| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240 | // Copyright 2014 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package dbimport (	"fmt"	log "unknwon.dev/clog/v2")type AccessMode intconst (	AccessModeNone  AccessMode = iota // 0	AccessModeRead                    // 1	AccessModeWrite                   // 2	AccessModeAdmin                   // 3	AccessModeOwner                   // 4)func (mode AccessMode) String() string {	switch mode {	case AccessModeRead:		return "read"	case AccessModeWrite:		return "write"	case AccessModeAdmin:		return "admin"	case AccessModeOwner:		return "owner"	default:		return "none"	}}// ParseAccessMode returns corresponding access mode to given permission string.func ParseAccessMode(permission string) AccessMode {	switch permission {	case "write":		return AccessModeWrite	case "admin":		return AccessModeAdmin	default:		return AccessModeRead	}}// Access represents the highest access level of a user to a repository. The only access type// that is not in this table is the real owner of a repository. In case of an organization// repository, the members of the owners team are in this table.type Access struct {	ID     int64	UserID int64 `xorm:"UNIQUE(s)"`	RepoID int64 `xorm:"UNIQUE(s)"`	Mode   AccessMode}func userAccessMode(e Engine, userID int64, repo *Repository) (AccessMode, error) {	mode := AccessModeNone	// Everyone has read access to public repository	if !repo.IsPrivate {		mode = AccessModeRead	}	if userID <= 0 {		return mode, nil	}	if userID == repo.OwnerID {		return AccessModeOwner, nil	}	access := &Access{		UserID: userID,		RepoID: repo.ID,	}	if has, err := e.Get(access); !has || err != nil {		return mode, err	}	return access.Mode, nil}// UserAccessMode returns the access mode of given user to the repository.func UserAccessMode(userID int64, repo *Repository) (AccessMode, error) {	return userAccessMode(x, userID, repo)}func hasAccess(e Engine, userID int64, repo *Repository, testMode AccessMode) (bool, error) {	mode, err := userAccessMode(e, userID, repo)	return mode >= testMode, err}// HasAccess returns true if someone has the request access level. User can be nil!// Deprecated: Use Perms.Authorize instead.func HasAccess(userID int64, repo *Repository, testMode AccessMode) (bool, error) {	return hasAccess(x, userID, repo, testMode)}// GetRepositoryAccesses finds all repositories with their access mode where a user has access but does not own.func (u *User) GetRepositoryAccesses() (map[*Repository]AccessMode, error) {	accesses := make([]*Access, 0, 10)	if err := x.Find(&accesses, &Access{UserID: u.ID}); err != nil {		return nil, err	}	repos := make(map[*Repository]AccessMode, len(accesses))	for _, access := range accesses {		repo, err := GetRepositoryByID(access.RepoID)		if err != nil {			if IsErrRepoNotExist(err) {				log.Error("Failed to get repository by ID: %v", err)				continue			}			return nil, err		}		if repo.OwnerID == u.ID {			continue		}		repos[repo] = access.Mode	}	return repos, nil}// GetAccessibleRepositories finds repositories which the user has access but does not own.// If limit is smaller than 1 means returns all found results.func (user *User) GetAccessibleRepositories(limit int) (repos []*Repository, _ error) {	sess := x.Where("owner_id !=? ", user.ID).Desc("updated_unix")	if limit > 0 {		sess.Limit(limit)		repos = make([]*Repository, 0, limit)	} else {		repos = make([]*Repository, 0, 10)	}	return repos, sess.Join("INNER", "access", "access.user_id = ? AND access.repo_id = repository.id", user.ID).Find(&repos)}func maxAccessMode(modes ...AccessMode) AccessMode {	max := AccessModeNone	for _, mode := range modes {		if mode > max {			max = mode		}	}	return max}// Deprecated: Use Perms.SetRepoPerms instead.func (repo *Repository) refreshAccesses(e Engine, accessMap map[int64]AccessMode) (err error) {	newAccesses := make([]Access, 0, len(accessMap))	for userID, mode := range accessMap {		newAccesses = append(newAccesses, Access{			UserID: userID,			RepoID: repo.ID,			Mode:   mode,		})	}	// Delete old accesses and insert new ones for repository.	if _, err = e.Delete(&Access{RepoID: repo.ID}); err != nil {		return fmt.Errorf("delete old accesses: %v", err)	} else if _, err = e.Insert(newAccesses); err != nil {		return fmt.Errorf("insert new accesses: %v", err)	}	return nil}// refreshCollaboratorAccesses retrieves repository collaborations with their access modes.func (repo *Repository) refreshCollaboratorAccesses(e Engine, accessMap map[int64]AccessMode) error {	collaborations, err := repo.getCollaborations(e)	if err != nil {		return fmt.Errorf("getCollaborations: %v", err)	}	for _, c := range collaborations {		accessMap[c.UserID] = c.Mode	}	return nil}// recalculateTeamAccesses recalculates new accesses for teams of an organization// except the team whose ID is given. It is used to assign a team ID when// remove repository from that team.func (repo *Repository) recalculateTeamAccesses(e Engine, ignTeamID int64) (err error) {	accessMap := make(map[int64]AccessMode, 20)	if err = repo.getOwner(e); err != nil {		return err	} else if !repo.Owner.IsOrganization() {		return fmt.Errorf("owner is not an organization: %d", repo.OwnerID)	}	if err = repo.refreshCollaboratorAccesses(e, accessMap); err != nil {		return fmt.Errorf("refreshCollaboratorAccesses: %v", err)	}	if err = repo.Owner.getTeams(e); err != nil {		return err	}	for _, t := range repo.Owner.Teams {		if t.ID == ignTeamID {			continue		}		// Owner team gets owner access, and skip for teams that do not		// have relations with repository.		if t.IsOwnerTeam() {			t.Authorize = AccessModeOwner		} else if !t.hasRepository(e, repo.ID) {			continue		}		if err = t.getMembers(e); err != nil {			return fmt.Errorf("getMembers '%d': %v", t.ID, err)		}		for _, m := range t.Members {			accessMap[m.ID] = maxAccessMode(accessMap[m.ID], t.Authorize)		}	}	return repo.refreshAccesses(e, accessMap)}func (repo *Repository) recalculateAccesses(e Engine) error {	if repo.Owner.IsOrganization() {		return repo.recalculateTeamAccesses(e, 0)	}	accessMap := make(map[int64]AccessMode, 10)	if err := repo.refreshCollaboratorAccesses(e, accessMap); err != nil {		return fmt.Errorf("refreshCollaboratorAccesses: %v", err)	}	return repo.refreshAccesses(e, accessMap)}// RecalculateAccesses recalculates all accesses for repository.func (repo *Repository) RecalculateAccesses() error {	return repo.recalculateAccesses(x)}
 |