1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930 |
- // Copyright 2020 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE and LICENSE.gogs file.
- package database
- import (
- "context"
- "database/sql"
- "fmt"
- gouuid "github.com/satori/go.uuid"
- "os"
- "strings"
- "time"
- "unicode/utf8"
- "github.com/go-macaron/binding"
- api "github.com/gogs/go-gogs-client"
- "github.com/pkg/errors"
- "gorm.io/gorm"
- log "unknwon.dev/clog/v2"
- "github.com/SongZihuan/huan-gogs/internal/auth"
- "github.com/SongZihuan/huan-gogs/internal/conf"
- "github.com/SongZihuan/huan-gogs/internal/cryptoutil"
- "github.com/SongZihuan/huan-gogs/internal/dbutil"
- "github.com/SongZihuan/huan-gogs/internal/errutil"
- "github.com/SongZihuan/huan-gogs/internal/markup"
- "github.com/SongZihuan/huan-gogs/internal/osutil"
- "github.com/SongZihuan/huan-gogs/internal/repoutil"
- "github.com/SongZihuan/huan-gogs/internal/strutil"
- "github.com/SongZihuan/huan-gogs/internal/tool"
- "github.com/SongZihuan/huan-gogs/internal/userutil"
- )
- // UsersStore is the storage layer for users.
- type UsersStore struct {
- db *gorm.DB
- }
- func newUsersStore(db *gorm.DB) *UsersStore {
- return &UsersStore{db: db}
- }
- type ErrLoginSourceMismatch struct {
- args errutil.Args
- }
- // IsErrLoginSourceMismatch returns true if the underlying error has the type
- // ErrLoginSourceMismatch.
- func IsErrLoginSourceMismatch(err error) bool {
- return errors.As(err, &ErrLoginSourceMismatch{})
- }
- func (err ErrLoginSourceMismatch) Error() string {
- return fmt.Sprintf("login source mismatch: %v", err.args)
- }
- // Authenticate validates username and password via given login source ID. It
- // returns ErrUserNotExist when the user was not found.
- //
- // When the "loginSourceID" is negative, it aborts the process and returns
- // ErrUserNotExist if the user was not found in the database.
- //
- // When the "loginSourceID" is non-negative, it returns ErrLoginSourceMismatch
- // if the user has different login source ID than the "loginSourceID".
- //
- // When the "loginSourceID" is positive, it tries to authenticate via given
- // login source and creates a new user when not yet exists in the database.
- func (s *UsersStore) Authenticate(ctx context.Context, login, password string, loginSourceID int64) (*User, error) {
- login = strings.ToLower(login)
- query := s.db.WithContext(ctx).Where("email = ? OR lower_name = ? OR login_name = ?", login, login, login)
- user := new(User)
- err := query.First(user).Error
- if err != nil && !errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, errors.Wrap(err, "get user")
- }
- var authSourceID int64 // The login source ID will be used to authenticate the user
- createNewUser := false // Whether to create a new user after successful authentication
- // User found in the database
- if err == nil {
- // Note: This check is unnecessary but to reduce user confusion at login page
- // and make it more consistent from user's perspective.
- if loginSourceID >= 0 && user.LoginSource != loginSourceID {
- return nil, ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
- }
- // Validate password hash fetched from database for local accounts.
- if user.IsLocal() {
- if userutil.ValidatePassword(user.Password, user.Salt, password) {
- return user, nil
- }
- return nil, auth.ErrBadCredentials{Args: map[string]any{"login": login, "userID": user.ID}}
- }
- authSourceID = user.LoginSource
- } else {
- // Non-local login source is always greater than 0.
- if loginSourceID <= 0 {
- return nil, auth.ErrBadCredentials{Args: map[string]any{"login": login}}
- }
- authSourceID = loginSourceID
- createNewUser = true
- }
- source, err := newLoginSourcesStore(s.db, loadedLoginSourceFilesStore).GetByID(ctx, authSourceID)
- if err != nil {
- return nil, errors.Wrap(err, "get login source")
- }
- if !source.IsActived {
- return nil, errors.Errorf("login source %d is not activated", source.ID)
- }
- extAccount, err := source.Provider.Authenticate(login, password)
- if err != nil {
- return nil, err
- }
- if !createNewUser {
- return user, nil
- }
- // Validate username make sure it satisfies requirement.
- if binding.AlphaDashDotPattern.MatchString(extAccount.Name) {
- return nil, fmt.Errorf("invalid pattern for attribute 'username' [%s]: must be valid alpha or numeric or dash(-_) or dot characters", extAccount.Name)
- }
- return s.Create(ctx, extAccount.Name, extAccount.Email, CreateUserOptions{
- FullName: extAccount.FullName,
- LoginSource: authSourceID,
- LoginName: extAccount.Login,
- Location: extAccount.Location,
- Website: extAccount.Website,
- Activated: true,
- Admin: extAccount.Admin,
- })
- }
- func (s *UsersStore) AuthenticateByUser(ctx context.Context, user *User, password string, loginSourceID int64) error {
- var authSourceID int64 // The login source ID will be used to authenticate the user
- if loginSourceID >= 0 && user.LoginSource != loginSourceID {
- return ErrLoginSourceMismatch{args: errutil.Args{"expect": loginSourceID, "actual": user.LoginSource}}
- }
- // Validate password hash fetched from database for local accounts.
- if user.IsLocal() {
- if userutil.ValidatePassword(user.Password, user.Salt, password) {
- return nil
- }
- return auth.ErrBadCredentials{Args: map[string]any{"login": user.Name, "userID": user.ID}}
- }
- authSourceID = user.LoginSource
- source, err := newLoginSourcesStore(s.db, loadedLoginSourceFilesStore).GetByID(ctx, authSourceID)
- if err != nil {
- return errors.Wrap(err, "get login source")
- }
- if !source.IsActived {
- return errors.Errorf("login source %d is not activated", source.ID)
- }
- _, err = source.Provider.Authenticate(user.LoginName, password)
- if err != nil {
- _, err = source.Provider.Authenticate(user.Name, password)
- if err != nil {
- return err
- }
- }
- return nil
- }
- // ChangeUsername changes the username of the given user and updates all
- // references to the old username. It returns ErrNameNotAllowed if the given
- // name or pattern of the name is not allowed as a username, or
- // ErrUserAlreadyExist when another user with same name already exists.
- func (s *UsersStore) ChangeUsername(ctx context.Context, userID int64, newUsername string) error {
- err := isUsernameAllowed(newUsername)
- if err != nil {
- return err
- }
- if s.IsUsernameUsed(ctx, newUsername, userID) {
- return ErrUserAlreadyExist{
- args: errutil.Args{
- "name": newUsername,
- },
- }
- }
- user, err := s.GetByID(ctx, userID)
- if err != nil {
- return errors.Wrap(err, "get user")
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err := tx.Model(&User{}).
- Where("id = ?", user.ID).
- Updates(map[string]any{
- "lower_name": strings.ToLower(newUsername),
- "name": newUsername,
- "updated_unix": tx.NowFunc().Unix(),
- }).Error
- if err != nil {
- return errors.Wrap(err, "update user name")
- }
- // Stop here if it's just a case-change of the username
- if strings.EqualFold(user.Name, newUsername) {
- return nil
- }
- // Update all references to the user name in pull requests
- err = tx.Model(&PullRequest{}).
- Where("head_user_name = ?", user.LowerName).
- Update("head_user_name", strings.ToLower(newUsername)).
- Error
- if err != nil {
- return errors.Wrap(err, `update "pull_request.head_user_name"`)
- }
- // Delete local copies of repositories and their wikis that are owned by the user
- rows, err := tx.Model(&Repository{}).Where("owner_id = ?", user.ID).Rows()
- if err != nil {
- return errors.Wrap(err, "iterate repositories")
- }
- defer func() { _ = rows.Close() }()
- for rows.Next() {
- var repo struct {
- ID int64
- }
- err = tx.ScanRows(rows, &repo)
- if err != nil {
- return errors.Wrap(err, "scan rows")
- }
- deleteRepoLocalCopy(repo.ID)
- RemoveAllWithNotice(fmt.Sprintf("Delete repository %d wiki local copy", repo.ID), repoutil.RepositoryLocalWikiPath(repo.ID))
- }
- if err = rows.Err(); err != nil {
- return errors.Wrap(err, "check rows.Err")
- }
- // Rename user directory if exists
- userPath := repoutil.UserPath(user.Name)
- if osutil.IsExist(userPath) {
- newUserPath := repoutil.UserPath(newUsername)
- err = os.Rename(userPath, newUserPath)
- if err != nil {
- return errors.Wrap(err, "rename user directory")
- }
- }
- return nil
- })
- }
- // Count returns the total number of users.
- func (s *UsersStore) Count(ctx context.Context) int64 {
- var count int64
- s.db.WithContext(ctx).Model(&User{}).Where("type = ?", UserTypeIndividual).Count(&count)
- return count
- }
- type CreateUserOptions struct {
- FullName string
- Password string
- LoginSource int64
- LoginName string
- Location string
- Website string
- Activated bool
- Admin bool
- }
- type ErrUserAlreadyExist struct {
- args errutil.Args
- }
- // IsErrUserAlreadyExist returns true if the underlying error has the type
- // ErrUserAlreadyExist.
- func IsErrUserAlreadyExist(err error) bool {
- return errors.As(err, &ErrUserAlreadyExist{})
- }
- func (err ErrUserAlreadyExist) Error() string {
- return fmt.Sprintf("user already exists: %v", err.args)
- }
- type ErrEmailAlreadyUsed struct {
- args errutil.Args
- }
- // IsErrEmailAlreadyUsed returns true if the underlying error has the type
- // ErrEmailAlreadyUsed.
- func IsErrEmailAlreadyUsed(err error) bool {
- return errors.As(err, &ErrEmailAlreadyUsed{})
- }
- func (err ErrEmailAlreadyUsed) Email() string {
- email, ok := err.args["email"].(string)
- if ok {
- return email
- }
- return "<email not found>"
- }
- func (err ErrEmailAlreadyUsed) Error() string {
- return fmt.Sprintf("email has been used: %v", err.args)
- }
- // Create creates a new user and persists to database. It returns
- // ErrNameNotAllowed if the given name or pattern of the name is not allowed as
- // a username, or ErrUserAlreadyExist when a user with same name already exists,
- // or ErrEmailAlreadyUsed if the email has been verified by another user.
- func (s *UsersStore) Create(ctx context.Context, username, email string, opts CreateUserOptions) (*User, error) {
- err := isUsernameAllowed(username)
- if err != nil {
- return nil, err
- }
- if s.IsUsernameUsed(ctx, username, 0) {
- return nil, ErrUserAlreadyExist{
- args: errutil.Args{
- "name": username,
- },
- }
- }
- localEmail := gouuid.NewV4().String() + "@fake.localhost"
- email = strings.ToLower(strings.TrimSpace(email))
- _, err = s.GetByEmail(ctx, email)
- if err == nil {
- return nil, ErrEmailAlreadyUsed{
- args: errutil.Args{
- "email": email,
- },
- }
- } else if !IsErrUserNotExist(err) {
- return nil, err
- }
- if opts.LoginName == "" {
- opts.LoginName = username
- }
- user := &User{
- LowerName: strings.ToLower(username),
- Name: username,
- FullName: opts.FullName,
- Email: email,
- PublicEmail: localEmail,
- LocalEmail: localEmail,
- Password: opts.Password,
- LoginSource: opts.LoginSource,
- LoginName: opts.LoginName,
- Location: opts.Location,
- Website: opts.Website,
- MaxRepoCreation: -1,
- IsActive: opts.Activated,
- IsAdmin: opts.Admin,
- Avatar: cryptoutil.MD5(email), // Gravatar URL uses the MD5 hash of the email, see https://en.gravatar.com/site/implement/hash/
- AvatarEmail: email,
- }
- user.Rands, err = userutil.RandomSalt()
- if err != nil {
- return nil, err
- }
- user.Salt, err = userutil.RandomSalt()
- if err != nil {
- return nil, err
- }
- user.Password = userutil.EncodePassword(user.Password, user.Salt)
- err = s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err := tx.Create(user).Error
- if err == nil {
- return err
- }
- err = s.addEmail(tx, user.ID, user.Email, !conf.Auth.RequireEmailConfirmation)
- if err == nil {
- return err
- }
- return nil
- })
- return user, err
- }
- // DeleteCustomAvatar deletes the current user custom avatar and falls back to
- // use look up avatar by email.
- func (s *UsersStore) DeleteCustomAvatar(ctx context.Context, userID int64) error {
- _ = os.Remove(userutil.CustomAvatarPath(userID))
- return s.db.WithContext(ctx).
- Model(&User{}).
- Where("id = ?", userID).
- Updates(map[string]any{
- "use_custom_avatar": false,
- "updated_unix": s.db.NowFunc().Unix(),
- }).
- Error
- }
- type ErrUserOwnRepos struct {
- args errutil.Args
- }
- // IsErrUserOwnRepos returns true if the underlying error has the type
- // ErrUserOwnRepos.
- func IsErrUserOwnRepos(err error) bool {
- return errors.As(err, &ErrUserOwnRepos{})
- }
- func (err ErrUserOwnRepos) Error() string {
- return fmt.Sprintf("user still has repository ownership: %v", err.args)
- }
- type ErrUserHasOrgs struct {
- args errutil.Args
- }
- // IsErrUserHasOrgs returns true if the underlying error has the type
- // ErrUserHasOrgs.
- func IsErrUserHasOrgs(err error) bool {
- return errors.As(err, &ErrUserHasOrgs{})
- }
- func (err ErrUserHasOrgs) Error() string {
- return fmt.Sprintf("user still has organization membership: %v", err.args)
- }
- // DeleteByID deletes the given user and all their resources. It returns
- // ErrUserOwnRepos when the user still has repository ownership, or returns
- // ErrUserHasOrgs when the user still has organization membership. It is more
- // performant to skip rewriting the "authorized_keys" file for individual
- // deletion in a batch operation.
- func (s *UsersStore) DeleteByID(ctx context.Context, userID int64, skipRewriteAuthorizedKeys bool) error {
- user, err := s.GetByID(ctx, userID)
- if err != nil {
- if IsErrUserNotExist(err) {
- return nil
- }
- return errors.Wrap(err, "get user")
- }
- // Double-check the user is not a direct owner of any repository and not a
- // member of any organization.
- var count int64
- err = s.db.WithContext(ctx).Model(&Repository{}).Where("owner_id = ?", userID).Count(&count).Error
- if err != nil {
- return errors.Wrap(err, "count repositories")
- } else if count > 0 {
- return ErrUserOwnRepos{args: errutil.Args{"userID": userID}}
- }
- err = s.db.WithContext(ctx).Model(&OrgUser{}).Where("uid = ?", userID).Count(&count).Error
- if err != nil {
- return errors.Wrap(err, "count organization membership")
- } else if count > 0 {
- return ErrUserHasOrgs{args: errutil.Args{"userID": userID}}
- }
- needsRewriteAuthorizedKeys := false
- err = s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE repository
- SET num_watches = num_watches - 1
- WHERE id IN (
- SELECT repo_id FROM watch WHERE user_id = @userID
- )
- */
- err = tx.Table("repository").
- Where("id IN (?)", tx.
- Select("repo_id").
- Table("watch").
- Where("user_id = ?", userID),
- ).
- UpdateColumn("num_watches", gorm.Expr("num_watches - 1")).
- Error
- if err != nil {
- return errors.Wrap(err, `decrease "repository.num_watches"`)
- }
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE repository
- SET num_stars = num_stars - 1
- WHERE id IN (
- SELECT repo_id FROM star WHERE uid = @userID
- )
- */
- err = tx.Table("repository").
- Where("id IN (?)", tx.
- Select("repo_id").
- Table("star").
- Where("uid = ?", userID),
- ).
- UpdateColumn("num_stars", gorm.Expr("num_stars - 1")).
- Error
- if err != nil {
- return errors.Wrap(err, `decrease "repository.num_stars"`)
- }
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE user
- SET num_followers = num_followers - 1
- WHERE id IN (
- SELECT follow_id FROM follow WHERE user_id = @userID
- )
- */
- err = tx.Table("user").
- Where("id IN (?)", tx.
- Select("follow_id").
- Table("follow").
- Where("user_id = ?", userID),
- ).
- UpdateColumn("num_followers", gorm.Expr("num_followers - 1")).
- Error
- if err != nil {
- return errors.Wrap(err, `decrease "user.num_followers"`)
- }
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE user
- SET num_following = num_following - 1
- WHERE id IN (
- SELECT user_id FROM follow WHERE follow_id = @userID
- )
- */
- err = tx.Table("user").
- Where("id IN (?)", tx.
- Select("user_id").
- Table("follow").
- Where("follow_id = ?", userID),
- ).
- UpdateColumn("num_following", gorm.Expr("num_following - 1")).
- Error
- if err != nil {
- return errors.Wrap(err, `decrease "user.num_following"`)
- }
- if !skipRewriteAuthorizedKeys {
- // We need to rewrite "authorized_keys" file if the user owns any public keys.
- needsRewriteAuthorizedKeys = tx.Where("owner_id = ?", userID).First(&PublicKey{}).Error != gorm.ErrRecordNotFound
- }
- err = tx.Model(&Issue{}).Where("assignee_id = ?", userID).Update("assignee_id", 0).Error
- if err != nil {
- return errors.Wrap(err, "clear assignees")
- }
- for _, t := range []struct {
- table any
- where string
- }{
- {&Watch{}, "user_id = @userID"},
- {&Star{}, "uid = @userID"},
- {&Follow{}, "user_id = @userID OR follow_id = @userID"},
- {&PublicKey{}, "owner_id = @userID"},
- {&AccessToken{}, "uid = @userID"},
- {&Collaboration{}, "user_id = @userID"},
- {&Access{}, "user_id = @userID"},
- {&Action{}, "user_id = @userID"},
- {&IssueUser{}, "uid = @userID"},
- {&EmailAddress{}, "uid = @userID"},
- {&User{}, "id = @userID"},
- } {
- err = tx.Where(t.where, sql.Named("userID", userID)).Delete(t.table).Error
- if err != nil {
- return errors.Wrapf(err, "clean up table %T", t.table)
- }
- }
- return nil
- })
- if err != nil {
- return err
- }
- _ = os.RemoveAll(repoutil.UserPath(user.Name))
- _ = os.Remove(userutil.CustomAvatarPath(userID))
- if needsRewriteAuthorizedKeys {
- err = newPublicKeysStore(s.db).RewriteAuthorizedKeys()
- if err != nil {
- return errors.Wrap(err, `rewrite "authorized_keys" file`)
- }
- }
- return nil
- }
- // DeleteInactivated deletes all inactivated users.
- //
- // NOTE: We do not take context.Context here because this operation in practice
- // could much longer than the general request timeout (e.g. one minute).
- func (s *UsersStore) DeleteInactivated() error {
- var userIDs []int64
- err := s.db.Model(&User{}).Where("is_active = ?", false).Pluck("id", &userIDs).Error
- if err != nil {
- return errors.Wrap(err, "get inactivated user IDs")
- }
- for _, userID := range userIDs {
- err = s.DeleteByID(context.Background(), userID, true)
- if err != nil {
- // Skip users that may had set to inactivated by admins.
- if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {
- continue
- }
- return errors.Wrapf(err, "delete user with ID %d", userID)
- }
- }
- err = newPublicKeysStore(s.db).RewriteAuthorizedKeys()
- if err != nil {
- return errors.Wrap(err, `rewrite "authorized_keys" file`)
- }
- return nil
- }
- func (*UsersStore) recountFollows(tx *gorm.DB, userID, followID int64) error {
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE "user"
- SET num_followers = (
- SELECT COUNT(*) FROM follow WHERE follow_id = @followID
- )
- WHERE id = @followID
- */
- err := tx.Model(&User{}).
- Where("id = ?", followID).
- Update(
- "num_followers",
- tx.Model(&Follow{}).Select("COUNT(*)").Where("follow_id = ?", followID),
- ).
- Error
- if err != nil {
- return errors.Wrap(err, `update "user.num_followers"`)
- }
- /*
- Equivalent SQL for PostgreSQL:
- UPDATE "user"
- SET num_following = (
- SELECT COUNT(*) FROM follow WHERE user_id = @userID
- )
- WHERE id = @userID
- */
- err = tx.Model(&User{}).
- Where("id = ?", userID).
- Update(
- "num_following",
- tx.Model(&Follow{}).Select("COUNT(*)").Where("user_id = ?", userID),
- ).
- Error
- if err != nil {
- return errors.Wrap(err, `update "user.num_following"`)
- }
- return nil
- }
- // Follow marks the user to follow the other user.
- func (s *UsersStore) Follow(ctx context.Context, userID, followID int64) error {
- if userID == followID {
- return nil
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- f := &Follow{
- UserID: userID,
- FollowID: followID,
- }
- result := tx.FirstOrCreate(f, f)
- if result.Error != nil {
- return errors.Wrap(result.Error, "upsert")
- } else if result.RowsAffected <= 0 {
- return nil // Relation already exists
- }
- return s.recountFollows(tx, userID, followID)
- })
- }
- // Unfollow removes the mark the user to follow the other user.
- func (s *UsersStore) Unfollow(ctx context.Context, userID, followID int64) error {
- if userID == followID {
- return nil
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err := tx.Where("user_id = ? AND follow_id = ?", userID, followID).Delete(&Follow{}).Error
- if err != nil {
- return errors.Wrap(err, "delete")
- }
- return s.recountFollows(tx, userID, followID)
- })
- }
- // IsFollowing returns true if the user is following the other user.
- func (s *UsersStore) IsFollowing(ctx context.Context, userID, followID int64) bool {
- return s.db.WithContext(ctx).Where("user_id = ? AND follow_id = ?", userID, followID).First(&Follow{}).Error == nil
- }
- var _ errutil.NotFound = (*ErrUserNotExist)(nil)
- type ErrUserNotExist struct {
- args errutil.Args
- }
- // IsErrUserNotExist returns true if the underlying error has the type
- // ErrUserNotExist.
- func IsErrUserNotExist(err error) bool {
- _, ok := errors.Cause(err).(ErrUserNotExist)
- return ok
- }
- func (err ErrUserNotExist) Error() string {
- return fmt.Sprintf("user does not exist: %v", err.args)
- }
- func (ErrUserNotExist) NotFound() bool {
- return true
- }
- // GetByEmail returns the user (not organization) with given email. It ignores
- // records with unverified emails and returns ErrUserNotExist when not found.
- func (s *UsersStore) getByEmail(tx *gorm.DB, email string) (*User, error) {
- if email == "" {
- return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
- }
- email = strings.ToLower(email)
- /*
- Equivalent SQL for PostgreSQL:
- SELECT * FROM "user"
- LEFT JOIN email_address ON email_address.uid = "user".id
- WHERE
- "user".type = @userType
- AND (
- "user".email = @email AND "user".is_active = TRUE
- OR email_address.email = @email AND email_address.is_activated = TRUE
- )
- */
- user := new(User)
- err := tx.
- Joins(dbutil.Quote("LEFT JOIN email_address ON email_address.uid = %s.id", "user"), true).
- Where(dbutil.Quote("%s.type = ?", "user"), UserTypeIndividual).
- Where(tx.
- Where(dbutil.Quote("%[1]s.email = ? AND %[1]s.is_active = ?", "user"), email, true).
- Or("email_address.email = ? AND email_address.is_activated = ?", email, true),
- ).
- First(&user).
- Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetByEmail returns the user (not organization) with given email. It ignores
- // records with unverified emails and returns ErrUserNotExist when not found.
- func (s *UsersStore) GetByEmail(ctx context.Context, email string) (*User, error) {
- if email == "" {
- return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
- }
- email = strings.ToLower(email)
- /*
- Equivalent SQL for PostgreSQL:
- SELECT * FROM "user"
- LEFT JOIN email_address ON email_address.uid = "user".id
- WHERE
- "user".type = @userType
- AND (
- "user".email = @email AND "user".is_active = TRUE
- OR email_address.email = @email AND email_address.is_activated = TRUE
- )
- */
- user := new(User)
- err := s.db.WithContext(ctx).
- Joins(dbutil.Quote("LEFT JOIN email_address ON email_address.uid = %s.id", "user"), true).
- Where(dbutil.Quote("%s.type = ?", "user"), UserTypeIndividual).
- Where(s.db.
- Where(dbutil.Quote("%[1]s.email = ? AND %[1]s.is_active = ?", "user"), email, true).
- Or("email_address.email = ? AND email_address.is_activated = ?", email, true),
- ).
- First(&user).
- Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"email": email}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetByID returns the user with given ID. It returns ErrUserNotExist when not
- // found.
- func (s *UsersStore) getByID(tx *gorm.DB, id int64) (*User, error) {
- user := new(User)
- err := tx.Where("id = ?", id).First(user).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetByID returns the user with given ID. It returns ErrUserNotExist when not
- // found.
- func (s *UsersStore) GetByID(ctx context.Context, id int64) (*User, error) {
- user := new(User)
- err := s.db.WithContext(ctx).Where("id = ?", id).First(user).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"userID": id}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetByUsername returns the user with given username. It returns
- // ErrUserNotExist when not found.
- func (s *UsersStore) GetByUsername(ctx context.Context, username string) (*User, error) {
- user := new(User)
- err := s.db.WithContext(ctx).Where("lower_name = ?", strings.ToLower(username)).First(user).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"name": username}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetByKeyID returns the owner of given public key ID. It returns
- // ErrUserNotExist when not found.
- func (s *UsersStore) GetByKeyID(ctx context.Context, keyID int64) (*User, error) {
- user := new(User)
- err := s.db.WithContext(ctx).
- Joins(dbutil.Quote("JOIN public_key ON public_key.owner_id = %s.id", "user")).
- Where("public_key.id = ?", keyID).
- First(user).
- Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrUserNotExist{args: errutil.Args{"keyID": keyID}}
- }
- return nil, err
- }
- return user, nil
- }
- // GetMailableEmailsByUsernames returns a list of verified primary email
- // addresses (where email notifications are sent to) of users with given list of
- // usernames. Non-existing usernames are ignored.
- func (s *UsersStore) GetMailableEmailsByUsernames(ctx context.Context, usernames []string) ([]string, error) {
- emails := make([]string, 0, len(usernames))
- return emails, s.db.WithContext(ctx).
- Model(&User{}).
- Select("email").
- Where("lower_name IN (?) AND is_active = ?", usernames, true).
- Find(&emails).Error
- }
- // IsUsernameUsed returns true if the given username has been used other than
- // the excluded user (a non-positive ID effectively meaning check against all
- // users).
- func (s *UsersStore) IsUsernameUsed(ctx context.Context, username string, excludeUserId int64) bool {
- if username == "" {
- return false
- }
- return s.db.WithContext(ctx).
- Select("id").
- Where("lower_name = ? AND id != ?", strings.ToLower(username), excludeUserId).
- First(&User{}).
- Error != gorm.ErrRecordNotFound
- }
- // List returns a list of users. Results are paginated by given page and page
- // size, and sorted by primary key (id) in ascending order.
- func (s *UsersStore) List(ctx context.Context, page, pageSize int) ([]*User, error) {
- users := make([]*User, 0, pageSize)
- return users, s.db.WithContext(ctx).
- Where("type = ?", UserTypeIndividual).
- Limit(pageSize).Offset((page - 1) * pageSize).
- Order("id ASC").
- Find(&users).
- Error
- }
- // ListFollowers returns a list of users that are following the given user.
- // Results are paginated by given page and page size, and sorted by the time of
- // follow in descending order.
- func (s *UsersStore) ListFollowers(ctx context.Context, userID int64, page, pageSize int) ([]*User, error) {
- /*
- Equivalent SQL for PostgreSQL:
- SELECT * FROM "user"
- LEFT JOIN follow ON follow.user_id = "user".id
- WHERE follow.follow_id = @userID
- ORDER BY follow.id DESC
- LIMIT @limit OFFSET @offset
- */
- users := make([]*User, 0, pageSize)
- return users, s.db.WithContext(ctx).
- Joins(dbutil.Quote("LEFT JOIN follow ON follow.user_id = %s.id", "user")).
- Where("follow.follow_id = ?", userID).
- Limit(pageSize).Offset((page - 1) * pageSize).
- Order("follow.id DESC").
- Find(&users).
- Error
- }
- // ListFollowings returns a list of users that are followed by the given user.
- // Results are paginated by given page and page size, and sorted by the time of
- // follow in descending order.
- func (s *UsersStore) ListFollowings(ctx context.Context, userID int64, page, pageSize int) ([]*User, error) {
- /*
- Equivalent SQL for PostgreSQL:
- SELECT * FROM "user"
- LEFT JOIN follow ON follow.user_id = "user".id
- WHERE follow.user_id = @userID
- ORDER BY follow.id DESC
- LIMIT @limit OFFSET @offset
- */
- users := make([]*User, 0, pageSize)
- return users, s.db.WithContext(ctx).
- Joins(dbutil.Quote("LEFT JOIN follow ON follow.follow_id = %s.id", "user")).
- Where("follow.user_id = ?", userID).
- Limit(pageSize).Offset((page - 1) * pageSize).
- Order("follow.id DESC").
- Find(&users).
- Error
- }
- func searchUserByName(ctx context.Context, db *gorm.DB, userType UserType, keyword string, page, pageSize int, orderBy string) ([]*User, int64, error) {
- if keyword == "" {
- return []*User{}, 0, nil
- }
- keyword = "%" + strings.ToLower(keyword) + "%"
- tx := db.WithContext(ctx).
- Where("type = ? AND (lower_name LIKE ? OR LOWER(full_name) LIKE ?)", userType, keyword, keyword)
- var count int64
- err := tx.Model(&User{}).Count(&count).Error
- if err != nil {
- return nil, 0, errors.Wrap(err, "count")
- }
- users := make([]*User, 0, pageSize)
- return users, count, tx.Order(orderBy).Limit(pageSize).Offset((page - 1) * pageSize).Find(&users).Error
- }
- // SearchByName returns a list of users whose username or full name matches the
- // given keyword case-insensitively. Results are paginated by given page and
- // page size, and sorted by the given order (e.g. "id DESC"). A total count of
- // all results is also returned. If the order is not given, it's up to the
- // database to decide.
- func (s *UsersStore) SearchByName(ctx context.Context, keyword string, page, pageSize int, orderBy string) ([]*User, int64, error) {
- return searchUserByName(ctx, s.db, UserTypeIndividual, keyword, page, pageSize, orderBy)
- }
- type UpdateUserOptions struct {
- LoginSource *int64
- LoginName *string
- Password *string
- // GenerateNewRands indicates whether to force generate new rands for the user.
- GenerateNewRands bool
- FullName *string
- Email *string
- PublicEmail *string
- Website *string
- Location *string
- Description *string
- MaxRepoCreation *int
- LastRepoVisibility *bool
- IsActivated *bool
- IsAdmin *bool
- AllowGitHook *bool
- AllowImportLocal *bool
- ProhibitLogin *bool
- Avatar *string
- AvatarEmail *string
- }
- // Update updates fields for the given user.
- func (s *UsersStore) Update(ctx context.Context, userID int64, opts UpdateUserOptions) error {
- updates := map[string]any{
- "updated_unix": s.db.NowFunc().Unix(),
- }
- if opts.LoginSource != nil {
- updates["login_source"] = *opts.LoginSource
- }
- if opts.LoginName != nil {
- updates["login_name"] = *opts.LoginName
- }
- if opts.Password != nil {
- salt, err := userutil.RandomSalt()
- if err != nil {
- return errors.Wrap(err, "generate salt")
- }
- updates["salt"] = salt
- updates["passwd"] = userutil.EncodePassword(*opts.Password, salt)
- opts.GenerateNewRands = true
- }
- if opts.GenerateNewRands {
- rands, err := userutil.RandomSalt()
- if err != nil {
- return errors.Wrap(err, "generate rands")
- }
- updates["rands"] = rands
- }
- if opts.FullName != nil {
- updates["full_name"] = strutil.Truncate(*opts.FullName, 255)
- }
- if opts.Email != nil {
- _, err := s.GetByEmail(ctx, *opts.Email)
- if err == nil {
- return ErrEmailAlreadyUsed{args: errutil.Args{"email": *opts.Email}}
- } else if !IsErrUserNotExist(err) {
- return errors.Wrap(err, "check email")
- }
- updates["email"] = *opts.Email
- }
- if opts.PublicEmail != nil {
- // 不检查用户之间的 Public Email 重复
- //_, err := s.GetByPublicEmail(ctx, *opts.Email)
- //if err == nil {
- // return ErrEmailAlreadyUsed{args: errutil.Args{"email": *opts.Email}}
- //} else if !IsErrUserNotExist(err) {
- // return errors.Wrap(err, "check email")
- //}
- updates["public_email"] = *opts.PublicEmail
- }
- if opts.Website != nil {
- updates["website"] = strutil.Truncate(*opts.Website, 255)
- }
- if opts.Location != nil {
- updates["location"] = strutil.Truncate(*opts.Location, 255)
- }
- if opts.Description != nil {
- updates["description"] = strutil.Truncate(*opts.Description, 255)
- }
- if opts.MaxRepoCreation != nil {
- if *opts.MaxRepoCreation < -1 {
- *opts.MaxRepoCreation = -1
- }
- updates["max_repo_creation"] = *opts.MaxRepoCreation
- }
- if opts.LastRepoVisibility != nil {
- updates["last_repo_visibility"] = *opts.LastRepoVisibility
- }
- if opts.IsActivated != nil {
- updates["is_active"] = *opts.IsActivated
- }
- if opts.IsAdmin != nil {
- updates["is_admin"] = *opts.IsAdmin
- }
- if opts.AllowGitHook != nil {
- updates["allow_git_hook"] = *opts.AllowGitHook
- }
- if opts.AllowImportLocal != nil {
- updates["allow_import_local"] = *opts.AllowImportLocal
- }
- if opts.ProhibitLogin != nil {
- updates["prohibit_login"] = *opts.ProhibitLogin
- }
- if opts.Avatar != nil {
- updates["avatar"] = strutil.Truncate(*opts.Avatar, 2048)
- }
- if opts.AvatarEmail != nil {
- updates["avatar_email"] = strutil.Truncate(*opts.AvatarEmail, 255)
- }
- return s.db.WithContext(ctx).Model(&User{}).Where("id = ?", userID).Updates(updates).Error
- }
- func (s *UsersStore) Active(ctx context.Context, userID int64) error {
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- user, err := s.getByID(tx, userID)
- if err != nil {
- return err
- }
- emailUser, err := s.getByEmail(tx, user.Email)
- if err == nil && emailUser.ID != user.ID {
- return ErrEmailAlreadyUsed{args: errutil.Args{"email": user.Email}}
- } else if !IsErrUserNotExist(err) {
- return errors.Wrap(err, "check email")
- }
- err = s.markEmailActivated(tx, user.ID, user.Email)
- if err != nil {
- return err
- }
- rands, err := userutil.RandomSalt()
- if err != nil {
- return errors.Wrap(err, "generate rands")
- }
- user.UpdatedUnix = s.db.NowFunc().Unix()
- user.Rands = rands
- user.IsActive = true
- err = tx.Save(user).Error
- if err != nil {
- return err
- }
- return nil
- })
- }
- // UseCustomAvatar uses the given avatar as the user custom avatar.
- func (s *UsersStore) UseCustomAvatar(ctx context.Context, userID int64, avatar []byte) error {
- err := userutil.SaveAvatar(userID, avatar)
- if err != nil {
- return errors.Wrap(err, "save avatar")
- }
- return s.db.WithContext(ctx).
- Model(&User{}).
- Where("id = ?", userID).
- Updates(map[string]any{
- "use_custom_avatar": true,
- "updated_unix": s.db.NowFunc().Unix(),
- }).
- Error
- }
- // AddEmail adds a new email address to given user. It returns
- // ErrEmailAlreadyUsed if the email has been verified by another user.
- func (s *UsersStore) addEmail(tx *gorm.DB, userID int64, email string, isActivated bool) error {
- email = strings.ToLower(strings.TrimSpace(email))
- _, err := s.getByEmail(tx, email)
- if err == nil {
- return ErrEmailAlreadyUsed{
- args: errutil.Args{
- "email": email,
- },
- }
- } else if !IsErrUserNotExist(err) {
- return errors.Wrap(err, "check user by email")
- }
- return tx.Create(
- &EmailAddress{
- UserID: userID,
- Email: email,
- IsActivated: isActivated,
- },
- ).Error
- }
- // AddEmail adds a new email address to given user. It returns
- // ErrEmailAlreadyUsed if the email has been verified by another user.
- func (s *UsersStore) AddEmail(ctx context.Context, userID int64, email string, isActivated bool) error {
- email = strings.ToLower(strings.TrimSpace(email))
- _, err := s.GetByEmail(ctx, email)
- if err == nil {
- return ErrEmailAlreadyUsed{
- args: errutil.Args{
- "email": email,
- },
- }
- } else if !IsErrUserNotExist(err) {
- return errors.Wrap(err, "check user by email")
- }
- return s.db.WithContext(ctx).Create(
- &EmailAddress{
- UserID: userID,
- Email: email,
- IsActivated: isActivated,
- },
- ).Error
- }
- var _ errutil.NotFound = (*ErrEmailNotExist)(nil)
- type ErrEmailNotExist struct {
- args errutil.Args
- }
- // IsErrEmailAddressNotExist returns true if the underlying error has the type
- // ErrEmailNotExist.
- func IsErrEmailAddressNotExist(err error) bool {
- _, ok := errors.Cause(err).(ErrEmailNotExist)
- return ok
- }
- func (err ErrEmailNotExist) Error() string {
- return fmt.Sprintf("email address does not exist: %v", err.args)
- }
- func (ErrEmailNotExist) NotFound() bool {
- return true
- }
- // GetEmail returns the email address of the given user. If `needsActivated` is
- // true, only activated email will be returned, otherwise, it may return
- // inactivated email addresses. It returns ErrEmailNotExist when no qualified
- // email is not found.
- func (s *UsersStore) GetEmail(ctx context.Context, userID int64, email string, needsActivated bool) (*EmailAddress, error) {
- tx := s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email)
- if needsActivated {
- tx = tx.Where("is_activated = ?", true)
- }
- emailAddress := new(EmailAddress)
- err := tx.First(emailAddress).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return nil, ErrEmailNotExist{
- args: errutil.Args{
- "email": email,
- },
- }
- }
- return nil, err
- }
- return emailAddress, nil
- }
- // ListEmails returns all email addresses of the given user. It always includes
- // a primary email address.
- func (s *UsersStore) ListEmails(ctx context.Context, userID int64) ([]*EmailAddress, error) {
- user, err := s.GetByID(ctx, userID)
- if err != nil {
- return nil, errors.Wrap(err, "get user")
- }
- var emails []*EmailAddress
- err = s.db.WithContext(ctx).Where("uid = ?", userID).Order("id ASC").Find(&emails).Error
- if err != nil {
- return nil, errors.Wrap(err, "list emails")
- }
- var emailMap = make(map[string]*EmailAddress, 10)
- for _, email := range emails {
- if e, ok := emailMap[email.Email]; ok && e != nil {
- continue
- }
- email.NotExists = false
- emailMap[email.Email] = email
- if email.Email == user.Email {
- email.IsPrimary = true
- }
- if email.Email == user.PublicEmail {
- email.IsPublic = true
- }
- if email.Email == user.LocalEmail {
- email.IsActivated = true
- email.IsLocal = true
- }
- }
- // We always want the primary email address displayed, even if it's not in the
- // email_address table yet.
- if email, ok := emailMap[user.Email]; !ok || email == nil {
- email = &EmailAddress{
- Email: user.Email,
- IsActivated: user.IsActive,
- IsPrimary: true,
- NotExists: true,
- }
- emailMap[email.Email] = email
- emails = append(emails, email)
- } else {
- email.IsPrimary = true
- }
- if email, ok := emailMap[user.PublicEmail]; !ok || email == nil {
- email = &EmailAddress{
- Email: user.PublicEmail,
- IsActivated: false,
- IsPublic: true,
- NotExists: true,
- }
- emailMap[email.Email] = email
- emails = append(emails, email)
- } else {
- email.IsPublic = true
- }
- if email, ok := emailMap[user.LocalEmail]; !ok || email == nil {
- email = &EmailAddress{
- Email: user.LocalEmail,
- IsActivated: true,
- IsLocal: true,
- NotExists: false,
- }
- emailMap[user.LocalEmail] = email
- emails = append(emails, email)
- } else {
- email.IsActivated = true
- email.IsLocal = true
- email.NotExists = false
- }
- return emails, nil
- }
- // MarkEmailActivated marks the email address of the given user as activated,
- // and new rands are generated for the user.
- func (s *UsersStore) markEmailActivated(tx *gorm.DB, userID int64, email string) error {
- err := tx.
- Model(&EmailAddress{}).
- Where("uid = ? AND email = ?", userID, email).
- Update("is_activated", true).
- Error
- if err != nil {
- return errors.Wrap(err, "mark email activated")
- }
- return nil
- }
- // MarkEmailActivated marks the email address of the given user as activated,
- // and new rands are generated for the user.
- func (s *UsersStore) MarkEmailActivated(ctx context.Context, userID int64, email string) error {
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err := s.db.WithContext(ctx).
- Model(&EmailAddress{}).
- Where("uid = ? AND email = ?", userID, email).
- Update("is_activated", true).
- Error
- if err != nil {
- return errors.Wrap(err, "mark email activated")
- }
- return newUsersStore(tx).Update(ctx, userID, UpdateUserOptions{GenerateNewRands: true})
- })
- }
- type ErrEmailNotVerified struct {
- args errutil.Args
- }
- // IsErrEmailNotVerified returns true if the underlying error has the type
- // ErrEmailNotVerified.
- func IsErrEmailNotVerified(err error) bool {
- _, ok := errors.Cause(err).(ErrEmailNotVerified)
- return ok
- }
- func (err ErrEmailNotVerified) Error() string {
- return fmt.Sprintf("email has not been verified: %v", err.args)
- }
- // MarkEmailPrimary marks the email address of the given user as primary. It
- // returns ErrEmailNotExist when the email is not found for the user, and
- // ErrEmailNotActivated when the email is not activated.
- func (s *UsersStore) MarkEmailPrimary(ctx context.Context, userID int64, email string) error {
- var emailAddress EmailAddress
- err := s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email).First(&emailAddress).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return ErrEmailNotExist{args: errutil.Args{"email": email}}
- }
- return errors.Wrap(err, "get email address")
- }
- if !emailAddress.IsActivated {
- return ErrEmailNotVerified{args: errutil.Args{"email": email}}
- }
- user, err := s.GetByID(ctx, userID)
- if err != nil {
- return errors.Wrap(err, "get user")
- }
- if email == user.LocalEmail {
- return ErrEmailNotExist{args: errutil.Args{"email": email}}
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err = tx.FirstOrCreate(&EmailAddress{
- UserID: user.ID,
- Email: user.Email,
- IsActivated: false,
- }, &EmailAddress{
- UserID: user.ID,
- Email: user.Email,
- }).Error
- return tx.Model(&User{}).
- Where("id = ?", user.ID).
- Updates(map[string]any{
- "email": email,
- "updated_unix": tx.NowFunc().Unix(),
- },
- ).Error
- })
- }
- func (s *UsersStore) MarkEmailPublic(ctx context.Context, userID int64, email string) error {
- user, err := s.GetByID(ctx, userID)
- if err != nil {
- return errors.Wrap(err, "get user")
- }
- if email != user.LocalEmail {
- var emailAddress EmailAddress
- err := s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email).First(&emailAddress).Error
- if err != nil {
- if errors.Is(err, gorm.ErrRecordNotFound) {
- return ErrEmailNotExist{args: errutil.Args{"email": email}}
- }
- return errors.Wrap(err, "get email address")
- }
- if !emailAddress.IsActivated {
- return ErrEmailNotVerified{args: errutil.Args{"email": email}}
- }
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- err = tx.FirstOrCreate(&EmailAddress{
- UserID: user.ID,
- Email: user.PublicEmail,
- IsActivated: false,
- }, &EmailAddress{
- UserID: user.ID,
- Email: user.PublicEmail,
- }).Error
- if err != nil {
- return err
- }
- return tx.Model(&User{}).
- Where("id = ?", user.ID).
- Updates(map[string]any{
- "public_email": email,
- "updated_unix": tx.NowFunc().Unix(),
- },
- ).Error
- })
- }
- // DeleteEmail deletes the email address of the given user.
- func (s *UsersStore) DeleteEmail(ctx context.Context, userID int64, email string) error {
- return s.db.WithContext(ctx).Where("uid = ? AND email = ?", userID, email).Delete(&EmailAddress{}).Error
- }
- // DeletePublicEmail deletes the email address of the given user.
- func (s *UsersStore) DeletePublicEmail(ctx context.Context, user *User) error {
- if user.PublicEmail == "" {
- return nil
- }
- return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {
- if user.Email != user.LocalEmail {
- err := s.db.WithContext(ctx).Where("uid = ? AND email = ?", user.ID, user.PublicEmail).Delete(&EmailAddress{}).Error
- if err != nil {
- return nil
- }
- }
- user.PublicEmail = user.LocalEmail
- updates := map[string]any{
- "updated_unix": s.db.NowFunc().Unix(),
- "public_email": user.PublicEmail,
- }
- return tx.Model(&User{}).Where("id = ?", user.ID).Updates(updates).Error
- })
- }
- // UserType indicates the type of the user account.
- type UserType int
- const (
- UserTypeIndividual UserType = iota // NOTE: Historic reason to make it starts at 0.
- UserTypeOrganization
- )
- // User represents the object of an individual or an organization.
- type User struct {
- ID int64 `gorm:"primaryKey"`
- LowerName string `xorm:"UNIQUE NOT NULL" gorm:"unique;not null"`
- Name string `xorm:"UNIQUE NOT NULL" gorm:"not null"`
- FullName string
- // Email is the primary email address (to be used for communication)
- Email string `xorm:"NOT NULL" gorm:"not null"`
- // PublicEmail is the public email address
- PublicEmail string `xorm:"NOT NULL" gorm:"not null"`
- // LocalEmail is the fake email
- LocalEmail string `xorm:"NOT NULL" gorm:"not null"`
- Password string `xorm:"passwd NOT NULL" gorm:"column:passwd;not null"`
- LoginSource int64 `xorm:"NOT NULL DEFAULT 0" gorm:"not null;default:0"`
- LoginName string
- Type UserType
- Location string
- Website string
- Rands string `xorm:"VARCHAR(10)" gorm:"type:VARCHAR(10)"`
- Salt string `xorm:"VARCHAR(10)" gorm:"type:VARCHAR(10)"`
- Created time.Time `xorm:"-" gorm:"-" json:"-"`
- CreatedUnix int64
- Updated time.Time `xorm:"-" gorm:"-" json:"-"`
- UpdatedUnix int64
- // Remember visibility choice for convenience, true for private
- LastRepoVisibility bool
- // Maximum repository creation limit, -1 means use global default
- MaxRepoCreation int `xorm:"NOT NULL DEFAULT -1" gorm:"not null;default:-1"`
- // Permissions
- IsActive bool // Activate primary email
- IsAdmin bool
- AllowGitHook bool
- AllowImportLocal bool // Allow migrate repository by local path
- ProhibitLogin bool
- // Avatar
- Avatar string `xorm:"VARCHAR(2048) NOT NULL" gorm:"type:VARCHAR(2048);not null"`
- AvatarEmail string `xorm:"NOT NULL" gorm:"not null"`
- UseCustomAvatar bool
- // Counters
- NumFollowers int
- NumFollowing int `xorm:"NOT NULL DEFAULT 0" gorm:"not null;default:0"`
- NumStars int
- NumRepos int
- // For organization
- Description string
- NumTeams int
- NumMembers int
- Teams []*Team `xorm:"-" gorm:"-" json:"-"`
- Members []*User `xorm:"-" gorm:"-" json:"-"`
- }
- // BeforeCreate implements the GORM create hook.
- func (u *User) BeforeCreate(tx *gorm.DB) error {
- if u.CreatedUnix == 0 {
- u.CreatedUnix = tx.NowFunc().Unix()
- u.UpdatedUnix = u.CreatedUnix
- }
- return nil
- }
- // AfterFind implements the GORM query hook.
- func (u *User) AfterFind(_ *gorm.DB) error {
- u.FullName = markup.Sanitize(u.FullName)
- u.Created = time.Unix(u.CreatedUnix, 0).Local()
- u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
- return nil
- }
- // IsLocal returns true if the user is created as local account.
- func (u *User) IsLocal() bool {
- return u.LoginSource <= 0
- }
- // IsOrganization returns true if the user is an organization.
- func (u *User) IsOrganization() bool {
- return u.Type == UserTypeOrganization
- }
- // APIFormat returns the API format of a user.
- func (u *User) APIFormat() *api.User { // TODO 待检查
- return &api.User{
- ID: u.ID,
- UserName: u.Name,
- Login: u.Name,
- FullName: u.FullName,
- Email: u.Email,
- AvatarUrl: u.AvatarURL(),
- }
- }
- // maxNumRepos returns the maximum number of repositories that the user can have
- // direct ownership.
- func (u *User) maxNumRepos() int {
- if !u.IsActive {
- return 0
- } else if u.MaxRepoCreation <= -1 {
- return conf.Repository.MaxCreationLimit
- }
- return u.MaxRepoCreation
- }
- // CanCreateRepo returns true if the user can create a repository.
- func (u *User) CanCreateRepo() bool {
- if !u.IsActive {
- return false
- }
- if conf.Repository.AdminNotCreationLimit && u.IsAdmin {
- return true
- }
- if conf.Admin.DisableRegularOrgCreation && conf.Repository.OrganizationNotCreationLimit && u.IsOrganization() {
- return true
- }
- return u.maxNumRepos() <= -1 || u.NumRepos < u.maxNumRepos()
- }
- // CanCreateOrganization returns true if user can create organizations.
- func (u *User) CanCreateOrganization() bool {
- if !u.IsActive {
- return false
- }
- if conf.Admin.DisableRegularOrgCreation {
- return u.IsAdmin
- }
- return true
- }
- // CanEditGitHook returns true if user can edit Git hooks.
- func (u *User) CanEditGitHook() bool {
- return u.IsAdmin || u.AllowGitHook
- }
- // CanImportLocal returns true if user can migrate repositories by local path.
- func (u *User) CanImportLocal() bool {
- return conf.Repository.EnableLocalPathMigration && (u.IsAdmin || u.AllowImportLocal)
- }
- // DisplayName returns the full name of the user if it's not empty, returns the
- // username otherwise.
- func (u *User) DisplayName() string {
- if len(u.FullName) > 0 {
- return u.FullName
- }
- return u.Name
- }
- // HomeURLPath returns the URL path to the user or organization home page.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User` and move this to the "userutil"
- // package.
- func (u *User) HomeURLPath() string {
- return conf.Server.Subpath + "/" + u.Name
- }
- // HTMLURL returns the full URL to the user or organization home page.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User` and move this to the "userutil"
- // package.
- func (u *User) HTMLURL() string {
- return conf.Server.ExternalURL + u.Name
- }
- // AvatarURLPath returns the URL path to the user or organization avatar. If the
- // user enables Gravatar-like service, then an external URL will be returned.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User` and move this to the "userutil"
- // package.
- func (u *User) AvatarURLPath() string {
- defaultURLPath := conf.UserDefaultAvatarURLPath()
- if u.ID <= 0 {
- return defaultURLPath
- }
- hasCustomAvatar := osutil.IsFile(userutil.CustomAvatarPath(u.ID))
- switch {
- case u.UseCustomAvatar:
- if !hasCustomAvatar {
- return defaultURLPath
- }
- return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, conf.UsersAvatarPathPrefix, u.ID)
- case conf.Picture.DisableGravatar:
- if !hasCustomAvatar {
- if err := userutil.GenerateRandomAvatar(u.ID, u.Name, u.PublicEmail); err != nil {
- log.Error("Failed to generate random avatar [user_id: %d]: %v", u.ID, err)
- }
- }
- return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, conf.UsersAvatarPathPrefix, u.ID)
- }
- return tool.AvatarLink(u.AvatarEmail)
- }
- // AvatarURL returns the full URL to the user or organization avatar. If the
- // user enables Gravatar-like service, then an external URL will be returned.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User` and move this to the "userutil"
- // package.
- func (u *User) AvatarURL() string {
- link := u.AvatarURLPath()
- if link[0] == '/' && link[1] != '/' {
- return conf.Server.ExternalURL + strings.TrimPrefix(link, conf.Server.Subpath)[1:]
- }
- return link
- }
- // IsFollowing returns true if the user is following the given user.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User`.
- func (u *User) IsFollowing(followID int64) bool {
- return Handle.Users().IsFollowing(context.TODO(), u.ID, followID)
- }
- // IsUserOrgOwner returns true if the user is in the owner team of the given
- // organization.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User`.
- func (u *User) IsUserOrgOwner(orgId int64) bool {
- return IsOrganizationOwner(orgId, u.ID)
- }
- // IsPublicMember returns true if the user has public membership of the given
- // organization.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User`.
- func (u *User) IsPublicMember(orgId int64) bool {
- return IsPublicMembership(orgId, u.ID)
- }
- // GetOrganizationCount returns the count of organization membership that the
- // user has.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User`.
- func (u *User) GetOrganizationCount() (int64, error) {
- return Handle.Organizations().CountByUser(context.TODO(), u.ID)
- }
- // ShortName truncates and returns the username at most in given length.
- //
- // TODO(unknwon): This is also used in templates, which should be fixed by
- // having a dedicated type `template.User`.
- func (u *User) ShortName(length int) string {
- return strutil.Ellipsis(u.Name, length)
- }
- // NewGhostUser creates and returns a fake user for people who has deleted their
- // accounts.
- //
- // TODO: Once migrated to unknwon.dev/i18n, pass in the `i18n.Locale` to
- // translate the text to local language.
- func NewGhostUser() *User {
- return &User{
- ID: -1,
- Name: "Ghost",
- LowerName: "ghost",
- }
- }
- var (
- reservedUsernames = map[string]struct{}{
- "-": {},
- "explore": {},
- "create": {},
- "assets": {},
- "css": {},
- "img": {},
- "js": {},
- "less": {},
- "plugins": {},
- "debug": {},
- "raw": {},
- "install": {},
- "api": {},
- "avatar": {},
- "user": {},
- "org": {},
- "help": {},
- "stars": {},
- "issues": {},
- "pulls": {},
- "commits": {},
- "repo": {},
- "template": {},
- "admin": {},
- "new": {},
- ".": {},
- "..": {},
- }
- reservedUsernamePatterns = []string{"*.keys"}
- )
- type ErrNameNotAllowed struct {
- args errutil.Args
- }
- // IsErrNameNotAllowed returns true if the underlying error has the type
- // ErrNameNotAllowed.
- func IsErrNameNotAllowed(err error) bool {
- _, ok := errors.Cause(err).(ErrNameNotAllowed)
- return ok
- }
- func (err ErrNameNotAllowed) Value() string {
- val, ok := err.args["name"].(string)
- if ok {
- return val
- }
- val, ok = err.args["pattern"].(string)
- if ok {
- return val
- }
- return "<value not found>"
- }
- func (err ErrNameNotAllowed) Error() string {
- return fmt.Sprintf("name is not allowed: %v", err.args)
- }
- // isNameAllowed checks if the name is reserved or pattern of the name is not
- // allowed based on given reserved names and patterns. Names are exact match,
- // patterns can be prefix or suffix match with the wildcard ("*").
- func isNameAllowed(names map[string]struct{}, patterns []string, name string) error {
- name = strings.TrimSpace(strings.ToLower(name))
- if utf8.RuneCountInString(name) == 0 {
- return ErrNameNotAllowed{
- args: errutil.Args{
- "reason": "empty name",
- },
- }
- }
- if _, ok := names[name]; ok {
- return ErrNameNotAllowed{
- args: errutil.Args{
- "reason": "reserved",
- "name": name,
- },
- }
- }
- for _, pattern := range patterns {
- if pattern[0] == '*' && strings.HasSuffix(name, pattern[1:]) ||
- (pattern[len(pattern)-1] == '*' && strings.HasPrefix(name, pattern[:len(pattern)-1])) {
- return ErrNameNotAllowed{
- args: errutil.Args{
- "reason": "reserved",
- "pattern": pattern,
- },
- }
- }
- }
- return nil
- }
- // isUsernameAllowed returns ErrNameNotAllowed if the given name or pattern of
- // the name is not allowed as a username.
- func isUsernameAllowed(name string) error {
- return isNameAllowed(reservedUsernames, reservedUsernamePatterns, name)
- }
- // EmailAddress is an email address of a user.
- type EmailAddress struct {
- ID int64 `gorm:"primaryKey"`
- UserID int64 `xorm:"uid INDEX NOT NULL" gorm:"column:uid;index;uniqueIndex:email_address_user_email_unique;not null"`
- Email string `xorm:"UNIQUE NOT NULL" gorm:"uniqueIndex:email_address_user_email_unique;not null;size:254"`
- IsActivated bool `gorm:"not null;default:FALSE"`
- IsPrimary bool `xorm:"-" gorm:"-" json:"-"`
- IsPublic bool `xorm:"-" gorm:"-" json:"-"`
- IsLocal bool `xorm:"-" gorm:"-" json:"-"`
- NotExists bool `xorm:"-" gorm:"-" json:"-"`
- }
- // Follow represents relations of users and their followers.
- type Follow struct {
- ID int64 `gorm:"primaryKey"`
- UserID int64 `xorm:"UNIQUE(follow)" gorm:"uniqueIndex:follow_user_follow_unique;not null"`
- FollowID int64 `xorm:"UNIQUE(follow)" gorm:"uniqueIndex:follow_user_follow_unique;not null"`
- }
|