| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493 |
- // Copyright 2015 The Gogs Authors. All rights reserved.
- // Copyright 2019 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package admin
-
- import (
- "errors"
- "fmt"
- "net/http"
-
- asymkey_model "code.gitea.io/gitea/models/asymkey"
- "code.gitea.io/gitea/models/auth"
- "code.gitea.io/gitea/models/db"
- org_model "code.gitea.io/gitea/models/organization"
- packages_model "code.gitea.io/gitea/models/packages"
- repo_model "code.gitea.io/gitea/models/repo"
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/auth/password"
- "code.gitea.io/gitea/modules/log"
- "code.gitea.io/gitea/modules/optional"
- "code.gitea.io/gitea/modules/setting"
- api "code.gitea.io/gitea/modules/structs"
- "code.gitea.io/gitea/modules/timeutil"
- "code.gitea.io/gitea/modules/web"
- "code.gitea.io/gitea/routers/api/v1/user"
- "code.gitea.io/gitea/routers/api/v1/utils"
- asymkey_service "code.gitea.io/gitea/services/asymkey"
- "code.gitea.io/gitea/services/context"
- "code.gitea.io/gitea/services/convert"
- "code.gitea.io/gitea/services/mailer"
- user_service "code.gitea.io/gitea/services/user"
- )
-
- func parseAuthSource(ctx *context.APIContext, u *user_model.User, sourceID int64) {
- if sourceID == 0 {
- return
- }
-
- source, err := auth.GetSourceByID(ctx, sourceID)
- if err != nil {
- if auth.IsErrSourceNotExist(err) {
- ctx.APIError(http.StatusUnprocessableEntity, err)
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
-
- u.LoginType = source.Type
- u.LoginSource = source.ID
- }
-
- // CreateUser create a user
- func CreateUser(ctx *context.APIContext) {
- // swagger:operation POST /admin/users admin adminCreateUser
- // ---
- // summary: Create a user
- // consumes:
- // - application/json
- // produces:
- // - application/json
- // parameters:
- // - name: body
- // in: body
- // schema:
- // "$ref": "#/definitions/CreateUserOption"
- // responses:
- // "201":
- // "$ref": "#/responses/User"
- // "400":
- // "$ref": "#/responses/error"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "422":
- // "$ref": "#/responses/validationError"
-
- form := web.GetForm(ctx).(*api.CreateUserOption)
-
- u := &user_model.User{
- Name: form.Username,
- FullName: form.FullName,
- Email: form.Email,
- Passwd: form.Password,
- MustChangePassword: true,
- LoginType: auth.Plain,
- LoginName: form.LoginName,
- }
- if form.MustChangePassword != nil {
- u.MustChangePassword = *form.MustChangePassword
- }
-
- parseAuthSource(ctx, u, form.SourceID)
- if ctx.Written() {
- return
- }
-
- if u.LoginType == auth.Plain {
- if len(form.Password) < setting.MinPasswordLength {
- err := errors.New("PasswordIsRequired")
- ctx.APIError(http.StatusBadRequest, err)
- return
- }
-
- if !password.IsComplexEnough(form.Password) {
- err := errors.New("PasswordComplexity")
- ctx.APIError(http.StatusBadRequest, err)
- return
- }
-
- if err := password.IsPwned(ctx, form.Password); err != nil {
- if password.IsErrIsPwnedRequest(err) {
- log.Error(err.Error())
- }
- ctx.APIError(http.StatusBadRequest, errors.New("PasswordPwned"))
- return
- }
- }
-
- overwriteDefault := &user_model.CreateUserOverwriteOptions{
- IsActive: optional.Some(true),
- IsRestricted: optional.FromPtr(form.Restricted),
- }
-
- if form.Visibility != "" {
- visibility := api.VisibilityModes[form.Visibility]
- overwriteDefault.Visibility = &visibility
- }
-
- // Update the user creation timestamp. This can only be done after the user
- // record has been inserted into the database; the insert intself will always
- // set the creation timestamp to "now".
- if form.Created != nil {
- u.CreatedUnix = timeutil.TimeStamp(form.Created.Unix())
- u.UpdatedUnix = u.CreatedUnix
- }
-
- if err := user_model.AdminCreateUser(ctx, u, &user_model.Meta{}, overwriteDefault); err != nil {
- if user_model.IsErrUserAlreadyExist(err) ||
- user_model.IsErrEmailAlreadyUsed(err) ||
- db.IsErrNameReserved(err) ||
- db.IsErrNameCharsNotAllowed(err) ||
- user_model.IsErrEmailCharIsNotSupported(err) ||
- user_model.IsErrEmailInvalid(err) ||
- db.IsErrNamePatternNotAllowed(err) {
- ctx.APIError(http.StatusUnprocessableEntity, err)
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
-
- if !user_model.IsEmailDomainAllowed(u.Email) {
- ctx.Resp.Header().Add("X-Gitea-Warning", fmt.Sprintf("the domain of user email %s conflicts with EMAIL_DOMAIN_ALLOWLIST or EMAIL_DOMAIN_BLOCKLIST", u.Email))
- }
-
- log.Trace("Account created by admin (%s): %s", ctx.Doer.Name, u.Name)
-
- // Send email notification.
- if form.SendNotify {
- mailer.SendRegisterNotifyMail(u)
- }
- ctx.JSON(http.StatusCreated, convert.ToUser(ctx, u, ctx.Doer))
- }
-
- // EditUser api for modifying a user's information
- func EditUser(ctx *context.APIContext) {
- // swagger:operation PATCH /admin/users/{username} admin adminEditUser
- // ---
- // summary: Edit an existing user
- // consumes:
- // - application/json
- // produces:
- // - application/json
- // parameters:
- // - name: username
- // in: path
- // description: username of the user whose data is to be edited
- // type: string
- // required: true
- // - name: body
- // in: body
- // schema:
- // "$ref": "#/definitions/EditUserOption"
- // responses:
- // "200":
- // "$ref": "#/responses/User"
- // "400":
- // "$ref": "#/responses/error"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "422":
- // "$ref": "#/responses/validationError"
-
- form := web.GetForm(ctx).(*api.EditUserOption)
-
- authOpts := &user_service.UpdateAuthOptions{
- LoginSource: optional.FromNonDefault(form.SourceID),
- LoginName: optional.Some(form.LoginName),
- Password: optional.FromNonDefault(form.Password),
- MustChangePassword: optional.FromPtr(form.MustChangePassword),
- ProhibitLogin: optional.FromPtr(form.ProhibitLogin),
- }
- if err := user_service.UpdateAuth(ctx, ctx.ContextUser, authOpts); err != nil {
- switch {
- case errors.Is(err, password.ErrMinLength):
- ctx.APIError(http.StatusBadRequest, fmt.Errorf("password must be at least %d characters", setting.MinPasswordLength))
- case errors.Is(err, password.ErrComplexity):
- ctx.APIError(http.StatusBadRequest, err)
- case errors.Is(err, password.ErrIsPwned), password.IsErrIsPwnedRequest(err):
- ctx.APIError(http.StatusBadRequest, err)
- default:
- ctx.APIErrorInternal(err)
- }
- return
- }
-
- if form.Email != nil {
- if err := user_service.AdminAddOrSetPrimaryEmailAddress(ctx, ctx.ContextUser, *form.Email); err != nil {
- switch {
- case user_model.IsErrEmailCharIsNotSupported(err), user_model.IsErrEmailInvalid(err):
- ctx.APIError(http.StatusBadRequest, err)
- case user_model.IsErrEmailAlreadyUsed(err):
- ctx.APIError(http.StatusBadRequest, err)
- default:
- ctx.APIErrorInternal(err)
- }
- return
- }
-
- if !user_model.IsEmailDomainAllowed(*form.Email) {
- ctx.Resp.Header().Add("X-Gitea-Warning", fmt.Sprintf("the domain of user email %s conflicts with EMAIL_DOMAIN_ALLOWLIST or EMAIL_DOMAIN_BLOCKLIST", *form.Email))
- }
- }
-
- opts := &user_service.UpdateOptions{
- FullName: optional.FromPtr(form.FullName),
- Website: optional.FromPtr(form.Website),
- Location: optional.FromPtr(form.Location),
- Description: optional.FromPtr(form.Description),
- IsActive: optional.FromPtr(form.Active),
- IsAdmin: user_service.UpdateOptionFieldFromPtr(form.Admin),
- Visibility: optional.FromMapLookup(api.VisibilityModes, form.Visibility),
- AllowGitHook: optional.FromPtr(form.AllowGitHook),
- AllowImportLocal: optional.FromPtr(form.AllowImportLocal),
- MaxRepoCreation: optional.FromPtr(form.MaxRepoCreation),
- AllowCreateOrganization: optional.FromPtr(form.AllowCreateOrganization),
- IsRestricted: optional.FromPtr(form.Restricted),
- }
-
- if err := user_service.UpdateUser(ctx, ctx.ContextUser, opts); err != nil {
- if user_model.IsErrDeleteLastAdminUser(err) {
- ctx.APIError(http.StatusBadRequest, err)
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
-
- log.Trace("Account profile updated by admin (%s): %s", ctx.Doer.Name, ctx.ContextUser.Name)
-
- ctx.JSON(http.StatusOK, convert.ToUser(ctx, ctx.ContextUser, ctx.Doer))
- }
-
- // DeleteUser api for deleting a user
- func DeleteUser(ctx *context.APIContext) {
- // swagger:operation DELETE /admin/users/{username} admin adminDeleteUser
- // ---
- // summary: Delete a user
- // produces:
- // - application/json
- // parameters:
- // - name: username
- // in: path
- // description: username of the user to delete
- // type: string
- // required: true
- // - name: purge
- // in: query
- // description: purge the user from the system completely
- // type: boolean
- // responses:
- // "204":
- // "$ref": "#/responses/empty"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "404":
- // "$ref": "#/responses/notFound"
- // "422":
- // "$ref": "#/responses/validationError"
-
- if ctx.ContextUser.IsOrganization() {
- ctx.APIError(http.StatusUnprocessableEntity, fmt.Errorf("%s is an organization not a user", ctx.ContextUser.Name))
- return
- }
-
- // admin should not delete themself
- if ctx.ContextUser.ID == ctx.Doer.ID {
- ctx.APIError(http.StatusUnprocessableEntity, errors.New("you cannot delete yourself"))
- return
- }
-
- if err := user_service.DeleteUser(ctx, ctx.ContextUser, ctx.FormBool("purge")); err != nil {
- if repo_model.IsErrUserOwnRepos(err) ||
- org_model.IsErrUserHasOrgs(err) ||
- packages_model.IsErrUserOwnPackages(err) ||
- user_model.IsErrDeleteLastAdminUser(err) {
- ctx.APIError(http.StatusUnprocessableEntity, err)
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
- log.Trace("Account deleted by admin(%s): %s", ctx.Doer.Name, ctx.ContextUser.Name)
-
- ctx.Status(http.StatusNoContent)
- }
-
- // CreatePublicKey api for creating a public key to a user
- func CreatePublicKey(ctx *context.APIContext) {
- // swagger:operation POST /admin/users/{username}/keys admin adminCreatePublicKey
- // ---
- // summary: Add a public key on behalf of a user
- // consumes:
- // - application/json
- // produces:
- // - application/json
- // parameters:
- // - name: username
- // in: path
- // description: username of the user who is to receive a public key
- // type: string
- // required: true
- // - name: key
- // in: body
- // schema:
- // "$ref": "#/definitions/CreateKeyOption"
- // responses:
- // "201":
- // "$ref": "#/responses/PublicKey"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "422":
- // "$ref": "#/responses/validationError"
-
- form := web.GetForm(ctx).(*api.CreateKeyOption)
-
- user.CreateUserPublicKey(ctx, *form, ctx.ContextUser.ID)
- }
-
- // DeleteUserPublicKey api for deleting a user's public key
- func DeleteUserPublicKey(ctx *context.APIContext) {
- // swagger:operation DELETE /admin/users/{username}/keys/{id} admin adminDeleteUserPublicKey
- // ---
- // summary: Delete a user's public key
- // produces:
- // - application/json
- // parameters:
- // - name: username
- // in: path
- // description: username of the user whose public key is to be deleted
- // type: string
- // required: true
- // - name: id
- // in: path
- // description: id of the key to delete
- // type: integer
- // format: int64
- // required: true
- // responses:
- // "204":
- // "$ref": "#/responses/empty"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "404":
- // "$ref": "#/responses/notFound"
-
- if err := asymkey_service.DeletePublicKey(ctx, ctx.ContextUser, ctx.PathParamInt64("id")); err != nil {
- if asymkey_model.IsErrKeyNotExist(err) {
- ctx.APIErrorNotFound()
- } else if asymkey_model.IsErrKeyAccessDenied(err) {
- ctx.APIError(http.StatusForbidden, "You do not have access to this key")
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
- log.Trace("Key deleted by admin(%s): %s", ctx.Doer.Name, ctx.ContextUser.Name)
-
- ctx.Status(http.StatusNoContent)
- }
-
- // SearchUsers API for getting information of the users according the filter conditions
- func SearchUsers(ctx *context.APIContext) {
- // swagger:operation GET /admin/users admin adminSearchUsers
- // ---
- // summary: Search users according filter conditions
- // produces:
- // - application/json
- // parameters:
- // - name: source_id
- // in: query
- // description: ID of the user's login source to search for
- // type: integer
- // format: int64
- // - name: login_name
- // in: query
- // description: identifier of the user, provided by the external authenticator
- // type: string
- // - name: page
- // in: query
- // description: page number of results to return (1-based)
- // type: integer
- // - name: limit
- // in: query
- // description: page size of results
- // type: integer
- // responses:
- // "200":
- // "$ref": "#/responses/UserList"
- // "403":
- // "$ref": "#/responses/forbidden"
-
- listOptions := utils.GetListOptions(ctx)
-
- users, maxResults, err := user_model.SearchUsers(ctx, user_model.SearchUserOptions{
- Actor: ctx.Doer,
- Type: user_model.UserTypeIndividual,
- LoginName: ctx.FormTrim("login_name"),
- SourceID: ctx.FormInt64("source_id"),
- OrderBy: db.SearchOrderByAlphabetically,
- ListOptions: listOptions,
- })
- if err != nil {
- ctx.APIErrorInternal(err)
- return
- }
-
- results := make([]*api.User, len(users))
- for i := range users {
- results[i] = convert.ToUser(ctx, users[i], ctx.Doer)
- }
-
- ctx.SetLinkHeader(int(maxResults), listOptions.PageSize)
- ctx.SetTotalCountHeader(maxResults)
- ctx.JSON(http.StatusOK, &results)
- }
-
- // RenameUser api for renaming a user
- func RenameUser(ctx *context.APIContext) {
- // swagger:operation POST /admin/users/{username}/rename admin adminRenameUser
- // ---
- // summary: Rename a user
- // produces:
- // - application/json
- // parameters:
- // - name: username
- // in: path
- // description: current username of the user
- // type: string
- // required: true
- // - name: body
- // in: body
- // required: true
- // schema:
- // "$ref": "#/definitions/RenameUserOption"
- // responses:
- // "204":
- // "$ref": "#/responses/empty"
- // "403":
- // "$ref": "#/responses/forbidden"
- // "422":
- // "$ref": "#/responses/validationError"
-
- if ctx.ContextUser.IsOrganization() {
- ctx.APIError(http.StatusUnprocessableEntity, fmt.Errorf("%s is an organization not a user", ctx.ContextUser.Name))
- return
- }
-
- newName := web.GetForm(ctx).(*api.RenameUserOption).NewName
-
- // Check if username has been changed
- if err := user_service.RenameUser(ctx, ctx.ContextUser, newName); err != nil {
- if user_model.IsErrUserAlreadyExist(err) || db.IsErrNameReserved(err) || db.IsErrNamePatternNotAllowed(err) || db.IsErrNameCharsNotAllowed(err) {
- ctx.APIError(http.StatusUnprocessableEntity, err)
- } else {
- ctx.APIErrorInternal(err)
- }
- return
- }
- ctx.Status(http.StatusNoContent)
- }
|