1ee59f0fa3
We have some instances that only allow using an external authentication source for authentication. In this case, users changing their email, password, or linked OpenID connections will not have any effect, and we'd like to prevent showing that to them to prevent confusion. Included in this are several changes to support this: * A new setting to disable user managed authentication credentials (email, password & OpenID connections) * A new setting to disable user managed MFA (2FA codes & WebAuthn) * Fix an issue where some templates had separate logic for determining if a feature was disabled since it didn't check the globally disabled features * Hide more user setting pages in the navbar when their settings aren't enabled --------- Co-authored-by: Kyle D <kdumontnu@gmail.com>
130 lines
3.0 KiB
Go
130 lines
3.0 KiB
Go
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package setting
|
|
|
|
import (
|
|
"errors"
|
|
"net/http"
|
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
"code.gitea.io/gitea/modules/base"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
shared "code.gitea.io/gitea/routers/web/shared/secrets"
|
|
shared_user "code.gitea.io/gitea/routers/web/shared/user"
|
|
"code.gitea.io/gitea/services/context"
|
|
)
|
|
|
|
const (
|
|
// TODO: Separate secrets from runners when layout is ready
|
|
tplRepoSecrets base.TplName = "repo/settings/actions"
|
|
tplOrgSecrets base.TplName = "org/settings/actions"
|
|
tplUserSecrets base.TplName = "user/settings/actions"
|
|
)
|
|
|
|
type secretsCtx struct {
|
|
OwnerID int64
|
|
RepoID int64
|
|
IsRepo bool
|
|
IsOrg bool
|
|
IsUser bool
|
|
SecretsTemplate base.TplName
|
|
RedirectLink string
|
|
}
|
|
|
|
func getSecretsCtx(ctx *context.Context) (*secretsCtx, error) {
|
|
if ctx.Data["PageIsRepoSettings"] == true {
|
|
return &secretsCtx{
|
|
OwnerID: 0,
|
|
RepoID: ctx.Repo.Repository.ID,
|
|
IsRepo: true,
|
|
SecretsTemplate: tplRepoSecrets,
|
|
RedirectLink: ctx.Repo.RepoLink + "/settings/actions/secrets",
|
|
}, nil
|
|
}
|
|
|
|
if ctx.Data["PageIsOrgSettings"] == true {
|
|
err := shared_user.LoadHeaderCount(ctx)
|
|
if err != nil {
|
|
ctx.ServerError("LoadHeaderCount", err)
|
|
return nil, nil
|
|
}
|
|
return &secretsCtx{
|
|
OwnerID: ctx.ContextUser.ID,
|
|
RepoID: 0,
|
|
IsOrg: true,
|
|
SecretsTemplate: tplOrgSecrets,
|
|
RedirectLink: ctx.Org.OrgLink + "/settings/actions/secrets",
|
|
}, nil
|
|
}
|
|
|
|
if ctx.Data["PageIsUserSettings"] == true {
|
|
return &secretsCtx{
|
|
OwnerID: ctx.Doer.ID,
|
|
RepoID: 0,
|
|
IsUser: true,
|
|
SecretsTemplate: tplUserSecrets,
|
|
RedirectLink: setting.AppSubURL + "/user/settings/actions/secrets",
|
|
}, nil
|
|
}
|
|
|
|
return nil, errors.New("unable to set Secrets context")
|
|
}
|
|
|
|
func Secrets(ctx *context.Context) {
|
|
ctx.Data["Title"] = ctx.Tr("actions.actions")
|
|
ctx.Data["PageType"] = "secrets"
|
|
ctx.Data["PageIsSharedSettingsSecrets"] = true
|
|
ctx.Data["UserDisabledFeatures"] = user_model.DisabledFeaturesWithLoginType(ctx.Doer)
|
|
|
|
sCtx, err := getSecretsCtx(ctx)
|
|
if err != nil {
|
|
ctx.ServerError("getSecretsCtx", err)
|
|
return
|
|
}
|
|
|
|
if sCtx.IsRepo {
|
|
ctx.Data["DisableSSH"] = setting.SSH.Disabled
|
|
}
|
|
|
|
shared.SetSecretsContext(ctx, sCtx.OwnerID, sCtx.RepoID)
|
|
if ctx.Written() {
|
|
return
|
|
}
|
|
ctx.HTML(http.StatusOK, sCtx.SecretsTemplate)
|
|
}
|
|
|
|
func SecretsPost(ctx *context.Context) {
|
|
sCtx, err := getSecretsCtx(ctx)
|
|
if err != nil {
|
|
ctx.ServerError("getSecretsCtx", err)
|
|
return
|
|
}
|
|
|
|
if ctx.HasError() {
|
|
ctx.JSONError(ctx.GetErrMsg())
|
|
return
|
|
}
|
|
|
|
shared.PerformSecretsPost(
|
|
ctx,
|
|
sCtx.OwnerID,
|
|
sCtx.RepoID,
|
|
sCtx.RedirectLink,
|
|
)
|
|
}
|
|
|
|
func SecretsDelete(ctx *context.Context) {
|
|
sCtx, err := getSecretsCtx(ctx)
|
|
if err != nil {
|
|
ctx.ServerError("getSecretsCtx", err)
|
|
return
|
|
}
|
|
shared.PerformSecretsDelete(
|
|
ctx,
|
|
sCtx.OwnerID,
|
|
sCtx.RepoID,
|
|
sCtx.RedirectLink,
|
|
)
|
|
}
|