2014-02-17 23:38:50 +00:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2014-02-17 15:57:23 +00:00
|
|
|
package models
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
type AccessMode int
|
2014-06-25 04:44:48 +00:00
|
|
|
|
2014-02-17 15:57:23 +00:00
|
|
|
const (
|
2015-02-09 11:36:33 +00:00
|
|
|
ACCESS_MODE_NONE AccessMode = iota
|
|
|
|
ACCESS_MODE_READ
|
|
|
|
ACCESS_MODE_WRITE
|
|
|
|
ACCESS_MODE_ADMIN
|
|
|
|
ACCESS_MODE_OWNER
|
2014-02-17 15:57:23 +00:00
|
|
|
)
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
func maxAccessMode(modes ...AccessMode) AccessMode {
|
2015-02-09 11:36:33 +00:00
|
|
|
max := ACCESS_MODE_NONE
|
2015-02-05 13:29:08 +00:00
|
|
|
for _, mode := range modes {
|
|
|
|
if mode > max {
|
|
|
|
max = mode
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return max
|
2014-02-17 15:57:23 +00:00
|
|
|
}
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
// Access represents the highest access level of a user to the repository. The only access type
|
|
|
|
// that is not in this table is the real owner of a repository. In case of an organization
|
|
|
|
// repository, the members of the owners team are in this table.
|
|
|
|
type Access struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
UserID int64 `xorm:"UNIQUE(s)"`
|
|
|
|
RepoID int64 `xorm:"UNIQUE(s)"`
|
|
|
|
Mode AccessMode
|
2014-02-17 15:57:23 +00:00
|
|
|
}
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
// HasAccess returns true if someone has the request access level. User can be nil!
|
|
|
|
func HasAccess(u *User, r *Repository, testMode AccessMode) (bool, error) {
|
|
|
|
mode, err := AccessLevel(u, r)
|
|
|
|
return testMode <= mode, err
|
2015-02-12 02:58:37 +00:00
|
|
|
}
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
// Return the Access a user has to a repository. Will return NoneAccess if the
|
|
|
|
// user does not have access. User can be nil!
|
|
|
|
func AccessLevel(u *User, r *Repository) (AccessMode, error) {
|
2015-02-09 11:36:33 +00:00
|
|
|
mode := ACCESS_MODE_NONE
|
2015-02-05 13:29:08 +00:00
|
|
|
if !r.IsPrivate {
|
2015-02-09 11:36:33 +00:00
|
|
|
mode = ACCESS_MODE_READ
|
2015-02-12 02:58:37 +00:00
|
|
|
}
|
2014-05-01 15:32:12 +00:00
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
if u != nil {
|
|
|
|
if u.Id == r.OwnerId {
|
2015-02-09 11:36:33 +00:00
|
|
|
return ACCESS_MODE_OWNER, nil
|
2015-02-05 13:29:08 +00:00
|
|
|
}
|
2014-04-04 22:55:17 +00:00
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
a := &Access{UserID: u.Id, RepoID: r.Id}
|
|
|
|
if has, err := x.Get(a); !has || err != nil {
|
|
|
|
return mode, err
|
|
|
|
}
|
|
|
|
return a.Mode, nil
|
2014-04-12 01:47:39 +00:00
|
|
|
}
|
2015-02-05 13:29:08 +00:00
|
|
|
|
|
|
|
return mode, nil
|
2014-02-17 15:57:23 +00:00
|
|
|
}
|
2015-01-23 07:54:16 +00:00
|
|
|
|
|
|
|
// GetAccessibleRepositories finds all repositories where a user has access to,
|
|
|
|
// besides his own.
|
2015-02-05 13:29:08 +00:00
|
|
|
func (u *User) GetAccessibleRepositories() (map[*Repository]AccessMode, error) {
|
2015-01-23 07:54:16 +00:00
|
|
|
accesses := make([]*Access, 0, 10)
|
2015-02-05 13:29:08 +00:00
|
|
|
if err := x.Find(&accesses, &Access{UserID: u.Id}); err != nil {
|
2015-01-23 07:54:16 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-02-05 13:29:08 +00:00
|
|
|
repos := make(map[*Repository]AccessMode, len(accesses))
|
2015-01-23 07:54:16 +00:00
|
|
|
for _, access := range accesses {
|
2015-02-05 13:29:08 +00:00
|
|
|
repo, err := GetRepositoryById(access.RepoID)
|
2015-01-23 07:54:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-02-12 02:58:37 +00:00
|
|
|
if err = repo.GetOwner(); err != nil {
|
2015-02-04 14:08:55 +00:00
|
|
|
return nil, err
|
2015-02-12 02:58:37 +00:00
|
|
|
} else if repo.OwnerId == u.Id {
|
|
|
|
continue
|
2015-02-04 14:08:55 +00:00
|
|
|
}
|
2015-01-23 07:54:16 +00:00
|
|
|
repos[repo] = access.Mode
|
|
|
|
}
|
|
|
|
|
|
|
|
return repos, nil
|
|
|
|
}
|
2015-02-05 13:29:08 +00:00
|
|
|
|
|
|
|
// Recalculate all accesses for repository
|
|
|
|
func (r *Repository) RecalcAccessSess() error {
|
|
|
|
accessMap := make(map[int64]AccessMode, 20)
|
|
|
|
|
|
|
|
// Give all collaborators write access
|
|
|
|
collaborators, err := r.GetCollaborators()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, c := range collaborators {
|
2015-02-09 11:36:33 +00:00
|
|
|
accessMap[c.Id] = ACCESS_MODE_WRITE
|
2015-02-05 13:29:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := r.GetOwner(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if r.Owner.IsOrganization() {
|
|
|
|
if err = r.Owner.GetTeams(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, team := range r.Owner.Teams {
|
|
|
|
if !(team.IsOwnerTeam() || team.HasRepository(r)) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = team.GetMembers(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, u := range team.Members {
|
|
|
|
accessMap[u.Id] = maxAccessMode(accessMap[u.Id], team.Authorize)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-09 11:36:33 +00:00
|
|
|
minMode := ACCESS_MODE_READ
|
2015-02-05 13:29:08 +00:00
|
|
|
if !r.IsPrivate {
|
2015-02-09 11:36:33 +00:00
|
|
|
minMode = ACCESS_MODE_WRITE
|
2015-02-05 13:29:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
newAccesses := make([]Access, 0, len(accessMap))
|
|
|
|
for userID, mode := range accessMap {
|
|
|
|
if userID == r.OwnerId || mode <= minMode {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
newAccesses = append(newAccesses, Access{UserID: userID, RepoID: r.Id, Mode: mode})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete old accesses for repository
|
|
|
|
if _, err = x.Delete(&Access{RepoID: r.Id}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// And insert the new ones
|
|
|
|
if _, err = x.Insert(newAccesses); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
|
|
|
}
|