// Copyright 2014 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package user import ( "bytes" "encoding/base64" "fmt" "html/template" "image/png" "io/ioutil" "strings" "github.com/pquerna/otp" "github.com/pquerna/otp/totp" "github.com/unknwon/com" log "gopkg.in/clog.v1" "gogs.io/gogs/internal/context" "gogs.io/gogs/internal/db" "gogs.io/gogs/internal/db/errors" "gogs.io/gogs/internal/form" "gogs.io/gogs/internal/mailer" "gogs.io/gogs/internal/setting" "gogs.io/gogs/internal/tool" ) const ( SETTINGS_PROFILE = "user/settings/profile" SETTINGS_AVATAR = "user/settings/avatar" SETTINGS_PASSWORD = "user/settings/password" SETTINGS_EMAILS = "user/settings/email" SETTINGS_SSH_KEYS = "user/settings/sshkeys" SETTINGS_SECURITY = "user/settings/security" SETTINGS_TWO_FACTOR_ENABLE = "user/settings/two_factor_enable" SETTINGS_TWO_FACTOR_RECOVERY_CODES = "user/settings/two_factor_recovery_codes" SETTINGS_REPOSITORIES = "user/settings/repositories" SETTINGS_ORGANIZATIONS = "user/settings/organizations" SETTINGS_APPLICATIONS = "user/settings/applications" SETTINGS_DELETE = "user/settings/delete" NOTIFICATION = "user/notification" ) func Settings(c *context.Context) { c.Title("settings.profile") c.PageIs("SettingsProfile") c.Data["origin_name"] = c.User.Name c.Data["name"] = c.User.Name c.Data["full_name"] = c.User.FullName c.Data["email"] = c.User.Email c.Data["website"] = c.User.Website c.Data["location"] = c.User.Location c.Success(SETTINGS_PROFILE) } func SettingsPost(c *context.Context, f form.UpdateProfile) { c.Title("settings.profile") c.PageIs("SettingsProfile") c.Data["origin_name"] = c.User.Name if c.HasError() { c.Success(SETTINGS_PROFILE) return } // Non-local users are not allowed to change their username if c.User.IsLocal() { // Check if username characters have been changed if c.User.LowerName != strings.ToLower(f.Name) { if err := db.ChangeUserName(c.User, f.Name); err != nil { c.FormErr("Name") var msg string switch { case db.IsErrUserAlreadyExist(err): msg = c.Tr("form.username_been_taken") case db.IsErrEmailAlreadyUsed(err): msg = c.Tr("form.email_been_used") case db.IsErrNameReserved(err): msg = c.Tr("form.name_reserved") case db.IsErrNamePatternNotAllowed(err): msg = c.Tr("form.name_pattern_not_allowed") default: c.ServerError("ChangeUserName", err) return } c.RenderWithErr(msg, SETTINGS_PROFILE, &f) return } log.Trace("Username changed: %s -> %s", c.User.Name, f.Name) } // In case it's just a case change c.User.Name = f.Name c.User.LowerName = strings.ToLower(f.Name) } c.User.FullName = f.FullName c.User.Email = f.Email c.User.Website = f.Website c.User.Location = f.Location if err := db.UpdateUser(c.User); err != nil { c.ServerError("UpdateUser", err) return } c.Flash.Success(c.Tr("settings.update_profile_success")) c.SubURLRedirect("/user/settings") } // FIXME: limit upload size func UpdateAvatarSetting(c *context.Context, f form.Avatar, ctxUser *db.User) error { ctxUser.UseCustomAvatar = f.Source == form.AVATAR_LOCAL if len(f.Gravatar) > 0 { ctxUser.Avatar = tool.MD5(f.Gravatar) ctxUser.AvatarEmail = f.Gravatar } if f.Avatar != nil && f.Avatar.Filename != "" { r, err := f.Avatar.Open() if err != nil { return fmt.Errorf("open avatar reader: %v", err) } defer r.Close() data, err := ioutil.ReadAll(r) if err != nil { return fmt.Errorf("read avatar content: %v", err) } if !tool.IsImageFile(data) { return errors.New(c.Tr("settings.uploaded_avatar_not_a_image")) } if err = ctxUser.UploadAvatar(data); err != nil { return fmt.Errorf("upload avatar: %v", err) } } else { // No avatar is uploaded but setting has been changed to enable, // generate a random one when needed. if ctxUser.UseCustomAvatar && !com.IsFile(ctxUser.CustomAvatarPath()) { if err := ctxUser.GenerateRandomAvatar(); err != nil { log.Error(2, "generate random avatar [%d]: %v", ctxUser.ID, err) } } } if err := db.UpdateUser(ctxUser); err != nil { return fmt.Errorf("update user: %v", err) } return nil } func SettingsAvatar(c *context.Context) { c.Title("settings.avatar") c.PageIs("SettingsAvatar") c.Success(SETTINGS_AVATAR) } func SettingsAvatarPost(c *context.Context, f form.Avatar) { if err := UpdateAvatarSetting(c, f, c.User); err != nil { c.Flash.Error(err.Error()) } else { c.Flash.Success(c.Tr("settings.update_avatar_success")) } c.SubURLRedirect("/user/settings/avatar") } func SettingsDeleteAvatar(c *context.Context) { if err := c.User.DeleteAvatar(); err != nil { c.Flash.Error(fmt.Sprintf("Failed to delete avatar: %v", err)) } c.SubURLRedirect("/user/settings/avatar") } func SettingsPassword(c *context.Context) { c.Title("settings.password") c.PageIs("SettingsPassword") c.Success(SETTINGS_PASSWORD) } func SettingsPasswordPost(c *context.Context, f form.ChangePassword) { c.Title("settings.password") c.PageIs("SettingsPassword") if c.HasError() { c.Success(SETTINGS_PASSWORD) return } if !c.User.ValidatePassword(f.OldPassword) { c.Flash.Error(c.Tr("settings.password_incorrect")) } else if f.Password != f.Retype { c.Flash.Error(c.Tr("form.password_not_match")) } else { c.User.Passwd = f.Password var err error if c.User.Salt, err = db.GetUserSalt(); err != nil { c.ServerError("GetUserSalt", err) return } c.User.EncodePasswd() if err := db.UpdateUser(c.User); err != nil { c.ServerError("UpdateUser", err) return } c.Flash.Success(c.Tr("settings.change_password_success")) } c.SubURLRedirect("/user/settings/password") } func SettingsEmails(c *context.Context) { c.Title("settings.emails") c.PageIs("SettingsEmails") emails, err := db.GetEmailAddresses(c.User.ID) if err != nil { c.ServerError("GetEmailAddresses", err) return } c.Data["Emails"] = emails c.Success(SETTINGS_EMAILS) } func SettingsEmailPost(c *context.Context, f form.AddEmail) { c.Title("settings.emails") c.PageIs("SettingsEmails") // Make emailaddress primary. if c.Query("_method") == "PRIMARY" { if err := db.MakeEmailPrimary(&db.EmailAddress{ID: c.QueryInt64("id")}); err != nil { c.ServerError("MakeEmailPrimary", err) return } c.SubURLRedirect("/user/settings/email") return } // Add Email address. emails, err := db.GetEmailAddresses(c.User.ID) if err != nil { c.ServerError("GetEmailAddresses", err) return } c.Data["Emails"] = emails if c.HasError() { c.Success(SETTINGS_EMAILS) return } email := &db.EmailAddress{ UID: c.User.ID, Email: f.Email, IsActivated: !setting.Service.RegisterEmailConfirm, } if err := db.AddEmailAddress(email); err != nil { if db.IsErrEmailAlreadyUsed(err) { c.RenderWithErr(c.Tr("form.email_been_used"), SETTINGS_EMAILS, &f) } else { c.ServerError("AddEmailAddress", err) } return } // Send confirmation email if setting.Service.RegisterEmailConfirm { mailer.SendActivateEmailMail(c.Context, db.NewMailerUser(c.User), email.Email) if err := c.Cache.Put("MailResendLimit_"+c.User.LowerName, c.User.LowerName, 180); err != nil { log.Error(2, "Set cache 'MailResendLimit' failed: %v", err) } c.Flash.Info(c.Tr("settings.add_email_confirmation_sent", email.Email, setting.Service.ActiveCodeLives/60)) } else { c.Flash.Success(c.Tr("settings.add_email_success")) } c.SubURLRedirect("/user/settings/email") } func DeleteEmail(c *context.Context) { if err := db.DeleteEmailAddress(&db.EmailAddress{ ID: c.QueryInt64("id"), UID: c.User.ID, }); err != nil { c.ServerError("DeleteEmailAddress", err) return } c.Flash.Success(c.Tr("settings.email_deletion_success")) c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/email", }) } func SettingsSSHKeys(c *context.Context) { c.Title("settings.ssh_keys") c.PageIs("SettingsSSHKeys") keys, err := db.ListPublicKeys(c.User.ID) if err != nil { c.ServerError("ListPublicKeys", err) return } c.Data["Keys"] = keys c.Success(SETTINGS_SSH_KEYS) } func SettingsSSHKeysPost(c *context.Context, f form.AddSSHKey) { c.Title("settings.ssh_keys") c.PageIs("SettingsSSHKeys") keys, err := db.ListPublicKeys(c.User.ID) if err != nil { c.ServerError("ListPublicKeys", err) return } c.Data["Keys"] = keys if c.HasError() { c.Success(SETTINGS_SSH_KEYS) return } content, err := db.CheckPublicKeyString(f.Content) if err != nil { if db.IsErrKeyUnableVerify(err) { c.Flash.Info(c.Tr("form.unable_verify_ssh_key")) } else { c.Flash.Error(c.Tr("form.invalid_ssh_key", err.Error())) c.SubURLRedirect("/user/settings/ssh") return } } if _, err = db.AddPublicKey(c.User.ID, f.Title, content); err != nil { c.Data["HasError"] = true switch { case db.IsErrKeyAlreadyExist(err): c.FormErr("Content") c.RenderWithErr(c.Tr("settings.ssh_key_been_used"), SETTINGS_SSH_KEYS, &f) case db.IsErrKeyNameAlreadyUsed(err): c.FormErr("Title") c.RenderWithErr(c.Tr("settings.ssh_key_name_used"), SETTINGS_SSH_KEYS, &f) default: c.ServerError("AddPublicKey", err) } return } c.Flash.Success(c.Tr("settings.add_key_success", f.Title)) c.SubURLRedirect("/user/settings/ssh") } func DeleteSSHKey(c *context.Context) { if err := db.DeletePublicKey(c.User, c.QueryInt64("id")); err != nil { c.Flash.Error("DeletePublicKey: " + err.Error()) } else { c.Flash.Success(c.Tr("settings.ssh_key_deletion_success")) } c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/ssh", }) } func SettingsSecurity(c *context.Context) { c.Title("settings.security") c.PageIs("SettingsSecurity") t, err := db.GetTwoFactorByUserID(c.UserID()) if err != nil && !errors.IsTwoFactorNotFound(err) { c.ServerError("GetTwoFactorByUserID", err) return } c.Data["TwoFactor"] = t c.Success(SETTINGS_SECURITY) } func SettingsTwoFactorEnable(c *context.Context) { if c.User.IsEnabledTwoFactor() { c.NotFound() return } c.Title("settings.two_factor_enable_title") c.PageIs("SettingsSecurity") var key *otp.Key var err error keyURL := c.Session.Get("twoFactorURL") if keyURL != nil { key, _ = otp.NewKeyFromURL(keyURL.(string)) } if key == nil { key, err = totp.Generate(totp.GenerateOpts{ Issuer: setting.AppName, AccountName: c.User.Email, }) if err != nil { c.ServerError("Generate", err) return } } c.Data["TwoFactorSecret"] = key.Secret() img, err := key.Image(240, 240) if err != nil { c.ServerError("Image", err) return } var buf bytes.Buffer if err = png.Encode(&buf, img); err != nil { c.ServerError("Encode", err) return } c.Data["QRCode"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(buf.Bytes())) c.Session.Set("twoFactorSecret", c.Data["TwoFactorSecret"]) c.Session.Set("twoFactorURL", key.String()) c.Success(SETTINGS_TWO_FACTOR_ENABLE) } func SettingsTwoFactorEnablePost(c *context.Context) { secret, ok := c.Session.Get("twoFactorSecret").(string) if !ok { c.NotFound() return } if !totp.Validate(c.Query("passcode"), secret) { c.Flash.Error(c.Tr("settings.two_factor_invalid_passcode")) c.SubURLRedirect("/user/settings/security/two_factor_enable") return } if err := db.NewTwoFactor(c.UserID(), secret); err != nil { c.Flash.Error(c.Tr("settings.two_factor_enable_error", err)) c.SubURLRedirect("/user/settings/security/two_factor_enable") return } c.Session.Delete("twoFactorSecret") c.Session.Delete("twoFactorURL") c.Flash.Success(c.Tr("settings.two_factor_enable_success")) c.SubURLRedirect("/user/settings/security/two_factor_recovery_codes") } func SettingsTwoFactorRecoveryCodes(c *context.Context) { if !c.User.IsEnabledTwoFactor() { c.NotFound() return } c.Title("settings.two_factor_recovery_codes_title") c.PageIs("SettingsSecurity") recoveryCodes, err := db.GetRecoveryCodesByUserID(c.UserID()) if err != nil { c.ServerError("GetRecoveryCodesByUserID", err) return } c.Data["RecoveryCodes"] = recoveryCodes c.Success(SETTINGS_TWO_FACTOR_RECOVERY_CODES) } func SettingsTwoFactorRecoveryCodesPost(c *context.Context) { if !c.User.IsEnabledTwoFactor() { c.NotFound() return } if err := db.RegenerateRecoveryCodes(c.UserID()); err != nil { c.Flash.Error(c.Tr("settings.two_factor_regenerate_recovery_codes_error", err)) } else { c.Flash.Success(c.Tr("settings.two_factor_regenerate_recovery_codes_success")) } c.SubURLRedirect("/user/settings/security/two_factor_recovery_codes") } func SettingsTwoFactorDisable(c *context.Context) { if !c.User.IsEnabledTwoFactor() { c.NotFound() return } if err := db.DeleteTwoFactor(c.UserID()); err != nil { c.ServerError("DeleteTwoFactor", err) return } c.Flash.Success(c.Tr("settings.two_factor_disable_success")) c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/security", }) } func SettingsRepos(c *context.Context) { c.Title("settings.repos") c.PageIs("SettingsRepositories") repos, err := db.GetUserAndCollaborativeRepositories(c.User.ID) if err != nil { c.ServerError("GetUserAndCollaborativeRepositories", err) return } if err = db.RepositoryList(repos).LoadAttributes(); err != nil { c.ServerError("LoadAttributes", err) return } c.Data["Repos"] = repos c.Success(SETTINGS_REPOSITORIES) } func SettingsLeaveRepo(c *context.Context) { repo, err := db.GetRepositoryByID(c.QueryInt64("id")) if err != nil { c.NotFoundOrServerError("GetRepositoryByID", errors.IsRepoNotExist, err) return } if err = repo.DeleteCollaboration(c.User.ID); err != nil { c.ServerError("DeleteCollaboration", err) return } c.Flash.Success(c.Tr("settings.repos.leave_success", repo.FullName())) c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/repositories", }) } func SettingsOrganizations(c *context.Context) { c.Title("settings.orgs") c.PageIs("SettingsOrganizations") orgs, err := db.GetOrgsByUserID(c.User.ID, true) if err != nil { c.ServerError("GetOrgsByUserID", err) return } c.Data["Orgs"] = orgs c.Success(SETTINGS_ORGANIZATIONS) } func SettingsLeaveOrganization(c *context.Context) { if err := db.RemoveOrgUser(c.QueryInt64("id"), c.User.ID); err != nil { if db.IsErrLastOrgOwner(err) { c.Flash.Error(c.Tr("form.last_org_owner")) } else { c.ServerError("RemoveOrgUser", err) return } } c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/organizations", }) } func SettingsApplications(c *context.Context) { c.Title("settings.applications") c.PageIs("SettingsApplications") tokens, err := db.ListAccessTokens(c.User.ID) if err != nil { c.ServerError("ListAccessTokens", err) return } c.Data["Tokens"] = tokens c.Success(SETTINGS_APPLICATIONS) } func SettingsApplicationsPost(c *context.Context, f form.NewAccessToken) { c.Title("settings.applications") c.PageIs("SettingsApplications") if c.HasError() { tokens, err := db.ListAccessTokens(c.User.ID) if err != nil { c.ServerError("ListAccessTokens", err) return } c.Data["Tokens"] = tokens c.Success(SETTINGS_APPLICATIONS) return } t := &db.AccessToken{ UID: c.User.ID, Name: f.Name, } if err := db.NewAccessToken(t); err != nil { if errors.IsAccessTokenNameAlreadyExist(err) { c.Flash.Error(c.Tr("settings.token_name_exists")) c.SubURLRedirect("/user/settings/applications") } else { c.ServerError("NewAccessToken", err) } return } c.Flash.Success(c.Tr("settings.generate_token_succees")) c.Flash.Info(t.Sha1) c.SubURLRedirect("/user/settings/applications") } func SettingsDeleteApplication(c *context.Context) { if err := db.DeleteAccessTokenOfUserByID(c.User.ID, c.QueryInt64("id")); err != nil { c.Flash.Error("DeleteAccessTokenByID: " + err.Error()) } else { c.Flash.Success(c.Tr("settings.delete_token_success")) } c.JSONSuccess(map[string]interface{}{ "redirect": setting.AppSubURL + "/user/settings/applications", }) } func SettingsDelete(c *context.Context) { c.Title("settings.delete") c.PageIs("SettingsDelete") if c.Req.Method == "POST" { if _, err := db.UserLogin(c.User.Name, c.Query("password"), c.User.LoginSource); err != nil { if errors.IsUserNotExist(err) { c.RenderWithErr(c.Tr("form.enterred_invalid_password"), SETTINGS_DELETE, nil) } else { c.ServerError("UserLogin", err) } return } if err := db.DeleteUser(c.User); err != nil { switch { case db.IsErrUserOwnRepos(err): c.Flash.Error(c.Tr("form.still_own_repo")) c.Redirect(setting.AppSubURL + "/user/settings/delete") case db.IsErrUserHasOrgs(err): c.Flash.Error(c.Tr("form.still_has_org")) c.Redirect(setting.AppSubURL + "/user/settings/delete") default: c.ServerError("DeleteUser", err) } } else { log.Trace("Account deleted: %s", c.User.Name) c.Redirect(setting.AppSubURL + "/") } return } c.Success(SETTINGS_DELETE) }