setting.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package user
  5. import (
  6. "strconv"
  7. "github.com/gogits/gogs/models"
  8. "github.com/gogits/gogs/modules/auth"
  9. "github.com/gogits/gogs/modules/base"
  10. "github.com/gogits/gogs/modules/log"
  11. "github.com/gogits/gogs/modules/middleware"
  12. )
  13. func Setting(ctx *middleware.Context, form auth.UpdateProfileForm) {
  14. ctx.Data["Title"] = "Setting"
  15. ctx.Data["PageIsUserSetting"] = true
  16. user := ctx.User
  17. ctx.Data["Owner"] = user
  18. if ctx.Req.Method == "GET" {
  19. ctx.Render.HTML(200, "user/setting", ctx.Data)
  20. return
  21. }
  22. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  23. ctx.Render.HTML(200, "user/setting", ctx.Data)
  24. return
  25. }
  26. user.Email = form.Email
  27. user.Website = form.Website
  28. user.Location = form.Location
  29. user.Avatar = base.EncodeMd5(form.Avatar)
  30. user.AvatarEmail = form.Avatar
  31. if err := models.UpdateUser(user); err != nil {
  32. ctx.Handle(200, "setting.Setting", err)
  33. return
  34. }
  35. ctx.Data["IsSuccess"] = true
  36. ctx.Render.HTML(200, "user/setting", ctx.Data)
  37. }
  38. func SettingPassword(ctx *middleware.Context, form auth.UpdatePasswdForm) {
  39. ctx.Data["Title"] = "Password"
  40. ctx.Data["PageIsUserSetting"] = true
  41. if ctx.Req.Method == "GET" {
  42. ctx.Render.HTML(200, "user/password", ctx.Data)
  43. return
  44. }
  45. user := ctx.User
  46. newUser := &models.User{Passwd: form.NewPasswd}
  47. if err := newUser.EncodePasswd(); err != nil {
  48. ctx.Handle(200, "setting.SettingPassword", err)
  49. return
  50. }
  51. if user.Passwd != newUser.Passwd {
  52. ctx.Data["HasError"] = true
  53. ctx.Data["ErrorMsg"] = "Old password is not correct"
  54. } else if form.NewPasswd != form.RetypePasswd {
  55. ctx.Data["HasError"] = true
  56. ctx.Data["ErrorMsg"] = "New password and re-type password are not same"
  57. } else {
  58. user.Passwd = newUser.Passwd
  59. if err := models.UpdateUser(user); err != nil {
  60. ctx.Handle(200, "setting.SettingPassword", err)
  61. return
  62. }
  63. ctx.Data["IsSuccess"] = true
  64. }
  65. ctx.Data["Owner"] = user
  66. ctx.Render.HTML(200, "user/password", ctx.Data)
  67. }
  68. func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) {
  69. ctx.Data["Title"] = "SSH Keys"
  70. // Delete SSH key.
  71. if ctx.Req.Method == "DELETE" || ctx.Query("_method") == "DELETE" {
  72. id, err := strconv.ParseInt(ctx.Query("id"), 10, 64)
  73. if err != nil {
  74. ctx.Data["ErrorMsg"] = err
  75. log.Error("ssh.DelPublicKey: %v", err)
  76. ctx.Render.JSON(200, map[string]interface{}{
  77. "ok": false,
  78. "err": err.Error(),
  79. })
  80. return
  81. }
  82. k := &models.PublicKey{
  83. Id: id,
  84. OwnerId: ctx.User.Id,
  85. }
  86. if err = models.DeletePublicKey(k); err != nil {
  87. ctx.Data["ErrorMsg"] = err
  88. log.Error("ssh.DelPublicKey: %v", err)
  89. ctx.Render.JSON(200, map[string]interface{}{
  90. "ok": false,
  91. "err": err.Error(),
  92. })
  93. } else {
  94. ctx.Render.JSON(200, map[string]interface{}{
  95. "ok": true,
  96. })
  97. }
  98. return
  99. }
  100. // Add new SSH key.
  101. if ctx.Req.Method == "POST" {
  102. if hasErr, ok := ctx.Data["HasError"]; ok && hasErr.(bool) {
  103. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  104. return
  105. }
  106. k := &models.PublicKey{OwnerId: ctx.User.Id,
  107. Name: form.KeyName,
  108. Content: form.KeyContent,
  109. }
  110. if err := models.AddPublicKey(k); err != nil {
  111. if err.Error() == models.ErrKeyAlreadyExist.Error() {
  112. ctx.RenderWithErr("Public key name has been used", "user/publickey", &form)
  113. return
  114. }
  115. ctx.Handle(200, "ssh.AddPublicKey", err)
  116. return
  117. } else {
  118. ctx.Data["AddSSHKeySuccess"] = true
  119. }
  120. }
  121. // List existed SSH keys.
  122. keys, err := models.ListPublicKey(ctx.User.Id)
  123. if err != nil {
  124. ctx.Handle(200, "ssh.ListPublicKey", err)
  125. return
  126. }
  127. ctx.Data["PageIsUserSetting"] = true
  128. ctx.Data["Keys"] = keys
  129. ctx.Render.HTML(200, "user/publickey", ctx.Data)
  130. }
  131. func SettingNotification(ctx *middleware.Context) {
  132. // todo user setting notification
  133. ctx.Data["Title"] = "Notification"
  134. ctx.Data["PageIsUserSetting"] = true
  135. ctx.Render.HTML(200, "user/notification", ctx.Data)
  136. }
  137. func SettingSecurity(ctx *middleware.Context) {
  138. // todo user setting security
  139. ctx.Data["Title"] = "Security"
  140. ctx.Data["PageIsUserSetting"] = true
  141. ctx.Render.HTML(200, "user/security", ctx.Data)
  142. }