photoprism/internal/entity/auth_user.go
Michael Mayer cc38922cbe Auth: Add dummy LDAP service #98
Signed-off-by: Michael Mayer <michael@photoprism.app>
2022-11-22 22:14:34 +01:00

889 lines
24 KiB
Go

package entity
import (
"errors"
"fmt"
"net/mail"
"path"
"strings"
"time"
"github.com/jinzhu/gorm"
"github.com/ulule/deepcopier"
"github.com/photoprism/photoprism/internal/acl"
"github.com/photoprism/photoprism/internal/event"
"github.com/photoprism/photoprism/internal/form"
"github.com/photoprism/photoprism/pkg/clean"
"github.com/photoprism/photoprism/pkg/rnd"
"github.com/photoprism/photoprism/pkg/txt"
)
// User identifier prefixes.
const (
UserUID = byte('u')
UserPrefix = "user"
OwnerUnknown = ""
)
// UsernameLength specifies the minimum length of the username in characters.
var UsernameLength = 1
// PasswordLength specifies the minimum length of the password in characters.
var PasswordLength = 4
// Users represents a list of users.
type Users []User
// User represents a person that may optionally log in as user.
type User struct {
ID int `gorm:"primary_key" json:"-" yaml:"-"`
UUID string `gorm:"type:VARBINARY(64);column:user_uuid;index;" json:"UUID,omitempty" yaml:"UUID,omitempty"`
UserUID string `gorm:"type:VARBINARY(42);column:user_uid;unique_index;" json:"UID" yaml:"UID"`
AuthProvider string `gorm:"type:VARBINARY(128);default:'';" json:"AuthProvider,omitempty" yaml:"AuthProvider,omitempty"`
AuthID string `gorm:"type:VARBINARY(128);index;default:'';" json:"AuthID,omitempty" yaml:"AuthID,omitempty"`
UserName string `gorm:"size:64;index;" json:"Name" yaml:"Name,omitempty"`
DisplayName string `gorm:"size:200;" json:"DisplayName" yaml:"DisplayName,omitempty"`
UserEmail string `gorm:"size:255;index;" json:"Email" yaml:"Email,omitempty"`
BackupEmail string `gorm:"size:255;" json:"BackupEmail,omitempty" yaml:"BackupEmail,omitempty"`
UserRole string `gorm:"size:64;default:'';" json:"Role,omitempty" yaml:"Role,omitempty"`
UserAttr string `gorm:"size:1024;" json:"Attr,omitempty" yaml:"Attr,omitempty"`
SuperAdmin bool `json:"SuperAdmin,omitempty" yaml:"SuperAdmin,omitempty"`
CanLogin bool `json:"CanLogin,omitempty" yaml:"CanLogin,omitempty"`
LoginAt *time.Time `json:"LoginAt,omitempty" yaml:"LoginAt,omitempty"`
ExpiresAt *time.Time `sql:"index" json:"ExpiresAt,omitempty" yaml:"ExpiresAt,omitempty"`
WebDAV bool `gorm:"column:webdav;" json:"WebDAV,omitempty" yaml:"WebDAV,omitempty"`
BasePath string `gorm:"type:VARBINARY(1024);" json:"BasePath,omitempty" yaml:"BasePath,omitempty"`
UploadPath string `gorm:"type:VARBINARY(1024);" json:"UploadPath,omitempty" yaml:"UploadPath,omitempty"`
CanInvite bool `json:"CanInvite,omitempty" yaml:"CanInvite,omitempty"`
InviteToken string `gorm:"type:VARBINARY(64);index;" json:"-" yaml:"-"`
InvitedBy string `gorm:"size:64;" json:"-" yaml:"-"`
VerifyToken string `gorm:"type:VARBINARY(64);" json:"-" yaml:"-"`
VerifiedAt *time.Time `json:"VerifiedAt,omitempty" yaml:"VerifiedAt,omitempty"`
ConsentAt *time.Time `json:"ConsentAt,omitempty" yaml:"ConsentAt,omitempty"`
BornAt *time.Time `sql:"index" json:"BornAt,omitempty" yaml:"BornAt,omitempty"`
UserDetails *UserDetails `gorm:"PRELOAD:true;foreignkey:UserUID;association_foreignkey:UserUID;" json:"Details,omitempty" yaml:"Details,omitempty"`
UserSettings *UserSettings `gorm:"PRELOAD:true;foreignkey:UserUID;association_foreignkey:UserUID;" json:"Settings,omitempty" yaml:"Settings,omitempty"`
UserShares UserShares `gorm:"-" json:"Shares,omitempty" yaml:"Shares,omitempty"`
ResetToken string `gorm:"type:VARBINARY(64);" json:"-" yaml:"-"`
PreviewToken string `gorm:"type:VARBINARY(64);column:preview_token;" json:"-" yaml:"-"`
DownloadToken string `gorm:"type:VARBINARY(64);column:download_token;" json:"-" yaml:"-"`
Thumb string `gorm:"type:VARBINARY(128);index;default:'';" json:"Thumb" yaml:"Thumb,omitempty"`
ThumbSrc string `gorm:"type:VARBINARY(8);default:'';" json:"ThumbSrc" yaml:"ThumbSrc,omitempty"`
RefID string `gorm:"type:VARBINARY(16);" json:"-" yaml:"-"`
CreatedAt time.Time `json:"CreatedAt" yaml:"-"`
UpdatedAt time.Time `json:"UpdatedAt" yaml:"-"`
DeletedAt *time.Time `sql:"index" json:"DeletedAt,omitempty" yaml:"-"`
}
// TableName returns the entity table name.
func (User) TableName() string {
return "auth_users"
}
// NewUser creates a new user and returns it.
func NewUser() (m *User) {
uid := rnd.GenerateUID(UserUID)
return &User{
UserUID: uid,
UserDetails: NewUserDetails(uid),
UserSettings: NewUserSettings(uid),
PreviewToken: GenerateToken(),
DownloadToken: GenerateToken(),
RefID: rnd.RefID(UserPrefix),
}
}
// FindUser returns the matching user or nil if it was not found.
func FindUser(find User) *User {
m := &User{}
// Build query.
stmt := UnscopedDb()
if find.ID != 0 {
stmt = stmt.Where("id = ?", find.ID)
} else if rnd.IsUID(find.UserUID, UserUID) {
stmt = stmt.Where("user_uid = ?", find.UserUID)
} else if find.UserName != "" {
stmt = stmt.Where("user_name = ?", find.UserName)
} else if find.UserEmail != "" {
stmt = stmt.Where("user_email = ?", find.UserEmail)
} else if find.AuthProvider != "" && find.AuthID != "" {
stmt = stmt.Where("auth_provider = ? AND auth_id = ?", find.AuthProvider, find.AuthID)
} else {
return nil
}
// Find matching record.
if err := stmt.First(m).Error; err != nil {
return nil
}
// Fetch related records.
return m.LoadRelated()
}
// FirstOrCreateUser returns an existing record, inserts a new record, or returns nil in case of an error.
func FirstOrCreateUser(m *User) *User {
if m == nil {
return nil
}
if found := FindUser(*m); found != nil {
return found
} else if err := m.Create(); err != nil {
event.AuditErr([]string{"user", "failed to create", "%s"}, err)
return nil
} else {
return m
}
}
// FindUserByName returns the matching user or nil if it was not found.
func FindUserByName(name string) *User {
name = clean.Username(name)
if name == "" {
return nil
}
return FindUser(User{UserName: name})
}
// FindUserByUID returns the matching user or nil if it was not found.
func FindUserByUID(uid string) *User {
if rnd.InvalidUID(uid, UserUID) {
return nil
}
return FindUser(User{UserUID: uid})
}
// UID returns the unique id as string.
func (m *User) UID() string {
if m == nil {
return ""
}
return m.UserUID
}
// SameUID checks if the given uid matches the own uid.
func (m *User) SameUID(uid string) bool {
if m == nil {
return false
} else if m.UserUID == "" || rnd.InvalidUID(uid, UserUID) {
return false
}
return m.UserUID == uid
}
// InitAccount sets the name and password of the initial admin account.
func (m *User) InitAccount(initName, initPasswd string) (updated bool) {
// User must exist and the password must not be empty.
initPasswd = strings.TrimSpace(initPasswd)
if rnd.InvalidUID(m.UserUID, UserUID) || initPasswd == "" {
return false
} else if !m.CanLogIn() {
log.Warnf("users: %s account is not allowed to log in", m.String())
}
// Abort if user has a password.
existingPasswd := FindPassword(m.UserUID)
if existingPasswd != nil {
return false
}
// Set initial password.
initialPasswd := NewPassword(m.UserUID, initPasswd)
// Save password.
if err := initialPasswd.Save(); err != nil {
event.AuditErr([]string{"user %s", "failed to change password", "%s"}, m.RefID, err)
return false
}
// Change username if needed.
if initName != "" && initName != m.UserName {
if err := m.UpdateName(initName); err != nil {
event.AuditErr([]string{"user %s", "failed to change username to %s", "%s"}, m.RefID, clean.Log(initName), err)
}
}
return true
}
// Create new entity in the database.
func (m *User) Create() (err error) {
err = Db().Create(m).Error
if err == nil {
m.SaveRelated()
}
return err
}
// Save updates the record in the database or inserts a new record if it does not already exist.
func (m *User) Save() (err error) {
m.GenerateTokens(false)
err = Db().Save(m).Error
if err == nil {
m.SaveRelated()
}
return err
}
// Delete marks the entity as deleted.
func (m *User) Delete() error {
if m.ID <= 1 {
return fmt.Errorf("cannot delete system user")
}
return Db().Delete(m).Error
}
// Deleted checks if the user account has been deleted.
func (m *User) Deleted() bool {
if m.DeletedAt == nil {
return false
}
return !m.DeletedAt.IsZero()
}
// LoadRelated loads related settings and details.
func (m *User) LoadRelated() *User {
m.Settings()
m.Details()
return m
}
// SaveRelated saves related settings and details.
func (m *User) SaveRelated() *User {
if err := m.Settings().Save(); err != nil {
event.AuditErr([]string{"user %s", "failed to save settings", "%s"}, m.RefID, err)
}
if err := m.Details().Save(); err != nil {
event.AuditErr([]string{"user %s", "failed to save details", "%s"}, m.RefID, err)
}
return m
}
// Updates multiple properties in the database.
func (m *User) Updates(values interface{}) error {
return UnscopedDb().Model(m).Updates(values).Error
}
// BeforeCreate sets a random UID if needed before inserting a new row to the database.
func (m *User) BeforeCreate(scope *gorm.Scope) error {
if m.UserSettings != nil {
m.UserSettings.UserUID = m.UserUID
}
if m.UserDetails != nil {
m.UserDetails.UserUID = m.UserUID
}
m.GenerateTokens(false)
if rnd.InvalidRefID(m.RefID) {
m.RefID = rnd.RefID(UserPrefix)
Log("user", "set ref id", scope.SetColumn("RefID", m.RefID))
}
if rnd.IsUnique(m.UserUID, UserUID) {
return nil
}
m.UserUID = rnd.GenerateUID(UserUID)
return scope.SetColumn("UserUID", m.UserUID)
}
// Expired checks if the user account has expired.
func (m *User) Expired() bool {
if m.ExpiresAt == nil {
return false
}
return m.ExpiresAt.Before(time.Now())
}
// Disabled checks if the user account has been deleted or has expired.
func (m *User) Disabled() bool {
return m.Deleted() || m.Expired() && !m.SuperAdmin
}
// CanLogIn checks if the user is allowed to log in and use the web UI.
func (m *User) CanLogIn() bool {
if !m.CanLogin && !m.SuperAdmin || m.ID <= 0 || m.UserName == "" {
return false
} else if role := m.AclRole(); m.Disabled() || role == acl.RoleUnknown {
return false
} else {
return acl.Resources.Allow(acl.ResourceConfig, role, acl.AccessOwn)
}
}
// CanUseWebDAV checks whether the user is allowed to use WebDAV to synchronize files.
func (m *User) CanUseWebDAV() bool {
if role := m.AclRole(); m.Disabled() || !m.WebDAV || m.ID <= 0 || m.UserName == "" || role == acl.RoleUnknown {
return false
} else {
return acl.Resources.Allow(acl.ResourcePhotos, role, acl.ActionUpload)
}
}
// CanUpload checks if the user is allowed to upload files.
func (m *User) CanUpload() bool {
if role := m.AclRole(); m.Disabled() || role == acl.RoleUnknown {
return false
} else {
return acl.Resources.Allow(acl.ResourcePhotos, role, acl.ActionUpload)
}
}
// SetBasePath changes the user's base folder.
func (m *User) SetBasePath(dir string) *User {
m.BasePath = clean.UserPath(dir)
return m
}
// SetUploadPath changes the user's upload folder.
func (m *User) SetUploadPath(dir string) *User {
if m.BasePath == "" {
m.UploadPath = clean.UserPath(dir)
} else {
m.UploadPath = path.Join(m.BasePath, clean.UserPath(dir))
}
return m
}
// String returns an identifier that can be used in logs.
func (m *User) String() string {
if n := m.Name(); n != "" {
return clean.Log(n)
} else if n = m.FullName(); n != "" {
return clean.Log(n)
}
return clean.Log(m.UserUID)
}
// Name returns the user's login name for authentication.
func (m *User) Name() string {
return clean.Username(m.UserName)
}
// SetName sets the login username to the specified string.
func (m *User) SetName(login string) (err error) {
if m.ID < 0 {
return fmt.Errorf("system users cannot be modified")
}
login = clean.Username(login)
// Empty?
if login == "" {
return fmt.Errorf("username is empty")
} else if m.UserName == login {
return nil
} else if m.UserName != "" && m.ID != 1 {
return fmt.Errorf("username cannot be changed")
}
// Update username and slug.
m.UserName = login
// Update display name.
if m.DisplayName == "" || m.DisplayName == AdminDisplayName && m.ID == 1 {
m.DisplayName = clean.NameCapitalized(login)
}
return nil
}
// UpdateName changes the login username and saves it to the database.
func (m *User) UpdateName(login string) (err error) {
if err = m.SetName(login); err != nil {
return err
}
// Save to database.
return m.Updates(Values{
"UserName": m.UserName,
"DisplayName": m.DisplayName,
})
}
// Email returns the user's login email for authentication.
func (m *User) Email() string {
return clean.Email(m.UserEmail)
}
// FullName returns the name of the user for display purposes.
func (m *User) FullName() string {
switch {
case m.DisplayName != "":
return m.DisplayName
default:
return m.UserName
}
}
// AclRole returns the user role for ACL permission checks.
func (m *User) AclRole() acl.Role {
role := clean.Role(m.UserRole)
switch {
case m.SuperAdmin:
return acl.RoleAdmin
case role == "":
return acl.RoleUnknown
case m.UserName == "":
return acl.RoleVisitor
default:
return acl.ValidRoles[role]
}
}
// Settings returns the user settings and initializes them if necessary.
func (m *User) Settings() *UserSettings {
if m.UserSettings != nil {
m.UserSettings.UserUID = m.UserUID
return m.UserSettings
} else if m.UID() == "" {
m.UserSettings = &UserSettings{}
return m.UserSettings
} else if err := CreateUserSettings(m); err != nil {
m.UserSettings = NewUserSettings(m.UserUID)
}
return m.UserSettings
}
// Details returns user profile information and initializes it if needed.
func (m *User) Details() *UserDetails {
if m.UserDetails != nil {
m.UserDetails.UserUID = m.UserUID
return m.UserDetails
} else if m.UID() == "" {
m.UserDetails = &UserDetails{}
return m.UserDetails
} else if err := CreateUserDetails(m); err != nil {
m.UserDetails = NewUserDetails(m.UserUID)
}
return m.UserDetails
}
// Attr returns optional user account attributes as sanitized string.
// Example: https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/useraccountcontrol-manipulate-account-properties
func (m *User) Attr() string {
return clean.Attr(m.UserAttr)
}
// IsRegistered checks if the user is registered e.g. has a username.
func (m *User) IsRegistered() bool {
if m == nil {
return false
}
return m.UserName != "" && rnd.IsUID(m.UserUID, UserUID) && !m.IsVisitor()
}
// NotRegistered checks if the user is not registered with an own account.
func (m *User) NotRegistered() bool {
return !m.IsRegistered()
}
// IsAdmin checks if the user is an admin with username.
func (m *User) IsAdmin() bool {
if m == nil {
return false
}
return m.IsSuperAdmin() || m.IsRegistered() && m.AclRole() == acl.RoleAdmin
}
// IsSuperAdmin checks if the user is a super admin.
func (m *User) IsSuperAdmin() bool {
if m == nil {
return false
}
return m.SuperAdmin
}
// IsVisitor checks if the user is a sharing link visitor.
func (m *User) IsVisitor() bool {
return m.AclRole() == acl.RoleVisitor || m.ID == Visitor.ID
}
// IsUnknown checks if the user is unknown.
func (m *User) IsUnknown() bool {
return !rnd.IsUID(m.UserUID, UserUID) || m.ID == UnknownUser.ID || m.UserUID == UnknownUser.UserUID
}
// DeleteSessions deletes all active user sessions except those passed as argument.
func (m *User) DeleteSessions(omit []string) (deleted int) {
if m.UserUID == "" {
return 0
}
// Find all user sessions except the session ids passed as argument.
stmt := Db().Where("user_uid = ? AND id NOT IN (?)", m.UserUID, omit)
sess := Sessions{}
if err := stmt.Find(&sess).Error; err != nil {
event.AuditErr([]string{"user %s", "failed to invalidate sessions", "%s"}, m.RefID, err)
return 0
}
// This will also remove the session from the cache.
for _, s := range sess {
if err := s.Delete(); err != nil {
event.AuditWarn([]string{"user %s", "failed to invalidate session %s", "%s"}, m.RefID, clean.Log(s.RefID), err)
} else {
deleted++
}
}
// Return number of deleted sessions for logs.
return deleted
}
// SetPassword sets a new password stored as hash.
func (m *User) SetPassword(password string) error {
if !m.IsRegistered() {
return fmt.Errorf("only registered users can change their password")
}
if len(password) < PasswordLength {
return fmt.Errorf("password must have at least %d characters", PasswordLength)
}
pw := NewPassword(m.UserUID, password)
if err := pw.Save(); err != nil {
return err
}
return m.RegenerateTokens()
}
// HasPassword checks if the user has the specified password and the account is registered.
func (m *User) HasPassword(s string) bool {
return !m.WrongPassword(s)
}
// WrongPassword checks if the given password is incorrect or the account is not registered.
func (m *User) WrongPassword(s string) bool {
// Registered user?
if !m.IsRegistered() {
log.Warn("only registered users can log in")
return true
}
// Empty password?
if s == "" {
return true
}
// Fetch password.
pw := FindPassword(m.UserUID)
// Found?
if pw == nil {
return true
}
// Invalid?
if pw.IsWrong(s) {
return true
}
return false
}
// Validate checks if username, email and role are valid and returns an error otherwise.
func (m *User) Validate() (err error) {
// Empty name?
if m.Name() == "" {
return errors.New("username must not be empty")
}
// Name too short?
if len(m.Name()) < UsernameLength {
return fmt.Errorf("username must have at least %d characters", UsernameLength)
}
// Validate user role.
if acl.ValidRoles[m.UserRole] == "" {
return fmt.Errorf("role %s is invalid", clean.LogQuote(m.UserRole))
}
// Check if the username is unique.
var duplicate = User{}
if err = Db().
Where("user_name = ? AND id <> ?", m.UserName, m.ID).
First(&duplicate).Error; err == nil {
return fmt.Errorf("username %s already exists", clean.LogQuote(m.UserName))
} else if err != gorm.ErrRecordNotFound {
return err
}
// Skip email check?
if m.UserEmail == "" {
return nil
}
// Parse and validate email address.
if a, err := mail.ParseAddress(m.UserEmail); err != nil {
return fmt.Errorf("email %s is invalid", clean.LogQuote(m.UserEmail))
} else if email := a.Address; !strings.ContainsRune(email, '.') {
return fmt.Errorf("email %s does not have a fully qualified domain", clean.LogQuote(m.UserEmail))
} else {
m.UserEmail = email
}
// Check if the email is unique.
if err = Db().
Where("user_email = ? AND id <> ?", m.UserEmail, m.ID).
First(&duplicate).Error; err == nil {
return fmt.Errorf("email %s already exists", clean.Log(m.UserEmail))
} else if err != gorm.ErrRecordNotFound {
return err
}
return nil
}
// SetFormValues sets the values specified in the form.
func (m *User) SetFormValues(frm form.User) *User {
m.UserName = frm.Name()
m.UserEmail = frm.Email()
m.DisplayName = frm.DisplayName
m.SuperAdmin = frm.SuperAdmin
m.CanLogin = frm.CanLogin
m.WebDAV = frm.WebDAV
m.UserRole = frm.Role()
m.UserAttr = frm.Attr()
m.SetBasePath(frm.BasePath)
m.SetUploadPath(frm.UploadPath)
return m
}
// GenerateTokens generates preview and download tokens as needed.
func (m *User) GenerateTokens(force bool) *User {
if m.ID < 0 {
return m
}
if m.PreviewToken == "" || force {
m.PreviewToken = GenerateToken()
}
if m.DownloadToken == "" || force {
m.DownloadToken = GenerateToken()
}
return m
}
// RegenerateTokens replaces the existing preview and download tokens.
func (m *User) RegenerateTokens() error {
if m.ID < 0 {
return nil
}
m.GenerateTokens(true)
return m.Updates(Values{"PreviewToken": m.PreviewToken, "DownloadToken": m.DownloadToken})
}
// RefreshShares updates the list of shares.
func (m *User) RefreshShares() *User {
m.UserShares = FindUserShares(m.UID())
return m
}
// NoShares checks if the user has no shares yet.
func (m *User) NoShares() bool {
if !m.IsRegistered() {
return true
}
return m.UserShares.Empty()
}
// HasShares checks if the user has any shares.
func (m *User) HasShares() bool {
return !m.NoShares()
}
// HasShare if a uid was shared with the user.
func (m *User) HasShare(uid string) bool {
if !m.IsRegistered() || m.NoShares() {
return false
}
return m.UserShares.Contains(uid)
}
// SharedUIDs returns shared entity UIDs.
func (m *User) SharedUIDs() UIDs {
if m.IsRegistered() && m.UserShares.Empty() {
m.RefreshShares()
}
return m.UserShares.UIDs()
}
// RedeemToken updates shared entity UIDs using the specified token.
func (m *User) RedeemToken(token string) (n int) {
if !m.IsRegistered() {
return 0
}
// Find links.
links := FindValidLinks(token, "")
// Found?
if n = len(links); n == 0 {
return n
}
// Find shares.
for _, link := range links {
if found := FindUserShare(UserShare{UserUID: m.UID(), ShareUID: link.ShareUID}); found == nil {
share := NewUserShare(m.UID(), link.ShareUID, link.Perm, link.ExpiresAt())
share.LinkUID = link.LinkUID
share.Comment = link.Comment
if err := share.Save(); err != nil {
event.AuditErr([]string{"user %s", "token %s", "failed to redeem shares", "%s"}, m.RefID, clean.Log(token), err)
} else {
link.Redeem()
}
} else if err := found.UpdateLink(link); err != nil {
event.AuditErr([]string{"user %s", "token %s", "failed to update shares", "%s"}, m.RefID, clean.Log(token), err)
}
}
return n
}
// Form returns a populated user form to perform changes.
func (m *User) Form() (form.User, error) {
frm := form.User{UserDetails: &form.UserDetails{}}
if err := deepcopier.Copy(m).To(&frm); err != nil {
return frm, err
}
if err := deepcopier.Copy(m.UserDetails).To(frm.UserDetails); err != nil {
return frm, err
}
return frm, nil
}
// SaveForm updates the entity using form data and stores it in the database.
func (m *User) SaveForm(f form.User) error {
if m.UserName == "" || m.ID <= 0 {
return fmt.Errorf("system users cannot be updated")
}
// Ignore details if not set.
if f.UserDetails == nil {
// Ignore.
} else if err := deepcopier.Copy(f.UserDetails).To(m.UserDetails); err != nil {
return err
} else {
m.UserDetails.UserAbout = strings.TrimSpace(m.UserDetails.UserAbout)
m.UserDetails.UserBio = strings.TrimSpace(m.UserDetails.UserBio)
}
// Sanitize display name.
if n := clean.Name(f.DisplayName); n != "" && n != m.DisplayName {
m.SetDisplayName(n)
}
// Sanitize email address.
if email := clean.Email(f.UserEmail); email != "" && email != m.UserEmail {
m.UserEmail = email
m.VerifiedAt = nil
m.VerifyToken = GenerateToken()
}
return m.Save()
}
// SetDisplayName sets a new display name and, if possible, splits it into its components.
func (m *User) SetDisplayName(name string) *User {
name = clean.Name(name)
// Empty?
if name == "" {
return m
}
m.DisplayName = name
d := m.Details()
if SrcPriority[SrcAuto] < SrcPriority[d.NameSrc] {
return m
}
// Try to parse name into components.
n := txt.ParseName(name)
d.NameTitle = n.Title
d.GivenName = n.Given
d.MiddleName = n.Middle
d.FamilyName = n.Family
d.NameSuffix = n.Suffix
d.NickName = n.Nick
return m
}
// SetAvatar updates the user avatar image.
func (m *User) SetAvatar(thumb, thumbSrc string) error {
if m.UserName == "" || m.ID <= 0 {
return fmt.Errorf("system user avatars cannot be changed")
}
if SrcPriority[thumbSrc] < SrcPriority[m.ThumbSrc] && m.Thumb != "" {
return fmt.Errorf("no permission to change avatar")
}
m.Thumb = thumb
m.ThumbSrc = thumbSrc
return m.Updates(Values{"Thumb": m.Thumb, "ThumbSrc": m.ThumbSrc})
}
// Login returns the login name and provider.
func (m *User) Login() string {
if m.AuthProvider == "" {
return m.UserName
} else {
return fmt.Sprintf("%s@%s", m.UserName, m.AuthProvider)
}
}