diff options
author | ᴜɴᴋɴᴡᴏɴ <u@gogs.io> | 2020-10-06 15:43:28 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-10-06 15:43:28 +0800 |
commit | 2eaf1d693ae08c0312dd1f977f81675f418f3770 (patch) | |
tree | b42a26180e813918a05a676bd18e13a3a1bb73ec /internal/db/access.go | |
parent | a92d818aa35583594a6b3098f4e1e1f4edec17dd (diff) |
db: migrate access table to use GORM (#6371)
Diffstat (limited to 'internal/db/access.go')
-rw-r--r-- | internal/db/access.go | 240 |
1 files changed, 0 insertions, 240 deletions
diff --git a/internal/db/access.go b/internal/db/access.go deleted file mode 100644 index 987abe80..00000000 --- a/internal/db/access.go +++ /dev/null @@ -1,240 +0,0 @@ -// Copyright 2014 The Gogs Authors. All rights reserved. -// Use of this source code is governed by a MIT-style -// license that can be found in the LICENSE file. - -package db - -import ( - "fmt" - - log "unknwon.dev/clog/v2" -) - -type AccessMode int - -const ( - AccessModeNone AccessMode = iota // 0 - AccessModeRead // 1 - AccessModeWrite // 2 - AccessModeAdmin // 3 - AccessModeOwner // 4 -) - -func (mode AccessMode) String() string { - switch mode { - case AccessModeRead: - return "read" - case AccessModeWrite: - return "write" - case AccessModeAdmin: - return "admin" - case AccessModeOwner: - return "owner" - default: - return "none" - } -} - -// ParseAccessMode returns corresponding access mode to given permission string. -func ParseAccessMode(permission string) AccessMode { - switch permission { - case "write": - return AccessModeWrite - case "admin": - return AccessModeAdmin - default: - return AccessModeRead - } -} - -// Access represents the highest access level of a user to a repository. The only access type -// that is not in this table is the real owner of a repository. In case of an organization -// repository, the members of the owners team are in this table. -type Access struct { - ID int64 - UserID int64 `xorm:"UNIQUE(s)"` - RepoID int64 `xorm:"UNIQUE(s)"` - Mode AccessMode -} - -func userAccessMode(e Engine, userID int64, repo *Repository) (AccessMode, error) { - mode := AccessModeNone - // Everyone has read access to public repository - if !repo.IsPrivate { - mode = AccessModeRead - } - - if userID <= 0 { - return mode, nil - } - - if userID == repo.OwnerID { - return AccessModeOwner, nil - } - - access := &Access{ - UserID: userID, - RepoID: repo.ID, - } - if has, err := e.Get(access); !has || err != nil { - return mode, err - } - return access.Mode, nil -} - -// UserAccessMode returns the access mode of given user to the repository. -func UserAccessMode(userID int64, repo *Repository) (AccessMode, error) { - return userAccessMode(x, userID, repo) -} - -func hasAccess(e Engine, userID int64, repo *Repository, testMode AccessMode) (bool, error) { - mode, err := userAccessMode(e, userID, repo) - return mode >= testMode, err -} - -// HasAccess returns true if someone has the request access level. User can be nil! -// Deprecated: Use Perms.Authorize instead. -func HasAccess(userID int64, repo *Repository, testMode AccessMode) (bool, error) { - return hasAccess(x, userID, repo, testMode) -} - -// GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own. -func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) { - accesses := make([]*Access, 0, 10) - if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil { - return nil, err - } - - repos := make(map[*Repository]AccessMode, len(accesses)) - for _, access := range accesses { - repo, err := GetRepositoryByID(access.RepoID) - if err != nil { - if IsErrRepoNotExist(err) { - log.Error("Failed to get repository by ID: %v", err) - continue - } - return nil, err - } - if repo.OwnerID == u.ID { - continue - } - repos[repo] = access.Mode - } - return repos, nil -} - -// GetAccessibleRepositories finds repositories which the user has access but does not own. -// If limit is smaller than 1 means returns all found results. -func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) { - sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix") - if limit > 0 { - sess.Limit(limit) - repos = make([]*Repository, 0, limit) - } else { - repos = make([]*Repository, 0, 10) - } - return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos) -} - -func maxAccessMode(modes ...AccessMode) AccessMode { - max := AccessModeNone - for _, mode := range modes { - if mode > max { - max = mode - } - } - return max -} - -// Deprecated: Use Perms.SetRepoPerms instead. -func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]AccessMode) (err error) { - newAccesses := make([]Access, 0, len(accessMap)) - for userID, mode := range accessMap { - newAccesses = append(newAccesses, Access{ - UserID: userID, - RepoID: repo.ID, - Mode: mode, - }) - } - - // Delete old accesses and insert new ones for repository. - if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil { - return fmt.Errorf("delete old accesses: %v", err) - } else if _, err = e.Insert(newAccesses); err != nil { - return fmt.Errorf("insert new accesses: %v", err) - } - return nil -} - -// refreshCollaboratorAccesses retrieves repository collaborations with their access modes. -func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]AccessMode) error { - collaborations, err := repo.getCollaborations(e) - if err != nil { - return fmt.Errorf("getCollaborations: %v", err) - } - for _, c := range collaborations { - accessMap[c.UserID] = c.Mode - } - return nil -} - -// recalculateTeamAccesses recalculates new accesses for teams of an organization -// except the team whose ID is given. It is used to assign a team ID when -// remove repository from that team. -func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) { - accessMap := make(map[int64]AccessMode, 20) - - if err = repo.getOwner(e); err != nil { - return err - } else if !repo.Owner.IsOrganization() { - return fmt.Errorf("owner is not an organization: %d", repo.OwnerID) - } - - if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil { - return fmt.Errorf("refreshCollaboratorAccesses: %v", err) - } - - if err = repo.Owner.getTeams(e); err != nil { - return err - } - - for _, t := range repo.Owner.Teams { - if t.ID == ignTeamID { - continue - } - - // Owner team gets owner access, and skip for teams that do not - // have relations with repository. - if t.IsOwnerTeam() { - t.Authorize = AccessModeOwner - } else if !t.hasRepository(e, repo.ID) { - continue - } - - if err = t.getMembers(e); err != nil { - return fmt.Errorf("getMembers '%d': %v", t.ID, err) - } - for _, m := range t.Members { - accessMap[m.ID] = maxAccessMode(accessMap[m.ID], t.Authorize) - } - } - - return repo.refreshAccesses(e, accessMap) -} - -func (repo *Repository) recalculateAccesses(e Engine) error { - if repo.Owner.IsOrganization() { - return repo.recalculateTeamAccesses(e, 0) - } - - accessMap := make(map[int64]AccessMode, 10) - if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil { - return fmt.Errorf("refreshCollaboratorAccesses: %v", err) - } - return repo.refreshAccesses(e, accessMap) -} - -// RecalculateAccesses recalculates all accesses for repository. -func (repo *Repository) RecalculateAccesses() error { - return repo.recalculateAccesses(x) -} |