2014-02-18 05:08:50 +05:30
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2019-04-23 02:10:51 +05:30
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 23:50:29 +05:30
|
|
|
// SPDX-License-Identifier: MIT
|
2014-02-18 05:08:50 +05:30
|
|
|
|
2022-05-11 15:39:36 +05:30
|
|
|
package access
|
2014-02-17 21:27:23 +05:30
|
|
|
|
2019-04-23 02:10:51 +05:30
|
|
|
import (
|
2021-12-10 06:57:50 +05:30
|
|
|
"context"
|
2019-04-23 02:10:51 +05:30
|
|
|
"fmt"
|
|
|
|
|
2021-09-19 17:19:59 +05:30
|
|
|
"code.gitea.io/gitea/models/db"
|
2022-03-29 11:59:02 +05:30
|
|
|
"code.gitea.io/gitea/models/organization"
|
2021-11-28 17:28:28 +05:30
|
|
|
"code.gitea.io/gitea/models/perm"
|
2021-12-10 06:57:50 +05:30
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2021-11-24 15:19:20 +05:30
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2023-12-07 12:57:36 +05:30
|
|
|
|
|
|
|
"xorm.io/builder"
|
2019-04-23 02:10:51 +05:30
|
|
|
)
|
2015-02-24 10:57:22 +05:30
|
|
|
|
2015-02-05 18:59:08 +05:30
|
|
|
// Access represents the highest access level of a user to the repository. The only access type
|
|
|
|
// that is not in this table is the real owner of a repository. In case of an organization
|
|
|
|
// repository, the members of the owners team are in this table.
|
|
|
|
type Access struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
UserID int64 `xorm:"UNIQUE(s)"`
|
|
|
|
RepoID int64 `xorm:"UNIQUE(s)"`
|
2021-11-28 17:28:28 +05:30
|
|
|
Mode perm.AccessMode
|
2014-02-17 21:27:23 +05:30
|
|
|
}
|
|
|
|
|
2021-09-19 17:19:59 +05:30
|
|
|
func init() {
|
|
|
|
db.RegisterModel(new(Access))
|
|
|
|
}
|
|
|
|
|
2022-05-20 19:38:52 +05:30
|
|
|
func accessLevel(ctx context.Context, user *user_model.User, repo *repo_model.Repository) (perm.AccessMode, error) {
|
2021-11-28 17:28:28 +05:30
|
|
|
mode := perm.AccessModeNone
|
2020-01-13 23:03:46 +05:30
|
|
|
var userID int64
|
|
|
|
restricted := false
|
|
|
|
|
|
|
|
if user != nil {
|
|
|
|
userID = user.ID
|
|
|
|
restricted = user.IsRestricted
|
|
|
|
}
|
|
|
|
|
|
|
|
if !restricted && !repo.IsPrivate {
|
2021-11-28 17:28:28 +05:30
|
|
|
mode = perm.AccessModeRead
|
2015-02-12 08:28:37 +05:30
|
|
|
}
|
2014-05-01 21:02:12 +05:30
|
|
|
|
2017-03-15 06:21:46 +05:30
|
|
|
if userID == 0 {
|
2015-11-19 22:10:00 +05:30
|
|
|
return mode, nil
|
|
|
|
}
|
2014-04-05 04:25:17 +05:30
|
|
|
|
2017-03-15 06:21:46 +05:30
|
|
|
if userID == repo.OwnerID {
|
2021-11-28 17:28:28 +05:30
|
|
|
return perm.AccessModeOwner, nil
|
2014-04-12 07:17:39 +05:30
|
|
|
}
|
2015-02-05 18:59:08 +05:30
|
|
|
|
2023-12-07 12:57:36 +05:30
|
|
|
a, exist, err := db.Get[Access](ctx, builder.Eq{"user_id": userID, "repo_id": repo.ID})
|
|
|
|
if err != nil {
|
2015-11-19 22:10:00 +05:30
|
|
|
return mode, err
|
2023-12-07 12:57:36 +05:30
|
|
|
} else if !exist {
|
|
|
|
return mode, nil
|
2015-11-19 22:10:00 +05:30
|
|
|
}
|
|
|
|
return a.Mode, nil
|
2014-02-17 21:27:23 +05:30
|
|
|
}
|
2015-01-23 13:24:16 +05:30
|
|
|
|
2021-11-28 17:28:28 +05:30
|
|
|
func maxAccessMode(modes ...perm.AccessMode) perm.AccessMode {
|
|
|
|
max := perm.AccessModeNone
|
2015-02-13 11:28:46 +05:30
|
|
|
for _, mode := range modes {
|
|
|
|
if mode > max {
|
|
|
|
max = mode
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return max
|
|
|
|
}
|
|
|
|
|
2020-01-13 23:03:46 +05:30
|
|
|
type userAccess struct {
|
2021-11-24 15:19:20 +05:30
|
|
|
User *user_model.User
|
2021-11-28 17:28:28 +05:30
|
|
|
Mode perm.AccessMode
|
2020-01-13 23:03:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
// updateUserAccess updates an access map so that user has at least mode
|
2021-11-28 17:28:28 +05:30
|
|
|
func updateUserAccess(accessMap map[int64]*userAccess, user *user_model.User, mode perm.AccessMode) {
|
2020-01-13 23:03:46 +05:30
|
|
|
if ua, ok := accessMap[user.ID]; ok {
|
|
|
|
ua.Mode = maxAccessMode(ua.Mode, mode)
|
|
|
|
} else {
|
|
|
|
accessMap[user.ID] = &userAccess{User: user, Mode: mode}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-05 06:20:34 +05:30
|
|
|
// FIXME: do cross-comparison so reduce deletions and additions to the minimum?
|
2022-05-20 19:38:52 +05:30
|
|
|
func refreshAccesses(ctx context.Context, repo *repo_model.Repository, accessMap map[int64]*userAccess) (err error) {
|
2021-11-28 17:28:28 +05:30
|
|
|
minMode := perm.AccessModeRead
|
2023-02-18 17:41:03 +05:30
|
|
|
if err := repo.LoadOwner(ctx); err != nil {
|
|
|
|
return fmt.Errorf("LoadOwner: %w", err)
|
2022-07-11 17:18:43 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
// If the repo isn't private and isn't owned by a organization,
|
|
|
|
// increase the minMode to Write.
|
|
|
|
if !repo.IsPrivate && !repo.Owner.IsOrganization() {
|
2021-11-28 17:28:28 +05:30
|
|
|
minMode = perm.AccessModeWrite
|
2015-03-01 08:14:09 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
newAccesses := make([]Access, 0, len(accessMap))
|
2020-01-13 23:03:46 +05:30
|
|
|
for userID, ua := range accessMap {
|
|
|
|
if ua.Mode < minMode && !ua.User.IsRestricted {
|
2015-03-01 08:14:09 +05:30
|
|
|
continue
|
|
|
|
}
|
2020-01-13 23:03:46 +05:30
|
|
|
|
2015-03-01 08:14:09 +05:30
|
|
|
newAccesses = append(newAccesses, Access{
|
|
|
|
UserID: userID,
|
2015-08-08 20:13:14 +05:30
|
|
|
RepoID: repo.ID,
|
2020-01-13 23:03:46 +05:30
|
|
|
Mode: ua.Mode,
|
2015-03-01 08:14:09 +05:30
|
|
|
})
|
|
|
|
}
|
2015-02-13 13:26:42 +05:30
|
|
|
|
2015-03-01 08:14:09 +05:30
|
|
|
// Delete old accesses and insert new ones for repository.
|
2022-05-20 19:38:52 +05:30
|
|
|
if _, err = db.DeleteByBean(ctx, &Access{RepoID: repo.ID}); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("delete old accesses: %w", err)
|
2020-03-22 20:42:55 +05:30
|
|
|
}
|
|
|
|
if len(newAccesses) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-20 19:38:52 +05:30
|
|
|
if err = db.Insert(ctx, newAccesses); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("insert new accesses: %w", err)
|
2015-03-01 08:14:09 +05:30
|
|
|
}
|
2015-02-13 13:26:42 +05:30
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-06 04:38:42 +05:30
|
|
|
// refreshCollaboratorAccesses retrieves repository collaborations with their access modes.
|
2022-05-11 15:39:36 +05:30
|
|
|
func refreshCollaboratorAccesses(ctx context.Context, repoID int64, accessMap map[int64]*userAccess) error {
|
|
|
|
collaborators, err := repo_model.GetCollaborators(ctx, repoID, db.ListOptions{})
|
2015-02-05 18:59:08 +05:30
|
|
|
if err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("getCollaborations: %w", err)
|
2015-02-05 18:59:08 +05:30
|
|
|
}
|
2020-01-13 23:03:46 +05:30
|
|
|
for _, c := range collaborators {
|
2021-09-27 23:37:19 +05:30
|
|
|
if c.User.IsGhost() {
|
|
|
|
continue
|
|
|
|
}
|
2020-01-13 23:03:46 +05:30
|
|
|
updateUserAccess(accessMap, c.User, c.Collaboration.Mode)
|
2015-02-05 18:59:08 +05:30
|
|
|
}
|
2015-03-01 08:14:09 +05:30
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-11 15:39:36 +05:30
|
|
|
// RecalculateTeamAccesses recalculates new accesses for teams of an organization
|
2015-03-01 08:14:09 +05:30
|
|
|
// except the team whose ID is given. It is used to assign a team ID when
|
|
|
|
// remove repository from that team.
|
2022-05-11 15:39:36 +05:30
|
|
|
func RecalculateTeamAccesses(ctx context.Context, repo *repo_model.Repository, ignTeamID int64) (err error) {
|
2020-01-13 23:03:46 +05:30
|
|
|
accessMap := make(map[int64]*userAccess, 20)
|
2015-03-01 08:14:09 +05:30
|
|
|
|
2023-02-18 17:41:03 +05:30
|
|
|
if err = repo.LoadOwner(ctx); err != nil {
|
2015-02-05 18:59:08 +05:30
|
|
|
return err
|
2015-08-28 11:21:15 +05:30
|
|
|
} else if !repo.Owner.IsOrganization() {
|
|
|
|
return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)
|
2015-02-05 18:59:08 +05:30
|
|
|
}
|
2015-08-28 11:21:15 +05:30
|
|
|
|
2022-05-11 15:39:36 +05:30
|
|
|
if err = refreshCollaboratorAccesses(ctx, repo.ID, accessMap); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("refreshCollaboratorAccesses: %w", err)
|
2015-07-24 14:22:01 +05:30
|
|
|
}
|
2015-02-05 18:59:08 +05:30
|
|
|
|
2022-03-29 11:59:02 +05:30
|
|
|
teams, err := organization.FindOrgTeams(ctx, repo.Owner.ID)
|
2021-11-19 17:11:40 +05:30
|
|
|
if err != nil {
|
2015-08-28 11:21:15 +05:30
|
|
|
return err
|
|
|
|
}
|
2015-03-25 03:44:04 +05:30
|
|
|
|
2021-11-19 17:11:40 +05:30
|
|
|
for _, t := range teams {
|
2015-08-28 11:21:15 +05:30
|
|
|
if t.ID == ignTeamID {
|
|
|
|
continue
|
|
|
|
}
|
2015-02-05 18:59:08 +05:30
|
|
|
|
2015-08-28 11:21:15 +05:30
|
|
|
// Owner team gets owner access, and skip for teams that do not
|
|
|
|
// have relations with repository.
|
|
|
|
if t.IsOwnerTeam() {
|
2022-01-05 09:07:00 +05:30
|
|
|
t.AccessMode = perm.AccessModeOwner
|
2022-05-11 15:39:36 +05:30
|
|
|
} else if !organization.HasTeamRepo(ctx, t.OrgID, t.ID, repo.ID) {
|
2015-08-28 11:21:15 +05:30
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-12-03 08:18:26 +05:30
|
|
|
if err = t.LoadMembers(ctx); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("getMembers '%d': %w", t.ID, err)
|
2015-08-28 11:21:15 +05:30
|
|
|
}
|
|
|
|
for _, m := range t.Members {
|
2022-01-05 09:07:00 +05:30
|
|
|
updateUserAccess(accessMap, m, t.AccessMode)
|
2015-02-05 18:59:08 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-20 19:38:52 +05:30
|
|
|
return refreshAccesses(ctx, repo, accessMap)
|
2015-03-01 08:14:09 +05:30
|
|
|
}
|
2015-02-05 18:59:08 +05:30
|
|
|
|
2022-05-11 15:39:36 +05:30
|
|
|
// RecalculateUserAccess recalculates new access for a single user
|
2019-10-15 06:25:21 +05:30
|
|
|
// Usable if we know access only affected one user
|
2022-05-11 15:39:36 +05:30
|
|
|
func RecalculateUserAccess(ctx context.Context, repo *repo_model.Repository, uid int64) (err error) {
|
2021-11-28 17:28:28 +05:30
|
|
|
minMode := perm.AccessModeRead
|
2019-10-15 06:25:21 +05:30
|
|
|
if !repo.IsPrivate {
|
2021-11-28 17:28:28 +05:30
|
|
|
minMode = perm.AccessModeWrite
|
2019-10-15 06:25:21 +05:30
|
|
|
}
|
|
|
|
|
2021-11-28 17:28:28 +05:30
|
|
|
accessMode := perm.AccessModeNone
|
2021-12-10 06:57:50 +05:30
|
|
|
e := db.GetEngine(ctx)
|
2022-05-11 15:39:36 +05:30
|
|
|
collaborator, err := repo_model.GetCollaboration(ctx, repo.ID, uid)
|
2019-10-15 06:25:21 +05:30
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if collaborator != nil {
|
|
|
|
accessMode = collaborator.Mode
|
|
|
|
}
|
|
|
|
|
2023-02-18 17:41:03 +05:30
|
|
|
if err = repo.LoadOwner(ctx); err != nil {
|
2019-10-15 06:25:21 +05:30
|
|
|
return err
|
|
|
|
} else if repo.Owner.IsOrganization() {
|
2022-03-29 11:59:02 +05:30
|
|
|
var teams []organization.Team
|
2019-10-15 06:25:21 +05:30
|
|
|
if err := e.Join("INNER", "team_repo", "team_repo.team_id = team.id").
|
|
|
|
Join("INNER", "team_user", "team_user.team_id = team.id").
|
|
|
|
Where("team.org_id = ?", repo.OwnerID).
|
|
|
|
And("team_repo.repo_id=?", repo.ID).
|
|
|
|
And("team_user.uid=?", uid).
|
|
|
|
Find(&teams); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, t := range teams {
|
|
|
|
if t.IsOwnerTeam() {
|
2022-01-05 09:07:00 +05:30
|
|
|
t.AccessMode = perm.AccessModeOwner
|
2019-10-15 06:25:21 +05:30
|
|
|
}
|
|
|
|
|
2022-01-05 09:07:00 +05:30
|
|
|
accessMode = maxAccessMode(accessMode, t.AccessMode)
|
2019-10-15 06:25:21 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete old user accesses and insert new one for repository.
|
|
|
|
if _, err = e.Delete(&Access{RepoID: repo.ID, UserID: uid}); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("delete old user accesses: %w", err)
|
2019-10-15 06:25:21 +05:30
|
|
|
} else if accessMode >= minMode {
|
2022-05-11 15:39:36 +05:30
|
|
|
if err = db.Insert(ctx, &Access{RepoID: repo.ID, UserID: uid, Mode: accessMode}); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("insert new user accesses: %w", err)
|
2019-10-15 06:25:21 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-11 15:39:36 +05:30
|
|
|
// RecalculateAccesses recalculates all accesses for repository.
|
|
|
|
func RecalculateAccesses(ctx context.Context, repo *repo_model.Repository) error {
|
2015-08-28 11:21:15 +05:30
|
|
|
if repo.Owner.IsOrganization() {
|
2022-05-11 15:39:36 +05:30
|
|
|
return RecalculateTeamAccesses(ctx, repo, 0)
|
2015-08-28 11:21:15 +05:30
|
|
|
}
|
|
|
|
|
2020-01-13 23:03:46 +05:30
|
|
|
accessMap := make(map[int64]*userAccess, 20)
|
2022-05-11 15:39:36 +05:30
|
|
|
if err := refreshCollaboratorAccesses(ctx, repo.ID, accessMap); err != nil {
|
2022-10-25 00:59:17 +05:30
|
|
|
return fmt.Errorf("refreshCollaboratorAccesses: %w", err)
|
2015-02-05 18:59:08 +05:30
|
|
|
}
|
2022-05-20 19:38:52 +05:30
|
|
|
return refreshAccesses(ctx, repo, accessMap)
|
2015-02-13 11:28:46 +05:30
|
|
|
}
|