setting.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "strconv"
  7. "github.com/gogits/gogs/models"
  8. "github.com/gogits/gogs/modules/auth"
  9. "github.com/gogits/gogs/modules/base"
  10. "github.com/gogits/gogs/modules/log"
  11. "github.com/gogits/gogs/modules/middleware"
  12. )
  13. // Render user setting page (email, website modify)
  14. func Setting(ctx *middleware.Context, form auth.UpdateProfileForm) {
  15. ctx.Data["Title"] = "Setting"
  16. ctx.Data["PageIsUserSetting"] = true // For navbar arrow.
  17. ctx.Data["IsUserPageSetting"] = true // For setting nav highlight.
  18. user := ctx.User
  19. ctx.Data["Owner"] = user
  20. if ctx.Req.Method == "GET" {
  21. ctx.Render.HTML(200, "user/setting", ctx.Data)
  22. return
  23. }
  24. // below is for POST requests
  25. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  26. ctx.Render.HTML(200, "user/setting", ctx.Data)
  27. return
  28. }
  29. user.Email = form.Email
  30. user.Website = form.Website
  31. user.Location = form.Location
  32. user.Avatar = base.EncodeMd5(form.Avatar)
  33. user.AvatarEmail = form.Avatar
  34. if err := models.UpdateUser(user); err != nil {
  35. ctx.Handle(200, "setting.Setting", err)
  36. return
  37. }
  38. ctx.Data["IsSuccess"] = true
  39. ctx.Render.HTML(200, "user/setting", ctx.Data)
  40. }
  41. func SettingPassword(ctx *middleware.Context, form auth.UpdatePasswdForm) {
  42. ctx.Data["Title"] = "Password"
  43. ctx.Data["PageIsUserSetting"] = true
  44. ctx.Data["IsUserPageSettingPasswd"] = true
  45. if ctx.Req.Method == "GET" {
  46. ctx.Render.HTML(200, "user/password", ctx.Data)
  47. return
  48. }
  49. user := ctx.User
  50. newUser := &models.User{Passwd: form.NewPasswd}
  51. if err := newUser.EncodePasswd(); err != nil {
  52. ctx.Handle(200, "setting.SettingPassword", err)
  53. return
  54. }
  55. if user.Passwd != newUser.Passwd {
  56. ctx.Data["HasError"] = true
  57. ctx.Data["ErrorMsg"] = "Old password is not correct"
  58. } else if form.NewPasswd != form.RetypePasswd {
  59. ctx.Data["HasError"] = true
  60. ctx.Data["ErrorMsg"] = "New password and re-type password are not same"
  61. } else {
  62. user.Passwd = newUser.Passwd
  63. if err := models.UpdateUser(user); err != nil {
  64. ctx.Handle(200, "setting.SettingPassword", err)
  65. return
  66. }
  67. ctx.Data["IsSuccess"] = true
  68. }
  69. ctx.Data["Owner"] = user
  70. ctx.Render.HTML(200, "user/password", ctx.Data)
  71. }
  72. func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) {
  73. ctx.Data["Title"] = "SSH Keys"
  74. // Delete SSH key.
  75. if ctx.Req.Method == "DELETE" || ctx.Query("_method") == "DELETE" {
  76. id, err := strconv.ParseInt(ctx.Query("id"), 10, 64)
  77. if err != nil {
  78. ctx.Data["ErrorMsg"] = err
  79. log.Error("ssh.DelPublicKey: %v", err)
  80. ctx.Render.JSON(200, map[string]interface{}{
  81. "ok": false,
  82. "err": err.Error(),
  83. })
  84. return
  85. }
  86. k := &models.PublicKey{
  87. Id: id,
  88. OwnerId: ctx.User.Id,
  89. }
  90. if err = models.DeletePublicKey(k); err != nil {
  91. ctx.Data["ErrorMsg"] = err
  92. log.Error("ssh.DelPublicKey: %v", err)
  93. ctx.Render.JSON(200, map[string]interface{}{
  94. "ok": false,
  95. "err": err.Error(),
  96. })
  97. } else {
  98. ctx.Render.JSON(200, map[string]interface{}{
  99. "ok": true,
  100. })
  101. }
  102. return
  103. }
  104. // Add new SSH key.
  105. if ctx.Req.Method == "POST" {
  106. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  107. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  108. return
  109. }
  110. k := &models.PublicKey{OwnerId: ctx.User.Id,
  111. Name: form.KeyName,
  112. Content: form.KeyContent,
  113. }
  114. if err := models.AddPublicKey(k); err != nil {
  115. if err.Error() == models.ErrKeyAlreadyExist.Error() {
  116. ctx.RenderWithErr("Public key name has been used", "user/publickey", &form)
  117. return
  118. }
  119. ctx.Handle(200, "ssh.AddPublicKey", err)
  120. return
  121. } else {
  122. ctx.Data["AddSSHKeySuccess"] = true
  123. }
  124. }
  125. // List existed SSH keys.
  126. keys, err := models.ListPublicKey(ctx.User.Id)
  127. if err != nil {
  128. ctx.Handle(200, "ssh.ListPublicKey", err)
  129. return
  130. }
  131. ctx.Data["PageIsUserSetting"] = true
  132. ctx.Data["IsUserPageSettingSSH"] = true
  133. ctx.Data["Keys"] = keys
  134. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  135. }
  136. func SettingNotification(ctx *middleware.Context) {
  137. // TODO: user setting notification
  138. ctx.Data["Title"] = "Notification"
  139. ctx.Data["PageIsUserSetting"] = true
  140. ctx.Data["IsUserPageSettingNotify"] = true
  141. ctx.Render.HTML(200, "user/notification", ctx.Data)
  142. }
  143. func SettingSecurity(ctx *middleware.Context) {
  144. // TODO: user setting security
  145. ctx.Data["Title"] = "Security"
  146. ctx.Data["PageIsUserSetting"] = true
  147. ctx.Data["IsUserPageSettingSecurity"] = true
  148. ctx.Render.HTML(200, "user/security", ctx.Data)
  149. }