You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

access.go 6.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package access
  5. import (
  6. "context"
  7. "fmt"
  8. "code.gitea.io/gitea/models/db"
  9. "code.gitea.io/gitea/models/organization"
  10. "code.gitea.io/gitea/models/perm"
  11. repo_model "code.gitea.io/gitea/models/repo"
  12. user_model "code.gitea.io/gitea/models/user"
  13. "xorm.io/builder"
  14. )
  15. // Access represents the highest access level of a user to the repository. The only access type
  16. // that is not in this table is the real owner of a repository. In case of an organization
  17. // repository, the members of the owners team are in this table.
  18. type Access struct {
  19. ID int64 `xorm:"pk autoincr"`
  20. UserID int64 `xorm:"UNIQUE(s)"`
  21. RepoID int64 `xorm:"UNIQUE(s)"`
  22. Mode perm.AccessMode
  23. }
  24. func init() {
  25. db.RegisterModel(new(Access))
  26. }
  27. func accessLevel(ctx context.Context, user *user_model.User, repo *repo_model.Repository) (perm.AccessMode, error) {
  28. mode := perm.AccessModeNone
  29. var userID int64
  30. restricted := false
  31. if user != nil {
  32. userID = user.ID
  33. restricted = user.IsRestricted
  34. }
  35. if !restricted && !repo.IsPrivate {
  36. mode = perm.AccessModeRead
  37. }
  38. if userID == 0 {
  39. return mode, nil
  40. }
  41. if userID == repo.OwnerID {
  42. return perm.AccessModeOwner, nil
  43. }
  44. a, exist, err := db.Get[Access](ctx, builder.Eq{"user_id": userID, "repo_id": repo.ID})
  45. if err != nil {
  46. return mode, err
  47. } else if !exist {
  48. return mode, nil
  49. }
  50. return a.Mode, nil
  51. }
  52. func maxAccessMode(modes ...perm.AccessMode) perm.AccessMode {
  53. maxMode := perm.AccessModeNone
  54. for _, mode := range modes {
  55. maxMode = max(maxMode, mode)
  56. }
  57. return maxMode
  58. }
  59. type userAccess struct {
  60. User *user_model.User
  61. Mode perm.AccessMode
  62. }
  63. // updateUserAccess updates an access map so that user has at least mode
  64. func updateUserAccess(accessMap map[int64]*userAccess, user *user_model.User, mode perm.AccessMode) {
  65. if ua, ok := accessMap[user.ID]; ok {
  66. ua.Mode = maxAccessMode(ua.Mode, mode)
  67. } else {
  68. accessMap[user.ID] = &userAccess{User: user, Mode: mode}
  69. }
  70. }
  71. // FIXME: do cross-comparison so reduce deletions and additions to the minimum?
  72. func refreshAccesses(ctx context.Context, repo *repo_model.Repository, accessMap map[int64]*userAccess) (err error) {
  73. minMode := perm.AccessModeRead
  74. if err := repo.LoadOwner(ctx); err != nil {
  75. return fmt.Errorf("LoadOwner: %w", err)
  76. }
  77. // If the repo isn't private and isn't owned by a organization,
  78. // increase the minMode to Write.
  79. if !repo.IsPrivate && !repo.Owner.IsOrganization() {
  80. minMode = perm.AccessModeWrite
  81. }
  82. newAccesses := make([]Access, 0, len(accessMap))
  83. for userID, ua := range accessMap {
  84. if ua.Mode < minMode && !ua.User.IsRestricted {
  85. continue
  86. }
  87. newAccesses = append(newAccesses, Access{
  88. UserID: userID,
  89. RepoID: repo.ID,
  90. Mode: ua.Mode,
  91. })
  92. }
  93. // Delete old accesses and insert new ones for repository.
  94. if _, err = db.DeleteByBean(ctx, &Access{RepoID: repo.ID}); err != nil {
  95. return fmt.Errorf("delete old accesses: %w", err)
  96. }
  97. if len(newAccesses) == 0 {
  98. return nil
  99. }
  100. if err = db.Insert(ctx, newAccesses); err != nil {
  101. return fmt.Errorf("insert new accesses: %w", err)
  102. }
  103. return nil
  104. }
  105. // refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
  106. func refreshCollaboratorAccesses(ctx context.Context, repoID int64, accessMap map[int64]*userAccess) error {
  107. collaborators, _, err := repo_model.GetCollaborators(ctx, &repo_model.FindCollaborationOptions{RepoID: repoID})
  108. if err != nil {
  109. return fmt.Errorf("GetCollaborators: %w", err)
  110. }
  111. for _, c := range collaborators {
  112. if c.User.IsGhost() {
  113. continue
  114. }
  115. updateUserAccess(accessMap, c.User, c.Collaboration.Mode)
  116. }
  117. return nil
  118. }
  119. // RecalculateTeamAccesses recalculates new accesses for teams of an organization
  120. // except the team whose ID is given. It is used to assign a team ID when
  121. // remove repository from that team.
  122. func RecalculateTeamAccesses(ctx context.Context, repo *repo_model.Repository, ignTeamID int64) (err error) {
  123. accessMap := make(map[int64]*userAccess, 20)
  124. if err = repo.LoadOwner(ctx); err != nil {
  125. return err
  126. } else if !repo.Owner.IsOrganization() {
  127. return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
  128. }
  129. if err = refreshCollaboratorAccesses(ctx, repo.ID, accessMap); err != nil {
  130. return fmt.Errorf("refreshCollaboratorAccesses: %w", err)
  131. }
  132. teams, err := organization.FindOrgTeams(ctx, repo.Owner.ID)
  133. if err != nil {
  134. return err
  135. }
  136. for _, t := range teams {
  137. if t.ID == ignTeamID {
  138. continue
  139. }
  140. // Owner team gets owner access, and skip for teams that do not
  141. // have relations with repository.
  142. if t.IsOwnerTeam() {
  143. t.AccessMode = perm.AccessModeOwner
  144. } else if !organization.HasTeamRepo(ctx, t.OrgID, t.ID, repo.ID) {
  145. continue
  146. }
  147. if err = t.LoadMembers(ctx); err != nil {
  148. return fmt.Errorf("getMembers '%d': %w", t.ID, err)
  149. }
  150. for _, m := range t.Members {
  151. updateUserAccess(accessMap, m, t.AccessMode)
  152. }
  153. }
  154. return refreshAccesses(ctx, repo, accessMap)
  155. }
  156. // RecalculateUserAccess recalculates new access for a single user
  157. // Usable if we know access only affected one user
  158. func RecalculateUserAccess(ctx context.Context, repo *repo_model.Repository, uid int64) (err error) {
  159. minMode := perm.AccessModeRead
  160. if !repo.IsPrivate {
  161. minMode = perm.AccessModeWrite
  162. }
  163. accessMode := perm.AccessModeNone
  164. e := db.GetEngine(ctx)
  165. collaborator, err := repo_model.GetCollaboration(ctx, repo.ID, uid)
  166. if err != nil {
  167. return err
  168. } else if collaborator != nil {
  169. accessMode = collaborator.Mode
  170. }
  171. if err = repo.LoadOwner(ctx); err != nil {
  172. return err
  173. } else if repo.Owner.IsOrganization() {
  174. var teams []organization.Team
  175. if err := e.Join("INNER", "team_repo", "team_repo.team_id = team.id").
  176. Join("INNER", "team_user", "team_user.team_id = team.id").
  177. Where("team.org_id = ?", repo.OwnerID).
  178. And("team_repo.repo_id=?", repo.ID).
  179. And("team_user.uid=?", uid).
  180. Find(&teams); err != nil {
  181. return err
  182. }
  183. for _, t := range teams {
  184. if t.IsOwnerTeam() {
  185. t.AccessMode = perm.AccessModeOwner
  186. }
  187. accessMode = maxAccessMode(accessMode, t.AccessMode)
  188. }
  189. }
  190. // Delete old user accesses and insert new one for repository.
  191. if _, err = e.Delete(&Access{RepoID: repo.ID, UserID: uid}); err != nil {
  192. return fmt.Errorf("delete old user accesses: %w", err)
  193. } else if accessMode >= minMode {
  194. if err = db.Insert(ctx, &Access{RepoID: repo.ID, UserID: uid, Mode: accessMode}); err != nil {
  195. return fmt.Errorf("insert new user accesses: %w", err)
  196. }
  197. }
  198. return nil
  199. }
  200. // RecalculateAccesses recalculates all accesses for repository.
  201. func RecalculateAccesses(ctx context.Context, repo *repo_model.Repository) error {
  202. if repo.Owner.IsOrganization() {
  203. return RecalculateTeamAccesses(ctx, repo, 0)
  204. }
  205. accessMap := make(map[int64]*userAccess, 20)
  206. if err := refreshCollaboratorAccesses(ctx, repo.ID, accessMap); err != nil {
  207. return fmt.Errorf("refreshCollaboratorAccesses: %w", err)
  208. }
  209. return refreshAccesses(ctx, repo, accessMap)
  210. }