mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 05:11:41 +01:00 
			
		
		
		
	- Move the file `compare.go` and `slice.go` to `slice.go`.
- Fix `ExistsInSlice`, it's buggy
  - It uses `sort.Search`, so it assumes that the input slice is sorted.
- It passes `func(i int) bool { return slice[i] == target })` to
`sort.Search`, that's incorrect, check the doc of `sort.Search`.
- Conbine `IsInt64InSlice(int64, []int64)` and `ExistsInSlice(string,
[]string)` to `SliceContains[T]([]T, T)`.
- Conbine `IsSliceInt64Eq([]int64, []int64)` and `IsEqualSlice([]string,
[]string)` to `SliceSortedEqual[T]([]T, T)`.
- Add `SliceEqual[T]([]T, T)` as a distinction from
`SliceSortedEqual[T]([]T, T)`.
- Redesign `RemoveIDFromList([]int64, int64) ([]int64, bool)` to
`SliceRemoveAll[T]([]T, T) []T`.
- Add `SliceContainsFunc[T]([]T, func(T) bool)` and
`SliceRemoveAllFunc[T]([]T, func(T) bool)` for general use.
- Add comments to explain why not `golang.org/x/exp/slices`.
- Add unit tests.
		
	
			
		
			
				
	
	
		
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package smtp
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"net/smtp"
 | |
| 	"net/textproto"
 | |
| 	"strings"
 | |
| 
 | |
| 	auth_model "code.gitea.io/gitea/models/auth"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	"code.gitea.io/gitea/services/mailer"
 | |
| )
 | |
| 
 | |
| // Authenticate queries if the provided login/password is authenticates against the SMTP server
 | |
| // Users will be autoregistered as required
 | |
| func (source *Source) Authenticate(user *user_model.User, userName, password string) (*user_model.User, error) {
 | |
| 	// Verify allowed domains.
 | |
| 	if len(source.AllowedDomains) > 0 {
 | |
| 		idx := strings.Index(userName, "@")
 | |
| 		if idx == -1 {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		} else if !util.SliceContainsString(strings.Split(source.AllowedDomains, ","), userName[idx+1:], true) {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var auth smtp.Auth
 | |
| 	switch source.Auth {
 | |
| 	case PlainAuthentication:
 | |
| 		auth = smtp.PlainAuth("", userName, password, source.Host)
 | |
| 	case LoginAuthentication:
 | |
| 		auth = &loginAuthenticator{userName, password}
 | |
| 	case CRAMMD5Authentication:
 | |
| 		auth = smtp.CRAMMD5Auth(userName, password)
 | |
| 	default:
 | |
| 		return nil, errors.New("unsupported SMTP auth type")
 | |
| 	}
 | |
| 
 | |
| 	if err := Authenticate(auth, source); err != nil {
 | |
| 		// Check standard error format first,
 | |
| 		// then fallback to worse case.
 | |
| 		tperr, ok := err.(*textproto.Error)
 | |
| 		if (ok && tperr.Code == 535) ||
 | |
| 			strings.Contains(err.Error(), "Username and Password not accepted") {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 		if (ok && tperr.Code == 534) ||
 | |
| 			strings.Contains(err.Error(), "Application-specific password required") {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if user != nil {
 | |
| 		return user, nil
 | |
| 	}
 | |
| 
 | |
| 	username := userName
 | |
| 	idx := strings.Index(userName, "@")
 | |
| 	if idx > -1 {
 | |
| 		username = userName[:idx]
 | |
| 	}
 | |
| 
 | |
| 	user = &user_model.User{
 | |
| 		LowerName:   strings.ToLower(username),
 | |
| 		Name:        strings.ToLower(username),
 | |
| 		Email:       userName,
 | |
| 		Passwd:      password,
 | |
| 		LoginType:   auth_model.SMTP,
 | |
| 		LoginSource: source.authSource.ID,
 | |
| 		LoginName:   userName,
 | |
| 	}
 | |
| 	overwriteDefault := &user_model.CreateUserOverwriteOptions{
 | |
| 		IsActive: util.OptionalBoolTrue,
 | |
| 	}
 | |
| 
 | |
| 	if err := user_model.CreateUser(user, overwriteDefault); err != nil {
 | |
| 		return user, err
 | |
| 	}
 | |
| 
 | |
| 	mailer.SendRegisterNotifyMail(user)
 | |
| 
 | |
| 	return user, nil
 | |
| }
 | |
| 
 | |
| // IsSkipLocalTwoFA returns if this source should skip local 2fa for password authentication
 | |
| func (source *Source) IsSkipLocalTwoFA() bool {
 | |
| 	return source.SkipLocalTwoFA
 | |
| }
 |