mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-25 17:44:32 +02:00 
			
		
		
		
	* Upgrade xorm to v1.0.0 * small nit * Fix tests * Update xorm * Update xorm * fix go.sum * fix test * Fix bug when dump * Fix bug * update xorm to latest * Fix migration test * update xorm to latest * Fix import order * Use xorm tag
		
			
				
	
	
		
			342 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			342 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2014 The Gogs Authors. All rights reserved.
 | |
| // Copyright 2019 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package models
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| )
 | |
| 
 | |
| // AccessMode specifies the users access mode
 | |
| type AccessMode int
 | |
| 
 | |
| const (
 | |
| 	// AccessModeNone no access
 | |
| 	AccessModeNone AccessMode = iota // 0
 | |
| 	// AccessModeRead read access
 | |
| 	AccessModeRead // 1
 | |
| 	// AccessModeWrite write access
 | |
| 	AccessModeWrite // 2
 | |
| 	// AccessModeAdmin admin access
 | |
| 	AccessModeAdmin // 3
 | |
| 	// AccessModeOwner owner access
 | |
| 	AccessModeOwner // 4
 | |
| )
 | |
| 
 | |
| func (mode AccessMode) String() string {
 | |
| 	switch mode {
 | |
| 	case AccessModeRead:
 | |
| 		return "read"
 | |
| 	case AccessModeWrite:
 | |
| 		return "write"
 | |
| 	case AccessModeAdmin:
 | |
| 		return "admin"
 | |
| 	case AccessModeOwner:
 | |
| 		return "owner"
 | |
| 	default:
 | |
| 		return "none"
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // ColorFormat provides a ColorFormatted version of this AccessMode
 | |
| func (mode AccessMode) ColorFormat(s fmt.State) {
 | |
| 	log.ColorFprintf(s, "%d:%s",
 | |
| 		log.NewColoredIDValue(mode),
 | |
| 		mode)
 | |
| }
 | |
| 
 | |
| // ParseAccessMode returns corresponding access mode to given permission string.
 | |
| func ParseAccessMode(permission string) AccessMode {
 | |
| 	switch permission {
 | |
| 	case "write":
 | |
| 		return AccessModeWrite
 | |
| 	case "admin":
 | |
| 		return AccessModeAdmin
 | |
| 	default:
 | |
| 		return AccessModeRead
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Access represents the highest access level of a user to the repository. The only access type
 | |
| // that is not in this table is the real owner of a repository. In case of an organization
 | |
| // repository, the members of the owners team are in this table.
 | |
| type Access struct {
 | |
| 	ID     int64 `xorm:"pk autoincr"`
 | |
| 	UserID int64 `xorm:"UNIQUE(s)"`
 | |
| 	RepoID int64 `xorm:"UNIQUE(s)"`
 | |
| 	Mode   AccessMode
 | |
| }
 | |
| 
 | |
| func accessLevel(e Engine, user *User, repo *Repository) (AccessMode, error) {
 | |
| 	mode := AccessModeNone
 | |
| 	var userID int64
 | |
| 	restricted := false
 | |
| 
 | |
| 	if user != nil {
 | |
| 		userID = user.ID
 | |
| 		restricted = user.IsRestricted
 | |
| 	}
 | |
| 
 | |
| 	if !restricted && !repo.IsPrivate {
 | |
| 		mode = AccessModeRead
 | |
| 	}
 | |
| 
 | |
| 	if userID == 0 {
 | |
| 		return mode, nil
 | |
| 	}
 | |
| 
 | |
| 	if userID == repo.OwnerID {
 | |
| 		return AccessModeOwner, nil
 | |
| 	}
 | |
| 
 | |
| 	a := &Access{UserID: userID, RepoID: repo.ID}
 | |
| 	if has, err := e.Get(a); !has || err != nil {
 | |
| 		return mode, err
 | |
| 	}
 | |
| 	return a.Mode, nil
 | |
| }
 | |
| 
 | |
| type repoAccess struct {
 | |
| 	Access     `xorm:"extends"`
 | |
| 	Repository `xorm:"extends"`
 | |
| }
 | |
| 
 | |
| func (repoAccess) TableName() string {
 | |
| 	return "access"
 | |
| }
 | |
| 
 | |
| // GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.
 | |
| func (user *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {
 | |
| 	rows, err := x.
 | |
| 		Join("INNER", "repository", "repository.id = access.repo_id").
 | |
| 		Where("access.user_id = ?", user.ID).
 | |
| 		And("repository.owner_id <> ?", user.ID).
 | |
| 		Rows(new(repoAccess))
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	defer rows.Close()
 | |
| 
 | |
| 	var repos = make(map[*Repository]AccessMode, 10)
 | |
| 	var ownerCache = make(map[int64]*User, 10)
 | |
| 	for rows.Next() {
 | |
| 		var repo repoAccess
 | |
| 		err = rows.Scan(&repo)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 
 | |
| 		var ok bool
 | |
| 		if repo.Owner, ok = ownerCache[repo.OwnerID]; !ok {
 | |
| 			if err = repo.GetOwner(); err != nil {
 | |
| 				return nil, err
 | |
| 			}
 | |
| 			ownerCache[repo.OwnerID] = repo.Owner
 | |
| 		}
 | |
| 
 | |
| 		repos[&repo.Repository] = repo.Access.Mode
 | |
| 	}
 | |
| 	return repos, nil
 | |
| }
 | |
| 
 | |
| // GetAccessibleRepositories finds repositories which the user has access but does not own.
 | |
| // If limit is smaller than 1 means returns all found results.
 | |
| func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {
 | |
| 	sess := x.
 | |
| 		Where("owner_id !=? ", user.ID).
 | |
| 		Desc("updated_unix")
 | |
| 	if limit > 0 {
 | |
| 		sess.Limit(limit)
 | |
| 		repos = make([]*Repository, 0, limit)
 | |
| 	} else {
 | |
| 		repos = make([]*Repository, 0, 10)
 | |
| 	}
 | |
| 	return repos, sess.
 | |
| 		Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).
 | |
| 		Find(&repos)
 | |
| }
 | |
| 
 | |
| func maxAccessMode(modes ...AccessMode) AccessMode {
 | |
| 	max := AccessModeNone
 | |
| 	for _, mode := range modes {
 | |
| 		if mode > max {
 | |
| 			max = mode
 | |
| 		}
 | |
| 	}
 | |
| 	return max
 | |
| }
 | |
| 
 | |
| type userAccess struct {
 | |
| 	User *User
 | |
| 	Mode AccessMode
 | |
| }
 | |
| 
 | |
| // updateUserAccess updates an access map so that user has at least mode
 | |
| func updateUserAccess(accessMap map[int64]*userAccess, user *User, mode AccessMode) {
 | |
| 	if ua, ok := accessMap[user.ID]; ok {
 | |
| 		ua.Mode = maxAccessMode(ua.Mode, mode)
 | |
| 	} else {
 | |
| 		accessMap[user.ID] = &userAccess{User: user, Mode: mode}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // FIXME: do cross-comparison so reduce deletions and additions to the minimum?
 | |
| func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]*userAccess) (err error) {
 | |
| 	minMode := AccessModeRead
 | |
| 	if !repo.IsPrivate {
 | |
| 		minMode = AccessModeWrite
 | |
| 	}
 | |
| 
 | |
| 	newAccesses := make([]Access, 0, len(accessMap))
 | |
| 	for userID, ua := range accessMap {
 | |
| 		if ua.Mode < minMode && !ua.User.IsRestricted {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		newAccesses = append(newAccesses, Access{
 | |
| 			UserID: userID,
 | |
| 			RepoID: repo.ID,
 | |
| 			Mode:   ua.Mode,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	// Delete old accesses and insert new ones for repository.
 | |
| 	if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil {
 | |
| 		return fmt.Errorf("delete old accesses: %v", err)
 | |
| 	}
 | |
| 	if len(newAccesses) == 0 {
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	if _, err = e.Insert(newAccesses); err != nil {
 | |
| 		return fmt.Errorf("insert new accesses: %v", err)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
 | |
| func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]*userAccess) error {
 | |
| 	collaborators, err := repo.getCollaborators(e, ListOptions{})
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("getCollaborations: %v", err)
 | |
| 	}
 | |
| 	for _, c := range collaborators {
 | |
| 		updateUserAccess(accessMap, c.User, c.Collaboration.Mode)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // recalculateTeamAccesses recalculates new accesses for teams of an organization
 | |
| // except the team whose ID is given. It is used to assign a team ID when
 | |
| // remove repository from that team.
 | |
| func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) {
 | |
| 	accessMap := make(map[int64]*userAccess, 20)
 | |
| 
 | |
| 	if err = repo.getOwner(e); err != nil {
 | |
| 		return err
 | |
| 	} else if !repo.Owner.IsOrganization() {
 | |
| 		return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
 | |
| 	}
 | |
| 
 | |
| 	if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
 | |
| 		return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = repo.Owner.getTeams(e); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	for _, t := range repo.Owner.Teams {
 | |
| 		if t.ID == ignTeamID {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Owner team gets owner access, and skip for teams that do not
 | |
| 		// have relations with repository.
 | |
| 		if t.IsOwnerTeam() {
 | |
| 			t.Authorize = AccessModeOwner
 | |
| 		} else if !t.hasRepository(e, repo.ID) {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if err = t.getMembers(e); err != nil {
 | |
| 			return fmt.Errorf("getMembers '%d': %v", t.ID, err)
 | |
| 		}
 | |
| 		for _, m := range t.Members {
 | |
| 			updateUserAccess(accessMap, m, t.Authorize)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return repo.refreshAccesses(e, accessMap)
 | |
| }
 | |
| 
 | |
| // recalculateUserAccess recalculates new access for a single user
 | |
| // Usable if we know access only affected one user
 | |
| func (repo *Repository) recalculateUserAccess(e Engine, uid int64) (err error) {
 | |
| 	minMode := AccessModeRead
 | |
| 	if !repo.IsPrivate {
 | |
| 		minMode = AccessModeWrite
 | |
| 	}
 | |
| 
 | |
| 	accessMode := AccessModeNone
 | |
| 	collaborator, err := repo.getCollaboration(e, uid)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	} else if collaborator != nil {
 | |
| 		accessMode = collaborator.Mode
 | |
| 	}
 | |
| 
 | |
| 	if err = repo.getOwner(e); err != nil {
 | |
| 		return err
 | |
| 	} else if repo.Owner.IsOrganization() {
 | |
| 		var teams []Team
 | |
| 		if err := e.Join("INNER", "team_repo", "team_repo.team_id = team.id").
 | |
| 			Join("INNER", "team_user", "team_user.team_id = team.id").
 | |
| 			Where("team.org_id = ?", repo.OwnerID).
 | |
| 			And("team_repo.repo_id=?", repo.ID).
 | |
| 			And("team_user.uid=?", uid).
 | |
| 			Find(&teams); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		for _, t := range teams {
 | |
| 			if t.IsOwnerTeam() {
 | |
| 				t.Authorize = AccessModeOwner
 | |
| 			}
 | |
| 
 | |
| 			accessMode = maxAccessMode(accessMode, t.Authorize)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Delete old user accesses and insert new one for repository.
 | |
| 	if _, err = e.Delete(&Access{RepoID: repo.ID, UserID: uid}); err != nil {
 | |
| 		return fmt.Errorf("delete old user accesses: %v", err)
 | |
| 	} else if accessMode >= minMode {
 | |
| 		if _, err = e.Insert(&Access{RepoID: repo.ID, UserID: uid, Mode: accessMode}); err != nil {
 | |
| 			return fmt.Errorf("insert new user accesses: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (repo *Repository) recalculateAccesses(e Engine) error {
 | |
| 	if repo.Owner.IsOrganization() {
 | |
| 		return repo.recalculateTeamAccesses(e, 0)
 | |
| 	}
 | |
| 
 | |
| 	accessMap := make(map[int64]*userAccess, 20)
 | |
| 	if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil {
 | |
| 		return fmt.Errorf("refreshCollaboratorAccesses: %v", err)
 | |
| 	}
 | |
| 	return repo.refreshAccesses(e, accessMap)
 | |
| }
 | |
| 
 | |
| // RecalculateAccesses recalculates all accesses for repository.
 | |
| func (repo *Repository) RecalculateAccesses() error {
 | |
| 	return repo.recalculateAccesses(x)
 | |
| }
 |