summaryrefslogtreecommitdiffstats
path: root/cmd/admin_user_generate_access_token.go
diff options
context:
space:
mode:
authorzeripath <art27@cantab.net>2023-02-14 22:12:19 +0000
committerGitHub <noreply@github.com>2023-02-14 16:12:19 -0600
commitaa1d95300ab1b34a3b4c9f5902ea821f2aa99f6e (patch)
treeac14d69e9e908ceba7826058115550315ee10c87 /cmd/admin_user_generate_access_token.go
parent618c9118c1652fdeea2a2ae0d1459bb1fd3d5169 (diff)
downloadgitea-aa1d95300ab1b34a3b4c9f5902ea821f2aa99f6e.tar.gz
gitea-aa1d95300ab1b34a3b4c9f5902ea821f2aa99f6e.zip
Add command to bulk set must-change-password (#22823)
As part of administration sometimes it is appropriate to forcibly tell users to update their passwords. This PR creates a new command `gitea admin user must-change-password` which will set the `MustChangePassword` flag on the provided users. Signed-off-by: Andrew Thornton <art27@cantab.net>
Diffstat (limited to 'cmd/admin_user_generate_access_token.go')
-rw-r--r--cmd/admin_user_generate_access_token.go80
1 files changed, 80 insertions, 0 deletions
diff --git a/cmd/admin_user_generate_access_token.go b/cmd/admin_user_generate_access_token.go
new file mode 100644
index 0000000000..822bc5c2bc
--- /dev/null
+++ b/cmd/admin_user_generate_access_token.go
@@ -0,0 +1,80 @@
+// Copyright 2023 The Gitea Authors. All rights reserved.
+// SPDX-License-Identifier: MIT
+
+package cmd
+
+import (
+ "fmt"
+
+ auth_model "code.gitea.io/gitea/models/auth"
+ user_model "code.gitea.io/gitea/models/user"
+
+ "github.com/urfave/cli"
+)
+
+var microcmdUserGenerateAccessToken = cli.Command{
+ Name: "generate-access-token",
+ Usage: "Generate an access token for a specific user",
+ Flags: []cli.Flag{
+ cli.StringFlag{
+ Name: "username,u",
+ Usage: "Username",
+ },
+ cli.StringFlag{
+ Name: "token-name,t",
+ Usage: "Token name",
+ Value: "gitea-admin",
+ },
+ cli.BoolFlag{
+ Name: "raw",
+ Usage: "Display only the token value",
+ },
+ cli.StringFlag{
+ Name: "scopes",
+ Value: "",
+ Usage: "Comma separated list of scopes to apply to access token",
+ },
+ },
+ Action: runGenerateAccessToken,
+}
+
+func runGenerateAccessToken(c *cli.Context) error {
+ if !c.IsSet("username") {
+ return fmt.Errorf("You must provide a username to generate a token for")
+ }
+
+ ctx, cancel := installSignals()
+ defer cancel()
+
+ if err := initDB(ctx); err != nil {
+ return err
+ }
+
+ user, err := user_model.GetUserByName(ctx, c.String("username"))
+ if err != nil {
+ return err
+ }
+
+ accessTokenScope, err := auth_model.AccessTokenScope(c.String("scopes")).Normalize()
+ if err != nil {
+ return err
+ }
+
+ t := &auth_model.AccessToken{
+ Name: c.String("token-name"),
+ UID: user.ID,
+ Scope: accessTokenScope,
+ }
+
+ if err := auth_model.NewAccessToken(t); err != nil {
+ return err
+ }
+
+ if c.Bool("raw") {
+ fmt.Printf("%s\n", t.Token)
+ } else {
+ fmt.Printf("Access token was successfully created: %s\n", t.Token)
+ }
+
+ return nil
+}