setting.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "strconv"
  7. "github.com/gogits/gogs/models"
  8. "github.com/gogits/gogs/modules/auth"
  9. "github.com/gogits/gogs/modules/base"
  10. "github.com/gogits/gogs/modules/log"
  11. "github.com/gogits/gogs/modules/middleware"
  12. )
  13. // render user setting page (email, website modify)
  14. func Setting(ctx *middleware.Context, form auth.UpdateProfileForm) {
  15. ctx.Data["Title"] = "Setting"
  16. ctx.Data["PageIsUserSetting"] = true
  17. user := ctx.User
  18. ctx.Data["Owner"] = user
  19. if ctx.Req.Method == "GET" {
  20. ctx.Render.HTML(200, "user/setting", ctx.Data)
  21. return
  22. }
  23. // below is for POST requests
  24. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  25. ctx.Render.HTML(200, "user/setting", ctx.Data)
  26. return
  27. }
  28. user.Email = form.Email
  29. user.Website = form.Website
  30. user.Location = form.Location
  31. user.Avatar = base.EncodeMd5(form.Avatar)
  32. user.AvatarEmail = form.Avatar
  33. if err := models.UpdateUser(user); err != nil {
  34. ctx.Handle(200, "setting.Setting", err)
  35. return
  36. }
  37. ctx.Data["IsSuccess"] = true
  38. ctx.Render.HTML(200, "user/setting", ctx.Data)
  39. }
  40. func SettingPassword(ctx *middleware.Context, form auth.UpdatePasswdForm) {
  41. ctx.Data["Title"] = "Password"
  42. ctx.Data["PageIsUserSetting"] = true
  43. if ctx.Req.Method == "GET" {
  44. ctx.Render.HTML(200, "user/password", ctx.Data)
  45. return
  46. }
  47. user := ctx.User
  48. newUser := &models.User{Passwd: form.NewPasswd}
  49. if err := newUser.EncodePasswd(); err != nil {
  50. ctx.Handle(200, "setting.SettingPassword", err)
  51. return
  52. }
  53. if user.Passwd != newUser.Passwd {
  54. ctx.Data["HasError"] = true
  55. ctx.Data["ErrorMsg"] = "Old password is not correct"
  56. } else if form.NewPasswd != form.RetypePasswd {
  57. ctx.Data["HasError"] = true
  58. ctx.Data["ErrorMsg"] = "New password and re-type password are not same"
  59. } else {
  60. user.Passwd = newUser.Passwd
  61. if err := models.UpdateUser(user); err != nil {
  62. ctx.Handle(200, "setting.SettingPassword", err)
  63. return
  64. }
  65. ctx.Data["IsSuccess"] = true
  66. }
  67. ctx.Data["Owner"] = user
  68. ctx.Render.HTML(200, "user/password", ctx.Data)
  69. }
  70. func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) {
  71. ctx.Data["Title"] = "SSH Keys"
  72. // Delete SSH key.
  73. if ctx.Req.Method == "DELETE" || ctx.Query("_method") == "DELETE" {
  74. id, err := strconv.ParseInt(ctx.Query("id"), 10, 64)
  75. if err != nil {
  76. ctx.Data["ErrorMsg"] = err
  77. log.Error("ssh.DelPublicKey: %v", err)
  78. ctx.Render.JSON(200, map[string]interface{}{
  79. "ok": false,
  80. "err": err.Error(),
  81. })
  82. return
  83. }
  84. k := &models.PublicKey{
  85. Id: id,
  86. OwnerId: ctx.User.Id,
  87. }
  88. if err = models.DeletePublicKey(k); err != nil {
  89. ctx.Data["ErrorMsg"] = err
  90. log.Error("ssh.DelPublicKey: %v", err)
  91. ctx.Render.JSON(200, map[string]interface{}{
  92. "ok": false,
  93. "err": err.Error(),
  94. })
  95. } else {
  96. ctx.Render.JSON(200, map[string]interface{}{
  97. "ok": true,
  98. })
  99. }
  100. return
  101. }
  102. // Add new SSH key.
  103. if ctx.Req.Method == "POST" {
  104. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  105. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  106. return
  107. }
  108. k := &models.PublicKey{OwnerId: ctx.User.Id,
  109. Name: form.KeyName,
  110. Content: form.KeyContent,
  111. }
  112. if err := models.AddPublicKey(k); err != nil {
  113. if err.Error() == models.ErrKeyAlreadyExist.Error() {
  114. ctx.RenderWithErr("Public key name has been used", "user/publickey", &form)
  115. return
  116. }
  117. ctx.Handle(200, "ssh.AddPublicKey", err)
  118. return
  119. } else {
  120. ctx.Data["AddSSHKeySuccess"] = true
  121. }
  122. }
  123. // List existed SSH keys.
  124. keys, err := models.ListPublicKey(ctx.User.Id)
  125. if err != nil {
  126. ctx.Handle(200, "ssh.ListPublicKey", err)
  127. return
  128. }
  129. ctx.Data["PageIsUserSetting"] = true
  130. ctx.Data["Keys"] = keys
  131. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  132. }
  133. func SettingNotification(ctx *middleware.Context) {
  134. // todo user setting notification
  135. ctx.Data["Title"] = "Notification"
  136. ctx.Data["PageIsUserSetting"] = true
  137. ctx.Render.HTML(200, "user/notification", ctx.Data)
  138. }
  139. func SettingSecurity(ctx *middleware.Context) {
  140. // todo user setting security
  141. ctx.Data["Title"] = "Security"
  142. ctx.Data["PageIsUserSetting"] = true
  143. ctx.Render.HTML(200, "user/security", ctx.Data)
  144. }