You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

repo_permission.go 7.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. // Copyright 2018 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. // Permission contains all the permissions related variables to a repository for a user
  6. type Permission struct {
  7. AccessMode AccessMode
  8. Units []*RepoUnit
  9. UnitsMode map[UnitType]AccessMode
  10. }
  11. // IsOwner returns true if current user is the owner of repository.
  12. func (p *Permission) IsOwner() bool {
  13. return p.AccessMode >= AccessModeOwner
  14. }
  15. // IsAdmin returns true if current user has admin or higher access of repository.
  16. func (p *Permission) IsAdmin() bool {
  17. return p.AccessMode >= AccessModeAdmin
  18. }
  19. // HasAccess returns true if the current user has at least read access to any unit of this repository
  20. func (p *Permission) HasAccess() bool {
  21. if p.UnitsMode == nil {
  22. return p.AccessMode >= AccessModeRead
  23. }
  24. return len(p.UnitsMode) > 0
  25. }
  26. // UnitAccessMode returns current user accessmode to the specify unit of the repository
  27. func (p *Permission) UnitAccessMode(unitType UnitType) AccessMode {
  28. if p.UnitsMode == nil {
  29. for _, u := range p.Units {
  30. if u.Type == unitType {
  31. return p.AccessMode
  32. }
  33. }
  34. return AccessModeNone
  35. }
  36. return p.UnitsMode[unitType]
  37. }
  38. // CanAccess returns true if user has mode access to the unit of the repository
  39. func (p *Permission) CanAccess(mode AccessMode, unitType UnitType) bool {
  40. return p.UnitAccessMode(unitType) >= mode
  41. }
  42. // CanAccessAny returns true if user has mode access to any of the units of the repository
  43. func (p *Permission) CanAccessAny(mode AccessMode, unitTypes ...UnitType) bool {
  44. for _, u := range unitTypes {
  45. if p.CanAccess(mode, u) {
  46. return true
  47. }
  48. }
  49. return false
  50. }
  51. // CanRead returns true if user could read to this unit
  52. func (p *Permission) CanRead(unitType UnitType) bool {
  53. return p.CanAccess(AccessModeRead, unitType)
  54. }
  55. // CanReadAny returns true if user has read access to any of the units of the repository
  56. func (p *Permission) CanReadAny(unitTypes ...UnitType) bool {
  57. return p.CanAccessAny(AccessModeRead, unitTypes...)
  58. }
  59. // CanReadIssuesOrPulls returns true if isPull is true and user could read pull requests and
  60. // returns true if isPull is false and user could read to issues
  61. func (p *Permission) CanReadIssuesOrPulls(isPull bool) bool {
  62. if isPull {
  63. return p.CanRead(UnitTypePullRequests)
  64. }
  65. return p.CanRead(UnitTypeIssues)
  66. }
  67. // CanWrite returns true if user could write to this unit
  68. func (p *Permission) CanWrite(unitType UnitType) bool {
  69. return p.CanAccess(AccessModeWrite, unitType)
  70. }
  71. // CanWriteIssuesOrPulls returns true if isPull is true and user could write to pull requests and
  72. // returns true if isPull is false and user could write to issues
  73. func (p *Permission) CanWriteIssuesOrPulls(isPull bool) bool {
  74. if isPull {
  75. return p.CanWrite(UnitTypePullRequests)
  76. }
  77. return p.CanWrite(UnitTypeIssues)
  78. }
  79. // GetUserRepoPermission returns the user permissions to the repository
  80. func GetUserRepoPermission(repo *Repository, user *User) (Permission, error) {
  81. return getUserRepoPermission(x, repo, user)
  82. }
  83. func getUserRepoPermission(e Engine, repo *Repository, user *User) (perm Permission, err error) {
  84. // anonymous user visit private repo.
  85. // TODO: anonymous user visit public unit of private repo???
  86. if user == nil && repo.IsPrivate {
  87. perm.AccessMode = AccessModeNone
  88. return
  89. }
  90. if err = repo.getUnits(e); err != nil {
  91. return
  92. }
  93. perm.Units = repo.Units
  94. // anonymous visit public repo
  95. if user == nil {
  96. perm.AccessMode = AccessModeRead
  97. return
  98. }
  99. // Admin or the owner has super access to the repository
  100. if user.IsAdmin || user.ID == repo.OwnerID {
  101. perm.AccessMode = AccessModeOwner
  102. return
  103. }
  104. // plain user
  105. perm.AccessMode, err = accessLevel(e, user.ID, repo)
  106. if err != nil {
  107. return
  108. }
  109. if err = repo.getOwner(e); err != nil {
  110. return
  111. }
  112. if !repo.Owner.IsOrganization() {
  113. return
  114. }
  115. perm.UnitsMode = make(map[UnitType]AccessMode)
  116. // Collaborators on organization
  117. if isCollaborator, err := repo.isCollaborator(e, user.ID); err != nil {
  118. return perm, err
  119. } else if isCollaborator {
  120. for _, u := range repo.Units {
  121. perm.UnitsMode[u.Type] = perm.AccessMode
  122. }
  123. }
  124. // get units mode from teams
  125. teams, err := getUserRepoTeams(e, repo.OwnerID, user.ID, repo.ID)
  126. if err != nil {
  127. return
  128. }
  129. for _, u := range repo.Units {
  130. var found bool
  131. for _, team := range teams {
  132. if team.unitEnabled(e, u.Type) {
  133. m := perm.UnitsMode[u.Type]
  134. if m < team.Authorize {
  135. perm.UnitsMode[u.Type] = team.Authorize
  136. }
  137. found = true
  138. }
  139. }
  140. // for a public repo on an organization, user have read permission on non-team defined units.
  141. if !found && !repo.IsPrivate {
  142. if _, ok := perm.UnitsMode[u.Type]; !ok {
  143. perm.UnitsMode[u.Type] = AccessModeRead
  144. }
  145. }
  146. }
  147. // remove no permission units
  148. perm.Units = make([]*RepoUnit, 0, len(repo.Units))
  149. for t := range perm.UnitsMode {
  150. for _, u := range repo.Units {
  151. if u.Type == t {
  152. perm.Units = append(perm.Units, u)
  153. }
  154. }
  155. }
  156. return
  157. }
  158. // IsUserRepoAdmin return ture if user has admin right of a repo
  159. func IsUserRepoAdmin(repo *Repository, user *User) (bool, error) {
  160. return isUserRepoAdmin(x, repo, user)
  161. }
  162. func isUserRepoAdmin(e Engine, repo *Repository, user *User) (bool, error) {
  163. if user == nil || repo == nil {
  164. return false, nil
  165. }
  166. if user.IsAdmin {
  167. return true, nil
  168. }
  169. mode, err := accessLevel(e, user.ID, repo)
  170. if err != nil {
  171. return false, err
  172. }
  173. if mode >= AccessModeAdmin {
  174. return true, nil
  175. }
  176. teams, err := getUserRepoTeams(e, repo.OwnerID, user.ID, repo.ID)
  177. if err != nil {
  178. return false, err
  179. }
  180. for _, team := range teams {
  181. if team.Authorize >= AccessModeAdmin {
  182. return true, nil
  183. }
  184. }
  185. return false, nil
  186. }
  187. // AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
  188. // user does not have access.
  189. func AccessLevel(user *User, repo *Repository) (AccessMode, error) {
  190. return accessLevelUnit(x, user, repo, UnitTypeCode)
  191. }
  192. func accessLevelUnit(e Engine, user *User, repo *Repository, unitType UnitType) (AccessMode, error) {
  193. perm, err := getUserRepoPermission(e, repo, user)
  194. if err != nil {
  195. return AccessModeNone, err
  196. }
  197. return perm.UnitAccessMode(UnitTypeCode), nil
  198. }
  199. func hasAccessUnit(e Engine, user *User, repo *Repository, unitType UnitType, testMode AccessMode) (bool, error) {
  200. mode, err := accessLevelUnit(e, user, repo, unitType)
  201. return testMode <= mode, err
  202. }
  203. // HasAccessUnit returns ture if user has testMode to the unit of the repository
  204. func HasAccessUnit(user *User, repo *Repository, unitType UnitType, testMode AccessMode) (bool, error) {
  205. return hasAccessUnit(x, user, repo, unitType, testMode)
  206. }
  207. // canBeAssigned return true if user could be assigned to a repo
  208. // FIXME: user could send PullRequest also could be assigned???
  209. func canBeAssigned(e Engine, user *User, repo *Repository) (bool, error) {
  210. return hasAccessUnit(e, user, repo, UnitTypeCode, AccessModeWrite)
  211. }
  212. func hasAccess(e Engine, userID int64, repo *Repository) (bool, error) {
  213. var user *User
  214. var err error
  215. if userID > 0 {
  216. user, err = getUserByID(e, userID)
  217. if err != nil {
  218. return false, err
  219. }
  220. }
  221. perm, err := getUserRepoPermission(e, repo, user)
  222. if err != nil {
  223. return false, err
  224. }
  225. return perm.HasAccess(), nil
  226. }
  227. // HasAccess returns true if user has access to repo
  228. func HasAccess(userID int64, repo *Repository) (bool, error) {
  229. return hasAccess(x, userID, repo)
  230. }