2014-02-18 03:38:50 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
2019-04-22 23:40:51 +03:00
// Copyright 2019 The Gitea Authors. All rights reserved.
2014-02-18 03:38:50 +04:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-02-17 19:57:23 +04:00
package models
2019-04-22 23:40:51 +03:00
import (
"fmt"
2021-09-19 14:49:59 +03:00
"code.gitea.io/gitea/models/db"
2021-11-24 12:49:20 +03:00
user_model "code.gitea.io/gitea/models/user"
2019-04-22 23:40:51 +03:00
"code.gitea.io/gitea/modules/log"
)
2015-02-24 08:27:22 +03:00
2016-11-26 03:07:57 +03:00
// AccessMode specifies the users access mode
2015-02-05 16:29:08 +03:00
type AccessMode int
2014-06-25 08:44:48 +04:00
2014-02-17 19:57:23 +04:00
const (
2016-11-26 03:07:57 +03:00
// AccessModeNone no access
AccessModeNone AccessMode = iota // 0
// AccessModeRead read access
AccessModeRead // 1
// AccessModeWrite write access
AccessModeWrite // 2
// AccessModeAdmin admin access
AccessModeAdmin // 3
// AccessModeOwner owner access
AccessModeOwner // 4
2014-02-17 19:57:23 +04:00
)
2016-03-21 19:47:54 +03:00
func ( mode AccessMode ) String ( ) string {
switch mode {
2016-11-07 19:20:37 +03:00
case AccessModeRead :
2016-03-21 19:47:54 +03:00
return "read"
2016-11-07 19:20:37 +03:00
case AccessModeWrite :
2016-03-21 19:47:54 +03:00
return "write"
2016-11-07 19:20:37 +03:00
case AccessModeAdmin :
2016-03-21 19:47:54 +03:00
return "admin"
2016-11-07 19:20:37 +03:00
case AccessModeOwner :
2016-03-21 19:47:54 +03:00
return "owner"
default :
return "none"
}
}
2019-04-22 23:40:51 +03:00
// ColorFormat provides a ColorFormatted version of this AccessMode
func ( mode AccessMode ) ColorFormat ( s fmt . State ) {
log . ColorFprintf ( s , "%d:%s" ,
log . NewColoredIDValue ( mode ) ,
mode )
}
2016-03-21 19:47:54 +03:00
// ParseAccessMode returns corresponding access mode to given permission string.
func ParseAccessMode ( permission string ) AccessMode {
switch permission {
case "write" :
2016-11-07 19:20:37 +03:00
return AccessModeWrite
2016-03-21 19:47:54 +03:00
case "admin" :
2016-11-07 19:20:37 +03:00
return AccessModeAdmin
2016-03-21 19:47:54 +03:00
default :
2016-11-07 19:20:37 +03:00
return AccessModeRead
2016-03-21 19:47:54 +03:00
}
}
2015-02-05 16:29:08 +03:00
// Access represents the highest access level of a user to the repository. The only access type
// that is not in this table is the real owner of a repository. In case of an organization
// repository, the members of the owners team are in this table.
type Access struct {
ID int64 ` xorm:"pk autoincr" `
UserID int64 ` xorm:"UNIQUE(s)" `
RepoID int64 ` xorm:"UNIQUE(s)" `
Mode AccessMode
2014-02-17 19:57:23 +04:00
}
2021-09-19 14:49:59 +03:00
func init ( ) {
db . RegisterModel ( new ( Access ) )
}
2021-11-24 12:49:20 +03:00
func accessLevel ( e db . Engine , user * user_model . User , repo * Repository ) ( AccessMode , error ) {
2016-11-07 19:20:37 +03:00
mode := AccessModeNone
2020-01-13 20:33:46 +03:00
var userID int64
restricted := false
if user != nil {
userID = user . ID
restricted = user . IsRestricted
}
if ! restricted && ! repo . IsPrivate {
2016-11-07 19:20:37 +03:00
mode = AccessModeRead
2015-02-12 05:58:37 +03:00
}
2014-05-01 19:32:12 +04:00
2017-03-15 03:51:46 +03:00
if userID == 0 {
2015-11-19 19:40:00 +03:00
return mode , nil
}
2014-04-05 02:55:17 +04:00
2017-03-15 03:51:46 +03:00
if userID == repo . OwnerID {
2016-11-07 19:20:37 +03:00
return AccessModeOwner , nil
2014-04-12 05:47:39 +04:00
}
2015-02-05 16:29:08 +03:00
2017-03-15 03:51:46 +03:00
a := & Access { UserID : userID , RepoID : repo . ID }
2015-11-19 19:40:00 +03:00
if has , err := e . Get ( a ) ; ! has || err != nil {
return mode , err
}
return a . Mode , nil
2014-02-17 19:57:23 +04:00
}
2015-01-23 10:54:16 +03:00
2015-02-13 08:58:46 +03:00
func maxAccessMode ( modes ... AccessMode ) AccessMode {
2016-11-07 19:20:37 +03:00
max := AccessModeNone
2015-02-13 08:58:46 +03:00
for _ , mode := range modes {
if mode > max {
max = mode
}
}
return max
}
2020-01-13 20:33:46 +03:00
type userAccess struct {
2021-11-24 12:49:20 +03:00
User * user_model . User
2020-01-13 20:33:46 +03:00
Mode AccessMode
}
// updateUserAccess updates an access map so that user has at least mode
2021-11-24 12:49:20 +03:00
func updateUserAccess ( accessMap map [ int64 ] * userAccess , user * user_model . User , mode AccessMode ) {
2020-01-13 20:33:46 +03:00
if ua , ok := accessMap [ user . ID ] ; ok {
ua . Mode = maxAccessMode ( ua . Mode , mode )
} else {
accessMap [ user . ID ] = & userAccess { User : user , Mode : mode }
}
}
2017-01-05 03:50:34 +03:00
// FIXME: do cross-comparison so reduce deletions and additions to the minimum?
2021-09-19 14:49:59 +03:00
func ( repo * Repository ) refreshAccesses ( e db . Engine , accessMap map [ int64 ] * userAccess ) ( err error ) {
2016-11-07 19:20:37 +03:00
minMode := AccessModeRead
2015-03-01 05:44:09 +03:00
if ! repo . IsPrivate {
2016-11-07 19:20:37 +03:00
minMode = AccessModeWrite
2015-03-01 05:44:09 +03:00
}
newAccesses := make ( [ ] Access , 0 , len ( accessMap ) )
2020-01-13 20:33:46 +03:00
for userID , ua := range accessMap {
if ua . Mode < minMode && ! ua . User . IsRestricted {
2015-03-01 05:44:09 +03:00
continue
}
2020-01-13 20:33:46 +03:00
2015-03-01 05:44:09 +03:00
newAccesses = append ( newAccesses , Access {
UserID : userID ,
2015-08-08 17:43:14 +03:00
RepoID : repo . ID ,
2020-01-13 20:33:46 +03:00
Mode : ua . Mode ,
2015-03-01 05:44:09 +03:00
} )
}
2015-02-13 10:56:42 +03:00
2015-03-01 05:44:09 +03:00
// Delete old accesses and insert new ones for repository.
2015-08-08 17:43:14 +03:00
if _ , err = e . Delete ( & Access { RepoID : repo . ID } ) ; err != nil {
2015-03-01 05:44:09 +03:00
return fmt . Errorf ( "delete old accesses: %v" , err )
2020-03-22 18:12:55 +03:00
}
if len ( newAccesses ) == 0 {
return nil
}
if _ , err = e . Insert ( newAccesses ) ; err != nil {
2015-03-01 05:44:09 +03:00
return fmt . Errorf ( "insert new accesses: %v" , err )
}
2015-02-13 10:56:42 +03:00
return nil
}
2016-03-06 02:08:42 +03:00
// refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
2021-09-19 14:49:59 +03:00
func ( repo * Repository ) refreshCollaboratorAccesses ( e db . Engine , accessMap map [ int64 ] * userAccess ) error {
2021-09-24 14:32:56 +03:00
collaborators , err := repo . getCollaborators ( e , db . ListOptions { } )
2015-02-05 16:29:08 +03:00
if err != nil {
2016-03-06 02:08:42 +03:00
return fmt . Errorf ( "getCollaborations: %v" , err )
2015-02-05 16:29:08 +03:00
}
2020-01-13 20:33:46 +03:00
for _ , c := range collaborators {
2021-09-27 21:07:19 +03:00
if c . User . IsGhost ( ) {
continue
}
2020-01-13 20:33:46 +03:00
updateUserAccess ( accessMap , c . User , c . Collaboration . Mode )
2015-02-05 16:29:08 +03:00
}
2015-03-01 05:44:09 +03:00
return nil
}
// recalculateTeamAccesses recalculates new accesses for teams of an organization
// except the team whose ID is given. It is used to assign a team ID when
// remove repository from that team.
2021-09-19 14:49:59 +03:00
func ( repo * Repository ) recalculateTeamAccesses ( e db . Engine , ignTeamID int64 ) ( err error ) {
2020-01-13 20:33:46 +03:00
accessMap := make ( map [ int64 ] * userAccess , 20 )
2015-03-01 05:44:09 +03:00
if err = repo . getOwner ( e ) ; err != nil {
2015-02-05 16:29:08 +03:00
return err
2015-08-28 08:51:15 +03:00
} else if ! repo . Owner . IsOrganization ( ) {
return fmt . Errorf ( "owner is not an organization: %d" , repo . OwnerID )
2015-02-05 16:29:08 +03:00
}
2015-08-28 08:51:15 +03:00
2015-07-24 11:52:01 +03:00
if err = repo . refreshCollaboratorAccesses ( e , accessMap ) ; err != nil {
return fmt . Errorf ( "refreshCollaboratorAccesses: %v" , err )
}
2015-02-05 16:29:08 +03:00
2021-11-19 14:41:40 +03:00
teams , err := OrgFromUser ( repo . Owner ) . loadTeams ( e )
if err != nil {
2015-08-28 08:51:15 +03:00
return err
}
2015-03-25 01:14:04 +03:00
2021-11-19 14:41:40 +03:00
for _ , t := range teams {
2015-08-28 08:51:15 +03:00
if t . ID == ignTeamID {
continue
}
2015-02-05 16:29:08 +03:00
2015-08-28 08:51:15 +03:00
// Owner team gets owner access, and skip for teams that do not
// have relations with repository.
if t . IsOwnerTeam ( ) {
2016-11-07 19:20:37 +03:00
t . Authorize = AccessModeOwner
2015-08-28 08:51:15 +03:00
} else if ! t . hasRepository ( e , repo . ID ) {
continue
}
if err = t . getMembers ( e ) ; err != nil {
return fmt . Errorf ( "getMembers '%d': %v" , t . ID , err )
}
for _ , m := range t . Members {
2020-01-13 20:33:46 +03:00
updateUserAccess ( accessMap , m , t . Authorize )
2015-02-05 16:29:08 +03:00
}
}
2015-03-01 05:44:09 +03:00
return repo . refreshAccesses ( e , accessMap )
}
2015-02-05 16:29:08 +03:00
2019-10-15 03:55:21 +03:00
// recalculateUserAccess recalculates new access for a single user
// Usable if we know access only affected one user
2021-09-19 14:49:59 +03:00
func ( repo * Repository ) recalculateUserAccess ( e db . Engine , uid int64 ) ( err error ) {
2019-10-15 03:55:21 +03:00
minMode := AccessModeRead
if ! repo . IsPrivate {
minMode = AccessModeWrite
}
accessMode := AccessModeNone
collaborator , err := repo . getCollaboration ( e , uid )
if err != nil {
return err
} else if collaborator != nil {
accessMode = collaborator . Mode
}
if err = repo . getOwner ( e ) ; err != nil {
return err
} else if repo . Owner . IsOrganization ( ) {
var teams [ ] Team
if err := e . Join ( "INNER" , "team_repo" , "team_repo.team_id = team.id" ) .
Join ( "INNER" , "team_user" , "team_user.team_id = team.id" ) .
Where ( "team.org_id = ?" , repo . OwnerID ) .
And ( "team_repo.repo_id=?" , repo . ID ) .
And ( "team_user.uid=?" , uid ) .
Find ( & teams ) ; err != nil {
return err
}
for _ , t := range teams {
if t . IsOwnerTeam ( ) {
t . Authorize = AccessModeOwner
}
accessMode = maxAccessMode ( accessMode , t . Authorize )
}
}
// Delete old user accesses and insert new one for repository.
if _ , err = e . Delete ( & Access { RepoID : repo . ID , UserID : uid } ) ; err != nil {
return fmt . Errorf ( "delete old user accesses: %v" , err )
} else if accessMode >= minMode {
if _ , err = e . Insert ( & Access { RepoID : repo . ID , UserID : uid , Mode : accessMode } ) ; err != nil {
return fmt . Errorf ( "insert new user accesses: %v" , err )
}
}
return nil
}
2021-09-19 14:49:59 +03:00
func ( repo * Repository ) recalculateAccesses ( e db . Engine ) error {
2015-08-28 08:51:15 +03:00
if repo . Owner . IsOrganization ( ) {
return repo . recalculateTeamAccesses ( e , 0 )
}
2020-01-13 20:33:46 +03:00
accessMap := make ( map [ int64 ] * userAccess , 20 )
2015-03-01 05:44:09 +03:00
if err := repo . refreshCollaboratorAccesses ( e , accessMap ) ; err != nil {
return fmt . Errorf ( "refreshCollaboratorAccesses: %v" , err )
2015-02-05 16:29:08 +03:00
}
2015-03-01 05:44:09 +03:00
return repo . refreshAccesses ( e , accessMap )
2015-02-13 08:58:46 +03:00
}
2015-02-05 16:29:08 +03:00
2015-02-13 08:58:46 +03:00
// RecalculateAccesses recalculates all accesses for repository.
2016-11-26 03:07:57 +03:00
func ( repo * Repository ) RecalculateAccesses ( ) error {
2021-09-23 18:45:36 +03:00
return repo . recalculateAccesses ( db . GetEngine ( db . DefaultContext ) )
2015-02-05 16:29:08 +03:00
}