| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217 | 
							- // Copyright 2014 The Gogs Authors. All rights reserved.
 
- // Use of this source code is governed by a MIT-style
 
- // license that can be found in the LICENSE file.
 
- package db
 
- import (
 
- 	"bytes"
 
- 	"context"
 
- 	"crypto/sha256"
 
- 	"crypto/subtle"
 
- 	"encoding/hex"
 
- 	"fmt"
 
- 	"image"
 
- 	_ "image/jpeg"
 
- 	"image/png"
 
- 	"os"
 
- 	"path/filepath"
 
- 	"strings"
 
- 	"time"
 
- 	"unicode/utf8"
 
- 	"github.com/nfnt/resize"
 
- 	"github.com/unknwon/com"
 
- 	"golang.org/x/crypto/pbkdf2"
 
- 	log "unknwon.dev/clog/v2"
 
- 	"xorm.io/xorm"
 
- 	"github.com/gogs/git-module"
 
- 	api "github.com/gogs/go-gogs-client"
 
- 	"gogs.io/gogs/internal/avatar"
 
- 	"gogs.io/gogs/internal/conf"
 
- 	"gogs.io/gogs/internal/db/errors"
 
- 	"gogs.io/gogs/internal/errutil"
 
- 	"gogs.io/gogs/internal/strutil"
 
- 	"gogs.io/gogs/internal/tool"
 
- )
 
- // USER_AVATAR_URL_PREFIX is used to identify a URL is to access user avatar.
 
- const USER_AVATAR_URL_PREFIX = "avatars"
 
- type UserType int
 
- const (
 
- 	UserIndividual UserType = iota // Historic reason to make it starts at 0.
 
- 	UserOrganization
 
- )
 
- // User represents the object of individual and member of organization.
 
- type User struct {
 
- 	ID        int64
 
- 	LowerName string `xorm:"UNIQUE NOT NULL" gorm:"UNIQUE"`
 
- 	Name      string `xorm:"UNIQUE NOT NULL" gorm:"NOT NULL"`
 
- 	FullName  string
 
- 	// Email is the primary email address (to be used for communication)
 
- 	Email       string `xorm:"NOT NULL" gorm:"NOT NULL"`
 
- 	Passwd      string `xorm:"NOT NULL" gorm:"NOT NULL"`
 
- 	LoginSource int64  `xorm:"NOT NULL DEFAULT 0" gorm:"NOT NULL;DEFAULT:0"`
 
- 	LoginName   string
 
- 	Type        UserType
 
- 	OwnedOrgs   []*User       `xorm:"-" gorm:"-" json:"-"`
 
- 	Orgs        []*User       `xorm:"-" gorm:"-" json:"-"`
 
- 	Repos       []*Repository `xorm:"-" gorm:"-" json:"-"`
 
- 	Location    string
 
- 	Website     string
 
- 	Rands       string `xorm:"VARCHAR(10)" gorm:"TYPE:VARCHAR(10)"`
 
- 	Salt        string `xorm:"VARCHAR(10)" gorm:"TYPE:VARCHAR(10)"`
 
- 	Created     time.Time `xorm:"-" gorm:"-" json:"-"`
 
- 	CreatedUnix int64
 
- 	Updated     time.Time `xorm:"-" gorm:"-" json:"-"`
 
- 	UpdatedUnix int64
 
- 	// Remember visibility choice for convenience, true for private
 
- 	LastRepoVisibility bool
 
- 	// Maximum repository creation limit, -1 means use global default
 
- 	MaxRepoCreation int `xorm:"NOT NULL DEFAULT -1" gorm:"NOT NULL;DEFAULT:-1"`
 
- 	// Permissions
 
- 	IsActive         bool // Activate primary email
 
- 	IsAdmin          bool
 
- 	AllowGitHook     bool
 
- 	AllowImportLocal bool // Allow migrate repository by local path
 
- 	ProhibitLogin    bool
 
- 	// Avatar
 
- 	Avatar          string `xorm:"VARCHAR(2048) NOT NULL" gorm:"TYPE:VARCHAR(2048);NOT NULL"`
 
- 	AvatarEmail     string `xorm:"NOT NULL" gorm:"NOT NULL"`
 
- 	UseCustomAvatar bool
 
- 	// Counters
 
- 	NumFollowers int
 
- 	NumFollowing int `xorm:"NOT NULL DEFAULT 0" gorm:"NOT NULL;DEFAULT:0"`
 
- 	NumStars     int
 
- 	NumRepos     int
 
- 	// For organization
 
- 	Description string
 
- 	NumTeams    int
 
- 	NumMembers  int
 
- 	Teams       []*Team `xorm:"-" gorm:"-" json:"-"`
 
- 	Members     []*User `xorm:"-" gorm:"-" json:"-"`
 
- }
 
- func (u *User) BeforeInsert() {
 
- 	u.CreatedUnix = time.Now().Unix()
 
- 	u.UpdatedUnix = u.CreatedUnix
 
- }
 
- func (u *User) BeforeUpdate() {
 
- 	if u.MaxRepoCreation < -1 {
 
- 		u.MaxRepoCreation = -1
 
- 	}
 
- 	u.UpdatedUnix = time.Now().Unix()
 
- }
 
- func (u *User) AfterSet(colName string, _ xorm.Cell) {
 
- 	switch colName {
 
- 	case "created_unix":
 
- 		u.Created = time.Unix(u.CreatedUnix, 0).Local()
 
- 	case "updated_unix":
 
- 		u.Updated = time.Unix(u.UpdatedUnix, 0).Local()
 
- 	}
 
- }
 
- // IDStr returns string representation of user's ID.
 
- func (u *User) IDStr() string {
 
- 	return com.ToStr(u.ID)
 
- }
 
- func (u *User) APIFormat() *api.User {
 
- 	return &api.User{
 
- 		ID:        u.ID,
 
- 		UserName:  u.Name,
 
- 		Login:     u.Name,
 
- 		FullName:  u.FullName,
 
- 		Email:     u.Email,
 
- 		AvatarUrl: u.AvatarLink(),
 
- 	}
 
- }
 
- // returns true if user login type is LoginPlain.
 
- func (u *User) IsLocal() bool {
 
- 	return u.LoginSource <= 0
 
- }
 
- // HasForkedRepo checks if user has already forked a repository with given ID.
 
- func (u *User) HasForkedRepo(repoID int64) bool {
 
- 	_, has, _ := HasForkedRepo(u.ID, repoID)
 
- 	return has
 
- }
 
- func (u *User) RepoCreationNum() int {
 
- 	if u.MaxRepoCreation <= -1 {
 
- 		return conf.Repository.MaxCreationLimit
 
- 	}
 
- 	return u.MaxRepoCreation
 
- }
 
- func (u *User) CanCreateRepo() bool {
 
- 	if u.MaxRepoCreation <= -1 {
 
- 		if conf.Repository.MaxCreationLimit <= -1 {
 
- 			return true
 
- 		}
 
- 		return u.NumRepos < conf.Repository.MaxCreationLimit
 
- 	}
 
- 	return u.NumRepos < u.MaxRepoCreation
 
- }
 
- func (u *User) CanCreateOrganization() bool {
 
- 	return !conf.Admin.DisableRegularOrgCreation || u.IsAdmin
 
- }
 
- // CanEditGitHook returns true if user can edit Git hooks.
 
- func (u *User) CanEditGitHook() bool {
 
- 	return u.IsAdmin || u.AllowGitHook
 
- }
 
- // CanImportLocal returns true if user can migrate repository by local path.
 
- func (u *User) CanImportLocal() bool {
 
- 	return conf.Repository.EnableLocalPathMigration && (u.IsAdmin || u.AllowImportLocal)
 
- }
 
- // DashboardLink returns the user dashboard page link.
 
- func (u *User) DashboardLink() string {
 
- 	if u.IsOrganization() {
 
- 		return conf.Server.Subpath + "/org/" + u.Name + "/dashboard/"
 
- 	}
 
- 	return conf.Server.Subpath + "/"
 
- }
 
- // HomeLink returns the user or organization home page link.
 
- func (u *User) HomeLink() string {
 
- 	return conf.Server.Subpath + "/" + u.Name
 
- }
 
- func (u *User) HTMLURL() string {
 
- 	return conf.Server.ExternalURL + u.Name
 
- }
 
- // GenerateEmailActivateCode generates an activate code based on user information and given e-mail.
 
- func (u *User) GenerateEmailActivateCode(email string) string {
 
- 	code := tool.CreateTimeLimitCode(
 
- 		com.ToStr(u.ID)+email+u.LowerName+u.Passwd+u.Rands,
 
- 		conf.Auth.ActivateCodeLives, nil)
 
- 	// Add tail hex username
 
- 	code += hex.EncodeToString([]byte(u.LowerName))
 
- 	return code
 
- }
 
- // GenerateActivateCode generates an activate code based on user information.
 
- func (u *User) GenerateActivateCode() string {
 
- 	return u.GenerateEmailActivateCode(u.Email)
 
- }
 
- // CustomAvatarPath returns user custom avatar file path.
 
- func (u *User) CustomAvatarPath() string {
 
- 	return filepath.Join(conf.Picture.AvatarUploadPath, com.ToStr(u.ID))
 
- }
 
- // GenerateRandomAvatar generates a random avatar for user.
 
- func (u *User) GenerateRandomAvatar() error {
 
- 	seed := u.Email
 
- 	if seed == "" {
 
- 		seed = u.Name
 
- 	}
 
- 	img, err := avatar.RandomImage([]byte(seed))
 
- 	if err != nil {
 
- 		return fmt.Errorf("RandomImage: %v", err)
 
- 	}
 
- 	if err = os.MkdirAll(filepath.Dir(u.CustomAvatarPath()), os.ModePerm); err != nil {
 
- 		return fmt.Errorf("MkdirAll: %v", err)
 
- 	}
 
- 	fw, err := os.Create(u.CustomAvatarPath())
 
- 	if err != nil {
 
- 		return fmt.Errorf("Create: %v", err)
 
- 	}
 
- 	defer fw.Close()
 
- 	if err = png.Encode(fw, img); err != nil {
 
- 		return fmt.Errorf("Encode: %v", err)
 
- 	}
 
- 	log.Info("New random avatar created: %d", u.ID)
 
- 	return nil
 
- }
 
- // RelAvatarLink returns relative avatar link to the site domain,
 
- // which includes app sub-url as prefix. However, it is possible
 
- // to return full URL if user enables Gravatar-like service.
 
- func (u *User) RelAvatarLink() string {
 
- 	defaultImgUrl := conf.Server.Subpath + "/img/avatar_default.png"
 
- 	if u.ID == -1 {
 
- 		return defaultImgUrl
 
- 	}
 
- 	switch {
 
- 	case u.UseCustomAvatar:
 
- 		if !com.IsExist(u.CustomAvatarPath()) {
 
- 			return defaultImgUrl
 
- 		}
 
- 		return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, USER_AVATAR_URL_PREFIX, u.ID)
 
- 	case conf.Picture.DisableGravatar:
 
- 		if !com.IsExist(u.CustomAvatarPath()) {
 
- 			if err := u.GenerateRandomAvatar(); err != nil {
 
- 				log.Error("GenerateRandomAvatar: %v", err)
 
- 			}
 
- 		}
 
- 		return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, USER_AVATAR_URL_PREFIX, u.ID)
 
- 	}
 
- 	return tool.AvatarLink(u.AvatarEmail)
 
- }
 
- // AvatarLink returns user avatar absolute link.
 
- func (u *User) AvatarLink() string {
 
- 	link := u.RelAvatarLink()
 
- 	if link[0] == '/' && link[1] != '/' {
 
- 		return conf.Server.ExternalURL + strings.TrimPrefix(link, conf.Server.Subpath)[1:]
 
- 	}
 
- 	return link
 
- }
 
- // User.GetFollowers returns range of user's followers.
 
- func (u *User) GetFollowers(page int) ([]*User, error) {
 
- 	users := make([]*User, 0, ItemsPerPage)
 
- 	sess := x.Limit(ItemsPerPage, (page-1)*ItemsPerPage).Where("follow.follow_id=?", u.ID)
 
- 	if conf.UsePostgreSQL {
 
- 		sess = sess.Join("LEFT", "follow", `"user".id=follow.user_id`)
 
- 	} else {
 
- 		sess = sess.Join("LEFT", "follow", "user.id=follow.user_id")
 
- 	}
 
- 	return users, sess.Find(&users)
 
- }
 
- func (u *User) IsFollowing(followID int64) bool {
 
- 	return IsFollowing(u.ID, followID)
 
- }
 
- // GetFollowing returns range of user's following.
 
- func (u *User) GetFollowing(page int) ([]*User, error) {
 
- 	users := make([]*User, 0, ItemsPerPage)
 
- 	sess := x.Limit(ItemsPerPage, (page-1)*ItemsPerPage).Where("follow.user_id=?", u.ID)
 
- 	if conf.UsePostgreSQL {
 
- 		sess = sess.Join("LEFT", "follow", `"user".id=follow.follow_id`)
 
- 	} else {
 
- 		sess = sess.Join("LEFT", "follow", "user.id=follow.follow_id")
 
- 	}
 
- 	return users, sess.Find(&users)
 
- }
 
- // NewGitSig generates and returns the signature of given user.
 
- func (u *User) NewGitSig() *git.Signature {
 
- 	return &git.Signature{
 
- 		Name:  u.DisplayName(),
 
- 		Email: u.Email,
 
- 		When:  time.Now(),
 
- 	}
 
- }
 
- // EncodePassword encodes password to safe format.
 
- func (u *User) EncodePassword() {
 
- 	newPasswd := pbkdf2.Key([]byte(u.Passwd), []byte(u.Salt), 10000, 50, sha256.New)
 
- 	u.Passwd = fmt.Sprintf("%x", newPasswd)
 
- }
 
- // ValidatePassword checks if given password matches the one belongs to the user.
 
- func (u *User) ValidatePassword(passwd string) bool {
 
- 	newUser := &User{Passwd: passwd, Salt: u.Salt}
 
- 	newUser.EncodePassword()
 
- 	return subtle.ConstantTimeCompare([]byte(u.Passwd), []byte(newUser.Passwd)) == 1
 
- }
 
- // UploadAvatar saves custom avatar for user.
 
- // FIXME: split uploads to different subdirs in case we have massive number of users.
 
- func (u *User) UploadAvatar(data []byte) error {
 
- 	img, _, err := image.Decode(bytes.NewReader(data))
 
- 	if err != nil {
 
- 		return fmt.Errorf("decode image: %v", err)
 
- 	}
 
- 	_ = os.MkdirAll(conf.Picture.AvatarUploadPath, os.ModePerm)
 
- 	fw, err := os.Create(u.CustomAvatarPath())
 
- 	if err != nil {
 
- 		return fmt.Errorf("create custom avatar directory: %v", err)
 
- 	}
 
- 	defer fw.Close()
 
- 	m := resize.Resize(avatar.AVATAR_SIZE, avatar.AVATAR_SIZE, img, resize.NearestNeighbor)
 
- 	if err = png.Encode(fw, m); err != nil {
 
- 		return fmt.Errorf("encode image: %v", err)
 
- 	}
 
- 	return nil
 
- }
 
- // DeleteAvatar deletes the user's custom avatar.
 
- func (u *User) DeleteAvatar() error {
 
- 	log.Trace("DeleteAvatar [%d]: %s", u.ID, u.CustomAvatarPath())
 
- 	if err := os.Remove(u.CustomAvatarPath()); err != nil {
 
- 		return err
 
- 	}
 
- 	u.UseCustomAvatar = false
 
- 	return UpdateUser(u)
 
- }
 
- // IsAdminOfRepo returns true if user has admin or higher access of repository.
 
- func (u *User) IsAdminOfRepo(repo *Repository) bool {
 
- 	return Perms.Authorize(context.TODO(), u.ID, repo.ID, AccessModeAdmin,
 
- 		AccessModeOptions{
 
- 			OwnerID: repo.OwnerID,
 
- 			Private: repo.IsPrivate,
 
- 		},
 
- 	)
 
- }
 
- // IsWriterOfRepo returns true if user has write access to given repository.
 
- func (u *User) IsWriterOfRepo(repo *Repository) bool {
 
- 	return Perms.Authorize(context.TODO(), u.ID, repo.ID, AccessModeWrite,
 
- 		AccessModeOptions{
 
- 			OwnerID: repo.OwnerID,
 
- 			Private: repo.IsPrivate,
 
- 		},
 
- 	)
 
- }
 
- // IsOrganization returns true if user is actually a organization.
 
- func (u *User) IsOrganization() bool {
 
- 	return u.Type == UserOrganization
 
- }
 
- // IsUserOrgOwner returns true if user is in the owner team of given organization.
 
- func (u *User) IsUserOrgOwner(orgId int64) bool {
 
- 	return IsOrganizationOwner(orgId, u.ID)
 
- }
 
- // IsPublicMember returns true if user public his/her membership in give organization.
 
- func (u *User) IsPublicMember(orgId int64) bool {
 
- 	return IsPublicMembership(orgId, u.ID)
 
- }
 
- // IsEnabledTwoFactor returns true if user has enabled two-factor authentication.
 
- func (u *User) IsEnabledTwoFactor() bool {
 
- 	return TwoFactors.IsUserEnabled(u.ID)
 
- }
 
- func (u *User) getOrganizationCount(e Engine) (int64, error) {
 
- 	return e.Where("uid=?", u.ID).Count(new(OrgUser))
 
- }
 
- // GetOrganizationCount returns count of membership of organization of user.
 
- func (u *User) GetOrganizationCount() (int64, error) {
 
- 	return u.getOrganizationCount(x)
 
- }
 
- // GetRepositories returns repositories that user owns, including private repositories.
 
- func (u *User) GetRepositories(page, pageSize int) (err error) {
 
- 	u.Repos, err = GetUserRepositories(&UserRepoOptions{
 
- 		UserID:   u.ID,
 
- 		Private:  true,
 
- 		Page:     page,
 
- 		PageSize: pageSize,
 
- 	})
 
- 	return err
 
- }
 
- // GetRepositories returns mirror repositories that user owns, including private repositories.
 
- func (u *User) GetMirrorRepositories() ([]*Repository, error) {
 
- 	return GetUserMirrorRepositories(u.ID)
 
- }
 
- // GetOwnedOrganizations returns all organizations that user owns.
 
- func (u *User) GetOwnedOrganizations() (err error) {
 
- 	u.OwnedOrgs, err = GetOwnedOrgsByUserID(u.ID)
 
- 	return err
 
- }
 
- // GetOrganizations returns all organizations that user belongs to.
 
- func (u *User) GetOrganizations(showPrivate bool) error {
 
- 	orgIDs, err := GetOrgIDsByUserID(u.ID, showPrivate)
 
- 	if err != nil {
 
- 		return fmt.Errorf("GetOrgIDsByUserID: %v", err)
 
- 	}
 
- 	if len(orgIDs) == 0 {
 
- 		return nil
 
- 	}
 
- 	u.Orgs = make([]*User, 0, len(orgIDs))
 
- 	if err = x.Where("type = ?", UserOrganization).In("id", orgIDs).Find(&u.Orgs); err != nil {
 
- 		return err
 
- 	}
 
- 	return nil
 
- }
 
- // DisplayName returns full name if it's not empty,
 
- // returns username otherwise.
 
- func (u *User) DisplayName() string {
 
- 	if len(u.FullName) > 0 {
 
- 		return u.FullName
 
- 	}
 
- 	return u.Name
 
- }
 
- func (u *User) ShortName(length int) string {
 
- 	return tool.EllipsisString(u.Name, length)
 
- }
 
- // IsMailable checks if a user is eligible
 
- // to receive emails.
 
- func (u *User) IsMailable() bool {
 
- 	return u.IsActive
 
- }
 
- // IsUserExist checks if given user name exist,
 
- // the user name should be noncased unique.
 
- // If uid is presented, then check will rule out that one,
 
- // it is used when update a user name in settings page.
 
- func IsUserExist(uid int64, name string) (bool, error) {
 
- 	if name == "" {
 
- 		return false, nil
 
- 	}
 
- 	return x.Where("id != ?", uid).Get(&User{LowerName: strings.ToLower(name)})
 
- }
 
- // GetUserSalt returns a random user salt token.
 
- func GetUserSalt() (string, error) {
 
- 	return strutil.RandomChars(10)
 
- }
 
- // NewGhostUser creates and returns a fake user for someone who has deleted his/her account.
 
- func NewGhostUser() *User {
 
- 	return &User{
 
- 		ID:        -1,
 
- 		Name:      "Ghost",
 
- 		LowerName: "ghost",
 
- 	}
 
- }
 
- var (
 
- 	reservedUsernames    = []string{"-", "explore", "create", "assets", "css", "img", "js", "less", "plugins", "debug", "raw", "install", "api", "avatar", "user", "org", "help", "stars", "issues", "pulls", "commits", "repo", "template", "admin", "new", ".", ".."}
 
- 	reservedUserPatterns = []string{"*.keys"}
 
- )
 
- type ErrNameNotAllowed struct {
 
- 	args errutil.Args
 
- }
 
- func IsErrNameNotAllowed(err error) bool {
 
- 	_, ok := err.(ErrNameNotAllowed)
 
- 	return ok
 
- }
 
- func (err ErrNameNotAllowed) Value() string {
 
- 	val, ok := err.args["name"].(string)
 
- 	if ok {
 
- 		return val
 
- 	}
 
- 	val, ok = err.args["pattern"].(string)
 
- 	if ok {
 
- 		return val
 
- 	}
 
- 	return "<value not found>"
 
- }
 
- func (err ErrNameNotAllowed) Error() string {
 
- 	return fmt.Sprintf("name is not allowed: %v", err.args)
 
- }
 
- // isNameAllowed checks if name is reserved or pattern of name is not allowed
 
- // based on given reserved names and patterns.
 
- // Names are exact match, patterns can be prefix or suffix match with placeholder '*'.
 
- func isNameAllowed(names, patterns []string, name string) error {
 
- 	name = strings.TrimSpace(strings.ToLower(name))
 
- 	if utf8.RuneCountInString(name) == 0 {
 
- 		return ErrNameNotAllowed{args: errutil.Args{"reason": "empty name"}}
 
- 	}
 
- 	for i := range names {
 
- 		if name == names[i] {
 
- 			return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "name": name}}
 
- 		}
 
- 	}
 
- 	for _, pat := range patterns {
 
- 		if pat[0] == '*' && strings.HasSuffix(name, pat[1:]) ||
 
- 			(pat[len(pat)-1] == '*' && strings.HasPrefix(name, pat[:len(pat)-1])) {
 
- 			return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "pattern": pat}}
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- // isUsernameAllowed return an error if given name is a reserved name or pattern for users.
 
- func isUsernameAllowed(name string) error {
 
- 	return isNameAllowed(reservedUsernames, reservedUserPatterns, name)
 
- }
 
- // CreateUser creates record of a new user.
 
- // Deprecated: Use Users.Create instead.
 
- func CreateUser(u *User) (err error) {
 
- 	if err = isUsernameAllowed(u.Name); err != nil {
 
- 		return err
 
- 	}
 
- 	isExist, err := IsUserExist(0, u.Name)
 
- 	if err != nil {
 
- 		return err
 
- 	} else if isExist {
 
- 		return ErrUserAlreadyExist{args: errutil.Args{"name": u.Name}}
 
- 	}
 
- 	u.Email = strings.ToLower(u.Email)
 
- 	isExist, err = IsEmailUsed(u.Email)
 
- 	if err != nil {
 
- 		return err
 
- 	} else if isExist {
 
- 		return ErrEmailAlreadyUsed{args: errutil.Args{"email": u.Email}}
 
- 	}
 
- 	u.LowerName = strings.ToLower(u.Name)
 
- 	u.AvatarEmail = u.Email
 
- 	u.Avatar = tool.HashEmail(u.AvatarEmail)
 
- 	if u.Rands, err = GetUserSalt(); err != nil {
 
- 		return err
 
- 	}
 
- 	if u.Salt, err = GetUserSalt(); err != nil {
 
- 		return err
 
- 	}
 
- 	u.EncodePassword()
 
- 	u.MaxRepoCreation = -1
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Insert(u); err != nil {
 
- 		return err
 
- 	} else if err = os.MkdirAll(UserPath(u.Name), os.ModePerm); err != nil {
 
- 		return err
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- func countUsers(e Engine) int64 {
 
- 	count, _ := e.Where("type=0").Count(new(User))
 
- 	return count
 
- }
 
- // CountUsers returns number of users.
 
- func CountUsers() int64 {
 
- 	return countUsers(x)
 
- }
 
- // Users returns number of users in given page.
 
- func ListUsers(page, pageSize int) ([]*User, error) {
 
- 	users := make([]*User, 0, pageSize)
 
- 	return users, x.Limit(pageSize, (page-1)*pageSize).Where("type=0").Asc("id").Find(&users)
 
- }
 
- // parseUserFromCode returns user by username encoded in code.
 
- // It returns nil if code or username is invalid.
 
- func parseUserFromCode(code string) (user *User) {
 
- 	if len(code) <= tool.TIME_LIMIT_CODE_LENGTH {
 
- 		return nil
 
- 	}
 
- 	// Use tail hex username to query user
 
- 	hexStr := code[tool.TIME_LIMIT_CODE_LENGTH:]
 
- 	if b, err := hex.DecodeString(hexStr); err == nil {
 
- 		if user, err = GetUserByName(string(b)); user != nil {
 
- 			return user
 
- 		} else if !IsErrUserNotExist(err) {
 
- 			log.Error("Failed to get user by name %q: %v", string(b), err)
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- // verify active code when active account
 
- func VerifyUserActiveCode(code string) (user *User) {
 
- 	minutes := conf.Auth.ActivateCodeLives
 
- 	if user = parseUserFromCode(code); user != nil {
 
- 		// time limit code
 
- 		prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
 
- 		data := com.ToStr(user.ID) + user.Email + user.LowerName + user.Passwd + user.Rands
 
- 		if tool.VerifyTimeLimitCode(data, minutes, prefix) {
 
- 			return user
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- // verify active code when active account
 
- func VerifyActiveEmailCode(code, email string) *EmailAddress {
 
- 	minutes := conf.Auth.ActivateCodeLives
 
- 	if user := parseUserFromCode(code); user != nil {
 
- 		// time limit code
 
- 		prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
 
- 		data := com.ToStr(user.ID) + email + user.LowerName + user.Passwd + user.Rands
 
- 		if tool.VerifyTimeLimitCode(data, minutes, prefix) {
 
- 			emailAddress := &EmailAddress{Email: email}
 
- 			if has, _ := x.Get(emailAddress); has {
 
- 				return emailAddress
 
- 			}
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- // ChangeUserName changes all corresponding setting from old user name to new one.
 
- func ChangeUserName(u *User, newUserName string) (err error) {
 
- 	if err = isUsernameAllowed(newUserName); err != nil {
 
- 		return err
 
- 	}
 
- 	isExist, err := IsUserExist(0, newUserName)
 
- 	if err != nil {
 
- 		return err
 
- 	} else if isExist {
 
- 		return ErrUserAlreadyExist{args: errutil.Args{"name": newUserName}}
 
- 	}
 
- 	if err = ChangeUsernameInPullRequests(u.Name, newUserName); err != nil {
 
- 		return fmt.Errorf("ChangeUsernameInPullRequests: %v", err)
 
- 	}
 
- 	// Delete all local copies of repositories and wikis the user owns.
 
- 	if err = x.Where("owner_id=?", u.ID).Iterate(new(Repository), func(idx int, bean interface{}) error {
 
- 		repo := bean.(*Repository)
 
- 		deleteRepoLocalCopy(repo)
 
- 		// TODO: By the same reasoning, shouldn't we also sync access to the local wiki path?
 
- 		RemoveAllWithNotice("Delete repository wiki local copy", repo.LocalWikiPath())
 
- 		return nil
 
- 	}); err != nil {
 
- 		return fmt.Errorf("delete repository and wiki local copy: %v", err)
 
- 	}
 
- 	// Rename or create user base directory
 
- 	baseDir := UserPath(u.Name)
 
- 	newBaseDir := UserPath(newUserName)
 
- 	if com.IsExist(baseDir) {
 
- 		return os.Rename(baseDir, newBaseDir)
 
- 	}
 
- 	return os.MkdirAll(newBaseDir, os.ModePerm)
 
- }
 
- func updateUser(e Engine, u *User) error {
 
- 	// Organization does not need email
 
- 	if !u.IsOrganization() {
 
- 		u.Email = strings.ToLower(u.Email)
 
- 		has, err := e.Where("id!=?", u.ID).And("type=?", u.Type).And("email=?", u.Email).Get(new(User))
 
- 		if err != nil {
 
- 			return err
 
- 		} else if has {
 
- 			return ErrEmailAlreadyUsed{args: errutil.Args{"email": u.Email}}
 
- 		}
 
- 		if u.AvatarEmail == "" {
 
- 			u.AvatarEmail = u.Email
 
- 		}
 
- 		u.Avatar = tool.HashEmail(u.AvatarEmail)
 
- 	}
 
- 	u.LowerName = strings.ToLower(u.Name)
 
- 	u.Location = tool.TruncateString(u.Location, 255)
 
- 	u.Website = tool.TruncateString(u.Website, 255)
 
- 	u.Description = tool.TruncateString(u.Description, 255)
 
- 	_, err := e.ID(u.ID).AllCols().Update(u)
 
- 	return err
 
- }
 
- // UpdateUser updates user's information.
 
- func UpdateUser(u *User) error {
 
- 	return updateUser(x, u)
 
- }
 
- // deleteBeans deletes all given beans, beans should contain delete conditions.
 
- func deleteBeans(e Engine, beans ...interface{}) (err error) {
 
- 	for i := range beans {
 
- 		if _, err = e.Delete(beans[i]); err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- // FIXME: need some kind of mechanism to record failure. HINT: system notice
 
- func deleteUser(e *xorm.Session, u *User) error {
 
- 	// Note: A user owns any repository or belongs to any organization
 
- 	//	cannot perform delete operation.
 
- 	// Check ownership of repository.
 
- 	count, err := getRepositoryCount(e, u)
 
- 	if err != nil {
 
- 		return fmt.Errorf("GetRepositoryCount: %v", err)
 
- 	} else if count > 0 {
 
- 		return ErrUserOwnRepos{UID: u.ID}
 
- 	}
 
- 	// Check membership of organization.
 
- 	count, err = u.getOrganizationCount(e)
 
- 	if err != nil {
 
- 		return fmt.Errorf("GetOrganizationCount: %v", err)
 
- 	} else if count > 0 {
 
- 		return ErrUserHasOrgs{UID: u.ID}
 
- 	}
 
- 	// ***** START: Watch *****
 
- 	watches := make([]*Watch, 0, 10)
 
- 	if err = e.Find(&watches, &Watch{UserID: u.ID}); err != nil {
 
- 		return fmt.Errorf("get all watches: %v", err)
 
- 	}
 
- 	for i := range watches {
 
- 		if _, err = e.Exec("UPDATE `repository` SET num_watches=num_watches-1 WHERE id=?", watches[i].RepoID); err != nil {
 
- 			return fmt.Errorf("decrease repository watch number[%d]: %v", watches[i].RepoID, err)
 
- 		}
 
- 	}
 
- 	// ***** END: Watch *****
 
- 	// ***** START: Star *****
 
- 	stars := make([]*Star, 0, 10)
 
- 	if err = e.Find(&stars, &Star{UID: u.ID}); err != nil {
 
- 		return fmt.Errorf("get all stars: %v", err)
 
- 	}
 
- 	for i := range stars {
 
- 		if _, err = e.Exec("UPDATE `repository` SET num_stars=num_stars-1 WHERE id=?", stars[i].RepoID); err != nil {
 
- 			return fmt.Errorf("decrease repository star number[%d]: %v", stars[i].RepoID, err)
 
- 		}
 
- 	}
 
- 	// ***** END: Star *****
 
- 	// ***** START: Follow *****
 
- 	followers := make([]*Follow, 0, 10)
 
- 	if err = e.Find(&followers, &Follow{UserID: u.ID}); err != nil {
 
- 		return fmt.Errorf("get all followers: %v", err)
 
- 	}
 
- 	for i := range followers {
 
- 		if _, err = e.Exec("UPDATE `user` SET num_followers=num_followers-1 WHERE id=?", followers[i].UserID); err != nil {
 
- 			return fmt.Errorf("decrease user follower number[%d]: %v", followers[i].UserID, err)
 
- 		}
 
- 	}
 
- 	// ***** END: Follow *****
 
- 	if err = deleteBeans(e,
 
- 		&AccessToken{UserID: u.ID},
 
- 		&Collaboration{UserID: u.ID},
 
- 		&Access{UserID: u.ID},
 
- 		&Watch{UserID: u.ID},
 
- 		&Star{UID: u.ID},
 
- 		&Follow{FollowID: u.ID},
 
- 		&Action{UserID: u.ID},
 
- 		&IssueUser{UID: u.ID},
 
- 		&EmailAddress{UID: u.ID},
 
- 	); err != nil {
 
- 		return fmt.Errorf("deleteBeans: %v", err)
 
- 	}
 
- 	// ***** START: PublicKey *****
 
- 	keys := make([]*PublicKey, 0, 10)
 
- 	if err = e.Find(&keys, &PublicKey{OwnerID: u.ID}); err != nil {
 
- 		return fmt.Errorf("get all public keys: %v", err)
 
- 	}
 
- 	keyIDs := make([]int64, len(keys))
 
- 	for i := range keys {
 
- 		keyIDs[i] = keys[i].ID
 
- 	}
 
- 	if err = deletePublicKeys(e, keyIDs...); err != nil {
 
- 		return fmt.Errorf("deletePublicKeys: %v", err)
 
- 	}
 
- 	// ***** END: PublicKey *****
 
- 	// Clear assignee.
 
- 	if _, err = e.Exec("UPDATE `issue` SET assignee_id=0 WHERE assignee_id=?", u.ID); err != nil {
 
- 		return fmt.Errorf("clear assignee: %v", err)
 
- 	}
 
- 	if _, err = e.ID(u.ID).Delete(new(User)); err != nil {
 
- 		return fmt.Errorf("Delete: %v", err)
 
- 	}
 
- 	// FIXME: system notice
 
- 	// Note: There are something just cannot be roll back,
 
- 	//	so just keep error logs of those operations.
 
- 	_ = os.RemoveAll(UserPath(u.Name))
 
- 	_ = os.Remove(u.CustomAvatarPath())
 
- 	return nil
 
- }
 
- // DeleteUser completely and permanently deletes everything of a user,
 
- // but issues/comments/pulls will be kept and shown as someone has been deleted.
 
- func DeleteUser(u *User) (err error) {
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if err = deleteUser(sess, u); err != nil {
 
- 		// Note: don't wrapper error here.
 
- 		return err
 
- 	}
 
- 	if err = sess.Commit(); err != nil {
 
- 		return err
 
- 	}
 
- 	return RewriteAuthorizedKeys()
 
- }
 
- // DeleteInactivateUsers deletes all inactivate users and email addresses.
 
- func DeleteInactivateUsers() (err error) {
 
- 	users := make([]*User, 0, 10)
 
- 	if err = x.Where("is_active = ?", false).Find(&users); err != nil {
 
- 		return fmt.Errorf("get all inactive users: %v", err)
 
- 	}
 
- 	// FIXME: should only update authorized_keys file once after all deletions.
 
- 	for _, u := range users {
 
- 		if err = DeleteUser(u); err != nil {
 
- 			// Ignore users that were set inactive by admin.
 
- 			if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {
 
- 				continue
 
- 			}
 
- 			return err
 
- 		}
 
- 	}
 
- 	_, err = x.Where("is_activated = ?", false).Delete(new(EmailAddress))
 
- 	return err
 
- }
 
- // UserPath returns the path absolute path of user repositories.
 
- func UserPath(username string) string {
 
- 	return filepath.Join(conf.Repository.Root, strings.ToLower(username))
 
- }
 
- func GetUserByKeyID(keyID int64) (*User, error) {
 
- 	user := new(User)
 
- 	has, err := x.SQL("SELECT a.* FROM `user` AS a, public_key AS b WHERE a.id = b.owner_id AND b.id=?", keyID).Get(user)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	} else if !has {
 
- 		return nil, errors.UserNotKeyOwner{KeyID: keyID}
 
- 	}
 
- 	return user, nil
 
- }
 
- func getUserByID(e Engine, id int64) (*User, error) {
 
- 	u := new(User)
 
- 	has, err := e.ID(id).Get(u)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	} else if !has {
 
- 		return nil, ErrUserNotExist{args: map[string]interface{}{"userID": id}}
 
- 	}
 
- 	return u, nil
 
- }
 
- // GetUserByID returns the user object by given ID if exists.
 
- // Deprecated: Use Users.GetByID instead.
 
- func GetUserByID(id int64) (*User, error) {
 
- 	return getUserByID(x, id)
 
- }
 
- // GetAssigneeByID returns the user with read access of repository by given ID.
 
- func GetAssigneeByID(repo *Repository, userID int64) (*User, error) {
 
- 	ctx := context.TODO()
 
- 	if !Perms.Authorize(ctx, userID, repo.ID, AccessModeRead,
 
- 		AccessModeOptions{
 
- 			OwnerID: repo.OwnerID,
 
- 			Private: repo.IsPrivate,
 
- 		},
 
- 	) {
 
- 		return nil, ErrUserNotExist{args: map[string]interface{}{"userID": userID}}
 
- 	}
 
- 	return Users.GetByID(ctx, userID)
 
- }
 
- // GetUserByName returns a user by given name.
 
- // Deprecated: Use Users.GetByUsername instead.
 
- func GetUserByName(name string) (*User, error) {
 
- 	if name == "" {
 
- 		return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}
 
- 	}
 
- 	u := &User{LowerName: strings.ToLower(name)}
 
- 	has, err := x.Get(u)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	} else if !has {
 
- 		return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}
 
- 	}
 
- 	return u, nil
 
- }
 
- // GetUserEmailsByNames returns a list of e-mails corresponds to names.
 
- func GetUserEmailsByNames(names []string) []string {
 
- 	mails := make([]string, 0, len(names))
 
- 	for _, name := range names {
 
- 		u, err := GetUserByName(name)
 
- 		if err != nil {
 
- 			continue
 
- 		}
 
- 		if u.IsMailable() {
 
- 			mails = append(mails, u.Email)
 
- 		}
 
- 	}
 
- 	return mails
 
- }
 
- // GetUserIDsByNames returns a slice of ids corresponds to names.
 
- func GetUserIDsByNames(names []string) []int64 {
 
- 	ids := make([]int64, 0, len(names))
 
- 	for _, name := range names {
 
- 		u, err := GetUserByName(name)
 
- 		if err != nil {
 
- 			continue
 
- 		}
 
- 		ids = append(ids, u.ID)
 
- 	}
 
- 	return ids
 
- }
 
- // UserCommit represents a commit with validation of user.
 
- type UserCommit struct {
 
- 	User *User
 
- 	*git.Commit
 
- }
 
- // ValidateCommitWithEmail checks if author's e-mail of commit is corresponding to a user.
 
- func ValidateCommitWithEmail(c *git.Commit) *User {
 
- 	u, err := GetUserByEmail(c.Author.Email)
 
- 	if err != nil {
 
- 		return nil
 
- 	}
 
- 	return u
 
- }
 
- // ValidateCommitsWithEmails checks if authors' e-mails of commits are corresponding to users.
 
- func ValidateCommitsWithEmails(oldCommits []*git.Commit) []*UserCommit {
 
- 	emails := make(map[string]*User)
 
- 	newCommits := make([]*UserCommit, len(oldCommits))
 
- 	for i := range oldCommits {
 
- 		var u *User
 
- 		if v, ok := emails[oldCommits[i].Author.Email]; !ok {
 
- 			u, _ = GetUserByEmail(oldCommits[i].Author.Email)
 
- 			emails[oldCommits[i].Author.Email] = u
 
- 		} else {
 
- 			u = v
 
- 		}
 
- 		newCommits[i] = &UserCommit{
 
- 			User:   u,
 
- 			Commit: oldCommits[i],
 
- 		}
 
- 	}
 
- 	return newCommits
 
- }
 
- // GetUserByEmail returns the user object by given e-mail if exists.
 
- // Deprecated: Use Users.GetByEmail instead.
 
- func GetUserByEmail(email string) (*User, error) {
 
- 	if email == "" {
 
- 		return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}
 
- 	}
 
- 	email = strings.ToLower(email)
 
- 	// First try to find the user by primary email
 
- 	user := &User{Email: email}
 
- 	has, err := x.Get(user)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	if has {
 
- 		return user, nil
 
- 	}
 
- 	// Otherwise, check in alternative list for activated email addresses
 
- 	emailAddress := &EmailAddress{Email: email, IsActivated: true}
 
- 	has, err = x.Get(emailAddress)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	if has {
 
- 		return GetUserByID(emailAddress.UID)
 
- 	}
 
- 	return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}
 
- }
 
- type SearchUserOptions struct {
 
- 	Keyword  string
 
- 	Type     UserType
 
- 	OrderBy  string
 
- 	Page     int
 
- 	PageSize int // Can be smaller than or equal to setting.UI.ExplorePagingNum
 
- }
 
- // SearchUserByName takes keyword and part of user name to search,
 
- // it returns results in given range and number of total results.
 
- func SearchUserByName(opts *SearchUserOptions) (users []*User, _ int64, _ error) {
 
- 	if opts.Keyword == "" {
 
- 		return users, 0, nil
 
- 	}
 
- 	opts.Keyword = strings.ToLower(opts.Keyword)
 
- 	if opts.PageSize <= 0 || opts.PageSize > conf.UI.ExplorePagingNum {
 
- 		opts.PageSize = conf.UI.ExplorePagingNum
 
- 	}
 
- 	if opts.Page <= 0 {
 
- 		opts.Page = 1
 
- 	}
 
- 	searchQuery := "%" + opts.Keyword + "%"
 
- 	users = make([]*User, 0, opts.PageSize)
 
- 	// Append conditions
 
- 	sess := x.Where("LOWER(lower_name) LIKE ?", searchQuery).
 
- 		Or("LOWER(full_name) LIKE ?", searchQuery).
 
- 		And("type = ?", opts.Type)
 
- 	countSess := *sess
 
- 	count, err := countSess.Count(new(User))
 
- 	if err != nil {
 
- 		return nil, 0, fmt.Errorf("Count: %v", err)
 
- 	}
 
- 	if len(opts.OrderBy) > 0 {
 
- 		sess.OrderBy(opts.OrderBy)
 
- 	}
 
- 	return users, count, sess.Limit(opts.PageSize, (opts.Page-1)*opts.PageSize).Find(&users)
 
- }
 
- // ___________    .__  .__
 
- // \_   _____/___ |  | |  |   ______  _  __
 
- //  |    __)/  _ \|  | |  |  /  _ \ \/ \/ /
 
- //  |     \(  <_> )  |_|  |_(  <_> )     /
 
- //  \___  / \____/|____/____/\____/ \/\_/
 
- //      \/
 
- // Follow represents relations of user and his/her followers.
 
- type Follow struct {
 
- 	ID       int64
 
- 	UserID   int64 `xorm:"UNIQUE(follow)"`
 
- 	FollowID int64 `xorm:"UNIQUE(follow)"`
 
- }
 
- func IsFollowing(userID, followID int64) bool {
 
- 	has, _ := x.Get(&Follow{UserID: userID, FollowID: followID})
 
- 	return has
 
- }
 
- // FollowUser marks someone be another's follower.
 
- func FollowUser(userID, followID int64) (err error) {
 
- 	if userID == followID || IsFollowing(userID, followID) {
 
- 		return nil
 
- 	}
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Insert(&Follow{UserID: userID, FollowID: followID}); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Exec("UPDATE `user` SET num_followers = num_followers + 1 WHERE id = ?", followID); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Exec("UPDATE `user` SET num_following = num_following + 1 WHERE id = ?", userID); err != nil {
 
- 		return err
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- // UnfollowUser unmarks someone be another's follower.
 
- func UnfollowUser(userID, followID int64) (err error) {
 
- 	if userID == followID || !IsFollowing(userID, followID) {
 
- 		return nil
 
- 	}
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Delete(&Follow{UserID: userID, FollowID: followID}); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Exec("UPDATE `user` SET num_followers = num_followers - 1 WHERE id = ?", followID); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Exec("UPDATE `user` SET num_following = num_following - 1 WHERE id = ?", userID); err != nil {
 
- 		return err
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- // GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
 
- func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
 
- 	accesses := make([]*Access, 0, 10)
 
- 	if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {
 
- 		return nil, err
 
- 	}
 
- 	repos := make(map[*Repository]AccessMode, len(accesses))
 
- 	for _, access := range accesses {
 
- 		repo, err := GetRepositoryByID(access.RepoID)
 
- 		if err != nil {
 
- 			if IsErrRepoNotExist(err) {
 
- 				log.Error("Failed to get repository by ID: %v", err)
 
- 				continue
 
- 			}
 
- 			return nil, err
 
- 		}
 
- 		if repo.OwnerID == u.ID {
 
- 			continue
 
- 		}
 
- 		repos[repo] = access.Mode
 
- 	}
 
- 	return repos, nil
 
- }
 
- // GetAccessibleRepositories finds repositories which the user has access but does not own.
 
- // If limit is smaller than 1 means returns all found results.
 
- func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
 
- 	sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix")
 
- 	if limit > 0 {
 
- 		sess.Limit(limit)
 
- 		repos = make([]*Repository, 0, limit)
 
- 	} else {
 
- 		repos = make([]*Repository, 0, 10)
 
- 	}
 
- 	return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos)
 
- }
 
 
  |