mirror of https://github.com/gogs/gogs.git
703 lines
19 KiB
Go
703 lines
19 KiB
Go
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package db
|
|
|
|
import (
|
|
"context"
|
|
"encoding/hex"
|
|
"fmt"
|
|
_ "image/jpeg"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
"unicode/utf8"
|
|
|
|
"github.com/unknwon/com"
|
|
log "unknwon.dev/clog/v2"
|
|
"xorm.io/xorm"
|
|
|
|
"github.com/gogs/git-module"
|
|
|
|
"gogs.io/gogs/internal/conf"
|
|
"gogs.io/gogs/internal/db/errors"
|
|
"gogs.io/gogs/internal/errutil"
|
|
"gogs.io/gogs/internal/tool"
|
|
"gogs.io/gogs/internal/userutil"
|
|
)
|
|
|
|
// TODO(unknwon): Delete me once refactoring is done.
|
|
func (u *User) BeforeInsert() {
|
|
u.CreatedUnix = time.Now().Unix()
|
|
u.UpdatedUnix = u.CreatedUnix
|
|
}
|
|
|
|
// TODO(unknwon): Refactoring together with methods that do updates.
|
|
func (u *User) BeforeUpdate() {
|
|
if u.MaxRepoCreation < -1 {
|
|
u.MaxRepoCreation = -1
|
|
}
|
|
u.UpdatedUnix = time.Now().Unix()
|
|
}
|
|
|
|
// TODO(unknwon): Delete me once refactoring is done.
|
|
func (u *User) AfterSet(colName string, _ xorm.Cell) {
|
|
switch colName {
|
|
case "created_unix":
|
|
u.Created = time.Unix(u.CreatedUnix, 0).Local()
|
|
case "updated_unix":
|
|
u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
|
|
}
|
|
}
|
|
|
|
// Deprecated: Use OrgsUsers.CountByUser instead.
|
|
//
|
|
// TODO(unknwon): Delete me once no more call sites in this file.
|
|
func (u *User) getOrganizationCount(e Engine) (int64, error) {
|
|
return e.Where("uid=?", u.ID).Count(new(OrgUser))
|
|
}
|
|
|
|
var (
|
|
reservedUsernames = []string{"-", "explore", "create", "assets", "css", "img", "js", "less", "plugins", "debug", "raw", "install", "api", "avatar", "user", "org", "help", "stars", "issues", "pulls", "commits", "repo", "template", "admin", "new", ".", ".."}
|
|
reservedUserPatterns = []string{"*.keys"}
|
|
)
|
|
|
|
type ErrNameNotAllowed struct {
|
|
args errutil.Args
|
|
}
|
|
|
|
func IsErrNameNotAllowed(err error) bool {
|
|
_, ok := err.(ErrNameNotAllowed)
|
|
return ok
|
|
}
|
|
|
|
func (err ErrNameNotAllowed) Value() string {
|
|
val, ok := err.args["name"].(string)
|
|
if ok {
|
|
return val
|
|
}
|
|
|
|
val, ok = err.args["pattern"].(string)
|
|
if ok {
|
|
return val
|
|
}
|
|
|
|
return "<value not found>"
|
|
}
|
|
|
|
func (err ErrNameNotAllowed) Error() string {
|
|
return fmt.Sprintf("name is not allowed: %v", err.args)
|
|
}
|
|
|
|
// isNameAllowed checks if name is reserved or pattern of name is not allowed
|
|
// based on given reserved names and patterns.
|
|
// Names are exact match, patterns can be prefix or suffix match with placeholder '*'.
|
|
func isNameAllowed(names, patterns []string, name string) error {
|
|
name = strings.TrimSpace(strings.ToLower(name))
|
|
if utf8.RuneCountInString(name) == 0 {
|
|
return ErrNameNotAllowed{args: errutil.Args{"reason": "empty name"}}
|
|
}
|
|
|
|
for i := range names {
|
|
if name == names[i] {
|
|
return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "name": name}}
|
|
}
|
|
}
|
|
|
|
for _, pat := range patterns {
|
|
if pat[0] == '*' && strings.HasSuffix(name, pat[1:]) ||
|
|
(pat[len(pat)-1] == '*' && strings.HasPrefix(name, pat[:len(pat)-1])) {
|
|
return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "pattern": pat}}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// isUsernameAllowed return an error if given name is a reserved name or pattern for users.
|
|
func isUsernameAllowed(name string) error {
|
|
return isNameAllowed(reservedUsernames, reservedUserPatterns, name)
|
|
}
|
|
|
|
// CreateUser creates record of a new user.
|
|
//
|
|
// Deprecated: Use Users.Create instead.
|
|
func CreateUser(u *User) (err error) {
|
|
if err = isUsernameAllowed(u.Name); err != nil {
|
|
return err
|
|
}
|
|
|
|
if Users.IsUsernameUsed(context.TODO(), u.Name) {
|
|
return ErrUserAlreadyExist{args: errutil.Args{"name": u.Name}}
|
|
}
|
|
|
|
u.Email = strings.ToLower(u.Email)
|
|
isExist, err := IsEmailUsed(u.Email)
|
|
if err != nil {
|
|
return err
|
|
} else if isExist {
|
|
return ErrEmailAlreadyUsed{args: errutil.Args{"email": u.Email}}
|
|
}
|
|
|
|
u.LowerName = strings.ToLower(u.Name)
|
|
u.AvatarEmail = u.Email
|
|
u.Avatar = tool.HashEmail(u.AvatarEmail)
|
|
if u.Rands, err = userutil.RandomSalt(); err != nil {
|
|
return err
|
|
}
|
|
if u.Salt, err = userutil.RandomSalt(); err != nil {
|
|
return err
|
|
}
|
|
u.Password = userutil.EncodePassword(u.Password, u.Salt)
|
|
u.MaxRepoCreation = -1
|
|
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err = sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err = sess.Insert(u); err != nil {
|
|
return err
|
|
} else if err = os.MkdirAll(UserPath(u.Name), os.ModePerm); err != nil {
|
|
return err
|
|
}
|
|
|
|
return sess.Commit()
|
|
}
|
|
|
|
func countUsers(e Engine) int64 {
|
|
count, _ := e.Where("type=0").Count(new(User))
|
|
return count
|
|
}
|
|
|
|
// CountUsers returns number of users.
|
|
func CountUsers() int64 {
|
|
return countUsers(x)
|
|
}
|
|
|
|
// Users returns number of users in given page.
|
|
func ListUsers(page, pageSize int) ([]*User, error) {
|
|
users := make([]*User, 0, pageSize)
|
|
return users, x.Limit(pageSize, (page-1)*pageSize).Where("type=0").Asc("id").Find(&users)
|
|
}
|
|
|
|
// parseUserFromCode returns user by username encoded in code.
|
|
// It returns nil if code or username is invalid.
|
|
func parseUserFromCode(code string) (user *User) {
|
|
if len(code) <= tool.TIME_LIMIT_CODE_LENGTH {
|
|
return nil
|
|
}
|
|
|
|
// Use tail hex username to query user
|
|
hexStr := code[tool.TIME_LIMIT_CODE_LENGTH:]
|
|
if b, err := hex.DecodeString(hexStr); err == nil {
|
|
if user, err = GetUserByName(string(b)); user != nil {
|
|
return user
|
|
} else if !IsErrUserNotExist(err) {
|
|
log.Error("Failed to get user by name %q: %v", string(b), err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// verify active code when active account
|
|
func VerifyUserActiveCode(code string) (user *User) {
|
|
minutes := conf.Auth.ActivateCodeLives
|
|
|
|
if user = parseUserFromCode(code); user != nil {
|
|
// time limit code
|
|
prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
|
|
data := com.ToStr(user.ID) + user.Email + user.LowerName + user.Password + user.Rands
|
|
|
|
if tool.VerifyTimeLimitCode(data, minutes, prefix) {
|
|
return user
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// verify active code when active account
|
|
func VerifyActiveEmailCode(code, email string) *EmailAddress {
|
|
minutes := conf.Auth.ActivateCodeLives
|
|
|
|
if user := parseUserFromCode(code); user != nil {
|
|
// time limit code
|
|
prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
|
|
data := com.ToStr(user.ID) + email + user.LowerName + user.Password + user.Rands
|
|
|
|
if tool.VerifyTimeLimitCode(data, minutes, prefix) {
|
|
emailAddress := &EmailAddress{Email: email}
|
|
if has, _ := x.Get(emailAddress); has {
|
|
return emailAddress
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// ChangeUserName changes all corresponding setting from old user name to new one.
|
|
func ChangeUserName(u *User, newUserName string) (err error) {
|
|
if err = isUsernameAllowed(newUserName); err != nil {
|
|
return err
|
|
}
|
|
|
|
if Users.IsUsernameUsed(context.TODO(), newUserName) {
|
|
return ErrUserAlreadyExist{args: errutil.Args{"name": newUserName}}
|
|
}
|
|
|
|
if err = ChangeUsernameInPullRequests(u.Name, newUserName); err != nil {
|
|
return fmt.Errorf("ChangeUsernameInPullRequests: %v", err)
|
|
}
|
|
|
|
// Delete all local copies of repositories and wikis the user owns.
|
|
if err = x.Where("owner_id=?", u.ID).Iterate(new(Repository), func(idx int, bean interface{}) error {
|
|
repo := bean.(*Repository)
|
|
deleteRepoLocalCopy(repo)
|
|
// TODO: By the same reasoning, shouldn't we also sync access to the local wiki path?
|
|
RemoveAllWithNotice("Delete repository wiki local copy", repo.LocalWikiPath())
|
|
return nil
|
|
}); err != nil {
|
|
return fmt.Errorf("delete repository and wiki local copy: %v", err)
|
|
}
|
|
|
|
// Rename or create user base directory
|
|
baseDir := UserPath(u.Name)
|
|
newBaseDir := UserPath(newUserName)
|
|
if com.IsExist(baseDir) {
|
|
return os.Rename(baseDir, newBaseDir)
|
|
}
|
|
return os.MkdirAll(newBaseDir, os.ModePerm)
|
|
}
|
|
|
|
func updateUser(e Engine, u *User) error {
|
|
// Organization does not need email
|
|
if !u.IsOrganization() {
|
|
u.Email = strings.ToLower(u.Email)
|
|
has, err := e.Where("id!=?", u.ID).And("type=?", u.Type).And("email=?", u.Email).Get(new(User))
|
|
if err != nil {
|
|
return err
|
|
} else if has {
|
|
return ErrEmailAlreadyUsed{args: errutil.Args{"email": u.Email}}
|
|
}
|
|
|
|
if u.AvatarEmail == "" {
|
|
u.AvatarEmail = u.Email
|
|
}
|
|
u.Avatar = tool.HashEmail(u.AvatarEmail)
|
|
}
|
|
|
|
u.LowerName = strings.ToLower(u.Name)
|
|
u.Location = tool.TruncateString(u.Location, 255)
|
|
u.Website = tool.TruncateString(u.Website, 255)
|
|
u.Description = tool.TruncateString(u.Description, 255)
|
|
|
|
_, err := e.ID(u.ID).AllCols().Update(u)
|
|
return err
|
|
}
|
|
|
|
// UpdateUser updates user's information.
|
|
func UpdateUser(u *User) error {
|
|
return updateUser(x, u)
|
|
}
|
|
|
|
// deleteBeans deletes all given beans, beans should contain delete conditions.
|
|
func deleteBeans(e Engine, beans ...interface{}) (err error) {
|
|
for i := range beans {
|
|
if _, err = e.Delete(beans[i]); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// FIXME: need some kind of mechanism to record failure. HINT: system notice
|
|
func deleteUser(e *xorm.Session, u *User) error {
|
|
// Note: A user owns any repository or belongs to any organization
|
|
// cannot perform delete operation.
|
|
|
|
// Check ownership of repository.
|
|
count, err := getRepositoryCount(e, u)
|
|
if err != nil {
|
|
return fmt.Errorf("GetRepositoryCount: %v", err)
|
|
} else if count > 0 {
|
|
return ErrUserOwnRepos{UID: u.ID}
|
|
}
|
|
|
|
// Check membership of organization.
|
|
count, err = u.getOrganizationCount(e)
|
|
if err != nil {
|
|
return fmt.Errorf("GetOrganizationCount: %v", err)
|
|
} else if count > 0 {
|
|
return ErrUserHasOrgs{UID: u.ID}
|
|
}
|
|
|
|
// ***** START: Watch *****
|
|
watches := make([]*Watch, 0, 10)
|
|
if err = e.Find(&watches, &Watch{UserID: u.ID}); err != nil {
|
|
return fmt.Errorf("get all watches: %v", err)
|
|
}
|
|
for i := range watches {
|
|
if _, err = e.Exec("UPDATE `repository` SET num_watches=num_watches-1 WHERE id=?", watches[i].RepoID); err != nil {
|
|
return fmt.Errorf("decrease repository watch number[%d]: %v", watches[i].RepoID, err)
|
|
}
|
|
}
|
|
// ***** END: Watch *****
|
|
|
|
// ***** START: Star *****
|
|
stars := make([]*Star, 0, 10)
|
|
if err = e.Find(&stars, &Star{UID: u.ID}); err != nil {
|
|
return fmt.Errorf("get all stars: %v", err)
|
|
}
|
|
for i := range stars {
|
|
if _, err = e.Exec("UPDATE `repository` SET num_stars=num_stars-1 WHERE id=?", stars[i].RepoID); err != nil {
|
|
return fmt.Errorf("decrease repository star number[%d]: %v", stars[i].RepoID, err)
|
|
}
|
|
}
|
|
// ***** END: Star *****
|
|
|
|
// ***** START: Follow *****
|
|
followers := make([]*Follow, 0, 10)
|
|
if err = e.Find(&followers, &Follow{UserID: u.ID}); err != nil {
|
|
return fmt.Errorf("get all followers: %v", err)
|
|
}
|
|
for i := range followers {
|
|
if _, err = e.Exec("UPDATE `user` SET num_followers=num_followers-1 WHERE id=?", followers[i].UserID); err != nil {
|
|
return fmt.Errorf("decrease user follower number[%d]: %v", followers[i].UserID, err)
|
|
}
|
|
}
|
|
// ***** END: Follow *****
|
|
|
|
if err = deleteBeans(e,
|
|
&AccessToken{UserID: u.ID},
|
|
&Collaboration{UserID: u.ID},
|
|
&Access{UserID: u.ID},
|
|
&Watch{UserID: u.ID},
|
|
&Star{UID: u.ID},
|
|
&Follow{FollowID: u.ID},
|
|
&Action{UserID: u.ID},
|
|
&IssueUser{UID: u.ID},
|
|
&EmailAddress{UID: u.ID},
|
|
); err != nil {
|
|
return fmt.Errorf("deleteBeans: %v", err)
|
|
}
|
|
|
|
// ***** START: PublicKey *****
|
|
keys := make([]*PublicKey, 0, 10)
|
|
if err = e.Find(&keys, &PublicKey{OwnerID: u.ID}); err != nil {
|
|
return fmt.Errorf("get all public keys: %v", err)
|
|
}
|
|
|
|
keyIDs := make([]int64, len(keys))
|
|
for i := range keys {
|
|
keyIDs[i] = keys[i].ID
|
|
}
|
|
if err = deletePublicKeys(e, keyIDs...); err != nil {
|
|
return fmt.Errorf("deletePublicKeys: %v", err)
|
|
}
|
|
// ***** END: PublicKey *****
|
|
|
|
// Clear assignee.
|
|
if _, err = e.Exec("UPDATE `issue` SET assignee_id=0 WHERE assignee_id=?", u.ID); err != nil {
|
|
return fmt.Errorf("clear assignee: %v", err)
|
|
}
|
|
|
|
if _, err = e.ID(u.ID).Delete(new(User)); err != nil {
|
|
return fmt.Errorf("Delete: %v", err)
|
|
}
|
|
|
|
// FIXME: system notice
|
|
// Note: There are something just cannot be roll back,
|
|
// so just keep error logs of those operations.
|
|
|
|
_ = os.RemoveAll(UserPath(u.Name))
|
|
_ = os.Remove(userutil.CustomAvatarPath(u.ID))
|
|
|
|
return nil
|
|
}
|
|
|
|
// DeleteUser completely and permanently deletes everything of a user,
|
|
// but issues/comments/pulls will be kept and shown as someone has been deleted.
|
|
func DeleteUser(u *User) (err error) {
|
|
sess := x.NewSession()
|
|
defer sess.Close()
|
|
if err = sess.Begin(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err = deleteUser(sess, u); err != nil {
|
|
// Note: don't wrapper error here.
|
|
return err
|
|
}
|
|
|
|
if err = sess.Commit(); err != nil {
|
|
return err
|
|
}
|
|
|
|
return RewriteAuthorizedKeys()
|
|
}
|
|
|
|
// DeleteInactivateUsers deletes all inactivate users and email addresses.
|
|
func DeleteInactivateUsers() (err error) {
|
|
users := make([]*User, 0, 10)
|
|
if err = x.Where("is_active = ?", false).Find(&users); err != nil {
|
|
return fmt.Errorf("get all inactive users: %v", err)
|
|
}
|
|
// FIXME: should only update authorized_keys file once after all deletions.
|
|
for _, u := range users {
|
|
if err = DeleteUser(u); err != nil {
|
|
// Ignore users that were set inactive by admin.
|
|
if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {
|
|
continue
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
_, err = x.Where("is_activated = ?", false).Delete(new(EmailAddress))
|
|
return err
|
|
}
|
|
|
|
// UserPath returns the path absolute path of user repositories.
|
|
//
|
|
// Deprecated: Use repoutil.UserPath instead.
|
|
func UserPath(username string) string {
|
|
return filepath.Join(conf.Repository.Root, strings.ToLower(username))
|
|
}
|
|
|
|
func GetUserByKeyID(keyID int64) (*User, error) {
|
|
user := new(User)
|
|
has, err := x.SQL("SELECT a.* FROM `user` AS a, public_key AS b WHERE a.id = b.owner_id AND b.id=?", keyID).Get(user)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, errors.UserNotKeyOwner{KeyID: keyID}
|
|
}
|
|
return user, nil
|
|
}
|
|
|
|
func getUserByID(e Engine, id int64) (*User, error) {
|
|
u := new(User)
|
|
has, err := e.ID(id).Get(u)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"userID": id}}
|
|
}
|
|
return u, nil
|
|
}
|
|
|
|
// GetUserByID returns the user object by given ID if exists.
|
|
// Deprecated: Use Users.GetByID instead.
|
|
func GetUserByID(id int64) (*User, error) {
|
|
return getUserByID(x, id)
|
|
}
|
|
|
|
// GetAssigneeByID returns the user with read access of repository by given ID.
|
|
func GetAssigneeByID(repo *Repository, userID int64) (*User, error) {
|
|
ctx := context.TODO()
|
|
if !Perms.Authorize(ctx, userID, repo.ID, AccessModeRead,
|
|
AccessModeOptions{
|
|
OwnerID: repo.OwnerID,
|
|
Private: repo.IsPrivate,
|
|
},
|
|
) {
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"userID": userID}}
|
|
}
|
|
return Users.GetByID(ctx, userID)
|
|
}
|
|
|
|
// GetUserByName returns a user by given name.
|
|
// Deprecated: Use Users.GetByUsername instead.
|
|
func GetUserByName(name string) (*User, error) {
|
|
if name == "" {
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}
|
|
}
|
|
u := &User{LowerName: strings.ToLower(name)}
|
|
has, err := x.Get(u)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if !has {
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}
|
|
}
|
|
return u, nil
|
|
}
|
|
|
|
// GetUserEmailsByNames returns a list of e-mails corresponds to names.
|
|
func GetUserEmailsByNames(names []string) []string {
|
|
mails := make([]string, 0, len(names))
|
|
for _, name := range names {
|
|
u, err := GetUserByName(name)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if u.IsMailable() {
|
|
mails = append(mails, u.Email)
|
|
}
|
|
}
|
|
return mails
|
|
}
|
|
|
|
// GetUserIDsByNames returns a slice of ids corresponds to names.
|
|
func GetUserIDsByNames(names []string) []int64 {
|
|
ids := make([]int64, 0, len(names))
|
|
for _, name := range names {
|
|
u, err := GetUserByName(name)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
ids = append(ids, u.ID)
|
|
}
|
|
return ids
|
|
}
|
|
|
|
// UserCommit represents a commit with validation of user.
|
|
type UserCommit struct {
|
|
User *User
|
|
*git.Commit
|
|
}
|
|
|
|
// ValidateCommitWithEmail checks if author's e-mail of commit is corresponding to a user.
|
|
func ValidateCommitWithEmail(c *git.Commit) *User {
|
|
u, err := GetUserByEmail(c.Author.Email)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return u
|
|
}
|
|
|
|
// ValidateCommitsWithEmails checks if authors' e-mails of commits are corresponding to users.
|
|
func ValidateCommitsWithEmails(oldCommits []*git.Commit) []*UserCommit {
|
|
emails := make(map[string]*User)
|
|
newCommits := make([]*UserCommit, len(oldCommits))
|
|
for i := range oldCommits {
|
|
var u *User
|
|
if v, ok := emails[oldCommits[i].Author.Email]; !ok {
|
|
u, _ = GetUserByEmail(oldCommits[i].Author.Email)
|
|
emails[oldCommits[i].Author.Email] = u
|
|
} else {
|
|
u = v
|
|
}
|
|
|
|
newCommits[i] = &UserCommit{
|
|
User: u,
|
|
Commit: oldCommits[i],
|
|
}
|
|
}
|
|
return newCommits
|
|
}
|
|
|
|
// GetUserByEmail returns the user object by given e-mail if exists.
|
|
// Deprecated: Use Users.GetByEmail instead.
|
|
func GetUserByEmail(email string) (*User, error) {
|
|
if email == "" {
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}
|
|
}
|
|
|
|
email = strings.ToLower(email)
|
|
// First try to find the user by primary email
|
|
user := &User{Email: email}
|
|
has, err := x.Get(user)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if has {
|
|
return user, nil
|
|
}
|
|
|
|
// Otherwise, check in alternative list for activated email addresses
|
|
emailAddress := &EmailAddress{Email: email, IsActivated: true}
|
|
has, err = x.Get(emailAddress)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if has {
|
|
return GetUserByID(emailAddress.UID)
|
|
}
|
|
|
|
return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}
|
|
}
|
|
|
|
type SearchUserOptions struct {
|
|
Keyword string
|
|
Type UserType
|
|
OrderBy string
|
|
Page int
|
|
PageSize int // Can be smaller than or equal to setting.UI.ExplorePagingNum
|
|
}
|
|
|
|
// SearchUserByName takes keyword and part of user name to search,
|
|
// it returns results in given range and number of total results.
|
|
func SearchUserByName(opts *SearchUserOptions) (users []*User, _ int64, _ error) {
|
|
if opts.Keyword == "" {
|
|
return users, 0, nil
|
|
}
|
|
opts.Keyword = strings.ToLower(opts.Keyword)
|
|
|
|
if opts.PageSize <= 0 || opts.PageSize > conf.UI.ExplorePagingNum {
|
|
opts.PageSize = conf.UI.ExplorePagingNum
|
|
}
|
|
if opts.Page <= 0 {
|
|
opts.Page = 1
|
|
}
|
|
|
|
searchQuery := "%" + opts.Keyword + "%"
|
|
users = make([]*User, 0, opts.PageSize)
|
|
// Append conditions
|
|
sess := x.Where("LOWER(lower_name) LIKE ?", searchQuery).
|
|
Or("LOWER(full_name) LIKE ?", searchQuery).
|
|
And("type = ?", opts.Type)
|
|
|
|
countSess := *sess
|
|
count, err := countSess.Count(new(User))
|
|
if err != nil {
|
|
return nil, 0, fmt.Errorf("Count: %v", err)
|
|
}
|
|
|
|
if len(opts.OrderBy) > 0 {
|
|
sess.OrderBy(opts.OrderBy)
|
|
}
|
|
return users, count, sess.Limit(opts.PageSize, (opts.Page-1)*opts.PageSize).Find(&users)
|
|
}
|
|
|
|
// GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
|
|
func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
|
|
accesses := make([]*Access, 0, 10)
|
|
if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
repos := make(map[*Repository]AccessMode, len(accesses))
|
|
for _, access := range accesses {
|
|
repo, err := GetRepositoryByID(access.RepoID)
|
|
if err != nil {
|
|
if IsErrRepoNotExist(err) {
|
|
log.Error("Failed to get repository by ID: %v", err)
|
|
continue
|
|
}
|
|
return nil, err
|
|
}
|
|
if repo.OwnerID == u.ID {
|
|
continue
|
|
}
|
|
repos[repo] = access.Mode
|
|
}
|
|
return repos, nil
|
|
}
|
|
|
|
// GetAccessibleRepositories finds repositories which the user has access but does not own.
|
|
// If limit is smaller than 1 means returns all found results.
|
|
func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
|
|
sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix")
|
|
if limit > 0 {
|
|
sess.Limit(limit)
|
|
repos = make([]*Repository, 0, limit)
|
|
} else {
|
|
repos = make([]*Repository, 0, 10)
|
|
}
|
|
return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos)
|
|
}
|