2014-02-17 18:38:50 -05:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2014-02-17 10:57:23 -05:00
|
|
|
package models
|
|
|
|
|
2015-02-24 00:27:22 -05:00
|
|
|
import (
|
|
|
|
"fmt"
|
2015-03-16 03:04:27 -05:00
|
|
|
|
2016-11-03 07:29:56 -05:00
|
|
|
"github.com/go-gitea/gitea/modules/log"
|
2015-02-24 00:27:22 -05:00
|
|
|
)
|
|
|
|
|
2015-02-05 08:29:08 -05:00
|
|
|
type AccessMode int
|
2014-06-24 23:44:48 -05:00
|
|
|
|
2014-02-17 10:57:23 -05:00
|
|
|
const (
|
2016-11-07 11:20:37 -05:00
|
|
|
AccessModeNone AccessMode = iota // 0
|
|
|
|
AccessModeRead // 1
|
|
|
|
AccessModeWrite // 2
|
|
|
|
AccessModeAdmin // 3
|
|
|
|
AccessModeOwner // 4
|
2014-02-17 10:57:23 -05:00
|
|
|
)
|
|
|
|
|
2016-03-21 11:47:54 -05:00
|
|
|
func (mode AccessMode) String() string {
|
|
|
|
switch mode {
|
2016-11-07 11:20:37 -05:00
|
|
|
case AccessModeRead:
|
2016-03-21 11:47:54 -05:00
|
|
|
return "read"
|
2016-11-07 11:20:37 -05:00
|
|
|
case AccessModeWrite:
|
2016-03-21 11:47:54 -05:00
|
|
|
return "write"
|
2016-11-07 11:20:37 -05:00
|
|
|
case AccessModeAdmin:
|
2016-03-21 11:47:54 -05:00
|
|
|
return "admin"
|
2016-11-07 11:20:37 -05:00
|
|
|
case AccessModeOwner:
|
2016-03-21 11:47:54 -05:00
|
|
|
return "owner"
|
|
|
|
default:
|
|
|
|
return "none"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ParseAccessMode returns corresponding access mode to given permission string.
|
|
|
|
func ParseAccessMode(permission string) AccessMode {
|
|
|
|
switch permission {
|
|
|
|
case "write":
|
2016-11-07 11:20:37 -05:00
|
|
|
return AccessModeWrite
|
2016-03-21 11:47:54 -05:00
|
|
|
case "admin":
|
2016-11-07 11:20:37 -05:00
|
|
|
return AccessModeAdmin
|
2016-03-21 11:47:54 -05:00
|
|
|
default:
|
2016-11-07 11:20:37 -05:00
|
|
|
return AccessModeRead
|
2016-03-21 11:47:54 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-05 08:29:08 -05:00
|
|
|
// Access represents the highest access level of a user to the repository. The only access type
|
|
|
|
// that is not in this table is the real owner of a repository. In case of an organization
|
|
|
|
// repository, the members of the owners team are in this table.
|
|
|
|
type Access struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
UserID int64 `xorm:"UNIQUE(s)"`
|
|
|
|
RepoID int64 `xorm:"UNIQUE(s)"`
|
|
|
|
Mode AccessMode
|
2014-02-17 10:57:23 -05:00
|
|
|
}
|
|
|
|
|
2015-02-23 02:15:53 -05:00
|
|
|
func accessLevel(e Engine, u *User, repo *Repository) (AccessMode, error) {
|
2016-11-07 11:20:37 -05:00
|
|
|
mode := AccessModeNone
|
2015-02-23 02:15:53 -05:00
|
|
|
if !repo.IsPrivate {
|
2016-11-07 11:20:37 -05:00
|
|
|
mode = AccessModeRead
|
2015-02-11 21:58:37 -05:00
|
|
|
}
|
2014-05-01 10:32:12 -05:00
|
|
|
|
2015-11-19 11:40:00 -05:00
|
|
|
if u == nil {
|
|
|
|
return mode, nil
|
|
|
|
}
|
2014-04-04 17:55:17 -05:00
|
|
|
|
2016-07-23 12:08:22 -05:00
|
|
|
if u.ID == repo.OwnerID {
|
2016-11-07 11:20:37 -05:00
|
|
|
return AccessModeOwner, nil
|
2014-04-11 20:47:39 -05:00
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2016-07-23 12:08:22 -05:00
|
|
|
a := &Access{UserID: u.ID, RepoID: repo.ID}
|
2015-11-19 11:40:00 -05:00
|
|
|
if has, err := e.Get(a); !has || err != nil {
|
|
|
|
return mode, err
|
|
|
|
}
|
|
|
|
return a.Mode, nil
|
2014-02-17 10:57:23 -05:00
|
|
|
}
|
2015-01-23 02:54:16 -05:00
|
|
|
|
2015-02-23 02:15:53 -05:00
|
|
|
// AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
|
|
|
|
// user does not have access. User can be nil!
|
|
|
|
func AccessLevel(u *User, repo *Repository) (AccessMode, error) {
|
|
|
|
return accessLevel(x, u, repo)
|
|
|
|
}
|
|
|
|
|
|
|
|
func hasAccess(e Engine, u *User, repo *Repository, testMode AccessMode) (bool, error) {
|
|
|
|
mode, err := accessLevel(e, u, repo)
|
2015-02-13 00:58:46 -05:00
|
|
|
return testMode <= mode, err
|
|
|
|
}
|
|
|
|
|
2015-02-23 02:15:53 -05:00
|
|
|
// HasAccess returns true if someone has the request access level. User can be nil!
|
|
|
|
func HasAccess(u *User, repo *Repository, testMode AccessMode) (bool, error) {
|
|
|
|
return hasAccess(x, u, repo, testMode)
|
|
|
|
}
|
|
|
|
|
2015-11-13 17:37:02 -05:00
|
|
|
// GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
|
|
|
|
func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
|
2015-01-23 02:54:16 -05:00
|
|
|
accesses := make([]*Access, 0, 10)
|
2016-07-23 12:08:22 -05:00
|
|
|
if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {
|
2015-01-23 02:54:16 -05:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-02-05 08:29:08 -05:00
|
|
|
repos := make(map[*Repository]AccessMode, len(accesses))
|
2015-01-23 02:54:16 -05:00
|
|
|
for _, access := range accesses {
|
2015-08-08 09:43:14 -05:00
|
|
|
repo, err := GetRepositoryByID(access.RepoID)
|
2015-01-23 02:54:16 -05:00
|
|
|
if err != nil {
|
2015-03-16 03:04:27 -05:00
|
|
|
if IsErrRepoNotExist(err) {
|
2015-11-13 17:37:02 -05:00
|
|
|
log.Error(4, "GetRepositoryByID: %v", err)
|
2015-03-16 03:04:27 -05:00
|
|
|
continue
|
|
|
|
}
|
2015-01-23 02:54:16 -05:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-02-11 21:58:37 -05:00
|
|
|
if err = repo.GetOwner(); err != nil {
|
2015-02-04 09:08:55 -05:00
|
|
|
return nil, err
|
2016-07-23 12:08:22 -05:00
|
|
|
} else if repo.OwnerID == u.ID {
|
2015-02-11 21:58:37 -05:00
|
|
|
continue
|
2015-02-04 09:08:55 -05:00
|
|
|
}
|
2015-01-23 02:54:16 -05:00
|
|
|
repos[repo] = access.Mode
|
|
|
|
}
|
|
|
|
return repos, nil
|
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2016-07-24 01:32:46 -05:00
|
|
|
// GetAccessibleRepositories finds repositories which the user has access but does not own.
|
|
|
|
// If limit is smaller than 1 means returns all found results.
|
|
|
|
func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
|
2016-11-10 10:16:32 -05:00
|
|
|
sess := x.
|
|
|
|
Where("owner_id !=? ", user.ID).
|
|
|
|
Desc("updated_unix")
|
2016-07-24 01:32:46 -05:00
|
|
|
if limit > 0 {
|
|
|
|
sess.Limit(limit)
|
|
|
|
repos = make([]*Repository, 0, limit)
|
|
|
|
} else {
|
|
|
|
repos = make([]*Repository, 0, 10)
|
2015-11-13 17:37:02 -05:00
|
|
|
}
|
2016-11-10 10:16:32 -05:00
|
|
|
return repos, sess.
|
|
|
|
Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).
|
|
|
|
Find(&repos)
|
2015-11-13 17:37:02 -05:00
|
|
|
}
|
|
|
|
|
2015-02-13 00:58:46 -05:00
|
|
|
func maxAccessMode(modes ...AccessMode) AccessMode {
|
2016-11-07 11:20:37 -05:00
|
|
|
max := AccessModeNone
|
2015-02-13 00:58:46 -05:00
|
|
|
for _, mode := range modes {
|
|
|
|
if mode > max {
|
|
|
|
max = mode
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return max
|
|
|
|
}
|
|
|
|
|
2015-02-28 21:44:09 -05:00
|
|
|
// FIXME: do corss-comparison so reduce deletions and additions to the minimum?
|
|
|
|
func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]AccessMode) (err error) {
|
2016-11-07 11:20:37 -05:00
|
|
|
minMode := AccessModeRead
|
2015-02-28 21:44:09 -05:00
|
|
|
if !repo.IsPrivate {
|
2016-11-07 11:20:37 -05:00
|
|
|
minMode = AccessModeWrite
|
2015-02-28 21:44:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
newAccesses := make([]Access, 0, len(accessMap))
|
|
|
|
for userID, mode := range accessMap {
|
|
|
|
if mode < minMode {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
newAccesses = append(newAccesses, Access{
|
|
|
|
UserID: userID,
|
2015-08-08 09:43:14 -05:00
|
|
|
RepoID: repo.ID,
|
2015-02-28 21:44:09 -05:00
|
|
|
Mode: mode,
|
|
|
|
})
|
|
|
|
}
|
2015-02-13 02:56:42 -05:00
|
|
|
|
2015-02-28 21:44:09 -05:00
|
|
|
// Delete old accesses and insert new ones for repository.
|
2015-08-08 09:43:14 -05:00
|
|
|
if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil {
|
2015-02-28 21:44:09 -05:00
|
|
|
return fmt.Errorf("delete old accesses: %v", err)
|
|
|
|
} else if _, err = e.Insert(newAccesses); err != nil {
|
|
|
|
return fmt.Errorf("insert new accesses: %v", err)
|
|
|
|
}
|
2015-02-13 02:56:42 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-05 18:08:42 -05:00
|
|
|
// refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
|
2015-02-28 21:44:09 -05:00
|
|
|
func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]AccessMode) error {
|
2016-03-05 18:08:42 -05:00
|
|
|
collaborations, err := repo.getCollaborations(e)
|
2015-02-05 08:29:08 -05:00
|
|
|
if err != nil {
|
2016-03-05 18:08:42 -05:00
|
|
|
return fmt.Errorf("getCollaborations: %v", err)
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|
2016-03-05 18:08:42 -05:00
|
|
|
for _, c := range collaborations {
|
|
|
|
accessMap[c.UserID] = c.Mode
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|
2015-02-28 21:44:09 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// recalculateTeamAccesses recalculates new accesses for teams of an organization
|
|
|
|
// except the team whose ID is given. It is used to assign a team ID when
|
|
|
|
// remove repository from that team.
|
|
|
|
func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) {
|
|
|
|
accessMap := make(map[int64]AccessMode, 20)
|
|
|
|
|
|
|
|
if err = repo.getOwner(e); err != nil {
|
2015-02-05 08:29:08 -05:00
|
|
|
return err
|
2015-08-28 00:51:15 -05:00
|
|
|
} else if !repo.Owner.IsOrganization() {
|
|
|
|
return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|
2015-08-28 00:51:15 -05:00
|
|
|
|
2015-07-24 03:52:01 -05:00
|
|
|
if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
|
|
|
|
return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
|
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2015-08-28 00:51:15 -05:00
|
|
|
if err = repo.Owner.getTeams(e); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-24 17:14:04 -05:00
|
|
|
|
2015-08-28 00:51:15 -05:00
|
|
|
for _, t := range repo.Owner.Teams {
|
|
|
|
if t.ID == ignTeamID {
|
|
|
|
continue
|
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2015-08-28 00:51:15 -05:00
|
|
|
// Owner team gets owner access, and skip for teams that do not
|
|
|
|
// have relations with repository.
|
|
|
|
if t.IsOwnerTeam() {
|
2016-11-07 11:20:37 -05:00
|
|
|
t.Authorize = AccessModeOwner
|
2015-08-28 00:51:15 -05:00
|
|
|
} else if !t.hasRepository(e, repo.ID) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = t.getMembers(e); err != nil {
|
|
|
|
return fmt.Errorf("getMembers '%d': %v", t.ID, err)
|
|
|
|
}
|
|
|
|
for _, m := range t.Members {
|
2016-07-23 12:08:22 -05:00
|
|
|
accessMap[m.ID] = maxAccessMode(accessMap[m.ID], t.Authorize)
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-28 21:44:09 -05:00
|
|
|
return repo.refreshAccesses(e, accessMap)
|
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2015-02-28 21:44:09 -05:00
|
|
|
func (repo *Repository) recalculateAccesses(e Engine) error {
|
2015-08-28 00:51:15 -05:00
|
|
|
if repo.Owner.IsOrganization() {
|
|
|
|
return repo.recalculateTeamAccesses(e, 0)
|
|
|
|
}
|
|
|
|
|
2015-02-28 21:44:09 -05:00
|
|
|
accessMap := make(map[int64]AccessMode, 20)
|
|
|
|
if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
|
|
|
|
return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|
2015-02-28 21:44:09 -05:00
|
|
|
return repo.refreshAccesses(e, accessMap)
|
2015-02-13 00:58:46 -05:00
|
|
|
}
|
2015-02-05 08:29:08 -05:00
|
|
|
|
2015-02-13 00:58:46 -05:00
|
|
|
// RecalculateAccesses recalculates all accesses for repository.
|
|
|
|
func (r *Repository) RecalculateAccesses() error {
|
|
|
|
return r.recalculateAccesses(x)
|
2015-02-05 08:29:08 -05:00
|
|
|
}
|