diff options
Diffstat (limited to 'internal/db/access.go')
-rw-r--r-- | internal/db/access.go | 241 |
1 files changed, 241 insertions, 0 deletions
diff --git a/internal/db/access.go b/internal/db/access.go new file mode 100644 index 00000000..e9c8b5b7 --- /dev/null +++ b/internal/db/access.go @@ -0,0 +1,241 @@ +// Copyright 2014 The Gogs Authors. All rights reserved. +// Use of this source code is governed by a MIT-style +// license that can be found in the LICENSE file. + +package db + +import ( + "fmt" + + log "gopkg.in/clog.v1" + + "gogs.io/gogs/internal/db/errors" +) + +type AccessMode int + +const ( + ACCESS_MODE_NONE AccessMode = iota // 0 + ACCESS_MODE_READ // 1 + ACCESS_MODE_WRITE // 2 + ACCESS_MODE_ADMIN // 3 + ACCESS_MODE_OWNER // 4 +) + +func (mode AccessMode) String() string { + switch mode { + case ACCESS_MODE_READ: + return "read" + case ACCESS_MODE_WRITE: + return "write" + case ACCESS_MODE_ADMIN: + return "admin" + case ACCESS_MODE_OWNER: + return "owner" + default: + return "none" + } +} + +// ParseAccessMode returns corresponding access mode to given permission string. +func ParseAccessMode(permission string) AccessMode { + switch permission { + case "write": + return ACCESS_MODE_WRITE + case "admin": + return ACCESS_MODE_ADMIN + default: + return ACCESS_MODE_READ + } +} + +// Access represents the highest access level of a user to the repository. The only access type +// that is not in this table is the real owner of a repository. In case of an organization +// repository, the members of the owners team are in this table. +type Access struct { + ID int64 + UserID int64 `xorm:"UNIQUE(s)"` + RepoID int64 `xorm:"UNIQUE(s)"` + Mode AccessMode +} + +func userAccessMode(e Engine, userID int64, repo *Repository) (AccessMode, error) { + mode := ACCESS_MODE_NONE + // Everyone has read access to public repository + if !repo.IsPrivate { + mode = ACCESS_MODE_READ + } + + if userID <= 0 { + return mode, nil + } + + if userID == repo.OwnerID { + return ACCESS_MODE_OWNER, nil + } + + access := &Access{ + UserID: userID, + RepoID: repo.ID, + } + if has, err := e.Get(access); !has || err != nil { + return mode, err + } + return access.Mode, nil +} + +// UserAccessMode returns the access mode of given user to the repository. +func UserAccessMode(userID int64, repo *Repository) (AccessMode, error) { + return userAccessMode(x, userID, repo) +} + +func hasAccess(e Engine, userID int64, repo *Repository, testMode AccessMode) (bool, error) { + mode, err := userAccessMode(e, userID, repo) + return mode >= testMode, err +} + +// HasAccess returns true if someone has the request access level. User can be nil! +func HasAccess(userID int64, repo *Repository, testMode AccessMode) (bool, error) { + return hasAccess(x, userID, repo, testMode) +} + +// GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own. +func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) { + accesses := make([]*Access, 0, 10) + if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil { + return nil, err + } + + repos := make(map[*Repository]AccessMode, len(accesses)) + for _, access := range accesses { + repo, err := GetRepositoryByID(access.RepoID) + if err != nil { + if errors.IsRepoNotExist(err) { + log.Error(2, "GetRepositoryByID: %v", err) + continue + } + return nil, err + } + if repo.OwnerID == u.ID { + continue + } + repos[repo] = access.Mode + } + return repos, nil +} + +// GetAccessibleRepositories finds repositories which the user has access but does not own. +// If limit is smaller than 1 means returns all found results. +func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) { + sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix") + if limit > 0 { + sess.Limit(limit) + repos = make([]*Repository, 0, limit) + } else { + repos = make([]*Repository, 0, 10) + } + return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos) +} + +func maxAccessMode(modes ...AccessMode) AccessMode { + max := ACCESS_MODE_NONE + for _, mode := range modes { + if mode > max { + max = mode + } + } + return max +} + +// FIXME: do corss-comparison so reduce deletions and additions to the minimum? +func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]AccessMode) (err error) { + newAccesses := make([]Access, 0, len(accessMap)) + for userID, mode := range accessMap { + newAccesses = append(newAccesses, Access{ + UserID: userID, + RepoID: repo.ID, + Mode: mode, + }) + } + + // Delete old accesses and insert new ones for repository. + if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil { + return fmt.Errorf("delete old accesses: %v", err) + } else if _, err = e.Insert(newAccesses); err != nil { + return fmt.Errorf("insert new accesses: %v", err) + } + return nil +} + +// refreshCollaboratorAccesses retrieves repository collaborations with their access modes. +func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]AccessMode) error { + collaborations, err := repo.getCollaborations(e) + if err != nil { + return fmt.Errorf("getCollaborations: %v", err) + } + for _, c := range collaborations { + accessMap[c.UserID] = c.Mode + } + return nil +} + +// recalculateTeamAccesses recalculates new accesses for teams of an organization +// except the team whose ID is given. It is used to assign a team ID when +// remove repository from that team. +func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) { + accessMap := make(map[int64]AccessMode, 20) + + if err = repo.getOwner(e); err != nil { + return err + } else if !repo.Owner.IsOrganization() { + return fmt.Errorf("owner is not an organization: %d", repo.OwnerID) + } + + if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil { + return fmt.Errorf("refreshCollaboratorAccesses: %v", err) + } + + if err = repo.Owner.getTeams(e); err != nil { + return err + } + + for _, t := range repo.Owner.Teams { + if t.ID == ignTeamID { + continue + } + + // Owner team gets owner access, and skip for teams that do not + // have relations with repository. + if t.IsOwnerTeam() { + t.Authorize = ACCESS_MODE_OWNER + } else if !t.hasRepository(e, repo.ID) { + continue + } + + if err = t.getMembers(e); err != nil { + return fmt.Errorf("getMembers '%d': %v", t.ID, err) + } + for _, m := range t.Members { + accessMap[m.ID] = maxAccessMode(accessMap[m.ID], t.Authorize) + } + } + + return repo.refreshAccesses(e, accessMap) +} + +func (repo *Repository) recalculateAccesses(e Engine) error { + if repo.Owner.IsOrganization() { + return repo.recalculateTeamAccesses(e, 0) + } + + accessMap := make(map[int64]AccessMode, 10) + if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil { + return fmt.Errorf("refreshCollaboratorAccesses: %v", err) + } + return repo.refreshAccesses(e, accessMap) +} + +// RecalculateAccesses recalculates all accesses for repository. +func (repo *Repository) RecalculateAccesses() error { + return repo.recalculateAccesses(x) +} |