mirror of https://github.com/gogits/gogs.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
664 lines
17 KiB
664 lines
17 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package user |
|
|
|
import ( |
|
"bytes" |
|
"encoding/base64" |
|
"fmt" |
|
"html/template" |
|
"image/png" |
|
"io/ioutil" |
|
"strings" |
|
|
|
"github.com/Unknwon/com" |
|
"github.com/pquerna/otp" |
|
"github.com/pquerna/otp/totp" |
|
log "gopkg.in/clog.v1" |
|
|
|
"github.com/gogs/gogs/models" |
|
"github.com/gogs/gogs/models/errors" |
|
"github.com/gogs/gogs/pkg/context" |
|
"github.com/gogs/gogs/pkg/form" |
|
"github.com/gogs/gogs/pkg/mailer" |
|
"github.com/gogs/gogs/pkg/setting" |
|
"github.com/gogs/gogs/pkg/tool" |
|
) |
|
|
|
const ( |
|
SETTINGS_PROFILE = "user/settings/profile" |
|
SETTINGS_AVATAR = "user/settings/avatar" |
|
SETTINGS_PASSWORD = "user/settings/password" |
|
SETTINGS_EMAILS = "user/settings/email" |
|
SETTINGS_SSH_KEYS = "user/settings/sshkeys" |
|
SETTINGS_SECURITY = "user/settings/security" |
|
SETTINGS_TWO_FACTOR_ENABLE = "user/settings/two_factor_enable" |
|
SETTINGS_TWO_FACTOR_RECOVERY_CODES = "user/settings/two_factor_recovery_codes" |
|
SETTINGS_REPOSITORIES = "user/settings/repositories" |
|
SETTINGS_ORGANIZATIONS = "user/settings/organizations" |
|
SETTINGS_APPLICATIONS = "user/settings/applications" |
|
SETTINGS_DELETE = "user/settings/delete" |
|
NOTIFICATION = "user/notification" |
|
) |
|
|
|
func Settings(c *context.Context) { |
|
c.Title("settings.profile") |
|
c.PageIs("SettingsProfile") |
|
c.Data["origin_name"] = c.User.Name |
|
c.Data["name"] = c.User.Name |
|
c.Data["full_name"] = c.User.FullName |
|
c.Data["email"] = c.User.Email |
|
c.Data["website"] = c.User.Website |
|
c.Data["location"] = c.User.Location |
|
c.Success(SETTINGS_PROFILE) |
|
} |
|
|
|
func SettingsPost(c *context.Context, f form.UpdateProfile) { |
|
c.Title("settings.profile") |
|
c.PageIs("SettingsProfile") |
|
c.Data["origin_name"] = c.User.Name |
|
|
|
if c.HasError() { |
|
c.Success(SETTINGS_PROFILE) |
|
return |
|
} |
|
|
|
// Non-local users are not allowed to change their username |
|
if c.User.IsLocal() { |
|
// Check if username characters have been changed |
|
if c.User.LowerName != strings.ToLower(f.Name) { |
|
if err := models.ChangeUserName(c.User, f.Name); err != nil { |
|
c.FormErr("Name") |
|
var msg string |
|
switch { |
|
case models.IsErrUserAlreadyExist(err): |
|
msg = c.Tr("form.username_been_taken") |
|
case models.IsErrEmailAlreadyUsed(err): |
|
msg = c.Tr("form.email_been_used") |
|
case models.IsErrNameReserved(err): |
|
msg = c.Tr("form.name_reserved") |
|
case models.IsErrNamePatternNotAllowed(err): |
|
msg = c.Tr("form.name_pattern_not_allowed") |
|
default: |
|
c.ServerError("ChangeUserName", err) |
|
return |
|
} |
|
|
|
c.RenderWithErr(msg, SETTINGS_PROFILE, &f) |
|
return |
|
} |
|
|
|
log.Trace("Username changed: %s -> %s", c.User.Name, f.Name) |
|
} |
|
|
|
// In case it's just a case change |
|
c.User.Name = f.Name |
|
c.User.LowerName = strings.ToLower(f.Name) |
|
} |
|
|
|
c.User.FullName = f.FullName |
|
c.User.Email = f.Email |
|
c.User.Website = f.Website |
|
c.User.Location = f.Location |
|
if err := models.UpdateUser(c.User); err != nil { |
|
c.ServerError("UpdateUser", err) |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.update_profile_success")) |
|
c.SubURLRedirect("/user/settings") |
|
} |
|
|
|
// FIXME: limit upload size |
|
func UpdateAvatarSetting(c *context.Context, f form.Avatar, ctxUser *models.User) error { |
|
ctxUser.UseCustomAvatar = f.Source == form.AVATAR_LOCAL |
|
if len(f.Gravatar) > 0 { |
|
ctxUser.Avatar = tool.MD5(f.Gravatar) |
|
ctxUser.AvatarEmail = f.Gravatar |
|
} |
|
|
|
if f.Avatar != nil && f.Avatar.Filename != "" { |
|
r, err := f.Avatar.Open() |
|
if err != nil { |
|
return fmt.Errorf("open avatar reader: %v", err) |
|
} |
|
defer r.Close() |
|
|
|
data, err := ioutil.ReadAll(r) |
|
if err != nil { |
|
return fmt.Errorf("read avatar content: %v", err) |
|
} |
|
if !tool.IsImageFile(data) { |
|
return errors.New(c.Tr("settings.uploaded_avatar_not_a_image")) |
|
} |
|
if err = ctxUser.UploadAvatar(data); err != nil { |
|
return fmt.Errorf("upload avatar: %v", err) |
|
} |
|
} else { |
|
// No avatar is uploaded but setting has been changed to enable, |
|
// generate a random one when needed. |
|
if ctxUser.UseCustomAvatar && !com.IsFile(ctxUser.CustomAvatarPath()) { |
|
if err := ctxUser.GenerateRandomAvatar(); err != nil { |
|
log.Error(2, "generate random avatar [%d]: %v", ctxUser.ID, err) |
|
} |
|
} |
|
} |
|
|
|
if err := models.UpdateUser(ctxUser); err != nil { |
|
return fmt.Errorf("update user: %v", err) |
|
} |
|
|
|
return nil |
|
} |
|
|
|
func SettingsAvatar(c *context.Context) { |
|
c.Title("settings.avatar") |
|
c.PageIs("SettingsAvatar") |
|
c.Success(SETTINGS_AVATAR) |
|
} |
|
|
|
func SettingsAvatarPost(c *context.Context, f form.Avatar) { |
|
if err := UpdateAvatarSetting(c, f, c.User); err != nil { |
|
c.Flash.Error(err.Error()) |
|
} else { |
|
c.Flash.Success(c.Tr("settings.update_avatar_success")) |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/avatar") |
|
} |
|
|
|
func SettingsDeleteAvatar(c *context.Context) { |
|
if err := c.User.DeleteAvatar(); err != nil { |
|
c.Flash.Error(fmt.Sprintf("Failed to delete avatar: %v", err)) |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/avatar") |
|
} |
|
|
|
func SettingsPassword(c *context.Context) { |
|
c.Title("settings.password") |
|
c.PageIs("SettingsPassword") |
|
c.Success(SETTINGS_PASSWORD) |
|
} |
|
|
|
func SettingsPasswordPost(c *context.Context, f form.ChangePassword) { |
|
c.Title("settings.password") |
|
c.PageIs("SettingsPassword") |
|
|
|
if c.HasError() { |
|
c.Success(SETTINGS_PASSWORD) |
|
return |
|
} |
|
|
|
if !c.User.ValidatePassword(f.OldPassword) { |
|
c.Flash.Error(c.Tr("settings.password_incorrect")) |
|
} else if f.Password != f.Retype { |
|
c.Flash.Error(c.Tr("form.password_not_match")) |
|
} else { |
|
c.User.Passwd = f.Password |
|
var err error |
|
if c.User.Salt, err = models.GetUserSalt(); err != nil { |
|
c.ServerError("GetUserSalt", err) |
|
return |
|
} |
|
c.User.EncodePasswd() |
|
if err := models.UpdateUser(c.User); err != nil { |
|
c.ServerError("UpdateUser", err) |
|
return |
|
} |
|
c.Flash.Success(c.Tr("settings.change_password_success")) |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/password") |
|
} |
|
|
|
func SettingsEmails(c *context.Context) { |
|
c.Title("settings.emails") |
|
c.PageIs("SettingsEmails") |
|
|
|
emails, err := models.GetEmailAddresses(c.User.ID) |
|
if err != nil { |
|
c.ServerError("GetEmailAddresses", err) |
|
return |
|
} |
|
c.Data["Emails"] = emails |
|
|
|
c.Success(SETTINGS_EMAILS) |
|
} |
|
|
|
func SettingsEmailPost(c *context.Context, f form.AddEmail) { |
|
c.Title("settings.emails") |
|
c.PageIs("SettingsEmails") |
|
|
|
// Make emailaddress primary. |
|
if c.Query("_method") == "PRIMARY" { |
|
if err := models.MakeEmailPrimary(&models.EmailAddress{ID: c.QueryInt64("id")}); err != nil { |
|
c.ServerError("MakeEmailPrimary", err) |
|
return |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/email") |
|
return |
|
} |
|
|
|
// Add Email address. |
|
emails, err := models.GetEmailAddresses(c.User.ID) |
|
if err != nil { |
|
c.ServerError("GetEmailAddresses", err) |
|
return |
|
} |
|
c.Data["Emails"] = emails |
|
|
|
if c.HasError() { |
|
c.Success(SETTINGS_EMAILS) |
|
return |
|
} |
|
|
|
email := &models.EmailAddress{ |
|
UID: c.User.ID, |
|
Email: f.Email, |
|
IsActivated: !setting.Service.RegisterEmailConfirm, |
|
} |
|
if err := models.AddEmailAddress(email); err != nil { |
|
if models.IsErrEmailAlreadyUsed(err) { |
|
c.RenderWithErr(c.Tr("form.email_been_used"), SETTINGS_EMAILS, &f) |
|
} else { |
|
c.ServerError("AddEmailAddress", err) |
|
} |
|
return |
|
} |
|
|
|
// Send confirmation email |
|
if setting.Service.RegisterEmailConfirm { |
|
mailer.SendActivateEmailMail(c.Context, models.NewMailerUser(c.User), email.Email) |
|
|
|
if err := c.Cache.Put("MailResendLimit_"+c.User.LowerName, c.User.LowerName, 180); err != nil { |
|
log.Error(2, "Set cache 'MailResendLimit' failed: %v", err) |
|
} |
|
c.Flash.Info(c.Tr("settings.add_email_confirmation_sent", email.Email, setting.Service.ActiveCodeLives/60)) |
|
} else { |
|
c.Flash.Success(c.Tr("settings.add_email_success")) |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/email") |
|
} |
|
|
|
func DeleteEmail(c *context.Context) { |
|
if err := models.DeleteEmailAddress(&models.EmailAddress{ |
|
ID: c.QueryInt64("id"), |
|
UID: c.User.ID, |
|
}); err != nil { |
|
c.ServerError("DeleteEmailAddress", err) |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.email_deletion_success")) |
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/email", |
|
}) |
|
} |
|
|
|
func SettingsSSHKeys(c *context.Context) { |
|
c.Title("settings.ssh_keys") |
|
c.PageIs("SettingsSSHKeys") |
|
|
|
keys, err := models.ListPublicKeys(c.User.ID) |
|
if err != nil { |
|
c.ServerError("ListPublicKeys", err) |
|
return |
|
} |
|
c.Data["Keys"] = keys |
|
|
|
c.Success(SETTINGS_SSH_KEYS) |
|
} |
|
|
|
func SettingsSSHKeysPost(c *context.Context, f form.AddSSHKey) { |
|
c.Title("settings.ssh_keys") |
|
c.PageIs("SettingsSSHKeys") |
|
|
|
keys, err := models.ListPublicKeys(c.User.ID) |
|
if err != nil { |
|
c.ServerError("ListPublicKeys", err) |
|
return |
|
} |
|
c.Data["Keys"] = keys |
|
|
|
if c.HasError() { |
|
c.Success(SETTINGS_SSH_KEYS) |
|
return |
|
} |
|
|
|
content, err := models.CheckPublicKeyString(f.Content) |
|
if err != nil { |
|
if models.IsErrKeyUnableVerify(err) { |
|
c.Flash.Info(c.Tr("form.unable_verify_ssh_key")) |
|
} else { |
|
c.Flash.Error(c.Tr("form.invalid_ssh_key", err.Error())) |
|
c.SubURLRedirect("/user/settings/ssh") |
|
return |
|
} |
|
} |
|
|
|
if _, err = models.AddPublicKey(c.User.ID, f.Title, content); err != nil { |
|
c.Data["HasError"] = true |
|
switch { |
|
case models.IsErrKeyAlreadyExist(err): |
|
c.FormErr("Content") |
|
c.RenderWithErr(c.Tr("settings.ssh_key_been_used"), SETTINGS_SSH_KEYS, &f) |
|
case models.IsErrKeyNameAlreadyUsed(err): |
|
c.FormErr("Title") |
|
c.RenderWithErr(c.Tr("settings.ssh_key_name_used"), SETTINGS_SSH_KEYS, &f) |
|
default: |
|
c.ServerError("AddPublicKey", err) |
|
} |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.add_key_success", f.Title)) |
|
c.SubURLRedirect("/user/settings/ssh") |
|
} |
|
|
|
func DeleteSSHKey(c *context.Context) { |
|
if err := models.DeletePublicKey(c.User, c.QueryInt64("id")); err != nil { |
|
c.Flash.Error("DeletePublicKey: " + err.Error()) |
|
} else { |
|
c.Flash.Success(c.Tr("settings.ssh_key_deletion_success")) |
|
} |
|
|
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/ssh", |
|
}) |
|
} |
|
|
|
func SettingsSecurity(c *context.Context) { |
|
c.Title("settings.security") |
|
c.PageIs("SettingsSecurity") |
|
|
|
t, err := models.GetTwoFactorByUserID(c.UserID()) |
|
if err != nil && !errors.IsTwoFactorNotFound(err) { |
|
c.ServerError("GetTwoFactorByUserID", err) |
|
return |
|
} |
|
c.Data["TwoFactor"] = t |
|
|
|
c.Success(SETTINGS_SECURITY) |
|
} |
|
|
|
func SettingsTwoFactorEnable(c *context.Context) { |
|
if c.User.IsEnabledTwoFactor() { |
|
c.NotFound() |
|
return |
|
} |
|
|
|
c.Title("settings.two_factor_enable_title") |
|
c.PageIs("SettingsSecurity") |
|
|
|
var key *otp.Key |
|
var err error |
|
keyURL := c.Session.Get("twoFactorURL") |
|
if keyURL != nil { |
|
key, _ = otp.NewKeyFromURL(keyURL.(string)) |
|
} |
|
if key == nil { |
|
key, err = totp.Generate(totp.GenerateOpts{ |
|
Issuer: setting.AppName, |
|
AccountName: c.User.Email, |
|
}) |
|
if err != nil { |
|
c.ServerError("Generate", err) |
|
return |
|
} |
|
} |
|
c.Data["TwoFactorSecret"] = key.Secret() |
|
|
|
img, err := key.Image(240, 240) |
|
if err != nil { |
|
c.ServerError("Image", err) |
|
return |
|
} |
|
|
|
var buf bytes.Buffer |
|
if err = png.Encode(&buf, img); err != nil { |
|
c.ServerError("Encode", err) |
|
return |
|
} |
|
c.Data["QRCode"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(buf.Bytes())) |
|
|
|
c.Session.Set("twoFactorSecret", c.Data["TwoFactorSecret"]) |
|
c.Session.Set("twoFactorURL", key.String()) |
|
c.Success(SETTINGS_TWO_FACTOR_ENABLE) |
|
} |
|
|
|
func SettingsTwoFactorEnablePost(c *context.Context) { |
|
secret, ok := c.Session.Get("twoFactorSecret").(string) |
|
if !ok { |
|
c.NotFound() |
|
return |
|
} |
|
|
|
if !totp.Validate(c.Query("passcode"), secret) { |
|
c.Flash.Error(c.Tr("settings.two_factor_invalid_passcode")) |
|
c.SubURLRedirect("/user/settings/security/two_factor_enable") |
|
return |
|
} |
|
|
|
if err := models.NewTwoFactor(c.UserID(), secret); err != nil { |
|
c.Flash.Error(c.Tr("settings.two_factor_enable_error", err)) |
|
c.SubURLRedirect("/user/settings/security/two_factor_enable") |
|
return |
|
} |
|
|
|
c.Session.Delete("twoFactorSecret") |
|
c.Session.Delete("twoFactorURL") |
|
c.Flash.Success(c.Tr("settings.two_factor_enable_success")) |
|
c.SubURLRedirect("/user/settings/security/two_factor_recovery_codes") |
|
} |
|
|
|
func SettingsTwoFactorRecoveryCodes(c *context.Context) { |
|
if !c.User.IsEnabledTwoFactor() { |
|
c.NotFound() |
|
return |
|
} |
|
|
|
c.Title("settings.two_factor_recovery_codes_title") |
|
c.PageIs("SettingsSecurity") |
|
|
|
recoveryCodes, err := models.GetRecoveryCodesByUserID(c.UserID()) |
|
if err != nil { |
|
c.ServerError("GetRecoveryCodesByUserID", err) |
|
return |
|
} |
|
c.Data["RecoveryCodes"] = recoveryCodes |
|
|
|
c.Success(SETTINGS_TWO_FACTOR_RECOVERY_CODES) |
|
} |
|
|
|
func SettingsTwoFactorRecoveryCodesPost(c *context.Context) { |
|
if !c.User.IsEnabledTwoFactor() { |
|
c.NotFound() |
|
return |
|
} |
|
|
|
if err := models.RegenerateRecoveryCodes(c.UserID()); err != nil { |
|
c.Flash.Error(c.Tr("settings.two_factor_regenerate_recovery_codes_error", err)) |
|
} else { |
|
c.Flash.Success(c.Tr("settings.two_factor_regenerate_recovery_codes_success")) |
|
} |
|
|
|
c.SubURLRedirect("/user/settings/security/two_factor_recovery_codes") |
|
} |
|
|
|
func SettingsTwoFactorDisable(c *context.Context) { |
|
if !c.User.IsEnabledTwoFactor() { |
|
c.NotFound() |
|
return |
|
} |
|
|
|
if err := models.DeleteTwoFactor(c.UserID()); err != nil { |
|
c.ServerError("DeleteTwoFactor", err) |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.two_factor_disable_success")) |
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/security", |
|
}) |
|
} |
|
|
|
func SettingsRepos(c *context.Context) { |
|
c.Title("settings.repos") |
|
c.PageIs("SettingsRepositories") |
|
|
|
repos, err := models.GetUserAndCollaborativeRepositories(c.User.ID) |
|
if err != nil { |
|
c.ServerError("GetUserAndCollaborativeRepositories", err) |
|
return |
|
} |
|
if err = models.RepositoryList(repos).LoadAttributes(); err != nil { |
|
c.ServerError("LoadAttributes", err) |
|
return |
|
} |
|
c.Data["Repos"] = repos |
|
|
|
c.Success(SETTINGS_REPOSITORIES) |
|
} |
|
|
|
func SettingsLeaveRepo(c *context.Context) { |
|
repo, err := models.GetRepositoryByID(c.QueryInt64("id")) |
|
if err != nil { |
|
c.NotFoundOrServerError("GetRepositoryByID", errors.IsRepoNotExist, err) |
|
return |
|
} |
|
|
|
if err = repo.DeleteCollaboration(c.User.ID); err != nil { |
|
c.ServerError("DeleteCollaboration", err) |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.repos.leave_success", repo.FullName())) |
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/repositories", |
|
}) |
|
} |
|
|
|
func SettingsOrganizations(c *context.Context) { |
|
c.Title("settings.orgs") |
|
c.PageIs("SettingsOrganizations") |
|
|
|
orgs, err := models.GetOrgsByUserID(c.User.ID, true) |
|
if err != nil { |
|
c.ServerError("GetOrgsByUserID", err) |
|
return |
|
} |
|
c.Data["Orgs"] = orgs |
|
|
|
c.Success(SETTINGS_ORGANIZATIONS) |
|
} |
|
|
|
func SettingsLeaveOrganization(c *context.Context) { |
|
if err := models.RemoveOrgUser(c.QueryInt64("id"), c.User.ID); err != nil { |
|
if models.IsErrLastOrgOwner(err) { |
|
c.Flash.Error(c.Tr("form.last_org_owner")) |
|
} else { |
|
c.ServerError("RemoveOrgUser", err) |
|
return |
|
} |
|
} |
|
|
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/organizations", |
|
}) |
|
} |
|
|
|
func SettingsApplications(c *context.Context) { |
|
c.Title("settings.applications") |
|
c.PageIs("SettingsApplications") |
|
|
|
tokens, err := models.ListAccessTokens(c.User.ID) |
|
if err != nil { |
|
c.ServerError("ListAccessTokens", err) |
|
return |
|
} |
|
c.Data["Tokens"] = tokens |
|
|
|
c.Success(SETTINGS_APPLICATIONS) |
|
} |
|
|
|
func SettingsApplicationsPost(c *context.Context, f form.NewAccessToken) { |
|
c.Title("settings.applications") |
|
c.PageIs("SettingsApplications") |
|
|
|
if c.HasError() { |
|
tokens, err := models.ListAccessTokens(c.User.ID) |
|
if err != nil { |
|
c.ServerError("ListAccessTokens", err) |
|
return |
|
} |
|
|
|
c.Data["Tokens"] = tokens |
|
c.Success(SETTINGS_APPLICATIONS) |
|
return |
|
} |
|
|
|
t := &models.AccessToken{ |
|
UID: c.User.ID, |
|
Name: f.Name, |
|
} |
|
if err := models.NewAccessToken(t); err != nil { |
|
c.ServerError("NewAccessToken", err) |
|
return |
|
} |
|
|
|
c.Flash.Success(c.Tr("settings.generate_token_succees")) |
|
c.Flash.Info(t.Sha1) |
|
c.SubURLRedirect("/user/settings/applications") |
|
} |
|
|
|
func SettingsDeleteApplication(c *context.Context) { |
|
if err := models.DeleteAccessTokenOfUserByID(c.User.ID, c.QueryInt64("id")); err != nil { |
|
c.Flash.Error("DeleteAccessTokenByID: " + err.Error()) |
|
} else { |
|
c.Flash.Success(c.Tr("settings.delete_token_success")) |
|
} |
|
|
|
c.JSONSuccess(map[string]interface{}{ |
|
"redirect": setting.AppSubURL + "/user/settings/applications", |
|
}) |
|
} |
|
|
|
func SettingsDelete(c *context.Context) { |
|
c.Title("settings.delete") |
|
c.PageIs("SettingsDelete") |
|
|
|
if c.Req.Method == "POST" { |
|
if _, err := models.UserLogin(c.User.Name, c.Query("password"), c.User.LoginSource); err != nil { |
|
if errors.IsUserNotExist(err) { |
|
c.RenderWithErr(c.Tr("form.enterred_invalid_password"), SETTINGS_DELETE, nil) |
|
} else { |
|
c.ServerError("UserLogin", err) |
|
} |
|
return |
|
} |
|
|
|
if err := models.DeleteUser(c.User); err != nil { |
|
switch { |
|
case models.IsErrUserOwnRepos(err): |
|
c.Flash.Error(c.Tr("form.still_own_repo")) |
|
c.Redirect(setting.AppSubURL + "/user/settings/delete") |
|
case models.IsErrUserHasOrgs(err): |
|
c.Flash.Error(c.Tr("form.still_has_org")) |
|
c.Redirect(setting.AppSubURL + "/user/settings/delete") |
|
default: |
|
c.ServerError("DeleteUser", err) |
|
} |
|
} else { |
|
log.Trace("Account deleted: %s", c.User.Name) |
|
c.Redirect(setting.AppSubURL + "/") |
|
} |
|
return |
|
} |
|
|
|
c.Success(SETTINGS_DELETE) |
|
}
|
|
|