setting.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "net/http"
  7. "strconv"
  8. "github.com/martini-contrib/render"
  9. "github.com/martini-contrib/sessions"
  10. "github.com/gogits/gogs/models"
  11. "github.com/gogits/gogs/modules/auth"
  12. "github.com/gogits/gogs/modules/base"
  13. "github.com/gogits/gogs/modules/log"
  14. )
  15. func Setting(form auth.UpdateProfileForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  16. data["Title"] = "Setting"
  17. data["PageIsUserSetting"] = true
  18. user := auth.SignedInUser(session)
  19. if req.Method == "GET" {
  20. data["Owner"] = user
  21. r.HTML(200, "user/setting", data)
  22. return
  23. }
  24. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  25. r.HTML(200, "user/setting", data)
  26. return
  27. }
  28. user.Email = form.Email
  29. user.Website = form.Website
  30. user.Location = form.Location
  31. user.Avatar = base.EncodeMd5(form.Avatar)
  32. if err := models.UpdateUser(user); err != nil {
  33. data["ErrorMsg"] = err
  34. log.Error("setting.Setting: %v", err)
  35. r.HTML(200, "base/error", data)
  36. return
  37. }
  38. r.HTML(200, "user/setting", data)
  39. }
  40. func SettingEmailPassword(r render.Render, data base.TmplData, session sessions.Session, req *http.Request) {
  41. data["Title"] = "Email & Password"
  42. data["PageIsUserSetting"] = true
  43. data["IsPwdSuccess"] = (req.FormValue("password") == "true")
  44. r.HTML(200, "user/email_password", data)
  45. }
  46. func UpdatePasswd(form auth.UpdatePasswdForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  47. data["Title"] = "Setting"
  48. data["PageIsUserSetting"] = true
  49. user := auth.SignedInUser(session)
  50. newUser := &models.User{Passwd: form.OldPasswd}
  51. if err := newUser.EncodePasswd(); err != nil {
  52. data["ErrorMsg"] = err
  53. log.Error("setting.UpdatePasswd: %v", err)
  54. r.HTML(200, "base/error", data)
  55. return
  56. }
  57. if user.Passwd != newUser.Passwd {
  58. data["HasError"] = true
  59. data["ErrorMsg"] = "Old password is not correct"
  60. } else if form.NewPasswd != form.RetypePasswd {
  61. data["HasError"] = true
  62. data["ErrorMsg"] = "New password and re-type password are not same"
  63. } else {
  64. user.Passwd = newUser.Passwd
  65. if err := models.UpdateUser(user); err != nil {
  66. data["ErrorMsg"] = err
  67. log.Error("setting.Setting: %v", err)
  68. r.HTML(200, "base/error", data)
  69. return
  70. }
  71. }
  72. data["Owner"] = user
  73. r.HTML(200, "user/setting", data)
  74. }
  75. func SettingSSHKeys(form auth.AddSSHKeyForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  76. data["Title"] = "SSH Keys"
  77. // Delete SSH key.
  78. if req.Method == "DELETE" || req.FormValue("_method") == "DELETE" {
  79. println(1)
  80. id, err := strconv.ParseInt(req.FormValue("id"), 10, 64)
  81. if err != nil {
  82. data["ErrorMsg"] = err
  83. log.Error("ssh.DelPublicKey: %v", err)
  84. r.JSON(200, map[string]interface{}{
  85. "ok": false,
  86. "err": err.Error(),
  87. })
  88. return
  89. }
  90. k := &models.PublicKey{
  91. Id: id,
  92. OwnerId: auth.SignedInId(session),
  93. }
  94. if err = models.DeletePublicKey(k); err != nil {
  95. data["ErrorMsg"] = err
  96. log.Error("ssh.DelPublicKey: %v", err)
  97. r.JSON(200, map[string]interface{}{
  98. "ok": false,
  99. "err": err.Error(),
  100. })
  101. } else {
  102. r.JSON(200, map[string]interface{}{
  103. "ok": true,
  104. })
  105. }
  106. return
  107. }
  108. // Add new SSH key.
  109. if req.Method == "POST" {
  110. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  111. r.HTML(200, "user/publickey", data)
  112. return
  113. }
  114. k := &models.PublicKey{OwnerId: auth.SignedInId(session),
  115. Name: form.KeyName,
  116. Content: form.KeyContent,
  117. }
  118. if err := models.AddPublicKey(k); err != nil {
  119. data["ErrorMsg"] = err
  120. log.Error("ssh.AddPublicKey: %v", err)
  121. r.HTML(200, "base/error", data)
  122. return
  123. } else {
  124. data["AddSSHKeySuccess"] = true
  125. }
  126. }
  127. // List existed SSH keys.
  128. keys, err := models.ListPublicKey(auth.SignedInId(session))
  129. if err != nil {
  130. data["ErrorMsg"] = err
  131. log.Error("ssh.ListPublicKey: %v", err)
  132. r.HTML(200, "base/error", data)
  133. return
  134. }
  135. data["PageIsUserSetting"] = true
  136. data["Keys"] = keys
  137. r.HTML(200, "user/publickey", data)
  138. }