2014-07-26 08:24:27 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package user
import (
2016-03-11 19:56:52 +03:00
"fmt"
2014-07-26 08:24:27 +04:00
"net/url"
2015-10-16 04:28:12 +03:00
"github.com/go-macaron/captcha"
2014-08-01 01:25:34 +04:00
2016-11-10 19:24:48 +03:00
"code.gitea.io/gitea/models"
"code.gitea.io/gitea/modules/auth"
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
2014-07-26 08:24:27 +04:00
)
const (
2016-11-18 06:03:03 +03:00
// tplSignIn template for sign in page
tplSignIn base . TplName = "user/auth/signin"
// tplSignUp template path for sign up page
tplSignUp base . TplName = "user/auth/signup"
// TplActivate template path for activate user
TplActivate base . TplName = "user/auth/activate"
tplForgotPassword base . TplName = "user/auth/forgot_passwd"
tplResetPassword base . TplName = "user/auth/reset_passwd"
2014-07-26 08:24:27 +04:00
)
2016-03-11 19:56:52 +03:00
// AutoSignIn reads cookie and try to auto-login.
func AutoSignIn ( ctx * context . Context ) ( bool , error ) {
if ! models . HasEngine {
return false , nil
}
uname := ctx . GetCookie ( setting . CookieUserName )
if len ( uname ) == 0 {
return false , nil
}
isSucceed := false
defer func ( ) {
if ! isSucceed {
log . Trace ( "auto-login cookie cleared: %s" , uname )
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( setting . CookieUserName , "" , - 1 , setting . AppSubURL )
ctx . SetCookie ( setting . CookieRememberName , "" , - 1 , setting . AppSubURL )
2016-03-11 19:56:52 +03:00
}
} ( )
u , err := models . GetUserByName ( uname )
if err != nil {
if ! models . IsErrUserNotExist ( err ) {
return false , fmt . Errorf ( "GetUserByName: %v" , err )
}
return false , nil
}
if val , _ := ctx . GetSuperSecureCookie (
base . EncodeMD5 ( u . Rands + u . Passwd ) , setting . CookieRememberName ) ; val != u . Name {
return false , nil
}
isSucceed = true
2016-07-23 20:08:22 +03:00
ctx . Session . Set ( "uid" , u . ID )
2016-03-11 19:56:52 +03:00
ctx . Session . Set ( "uname" , u . Name )
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( setting . CSRFCookieName , "" , - 1 , setting . AppSubURL )
2016-03-11 19:56:52 +03:00
return true , nil
}
2016-11-18 06:03:03 +03:00
// SignIn render sign in page
2016-03-11 19:56:52 +03:00
func SignIn ( ctx * context . Context ) {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "sign_in" )
// Check auto-login.
2016-03-11 19:56:52 +03:00
isSucceed , err := AutoSignIn ( ctx )
2014-07-26 08:24:27 +04:00
if err != nil {
2015-08-13 21:43:40 +03:00
ctx . Handle ( 500 , "AutoSignIn" , err )
2014-07-26 08:24:27 +04:00
return
}
2016-08-28 01:07:02 +03:00
redirectTo := ctx . Query ( "redirect_to" )
if len ( redirectTo ) > 0 {
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( "redirect_to" , redirectTo , 0 , setting . AppSubURL )
2016-08-28 01:07:02 +03:00
} else {
redirectTo , _ = url . QueryUnescape ( ctx . GetCookie ( "redirect_to" ) )
}
2015-08-13 21:43:40 +03:00
if isSucceed {
2016-08-28 01:07:02 +03:00
if len ( redirectTo ) > 0 {
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( "redirect_to" , "" , - 1 , setting . AppSubURL )
2015-08-13 21:43:40 +03:00
ctx . Redirect ( redirectTo )
2015-11-19 07:52:09 +03:00
} else {
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/" )
2015-08-13 21:43:40 +03:00
}
2014-07-26 08:24:27 +04:00
return
}
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplSignIn )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// SignInPost response for sign in request
2016-03-11 19:56:52 +03:00
func SignInPost ( ctx * context . Context , form auth . SignInForm ) {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "sign_in" )
if ctx . HasError ( ) {
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplSignIn )
2014-07-26 08:24:27 +04:00
return
}
u , err := models . UserSignIn ( form . UserName , form . Password )
if err != nil {
2015-08-05 06:14:17 +03:00
if models . IsErrUserNotExist ( err ) {
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.username_password_incorrect" ) , tplSignIn , & form )
2014-08-10 08:02:00 +04:00
} else {
ctx . Handle ( 500 , "UserSignIn" , err )
2014-07-26 08:24:27 +04:00
}
return
}
if form . Remember {
days := 86400 * setting . LogInRememberDays
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( setting . CookieUserName , u . Name , days , setting . AppSubURL )
2015-11-25 02:49:34 +03:00
ctx . SetSuperSecureCookie ( base . EncodeMD5 ( u . Rands + u . Passwd ) ,
2016-11-27 13:14:25 +03:00
setting . CookieRememberName , u . Name , days , setting . AppSubURL )
2014-07-26 08:24:27 +04:00
}
2016-07-23 20:08:22 +03:00
ctx . Session . Set ( "uid" , u . ID )
2014-07-26 08:24:27 +04:00
ctx . Session . Set ( "uname" , u . Name )
2016-03-13 04:56:03 +03:00
// Clear whatever CSRF has right now, force to generate a new one
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( setting . CSRFCookieName , "" , - 1 , setting . AppSubURL )
2016-03-13 04:56:03 +03:00
2016-11-09 13:53:45 +03:00
// Register last login
u . SetLastLogin ( )
if err := models . UpdateUser ( u ) ; err != nil {
2016-11-11 15:11:45 +03:00
ctx . Handle ( 500 , "UpdateUser" , err )
return
2016-11-09 13:53:45 +03:00
}
2014-07-26 08:24:27 +04:00
if redirectTo , _ := url . QueryUnescape ( ctx . GetCookie ( "redirect_to" ) ) ; len ( redirectTo ) > 0 {
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( "redirect_to" , "" , - 1 , setting . AppSubURL )
2014-07-26 08:24:27 +04:00
ctx . Redirect ( redirectTo )
return
}
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/" )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// SignOut sign out from login status
2016-03-11 19:56:52 +03:00
func SignOut ( ctx * context . Context ) {
2014-07-26 08:24:27 +04:00
ctx . Session . Delete ( "uid" )
ctx . Session . Delete ( "uname" )
2014-08-07 14:40:05 +04:00
ctx . Session . Delete ( "socialId" )
ctx . Session . Delete ( "socialName" )
ctx . Session . Delete ( "socialEmail" )
2016-11-27 13:14:25 +03:00
ctx . SetCookie ( setting . CookieUserName , "" , - 1 , setting . AppSubURL )
ctx . SetCookie ( setting . CookieRememberName , "" , - 1 , setting . AppSubURL )
ctx . SetCookie ( setting . CSRFCookieName , "" , - 1 , setting . AppSubURL )
ctx . Redirect ( setting . AppSubURL + "/" )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// SignUp render the register page
2016-03-11 19:56:52 +03:00
func SignUp ( ctx * context . Context ) {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "sign_up" )
2015-09-13 18:07:21 +03:00
ctx . Data [ "EnableCaptcha" ] = setting . Service . EnableCaptcha
2015-09-13 16:51:51 +03:00
2014-07-26 08:24:27 +04:00
if setting . Service . DisableRegistration {
ctx . Data [ "DisableRegistration" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplSignUp )
2014-07-26 08:24:27 +04:00
return
}
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplSignUp )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// SignUpPost response for sign up information submission
2016-03-11 19:56:52 +03:00
func SignUpPost ( ctx * context . Context , cpt * captcha . Captcha , form auth . RegisterForm ) {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "sign_up" )
2015-09-13 18:07:21 +03:00
ctx . Data [ "EnableCaptcha" ] = setting . Service . EnableCaptcha
2015-09-13 16:51:51 +03:00
2014-07-26 08:24:27 +04:00
if setting . Service . DisableRegistration {
ctx . Error ( 403 )
return
}
if ctx . HasError ( ) {
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplSignUp )
2014-07-26 08:24:27 +04:00
return
}
2015-09-13 18:07:21 +03:00
if setting . Service . EnableCaptcha && ! cpt . VerifyReq ( ctx . Req ) {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Err_Captcha" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.captcha_incorrect" ) , tplSignUp , & form )
2014-07-26 08:24:27 +04:00
return
2015-09-13 16:51:51 +03:00
}
if form . Password != form . Retype {
2014-07-26 08:24:27 +04:00
ctx . Data [ "Err_Password" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.password_not_match" ) , tplSignUp , & form )
2014-07-26 08:24:27 +04:00
return
}
u := & models . User {
Name : form . UserName ,
Email : form . Email ,
Passwd : form . Password ,
2015-09-17 23:11:44 +03:00
IsActive : ! setting . Service . RegisterEmailConfirm ,
2014-07-26 08:24:27 +04:00
}
if err := models . CreateUser ( u ) ; err != nil {
2015-03-27 00:11:47 +03:00
switch {
case models . IsErrUserAlreadyExist ( err ) :
2014-07-26 08:24:27 +04:00
ctx . Data [ "Err_UserName" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.username_been_taken" ) , tplSignUp , & form )
2015-03-27 00:11:47 +03:00
case models . IsErrEmailAlreadyUsed ( err ) :
2014-07-26 08:24:27 +04:00
ctx . Data [ "Err_Email" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "form.email_been_used" ) , tplSignUp , & form )
2015-03-27 00:11:47 +03:00
case models . IsErrNameReserved ( err ) :
2014-07-26 08:24:27 +04:00
ctx . Data [ "Err_UserName" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "user.form.name_reserved" , err . ( models . ErrNameReserved ) . Name ) , tplSignUp , & form )
2015-03-27 00:11:47 +03:00
case models . IsErrNamePatternNotAllowed ( err ) :
ctx . Data [ "Err_UserName" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "user.form.name_pattern_not_allowed" , err . ( models . ErrNamePatternNotAllowed ) . Pattern ) , tplSignUp , & form )
2014-07-26 08:24:27 +04:00
default :
ctx . Handle ( 500 , "CreateUser" , err )
}
return
}
log . Trace ( "Account created: %s" , u . Name )
2015-08-18 23:58:45 +03:00
// Auto-set admin for the only user.
if models . CountUsers ( ) == 1 {
u . IsAdmin = true
u . IsActive = true
if err := models . UpdateUser ( u ) ; err != nil {
ctx . Handle ( 500 , "UpdateUser" , err )
return
}
}
2016-07-15 19:36:39 +03:00
// Send confirmation email, no need for social account.
2016-07-23 20:08:22 +03:00
if setting . Service . RegisterEmailConfirm && u . ID > 1 {
2016-07-15 19:36:39 +03:00
models . SendActivateAccountMail ( ctx . Context , u )
2014-08-10 04:25:02 +04:00
ctx . Data [ "IsSendRegisterMail" ] = true
ctx . Data [ "Email" ] = u . Email
ctx . Data [ "Hours" ] = setting . Service . ActiveCodeLives / 60
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , TplActivate )
2014-08-10 04:25:02 +04:00
if err := ctx . Cache . Put ( "MailResendLimit_" + u . LowerName , u . LowerName , 180 ) ; err != nil {
log . Error ( 4 , "Set cache(MailResendLimit) fail: %v" , err )
}
return
}
2014-07-26 08:24:27 +04:00
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/user/login" )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// Activate render activate user page
2016-03-11 19:56:52 +03:00
func Activate ( ctx * context . Context ) {
2014-08-10 08:02:00 +04:00
code := ctx . Query ( "code" )
if len ( code ) == 0 {
ctx . Data [ "IsActivatePage" ] = true
if ctx . User . IsActive {
ctx . Error ( 404 )
return
}
2016-07-15 19:36:39 +03:00
// Resend confirmation email.
2014-08-10 08:02:00 +04:00
if setting . Service . RegisterEmailConfirm {
if ctx . Cache . IsExist ( "MailResendLimit_" + ctx . User . LowerName ) {
ctx . Data [ "ResendLimited" ] = true
} else {
ctx . Data [ "Hours" ] = setting . Service . ActiveCodeLives / 60
2016-07-15 19:36:39 +03:00
models . SendActivateAccountMail ( ctx . Context , ctx . User )
2014-08-10 08:02:00 +04:00
if err := ctx . Cache . Put ( "MailResendLimit_" + ctx . User . LowerName , ctx . User . LowerName , 180 ) ; err != nil {
log . Error ( 4 , "Set cache(MailResendLimit) fail: %v" , err )
}
}
} else {
ctx . Data [ "ServiceNotEnabled" ] = true
}
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , TplActivate )
2014-08-10 08:02:00 +04:00
return
}
// Verify code.
if user := models . VerifyUserActiveCode ( code ) ; user != nil {
user . IsActive = true
2016-12-20 15:32:02 +03:00
var err error
if user . Rands , err = models . GetUserSalt ( ) ; err != nil {
ctx . Handle ( 500 , "UpdateUser" , err )
return
}
2014-08-10 08:02:00 +04:00
if err := models . UpdateUser ( user ) ; err != nil {
2015-08-05 06:14:17 +03:00
if models . IsErrUserNotExist ( err ) {
2014-08-10 08:02:00 +04:00
ctx . Error ( 404 )
} else {
ctx . Handle ( 500 , "UpdateUser" , err )
}
return
}
log . Trace ( "User activated: %s" , user . Name )
2016-07-23 20:08:22 +03:00
ctx . Session . Set ( "uid" , user . ID )
2014-08-10 08:02:00 +04:00
ctx . Session . Set ( "uname" , user . Name )
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/" )
2014-08-10 08:02:00 +04:00
return
}
ctx . Data [ "IsActivateFailed" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , TplActivate )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// ActivateEmail render the activate email page
2016-03-11 19:56:52 +03:00
func ActivateEmail ( ctx * context . Context ) {
2014-12-17 18:41:49 +03:00
code := ctx . Query ( "code" )
2016-11-18 06:03:03 +03:00
emailStr := ctx . Query ( "email" )
2014-12-17 18:41:49 +03:00
// Verify code.
2016-11-18 06:03:03 +03:00
if email := models . VerifyActiveEmailCode ( code , emailStr ) ; email != nil {
2015-02-22 06:13:47 +03:00
if err := email . Activate ( ) ; err != nil {
2014-12-17 18:41:49 +03:00
ctx . Handle ( 500 , "ActivateEmail" , err )
}
log . Trace ( "Email activated: %s" , email . Email )
2015-11-19 19:52:39 +03:00
ctx . Flash . Success ( ctx . Tr ( "settings.add_email_success" ) )
2014-12-17 18:41:49 +03:00
}
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/user/settings/email" )
2014-12-17 18:41:49 +03:00
return
}
2016-11-18 06:03:03 +03:00
// ForgotPasswd render the forget pasword page
2016-03-11 19:56:52 +03:00
func ForgotPasswd ( ctx * context . Context ) {
2014-08-10 08:02:00 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "auth.forgot_password" )
2014-07-26 08:24:27 +04:00
if setting . MailService == nil {
ctx . Data [ "IsResetDisable" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplForgotPassword )
2014-07-26 08:24:27 +04:00
return
}
ctx . Data [ "IsResetRequest" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplForgotPassword )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// ForgotPasswdPost response for forget password request
2016-03-11 19:56:52 +03:00
func ForgotPasswdPost ( ctx * context . Context ) {
2014-08-10 08:02:00 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "auth.forgot_password" )
if setting . MailService == nil {
2015-09-17 21:57:24 +03:00
ctx . Handle ( 403 , "ForgotPasswdPost" , nil )
2014-08-10 08:02:00 +04:00
return
}
ctx . Data [ "IsResetRequest" ] = true
email := ctx . Query ( "email" )
2015-09-17 21:57:24 +03:00
ctx . Data [ "Email" ] = email
2014-08-10 08:02:00 +04:00
u , err := models . GetUserByEmail ( email )
if err != nil {
2015-08-05 06:14:17 +03:00
if models . IsErrUserNotExist ( err ) {
2016-10-17 05:08:40 +03:00
ctx . Data [ "Hours" ] = setting . Service . ActiveCodeLives / 60
ctx . Data [ "IsResetSent" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplForgotPassword )
2016-10-17 05:08:40 +03:00
return
2014-08-10 08:02:00 +04:00
}
2016-11-18 06:03:03 +03:00
ctx . Handle ( 500 , "user.ResetPasswd(check existence)" , err )
2014-08-10 08:02:00 +04:00
return
}
2016-03-14 17:40:16 +03:00
if ! u . IsLocal ( ) {
ctx . Data [ "Err_Email" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "auth.non_local_account" ) , tplForgotPassword , nil )
2016-03-14 17:40:16 +03:00
return
}
2014-08-10 08:02:00 +04:00
if ctx . Cache . IsExist ( "MailResendLimit_" + u . LowerName ) {
ctx . Data [ "ResendLimited" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplForgotPassword )
2014-08-10 08:02:00 +04:00
return
}
2016-07-15 19:36:39 +03:00
models . SendResetPasswordMail ( ctx . Context , u )
2014-08-10 08:02:00 +04:00
if err = ctx . Cache . Put ( "MailResendLimit_" + u . LowerName , u . LowerName , 180 ) ; err != nil {
log . Error ( 4 , "Set cache(MailResendLimit) fail: %v" , err )
}
ctx . Data [ "Hours" ] = setting . Service . ActiveCodeLives / 60
ctx . Data [ "IsResetSent" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplForgotPassword )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// ResetPasswd render the reset password page
2016-03-11 19:56:52 +03:00
func ResetPasswd ( ctx * context . Context ) {
2014-08-10 08:02:00 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "auth.reset_password" )
2014-07-26 08:24:27 +04:00
code := ctx . Query ( "code" )
if len ( code ) == 0 {
ctx . Error ( 404 )
return
}
ctx . Data [ "Code" ] = code
ctx . Data [ "IsResetForm" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplResetPassword )
2014-07-26 08:24:27 +04:00
}
2016-11-18 06:03:03 +03:00
// ResetPasswdPost response fro reset password request
2016-03-11 19:56:52 +03:00
func ResetPasswdPost ( ctx * context . Context ) {
2014-08-10 08:02:00 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "auth.reset_password" )
code := ctx . Query ( "code" )
if len ( code ) == 0 {
ctx . Error ( 404 )
return
}
ctx . Data [ "Code" ] = code
if u := models . VerifyUserActiveCode ( code ) ; u != nil {
// Validate password length.
passwd := ctx . Query ( "password" )
if len ( passwd ) < 6 {
ctx . Data [ "IsResetForm" ] = true
ctx . Data [ "Err_Password" ] = true
2016-11-18 06:03:03 +03:00
ctx . RenderWithErr ( ctx . Tr ( "auth.password_too_short" ) , tplResetPassword , nil )
2014-08-10 08:02:00 +04:00
return
}
u . Passwd = passwd
2016-12-20 15:32:02 +03:00
var err error
if u . Rands , err = models . GetUserSalt ( ) ; err != nil {
ctx . Handle ( 500 , "UpdateUser" , err )
return
}
if u . Salt , err = models . GetUserSalt ( ) ; err != nil {
ctx . Handle ( 500 , "UpdateUser" , err )
return
}
2014-08-10 08:02:00 +04:00
u . EncodePasswd ( )
if err := models . UpdateUser ( u ) ; err != nil {
ctx . Handle ( 500 , "UpdateUser" , err )
return
}
log . Trace ( "User password reset: %s" , u . Name )
2016-11-27 13:14:25 +03:00
ctx . Redirect ( setting . AppSubURL + "/user/login" )
2014-08-10 08:02:00 +04:00
return
}
ctx . Data [ "IsResetFailed" ] = true
2016-11-18 06:03:03 +03:00
ctx . HTML ( 200 , tplResetPassword )
2014-07-26 08:24:27 +04:00
}