2014-07-26 06:24:27 +02:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2018-11-15 02:00:04 +01:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2014-07-26 06:24:27 +02:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
package forms
|
2014-07-26 06:24:27 +02:00
|
|
|
|
|
|
|
import (
|
2014-11-21 16:58:08 +01:00
|
|
|
"mime/multipart"
|
2021-01-26 16:36:53 +01:00
|
|
|
"net/http"
|
2018-11-15 02:00:04 +01:00
|
|
|
"strings"
|
|
|
|
|
2023-01-17 22:46:03 +01:00
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
2024-03-11 07:07:36 +01:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-06-26 21:53:14 +02:00
|
|
|
"code.gitea.io/gitea/modules/structs"
|
2021-01-30 09:55:53 +01:00
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2024-02-27 08:12:22 +01:00
|
|
|
"code.gitea.io/gitea/services/context"
|
2014-11-21 16:58:08 +01:00
|
|
|
|
2021-01-26 16:36:53 +01:00
|
|
|
"gitea.com/go-chi/binding"
|
2014-07-26 06:24:27 +02:00
|
|
|
)
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// InstallForm form for installation page
|
2014-07-26 06:24:27 +02:00
|
|
|
type InstallForm struct {
|
2015-07-09 07:17:48 +02:00
|
|
|
DbType string `binding:"Required"`
|
|
|
|
DbHost string
|
|
|
|
DbUser string
|
|
|
|
DbPasswd string
|
|
|
|
DbName string
|
2015-07-20 06:34:53 +02:00
|
|
|
SSLMode string
|
2015-07-09 07:17:48 +02:00
|
|
|
DbPath string
|
2020-01-20 16:45:14 +01:00
|
|
|
DbSchema string
|
2015-07-09 07:17:48 +02:00
|
|
|
|
|
|
|
AppName string `binding:"Required" locale:"install.app_name"`
|
|
|
|
RepoRootPath string `binding:"Required"`
|
2016-12-26 02:16:37 +01:00
|
|
|
LFSRootPath string
|
2015-07-09 07:17:48 +02:00
|
|
|
RunUser string `binding:"Required"`
|
|
|
|
Domain string `binding:"Required"`
|
2015-08-19 14:36:19 +02:00
|
|
|
SSHPort int
|
2015-07-20 06:34:53 +02:00
|
|
|
HTTPPort string `binding:"Required"`
|
2016-11-27 07:03:59 +01:00
|
|
|
AppURL string `binding:"Required"`
|
2016-02-12 16:10:02 +01:00
|
|
|
LogRootPath string `binding:"Required"`
|
2015-07-09 07:17:48 +02:00
|
|
|
|
Rework mailer settings (#18982)
* `PROTOCOL`: can be smtp, smtps, smtp+startls, smtp+unix, sendmail, dummy
* `SMTP_ADDR`: domain for SMTP, or path to unix socket
* `SMTP_PORT`: port for SMTP; defaults to 25 for `smtp`, 465 for `smtps`, and 587 for `smtp+startls`
* `ENABLE_HELO`, `HELO_HOSTNAME`: reverse `DISABLE_HELO` to `ENABLE_HELO`; default to false + system hostname
* `FORCE_TRUST_SERVER_CERT`: replace the unclear `SKIP_VERIFY`
* `CLIENT_CERT_FILE`, `CLIENT_KEY_FILE`, `USE_CLIENT_CERT`: clarify client certificates here
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2022-08-02 07:24:18 +02:00
|
|
|
SMTPAddr string
|
|
|
|
SMTPPort string
|
2015-07-20 06:34:53 +02:00
|
|
|
SMTPFrom string
|
2017-02-24 02:37:13 +01:00
|
|
|
SMTPUser string `binding:"OmitEmpty;MaxSize(254)" locale:"install.mailer_user"`
|
2015-07-20 06:34:53 +02:00
|
|
|
SMTPPasswd string
|
2015-07-09 07:17:48 +02:00
|
|
|
RegisterConfirm bool
|
|
|
|
MailNotify bool
|
|
|
|
|
2017-05-12 10:09:53 +02:00
|
|
|
OfflineMode bool
|
|
|
|
DisableGravatar bool
|
|
|
|
EnableFederatedAvatar bool
|
2017-08-19 17:34:49 +02:00
|
|
|
EnableOpenIDSignIn bool
|
|
|
|
EnableOpenIDSignUp bool
|
2017-05-12 10:09:53 +02:00
|
|
|
DisableRegistration bool
|
2018-05-13 09:51:16 +02:00
|
|
|
AllowOnlyExternalRegistration bool
|
2017-05-12 10:09:53 +02:00
|
|
|
EnableCaptcha bool
|
|
|
|
RequireSignInView bool
|
|
|
|
DefaultKeepEmailPrivate bool
|
2017-05-08 21:51:53 +02:00
|
|
|
DefaultAllowCreateOrganization bool
|
2017-09-12 08:48:13 +02:00
|
|
|
DefaultEnableTimetracking bool
|
2022-11-01 20:23:56 +01:00
|
|
|
EnableUpdateChecker bool
|
2017-05-12 10:09:53 +02:00
|
|
|
NoReplyAddress string
|
2015-07-09 07:17:48 +02:00
|
|
|
|
2021-02-16 23:37:20 +01:00
|
|
|
PasswordAlgorithm string
|
|
|
|
|
2022-11-04 10:04:08 +01:00
|
|
|
AdminName string `binding:"OmitEmpty;Username;MaxSize(30)" locale:"install.admin_name"`
|
2015-08-17 20:30:33 +02:00
|
|
|
AdminPasswd string `binding:"OmitEmpty;MaxSize(255)" locale:"install.admin_password"`
|
2015-07-08 13:47:56 +02:00
|
|
|
AdminConfirmPasswd string
|
2015-10-30 02:12:41 +01:00
|
|
|
AdminEmail string `binding:"OmitEmpty;MinSize(3);MaxSize(254);Include(@)" locale:"install.admin_email"`
|
2021-12-01 08:50:01 +01:00
|
|
|
|
|
|
|
// ReinstallConfirmFirst we can not use 1/2/3 or A/B/C here, there is a framework bug, can not parse "reinstall_confirm_1" or "reinstall_confirm_a"
|
|
|
|
ReinstallConfirmFirst bool
|
|
|
|
ReinstallConfirmSecond bool
|
|
|
|
ReinstallConfirmThird bool
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *InstallForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// _____ ____ _________________ ___
|
|
|
|
// / _ \ | | \__ ___/ | \
|
|
|
|
// / /_\ \| | / | | / ~ \
|
|
|
|
// / | \ | / | | \ Y /
|
|
|
|
// \____|__ /______/ |____| \___|_ /
|
|
|
|
// \/ \/
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// RegisterForm form for registering
|
2014-07-26 06:24:27 +02:00
|
|
|
type RegisterForm struct {
|
2022-11-22 22:13:18 +01:00
|
|
|
UserName string `binding:"Required;Username;MaxSize(40)"`
|
|
|
|
Email string `binding:"Required;MaxSize(254)"`
|
|
|
|
Password string `binding:"MaxSize(255)"`
|
|
|
|
Retype string
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *RegisterForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2021-02-15 00:31:29 +01:00
|
|
|
// IsEmailDomainAllowed validates that the email address
|
|
|
|
// provided by the user matches what has been configured .
|
|
|
|
// The email is marked as allowed if it matches any of the
|
|
|
|
// domains in the whitelist or if it doesn't match any of
|
|
|
|
// domains in the blocklist, if any such list is not empty.
|
2023-05-22 02:05:44 +02:00
|
|
|
func (f *RegisterForm) IsEmailDomainAllowed() bool {
|
2024-03-11 07:07:36 +01:00
|
|
|
return user_model.IsEmailDomainAllowed(f.Email)
|
2021-02-15 00:31:29 +01:00
|
|
|
}
|
|
|
|
|
2018-09-13 14:04:25 +02:00
|
|
|
// MustChangePasswordForm form for updating your password after account creation
|
|
|
|
// by an admin
|
|
|
|
type MustChangePasswordForm struct {
|
|
|
|
Password string `binding:"Required;MaxSize(255)"`
|
|
|
|
Retype string
|
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *MustChangePasswordForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2018-09-13 14:04:25 +02:00
|
|
|
}
|
|
|
|
|
2017-03-17 15:16:08 +01:00
|
|
|
// SignInForm form for signing in with user/password
|
2014-07-26 06:24:27 +02:00
|
|
|
type SignInForm struct {
|
2015-09-15 04:50:44 +02:00
|
|
|
UserName string `binding:"Required;MaxSize(254)"`
|
2019-07-06 21:48:02 +02:00
|
|
|
// TODO remove required from password for SecondFactorAuthentication
|
2015-09-15 04:50:44 +02:00
|
|
|
Password string `binding:"Required;MaxSize(255)"`
|
|
|
|
Remember bool
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *SignInForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2019-03-08 17:42:50 +01:00
|
|
|
// AuthorizationForm form for authorizing oauth2 clients
|
|
|
|
type AuthorizationForm struct {
|
|
|
|
ResponseType string `binding:"Required;In(code)"`
|
|
|
|
ClientID string `binding:"Required"`
|
|
|
|
RedirectURI string
|
|
|
|
State string
|
2021-01-01 17:33:27 +01:00
|
|
|
Scope string
|
|
|
|
Nonce string
|
2019-03-08 17:42:50 +01:00
|
|
|
|
|
|
|
// PKCE support
|
|
|
|
CodeChallengeMethod string // S256, plain
|
|
|
|
CodeChallenge string
|
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AuthorizationForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// GrantApplicationForm form for authorizing oauth2 clients
|
|
|
|
type GrantApplicationForm struct {
|
|
|
|
ClientID string `binding:"Required"`
|
2024-05-20 09:17:00 +02:00
|
|
|
Granted bool
|
2019-03-08 17:42:50 +01:00
|
|
|
RedirectURI string
|
|
|
|
State string
|
2021-01-01 17:33:27 +01:00
|
|
|
Scope string
|
|
|
|
Nonce string
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *GrantApplicationForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// AccessTokenForm for issuing access tokens from authorization codes or refresh tokens
|
|
|
|
type AccessTokenForm struct {
|
2019-04-15 17:54:50 +02:00
|
|
|
GrantType string `json:"grant_type"`
|
|
|
|
ClientID string `json:"client_id"`
|
|
|
|
ClientSecret string `json:"client_secret"`
|
|
|
|
RedirectURI string `json:"redirect_uri"`
|
|
|
|
Code string `json:"code"`
|
|
|
|
RefreshToken string `json:"refresh_token"`
|
2019-03-08 17:42:50 +01:00
|
|
|
|
|
|
|
// PKCE support
|
2019-04-15 17:54:50 +02:00
|
|
|
CodeVerifier string `json:"code_verifier"`
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AccessTokenForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
2021-08-21 04:16:45 +02:00
|
|
|
// IntrospectTokenForm for introspecting tokens
|
|
|
|
type IntrospectTokenForm struct {
|
|
|
|
Token string `json:"token"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the fields
|
|
|
|
func (f *IntrospectTokenForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-08-21 04:16:45 +02:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|
|
|
|
|
2014-07-26 06:24:27 +02:00
|
|
|
// __________________________________________.___ _______ ________ _________
|
|
|
|
// / _____/\_ _____/\__ ___/\__ ___/| |\ \ / _____/ / _____/
|
|
|
|
// \_____ \ | __)_ | | | | | |/ | \/ \ ___ \_____ \
|
|
|
|
// / \ | \ | | | | | / | \ \_\ \/ \
|
|
|
|
// /_______ //_______ / |____| |____| |___\____|__ /\______ /_______ /
|
|
|
|
// \/ \/ \/ \/ \/
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// UpdateProfileForm form for updating profile
|
2014-07-26 06:24:27 +02:00
|
|
|
type UpdateProfileForm struct {
|
2022-11-04 10:04:08 +01:00
|
|
|
Name string `binding:"Username;MaxSize(40)"`
|
2020-06-05 22:01:53 +02:00
|
|
|
FullName string `binding:"MaxSize(100)"`
|
|
|
|
KeepEmailPrivate bool
|
2021-06-26 00:38:27 +02:00
|
|
|
Website string `binding:"ValidSiteUrl;MaxSize(255)"`
|
2020-06-05 22:01:53 +02:00
|
|
|
Location string `binding:"MaxSize(50)"`
|
|
|
|
Description string `binding:"MaxSize(255)"`
|
2021-06-26 21:53:14 +02:00
|
|
|
Visibility structs.VisibleType
|
2020-06-05 22:01:53 +02:00
|
|
|
KeepActivityPrivate bool
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *UpdateProfileForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-10-27 17:40:08 +02:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateLanguageForm form for updating profile
|
|
|
|
type UpdateLanguageForm struct {
|
|
|
|
Language string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the fields
|
|
|
|
func (f *UpdateLanguageForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// Avatar types
|
2016-08-07 19:27:38 +02:00
|
|
|
const (
|
2016-11-07 17:55:31 +01:00
|
|
|
AvatarLocal string = "local"
|
|
|
|
AvatarByMail string = "bymail"
|
2016-08-07 19:27:38 +02:00
|
|
|
)
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// AvatarForm form for changing avatar
|
2016-08-07 19:27:38 +02:00
|
|
|
type AvatarForm struct {
|
|
|
|
Source string
|
|
|
|
Avatar *multipart.FileHeader
|
|
|
|
Gravatar string `binding:"OmitEmpty;Email;MaxSize(254)"`
|
|
|
|
Federavatar bool
|
2014-11-21 16:58:08 +01:00
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AvatarForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-11-21 16:58:08 +01:00
|
|
|
}
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// AddEmailForm form for adding new email
|
2014-12-17 16:42:54 +01:00
|
|
|
type AddEmailForm struct {
|
2015-09-10 17:40:34 +02:00
|
|
|
Email string `binding:"Required;Email;MaxSize(254)"`
|
2014-12-17 16:42:54 +01:00
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AddEmailForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-12-17 16:42:54 +01:00
|
|
|
}
|
|
|
|
|
2019-01-09 18:22:57 +01:00
|
|
|
// UpdateThemeForm form for updating a users' theme
|
|
|
|
type UpdateThemeForm struct {
|
2024-04-23 18:18:41 +02:00
|
|
|
Theme string `binding:"Required;MaxSize(255)"`
|
2019-01-09 18:22:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the field
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *UpdateThemeForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2019-01-09 18:22:57 +01:00
|
|
|
}
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// ChangePasswordForm form for changing password
|
2014-07-26 06:24:27 +02:00
|
|
|
type ChangePasswordForm struct {
|
2017-02-22 08:14:37 +01:00
|
|
|
OldPassword string `form:"old_password" binding:"MaxSize(255)"`
|
2015-08-17 20:30:33 +02:00
|
|
|
Password string `form:"password" binding:"Required;MaxSize(255)"`
|
2014-07-26 06:24:27 +02:00
|
|
|
Retype string `form:"retype"`
|
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *ChangePasswordForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-07-26 06:24:27 +02:00
|
|
|
}
|
2014-11-12 12:48:50 +01:00
|
|
|
|
2017-03-17 15:16:08 +01:00
|
|
|
// AddOpenIDForm is for changing openid uri
|
|
|
|
type AddOpenIDForm struct {
|
2017-03-21 01:55:00 +01:00
|
|
|
Openid string `binding:"Required;MaxSize(256)"`
|
2017-03-17 15:16:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AddOpenIDForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2017-03-17 15:16:08 +01:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:10:43 +02:00
|
|
|
// AddKeyForm form for adding SSH/GPG key
|
|
|
|
type AddKeyForm struct {
|
2021-12-19 06:37:18 +01:00
|
|
|
Type string `binding:"OmitEmpty"`
|
|
|
|
Title string `binding:"Required;MaxSize(50)"`
|
|
|
|
Content string `binding:"Required"`
|
|
|
|
Signature string `binding:"OmitEmpty"`
|
|
|
|
KeyID string `binding:"OmitEmpty"`
|
|
|
|
Fingerprint string `binding:"OmitEmpty"`
|
|
|
|
IsWritable bool
|
2014-11-12 12:48:50 +01:00
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *AddKeyForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-11-12 12:48:50 +01:00
|
|
|
}
|
|
|
|
|
2022-12-20 10:07:13 +01:00
|
|
|
// AddSecretForm for adding secrets
|
|
|
|
type AddSecretForm struct {
|
2023-06-21 00:54:15 +02:00
|
|
|
Name string `binding:"Required;MaxSize(255)"`
|
|
|
|
Data string `binding:"Required;MaxSize(65535)"`
|
2022-12-20 10:07:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the fields
|
|
|
|
func (f *AddSecretForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-06-21 00:54:15 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|
|
|
|
|
|
|
|
type EditVariableForm struct {
|
|
|
|
Name string `binding:"Required;MaxSize(255)"`
|
|
|
|
Data string `binding:"Required;MaxSize(65535)"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f *EditVariableForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2022-12-20 10:07:13 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|
|
|
|
|
2016-11-27 07:03:59 +01:00
|
|
|
// NewAccessTokenForm form for creating access token
|
2014-11-12 12:48:50 +01:00
|
|
|
type NewAccessTokenForm struct {
|
2023-11-29 04:47:05 +01:00
|
|
|
Name string `binding:"Required;MaxSize(255)" locale:"settings.token_name"`
|
2023-01-17 22:46:03 +01:00
|
|
|
Scope []string
|
2014-11-12 12:48:50 +01:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *NewAccessTokenForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2014-11-12 12:48:50 +01:00
|
|
|
}
|
2017-01-16 03:14:29 +01:00
|
|
|
|
2023-01-17 22:46:03 +01:00
|
|
|
func (f *NewAccessTokenForm) GetScope() (auth_model.AccessTokenScope, error) {
|
|
|
|
scope := strings.Join(f.Scope, ",")
|
|
|
|
s, err := auth_model.AccessTokenScope(scope).Normalize()
|
|
|
|
return s, err
|
|
|
|
}
|
|
|
|
|
2019-03-08 17:42:50 +01:00
|
|
|
// EditOAuth2ApplicationForm form for editing oauth2 applications
|
|
|
|
type EditOAuth2ApplicationForm struct {
|
2022-10-24 09:59:24 +02:00
|
|
|
Name string `binding:"Required;MaxSize(255)" form:"application_name"`
|
2023-06-05 09:00:12 +02:00
|
|
|
RedirectURIs string `binding:"Required" form:"redirect_uris"`
|
2022-10-24 09:59:24 +02:00
|
|
|
ConfidentialClient bool `form:"confidential_client"`
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *EditOAuth2ApplicationForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2019-03-08 17:42:50 +01:00
|
|
|
}
|
|
|
|
|
2017-01-16 03:14:29 +01:00
|
|
|
// TwoFactorAuthForm for logging in with 2FA token.
|
|
|
|
type TwoFactorAuthForm struct {
|
|
|
|
Passcode string `binding:"Required"`
|
|
|
|
}
|
|
|
|
|
2017-03-15 01:52:01 +01:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *TwoFactorAuthForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2017-01-16 03:14:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// TwoFactorScratchAuthForm for logging in with 2FA scratch token.
|
|
|
|
type TwoFactorScratchAuthForm struct {
|
|
|
|
Token string `binding:"Required"`
|
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2021-01-26 16:36:53 +01:00
|
|
|
func (f *TwoFactorScratchAuthForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2017-01-16 03:14:29 +01:00
|
|
|
}
|
2018-05-19 16:12:37 +02:00
|
|
|
|
2022-01-14 16:03:31 +01:00
|
|
|
// WebauthnRegistrationForm for reserving an WebAuthn name
|
|
|
|
type WebauthnRegistrationForm struct {
|
2018-05-19 16:12:37 +02:00
|
|
|
Name string `binding:"Required"`
|
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2022-01-14 16:03:31 +01:00
|
|
|
func (f *WebauthnRegistrationForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2018-05-19 16:12:37 +02:00
|
|
|
}
|
|
|
|
|
2022-01-14 16:03:31 +01:00
|
|
|
// WebauthnDeleteForm for deleting WebAuthn keys
|
|
|
|
type WebauthnDeleteForm struct {
|
2018-05-19 16:12:37 +02:00
|
|
|
ID int64 `binding:"Required"`
|
|
|
|
}
|
|
|
|
|
2020-06-05 16:34:23 +02:00
|
|
|
// Validate validates the fields
|
2022-01-14 16:03:31 +01:00
|
|
|
func (f *WebauthnDeleteForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2021-01-30 09:55:53 +01:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
2018-05-19 16:12:37 +02:00
|
|
|
}
|
2022-03-30 10:42:47 +02:00
|
|
|
|
|
|
|
// PackageSettingForm form for package settings
|
|
|
|
type PackageSettingForm struct {
|
|
|
|
Action string
|
|
|
|
RepoID int64 `form:"repo_id"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the fields
|
|
|
|
func (f *PackageSettingForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
2023-05-21 03:50:53 +02:00
|
|
|
ctx := context.GetValidateContext(req)
|
2022-03-30 10:42:47 +02:00
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|
2024-03-04 09:16:03 +01:00
|
|
|
|
|
|
|
type BlockUserForm struct {
|
|
|
|
Action string `binding:"Required;In(block,unblock,note)"`
|
|
|
|
Blockee string `binding:"Required"`
|
|
|
|
Note string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f *BlockUserForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {
|
|
|
|
ctx := context.GetValidateContext(req)
|
|
|
|
return middleware.Validate(errs, ctx.Data, f, ctx.Locale)
|
|
|
|
}
|