You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

security.go 2.8 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2018 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package setting
  6. import (
  7. "code.gitea.io/gitea/models"
  8. "code.gitea.io/gitea/modules/base"
  9. "code.gitea.io/gitea/modules/context"
  10. "code.gitea.io/gitea/modules/setting"
  11. )
  12. const (
  13. tplSettingsSecurity base.TplName = "user/settings/security"
  14. tplSettingsTwofaEnroll base.TplName = "user/settings/twofa_enroll"
  15. )
  16. // Security render change user's password page and 2FA
  17. func Security(ctx *context.Context) {
  18. ctx.Data["Title"] = ctx.Tr("settings")
  19. ctx.Data["PageIsSettingsSecurity"] = true
  20. enrolled := true
  21. _, err := models.GetTwoFactorByUID(ctx.User.ID)
  22. if err != nil {
  23. if models.IsErrTwoFactorNotEnrolled(err) {
  24. enrolled = false
  25. } else {
  26. ctx.ServerError("SettingsTwoFactor", err)
  27. return
  28. }
  29. }
  30. ctx.Data["TwofaEnrolled"] = enrolled
  31. if enrolled {
  32. ctx.Data["U2FRegistrations"], err = models.GetU2FRegistrationsByUID(ctx.User.ID)
  33. if err != nil {
  34. ctx.ServerError("GetU2FRegistrationsByUID", err)
  35. return
  36. }
  37. ctx.Data["RequireU2F"] = true
  38. }
  39. tokens, err := models.ListAccessTokens(ctx.User.ID)
  40. if err != nil {
  41. ctx.ServerError("ListAccessTokens", err)
  42. return
  43. }
  44. ctx.Data["Tokens"] = tokens
  45. accountLinks, err := models.ListAccountLinks(ctx.User)
  46. if err != nil {
  47. ctx.ServerError("ListAccountLinks", err)
  48. return
  49. }
  50. // map the provider display name with the LoginSource
  51. sources := make(map[*models.LoginSource]string)
  52. for _, externalAccount := range accountLinks {
  53. if loginSource, err := models.GetLoginSourceByID(externalAccount.LoginSourceID); err == nil {
  54. var providerDisplayName string
  55. if loginSource.IsOAuth2() {
  56. providerTechnicalName := loginSource.OAuth2().Provider
  57. providerDisplayName = models.OAuth2Providers[providerTechnicalName].DisplayName
  58. } else {
  59. providerDisplayName = loginSource.Name
  60. }
  61. sources[loginSource] = providerDisplayName
  62. }
  63. }
  64. ctx.Data["AccountLinks"] = sources
  65. if ctx.Query("openid.return_to") != "" {
  66. settingsOpenIDVerify(ctx)
  67. return
  68. }
  69. openid, err := models.GetUserOpenIDs(ctx.User.ID)
  70. if err != nil {
  71. ctx.ServerError("GetUserOpenIDs", err)
  72. return
  73. }
  74. ctx.Data["OpenIDs"] = openid
  75. ctx.HTML(200, tplSettingsSecurity)
  76. }
  77. // DeleteAccountLink delete a single account link
  78. func DeleteAccountLink(ctx *context.Context) {
  79. if _, err := models.RemoveAccountLink(ctx.User, ctx.QueryInt64("loginSourceID")); err != nil {
  80. ctx.Flash.Error("RemoveAccountLink: " + err.Error())
  81. } else {
  82. ctx.Flash.Success(ctx.Tr("settings.remove_account_link_success"))
  83. }
  84. ctx.JSON(200, map[string]interface{}{
  85. "redirect": setting.AppSubURL + "/user/settings/security",
  86. })
  87. }