You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

user.go 10.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. // Copyright 2021 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package user
  4. import (
  5. "context"
  6. "fmt"
  7. "os"
  8. "strings"
  9. "time"
  10. "code.gitea.io/gitea/models"
  11. "code.gitea.io/gitea/models/db"
  12. "code.gitea.io/gitea/models/organization"
  13. packages_model "code.gitea.io/gitea/models/packages"
  14. repo_model "code.gitea.io/gitea/models/repo"
  15. system_model "code.gitea.io/gitea/models/system"
  16. user_model "code.gitea.io/gitea/models/user"
  17. "code.gitea.io/gitea/modules/eventsource"
  18. "code.gitea.io/gitea/modules/log"
  19. "code.gitea.io/gitea/modules/setting"
  20. "code.gitea.io/gitea/modules/storage"
  21. "code.gitea.io/gitea/modules/util"
  22. "code.gitea.io/gitea/services/agit"
  23. asymkey_service "code.gitea.io/gitea/services/asymkey"
  24. org_service "code.gitea.io/gitea/services/org"
  25. "code.gitea.io/gitea/services/packages"
  26. container_service "code.gitea.io/gitea/services/packages/container"
  27. repo_service "code.gitea.io/gitea/services/repository"
  28. )
  29. // RenameUser renames a user
  30. func RenameUser(ctx context.Context, u *user_model.User, newUserName string) error {
  31. // Non-local users are not allowed to change their username.
  32. if !u.IsOrganization() && !u.IsLocal() {
  33. return user_model.ErrUserIsNotLocal{
  34. UID: u.ID,
  35. Name: u.Name,
  36. }
  37. }
  38. if newUserName == u.Name {
  39. return nil
  40. }
  41. if err := user_model.IsUsableUsername(newUserName); err != nil {
  42. return err
  43. }
  44. onlyCapitalization := strings.EqualFold(newUserName, u.Name)
  45. oldUserName := u.Name
  46. if onlyCapitalization {
  47. u.Name = newUserName
  48. if err := user_model.UpdateUserCols(ctx, u, "name"); err != nil {
  49. u.Name = oldUserName
  50. return err
  51. }
  52. return repo_model.UpdateRepositoryOwnerNames(ctx, u.ID, newUserName)
  53. }
  54. ctx, committer, err := db.TxContext(ctx)
  55. if err != nil {
  56. return err
  57. }
  58. defer committer.Close()
  59. isExist, err := user_model.IsUserExist(ctx, u.ID, newUserName)
  60. if err != nil {
  61. return err
  62. }
  63. if isExist {
  64. return user_model.ErrUserAlreadyExist{
  65. Name: newUserName,
  66. }
  67. }
  68. if err = repo_model.UpdateRepositoryOwnerName(ctx, oldUserName, newUserName); err != nil {
  69. return err
  70. }
  71. if err = user_model.NewUserRedirect(ctx, u.ID, oldUserName, newUserName); err != nil {
  72. return err
  73. }
  74. if err := agit.UserNameChanged(ctx, u, newUserName); err != nil {
  75. return err
  76. }
  77. if err := container_service.UpdateRepositoryNames(ctx, u, newUserName); err != nil {
  78. return err
  79. }
  80. u.Name = newUserName
  81. u.LowerName = strings.ToLower(newUserName)
  82. if err := user_model.UpdateUserCols(ctx, u, "name", "lower_name"); err != nil {
  83. u.Name = oldUserName
  84. u.LowerName = strings.ToLower(oldUserName)
  85. return err
  86. }
  87. // Do not fail if directory does not exist
  88. if err = util.Rename(user_model.UserPath(oldUserName), user_model.UserPath(newUserName)); err != nil && !os.IsNotExist(err) {
  89. u.Name = oldUserName
  90. u.LowerName = strings.ToLower(oldUserName)
  91. return fmt.Errorf("rename user directory: %w", err)
  92. }
  93. if err = committer.Commit(); err != nil {
  94. u.Name = oldUserName
  95. u.LowerName = strings.ToLower(oldUserName)
  96. if err2 := util.Rename(user_model.UserPath(newUserName), user_model.UserPath(oldUserName)); err2 != nil && !os.IsNotExist(err2) {
  97. log.Critical("Unable to rollback directory change during failed username change from: %s to: %s. DB Error: %v. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  98. return fmt.Errorf("failed to rollback directory change during failed username change from: %s to: %s. DB Error: %w. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  99. }
  100. return err
  101. }
  102. return nil
  103. }
  104. // DeleteUser completely and permanently deletes everything of a user,
  105. // but issues/comments/pulls will be kept and shown as someone has been deleted,
  106. // unless the user is younger than USER_DELETE_WITH_COMMENTS_MAX_DAYS.
  107. func DeleteUser(ctx context.Context, u *user_model.User, purge bool) error {
  108. if u.IsOrganization() {
  109. return fmt.Errorf("%s is an organization not a user", u.Name)
  110. }
  111. if user_model.IsLastAdminUser(ctx, u) {
  112. return models.ErrDeleteLastAdminUser{UID: u.ID}
  113. }
  114. if purge {
  115. // Disable the user first
  116. // NOTE: This is deliberately not within a transaction as it must disable the user immediately to prevent any further action by the user to be purged.
  117. if err := user_model.UpdateUserCols(ctx, &user_model.User{
  118. ID: u.ID,
  119. IsActive: false,
  120. IsRestricted: true,
  121. IsAdmin: false,
  122. ProhibitLogin: true,
  123. Passwd: "",
  124. Salt: "",
  125. PasswdHashAlgo: "",
  126. MaxRepoCreation: 0,
  127. }, "is_active", "is_restricted", "is_admin", "prohibit_login", "max_repo_creation", "passwd", "salt", "passwd_hash_algo"); err != nil {
  128. return fmt.Errorf("unable to disable user: %s[%d] prior to purge. UpdateUserCols: %w", u.Name, u.ID, err)
  129. }
  130. // Force any logged in sessions to log out
  131. // FIXME: We also need to tell the session manager to log them out too.
  132. eventsource.GetManager().SendMessage(u.ID, &eventsource.Event{
  133. Name: "logout",
  134. })
  135. // Delete all repos belonging to this user
  136. // Now this is not within a transaction because there are internal transactions within the DeleteRepository
  137. // BUT: the db will still be consistent even if a number of repos have already been deleted.
  138. // And in fact we want to capture any repositories that are being created in other transactions in the meantime
  139. //
  140. // An alternative option here would be write a DeleteAllRepositoriesForUserID function which would delete all of the repos
  141. // but such a function would likely get out of date
  142. err := repo_service.DeleteOwnerRepositoriesDirectly(ctx, u)
  143. if err != nil {
  144. return err
  145. }
  146. // Remove from Organizations and delete last owner organizations
  147. // Now this is not within a transaction because there are internal transactions within the DeleteOrganization
  148. // BUT: the db will still be consistent even if a number of organizations memberships and organizations have already been deleted
  149. // And in fact we want to capture any organization additions that are being created in other transactions in the meantime
  150. //
  151. // An alternative option here would be write a function which would delete all organizations but it seems
  152. // but such a function would likely get out of date
  153. for {
  154. orgs, err := db.Find[organization.Organization](ctx, organization.FindOrgOptions{
  155. ListOptions: db.ListOptions{
  156. PageSize: repo_model.RepositoryListDefaultPageSize,
  157. Page: 1,
  158. },
  159. UserID: u.ID,
  160. IncludePrivate: true,
  161. })
  162. if err != nil {
  163. return fmt.Errorf("unable to find org list for %s[%d]. Error: %w", u.Name, u.ID, err)
  164. }
  165. if len(orgs) == 0 {
  166. break
  167. }
  168. for _, org := range orgs {
  169. if err := models.RemoveOrgUser(ctx, org, u); err != nil {
  170. if organization.IsErrLastOrgOwner(err) {
  171. err = org_service.DeleteOrganization(ctx, org, true)
  172. if err != nil {
  173. return fmt.Errorf("unable to delete organization %d: %w", org.ID, err)
  174. }
  175. }
  176. if err != nil {
  177. return fmt.Errorf("unable to remove user %s[%d] from org %s[%d]. Error: %w", u.Name, u.ID, org.Name, org.ID, err)
  178. }
  179. }
  180. }
  181. }
  182. // Delete Packages
  183. if setting.Packages.Enabled {
  184. if _, err := packages.RemoveAllPackages(ctx, u.ID); err != nil {
  185. return err
  186. }
  187. }
  188. }
  189. ctx, committer, err := db.TxContext(ctx)
  190. if err != nil {
  191. return err
  192. }
  193. defer committer.Close()
  194. // Note: A user owns any repository or belongs to any organization
  195. // cannot perform delete operation. This causes a race with the purge above
  196. // however consistency requires that we ensure that this is the case
  197. // Check ownership of repository.
  198. count, err := repo_model.CountRepositories(ctx, repo_model.CountRepositoryOptions{OwnerID: u.ID})
  199. if err != nil {
  200. return fmt.Errorf("GetRepositoryCount: %w", err)
  201. } else if count > 0 {
  202. return models.ErrUserOwnRepos{UID: u.ID}
  203. }
  204. // Check membership of organization.
  205. count, err = organization.GetOrganizationCount(ctx, u)
  206. if err != nil {
  207. return fmt.Errorf("GetOrganizationCount: %w", err)
  208. } else if count > 0 {
  209. return models.ErrUserHasOrgs{UID: u.ID}
  210. }
  211. // Check ownership of packages.
  212. if ownsPackages, err := packages_model.HasOwnerPackages(ctx, u.ID); err != nil {
  213. return fmt.Errorf("HasOwnerPackages: %w", err)
  214. } else if ownsPackages {
  215. return models.ErrUserOwnPackages{UID: u.ID}
  216. }
  217. if err := deleteUser(ctx, u, purge); err != nil {
  218. return fmt.Errorf("DeleteUser: %w", err)
  219. }
  220. if err := committer.Commit(); err != nil {
  221. return err
  222. }
  223. committer.Close()
  224. if err = asymkey_service.RewriteAllPublicKeys(ctx); err != nil {
  225. return err
  226. }
  227. if err = asymkey_service.RewriteAllPrincipalKeys(ctx); err != nil {
  228. return err
  229. }
  230. // Note: There are something just cannot be roll back,
  231. // so just keep error logs of those operations.
  232. path := user_model.UserPath(u.Name)
  233. if err := util.RemoveAll(path); err != nil {
  234. err = fmt.Errorf("Failed to RemoveAll %s: %w", path, err)
  235. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  236. return err
  237. }
  238. if u.Avatar != "" {
  239. avatarPath := u.CustomAvatarRelativePath()
  240. if err := storage.Avatars.Delete(avatarPath); err != nil {
  241. err = fmt.Errorf("Failed to remove %s: %w", avatarPath, err)
  242. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  243. return err
  244. }
  245. }
  246. return nil
  247. }
  248. // DeleteInactiveUsers deletes all inactive users and email addresses.
  249. func DeleteInactiveUsers(ctx context.Context, olderThan time.Duration) error {
  250. users, err := user_model.GetInactiveUsers(ctx, olderThan)
  251. if err != nil {
  252. return err
  253. }
  254. // FIXME: should only update authorized_keys file once after all deletions.
  255. for _, u := range users {
  256. select {
  257. case <-ctx.Done():
  258. return db.ErrCancelledf("Before delete inactive user %s", u.Name)
  259. default:
  260. }
  261. if err := DeleteUser(ctx, u, false); err != nil {
  262. // Ignore users that were set inactive by admin.
  263. if models.IsErrUserOwnRepos(err) || models.IsErrUserHasOrgs(err) ||
  264. models.IsErrUserOwnPackages(err) || models.IsErrDeleteLastAdminUser(err) {
  265. continue
  266. }
  267. return err
  268. }
  269. }
  270. return user_model.DeleteInactiveEmailAddresses(ctx)
  271. }