123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package db
- import (
- "context"
- "fmt"
- _ "image/jpeg"
- "os"
- "strings"
- "time"
- log "unknwon.dev/clog/v2"
- "xorm.io/xorm"
- "github.com/gogs/git-module"
- "gogs.io/gogs/internal/conf"
- "gogs.io/gogs/internal/repoutil"
- "gogs.io/gogs/internal/userutil"
- )
- // TODO(unknwon): Delete me once refactoring is done.
- func (u *User) BeforeInsert() {
- u.CreatedUnix = time.Now().Unix()
- u.UpdatedUnix = u.CreatedUnix
- }
- // TODO(unknwon): Delete me once refactoring is done.
- func (u *User) AfterSet(colName string, _ xorm.Cell) {
- switch colName {
- case "created_unix":
- u.Created = time.Unix(u.CreatedUnix, 0).Local()
- case "updated_unix":
- u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
- }
- }
- // deleteBeans deletes all given beans, beans should contain delete conditions.
- func deleteBeans(e Engine, beans ...interface{}) (err error) {
- for i := range beans {
- if _, err = e.Delete(beans[i]); err != nil {
- return err
- }
- }
- return nil
- }
- // FIXME: need some kind of mechanism to record failure. HINT: system notice
- func deleteUser(e *xorm.Session, u *User) error {
- // Note: A user owns any repository or belongs to any organization
- // cannot perform delete operation.
- // Check ownership of repository.
- count, err := getRepositoryCount(e, u)
- if err != nil {
- return fmt.Errorf("GetRepositoryCount: %v", err)
- } else if count > 0 {
- return ErrUserOwnRepos{UID: u.ID}
- }
- // Check membership of organization.
- count, err = u.getOrganizationCount(e)
- if err != nil {
- return fmt.Errorf("GetOrganizationCount: %v", err)
- } else if count > 0 {
- return ErrUserHasOrgs{UID: u.ID}
- }
- // ***** START: Watch *****
- watches := make([]*Watch, 0, 10)
- if err = e.Find(&watches, &Watch{UserID: u.ID}); err != nil {
- return fmt.Errorf("get all watches: %v", err)
- }
- for i := range watches {
- if _, err = e.Exec("UPDATE `repository` SET num_watches=num_watches-1 WHERE id=?", watches[i].RepoID); err != nil {
- return fmt.Errorf("decrease repository watch number[%d]: %v", watches[i].RepoID, err)
- }
- }
- // ***** END: Watch *****
- // ***** START: Star *****
- stars := make([]*Star, 0, 10)
- if err = e.Find(&stars, &Star{UID: u.ID}); err != nil {
- return fmt.Errorf("get all stars: %v", err)
- }
- for i := range stars {
- if _, err = e.Exec("UPDATE `repository` SET num_stars=num_stars-1 WHERE id=?", stars[i].RepoID); err != nil {
- return fmt.Errorf("decrease repository star number[%d]: %v", stars[i].RepoID, err)
- }
- }
- // ***** END: Star *****
- // ***** START: Follow *****
- followers := make([]*Follow, 0, 10)
- if err = e.Find(&followers, &Follow{UserID: u.ID}); err != nil {
- return fmt.Errorf("get all followers: %v", err)
- }
- for i := range followers {
- if _, err = e.Exec("UPDATE `user` SET num_followers=num_followers-1 WHERE id=?", followers[i].UserID); err != nil {
- return fmt.Errorf("decrease user follower number[%d]: %v", followers[i].UserID, err)
- }
- }
- // ***** END: Follow *****
- if err = deleteBeans(e,
- &AccessToken{UserID: u.ID},
- &Collaboration{UserID: u.ID},
- &Access{UserID: u.ID},
- &Watch{UserID: u.ID},
- &Star{UID: u.ID},
- &Follow{FollowID: u.ID},
- &Action{UserID: u.ID},
- &IssueUser{UID: u.ID},
- &EmailAddress{UserID: u.ID},
- ); err != nil {
- return fmt.Errorf("deleteBeans: %v", err)
- }
- // ***** START: PublicKey *****
- keys := make([]*PublicKey, 0, 10)
- if err = e.Find(&keys, &PublicKey{OwnerID: u.ID}); err != nil {
- return fmt.Errorf("get all public keys: %v", err)
- }
- keyIDs := make([]int64, len(keys))
- for i := range keys {
- keyIDs[i] = keys[i].ID
- }
- if err = deletePublicKeys(e, keyIDs...); err != nil {
- return fmt.Errorf("deletePublicKeys: %v", err)
- }
- // ***** END: PublicKey *****
- // Clear assignee.
- if _, err = e.Exec("UPDATE `issue` SET assignee_id=0 WHERE assignee_id=?", u.ID); err != nil {
- return fmt.Errorf("clear assignee: %v", err)
- }
- if _, err = e.ID(u.ID).Delete(new(User)); err != nil {
- return fmt.Errorf("Delete: %v", err)
- }
- // FIXME: system notice
- // Note: There are something just cannot be roll back,
- // so just keep error logs of those operations.
- _ = os.RemoveAll(repoutil.UserPath(u.Name))
- _ = os.Remove(userutil.CustomAvatarPath(u.ID))
- return nil
- }
- // Deprecated: Use OrgsUsers.CountByUser instead.
- //
- // TODO(unknwon): Delete me once no more call sites in this file.
- func (u *User) getOrganizationCount(e Engine) (int64, error) {
- return e.Where("uid=?", u.ID).Count(new(OrgUser))
- }
- // DeleteUser completely and permanently deletes everything of a user,
- // but issues/comments/pulls will be kept and shown as someone has been deleted.
- func DeleteUser(u *User) (err error) {
- sess := x.NewSession()
- defer sess.Close()
- if err = sess.Begin(); err != nil {
- return err
- }
- if err = deleteUser(sess, u); err != nil {
- // Note: don't wrapper error here.
- return err
- }
- if err = sess.Commit(); err != nil {
- return err
- }
- return RewriteAuthorizedKeys()
- }
- // DeleteInactivateUsers deletes all inactivate users and email addresses.
- func DeleteInactivateUsers() (err error) {
- users := make([]*User, 0, 10)
- if err = x.Where("is_active = ?", false).Find(&users); err != nil {
- return fmt.Errorf("get all inactive users: %v", err)
- }
- // FIXME: should only update authorized_keys file once after all deletions.
- for _, u := range users {
- if err = DeleteUser(u); err != nil {
- // Ignore users that were set inactive by admin.
- if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {
- continue
- }
- return err
- }
- }
- _, err = x.Where("is_activated = ?", false).Delete(new(EmailAddress))
- return err
- }
- func getUserByID(e Engine, id int64) (*User, error) {
- u := new(User)
- has, err := e.ID(id).Get(u)
- if err != nil {
- return nil, err
- } else if !has {
- return nil, ErrUserNotExist{args: map[string]interface{}{"userID": id}}
- }
- return u, nil
- }
- // GetUserEmailsByNames returns a list of e-mails corresponds to names.
- func GetUserEmailsByNames(names []string) []string {
- mails := make([]string, 0, len(names))
- for _, name := range names {
- u, err := Users.GetByUsername(context.TODO(), name)
- if err != nil {
- continue
- }
- if u.IsMailable() {
- mails = append(mails, u.Email)
- }
- }
- return mails
- }
- // UserCommit represents a commit with validation of user.
- type UserCommit struct {
- User *User
- *git.Commit
- }
- // ValidateCommitWithEmail checks if author's e-mail of commit is corresponding to a user.
- func ValidateCommitWithEmail(c *git.Commit) *User {
- u, err := Users.GetByEmail(context.TODO(), c.Author.Email)
- if err != nil {
- return nil
- }
- return u
- }
- // ValidateCommitsWithEmails checks if authors' e-mails of commits are corresponding to users.
- func ValidateCommitsWithEmails(oldCommits []*git.Commit) []*UserCommit {
- emails := make(map[string]*User)
- newCommits := make([]*UserCommit, len(oldCommits))
- for i := range oldCommits {
- var u *User
- if v, ok := emails[oldCommits[i].Author.Email]; !ok {
- u, _ = Users.GetByEmail(context.TODO(), oldCommits[i].Author.Email)
- emails[oldCommits[i].Author.Email] = u
- } else {
- u = v
- }
- newCommits[i] = &UserCommit{
- User: u,
- Commit: oldCommits[i],
- }
- }
- return newCommits
- }
- type SearchUserOptions struct {
- Keyword string
- Type UserType
- OrderBy string
- Page int
- PageSize int // Can be smaller than or equal to setting.UI.ExplorePagingNum
- }
- // SearchUserByName takes keyword and part of user name to search,
- // it returns results in given range and number of total results.
- func SearchUserByName(opts *SearchUserOptions) (users []*User, _ int64, _ error) {
- if opts.Keyword == "" {
- return users, 0, nil
- }
- opts.Keyword = strings.ToLower(opts.Keyword)
- if opts.PageSize <= 0 || opts.PageSize > conf.UI.ExplorePagingNum {
- opts.PageSize = conf.UI.ExplorePagingNum
- }
- if opts.Page <= 0 {
- opts.Page = 1
- }
- searchQuery := "%" + opts.Keyword + "%"
- users = make([]*User, 0, opts.PageSize)
- // Append conditions
- sess := x.Where("LOWER(lower_name) LIKE ?", searchQuery).
- Or("LOWER(full_name) LIKE ?", searchQuery).
- And("type = ?", opts.Type)
- countSess := *sess
- count, err := countSess.Count(new(User))
- if err != nil {
- return nil, 0, fmt.Errorf("Count: %v", err)
- }
- if len(opts.OrderBy) > 0 {
- sess.OrderBy(opts.OrderBy)
- }
- return users, count, sess.Limit(opts.PageSize, (opts.Page-1)*opts.PageSize).Find(&users)
- }
- // GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
- func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
- accesses := make([]*Access, 0, 10)
- if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {
- return nil, err
- }
- repos := make(map[*Repository]AccessMode, len(accesses))
- for _, access := range accesses {
- repo, err := GetRepositoryByID(access.RepoID)
- if err != nil {
- if IsErrRepoNotExist(err) {
- log.Error("Failed to get repository by ID: %v", err)
- continue
- }
- return nil, err
- }
- if repo.OwnerID == u.ID {
- continue
- }
- repos[repo] = access.Mode
- }
- return repos, nil
- }
- // GetAccessibleRepositories finds repositories which the user has access but does not own.
- // If limit is smaller than 1 means returns all found results.
- func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
- sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix")
- if limit > 0 {
- sess.Limit(limit)
- repos = make([]*Repository, 0, limit)
- } else {
- repos = make([]*Repository, 0, 10)
- }
- return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos)
- }
|