (*User, error)
  40. // GetByID returns the user with given ID. It returns ErrUserNotExist when not
  41. // found.
  42. GetByID(ctx context.Context, id int64) (*User, error)
  43. // GetByUsername returns the user with given username. It returns
  44. // ErrUserNotExist when not found.
  45. GetByUsername(ctx context.Context, username string) (*User, error)
  46. }
  47. var Users UsersStore
  48. // BeforeCreate implements the GORM create hook.
  49. func (u *User) BeforeCreate(tx *gorm.DB) error {
  50. if u.CreatedUnix == 0 {
  51. u.CreatedUnix = tx.NowFunc().Unix()
  52. u.UpdatedUnix = u.CreatedUnix
  53. }
  54. return nil
  55. }
  56. // AfterFind implements the GORM query hook.
  57. func (u *User) AfterFind(_ *gorm.DB) error {
  58. u.Created = time.Unix(u.CreatedUnix, 0).Local()
  59. u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
  60. return nil
  61. }
  62. var _ UsersStore = (*users)(nil)
  63. type users struct {
  64. *gorm.DB
  65. }
  66. // NewUsersStore returns a persistent interface for users with given database
  67. // connection.
  68. func NewUsersStore(db *gorm.DB) UsersStore {
  69. return &users{DB: db}
  70. }
  71. type ErrLoginSourceMismatch struct {
  72. args errutil.Args
  73. }
  74. func (err ErrLoginSourceMismatch) Error() string {
  75. return fmt.Sprintf("login source mismatch: %v", err.args)
  76. }
  77. func (db *users) Authenticate(ctx context.Context, login, password string, loginSourceID int64) (*User, error) {
  78. login = strings.ToLower(login)
  79. query := db.WithContext(ctx)
  80. if strings.Contains(login, "@") {
  81. query = query.Where("email = ?", login)
  82. } else {
  83. query = query.Where("lower_name = ?", login)
  84. }
  85. user := new(User)
  86. err := query.First(user).Error
  87. if err != nil && err != gorm.ErrRecordNotFound {
  88. return nil, errors.Wrap(err, "get user")
  89. }
  90. var authSourceID int64 // The login source ID will be used to authenticate the user
  91. createNewUser := false // Whether to create a new user after successful authentication
  92. // User found in the database
  93. if err == nil {
  94. // Note: This check is unnecessary but to reduce user confusion at login page
  95. // and make it more consistent from user's perspective.
  96. if loginSourceID >= 0 && user.LoginSource != loginSourceID {
  97. return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
  98. }
  99. // Validate password hash fetched from database for local accounts.
  100. if user.IsLocal() {
  101. if user.ValidatePassword(password) {
  102. return user, nil
  103. }
  104. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login, "userID": user.ID}}
  105. }
  106. authSourceID = user.LoginSource
  107. } else {
  108. // Non-local login source is always greater than 0.
  109. if loginSourceID <= 0 {
  110. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login}}
  111. }
  112. authSourceID = loginSourceID
  113. createNewUser = true
  114. }
  115. source, err := LoginSources.GetByID(ctx, authSourceID)
  116. if err != nil {
  117. return nil, errors.Wrap(err, "get login source")
  118. }
  119. if !source.IsActived {
  120. return nil, errors.Errorf("login source %d is not activated", source.ID)
  121. }
  122. extAccount, err := source.Provider.Authenticate(login, password)
  123. if err != nil {
  124. return nil, err
  125. }
  126. if !createNewUser {
  127. return user, nil
  128. }
  129. // Validate username make sure it satisfies requirement.
  130. if binding.AlphaDashDotPattern.MatchString(extAccount.Name) {
  131. return nil, fmt.Errorf("invalid pattern for attribute 'username' [%s]: must be valid alpha or numeric or dash(-_) or dot characters", extAccount.Name)
  132. }
  133. return db.Create(ctx, extAccount.Name, extAccount.Email,
  134. CreateUserOptions{
  135. FullName: extAccount.FullName,
  136. LoginSource: authSourceID,
  137. LoginName: extAccount.Login,
  138. Location: extAccount.Location,
  139. Website: extAccount.Website,
  140. Activated: true,
  141. Admin: extAccount.Admin,
  142. },
  143. )
  144. }
  145. type CreateUserOptions struct {
  146. FullName string
  147. Password string
  148. LoginSource int64
  149. LoginName string
  150. Location string
  151. Website string
  152. Activated bool
  153. Admin bool
  154. }
  155. type ErrUserAlreadyExist struct {
  156. args errutil.Args
  157. }
  158. func IsErrUserAlreadyExist(err error) bool {
  159. _, ok := err.(ErrUserAlreadyExist)
  160. return ok
  161. }
  162. func (err ErrUserAlreadyExist) Error() string {
  163. return fmt.Sprintf("user already exists: %v", err.args)
  164. }
  165. type ErrEmailAlreadyUsed struct {
  166. args errutil.Args
  167. }
  168. func IsErrEmailAlreadyUsed(err error) bool {
  169. _, ok := err.(ErrEmailAlreadyUsed)
  170. return ok
  171. }
  172. func (err ErrEmailAlreadyUsed) Email() string {
  173. email, ok := err.args["email"].(string)
  174. if ok {
  175. return email
  176. }
  177. return "<email not found>"
  178. }
  179. func (err ErrEmailAlreadyUsed) Error() string {
  180. return fmt.Sprintf("email has been used: %v", err.args)
  181. }
  182. func (db *users) Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error) {
  183. err := isUsernameAllowed(username)
  184. if err != nil {
  185. return nil, err
  186. }
  187. _, err = db.GetByUsername(ctx, username)
  188. if err == nil {
  189. return nil, ErrUserAlreadyExist{args: errutil.Args{"name": username}}
  190. } else if !IsErrUserNotExist(err) {
  191. return nil, err
  192. }
  193. _, err = db.GetByEmail(ctx, email)
  194. if err == nil {
  195. return nil, ErrEmailAlreadyUsed{args: errutil.Args{"email": email}}
  196. } else if !IsErrUserNotExist(err) {
  197. return nil, err
  198. }
  199. user := &User{
  200. LowerName: strings.ToLower(username),
  201. Name: username,
  202. FullName: opts.FullName,
  203. Email: email,
  204. Passwd: opts.Password,
  205. LoginSource: opts.LoginSource,
  206. LoginName: opts.LoginName,
  207. Location: opts.Location,
  208. Website: opts.Website,
  209. MaxRepoCreation: -1,
  210. IsActive: opts.Activated,
  211. IsAdmin: opts.Admin,
  212. Avatar: cryptoutil.MD5(email),
  213. AvatarEmail: email,
  214. }
  215. user.Rands, err = GetUserSalt()
  216. if err != nil {
  217. return nil, err
  218. }
  219. user.Salt, err = GetUserSalt()
  220. if err != nil {
  221. return nil, err
  222. }
  223. user.EncodePassword()
  224. return user, db.WithContext(ctx).Create(user).Error
  225. }
  226. var _ errutil.NotFound = (*ErrUserNotExist)(nil)
  227. type ErrUserNotExist struct {
  228. args errutil.Args
  229. }
  230. func IsErrUserNotExist(err error) bool {
  231. _, ok := err.(ErrUserNotExist)
  232. return ok
  233. }
  234. func (err ErrUserNotExist) Error() string {
  235. return fmt.Sprintf("user does not exist: %v", err.args)
  236. }
  237. func (ErrUserNotExist) NotFound() bool {
  238. return true
  239. }
  240. func (db *users) GetByEmail(ctx context.Context, email string) (*User, error) {
  241. email = strings.ToLower(email)
  242. if email == "" {
  243. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  244. }
  245. // First try to find the user by primary email
  246. user := new(User)
  247. err := db.WithContext(ctx).
  248. Where("email = ? AND type = ? AND is_active = ?", email, UserIndividual, true).
  249. First(user).
  250. Error
  251. if err == nil {
  252. return user, nil
  253. } else if err != gorm.ErrRecordNotFound {
  254. return nil, err
  255. }
  256. // Otherwise, check activated email addresses
  257. emailAddress := new(EmailAddress)
  258. err = db.WithContext(ctx).
  259. Where("email = ? AND is_activated = ?", email, true).
  260. First(emailAddress).
  261. Error
  262. if err != nil {
  263. if err == gorm.ErrRecordNotFound {
  264. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  265. }
  266. return nil, err
  267. }
  268. return db.GetByID(ctx, emailAddress.UID)
  269. }
  270. func (db *users) GetByID(ctx context.Context, id int64) (*User, error) {
  271. user := new(User)
  272. err := db.WithContext(ctx).Where("id = ?", id).First(user).Error
  273. if err != nil {
  274. if err == gorm.ErrRecordNotFound {
  275. return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
  276. }
  277. return nil, err
  278. }
  279. return user, nil
  280. }
  281. func (db *users) GetByUsername(ctx context.Context, username string) (*User, error) {
  282. user := new(User)
  283. err := db.WithContext(ctx).Where("lower_name = ?", strings.ToLower(username)).First(user).Error
  284. if err != nil {
  285. if err == gorm.ErrRecordNotFound {
  286. return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
  287. }
  288. return nil, err
  289. }
  290. return user, nil
  291. }