users.go 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "fmt"
  8. "strings"
  9. "time"
  10. "github.com/go-macaron/binding"
  11. "github.com/pkg/errors"
  12. "gorm.io/gorm"
  13. "gogs.io/gogs/internal/auth"
  14. "gogs.io/gogs/internal/cryptoutil"
  15. "gogs.io/gogs/internal/errutil"
  16. )
  17. // UsersStore is the persistent interface for users.
  18. //
  19. // NOTE: All methods are sorted in alphabetical order.
  20. type UsersStore interface {
  21. // Authenticate validates username and password via given login source ID. It
  22. // returns ErrUserNotExist when the user was not found.
  23. //
  24. // When the "loginSourceID" is negative, it aborts the process and returns
  25. // ErrUserNotExist if the user was not found in the database.
  26. //
  27. // When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
  28. // if the user has different login source ID than the "loginSourceID".
  29. //
  30. // When the "loginSourceID" is positive, it tries to authenticate via given
  31. // login source and creates a new user when not yet exists in the database.
  32. Authenticate(ctx context.Context, username, password string, loginSourceID int64) (*User, error)
  33. // Create creates a new user and persists to database. It returns
  34. // ErrUserAlreadyExist when a user with same name already exists, or
  35. // ErrEmailAlreadyUsed if the email has been used by another user.
  36. Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error)
  37. // GetByEmail returns the user (not organization) with given email. It ignores
  38. // records with unverified emails and returns ErrUserNotExist when not found.
  39. GetByEmail(ctx context.Context, email string) (*User, error)
  40. // GetByID returns the user with given ID. It returns ErrUserNotExist when not
  41. // found.
  42. GetByID(ctx context.Context, id int64) (*User, error)
  43. // GetByUsername returns the user with given username. It returns
  44. // ErrUserNotExist when not found.
  45. GetByUsername(ctx context.Context, username string) (*User, error)
  46. // HasForkedRepository returns true if the user has forked given repository.
  47. HasForkedRepository(ctx context.Context, userID, repoID int64) bool
  48. }
  49. var Users UsersStore
  50. // BeforeCreate implements the GORM create hook.
  51. func (u *User) BeforeCreate(tx *gorm.DB) error {
  52. if u.CreatedUnix == 0 {
  53. u.CreatedUnix = tx.NowFunc().Unix()
  54. u.UpdatedUnix = u.CreatedUnix
  55. }
  56. return nil
  57. }
  58. // AfterFind implements the GORM query hook.
  59. func (u *User) AfterFind(_ *gorm.DB) error {
  60. u.Created = time.Unix(u.CreatedUnix, 0).Local()
  61. u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
  62. return nil
  63. }
  64. // IsLocal returns true if user is created as local account.
  65. func (u *User) IsLocal() bool {
  66. return u.LoginSource <= 0
  67. }
  68. var _ UsersStore = (*users)(nil)
  69. type users struct {
  70. *gorm.DB
  71. }
  72. // NewUsersStore returns a persistent interface for users with given database
  73. // connection.
  74. func NewUsersStore(db *gorm.DB) UsersStore {
  75. return &users{DB: db}
  76. }
  77. type ErrLoginSourceMismatch struct {
  78. args errutil.Args
  79. }
  80. func (err ErrLoginSourceMismatch) Error() string {
  81. return fmt.Sprintf("login source mismatch: %v", err.args)
  82. }
  83. func (db *users) Authenticate(ctx context.Context, login, password string, loginSourceID int64) (*User, error) {
  84. login = strings.ToLower(login)
  85. query := db.WithContext(ctx)
  86. if strings.Contains(login, "@") {
  87. query = query.Where("email = ?", login)
  88. } else {
  89. query = query.Where("lower_name = ?", login)
  90. }
  91. user := new(User)
  92. err := query.First(user).Error
  93. if err != nil && err != gorm.ErrRecordNotFound {
  94. return nil, errors.Wrap(err, "get user")
  95. }
  96. var authSourceID int64 // The login source ID will be used to authenticate the user
  97. createNewUser := false // Whether to create a new user after successful authentication
  98. // User found in the database
  99. if err == nil {
  100. // Note: This check is unnecessary but to reduce user confusion at login page
  101. // and make it more consistent from user's perspective.
  102. if loginSourceID >= 0 && user.LoginSource != loginSourceID {
  103. return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
  104. }
  105. // Validate password hash fetched from database for local accounts.
  106. if user.IsLocal() {
  107. if user.ValidatePassword(password) {
  108. return user, nil
  109. }
  110. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login, "userID": user.ID}}
  111. }
  112. authSourceID = user.LoginSource
  113. } else {
  114. // Non-local login source is always greater than 0.
  115. if loginSourceID <= 0 {
  116. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login}}
  117. }
  118. authSourceID = loginSourceID
  119. createNewUser = true
  120. }
  121. source, err := LoginSources.GetByID(ctx, authSourceID)
  122. if err != nil {
  123. return nil, errors.Wrap(err, "get login source")
  124. }
  125. if !source.IsActived {
  126. return nil, errors.Errorf("login source %d is not activated", source.ID)
  127. }
  128. extAccount, err := source.Provider.Authenticate(login, password)
  129. if err != nil {
  130. return nil, err
  131. }
  132. if !createNewUser {
  133. return user, nil
  134. }
  135. // Validate username make sure it satisfies requirement.
  136. if binding.AlphaDashDotPattern.MatchString(extAccount.Name) {
  137. return nil, fmt.Errorf("invalid pattern for attribute 'username' [%s]: must be valid alpha or numeric or dash(-_) or dot characters", extAccount.Name)
  138. }
  139. return db.Create(ctx, extAccount.Name, extAccount.Email,
  140. CreateUserOptions{
  141. FullName: extAccount.FullName,
  142. LoginSource: authSourceID,
  143. LoginName: extAccount.Login,
  144. Location: extAccount.Location,
  145. Website: extAccount.Website,
  146. Activated: true,
  147. Admin: extAccount.Admin,
  148. },
  149. )
  150. }
  151. type CreateUserOptions struct {
  152. FullName string
  153. Password string
  154. LoginSource int64
  155. LoginName string
  156. Location string
  157. Website string
  158. Activated bool
  159. Admin bool
  160. }
  161. type ErrUserAlreadyExist struct {
  162. args errutil.Args
  163. }
  164. func IsErrUserAlreadyExist(err error) bool {
  165. _, ok := err.(ErrUserAlreadyExist)
  166. return ok
  167. }
  168. func (err ErrUserAlreadyExist) Error() string {
  169. return fmt.Sprintf("user already exists: %v", err.args)
  170. }
  171. type ErrEmailAlreadyUsed struct {
  172. args errutil.Args
  173. }
  174. func IsErrEmailAlreadyUsed(err error) bool {
  175. _, ok := err.(ErrEmailAlreadyUsed)
  176. return ok
  177. }
  178. func (err ErrEmailAlreadyUsed) Email() string {
  179. email, ok := err.args["email"].(string)
  180. if ok {
  181. return email
  182. }
  183. return "<email not found>"
  184. }
  185. func (err ErrEmailAlreadyUsed) Error() string {
  186. return fmt.Sprintf("email has been used: %v", err.args)
  187. }
  188. func (db *users) Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error) {
  189. err := isUsernameAllowed(username)
  190. if err != nil {
  191. return nil, err
  192. }
  193. _, err = db.GetByUsername(ctx, username)
  194. if err == nil {
  195. return nil, ErrUserAlreadyExist{args: errutil.Args{"name": username}}
  196. } else if !IsErrUserNotExist(err) {
  197. return nil, err
  198. }
  199. _, err = db.GetByEmail(ctx, email)
  200. if err == nil {
  201. return nil, ErrEmailAlreadyUsed{args: errutil.Args{"email": email}}
  202. } else if !IsErrUserNotExist(err) {
  203. return nil, err
  204. }
  205. user := &User{
  206. LowerName: strings.ToLower(username),
  207. Name: username,
  208. FullName: opts.FullName,
  209. Email: email,
  210. Passwd: opts.Password,
  211. LoginSource: opts.LoginSource,
  212. LoginName: opts.LoginName,
  213. Location: opts.Location,
  214. Website: opts.Website,
  215. MaxRepoCreation: -1,
  216. IsActive: opts.Activated,
  217. IsAdmin: opts.Admin,
  218. Avatar: cryptoutil.MD5(email),
  219. AvatarEmail: email,
  220. }
  221. user.Rands, err = GetUserSalt()
  222. if err != nil {
  223. return nil, err
  224. }
  225. user.Salt, err = GetUserSalt()
  226. if err != nil {
  227. return nil, err
  228. }
  229. user.EncodePassword()
  230. return user, db.WithContext(ctx).Create(user).Error
  231. }
  232. var _ errutil.NotFound = (*ErrUserNotExist)(nil)
  233. type ErrUserNotExist struct {
  234. args errutil.Args
  235. }
  236. func IsErrUserNotExist(err error) bool {
  237. _, ok := err.(ErrUserNotExist)
  238. return ok
  239. }
  240. func (err ErrUserNotExist) Error() string {
  241. return fmt.Sprintf("user does not exist: %v", err.args)
  242. }
  243. func (ErrUserNotExist) NotFound() bool {
  244. return true
  245. }
  246. func (db *users) GetByEmail(ctx context.Context, email string) (*User, error) {
  247. email = strings.ToLower(email)
  248. if email == "" {
  249. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  250. }
  251. // First try to find the user by primary email
  252. user := new(User)
  253. err := db.WithContext(ctx).
  254. Where("email = ? AND type = ? AND is_active = ?", email, UserIndividual, true).
  255. First(user).
  256. Error
  257. if err == nil {
  258. return user, nil
  259. } else if err != gorm.ErrRecordNotFound {
  260. return nil, err
  261. }
  262. // Otherwise, check activated email addresses
  263. emailAddress := new(EmailAddress)
  264. err = db.WithContext(ctx).
  265. Where("email = ? AND is_activated = ?", email, true).
  266. First(emailAddress).
  267. Error
  268. if err != nil {
  269. if err == gorm.ErrRecordNotFound {
  270. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  271. }
  272. return nil, err
  273. }
  274. return db.GetByID(ctx, emailAddress.UID)
  275. }
  276. func (db *users) GetByID(ctx context.Context, id int64) (*User, error) {
  277. user := new(User)
  278. err := db.WithContext(ctx).Where("id = ?", id).First(user).Error
  279. if err != nil {
  280. if err == gorm.ErrRecordNotFound {
  281. return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
  282. }
  283. return nil, err
  284. }
  285. return user, nil
  286. }
  287. func (db *users) GetByUsername(ctx context.Context, username string) (*User, error) {
  288. user := new(User)
  289. err := db.WithContext(ctx).Where("lower_name = ?", strings.ToLower(username)).First(user).Error
  290. if err != nil {
  291. if err == gorm.ErrRecordNotFound {
  292. return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
  293. }
  294. return nil, err
  295. }
  296. return user, nil
  297. }
  298. func (db *users) HasForkedRepository(ctx context.Context, userID, repoID int64) bool {
  299. var count int64
  300. db.WithContext(ctx).Model(new(Repository)).Where("owner_id = ? AND fork_id = ?", userID, repoID).Count(&count)
  301. return count > 0
  302. }