mirror of
				https://github.com/go-gitea/gitea
				synced 2025-11-04 05:18:25 +00:00 
			
		
		
		
	- Move the file `compare.go` and `slice.go` to `slice.go`.
- Fix `ExistsInSlice`, it's buggy
  - It uses `sort.Search`, so it assumes that the input slice is sorted.
- It passes `func(i int) bool { return slice[i] == target })` to
`sort.Search`, that's incorrect, check the doc of `sort.Search`.
- Conbine `IsInt64InSlice(int64, []int64)` and `ExistsInSlice(string,
[]string)` to `SliceContains[T]([]T, T)`.
- Conbine `IsSliceInt64Eq([]int64, []int64)` and `IsEqualSlice([]string,
[]string)` to `SliceSortedEqual[T]([]T, T)`.
- Add `SliceEqual[T]([]T, T)` as a distinction from
`SliceSortedEqual[T]([]T, T)`.
- Redesign `RemoveIDFromList([]int64, int64) ([]int64, bool)` to
`SliceRemoveAll[T]([]T, T) []T`.
- Add `SliceContainsFunc[T]([]T, func(T) bool)` and
`SliceRemoveAllFunc[T]([]T, func(T) bool)` for general use.
- Add comments to explain why not `golang.org/x/exp/slices`.
- Add unit tests.
		
	
		
			
				
	
	
		
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package smtp
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"net/smtp"
 | 
						|
	"net/textproto"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	auth_model "code.gitea.io/gitea/models/auth"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/util"
 | 
						|
	"code.gitea.io/gitea/services/mailer"
 | 
						|
)
 | 
						|
 | 
						|
// Authenticate queries if the provided login/password is authenticates against the SMTP server
 | 
						|
// Users will be autoregistered as required
 | 
						|
func (source *Source) Authenticate(user *user_model.User, userName, password string) (*user_model.User, error) {
 | 
						|
	// Verify allowed domains.
 | 
						|
	if len(source.AllowedDomains) > 0 {
 | 
						|
		idx := strings.Index(userName, "@")
 | 
						|
		if idx == -1 {
 | 
						|
			return nil, user_model.ErrUserNotExist{Name: userName}
 | 
						|
		} else if !util.SliceContainsString(strings.Split(source.AllowedDomains, ","), userName[idx+1:], true) {
 | 
						|
			return nil, user_model.ErrUserNotExist{Name: userName}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var auth smtp.Auth
 | 
						|
	switch source.Auth {
 | 
						|
	case PlainAuthentication:
 | 
						|
		auth = smtp.PlainAuth("", userName, password, source.Host)
 | 
						|
	case LoginAuthentication:
 | 
						|
		auth = &loginAuthenticator{userName, password}
 | 
						|
	case CRAMMD5Authentication:
 | 
						|
		auth = smtp.CRAMMD5Auth(userName, password)
 | 
						|
	default:
 | 
						|
		return nil, errors.New("unsupported SMTP auth type")
 | 
						|
	}
 | 
						|
 | 
						|
	if err := Authenticate(auth, source); err != nil {
 | 
						|
		// Check standard error format first,
 | 
						|
		// then fallback to worse case.
 | 
						|
		tperr, ok := err.(*textproto.Error)
 | 
						|
		if (ok && tperr.Code == 535) ||
 | 
						|
			strings.Contains(err.Error(), "Username and Password not accepted") {
 | 
						|
			return nil, user_model.ErrUserNotExist{Name: userName}
 | 
						|
		}
 | 
						|
		if (ok && tperr.Code == 534) ||
 | 
						|
			strings.Contains(err.Error(), "Application-specific password required") {
 | 
						|
			return nil, user_model.ErrUserNotExist{Name: userName}
 | 
						|
		}
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	if user != nil {
 | 
						|
		return user, nil
 | 
						|
	}
 | 
						|
 | 
						|
	username := userName
 | 
						|
	idx := strings.Index(userName, "@")
 | 
						|
	if idx > -1 {
 | 
						|
		username = userName[:idx]
 | 
						|
	}
 | 
						|
 | 
						|
	user = &user_model.User{
 | 
						|
		LowerName:   strings.ToLower(username),
 | 
						|
		Name:        strings.ToLower(username),
 | 
						|
		Email:       userName,
 | 
						|
		Passwd:      password,
 | 
						|
		LoginType:   auth_model.SMTP,
 | 
						|
		LoginSource: source.authSource.ID,
 | 
						|
		LoginName:   userName,
 | 
						|
	}
 | 
						|
	overwriteDefault := &user_model.CreateUserOverwriteOptions{
 | 
						|
		IsActive: util.OptionalBoolTrue,
 | 
						|
	}
 | 
						|
 | 
						|
	if err := user_model.CreateUser(user, overwriteDefault); err != nil {
 | 
						|
		return user, err
 | 
						|
	}
 | 
						|
 | 
						|
	mailer.SendRegisterNotifyMail(user)
 | 
						|
 | 
						|
	return user, nil
 | 
						|
}
 | 
						|
 | 
						|
// IsSkipLocalTwoFA returns if this source should skip local 2fa for password authentication
 | 
						|
func (source *Source) IsSkipLocalTwoFA() bool {
 | 
						|
	return source.SkipLocalTwoFA
 | 
						|
}
 |