mirror of
				https://github.com/go-gitea/gitea
				synced 2025-11-04 05:18:25 +00:00 
			
		
		
		
	Issue: [link](https://github.com/go-gitea/gitea/issues/9637) Changes introduced: I have clarified the problematic terms (`login`, `login_name`, and `username`) in all affected endpoints. The changes were made to relevant: - HTTP endpoint parameters' descriptions - response/request models' fields
		
			
				
	
	
		
			415 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			415 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
						|
// Copyright 2018 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package user
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	auth_model "code.gitea.io/gitea/models/auth"
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	api "code.gitea.io/gitea/modules/structs"
 | 
						|
	"code.gitea.io/gitea/modules/web"
 | 
						|
	"code.gitea.io/gitea/routers/api/v1/utils"
 | 
						|
	"code.gitea.io/gitea/services/context"
 | 
						|
	"code.gitea.io/gitea/services/convert"
 | 
						|
)
 | 
						|
 | 
						|
// ListAccessTokens list all the access tokens
 | 
						|
func ListAccessTokens(ctx *context.APIContext) {
 | 
						|
	// swagger:operation GET /users/{username}/tokens user userGetTokens
 | 
						|
	// ---
 | 
						|
	// summary: List the authenticated user's access tokens
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: username
 | 
						|
	//   in: path
 | 
						|
	//   description: username of to user whose access tokens are to be listed
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: page
 | 
						|
	//   in: query
 | 
						|
	//   description: page number of results to return (1-based)
 | 
						|
	//   type: integer
 | 
						|
	// - name: limit
 | 
						|
	//   in: query
 | 
						|
	//   description: page size of results
 | 
						|
	//   type: integer
 | 
						|
	// responses:
 | 
						|
	//   "200":
 | 
						|
	//     "$ref": "#/responses/AccessTokenList"
 | 
						|
	//   "403":
 | 
						|
	//     "$ref": "#/responses/forbidden"
 | 
						|
 | 
						|
	opts := auth_model.ListAccessTokensOptions{UserID: ctx.ContextUser.ID, ListOptions: utils.GetListOptions(ctx)}
 | 
						|
 | 
						|
	tokens, count, err := db.FindAndCount[auth_model.AccessToken](ctx, opts)
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIErrorInternal(err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	apiTokens := make([]*api.AccessToken, len(tokens))
 | 
						|
	for i := range tokens {
 | 
						|
		apiTokens[i] = &api.AccessToken{
 | 
						|
			ID:             tokens[i].ID,
 | 
						|
			Name:           tokens[i].Name,
 | 
						|
			TokenLastEight: tokens[i].TokenLastEight,
 | 
						|
			Scopes:         tokens[i].Scope.StringSlice(),
 | 
						|
			Created:        tokens[i].CreatedUnix.AsTime(),
 | 
						|
			Updated:        tokens[i].UpdatedUnix.AsTime(),
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.SetTotalCountHeader(count)
 | 
						|
	ctx.JSON(http.StatusOK, &apiTokens)
 | 
						|
}
 | 
						|
 | 
						|
// CreateAccessToken create access tokens
 | 
						|
func CreateAccessToken(ctx *context.APIContext) {
 | 
						|
	// swagger:operation POST /users/{username}/tokens user userCreateToken
 | 
						|
	// ---
 | 
						|
	// summary: Create an access token
 | 
						|
	// consumes:
 | 
						|
	// - application/json
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: username
 | 
						|
	//   in: path
 | 
						|
	//   description: username of the user whose token is to be created
 | 
						|
	//   required: true
 | 
						|
	//   type: string
 | 
						|
	// - name: body
 | 
						|
	//   in: body
 | 
						|
	//   schema:
 | 
						|
	//     "$ref": "#/definitions/CreateAccessTokenOption"
 | 
						|
	// responses:
 | 
						|
	//   "201":
 | 
						|
	//     "$ref": "#/responses/AccessToken"
 | 
						|
	//   "400":
 | 
						|
	//     "$ref": "#/responses/error"
 | 
						|
	//   "403":
 | 
						|
	//     "$ref": "#/responses/forbidden"
 | 
						|
 | 
						|
	form := web.GetForm(ctx).(*api.CreateAccessTokenOption)
 | 
						|
 | 
						|
	t := &auth_model.AccessToken{
 | 
						|
		UID:  ctx.ContextUser.ID,
 | 
						|
		Name: form.Name,
 | 
						|
	}
 | 
						|
 | 
						|
	exist, err := auth_model.AccessTokenByNameExists(ctx, t)
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIErrorInternal(err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if exist {
 | 
						|
		ctx.APIError(http.StatusBadRequest, errors.New("access token name has been used already"))
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	scope, err := auth_model.AccessTokenScope(strings.Join(form.Scopes, ",")).Normalize()
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIError(http.StatusBadRequest, fmt.Errorf("invalid access token scope provided: %w", err))
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if scope == "" {
 | 
						|
		ctx.APIError(http.StatusBadRequest, "access token must have a scope")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	t.Scope = scope
 | 
						|
 | 
						|
	if err := auth_model.NewAccessToken(ctx, t); err != nil {
 | 
						|
		ctx.APIErrorInternal(err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ctx.JSON(http.StatusCreated, &api.AccessToken{
 | 
						|
		Name:           t.Name,
 | 
						|
		Token:          t.Token,
 | 
						|
		ID:             t.ID,
 | 
						|
		TokenLastEight: t.TokenLastEight,
 | 
						|
		Scopes:         t.Scope.StringSlice(),
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// DeleteAccessToken delete access tokens
 | 
						|
func DeleteAccessToken(ctx *context.APIContext) {
 | 
						|
	// swagger:operation DELETE /users/{username}/tokens/{token} user userDeleteAccessToken
 | 
						|
	// ---
 | 
						|
	// summary: delete an access token
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: username
 | 
						|
	//   in: path
 | 
						|
	//   description: username of the user whose token is to be deleted
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// - name: token
 | 
						|
	//   in: path
 | 
						|
	//   description: token to be deleted, identified by ID and if not available by name
 | 
						|
	//   type: string
 | 
						|
	//   required: true
 | 
						|
	// responses:
 | 
						|
	//   "204":
 | 
						|
	//     "$ref": "#/responses/empty"
 | 
						|
	//   "403":
 | 
						|
	//     "$ref": "#/responses/forbidden"
 | 
						|
	//   "404":
 | 
						|
	//     "$ref": "#/responses/notFound"
 | 
						|
	//   "422":
 | 
						|
	//     "$ref": "#/responses/error"
 | 
						|
 | 
						|
	token := ctx.PathParam("id")
 | 
						|
	tokenID, _ := strconv.ParseInt(token, 0, 64)
 | 
						|
 | 
						|
	if tokenID == 0 {
 | 
						|
		tokens, err := db.Find[auth_model.AccessToken](ctx, auth_model.ListAccessTokensOptions{
 | 
						|
			Name:   token,
 | 
						|
			UserID: ctx.ContextUser.ID,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			ctx.APIErrorInternal(err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		switch len(tokens) {
 | 
						|
		case 0:
 | 
						|
			ctx.APIErrorNotFound()
 | 
						|
			return
 | 
						|
		case 1:
 | 
						|
			tokenID = tokens[0].ID
 | 
						|
		default:
 | 
						|
			ctx.APIError(http.StatusUnprocessableEntity, fmt.Errorf("multiple matches for token name '%s'", token))
 | 
						|
			return
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if tokenID == 0 {
 | 
						|
		ctx.APIErrorInternal(nil)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	if err := auth_model.DeleteAccessTokenByID(ctx, tokenID, ctx.ContextUser.ID); err != nil {
 | 
						|
		if auth_model.IsErrAccessTokenNotExist(err) {
 | 
						|
			ctx.APIErrorNotFound()
 | 
						|
		} else {
 | 
						|
			ctx.APIErrorInternal(err)
 | 
						|
		}
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.Status(http.StatusNoContent)
 | 
						|
}
 | 
						|
 | 
						|
// CreateOauth2Application is the handler to create a new OAuth2 Application for the authenticated user
 | 
						|
func CreateOauth2Application(ctx *context.APIContext) {
 | 
						|
	// swagger:operation POST /user/applications/oauth2 user userCreateOAuth2Application
 | 
						|
	// ---
 | 
						|
	// summary: creates a new OAuth2 application
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: body
 | 
						|
	//   in: body
 | 
						|
	//   required: true
 | 
						|
	//   schema:
 | 
						|
	//     "$ref": "#/definitions/CreateOAuth2ApplicationOptions"
 | 
						|
	// responses:
 | 
						|
	//   "201":
 | 
						|
	//     "$ref": "#/responses/OAuth2Application"
 | 
						|
	//   "400":
 | 
						|
	//     "$ref": "#/responses/error"
 | 
						|
 | 
						|
	data := web.GetForm(ctx).(*api.CreateOAuth2ApplicationOptions)
 | 
						|
 | 
						|
	app, err := auth_model.CreateOAuth2Application(ctx, auth_model.CreateOAuth2ApplicationOptions{
 | 
						|
		Name:                       data.Name,
 | 
						|
		UserID:                     ctx.Doer.ID,
 | 
						|
		RedirectURIs:               data.RedirectURIs,
 | 
						|
		ConfidentialClient:         data.ConfidentialClient,
 | 
						|
		SkipSecondaryAuthorization: data.SkipSecondaryAuthorization,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIError(http.StatusBadRequest, "error creating oauth2 application")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	secret, err := app.GenerateClientSecret(ctx)
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIError(http.StatusBadRequest, "error creating application secret")
 | 
						|
		return
 | 
						|
	}
 | 
						|
	app.ClientSecret = secret
 | 
						|
 | 
						|
	ctx.JSON(http.StatusCreated, convert.ToOAuth2Application(app))
 | 
						|
}
 | 
						|
 | 
						|
// ListOauth2Applications list all the Oauth2 application
 | 
						|
func ListOauth2Applications(ctx *context.APIContext) {
 | 
						|
	// swagger:operation GET /user/applications/oauth2 user userGetOauth2Application
 | 
						|
	// ---
 | 
						|
	// summary: List the authenticated user's oauth2 applications
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: page
 | 
						|
	//   in: query
 | 
						|
	//   description: page number of results to return (1-based)
 | 
						|
	//   type: integer
 | 
						|
	// - name: limit
 | 
						|
	//   in: query
 | 
						|
	//   description: page size of results
 | 
						|
	//   type: integer
 | 
						|
	// responses:
 | 
						|
	//   "200":
 | 
						|
	//     "$ref": "#/responses/OAuth2ApplicationList"
 | 
						|
 | 
						|
	apps, total, err := db.FindAndCount[auth_model.OAuth2Application](ctx, auth_model.FindOAuth2ApplicationsOptions{
 | 
						|
		ListOptions: utils.GetListOptions(ctx),
 | 
						|
		OwnerID:     ctx.Doer.ID,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIErrorInternal(err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	apiApps := make([]*api.OAuth2Application, len(apps))
 | 
						|
	for i := range apps {
 | 
						|
		apiApps[i] = convert.ToOAuth2Application(apps[i])
 | 
						|
		apiApps[i].ClientSecret = "" // Hide secret on application list
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.SetTotalCountHeader(total)
 | 
						|
	ctx.JSON(http.StatusOK, &apiApps)
 | 
						|
}
 | 
						|
 | 
						|
// DeleteOauth2Application delete OAuth2 Application
 | 
						|
func DeleteOauth2Application(ctx *context.APIContext) {
 | 
						|
	// swagger:operation DELETE /user/applications/oauth2/{id} user userDeleteOAuth2Application
 | 
						|
	// ---
 | 
						|
	// summary: delete an OAuth2 Application
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: id
 | 
						|
	//   in: path
 | 
						|
	//   description: token to be deleted
 | 
						|
	//   type: integer
 | 
						|
	//   format: int64
 | 
						|
	//   required: true
 | 
						|
	// responses:
 | 
						|
	//   "204":
 | 
						|
	//     "$ref": "#/responses/empty"
 | 
						|
	//   "404":
 | 
						|
	//     "$ref": "#/responses/notFound"
 | 
						|
	appID := ctx.PathParamInt64("id")
 | 
						|
	if err := auth_model.DeleteOAuth2Application(ctx, appID, ctx.Doer.ID); err != nil {
 | 
						|
		if auth_model.IsErrOAuthApplicationNotFound(err) {
 | 
						|
			ctx.APIErrorNotFound()
 | 
						|
		} else {
 | 
						|
			ctx.APIErrorInternal(err)
 | 
						|
		}
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.Status(http.StatusNoContent)
 | 
						|
}
 | 
						|
 | 
						|
// GetOauth2Application get OAuth2 Application
 | 
						|
func GetOauth2Application(ctx *context.APIContext) {
 | 
						|
	// swagger:operation GET /user/applications/oauth2/{id} user userGetOAuth2Application
 | 
						|
	// ---
 | 
						|
	// summary: get an OAuth2 Application
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: id
 | 
						|
	//   in: path
 | 
						|
	//   description: Application ID to be found
 | 
						|
	//   type: integer
 | 
						|
	//   format: int64
 | 
						|
	//   required: true
 | 
						|
	// responses:
 | 
						|
	//   "200":
 | 
						|
	//     "$ref": "#/responses/OAuth2Application"
 | 
						|
	//   "404":
 | 
						|
	//     "$ref": "#/responses/notFound"
 | 
						|
	appID := ctx.PathParamInt64("id")
 | 
						|
	app, err := auth_model.GetOAuth2ApplicationByID(ctx, appID)
 | 
						|
	if err != nil {
 | 
						|
		if auth_model.IsErrOauthClientIDInvalid(err) || auth_model.IsErrOAuthApplicationNotFound(err) {
 | 
						|
			ctx.APIErrorNotFound()
 | 
						|
		} else {
 | 
						|
			ctx.APIErrorInternal(err)
 | 
						|
		}
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if app.UID != ctx.Doer.ID {
 | 
						|
		ctx.APIErrorNotFound()
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	app.ClientSecret = ""
 | 
						|
 | 
						|
	ctx.JSON(http.StatusOK, convert.ToOAuth2Application(app))
 | 
						|
}
 | 
						|
 | 
						|
// UpdateOauth2Application update OAuth2 Application
 | 
						|
func UpdateOauth2Application(ctx *context.APIContext) {
 | 
						|
	// swagger:operation PATCH /user/applications/oauth2/{id} user userUpdateOAuth2Application
 | 
						|
	// ---
 | 
						|
	// summary: update an OAuth2 Application, this includes regenerating the client secret
 | 
						|
	// produces:
 | 
						|
	// - application/json
 | 
						|
	// parameters:
 | 
						|
	// - name: id
 | 
						|
	//   in: path
 | 
						|
	//   description: application to be updated
 | 
						|
	//   type: integer
 | 
						|
	//   format: int64
 | 
						|
	//   required: true
 | 
						|
	// - name: body
 | 
						|
	//   in: body
 | 
						|
	//   required: true
 | 
						|
	//   schema:
 | 
						|
	//     "$ref": "#/definitions/CreateOAuth2ApplicationOptions"
 | 
						|
	// responses:
 | 
						|
	//   "200":
 | 
						|
	//     "$ref": "#/responses/OAuth2Application"
 | 
						|
	//   "404":
 | 
						|
	//     "$ref": "#/responses/notFound"
 | 
						|
	appID := ctx.PathParamInt64("id")
 | 
						|
 | 
						|
	data := web.GetForm(ctx).(*api.CreateOAuth2ApplicationOptions)
 | 
						|
 | 
						|
	app, err := auth_model.UpdateOAuth2Application(ctx, auth_model.UpdateOAuth2ApplicationOptions{
 | 
						|
		Name:                       data.Name,
 | 
						|
		UserID:                     ctx.Doer.ID,
 | 
						|
		ID:                         appID,
 | 
						|
		RedirectURIs:               data.RedirectURIs,
 | 
						|
		ConfidentialClient:         data.ConfidentialClient,
 | 
						|
		SkipSecondaryAuthorization: data.SkipSecondaryAuthorization,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		if auth_model.IsErrOauthClientIDInvalid(err) || auth_model.IsErrOAuthApplicationNotFound(err) {
 | 
						|
			ctx.APIErrorNotFound()
 | 
						|
		} else {
 | 
						|
			ctx.APIErrorInternal(err)
 | 
						|
		}
 | 
						|
		return
 | 
						|
	}
 | 
						|
	app.ClientSecret, err = app.GenerateClientSecret(ctx)
 | 
						|
	if err != nil {
 | 
						|
		ctx.APIError(http.StatusBadRequest, "error updating application secret")
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.JSON(http.StatusOK, convert.ToOAuth2Application(app))
 | 
						|
}
 |