123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package models
- import (
- "fmt"
- "github.com/gogits/gogs/modules/log"
- )
- type AccessMode int
- const (
- ACCESS_MODE_NONE AccessMode = iota // 0
- ACCESS_MODE_READ // 1
- ACCESS_MODE_WRITE // 2
- ACCESS_MODE_ADMIN // 3
- ACCESS_MODE_OWNER // 4
- )
- func (mode AccessMode) String() string {
- switch mode {
- case ACCESS_MODE_READ:
- return "read"
- case ACCESS_MODE_WRITE:
- return "write"
- case ACCESS_MODE_ADMIN:
- return "admin"
- case ACCESS_MODE_OWNER:
- return "owner"
- default:
- return "none"
- }
- }
- // ParseAccessMode returns corresponding access mode to given permission string.
- func ParseAccessMode(permission string) AccessMode {
- switch permission {
- case "write":
- return ACCESS_MODE_WRITE
- case "admin":
- return ACCESS_MODE_ADMIN
- default:
- return ACCESS_MODE_READ
- }
- }
- // Access represents the highest access level of a user to the repository. The only access type
- // that is not in this table is the real owner of a repository. In case of an organization
- // repository, the members of the owners team are in this table.
- type Access struct {
- ID int64 `xorm:"pk autoincr"`
- UserID int64 `xorm:"UNIQUE(s)"`
- RepoID int64 `xorm:"UNIQUE(s)"`
- Mode AccessMode
- }
- func accessLevel(e Engine, u *User, repo *Repository) (AccessMode, error) {
- mode := ACCESS_MODE_NONE
- if !repo.IsPrivate {
- mode = ACCESS_MODE_READ
- }
- if u == nil {
- return mode, nil
- }
- if u.ID == repo.OwnerID {
- return ACCESS_MODE_OWNER, nil
- }
- a := &Access{UserID: u.ID, RepoID: repo.ID}
- if has, err := e.Get(a); !has || err != nil {
- return mode, err
- }
- return a.Mode, nil
- }
- // AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
- // user does not have access. User can be nil!
- func AccessLevel(u *User, repo *Repository) (AccessMode, error) {
- return accessLevel(x, u, repo)
- }
- func hasAccess(e Engine, u *User, repo *Repository, testMode AccessMode) (bool, error) {
- mode, err := accessLevel(e, u, repo)
- return testMode <= mode, err
- }
- // HasAccess returns true if someone has the request access level. User can be nil!
- func HasAccess(u *User, repo *Repository, testMode AccessMode) (bool, error) {
- return hasAccess(x, u, repo, testMode)
- }
- // GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
- func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
- accesses := make([]*Access, 0, 10)
- if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {
- return nil, err
- }
- repos := make(map[*Repository]AccessMode, len(accesses))
- for _, access := range accesses {
- repo, err := GetRepositoryByID(access.RepoID)
- if err != nil {
- if IsErrRepoNotExist(err) {
- log.Error(4, "GetRepositoryByID: %v", err)
- continue
- }
- return nil, err
- }
- if err = repo.GetOwner(); err != nil {
- return nil, err
- } else if repo.OwnerID == u.ID {
- continue
- }
- repos[repo] = access.Mode
- }
- return repos, nil
- }
- // GetAccessibleRepositories finds repositories which the user has access but does not own.
- // If limit is smaller than 1 means returns all found results.
- func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
- sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix")
- if limit > 0 {
- sess.Limit(limit)
- repos = make([]*Repository, 0, limit)
- } else {
- repos = make([]*Repository, 0, 10)
- }
- return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos)
- }
- func maxAccessMode(modes ...AccessMode) AccessMode {
- max := ACCESS_MODE_NONE
- for _, mode := range modes {
- if mode > max {
- max = mode
- }
- }
- return max
- }
- // FIXME: do corss-comparison so reduce deletions and additions to the minimum?
- func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]AccessMode) (err error) {
- minMode := ACCESS_MODE_READ
- if !repo.IsPrivate {
- minMode = ACCESS_MODE_WRITE
- }
- newAccesses := make([]Access, 0, len(accessMap))
- for userID, mode := range accessMap {
- if mode < minMode {
- continue
- }
- newAccesses = append(newAccesses, Access{
- UserID: userID,
- RepoID: repo.ID,
- Mode: mode,
- })
- }
- // Delete old accesses and insert new ones for repository.
- if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil {
- return fmt.Errorf("delete old accesses: %v", err)
- } else if _, err = e.Insert(newAccesses); err != nil {
- return fmt.Errorf("insert new accesses: %v", err)
- }
- return nil
- }
- // refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
- func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]AccessMode) error {
- collaborations, err := repo.getCollaborations(e)
- if err != nil {
- return fmt.Errorf("getCollaborations: %v", err)
- }
- for _, c := range collaborations {
- accessMap[c.UserID] = c.Mode
- }
- return nil
- }
- // recalculateTeamAccesses recalculates new accesses for teams of an organization
- // except the team whose ID is given. It is used to assign a team ID when
- // remove repository from that team.
- func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) {
- accessMap := make(map[int64]AccessMode, 20)
- if err = repo.getOwner(e); err != nil {
- return err
- } else if !repo.Owner.IsOrganization() {
- return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
- }
- if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
- return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
- }
- if err = repo.Owner.getTeams(e); err != nil {
- return err
- }
- for _, t := range repo.Owner.Teams {
- if t.ID == ignTeamID {
- continue
- }
- // Owner team gets owner access, and skip for teams that do not
- // have relations with repository.
- if t.IsOwnerTeam() {
- t.Authorize = ACCESS_MODE_OWNER
- } else if !t.hasRepository(e, repo.ID) {
- continue
- }
- if err = t.getMembers(e); err != nil {
- return fmt.Errorf("getMembers '%d': %v", t.ID, err)
- }
- for _, m := range t.Members {
- accessMap[m.ID] = maxAccessMode(accessMap[m.ID], t.Authorize)
- }
- }
- return repo.refreshAccesses(e, accessMap)
- }
- func (repo *Repository) recalculateAccesses(e Engine) error {
- if repo.Owner.IsOrganization() {
- return repo.recalculateTeamAccesses(e, 0)
- }
- accessMap := make(map[int64]AccessMode, 20)
- if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
- return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
- }
- return repo.refreshAccesses(e, accessMap)
- }
- // RecalculateAccesses recalculates all accesses for repository.
- func (r *Repository) RecalculateAccesses() error {
- return r.recalculateAccesses(x)
- }
|