debian-mirror-gitlab/app/finders/issues_finder.rb

153 lines
4.2 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
# Finders::Issues class
#
# Used to filter Issues collections by set of params
#
# Arguments:
# current_user - which user use
# params:
2018-11-08 19:23:39 +05:30
# scope: 'created_by_me' or 'assigned_to_me' or 'all'
2014-09-02 18:07:02 +05:30
# state: 'open' or 'closed' or 'all'
# group_id: integer
# project_id: integer
2017-08-17 22:00:37 +05:30
# milestone_title: string
2014-09-02 18:07:02 +05:30
# assignee_id: integer
# search: string
2019-03-02 22:35:43 +05:30
# in: 'title', 'description', or a string joining them with comma
2014-09-02 18:07:02 +05:30
# label_name: string
# sort: string
2018-03-17 18:26:18 +05:30
# my_reaction_emoji: string
# public_only: boolean
2018-03-27 19:54:05 +05:30
# due_date: date or '0', '', 'overdue', 'week', or 'month'
# created_after: datetime
# created_before: datetime
# updated_after: datetime
# updated_before: datetime
2014-09-02 18:07:02 +05:30
#
2015-04-26 12:48:37 +05:30
class IssuesFinder < IssuableFinder
2017-09-10 17:25:29 +05:30
CONFIDENTIAL_ACCESS_LEVEL = Gitlab::Access::REPORTER
2018-03-27 19:54:05 +05:30
def self.scalar_params
@scalar_params ||= super + [:due_date]
end
2018-12-05 23:21:45 +05:30
# rubocop: disable CodeReuse/ActiveRecord
2014-09-02 18:07:02 +05:30
def klass
2018-03-27 19:54:05 +05:30
Issue.includes(:author)
2014-09-02 18:07:02 +05:30
end
2018-12-05 23:21:45 +05:30
# rubocop: enable CodeReuse/ActiveRecord
2016-06-02 11:05:42 +05:30
2018-12-05 23:21:45 +05:30
# rubocop: disable CodeReuse/ActiveRecord
2017-09-10 17:25:29 +05:30
def with_confidentiality_access_check
return Issue.all if user_can_see_all_confidential_issues?
return Issue.where('issues.confidential IS NOT TRUE') if user_cannot_see_confidential_issues?
Issue.where('
issues.confidential IS NOT TRUE
OR (issues.confidential = TRUE
AND (issues.author_id = :user_id
OR EXISTS (SELECT TRUE FROM issue_assignees WHERE user_id = :user_id AND issue_id = issues.id)
OR issues.project_id IN(:project_ids)))',
user_id: current_user.id,
project_ids: current_user.authorized_projects(CONFIDENTIAL_ACCESS_LEVEL).select(:id))
end
2018-12-05 23:21:45 +05:30
# rubocop: enable CodeReuse/ActiveRecord
2017-09-10 17:25:29 +05:30
2016-06-02 11:05:42 +05:30
private
def init_collection
2018-03-17 18:26:18 +05:30
if public_only?
Issue.public_only
else
with_confidentiality_access_check
end
end
def public_only?
params.fetch(:public_only, false)
2017-09-10 17:25:29 +05:30
end
2018-03-27 19:54:05 +05:30
def filter_items(items)
by_due_date(super)
end
def by_due_date(items)
if due_date?
if filter_by_no_due_date?
items = items.without_due_date
elsif filter_by_overdue?
items = items.due_before(Date.today)
elsif filter_by_due_this_week?
items = items.due_between(Date.today.beginning_of_week, Date.today.end_of_week)
elsif filter_by_due_this_month?
items = items.due_between(Date.today.beginning_of_month, Date.today.end_of_month)
2018-11-08 19:23:39 +05:30
elsif filter_by_due_next_month_and_previous_two_weeks?
items = items.due_between(Date.today - 2.weeks, (Date.today + 1.month).end_of_month)
2018-03-27 19:54:05 +05:30
end
end
items
end
def filter_by_no_due_date?
due_date? && params[:due_date] == Issue::NoDueDate.name
end
def filter_by_overdue?
due_date? && params[:due_date] == Issue::Overdue.name
end
def filter_by_due_this_week?
due_date? && params[:due_date] == Issue::DueThisWeek.name
end
def filter_by_due_this_month?
due_date? && params[:due_date] == Issue::DueThisMonth.name
end
2018-11-08 19:23:39 +05:30
def filter_by_due_next_month_and_previous_two_weeks?
due_date? && params[:due_date] == Issue::DueNextMonthAndPreviousTwoWeeks.name
end
2018-03-27 19:54:05 +05:30
def due_date?
params[:due_date].present?
end
2017-09-10 17:25:29 +05:30
def user_can_see_all_confidential_issues?
return @user_can_see_all_confidential_issues if defined?(@user_can_see_all_confidential_issues)
return @user_can_see_all_confidential_issues = false if current_user.blank?
return @user_can_see_all_confidential_issues = true if current_user.full_private_access?
@user_can_see_all_confidential_issues =
2018-12-05 23:21:45 +05:30
if project? && project
project.team.max_member_access(current_user.id) >= CONFIDENTIAL_ACCESS_LEVEL
elsif group
group.max_member_access_for_user(current_user) >= CONFIDENTIAL_ACCESS_LEVEL
else
false
end
2017-09-10 17:25:29 +05:30
end
2018-03-17 18:26:18 +05:30
def user_cannot_see_confidential_issues?
2017-09-10 17:25:29 +05:30
return false if user_can_see_all_confidential_issues?
2018-03-17 18:26:18 +05:30
current_user.blank?
2016-06-02 11:05:42 +05:30
end
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
def by_assignee(items)
2018-12-13 13:39:08 +05:30
if filter_by_no_assignee?
2017-08-17 22:00:37 +05:30
items.unassigned
2018-12-13 13:39:08 +05:30
elsif filter_by_any_assignee?
items.assigned
elsif assignee
items.assigned_to(assignee)
2017-08-17 22:00:37 +05:30
elsif assignee_id? || assignee_username? # assignee not found
items.none
else
items
end
2016-09-29 09:46:39 +05:30
end
2014-09-02 18:07:02 +05:30
end