gitea/models/access.go

176 lines
4.3 KiB
Go
Raw Normal View History

2014-02-18 00:38:50 +01:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-02-17 16:57:23 +01:00
package models
import (
"fmt"
)
type AccessMode int
2014-06-25 06:44:48 +02:00
2014-02-17 16:57:23 +01:00
const (
ACCESS_MODE_NONE AccessMode = iota
ACCESS_MODE_READ
ACCESS_MODE_WRITE
ACCESS_MODE_ADMIN
ACCESS_MODE_OWNER
2014-02-17 16:57:23 +01:00
)
// Access represents the highest access level of a user to the repository. The only access type
// that is not in this table is the real owner of a repository. In case of an organization
// repository, the members of the owners team are in this table.
type Access struct {
ID int64 `xorm:"pk autoincr"`
UserID int64 `xorm:"UNIQUE(s)"`
RepoID int64 `xorm:"UNIQUE(s)"`
Mode AccessMode
2014-02-17 16:57:23 +01:00
}
func accessLevel(e Engine, u *User, repo *Repository) (AccessMode, error) {
mode := ACCESS_MODE_NONE
if !repo.IsPrivate {
mode = ACCESS_MODE_READ
2015-02-12 03:58:37 +01:00
}
2014-05-01 17:32:12 +02:00
if u != nil {
if u.Id == repo.OwnerId {
return ACCESS_MODE_OWNER, nil
}
2014-04-05 00:55:17 +02:00
a := &Access{UserID: u.Id, RepoID: repo.Id}
if has, err := e.Get(a); !has || err != nil {
return mode, err
}
return a.Mode, nil
2014-04-12 03:47:39 +02:00
}
return mode, nil
2014-02-17 16:57:23 +01:00
}
2015-01-23 08:54:16 +01:00
// AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
// user does not have access. User can be nil!
func AccessLevel(u *User, repo *Repository) (AccessMode, error) {
return accessLevel(x, u, repo)
}
func hasAccess(e Engine, u *User, repo *Repository, testMode AccessMode) (bool, error) {
mode, err := accessLevel(e, u, repo)
2015-02-13 06:58:46 +01:00
return testMode <= mode, err
}
// HasAccess returns true if someone has the request access level. User can be nil!
func HasAccess(u *User, repo *Repository, testMode AccessMode) (bool, error) {
return hasAccess(x, u, repo, testMode)
}
2015-01-23 08:54:16 +01:00
// GetAccessibleRepositories finds all repositories where a user has access to,
// besides his own.
func (u *User) GetAccessibleRepositories() (map[*Repository]AccessMode, error) {
2015-01-23 08:54:16 +01:00
accesses := make([]*Access, 0, 10)
if err := x.Find(&accesses, &Access{UserID: u.Id}); err != nil {
2015-01-23 08:54:16 +01:00
return nil, err
}
repos := make(map[*Repository]AccessMode, len(accesses))
2015-01-23 08:54:16 +01:00
for _, access := range accesses {
repo, err := GetRepositoryById(access.RepoID)
2015-01-23 08:54:16 +01:00
if err != nil {
return nil, err
}
2015-02-12 03:58:37 +01:00
if err = repo.GetOwner(); err != nil {
return nil, err
2015-02-12 03:58:37 +01:00
} else if repo.OwnerId == u.Id {
continue
}
2015-01-23 08:54:16 +01:00
repos[repo] = access.Mode
}
return repos, nil
}
2015-02-13 06:58:46 +01:00
func maxAccessMode(modes ...AccessMode) AccessMode {
max := ACCESS_MODE_NONE
for _, mode := range modes {
if mode > max {
max = mode
}
}
return max
}
2015-02-13 08:56:42 +01:00
func (repo *Repository) recalculateTeamAccesses(e Engine, mode AccessMode) error {
return nil
}
2015-02-13 06:58:46 +01:00
func (repo *Repository) recalculateAccesses(e Engine) error {
accessMap := make(map[int64]AccessMode, 20)
// FIXME: should be able to have read-only access.
// Give all collaborators write access.
2015-02-13 06:58:46 +01:00
collaborators, err := repo.getCollaborators(e)
if err != nil {
return err
}
for _, c := range collaborators {
accessMap[c.Id] = ACCESS_MODE_WRITE
}
2015-02-13 06:58:46 +01:00
if err := repo.getOwner(e); err != nil {
return err
}
2015-02-13 06:58:46 +01:00
if repo.Owner.IsOrganization() {
if err = repo.Owner.getTeams(e); err != nil {
return err
}
2015-02-13 06:58:46 +01:00
for _, team := range repo.Owner.Teams {
if team.IsOwnerTeam() {
2015-02-13 08:56:42 +01:00
team.Authorize = ACCESS_MODE_OWNER
}
2015-02-13 06:58:46 +01:00
if err = team.getMembers(e); err != nil {
return fmt.Errorf("getMembers '%d': %v", team.ID, err)
}
for _, u := range team.Members {
accessMap[u.Id] = maxAccessMode(accessMap[u.Id], team.Authorize)
}
}
}
// FIXME: do corss-comparison so reduce deletions and additions to the minimum?
minMode := ACCESS_MODE_READ
2015-02-13 06:58:46 +01:00
if !repo.IsPrivate {
minMode = ACCESS_MODE_WRITE
}
newAccesses := make([]Access, 0, len(accessMap))
for userID, mode := range accessMap {
2015-02-13 08:56:42 +01:00
if mode < minMode {
continue
}
2015-02-13 06:58:46 +01:00
newAccesses = append(newAccesses, Access{
UserID: userID,
RepoID: repo.Id,
2015-02-13 08:56:42 +01:00
Mode: mode,
})
}
2015-02-13 08:56:42 +01:00
// Delete old accesses and insert new ones for repository.
2015-02-13 06:58:46 +01:00
if _, err = e.Delete(&Access{RepoID: repo.Id}); err != nil {
return fmt.Errorf("delete old accesses: %v", err)
2015-02-13 08:56:42 +01:00
} else if _, err = e.Insert(newAccesses); err != nil {
return fmt.Errorf("insert new accesses: %v", err)
}
return nil
2015-02-13 06:58:46 +01:00
}
2015-02-13 06:58:46 +01:00
// RecalculateAccesses recalculates all accesses for repository.
func (r *Repository) RecalculateAccesses() error {
return r.recalculateAccesses(x)
}