| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190 | // Copyright 2014 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package dbimport (	"bytes"	"crypto/sha256"	"crypto/subtle"	"encoding/hex"	"fmt"	"image"	_ "image/jpeg"	"image/png"	"os"	"path/filepath"	"strings"	"time"	"unicode/utf8"	"github.com/nfnt/resize"	"github.com/unknwon/com"	"golang.org/x/crypto/pbkdf2"	log "unknwon.dev/clog/v2"	"xorm.io/xorm"	"github.com/gogs/git-module"	api "github.com/gogs/go-gogs-client"	"gogs.io/gogs/internal/avatar"	"gogs.io/gogs/internal/conf"	"gogs.io/gogs/internal/db/errors"	"gogs.io/gogs/internal/errutil"	"gogs.io/gogs/internal/strutil"	"gogs.io/gogs/internal/tool")// USER_AVATAR_URL_PREFIX is used to identify a URL is to access user avatar.const USER_AVATAR_URL_PREFIX = "avatars"type UserType intconst (	USER_TYPE_INDIVIDUAL UserType = iota // Historic reason to make it starts at 0.	USER_TYPE_ORGANIZATION)// User represents the object of individual and member of organization.type User struct {	ID        int64	LowerName string `xorm:"UNIQUE NOT NULL" gorm:"UNIQUE"`	Name      string `xorm:"UNIQUE NOT NULL" gorm:"NOT NULL"`	FullName  string	// Email is the primary email address (to be used for communication)	Email       string `xorm:"NOT NULL" gorm:"NOT NULL"`	Passwd      string `xorm:"NOT NULL" gorm:"NOT NULL"`	LoginType   LoginType	LoginSource int64 `xorm:"NOT NULL DEFAULT 0" gorm:"NOT NULL;DEFAULT:0"`	LoginName   string	Type        UserType	OwnedOrgs   []*User       `xorm:"-" gorm:"-" json:"-"`	Orgs        []*User       `xorm:"-" gorm:"-" json:"-"`	Repos       []*Repository `xorm:"-" gorm:"-" json:"-"`	Location    string	Website     string	Rands       string `xorm:"VARCHAR(10)" gorm:"TYPE:VARCHAR(10)"`	Salt        string `xorm:"VARCHAR(10)" gorm:"TYPE:VARCHAR(10)"`	Created     time.Time `xorm:"-" gorm:"-" json:"-"`	CreatedUnix int64	Updated     time.Time `xorm:"-" gorm:"-" json:"-"`	UpdatedUnix int64	// Remember visibility choice for convenience, true for private	LastRepoVisibility bool	// Maximum repository creation limit, -1 means use global default	MaxRepoCreation int `xorm:"NOT NULL DEFAULT -1" gorm:"NOT NULL;DEFAULT:-1"`	// Permissions	IsActive         bool // Activate primary email	IsAdmin          bool	AllowGitHook     bool	AllowImportLocal bool // Allow migrate repository by local path	ProhibitLogin    bool	// Avatar	Avatar          string `xorm:"VARCHAR(2048) NOT NULL" gorm:"TYPE:VARCHAR(2048);NOT NULL"`	AvatarEmail     string `xorm:"NOT NULL" gorm:"NOT NULL"`	UseCustomAvatar bool	// Counters	NumFollowers int	NumFollowing int `xorm:"NOT NULL DEFAULT 0" gorm:"NOT NULL;DEFAULT:0"`	NumStars     int	NumRepos     int	// For organization	Description string	NumTeams    int	NumMembers  int	Teams       []*Team `xorm:"-" gorm:"-" json:"-"`	Members     []*User `xorm:"-" gorm:"-" json:"-"`}func (u *User) BeforeInsert() {	u.CreatedUnix = time.Now().Unix()	u.UpdatedUnix = u.CreatedUnix}func (u *User) BeforeUpdate() {	if u.MaxRepoCreation < -1 {		u.MaxRepoCreation = -1	}	u.UpdatedUnix = time.Now().Unix()}func (u *User) AfterSet(colName string, _ xorm.Cell) {	switch colName {	case "created_unix":		u.Created = time.Unix(u.CreatedUnix, 0).Local()	case "updated_unix":		u.Updated = time.Unix(u.UpdatedUnix, 0).Local()	}}// IDStr returns string representation of user's ID.func (u *User) IDStr() string {	return com.ToStr(u.ID)}func (u *User) APIFormat() *api.User {	return &api.User{		ID:        u.ID,		UserName:  u.Name,		Login:     u.Name,		FullName:  u.FullName,		Email:     u.Email,		AvatarUrl: u.AvatarLink(),	}}// returns true if user login type is LoginPlain.func (u *User) IsLocal() bool {	return u.LoginType <= LoginPlain}// HasForkedRepo checks if user has already forked a repository with given ID.func (u *User) HasForkedRepo(repoID int64) bool {	_, has, _ := HasForkedRepo(u.ID, repoID)	return has}func (u *User) RepoCreationNum() int {	if u.MaxRepoCreation <= -1 {		return conf.Repository.MaxCreationLimit	}	return u.MaxRepoCreation}func (u *User) CanCreateRepo() bool {	if u.MaxRepoCreation <= -1 {		if conf.Repository.MaxCreationLimit <= -1 {			return true		}		return u.NumRepos < conf.Repository.MaxCreationLimit	}	return u.NumRepos < u.MaxRepoCreation}func (u *User) CanCreateOrganization() bool {	return !conf.Admin.DisableRegularOrgCreation || u.IsAdmin}// CanEditGitHook returns true if user can edit Git hooks.func (u *User) CanEditGitHook() bool {	return u.IsAdmin || u.AllowGitHook}// CanImportLocal returns true if user can migrate repository by local path.func (u *User) CanImportLocal() bool {	return conf.Repository.EnableLocalPathMigration && (u.IsAdmin || u.AllowImportLocal)}// DashboardLink returns the user dashboard page link.func (u *User) DashboardLink() string {	if u.IsOrganization() {		return conf.Server.Subpath + "/org/" + u.Name + "/dashboard/"	}	return conf.Server.Subpath + "/"}// HomeLink returns the user or organization home page link.func (u *User) HomeLink() string {	return conf.Server.Subpath + "/" + u.Name}func (u *User) HTMLURL() string {	return conf.Server.ExternalURL + u.Name}// GenerateEmailActivateCode generates an activate code based on user information and given e-mail.func (u *User) GenerateEmailActivateCode(email string) string {	code := tool.CreateTimeLimitCode(		com.ToStr(u.ID)+email+u.LowerName+u.Passwd+u.Rands,		conf.Auth.ActivateCodeLives, nil)	// Add tail hex username	code += hex.EncodeToString([]byte(u.LowerName))	return code}// GenerateActivateCode generates an activate code based on user information.func (u *User) GenerateActivateCode() string {	return u.GenerateEmailActivateCode(u.Email)}// CustomAvatarPath returns user custom avatar file path.func (u *User) CustomAvatarPath() string {	return filepath.Join(conf.Picture.AvatarUploadPath, com.ToStr(u.ID))}// GenerateRandomAvatar generates a random avatar for user.func (u *User) GenerateRandomAvatar() error {	seed := u.Email	if len(seed) == 0 {		seed = u.Name	}	img, err := avatar.RandomImage([]byte(seed))	if err != nil {		return fmt.Errorf("RandomImage: %v", err)	}	if err = os.MkdirAll(filepath.Dir(u.CustomAvatarPath()), os.ModePerm); err != nil {		return fmt.Errorf("MkdirAll: %v", err)	}	fw, err := os.Create(u.CustomAvatarPath())	if err != nil {		return fmt.Errorf("Create: %v", err)	}	defer fw.Close()	if err = png.Encode(fw, img); err != nil {		return fmt.Errorf("Encode: %v", err)	}	log.Info("New random avatar created: %d", u.ID)	return nil}// RelAvatarLink returns relative avatar link to the site domain,// which includes app sub-url as prefix. However, it is possible// to return full URL if user enables Gravatar-like service.func (u *User) RelAvatarLink() string {	defaultImgUrl := conf.Server.Subpath + "/img/avatar_default.png"	if u.ID == -1 {		return defaultImgUrl	}	switch {	case u.UseCustomAvatar:		if !com.IsExist(u.CustomAvatarPath()) {			return defaultImgUrl		}		return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, USER_AVATAR_URL_PREFIX, u.ID)	case conf.Picture.DisableGravatar:		if !com.IsExist(u.CustomAvatarPath()) {			if err := u.GenerateRandomAvatar(); err != nil {				log.Error("GenerateRandomAvatar: %v", err)			}		}		return fmt.Sprintf("%s/%s/%d", conf.Server.Subpath, USER_AVATAR_URL_PREFIX, u.ID)	}	return tool.AvatarLink(u.AvatarEmail)}// AvatarLink returns user avatar absolute link.func (u *User) AvatarLink() string {	link := u.RelAvatarLink()	if link[0] == '/' && link[1] != '/' {		return conf.Server.ExternalURL + strings.TrimPrefix(link, conf.Server.Subpath)[1:]	}	return link}// User.GetFollwoers returns range of user's followers.func (u *User) GetFollowers(page int) ([]*User, error) {	users := make([]*User, 0, ItemsPerPage)	sess := x.Limit(ItemsPerPage, (page-1)*ItemsPerPage).Where("follow.follow_id=?", u.ID)	if conf.UsePostgreSQL {		sess = sess.Join("LEFT", "follow", `"user".id=follow.user_id`)	} else {		sess = sess.Join("LEFT", "follow", "user.id=follow.user_id")	}	return users, sess.Find(&users)}func (u *User) IsFollowing(followID int64) bool {	return IsFollowing(u.ID, followID)}// GetFollowing returns range of user's following.func (u *User) GetFollowing(page int) ([]*User, error) {	users := make([]*User, 0, ItemsPerPage)	sess := x.Limit(ItemsPerPage, (page-1)*ItemsPerPage).Where("follow.user_id=?", u.ID)	if conf.UsePostgreSQL {		sess = sess.Join("LEFT", "follow", `"user".id=follow.follow_id`)	} else {		sess = sess.Join("LEFT", "follow", "user.id=follow.follow_id")	}	return users, sess.Find(&users)}// NewGitSig generates and returns the signature of given user.func (u *User) NewGitSig() *git.Signature {	return &git.Signature{		Name:  u.DisplayName(),		Email: u.Email,		When:  time.Now(),	}}// EncodePasswd encodes password to safe format.func (u *User) EncodePasswd() {	newPasswd := pbkdf2.Key([]byte(u.Passwd), []byte(u.Salt), 10000, 50, sha256.New)	u.Passwd = fmt.Sprintf("%x", newPasswd)}// ValidatePassword checks if given password matches the one belongs to the user.func (u *User) ValidatePassword(passwd string) bool {	newUser := &User{Passwd: passwd, Salt: u.Salt}	newUser.EncodePasswd()	return subtle.ConstantTimeCompare([]byte(u.Passwd), []byte(newUser.Passwd)) == 1}// UploadAvatar saves custom avatar for user.// FIXME: split uploads to different subdirs in case we have massive number of users.func (u *User) UploadAvatar(data []byte) error {	img, _, err := image.Decode(bytes.NewReader(data))	if err != nil {		return fmt.Errorf("decode image: %v", err)	}	_ = os.MkdirAll(conf.Picture.AvatarUploadPath, os.ModePerm)	fw, err := os.Create(u.CustomAvatarPath())	if err != nil {		return fmt.Errorf("create custom avatar directory: %v", err)	}	defer fw.Close()	m := resize.Resize(avatar.AVATAR_SIZE, avatar.AVATAR_SIZE, img, resize.NearestNeighbor)	if err = png.Encode(fw, m); err != nil {		return fmt.Errorf("encode image: %v", err)	}	return nil}// DeleteAvatar deletes the user's custom avatar.func (u *User) DeleteAvatar() error {	log.Trace("DeleteAvatar [%d]: %s", u.ID, u.CustomAvatarPath())	if err := os.Remove(u.CustomAvatarPath()); err != nil {		return err	}	u.UseCustomAvatar = false	return UpdateUser(u)}// IsAdminOfRepo returns true if user has admin or higher access of repository.func (u *User) IsAdminOfRepo(repo *Repository) bool {	has, err := HasAccess(u.ID, repo, AccessModeAdmin)	if err != nil {		log.Error("HasAccess: %v", err)	}	return has}// IsWriterOfRepo returns true if user has write access to given repository.func (u *User) IsWriterOfRepo(repo *Repository) bool {	has, err := HasAccess(u.ID, repo, AccessModeWrite)	if err != nil {		log.Error("HasAccess: %v", err)	}	return has}// IsOrganization returns true if user is actually a organization.func (u *User) IsOrganization() bool {	return u.Type == USER_TYPE_ORGANIZATION}// IsUserOrgOwner returns true if user is in the owner team of given organization.func (u *User) IsUserOrgOwner(orgId int64) bool {	return IsOrganizationOwner(orgId, u.ID)}// IsPublicMember returns true if user public his/her membership in give organization.func (u *User) IsPublicMember(orgId int64) bool {	return IsPublicMembership(orgId, u.ID)}// IsEnabledTwoFactor returns true if user has enabled two-factor authentication.func (u *User) IsEnabledTwoFactor() bool {	return TwoFactors.IsUserEnabled(u.ID)}func (u *User) getOrganizationCount(e Engine) (int64, error) {	return e.Where("uid=?", u.ID).Count(new(OrgUser))}// GetOrganizationCount returns count of membership of organization of user.func (u *User) GetOrganizationCount() (int64, error) {	return u.getOrganizationCount(x)}// GetRepositories returns repositories that user owns, including private repositories.func (u *User) GetRepositories(page, pageSize int) (err error) {	u.Repos, err = GetUserRepositories(&UserRepoOptions{		UserID:   u.ID,		Private:  true,		Page:     page,		PageSize: pageSize,	})	return err}// GetRepositories returns mirror repositories that user owns, including private repositories.func (u *User) GetMirrorRepositories() ([]*Repository, error) {	return GetUserMirrorRepositories(u.ID)}// GetOwnedOrganizations returns all organizations that user owns.func (u *User) GetOwnedOrganizations() (err error) {	u.OwnedOrgs, err = GetOwnedOrgsByUserID(u.ID)	return err}// GetOrganizations returns all organizations that user belongs to.func (u *User) GetOrganizations(showPrivate bool) error {	orgIDs, err := GetOrgIDsByUserID(u.ID, showPrivate)	if err != nil {		return fmt.Errorf("GetOrgIDsByUserID: %v", err)	}	if len(orgIDs) == 0 {		return nil	}	u.Orgs = make([]*User, 0, len(orgIDs))	if err = x.Where("type = ?", USER_TYPE_ORGANIZATION).In("id", orgIDs).Find(&u.Orgs); err != nil {		return err	}	return nil}// DisplayName returns full name if it's not empty,// returns username otherwise.func (u *User) DisplayName() string {	if len(u.FullName) > 0 {		return u.FullName	}	return u.Name}func (u *User) ShortName(length int) string {	return tool.EllipsisString(u.Name, length)}// IsMailable checks if a user is elegible// to receive emails.func (u *User) IsMailable() bool {	return u.IsActive}// IsUserExist checks if given user name exist,// the user name should be noncased unique.// If uid is presented, then check will rule out that one,// it is used when update a user name in settings page.func IsUserExist(uid int64, name string) (bool, error) {	if len(name) == 0 {		return false, nil	}	return x.Where("id != ?", uid).Get(&User{LowerName: strings.ToLower(name)})}// GetUserSalt returns a random user salt token.func GetUserSalt() (string, error) {	return strutil.RandomChars(10)}// NewGhostUser creates and returns a fake user for someone who has deleted his/her account.func NewGhostUser() *User {	return &User{		ID:        -1,		Name:      "Ghost",		LowerName: "ghost",	}}var (	reservedUsernames    = []string{"-", "explore", "create", "assets", "css", "img", "js", "less", "plugins", "debug", "raw", "install", "api", "avatar", "user", "org", "help", "stars", "issues", "pulls", "commits", "repo", "template", "admin", "new", ".", ".."}	reservedUserPatterns = []string{"*.keys"})type ErrNameNotAllowed struct {	args errutil.Args}func IsErrNameNotAllowed(err error) bool {	_, ok := err.(ErrNameNotAllowed)	return ok}func (err ErrNameNotAllowed) Value() string {	val, ok := err.args["name"].(string)	if ok {		return val	}	val, ok = err.args["pattern"].(string)	if ok {		return val	}	return "<value not found>"}func (err ErrNameNotAllowed) Error() string {	return fmt.Sprintf("name is not allowed: %v", err.args)}// isNameAllowed checks if name is reserved or pattern of name is not allowed// based on given reserved names and patterns.// Names are exact match, patterns can be prefix or suffix match with placeholder '*'.func isNameAllowed(names, patterns []string, name string) error {	name = strings.TrimSpace(strings.ToLower(name))	if utf8.RuneCountInString(name) == 0 {		return ErrNameNotAllowed{args: errutil.Args{"reason": "empty name"}}	}	for i := range names {		if name == names[i] {			return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "name": name}}		}	}	for _, pat := range patterns {		if pat[0] == '*' && strings.HasSuffix(name, pat[1:]) ||			(pat[len(pat)-1] == '*' && strings.HasPrefix(name, pat[:len(pat)-1])) {			return ErrNameNotAllowed{args: errutil.Args{"reason": "reserved", "pattern": pat}}		}	}	return nil}func IsUsableUsername(name string) error {	return isNameAllowed(reservedUsernames, reservedUserPatterns, name)}// CreateUser creates record of a new user.func CreateUser(u *User) (err error) {	if err = IsUsableUsername(u.Name); err != nil {		return err	}	isExist, err := IsUserExist(0, u.Name)	if err != nil {		return err	} else if isExist {		return ErrUserAlreadyExist{u.Name}	}	u.Email = strings.ToLower(u.Email)	isExist, err = IsEmailUsed(u.Email)	if err != nil {		return err	} else if isExist {		return ErrEmailAlreadyUsed{u.Email}	}	u.LowerName = strings.ToLower(u.Name)	u.AvatarEmail = u.Email	u.Avatar = tool.HashEmail(u.AvatarEmail)	if u.Rands, err = GetUserSalt(); err != nil {		return err	}	if u.Salt, err = GetUserSalt(); err != nil {		return err	}	u.EncodePasswd()	u.MaxRepoCreation = -1	sess := x.NewSession()	defer sess.Close()	if err = sess.Begin(); err != nil {		return err	}	if _, err = sess.Insert(u); err != nil {		return err	} else if err = os.MkdirAll(UserPath(u.Name), os.ModePerm); err != nil {		return err	}	return sess.Commit()}func countUsers(e Engine) int64 {	count, _ := e.Where("type=0").Count(new(User))	return count}// CountUsers returns number of users.func CountUsers() int64 {	return countUsers(x)}// Users returns number of users in given page.func ListUsers(page, pageSize int) ([]*User, error) {	users := make([]*User, 0, pageSize)	return users, x.Limit(pageSize, (page-1)*pageSize).Where("type=0").Asc("id").Find(&users)}// parseUserFromCode returns user by username encoded in code.// It returns nil if code or username is invalid.func parseUserFromCode(code string) (user *User) {	if len(code) <= tool.TIME_LIMIT_CODE_LENGTH {		return nil	}	// Use tail hex username to query user	hexStr := code[tool.TIME_LIMIT_CODE_LENGTH:]	if b, err := hex.DecodeString(hexStr); err == nil {		if user, err = GetUserByName(string(b)); user != nil {			return user		} else if !IsErrUserNotExist(err) {			log.Error("Failed to get user by name %q: %v", string(b), err)		}	}	return nil}// verify active code when active accountfunc VerifyUserActiveCode(code string) (user *User) {	minutes := conf.Auth.ActivateCodeLives	if user = parseUserFromCode(code); user != nil {		// time limit code		prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]		data := com.ToStr(user.ID) + user.Email + user.LowerName + user.Passwd + user.Rands		if tool.VerifyTimeLimitCode(data, minutes, prefix) {			return user		}	}	return nil}// verify active code when active accountfunc VerifyActiveEmailCode(code, email string) *EmailAddress {	minutes := conf.Auth.ActivateCodeLives	if user := parseUserFromCode(code); user != nil {		// time limit code		prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]		data := com.ToStr(user.ID) + email + user.LowerName + user.Passwd + user.Rands		if tool.VerifyTimeLimitCode(data, minutes, prefix) {			emailAddress := &EmailAddress{Email: email}			if has, _ := x.Get(emailAddress); has {				return emailAddress			}		}	}	return nil}// ChangeUserName changes all corresponding setting from old user name to new one.func ChangeUserName(u *User, newUserName string) (err error) {	if err = IsUsableUsername(newUserName); err != nil {		return err	}	isExist, err := IsUserExist(0, newUserName)	if err != nil {		return err	} else if isExist {		return ErrUserAlreadyExist{newUserName}	}	if err = ChangeUsernameInPullRequests(u.Name, newUserName); err != nil {		return fmt.Errorf("ChangeUsernameInPullRequests: %v", err)	}	// Delete all local copies of repositories and wikis the user owns.	if err = x.Where("owner_id=?", u.ID).Iterate(new(Repository), func(idx int, bean interface{}) error {		repo := bean.(*Repository)		deleteRepoLocalCopy(repo)		// TODO: By the same reasoning, shouldn't we also sync access to the local wiki path?		RemoveAllWithNotice("Delete repository wiki local copy", repo.LocalWikiPath())		return nil	}); err != nil {		return fmt.Errorf("delete repository and wiki local copy: %v", err)	}	// Rename or create user base directory	baseDir := UserPath(u.Name)	newBaseDir := UserPath(newUserName)	if com.IsExist(baseDir) {		return os.Rename(baseDir, newBaseDir)	}	return os.MkdirAll(newBaseDir, os.ModePerm)}func updateUser(e Engine, u *User) error {	// Organization does not need email	if !u.IsOrganization() {		u.Email = strings.ToLower(u.Email)		has, err := e.Where("id!=?", u.ID).And("type=?", u.Type).And("email=?", u.Email).Get(new(User))		if err != nil {			return err		} else if has {			return ErrEmailAlreadyUsed{u.Email}		}		if len(u.AvatarEmail) == 0 {			u.AvatarEmail = u.Email		}		u.Avatar = tool.HashEmail(u.AvatarEmail)	}	u.LowerName = strings.ToLower(u.Name)	u.Location = tool.TruncateString(u.Location, 255)	u.Website = tool.TruncateString(u.Website, 255)	u.Description = tool.TruncateString(u.Description, 255)	_, err := e.ID(u.ID).AllCols().Update(u)	return err}// UpdateUser updates user's information.func UpdateUser(u *User) error {	return updateUser(x, u)}// deleteBeans deletes all given beans, beans should contain delete conditions.func deleteBeans(e Engine, beans ...interface{}) (err error) {	for i := range beans {		if _, err = e.Delete(beans[i]); err != nil {			return err		}	}	return nil}// FIXME: need some kind of mechanism to record failure. HINT: system noticefunc deleteUser(e *xorm.Session, u *User) error {	// Note: A user owns any repository or belongs to any organization	//	cannot perform delete operation.	// Check ownership of repository.	count, err := getRepositoryCount(e, u)	if err != nil {		return fmt.Errorf("GetRepositoryCount: %v", err)	} else if count > 0 {		return ErrUserOwnRepos{UID: u.ID}	}	// Check membership of organization.	count, err = u.getOrganizationCount(e)	if err != nil {		return fmt.Errorf("GetOrganizationCount: %v", err)	} else if count > 0 {		return ErrUserHasOrgs{UID: u.ID}	}	// ***** START: Watch *****	watches := make([]*Watch, 0, 10)	if err = e.Find(&watches, &Watch{UserID: u.ID}); err != nil {		return fmt.Errorf("get all watches: %v", err)	}	for i := range watches {		if _, err = e.Exec("UPDATE `repository` SET num_watches=num_watches-1 WHERE id=?", watches[i].RepoID); err != nil {			return fmt.Errorf("decrease repository watch number[%d]: %v", watches[i].RepoID, err)		}	}	// ***** END: Watch *****	// ***** START: Star *****	stars := make([]*Star, 0, 10)	if err = e.Find(&stars, &Star{UID: u.ID}); err != nil {		return fmt.Errorf("get all stars: %v", err)	}	for i := range stars {		if _, err = e.Exec("UPDATE `repository` SET num_stars=num_stars-1 WHERE id=?", stars[i].RepoID); err != nil {			return fmt.Errorf("decrease repository star number[%d]: %v", stars[i].RepoID, err)		}	}	// ***** END: Star *****	// ***** START: Follow *****	followers := make([]*Follow, 0, 10)	if err = e.Find(&followers, &Follow{UserID: u.ID}); err != nil {		return fmt.Errorf("get all followers: %v", err)	}	for i := range followers {		if _, err = e.Exec("UPDATE `user` SET num_followers=num_followers-1 WHERE id=?", followers[i].UserID); err != nil {			return fmt.Errorf("decrease user follower number[%d]: %v", followers[i].UserID, err)		}	}	// ***** END: Follow *****	if err = deleteBeans(e,		&AccessToken{UserID: u.ID},		&Collaboration{UserID: u.ID},		&Access{UserID: u.ID},		&Watch{UserID: u.ID},		&Star{UID: u.ID},		&Follow{FollowID: u.ID},		&Action{UserID: u.ID},		&IssueUser{UID: u.ID},		&EmailAddress{UID: u.ID},	); err != nil {		return fmt.Errorf("deleteBeans: %v", err)	}	// ***** START: PublicKey *****	keys := make([]*PublicKey, 0, 10)	if err = e.Find(&keys, &PublicKey{OwnerID: u.ID}); err != nil {		return fmt.Errorf("get all public keys: %v", err)	}	keyIDs := make([]int64, len(keys))	for i := range keys {		keyIDs[i] = keys[i].ID	}	if err = deletePublicKeys(e, keyIDs...); err != nil {		return fmt.Errorf("deletePublicKeys: %v", err)	}	// ***** END: PublicKey *****	// Clear assignee.	if _, err = e.Exec("UPDATE `issue` SET assignee_id=0 WHERE assignee_id=?", u.ID); err != nil {		return fmt.Errorf("clear assignee: %v", err)	}	if _, err = e.ID(u.ID).Delete(new(User)); err != nil {		return fmt.Errorf("Delete: %v", err)	}	// FIXME: system notice	// Note: There are something just cannot be roll back,	//	so just keep error logs of those operations.	_ = os.RemoveAll(UserPath(u.Name))	_ = os.Remove(u.CustomAvatarPath())	return nil}// DeleteUser completely and permanently deletes everything of a user,// but issues/comments/pulls will be kept and shown as someone has been deleted.func DeleteUser(u *User) (err error) {	sess := x.NewSession()	defer sess.Close()	if err = sess.Begin(); err != nil {		return err	}	if err = deleteUser(sess, u); err != nil {		// Note: don't wrapper error here.		return err	}	if err = sess.Commit(); err != nil {		return err	}	return RewriteAuthorizedKeys()}// DeleteInactivateUsers deletes all inactivate users and email addresses.func DeleteInactivateUsers() (err error) {	users := make([]*User, 0, 10)	if err = x.Where("is_active = ?", false).Find(&users); err != nil {		return fmt.Errorf("get all inactive users: %v", err)	}	// FIXME: should only update authorized_keys file once after all deletions.	for _, u := range users {		if err = DeleteUser(u); err != nil {			// Ignore users that were set inactive by admin.			if IsErrUserOwnRepos(err) || IsErrUserHasOrgs(err) {				continue			}			return err		}	}	_, err = x.Where("is_activated = ?", false).Delete(new(EmailAddress))	return err}// UserPath returns the path absolute path of user repositories.func UserPath(userName string) string {	return filepath.Join(conf.Repository.Root, strings.ToLower(userName))}func GetUserByKeyID(keyID int64) (*User, error) {	user := new(User)	has, err := x.SQL("SELECT a.* FROM `user` AS a, public_key AS b WHERE a.id = b.owner_id AND b.id=?", keyID).Get(user)	if err != nil {		return nil, err	} else if !has {		return nil, errors.UserNotKeyOwner{KeyID: keyID}	}	return user, nil}var _ errutil.NotFound = (*ErrUserNotExist)(nil)type ErrUserNotExist struct {	args map[string]interface{}}func IsErrUserNotExist(err error) bool {	_, ok := err.(ErrUserNotExist)	return ok}func (err ErrUserNotExist) Error() string {	return fmt.Sprintf("user does not exist: %v", err.args)}func (ErrUserNotExist) NotFound() bool {	return true}func getUserByID(e Engine, id int64) (*User, error) {	u := new(User)	has, err := e.ID(id).Get(u)	if err != nil {		return nil, err	} else if !has {		return nil, ErrUserNotExist{args: map[string]interface{}{"userID": id}}	}	return u, nil}// GetUserByID returns the user object by given ID if exists.// Deprecated: Use Users.GetByID instead.func GetUserByID(id int64) (*User, error) {	return getUserByID(x, id)}// GetAssigneeByID returns the user with write access of repository by given ID.func GetAssigneeByID(repo *Repository, userID int64) (*User, error) {	has, err := HasAccess(userID, repo, AccessModeRead)	if err != nil {		return nil, err	} else if !has {		return nil, ErrUserNotExist{args: map[string]interface{}{"userID": userID}}	}	return GetUserByID(userID)}// GetUserByName returns a user by given name.// Deprecated: Use Users.GetByUsername instead.func GetUserByName(name string) (*User, error) {	if len(name) == 0 {		return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}	}	u := &User{LowerName: strings.ToLower(name)}	has, err := x.Get(u)	if err != nil {		return nil, err	} else if !has {		return nil, ErrUserNotExist{args: map[string]interface{}{"name": name}}	}	return u, nil}// GetUserEmailsByNames returns a list of e-mails corresponds to names.func GetUserEmailsByNames(names []string) []string {	mails := make([]string, 0, len(names))	for _, name := range names {		u, err := GetUserByName(name)		if err != nil {			continue		}		if u.IsMailable() {			mails = append(mails, u.Email)		}	}	return mails}// GetUserIDsByNames returns a slice of ids corresponds to names.func GetUserIDsByNames(names []string) []int64 {	ids := make([]int64, 0, len(names))	for _, name := range names {		u, err := GetUserByName(name)		if err != nil {			continue		}		ids = append(ids, u.ID)	}	return ids}// UserCommit represents a commit with validation of user.type UserCommit struct {	User *User	*git.Commit}// ValidateCommitWithEmail chceck if author's e-mail of commit is corresponsind to a user.func ValidateCommitWithEmail(c *git.Commit) *User {	u, err := GetUserByEmail(c.Author.Email)	if err != nil {		return nil	}	return u}// ValidateCommitsWithEmails checks if authors' e-mails of commits are corresponding to users.func ValidateCommitsWithEmails(oldCommits []*git.Commit) []*UserCommit {	emails := make(map[string]*User)	newCommits := make([]*UserCommit, len(oldCommits))	for i := range oldCommits {		var u *User		if v, ok := emails[oldCommits[i].Author.Email]; !ok {			u, _ = GetUserByEmail(oldCommits[i].Author.Email)			emails[oldCommits[i].Author.Email] = u		} else {			u = v		}		newCommits[i] = &UserCommit{			User:   u,			Commit: oldCommits[i],		}	}	return newCommits}// GetUserByEmail returns the user object by given e-mail if exists.func GetUserByEmail(email string) (*User, error) {	if len(email) == 0 {		return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}	}	email = strings.ToLower(email)	// First try to find the user by primary email	user := &User{Email: email}	has, err := x.Get(user)	if err != nil {		return nil, err	}	if has {		return user, nil	}	// Otherwise, check in alternative list for activated email addresses	emailAddress := &EmailAddress{Email: email, IsActivated: true}	has, err = x.Get(emailAddress)	if err != nil {		return nil, err	}	if has {		return GetUserByID(emailAddress.UID)	}	return nil, ErrUserNotExist{args: map[string]interface{}{"email": email}}}type SearchUserOptions struct {	Keyword  string	Type     UserType	OrderBy  string	Page     int	PageSize int // Can be smaller than or equal to setting.UI.ExplorePagingNum}// SearchUserByName takes keyword and part of user name to search,// it returns results in given range and number of total results.func SearchUserByName(opts *SearchUserOptions) (users []*User, _ int64, _ error) {	if len(opts.Keyword) == 0 {		return users, 0, nil	}	opts.Keyword = strings.ToLower(opts.Keyword)	if opts.PageSize <= 0 || opts.PageSize > conf.UI.ExplorePagingNum {		opts.PageSize = conf.UI.ExplorePagingNum	}	if opts.Page <= 0 {		opts.Page = 1	}	searchQuery := "%" + opts.Keyword + "%"	users = make([]*User, 0, opts.PageSize)	// Append conditions	sess := x.Where("LOWER(lower_name) LIKE ?", searchQuery).		Or("LOWER(full_name) LIKE ?", searchQuery).		And("type = ?", opts.Type)	countSess := *sess	count, err := countSess.Count(new(User))	if err != nil {		return nil, 0, fmt.Errorf("Count: %v", err)	}	if len(opts.OrderBy) > 0 {		sess.OrderBy(opts.OrderBy)	}	return users, count, sess.Limit(opts.PageSize, (opts.Page-1)*opts.PageSize).Find(&users)}// ___________    .__  .__// \_   _____/___ |  | |  |   ______  _  __//  |    __)/  _ \|  | |  |  /  _ \ \/ \/ ///  |     \(  <_> )  |_|  |_(  <_> )     ///  \___  / \____/|____/____/\____/ \/\_///      \/// Follow represents relations of user and his/her followers.type Follow struct {	ID       int64	UserID   int64 `xorm:"UNIQUE(follow)"`	FollowID int64 `xorm:"UNIQUE(follow)"`}func IsFollowing(userID, followID int64) bool {	has, _ := x.Get(&Follow{UserID: userID, FollowID: followID})	return has}// FollowUser marks someone be another's follower.func FollowUser(userID, followID int64) (err error) {	if userID == followID || IsFollowing(userID, followID) {		return nil	}	sess := x.NewSession()	defer sess.Close()	if err = sess.Begin(); err != nil {		return err	}	if _, err = sess.Insert(&Follow{UserID: userID, FollowID: followID}); err != nil {		return err	}	if _, err = sess.Exec("UPDATE `user` SET num_followers = num_followers + 1 WHERE id = ?", followID); err != nil {		return err	}	if _, err = sess.Exec("UPDATE `user` SET num_following = num_following + 1 WHERE id = ?", userID); err != nil {		return err	}	return sess.Commit()}// UnfollowUser unmarks someone be another's follower.func UnfollowUser(userID, followID int64) (err error) {	if userID == followID || !IsFollowing(userID, followID) {		return nil	}	sess := x.NewSession()	defer sess.Close()	if err = sess.Begin(); err != nil {		return err	}	if _, err = sess.Delete(&Follow{UserID: userID, FollowID: followID}); err != nil {		return err	}	if _, err = sess.Exec("UPDATE `user` SET num_followers = num_followers - 1 WHERE id = ?", followID); err != nil {		return err	}	if _, err = sess.Exec("UPDATE `user` SET num_following = num_following - 1 WHERE id = ?", userID); err != nil {		return err	}	return sess.Commit()}
 |