users.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "fmt"
  8. "strings"
  9. "time"
  10. "github.com/go-macaron/binding"
  11. "github.com/pkg/errors"
  12. "gorm.io/gorm"
  13. "gogs.io/gogs/internal/auth"
  14. "gogs.io/gogs/internal/cryptoutil"
  15. "gogs.io/gogs/internal/errutil"
  16. )
  17. // UsersStore is the persistent interface for users.
  18. //
  19. // NOTE: All methods are sorted in alphabetical order.
  20. type UsersStore interface {
  21. // Authenticate validates username and password via given login source ID. It
  22. // returns ErrUserNotExist when the user was not found.
  23. //
  24. // When the "loginSourceID" is negative, it aborts the process and returns
  25. // ErrUserNotExist if the user was not found in the database.
  26. //
  27. // When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
  28. // if the user has different login source ID than the "loginSourceID".
  29. //
  30. // When the "loginSourceID" is positive, it tries to authenticate via given
  31. // login source and creates a new user when not yet exists in the database.
  32. Authenticate(ctx context.Context, username, password string, loginSourceID int64) (*User, error)
  33. // Create creates a new user and persists to database. It returns
  34. // ErrUserAlreadyExist when a user with same name already exists, or
  35. // ErrEmailAlreadyUsed if the email has been used by another user.
  36. Create(ctx context.Context, username, email string, opts CreateUserOpts) (*User, error)
  37. // GetByEmail returns the user (not organization) with given email. It ignores
  38. // records with unverified emails and returns ErrUserNotExist when not found.
  39. GetByEmail(ctx context.Context, email string) (*User, error)
  40. // GetByID returns the user with given ID. It returns ErrUserNotExist when not
  41. // found.
  42. GetByID(ctx context.Context, id int64) (*User, error)
  43. // GetByUsername returns the user with given username. It returns
  44. // ErrUserNotExist when not found.
  45. GetByUsername(ctx context.Context, username string) (*User, error)
  46. }
  47. var Users UsersStore
  48. // BeforeCreate implements the GORM create hook.
  49. func (u *User) BeforeCreate(tx *gorm.DB) error {
  50. if u.CreatedUnix == 0 {
  51. u.CreatedUnix = tx.NowFunc().Unix()
  52. u.UpdatedUnix = u.CreatedUnix
  53. }
  54. return nil
  55. }
  56. // AfterFind implements the GORM query hook.
  57. func (u *User) AfterFind(_ *gorm.DB) error {
  58. u.Created = time.Unix(u.CreatedUnix, 0).Local()
  59. u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
  60. return nil
  61. }
  62. var _ UsersStore = (*users)(nil)
  63. type users struct {
  64. *gorm.DB
  65. }
  66. type ErrLoginSourceMismatch struct {
  67. args errutil.Args
  68. }
  69. func (err ErrLoginSourceMismatch) Error() string {
  70. return fmt.Sprintf("login source mismatch: %v", err.args)
  71. }
  72. func (db *users) Authenticate(ctx context.Context, login, password string, loginSourceID int64) (*User, error) {
  73. login = strings.ToLower(login)
  74. query := db.WithContext(ctx)
  75. if strings.Contains(login, "@") {
  76. query = query.Where("email = ?", login)
  77. } else {
  78. query = query.Where("lower_name = ?", login)
  79. }
  80. user := new(User)
  81. err := query.First(user).Error
  82. if err != nil && err != gorm.ErrRecordNotFound {
  83. return nil, errors.Wrap(err, "get user")
  84. }
  85. var authSourceID int64 // The login source ID will be used to authenticate the user
  86. createNewUser := false // Whether to create a new user after successful authentication
  87. // User found in the database
  88. if err == nil {
  89. // Note: This check is unnecessary but to reduce user confusion at login page
  90. // and make it more consistent from user's perspective.
  91. if loginSourceID >= 0 && user.LoginSource != loginSourceID {
  92. return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
  93. }
  94. // Validate password hash fetched from database for local accounts.
  95. if user.IsLocal() {
  96. if user.ValidatePassword(password) {
  97. return user, nil
  98. }
  99. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login, "userID": user.ID}}
  100. }
  101. authSourceID = user.LoginSource
  102. } else {
  103. // Non-local login source is always greater than 0.
  104. if loginSourceID <= 0 {
  105. return nil, auth.ErrBadCredentials{Args: map[string]interface{}{"login": login}}
  106. }
  107. authSourceID = loginSourceID
  108. createNewUser = true
  109. }
  110. source, err := LoginSources.GetByID(ctx, authSourceID)
  111. if err != nil {
  112. return nil, errors.Wrap(err, "get login source")
  113. }
  114. if !source.IsActived {
  115. return nil, errors.Errorf("login source %d is not activated", source.ID)
  116. }
  117. extAccount, err := source.Provider.Authenticate(login, password)
  118. if err != nil {
  119. return nil, err
  120. }
  121. if !createNewUser {
  122. return user, nil
  123. }
  124. // Validate username make sure it satisfies requirement.
  125. if binding.AlphaDashDotPattern.MatchString(extAccount.Name) {
  126. return nil, fmt.Errorf("invalid pattern for attribute 'username' [%s]: must be valid alpha or numeric or dash(-_) or dot characters", extAccount.Name)
  127. }
  128. return db.Create(ctx, extAccount.Name, extAccount.Email,
  129. CreateUserOpts{
  130. FullName: extAccount.FullName,
  131. LoginSource: authSourceID,
  132. LoginName: extAccount.Login,
  133. Location: extAccount.Location,
  134. Website: extAccount.Website,
  135. Activated: true,
  136. Admin: extAccount.Admin,
  137. },
  138. )
  139. }
  140. type CreateUserOpts struct {
  141. FullName string
  142. Password string
  143. LoginSource int64
  144. LoginName string
  145. Location string
  146. Website string
  147. Activated bool
  148. Admin bool
  149. }
  150. type ErrUserAlreadyExist struct {
  151. args errutil.Args
  152. }
  153. func IsErrUserAlreadyExist(err error) bool {
  154. _, ok := err.(ErrUserAlreadyExist)
  155. return ok
  156. }
  157. func (err ErrUserAlreadyExist) Error() string {
  158. return fmt.Sprintf("user already exists: %v", err.args)
  159. }
  160. type ErrEmailAlreadyUsed struct {
  161. args errutil.Args
  162. }
  163. func IsErrEmailAlreadyUsed(err error) bool {
  164. _, ok := err.(ErrEmailAlreadyUsed)
  165. return ok
  166. }
  167. func (err ErrEmailAlreadyUsed) Email() string {
  168. email, ok := err.args["email"].(string)
  169. if ok {
  170. return email
  171. }
  172. return "<email not found>"
  173. }
  174. func (err ErrEmailAlreadyUsed) Error() string {
  175. return fmt.Sprintf("email has been used: %v", err.args)
  176. }
  177. func (db *users) Create(ctx context.Context, username, email string, opts CreateUserOpts) (*User, error) {
  178. err := isUsernameAllowed(username)
  179. if err != nil {
  180. return nil, err
  181. }
  182. _, err = db.GetByUsername(ctx, username)
  183. if err == nil {
  184. return nil, ErrUserAlreadyExist{args: errutil.Args{"name": username}}
  185. } else if !IsErrUserNotExist(err) {
  186. return nil, err
  187. }
  188. _, err = db.GetByEmail(ctx, email)
  189. if err == nil {
  190. return nil, ErrEmailAlreadyUsed{args: errutil.Args{"email": email}}
  191. } else if !IsErrUserNotExist(err) {
  192. return nil, err
  193. }
  194. user := &User{
  195. LowerName: strings.ToLower(username),
  196. Name: username,
  197. FullName: opts.FullName,
  198. Email: email,
  199. Passwd: opts.Password,
  200. LoginSource: opts.LoginSource,
  201. LoginName: opts.LoginName,
  202. Location: opts.Location,
  203. Website: opts.Website,
  204. MaxRepoCreation: -1,
  205. IsActive: opts.Activated,
  206. IsAdmin: opts.Admin,
  207. Avatar: cryptoutil.MD5(email),
  208. AvatarEmail: email,
  209. }
  210. user.Rands, err = GetUserSalt()
  211. if err != nil {
  212. return nil, err
  213. }
  214. user.Salt, err = GetUserSalt()
  215. if err != nil {
  216. return nil, err
  217. }
  218. user.EncodePassword()
  219. return user, db.WithContext(ctx).Create(user).Error
  220. }
  221. var _ errutil.NotFound = (*ErrUserNotExist)(nil)
  222. type ErrUserNotExist struct {
  223. args errutil.Args
  224. }
  225. func IsErrUserNotExist(err error) bool {
  226. _, ok := err.(ErrUserNotExist)
  227. return ok
  228. }
  229. func (err ErrUserNotExist) Error() string {
  230. return fmt.Sprintf("user does not exist: %v", err.args)
  231. }
  232. func (ErrUserNotExist) NotFound() bool {
  233. return true
  234. }
  235. func (db *users) GetByEmail(ctx context.Context, email string) (*User, error) {
  236. email = strings.ToLower(email)
  237. if email == "" {
  238. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  239. }
  240. // First try to find the user by primary email
  241. user := new(User)
  242. err := db.WithContext(ctx).
  243. Where("email = ? AND type = ? AND is_active = ?", email, UserIndividual, true).
  244. First(user).
  245. Error
  246. if err == nil {
  247. return user, nil
  248. } else if err != gorm.ErrRecordNotFound {
  249. return nil, err
  250. }
  251. // Otherwise, check activated email addresses
  252. emailAddress := new(EmailAddress)
  253. err = db.WithContext(ctx).
  254. Where("email = ? AND is_activated = ?", email, true).
  255. First(emailAddress).
  256. Error
  257. if err != nil {
  258. if err == gorm.ErrRecordNotFound {
  259. return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
  260. }
  261. return nil, err
  262. }
  263. return db.GetByID(ctx, emailAddress.UID)
  264. }
  265. func (db *users) GetByID(ctx context.Context, id int64) (*User, error) {
  266. user := new(User)
  267. err := db.WithContext(ctx).Where("id = ?", id).First(user).Error
  268. if err != nil {
  269. if err == gorm.ErrRecordNotFound {
  270. return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
  271. }
  272. return nil, err
  273. }
  274. return user, nil
  275. }
  276. func (db *users) GetByUsername(ctx context.Context, username string) (*User, error) {
  277. user := new(User)
  278. err := db.WithContext(ctx).Where("lower_name = ?", strings.ToLower(username)).First(user).Error
  279. if err != nil {
  280. if err == gorm.ErrRecordNotFound {
  281. return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
  282. }
  283. return nil, err
  284. }
  285. return user, nil
  286. }