| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Copyright 2018 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package setting
-
- import (
- "net/http"
- "strings"
-
- auth_model "code.gitea.io/gitea/models/auth"
- "code.gitea.io/gitea/models/db"
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/setting"
- "code.gitea.io/gitea/modules/templates"
- "code.gitea.io/gitea/modules/util"
- "code.gitea.io/gitea/modules/web"
- "code.gitea.io/gitea/services/context"
- "code.gitea.io/gitea/services/forms"
- )
-
- const (
- tplSettingsApplications templates.TplName = "user/settings/applications"
- )
-
- // Applications render manage access token page
- func Applications(ctx *context.Context) {
- ctx.Data["Title"] = ctx.Tr("settings.applications")
- ctx.Data["PageIsSettingsApplications"] = true
- ctx.Data["UserDisabledFeatures"] = user_model.DisabledFeaturesWithLoginType(ctx.Doer)
-
- loadApplicationsData(ctx)
-
- ctx.HTML(http.StatusOK, tplSettingsApplications)
- }
-
- // ApplicationsPost response for add user's access token
- func ApplicationsPost(ctx *context.Context) {
- form := web.GetForm(ctx).(*forms.NewAccessTokenForm)
- ctx.Data["Title"] = ctx.Tr("settings")
- ctx.Data["PageIsSettingsApplications"] = true
- ctx.Data["UserDisabledFeatures"] = user_model.DisabledFeaturesWithLoginType(ctx.Doer)
-
- _ = ctx.Req.ParseForm()
- var scopeNames []string
- const accessTokenScopePrefix = "scope-"
- for k, v := range ctx.Req.Form {
- if strings.HasPrefix(k, accessTokenScopePrefix) {
- scopeNames = append(scopeNames, v...)
- }
- }
-
- scope, err := auth_model.AccessTokenScope(strings.Join(scopeNames, ",")).Normalize()
- if err != nil {
- ctx.ServerError("GetScope", err)
- return
- }
- if !scope.HasPermissionScope() {
- ctx.Flash.Error(ctx.Tr("settings.at_least_one_permission"), true)
- }
-
- if ctx.HasError() {
- loadApplicationsData(ctx)
- ctx.HTML(http.StatusOK, tplSettingsApplications)
- return
- }
-
- t := &auth_model.AccessToken{
- UID: ctx.Doer.ID,
- Name: form.Name,
- Scope: scope,
- }
-
- exist, err := auth_model.AccessTokenByNameExists(ctx, t)
- if err != nil {
- ctx.ServerError("AccessTokenByNameExists", err)
- return
- }
- if exist {
- ctx.Flash.Error(ctx.Tr("settings.generate_token_name_duplicate", t.Name))
- ctx.Redirect(setting.AppSubURL + "/user/settings/applications")
- return
- }
-
- if err := auth_model.NewAccessToken(ctx, t); err != nil {
- ctx.ServerError("NewAccessToken", err)
- return
- }
-
- ctx.Flash.Success(ctx.Tr("settings.generate_token_success"))
- ctx.Flash.Info(t.Token)
-
- ctx.Redirect(setting.AppSubURL + "/user/settings/applications")
- }
-
- // DeleteApplication response for delete user access token
- func DeleteApplication(ctx *context.Context) {
- if err := auth_model.DeleteAccessTokenByID(ctx, ctx.FormInt64("id"), ctx.Doer.ID); err != nil {
- ctx.Flash.Error("DeleteAccessTokenByID: " + err.Error())
- } else {
- ctx.Flash.Success(ctx.Tr("settings.delete_token_success"))
- }
-
- ctx.JSONRedirect(setting.AppSubURL + "/user/settings/applications")
- }
-
- func loadApplicationsData(ctx *context.Context) {
- ctx.Data["AccessTokenScopePublicOnly"] = auth_model.AccessTokenScopePublicOnly
- tokens, err := db.Find[auth_model.AccessToken](ctx, auth_model.ListAccessTokensOptions{UserID: ctx.Doer.ID})
- if err != nil {
- ctx.ServerError("ListAccessTokens", err)
- return
- }
- ctx.Data["Tokens"] = tokens
- ctx.Data["EnableOAuth2"] = setting.OAuth2.Enabled
-
- // Handle specific ordered token categories for admin or non-admin users
- tokenCategoryNames := auth_model.GetAccessTokenCategories()
- if !ctx.Doer.IsAdmin {
- tokenCategoryNames = util.SliceRemoveAll(tokenCategoryNames, "admin")
- }
- ctx.Data["TokenCategories"] = tokenCategoryNames
-
- if setting.OAuth2.Enabled {
- ctx.Data["Applications"], err = db.Find[auth_model.OAuth2Application](ctx, auth_model.FindOAuth2ApplicationsOptions{
- OwnerID: ctx.Doer.ID,
- })
- if err != nil {
- ctx.ServerError("GetOAuth2ApplicationsByUserID", err)
- return
- }
- ctx.Data["Grants"], err = auth_model.GetOAuth2GrantsByUserID(ctx, ctx.Doer.ID)
- if err != nil {
- ctx.ServerError("GetOAuth2GrantsByUserID", err)
- return
- }
- }
- }
|