49 lines
1.2 KiB
Ruby
49 lines
1.2 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class MergeRequestPolicy < IssuablePolicy
|
|
condition(:can_approve) { can_approve? }
|
|
|
|
rule { locked }.policy do
|
|
prevent :reopen_merge_request
|
|
end
|
|
|
|
# Only users who can read the merge request can comment.
|
|
# Although :read_merge_request is computed in the policy context,
|
|
# it would not be safe to prevent :create_note there, since
|
|
# note permissions are shared, and this would apply too broadly.
|
|
rule { ~can?(:read_merge_request) }.policy do
|
|
prevent :create_note
|
|
prevent :accept_merge_request
|
|
end
|
|
|
|
rule { can_approve }.policy do
|
|
enable :approve_merge_request
|
|
end
|
|
|
|
rule { can?(:approve_merge_request) & bot }.policy do
|
|
enable :reset_merge_request_approvals
|
|
end
|
|
|
|
rule { ~anonymous & can?(:read_merge_request) }.policy do
|
|
enable :create_todo
|
|
enable :update_subscription
|
|
end
|
|
|
|
condition(:can_merge) { @subject.can_be_merged_by?(@user) }
|
|
|
|
rule { can_merge }.policy do
|
|
enable :accept_merge_request
|
|
end
|
|
|
|
rule { can?(:admin_merge_request) }.policy do
|
|
enable :set_merge_request_metadata
|
|
end
|
|
|
|
private
|
|
|
|
def can_approve?
|
|
can?(:update_merge_request) && is_project_member?
|
|
end
|
|
end
|
|
|
|
MergeRequestPolicy.prepend_mod_with('MergeRequestPolicy')
|