mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-11-03 16:01:11 +00:00 
			
		
		
		
	As part of administration sometimes it is appropriate to forcibly tell users to update their passwords. This PR creates a new command `gitea admin user must-change-password` which will set the `MustChangePassword` flag on the provided users. Signed-off-by: Andrew Thornton <art27@cantab.net>
		
			
				
	
	
		
			80 lines
		
	
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			80 lines
		
	
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2023 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	auth_model "code.gitea.io/gitea/models/auth"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
 | 
						|
	"github.com/urfave/cli"
 | 
						|
)
 | 
						|
 | 
						|
var microcmdUserGenerateAccessToken = cli.Command{
 | 
						|
	Name:  "generate-access-token",
 | 
						|
	Usage: "Generate an access token for a specific user",
 | 
						|
	Flags: []cli.Flag{
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "username,u",
 | 
						|
			Usage: "Username",
 | 
						|
		},
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "token-name,t",
 | 
						|
			Usage: "Token name",
 | 
						|
			Value: "gitea-admin",
 | 
						|
		},
 | 
						|
		cli.BoolFlag{
 | 
						|
			Name:  "raw",
 | 
						|
			Usage: "Display only the token value",
 | 
						|
		},
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "scopes",
 | 
						|
			Value: "",
 | 
						|
			Usage: "Comma separated list of scopes to apply to access token",
 | 
						|
		},
 | 
						|
	},
 | 
						|
	Action: runGenerateAccessToken,
 | 
						|
}
 | 
						|
 | 
						|
func runGenerateAccessToken(c *cli.Context) error {
 | 
						|
	if !c.IsSet("username") {
 | 
						|
		return fmt.Errorf("You must provide a username to generate a token for")
 | 
						|
	}
 | 
						|
 | 
						|
	ctx, cancel := installSignals()
 | 
						|
	defer cancel()
 | 
						|
 | 
						|
	if err := initDB(ctx); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	user, err := user_model.GetUserByName(ctx, c.String("username"))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	accessTokenScope, err := auth_model.AccessTokenScope(c.String("scopes")).Normalize()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	t := &auth_model.AccessToken{
 | 
						|
		Name:  c.String("token-name"),
 | 
						|
		UID:   user.ID,
 | 
						|
		Scope: accessTokenScope,
 | 
						|
	}
 | 
						|
 | 
						|
	if err := auth_model.NewAccessToken(t); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	if c.Bool("raw") {
 | 
						|
		fmt.Printf("%s\n", t.Token)
 | 
						|
	} else {
 | 
						|
		fmt.Printf("Access token was successfully created: %s\n", t.Token)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |