mirror of
https://github.com/go-gitea/gitea
synced 2024-10-31 16:53:25 +01:00
f6145a69c4
Unfortunately #18789 disabled autoregistration using email addresses as they would be shortcut to email address does not exist. This PR attempts to restore autoregistration by allowing an unknown email address to percolate through to the autoregistration path of UserSignin. Fix #19256 Signed-off-by: Andrew Thornton <art27@cantab.net>
126 lines
3.3 KiB
Go
126 lines
3.3 KiB
Go
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package auth
|
|
|
|
import (
|
|
"strings"
|
|
|
|
"code.gitea.io/gitea/models/auth"
|
|
"code.gitea.io/gitea/models/db"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/services/auth/source/oauth2"
|
|
"code.gitea.io/gitea/services/auth/source/smtp"
|
|
|
|
_ "code.gitea.io/gitea/services/auth/source/db" // register the sources (and below)
|
|
_ "code.gitea.io/gitea/services/auth/source/ldap" // register the ldap source
|
|
_ "code.gitea.io/gitea/services/auth/source/pam" // register the pam source
|
|
_ "code.gitea.io/gitea/services/auth/source/sspi" // register the sspi source
|
|
)
|
|
|
|
// UserSignIn validates user name and password.
|
|
func UserSignIn(username, password string) (*user_model.User, *auth.Source, error) {
|
|
var user *user_model.User
|
|
isEmail := false
|
|
if strings.Contains(username, "@") {
|
|
isEmail = true
|
|
emailAddress := user_model.EmailAddress{LowerEmail: strings.ToLower(strings.TrimSpace(username))}
|
|
// check same email
|
|
has, err := db.GetEngine(db.DefaultContext).Get(&emailAddress)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if has {
|
|
if !emailAddress.IsActivated {
|
|
return nil, nil, user_model.ErrEmailAddressNotExist{
|
|
Email: username,
|
|
}
|
|
}
|
|
user = &user_model.User{ID: emailAddress.UID}
|
|
}
|
|
} else {
|
|
trimmedUsername := strings.TrimSpace(username)
|
|
if len(trimmedUsername) == 0 {
|
|
return nil, nil, user_model.ErrUserNotExist{Name: username}
|
|
}
|
|
|
|
user = &user_model.User{LowerName: strings.ToLower(trimmedUsername)}
|
|
}
|
|
|
|
if user != nil {
|
|
hasUser, err := user_model.GetUser(user)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
if hasUser {
|
|
source, err := auth.GetSourceByID(user.LoginSource)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
if !source.IsActive {
|
|
return nil, nil, oauth2.ErrAuthSourceNotActived
|
|
}
|
|
|
|
authenticator, ok := source.Cfg.(PasswordAuthenticator)
|
|
if !ok {
|
|
return nil, nil, smtp.ErrUnsupportedLoginType
|
|
}
|
|
|
|
user, err := authenticator.Authenticate(user, user.LoginName, password)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
// WARN: DON'T check user.IsActive, that will be checked on reqSign so that
|
|
// user could be hint to resend confirm email.
|
|
if user.ProhibitLogin {
|
|
return nil, nil, user_model.ErrUserProhibitLogin{UID: user.ID, Name: user.Name}
|
|
}
|
|
|
|
return user, source, nil
|
|
}
|
|
}
|
|
|
|
sources, err := auth.AllActiveSources()
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
for _, source := range sources {
|
|
if !source.IsActive {
|
|
// don't try to authenticate non-active sources
|
|
continue
|
|
}
|
|
|
|
authenticator, ok := source.Cfg.(PasswordAuthenticator)
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
authUser, err := authenticator.Authenticate(nil, username, password)
|
|
|
|
if err == nil {
|
|
if !authUser.ProhibitLogin {
|
|
return authUser, source, nil
|
|
}
|
|
err = user_model.ErrUserProhibitLogin{UID: authUser.ID, Name: authUser.Name}
|
|
}
|
|
|
|
if user_model.IsErrUserNotExist(err) {
|
|
log.Debug("Failed to login '%s' via '%s': %v", username, source.Name, err)
|
|
} else {
|
|
log.Warn("Failed to login '%s' via '%s': %v", username, source.Name, err)
|
|
}
|
|
}
|
|
|
|
if isEmail {
|
|
return nil, nil, user_model.ErrEmailAddressNotExist{Email: username}
|
|
}
|
|
|
|
return nil, nil, user_model.ErrUserNotExist{Name: username}
|
|
}
|