githaven-fork/routers/user/setting.go

163 lines
3.9 KiB
Go
Raw Normal View History

2014-03-10 08:54:52 +00:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package user
import (
2014-03-11 00:48:58 +00:00
"net/http"
"strconv"
"github.com/martini-contrib/render"
"github.com/martini-contrib/sessions"
2014-03-10 08:54:52 +00:00
"github.com/gogits/gogs/models"
"github.com/gogits/gogs/modules/auth"
"github.com/gogits/gogs/modules/base"
"github.com/gogits/gogs/modules/log"
)
func Setting(form auth.UpdateProfileForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
2014-03-10 08:54:52 +00:00
data["Title"] = "Setting"
data["PageIsUserSetting"] = true
user := auth.SignedInUser(session)
2014-03-14 05:12:07 +00:00
data["Owner"] = user
if req.Method == "GET" {
2014-03-13 07:44:56 +00:00
r.HTML(200, "user/setting", data)
return
}
if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
r.HTML(200, "user/setting", data)
return
}
user.Email = form.Email
user.Website = form.Website
user.Location = form.Location
user.Avatar = base.EncodeMd5(form.Avatar)
2014-03-14 05:12:07 +00:00
user.AvatarEmail = form.Avatar
if err := models.UpdateUser(user); err != nil {
data["ErrorMsg"] = err
log.Error("setting.Setting: %v", err)
r.HTML(200, "base/error", data)
return
}
2014-03-14 05:12:07 +00:00
data["IsSuccess"] = true
2014-03-10 08:54:52 +00:00
r.HTML(200, "user/setting", data)
}
2014-03-14 05:12:07 +00:00
func SettingPassword(form auth.UpdatePasswdForm, r render.Render, data base.TmplData, session sessions.Session, req *http.Request) {
data["Title"] = "Password"
2014-03-14 03:24:08 +00:00
data["PageIsUserSetting"] = true
2014-03-14 05:12:07 +00:00
if req.Method == "GET" {
r.HTML(200, "user/password", data)
return
}
2014-03-13 08:06:35 +00:00
user := auth.SignedInUser(session)
2014-03-14 05:12:07 +00:00
newUser := &models.User{Passwd: form.NewPasswd}
2014-03-13 08:06:35 +00:00
if err := newUser.EncodePasswd(); err != nil {
data["ErrorMsg"] = err
log.Error("setting.UpdatePasswd: %v", err)
r.HTML(200, "base/error", data)
return
}
if user.Passwd != newUser.Passwd {
data["HasError"] = true
data["ErrorMsg"] = "Old password is not correct"
} else if form.NewPasswd != form.RetypePasswd {
data["HasError"] = true
data["ErrorMsg"] = "New password and re-type password are not same"
} else {
user.Passwd = newUser.Passwd
if err := models.UpdateUser(user); err != nil {
data["ErrorMsg"] = err
2014-03-14 05:12:07 +00:00
log.Error("setting.UpdatePasswd: %v", err)
2014-03-13 08:06:35 +00:00
r.HTML(200, "base/error", data)
return
}
2014-03-14 05:12:07 +00:00
data["IsSuccess"] = true
2014-03-13 08:06:35 +00:00
}
data["Owner"] = user
2014-03-14 05:12:07 +00:00
r.HTML(200, "user/password", data)
2014-03-13 08:06:35 +00:00
}
2014-03-11 00:48:58 +00:00
func SettingSSHKeys(form auth.AddSSHKeyForm, r render.Render, data base.TmplData, req *http.Request, session sessions.Session) {
data["Title"] = "SSH Keys"
// Delete SSH key.
2014-03-10 13:12:49 +00:00
if req.Method == "DELETE" || req.FormValue("_method") == "DELETE" {
2014-03-11 00:48:58 +00:00
println(1)
2014-03-10 13:12:49 +00:00
id, err := strconv.ParseInt(req.FormValue("id"), 10, 64)
if err != nil {
data["ErrorMsg"] = err
log.Error("ssh.DelPublicKey: %v", err)
r.JSON(200, map[string]interface{}{
"ok": false,
"err": err.Error(),
})
return
}
k := &models.PublicKey{
Id: id,
OwnerId: auth.SignedInId(session),
}
2014-03-11 00:48:58 +00:00
if err = models.DeletePublicKey(k); err != nil {
2014-03-10 13:12:49 +00:00
data["ErrorMsg"] = err
log.Error("ssh.DelPublicKey: %v", err)
r.JSON(200, map[string]interface{}{
"ok": false,
"err": err.Error(),
})
} else {
r.JSON(200, map[string]interface{}{
"ok": true,
})
}
2014-03-11 03:41:38 +00:00
return
2014-03-10 13:12:49 +00:00
}
2014-03-11 00:48:58 +00:00
// Add new SSH key.
2014-03-10 08:54:52 +00:00
if req.Method == "POST" {
2014-03-11 00:48:58 +00:00
if hasErr, ok := data["HasError"]; ok && hasErr.(bool) {
r.HTML(200, "user/publickey", data)
return
}
2014-03-10 08:54:52 +00:00
k := &models.PublicKey{OwnerId: auth.SignedInId(session),
2014-03-11 00:48:58 +00:00
Name: form.KeyName,
Content: form.KeyContent,
2014-03-10 08:54:52 +00:00
}
2014-03-11 00:48:58 +00:00
if err := models.AddPublicKey(k); err != nil {
2014-03-10 08:54:52 +00:00
data["ErrorMsg"] = err
log.Error("ssh.AddPublicKey: %v", err)
r.HTML(200, "base/error", data)
return
} else {
data["AddSSHKeySuccess"] = true
}
}
2014-03-11 00:48:58 +00:00
// List existed SSH keys.
2014-03-10 08:54:52 +00:00
keys, err := models.ListPublicKey(auth.SignedInId(session))
if err != nil {
data["ErrorMsg"] = err
log.Error("ssh.ListPublicKey: %v", err)
r.HTML(200, "base/error", data)
return
}
data["PageIsUserSetting"] = true
data["Keys"] = keys
r.HTML(200, "user/publickey", data)
}