mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2026-05-13 22:40:24 +00:00
Update the Forgejo driver for gof3 with modifications for non-backward compatible changes. The changes are isolated behind the f3.Enable flag and not yet functional. The purpose of this upgrade is to not drift from the gof3 implementation while the work continues.
The `fix: include remote users when counting users` commit is a functional change to Forgejo itself but does not change the behavior because the remote users are only created in fixtures or by F3.
59c721d26b/models/user/user.go (L65-L66)
Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/10673
Reviewed-by: Gusted <gusted@noreply.codeberg.org>
Co-authored-by: limiting-factor <limiting-factor@posteo.com>
Co-committed-by: limiting-factor <limiting-factor@posteo.com>
149 lines
3.5 KiB
Go
149 lines
3.5 KiB
Go
// Copyright Earl Warren <contact@earl-warren.org>
|
|
// Copyright Loïc Dachary <loic@dachary.org>
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package driver
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
user_model "forgejo.org/models/user"
|
|
"forgejo.org/modules/optional"
|
|
user_service "forgejo.org/services/user"
|
|
|
|
"code.forgejo.org/f3/gof3/v3/f3"
|
|
f3_id "code.forgejo.org/f3/gof3/v3/id"
|
|
f3_tree "code.forgejo.org/f3/gof3/v3/tree/f3"
|
|
"code.forgejo.org/f3/gof3/v3/tree/generic"
|
|
f3_util "code.forgejo.org/f3/gof3/v3/util"
|
|
)
|
|
|
|
var _ f3_tree.ForgeDriverInterface = &user{}
|
|
|
|
type user struct {
|
|
common
|
|
|
|
forgejoUser *user_model.User
|
|
}
|
|
|
|
const fakeEmailSuffix = ".fakeemail"
|
|
|
|
func fromFakeEmail(mail string) string {
|
|
return strings.TrimSuffix(mail, fakeEmailSuffix)
|
|
}
|
|
|
|
func toFakeEmail(mail string) string {
|
|
if !strings.HasSuffix(mail, fakeEmailSuffix) {
|
|
return mail + fakeEmailSuffix
|
|
}
|
|
return mail
|
|
}
|
|
|
|
func getSystemUserByName(name string) *user_model.User {
|
|
switch name {
|
|
case user_model.GhostUserName:
|
|
return user_model.NewGhostUser()
|
|
case user_model.ActionsUserName:
|
|
return user_model.NewActionsUser()
|
|
default:
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (o *user) SetNative(user any) {
|
|
o.forgejoUser = user.(*user_model.User)
|
|
}
|
|
|
|
func (o *user) GetNativeID() string {
|
|
return fmt.Sprintf("%d", o.forgejoUser.ID)
|
|
}
|
|
|
|
func (o *user) NewFormat() f3.Interface {
|
|
node := o.GetNode()
|
|
return node.GetTree().(f3_tree.TreeInterface).NewFormat(node.GetKind())
|
|
}
|
|
|
|
func (o *user) ToFormat() f3.Interface {
|
|
if o.forgejoUser == nil {
|
|
return o.NewFormat()
|
|
}
|
|
return &f3.User{
|
|
Common: f3.NewCommon(fmt.Sprintf("%d", o.forgejoUser.ID)),
|
|
UserName: o.forgejoUser.Name,
|
|
Name: o.forgejoUser.FullName,
|
|
Email: o.forgejoUser.Email,
|
|
IsAdmin: o.forgejoUser.IsAdmin,
|
|
Password: o.forgejoUser.Passwd,
|
|
}
|
|
}
|
|
|
|
func (o *user) FromFormat(content f3.Interface) {
|
|
user := content.(*f3.User)
|
|
o.forgejoUser = &user_model.User{
|
|
Type: user_model.UserTypeRemoteUser,
|
|
ID: f3_util.ParseInt(user.GetID()),
|
|
Name: user.UserName,
|
|
FullName: user.Name,
|
|
Email: user.Email,
|
|
IsAdmin: user.IsAdmin,
|
|
Passwd: user.Password,
|
|
}
|
|
}
|
|
|
|
func (o *user) Get(ctx context.Context) bool {
|
|
node := o.GetNode()
|
|
o.Trace("%s", node.GetID())
|
|
id := node.GetID().Int64()
|
|
u, err := user_model.GetPossibleUserByID(ctx, id)
|
|
if user_model.IsErrUserNotExist(err) {
|
|
return false
|
|
}
|
|
if err != nil {
|
|
panic(fmt.Errorf("user %v %w", id, err))
|
|
}
|
|
u.Email = fromFakeEmail(u.Email)
|
|
o.forgejoUser = u
|
|
return true
|
|
}
|
|
|
|
func (o *user) Patch(context.Context) {
|
|
}
|
|
|
|
func (o *user) Put(ctx context.Context) f3_id.NodeID {
|
|
if user := getSystemUserByName(o.forgejoUser.Name); user != nil {
|
|
return f3_id.NewNodeID(user.ID)
|
|
}
|
|
|
|
o.forgejoUser.LowerName = strings.ToLower(o.forgejoUser.Name)
|
|
o.forgejoUser.Email = toFakeEmail(o.forgejoUser.Email)
|
|
o.Trace("%+v", *o.forgejoUser)
|
|
overwriteDefault := &user_model.CreateUserOverwriteOptions{
|
|
IsActive: optional.Some(true),
|
|
}
|
|
err := user_model.CreateUser(ctx, o.forgejoUser, overwriteDefault)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
return f3_id.NewNodeID(o.forgejoUser.ID)
|
|
}
|
|
|
|
func (o *user) Delete(ctx context.Context) {
|
|
node := o.GetNode()
|
|
o.Trace("%s", node.GetID())
|
|
|
|
if o.forgejoUser.ID == 1 && o.forgejoUser.IsAdmin {
|
|
o.Debug("silently ignore a request to delete the admin user with ID 1 because it is assumed to be required: %+v", o.forgejoUser.Type)
|
|
return
|
|
}
|
|
|
|
if err := user_service.DeleteUser(ctx, o.forgejoUser, true); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
func newUser() generic.NodeDriverInterface {
|
|
return &user{}
|
|
}
|