# frozen_string_literal: true class IssuePolicy < IssuablePolicy # This class duplicates the same check of Issue#readable_by? for performance reasons # Make sure to sync this class checks with issue.rb to avoid security problems. # Check commit 002ad215818450d2cbbc5fa065850a953dc7ada8 for more information. include CrudPolicyHelpers desc "User can read confidential issues" condition(:can_read_confidential) do @user && IssueCollection.new([@subject]).visible_to(@user).any? end desc "Issue is confidential" condition(:confidential, scope: :subject) { @subject.confidential? } desc "Issue is persisted" condition(:persisted, scope: :subject) { @subject.persisted? } rule { confidential & ~can_read_confidential }.policy do prevent(*create_read_update_admin_destroy(:issue)) prevent :read_issue_iid end rule { ~can?(:read_issue) }.prevent :create_note rule { locked }.policy do prevent :reopen_issue end rule { ~can?(:read_issue) }.policy do prevent :read_design prevent :create_design prevent :destroy_design end rule { ~can?(:read_design) }.policy do prevent :move_design end rule { ~anonymous & can?(:read_issue) }.policy do enable :create_todo enable :update_subscription end # admin can set metadata on new issues rule { ~persisted & admin }.policy do enable :set_issue_metadata end # support bot needs to be able to set metadata on new issues when service desk is enabled rule { ~persisted & support_bot & can?(:guest_access) }.policy do enable :set_issue_metadata end # guest members need to be able to set issue metadata per https://gitlab.com/gitlab-org/gitlab/-/issues/300100 rule { ~persisted & is_project_member & can?(:guest_access) }.policy do enable :set_issue_metadata end rule { persisted & can?(:admin_issue) }.policy do enable :set_issue_metadata end end IssuePolicy.prepend_mod_with('IssuePolicy')