2021-11-24 09:49:20 +00:00
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2021-11-24 09:49:20 +00:00
|
|
|
|
|
|
|
package user
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/models/db"
|
|
|
|
"code.gitea.io/gitea/modules/structs"
|
|
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
|
|
|
|
"xorm.io/builder"
|
|
|
|
"xorm.io/xorm"
|
|
|
|
)
|
|
|
|
|
|
|
|
// SearchUserOptions contains the options for searching
|
|
|
|
type SearchUserOptions struct {
|
|
|
|
db.ListOptions
|
2022-03-02 15:30:14 +00:00
|
|
|
|
2021-11-24 09:49:20 +00:00
|
|
|
Keyword string
|
|
|
|
Type UserType
|
|
|
|
UID int64
|
2023-03-15 11:53:01 +00:00
|
|
|
LoginName string // this option should be used only for admin user
|
|
|
|
SourceID int64 // this option should be used only for admin user
|
2021-11-24 09:49:20 +00:00
|
|
|
OrderBy db.SearchOrderBy
|
|
|
|
Visible []structs.VisibleType
|
|
|
|
Actor *User // The user doing the search
|
|
|
|
SearchByEmail bool // Search by email as well as username/full name
|
|
|
|
|
|
|
|
IsActive util.OptionalBool
|
|
|
|
IsAdmin util.OptionalBool
|
|
|
|
IsRestricted util.OptionalBool
|
|
|
|
IsTwoFactorEnabled util.OptionalBool
|
|
|
|
IsProhibitLogin util.OptionalBool
|
2022-03-02 15:30:14 +00:00
|
|
|
|
|
|
|
ExtraParamStrings map[string]string
|
2021-11-24 09:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (opts *SearchUserOptions) toSearchQueryBase() *xorm.Session {
|
[F3] Forgejo driver and CLI
user, topic, project, label, milestone, repository, pull_request,
release, asset, comment, reaction, review providers
Signed-off-by: Earl Warren <contact@earl-warren.org>
Preserve file size when creating attachments
Introduced in c6f50297084ebd9ec8b8c25370b9b963167274eb
repoList.LoadAttributes has a ctx argument now
Rename `repo.GetOwner` to `repo.LoadOwner`
bd66fa586a0da58c4cf2f5f8390aef4bac9d0527
upgrade to the latest gof3
(cherry picked from commit c77071365629984c1dc39a7a83e7252fd5b298e2)
[F3] ID remapping logic is in place, remove workaround
(cherry picked from commit d0fee301670c37c0e73afb271e0a8dd6b622f6f6)
[F3] it is experimental, do not enable by default
(cherry picked from commit de325b21d0adad199ec05652cb8d9fff19248ddb)
(cherry picked from commit 547e7b3c40f15766deb569cf2acface3290cf092)
(cherry picked from commit 820df3a56bc194645b482ef77a8845255d1185fe)
(cherry picked from commit eaba87689bbea84a215558033fc7d514b1b44f3e)
(cherry picked from commit 1b86896b3b4144254ed27064a167650b4e12c690)
(cherry picked from commit 0046aac1c639e021e719408e374cfc84fcbaa1d8)
(cherry picked from commit f14220df8ff692bdcfdcc94660acf64c77e732f5)
(cherry picked from commit 559b73100149978173b0ca8085280cc7fb79982f)
(cherry picked from commit 801f7d600de923afb9f24b74f2b28cc380f09cd0)
(cherry picked from commit 6aa76e9bcf243500675b5dbd543ee89d301ca44e)
(cherry picked from commit a8757dcb071093faea8a398413ee5681193b0627)
[F3] promote F3 users to matching OAuth2 users on first sign-in
(cherry picked from commit bd7fef7496c6f50e1559eac5922ec3280745864d)
(cherry picked from commit 07412698e8828bff3e1894d57356d92bb0063665)
(cherry picked from commit d143e5b2a3dda118529d29caea5e12423b5f5116)
[F3] upgrade to gof3 50a6e740ac04
Add new methods GetIDString() & SetIDString() & ToFormatInterface()
Change the prototype of the fixture function
(cherry picked from commit d7b263ff8b6fda188fe51b2ce75fa333d4aaa23e)
(cherry picked from commit b3eaf2249d3a8b35a564890674f9f50c4e2fde35)
(cherry picked from commit d492ddd9bba3df102e513e748fcafe7808206cb2)
[F3] add GetLocalMatchingRemote with a default implementation
(cherry picked from commit 0a2201503960a18a4308fcf9c13843c6b48569b0)
(cherry picked from commit f1310c38fbc4b2b941af323be215a6313de08232)
(cherry picked from commit deb68552f24ce22e35b5c7a88ceb45190b9df0a2)
[F3] GetLocalMatchingRemote for user
(cherry picked from commit e73cb837f57be0d6c65d6ecb13da621a362351da)
(cherry picked from commit a24bc0b85e1702917a6b39282a869b26654b1aa0)
(cherry picked from commit 846a522ecc5fcdfff1e875e3d006ea68f26137dd)
[F3] GetAdminUser now has a ctx argument
(cherry picked from commit 37357a92afe74405909721a0e0062c3eebcb3454)
(cherry picked from commit 660bc1673c189a16e88bd492947280a6e25fc7dd)
(cherry picked from commit 72d692a76743279b5dd74ff69ecf85d0994be265)
[F3] introduce UserTypeF3
To avoid conflicts should UserTypeRemoteUser be used differently by Gitea
(cherry picked from commit 6de2701bb34da3ab0e9f9e6038541eecbec1d7e4)
[F3] user.Put: idempotency
(cherry picked from commit 821e38573ceaa62ffa067b4e173fad50f0f20f05)
(cherry picked from commit f7638f5414e8dadbb3d982827d52c9529a4e9298)
[F3] upgrade to urfave v2
(cherry picked from commit cc3dbdfd1d1f6814cf8f047805dccf80efd8554c)
[F3] update gof3
(cherry picked from commit 2eee960751e1481f007c00e50406104a614e1255)
[F3] move f3 under forgejo-cli
* simplify the tests by re-using the forgejo-cli helpers to capture
the output
* unify CmdF3 to be structured in the same way CmdActions is
(cherry picked from commit 4c9fe58b7475529aecae2c85a4a51f7dcee86df8)
[F3] replace f3 with forgejo-cli f3
(cherry picked from commit 7ba7ceef1b22ed43d5e89f7c4a48d883332ac512)
[F3] s/ListOptions/Paginator/
[F3] user: add unit tests
[F3] user comparison of F3 managed users is on content
[F3] issue: add unit tests
[F3] gof3 now has one more argument to Put()
[F3] re-use gof3 unit tests for the driver
(cherry picked from commit af7ee6200cba7fcc2fa8bb7ca1e0aa0a5942a7df)
Conflicts:
tests/integration/integration_test.go
because of some code removed in forgejo-development, trivial
context conflict resolution
[F3] more idempotent tests (#1275)
Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/1275
Co-authored-by: Loïc Dachary <loic@dachary.org>
Co-committed-by: Loïc Dachary <loic@dachary.org>
[F3] tests: do SQL update if nothing changes
[F3] tests comment idempotence
[F3] tests milestone idempotence
[F3] tests pull_request idempotence
[F3] tests release idempotence
[F3] tests asset idempotence
[F3] tests project idempotence
[F3] tests review idempotence
(cherry picked from commit 91038bb4e8d1f45d496ccf05d4fc8be88ded8093)
(cherry picked from commit a7d2a65214d30d2b75961da8eed16378eb445766)
(cherry picked from commit 59a17e5a3404a320b85a2b2ee5838e704f558cea)
[F3] sub command of forgejo-cli
(cherry picked from commit 4d098e9b83a7d43e46086a84606ab627d6ae3138)
[F3] implement --quiet, --debug, --verbose
(cherry picked from commit 82e2e17b4524900ae5afd68ec3ea23d58cabba54)
[F3] fix off by one error when importing repositories
(cherry picked from commit 31689b13979cb54521a09cf95be9c77f4b718fe3)
[F3] upgrade gof3
(cherry picked from commit 87b8cfe5a1e4790848f76ccec1055782cf2e493e)
[F3] set the logger for all drivers
The logger is set for the local Forgejo driver only. Even when --debug
is specified, the other drivers do not display debug
information. Use the gof3 context to set the logger for all of them at
once.
(cherry picked from commit 8aa7de8ba0ddac1c696063aa1c5c9e52ff3e11b4)
[F3] the closed date of an issue may be nil
(cherry picked from commit 93d3eaf0b5026f003fcc071ba9596d9d225e9b17)
[F3] update gof3 to support system users
there now is a workaround to hardcode system users when they are not
supported by the API
(cherry picked from commit 915484daa7365186d77a218af1c11ef9dba53d7c)
2022-09-06 04:35:43 +00:00
|
|
|
var cond builder.Cond
|
|
|
|
if opts.Type == UserTypeIndividual {
|
|
|
|
cond = builder.In("type", UserTypeIndividual, UserTypeF3)
|
|
|
|
} else {
|
|
|
|
cond = builder.Eq{"type": opts.Type}
|
|
|
|
}
|
2021-11-24 09:49:20 +00:00
|
|
|
if len(opts.Keyword) > 0 {
|
|
|
|
lowerKeyword := strings.ToLower(opts.Keyword)
|
|
|
|
keywordCond := builder.Or(
|
|
|
|
builder.Like{"lower_name", lowerKeyword},
|
|
|
|
builder.Like{"LOWER(full_name)", lowerKeyword},
|
|
|
|
)
|
|
|
|
if opts.SearchByEmail {
|
|
|
|
keywordCond = keywordCond.Or(builder.Like{"LOWER(email)", lowerKeyword})
|
|
|
|
}
|
|
|
|
|
|
|
|
cond = cond.And(keywordCond)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If visibility filtered
|
|
|
|
if len(opts.Visible) > 0 {
|
|
|
|
cond = cond.And(builder.In("visibility", opts.Visible))
|
|
|
|
}
|
|
|
|
|
2022-07-28 03:59:39 +00:00
|
|
|
cond = cond.And(BuildCanSeeUserCondition(opts.Actor))
|
2021-11-24 09:49:20 +00:00
|
|
|
|
|
|
|
if opts.UID > 0 {
|
|
|
|
cond = cond.And(builder.Eq{"id": opts.UID})
|
|
|
|
}
|
|
|
|
|
2023-03-15 11:53:01 +00:00
|
|
|
if opts.SourceID > 0 {
|
|
|
|
cond = cond.And(builder.Eq{"login_source": opts.SourceID})
|
|
|
|
}
|
|
|
|
if opts.LoginName != "" {
|
|
|
|
cond = cond.And(builder.Eq{"login_name": opts.LoginName})
|
|
|
|
}
|
|
|
|
|
2021-11-24 09:49:20 +00:00
|
|
|
if !opts.IsActive.IsNone() {
|
|
|
|
cond = cond.And(builder.Eq{"is_active": opts.IsActive.IsTrue()})
|
|
|
|
}
|
|
|
|
|
|
|
|
if !opts.IsAdmin.IsNone() {
|
|
|
|
cond = cond.And(builder.Eq{"is_admin": opts.IsAdmin.IsTrue()})
|
|
|
|
}
|
|
|
|
|
|
|
|
if !opts.IsRestricted.IsNone() {
|
|
|
|
cond = cond.And(builder.Eq{"is_restricted": opts.IsRestricted.IsTrue()})
|
|
|
|
}
|
|
|
|
|
|
|
|
if !opts.IsProhibitLogin.IsNone() {
|
|
|
|
cond = cond.And(builder.Eq{"prohibit_login": opts.IsProhibitLogin.IsTrue()})
|
|
|
|
}
|
|
|
|
|
|
|
|
e := db.GetEngine(db.DefaultContext)
|
|
|
|
if opts.IsTwoFactorEnabled.IsNone() {
|
|
|
|
return e.Where(cond)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2fa filter uses LEFT JOIN to check whether a user has a 2fa record
|
2022-01-13 20:32:28 +00:00
|
|
|
// While using LEFT JOIN, sometimes the performance might not be good, but it won't be a problem now, such SQL is seldom executed.
|
|
|
|
// There are some possible methods to refactor this SQL in future when we really need to optimize the performance (but not now):
|
|
|
|
// (1) add a column in user table (2) add a setting value in user_setting table (3) use search engines (bleve/elasticsearch)
|
2021-11-24 09:49:20 +00:00
|
|
|
if opts.IsTwoFactorEnabled.IsTrue() {
|
|
|
|
cond = cond.And(builder.Expr("two_factor.uid IS NOT NULL"))
|
|
|
|
} else {
|
|
|
|
cond = cond.And(builder.Expr("two_factor.uid IS NULL"))
|
|
|
|
}
|
|
|
|
|
|
|
|
return e.Join("LEFT OUTER", "two_factor", "two_factor.uid = `user`.id").
|
|
|
|
Where(cond)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SearchUsers takes options i.e. keyword and part of user name to search,
|
|
|
|
// it returns results in given range and number of total results.
|
|
|
|
func SearchUsers(opts *SearchUserOptions) (users []*User, _ int64, _ error) {
|
|
|
|
sessCount := opts.toSearchQueryBase()
|
|
|
|
defer sessCount.Close()
|
|
|
|
count, err := sessCount.Count(new(User))
|
|
|
|
if err != nil {
|
2022-10-24 19:29:17 +00:00
|
|
|
return nil, 0, fmt.Errorf("Count: %w", err)
|
2021-11-24 09:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(opts.OrderBy) == 0 {
|
|
|
|
opts.OrderBy = db.SearchOrderByAlphabetically
|
|
|
|
}
|
|
|
|
|
|
|
|
sessQuery := opts.toSearchQueryBase().OrderBy(opts.OrderBy.String())
|
|
|
|
defer sessQuery.Close()
|
|
|
|
if opts.Page != 0 {
|
|
|
|
sessQuery = db.SetSessionPagination(sessQuery, opts)
|
|
|
|
}
|
|
|
|
|
|
|
|
// the sql may contain JOIN, so we must only select User related columns
|
|
|
|
sessQuery = sessQuery.Select("`user`.*")
|
|
|
|
users = make([]*User, 0, opts.PageSize)
|
|
|
|
return users, count, sessQuery.Find(&users)
|
|
|
|
}
|
|
|
|
|
2022-07-28 03:59:39 +00:00
|
|
|
// BuildCanSeeUserCondition creates a condition which can be used to restrict results to users/orgs the actor can see
|
|
|
|
func BuildCanSeeUserCondition(actor *User) builder.Cond {
|
|
|
|
if actor != nil {
|
|
|
|
// If Admin - they see all users!
|
|
|
|
if !actor.IsAdmin {
|
|
|
|
// Users can see an organization they are a member of
|
|
|
|
cond := builder.In("`user`.id", builder.Select("org_id").From("org_user").Where(builder.Eq{"uid": actor.ID}))
|
|
|
|
if !actor.IsRestricted {
|
|
|
|
// Not-Restricted users can see public and limited users/organizations
|
|
|
|
cond = cond.Or(builder.In("`user`.visibility", structs.VisibleTypePublic, structs.VisibleTypeLimited))
|
|
|
|
}
|
|
|
|
// Don't forget about self
|
|
|
|
return cond.Or(builder.Eq{"`user`.id": actor.ID})
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Force visibility for privacy
|
|
|
|
// Not logged in - only public users
|
|
|
|
return builder.In("`user`.visibility", structs.VisibleTypePublic)
|
|
|
|
}
|