mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	Splitted the user settings code into several files to be more maintainable (#3968)
* refactor setting router code splitted up one huge router settings file into the smaller files representing the actual page structure * move code to subfolder * rename functions * renamed files * add copyright information
This commit is contained in:
		
				
					committed by
					
						
						Lunny Xiao
					
				
			
			
				
	
			
			
			
						parent
						
							8f4d11af0b
						
					
				
				
					commit
					2aabfc1afa
				
			@@ -13,7 +13,7 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
	"code.gitea.io/gitea/routers/user"
 | 
			
		||||
	userSetting "code.gitea.io/gitea/routers/user/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
@@ -91,7 +91,7 @@ func SettingsPost(ctx *context.Context, form auth.UpdateOrgSettingForm) {
 | 
			
		||||
// SettingsAvatar response for change avatar on settings page
 | 
			
		||||
func SettingsAvatar(ctx *context.Context, form auth.AvatarForm) {
 | 
			
		||||
	form.Source = auth.AvatarLocal
 | 
			
		||||
	if err := user.UpdateAvatarSetting(ctx, form, ctx.Org.Organization); err != nil {
 | 
			
		||||
	if err := userSetting.UpdateAvatarSetting(ctx, form, ctx.Org.Organization); err != nil {
 | 
			
		||||
		ctx.Flash.Error(err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("org.settings.update_avatar_success"))
 | 
			
		||||
 
 | 
			
		||||
@@ -27,6 +27,7 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/routers/private"
 | 
			
		||||
	"code.gitea.io/gitea/routers/repo"
 | 
			
		||||
	"code.gitea.io/gitea/routers/user"
 | 
			
		||||
	userSetting "code.gitea.io/gitea/routers/user/setting"
 | 
			
		||||
 | 
			
		||||
	"github.com/go-macaron/binding"
 | 
			
		||||
	"github.com/go-macaron/cache"
 | 
			
		||||
@@ -216,39 +217,39 @@ func RegisterRoutes(m *macaron.Macaron) {
 | 
			
		||||
	}, reqSignOut)
 | 
			
		||||
 | 
			
		||||
	m.Group("/user/settings", func() {
 | 
			
		||||
		m.Get("", user.Settings)
 | 
			
		||||
		m.Post("", bindIgnErr(auth.UpdateProfileForm{}), user.SettingsPost)
 | 
			
		||||
		m.Post("/avatar", binding.MultipartForm(auth.AvatarForm{}), user.SettingsAvatarPost)
 | 
			
		||||
		m.Post("/avatar/delete", user.SettingsDeleteAvatar)
 | 
			
		||||
		m.Get("", userSetting.Profile)
 | 
			
		||||
		m.Post("", bindIgnErr(auth.UpdateProfileForm{}), userSetting.ProfilePost)
 | 
			
		||||
		m.Post("/avatar", binding.MultipartForm(auth.AvatarForm{}), userSetting.AvatarPost)
 | 
			
		||||
		m.Post("/avatar/delete", userSetting.DeleteAvatar)
 | 
			
		||||
		m.Group("/account", func() {
 | 
			
		||||
			m.Combo("").Get(user.SettingsAccount).Post(bindIgnErr(auth.ChangePasswordForm{}), user.SettingsAccountPost)
 | 
			
		||||
			m.Post("/email", bindIgnErr(auth.AddEmailForm{}), user.SettingsEmailPost)
 | 
			
		||||
			m.Post("/email/delete", user.DeleteEmail)
 | 
			
		||||
			m.Post("/delete", user.SettingsDelete)
 | 
			
		||||
			m.Combo("").Get(userSetting.Account).Post(bindIgnErr(auth.ChangePasswordForm{}), userSetting.AccountPost)
 | 
			
		||||
			m.Post("/email", bindIgnErr(auth.AddEmailForm{}), userSetting.EmailPost)
 | 
			
		||||
			m.Post("/email/delete", userSetting.DeleteEmail)
 | 
			
		||||
			m.Post("/delete", userSetting.DeleteAccount)
 | 
			
		||||
		})
 | 
			
		||||
		m.Group("/security", func() {
 | 
			
		||||
			m.Get("", user.SettingsSecurity)
 | 
			
		||||
			m.Get("", userSetting.Security)
 | 
			
		||||
			m.Group("/two_factor", func() {
 | 
			
		||||
				m.Post("/regenerate_scratch", user.SettingsTwoFactorRegenerateScratch)
 | 
			
		||||
				m.Post("/disable", user.SettingsTwoFactorDisable)
 | 
			
		||||
				m.Get("/enroll", user.SettingsTwoFactorEnroll)
 | 
			
		||||
				m.Post("/enroll", bindIgnErr(auth.TwoFactorAuthForm{}), user.SettingsTwoFactorEnrollPost)
 | 
			
		||||
				m.Post("/regenerate_scratch", userSetting.RegenerateScratchTwoFactor)
 | 
			
		||||
				m.Post("/disable", userSetting.DisableTwoFactor)
 | 
			
		||||
				m.Get("/enroll", userSetting.EnrollTwoFactor)
 | 
			
		||||
				m.Post("/enroll", bindIgnErr(auth.TwoFactorAuthForm{}), userSetting.EnrollTwoFactorPost)
 | 
			
		||||
			})
 | 
			
		||||
			m.Group("/openid", func() {
 | 
			
		||||
				m.Post("", bindIgnErr(auth.AddOpenIDForm{}), user.SettingsOpenIDPost)
 | 
			
		||||
				m.Post("/delete", user.DeleteOpenID)
 | 
			
		||||
				m.Post("/toggle_visibility", user.ToggleOpenIDVisibility)
 | 
			
		||||
				m.Post("", bindIgnErr(auth.AddOpenIDForm{}), userSetting.OpenIDPost)
 | 
			
		||||
				m.Post("/delete", userSetting.DeleteOpenID)
 | 
			
		||||
				m.Post("/toggle_visibility", userSetting.ToggleOpenIDVisibility)
 | 
			
		||||
			}, openIDSignInEnabled)
 | 
			
		||||
			m.Post("/account_link", user.SettingsDeleteAccountLink)
 | 
			
		||||
			m.Post("/account_link", userSetting.DeleteAccountLink)
 | 
			
		||||
		})
 | 
			
		||||
		m.Combo("/applications").Get(user.SettingsApplications).
 | 
			
		||||
			Post(bindIgnErr(auth.NewAccessTokenForm{}), user.SettingsApplicationsPost)
 | 
			
		||||
		m.Post("/applications/delete", user.SettingsDeleteApplication)
 | 
			
		||||
		m.Combo("/keys").Get(user.SettingsKeys).
 | 
			
		||||
			Post(bindIgnErr(auth.AddKeyForm{}), user.SettingsKeysPost)
 | 
			
		||||
		m.Post("/keys/delete", user.DeleteKey)
 | 
			
		||||
		m.Get("/organization", user.SettingsOrganization)
 | 
			
		||||
		m.Get("/repos", user.SettingsRepos)
 | 
			
		||||
		m.Combo("/applications").Get(userSetting.Applications).
 | 
			
		||||
			Post(bindIgnErr(auth.NewAccessTokenForm{}), userSetting.ApplicationsPost)
 | 
			
		||||
		m.Post("/applications/delete", userSetting.DeleteApplication)
 | 
			
		||||
		m.Combo("/keys").Get(userSetting.Keys).
 | 
			
		||||
			Post(bindIgnErr(auth.AddKeyForm{}), userSetting.KeysPost)
 | 
			
		||||
		m.Post("/keys/delete", userSetting.DeleteKey)
 | 
			
		||||
		m.Get("/organization", userSetting.Organization)
 | 
			
		||||
		m.Get("/repos", userSetting.Repos)
 | 
			
		||||
 | 
			
		||||
		// redirects from old settings urls to new ones
 | 
			
		||||
		// TODO: can be removed on next major version
 | 
			
		||||
 
 | 
			
		||||
@@ -1,808 +0,0 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package user
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"github.com/Unknwon/com"
 | 
			
		||||
	"github.com/Unknwon/i18n"
 | 
			
		||||
	"github.com/pquerna/otp"
 | 
			
		||||
	"github.com/pquerna/otp/totp"
 | 
			
		||||
 | 
			
		||||
	"encoding/base64"
 | 
			
		||||
	"html/template"
 | 
			
		||||
	"image/png"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsProfile      base.TplName = "user/settings/profile"
 | 
			
		||||
	tplSettingsAccount      base.TplName = "user/settings/account"
 | 
			
		||||
	tplSettingsSecurity     base.TplName = "user/settings/security"
 | 
			
		||||
	tplSettingsTwofaEnroll  base.TplName = "user/settings/twofa_enroll"
 | 
			
		||||
	tplSettingsApplications base.TplName = "user/settings/applications"
 | 
			
		||||
	tplSettingsKeys         base.TplName = "user/settings/keys"
 | 
			
		||||
	tplSettingsOrganization base.TplName = "user/settings/organization"
 | 
			
		||||
	tplSettingsRepositories base.TplName = "user/settings/repos"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Settings render user's profile page
 | 
			
		||||
func Settings(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsProfile"] = true
 | 
			
		||||
	ctx.HTML(200, tplSettingsProfile)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func handleUsernameChange(ctx *context.Context, newName string) {
 | 
			
		||||
	// Non-local users are not allowed to change their username.
 | 
			
		||||
	if len(newName) == 0 || !ctx.User.IsLocal() {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Check if user name has been changed
 | 
			
		||||
	if ctx.User.LowerName != strings.ToLower(newName) {
 | 
			
		||||
		if err := models.ChangeUserName(ctx.User, newName); err != nil {
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrUserAlreadyExist(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.username_been_taken"))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrEmailAlreadyUsed(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.email_been_used"))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrNameReserved(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("user.form.name_reserved", newName))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrNamePatternNotAllowed(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("user.form.name_pattern_not_allowed", newName))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("ChangeUserName", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		log.Trace("User name changed: %s -> %s", ctx.User.Name, newName)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// In case it's just a case change
 | 
			
		||||
	ctx.User.Name = newName
 | 
			
		||||
	ctx.User.LowerName = strings.ToLower(newName)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsPost response for change user's profile
 | 
			
		||||
func SettingsPost(ctx *context.Context, form auth.UpdateProfileForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsProfile"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsProfile)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	handleUsernameChange(ctx, form.Name)
 | 
			
		||||
	if ctx.Written() {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.User.FullName = form.FullName
 | 
			
		||||
	ctx.User.Email = form.Email
 | 
			
		||||
	ctx.User.KeepEmailPrivate = form.KeepEmailPrivate
 | 
			
		||||
	ctx.User.Website = form.Website
 | 
			
		||||
	ctx.User.Location = form.Location
 | 
			
		||||
	ctx.User.Language = form.Language
 | 
			
		||||
	if err := models.UpdateUserSetting(ctx.User); err != nil {
 | 
			
		||||
		if _, ok := err.(models.ErrEmailAlreadyUsed); ok {
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.email_been_used"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.ServerError("UpdateUser", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Update the language to the one we just set
 | 
			
		||||
	ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL)
 | 
			
		||||
 | 
			
		||||
	log.Trace("User settings updated: %s", ctx.User.Name)
 | 
			
		||||
	ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success"))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UpdateAvatarSetting update user's avatar
 | 
			
		||||
// FIXME: limit size.
 | 
			
		||||
func UpdateAvatarSetting(ctx *context.Context, form auth.AvatarForm, ctxUser *models.User) error {
 | 
			
		||||
	ctxUser.UseCustomAvatar = form.Source == auth.AvatarLocal
 | 
			
		||||
	if len(form.Gravatar) > 0 {
 | 
			
		||||
		ctxUser.Avatar = base.EncodeMD5(form.Gravatar)
 | 
			
		||||
		ctxUser.AvatarEmail = form.Gravatar
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if form.Avatar != nil {
 | 
			
		||||
		fr, err := form.Avatar.Open()
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return fmt.Errorf("Avatar.Open: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		defer fr.Close()
 | 
			
		||||
 | 
			
		||||
		data, err := ioutil.ReadAll(fr)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return fmt.Errorf("ioutil.ReadAll: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		if !base.IsImageFile(data) {
 | 
			
		||||
			return errors.New(ctx.Tr("settings.uploaded_avatar_not_a_image"))
 | 
			
		||||
		}
 | 
			
		||||
		if err = ctxUser.UploadAvatar(data); err != nil {
 | 
			
		||||
			return fmt.Errorf("UploadAvatar: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		// No avatar is uploaded but setting has been changed to enable,
 | 
			
		||||
		// generate a random one when needed.
 | 
			
		||||
		if ctxUser.UseCustomAvatar && !com.IsFile(ctxUser.CustomAvatarPath()) {
 | 
			
		||||
			if err := ctxUser.GenerateRandomAvatar(); err != nil {
 | 
			
		||||
				log.Error(4, "GenerateRandomAvatar[%d]: %v", ctxUser.ID, err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := models.UpdateUserCols(ctxUser, "avatar", "avatar_email", "use_custom_avatar"); err != nil {
 | 
			
		||||
		return fmt.Errorf("UpdateUser: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsAvatarPost response for change user's avatar request
 | 
			
		||||
func SettingsAvatarPost(ctx *context.Context, form auth.AvatarForm) {
 | 
			
		||||
	if err := UpdateAvatarSetting(ctx, form, ctx.User); err != nil {
 | 
			
		||||
		ctx.Flash.Error(err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.update_avatar_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsDeleteAvatar render delete avatar page
 | 
			
		||||
func SettingsDeleteAvatar(ctx *context.Context) {
 | 
			
		||||
	if err := ctx.User.DeleteAvatar(); err != nil {
 | 
			
		||||
		ctx.Flash.Error(err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsAccount renders change user's password, user's email and user suicide page
 | 
			
		||||
func SettingsAccount(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
	ctx.Data["Email"] = ctx.User.Email
 | 
			
		||||
 | 
			
		||||
	emails, err := models.GetEmailAddresses(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetEmailAddresses", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Emails"] = emails
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsAccountPost response for change user's password
 | 
			
		||||
func SettingsAccountPost(ctx *context.Context, form auth.ChangePasswordForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(form.Password) < setting.MinPasswordLength {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("auth.password_too_short", setting.MinPasswordLength))
 | 
			
		||||
	} else if ctx.User.IsPasswordSet() && !ctx.User.ValidatePassword(form.OldPassword) {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("settings.password_incorrect"))
 | 
			
		||||
	} else if form.Password != form.Retype {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("form.password_not_match"))
 | 
			
		||||
	} else {
 | 
			
		||||
		var err error
 | 
			
		||||
		if ctx.User.Salt, err = models.GetUserSalt(); err != nil {
 | 
			
		||||
			ctx.ServerError("UpdateUser", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.User.HashPassword(form.Password)
 | 
			
		||||
		if err := models.UpdateUserCols(ctx.User, "salt", "passwd"); err != nil {
 | 
			
		||||
			ctx.ServerError("UpdateUser", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		log.Trace("User password updated: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.change_password_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsEmailPost response for change user's email
 | 
			
		||||
func SettingsEmailPost(ctx *context.Context, form auth.AddEmailForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	// Make emailaddress primary.
 | 
			
		||||
	if ctx.Query("_method") == "PRIMARY" {
 | 
			
		||||
		if err := models.MakeEmailPrimary(&models.EmailAddress{ID: ctx.QueryInt64("id")}); err != nil {
 | 
			
		||||
			ctx.ServerError("MakeEmailPrimary", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		log.Trace("Email made primary: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Add Email address.
 | 
			
		||||
	emails, err := models.GetEmailAddresses(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetEmailAddresses", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Emails"] = emails
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	email := &models.EmailAddress{
 | 
			
		||||
		UID:         ctx.User.ID,
 | 
			
		||||
		Email:       form.Email,
 | 
			
		||||
		IsActivated: !setting.Service.RegisterEmailConfirm,
 | 
			
		||||
	}
 | 
			
		||||
	if err := models.AddEmailAddress(email); err != nil {
 | 
			
		||||
		if models.IsErrEmailAlreadyUsed(err) {
 | 
			
		||||
			ctx.RenderWithErr(ctx.Tr("form.email_been_used"), tplSettingsAccount, &form)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.ServerError("AddEmailAddress", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Send confirmation email
 | 
			
		||||
	if setting.Service.RegisterEmailConfirm {
 | 
			
		||||
		models.SendActivateEmailMail(ctx.Context, ctx.User, email)
 | 
			
		||||
 | 
			
		||||
		if err := ctx.Cache.Put("MailResendLimit_"+ctx.User.LowerName, ctx.User.LowerName, 180); err != nil {
 | 
			
		||||
			log.Error(4, "Set cache(MailResendLimit) fail: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Info(ctx.Tr("settings.add_email_confirmation_sent", email.Email, base.MinutesToFriendly(setting.Service.ActiveCodeLives, ctx.Locale.Language())))
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_email_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	log.Trace("Email address added: %s", email.Email)
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteEmail response for delete user's email
 | 
			
		||||
func DeleteEmail(ctx *context.Context) {
 | 
			
		||||
	if err := models.DeleteEmailAddress(&models.EmailAddress{ID: ctx.QueryInt64("id"), UID: ctx.User.ID}); err != nil {
 | 
			
		||||
		ctx.ServerError("DeleteEmail", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	log.Trace("Email address deleted: %s", ctx.User.Name)
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.email_deletion_success"))
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/account",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsDelete render user suicide page and response for delete user himself
 | 
			
		||||
func SettingsDelete(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	if _, err := models.UserSignIn(ctx.User.Name, ctx.Query("password")); err != nil {
 | 
			
		||||
		if models.IsErrUserNotExist(err) {
 | 
			
		||||
			ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_password"), tplSettingsAccount, nil)
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.ServerError("UserSignIn", err)
 | 
			
		||||
		}
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := models.DeleteUser(ctx.User); err != nil {
 | 
			
		||||
		switch {
 | 
			
		||||
		case models.IsErrUserOwnRepos(err):
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.still_own_repo"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		case models.IsErrUserHasOrgs(err):
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.still_has_org"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		default:
 | 
			
		||||
			ctx.ServerError("DeleteUser", err)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		log.Trace("Account deleted: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsSecurity render change user's password page and 2FA
 | 
			
		||||
func SettingsSecurity(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	enrolled := true
 | 
			
		||||
	_, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
			enrolled = false
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["TwofaEnrolled"] = enrolled
 | 
			
		||||
 | 
			
		||||
	accountLinks, err := models.ListAccountLinks(ctx.User)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListAccountLinks", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// map the provider display name with the LoginSource
 | 
			
		||||
	sources := make(map[*models.LoginSource]string)
 | 
			
		||||
	for _, externalAccount := range accountLinks {
 | 
			
		||||
		if loginSource, err := models.GetLoginSourceByID(externalAccount.LoginSourceID); err == nil {
 | 
			
		||||
			var providerDisplayName string
 | 
			
		||||
			if loginSource.IsOAuth2() {
 | 
			
		||||
				providerTechnicalName := loginSource.OAuth2().Provider
 | 
			
		||||
				providerDisplayName = models.OAuth2Providers[providerTechnicalName].DisplayName
 | 
			
		||||
			} else {
 | 
			
		||||
				providerDisplayName = loginSource.Name
 | 
			
		||||
			}
 | 
			
		||||
			sources[loginSource] = providerDisplayName
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["AccountLinks"] = sources
 | 
			
		||||
 | 
			
		||||
	if ctx.Query("openid.return_to") != "" {
 | 
			
		||||
		settingsOpenIDVerify(ctx)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	openid, err := models.GetUserOpenIDs(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetUserOpenIDs", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["OpenIDs"] = openid
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsSecurity)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsDeleteAccountLink delete a single account link
 | 
			
		||||
func SettingsDeleteAccountLink(ctx *context.Context) {
 | 
			
		||||
	if _, err := models.RemoveAccountLink(ctx.User, ctx.QueryInt64("loginSourceID")); err != nil {
 | 
			
		||||
		ctx.Flash.Error("RemoveAccountLink: " + err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.remove_account_link_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/security",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsApplications render manage access token page
 | 
			
		||||
func SettingsApplications(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsApplications"] = true
 | 
			
		||||
 | 
			
		||||
	tokens, err := models.ListAccessTokens(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListAccessTokens", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Tokens"] = tokens
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsApplications)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsApplicationsPost response for add user's access token
 | 
			
		||||
func SettingsApplicationsPost(ctx *context.Context, form auth.NewAccessTokenForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsApplications"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		tokens, err := models.ListAccessTokens(ctx.User.ID)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.ServerError("ListAccessTokens", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Data["Tokens"] = tokens
 | 
			
		||||
		ctx.HTML(200, tplSettingsApplications)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t := &models.AccessToken{
 | 
			
		||||
		UID:  ctx.User.ID,
 | 
			
		||||
		Name: form.Name,
 | 
			
		||||
	}
 | 
			
		||||
	if err := models.NewAccessToken(t); err != nil {
 | 
			
		||||
		ctx.ServerError("NewAccessToken", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.generate_token_success"))
 | 
			
		||||
	ctx.Flash.Info(t.Sha1)
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/applications")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsDeleteApplication response for delete user access token
 | 
			
		||||
func SettingsDeleteApplication(ctx *context.Context) {
 | 
			
		||||
	if err := models.DeleteAccessTokenByID(ctx.QueryInt64("id"), ctx.User.ID); err != nil {
 | 
			
		||||
		ctx.Flash.Error("DeleteAccessTokenByID: " + err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.delete_token_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/applications",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsKeys render user's SSH/GPG public keys page
 | 
			
		||||
func SettingsKeys(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsKeys"] = true
 | 
			
		||||
	ctx.Data["DisableSSH"] = setting.SSH.Disabled
 | 
			
		||||
 | 
			
		||||
	keys, err := models.ListPublicKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListPublicKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Keys"] = keys
 | 
			
		||||
 | 
			
		||||
	gpgkeys, err := models.ListGPGKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListGPGKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["GPGKeys"] = gpgkeys
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsKeys)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsKeysPost response for change user's SSH/GPG keys
 | 
			
		||||
func SettingsKeysPost(ctx *context.Context, form auth.AddKeyForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsKeys"] = true
 | 
			
		||||
 | 
			
		||||
	keys, err := models.ListPublicKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListPublicKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Keys"] = keys
 | 
			
		||||
 | 
			
		||||
	gpgkeys, err := models.ListGPGKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListGPGKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["GPGKeys"] = gpgkeys
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsKeys)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	switch form.Type {
 | 
			
		||||
	case "gpg":
 | 
			
		||||
		key, err := models.AddGPGKey(ctx.User.ID, form.Content)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.Data["HasGPGError"] = true
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrGPGKeyParsing(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.invalid_gpg_key", err.Error()))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
			case models.IsErrGPGKeyIDAlreadyUsed(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.gpg_key_id_used"), tplSettingsKeys, &form)
 | 
			
		||||
			case models.IsErrGPGNoEmailFound(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.gpg_no_key_email_found"), tplSettingsKeys, &form)
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("AddPublicKey", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_gpg_key_success", key.KeyID))
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	case "ssh":
 | 
			
		||||
		content, err := models.CheckPublicKeyString(form.Content)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if models.IsErrSSHDisabled(err) {
 | 
			
		||||
				ctx.Flash.Info(ctx.Tr("settings.ssh_disabled"))
 | 
			
		||||
			} else if models.IsErrKeyUnableVerify(err) {
 | 
			
		||||
				ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key"))
 | 
			
		||||
			} else {
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.invalid_ssh_key", err.Error()))
 | 
			
		||||
			}
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if _, err = models.AddPublicKey(ctx.User.ID, form.Title, content); err != nil {
 | 
			
		||||
			ctx.Data["HasSSHError"] = true
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrKeyAlreadyExist(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.ssh_key_been_used"), tplSettingsKeys, &form)
 | 
			
		||||
			case models.IsErrKeyNameAlreadyUsed(err):
 | 
			
		||||
				ctx.Data["Err_Title"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.ssh_key_name_used"), tplSettingsKeys, &form)
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("AddPublicKey", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_key_success", form.Title))
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
 | 
			
		||||
	default:
 | 
			
		||||
		ctx.Flash.Warning("Function not implemented")
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteKey response for delete user's SSH/GPG key
 | 
			
		||||
func DeleteKey(ctx *context.Context) {
 | 
			
		||||
 | 
			
		||||
	switch ctx.Query("type") {
 | 
			
		||||
	case "gpg":
 | 
			
		||||
		if err := models.DeleteGPGKey(ctx.User, ctx.QueryInt64("id")); err != nil {
 | 
			
		||||
			ctx.Flash.Error("DeleteGPGKey: " + err.Error())
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.Flash.Success(ctx.Tr("settings.gpg_key_deletion_success"))
 | 
			
		||||
		}
 | 
			
		||||
	case "ssh":
 | 
			
		||||
		if err := models.DeletePublicKey(ctx.User, ctx.QueryInt64("id")); err != nil {
 | 
			
		||||
			ctx.Flash.Error("DeletePublicKey: " + err.Error())
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.Flash.Success(ctx.Tr("settings.ssh_key_deletion_success"))
 | 
			
		||||
		}
 | 
			
		||||
	default:
 | 
			
		||||
		ctx.Flash.Warning("Function not implemented")
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	}
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/keys",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsTwoFactorRegenerateScratch regenerates the user's 2FA scratch code.
 | 
			
		||||
func SettingsTwoFactorRegenerateScratch(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = t.GenerateScratchToken(); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.UpdateTwoFactor(t); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_scratch_token_regenerated", t.ScratchToken))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsTwoFactorDisable deletes the user's 2FA settings.
 | 
			
		||||
func SettingsTwoFactorDisable(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.DeleteTwoFactorByID(t.ID, ctx.User.ID); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_disabled"))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func twofaGenerateSecretAndQr(ctx *context.Context) bool {
 | 
			
		||||
	var otpKey *otp.Key
 | 
			
		||||
	var err error
 | 
			
		||||
	uri := ctx.Session.Get("twofaUri")
 | 
			
		||||
	if uri != nil {
 | 
			
		||||
		otpKey, err = otp.NewKeyFromURL(uri.(string))
 | 
			
		||||
	}
 | 
			
		||||
	if otpKey == nil {
 | 
			
		||||
		err = nil // clear the error, in case the URL was invalid
 | 
			
		||||
		otpKey, err = totp.Generate(totp.GenerateOpts{
 | 
			
		||||
			Issuer:      setting.AppName + " (" + strings.TrimRight(setting.AppURL, "/") + ")",
 | 
			
		||||
			AccountName: ctx.User.Name,
 | 
			
		||||
		})
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["TwofaSecret"] = otpKey.Secret()
 | 
			
		||||
	img, err := otpKey.Image(320, 240)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var imgBytes bytes.Buffer
 | 
			
		||||
	if err = png.Encode(&imgBytes, img); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["QrUri"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(imgBytes.Bytes()))
 | 
			
		||||
	ctx.Session.Set("twofaSecret", otpKey.Secret())
 | 
			
		||||
	ctx.Session.Set("twofaUri", otpKey.String())
 | 
			
		||||
	return true
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsTwoFactorEnroll shows the page where the user can enroll into 2FA.
 | 
			
		||||
func SettingsTwoFactorEnroll(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if t != nil {
 | 
			
		||||
		// already enrolled
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsTwoFactorEnrollPost handles enrolling the user into 2FA.
 | 
			
		||||
func SettingsTwoFactorEnrollPost(ctx *context.Context, form auth.TwoFactorAuthForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if t != nil {
 | 
			
		||||
		// already enrolled
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secret := ctx.Session.Get("twofaSecret").(string)
 | 
			
		||||
	if !totp.Validate(form.Passcode, secret) {
 | 
			
		||||
		if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("settings.passcode_invalid"))
 | 
			
		||||
		ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t = &models.TwoFactor{
 | 
			
		||||
		UID: ctx.User.ID,
 | 
			
		||||
	}
 | 
			
		||||
	err = t.SetSecret(secret)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	err = t.GenerateScratchToken()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.NewTwoFactor(t); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Session.Delete("twofaSecret")
 | 
			
		||||
	ctx.Session.Delete("twofaUri")
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_enrolled", t.ScratchToken))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsOrganization render all the organization of the user
 | 
			
		||||
func SettingsOrganization(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsOrganization"] = true
 | 
			
		||||
	orgs, err := models.GetOrgsByUserID(ctx.User.ID, ctx.IsSigned)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetOrgsByUserID", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Orgs"] = orgs
 | 
			
		||||
	ctx.HTML(200, tplSettingsOrganization)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SettingsRepos display a list of all repositories of the user
 | 
			
		||||
func SettingsRepos(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsRepos"] = true
 | 
			
		||||
	ctxUser := ctx.User
 | 
			
		||||
 | 
			
		||||
	var err error
 | 
			
		||||
	if err = ctxUser.GetRepositories(1, setting.UI.User.RepoPagingNum); err != nil {
 | 
			
		||||
		ctx.ServerError("GetRepositories", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	repos := ctxUser.Repos
 | 
			
		||||
 | 
			
		||||
	for i := range repos {
 | 
			
		||||
		if repos[i].IsFork {
 | 
			
		||||
			err := repos[i].GetBaseRepo()
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				ctx.ServerError("GetBaseRepo", err)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
			err = repos[i].BaseRepo.GetOwner()
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				ctx.ServerError("GetOwner", err)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["Owner"] = ctxUser
 | 
			
		||||
	ctx.Data["Repos"] = repos
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsRepositories)
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										174
									
								
								routers/user/setting/account.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										174
									
								
								routers/user/setting/account.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,174 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsAccount base.TplName = "user/settings/account"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Account renders change user's password, user's email and user suicide page
 | 
			
		||||
func Account(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
	ctx.Data["Email"] = ctx.User.Email
 | 
			
		||||
 | 
			
		||||
	emails, err := models.GetEmailAddresses(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetEmailAddresses", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Emails"] = emails
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// AccountPost response for change user's password
 | 
			
		||||
func AccountPost(ctx *context.Context, form auth.ChangePasswordForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(form.Password) < setting.MinPasswordLength {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("auth.password_too_short", setting.MinPasswordLength))
 | 
			
		||||
	} else if ctx.User.IsPasswordSet() && !ctx.User.ValidatePassword(form.OldPassword) {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("settings.password_incorrect"))
 | 
			
		||||
	} else if form.Password != form.Retype {
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("form.password_not_match"))
 | 
			
		||||
	} else {
 | 
			
		||||
		var err error
 | 
			
		||||
		if ctx.User.Salt, err = models.GetUserSalt(); err != nil {
 | 
			
		||||
			ctx.ServerError("UpdateUser", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.User.HashPassword(form.Password)
 | 
			
		||||
		if err := models.UpdateUserCols(ctx.User, "salt", "passwd"); err != nil {
 | 
			
		||||
			ctx.ServerError("UpdateUser", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		log.Trace("User password updated: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.change_password_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// EmailPost response for change user's email
 | 
			
		||||
func EmailPost(ctx *context.Context, form auth.AddEmailForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	// Make emailaddress primary.
 | 
			
		||||
	if ctx.Query("_method") == "PRIMARY" {
 | 
			
		||||
		if err := models.MakeEmailPrimary(&models.EmailAddress{ID: ctx.QueryInt64("id")}); err != nil {
 | 
			
		||||
			ctx.ServerError("MakeEmailPrimary", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		log.Trace("Email made primary: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Add Email address.
 | 
			
		||||
	emails, err := models.GetEmailAddresses(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetEmailAddresses", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Emails"] = emails
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsAccount)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	email := &models.EmailAddress{
 | 
			
		||||
		UID:         ctx.User.ID,
 | 
			
		||||
		Email:       form.Email,
 | 
			
		||||
		IsActivated: !setting.Service.RegisterEmailConfirm,
 | 
			
		||||
	}
 | 
			
		||||
	if err := models.AddEmailAddress(email); err != nil {
 | 
			
		||||
		if models.IsErrEmailAlreadyUsed(err) {
 | 
			
		||||
			ctx.RenderWithErr(ctx.Tr("form.email_been_used"), tplSettingsAccount, &form)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.ServerError("AddEmailAddress", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Send confirmation email
 | 
			
		||||
	if setting.Service.RegisterEmailConfirm {
 | 
			
		||||
		models.SendActivateEmailMail(ctx.Context, ctx.User, email)
 | 
			
		||||
 | 
			
		||||
		if err := ctx.Cache.Put("MailResendLimit_"+ctx.User.LowerName, ctx.User.LowerName, 180); err != nil {
 | 
			
		||||
			log.Error(4, "Set cache(MailResendLimit) fail: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Info(ctx.Tr("settings.add_email_confirmation_sent", email.Email, base.MinutesToFriendly(setting.Service.ActiveCodeLives, ctx.Locale.Language())))
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_email_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	log.Trace("Email address added: %s", email.Email)
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteEmail response for delete user's email
 | 
			
		||||
func DeleteEmail(ctx *context.Context) {
 | 
			
		||||
	if err := models.DeleteEmailAddress(&models.EmailAddress{ID: ctx.QueryInt64("id"), UID: ctx.User.ID}); err != nil {
 | 
			
		||||
		ctx.ServerError("DeleteEmail", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	log.Trace("Email address deleted: %s", ctx.User.Name)
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.email_deletion_success"))
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/account",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteAccount render user suicide page and response for delete user himself
 | 
			
		||||
func DeleteAccount(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsAccount"] = true
 | 
			
		||||
 | 
			
		||||
	if _, err := models.UserSignIn(ctx.User.Name, ctx.Query("password")); err != nil {
 | 
			
		||||
		if models.IsErrUserNotExist(err) {
 | 
			
		||||
			ctx.RenderWithErr(ctx.Tr("form.enterred_invalid_password"), tplSettingsAccount, nil)
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.ServerError("UserSignIn", err)
 | 
			
		||||
		}
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := models.DeleteUser(ctx.User); err != nil {
 | 
			
		||||
		switch {
 | 
			
		||||
		case models.IsErrUserOwnRepos(err):
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.still_own_repo"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		case models.IsErrUserHasOrgs(err):
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.still_has_org"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/account")
 | 
			
		||||
		default:
 | 
			
		||||
			ctx.ServerError("DeleteUser", err)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		log.Trace("Account deleted: %s", ctx.User.Name)
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
@@ -1,8 +1,8 @@
 | 
			
		||||
// Copyright 2017 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package user
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"net/http"
 | 
			
		||||
@@ -56,7 +56,7 @@ func TestChangePassword(t *testing.T) {
 | 
			
		||||
		test.LoadUser(t, ctx, 2)
 | 
			
		||||
		test.LoadRepo(t, ctx, 1)
 | 
			
		||||
 | 
			
		||||
		SettingsAccountPost(ctx, auth.ChangePasswordForm{
 | 
			
		||||
		AccountPost(ctx, auth.ChangePasswordForm{
 | 
			
		||||
			OldPassword: req.OldPassword,
 | 
			
		||||
			Password:    req.NewPassword,
 | 
			
		||||
			Retype:      req.Retype,
 | 
			
		||||
							
								
								
									
										77
									
								
								routers/user/setting/applications.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										77
									
								
								routers/user/setting/applications.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,77 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsApplications base.TplName = "user/settings/applications"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Applications render manage access token page
 | 
			
		||||
func Applications(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsApplications"] = true
 | 
			
		||||
 | 
			
		||||
	tokens, err := models.ListAccessTokens(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListAccessTokens", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Tokens"] = tokens
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsApplications)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ApplicationsPost response for add user's access token
 | 
			
		||||
func ApplicationsPost(ctx *context.Context, form auth.NewAccessTokenForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsApplications"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		tokens, err := models.ListAccessTokens(ctx.User.ID)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.ServerError("ListAccessTokens", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Data["Tokens"] = tokens
 | 
			
		||||
		ctx.HTML(200, tplSettingsApplications)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t := &models.AccessToken{
 | 
			
		||||
		UID:  ctx.User.ID,
 | 
			
		||||
		Name: form.Name,
 | 
			
		||||
	}
 | 
			
		||||
	if err := models.NewAccessToken(t); err != nil {
 | 
			
		||||
		ctx.ServerError("NewAccessToken", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.generate_token_success"))
 | 
			
		||||
	ctx.Flash.Info(t.Sha1)
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/applications")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteApplication response for delete user access token
 | 
			
		||||
func DeleteApplication(ctx *context.Context) {
 | 
			
		||||
	if err := models.DeleteAccessTokenByID(ctx.QueryInt64("id"), ctx.User.ID); err != nil {
 | 
			
		||||
		ctx.Flash.Error("DeleteAccessTokenByID: " + err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.delete_token_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/applications",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										149
									
								
								routers/user/setting/keys.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										149
									
								
								routers/user/setting/keys.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,149 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsKeys base.TplName = "user/settings/keys"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Keys render user's SSH/GPG public keys page
 | 
			
		||||
func Keys(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsKeys"] = true
 | 
			
		||||
	ctx.Data["DisableSSH"] = setting.SSH.Disabled
 | 
			
		||||
 | 
			
		||||
	keys, err := models.ListPublicKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListPublicKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Keys"] = keys
 | 
			
		||||
 | 
			
		||||
	gpgkeys, err := models.ListGPGKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListGPGKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["GPGKeys"] = gpgkeys
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsKeys)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// KeysPost response for change user's SSH/GPG keys
 | 
			
		||||
func KeysPost(ctx *context.Context, form auth.AddKeyForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsKeys"] = true
 | 
			
		||||
 | 
			
		||||
	keys, err := models.ListPublicKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListPublicKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Keys"] = keys
 | 
			
		||||
 | 
			
		||||
	gpgkeys, err := models.ListGPGKeys(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListGPGKeys", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["GPGKeys"] = gpgkeys
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsKeys)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	switch form.Type {
 | 
			
		||||
	case "gpg":
 | 
			
		||||
		key, err := models.AddGPGKey(ctx.User.ID, form.Content)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.Data["HasGPGError"] = true
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrGPGKeyParsing(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.invalid_gpg_key", err.Error()))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
			case models.IsErrGPGKeyIDAlreadyUsed(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.gpg_key_id_used"), tplSettingsKeys, &form)
 | 
			
		||||
			case models.IsErrGPGNoEmailFound(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.gpg_no_key_email_found"), tplSettingsKeys, &form)
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("AddPublicKey", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_gpg_key_success", key.KeyID))
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	case "ssh":
 | 
			
		||||
		content, err := models.CheckPublicKeyString(form.Content)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if models.IsErrSSHDisabled(err) {
 | 
			
		||||
				ctx.Flash.Info(ctx.Tr("settings.ssh_disabled"))
 | 
			
		||||
			} else if models.IsErrKeyUnableVerify(err) {
 | 
			
		||||
				ctx.Flash.Info(ctx.Tr("form.unable_verify_ssh_key"))
 | 
			
		||||
			} else {
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.invalid_ssh_key", err.Error()))
 | 
			
		||||
			}
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if _, err = models.AddPublicKey(ctx.User.ID, form.Title, content); err != nil {
 | 
			
		||||
			ctx.Data["HasSSHError"] = true
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrKeyAlreadyExist(err):
 | 
			
		||||
				ctx.Data["Err_Content"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.ssh_key_been_used"), tplSettingsKeys, &form)
 | 
			
		||||
			case models.IsErrKeyNameAlreadyUsed(err):
 | 
			
		||||
				ctx.Data["Err_Title"] = true
 | 
			
		||||
				ctx.RenderWithErr(ctx.Tr("settings.ssh_key_name_used"), tplSettingsKeys, &form)
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("AddPublicKey", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.add_key_success", form.Title))
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
 | 
			
		||||
	default:
 | 
			
		||||
		ctx.Flash.Warning("Function not implemented")
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteKey response for delete user's SSH/GPG key
 | 
			
		||||
func DeleteKey(ctx *context.Context) {
 | 
			
		||||
 | 
			
		||||
	switch ctx.Query("type") {
 | 
			
		||||
	case "gpg":
 | 
			
		||||
		if err := models.DeleteGPGKey(ctx.User, ctx.QueryInt64("id")); err != nil {
 | 
			
		||||
			ctx.Flash.Error("DeleteGPGKey: " + err.Error())
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.Flash.Success(ctx.Tr("settings.gpg_key_deletion_success"))
 | 
			
		||||
		}
 | 
			
		||||
	case "ssh":
 | 
			
		||||
		if err := models.DeletePublicKey(ctx.User, ctx.QueryInt64("id")); err != nil {
 | 
			
		||||
			ctx.Flash.Error("DeletePublicKey: " + err.Error())
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.Flash.Success(ctx.Tr("settings.ssh_key_deletion_success"))
 | 
			
		||||
		}
 | 
			
		||||
	default:
 | 
			
		||||
		ctx.Flash.Warning("Function not implemented")
 | 
			
		||||
		ctx.Redirect(setting.AppSubURL + "/user/settings/keys")
 | 
			
		||||
	}
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/keys",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										16
									
								
								routers/user/setting/main_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								routers/user/setting/main_test.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,16 @@
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"path/filepath"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestMain(m *testing.M) {
 | 
			
		||||
	models.MainTest(m, filepath.Join("..", "..", ".."))
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										220
									
								
								routers/user/setting/profile.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										220
									
								
								routers/user/setting/profile.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,220 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/log"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
 | 
			
		||||
	"github.com/Unknwon/com"
 | 
			
		||||
	"github.com/Unknwon/i18n"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsProfile      base.TplName = "user/settings/profile"
 | 
			
		||||
	tplSettingsOrganization base.TplName = "user/settings/organization"
 | 
			
		||||
	tplSettingsRepositories base.TplName = "user/settings/repos"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Profile render user's profile page
 | 
			
		||||
func Profile(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsProfile"] = true
 | 
			
		||||
	ctx.HTML(200, tplSettingsProfile)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func handleUsernameChange(ctx *context.Context, newName string) {
 | 
			
		||||
	// Non-local users are not allowed to change their username.
 | 
			
		||||
	if len(newName) == 0 || !ctx.User.IsLocal() {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Check if user name has been changed
 | 
			
		||||
	if ctx.User.LowerName != strings.ToLower(newName) {
 | 
			
		||||
		if err := models.ChangeUserName(ctx.User, newName); err != nil {
 | 
			
		||||
			switch {
 | 
			
		||||
			case models.IsErrUserAlreadyExist(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.username_been_taken"))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrEmailAlreadyUsed(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("form.email_been_used"))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrNameReserved(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("user.form.name_reserved", newName))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			case models.IsErrNamePatternNotAllowed(err):
 | 
			
		||||
				ctx.Flash.Error(ctx.Tr("user.form.name_pattern_not_allowed", newName))
 | 
			
		||||
				ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			default:
 | 
			
		||||
				ctx.ServerError("ChangeUserName", err)
 | 
			
		||||
			}
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		log.Trace("User name changed: %s -> %s", ctx.User.Name, newName)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// In case it's just a case change
 | 
			
		||||
	ctx.User.Name = newName
 | 
			
		||||
	ctx.User.LowerName = strings.ToLower(newName)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ProfilePost response for change user's profile
 | 
			
		||||
func ProfilePost(ctx *context.Context, form auth.UpdateProfileForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsProfile"] = true
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		ctx.HTML(200, tplSettingsProfile)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	handleUsernameChange(ctx, form.Name)
 | 
			
		||||
	if ctx.Written() {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.User.FullName = form.FullName
 | 
			
		||||
	ctx.User.Email = form.Email
 | 
			
		||||
	ctx.User.KeepEmailPrivate = form.KeepEmailPrivate
 | 
			
		||||
	ctx.User.Website = form.Website
 | 
			
		||||
	ctx.User.Location = form.Location
 | 
			
		||||
	ctx.User.Language = form.Language
 | 
			
		||||
	if err := models.UpdateUserSetting(ctx.User); err != nil {
 | 
			
		||||
		if _, ok := err.(models.ErrEmailAlreadyUsed); ok {
 | 
			
		||||
			ctx.Flash.Error(ctx.Tr("form.email_been_used"))
 | 
			
		||||
			ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.ServerError("UpdateUser", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Update the language to the one we just set
 | 
			
		||||
	ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL)
 | 
			
		||||
 | 
			
		||||
	log.Trace("User settings updated: %s", ctx.User.Name)
 | 
			
		||||
	ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success"))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UpdateAvatarSetting update user's avatar
 | 
			
		||||
// FIXME: limit size.
 | 
			
		||||
func UpdateAvatarSetting(ctx *context.Context, form auth.AvatarForm, ctxUser *models.User) error {
 | 
			
		||||
	ctxUser.UseCustomAvatar = form.Source == auth.AvatarLocal
 | 
			
		||||
	if len(form.Gravatar) > 0 {
 | 
			
		||||
		ctxUser.Avatar = base.EncodeMD5(form.Gravatar)
 | 
			
		||||
		ctxUser.AvatarEmail = form.Gravatar
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if form.Avatar != nil {
 | 
			
		||||
		fr, err := form.Avatar.Open()
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return fmt.Errorf("Avatar.Open: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		defer fr.Close()
 | 
			
		||||
 | 
			
		||||
		data, err := ioutil.ReadAll(fr)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return fmt.Errorf("ioutil.ReadAll: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
		if !base.IsImageFile(data) {
 | 
			
		||||
			return errors.New(ctx.Tr("settings.uploaded_avatar_not_a_image"))
 | 
			
		||||
		}
 | 
			
		||||
		if err = ctxUser.UploadAvatar(data); err != nil {
 | 
			
		||||
			return fmt.Errorf("UploadAvatar: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		// No avatar is uploaded but setting has been changed to enable,
 | 
			
		||||
		// generate a random one when needed.
 | 
			
		||||
		if ctxUser.UseCustomAvatar && !com.IsFile(ctxUser.CustomAvatarPath()) {
 | 
			
		||||
			if err := ctxUser.GenerateRandomAvatar(); err != nil {
 | 
			
		||||
				log.Error(4, "GenerateRandomAvatar[%d]: %v", ctxUser.ID, err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := models.UpdateUserCols(ctxUser, "avatar", "avatar_email", "use_custom_avatar"); err != nil {
 | 
			
		||||
		return fmt.Errorf("UpdateUser: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// AvatarPost response for change user's avatar request
 | 
			
		||||
func AvatarPost(ctx *context.Context, form auth.AvatarForm) {
 | 
			
		||||
	if err := UpdateAvatarSetting(ctx, form, ctx.User); err != nil {
 | 
			
		||||
		ctx.Flash.Error(err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.update_avatar_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteAvatar render delete avatar page
 | 
			
		||||
func DeleteAvatar(ctx *context.Context) {
 | 
			
		||||
	if err := ctx.User.DeleteAvatar(); err != nil {
 | 
			
		||||
		ctx.Flash.Error(err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Organization render all the organization of the user
 | 
			
		||||
func Organization(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsOrganization"] = true
 | 
			
		||||
	orgs, err := models.GetOrgsByUserID(ctx.User.ID, ctx.IsSigned)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetOrgsByUserID", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Orgs"] = orgs
 | 
			
		||||
	ctx.HTML(200, tplSettingsOrganization)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Repos display a list of all repositories of the user
 | 
			
		||||
func Repos(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsRepos"] = true
 | 
			
		||||
	ctxUser := ctx.User
 | 
			
		||||
 | 
			
		||||
	var err error
 | 
			
		||||
	if err = ctxUser.GetRepositories(1, setting.UI.User.RepoPagingNum); err != nil {
 | 
			
		||||
		ctx.ServerError("GetRepositories", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	repos := ctxUser.Repos
 | 
			
		||||
 | 
			
		||||
	for i := range repos {
 | 
			
		||||
		if repos[i].IsFork {
 | 
			
		||||
			err := repos[i].GetBaseRepo()
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				ctx.ServerError("GetBaseRepo", err)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
			err = repos[i].BaseRepo.GetOwner()
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				ctx.ServerError("GetOwner", err)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["Owner"] = ctxUser
 | 
			
		||||
	ctx.Data["Repos"] = repos
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsRepositories)
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										92
									
								
								routers/user/setting/security.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										92
									
								
								routers/user/setting/security.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,92 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/base"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	tplSettingsSecurity    base.TplName = "user/settings/security"
 | 
			
		||||
	tplSettingsTwofaEnroll base.TplName = "user/settings/twofa_enroll"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Security render change user's password page and 2FA
 | 
			
		||||
func Security(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	enrolled := true
 | 
			
		||||
	_, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
			enrolled = false
 | 
			
		||||
		} else {
 | 
			
		||||
			ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["TwofaEnrolled"] = enrolled
 | 
			
		||||
 | 
			
		||||
	tokens, err := models.ListAccessTokens(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListAccessTokens", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["Tokens"] = tokens
 | 
			
		||||
 | 
			
		||||
	accountLinks, err := models.ListAccountLinks(ctx.User)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("ListAccountLinks", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// map the provider display name with the LoginSource
 | 
			
		||||
	sources := make(map[*models.LoginSource]string)
 | 
			
		||||
	for _, externalAccount := range accountLinks {
 | 
			
		||||
		if loginSource, err := models.GetLoginSourceByID(externalAccount.LoginSourceID); err == nil {
 | 
			
		||||
			var providerDisplayName string
 | 
			
		||||
			if loginSource.IsOAuth2() {
 | 
			
		||||
				providerTechnicalName := loginSource.OAuth2().Provider
 | 
			
		||||
				providerDisplayName = models.OAuth2Providers[providerTechnicalName].DisplayName
 | 
			
		||||
			} else {
 | 
			
		||||
				providerDisplayName = loginSource.Name
 | 
			
		||||
			}
 | 
			
		||||
			sources[loginSource] = providerDisplayName
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["AccountLinks"] = sources
 | 
			
		||||
 | 
			
		||||
	if ctx.Query("openid.return_to") != "" {
 | 
			
		||||
		settingsOpenIDVerify(ctx)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	openid, err := models.GetUserOpenIDs(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("GetUserOpenIDs", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	ctx.Data["OpenIDs"] = openid
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsSecurity)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DeleteAccountLink delete a single account link
 | 
			
		||||
func DeleteAccountLink(ctx *context.Context) {
 | 
			
		||||
	if _, err := models.RemoveAccountLink(ctx.User, ctx.QueryInt64("loginSourceID")); err != nil {
 | 
			
		||||
		ctx.Flash.Error("RemoveAccountLink: " + err.Error())
 | 
			
		||||
	} else {
 | 
			
		||||
		ctx.Flash.Success(ctx.Tr("settings.remove_account_link_success"))
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.JSON(200, map[string]interface{}{
 | 
			
		||||
		"redirect": setting.AppSubURL + "/user/settings/security",
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
@@ -1,8 +1,8 @@
 | 
			
		||||
// Copyright 2017 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package user
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
@@ -13,8 +13,8 @@ import (
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// SettingsOpenIDPost response for change user's openid
 | 
			
		||||
func SettingsOpenIDPost(ctx *context.Context, form auth.AddOpenIDForm) {
 | 
			
		||||
// OpenIDPost response for change user's openid
 | 
			
		||||
func OpenIDPost(ctx *context.Context, form auth.AddOpenIDForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										187
									
								
								routers/user/setting/security_twofa.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										187
									
								
								routers/user/setting/security_twofa.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,187 @@
 | 
			
		||||
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
			
		||||
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
			
		||||
// Use of this source code is governed by a MIT-style
 | 
			
		||||
// license that can be found in the LICENSE file.
 | 
			
		||||
 | 
			
		||||
package setting
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"encoding/base64"
 | 
			
		||||
	"html/template"
 | 
			
		||||
	"image/png"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"code.gitea.io/gitea/models"
 | 
			
		||||
	"code.gitea.io/gitea/modules/auth"
 | 
			
		||||
	"code.gitea.io/gitea/modules/context"
 | 
			
		||||
	"code.gitea.io/gitea/modules/setting"
 | 
			
		||||
 | 
			
		||||
	"github.com/pquerna/otp"
 | 
			
		||||
	"github.com/pquerna/otp/totp"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// RegenerateScratchTwoFactor regenerates the user's 2FA scratch code.
 | 
			
		||||
func RegenerateScratchTwoFactor(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = t.GenerateScratchToken(); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.UpdateTwoFactor(t); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_scratch_token_regenerated", t.ScratchToken))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// DisableTwoFactor deletes the user's 2FA settings.
 | 
			
		||||
func DisableTwoFactor(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.DeleteTwoFactorByID(t.ID, ctx.User.ID); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_disabled"))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func twofaGenerateSecretAndQr(ctx *context.Context) bool {
 | 
			
		||||
	var otpKey *otp.Key
 | 
			
		||||
	var err error
 | 
			
		||||
	uri := ctx.Session.Get("twofaUri")
 | 
			
		||||
	if uri != nil {
 | 
			
		||||
		otpKey, err = otp.NewKeyFromURL(uri.(string))
 | 
			
		||||
	}
 | 
			
		||||
	if otpKey == nil {
 | 
			
		||||
		err = nil // clear the error, in case the URL was invalid
 | 
			
		||||
		otpKey, err = totp.Generate(totp.GenerateOpts{
 | 
			
		||||
			Issuer:      setting.AppName + " (" + strings.TrimRight(setting.AppURL, "/") + ")",
 | 
			
		||||
			AccountName: ctx.User.Name,
 | 
			
		||||
		})
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["TwofaSecret"] = otpKey.Secret()
 | 
			
		||||
	img, err := otpKey.Image(320, 240)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var imgBytes bytes.Buffer
 | 
			
		||||
	if err = png.Encode(&imgBytes, img); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Data["QrUri"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(imgBytes.Bytes()))
 | 
			
		||||
	ctx.Session.Set("twofaSecret", otpKey.Secret())
 | 
			
		||||
	ctx.Session.Set("twofaUri", otpKey.String())
 | 
			
		||||
	return true
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// EnrollTwoFactor shows the page where the user can enroll into 2FA.
 | 
			
		||||
func EnrollTwoFactor(ctx *context.Context) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if t != nil {
 | 
			
		||||
		// already enrolled
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// EnrollTwoFactorPost handles enrolling the user into 2FA.
 | 
			
		||||
func EnrollTwoFactorPost(ctx *context.Context, form auth.TwoFactorAuthForm) {
 | 
			
		||||
	ctx.Data["Title"] = ctx.Tr("settings")
 | 
			
		||||
	ctx.Data["PageIsSettingsSecurity"] = true
 | 
			
		||||
 | 
			
		||||
	t, err := models.GetTwoFactorByUID(ctx.User.ID)
 | 
			
		||||
	if t != nil {
 | 
			
		||||
		// already enrolled
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if ctx.HasError() {
 | 
			
		||||
		if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secret := ctx.Session.Get("twofaSecret").(string)
 | 
			
		||||
	if !totp.Validate(form.Passcode, secret) {
 | 
			
		||||
		if !twofaGenerateSecretAndQr(ctx) {
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
		ctx.Flash.Error(ctx.Tr("settings.passcode_invalid"))
 | 
			
		||||
		ctx.HTML(200, tplSettingsTwofaEnroll)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t = &models.TwoFactor{
 | 
			
		||||
		UID: ctx.User.ID,
 | 
			
		||||
	}
 | 
			
		||||
	err = t.SetSecret(secret)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	err = t.GenerateScratchToken()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = models.NewTwoFactor(t); err != nil {
 | 
			
		||||
		ctx.ServerError("SettingsTwoFactor", err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx.Session.Delete("twofaSecret")
 | 
			
		||||
	ctx.Session.Delete("twofaUri")
 | 
			
		||||
	ctx.Flash.Success(ctx.Tr("settings.twofa_enrolled", t.ScratchToken))
 | 
			
		||||
	ctx.Redirect(setting.AppSubURL + "/user/settings/security")
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user