debian-mirror-gitlab/app/policies/issuable_policy.rb
2022-11-25 23:54:43 +05:30

64 lines
1.7 KiB
Ruby

# frozen_string_literal: true
class IssuablePolicy < BasePolicy
delegate { @subject.project }
condition(:locked, scope: :subject, score: 0) { @subject.discussion_locked? }
condition(:is_project_member) { @user && @subject.project && @subject.project.team.member?(@user) }
condition(:can_read_issuable) { can?(:"read_#{@subject.to_ability_name}") }
desc "User is the assignee or author"
condition(:assignee_or_author) do
@user && @subject.assignee_or_author?(@user)
end
condition(:is_author) { @subject&.author == @user }
condition(:is_incident) { @subject.incident? }
rule { can?(:guest_access) & assignee_or_author & ~is_incident }.policy do
enable :read_issue
enable :update_issue
enable :reopen_issue
end
rule { can?(:read_merge_request) & assignee_or_author }.policy do
enable :update_merge_request
enable :reopen_merge_request
end
rule { is_author }.policy do
enable :resolve_note
end
rule { locked & ~is_project_member }.policy do
prevent :create_note
prevent :admin_note
prevent :resolve_note
prevent :award_emoji
end
rule { can?(:read_issue) }.policy do
enable :read_incident_management_timeline_event
end
rule { can?(:read_issue) & can?(:developer_access) }.policy do
enable :admin_incident_management_timeline_event
end
rule { can?(:reporter_access) }.policy do
enable :create_timelog
end
rule { can_read_issuable }.policy do
enable :read_issuable
enable :read_issuable_participables
end
# This rule replicates permissions in NotePolicy#can_read_confidential
rule { can?(:reporter_access) | assignee_or_author | admin }.policy do
enable :read_internal_note
end
end
IssuablePolicy.prepend_mod_with('IssuablePolicy')