mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2025-02-23 11:55:48 -05:00
chore: remove deadcode in models/user
- Remove `ErrUserInactive` introduced inf5fa22a499
and removed inef2a343e27
- Remove `GetUserEmailsByNames` introduced ina4cbe79567
and removed in08ae6bb7ed
- Remove `GetUserNamesByIDs` introduced in9ff4e1d2d9
and removed inb3a6596b54
This commit is contained in:
parent
fd285bfc4e
commit
801c392e0c
6 changed files with 0 additions and 81 deletions
|
@ -81,16 +81,12 @@ code.gitea.io/gitea/models/repo
|
||||||
WatchRepoMode
|
WatchRepoMode
|
||||||
|
|
||||||
code.gitea.io/gitea/models/user
|
code.gitea.io/gitea/models/user
|
||||||
ErrUserInactive.Error
|
|
||||||
ErrUserInactive.Unwrap
|
|
||||||
IsErrExternalLoginUserAlreadyExist
|
IsErrExternalLoginUserAlreadyExist
|
||||||
IsErrExternalLoginUserNotExist
|
IsErrExternalLoginUserNotExist
|
||||||
NewFederatedUser
|
NewFederatedUser
|
||||||
IsErrUserSettingIsNotExist
|
IsErrUserSettingIsNotExist
|
||||||
GetUserAllSettings
|
GetUserAllSettings
|
||||||
DeleteUserSetting
|
DeleteUserSetting
|
||||||
GetUserEmailsByNames
|
|
||||||
GetUserNamesByIDs
|
|
||||||
|
|
||||||
code.gitea.io/gitea/modules/activitypub
|
code.gitea.io/gitea/modules/activitypub
|
||||||
NewContext
|
NewContext
|
||||||
|
|
|
@ -71,27 +71,6 @@ func (err ErrUserProhibitLogin) Unwrap() error {
|
||||||
return util.ErrPermissionDenied
|
return util.ErrPermissionDenied
|
||||||
}
|
}
|
||||||
|
|
||||||
// ErrUserInactive represents a "ErrUserInactive" kind of error.
|
|
||||||
type ErrUserInactive struct {
|
|
||||||
UID int64
|
|
||||||
Name string
|
|
||||||
}
|
|
||||||
|
|
||||||
// IsErrUserInactive checks if an error is a ErrUserInactive
|
|
||||||
func IsErrUserInactive(err error) bool {
|
|
||||||
_, ok := err.(ErrUserInactive)
|
|
||||||
return ok
|
|
||||||
}
|
|
||||||
|
|
||||||
func (err ErrUserInactive) Error() string {
|
|
||||||
return fmt.Sprintf("user is inactive [uid: %d, name: %s]", err.UID, err.Name)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Unwrap unwraps this error as a ErrPermission error
|
|
||||||
func (err ErrUserInactive) Unwrap() error {
|
|
||||||
return util.ErrPermissionDenied
|
|
||||||
}
|
|
||||||
|
|
||||||
// ErrUserIsNotLocal represents a "ErrUserIsNotLocal" kind of error.
|
// ErrUserIsNotLocal represents a "ErrUserIsNotLocal" kind of error.
|
||||||
type ErrUserIsNotLocal struct {
|
type ErrUserIsNotLocal struct {
|
||||||
UID int64
|
UID int64
|
||||||
|
|
|
@ -1043,22 +1043,6 @@ func GetUserByName(ctx context.Context, name string) (*User, error) {
|
||||||
return u, nil
|
return u, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetUserEmailsByNames returns a list of e-mails corresponds to names of users
|
|
||||||
// that have their email notifications set to enabled or onmention.
|
|
||||||
func GetUserEmailsByNames(ctx context.Context, names []string) []string {
|
|
||||||
mails := make([]string, 0, len(names))
|
|
||||||
for _, name := range names {
|
|
||||||
u, err := GetUserByName(ctx, name)
|
|
||||||
if err != nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if u.IsMailable() && u.EmailNotificationsPreference != EmailNotificationsDisabled {
|
|
||||||
mails = append(mails, u.Email)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return mails
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetMaileableUsersByIDs gets users from ids, but only if they can receive mails
|
// GetMaileableUsersByIDs gets users from ids, but only if they can receive mails
|
||||||
func GetMaileableUsersByIDs(ctx context.Context, ids []int64, isMention bool) ([]*User, error) {
|
func GetMaileableUsersByIDs(ctx context.Context, ids []int64, isMention bool) ([]*User, error) {
|
||||||
if len(ids) == 0 {
|
if len(ids) == 0 {
|
||||||
|
@ -1085,17 +1069,6 @@ func GetMaileableUsersByIDs(ctx context.Context, ids []int64, isMention bool) ([
|
||||||
Find(&ous)
|
Find(&ous)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetUserNamesByIDs returns usernames for all resolved users from a list of Ids.
|
|
||||||
func GetUserNamesByIDs(ctx context.Context, ids []int64) ([]string, error) {
|
|
||||||
unames := make([]string, 0, len(ids))
|
|
||||||
err := db.GetEngine(ctx).In("id", ids).
|
|
||||||
Table("user").
|
|
||||||
Asc("name").
|
|
||||||
Cols("name").
|
|
||||||
Find(&unames)
|
|
||||||
return unames, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetUserNameByID returns username for the id
|
// GetUserNameByID returns username for the id
|
||||||
func GetUserNameByID(ctx context.Context, id int64) (string, error) {
|
func GetUserNameByID(ctx context.Context, id int64) (string, error) {
|
||||||
var name string
|
var name string
|
||||||
|
|
|
@ -102,16 +102,6 @@ func TestGetUserByName(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetUserEmailsByNames(t *testing.T) {
|
|
||||||
require.NoError(t, unittest.PrepareTestDatabase())
|
|
||||||
|
|
||||||
// ignore none active user email
|
|
||||||
assert.ElementsMatch(t, []string{"user8@example.com"}, user_model.GetUserEmailsByNames(db.DefaultContext, []string{"user8", "user9"}))
|
|
||||||
assert.ElementsMatch(t, []string{"user8@example.com", "user5@example.com"}, user_model.GetUserEmailsByNames(db.DefaultContext, []string{"user8", "user5"}))
|
|
||||||
|
|
||||||
assert.ElementsMatch(t, []string{"user8@example.com"}, user_model.GetUserEmailsByNames(db.DefaultContext, []string{"user8", "org7"}))
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestCanCreateOrganization(t *testing.T) {
|
func TestCanCreateOrganization(t *testing.T) {
|
||||||
require.NoError(t, unittest.PrepareTestDatabase())
|
require.NoError(t, unittest.PrepareTestDatabase())
|
||||||
|
|
||||||
|
|
|
@ -225,15 +225,6 @@ func SignInPost(ctx *context.Context) {
|
||||||
log.Warn("Failed authentication attempt for %s from %s: %v", form.UserName, ctx.RemoteAddr(), err)
|
log.Warn("Failed authentication attempt for %s from %s: %v", form.UserName, ctx.RemoteAddr(), err)
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
||||||
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
||||||
} else if user_model.IsErrUserInactive(err) {
|
|
||||||
if setting.Service.RegisterEmailConfirm {
|
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.active_your_account")
|
|
||||||
ctx.HTML(http.StatusOK, TplActivate)
|
|
||||||
} else {
|
|
||||||
log.Warn("Failed authentication attempt for %s from %s: %v", form.UserName, ctx.RemoteAddr(), err)
|
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
|
||||||
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
ctx.ServerError("UserSignIn", err)
|
ctx.ServerError("UserSignIn", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -99,16 +99,6 @@ func handleSignInError(ctx *context.Context, userName string, ptrForm any, tmpl
|
||||||
log.Info("Failed authentication attempt for %s from %s: %v", userName, ctx.RemoteAddr(), err)
|
log.Info("Failed authentication attempt for %s from %s: %v", userName, ctx.RemoteAddr(), err)
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
||||||
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
||||||
} else if user_model.IsErrUserInactive(err) {
|
|
||||||
ctx.Data["user_exists"] = true
|
|
||||||
if setting.Service.RegisterEmailConfirm {
|
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.active_your_account")
|
|
||||||
ctx.HTML(http.StatusOK, TplActivate)
|
|
||||||
} else {
|
|
||||||
log.Info("Failed authentication attempt for %s from %s: %v", userName, ctx.RemoteAddr(), err)
|
|
||||||
ctx.Data["Title"] = ctx.Tr("auth.prohibit_login")
|
|
||||||
ctx.HTML(http.StatusOK, "user/auth/prohibit_login")
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
ctx.ServerError(invoker, err)
|
ctx.ServerError(invoker, err)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue