setting.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "strings"
  7. "github.com/gogits/gogs/models"
  8. "github.com/gogits/gogs/modules/auth"
  9. "github.com/gogits/gogs/modules/base"
  10. "github.com/gogits/gogs/modules/log"
  11. "github.com/gogits/gogs/modules/middleware"
  12. )
  13. func Setting(ctx *middleware.Context) {
  14. ctx.Data["Title"] = "Setting"
  15. ctx.Data["PageIsUserSetting"] = true
  16. ctx.Data["IsUserPageSetting"] = true
  17. ctx.Data["Owner"] = ctx.User
  18. ctx.HTML(200, "user/setting")
  19. }
  20. func SettingPost(ctx *middleware.Context, form auth.UpdateProfileForm) {
  21. ctx.Data["Title"] = "Setting"
  22. ctx.Data["PageIsUserSetting"] = true
  23. ctx.Data["IsUserPageSetting"] = true
  24. if ctx.HasError() {
  25. ctx.HTML(200, "user/setting")
  26. return
  27. }
  28. ctx.Data["Owner"] = ctx.User
  29. // Check if user name has been changed.
  30. if ctx.User.Name != form.UserName {
  31. isExist, err := models.IsUserExist(form.UserName)
  32. if err != nil {
  33. ctx.Handle(500, "user.Setting(update: check existence)", err)
  34. return
  35. } else if isExist {
  36. ctx.RenderWithErr("User name has been taken.", "user/setting", &form)
  37. return
  38. } else if err = models.ChangeUserName(ctx.User, form.UserName); err != nil {
  39. ctx.Handle(500, "user.Setting(change user name)", err)
  40. return
  41. }
  42. log.Trace("%s User name changed: %s -> %s", ctx.Req.RequestURI, ctx.User.Name, form.UserName)
  43. ctx.User.Name = form.UserName
  44. }
  45. ctx.User.FullName = form.FullName
  46. ctx.User.Email = form.Email
  47. ctx.User.Website = form.Website
  48. ctx.User.Location = form.Location
  49. ctx.User.Avatar = base.EncodeMd5(form.Avatar)
  50. ctx.User.AvatarEmail = form.Avatar
  51. if err := models.UpdateUser(ctx.User); err != nil {
  52. ctx.Handle(500, "setting.Setting", err)
  53. return
  54. }
  55. log.Trace("%s User setting updated: %s", ctx.Req.RequestURI, ctx.User.LowerName)
  56. ctx.Flash.Success("Your profile has been successfully updated.")
  57. ctx.Redirect("/user/settings")
  58. }
  59. func SettingSocial(ctx *middleware.Context) {
  60. ctx.Data["Title"] = "Social Account"
  61. ctx.Data["PageIsUserSetting"] = true
  62. ctx.Data["IsUserPageSettingSocial"] = true
  63. // Unbind social account.
  64. remove, _ := base.StrTo(ctx.Query("remove")).Int64()
  65. if remove > 0 {
  66. if err := models.DeleteOauth2ById(remove); err != nil {
  67. ctx.Handle(500, "user.SettingSocial(DeleteOauth2ById)", err)
  68. return
  69. }
  70. ctx.Flash.Success("OAuth2 has been unbinded.")
  71. ctx.Redirect("/user/settings/social")
  72. return
  73. }
  74. var err error
  75. ctx.Data["Socials"], err = models.GetOauthByUserId(ctx.User.Id)
  76. if err != nil {
  77. ctx.Handle(500, "user.SettingSocial(GetOauthByUserId)", err)
  78. return
  79. }
  80. ctx.HTML(200, "user/social")
  81. }
  82. func SettingPassword(ctx *middleware.Context) {
  83. ctx.Data["Title"] = "Password"
  84. ctx.Data["PageIsUserSetting"] = true
  85. ctx.Data["IsUserPageSettingPasswd"] = true
  86. ctx.HTML(200, "user/password")
  87. }
  88. func SettingPasswordPost(ctx *middleware.Context, form auth.UpdatePasswdForm) {
  89. ctx.Data["Title"] = "Password"
  90. ctx.Data["PageIsUserSetting"] = true
  91. ctx.Data["IsUserPageSettingPasswd"] = true
  92. if ctx.HasError() {
  93. ctx.HTML(200, "user/password")
  94. return
  95. }
  96. tmpUser := &models.User{
  97. Passwd: form.OldPasswd,
  98. Salt: ctx.User.Salt,
  99. }
  100. tmpUser.EncodePasswd()
  101. if ctx.User.Passwd != tmpUser.Passwd {
  102. ctx.Flash.Error("Old password is not correct.")
  103. } else if form.NewPasswd != form.RetypePasswd {
  104. ctx.Flash.Error("New password and re-type password are not same.")
  105. } else {
  106. ctx.User.Passwd = form.NewPasswd
  107. ctx.User.Salt = models.GetUserSalt()
  108. ctx.User.EncodePasswd()
  109. if err := models.UpdateUser(ctx.User); err != nil {
  110. ctx.Handle(200, "setting.SettingPassword", err)
  111. return
  112. }
  113. log.Trace("%s User password updated: %s", ctx.Req.RequestURI, ctx.User.LowerName)
  114. ctx.Flash.Success("Password is changed successfully. You can now sign in via new password.")
  115. }
  116. ctx.Redirect("/user/settings/password")
  117. }
  118. func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) {
  119. ctx.Data["Title"] = "SSH Keys"
  120. ctx.Data["PageIsUserSetting"] = true
  121. ctx.Data["IsUserPageSettingSSH"] = true
  122. // Delete SSH key.
  123. if ctx.Req.Method == "DELETE" || ctx.Query("_method") == "DELETE" {
  124. id, err := base.StrTo(ctx.Query("id")).Int64()
  125. if err != nil {
  126. log.Error("ssh.DelPublicKey: %v", err)
  127. ctx.JSON(200, map[string]interface{}{
  128. "ok": false,
  129. "err": err.Error(),
  130. })
  131. return
  132. }
  133. if err = models.DeletePublicKey(&models.PublicKey{Id: id}); err != nil {
  134. log.Error("ssh.DelPublicKey: %v", err)
  135. ctx.JSON(200, map[string]interface{}{
  136. "ok": false,
  137. "err": err.Error(),
  138. })
  139. } else {
  140. log.Trace("%s User SSH key deleted: %s", ctx.Req.RequestURI, ctx.User.LowerName)
  141. ctx.JSON(200, map[string]interface{}{
  142. "ok": true,
  143. })
  144. }
  145. return
  146. }
  147. var err error
  148. // List existed SSH keys.
  149. ctx.Data["Keys"], err = models.ListPublicKey(ctx.User.Id)
  150. if err != nil {
  151. ctx.Handle(500, "ssh.ListPublicKey", err)
  152. return
  153. }
  154. // Add new SSH key.
  155. if ctx.Req.Method == "POST" {
  156. if ctx.HasError() {
  157. ctx.HTML(200, "user/publickey")
  158. return
  159. }
  160. if len(form.KeyContent) < 100 || !strings.HasPrefix(form.KeyContent, "ssh-rsa") {
  161. ctx.Flash.Error("SSH key content is not valid.")
  162. ctx.Redirect("/user/settings/ssh")
  163. return
  164. }
  165. k := &models.PublicKey{
  166. OwnerId: ctx.User.Id,
  167. Name: form.KeyName,
  168. Content: form.KeyContent,
  169. }
  170. if err := models.AddPublicKey(k); err != nil {
  171. if err.Error() == models.ErrKeyAlreadyExist.Error() {
  172. ctx.RenderWithErr("Public key name has been used", "user/publickey", &form)
  173. return
  174. }
  175. ctx.Handle(500, "ssh.AddPublicKey", err)
  176. return
  177. } else {
  178. log.Trace("%s User SSH key added: %s", ctx.Req.RequestURI, ctx.User.LowerName)
  179. ctx.Flash.Success("New SSH Key has been added!")
  180. ctx.Redirect("/user/settings/ssh")
  181. return
  182. }
  183. }
  184. ctx.HTML(200, "user/publickey")
  185. }
  186. func SettingNotification(ctx *middleware.Context) {
  187. // TODO: user setting notification
  188. ctx.Data["Title"] = "Notification"
  189. ctx.Data["PageIsUserSetting"] = true
  190. ctx.Data["IsUserPageSettingNotify"] = true
  191. ctx.HTML(200, "user/notification")
  192. }
  193. func SettingSecurity(ctx *middleware.Context) {
  194. // TODO: user setting security
  195. ctx.Data["Title"] = "Security"
  196. ctx.Data["PageIsUserSetting"] = true
  197. ctx.Data["IsUserPageSettingSecurity"] = true
  198. ctx.HTML(200, "user/security")
  199. }