You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

repo_permission.go 9.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357
  1. // Copyright 2018 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. import (
  6. "fmt"
  7. "code.gitea.io/gitea/modules/log"
  8. )
  9. // Permission contains all the permissions related variables to a repository for a user
  10. type Permission struct {
  11. AccessMode AccessMode
  12. Units []*RepoUnit
  13. UnitsMode map[UnitType]AccessMode
  14. }
  15. // IsOwner returns true if current user is the owner of repository.
  16. func (p *Permission) IsOwner() bool {
  17. return p.AccessMode >= AccessModeOwner
  18. }
  19. // IsAdmin returns true if current user has admin or higher access of repository.
  20. func (p *Permission) IsAdmin() bool {
  21. return p.AccessMode >= AccessModeAdmin
  22. }
  23. // HasAccess returns true if the current user has at least read access to any unit of this repository
  24. func (p *Permission) HasAccess() bool {
  25. if p.UnitsMode == nil {
  26. return p.AccessMode >= AccessModeRead
  27. }
  28. return len(p.UnitsMode) > 0
  29. }
  30. // UnitAccessMode returns current user accessmode to the specify unit of the repository
  31. func (p *Permission) UnitAccessMode(unitType UnitType) AccessMode {
  32. if p.UnitsMode == nil {
  33. for _, u := range p.Units {
  34. if u.Type == unitType {
  35. return p.AccessMode
  36. }
  37. }
  38. return AccessModeNone
  39. }
  40. return p.UnitsMode[unitType]
  41. }
  42. // CanAccess returns true if user has mode access to the unit of the repository
  43. func (p *Permission) CanAccess(mode AccessMode, unitType UnitType) bool {
  44. return p.UnitAccessMode(unitType) >= mode
  45. }
  46. // CanAccessAny returns true if user has mode access to any of the units of the repository
  47. func (p *Permission) CanAccessAny(mode AccessMode, unitTypes ...UnitType) bool {
  48. for _, u := range unitTypes {
  49. if p.CanAccess(mode, u) {
  50. return true
  51. }
  52. }
  53. return false
  54. }
  55. // CanRead returns true if user could read to this unit
  56. func (p *Permission) CanRead(unitType UnitType) bool {
  57. return p.CanAccess(AccessModeRead, unitType)
  58. }
  59. // CanReadAny returns true if user has read access to any of the units of the repository
  60. func (p *Permission) CanReadAny(unitTypes ...UnitType) bool {
  61. return p.CanAccessAny(AccessModeRead, unitTypes...)
  62. }
  63. // CanReadIssuesOrPulls returns true if isPull is true and user could read pull requests and
  64. // returns true if isPull is false and user could read to issues
  65. func (p *Permission) CanReadIssuesOrPulls(isPull bool) bool {
  66. if isPull {
  67. return p.CanRead(UnitTypePullRequests)
  68. }
  69. return p.CanRead(UnitTypeIssues)
  70. }
  71. // CanWrite returns true if user could write to this unit
  72. func (p *Permission) CanWrite(unitType UnitType) bool {
  73. return p.CanAccess(AccessModeWrite, unitType)
  74. }
  75. // CanWriteIssuesOrPulls returns true if isPull is true and user could write to pull requests and
  76. // returns true if isPull is false and user could write to issues
  77. func (p *Permission) CanWriteIssuesOrPulls(isPull bool) bool {
  78. if isPull {
  79. return p.CanWrite(UnitTypePullRequests)
  80. }
  81. return p.CanWrite(UnitTypeIssues)
  82. }
  83. // ColorFormat writes a colored string for these Permissions
  84. func (p *Permission) ColorFormat(s fmt.State) {
  85. noColor := log.ColorBytes(log.Reset)
  86. format := "AccessMode: %-v, %d Units, %d UnitsMode(s): [ "
  87. args := []interface{}{
  88. p.AccessMode,
  89. log.NewColoredValueBytes(len(p.Units), &noColor),
  90. log.NewColoredValueBytes(len(p.UnitsMode), &noColor),
  91. }
  92. if s.Flag('+') {
  93. for i, unit := range p.Units {
  94. config := ""
  95. if unit.Config != nil {
  96. configBytes, err := unit.Config.ToDB()
  97. config = string(configBytes)
  98. if err != nil {
  99. config = err.Error()
  100. }
  101. }
  102. format += "\nUnits[%d]: ID: %d RepoID: %d Type: %-v Config: %s"
  103. args = append(args,
  104. log.NewColoredValueBytes(i, &noColor),
  105. log.NewColoredIDValue(unit.ID),
  106. log.NewColoredIDValue(unit.RepoID),
  107. unit.Type,
  108. config)
  109. }
  110. for key, value := range p.UnitsMode {
  111. format += "\nUnitMode[%-v]: %-v"
  112. args = append(args,
  113. key,
  114. value)
  115. }
  116. } else {
  117. format += "..."
  118. }
  119. format += " ]"
  120. log.ColorFprintf(s, format, args...)
  121. }
  122. // GetUserRepoPermission returns the user permissions to the repository
  123. func GetUserRepoPermission(repo *Repository, user *User) (Permission, error) {
  124. return getUserRepoPermission(x, repo, user)
  125. }
  126. func getUserRepoPermission(e Engine, repo *Repository, user *User) (perm Permission, err error) {
  127. if log.IsTrace() {
  128. defer func() {
  129. if user == nil {
  130. log.Trace("Permission Loaded for anonymous user in %-v:\nPermissions: %-+v",
  131. repo,
  132. perm)
  133. return
  134. }
  135. log.Trace("Permission Loaded for %-v in %-v:\nPermissions: %-+v",
  136. user,
  137. repo,
  138. perm)
  139. }()
  140. }
  141. // anonymous user visit private repo.
  142. // TODO: anonymous user visit public unit of private repo???
  143. if user == nil && repo.IsPrivate {
  144. perm.AccessMode = AccessModeNone
  145. return
  146. }
  147. if repo.Owner == nil {
  148. repo.mustOwner(e)
  149. }
  150. var isCollaborator bool
  151. if user != nil {
  152. isCollaborator, err = repo.isCollaborator(e, user.ID)
  153. if err != nil {
  154. return perm, err
  155. }
  156. }
  157. // Prevent strangers from checking out public repo of private orginization
  158. // Allow user if they are collaborator of a repo within a private orginization but not a member of the orginization itself
  159. if repo.Owner.IsOrganization() && !HasOrgVisible(repo.Owner, user) && !isCollaborator {
  160. perm.AccessMode = AccessModeNone
  161. return
  162. }
  163. if err = repo.getUnits(e); err != nil {
  164. return
  165. }
  166. perm.Units = repo.Units
  167. // anonymous visit public repo
  168. if user == nil {
  169. perm.AccessMode = AccessModeRead
  170. return
  171. }
  172. // Admin or the owner has super access to the repository
  173. if user.IsAdmin || user.ID == repo.OwnerID {
  174. perm.AccessMode = AccessModeOwner
  175. return
  176. }
  177. // plain user
  178. perm.AccessMode, err = accessLevel(e, user.ID, repo)
  179. if err != nil {
  180. return
  181. }
  182. if err = repo.getOwner(e); err != nil {
  183. return
  184. }
  185. if !repo.Owner.IsOrganization() {
  186. return
  187. }
  188. perm.UnitsMode = make(map[UnitType]AccessMode)
  189. // Collaborators on organization
  190. if isCollaborator {
  191. for _, u := range repo.Units {
  192. perm.UnitsMode[u.Type] = perm.AccessMode
  193. }
  194. }
  195. // get units mode from teams
  196. teams, err := getUserRepoTeams(e, repo.OwnerID, user.ID, repo.ID)
  197. if err != nil {
  198. return
  199. }
  200. // if user in an owner team
  201. for _, team := range teams {
  202. if team.Authorize >= AccessModeOwner {
  203. perm.AccessMode = AccessModeOwner
  204. perm.UnitsMode = nil
  205. return
  206. }
  207. }
  208. for _, u := range repo.Units {
  209. var found bool
  210. for _, team := range teams {
  211. if team.unitEnabled(e, u.Type) {
  212. m := perm.UnitsMode[u.Type]
  213. if m < team.Authorize {
  214. perm.UnitsMode[u.Type] = team.Authorize
  215. }
  216. found = true
  217. }
  218. }
  219. // for a public repo on an organization, user have read permission on non-team defined units.
  220. if !found && !repo.IsPrivate {
  221. if _, ok := perm.UnitsMode[u.Type]; !ok {
  222. perm.UnitsMode[u.Type] = AccessModeRead
  223. }
  224. }
  225. }
  226. // remove no permission units
  227. perm.Units = make([]*RepoUnit, 0, len(repo.Units))
  228. for t := range perm.UnitsMode {
  229. for _, u := range repo.Units {
  230. if u.Type == t {
  231. perm.Units = append(perm.Units, u)
  232. }
  233. }
  234. }
  235. return
  236. }
  237. // IsUserRepoAdmin return ture if user has admin right of a repo
  238. func IsUserRepoAdmin(repo *Repository, user *User) (bool, error) {
  239. return isUserRepoAdmin(x, repo, user)
  240. }
  241. func isUserRepoAdmin(e Engine, repo *Repository, user *User) (bool, error) {
  242. if user == nil || repo == nil {
  243. return false, nil
  244. }
  245. if user.IsAdmin {
  246. return true, nil
  247. }
  248. mode, err := accessLevel(e, user.ID, repo)
  249. if err != nil {
  250. return false, err
  251. }
  252. if mode >= AccessModeAdmin {
  253. return true, nil
  254. }
  255. teams, err := getUserRepoTeams(e, repo.OwnerID, user.ID, repo.ID)
  256. if err != nil {
  257. return false, err
  258. }
  259. for _, team := range teams {
  260. if team.Authorize >= AccessModeAdmin {
  261. return true, nil
  262. }
  263. }
  264. return false, nil
  265. }
  266. // AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
  267. // user does not have access.
  268. func AccessLevel(user *User, repo *Repository) (AccessMode, error) {
  269. return accessLevelUnit(x, user, repo, UnitTypeCode)
  270. }
  271. func accessLevelUnit(e Engine, user *User, repo *Repository, unitType UnitType) (AccessMode, error) {
  272. perm, err := getUserRepoPermission(e, repo, user)
  273. if err != nil {
  274. return AccessModeNone, err
  275. }
  276. return perm.UnitAccessMode(unitType), nil
  277. }
  278. func hasAccessUnit(e Engine, user *User, repo *Repository, unitType UnitType, testMode AccessMode) (bool, error) {
  279. mode, err := accessLevelUnit(e, user, repo, unitType)
  280. return testMode <= mode, err
  281. }
  282. // HasAccessUnit returns ture if user has testMode to the unit of the repository
  283. func HasAccessUnit(user *User, repo *Repository, unitType UnitType, testMode AccessMode) (bool, error) {
  284. return hasAccessUnit(x, user, repo, unitType, testMode)
  285. }
  286. // canBeAssigned return true if user could be assigned to a repo
  287. // FIXME: user could send PullRequest also could be assigned???
  288. func canBeAssigned(e Engine, user *User, repo *Repository) (bool, error) {
  289. return hasAccessUnit(e, user, repo, UnitTypeCode, AccessModeWrite)
  290. }
  291. func hasAccess(e Engine, userID int64, repo *Repository) (bool, error) {
  292. var user *User
  293. var err error
  294. if userID > 0 {
  295. user, err = getUserByID(e, userID)
  296. if err != nil {
  297. return false, err
  298. }
  299. }
  300. perm, err := getUserRepoPermission(e, repo, user)
  301. if err != nil {
  302. return false, err
  303. }
  304. return perm.HasAccess(), nil
  305. }
  306. // HasAccess returns true if user has access to repo
  307. func HasAccess(userID int64, repo *Repository) (bool, error) {
  308. return hasAccess(x, userID, repo)
  309. }