You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

user.go 6.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package models
  6. import (
  7. "context"
  8. "fmt"
  9. "time"
  10. _ "image/jpeg" // Needed for jpeg support
  11. asymkey_model "code.gitea.io/gitea/models/asymkey"
  12. auth_model "code.gitea.io/gitea/models/auth"
  13. "code.gitea.io/gitea/models/db"
  14. "code.gitea.io/gitea/models/issues"
  15. "code.gitea.io/gitea/models/organization"
  16. access_model "code.gitea.io/gitea/models/perm/access"
  17. pull_model "code.gitea.io/gitea/models/pull"
  18. repo_model "code.gitea.io/gitea/models/repo"
  19. user_model "code.gitea.io/gitea/models/user"
  20. "code.gitea.io/gitea/modules/setting"
  21. "code.gitea.io/gitea/modules/util"
  22. )
  23. // DeleteUser deletes models associated to an user.
  24. func DeleteUser(ctx context.Context, u *user_model.User) (err error) {
  25. e := db.GetEngine(ctx)
  26. // ***** START: Watch *****
  27. watchedRepoIDs := make([]int64, 0, 10)
  28. if err = e.Table("watch").Cols("watch.repo_id").
  29. Where("watch.user_id = ?", u.ID).And("watch.mode <>?", repo_model.WatchModeDont).Find(&watchedRepoIDs); err != nil {
  30. return fmt.Errorf("get all watches: %v", err)
  31. }
  32. if _, err = e.Decr("num_watches").In("id", watchedRepoIDs).NoAutoTime().Update(new(repo_model.Repository)); err != nil {
  33. return fmt.Errorf("decrease repository num_watches: %v", err)
  34. }
  35. // ***** END: Watch *****
  36. // ***** START: Star *****
  37. starredRepoIDs := make([]int64, 0, 10)
  38. if err = e.Table("star").Cols("star.repo_id").
  39. Where("star.uid = ?", u.ID).Find(&starredRepoIDs); err != nil {
  40. return fmt.Errorf("get all stars: %v", err)
  41. } else if _, err = e.Decr("num_stars").In("id", starredRepoIDs).NoAutoTime().Update(new(repo_model.Repository)); err != nil {
  42. return fmt.Errorf("decrease repository num_stars: %v", err)
  43. }
  44. // ***** END: Star *****
  45. // ***** START: Follow *****
  46. followeeIDs := make([]int64, 0, 10)
  47. if err = e.Table("follow").Cols("follow.follow_id").
  48. Where("follow.user_id = ?", u.ID).Find(&followeeIDs); err != nil {
  49. return fmt.Errorf("get all followees: %v", err)
  50. } else if _, err = e.Decr("num_followers").In("id", followeeIDs).Update(new(user_model.User)); err != nil {
  51. return fmt.Errorf("decrease user num_followers: %v", err)
  52. }
  53. followerIDs := make([]int64, 0, 10)
  54. if err = e.Table("follow").Cols("follow.user_id").
  55. Where("follow.follow_id = ?", u.ID).Find(&followerIDs); err != nil {
  56. return fmt.Errorf("get all followers: %v", err)
  57. } else if _, err = e.Decr("num_following").In("id", followerIDs).Update(new(user_model.User)); err != nil {
  58. return fmt.Errorf("decrease user num_following: %v", err)
  59. }
  60. // ***** END: Follow *****
  61. if err = db.DeleteBeans(ctx,
  62. &AccessToken{UID: u.ID},
  63. &repo_model.Collaboration{UserID: u.ID},
  64. &access_model.Access{UserID: u.ID},
  65. &repo_model.Watch{UserID: u.ID},
  66. &repo_model.Star{UID: u.ID},
  67. &user_model.Follow{UserID: u.ID},
  68. &user_model.Follow{FollowID: u.ID},
  69. &Action{UserID: u.ID},
  70. &IssueUser{UID: u.ID},
  71. &user_model.EmailAddress{UID: u.ID},
  72. &user_model.UserOpenID{UID: u.ID},
  73. &issues.Reaction{UserID: u.ID},
  74. &organization.TeamUser{UID: u.ID},
  75. &Stopwatch{UserID: u.ID},
  76. &user_model.Setting{UserID: u.ID},
  77. &pull_model.AutoMerge{DoerID: u.ID},
  78. &pull_model.ReviewState{UserID: u.ID},
  79. ); err != nil {
  80. return fmt.Errorf("deleteBeans: %v", err)
  81. }
  82. if err := auth_model.DeleteOAuth2RelictsByUserID(ctx, u.ID); err != nil {
  83. return err
  84. }
  85. if setting.Service.UserDeleteWithCommentsMaxTime != 0 &&
  86. u.CreatedUnix.AsTime().Add(setting.Service.UserDeleteWithCommentsMaxTime).After(time.Now()) {
  87. // Delete Comments
  88. const batchSize = 50
  89. for start := 0; ; start += batchSize {
  90. comments := make([]*Comment, 0, batchSize)
  91. if err = e.Where("type=? AND poster_id=?", CommentTypeComment, u.ID).Limit(batchSize, start).Find(&comments); err != nil {
  92. return err
  93. }
  94. if len(comments) == 0 {
  95. break
  96. }
  97. for _, comment := range comments {
  98. if err = deleteComment(ctx, comment); err != nil {
  99. return err
  100. }
  101. }
  102. }
  103. // Delete Reactions
  104. if err = issues.DeleteReaction(ctx, &issues.ReactionOptions{DoerID: u.ID}); err != nil {
  105. return err
  106. }
  107. }
  108. // ***** START: Branch Protections *****
  109. {
  110. const batchSize = 50
  111. for start := 0; ; start += batchSize {
  112. protections := make([]*ProtectedBranch, 0, batchSize)
  113. // @perf: We can't filter on DB side by u.ID, as those IDs are serialized as JSON strings.
  114. // We could filter down with `WHERE repo_id IN (reposWithPushPermission(u))`,
  115. // though that query will be quite complex and tricky to maintain (compare `getRepoAssignees()`).
  116. // Also, as we didn't update branch protections when removing entries from `access` table,
  117. // it's safer to iterate all protected branches.
  118. if err = e.Limit(batchSize, start).Find(&protections); err != nil {
  119. return fmt.Errorf("findProtectedBranches: %v", err)
  120. }
  121. if len(protections) == 0 {
  122. break
  123. }
  124. for _, p := range protections {
  125. var matched1, matched2, matched3 bool
  126. if len(p.WhitelistUserIDs) != 0 {
  127. p.WhitelistUserIDs, matched1 = util.RemoveIDFromList(
  128. p.WhitelistUserIDs, u.ID)
  129. }
  130. if len(p.ApprovalsWhitelistUserIDs) != 0 {
  131. p.ApprovalsWhitelistUserIDs, matched2 = util.RemoveIDFromList(
  132. p.ApprovalsWhitelistUserIDs, u.ID)
  133. }
  134. if len(p.MergeWhitelistUserIDs) != 0 {
  135. p.MergeWhitelistUserIDs, matched3 = util.RemoveIDFromList(
  136. p.MergeWhitelistUserIDs, u.ID)
  137. }
  138. if matched1 || matched2 || matched3 {
  139. if _, err = e.ID(p.ID).Cols(
  140. "whitelist_user_i_ds",
  141. "merge_whitelist_user_i_ds",
  142. "approvals_whitelist_user_i_ds",
  143. ).Update(p); err != nil {
  144. return fmt.Errorf("updateProtectedBranches: %v", err)
  145. }
  146. }
  147. }
  148. }
  149. }
  150. // ***** END: Branch Protections *****
  151. // ***** START: PublicKey *****
  152. if _, err = db.DeleteByBean(ctx, &asymkey_model.PublicKey{OwnerID: u.ID}); err != nil {
  153. return fmt.Errorf("deletePublicKeys: %v", err)
  154. }
  155. // ***** END: PublicKey *****
  156. // ***** START: GPGPublicKey *****
  157. keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
  158. if err != nil {
  159. return fmt.Errorf("ListGPGKeys: %v", err)
  160. }
  161. // Delete GPGKeyImport(s).
  162. for _, key := range keys {
  163. if _, err = db.DeleteByBean(ctx, &asymkey_model.GPGKeyImport{KeyID: key.KeyID}); err != nil {
  164. return fmt.Errorf("deleteGPGKeyImports: %v", err)
  165. }
  166. }
  167. if _, err = db.DeleteByBean(ctx, &asymkey_model.GPGKey{OwnerID: u.ID}); err != nil {
  168. return fmt.Errorf("deleteGPGKeys: %v", err)
  169. }
  170. // ***** END: GPGPublicKey *****
  171. // Clear assignee.
  172. if _, err = db.DeleteByBean(ctx, &IssueAssignees{AssigneeID: u.ID}); err != nil {
  173. return fmt.Errorf("clear assignee: %v", err)
  174. }
  175. // ***** START: ExternalLoginUser *****
  176. if err = user_model.RemoveAllAccountLinks(ctx, u); err != nil {
  177. return fmt.Errorf("ExternalLoginUser: %v", err)
  178. }
  179. // ***** END: ExternalLoginUser *****
  180. if _, err = e.ID(u.ID).Delete(new(user_model.User)); err != nil {
  181. return fmt.Errorf("Delete: %v", err)
  182. }
  183. return nil
  184. }