setting.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "net/http"
  7. "strconv"
  8. "github.com/martini-contrib/render"
  9. "github.com/martini-contrib/sessions"
  10. "github.com/gogits/gogs/models"
  11. "github.com/gogits/gogs/modules/auth"
  12. "github.com/gogits/gogs/modules/base"
  13. "github.com/gogits/gogs/modules/log"
  14. "github.com/gogits/gogs/modules/middleware"
  15. )
  16. func Setting(form auth.UpdateProfileForm, ctx *middleware.Context, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  17. data["Title"] = "Setting"
  18. data["PageIsUserSetting"] = true
  19. user := auth.SignedInUser(session)
  20. data["Owner"] = user
  21. if req.Method == "GET" {
  22. r.HTML(200, "user/setting", data)
  23. return
  24. }
  25. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  26. r.HTML(200, "user/setting", data)
  27. return
  28. }
  29. user.Email = form.Email
  30. user.Website = form.Website
  31. user.Location = form.Location
  32. user.Avatar = base.EncodeMd5(form.Avatar)
  33. user.AvatarEmail = form.Avatar
  34. if err := models.UpdateUser(user); err != nil {
  35. ctx.Handle(200, "setting.Setting", err)
  36. return
  37. }
  38. data["IsSuccess"] = true
  39. r.HTML(200, "user/setting", data)
  40. }
  41. func SettingPassword(form auth.UpdatePasswdForm, ctx *middleware.Context, r render.Render, data base.TmplData, session sessions.Session, req *http.Request) {
  42. data["Title"] = "Password"
  43. data["PageIsUserSetting"] = true
  44. if req.Method == "GET" {
  45. r.HTML(200, "user/password", data)
  46. return
  47. }
  48. user := auth.SignedInUser(session)
  49. newUser := &models.User{Passwd: form.NewPasswd}
  50. if err := newUser.EncodePasswd(); err != nil {
  51. ctx.Handle(200, "setting.SettingPassword", err)
  52. return
  53. }
  54. if user.Passwd != newUser.Passwd {
  55. data["HasError"] = true
  56. data["ErrorMsg"] = "Old password is not correct"
  57. } else if form.NewPasswd != form.RetypePasswd {
  58. data["HasError"] = true
  59. data["ErrorMsg"] = "New password and re-type password are not same"
  60. } else {
  61. user.Passwd = newUser.Passwd
  62. if err := models.UpdateUser(user); err != nil {
  63. ctx.Handle(200, "setting.SettingPassword", err)
  64. return
  65. }
  66. data["IsSuccess"] = true
  67. }
  68. data["Owner"] = user
  69. r.HTML(200, "user/password", data)
  70. }
  71. func SettingSSHKeys(form auth.AddSSHKeyForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
  72. data["Title"] = "SSH Keys"
  73. // Delete SSH key.
  74. if req.Method == "DELETE" || req.FormValue("_method") == "DELETE" {
  75. println(1)
  76. id, err := strconv.ParseInt(req.FormValue("id"), 10, 64)
  77. if err != nil {
  78. data["ErrorMsg"] = err
  79. log.Error("ssh.DelPublicKey: %v", err)
  80. r.JSON(200, map[string]interface{}{
  81. "ok": false,
  82. "err": err.Error(),
  83. })
  84. return
  85. }
  86. k := &models.PublicKey{
  87. Id: id,
  88. OwnerId: auth.SignedInId(session),
  89. }
  90. if err = models.DeletePublicKey(k); err != nil {
  91. data["ErrorMsg"] = err
  92. log.Error("ssh.DelPublicKey: %v", err)
  93. r.JSON(200, map[string]interface{}{
  94. "ok": false,
  95. "err": err.Error(),
  96. })
  97. } else {
  98. r.JSON(200, map[string]interface{}{
  99. "ok": true,
  100. })
  101. }
  102. return
  103. }
  104. // Add new SSH key.
  105. if req.Method == "POST" {
  106. if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
  107. r.HTML(200, "user/publickey", data)
  108. return
  109. }
  110. k := &models.PublicKey{OwnerId: auth.SignedInId(session),
  111. Name: form.KeyName,
  112. Content: form.KeyContent,
  113. }
  114. if err := models.AddPublicKey(k); err != nil {
  115. data["ErrorMsg"] = err
  116. log.Error("ssh.AddPublicKey: %v", err)
  117. r.HTML(200, "base/error", data)
  118. return
  119. } else {
  120. data["AddSSHKeySuccess"] = true
  121. }
  122. }
  123. // List existed SSH keys.
  124. keys, err := models.ListPublicKey(auth.SignedInId(session))
  125. if err != nil {
  126. data["ErrorMsg"] = err
  127. log.Error("ssh.ListPublicKey: %v", err)
  128. r.HTML(200, "base/error", data)
  129. return
  130. }
  131. data["PageIsUserSetting"] = true
  132. data["Keys"] = keys
  133. r.HTML(200, "user/publickey", data)
  134. }
  135. func SettingNotification(r render.Render, data base.TmplData) {
  136. // todo user setting notification
  137. data["Title"] = "Notification"
  138. data["PageIsUserSetting"] = true
  139. r.HTML(200, "user/notification", data)
  140. }
  141. func SettingSecurity(r render.Render, data base.TmplData) {
  142. // todo user setting security
  143. data["Title"] = "Security"
  144. data["PageIsUserSetting"] = true
  145. r.HTML(200, "user/security", data)
  146. }