setting.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "bytes"
  7. gocontext "context"
  8. "encoding/base64"
  9. "fmt"
  10. "html/template"
  11. "image/png"
  12. "io"
  13. "github.com/pkg/errors"
  14. "github.com/pquerna/otp"
  15. "github.com/pquerna/otp/totp"
  16. "gopkg.in/macaron.v1"
  17. log "unknwon.dev/clog/v2"
  18. "gogs.io/gogs/internal/auth"
  19. "gogs.io/gogs/internal/conf"
  20. "gogs.io/gogs/internal/context"
  21. "gogs.io/gogs/internal/cryptoutil"
  22. "gogs.io/gogs/internal/database"
  23. "gogs.io/gogs/internal/email"
  24. "gogs.io/gogs/internal/form"
  25. "gogs.io/gogs/internal/tool"
  26. "gogs.io/gogs/internal/userutil"
  27. )
  28. // SettingsHandler is the handler for users settings endpoints.
  29. type SettingsHandler struct {
  30. store SettingsStore
  31. }
  32. // NewSettingsHandler returns a new SettingsHandler for users settings endpoints.
  33. func NewSettingsHandler(s SettingsStore) *SettingsHandler {
  34. return &SettingsHandler{
  35. store: s,
  36. }
  37. }
  38. const (
  39. SETTINGS_PROFILE = "user/settings/profile"
  40. SETTINGS_AVATAR = "user/settings/avatar"
  41. SETTINGS_PASSWORD = "user/settings/password"
  42. SETTINGS_EMAILS = "user/settings/email"
  43. SETTINGS_SSH_KEYS = "user/settings/sshkeys"
  44. SETTINGS_SECURITY = "user/settings/security"
  45. SETTINGS_TWO_FACTOR_ENABLE = "user/settings/two_factor_enable"
  46. SETTINGS_TWO_FACTOR_RECOVERY_CODES = "user/settings/two_factor_recovery_codes"
  47. SETTINGS_REPOSITORIES = "user/settings/repositories"
  48. SETTINGS_ORGANIZATIONS = "user/settings/organizations"
  49. SETTINGS_APPLICATIONS = "user/settings/applications"
  50. SETTINGS_DELETE = "user/settings/delete"
  51. NOTIFICATION = "user/notification"
  52. )
  53. func Settings(c *context.Context) {
  54. c.Title("settings.profile")
  55. c.PageIs("SettingsProfile")
  56. c.Data["origin_name"] = c.User.Name
  57. c.Data["name"] = c.User.Name
  58. c.Data["full_name"] = c.User.FullName
  59. c.Data["email"] = c.User.Email
  60. c.Data["website"] = c.User.Website
  61. c.Data["location"] = c.User.Location
  62. c.Success(SETTINGS_PROFILE)
  63. }
  64. func SettingsPost(c *context.Context, f form.UpdateProfile) {
  65. c.Title("settings.profile")
  66. c.PageIs("SettingsProfile")
  67. c.Data["origin_name"] = c.User.Name
  68. if c.HasError() {
  69. c.Success(SETTINGS_PROFILE)
  70. return
  71. }
  72. // Non-local users are not allowed to change their username
  73. if c.User.IsLocal() {
  74. // Check if the username (including cases) had been changed
  75. if c.User.Name != f.Name {
  76. err := database.Handle.Users().ChangeUsername(c.Req.Context(), c.User.ID, f.Name)
  77. if err != nil {
  78. c.FormErr("Name")
  79. var msg string
  80. switch {
  81. case database.IsErrUserAlreadyExist(errors.Cause(err)):
  82. msg = c.Tr("form.username_been_taken")
  83. case database.IsErrNameNotAllowed(errors.Cause(err)):
  84. msg = c.Tr("user.form.name_not_allowed", err.(database.ErrNameNotAllowed).Value())
  85. default:
  86. c.Error(err, "change user name")
  87. return
  88. }
  89. c.RenderWithErr(msg, SETTINGS_PROFILE, &f)
  90. return
  91. }
  92. log.Trace("Username changed: %s -> %s", c.User.Name, f.Name)
  93. }
  94. }
  95. err := database.Handle.Users().Update(
  96. c.Req.Context(),
  97. c.User.ID,
  98. database.UpdateUserOptions{
  99. FullName: &f.FullName,
  100. Website: &f.Website,
  101. Location: &f.Location,
  102. },
  103. )
  104. if err != nil {
  105. c.Error(err, "update user")
  106. return
  107. }
  108. c.Flash.Success(c.Tr("settings.update_profile_success"))
  109. c.RedirectSubpath("/user/settings")
  110. }
  111. // FIXME: limit upload size
  112. func UpdateAvatarSetting(c *context.Context, f form.Avatar, ctxUser *database.User) error {
  113. if f.Source == form.AvatarLookup && f.Gravatar != "" {
  114. avatar := cryptoutil.MD5(f.Gravatar)
  115. err := database.Handle.Users().Update(
  116. c.Req.Context(),
  117. ctxUser.ID,
  118. database.UpdateUserOptions{
  119. Avatar: &avatar,
  120. AvatarEmail: &f.Gravatar,
  121. },
  122. )
  123. if err != nil {
  124. return errors.Wrap(err, "update user")
  125. }
  126. err = database.Handle.Users().DeleteCustomAvatar(c.Req.Context(), c.User.ID)
  127. if err != nil {
  128. return errors.Wrap(err, "delete custom avatar")
  129. }
  130. return nil
  131. }
  132. if f.Avatar != nil && f.Avatar.Filename != "" {
  133. r, err := f.Avatar.Open()
  134. if err != nil {
  135. return fmt.Errorf("open avatar reader: %v", err)
  136. }
  137. defer func() { _ = r.Close() }()
  138. data, err := io.ReadAll(r)
  139. if err != nil {
  140. return fmt.Errorf("read avatar content: %v", err)
  141. }
  142. if !tool.IsImageFile(data) {
  143. return errors.New(c.Tr("settings.uploaded_avatar_not_a_image"))
  144. }
  145. err = database.Handle.Users().UseCustomAvatar(c.Req.Context(), ctxUser.ID, data)
  146. if err != nil {
  147. return errors.Wrap(err, "save avatar")
  148. }
  149. return nil
  150. }
  151. return nil
  152. }
  153. func SettingsAvatar(c *context.Context) {
  154. c.Title("settings.avatar")
  155. c.PageIs("SettingsAvatar")
  156. c.Success(SETTINGS_AVATAR)
  157. }
  158. func SettingsAvatarPost(c *context.Context, f form.Avatar) {
  159. if err := UpdateAvatarSetting(c, f, c.User); err != nil {
  160. c.Flash.Error(err.Error())
  161. } else {
  162. c.Flash.Success(c.Tr("settings.update_avatar_success"))
  163. }
  164. c.RedirectSubpath("/user/settings/avatar")
  165. }
  166. func SettingsDeleteAvatar(c *context.Context) {
  167. err := database.Handle.Users().DeleteCustomAvatar(c.Req.Context(), c.User.ID)
  168. if err != nil {
  169. c.Flash.Error(fmt.Sprintf("Failed to delete avatar: %v", err))
  170. }
  171. c.RedirectSubpath("/user/settings/avatar")
  172. }
  173. func SettingsPassword(c *context.Context) {
  174. c.Title("settings.password")
  175. c.PageIs("SettingsPassword")
  176. c.Success(SETTINGS_PASSWORD)
  177. }
  178. func SettingsPasswordPost(c *context.Context, f form.ChangePassword) {
  179. c.Title("settings.password")
  180. c.PageIs("SettingsPassword")
  181. if c.HasError() {
  182. c.Success(SETTINGS_PASSWORD)
  183. return
  184. }
  185. if !userutil.ValidatePassword(c.User.Password, c.User.Salt, f.OldPassword) {
  186. c.Flash.Error(c.Tr("settings.password_incorrect"))
  187. } else if f.Password != f.Retype {
  188. c.Flash.Error(c.Tr("form.password_not_match"))
  189. } else {
  190. err := database.Handle.Users().Update(
  191. c.Req.Context(),
  192. c.User.ID,
  193. database.UpdateUserOptions{
  194. Password: &f.Password,
  195. },
  196. )
  197. if err != nil {
  198. c.Errorf(err, "update user")
  199. return
  200. }
  201. c.Flash.Success(c.Tr("settings.change_password_success"))
  202. }
  203. c.RedirectSubpath("/user/settings/password")
  204. }
  205. func SettingsEmails(c *context.Context) {
  206. c.Title("settings.emails")
  207. c.PageIs("SettingsEmails")
  208. emails, err := database.Handle.Users().ListEmails(c.Req.Context(), c.User.ID)
  209. if err != nil {
  210. c.Errorf(err, "get email addresses")
  211. return
  212. }
  213. c.Data["Emails"] = emails
  214. c.Success(SETTINGS_EMAILS)
  215. }
  216. func SettingsEmailPost(c *context.Context, f form.AddEmail) {
  217. c.Title("settings.emails")
  218. c.PageIs("SettingsEmails")
  219. if c.Query("_method") == "PRIMARY" {
  220. err := database.Handle.Users().MarkEmailPrimary(c.Req.Context(), c.User.ID, c.Query("email"))
  221. if err != nil {
  222. c.Errorf(err, "make email primary")
  223. return
  224. }
  225. c.RedirectSubpath("/user/settings/email")
  226. return
  227. }
  228. // Add Email address.
  229. emails, err := database.Handle.Users().ListEmails(c.Req.Context(), c.User.ID)
  230. if err != nil {
  231. c.Errorf(err, "get email addresses")
  232. return
  233. }
  234. c.Data["Emails"] = emails
  235. if c.HasError() {
  236. c.Success(SETTINGS_EMAILS)
  237. return
  238. }
  239. err = database.Handle.Users().AddEmail(c.Req.Context(), c.User.ID, f.Email, !conf.Auth.RequireEmailConfirmation)
  240. if err != nil {
  241. if database.IsErrEmailAlreadyUsed(err) {
  242. c.RenderWithErr(c.Tr("form.email_been_used"), SETTINGS_EMAILS, &f)
  243. } else {
  244. c.Errorf(err, "add email address")
  245. }
  246. return
  247. }
  248. // Send confirmation email
  249. if conf.Auth.RequireEmailConfirmation {
  250. email.SendActivateEmailMail(c.Context, database.NewMailerUser(c.User), f.Email)
  251. if err := c.Cache.Put("MailResendLimit_"+c.User.LowerName, c.User.LowerName, 180); err != nil {
  252. log.Error("Set cache 'MailResendLimit' failed: %v", err)
  253. }
  254. c.Flash.Info(c.Tr("settings.add_email_confirmation_sent", f.Email, conf.Auth.ActivateCodeLives/60))
  255. } else {
  256. c.Flash.Success(c.Tr("settings.add_email_success"))
  257. }
  258. c.RedirectSubpath("/user/settings/email")
  259. }
  260. func DeleteEmail(c *context.Context) {
  261. email := c.Query("id") // The "id" here is the actual email address
  262. if c.User.Email == email {
  263. c.Flash.Error(c.Tr("settings.email_deletion_primary"))
  264. c.JSONSuccess(map[string]any{
  265. "redirect": conf.Server.Subpath + "/user/settings/email",
  266. })
  267. return
  268. }
  269. err := database.Handle.Users().DeleteEmail(c.Req.Context(), c.User.ID, email)
  270. if err != nil {
  271. c.Error(err, "delete email address")
  272. return
  273. }
  274. c.Flash.Success(c.Tr("settings.email_deletion_success"))
  275. c.JSONSuccess(map[string]any{
  276. "redirect": conf.Server.Subpath + "/user/settings/email",
  277. })
  278. }
  279. func SettingsSSHKeys(c *context.Context) {
  280. c.Title("settings.ssh_keys")
  281. c.PageIs("SettingsSSHKeys")
  282. keys, err := database.ListPublicKeys(c.User.ID)
  283. if err != nil {
  284. c.Errorf(err, "list public keys")
  285. return
  286. }
  287. c.Data["Keys"] = keys
  288. c.Success(SETTINGS_SSH_KEYS)
  289. }
  290. func SettingsSSHKeysPost(c *context.Context, f form.AddSSHKey) {
  291. c.Title("settings.ssh_keys")
  292. c.PageIs("SettingsSSHKeys")
  293. keys, err := database.ListPublicKeys(c.User.ID)
  294. if err != nil {
  295. c.Errorf(err, "list public keys")
  296. return
  297. }
  298. c.Data["Keys"] = keys
  299. if c.HasError() {
  300. c.Success(SETTINGS_SSH_KEYS)
  301. return
  302. }
  303. content, err := database.CheckPublicKeyString(f.Content)
  304. if err != nil {
  305. if database.IsErrKeyUnableVerify(err) {
  306. c.Flash.Info(c.Tr("form.unable_verify_ssh_key"))
  307. } else {
  308. c.Flash.Error(c.Tr("form.invalid_ssh_key", err.Error()))
  309. c.RedirectSubpath("/user/settings/ssh")
  310. return
  311. }
  312. }
  313. if _, err = database.AddPublicKey(c.User.ID, f.Title, content); err != nil {
  314. c.Data["HasError"] = true
  315. switch {
  316. case database.IsErrKeyAlreadyExist(err):
  317. c.FormErr("Content")
  318. c.RenderWithErr(c.Tr("settings.ssh_key_been_used"), SETTINGS_SSH_KEYS, &f)
  319. case database.IsErrKeyNameAlreadyUsed(err):
  320. c.FormErr("Title")
  321. c.RenderWithErr(c.Tr("settings.ssh_key_name_used"), SETTINGS_SSH_KEYS, &f)
  322. default:
  323. c.Errorf(err, "add public key")
  324. }
  325. return
  326. }
  327. c.Flash.Success(c.Tr("settings.add_key_success", f.Title))
  328. c.RedirectSubpath("/user/settings/ssh")
  329. }
  330. func DeleteSSHKey(c *context.Context) {
  331. if err := database.DeletePublicKey(c.User, c.QueryInt64("id")); err != nil {
  332. c.Flash.Error("DeletePublicKey: " + err.Error())
  333. } else {
  334. c.Flash.Success(c.Tr("settings.ssh_key_deletion_success"))
  335. }
  336. c.JSONSuccess(map[string]any{
  337. "redirect": conf.Server.Subpath + "/user/settings/ssh",
  338. })
  339. }
  340. func SettingsSecurity(c *context.Context) {
  341. c.Title("settings.security")
  342. c.PageIs("SettingsSecurity")
  343. t, err := database.Handle.TwoFactors().GetByUserID(c.Req.Context(), c.UserID())
  344. if err != nil && !database.IsErrTwoFactorNotFound(err) {
  345. c.Errorf(err, "get two factor by user ID")
  346. return
  347. }
  348. c.Data["TwoFactor"] = t
  349. c.Success(SETTINGS_SECURITY)
  350. }
  351. func SettingsTwoFactorEnable(c *context.Context) {
  352. if database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
  353. c.NotFound()
  354. return
  355. }
  356. c.Title("settings.two_factor_enable_title")
  357. c.PageIs("SettingsSecurity")
  358. var key *otp.Key
  359. var err error
  360. keyURL := c.Session.Get("twoFactorURL")
  361. if keyURL != nil {
  362. key, _ = otp.NewKeyFromURL(keyURL.(string))
  363. }
  364. if key == nil {
  365. key, err = totp.Generate(totp.GenerateOpts{
  366. Issuer: conf.App.BrandName,
  367. AccountName: c.User.Email,
  368. })
  369. if err != nil {
  370. c.Errorf(err, "generate TOTP")
  371. return
  372. }
  373. }
  374. c.Data["TwoFactorSecret"] = key.Secret()
  375. img, err := key.Image(240, 240)
  376. if err != nil {
  377. c.Errorf(err, "generate image")
  378. return
  379. }
  380. var buf bytes.Buffer
  381. if err = png.Encode(&buf, img); err != nil {
  382. c.Errorf(err, "encode image")
  383. return
  384. }
  385. c.Data["QRCode"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(buf.Bytes()))
  386. _ = c.Session.Set("twoFactorSecret", c.Data["TwoFactorSecret"])
  387. _ = c.Session.Set("twoFactorURL", key.String())
  388. c.Success(SETTINGS_TWO_FACTOR_ENABLE)
  389. }
  390. func SettingsTwoFactorEnablePost(c *context.Context) {
  391. secret, ok := c.Session.Get("twoFactorSecret").(string)
  392. if !ok {
  393. c.NotFound()
  394. return
  395. }
  396. if !totp.Validate(c.Query("passcode"), secret) {
  397. c.Flash.Error(c.Tr("settings.two_factor_invalid_passcode"))
  398. c.RedirectSubpath("/user/settings/security/two_factor_enable")
  399. return
  400. }
  401. if err := database.Handle.TwoFactors().Create(c.Req.Context(), c.UserID(), conf.Security.SecretKey, secret); err != nil {
  402. c.Flash.Error(c.Tr("settings.two_factor_enable_error", err))
  403. c.RedirectSubpath("/user/settings/security/two_factor_enable")
  404. return
  405. }
  406. _ = c.Session.Delete("twoFactorSecret")
  407. _ = c.Session.Delete("twoFactorURL")
  408. c.Flash.Success(c.Tr("settings.two_factor_enable_success"))
  409. c.RedirectSubpath("/user/settings/security/two_factor_recovery_codes")
  410. }
  411. func SettingsTwoFactorRecoveryCodes(c *context.Context) {
  412. if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
  413. c.NotFound()
  414. return
  415. }
  416. c.Title("settings.two_factor_recovery_codes_title")
  417. c.PageIs("SettingsSecurity")
  418. recoveryCodes, err := database.GetRecoveryCodesByUserID(c.UserID())
  419. if err != nil {
  420. c.Errorf(err, "get recovery codes by user ID")
  421. return
  422. }
  423. c.Data["RecoveryCodes"] = recoveryCodes
  424. c.Success(SETTINGS_TWO_FACTOR_RECOVERY_CODES)
  425. }
  426. func SettingsTwoFactorRecoveryCodesPost(c *context.Context) {
  427. if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
  428. c.NotFound()
  429. return
  430. }
  431. if err := database.RegenerateRecoveryCodes(c.UserID()); err != nil {
  432. c.Flash.Error(c.Tr("settings.two_factor_regenerate_recovery_codes_error", err))
  433. } else {
  434. c.Flash.Success(c.Tr("settings.two_factor_regenerate_recovery_codes_success"))
  435. }
  436. c.RedirectSubpath("/user/settings/security/two_factor_recovery_codes")
  437. }
  438. func SettingsTwoFactorDisable(c *context.Context) {
  439. if !database.Handle.TwoFactors().IsEnabled(c.Req.Context(), c.User.ID) {
  440. c.NotFound()
  441. return
  442. }
  443. if err := database.DeleteTwoFactor(c.UserID()); err != nil {
  444. c.Errorf(err, "delete two factor")
  445. return
  446. }
  447. c.Flash.Success(c.Tr("settings.two_factor_disable_success"))
  448. c.JSONSuccess(map[string]any{
  449. "redirect": conf.Server.Subpath + "/user/settings/security",
  450. })
  451. }
  452. func SettingsRepos(c *context.Context) {
  453. c.Title("settings.repos")
  454. c.PageIs("SettingsRepositories")
  455. repos, err := database.GetUserAndCollaborativeRepositories(c.User.ID)
  456. if err != nil {
  457. c.Errorf(err, "get user and collaborative repositories")
  458. return
  459. }
  460. if err = database.RepositoryList(repos).LoadAttributes(); err != nil {
  461. c.Errorf(err, "load attributes")
  462. return
  463. }
  464. c.Data["Repos"] = repos
  465. c.Success(SETTINGS_REPOSITORIES)
  466. }
  467. func SettingsLeaveRepo(c *context.Context) {
  468. repo, err := database.GetRepositoryByID(c.QueryInt64("id"))
  469. if err != nil {
  470. c.NotFoundOrError(err, "get repository by ID")
  471. return
  472. }
  473. if err = repo.DeleteCollaboration(c.User.ID); err != nil {
  474. c.Errorf(err, "delete collaboration")
  475. return
  476. }
  477. c.Flash.Success(c.Tr("settings.repos.leave_success", repo.FullName()))
  478. c.JSONSuccess(map[string]any{
  479. "redirect": conf.Server.Subpath + "/user/settings/repositories",
  480. })
  481. }
  482. func SettingsOrganizations(c *context.Context) {
  483. c.Title("settings.orgs")
  484. c.PageIs("SettingsOrganizations")
  485. orgs, err := database.GetOrgsByUserID(c.User.ID, true)
  486. if err != nil {
  487. c.Errorf(err, "get organizations by user ID")
  488. return
  489. }
  490. c.Data["Orgs"] = orgs
  491. c.Success(SETTINGS_ORGANIZATIONS)
  492. }
  493. func SettingsLeaveOrganization(c *context.Context) {
  494. if err := database.RemoveOrgUser(c.QueryInt64("id"), c.User.ID); err != nil {
  495. if database.IsErrLastOrgOwner(err) {
  496. c.Flash.Error(c.Tr("form.last_org_owner"))
  497. } else {
  498. c.Errorf(err, "remove organization user")
  499. return
  500. }
  501. }
  502. c.JSONSuccess(map[string]any{
  503. "redirect": conf.Server.Subpath + "/user/settings/organizations",
  504. })
  505. }
  506. func (h *SettingsHandler) Applications() macaron.Handler {
  507. return func(c *context.Context) {
  508. c.Title("settings.applications")
  509. c.PageIs("SettingsApplications")
  510. tokens, err := h.store.ListAccessTokens(c.Req.Context(), c.User.ID)
  511. if err != nil {
  512. c.Errorf(err, "list access tokens")
  513. return
  514. }
  515. c.Data["Tokens"] = tokens
  516. c.Success(SETTINGS_APPLICATIONS)
  517. }
  518. }
  519. func (h *SettingsHandler) ApplicationsPost() macaron.Handler {
  520. return func(c *context.Context, f form.NewAccessToken) {
  521. c.Title("settings.applications")
  522. c.PageIs("SettingsApplications")
  523. if c.HasError() {
  524. tokens, err := h.store.ListAccessTokens(c.Req.Context(), c.User.ID)
  525. if err != nil {
  526. c.Errorf(err, "list access tokens")
  527. return
  528. }
  529. c.Data["Tokens"] = tokens
  530. c.Success(SETTINGS_APPLICATIONS)
  531. return
  532. }
  533. t, err := h.store.CreateAccessToken(c.Req.Context(), c.User.ID, f.Name)
  534. if err != nil {
  535. if database.IsErrAccessTokenAlreadyExist(err) {
  536. c.Flash.Error(c.Tr("settings.token_name_exists"))
  537. c.RedirectSubpath("/user/settings/applications")
  538. } else {
  539. c.Errorf(err, "new access token")
  540. }
  541. return
  542. }
  543. c.Flash.Success(c.Tr("settings.generate_token_succees"))
  544. c.Flash.Info(t.Sha1)
  545. c.RedirectSubpath("/user/settings/applications")
  546. }
  547. }
  548. func (h *SettingsHandler) DeleteApplication() macaron.Handler {
  549. return func(c *context.Context) {
  550. if err := h.store.DeleteAccessTokenByID(c.Req.Context(), c.User.ID, c.QueryInt64("id")); err != nil {
  551. c.Flash.Error("DeleteAccessTokenByID: " + err.Error())
  552. } else {
  553. c.Flash.Success(c.Tr("settings.delete_token_success"))
  554. }
  555. c.JSONSuccess(map[string]any{
  556. "redirect": conf.Server.Subpath + "/user/settings/applications",
  557. })
  558. }
  559. }
  560. func SettingsDelete(c *context.Context) {
  561. c.Title("settings.delete")
  562. c.PageIs("SettingsDelete")
  563. if c.Req.Method == "POST" {
  564. if _, err := database.Handle.Users().Authenticate(c.Req.Context(), c.User.Name, c.Query("password"), c.User.LoginSource); err != nil {
  565. if auth.IsErrBadCredentials(err) {
  566. c.RenderWithErr(c.Tr("form.enterred_invalid_password"), SETTINGS_DELETE, nil)
  567. } else {
  568. c.Errorf(err, "authenticate user")
  569. }
  570. return
  571. }
  572. if err := database.Handle.Users().DeleteByID(c.Req.Context(), c.User.ID, false); err != nil {
  573. switch {
  574. case database.IsErrUserOwnRepos(err):
  575. c.Flash.Error(c.Tr("form.still_own_repo"))
  576. c.Redirect(conf.Server.Subpath + "/user/settings/delete")
  577. case database.IsErrUserHasOrgs(err):
  578. c.Flash.Error(c.Tr("form.still_has_org"))
  579. c.Redirect(conf.Server.Subpath + "/user/settings/delete")
  580. default:
  581. c.Errorf(err, "delete user")
  582. }
  583. } else {
  584. log.Trace("Account deleted: %s", c.User.Name)
  585. c.Redirect(conf.Server.Subpath + "/")
  586. }
  587. return
  588. }
  589. c.Success(SETTINGS_DELETE)
  590. }
  591. // SettingsStore is the data layer carrier for user settings endpoints. This
  592. // interface is meant to abstract away and limit the exposure of the underlying
  593. // data layer to the handler through a thin-wrapper.
  594. type SettingsStore interface {
  595. // CreateAccessToken creates a new access token and persist to database. It
  596. // returns database.ErrAccessTokenAlreadyExist when an access token with same
  597. // name already exists for the user.
  598. CreateAccessToken(ctx gocontext.Context, userID int64, name string) (*database.AccessToken, error)
  599. // GetAccessTokenBySHA1 returns the access token with given SHA1. It returns
  600. // database.ErrAccessTokenNotExist when not found.
  601. GetAccessTokenBySHA1(ctx gocontext.Context, sha1 string) (*database.AccessToken, error)
  602. // TouchAccessTokenByID updates the updated time of the given access token to
  603. // the current time.
  604. TouchAccessTokenByID(ctx gocontext.Context, id int64) error
  605. // ListAccessTokens returns all access tokens belongs to given user.
  606. ListAccessTokens(ctx gocontext.Context, userID int64) ([]*database.AccessToken, error)
  607. // DeleteAccessTokenByID deletes the access token by given ID.
  608. DeleteAccessTokenByID(ctx gocontext.Context, userID, id int64) error
  609. }
  610. type settingsStore struct{}
  611. // NewSettingsStore returns a new SettingsStore using the global database
  612. // handle.
  613. func NewSettingsStore() SettingsStore {
  614. return &settingsStore{}
  615. }
  616. func (*settingsStore) CreateAccessToken(ctx gocontext.Context, userID int64, name string) (*database.AccessToken, error) {
  617. return database.Handle.AccessTokens().Create(ctx, userID, name)
  618. }
  619. func (*settingsStore) GetAccessTokenBySHA1(ctx gocontext.Context, sha1 string) (*database.AccessToken, error) {
  620. return database.Handle.AccessTokens().GetBySHA1(ctx, sha1)
  621. }
  622. func (*settingsStore) TouchAccessTokenByID(ctx gocontext.Context, id int64) error {
  623. return database.Handle.AccessTokens().Touch(ctx, id)
  624. }
  625. func (*settingsStore) ListAccessTokens(ctx gocontext.Context, userID int64) ([]*database.AccessToken, error) {
  626. return database.Handle.AccessTokens().List(ctx, userID)
  627. }
  628. func (*settingsStore) DeleteAccessTokenByID(ctx gocontext.Context, userID, id int64) error {
  629. return database.Handle.AccessTokens().DeleteByID(ctx, userID, id)
  630. }