2014-08-29 11:32:52 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
2020-01-24 22:00:29 +03:00
// Copyright 2020 The Gitea Authors.
2014-08-29 11:32:52 +04:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package admin
import (
2021-04-05 18:30:52 +03:00
"net/http"
2021-11-16 21:18:25 +03:00
"net/url"
2020-12-25 12:59:32 +03:00
"strconv"
2014-08-29 11:32:52 +04:00
"strings"
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/models"
2022-01-02 16:12:35 +03:00
"code.gitea.io/gitea/models/auth"
2021-09-24 14:32:56 +03:00
"code.gitea.io/gitea/models/db"
2021-11-11 10:03:30 +03:00
user_model "code.gitea.io/gitea/models/user"
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
2019-10-14 18:24:26 +03:00
"code.gitea.io/gitea/modules/password"
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/modules/setting"
2021-10-12 21:11:35 +03:00
"code.gitea.io/gitea/modules/util"
2021-01-26 18:36:53 +03:00
"code.gitea.io/gitea/modules/web"
2021-06-09 02:33:54 +03:00
"code.gitea.io/gitea/routers/web/explore"
2021-11-22 18:21:55 +03:00
user_setting "code.gitea.io/gitea/routers/web/user/setting"
2021-04-06 22:44:05 +03:00
"code.gitea.io/gitea/services/forms"
2019-09-24 08:02:49 +03:00
"code.gitea.io/gitea/services/mailer"
2021-11-22 18:21:55 +03:00
user_service "code.gitea.io/gitea/services/user"
2014-08-29 11:32:52 +04:00
)
const (
2016-11-21 06:21:24 +03:00
tplUsers base . TplName = "admin/user/list"
tplUserNew base . TplName = "admin/user/new"
tplUserEdit base . TplName = "admin/user/edit"
2014-08-29 11:32:52 +04:00
)
2016-11-21 06:21:24 +03:00
// Users show all the users
2016-03-11 19:56:52 +03:00
func Users ( ctx * context . Context ) {
2014-08-29 16:50:43 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "admin.users" )
ctx . Data [ "PageIsAdmin" ] = true
ctx . Data [ "PageIsAdminUsers" ] = true
2022-03-02 18:30:14 +03:00
extraParamStrings := map [ string ] string { }
2021-10-12 21:11:35 +03:00
statusFilterKeys := [ ] string { "is_active" , "is_admin" , "is_restricted" , "is_2fa_enabled" , "is_prohibit_login" }
statusFilterMap := map [ string ] string { }
for _ , filterKey := range statusFilterKeys {
2022-03-02 18:30:14 +03:00
paramKey := "status_filter[" + filterKey + "]"
paramVal := ctx . FormString ( paramKey )
statusFilterMap [ filterKey ] = paramVal
if paramVal != "" {
extraParamStrings [ paramKey ] = paramVal
}
2021-10-12 21:11:35 +03:00
}
sortType := ctx . FormString ( "sort" )
if sortType == "" {
sortType = explore . UserSearchDefaultSortType
}
ctx . PageData [ "adminUserListSearchForm" ] = map [ string ] interface { } {
"StatusFilterMap" : statusFilterMap ,
"SortType" : sortType ,
}
2021-11-24 12:49:20 +03:00
explore . RenderUserSearch ( ctx , & user_model . SearchUserOptions {
2022-03-22 10:03:22 +03:00
Actor : ctx . Doer ,
2021-11-24 12:49:20 +03:00
Type : user_model . UserTypeIndividual ,
2021-09-24 14:32:56 +03:00
ListOptions : db . ListOptions {
2020-01-24 22:00:29 +03:00
PageSize : setting . UI . Admin . UserPagingNum ,
} ,
2021-10-12 21:11:35 +03:00
SearchByEmail : true ,
IsActive : util . OptionalBoolParse ( statusFilterMap [ "is_active" ] ) ,
IsAdmin : util . OptionalBoolParse ( statusFilterMap [ "is_admin" ] ) ,
IsRestricted : util . OptionalBoolParse ( statusFilterMap [ "is_restricted" ] ) ,
IsTwoFactorEnabled : util . OptionalBoolParse ( statusFilterMap [ "is_2fa_enabled" ] ) ,
IsProhibitLogin : util . OptionalBoolParse ( statusFilterMap [ "is_prohibit_login" ] ) ,
2022-03-02 18:30:14 +03:00
ExtraParamStrings : extraParamStrings ,
2017-10-24 20:36:19 +03:00
} , tplUsers )
2014-08-29 11:32:52 +04:00
}
2016-11-21 06:21:24 +03:00
// NewUser render adding a new user page
2016-03-11 19:56:52 +03:00
func NewUser ( ctx * context . Context ) {
2014-08-29 11:32:52 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "admin.users.new_account" )
ctx . Data [ "PageIsAdmin" ] = true
ctx . Data [ "PageIsAdminUsers" ] = true
2021-06-26 22:53:14 +03:00
ctx . Data [ "DefaultUserVisibilityMode" ] = setting . Service . DefaultUserVisibilityMode
2021-06-27 21:47:35 +03:00
ctx . Data [ "AllowedUserVisibilityModes" ] = setting . Service . AllowedUserVisibilityModesSlice . ToVisibleTypeSlice ( )
2014-08-29 11:32:52 +04:00
2015-09-13 16:51:51 +03:00
ctx . Data [ "login_type" ] = "0-0"
2022-01-02 16:12:35 +03:00
sources , err := auth . Sources ( )
2014-08-29 11:32:52 +04:00
if err != nil {
2022-01-02 16:12:35 +03:00
ctx . ServerError ( "auth.Sources" , err )
2014-08-29 11:32:52 +04:00
return
}
2015-09-13 16:51:51 +03:00
ctx . Data [ "Sources" ] = sources
2015-09-26 02:45:44 +03:00
ctx . Data [ "CanSendEmail" ] = setting . MailService != nil
2021-04-05 18:30:52 +03:00
ctx . HTML ( http . StatusOK , tplUserNew )
2014-08-29 11:32:52 +04:00
}
2016-11-21 06:21:24 +03:00
// NewUserPost response for adding a new user
2021-01-26 18:36:53 +03:00
func NewUserPost ( ctx * context . Context ) {
2021-04-06 22:44:05 +03:00
form := web . GetForm ( ctx ) . ( * forms . AdminCreateUserForm )
2014-08-29 11:32:52 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "admin.users.new_account" )
ctx . Data [ "PageIsAdmin" ] = true
ctx . Data [ "PageIsAdminUsers" ] = true
2021-06-26 22:53:14 +03:00
ctx . Data [ "DefaultUserVisibilityMode" ] = setting . Service . DefaultUserVisibilityMode
2014-08-29 11:32:52 +04:00
2022-01-02 16:12:35 +03:00
sources , err := auth . Sources ( )
2015-09-13 16:51:51 +03:00
if err != nil {
2022-01-02 16:12:35 +03:00
ctx . ServerError ( "auth.Sources" , err )
2014-08-29 11:32:52 +04:00
return
}
2015-09-13 16:51:51 +03:00
ctx . Data [ "Sources" ] = sources
2014-08-29 11:32:52 +04:00
2015-09-26 02:45:44 +03:00
ctx . Data [ "CanSendEmail" ] = setting . MailService != nil
2015-09-13 16:51:51 +03:00
if ctx . HasError ( ) {
2021-04-05 18:30:52 +03:00
ctx . HTML ( http . StatusOK , tplUserNew )
2014-08-29 11:32:52 +04:00
return
}
2021-11-24 12:49:20 +03:00
u := & user_model . User {
2019-11-04 22:10:37 +03:00
Name : form . UserName ,
Email : form . Email ,
Passwd : form . Password ,
IsActive : true ,
2022-01-02 16:12:35 +03:00
LoginType : auth . Plain ,
2014-08-29 11:32:52 +04:00
}
if len ( form . LoginType ) > 0 {
fields := strings . Split ( form . LoginType , "-" )
2015-09-13 16:51:51 +03:00
if len ( fields ) == 2 {
2020-12-25 12:59:32 +03:00
lType , _ := strconv . ParseInt ( fields [ 0 ] , 10 , 0 )
2022-01-02 16:12:35 +03:00
u . LoginType = auth . Type ( lType )
2020-12-25 12:59:32 +03:00
u . LoginSource , _ = strconv . ParseInt ( fields [ 1 ] , 10 , 64 )
2015-09-13 16:51:51 +03:00
u . LoginName = form . LoginName
}
2014-08-29 11:32:52 +04:00
}
2022-01-02 16:12:35 +03:00
if u . LoginType == auth . NoType || u . LoginType == auth . Plain {
2019-11-20 03:07:51 +03:00
if len ( form . Password ) < setting . MinPasswordLength {
ctx . Data [ "Err_Password" ] = true
ctx . RenderWithErr ( ctx . Tr ( "auth.password_too_short" , setting . MinPasswordLength ) , tplUserNew , & form )
return
}
2019-11-04 22:10:37 +03:00
if ! password . IsComplexEnough ( form . Password ) {
2019-11-20 03:07:51 +03:00
ctx . Data [ "Err_Password" ] = true
2019-11-20 01:44:58 +03:00
ctx . RenderWithErr ( password . BuildComplexityError ( ctx ) , tplUserNew , & form )
2019-11-04 22:10:37 +03:00
return
}
2021-05-31 09:18:11 +03:00
pwned , err := password . IsPwned ( ctx , form . Password )
2020-09-09 01:06:39 +03:00
if pwned {
ctx . Data [ "Err_Password" ] = true
errMsg := ctx . Tr ( "auth.password_pwned" )
if err != nil {
log . Error ( err . Error ( ) )
errMsg = ctx . Tr ( "auth.password_pwned_err" )
}
ctx . RenderWithErr ( errMsg , tplUserNew , & form )
return
}
2019-11-04 22:10:37 +03:00
u . MustChangePassword = form . MustChangePassword
2019-10-14 18:24:26 +03:00
}
2021-06-26 22:53:14 +03:00
2021-11-24 12:49:20 +03:00
if err := user_model . CreateUser ( u , & user_model . CreateUserOverwriteOptions { Visibility : form . Visibility } ) ; err != nil {
2015-03-27 00:11:47 +03:00
switch {
2021-11-24 12:49:20 +03:00
case user_model . IsErrUserAlreadyExist ( err ) :
2014-08-29 11:32:52 +04:00
ctx . Data [ "Err_UserName" ] = true
2016-11-21 06:21:24 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.username_been_taken" ) , tplUserNew , & form )
2021-11-11 10:03:30 +03:00
case user_model . IsErrEmailAlreadyUsed ( err ) :
2014-08-29 11:32:52 +04:00
ctx . Data [ "Err_Email" ] = true
2016-11-21 06:21:24 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.email_been_used" ) , tplUserNew , & form )
2022-03-14 20:39:54 +03:00
case user_model . IsErrEmailCharIsNotSupported ( err ) :
ctx . Data [ "Err_Email" ] = true
ctx . RenderWithErr ( ctx . Tr ( "form.email_invalid" ) , tplUserNew , & form )
2021-11-11 10:03:30 +03:00
case user_model . IsErrEmailInvalid ( err ) :
2020-11-14 19:53:43 +03:00
ctx . Data [ "Err_Email" ] = true
ctx . RenderWithErr ( ctx . Tr ( "form.email_invalid" ) , tplUserNew , & form )
2021-11-24 12:49:20 +03:00
case db . IsErrNameReserved ( err ) :
2014-08-29 11:32:52 +04:00
ctx . Data [ "Err_UserName" ] = true
2021-11-24 12:49:20 +03:00
ctx . RenderWithErr ( ctx . Tr ( "user.form.name_reserved" , err . ( db . ErrNameReserved ) . Name ) , tplUserNew , & form )
case db . IsErrNamePatternNotAllowed ( err ) :
2015-03-27 00:11:47 +03:00
ctx . Data [ "Err_UserName" ] = true
2021-11-24 12:49:20 +03:00
ctx . RenderWithErr ( ctx . Tr ( "user.form.name_pattern_not_allowed" , err . ( db . ErrNamePatternNotAllowed ) . Pattern ) , tplUserNew , & form )
case db . IsErrNameCharsNotAllowed ( err ) :
2020-02-23 22:52:05 +03:00
ctx . Data [ "Err_UserName" ] = true
2021-11-24 12:49:20 +03:00
ctx . RenderWithErr ( ctx . Tr ( "user.form.name_chars_not_allowed" , err . ( db . ErrNameCharsNotAllowed ) . Name ) , tplUserNew , & form )
2014-08-29 11:32:52 +04:00
default :
2018-01-11 00:34:17 +03:00
ctx . ServerError ( "CreateUser" , err )
2014-08-29 11:32:52 +04:00
}
return
}
2022-03-22 10:03:22 +03:00
log . Trace ( "Account created by admin (%s): %s" , ctx . Doer . Name , u . Name )
2015-09-13 16:51:51 +03:00
2016-07-15 19:36:39 +03:00
// Send email notification.
2019-09-24 08:02:49 +03:00
if form . SendNotify {
2021-04-02 13:25:13 +03:00
mailer . SendRegisterNotifyMail ( u )
2015-09-26 02:45:44 +03:00
}
2015-09-13 16:51:51 +03:00
ctx . Flash . Success ( ctx . Tr ( "admin.users.new_success" , u . Name ) )
2021-11-16 21:18:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/admin/users/" + strconv . FormatInt ( u . ID , 10 ) )
2014-08-29 11:32:52 +04:00
}
2021-11-24 12:49:20 +03:00
func prepareUserInfo ( ctx * context . Context ) * user_model . User {
u , err := user_model . GetUserByID ( ctx . ParamsInt64 ( ":userid" ) )
2014-08-29 11:32:52 +04:00
if err != nil {
2018-01-11 00:34:17 +03:00
ctx . ServerError ( "GetUserByID" , err )
2015-09-13 18:07:21 +03:00
return nil
2014-08-29 11:32:52 +04:00
}
ctx . Data [ "User" ] = u
2015-09-13 16:51:51 +03:00
2015-09-13 18:07:21 +03:00
if u . LoginSource > 0 {
2022-01-02 16:12:35 +03:00
ctx . Data [ "LoginSource" ] , err = auth . GetSourceByID ( u . LoginSource )
2015-09-13 18:07:21 +03:00
if err != nil {
2022-01-02 16:12:35 +03:00
ctx . ServerError ( "auth.GetSourceByID" , err )
2015-09-13 18:07:21 +03:00
return nil
}
} else {
2022-01-02 16:12:35 +03:00
ctx . Data [ "LoginSource" ] = & auth . Source { }
2015-09-13 18:07:21 +03:00
}
2022-01-02 16:12:35 +03:00
sources , err := auth . Sources ( )
2014-08-29 11:32:52 +04:00
if err != nil {
2022-01-02 16:12:35 +03:00
ctx . ServerError ( "auth.Sources" , err )
2015-09-13 18:07:21 +03:00
return nil
2014-08-29 11:32:52 +04:00
}
2015-09-13 18:07:21 +03:00
ctx . Data [ "Sources" ] = sources
2022-03-02 03:24:31 +03:00
hasTOTP , err := auth . HasTwoFactorByUID ( u . ID )
2021-01-05 16:54:48 +03:00
if err != nil {
2022-03-02 03:24:31 +03:00
ctx . ServerError ( "auth.HasTwoFactorByUID" , err )
return nil
}
hasWebAuthn , err := auth . HasWebAuthnRegistrationsByUID ( u . ID )
if err != nil {
ctx . ServerError ( "auth.HasWebAuthnRegistrationsByUID" , err )
return nil
2021-01-05 16:54:48 +03:00
}
2022-03-02 03:24:31 +03:00
ctx . Data [ "TwoFactorEnabled" ] = hasTOTP || hasWebAuthn
2021-01-05 16:54:48 +03:00
2015-09-13 18:07:21 +03:00
return u
2014-08-29 11:32:52 +04:00
}
2021-07-08 14:38:13 +03:00
// EditUser show editing user page
2016-03-11 19:56:52 +03:00
func EditUser ( ctx * context . Context ) {
2014-08-29 11:32:52 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "admin.users.edit_account" )
ctx . Data [ "PageIsAdmin" ] = true
ctx . Data [ "PageIsAdminUsers" ] = true
2017-02-14 15:16:00 +03:00
ctx . Data [ "DisableRegularOrgCreation" ] = setting . Admin . DisableRegularOrgCreation
2020-12-21 17:39:41 +03:00
ctx . Data [ "DisableMigrations" ] = setting . Repository . DisableMigrations
2021-06-27 21:47:35 +03:00
ctx . Data [ "AllowedUserVisibilityModes" ] = setting . Service . AllowedUserVisibilityModesSlice . ToVisibleTypeSlice ( )
2014-08-29 11:32:52 +04:00
2015-09-13 18:07:21 +03:00
prepareUserInfo ( ctx )
if ctx . Written ( ) {
2014-08-29 11:32:52 +04:00
return
}
2021-04-05 18:30:52 +03:00
ctx . HTML ( http . StatusOK , tplUserEdit )
2015-09-13 18:07:21 +03:00
}
2021-07-08 14:38:13 +03:00
// EditUserPost response for editing user
2021-01-26 18:36:53 +03:00
func EditUserPost ( ctx * context . Context ) {
2021-04-06 22:44:05 +03:00
form := web . GetForm ( ctx ) . ( * forms . AdminEditUserForm )
2015-09-13 18:07:21 +03:00
ctx . Data [ "Title" ] = ctx . Tr ( "admin.users.edit_account" )
ctx . Data [ "PageIsAdmin" ] = true
ctx . Data [ "PageIsAdminUsers" ] = true
2020-12-21 17:39:41 +03:00
ctx . Data [ "DisableMigrations" ] = setting . Repository . DisableMigrations
2015-09-13 18:07:21 +03:00
u := prepareUserInfo ( ctx )
if ctx . Written ( ) {
2014-08-29 11:32:52 +04:00
return
}
if ctx . HasError ( ) {
2021-04-05 18:30:52 +03:00
ctx . HTML ( http . StatusOK , tplUserEdit )
2014-08-29 11:32:52 +04:00
return
}
2015-09-13 18:07:21 +03:00
fields := strings . Split ( form . LoginType , "-" )
if len ( fields ) == 2 {
2020-12-25 12:59:32 +03:00
loginType , _ := strconv . ParseInt ( fields [ 0 ] , 10 , 0 )
2022-01-02 16:12:35 +03:00
authSource , _ := strconv . ParseInt ( fields [ 1 ] , 10 , 64 )
2015-09-13 18:07:21 +03:00
2022-01-02 16:12:35 +03:00
if u . LoginSource != authSource {
u . LoginSource = authSource
u . LoginType = auth . Type ( loginType )
2015-09-13 18:07:21 +03:00
}
}
2020-09-29 23:27:03 +03:00
if len ( form . Password ) > 0 && ( u . IsLocal ( ) || u . IsOAuth2 ( ) ) {
2016-12-20 15:32:02 +03:00
var err error
2019-11-20 03:07:51 +03:00
if len ( form . Password ) < setting . MinPasswordLength {
ctx . Data [ "Err_Password" ] = true
ctx . RenderWithErr ( ctx . Tr ( "auth.password_too_short" , setting . MinPasswordLength ) , tplUserEdit , & form )
2016-12-20 15:32:02 +03:00
return
}
2019-10-14 18:24:26 +03:00
if ! password . IsComplexEnough ( form . Password ) {
2019-11-20 01:44:58 +03:00
ctx . RenderWithErr ( password . BuildComplexityError ( ctx ) , tplUserEdit , & form )
2019-10-14 18:24:26 +03:00
return
}
2021-05-31 09:18:11 +03:00
pwned , err := password . IsPwned ( ctx , form . Password )
2020-09-09 01:06:39 +03:00
if pwned {
ctx . Data [ "Err_Password" ] = true
errMsg := ctx . Tr ( "auth.password_pwned" )
if err != nil {
log . Error ( err . Error ( ) )
errMsg = ctx . Tr ( "auth.password_pwned_err" )
}
ctx . RenderWithErr ( errMsg , tplUserNew , & form )
return
}
2021-11-26 04:56:16 +03:00
if err := user_model . ValidateEmail ( form . Email ) ; err != nil {
ctx . Data [ "Err_Email" ] = true
ctx . RenderWithErr ( ctx . Tr ( "form.email_error" ) , tplUserNew , & form )
return
}
2021-11-24 12:49:20 +03:00
if u . Salt , err = user_model . GetUserSalt ( ) ; err != nil {
2019-11-20 03:07:51 +03:00
ctx . ServerError ( "UpdateUser" , err )
return
}
2021-01-10 21:05:18 +03:00
if err = u . SetPassword ( form . Password ) ; err != nil {
2021-01-14 23:27:22 +03:00
ctx . ServerError ( "SetPassword" , err )
2021-01-10 21:05:18 +03:00
return
}
2014-08-29 11:32:52 +04:00
}
2021-01-10 15:14:02 +03:00
if len ( form . UserName ) != 0 && u . Name != form . UserName {
2021-11-22 18:21:55 +03:00
if err := user_setting . HandleUsernameChange ( ctx , u , form . UserName ) ; err != nil {
2021-01-10 15:14:02 +03:00
ctx . Redirect ( setting . AppSubURL + "/admin/users" )
return
}
u . Name = form . UserName
u . LowerName = strings . ToLower ( form . UserName )
}
2021-01-05 16:54:48 +03:00
if form . Reset2FA {
2022-01-02 16:12:35 +03:00
tf , err := auth . GetTwoFactorByUID ( u . ID )
if err != nil && ! auth . IsErrTwoFactorNotEnrolled ( err ) {
2022-03-02 03:24:31 +03:00
ctx . ServerError ( "auth.GetTwoFactorByUID" , err )
2021-01-05 16:54:48 +03:00
return
2022-03-02 03:24:31 +03:00
} else if tf != nil {
if err := auth . DeleteTwoFactorByID ( tf . ID , u . ID ) ; err != nil {
ctx . ServerError ( "auth.DeleteTwoFactorByID" , err )
return
}
2021-01-05 16:54:48 +03:00
}
2022-03-02 03:24:31 +03:00
wn , err := auth . GetWebAuthnCredentialsByUID ( u . ID )
if err != nil {
ctx . ServerError ( "auth.GetTwoFactorByUID" , err )
2021-01-05 16:54:48 +03:00
return
}
2022-03-02 03:24:31 +03:00
for _ , cred := range wn {
if _ , err := auth . DeleteCredential ( cred . ID , u . ID ) ; err != nil {
ctx . ServerError ( "auth.DeleteCredential" , err )
return
}
}
2021-01-05 16:54:48 +03:00
}
2015-09-13 18:26:25 +03:00
u . LoginName = form . LoginName
2015-04-28 18:59:05 +03:00
u . FullName = form . FullName
2021-11-26 04:56:16 +03:00
emailChanged := ! strings . EqualFold ( u . Email , form . Email )
2014-08-29 11:32:52 +04:00
u . Email = form . Email
u . Website = form . Website
u . Location = form . Location
2015-12-10 20:37:53 +03:00
u . MaxRepoCreation = form . MaxRepoCreation
2014-08-29 11:32:52 +04:00
u . IsActive = form . Active
u . IsAdmin = form . Admin
2020-01-13 20:33:46 +03:00
u . IsRestricted = form . Restricted
2014-11-17 22:53:41 +03:00
u . AllowGitHook = form . AllowGitHook
2015-11-04 02:40:52 +03:00
u . AllowImportLocal = form . AllowImportLocal
2016-12-31 05:33:30 +03:00
u . AllowCreateOrganization = form . AllowCreateOrganization
2020-04-06 17:23:15 +03:00
2021-06-26 22:53:14 +03:00
u . Visibility = form . Visibility
2020-04-06 17:23:15 +03:00
// skip self Prohibit Login
2022-03-22 10:03:22 +03:00
if ctx . Doer . ID == u . ID {
2020-04-06 17:23:15 +03:00
u . ProhibitLogin = false
} else {
u . ProhibitLogin = form . ProhibitLogin
}
2014-12-01 02:29:16 +03:00
2021-11-26 04:56:16 +03:00
if err := user_model . UpdateUser ( u , emailChanged ) ; err != nil {
2021-11-11 10:03:30 +03:00
if user_model . IsErrEmailAlreadyUsed ( err ) {
2014-12-01 02:29:16 +03:00
ctx . Data [ "Err_Email" ] = true
2016-11-21 06:21:24 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.email_been_used" ) , tplUserEdit , & form )
2022-03-14 20:39:54 +03:00
} else if user_model . IsErrEmailCharIsNotSupported ( err ) ||
user_model . IsErrEmailInvalid ( err ) {
2020-11-14 19:53:43 +03:00
ctx . Data [ "Err_Email" ] = true
ctx . RenderWithErr ( ctx . Tr ( "form.email_invalid" ) , tplUserEdit , & form )
2014-12-01 02:29:16 +03:00
} else {
2018-01-11 00:34:17 +03:00
ctx . ServerError ( "UpdateUser" , err )
2014-12-01 02:29:16 +03:00
}
2014-08-29 11:32:52 +04:00
return
}
2022-03-22 10:03:22 +03:00
log . Trace ( "Account profile updated by admin (%s): %s" , ctx . Doer . Name , u . Name )
2015-09-13 18:07:21 +03:00
2014-08-29 11:32:52 +04:00
ctx . Flash . Success ( ctx . Tr ( "admin.users.update_profile_success" ) )
2021-11-16 21:18:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/admin/users/" + url . PathEscape ( ctx . Params ( ":userid" ) ) )
2014-08-29 11:32:52 +04:00
}
2016-11-21 06:21:24 +03:00
// DeleteUser response for deleting a user
2016-03-11 19:56:52 +03:00
func DeleteUser ( ctx * context . Context ) {
2021-11-24 12:49:20 +03:00
u , err := user_model . GetUserByID ( ctx . ParamsInt64 ( ":userid" ) )
2014-08-29 11:32:52 +04:00
if err != nil {
2018-01-11 00:34:17 +03:00
ctx . ServerError ( "GetUserByID" , err )
2014-08-29 11:32:52 +04:00
return
}
2021-11-22 18:21:55 +03:00
if err = user_service . DeleteUser ( u ) ; err != nil {
2015-03-18 04:51:39 +03:00
switch {
case models . IsErrUserOwnRepos ( err ) :
2014-08-29 11:32:52 +04:00
ctx . Flash . Error ( ctx . Tr ( "admin.users.still_own_repo" ) )
2021-04-05 18:30:52 +03:00
ctx . JSON ( http . StatusOK , map [ string ] interface { } {
2021-11-16 21:18:25 +03:00
"redirect" : setting . AppSubURL + "/admin/users/" + url . PathEscape ( ctx . Params ( ":userid" ) ) ,
2015-09-13 20:26:20 +03:00
} )
2015-03-18 04:51:39 +03:00
case models . IsErrUserHasOrgs ( err ) :
2014-11-13 13:27:01 +03:00
ctx . Flash . Error ( ctx . Tr ( "admin.users.still_has_org" ) )
2021-04-05 18:30:52 +03:00
ctx . JSON ( http . StatusOK , map [ string ] interface { } {
2021-11-16 21:18:25 +03:00
"redirect" : setting . AppSubURL + "/admin/users/" + url . PathEscape ( ctx . Params ( ":userid" ) ) ,
2015-09-13 20:26:20 +03:00
} )
2022-03-30 11:42:47 +03:00
case models . IsErrUserOwnPackages ( err ) :
ctx . Flash . Error ( ctx . Tr ( "admin.users.still_own_packages" ) )
ctx . JSON ( http . StatusOK , map [ string ] interface { } {
"redirect" : setting . AppSubURL + "/admin/users/" + ctx . Params ( ":userid" ) ,
} )
2014-08-29 11:32:52 +04:00
default :
2018-01-11 00:34:17 +03:00
ctx . ServerError ( "DeleteUser" , err )
2014-08-29 11:32:52 +04:00
}
return
}
2022-03-22 10:03:22 +03:00
log . Trace ( "Account deleted by admin (%s): %s" , ctx . Doer . Name , u . Name )
2015-09-13 20:26:20 +03:00
ctx . Flash . Success ( ctx . Tr ( "admin.users.deletion_success" ) )
2021-04-05 18:30:52 +03:00
ctx . JSON ( http . StatusOK , map [ string ] interface { } {
2016-11-27 13:14:25 +03:00
"redirect" : setting . AppSubURL + "/admin/users" ,
2015-09-13 20:26:20 +03:00
} )
2014-08-29 11:32:52 +04:00
}
2021-11-16 22:13:13 +03:00
// AvatarPost response for change user's avatar request
func AvatarPost ( ctx * context . Context ) {
u := prepareUserInfo ( ctx )
if ctx . Written ( ) {
return
}
form := web . GetForm ( ctx ) . ( * forms . AvatarForm )
2021-11-22 18:21:55 +03:00
if err := user_setting . UpdateAvatarSetting ( ctx , form , u ) ; err != nil {
2021-11-16 22:13:13 +03:00
ctx . Flash . Error ( err . Error ( ) )
} else {
ctx . Flash . Success ( ctx . Tr ( "settings.update_user_avatar_success" ) )
}
ctx . Redirect ( setting . AppSubURL + "/admin/users/" + strconv . FormatInt ( u . ID , 10 ) )
}
// DeleteAvatar render delete avatar page
func DeleteAvatar ( ctx * context . Context ) {
u := prepareUserInfo ( ctx )
if ctx . Written ( ) {
return
}
2021-11-22 18:21:55 +03:00
if err := user_service . DeleteAvatar ( u ) ; err != nil {
2021-11-16 22:13:13 +03:00
ctx . Flash . Error ( err . Error ( ) )
}
ctx . Redirect ( setting . AppSubURL + "/admin/users/" + strconv . FormatInt ( u . ID , 10 ) )
}