diff options
Diffstat (limited to 'routers/user/user.go')
-rw-r--r-- | routers/user/user.go | 457 |
1 files changed, 0 insertions, 457 deletions
diff --git a/routers/user/user.go b/routers/user/user.go deleted file mode 100644 index 561fe1c111..0000000000 --- a/routers/user/user.go +++ /dev/null @@ -1,457 +0,0 @@ -// Copyright 2014 The Gogs Authors. All rights reserved. -// Use of this source code is governed by a MIT-style -// license that can be found in the LICENSE file. - -package user - -import ( - "net/url" - "strings" - - "github.com/gogits/gogs/models" - "github.com/gogits/gogs/modules/auth" - "github.com/gogits/gogs/modules/base" - "github.com/gogits/gogs/modules/log" - "github.com/gogits/gogs/modules/mailer" - "github.com/gogits/gogs/modules/middleware" - "github.com/gogits/gogs/modules/setting" -) - -const ( - SIGNIN base.TplName = "user/signin" - SIGNUP base.TplName = "user/signup" - DELETE base.TplName = "user/delete" - ACTIVATE base.TplName = "user/activate" - FORGOT_PASSWORD base.TplName = "user/forgot_passwd" - RESET_PASSWORD base.TplName = "user/reset_passwd" -) - -func SignIn(ctx *middleware.Context) { - ctx.Data["Title"] = "Log In" - - if _, ok := ctx.Session.Get("socialId").(int64); ok { - ctx.Data["IsSocialLogin"] = true - ctx.HTML(200, SIGNIN) - return - } - - if setting.OauthService != nil { - ctx.Data["OauthEnabled"] = true - ctx.Data["OauthService"] = setting.OauthService - } - - // Check auto-login. - uname := ctx.GetCookie(setting.CookieUserName) - if len(uname) == 0 { - ctx.HTML(200, SIGNIN) - return - } - - isSucceed := false - defer func() { - if !isSucceed { - log.Trace("user.SignIn(auto-login cookie cleared): %s", uname) - ctx.SetCookie(setting.CookieUserName, "", -1) - ctx.SetCookie(setting.CookieRememberName, "", -1) - return - } - }() - - user, err := models.GetUserByName(uname) - if err != nil { - ctx.Handle(500, "user.SignIn(GetUserByName)", err) - return - } - - secret := base.EncodeMd5(user.Rands + user.Passwd) - value, _ := ctx.GetSecureCookie(secret, setting.CookieRememberName) - if value != user.Name { - ctx.HTML(200, SIGNIN) - return - } - - isSucceed = true - - ctx.Session.Set("userId", user.Id) - ctx.Session.Set("userName", user.Name) - if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 { - ctx.SetCookie("redirect_to", "", -1) - ctx.Redirect(redirectTo) - return - } - - ctx.Redirect("/") -} - -func SignInPost(ctx *middleware.Context, form auth.LogInForm) { - ctx.Data["Title"] = "Log In" - - sid, isOauth := ctx.Session.Get("socialId").(int64) - if isOauth { - ctx.Data["IsSocialLogin"] = true - } else if setting.OauthService != nil { - ctx.Data["OauthEnabled"] = true - ctx.Data["OauthService"] = setting.OauthService - } - - if ctx.HasError() { - ctx.HTML(200, SIGNIN) - return - } - - user, err := models.UserSignIn(form.UserName, form.Password) - if err != nil { - if err == models.ErrUserNotExist { - log.Trace("%s Log in failed: %s", ctx.Req.RequestURI, form.UserName) - ctx.RenderWithErr("Username or password is not correct", SIGNIN, &form) - return - } - - ctx.Handle(500, "user.SignInPost(UserSignIn)", err) - return - } - - if form.Remember { - secret := base.EncodeMd5(user.Rands + user.Passwd) - days := 86400 * setting.LogInRememberDays - ctx.SetCookie(setting.CookieUserName, user.Name, days) - ctx.SetSecureCookie(secret, setting.CookieRememberName, user.Name, days) - } - - // Bind with social account. - if isOauth { - if err = models.BindUserOauth2(user.Id, sid); err != nil { - if err == models.ErrOauth2RecordNotExist { - ctx.Handle(404, "user.SignInPost(GetOauth2ById)", err) - } else { - ctx.Handle(500, "user.SignInPost(GetOauth2ById)", err) - } - return - } - ctx.Session.Delete("socialId") - log.Trace("%s OAuth binded: %s -> %d", ctx.Req.RequestURI, form.UserName, sid) - } - - ctx.Session.Set("userId", user.Id) - ctx.Session.Set("userName", user.Name) - if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 { - ctx.SetCookie("redirect_to", "", -1) - ctx.Redirect(redirectTo) - return - } - - ctx.Redirect("/") -} - -func SignOut(ctx *middleware.Context) { - ctx.Session.Delete("userId") - ctx.Session.Delete("userName") - ctx.Session.Delete("socialId") - ctx.Session.Delete("socialName") - ctx.Session.Delete("socialEmail") - ctx.SetCookie(setting.CookieUserName, "", -1) - ctx.SetCookie(setting.CookieRememberName, "", -1) - ctx.Redirect("/") -} - -func SignUp(ctx *middleware.Context) { - ctx.Data["Title"] = "Sign Up" - ctx.Data["PageIsSignUp"] = true - - if setting.Service.DisableRegistration { - ctx.Data["DisableRegistration"] = true - ctx.HTML(200, SIGNUP) - return - } - - if sid, ok := ctx.Session.Get("socialId").(int64); ok { - oauthSignUp(ctx, sid) - return - } - - ctx.HTML(200, SIGNUP) -} - -func oauthSignUp(ctx *middleware.Context, sid int64) { - ctx.Data["Title"] = "OAuth Sign Up" - ctx.Data["PageIsSignUp"] = true - - if _, err := models.GetOauth2ById(sid); err != nil { - if err == models.ErrOauth2RecordNotExist { - ctx.Handle(404, "user.oauthSignUp(GetOauth2ById)", err) - } else { - ctx.Handle(500, "user.oauthSignUp(GetOauth2ById)", err) - } - return - } - - ctx.Data["IsSocialLogin"] = true - ctx.Data["username"] = strings.Replace(ctx.Session.Get("socialName").(string), " ", "", -1) - ctx.Data["email"] = ctx.Session.Get("socialEmail") - log.Trace("user.oauthSignUp(social ID): %v", ctx.Session.Get("socialId")) - ctx.HTML(200, SIGNUP) -} - -func SignUpPost(ctx *middleware.Context, form auth.RegisterForm) { - ctx.Data["Title"] = "Sign Up" - ctx.Data["PageIsSignUp"] = true - - if setting.Service.DisableRegistration { - ctx.Handle(403, "user.SignUpPost", nil) - return - } - - sid, isOauth := ctx.Session.Get("socialId").(int64) - if isOauth { - ctx.Data["IsSocialLogin"] = true - } - - if ctx.HasError() { - ctx.HTML(200, SIGNUP) - return - } - - if form.Password != form.RetypePasswd { - ctx.Data["Err_Password"] = true - ctx.Data["Err_RetypePasswd"] = true - ctx.RenderWithErr("Password and re-type password are not same.", SIGNUP, &form) - return - } - - u := &models.User{ - Name: form.UserName, - Email: form.Email, - Passwd: form.Password, - IsActive: !setting.Service.RegisterEmailConfirm || isOauth, - } - - var err error - if u, err = models.CreateUser(u); err != nil { - switch err { - case models.ErrUserAlreadyExist: - ctx.Data["Err_UserName"] = true - ctx.RenderWithErr("Username has been already taken", SIGNUP, &form) - case models.ErrEmailAlreadyUsed: - ctx.Data["Err_Email"] = true - ctx.RenderWithErr("E-mail address has been already used", SIGNUP, &form) - case models.ErrUserNameIllegal: - ctx.Data["Err_UserName"] = true - ctx.RenderWithErr(models.ErrRepoNameIllegal.Error(), SIGNUP, &form) - default: - ctx.Handle(500, "user.SignUpPost(CreateUser)", err) - } - return - } - log.Trace("%s User created: %s", ctx.Req.RequestURI, u.Name) - - // Bind social account. - if isOauth { - if err = models.BindUserOauth2(u.Id, sid); err != nil { - ctx.Handle(500, "user.SignUp(BindUserOauth2)", err) - return - } - ctx.Session.Delete("socialId") - log.Trace("%s OAuth binded: %s -> %d", ctx.Req.RequestURI, form.UserName, sid) - } - - // Send confirmation e-mail, no need for social account. - if !isOauth && setting.Service.RegisterEmailConfirm && u.Id > 1 { - mailer.SendRegisterMail(ctx.Render, u) - ctx.Data["IsSendRegisterMail"] = true - ctx.Data["Email"] = u.Email - ctx.Data["Hours"] = setting.Service.ActiveCodeLives / 60 - ctx.HTML(200, "user/activate") - - if err = ctx.Cache.Put("MailResendLimit_"+u.LowerName, u.LowerName, 180); err != nil { - log.Error("Set cache(MailResendLimit) fail: %v", err) - } - return - } - - ctx.Redirect("/user/login") -} - -func Delete(ctx *middleware.Context) { - ctx.Data["Title"] = "Delete Account" - ctx.Data["PageIsUserSetting"] = true - ctx.Data["IsUserPageSettingDelete"] = true - ctx.HTML(200, DELETE) -} - -func DeletePost(ctx *middleware.Context) { - ctx.Data["Title"] = "Delete Account" - ctx.Data["PageIsUserSetting"] = true - ctx.Data["IsUserPageSettingDelete"] = true - - tmpUser := models.User{ - Passwd: ctx.Query("password"), - Salt: ctx.User.Salt, - } - tmpUser.EncodePasswd() - if tmpUser.Passwd != ctx.User.Passwd { - ctx.Flash.Error("Password is not correct. Make sure you are owner of this account.") - } else { - if err := models.DeleteUser(ctx.User); err != nil { - switch err { - case models.ErrUserOwnRepos: - ctx.Flash.Error("Your account still have ownership of repository, you have to delete or transfer them first.") - default: - ctx.Handle(500, "user.DeletePost(DeleteUser)", err) - return - } - } else { - ctx.Redirect("/") - return - } - } - - ctx.Redirect("/user/delete") -} - -func Activate(ctx *middleware.Context) { - code := ctx.Query("code") - if len(code) == 0 { - ctx.Data["IsActivatePage"] = true - if ctx.User.IsActive { - ctx.Handle(404, "user.Activate", nil) - return - } - // Resend confirmation e-mail. - if setting.Service.RegisterEmailConfirm { - if ctx.Cache.IsExist("MailResendLimit_" + ctx.User.LowerName) { - ctx.Data["ResendLimited"] = true - } else { - ctx.Data["Hours"] = setting.Service.ActiveCodeLives / 60 - mailer.SendActiveMail(ctx.Render, ctx.User) - - if err := ctx.Cache.Put("MailResendLimit_"+ctx.User.LowerName, ctx.User.LowerName, 180); err != nil { - log.Error("Set cache(MailResendLimit) fail: %v", err) - } - } - } else { - ctx.Data["ServiceNotEnabled"] = true - } - ctx.HTML(200, ACTIVATE) - return - } - - // Verify code. - if user := models.VerifyUserActiveCode(code); user != nil { - user.IsActive = true - user.Rands = models.GetUserSalt() - if err := models.UpdateUser(user); err != nil { - ctx.Handle(404, "user.Activate", err) - return - } - - log.Trace("%s User activated: %s", ctx.Req.RequestURI, user.Name) - - ctx.Session.Set("userId", user.Id) - ctx.Session.Set("userName", user.Name) - ctx.Redirect("/") - return - } - - ctx.Data["IsActivateFailed"] = true - ctx.HTML(200, ACTIVATE) -} - -func ForgotPasswd(ctx *middleware.Context) { - ctx.Data["Title"] = "Forgot Password" - - if setting.MailService == nil { - ctx.Data["IsResetDisable"] = true - ctx.HTML(200, FORGOT_PASSWORD) - return - } - - ctx.Data["IsResetRequest"] = true - ctx.HTML(200, FORGOT_PASSWORD) -} - -func ForgotPasswdPost(ctx *middleware.Context) { - ctx.Data["Title"] = "Forgot Password" - - if setting.MailService == nil { - ctx.Handle(403, "user.ForgotPasswdPost", nil) - return - } - ctx.Data["IsResetRequest"] = true - - email := ctx.Query("email") - u, err := models.GetUserByEmail(email) - if err != nil { - if err == models.ErrUserNotExist { - ctx.RenderWithErr("This e-mail address does not associate to any account.", "user/forgot_passwd", nil) - } else { - ctx.Handle(500, "user.ResetPasswd(check existence)", err) - } - return - } - - if ctx.Cache.IsExist("MailResendLimit_" + u.LowerName) { - ctx.Data["ResendLimited"] = true - ctx.HTML(200, FORGOT_PASSWORD) - return - } - - mailer.SendResetPasswdMail(ctx.Render, u) - if err = ctx.Cache.Put("MailResendLimit_"+u.LowerName, u.LowerName, 180); err != nil { - log.Error("Set cache(MailResendLimit) fail: %v", err) - } - - ctx.Data["Email"] = email - ctx.Data["Hours"] = setting.Service.ActiveCodeLives / 60 - ctx.Data["IsResetSent"] = true - ctx.HTML(200, FORGOT_PASSWORD) -} - -func ResetPasswd(ctx *middleware.Context) { - ctx.Data["Title"] = "Reset Password" - - code := ctx.Query("code") - if len(code) == 0 { - ctx.Error(404) - return - } - ctx.Data["Code"] = code - ctx.Data["IsResetForm"] = true - ctx.HTML(200, RESET_PASSWORD) -} - -func ResetPasswdPost(ctx *middleware.Context) { - ctx.Data["Title"] = "Reset Password" - - code := ctx.Query("code") - if len(code) == 0 { - ctx.Error(404) - return - } - ctx.Data["Code"] = code - - if u := models.VerifyUserActiveCode(code); u != nil { - // Validate password length. - passwd := ctx.Query("passwd") - if len(passwd) < 6 || len(passwd) > 30 { - ctx.Data["IsResetForm"] = true - ctx.RenderWithErr("Password length should be in 6 and 30.", "user/reset_passwd", nil) - return - } - - u.Passwd = passwd - u.Rands = models.GetUserSalt() - u.Salt = models.GetUserSalt() - u.EncodePasswd() - if err := models.UpdateUser(u); err != nil { - ctx.Handle(500, "user.ResetPasswd(UpdateUser)", err) - return - } - - log.Trace("%s User password reset: %s", ctx.Req.RequestURI, u.Name) - ctx.Redirect("/user/login") - return - } - - ctx.Data["IsResetFailed"] = true - ctx.HTML(200, RESET_PASSWORD) -} |