users.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "fmt"
  7. "strings"
  8. "time"
  9. "github.com/pkg/errors"
  10. "gorm.io/gorm"
  11. "gogs.io/gogs/internal/cryptoutil"
  12. "gogs.io/gogs/internal/errutil"
  13. )
  14. // UsersStore is the persistent interface for users.
  15. //
  16. // NOTE: All methods are sorted in alphabetical order.
  17. type UsersStore interface {
  18. // Authenticate validates username and password via given login source ID.
  19. // It returns ErrUserNotExist when the user was not found.
  20. //
  21. // When the "loginSourceID" is negative, it aborts the process and returns
  22. // ErrUserNotExist if the user was not found in the database.
  23. //
  24. // When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
  25. // if the user has different login source ID than the "loginSourceID".
  26. //
  27. // When the "loginSourceID" is positive, it tries to authenticate via given
  28. // login source and creates a new user when not yet exists in the database.
  29. Authenticate(username, password string, loginSourceID int64) (*User, error)
  30. // Create creates a new user and persist to database.
  31. // It returns ErrUserAlreadyExist when a user with same name already exists,
  32. // or ErrEmailAlreadyUsed if the email has been used by another user.
  33. Create(opts CreateUserOpts) (*User, error)
  34. // GetByEmail returns the user (not organization) with given email.
  35. // It ignores records with unverified emails and returns ErrUserNotExist when not found.
  36. GetByEmail(email string) (*User, error)
  37. // GetByID returns the user with given ID. It returns ErrUserNotExist when not found.
  38. GetByID(id int64) (*User, error)
  39. // GetByUsername returns the user with given username. It returns ErrUserNotExist when not found.
  40. GetByUsername(username string) (*User, error)
  41. }
  42. var Users UsersStore
  43. // NOTE: This is a GORM create hook.
  44. func (u *User) BeforeCreate(tx *gorm.DB) error {
  45. if u.CreatedUnix == 0 {
  46. u.CreatedUnix = tx.NowFunc().Unix()
  47. u.UpdatedUnix = u.CreatedUnix
  48. }
  49. return nil
  50. }
  51. // NOTE: This is a GORM query hook.
  52. func (u *User) AfterFind(tx *gorm.DB) error {
  53. u.Created = time.Unix(u.CreatedUnix, 0).Local()
  54. u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
  55. return nil
  56. }
  57. var _ UsersStore = (*users)(nil)
  58. type users struct {
  59. *gorm.DB
  60. }
  61. type ErrLoginSourceMismatch struct {
  62. args errutil.Args
  63. }
  64. func (err ErrLoginSourceMismatch) Error() string {
  65. return fmt.Sprintf("login source mismatch: %v", err.args)
  66. }
  67. func (db *users) Authenticate(login, password string, loginSourceID int64) (*User, error) {
  68. login = strings.ToLower(login)
  69. var query *gorm.DB
  70. if strings.Contains(login, "@") {
  71. query = db.Where("email = ?", login)
  72. } else {
  73. query = db.Where("lower_name = ?", login)
  74. }
  75. user := new(User)
  76. err := query.First(user).Error
  77. if err != nil && err != gorm.ErrRecordNotFound {
  78. return nil, errors.Wrap(err, "get user")
  79. }
  80. // User found in the database
  81. if err == nil {
  82. // Note: This check is unnecessary but to reduce user confusion at login page
  83. // and make it more consistent from user's perspective.
  84. if loginSourceID >= 0 && user.LoginSource != loginSourceID {
  85. return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
  86. }
  87. // Validate password hash fetched from database for local accounts.
  88. if user.IsLocal() {
  89. if user.ValidatePassword(password) {
  90. return user, nil
  91. }
  92. return nil, ErrUserNotExist{args: map[string]interface{}{"userID": user.ID, "name": user.Name}}
  93. }
  94. source, err := LoginSources.GetByID(user.LoginSource)
  95. if err != nil {
  96. return nil, errors.Wrap(err, "get login source")
  97. }
  98. _, err = authenticateViaLoginSource(source, login, password, false)
  99. if err != nil {
  100. return nil, errors.Wrap(err, "authenticate via login source")
  101. }
  102. return user, nil
  103. }
  104. // Non-local login source is always greater than 0.
  105. if loginSourceID <= 0 {
  106. return nil, ErrUserNotExist{args: map[string]interface{}{"login": login}}
  107. }
  108. source, err := LoginSources.GetByID(loginSourceID)
  109. if err != nil {
  110. return nil, errors.Wrap(err, "get login source")
  111. }
  112. user, err = authenticateViaLoginSource(source, login, password, true)
  113. if err != nil {
  114. return nil, errors.Wrap(err, "authenticate via login source")
  115. }
  116. return user, nil
  117. }
  118. type CreateUserOpts struct {
  119. Name string
  120. Email string
  121. Password string
  122. LoginSource int64
  123. Activated bool
  124. }
  125. type ErrUserAlreadyExist struct {
  126. args errutil.Args
  127. }
  128. func IsErrUserAlreadyExist(err error) bool {
  129. _, ok := err.(ErrUserAlreadyExist)
  130. return ok
  131. }
  132. func (err ErrUserAlreadyExist) Error() string {
  133. return fmt.Sprintf("user already exists: %v", err.args)
  134. }
  135. type ErrEmailAlreadyUsed struct {
  136. args errutil.Args
  137. }
  138. func IsErrEmailAlreadyUsed(err error) bool {
  139. _, ok := err.(ErrEmailAlreadyUsed)
  140. return ok
  141. }
  142. func (err ErrEmailAlreadyUsed) Email() string {
  143. email, ok := err.args["email"].(string)
  144. if ok {
  145. return email
  146. }
  147. return "<email not found>"
  148. }
  149. func (err ErrEmailAlreadyUsed) Error() string {
  150. return fmt.Sprintf("email has been used: %v", err.args)
  151. }
  152. func (db *users) Create(opts CreateUserOpts) (*User, error) {
  153. err := isUsernameAllowed(opts.Name)
  154. if err != nil {
  155. return nil, err
  156. }
  157. _, err = db.GetByUsername(opts.Name)
  158. if err == nil {
  159. return nil, ErrUserAlreadyExist{args: errutil.Args{"name": opts.Name}}
  160. } else if !IsErrUserNotExist(err) {
  161. return nil, err
  162. }
  163. _, err = db.GetByEmail(opts.Email)
  164. if err == nil {
  165. return nil, ErrEmailAlreadyUsed{args: errutil.Args{"email": opts.Email}}
  166. } else if !IsErrUserNotExist(err) {
  167. return nil, err
  168. }
  169. user := &User{
  170. LowerName: strings.ToLower(opts.Name),
  171. Name: opts.Name,
  172. Email: opts.Email,
  173. Passwd: opts.Password,
  174. LoginSource: opts.LoginSource,
  175. MaxRepoCreation: -1,
  176. IsActive: opts.Activated,
  177. Avatar: cryptoutil.MD5(opts.Email),
  178. AvatarEmail: opts.Email,
  179. }
  180. user.Rands, err = GetUserSalt()
  181. if err != nil {
  182. return nil, err
  183. }
  184. user.Salt, err = GetUserSalt()
  185. if err != nil {
  186. return nil, err
  187. }
  188. user.EncodePassword()
  189. return user, db.DB.Create(user).Error
  190. }
  191. var _ errutil.NotFound = (*ErrUserNotExist)(nil)
  192. type ErrUserNotExist struct {
  193. args errutil.Args
  194. }
  195. func IsErrUserNotExist(err error) bool {
  196. _, ok := err.(ErrUserNotExist)
  197. return ok
  198. }
  199. func (err ErrUserNotExist) Error() string {
  200. return fmt.Sprintf("user does not exist: %v", err.args)
  201. }
  202. func (ErrUserNotExist) NotFound() bool {
  203. return true
  204. }
  205. func (db *users) GetByEmail(email string) (*User, error) {
  206. email = strings.ToLower(email)
  207. if len(email) == 0 {
  208. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  209. }
  210. // First try to find the user by primary email
  211. user := new(User)
  212. err := db.Where("email = ? AND type = ? AND is_active = ?", email, UserIndividual, true).First(user).Error
  213. if err == nil {
  214. return user, nil
  215. } else if err != gorm.ErrRecordNotFound {
  216. return nil, err
  217. }
  218. // Otherwise, check activated email addresses
  219. emailAddress := new(EmailAddress)
  220. err = db.Where("email = ? AND is_activated = ?", email, true).First(emailAddress).Error
  221. if err != nil {
  222. if err == gorm.ErrRecordNotFound {
  223. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  224. }
  225. return nil, err
  226. }
  227. return db.GetByID(emailAddress.UID)
  228. }
  229. func (db *users) GetByID(id int64) (*User, error) {
  230. user := new(User)
  231. err := db.Where("id = ?", id).First(user).Error
  232. if err != nil {
  233. if err == gorm.ErrRecordNotFound {
  234. return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
  235. }
  236. return nil, err
  237. }
  238. return user, nil
  239. }
  240. func (db *users) GetByUsername(username string) (*User, error) {
  241. user := new(User)
  242. err := db.Where("lower_name = ?", strings.ToLower(username)).First(user).Error
  243. if err != nil {
  244. if err == gorm.ErrRecordNotFound {
  245. return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
  246. }
  247. return nil, err
  248. }
  249. return user, nil
  250. }