You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

security.go 2.9 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2018 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package setting
  6. import (
  7. "code.gitea.io/gitea/models"
  8. "code.gitea.io/gitea/modules/base"
  9. "code.gitea.io/gitea/modules/context"
  10. "code.gitea.io/gitea/modules/setting"
  11. )
  12. const (
  13. tplSettingsSecurity base.TplName = "user/settings/security"
  14. tplSettingsTwofaEnroll base.TplName = "user/settings/twofa_enroll"
  15. )
  16. // Security render change user's password page and 2FA
  17. func Security(ctx *context.Context) {
  18. ctx.Data["Title"] = ctx.Tr("settings")
  19. ctx.Data["PageIsSettingsSecurity"] = true
  20. if ctx.Query("openid.return_to") != "" {
  21. settingsOpenIDVerify(ctx)
  22. return
  23. }
  24. loadSecurityData(ctx)
  25. ctx.HTML(200, tplSettingsSecurity)
  26. }
  27. // DeleteAccountLink delete a single account link
  28. func DeleteAccountLink(ctx *context.Context) {
  29. if _, err := models.RemoveAccountLink(ctx.User, ctx.QueryInt64("loginSourceID")); err != nil {
  30. ctx.Flash.Error("RemoveAccountLink: " + err.Error())
  31. } else {
  32. ctx.Flash.Success(ctx.Tr("settings.remove_account_link_success"))
  33. }
  34. ctx.JSON(200, map[string]interface{}{
  35. "redirect": setting.AppSubURL + "/user/settings/security",
  36. })
  37. }
  38. func loadSecurityData(ctx *context.Context) {
  39. enrolled := true
  40. _, err := models.GetTwoFactorByUID(ctx.User.ID)
  41. if err != nil {
  42. if models.IsErrTwoFactorNotEnrolled(err) {
  43. enrolled = false
  44. } else {
  45. ctx.ServerError("SettingsTwoFactor", err)
  46. return
  47. }
  48. }
  49. ctx.Data["TwofaEnrolled"] = enrolled
  50. if enrolled {
  51. ctx.Data["U2FRegistrations"], err = models.GetU2FRegistrationsByUID(ctx.User.ID)
  52. if err != nil {
  53. ctx.ServerError("GetU2FRegistrationsByUID", err)
  54. return
  55. }
  56. ctx.Data["RequireU2F"] = true
  57. }
  58. tokens, err := models.ListAccessTokens(ctx.User.ID)
  59. if err != nil {
  60. ctx.ServerError("ListAccessTokens", err)
  61. return
  62. }
  63. ctx.Data["Tokens"] = tokens
  64. accountLinks, err := models.ListAccountLinks(ctx.User)
  65. if err != nil {
  66. ctx.ServerError("ListAccountLinks", err)
  67. return
  68. }
  69. // map the provider display name with the LoginSource
  70. sources := make(map[*models.LoginSource]string)
  71. for _, externalAccount := range accountLinks {
  72. if loginSource, err := models.GetLoginSourceByID(externalAccount.LoginSourceID); err == nil {
  73. var providerDisplayName string
  74. if loginSource.IsOAuth2() {
  75. providerTechnicalName := loginSource.OAuth2().Provider
  76. providerDisplayName = models.OAuth2Providers[providerTechnicalName].DisplayName
  77. } else {
  78. providerDisplayName = loginSource.Name
  79. }
  80. sources[loginSource] = providerDisplayName
  81. }
  82. }
  83. ctx.Data["AccountLinks"] = sources
  84. openid, err := models.GetUserOpenIDs(ctx.User.ID)
  85. if err != nil {
  86. ctx.ServerError("GetUserOpenIDs", err)
  87. return
  88. }
  89. ctx.Data["OpenIDs"] = openid
  90. }