You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

access.go 8.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package models
  6. import (
  7. "fmt"
  8. "code.gitea.io/gitea/models/db"
  9. "code.gitea.io/gitea/modules/log"
  10. )
  11. // AccessMode specifies the users access mode
  12. type AccessMode int
  13. const (
  14. // AccessModeNone no access
  15. AccessModeNone AccessMode = iota // 0
  16. // AccessModeRead read access
  17. AccessModeRead // 1
  18. // AccessModeWrite write access
  19. AccessModeWrite // 2
  20. // AccessModeAdmin admin access
  21. AccessModeAdmin // 3
  22. // AccessModeOwner owner access
  23. AccessModeOwner // 4
  24. )
  25. func (mode AccessMode) String() string {
  26. switch mode {
  27. case AccessModeRead:
  28. return "read"
  29. case AccessModeWrite:
  30. return "write"
  31. case AccessModeAdmin:
  32. return "admin"
  33. case AccessModeOwner:
  34. return "owner"
  35. default:
  36. return "none"
  37. }
  38. }
  39. // ColorFormat provides a ColorFormatted version of this AccessMode
  40. func (mode AccessMode) ColorFormat(s fmt.State) {
  41. log.ColorFprintf(s, "%d:%s",
  42. log.NewColoredIDValue(mode),
  43. mode)
  44. }
  45. // ParseAccessMode returns corresponding access mode to given permission string.
  46. func ParseAccessMode(permission string) AccessMode {
  47. switch permission {
  48. case "write":
  49. return AccessModeWrite
  50. case "admin":
  51. return AccessModeAdmin
  52. default:
  53. return AccessModeRead
  54. }
  55. }
  56. // Access represents the highest access level of a user to the repository. The only access type
  57. // that is not in this table is the real owner of a repository. In case of an organization
  58. // repository, the members of the owners team are in this table.
  59. type Access struct {
  60. ID int64 `xorm:"pk autoincr"`
  61. UserID int64 `xorm:"UNIQUE(s)"`
  62. RepoID int64 `xorm:"UNIQUE(s)"`
  63. Mode AccessMode
  64. }
  65. func init() {
  66. db.RegisterModel(new(Access))
  67. }
  68. func accessLevel(e db.Engine, user *User, repo *Repository) (AccessMode, error) {
  69. mode := AccessModeNone
  70. var userID int64
  71. restricted := false
  72. if user != nil {
  73. userID = user.ID
  74. restricted = user.IsRestricted
  75. }
  76. if !restricted && !repo.IsPrivate {
  77. mode = AccessModeRead
  78. }
  79. if userID == 0 {
  80. return mode, nil
  81. }
  82. if userID == repo.OwnerID {
  83. return AccessModeOwner, nil
  84. }
  85. a := &Access{UserID: userID, RepoID: repo.ID}
  86. if has, err := e.Get(a); !has || err != nil {
  87. return mode, err
  88. }
  89. return a.Mode, nil
  90. }
  91. type repoAccess struct {
  92. Access `xorm:"extends"`
  93. Repository `xorm:"extends"`
  94. }
  95. func (repoAccess) TableName() string {
  96. return "access"
  97. }
  98. // GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
  99. func (user *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
  100. rows, err := db.GetEngine(db.DefaultContext).
  101. Join("INNER", "repository", "repository.id = access.repo_id").
  102. Where("access.user_id = ?", user.ID).
  103. And("repository.owner_id <> ?", user.ID).
  104. Rows(new(repoAccess))
  105. if err != nil {
  106. return nil, err
  107. }
  108. defer rows.Close()
  109. repos := make(map[*Repository]AccessMode, 10)
  110. ownerCache := make(map[int64]*User, 10)
  111. for rows.Next() {
  112. var repo repoAccess
  113. err = rows.Scan(&repo)
  114. if err != nil {
  115. return nil, err
  116. }
  117. var ok bool
  118. if repo.Owner, ok = ownerCache[repo.OwnerID]; !ok {
  119. if err = repo.GetOwner(); err != nil {
  120. return nil, err
  121. }
  122. ownerCache[repo.OwnerID] = repo.Owner
  123. }
  124. repos[&repo.Repository] = repo.Access.Mode
  125. }
  126. return repos, nil
  127. }
  128. // GetAccessibleRepositories finds repositories which the user has access but does not own.
  129. // If limit is smaller than 1 means returns all found results.
  130. func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
  131. sess := db.GetEngine(db.DefaultContext).
  132. Where("owner_id !=? ", user.ID).
  133. Desc("updated_unix")
  134. if limit > 0 {
  135. sess.Limit(limit)
  136. repos = make([]*Repository, 0, limit)
  137. } else {
  138. repos = make([]*Repository, 0, 10)
  139. }
  140. return repos, sess.
  141. Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).
  142. Find(&repos)
  143. }
  144. func maxAccessMode(modes ...AccessMode) AccessMode {
  145. max := AccessModeNone
  146. for _, mode := range modes {
  147. if mode > max {
  148. max = mode
  149. }
  150. }
  151. return max
  152. }
  153. type userAccess struct {
  154. User *User
  155. Mode AccessMode
  156. }
  157. // updateUserAccess updates an access map so that user has at least mode
  158. func updateUserAccess(accessMap map[int64]*userAccess, user *User, mode AccessMode) {
  159. if ua, ok := accessMap[user.ID]; ok {
  160. ua.Mode = maxAccessMode(ua.Mode, mode)
  161. } else {
  162. accessMap[user.ID] = &userAccess{User: user, Mode: mode}
  163. }
  164. }
  165. // FIXME: do cross-comparison so reduce deletions and additions to the minimum?
  166. func (repo *Repository) refreshAccesses(e db.Engine, accessMap map[int64]*userAccess) (err error) {
  167. minMode := AccessModeRead
  168. if !repo.IsPrivate {
  169. minMode = AccessModeWrite
  170. }
  171. newAccesses := make([]Access, 0, len(accessMap))
  172. for userID, ua := range accessMap {
  173. if ua.Mode < minMode && !ua.User.IsRestricted {
  174. continue
  175. }
  176. newAccesses = append(newAccesses, Access{
  177. UserID: userID,
  178. RepoID: repo.ID,
  179. Mode: ua.Mode,
  180. })
  181. }
  182. // Delete old accesses and insert new ones for repository.
  183. if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil {
  184. return fmt.Errorf("delete old accesses: %v", err)
  185. }
  186. if len(newAccesses) == 0 {
  187. return nil
  188. }
  189. if _, err = e.Insert(newAccesses); err != nil {
  190. return fmt.Errorf("insert new accesses: %v", err)
  191. }
  192. return nil
  193. }
  194. // refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
  195. func (repo *Repository) refreshCollaboratorAccesses(e db.Engine, accessMap map[int64]*userAccess) error {
  196. collaborators, err := repo.getCollaborators(e, db.ListOptions{})
  197. if err != nil {
  198. return fmt.Errorf("getCollaborations: %v", err)
  199. }
  200. for _, c := range collaborators {
  201. if c.User.IsGhost() {
  202. continue
  203. }
  204. updateUserAccess(accessMap, c.User, c.Collaboration.Mode)
  205. }
  206. return nil
  207. }
  208. // recalculateTeamAccesses recalculates new accesses for teams of an organization
  209. // except the team whose ID is given. It is used to assign a team ID when
  210. // remove repository from that team.
  211. func (repo *Repository) recalculateTeamAccesses(e db.Engine, ignTeamID int64) (err error) {
  212. accessMap := make(map[int64]*userAccess, 20)
  213. if err = repo.getOwner(e); err != nil {
  214. return err
  215. } else if !repo.Owner.IsOrganization() {
  216. return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
  217. }
  218. if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
  219. return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
  220. }
  221. teams, err := OrgFromUser(repo.Owner).loadTeams(e)
  222. if err != nil {
  223. return err
  224. }
  225. for _, t := range teams {
  226. if t.ID == ignTeamID {
  227. continue
  228. }
  229. // Owner team gets owner access, and skip for teams that do not
  230. // have relations with repository.
  231. if t.IsOwnerTeam() {
  232. t.Authorize = AccessModeOwner
  233. } else if !t.hasRepository(e, repo.ID) {
  234. continue
  235. }
  236. if err = t.getMembers(e); err != nil {
  237. return fmt.Errorf("getMembers '%d': %v", t.ID, err)
  238. }
  239. for _, m := range t.Members {
  240. updateUserAccess(accessMap, m, t.Authorize)
  241. }
  242. }
  243. return repo.refreshAccesses(e, accessMap)
  244. }
  245. // recalculateUserAccess recalculates new access for a single user
  246. // Usable if we know access only affected one user
  247. func (repo *Repository) recalculateUserAccess(e db.Engine, uid int64) (err error) {
  248. minMode := AccessModeRead
  249. if !repo.IsPrivate {
  250. minMode = AccessModeWrite
  251. }
  252. accessMode := AccessModeNone
  253. collaborator, err := repo.getCollaboration(e, uid)
  254. if err != nil {
  255. return err
  256. } else if collaborator != nil {
  257. accessMode = collaborator.Mode
  258. }
  259. if err = repo.getOwner(e); err != nil {
  260. return err
  261. } else if repo.Owner.IsOrganization() {
  262. var teams []Team
  263. if err := e.Join("INNER", "team_repo", "team_repo.team_id = team.id").
  264. Join("INNER", "team_user", "team_user.team_id = team.id").
  265. Where("team.org_id = ?", repo.OwnerID).
  266. And("team_repo.repo_id=?", repo.ID).
  267. And("team_user.uid=?", uid).
  268. Find(&teams); err != nil {
  269. return err
  270. }
  271. for _, t := range teams {
  272. if t.IsOwnerTeam() {
  273. t.Authorize = AccessModeOwner
  274. }
  275. accessMode = maxAccessMode(accessMode, t.Authorize)
  276. }
  277. }
  278. // Delete old user accesses and insert new one for repository.
  279. if _, err = e.Delete(&Access{RepoID: repo.ID, UserID: uid}); err != nil {
  280. return fmt.Errorf("delete old user accesses: %v", err)
  281. } else if accessMode >= minMode {
  282. if _, err = e.Insert(&Access{RepoID: repo.ID, UserID: uid, Mode: accessMode}); err != nil {
  283. return fmt.Errorf("insert new user accesses: %v", err)
  284. }
  285. }
  286. return nil
  287. }
  288. func (repo *Repository) recalculateAccesses(e db.Engine) error {
  289. if repo.Owner.IsOrganization() {
  290. return repo.recalculateTeamAccesses(e, 0)
  291. }
  292. accessMap := make(map[int64]*userAccess, 20)
  293. if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
  294. return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
  295. }
  296. return repo.refreshAccesses(e, accessMap)
  297. }
  298. // RecalculateAccesses recalculates all accesses for repository.
  299. func (repo *Repository) RecalculateAccesses() error {
  300. return repo.recalculateAccesses(db.GetEngine(db.DefaultContext))
  301. }