You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

user.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320
  1. // Copyright 2021 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package user
  4. import (
  5. "context"
  6. "fmt"
  7. "os"
  8. "strings"
  9. "time"
  10. "code.gitea.io/gitea/models"
  11. asymkey_model "code.gitea.io/gitea/models/asymkey"
  12. "code.gitea.io/gitea/models/db"
  13. "code.gitea.io/gitea/models/organization"
  14. packages_model "code.gitea.io/gitea/models/packages"
  15. repo_model "code.gitea.io/gitea/models/repo"
  16. system_model "code.gitea.io/gitea/models/system"
  17. user_model "code.gitea.io/gitea/models/user"
  18. "code.gitea.io/gitea/modules/eventsource"
  19. "code.gitea.io/gitea/modules/log"
  20. "code.gitea.io/gitea/modules/setting"
  21. "code.gitea.io/gitea/modules/storage"
  22. "code.gitea.io/gitea/modules/util"
  23. "code.gitea.io/gitea/services/agit"
  24. "code.gitea.io/gitea/services/packages"
  25. container_service "code.gitea.io/gitea/services/packages/container"
  26. repo_service "code.gitea.io/gitea/services/repository"
  27. )
  28. // RenameUser renames a user
  29. func RenameUser(ctx context.Context, u *user_model.User, newUserName string) error {
  30. // Non-local users are not allowed to change their username.
  31. if !u.IsOrganization() && !u.IsLocal() {
  32. return user_model.ErrUserIsNotLocal{
  33. UID: u.ID,
  34. Name: u.Name,
  35. }
  36. }
  37. if newUserName == u.Name {
  38. return user_model.ErrUsernameNotChanged{
  39. UID: u.ID,
  40. Name: u.Name,
  41. }
  42. }
  43. if err := user_model.IsUsableUsername(newUserName); err != nil {
  44. return err
  45. }
  46. onlyCapitalization := strings.EqualFold(newUserName, u.Name)
  47. oldUserName := u.Name
  48. if onlyCapitalization {
  49. u.Name = newUserName
  50. if err := user_model.UpdateUserCols(ctx, u, "name"); err != nil {
  51. u.Name = oldUserName
  52. return err
  53. }
  54. return repo_model.UpdateRepositoryOwnerNames(ctx, u.ID, newUserName)
  55. }
  56. ctx, committer, err := db.TxContext(ctx)
  57. if err != nil {
  58. return err
  59. }
  60. defer committer.Close()
  61. isExist, err := user_model.IsUserExist(ctx, u.ID, newUserName)
  62. if err != nil {
  63. return err
  64. }
  65. if isExist {
  66. return user_model.ErrUserAlreadyExist{
  67. Name: newUserName,
  68. }
  69. }
  70. if err = repo_model.UpdateRepositoryOwnerName(ctx, oldUserName, newUserName); err != nil {
  71. return err
  72. }
  73. if err = user_model.NewUserRedirect(ctx, u.ID, oldUserName, newUserName); err != nil {
  74. return err
  75. }
  76. if err := agit.UserNameChanged(ctx, u, newUserName); err != nil {
  77. return err
  78. }
  79. if err := container_service.UpdateRepositoryNames(ctx, u, newUserName); err != nil {
  80. return err
  81. }
  82. u.Name = newUserName
  83. u.LowerName = strings.ToLower(newUserName)
  84. if err := user_model.UpdateUserCols(ctx, u, "name", "lower_name"); err != nil {
  85. u.Name = oldUserName
  86. u.LowerName = strings.ToLower(oldUserName)
  87. return err
  88. }
  89. // Do not fail if directory does not exist
  90. if err = util.Rename(user_model.UserPath(oldUserName), user_model.UserPath(newUserName)); err != nil && !os.IsNotExist(err) {
  91. u.Name = oldUserName
  92. u.LowerName = strings.ToLower(oldUserName)
  93. return fmt.Errorf("rename user directory: %w", err)
  94. }
  95. if err = committer.Commit(); err != nil {
  96. u.Name = oldUserName
  97. u.LowerName = strings.ToLower(oldUserName)
  98. if err2 := util.Rename(user_model.UserPath(newUserName), user_model.UserPath(oldUserName)); err2 != nil && !os.IsNotExist(err2) {
  99. log.Critical("Unable to rollback directory change during failed username change from: %s to: %s. DB Error: %v. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  100. return fmt.Errorf("failed to rollback directory change during failed username change from: %s to: %s. DB Error: %w. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  101. }
  102. return err
  103. }
  104. return nil
  105. }
  106. // DeleteUser completely and permanently deletes everything of a user,
  107. // but issues/comments/pulls will be kept and shown as someone has been deleted,
  108. // unless the user is younger than USER_DELETE_WITH_COMMENTS_MAX_DAYS.
  109. func DeleteUser(ctx context.Context, u *user_model.User, purge bool) error {
  110. if u.IsOrganization() {
  111. return fmt.Errorf("%s is an organization not a user", u.Name)
  112. }
  113. if purge {
  114. // Disable the user first
  115. // NOTE: This is deliberately not within a transaction as it must disable the user immediately to prevent any further action by the user to be purged.
  116. if err := user_model.UpdateUserCols(ctx, &user_model.User{
  117. ID: u.ID,
  118. IsActive: false,
  119. IsRestricted: true,
  120. IsAdmin: false,
  121. ProhibitLogin: true,
  122. Passwd: "",
  123. Salt: "",
  124. PasswdHashAlgo: "",
  125. MaxRepoCreation: 0,
  126. }, "is_active", "is_restricted", "is_admin", "prohibit_login", "max_repo_creation", "passwd", "salt", "passwd_hash_algo"); err != nil {
  127. return fmt.Errorf("unable to disable user: %s[%d] prior to purge. UpdateUserCols: %w", u.Name, u.ID, err)
  128. }
  129. // Force any logged in sessions to log out
  130. // FIXME: We also need to tell the session manager to log them out too.
  131. eventsource.GetManager().SendMessage(u.ID, &eventsource.Event{
  132. Name: "logout",
  133. })
  134. // Delete all repos belonging to this user
  135. // Now this is not within a transaction because there are internal transactions within the DeleteRepository
  136. // BUT: the db will still be consistent even if a number of repos have already been deleted.
  137. // And in fact we want to capture any repositories that are being created in other transactions in the meantime
  138. //
  139. // An alternative option here would be write a DeleteAllRepositoriesForUserID function which would delete all of the repos
  140. // but such a function would likely get out of date
  141. for {
  142. repos, _, err := repo_model.GetUserRepositories(ctx, &repo_model.SearchRepoOptions{
  143. ListOptions: db.ListOptions{
  144. PageSize: repo_model.RepositoryListDefaultPageSize,
  145. Page: 1,
  146. },
  147. Private: true,
  148. OwnerID: u.ID,
  149. Actor: u,
  150. })
  151. if err != nil {
  152. return fmt.Errorf("GetUserRepositories: %w", err)
  153. }
  154. if len(repos) == 0 {
  155. break
  156. }
  157. for _, repo := range repos {
  158. if err := repo_service.DeleteRepositoryDirectly(ctx, u, u.ID, repo.ID); err != nil {
  159. return fmt.Errorf("unable to delete repository %s for %s[%d]. Error: %w", repo.Name, u.Name, u.ID, err)
  160. }
  161. }
  162. }
  163. // Remove from Organizations and delete last owner organizations
  164. // Now this is not within a transaction because there are internal transactions within the DeleteOrganization
  165. // BUT: the db will still be consistent even if a number of organizations memberships and organizations have already been deleted
  166. // And in fact we want to capture any organization additions that are being created in other transactions in the meantime
  167. //
  168. // An alternative option here would be write a function which would delete all organizations but it seems
  169. // but such a function would likely get out of date
  170. for {
  171. orgs, err := organization.FindOrgs(ctx, organization.FindOrgOptions{
  172. ListOptions: db.ListOptions{
  173. PageSize: repo_model.RepositoryListDefaultPageSize,
  174. Page: 1,
  175. },
  176. UserID: u.ID,
  177. IncludePrivate: true,
  178. })
  179. if err != nil {
  180. return fmt.Errorf("unable to find org list for %s[%d]. Error: %w", u.Name, u.ID, err)
  181. }
  182. if len(orgs) == 0 {
  183. break
  184. }
  185. for _, org := range orgs {
  186. if err := models.RemoveOrgUser(ctx, org.ID, u.ID); err != nil {
  187. if organization.IsErrLastOrgOwner(err) {
  188. err = organization.DeleteOrganization(ctx, org)
  189. }
  190. if err != nil {
  191. return fmt.Errorf("unable to remove user %s[%d] from org %s[%d]. Error: %w", u.Name, u.ID, org.Name, org.ID, err)
  192. }
  193. }
  194. }
  195. }
  196. // Delete Packages
  197. if setting.Packages.Enabled {
  198. if _, err := packages.RemoveAllPackages(ctx, u.ID); err != nil {
  199. return err
  200. }
  201. }
  202. }
  203. ctx, committer, err := db.TxContext(ctx)
  204. if err != nil {
  205. return err
  206. }
  207. defer committer.Close()
  208. // Note: A user owns any repository or belongs to any organization
  209. // cannot perform delete operation. This causes a race with the purge above
  210. // however consistency requires that we ensure that this is the case
  211. // Check ownership of repository.
  212. count, err := repo_model.CountRepositories(ctx, repo_model.CountRepositoryOptions{OwnerID: u.ID})
  213. if err != nil {
  214. return fmt.Errorf("GetRepositoryCount: %w", err)
  215. } else if count > 0 {
  216. return models.ErrUserOwnRepos{UID: u.ID}
  217. }
  218. // Check membership of organization.
  219. count, err = organization.GetOrganizationCount(ctx, u)
  220. if err != nil {
  221. return fmt.Errorf("GetOrganizationCount: %w", err)
  222. } else if count > 0 {
  223. return models.ErrUserHasOrgs{UID: u.ID}
  224. }
  225. // Check ownership of packages.
  226. if ownsPackages, err := packages_model.HasOwnerPackages(ctx, u.ID); err != nil {
  227. return fmt.Errorf("HasOwnerPackages: %w", err)
  228. } else if ownsPackages {
  229. return models.ErrUserOwnPackages{UID: u.ID}
  230. }
  231. if err := deleteUser(ctx, u, purge); err != nil {
  232. return fmt.Errorf("DeleteUser: %w", err)
  233. }
  234. if err := committer.Commit(); err != nil {
  235. return err
  236. }
  237. committer.Close()
  238. if err = asymkey_model.RewriteAllPublicKeys(ctx); err != nil {
  239. return err
  240. }
  241. if err = asymkey_model.RewriteAllPrincipalKeys(ctx); err != nil {
  242. return err
  243. }
  244. // Note: There are something just cannot be roll back,
  245. // so just keep error logs of those operations.
  246. path := user_model.UserPath(u.Name)
  247. if err := util.RemoveAll(path); err != nil {
  248. err = fmt.Errorf("Failed to RemoveAll %s: %w", path, err)
  249. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  250. return err
  251. }
  252. if u.Avatar != "" {
  253. avatarPath := u.CustomAvatarRelativePath()
  254. if err := storage.Avatars.Delete(avatarPath); err != nil {
  255. err = fmt.Errorf("Failed to remove %s: %w", avatarPath, err)
  256. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  257. return err
  258. }
  259. }
  260. return nil
  261. }
  262. // DeleteInactiveUsers deletes all inactive users and email addresses.
  263. func DeleteInactiveUsers(ctx context.Context, olderThan time.Duration) error {
  264. users, err := user_model.GetInactiveUsers(ctx, olderThan)
  265. if err != nil {
  266. return err
  267. }
  268. // FIXME: should only update authorized_keys file once after all deletions.
  269. for _, u := range users {
  270. select {
  271. case <-ctx.Done():
  272. return db.ErrCancelledf("Before delete inactive user %s", u.Name)
  273. default:
  274. }
  275. if err := DeleteUser(ctx, u, false); err != nil {
  276. // Ignore users that were set inactive by admin.
  277. if models.IsErrUserOwnRepos(err) || models.IsErrUserHasOrgs(err) || models.IsErrUserOwnPackages(err) {
  278. continue
  279. }
  280. return err
  281. }
  282. }
  283. return user_model.DeleteInactiveEmailAddresses(ctx)
  284. }