gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. // Copyright 2021 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package user
  4. import (
  5. "context"
  6. "fmt"
  7. "os"
  8. "strings"
  9. "time"
  10. "code.gitea.io/gitea/models/db"
  11. "code.gitea.io/gitea/models/organization"
  12. packages_model "code.gitea.io/gitea/models/packages"
  13. repo_model "code.gitea.io/gitea/models/repo"
  14. system_model "code.gitea.io/gitea/models/system"
  15. user_model "code.gitea.io/gitea/models/user"
  16. "code.gitea.io/gitea/modules/eventsource"
  17. "code.gitea.io/gitea/modules/log"
  18. "code.gitea.io/gitea/modules/setting"
  19. "code.gitea.io/gitea/modules/storage"
  20. "code.gitea.io/gitea/modules/structs"
  21. "code.gitea.io/gitea/modules/util"
  22. "code.gitea.io/gitea/services/agit"
  23. asymkey_service "code.gitea.io/gitea/services/asymkey"
  24. org_service "code.gitea.io/gitea/services/org"
  25. "code.gitea.io/gitea/services/packages"
  26. container_service "code.gitea.io/gitea/services/packages/container"
  27. repo_service "code.gitea.io/gitea/services/repository"
  28. )
  29. // RenameUser renames a user
  30. func RenameUser(ctx context.Context, u *user_model.User, newUserName string) error {
  31. if newUserName == u.Name {
  32. return nil
  33. }
  34. // Non-local users are not allowed to change their username.
  35. if !u.IsOrganization() && !u.IsLocal() {
  36. return user_model.ErrUserIsNotLocal{
  37. UID: u.ID,
  38. Name: u.Name,
  39. }
  40. }
  41. if err := user_model.IsUsableUsername(newUserName); err != nil {
  42. return err
  43. }
  44. onlyCapitalization := strings.EqualFold(newUserName, u.Name)
  45. oldUserName := u.Name
  46. if onlyCapitalization {
  47. u.Name = newUserName
  48. if err := user_model.UpdateUserCols(ctx, u, "name"); err != nil {
  49. u.Name = oldUserName
  50. return err
  51. }
  52. return repo_model.UpdateRepositoryOwnerNames(ctx, u.ID, newUserName)
  53. }
  54. ctx, committer, err := db.TxContext(ctx)
  55. if err != nil {
  56. return err
  57. }
  58. defer committer.Close()
  59. isExist, err := user_model.IsUserExist(ctx, u.ID, newUserName)
  60. if err != nil {
  61. return err
  62. }
  63. if isExist {
  64. return user_model.ErrUserAlreadyExist{
  65. Name: newUserName,
  66. }
  67. }
  68. if err = repo_model.UpdateRepositoryOwnerName(ctx, oldUserName, newUserName); err != nil {
  69. return err
  70. }
  71. if err = user_model.NewUserRedirect(ctx, u.ID, oldUserName, newUserName); err != nil {
  72. return err
  73. }
  74. if err := agit.UserNameChanged(ctx, u, newUserName); err != nil {
  75. return err
  76. }
  77. if err := container_service.UpdateRepositoryNames(ctx, u, newUserName); err != nil {
  78. return err
  79. }
  80. u.Name = newUserName
  81. u.LowerName = strings.ToLower(newUserName)
  82. if err := user_model.UpdateUserCols(ctx, u, "name", "lower_name"); err != nil {
  83. u.Name = oldUserName
  84. u.LowerName = strings.ToLower(oldUserName)
  85. return err
  86. }
  87. // Do not fail if directory does not exist
  88. if err = util.Rename(user_model.UserPath(oldUserName), user_model.UserPath(newUserName)); err != nil && !os.IsNotExist(err) {
  89. u.Name = oldUserName
  90. u.LowerName = strings.ToLower(oldUserName)
  91. return fmt.Errorf("rename user directory: %w", err)
  92. }
  93. if err = committer.Commit(); err != nil {
  94. u.Name = oldUserName
  95. u.LowerName = strings.ToLower(oldUserName)
  96. if err2 := util.Rename(user_model.UserPath(newUserName), user_model.UserPath(oldUserName)); err2 != nil && !os.IsNotExist(err2) {
  97. log.Critical("Unable to rollback directory change during failed username change from: %s to: %s. DB Error: %v. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  98. return fmt.Errorf("failed to rollback directory change during failed username change from: %s to: %s. DB Error: %w. Filesystem Error: %v", oldUserName, newUserName, err, err2)
  99. }
  100. return err
  101. }
  102. return nil
  103. }
  104. // DeleteUser completely and permanently deletes everything of a user,
  105. // but issues/comments/pulls will be kept and shown as someone has been deleted,
  106. // unless the user is younger than USER_DELETE_WITH_COMMENTS_MAX_DAYS.
  107. func DeleteUser(ctx context.Context, u *user_model.User, purge bool) error {
  108. if u.IsOrganization() {
  109. return fmt.Errorf("%s is an organization not a user", u.Name)
  110. }
  111. if u.IsActive && user_model.IsLastAdminUser(ctx, u) {
  112. return user_model.ErrDeleteLastAdminUser{UID: u.ID}
  113. }
  114. if purge {
  115. // Disable the user first
  116. // NOTE: This is deliberately not within a transaction as it must disable the user immediately to prevent any further action by the user to be purged.
  117. if err := user_model.UpdateUserCols(ctx, &user_model.User{
  118. ID: u.ID,
  119. IsActive: false,
  120. IsRestricted: true,
  121. IsAdmin: false,
  122. ProhibitLogin: true,
  123. Passwd: "",
  124. Salt: "",
  125. PasswdHashAlgo: "",
  126. MaxRepoCreation: 0,
  127. }, "is_active", "is_restricted", "is_admin", "prohibit_login", "max_repo_creation", "passwd", "salt", "passwd_hash_algo"); err != nil {
  128. return fmt.Errorf("unable to disable user: %s[%d] prior to purge. UpdateUserCols: %w", u.Name, u.ID, err)
  129. }
  130. // Force any logged in sessions to log out
  131. // FIXME: We also need to tell the session manager to log them out too.
  132. eventsource.GetManager().SendMessage(u.ID, &eventsource.Event{
  133. Name: "logout",
  134. })
  135. // Delete all repos belonging to this user
  136. // Now this is not within a transaction because there are internal transactions within the DeleteRepository
  137. // BUT: the db will still be consistent even if a number of repos have already been deleted.
  138. // And in fact we want to capture any repositories that are being created in other transactions in the meantime
  139. //
  140. // An alternative option here would be write a DeleteAllRepositoriesForUserID function which would delete all of the repos
  141. // but such a function would likely get out of date
  142. err := repo_service.DeleteOwnerRepositoriesDirectly(ctx, u)
  143. if err != nil {
  144. return err
  145. }
  146. // Remove from Organizations and delete last owner organizations
  147. // Now this is not within a transaction because there are internal transactions within the DeleteOrganization
  148. // BUT: the db will still be consistent even if a number of organizations memberships and organizations have already been deleted
  149. // And in fact we want to capture any organization additions that are being created in other transactions in the meantime
  150. //
  151. // An alternative option here would be write a function which would delete all organizations but it seems
  152. // but such a function would likely get out of date
  153. for {
  154. orgs, err := db.Find[organization.Organization](ctx, organization.FindOrgOptions{
  155. ListOptions: db.ListOptions{
  156. PageSize: repo_model.RepositoryListDefaultPageSize,
  157. Page: 1,
  158. },
  159. UserID: u.ID,
  160. IncludeVisibility: structs.VisibleTypePrivate,
  161. })
  162. if err != nil {
  163. return fmt.Errorf("unable to find org list for %s[%d]. Error: %w", u.Name, u.ID, err)
  164. }
  165. if len(orgs) == 0 {
  166. break
  167. }
  168. for _, org := range orgs {
  169. if err := org_service.RemoveOrgUser(ctx, org, u); err != nil {
  170. if organization.IsErrLastOrgOwner(err) {
  171. err = org_service.DeleteOrganization(ctx, org, true)
  172. if err != nil {
  173. return fmt.Errorf("unable to delete organization %d: %w", org.ID, err)
  174. }
  175. }
  176. if err != nil {
  177. return fmt.Errorf("unable to remove user %s[%d] from org %s[%d]. Error: %w", u.Name, u.ID, org.Name, org.ID, err)
  178. }
  179. }
  180. }
  181. }
  182. // Delete Packages
  183. if setting.Packages.Enabled {
  184. if _, err := packages.RemoveAllPackages(ctx, u.ID); err != nil {
  185. return err
  186. }
  187. }
  188. }
  189. if err := db.WithTx(ctx, func(ctx context.Context) error {
  190. // Note: A user owns any repository or belongs to any organization
  191. // cannot perform delete operation. This causes a race with the purge above
  192. // however consistency requires that we ensure that this is the case
  193. // Check ownership of repository.
  194. count, err := repo_model.CountRepositories(ctx, repo_model.CountRepositoryOptions{OwnerID: u.ID})
  195. if err != nil {
  196. return fmt.Errorf("GetRepositoryCount: %w", err)
  197. } else if count > 0 {
  198. return repo_model.ErrUserOwnRepos{UID: u.ID}
  199. }
  200. // Check membership of organization.
  201. count, err = organization.GetOrganizationCount(ctx, u)
  202. if err != nil {
  203. return fmt.Errorf("GetOrganizationCount: %w", err)
  204. } else if count > 0 {
  205. return organization.ErrUserHasOrgs{UID: u.ID}
  206. }
  207. // Check ownership of packages.
  208. if ownsPackages, err := packages_model.HasOwnerPackages(ctx, u.ID); err != nil {
  209. return fmt.Errorf("HasOwnerPackages: %w", err)
  210. } else if ownsPackages {
  211. return packages_model.ErrUserOwnPackages{UID: u.ID}
  212. }
  213. if err := deleteUser(ctx, u, purge); err != nil {
  214. return fmt.Errorf("DeleteUser: %w", err)
  215. }
  216. return nil
  217. }); err != nil {
  218. return err
  219. }
  220. if err := asymkey_service.RewriteAllPublicKeys(ctx); err != nil {
  221. return err
  222. }
  223. if err := asymkey_service.RewriteAllPrincipalKeys(ctx); err != nil {
  224. return err
  225. }
  226. // Note: There are something just cannot be roll back, so just keep error logs of those operations.
  227. path := user_model.UserPath(u.Name)
  228. if err := util.RemoveAll(path); err != nil {
  229. err = fmt.Errorf("failed to RemoveAll %s: %w", path, err)
  230. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  231. }
  232. if u.Avatar != "" {
  233. avatarPath := u.CustomAvatarRelativePath()
  234. if err := storage.Avatars.Delete(avatarPath); err != nil {
  235. err = fmt.Errorf("failed to remove %s: %w", avatarPath, err)
  236. _ = system_model.CreateNotice(ctx, system_model.NoticeTask, fmt.Sprintf("delete user '%s': %v", u.Name, err))
  237. }
  238. }
  239. return nil
  240. }
  241. // DeleteInactiveUsers deletes all inactive users and their email addresses.
  242. func DeleteInactiveUsers(ctx context.Context, olderThan time.Duration) error {
  243. inactiveUsers, err := user_model.GetInactiveUsers(ctx, olderThan)
  244. if err != nil {
  245. return err
  246. }
  247. // FIXME: should only update authorized_keys file once after all deletions.
  248. for _, u := range inactiveUsers {
  249. if err = DeleteUser(ctx, u, false); err != nil {
  250. // Ignore inactive users that were ever active but then were set inactive by admin
  251. if repo_model.IsErrUserOwnRepos(err) || organization.IsErrUserHasOrgs(err) || packages_model.IsErrUserOwnPackages(err) {
  252. log.Warn("Inactive user %q has repositories, organizations or packages, skipping deletion: %v", u.Name, err)
  253. continue
  254. }
  255. select {
  256. case <-ctx.Done():
  257. return db.ErrCancelledf("when deleting inactive user %q", u.Name)
  258. default:
  259. return err
  260. }
  261. }
  262. }
  263. return nil // TODO: there could be still inactive users left, and the number would increase gradually
  264. }