mirror of
				https://github.com/go-gitea/gitea
				synced 2025-11-03 21:08:25 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			242 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			242 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2023 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	auth_model "code.gitea.io/gitea/models/auth"
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	pwd "code.gitea.io/gitea/modules/auth/password"
 | 
						|
	"code.gitea.io/gitea/modules/optional"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
 | 
						|
	"github.com/urfave/cli/v3"
 | 
						|
)
 | 
						|
 | 
						|
func microcmdUserCreate() *cli.Command {
 | 
						|
	return &cli.Command{
 | 
						|
		Name:   "create",
 | 
						|
		Usage:  "Create a new user in database",
 | 
						|
		Action: runCreateUser,
 | 
						|
		MutuallyExclusiveFlags: []cli.MutuallyExclusiveFlags{
 | 
						|
			{
 | 
						|
				Flags: [][]cli.Flag{
 | 
						|
					{
 | 
						|
						&cli.StringFlag{
 | 
						|
							Name:  "name",
 | 
						|
							Usage: "Username. DEPRECATED: use username instead",
 | 
						|
						},
 | 
						|
						&cli.StringFlag{
 | 
						|
							Name:  "username",
 | 
						|
							Usage: "Username",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Required: true,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Flags: []cli.Flag{
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:  "user-type",
 | 
						|
				Usage: "Set user's type: individual or bot",
 | 
						|
				Value: "individual",
 | 
						|
			},
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:  "password",
 | 
						|
				Usage: "User password",
 | 
						|
			},
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:     "email",
 | 
						|
				Usage:    "User email address",
 | 
						|
				Required: true,
 | 
						|
			},
 | 
						|
			&cli.BoolFlag{
 | 
						|
				Name:  "admin",
 | 
						|
				Usage: "User is an admin",
 | 
						|
			},
 | 
						|
			&cli.BoolFlag{
 | 
						|
				Name:  "random-password",
 | 
						|
				Usage: "Generate a random password for the user",
 | 
						|
			},
 | 
						|
			&cli.BoolFlag{
 | 
						|
				Name:        "must-change-password",
 | 
						|
				Usage:       "User must change password after initial login, defaults to true for all users except the first one (can be disabled by --must-change-password=false)",
 | 
						|
				HideDefault: true,
 | 
						|
			},
 | 
						|
			&cli.IntFlag{
 | 
						|
				Name:  "random-password-length",
 | 
						|
				Usage: "Length of the random password to be generated",
 | 
						|
				Value: 12,
 | 
						|
			},
 | 
						|
			&cli.BoolFlag{
 | 
						|
				Name:  "access-token",
 | 
						|
				Usage: "Generate access token for the user",
 | 
						|
			},
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:  "access-token-name",
 | 
						|
				Usage: `Name of the generated access token`,
 | 
						|
				Value: "gitea-admin",
 | 
						|
			},
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:  "access-token-scopes",
 | 
						|
				Usage: `Scopes of the generated access token, comma separated. Examples: "all", "public-only,read:issue", "write:repository,write:user"`,
 | 
						|
				Value: "all",
 | 
						|
			},
 | 
						|
			&cli.BoolFlag{
 | 
						|
				Name:  "restricted",
 | 
						|
				Usage: "Make a restricted user account",
 | 
						|
			},
 | 
						|
			&cli.StringFlag{
 | 
						|
				Name:  "fullname",
 | 
						|
				Usage: `The full, human-readable name of the user`,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func runCreateUser(ctx context.Context, c *cli.Command) error {
 | 
						|
	// this command highly depends on the many setting options (create org, visibility, etc.), so it must have a full setting load first
 | 
						|
	// duplicate setting loading should be safe at the moment, but it should be refactored & improved in the future.
 | 
						|
	setting.LoadSettings()
 | 
						|
 | 
						|
	userTypes := map[string]user_model.UserType{
 | 
						|
		"individual": user_model.UserTypeIndividual,
 | 
						|
		"bot":        user_model.UserTypeBot,
 | 
						|
	}
 | 
						|
	userType, ok := userTypes[c.String("user-type")]
 | 
						|
	if !ok {
 | 
						|
		return fmt.Errorf("invalid user type: %s", c.String("user-type"))
 | 
						|
	}
 | 
						|
	if userType != user_model.UserTypeIndividual {
 | 
						|
		// Some other commands like "change-password" also only support individual users.
 | 
						|
		// It needs to clarify the "password" behavior for bot users in the future.
 | 
						|
		// At the moment, we do not allow setting password for bot users.
 | 
						|
		if c.IsSet("password") || c.IsSet("random-password") {
 | 
						|
			return errors.New("password can only be set for individual users")
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if c.IsSet("password") && c.IsSet("random-password") {
 | 
						|
		return errors.New("cannot set both -random-password and -password flags")
 | 
						|
	}
 | 
						|
 | 
						|
	var username string
 | 
						|
	if c.IsSet("username") {
 | 
						|
		username = c.String("username")
 | 
						|
	} else {
 | 
						|
		username = c.String("name")
 | 
						|
		_, _ = fmt.Fprintf(c.ErrWriter, "--name flag is deprecated. Use --username instead.\n")
 | 
						|
	}
 | 
						|
 | 
						|
	if !setting.IsInTesting {
 | 
						|
		// FIXME: need to refactor the "initDB" related code later
 | 
						|
		// it doesn't make sense to call it in (almost) every command action function
 | 
						|
		if err := initDB(ctx); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var password string
 | 
						|
	if c.IsSet("password") {
 | 
						|
		password = c.String("password")
 | 
						|
	} else if c.IsSet("random-password") {
 | 
						|
		var err error
 | 
						|
		password, err = pwd.Generate(c.Int("random-password-length"))
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		// codeql[disable-next-line=go/clear-text-logging]
 | 
						|
		fmt.Printf("generated random password is '%s'\n", password)
 | 
						|
	} else if userType == user_model.UserTypeIndividual {
 | 
						|
		return errors.New("must set either password or random-password flag")
 | 
						|
	}
 | 
						|
 | 
						|
	isAdmin := c.Bool("admin")
 | 
						|
	mustChangePassword := true // always default to true
 | 
						|
	if c.IsSet("must-change-password") {
 | 
						|
		if userType != user_model.UserTypeIndividual {
 | 
						|
			return errors.New("must-change-password flag can only be set for individual users")
 | 
						|
		}
 | 
						|
		// if the flag is set, use the value provided by the user
 | 
						|
		mustChangePassword = c.Bool("must-change-password")
 | 
						|
	} else if userType == user_model.UserTypeIndividual {
 | 
						|
		// check whether there are users in the database
 | 
						|
		hasUserRecord, err := db.IsTableNotEmpty(&user_model.User{})
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("IsTableNotEmpty: %w", err)
 | 
						|
		}
 | 
						|
		if !hasUserRecord {
 | 
						|
			// if this is the first one being created, don't force to change password (keep the old behavior)
 | 
						|
			mustChangePassword = false
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	restricted := optional.None[bool]()
 | 
						|
 | 
						|
	if c.IsSet("restricted") {
 | 
						|
		restricted = optional.Some(c.Bool("restricted"))
 | 
						|
	}
 | 
						|
 | 
						|
	// default user visibility in app.ini
 | 
						|
	visibility := setting.Service.DefaultUserVisibilityMode
 | 
						|
 | 
						|
	u := &user_model.User{
 | 
						|
		Name:               username,
 | 
						|
		Email:              c.String("email"),
 | 
						|
		IsAdmin:            isAdmin,
 | 
						|
		Type:               userType,
 | 
						|
		Passwd:             password,
 | 
						|
		MustChangePassword: mustChangePassword,
 | 
						|
		Visibility:         visibility,
 | 
						|
		FullName:           c.String("fullname"),
 | 
						|
	}
 | 
						|
 | 
						|
	overwriteDefault := &user_model.CreateUserOverwriteOptions{
 | 
						|
		IsActive:     optional.Some(true),
 | 
						|
		IsRestricted: restricted,
 | 
						|
	}
 | 
						|
 | 
						|
	var accessTokenName string
 | 
						|
	var accessTokenScope auth_model.AccessTokenScope
 | 
						|
	if c.IsSet("access-token") {
 | 
						|
		accessTokenName = strings.TrimSpace(c.String("access-token-name"))
 | 
						|
		if accessTokenName == "" {
 | 
						|
			return errors.New("access-token-name cannot be empty")
 | 
						|
		}
 | 
						|
		var err error
 | 
						|
		accessTokenScope, err = auth_model.AccessTokenScope(c.String("access-token-scopes")).Normalize()
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("invalid access token scope provided: %w", err)
 | 
						|
		}
 | 
						|
		if !accessTokenScope.HasPermissionScope() {
 | 
						|
			return errors.New("access token does not have any permission")
 | 
						|
		}
 | 
						|
	} else if c.IsSet("access-token-name") || c.IsSet("access-token-scopes") {
 | 
						|
		return errors.New("access-token-name and access-token-scopes flags are only valid when access-token flag is set")
 | 
						|
	}
 | 
						|
 | 
						|
	// arguments should be prepared before creating the user & access token, in case there is anything wrong
 | 
						|
 | 
						|
	// create the user
 | 
						|
	if err := user_model.CreateUser(ctx, u, &user_model.Meta{}, overwriteDefault); err != nil {
 | 
						|
		return fmt.Errorf("CreateUser: %w", err)
 | 
						|
	}
 | 
						|
	fmt.Printf("New user '%s' has been successfully created!\n", username)
 | 
						|
 | 
						|
	// create the access token
 | 
						|
	if accessTokenScope != "" {
 | 
						|
		t := &auth_model.AccessToken{Name: accessTokenName, UID: u.ID, Scope: accessTokenScope}
 | 
						|
		if err := auth_model.NewAccessToken(ctx, t); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		fmt.Printf("Access token was successfully created... %s\n", t.Token)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 |