setting.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "net/http"
  7. "strconv"
  8. "github.com/martini-contrib/render"
  9. "github.com/martini-contrib/sessions"
  10. "github.com/gogits/gogs/models"
  11. "github.com/gogits/gogs/modules/auth"
  12. "github.com/gogits/gogs/modules/base"
  13. "github.com/gogits/gogs/modules/log"
  14. )
  15. func Setting(form auth.UpdateProfileForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  16. data["Title"] = "Setting"
  17. data["PageIsUserSetting"] = true
  18. user := auth.SignedInUser(session)
  19. data["Owner"] = user
  20. if req.Method == "GET" {
  21. r.HTML(200, "user/setting", data)
  22. return
  23. }
  24. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  25. r.HTML(200, "user/setting", data)
  26. return
  27. }
  28. user.Email = form.Email
  29. user.Website = form.Website
  30. user.Location = form.Location
  31. user.Avatar = base.EncodeMd5(form.Avatar)
  32. user.AvatarEmail = form.Avatar
  33. if err := models.UpdateUser(user); err != nil {
  34. data["ErrorMsg"] = err
  35. log.Error("setting.Setting: %v", err)
  36. r.HTML(200, "base/error", data)
  37. return
  38. }
  39. data["IsSuccess"] = true
  40. r.HTML(200, "user/setting", data)
  41. }
  42. func SettingPassword(form auth.UpdatePasswdForm, r render.Render, data base.TmplData, session sessions.Session, req *http.Request) {
  43. data["Title"] = "Password"
  44. data["PageIsUserSetting"] = true
  45. if req.Method == "GET" {
  46. r.HTML(200, "user/password", data)
  47. return
  48. }
  49. user := auth.SignedInUser(session)
  50. newUser := &models.User{Passwd: form.NewPasswd}
  51. if err := newUser.EncodePasswd(); err != nil {
  52. data["ErrorMsg"] = err
  53. log.Error("setting.UpdatePasswd: %v", err)
  54. r.HTML(200, "base/error", data)
  55. return
  56. }
  57. if user.Passwd != newUser.Passwd {
  58. data["HasError"] = true
  59. data["ErrorMsg"] = "Old password is not correct"
  60. } else if form.NewPasswd != form.RetypePasswd {
  61. data["HasError"] = true
  62. data["ErrorMsg"] = "New password and re-type password are not same"
  63. } else {
  64. user.Passwd = newUser.Passwd
  65. if err := models.UpdateUser(user); err != nil {
  66. data["ErrorMsg"] = err
  67. log.Error("setting.UpdatePasswd: %v", err)
  68. r.HTML(200, "base/error", data)
  69. return
  70. }
  71. data["IsSuccess"] = true
  72. }
  73. data["Owner"] = user
  74. r.HTML(200, "user/password", data)
  75. }
  76. func SettingSSHKeys(form auth.AddSSHKeyForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  77. data["Title"] = "SSH Keys"
  78. // Delete SSH key.
  79. if req.Method == "DELETE" || req.FormValue("_method") == "DELETE" {
  80. println(1)
  81. id, err := strconv.ParseInt(req.FormValue("id"), 10, 64)
  82. if err != nil {
  83. data["ErrorMsg"] = err
  84. log.Error("ssh.DelPublicKey: %v", err)
  85. r.JSON(200, map[string]interface{}{
  86. "ok": false,
  87. "err": err.Error(),
  88. })
  89. return
  90. }
  91. k := &models.PublicKey{
  92. Id: id,
  93. OwnerId: auth.SignedInId(session),
  94. }
  95. if err = models.DeletePublicKey(k); err != nil {
  96. data["ErrorMsg"] = err
  97. log.Error("ssh.DelPublicKey: %v", err)
  98. r.JSON(200, map[string]interface{}{
  99. "ok": false,
  100. "err": err.Error(),
  101. })
  102. } else {
  103. r.JSON(200, map[string]interface{}{
  104. "ok": true,
  105. })
  106. }
  107. return
  108. }
  109. // Add new SSH key.
  110. if req.Method == "POST" {
  111. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  112. r.HTML(200, "user/publickey", data)
  113. return
  114. }
  115. k := &models.PublicKey{OwnerId: auth.SignedInId(session),
  116. Name: form.KeyName,
  117. Content: form.KeyContent,
  118. }
  119. if err := models.AddPublicKey(k); err != nil {
  120. data["ErrorMsg"] = err
  121. log.Error("ssh.AddPublicKey: %v", err)
  122. r.HTML(200, "base/error", data)
  123. return
  124. } else {
  125. data["AddSSHKeySuccess"] = true
  126. }
  127. }
  128. // List existed SSH keys.
  129. keys, err := models.ListPublicKey(auth.SignedInId(session))
  130. if err != nil {
  131. data["ErrorMsg"] = err
  132. log.Error("ssh.ListPublicKey: %v", err)
  133. r.HTML(200, "base/error", data)
  134. return
  135. }
  136. data["PageIsUserSetting"] = true
  137. data["Keys"] = keys
  138. r.HTML(200, "user/publickey", data)
  139. }