aboutsummaryrefslogtreecommitdiff
path: root/models
diff options
context:
space:
mode:
Diffstat (limited to 'models')
-rw-r--r--models/migrations/migrations.go4
-rw-r--r--models/token.go2
-rw-r--r--models/two_factor.go4
-rw-r--r--models/user.go10
4 files changed, 10 insertions, 10 deletions
diff --git a/models/migrations/migrations.go b/models/migrations/migrations.go
index 30733423..29cb288a 100644
--- a/models/migrations/migrations.go
+++ b/models/migrations/migrations.go
@@ -159,10 +159,10 @@ func generateOrgRandsAndSalt(x *xorm.Engine) (err error) {
}
for _, org := range orgs {
- if org.Rands, err = tool.GetRandomString(10); err != nil {
+ if org.Rands, err = tool.RandomString(10); err != nil {
return err
}
- if org.Salt, err = tool.GetRandomString(10); err != nil {
+ if org.Salt, err = tool.RandomString(10); err != nil {
return err
}
if _, err = sess.Id(org.ID).Update(org); err != nil {
diff --git a/models/token.go b/models/token.go
index 6824e43c..9a69a601 100644
--- a/models/token.go
+++ b/models/token.go
@@ -49,7 +49,7 @@ func (t *AccessToken) AfterSet(colName string, _ xorm.Cell) {
// NewAccessToken creates new access token.
func NewAccessToken(t *AccessToken) error {
- t.Sha1 = tool.EncodeSha1(gouuid.NewV4().String())
+ t.Sha1 = tool.SHA1(gouuid.NewV4().String())
_, err := x.Insert(t)
return err
}
diff --git a/models/two_factor.go b/models/two_factor.go
index 2f6e7991..60d26147 100644
--- a/models/two_factor.go
+++ b/models/two_factor.go
@@ -66,9 +66,9 @@ func IsUserEnabledTwoFactor(userID int64) bool {
func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) {
recoveryCodes := make([]*TwoFactorRecoveryCode, 10)
for i := 0; i < 10; i++ {
- code, err := tool.GetRandomString(10)
+ code, err := tool.RandomString(10)
if err != nil {
- return nil, fmt.Errorf("GetRandomString: %v", err)
+ return nil, fmt.Errorf("RandomString: %v", err)
}
recoveryCodes[i] = &TwoFactorRecoveryCode{
UserID: userID,
diff --git a/models/user.go b/models/user.go
index d9a1e2a0..9f7b602a 100644
--- a/models/user.go
+++ b/models/user.go
@@ -489,7 +489,7 @@ func IsUserExist(uid int64, name string) (bool, error) {
// GetUserSalt returns a ramdom user salt token.
func GetUserSalt() (string, error) {
- return tool.GetRandomString(10)
+ return tool.RandomString(10)
}
// NewGhostUser creates and returns a fake user for someone has deleted his/her account.
@@ -601,12 +601,12 @@ func Users(page, pageSize int) ([]*User, error) {
// get user by erify code
func getVerifyUser(code string) (user *User) {
- if len(code) <= tool.TimeLimitCodeLength {
+ if len(code) <= tool.TIME_LIMIT_CODE_LENGTH {
return nil
}
// use tail hex username query user
- hexStr := code[tool.TimeLimitCodeLength:]
+ hexStr := code[tool.TIME_LIMIT_CODE_LENGTH:]
if b, err := hex.DecodeString(hexStr); err == nil {
if user, err = GetUserByName(string(b)); user != nil {
return user
@@ -623,7 +623,7 @@ func VerifyUserActiveCode(code string) (user *User) {
if user = getVerifyUser(code); user != nil {
// time limit code
- prefix := code[:tool.TimeLimitCodeLength]
+ prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
data := com.ToStr(user.ID) + user.Email + user.LowerName + user.Passwd + user.Rands
if tool.VerifyTimeLimitCode(data, minutes, prefix) {
@@ -639,7 +639,7 @@ func VerifyActiveEmailCode(code, email string) *EmailAddress {
if user := getVerifyUser(code); user != nil {
// time limit code
- prefix := code[:tool.TimeLimitCodeLength]
+ prefix := code[:tool.TIME_LIMIT_CODE_LENGTH]
data := com.ToStr(user.ID) + email + user.LowerName + user.Passwd + user.Rands
if tool.VerifyTimeLimitCode(data, minutes, prefix) {