mirror of https://github.com/gogs/gogs.git
1591 lines
46 KiB
Go
1591 lines
46 KiB
Go
// Copyright 2020 The Gogs Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package database
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
"unicode/utf8"
|
|
|
|
"github.com/go-macaron/binding"
|
|
api "github.com/gogs/go-gogs-client"
|
|
"github.com/pkg/errors"
|
|
"gorm.io/gorm"
|
|
log "unknwon.dev/clog/v2"
|
|
|
|
"gogs.io/gogs/internal/auth"
|
|
"gogs.io/gogs/internal/conf"
|
|
"gogs.io/gogs/internal/cryptoutil"
|
|
"gogs.io/gogs/internal/dbutil"
|
|
"gogs.io/gogs/internal/errutil"
|
|
"gogs.io/gogs/internal/markup"
|
|
"gogs.io/gogs/internal/osutil"
|
|
"gogs.io/gogs/internal/repoutil"
|
|
"gogs.io/gogs/internal/strutil"
|
|
"gogs.io/gogs/internal/tool"
|
|
"gogs.io/gogs/internal/userutil"
|
|
)
|
|
|
|
// UsersStore is the storage layer for users.
|
|
type UsersStore struct {
|
|
db *gorm.DB
|
|
}
|
|
|
|
func newUsersStore(db *gorm.DB) *UsersStore {
|
|
return &UsersStore{db: db}
|
|
}
|
|
|
|
type ErrLoginSourceMismatch struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrLoginSourceMismatch returns true if the underlying error has the type
|
|
// ErrLoginSourceMismatch.
|
|
func IsErrLoginSourceMismatch(err error) bool {
|
|
return errors.As(err, &ErrLoginSourceMismatch{})
|
|
}
|
|
|
|
func (err ErrLoginSourceMismatch) Error() string {
|
|
return fmt.Sprintf("login source mismatch: %v", err.args)
|
|
}
|
|
|
|
// Authenticate validates username and password via given login source ID. It
|
|
// returns ErrUserNotExist when the user was not found.
|
|
//
|
|
// When the "loginSourceID" is negative, it aborts the process and returns
|
|
// ErrUserNotExist if the user was not found in the database.
|
|
//
|
|
// When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
|
|
// if the user has different login source ID than the "loginSourceID".
|
|
//
|
|
// When the "loginSourceID" is positive, it tries to authenticate via given
|
|
// login source and creates a new user when not yet exists in the database.
|
|
func (s *UsersStore) Authenticate(ctx context.Context, login, password string, loginSourceID int64) (*User, error) {
|
|
login = strings.ToLower(login)
|
|
|
|
query := s.db.WithContext(ctx)
|
|
if strings.Contains(login, "@") {
|
|
query = query.Where("email = ?", login)
|
|
} else {
|
|
query = query.Where("lower_name = ?", login)
|
|
}
|
|
|
|
user := new(User)
|
|
err := query.First(user).Error
|
|
if err != nil && !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, errors.Wrap(err, "get user")
|
|
}
|
|
|
|
var authSourceID int64 // The login source ID will be used to authenticate the user
|
|
createNewUser := false // Whether to create a new user after successful authentication
|
|
|
|
// User found in the database
|
|
if err == nil {
|
|
// Note: This check is unnecessary but to reduce user confusion at login page
|
|
// and make it more consistent from user's perspective.
|
|
if loginSourceID >= 0 && user.LoginSource != loginSourceID {
|
|
return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
|
|
}
|
|
|
|
// Validate password hash fetched from database for local accounts.
|
|
if user.IsLocal() {
|
|
if userutil.ValidatePassword(user.Password, user.Salt, password) {
|
|
return user, nil
|
|
}
|
|
|
|
return nil, auth.ErrBadCredentials{Args: map[string]any{"login": login, "userID": user.ID}}
|
|
}
|
|
|
|
authSourceID = user.LoginSource
|
|
|
|
} else {
|
|
// Non-local login source is always greater than 0.
|
|
if loginSourceID <= 0 {
|
|
return nil, auth.ErrBadCredentials{Args: map[string]any{"login": login}}
|
|
}
|
|
|
|
authSourceID = loginSourceID
|
|
createNewUser = true
|
|
}
|
|
|
|
source, err := newLoginSourcesStore(s.db, loadedLoginSourceFilesStore).GetByID(ctx, authSourceID)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get login source")
|
|
}
|
|
|
|
if !source.IsActived {
|
|
return nil, errors.Errorf("login source %d is not activated", source.ID)
|
|
}
|
|
|
|
extAccount, err := source.Provider.Authenticate(login, password)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if !createNewUser {
|
|
return user, nil
|
|
}
|
|
|
|
// Validate username make sure it satisfies requirement.
|
|
if binding.AlphaDashDotPattern.MatchString(extAccount.Name) {
|
|
return nil, fmt.Errorf("invalid pattern for attribute 'username' [%s]: must be valid alpha or numeric or dash(-_) or dot characters", extAccount.Name)
|
|
}
|
|
|
|
return s.Create(ctx, extAccount.Name, extAccount.Email,
|
|
CreateUserOptions{
|
|
FullName: extAccount.FullName,
|
|
LoginSource: authSourceID,
|
|
LoginName: extAccount.Login,
|
|
Location: extAccount.Location,
|
|
Website: extAccount.Website,
|
|
Activated: true,
|
|
Admin: extAccount.Admin,
|
|
},
|
|
)
|
|
}
|
|
|
|
// ChangeUsername changes the username of the given user and updates all
|
|
// references to the old username. It returns ErrNameNotAllowed if the given
|
|
// name or pattern of the name is not allowed as a username, or
|
|
// ErrUserAlreadyExist when another user with same name already exists.
|
|
func (s *UsersStore) ChangeUsername(ctx context.Context, userID int64, newUsername string) error {
|
|
err := isUsernameAllowed(newUsername)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if s.IsUsernameUsed(ctx, newUsername, userID) {
|
|
return ErrUserAlreadyExist{
|
|
args: errutil.Args{
|
|
"name": newUsername,
|
|
},
|
|
}
|
|
}
|
|
|
|
user, err := s.GetByID(ctx, userID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "get user")
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
err := tx.Model(&User{}).
|
|
Where("id = ?", user.ID).
|
|
Updates(map[string]any{
|
|
"lower_name": strings.ToLower(newUsername),
|
|
"name": newUsername,
|
|
"updated_unix": tx.NowFunc().Unix(),
|
|
}).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "update user name")
|
|
}
|
|
|
|
// Stop here if it's just a case-change of the username
|
|
if strings.EqualFold(user.Name, newUsername) {
|
|
return nil
|
|
}
|
|
|
|
// Update all references to the user name in pull requests
|
|
err = tx.Model(&PullRequest{}).
|
|
Where("head_user_name = ?", user.LowerName).
|
|
Update("head_user_name", strings.ToLower(newUsername)).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `update "pull_request.head_user_name"`)
|
|
}
|
|
|
|
// Delete local copies of repositories and their wikis that are owned by the user
|
|
rows, err := tx.Model(&Repository{}).Where("owner_id = ?", user.ID).Rows()
|
|
if err != nil {
|
|
return errors.Wrap(err, "iterate repositories")
|
|
}
|
|
defer func() { _ = rows.Close() }()
|
|
|
|
for rows.Next() {
|
|
var repo struct {
|
|
ID int64
|
|
}
|
|
err = tx.ScanRows(rows, &repo)
|
|
if err != nil {
|
|
return errors.Wrap(err, "scan rows")
|
|
}
|
|
|
|
deleteRepoLocalCopy(repo.ID)
|
|
RemoveAllWithNotice(fmt.Sprintf("Delete repository %d wiki local copy", repo.ID), repoutil.RepositoryLocalWikiPath(repo.ID))
|
|
}
|
|
if err = rows.Err(); err != nil {
|
|
return errors.Wrap(err, "check rows.Err")
|
|
}
|
|
|
|
// Rename user directory if exists
|
|
userPath := repoutil.UserPath(user.Name)
|
|
if osutil.IsExist(userPath) {
|
|
newUserPath := repoutil.UserPath(newUsername)
|
|
err = os.Rename(userPath, newUserPath)
|
|
if err != nil {
|
|
return errors.Wrap(err, "rename user directory")
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// Count returns the total number of users.
|
|
func (s *UsersStore) Count(ctx context.Context) int64 {
|
|
var count int64
|
|
s.db.WithContext(ctx).Model(&User{}).Where("type = ?", UserTypeIndividual).Count(&count)
|
|
return count
|
|
}
|
|
|
|
type CreateUserOptions struct {
|
|
FullName string
|
|
Password string
|
|
LoginSource int64
|
|
LoginName string
|
|
Location string
|
|
Website string
|
|
Activated bool
|
|
Admin bool
|
|
}
|
|
|
|
type ErrUserAlreadyExist struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrUserAlreadyExist returns true if the underlying error has the type
|
|
// ErrUserAlreadyExist.
|
|
func IsErrUserAlreadyExist(err error) bool {
|
|
return errors.As(err, &ErrUserAlreadyExist{})
|
|
}
|
|
|
|
func (err ErrUserAlreadyExist) Error() string {
|
|
return fmt.Sprintf("user already exists: %v", err.args)
|
|
}
|
|
|
|
type ErrEmailAlreadyUsed struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrEmailAlreadyUsed returns true if the underlying error has the type
|
|
// ErrEmailAlreadyUsed.
|
|
func IsErrEmailAlreadyUsed(err error) bool {
|
|
return errors.As(err, &ErrEmailAlreadyUsed{})
|
|
}
|
|
|
|
func (err ErrEmailAlreadyUsed) Email() string {
|
|
email, ok := err.args["email"].(string)
|
|
if ok {
|
|
return email
|
|
}
|
|
return "<email not found>"
|
|
}
|
|
|
|
func (err ErrEmailAlreadyUsed) Error() string {
|
|
return fmt.Sprintf("email has been used: %v", err.args)
|
|
}
|
|
|
|
// Create creates a new user and persists to database. It returns
|
|
// ErrNameNotAllowed if the given name or pattern of the name is not allowed as
|
|
// a username, or ErrUserAlreadyExist when a user with same name already exists,
|
|
// or ErrEmailAlreadyUsed if the email has been verified by another user.
|
|
func (s *UsersStore) Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error) {
|
|
err := isUsernameAllowed(username)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if s.IsUsernameUsed(ctx, username, 0) {
|
|
return nil, ErrUserAlreadyExist{
|
|
args: errutil.Args{
|
|
"name": username,
|
|
},
|
|
}
|
|
}
|
|
|
|
email = strings.ToLower(strings.TrimSpace(email))
|
|
_, err = s.GetByEmail(ctx, email)
|
|
if err == nil {
|
|
return nil, ErrEmailAlreadyUsed{
|
|
args: errutil.Args{
|
|
"email": email,
|
|
},
|
|
}
|
|
} else if !IsErrUserNotExist(err) {
|
|
return nil, err
|
|
}
|
|
|
|
user := &User{
|
|
LowerName: strings.ToLower(username),
|
|
Name: username,
|
|
FullName: opts.FullName,
|
|
Email: email,
|
|
Password: opts.Password,
|
|
LoginSource: opts.LoginSource,
|
|
LoginName: opts.LoginName,
|
|
Location: opts.Location,
|
|
Website: opts.Website,
|
|
MaxRepoCreation: -1,
|
|
IsActive: opts.Activated,
|
|
IsAdmin: opts.Admin,
|
|
Avatar: cryptoutil.MD5(email), // Gravatar URL uses the MD5 hash of the email, see https://en.gravatar.com/site/implement/hash/
|
|
AvatarEmail: email,
|
|
}
|
|
|
|
user.Rands, err = userutil.RandomSalt()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
user.Salt, err = userutil.RandomSalt()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
user.Password = userutil.EncodePassword(user.Password, user.Salt)
|
|
|
|
return user, s.db.WithContext(ctx).Create(user).Error
|
|
}
|
|
|
|
// DeleteCustomAvatar deletes the current user custom avatar and falls back to
|
|
// use look up avatar by email.
|
|
func (s *UsersStore) DeleteCustomAvatar(ctx context.Context, userID int64) error {
|
|
_ = os.Remove(userutil.CustomAvatarPath(userID))
|
|
return s.db.WithContext(ctx).
|
|
Model(&User{}).
|
|
Where("id = ?", userID).
|
|
Updates(map[string]any{
|
|
"use_custom_avatar": false,
|
|
"updated_unix": s.db.NowFunc().Unix(),
|
|
}).
|
|
Error
|
|
}
|
|
|
|
type ErrUserOwnRepos struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrUserOwnRepos returns true if the underlying error has the type
|
|
// ErrUserOwnRepos.
|
|
func IsErrUserOwnRepos(err error) bool {
|
|
return errors.As(err, &ErrUserOwnRepos{})
|
|
}
|
|
|
|
func (err ErrUserOwnRepos) Error() string {
|
|
return fmt.Sprintf("user still has repository ownership: %v", err.args)
|
|
}
|
|
|
|
type ErrUserHasOrgs struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrUserHasOrgs returns true if the underlying error has the type
|
|
// ErrUserHasOrgs.
|
|
func IsErrUserHasOrgs(err error) bool {
|
|
return errors.As(err, &ErrUserHasOrgs{})
|
|
}
|
|
|
|
func (err ErrUserHasOrgs) Error() string {
|
|
return fmt.Sprintf("user still has organization membership: %v", err.args)
|
|
}
|
|
|
|
// DeleteByID deletes the given user and all their resources. It returns
|
|
// ErrUserOwnRepos when the user still has repository ownership, or returns
|
|
// ErrUserHasOrgs when the user still has organization membership. It is more
|
|
// performant to skip rewriting the "authorized_keys" file for individual
|
|
// deletion in a batch operation.
|
|
func (s *UsersStore) DeleteByID(ctx context.Context, userID int64, skipRewriteAuthorizedKeys bool) error {
|
|
user, err := s.GetByID(ctx, userID)
|
|
if err != nil {
|
|
if IsErrUserNotExist(err) {
|
|
return nil
|
|
}
|
|
return errors.Wrap(err, "get user")
|
|
}
|
|
|
|
// Double-check the user is not a direct owner of any repository and not a
|
|
// member of any organization.
|
|
var count int64
|
|
err = s.db.WithContext(ctx).Model(&Repository{}).Where("owner_id = ?", userID).Count(&count).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "count repositories")
|
|
} else if count > 0 {
|
|
return ErrUserOwnRepos{args: errutil.Args{"userID": userID}}
|
|
}
|
|
|
|
err = s.db.WithContext(ctx).Model(&OrgUser{}).Where("uid = ?", userID).Count(&count).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "count organization membership")
|
|
} else if count > 0 {
|
|
return ErrUserHasOrgs{args: errutil.Args{"userID": userID}}
|
|
}
|
|
|
|
needsRewriteAuthorizedKeys := false
|
|
err = s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE repository
|
|
SET num_watches = num_watches - 1
|
|
WHERE id IN (
|
|
SELECT repo_id FROM watch WHERE user_id = @userID
|
|
)
|
|
*/
|
|
err = tx.Table("repository").
|
|
Where("id IN (?)", tx.
|
|
Select("repo_id").
|
|
Table("watch").
|
|
Where("user_id = ?", userID),
|
|
).
|
|
UpdateColumn("num_watches", gorm.Expr("num_watches - 1")).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `decrease "repository.num_watches"`)
|
|
}
|
|
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE repository
|
|
SET num_stars = num_stars - 1
|
|
WHERE id IN (
|
|
SELECT repo_id FROM star WHERE uid = @userID
|
|
)
|
|
*/
|
|
err = tx.Table("repository").
|
|
Where("id IN (?)", tx.
|
|
Select("repo_id").
|
|
Table("star").
|
|
Where("uid = ?", userID),
|
|
).
|
|
UpdateColumn("num_stars", gorm.Expr("num_stars - 1")).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `decrease "repository.num_stars"`)
|
|
}
|
|
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE user
|
|
SET num_followers = num_followers - 1
|
|
WHERE id IN (
|
|
SELECT follow_id FROM follow WHERE user_id = @userID
|
|
)
|
|
*/
|
|
err = tx.Table("user").
|
|
Where("id IN (?)", tx.
|
|
Select("follow_id").
|
|
Table("follow").
|
|
Where("user_id = ?", userID),
|
|
).
|
|
UpdateColumn("num_followers", gorm.Expr("num_followers - 1")).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `decrease "user.num_followers"`)
|
|
}
|
|
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE user
|
|
SET num_following = num_following - 1
|
|
WHERE id IN (
|
|
SELECT user_id FROM follow WHERE follow_id = @userID
|
|
)
|
|
*/
|
|
err = tx.Table("user").
|
|
Where("id IN (?)", tx.
|
|
Select("user_id").
|
|
Table("follow").
|
|
Where("follow_id = ?", userID),
|
|
).
|
|
UpdateColumn("num_following", gorm.Expr("num_following - 1")).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `decrease "user.num_following"`)
|
|
}
|
|
|
|
if !skipRewriteAuthorizedKeys {
|
|
// We need to rewrite "authorized_keys" file if the user owns any public keys.
|
|
needsRewriteAuthorizedKeys = tx.Where("owner_id = ?", userID).First(&PublicKey{}).Error != gorm.ErrRecordNotFound
|
|
}
|
|
|
|
err = tx.Model(&Issue{}).Where("assignee_id = ?", userID).Update("assignee_id", 0).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "clear assignees")
|
|
}
|
|
|
|
for _, t := range []struct {
|
|
table any
|
|
where string
|
|
}{
|
|
{&Watch{}, "user_id = @userID"},
|
|
{&Star{}, "uid = @userID"},
|
|
{&Follow{}, "user_id = @userID OR follow_id = @userID"},
|
|
{&PublicKey{}, "owner_id = @userID"},
|
|
|
|
{&AccessToken{}, "uid = @userID"},
|
|
{&Collaboration{}, "user_id = @userID"},
|
|
{&Access{}, "user_id = @userID"},
|
|
{&Action{}, "user_id = @userID"},
|
|
{&IssueUser{}, "uid = @userID"},
|
|
{&EmailAddress{}, "uid = @userID"},
|
|
{&User{}, "id = @userID"},
|
|
} {
|
|
err = tx.Where(t.where, sql.Named("userID", userID)).Delete(t.table).Error
|
|
if err != nil {
|
|
return errors.Wrapf(err, "clean up table %T", t.table)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_ = os.RemoveAll(repoutil.UserPath(user.Name))
|
|
_ = os.Remove(userutil.CustomAvatarPath(userID))
|
|
|
|
if needsRewriteAuthorizedKeys {
|
|
err = newPublicKeysStore(s.db).RewriteAuthorizedKeys()
|
|
if err != nil {
|
|
return errors.Wrap(err, `rewrite "authorized_keys" file`)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// DeleteInactivated deletes all inactivated users.
|
|
//
|
|
// NOTE: We do not take context.Context here because this operation in practice
|
|
// could much longer than the general request timeout (e.g. one minute).
|
|
func (s *UsersStore) DeleteInactivated() error {
|
|
var userIDs []int64
|
|
err := s.db.Model(&User{}).Where("is_active = ?", false).Pluck("id", &userIDs).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "get inactivated user IDs")
|
|
}
|
|
|
|
for _, userID := range userIDs {
|
|
err = s.DeleteByID(context.Background(), userID, true)
|
|
if err != nil {
|
|
// Skip users that may had set to inactivated by admins.
|
|
if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {
|
|
continue
|
|
}
|
|
return errors.Wrapf(err, "delete user with ID %d", userID)
|
|
}
|
|
}
|
|
err = newPublicKeysStore(s.db).RewriteAuthorizedKeys()
|
|
if err != nil {
|
|
return errors.Wrap(err, `rewrite "authorized_keys" file`)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (*UsersStore) recountFollows(tx *gorm.DB, userID, followID int64) error {
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE "user"
|
|
SET num_followers = (
|
|
SELECT COUNT(*) FROM follow WHERE follow_id = @followID
|
|
)
|
|
WHERE id = @followID
|
|
*/
|
|
err := tx.Model(&User{}).
|
|
Where("id = ?", followID).
|
|
Update(
|
|
"num_followers",
|
|
tx.Model(&Follow{}).Select("COUNT(*)").Where("follow_id = ?", followID),
|
|
).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `update "user.num_followers"`)
|
|
}
|
|
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
UPDATE "user"
|
|
SET num_following = (
|
|
SELECT COUNT(*) FROM follow WHERE user_id = @userID
|
|
)
|
|
WHERE id = @userID
|
|
*/
|
|
err = tx.Model(&User{}).
|
|
Where("id = ?", userID).
|
|
Update(
|
|
"num_following",
|
|
tx.Model(&Follow{}).Select("COUNT(*)").Where("user_id = ?", userID),
|
|
).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, `update "user.num_following"`)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Follow marks the user to follow the other user.
|
|
func (s *UsersStore) Follow(ctx context.Context, userID, followID int64) error {
|
|
if userID == followID {
|
|
return nil
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
f := &Follow{
|
|
UserID: userID,
|
|
FollowID: followID,
|
|
}
|
|
result := tx.FirstOrCreate(f, f)
|
|
if result.Error != nil {
|
|
return errors.Wrap(result.Error, "upsert")
|
|
} else if result.RowsAffected <= 0 {
|
|
return nil // Relation already exists
|
|
}
|
|
|
|
return s.recountFollows(tx, userID, followID)
|
|
})
|
|
}
|
|
|
|
// Unfollow removes the mark the user to follow the other user.
|
|
func (s *UsersStore) Unfollow(ctx context.Context, userID, followID int64) error {
|
|
if userID == followID {
|
|
return nil
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
err := tx.Where("user_id = ? AND follow_id = ?", userID, followID).Delete(&Follow{}).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "delete")
|
|
}
|
|
return s.recountFollows(tx, userID, followID)
|
|
})
|
|
}
|
|
|
|
// IsFollowing returns true if the user is following the other user.
|
|
func (s *UsersStore) IsFollowing(ctx context.Context, userID, followID int64) bool {
|
|
return s.db.WithContext(ctx).Where("user_id = ? AND follow_id = ?", userID, followID).First(&Follow{}).Error == nil
|
|
}
|
|
|
|
var _ errutil.NotFound = (*ErrUserNotExist)(nil)
|
|
|
|
type ErrUserNotExist struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrUserNotExist returns true if the underlying error has the type
|
|
// ErrUserNotExist.
|
|
func IsErrUserNotExist(err error) bool {
|
|
_, ok := errors.Cause(err).(ErrUserNotExist)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrUserNotExist) Error() string {
|
|
return fmt.Sprintf("user does not exist: %v", err.args)
|
|
}
|
|
|
|
func (ErrUserNotExist) NotFound() bool {
|
|
return true
|
|
}
|
|
|
|
// GetByEmail returns the user (not organization) with given email. It ignores
|
|
// records with unverified emails and returns ErrUserNotExist when not found.
|
|
func (s *UsersStore) GetByEmail(ctx context.Context, email string) (*User, error) {
|
|
if email == "" {
|
|
return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
|
|
}
|
|
email = strings.ToLower(email)
|
|
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
SELECT * FROM "user"
|
|
LEFT JOIN email_address ON email_address.uid = "user".id
|
|
WHERE
|
|
"user".type = @userType
|
|
AND (
|
|
"user".email = @email AND "user".is_active = TRUE
|
|
OR email_address.email = @email AND email_address.is_activated = TRUE
|
|
)
|
|
*/
|
|
user := new(User)
|
|
err := s.db.WithContext(ctx).
|
|
Joins(dbutil.Quote("LEFT JOIN email_address ON email_address.uid = %s.id", "user"), true).
|
|
Where(dbutil.Quote("%s.type = ?", "user"), UserTypeIndividual).
|
|
Where(s.db.
|
|
Where(dbutil.Quote("%[1]s.email = ? AND %[1]s.is_active = ?", "user"), email, true).
|
|
Or("email_address.email = ? AND email_address.is_activated = ?", email, true),
|
|
).
|
|
First(&user).
|
|
Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
|
|
}
|
|
return nil, err
|
|
}
|
|
return user, nil
|
|
}
|
|
|
|
// GetByID returns the user with given ID. It returns ErrUserNotExist when not
|
|
// found.
|
|
func (s *UsersStore) GetByID(ctx context.Context, id int64) (*User, error) {
|
|
user := new(User)
|
|
err := s.db.WithContext(ctx).Where("id = ?", id).First(user).Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
|
|
}
|
|
return nil, err
|
|
}
|
|
return user, nil
|
|
}
|
|
|
|
// GetByUsername returns the user with given username. It returns
|
|
// ErrUserNotExist when not found.
|
|
func (s *UsersStore) GetByUsername(ctx context.Context, username string) (*User, error) {
|
|
user := new(User)
|
|
err := s.db.WithContext(ctx).Where("lower_name = ?", strings.ToLower(username)).First(user).Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
|
|
}
|
|
return nil, err
|
|
}
|
|
return user, nil
|
|
}
|
|
|
|
// GetByKeyID returns the owner of given public key ID. It returns
|
|
// ErrUserNotExist when not found.
|
|
func (s *UsersStore) GetByKeyID(ctx context.Context, keyID int64) (*User, error) {
|
|
user := new(User)
|
|
err := s.db.WithContext(ctx).
|
|
Joins(dbutil.Quote("JOIN public_key ON public_key.owner_id = %s.id", "user")).
|
|
Where("public_key.id = ?", keyID).
|
|
First(user).
|
|
Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrUserNotExist{args: errutil.Args{"keyID": keyID}}
|
|
}
|
|
return nil, err
|
|
}
|
|
return user, nil
|
|
}
|
|
|
|
// GetMailableEmailsByUsernames returns a list of verified primary email
|
|
// addresses (where email notifications are sent to) of users with given list of
|
|
// usernames. Non-existing usernames are ignored.
|
|
func (s *UsersStore) GetMailableEmailsByUsernames(ctx context.Context, usernames []string) ([]string, error) {
|
|
emails := make([]string, 0, len(usernames))
|
|
return emails, s.db.WithContext(ctx).
|
|
Model(&User{}).
|
|
Select("email").
|
|
Where("lower_name IN (?) AND is_active = ?", usernames, true).
|
|
Find(&emails).Error
|
|
}
|
|
|
|
// IsUsernameUsed returns true if the given username has been used other than
|
|
// the excluded user (a non-positive ID effectively meaning check against all
|
|
// users).
|
|
func (s *UsersStore) IsUsernameUsed(ctx context.Context, username string, excludeUserId int64) bool {
|
|
if username == "" {
|
|
return false
|
|
}
|
|
return s.db.WithContext(ctx).
|
|
Select("id").
|
|
Where("lower_name = ? AND id != ?", strings.ToLower(username), excludeUserId).
|
|
First(&User{}).
|
|
Error != gorm.ErrRecordNotFound
|
|
}
|
|
|
|
// List returns a list of users. Results are paginated by given page and page
|
|
// size, and sorted by primary key (id) in ascending order.
|
|
func (s *UsersStore) List(ctx context.Context, page, pageSize int) ([]*User, error) {
|
|
users := make([]*User, 0, pageSize)
|
|
return users, s.db.WithContext(ctx).
|
|
Where("type = ?", UserTypeIndividual).
|
|
Limit(pageSize).Offset((page - 1) * pageSize).
|
|
Order("id ASC").
|
|
Find(&users).
|
|
Error
|
|
}
|
|
|
|
// ListFollowers returns a list of users that are following the given user.
|
|
// Results are paginated by given page and page size, and sorted by the time of
|
|
// follow in descending order.
|
|
func (s *UsersStore) ListFollowers(ctx context.Context, userID int64, page, pageSize int) ([]*User, error) {
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
SELECT * FROM "user"
|
|
LEFT JOIN follow ON follow.user_id = "user".id
|
|
WHERE follow.follow_id = @userID
|
|
ORDER BY follow.id DESC
|
|
LIMIT @limit OFFSET @offset
|
|
*/
|
|
users := make([]*User, 0, pageSize)
|
|
return users, s.db.WithContext(ctx).
|
|
Joins(dbutil.Quote("LEFT JOIN follow ON follow.user_id = %s.id", "user")).
|
|
Where("follow.follow_id = ?", userID).
|
|
Limit(pageSize).Offset((page - 1) * pageSize).
|
|
Order("follow.id DESC").
|
|
Find(&users).
|
|
Error
|
|
}
|
|
|
|
// ListFollowings returns a list of users that are followed by the given user.
|
|
// Results are paginated by given page and page size, and sorted by the time of
|
|
// follow in descending order.
|
|
func (s *UsersStore) ListFollowings(ctx context.Context, userID int64, page, pageSize int) ([]*User, error) {
|
|
/*
|
|
Equivalent SQL for PostgreSQL:
|
|
|
|
SELECT * FROM "user"
|
|
LEFT JOIN follow ON follow.user_id = "user".id
|
|
WHERE follow.user_id = @userID
|
|
ORDER BY follow.id DESC
|
|
LIMIT @limit OFFSET @offset
|
|
*/
|
|
users := make([]*User, 0, pageSize)
|
|
return users, s.db.WithContext(ctx).
|
|
Joins(dbutil.Quote("LEFT JOIN follow ON follow.follow_id = %s.id", "user")).
|
|
Where("follow.user_id = ?", userID).
|
|
Limit(pageSize).Offset((page - 1) * pageSize).
|
|
Order("follow.id DESC").
|
|
Find(&users).
|
|
Error
|
|
}
|
|
|
|
func searchUserByName(ctx context.Context, db *gorm.DB, userType UserType, keyword string, page, pageSize int, orderBy string) ([]*User, int64, error) {
|
|
if keyword == "" {
|
|
return []*User{}, 0, nil
|
|
}
|
|
keyword = "%" + strings.ToLower(keyword) + "%"
|
|
|
|
tx := db.WithContext(ctx).
|
|
Where("type = ? AND (lower_name LIKE ? OR LOWER(full_name) LIKE ?)", userType, keyword, keyword)
|
|
|
|
var count int64
|
|
err := tx.Model(&User{}).Count(&count).Error
|
|
if err != nil {
|
|
return nil, 0, errors.Wrap(err, "count")
|
|
}
|
|
|
|
users := make([]*User, 0, pageSize)
|
|
return users, count, tx.Order(orderBy).Limit(pageSize).Offset((page - 1) * pageSize).Find(&users).Error
|
|
}
|
|
|
|
// SearchByName returns a list of users whose username or full name matches the
|
|
// given keyword case-insensitively. Results are paginated by given page and
|
|
// page size, and sorted by the given order (e.g. "id DESC"). A total count of
|
|
// all results is also returned. If the order is not given, it's up to the
|
|
// database to decide.
|
|
func (s *UsersStore) SearchByName(ctx context.Context, keyword string, page, pageSize int, orderBy string) ([]*User, int64, error) {
|
|
return searchUserByName(ctx, s.db, UserTypeIndividual, keyword, page, pageSize, orderBy)
|
|
}
|
|
|
|
type UpdateUserOptions struct {
|
|
LoginSource *int64
|
|
LoginName *string
|
|
|
|
Password *string
|
|
// GenerateNewRands indicates whether to force generate new rands for the user.
|
|
GenerateNewRands bool
|
|
|
|
FullName *string
|
|
Email *string
|
|
Website *string
|
|
Location *string
|
|
Description *string
|
|
|
|
MaxRepoCreation *int
|
|
LastRepoVisibility *bool
|
|
|
|
IsActivated *bool
|
|
IsAdmin *bool
|
|
AllowGitHook *bool
|
|
AllowImportLocal *bool
|
|
ProhibitLogin *bool
|
|
|
|
Avatar *string
|
|
AvatarEmail *string
|
|
}
|
|
|
|
// Update updates fields for the given user.
|
|
func (s *UsersStore) Update(ctx context.Context, userID int64, opts UpdateUserOptions) error {
|
|
updates := map[string]any{
|
|
"updated_unix": s.db.NowFunc().Unix(),
|
|
}
|
|
|
|
if opts.LoginSource != nil {
|
|
updates["login_source"] = *opts.LoginSource
|
|
}
|
|
if opts.LoginName != nil {
|
|
updates["login_name"] = *opts.LoginName
|
|
}
|
|
|
|
if opts.Password != nil {
|
|
salt, err := userutil.RandomSalt()
|
|
if err != nil {
|
|
return errors.Wrap(err, "generate salt")
|
|
}
|
|
updates["salt"] = salt
|
|
updates["passwd"] = userutil.EncodePassword(*opts.Password, salt)
|
|
opts.GenerateNewRands = true
|
|
}
|
|
if opts.GenerateNewRands {
|
|
rands, err := userutil.RandomSalt()
|
|
if err != nil {
|
|
return errors.Wrap(err, "generate rands")
|
|
}
|
|
updates["rands"] = rands
|
|
}
|
|
|
|
if opts.FullName != nil {
|
|
updates["full_name"] = strutil.Truncate(*opts.FullName, 255)
|
|
}
|
|
if opts.Email != nil {
|
|
_, err := s.GetByEmail(ctx, *opts.Email)
|
|
if err == nil {
|
|
return ErrEmailAlreadyUsed{args: errutil.Args{"email": *opts.Email}}
|
|
} else if !IsErrUserNotExist(err) {
|
|
return errors.Wrap(err, "check email")
|
|
}
|
|
updates["email"] = *opts.Email
|
|
}
|
|
if opts.Website != nil {
|
|
updates["website"] = strutil.Truncate(*opts.Website, 255)
|
|
}
|
|
if opts.Location != nil {
|
|
updates["location"] = strutil.Truncate(*opts.Location, 255)
|
|
}
|
|
if opts.Description != nil {
|
|
updates["description"] = strutil.Truncate(*opts.Description, 255)
|
|
}
|
|
|
|
if opts.MaxRepoCreation != nil {
|
|
if *opts.MaxRepoCreation < -1 {
|
|
*opts.MaxRepoCreation = -1
|
|
}
|
|
updates["max_repo_creation"] = *opts.MaxRepoCreation
|
|
}
|
|
if opts.LastRepoVisibility != nil {
|
|
updates["last_repo_visibility"] = *opts.LastRepoVisibility
|
|
}
|
|
|
|
if opts.IsActivated != nil {
|
|
updates["is_active"] = *opts.IsActivated
|
|
}
|
|
if opts.IsAdmin != nil {
|
|
updates["is_admin"] = *opts.IsAdmin
|
|
}
|
|
if opts.AllowGitHook != nil {
|
|
updates["allow_git_hook"] = *opts.AllowGitHook
|
|
}
|
|
if opts.AllowImportLocal != nil {
|
|
updates["allow_import_local"] = *opts.AllowImportLocal
|
|
}
|
|
if opts.ProhibitLogin != nil {
|
|
updates["prohibit_login"] = *opts.ProhibitLogin
|
|
}
|
|
|
|
if opts.Avatar != nil {
|
|
updates["avatar"] = strutil.Truncate(*opts.Avatar, 2048)
|
|
}
|
|
if opts.AvatarEmail != nil {
|
|
updates["avatar_email"] = strutil.Truncate(*opts.AvatarEmail, 255)
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Model(&User{}).Where("id = ?", userID).Updates(updates).Error
|
|
}
|
|
|
|
// UseCustomAvatar uses the given avatar as the user custom avatar.
|
|
func (s *UsersStore) UseCustomAvatar(ctx context.Context, userID int64, avatar []byte) error {
|
|
err := userutil.SaveAvatar(userID, avatar)
|
|
if err != nil {
|
|
return errors.Wrap(err, "save avatar")
|
|
}
|
|
|
|
return s.db.WithContext(ctx).
|
|
Model(&User{}).
|
|
Where("id = ?", userID).
|
|
Updates(map[string]any{
|
|
"use_custom_avatar": true,
|
|
"updated_unix": s.db.NowFunc().Unix(),
|
|
}).
|
|
Error
|
|
}
|
|
|
|
// AddEmail adds a new email address to given user. It returns
|
|
// ErrEmailAlreadyUsed if the email has been verified by another user.
|
|
func (s *UsersStore) AddEmail(ctx context.Context, userID int64, email string, isActivated bool) error {
|
|
email = strings.ToLower(strings.TrimSpace(email))
|
|
_, err := s.GetByEmail(ctx, email)
|
|
if err == nil {
|
|
return ErrEmailAlreadyUsed{
|
|
args: errutil.Args{
|
|
"email": email,
|
|
},
|
|
}
|
|
} else if !IsErrUserNotExist(err) {
|
|
return errors.Wrap(err, "check user by email")
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Create(
|
|
&EmailAddress{
|
|
UserID: userID,
|
|
Email: email,
|
|
IsActivated: isActivated,
|
|
},
|
|
).Error
|
|
}
|
|
|
|
var _ errutil.NotFound = (*ErrEmailNotExist)(nil)
|
|
|
|
type ErrEmailNotExist struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrEmailAddressNotExist returns true if the underlying error has the type
|
|
// ErrEmailNotExist.
|
|
func IsErrEmailAddressNotExist(err error) bool {
|
|
_, ok := errors.Cause(err).(ErrEmailNotExist)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrEmailNotExist) Error() string {
|
|
return fmt.Sprintf("email address does not exist: %v", err.args)
|
|
}
|
|
|
|
func (ErrEmailNotExist) NotFound() bool {
|
|
return true
|
|
}
|
|
|
|
// GetEmail returns the email address of the given user. If `needsActivated` is
|
|
// true, only activated email will be returned, otherwise, it may return
|
|
// inactivated email addresses. It returns ErrEmailNotExist when no qualified
|
|
// email is not found.
|
|
func (s *UsersStore) GetEmail(ctx context.Context, userID int64, email string, needsActivated bool) (*EmailAddress, error) {
|
|
tx := s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email)
|
|
if needsActivated {
|
|
tx = tx.Where("is_activated = ?", true)
|
|
}
|
|
|
|
emailAddress := new(EmailAddress)
|
|
err := tx.First(emailAddress).Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrEmailNotExist{
|
|
args: errutil.Args{
|
|
"email": email,
|
|
},
|
|
}
|
|
}
|
|
return nil, err
|
|
}
|
|
return emailAddress, nil
|
|
}
|
|
|
|
// ListEmails returns all email addresses of the given user. It always includes
|
|
// a primary email address.
|
|
func (s *UsersStore) ListEmails(ctx context.Context, userID int64) ([]*EmailAddress, error) {
|
|
user, err := s.GetByID(ctx, userID)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get user")
|
|
}
|
|
|
|
var emails []*EmailAddress
|
|
err = s.db.WithContext(ctx).Where("uid = ?", userID).Order("id ASC").Find(&emails).Error
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "list emails")
|
|
}
|
|
|
|
isPrimaryFound := false
|
|
for _, email := range emails {
|
|
if email.Email == user.Email {
|
|
isPrimaryFound = true
|
|
email.IsPrimary = true
|
|
break
|
|
}
|
|
}
|
|
|
|
// We always want the primary email address displayed, even if it's not in the
|
|
// email_address table yet.
|
|
if !isPrimaryFound {
|
|
emails = append(emails, &EmailAddress{
|
|
Email: user.Email,
|
|
IsActivated: user.IsActive,
|
|
IsPrimary: true,
|
|
})
|
|
}
|
|
return emails, nil
|
|
}
|
|
|
|
// MarkEmailActivated marks the email address of the given user as activated,
|
|
// and new rands are generated for the user.
|
|
func (s *UsersStore) MarkEmailActivated(ctx context.Context, userID int64, email string) error {
|
|
return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
err := s.db.WithContext(ctx).
|
|
Model(&EmailAddress{}).
|
|
Where("uid = ? AND email = ?", userID, email).
|
|
Update("is_activated", true).
|
|
Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "mark email activated")
|
|
}
|
|
|
|
return newUsersStore(tx).Update(ctx, userID, UpdateUserOptions{GenerateNewRands: true})
|
|
})
|
|
}
|
|
|
|
type ErrEmailNotVerified struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrEmailNotVerified returns true if the underlying error has the type
|
|
// ErrEmailNotVerified.
|
|
func IsErrEmailNotVerified(err error) bool {
|
|
_, ok := errors.Cause(err).(ErrEmailNotVerified)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrEmailNotVerified) Error() string {
|
|
return fmt.Sprintf("email has not been verified: %v", err.args)
|
|
}
|
|
|
|
// MarkEmailPrimary marks the email address of the given user as primary. It
|
|
// returns ErrEmailNotExist when the email is not found for the user, and
|
|
// ErrEmailNotActivated when the email is not activated.
|
|
func (s *UsersStore) MarkEmailPrimary(ctx context.Context, userID int64, email string) error {
|
|
var emailAddress EmailAddress
|
|
err := s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email).First(&emailAddress).Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return ErrEmailNotExist{args: errutil.Args{"email": email}}
|
|
}
|
|
return errors.Wrap(err, "get email address")
|
|
}
|
|
|
|
if !emailAddress.IsActivated {
|
|
return ErrEmailNotVerified{args: errutil.Args{"email": email}}
|
|
}
|
|
|
|
user, err := s.GetByID(ctx, userID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "get user")
|
|
}
|
|
|
|
return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
|
|
// Make sure the former primary email doesn't disappear.
|
|
err = tx.FirstOrCreate(
|
|
&EmailAddress{
|
|
UserID: user.ID,
|
|
Email: user.Email,
|
|
IsActivated: user.IsActive,
|
|
},
|
|
&EmailAddress{
|
|
UserID: user.ID,
|
|
Email: user.Email,
|
|
},
|
|
).Error
|
|
if err != nil {
|
|
return errors.Wrap(err, "upsert former primary email address")
|
|
}
|
|
|
|
return tx.Model(&User{}).
|
|
Where("id = ?", user.ID).
|
|
Updates(map[string]any{
|
|
"email": email,
|
|
"updated_unix": tx.NowFunc().Unix(),
|
|
},
|
|
).Error
|
|
})
|
|
}
|
|
|
|
// DeleteEmail deletes the email address of the given user.
|
|
func (s *UsersStore) DeleteEmail(ctx context.Context, userID int64, email string) error {
|
|
return s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email).Delete(&EmailAddress{}).Error
|
|
}
|
|
|
|
// UserType indicates the type of the user account.
|
|
type UserType int
|
|
|
|
const (
|
|
UserTypeIndividual UserType = iota // NOTE: Historic reason to make it starts at 0.
|
|
UserTypeOrganization
|
|
)
|
|
|
|
// User represents the object of an individual or an organization.
|
|
type User struct {
|
|
ID int64 `gorm:"primaryKey"`
|
|
LowerName string `xorm:"UNIQUE NOT NULL" gorm:"unique;not null"`
|
|
Name string `xorm:"UNIQUE NOT NULL" gorm:"not null"`
|
|
FullName string
|
|
// Email is the primary email address (to be used for communication)
|
|
Email string `xorm:"NOT NULL" gorm:"not null"`
|
|
Password string `xorm:"passwd NOT NULL" gorm:"column:passwd;not null"`
|
|
LoginSource int64 `xorm:"NOT NULL DEFAULT 0" gorm:"not null;default:0"`
|
|
LoginName string
|
|
Type UserType
|
|
Location string
|
|
Website string
|
|
Rands string `xorm:"VARCHAR(10)" gorm:"type:VARCHAR(10)"`
|
|
Salt string `xorm:"VARCHAR(10)" gorm:"type:VARCHAR(10)"`
|
|
|
|
Created time.Time `xorm:"-" gorm:"-" json:"-"`
|
|
CreatedUnix int64
|
|
Updated time.Time `xorm:"-" gorm:"-" json:"-"`
|
|
UpdatedUnix int64
|
|
|
|
// Remember visibility choice for convenience, true for private
|
|
LastRepoVisibility bool
|
|
// Maximum repository creation limit, -1 means use global default
|
|
MaxRepoCreation int `xorm:"NOT NULL DEFAULT -1" gorm:"not null;default:-1"`
|
|
|
|
// Permissions
|
|
IsActive bool // Activate primary email
|
|
IsAdmin bool
|
|
AllowGitHook bool
|
|
AllowImportLocal bool // Allow migrate repository by local path
|
|
ProhibitLogin bool
|
|
|
|
// Avatar
|
|
Avatar string `xorm:"VARCHAR(2048) NOT NULL" gorm:"type:VARCHAR(2048);not null"`
|
|
AvatarEmail string `xorm:"NOT NULL" gorm:"not null"`
|
|
UseCustomAvatar bool
|
|
|
|
// Counters
|
|
NumFollowers int
|
|
NumFollowing int `xorm:"NOT NULL DEFAULT 0" gorm:"not null;default:0"`
|
|
NumStars int
|
|
NumRepos int
|
|
|
|
// For organization
|
|
Description string
|
|
NumTeams int
|
|
NumMembers int
|
|
Teams []*Team `xorm:"-" gorm:"-" json:"-"`
|
|
Members []*User `xorm:"-" gorm:"-" json:"-"`
|
|
}
|
|
|
|
// BeforeCreate implements the GORM create hook.
|
|
func (u *User) BeforeCreate(tx *gorm.DB) error {
|
|
if u.CreatedUnix == 0 {
|
|
u.CreatedUnix = tx.NowFunc().Unix()
|
|
u.UpdatedUnix = u.CreatedUnix
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// AfterFind implements the GORM query hook.
|
|
func (u *User) AfterFind(_ *gorm.DB) error {
|
|
u.FullName = markup.Sanitize(u.FullName)
|
|
u.Created = time.Unix(u.CreatedUnix, 0).Local()
|
|
u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
|
|
return nil
|
|
}
|
|
|
|
// IsLocal returns true if the user is created as local account.
|
|
func (u *User) IsLocal() bool {
|
|
return u.LoginSource <= 0
|
|
}
|
|
|
|
// IsOrganization returns true if the user is an organization.
|
|
func (u *User) IsOrganization() bool {
|
|
return u.Type == UserTypeOrganization
|
|
}
|
|
|
|
// APIFormat returns the API format of a user.
|
|
func (u *User) APIFormat() *api.User {
|
|
return &api.User{
|
|
ID: u.ID,
|
|
UserName: u.Name,
|
|
Login: u.Name,
|
|
FullName: u.FullName,
|
|
Email: u.Email,
|
|
AvatarUrl: u.AvatarURL(),
|
|
}
|
|
}
|
|
|
|
// maxNumRepos returns the maximum number of repositories that the user can have
|
|
// direct ownership.
|
|
func (u *User) maxNumRepos() int {
|
|
if u.MaxRepoCreation <= -1 {
|
|
return conf.Repository.MaxCreationLimit
|
|
}
|
|
return u.MaxRepoCreation
|
|
}
|
|
|
|
// canCreateRepo returns true if the user can create a repository.
|
|
func (u *User) canCreateRepo() bool {
|
|
return u.maxNumRepos() <= -1 || u.NumRepos < u.maxNumRepos()
|
|
}
|
|
|
|
// CanCreateOrganization returns true if user can create organizations.
|
|
func (u *User) CanCreateOrganization() bool {
|
|
return !conf.Admin.DisableRegularOrgCreation || u.IsAdmin
|
|
}
|
|
|
|
// CanEditGitHook returns true if user can edit Git hooks.
|
|
func (u *User) CanEditGitHook() bool {
|
|
return u.IsAdmin || u.AllowGitHook
|
|
}
|
|
|
|
// CanImportLocal returns true if user can migrate repositories by local path.
|
|
func (u *User) CanImportLocal() bool {
|
|
return conf.Repository.EnableLocalPathMigration && (u.IsAdmin || u.AllowImportLocal)
|
|
}
|
|
|
|
// DisplayName returns the full name of the user if it's not empty, returns the
|
|
// username otherwise.
|
|
func (u *User) DisplayName() string {
|
|
if len(u.FullName) > 0 {
|
|
return u.FullName
|
|
}
|
|
return u.Name
|
|
}
|
|
|
|
// HomeURLPath returns the URL path to the user or organization home page.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User` and move this to the "userutil"
|
|
// package.
|
|
func (u *User) HomeURLPath() string {
|
|
return conf.Server.Subpath + "/" + u.Name
|
|
}
|
|
|
|
// HTMLURL returns the full URL to the user or organization home page.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User` and move this to the "userutil"
|
|
// package.
|
|
func (u *User) HTMLURL() string {
|
|
return conf.Server.ExternalURL + u.Name
|
|
}
|
|
|
|
// AvatarURLPath returns the URL path to the user or organization avatar. If the
|
|
// user enables Gravatar-like service, then an external URL will be returned.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User` and move this to the "userutil"
|
|
// package.
|
|
func (u *User) AvatarURLPath() string {
|
|
defaultURLPath := conf.UserDefaultAvatarURLPath()
|
|
if u.ID <= 0 {
|
|
return defaultURLPath
|
|
}
|
|
|
|
hasCustomAvatar := osutil.IsFile(userutil.CustomAvatarPath(u.ID))
|
|
switch {
|
|
case u.UseCustomAvatar:
|
|
if !hasCustomAvatar {
|
|
return defaultURLPath
|
|
}
|
|
return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, conf.UsersAvatarPathPrefix, u.ID)
|
|
case conf.Picture.DisableGravatar:
|
|
if !hasCustomAvatar {
|
|
if err := userutil.GenerateRandomAvatar(u.ID, u.Name, u.Email); err != nil {
|
|
log.Error("Failed to generate random avatar [user_id: %d]: %v", u.ID, err)
|
|
}
|
|
}
|
|
return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, conf.UsersAvatarPathPrefix, u.ID)
|
|
}
|
|
return tool.AvatarLink(u.AvatarEmail)
|
|
}
|
|
|
|
// AvatarURL returns the full URL to the user or organization avatar. If the
|
|
// user enables Gravatar-like service, then an external URL will be returned.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User` and move this to the "userutil"
|
|
// package.
|
|
func (u *User) AvatarURL() string {
|
|
link := u.AvatarURLPath()
|
|
if link[0] == '/' && link[1] != '/' {
|
|
return conf.Server.ExternalURL + strings.TrimPrefix(link, conf.Server.Subpath)[1:]
|
|
}
|
|
return link
|
|
}
|
|
|
|
// IsFollowing returns true if the user is following the given user.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User`.
|
|
func (u *User) IsFollowing(followID int64) bool {
|
|
return Handle.Users().IsFollowing(context.TODO(), u.ID, followID)
|
|
}
|
|
|
|
// IsUserOrgOwner returns true if the user is in the owner team of the given
|
|
// organization.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User`.
|
|
func (u *User) IsUserOrgOwner(orgId int64) bool {
|
|
return IsOrganizationOwner(orgId, u.ID)
|
|
}
|
|
|
|
// IsPublicMember returns true if the user has public membership of the given
|
|
// organization.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User`.
|
|
func (u *User) IsPublicMember(orgId int64) bool {
|
|
return IsPublicMembership(orgId, u.ID)
|
|
}
|
|
|
|
// GetOrganizationCount returns the count of organization membership that the
|
|
// user has.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User`.
|
|
func (u *User) GetOrganizationCount() (int64, error) {
|
|
return Handle.Organizations().CountByUser(context.TODO(), u.ID)
|
|
}
|
|
|
|
// ShortName truncates and returns the username at most in given length.
|
|
//
|
|
// TODO(unknwon): This is also used in templates, which should be fixed by
|
|
// having a dedicated type `template.User`.
|
|
func (u *User) ShortName(length int) string {
|
|
return strutil.Ellipsis(u.Name, length)
|
|
}
|
|
|
|
// NewGhostUser creates and returns a fake user for people who has deleted their
|
|
// accounts.
|
|
//
|
|
// TODO: Once migrated to unknwon.dev/i18n, pass in the `i18n.Locale` to
|
|
// translate the text to local language.
|
|
func NewGhostUser() *User {
|
|
return &User{
|
|
ID: -1,
|
|
Name: "Ghost",
|
|
LowerName: "ghost",
|
|
}
|
|
}
|
|
|
|
var (
|
|
reservedUsernames = map[string]struct{}{
|
|
"-": {},
|
|
"explore": {},
|
|
"create": {},
|
|
"assets": {},
|
|
"css": {},
|
|
"img": {},
|
|
"js": {},
|
|
"less": {},
|
|
"plugins": {},
|
|
"debug": {},
|
|
"raw": {},
|
|
"install": {},
|
|
"api": {},
|
|
"avatar": {},
|
|
"user": {},
|
|
"org": {},
|
|
"help": {},
|
|
"stars": {},
|
|
"issues": {},
|
|
"pulls": {},
|
|
"commits": {},
|
|
"repo": {},
|
|
"template": {},
|
|
"admin": {},
|
|
"new": {},
|
|
".": {},
|
|
"..": {},
|
|
}
|
|
reservedUsernamePatterns = []string{"*.keys"}
|
|
)
|
|
|
|
type ErrNameNotAllowed struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
// IsErrNameNotAllowed returns true if the underlying error has the type
|
|
// ErrNameNotAllowed.
|
|
func IsErrNameNotAllowed(err error) bool {
|
|
_, ok := errors.Cause(err).(ErrNameNotAllowed)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrNameNotAllowed) Value() string {
|
|
val, ok := err.args["name"].(string)
|
|
if ok {
|
|
return val
|
|
}
|
|
|
|
val, ok = err.args["pattern"].(string)
|
|
if ok {
|
|
return val
|
|
}
|
|
|
|
return "<value not found>"
|
|
}
|
|
|
|
func (err ErrNameNotAllowed) Error() string {
|
|
return fmt.Sprintf("name is not allowed: %v", err.args)
|
|
}
|
|
|
|
// isNameAllowed checks if the name is reserved or pattern of the name is not
|
|
// allowed based on given reserved names and patterns. Names are exact match,
|
|
// patterns can be prefix or suffix match with the wildcard ("*").
|
|
func isNameAllowed(names map[string]struct{}, patterns []string, name string) error {
|
|
name = strings.TrimSpace(strings.ToLower(name))
|
|
if utf8.RuneCountInString(name) == 0 {
|
|
return ErrNameNotAllowed{
|
|
args: errutil.Args{
|
|
"reason": "empty name",
|
|
},
|
|
}
|
|
}
|
|
|
|
if _, ok := names[name]; ok {
|
|
return ErrNameNotAllowed{
|
|
args: errutil.Args{
|
|
"reason": "reserved",
|
|
"name": name,
|
|
},
|
|
}
|
|
}
|
|
|
|
for _, pattern := range patterns {
|
|
if pattern[0] == '*' && strings.HasSuffix(name, pattern[1:]) ||
|
|
(pattern[len(pattern)-1] == '*' && strings.HasPrefix(name, pattern[:len(pattern)-1])) {
|
|
return ErrNameNotAllowed{
|
|
args: errutil.Args{
|
|
"reason": "reserved",
|
|
"pattern": pattern,
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// isUsernameAllowed returns ErrNameNotAllowed if the given name or pattern of
|
|
// the name is not allowed as a username.
|
|
func isUsernameAllowed(name string) error {
|
|
return isNameAllowed(reservedUsernames, reservedUsernamePatterns, name)
|
|
}
|
|
|
|
// EmailAddress is an email address of a user.
|
|
type EmailAddress struct {
|
|
ID int64 `gorm:"primaryKey"`
|
|
UserID int64 `xorm:"uid INDEX NOT NULL" gorm:"column:uid;index;uniqueIndex:email_address_user_email_unique;not null"`
|
|
Email string `xorm:"UNIQUE NOT NULL" gorm:"uniqueIndex:email_address_user_email_unique;not null;size:254"`
|
|
IsActivated bool `gorm:"not null;default:FALSE"`
|
|
IsPrimary bool `xorm:"-" gorm:"-" json:"-"`
|
|
}
|
|
|
|
// Follow represents relations of users and their followers.
|
|
type Follow struct {
|
|
ID int64 `gorm:"primaryKey"`
|
|
UserID int64 `xorm:"UNIQUE(follow)" gorm:"uniqueIndex:follow_user_follow_unique;not null"`
|
|
FollowID int64 `xorm:"UNIQUE(follow)" gorm:"uniqueIndex:follow_user_follow_unique;not null"`
|
|
}
|