2024-05-24 16:58:15 +05:30
// Copyright 2024 The Forgejo Authors. All rights reserved.
2021-11-18 23:12:27 +05:30
// Copyright 2021 The Gitea Authors. All rights reserved.
2022-11-27 23:50:29 +05:30
// SPDX-License-Identifier: MIT
2021-11-18 23:12:27 +05:30
package user
import (
"context"
"fmt"
2023-05-21 20:43:47 +05:30
"os"
"strings"
2021-11-18 23:12:27 +05:30
"time"
"code.gitea.io/gitea/models"
2021-12-10 13:44:24 +05:30
asymkey_model "code.gitea.io/gitea/models/asymkey"
2021-11-18 23:12:27 +05:30
"code.gitea.io/gitea/models/db"
2022-03-29 11:59:02 +05:30
"code.gitea.io/gitea/models/organization"
2022-03-30 14:12:47 +05:30
packages_model "code.gitea.io/gitea/models/packages"
2021-12-10 06:57:50 +05:30
repo_model "code.gitea.io/gitea/models/repo"
2022-10-17 04:59:26 +05:30
system_model "code.gitea.io/gitea/models/system"
2021-11-18 23:12:27 +05:30
user_model "code.gitea.io/gitea/models/user"
2022-07-14 12:52:09 +05:30
"code.gitea.io/gitea/modules/eventsource"
2021-11-22 20:51:55 +05:30
"code.gitea.io/gitea/modules/log"
2022-07-14 12:52:09 +05:30
"code.gitea.io/gitea/modules/setting"
2021-11-18 23:12:27 +05:30
"code.gitea.io/gitea/modules/storage"
"code.gitea.io/gitea/modules/util"
2023-05-21 20:43:47 +05:30
"code.gitea.io/gitea/services/agit"
2023-10-19 18:46:11 +05:30
org_service "code.gitea.io/gitea/services/org"
2022-07-14 12:52:09 +05:30
"code.gitea.io/gitea/services/packages"
2023-05-21 20:43:47 +05:30
container_service "code.gitea.io/gitea/services/packages/container"
2023-09-08 10:21:15 +05:30
repo_service "code.gitea.io/gitea/services/repository"
2021-11-18 23:12:27 +05:30
)
2023-03-14 13:15:21 +05:30
// RenameUser renames a user
func RenameUser ( ctx context . Context , u * user_model . User , newUserName string ) error {
2023-05-21 20:43:47 +05:30
// Non-local users are not allowed to change their username.
if ! u . IsOrganization ( ) && ! u . IsLocal ( ) {
return user_model . ErrUserIsNotLocal {
UID : u . ID ,
Name : u . Name ,
}
}
if newUserName == u . Name {
2024-02-04 18:59:09 +05:30
return nil
2023-05-21 20:43:47 +05:30
}
if err := user_model . IsUsableUsername ( newUserName ) ; err != nil {
return err
}
onlyCapitalization := strings . EqualFold ( newUserName , u . Name )
oldUserName := u . Name
if onlyCapitalization {
u . Name = newUserName
if err := user_model . UpdateUserCols ( ctx , u , "name" ) ; err != nil {
u . Name = oldUserName
return err
}
2023-09-16 20:09:12 +05:30
return repo_model . UpdateRepositoryOwnerNames ( ctx , u . ID , newUserName )
2023-05-21 20:43:47 +05:30
}
2023-03-14 13:15:21 +05:30
ctx , committer , err := db . TxContext ( ctx )
if err != nil {
return err
}
defer committer . Close ( )
2023-05-21 20:43:47 +05:30
isExist , err := user_model . IsUserExist ( ctx , u . ID , newUserName )
if err != nil {
2023-03-14 13:15:21 +05:30
return err
}
2023-05-21 20:43:47 +05:30
if isExist {
return user_model . ErrUserAlreadyExist {
Name : newUserName ,
}
}
if err = repo_model . UpdateRepositoryOwnerName ( ctx , oldUserName , newUserName ) ; err != nil {
return err
}
if err = user_model . NewUserRedirect ( ctx , u . ID , oldUserName , newUserName ) ; err != nil {
return err
}
if err := agit . UserNameChanged ( ctx , u , newUserName ) ; err != nil {
return err
}
if err := container_service . UpdateRepositoryNames ( ctx , u , newUserName ) ; err != nil {
return err
}
u . Name = newUserName
u . LowerName = strings . ToLower ( newUserName )
if err := user_model . UpdateUserCols ( ctx , u , "name" , "lower_name" ) ; err != nil {
u . Name = oldUserName
u . LowerName = strings . ToLower ( oldUserName )
2023-03-14 13:15:21 +05:30
return err
}
2023-05-21 20:43:47 +05:30
// Do not fail if directory does not exist
if err = util . Rename ( user_model . UserPath ( oldUserName ) , user_model . UserPath ( newUserName ) ) ; err != nil && ! os . IsNotExist ( err ) {
u . Name = oldUserName
u . LowerName = strings . ToLower ( oldUserName )
return fmt . Errorf ( "rename user directory: %w" , err )
}
if err = committer . Commit ( ) ; err != nil {
u . Name = oldUserName
u . LowerName = strings . ToLower ( oldUserName )
if err2 := util . Rename ( user_model . UserPath ( newUserName ) , user_model . UserPath ( oldUserName ) ) ; err2 != nil && ! os . IsNotExist ( err2 ) {
log . Critical ( "Unable to rollback directory change during failed username change from: %s to: %s. DB Error: %v. Filesystem Error: %v" , oldUserName , newUserName , err , err2 )
return fmt . Errorf ( "failed to rollback directory change during failed username change from: %s to: %s. DB Error: %w. Filesystem Error: %v" , oldUserName , newUserName , err , err2 )
}
return err
}
return nil
2023-03-14 13:15:21 +05:30
}
2021-11-18 23:12:27 +05:30
// DeleteUser completely and permanently deletes everything of a user,
// but issues/comments/pulls will be kept and shown as someone has been deleted,
// unless the user is younger than USER_DELETE_WITH_COMMENTS_MAX_DAYS.
2022-07-14 12:52:09 +05:30
func DeleteUser ( ctx context . Context , u * user_model . User , purge bool ) error {
2021-11-18 23:12:27 +05:30
if u . IsOrganization ( ) {
return fmt . Errorf ( "%s is an organization not a user" , u . Name )
}
2024-01-15 12:21:43 +05:30
if user_model . IsLastAdminUser ( ctx , u ) {
return models . ErrDeleteLastAdminUser { UID : u . ID }
}
2022-07-14 12:52:09 +05:30
if purge {
// Disable the user first
// NOTE: This is deliberately not within a transaction as it must disable the user immediately to prevent any further action by the user to be purged.
if err := user_model . UpdateUserCols ( ctx , & user_model . User {
ID : u . ID ,
IsActive : false ,
IsRestricted : true ,
IsAdmin : false ,
ProhibitLogin : true ,
Passwd : "" ,
Salt : "" ,
PasswdHashAlgo : "" ,
MaxRepoCreation : 0 ,
} , "is_active" , "is_restricted" , "is_admin" , "prohibit_login" , "max_repo_creation" , "passwd" , "salt" , "passwd_hash_algo" ) ; err != nil {
return fmt . Errorf ( "unable to disable user: %s[%d] prior to purge. UpdateUserCols: %w" , u . Name , u . ID , err )
}
// Force any logged in sessions to log out
// FIXME: We also need to tell the session manager to log them out too.
eventsource . GetManager ( ) . SendMessage ( u . ID , & eventsource . Event {
Name : "logout" ,
} )
// Delete all repos belonging to this user
// Now this is not within a transaction because there are internal transactions within the DeleteRepository
// BUT: the db will still be consistent even if a number of repos have already been deleted.
// And in fact we want to capture any repositories that are being created in other transactions in the meantime
//
// An alternative option here would be write a DeleteAllRepositoriesForUserID function which would delete all of the repos
// but such a function would likely get out of date
2023-10-19 18:46:11 +05:30
err := repo_service . DeleteOwnerRepositoriesDirectly ( ctx , u )
if err != nil {
return err
2022-07-14 12:52:09 +05:30
}
// Remove from Organizations and delete last owner organizations
// Now this is not within a transaction because there are internal transactions within the DeleteOrganization
// BUT: the db will still be consistent even if a number of organizations memberships and organizations have already been deleted
// And in fact we want to capture any organization additions that are being created in other transactions in the meantime
//
// An alternative option here would be write a function which would delete all organizations but it seems
// but such a function would likely get out of date
for {
2023-11-24 09:19:41 +05:30
orgs , err := db . Find [ organization . Organization ] ( ctx , organization . FindOrgOptions {
2022-07-14 12:52:09 +05:30
ListOptions : db . ListOptions {
PageSize : repo_model . RepositoryListDefaultPageSize ,
Page : 1 ,
} ,
UserID : u . ID ,
IncludePrivate : true ,
} )
if err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "unable to find org list for %s[%d]. Error: %w" , u . Name , u . ID , err )
2022-07-14 12:52:09 +05:30
}
if len ( orgs ) == 0 {
break
}
for _ , org := range orgs {
2023-10-15 21:16:06 +05:30
if err := models . RemoveOrgUser ( ctx , org . ID , u . ID ) ; err != nil {
2022-07-14 12:52:09 +05:30
if organization . IsErrLastOrgOwner ( err ) {
2023-10-19 18:46:11 +05:30
err = org_service . DeleteOrganization ( ctx , org , true )
if err != nil {
return fmt . Errorf ( "unable to delete organization %d: %w" , org . ID , err )
}
2022-07-14 12:52:09 +05:30
}
if err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "unable to remove user %s[%d] from org %s[%d]. Error: %w" , u . Name , u . ID , org . Name , org . ID , err )
2022-07-14 12:52:09 +05:30
}
}
}
}
// Delete Packages
if setting . Packages . Enabled {
if _ , err := packages . RemoveAllPackages ( ctx , u . ID ) ; err != nil {
return err
}
}
2024-05-24 16:58:15 +05:30
// Delete Federated Users
if setting . Federation . Enabled {
if err := user_model . DeleteFederatedUser ( ctx , u . ID ) ; err != nil {
return err
}
}
2022-07-14 12:52:09 +05:30
}
2023-10-11 09:54:07 +05:30
ctx , committer , err := db . TxContext ( ctx )
2021-11-18 23:12:27 +05:30
if err != nil {
return err
}
2021-12-10 13:44:24 +05:30
defer committer . Close ( )
2021-11-18 23:12:27 +05:30
// Note: A user owns any repository or belongs to any organization
2022-07-14 12:52:09 +05:30
// cannot perform delete operation. This causes a race with the purge above
// however consistency requires that we ensure that this is the case
2021-11-18 23:12:27 +05:30
// Check ownership of repository.
2022-05-20 19:38:52 +05:30
count , err := repo_model . CountRepositories ( ctx , repo_model . CountRepositoryOptions { OwnerID : u . ID } )
2021-11-18 23:12:27 +05:30
if err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "GetRepositoryCount: %w" , err )
2021-11-18 23:12:27 +05:30
} else if count > 0 {
return models . ErrUserOwnRepos { UID : u . ID }
}
// Check membership of organization.
2022-03-29 11:59:02 +05:30
count , err = organization . GetOrganizationCount ( ctx , u )
2021-11-18 23:12:27 +05:30
if err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "GetOrganizationCount: %w" , err )
2021-11-18 23:12:27 +05:30
} else if count > 0 {
return models . ErrUserHasOrgs { UID : u . ID }
}
2022-03-30 14:12:47 +05:30
// Check ownership of packages.
if ownsPackages , err := packages_model . HasOwnerPackages ( ctx , u . ID ) ; err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "HasOwnerPackages: %w" , err )
2022-03-30 14:12:47 +05:30
} else if ownsPackages {
return models . ErrUserOwnPackages { UID : u . ID }
}
2023-02-13 10:41:41 +05:30
if err := deleteUser ( ctx , u , purge ) ; err != nil {
2022-10-25 00:59:17 +05:30
return fmt . Errorf ( "DeleteUser: %w" , err )
2021-11-18 23:12:27 +05:30
}
2021-12-10 13:44:24 +05:30
if err := committer . Commit ( ) ; err != nil {
2021-11-18 23:12:27 +05:30
return err
}
2021-12-10 13:44:24 +05:30
committer . Close ( )
2021-11-18 23:12:27 +05:30
2023-09-25 18:47:37 +05:30
if err = asymkey_model . RewriteAllPublicKeys ( ctx ) ; err != nil {
2021-11-22 20:51:55 +05:30
return err
}
2023-09-25 18:47:37 +05:30
if err = asymkey_model . RewriteAllPrincipalKeys ( ctx ) ; err != nil {
2021-11-22 20:51:55 +05:30
return err
}
2021-11-18 23:12:27 +05:30
// Note: There are something just cannot be roll back,
// so just keep error logs of those operations.
2021-11-24 15:19:20 +05:30
path := user_model . UserPath ( u . Name )
2021-11-18 23:12:27 +05:30
if err := util . RemoveAll ( path ) ; err != nil {
2022-10-25 00:59:17 +05:30
err = fmt . Errorf ( "Failed to RemoveAll %s: %w" , path , err )
2022-10-17 04:59:26 +05:30
_ = system_model . CreateNotice ( ctx , system_model . NoticeTask , fmt . Sprintf ( "delete user '%s': %v" , u . Name , err ) )
2021-11-18 23:12:27 +05:30
return err
}
if u . Avatar != "" {
avatarPath := u . CustomAvatarRelativePath ( )
if err := storage . Avatars . Delete ( avatarPath ) ; err != nil {
2022-10-25 00:59:17 +05:30
err = fmt . Errorf ( "Failed to remove %s: %w" , avatarPath , err )
2022-10-17 04:59:26 +05:30
_ = system_model . CreateNotice ( ctx , system_model . NoticeTask , fmt . Sprintf ( "delete user '%s': %v" , u . Name , err ) )
2021-11-18 23:12:27 +05:30
return err
}
}
return nil
}
// DeleteInactiveUsers deletes all inactive users and email addresses.
func DeleteInactiveUsers ( ctx context . Context , olderThan time . Duration ) error {
2021-11-24 15:19:20 +05:30
users , err := user_model . GetInactiveUsers ( ctx , olderThan )
2021-11-18 23:12:27 +05:30
if err != nil {
return err
}
// FIXME: should only update authorized_keys file once after all deletions.
for _ , u := range users {
select {
case <- ctx . Done ( ) :
return db . ErrCancelledf ( "Before delete inactive user %s" , u . Name )
default :
}
2022-07-14 12:52:09 +05:30
if err := DeleteUser ( ctx , u , false ) ; err != nil {
2021-11-18 23:12:27 +05:30
// Ignore users that were set inactive by admin.
2024-01-15 12:21:43 +05:30
if models . IsErrUserOwnRepos ( err ) || models . IsErrUserHasOrgs ( err ) ||
models . IsErrUserOwnPackages ( err ) || models . IsErrDeleteLastAdminUser ( err ) {
2021-11-18 23:12:27 +05:30
continue
}
return err
}
}
2024-03-29 19:23:56 +05:30
return nil
2021-11-18 23:12:27 +05:30
}