123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Copyright 2019 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package models
-
- import (
- "context"
- "fmt"
- "time"
-
- _ "image/jpeg" // Needed for jpeg support
-
- activities_model "code.gitea.io/gitea/models/activities"
- asymkey_model "code.gitea.io/gitea/models/asymkey"
- auth_model "code.gitea.io/gitea/models/auth"
- "code.gitea.io/gitea/models/db"
- git_model "code.gitea.io/gitea/models/git"
- issues_model "code.gitea.io/gitea/models/issues"
- "code.gitea.io/gitea/models/organization"
- access_model "code.gitea.io/gitea/models/perm/access"
- pull_model "code.gitea.io/gitea/models/pull"
- repo_model "code.gitea.io/gitea/models/repo"
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/setting"
- )
-
- // DeleteUser deletes models associated to an user.
- func DeleteUser(ctx context.Context, u *user_model.User, purge bool) (err error) {
- e := db.GetEngine(ctx)
-
- // ***** START: Watch *****
- watchedRepoIDs := make([]int64, 0, 10)
- if err = e.Table("watch").Cols("watch.repo_id").
- Where("watch.user_id = ?", u.ID).And("watch.mode <>?", repo_model.WatchModeDont).Find(&watchedRepoIDs); err != nil {
- return fmt.Errorf("get all watches: %w", err)
- }
- if _, err = e.Decr("num_watches").In("id", watchedRepoIDs).NoAutoTime().Update(new(repo_model.Repository)); err != nil {
- return fmt.Errorf("decrease repository num_watches: %w", err)
- }
- // ***** END: Watch *****
-
- // ***** START: Star *****
- starredRepoIDs := make([]int64, 0, 10)
- if err = e.Table("star").Cols("star.repo_id").
- Where("star.uid = ?", u.ID).Find(&starredRepoIDs); err != nil {
- return fmt.Errorf("get all stars: %w", err)
- } else if _, err = e.Decr("num_stars").In("id", starredRepoIDs).NoAutoTime().Update(new(repo_model.Repository)); err != nil {
- return fmt.Errorf("decrease repository num_stars: %w", err)
- }
- // ***** END: Star *****
-
- // ***** START: Follow *****
- followeeIDs := make([]int64, 0, 10)
- if err = e.Table("follow").Cols("follow.follow_id").
- Where("follow.user_id = ?", u.ID).Find(&followeeIDs); err != nil {
- return fmt.Errorf("get all followees: %w", err)
- } else if _, err = e.Decr("num_followers").In("id", followeeIDs).Update(new(user_model.User)); err != nil {
- return fmt.Errorf("decrease user num_followers: %w", err)
- }
-
- followerIDs := make([]int64, 0, 10)
- if err = e.Table("follow").Cols("follow.user_id").
- Where("follow.follow_id = ?", u.ID).Find(&followerIDs); err != nil {
- return fmt.Errorf("get all followers: %w", err)
- } else if _, err = e.Decr("num_following").In("id", followerIDs).Update(new(user_model.User)); err != nil {
- return fmt.Errorf("decrease user num_following: %w", err)
- }
- // ***** END: Follow *****
-
- if err = db.DeleteBeans(ctx,
- &auth_model.AccessToken{UID: u.ID},
- &repo_model.Collaboration{UserID: u.ID},
- &access_model.Access{UserID: u.ID},
- &repo_model.Watch{UserID: u.ID},
- &repo_model.Star{UID: u.ID},
- &user_model.Follow{UserID: u.ID},
- &user_model.Follow{FollowID: u.ID},
- &activities_model.Action{UserID: u.ID},
- &issues_model.IssueUser{UID: u.ID},
- &user_model.EmailAddress{UID: u.ID},
- &user_model.UserOpenID{UID: u.ID},
- &issues_model.Reaction{UserID: u.ID},
- &organization.TeamUser{UID: u.ID},
- &issues_model.Stopwatch{UserID: u.ID},
- &user_model.Setting{UserID: u.ID},
- &user_model.UserBadge{UserID: u.ID},
- &pull_model.AutoMerge{DoerID: u.ID},
- &pull_model.ReviewState{UserID: u.ID},
- &user_model.Redirect{RedirectUserID: u.ID},
- ); err != nil {
- return fmt.Errorf("deleteBeans: %w", err)
- }
-
- if err := auth_model.DeleteOAuth2RelictsByUserID(ctx, u.ID); err != nil {
- return err
- }
-
- if purge || (setting.Service.UserDeleteWithCommentsMaxTime != 0 &&
- u.CreatedUnix.AsTime().Add(setting.Service.UserDeleteWithCommentsMaxTime).After(time.Now())) {
-
- // Delete Comments
- const batchSize = 50
- for {
- comments := make([]*issues_model.Comment, 0, batchSize)
- if err = e.Where("type=? AND poster_id=?", issues_model.CommentTypeComment, u.ID).Limit(batchSize, 0).Find(&comments); err != nil {
- return err
- }
- if len(comments) == 0 {
- break
- }
-
- for _, comment := range comments {
- if err = issues_model.DeleteComment(ctx, comment); err != nil {
- return err
- }
- }
- }
-
- // Delete Reactions
- if err = issues_model.DeleteReaction(ctx, &issues_model.ReactionOptions{DoerID: u.ID}); err != nil {
- return err
- }
- }
-
- // ***** START: Branch Protections *****
- {
- const batchSize = 50
- for start := 0; ; start += batchSize {
- protections := make([]*git_model.ProtectedBranch, 0, batchSize)
- // @perf: We can't filter on DB side by u.ID, as those IDs are serialized as JSON strings.
- // We could filter down with `WHERE repo_id IN (reposWithPushPermission(u))`,
- // though that query will be quite complex and tricky to maintain (compare `getRepoAssignees()`).
- // Also, as we didn't update branch protections when removing entries from `access` table,
- // it's safer to iterate all protected branches.
- if err = e.Limit(batchSize, start).Find(&protections); err != nil {
- return fmt.Errorf("findProtectedBranches: %w", err)
- }
- if len(protections) == 0 {
- break
- }
- for _, p := range protections {
- if err := git_model.RemoveUserIDFromProtectedBranch(ctx, p, u.ID); err != nil {
- return err
- }
- }
- }
- }
- // ***** END: Branch Protections *****
-
- // ***** START: PublicKey *****
- if _, err = db.DeleteByBean(ctx, &asymkey_model.PublicKey{OwnerID: u.ID}); err != nil {
- return fmt.Errorf("deletePublicKeys: %w", err)
- }
- // ***** END: PublicKey *****
-
- // ***** START: GPGPublicKey *****
- keys, err := asymkey_model.ListGPGKeys(ctx, u.ID, db.ListOptions{})
- if err != nil {
- return fmt.Errorf("ListGPGKeys: %w", err)
- }
- // Delete GPGKeyImport(s).
- for _, key := range keys {
- if _, err = db.DeleteByBean(ctx, &asymkey_model.GPGKeyImport{KeyID: key.KeyID}); err != nil {
- return fmt.Errorf("deleteGPGKeyImports: %w", err)
- }
- }
- if _, err = db.DeleteByBean(ctx, &asymkey_model.GPGKey{OwnerID: u.ID}); err != nil {
- return fmt.Errorf("deleteGPGKeys: %w", err)
- }
- // ***** END: GPGPublicKey *****
-
- // Clear assignee.
- if _, err = db.DeleteByBean(ctx, &issues_model.IssueAssignees{AssigneeID: u.ID}); err != nil {
- return fmt.Errorf("clear assignee: %w", err)
- }
-
- // ***** START: ExternalLoginUser *****
- if err = user_model.RemoveAllAccountLinks(ctx, u); err != nil {
- return fmt.Errorf("ExternalLoginUser: %w", err)
- }
- // ***** END: ExternalLoginUser *****
-
- if _, err = e.ID(u.ID).Delete(new(user_model.User)); err != nil {
- return fmt.Errorf("delete: %w", err)
- }
-
- return nil
- }
|