mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-27 00:23:41 +09:00 
			
		
		
		
	
		
			
				
	
	
		
			242 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			242 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2023 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	auth_model "code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	pwd "code.gitea.io/gitea/modules/auth/password"
 | |
| 	"code.gitea.io/gitea/modules/optional"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 
 | |
| 	"github.com/urfave/cli/v3"
 | |
| )
 | |
| 
 | |
| func microcmdUserCreate() *cli.Command {
 | |
| 	return &cli.Command{
 | |
| 		Name:   "create",
 | |
| 		Usage:  "Create a new user in database",
 | |
| 		Action: runCreateUser,
 | |
| 		MutuallyExclusiveFlags: []cli.MutuallyExclusiveFlags{
 | |
| 			{
 | |
| 				Flags: [][]cli.Flag{
 | |
| 					{
 | |
| 						&cli.StringFlag{
 | |
| 							Name:  "name",
 | |
| 							Usage: "Username. DEPRECATED: use username instead",
 | |
| 						},
 | |
| 						&cli.StringFlag{
 | |
| 							Name:  "username",
 | |
| 							Usage: "Username",
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 				Required: true,
 | |
| 			},
 | |
| 		},
 | |
| 		Flags: []cli.Flag{
 | |
| 			&cli.StringFlag{
 | |
| 				Name:  "user-type",
 | |
| 				Usage: "Set user's type: individual or bot",
 | |
| 				Value: "individual",
 | |
| 			},
 | |
| 			&cli.StringFlag{
 | |
| 				Name:  "password",
 | |
| 				Usage: "User password",
 | |
| 			},
 | |
| 			&cli.StringFlag{
 | |
| 				Name:     "email",
 | |
| 				Usage:    "User email address",
 | |
| 				Required: true,
 | |
| 			},
 | |
| 			&cli.BoolFlag{
 | |
| 				Name:  "admin",
 | |
| 				Usage: "User is an admin",
 | |
| 			},
 | |
| 			&cli.BoolFlag{
 | |
| 				Name:  "random-password",
 | |
| 				Usage: "Generate a random password for the user",
 | |
| 			},
 | |
| 			&cli.BoolFlag{
 | |
| 				Name:        "must-change-password",
 | |
| 				Usage:       "User must change password after initial login, defaults to true for all users except the first one (can be disabled by --must-change-password=false)",
 | |
| 				HideDefault: true,
 | |
| 			},
 | |
| 			&cli.IntFlag{
 | |
| 				Name:  "random-password-length",
 | |
| 				Usage: "Length of the random password to be generated",
 | |
| 				Value: 12,
 | |
| 			},
 | |
| 			&cli.BoolFlag{
 | |
| 				Name:  "access-token",
 | |
| 				Usage: "Generate access token for the user",
 | |
| 			},
 | |
| 			&cli.StringFlag{
 | |
| 				Name:  "access-token-name",
 | |
| 				Usage: `Name of the generated access token`,
 | |
| 				Value: "gitea-admin",
 | |
| 			},
 | |
| 			&cli.StringFlag{
 | |
| 				Name:  "access-token-scopes",
 | |
| 				Usage: `Scopes of the generated access token, comma separated. Examples: "all", "public-only,read:issue", "write:repository,write:user"`,
 | |
| 				Value: "all",
 | |
| 			},
 | |
| 			&cli.BoolFlag{
 | |
| 				Name:  "restricted",
 | |
| 				Usage: "Make a restricted user account",
 | |
| 			},
 | |
| 			&cli.StringFlag{
 | |
| 				Name:  "fullname",
 | |
| 				Usage: `The full, human-readable name of the user`,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func runCreateUser(ctx context.Context, c *cli.Command) error {
 | |
| 	// this command highly depends on the many setting options (create org, visibility, etc.), so it must have a full setting load first
 | |
| 	// duplicate setting loading should be safe at the moment, but it should be refactored & improved in the future.
 | |
| 	setting.LoadSettings()
 | |
| 
 | |
| 	userTypes := map[string]user_model.UserType{
 | |
| 		"individual": user_model.UserTypeIndividual,
 | |
| 		"bot":        user_model.UserTypeBot,
 | |
| 	}
 | |
| 	userType, ok := userTypes[c.String("user-type")]
 | |
| 	if !ok {
 | |
| 		return fmt.Errorf("invalid user type: %s", c.String("user-type"))
 | |
| 	}
 | |
| 	if userType != user_model.UserTypeIndividual {
 | |
| 		// Some other commands like "change-password" also only support individual users.
 | |
| 		// It needs to clarify the "password" behavior for bot users in the future.
 | |
| 		// At the moment, we do not allow setting password for bot users.
 | |
| 		if c.IsSet("password") || c.IsSet("random-password") {
 | |
| 			return errors.New("password can only be set for individual users")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if c.IsSet("password") && c.IsSet("random-password") {
 | |
| 		return errors.New("cannot set both -random-password and -password flags")
 | |
| 	}
 | |
| 
 | |
| 	var username string
 | |
| 	if c.IsSet("username") {
 | |
| 		username = c.String("username")
 | |
| 	} else {
 | |
| 		username = c.String("name")
 | |
| 		_, _ = fmt.Fprintf(c.ErrWriter, "--name flag is deprecated. Use --username instead.\n")
 | |
| 	}
 | |
| 
 | |
| 	if !setting.IsInTesting {
 | |
| 		// FIXME: need to refactor the "initDB" related code later
 | |
| 		// it doesn't make sense to call it in (almost) every command action function
 | |
| 		if err := initDB(ctx); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var password string
 | |
| 	if c.IsSet("password") {
 | |
| 		password = c.String("password")
 | |
| 	} else if c.IsSet("random-password") {
 | |
| 		var err error
 | |
| 		password, err = pwd.Generate(c.Int("random-password-length"))
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		// codeql[disable-next-line=go/clear-text-logging]
 | |
| 		fmt.Printf("generated random password is '%s'\n", password)
 | |
| 	} else if userType == user_model.UserTypeIndividual {
 | |
| 		return errors.New("must set either password or random-password flag")
 | |
| 	}
 | |
| 
 | |
| 	isAdmin := c.Bool("admin")
 | |
| 	mustChangePassword := true // always default to true
 | |
| 	if c.IsSet("must-change-password") {
 | |
| 		if userType != user_model.UserTypeIndividual {
 | |
| 			return errors.New("must-change-password flag can only be set for individual users")
 | |
| 		}
 | |
| 		// if the flag is set, use the value provided by the user
 | |
| 		mustChangePassword = c.Bool("must-change-password")
 | |
| 	} else if userType == user_model.UserTypeIndividual {
 | |
| 		// check whether there are users in the database
 | |
| 		hasUserRecord, err := db.IsTableNotEmpty(&user_model.User{})
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("IsTableNotEmpty: %w", err)
 | |
| 		}
 | |
| 		if !hasUserRecord {
 | |
| 			// if this is the first one being created, don't force to change password (keep the old behavior)
 | |
| 			mustChangePassword = false
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	restricted := optional.None[bool]()
 | |
| 
 | |
| 	if c.IsSet("restricted") {
 | |
| 		restricted = optional.Some(c.Bool("restricted"))
 | |
| 	}
 | |
| 
 | |
| 	// default user visibility in app.ini
 | |
| 	visibility := setting.Service.DefaultUserVisibilityMode
 | |
| 
 | |
| 	u := &user_model.User{
 | |
| 		Name:               username,
 | |
| 		Email:              c.String("email"),
 | |
| 		IsAdmin:            isAdmin,
 | |
| 		Type:               userType,
 | |
| 		Passwd:             password,
 | |
| 		MustChangePassword: mustChangePassword,
 | |
| 		Visibility:         visibility,
 | |
| 		FullName:           c.String("fullname"),
 | |
| 	}
 | |
| 
 | |
| 	overwriteDefault := &user_model.CreateUserOverwriteOptions{
 | |
| 		IsActive:     optional.Some(true),
 | |
| 		IsRestricted: restricted,
 | |
| 	}
 | |
| 
 | |
| 	var accessTokenName string
 | |
| 	var accessTokenScope auth_model.AccessTokenScope
 | |
| 	if c.IsSet("access-token") {
 | |
| 		accessTokenName = strings.TrimSpace(c.String("access-token-name"))
 | |
| 		if accessTokenName == "" {
 | |
| 			return errors.New("access-token-name cannot be empty")
 | |
| 		}
 | |
| 		var err error
 | |
| 		accessTokenScope, err = auth_model.AccessTokenScope(c.String("access-token-scopes")).Normalize()
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("invalid access token scope provided: %w", err)
 | |
| 		}
 | |
| 		if !accessTokenScope.HasPermissionScope() {
 | |
| 			return errors.New("access token does not have any permission")
 | |
| 		}
 | |
| 	} else if c.IsSet("access-token-name") || c.IsSet("access-token-scopes") {
 | |
| 		return errors.New("access-token-name and access-token-scopes flags are only valid when access-token flag is set")
 | |
| 	}
 | |
| 
 | |
| 	// arguments should be prepared before creating the user & access token, in case there is anything wrong
 | |
| 
 | |
| 	// create the user
 | |
| 	if err := user_model.CreateUser(ctx, u, &user_model.Meta{}, overwriteDefault); err != nil {
 | |
| 		return fmt.Errorf("CreateUser: %w", err)
 | |
| 	}
 | |
| 	fmt.Printf("New user '%s' has been successfully created!\n", username)
 | |
| 
 | |
| 	// create the access token
 | |
| 	if accessTokenScope != "" {
 | |
| 		t := &auth_model.AccessToken{Name: accessTokenName, UID: u.ID, Scope: accessTokenScope}
 | |
| 		if err := auth_model.NewAccessToken(ctx, t); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		fmt.Printf("Access token was successfully created... %s\n", t.Token)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |