mirror of
https://github.com/go-gitea/gitea.git
synced 2024-09-01 14:56:30 +00:00
Fix permission check of maintainer
This commit is contained in:
parent
130ea31d6d
commit
18c47f9f82
@ -50,7 +50,7 @@ func listPullRequestStatement(ctx context.Context, baseRepoID int64, opts *PullR
|
|||||||
}
|
}
|
||||||
|
|
||||||
// GetUnmergedPullRequestsByHeadInfo returns all pull requests that are open and has not been merged
|
// GetUnmergedPullRequestsByHeadInfo returns all pull requests that are open and has not been merged
|
||||||
func GetUnmergedPullRequestsByHeadInfo(ctx context.Context, repoID int64, branch string) ([]*PullRequest, error) {
|
func GetUnmergedPullRequestsByHeadInfo(ctx context.Context, repoID int64, branch string) (PullRequestList, error) {
|
||||||
prs := make([]*PullRequest, 0, 2)
|
prs := make([]*PullRequest, 0, 2)
|
||||||
sess := db.GetEngine(ctx).
|
sess := db.GetEngine(ctx).
|
||||||
Join("INNER", "issue", "issue.id = pull_request.issue_id").
|
Join("INNER", "issue", "issue.id = pull_request.issue_id").
|
||||||
@ -58,29 +58,30 @@ func GetUnmergedPullRequestsByHeadInfo(ctx context.Context, repoID int64, branch
|
|||||||
return prs, sess.Find(&prs)
|
return prs, sess.Find(&prs)
|
||||||
}
|
}
|
||||||
|
|
||||||
// CanMaintainerWriteToBranch check whether user is a maintainer and could write to the branch
|
func CanUserWriteToBranch(ctx context.Context, p access_model.Permission, headRepoID int64, branch string, user *user_model.User) bool {
|
||||||
func CanMaintainerWriteToBranch(ctx context.Context, p access_model.Permission, branch string, user *user_model.User) bool {
|
|
||||||
if p.CanWrite(unit.TypeCode) {
|
if p.CanWrite(unit.TypeCode) {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
// the code below depends on units to get the repository ID, not ideal but just keep it for now
|
return canMaintainerWriteToHeadBranch(ctx, p, headRepoID, branch, user)
|
||||||
firstUnitRepoID := p.GetFirstUnitRepoID()
|
}
|
||||||
if firstUnitRepoID == 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
prs, err := GetUnmergedPullRequestsByHeadInfo(ctx, firstUnitRepoID, branch)
|
// canMaintainerWriteToHeadBranch check whether user is a maintainer and could write to the branch
|
||||||
|
func canMaintainerWriteToHeadBranch(ctx context.Context, p access_model.Permission, headRepoID int64, branch string, user *user_model.User) bool {
|
||||||
|
prs, err := GetUnmergedPullRequestsByHeadInfo(ctx, headRepoID, branch)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Error("GetUnmergedPullRequestsByHeadInfo: %v", err)
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := prs.LoadRepositories(ctx); err != nil {
|
||||||
|
log.Error("LoadBaseRepos: %v", err)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// user can write to the branch once one pull request allowed the user edit the branch
|
||||||
for _, pr := range prs {
|
for _, pr := range prs {
|
||||||
if pr.AllowMaintainerEdit {
|
if pr.AllowMaintainerEdit {
|
||||||
err = pr.LoadBaseRepo(ctx)
|
|
||||||
if err != nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
prPerm, err := access_model.GetUserRepoPermission(ctx, pr.BaseRepo, user)
|
prPerm, err := access_model.GetUserRepoPermission(ctx, pr.BaseRepo, user)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
continue
|
continue
|
||||||
|
@ -55,7 +55,7 @@ func (ctx *preReceiveContext) CanWriteCode() bool {
|
|||||||
if !ctx.loadPusherAndPermission() {
|
if !ctx.loadPusherAndPermission() {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
ctx.canWriteCode = issues_model.CanMaintainerWriteToBranch(ctx, ctx.userPerm, ctx.branchName, ctx.user) || ctx.deployKeyAccessMode >= perm_model.AccessModeWrite
|
ctx.canWriteCode = issues_model.CanUserWriteToBranch(ctx, ctx.userPerm, ctx.Repo.Repository.ID, ctx.branchName, ctx.user) || ctx.deployKeyAccessMode >= perm_model.AccessModeWrite
|
||||||
ctx.checkedCanWriteCode = true
|
ctx.checkedCanWriteCode = true
|
||||||
}
|
}
|
||||||
return ctx.canWriteCode
|
return ctx.canWriteCode
|
||||||
|
@ -871,7 +871,7 @@ func viewPullFiles(ctx *context.Context, specifiedStartCommit, specifiedEndCommi
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if perm.CanWrite(unit.TypeCode) || issues_model.CanMaintainerWriteToBranch(ctx, perm, pull.HeadBranch, ctx.Doer) {
|
if issues_model.CanUserWriteToBranch(ctx, perm, pull.HeadRepoID, pull.HeadBranch, ctx.Doer) {
|
||||||
ctx.Data["CanEditFile"] = true
|
ctx.Data["CanEditFile"] = true
|
||||||
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.edit_this_file")
|
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.edit_this_file")
|
||||||
ctx.Data["HeadRepoLink"] = pull.HeadRepo.Link()
|
ctx.Data["HeadRepoLink"] = pull.HeadRepo.Link()
|
||||||
|
@ -70,7 +70,7 @@ type Repository struct {
|
|||||||
|
|
||||||
// CanWriteToBranch checks if the branch is writable by the user
|
// CanWriteToBranch checks if the branch is writable by the user
|
||||||
func (r *Repository) CanWriteToBranch(ctx context.Context, user *user_model.User, branch string) bool {
|
func (r *Repository) CanWriteToBranch(ctx context.Context, user *user_model.User, branch string) bool {
|
||||||
return issues_model.CanMaintainerWriteToBranch(ctx, r.Permission, branch, user)
|
return issues_model.CanUserWriteToBranch(ctx, r.Permission, r.Repository.ID, branch, user)
|
||||||
}
|
}
|
||||||
|
|
||||||
// CanEnableEditor returns true if repository is editable and user has proper access level.
|
// CanEnableEditor returns true if repository is editable and user has proper access level.
|
||||||
|
@ -67,7 +67,7 @@ func ToBranch(ctx context.Context, repo *repo_model.Repository, branchName strin
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
canPush = issues_model.CanMaintainerWriteToBranch(ctx, perms, branchName, user)
|
canPush = issues_model.CanUserWriteToBranch(ctx, perms, repo.ID, branchName, user)
|
||||||
}
|
}
|
||||||
|
|
||||||
return &api.Branch{
|
return &api.Branch{
|
||||||
|
@ -16,6 +16,7 @@ import (
|
|||||||
issues_model "code.gitea.io/gitea/models/issues"
|
issues_model "code.gitea.io/gitea/models/issues"
|
||||||
repo_model "code.gitea.io/gitea/models/repo"
|
repo_model "code.gitea.io/gitea/models/repo"
|
||||||
user_model "code.gitea.io/gitea/models/user"
|
user_model "code.gitea.io/gitea/models/user"
|
||||||
|
"code.gitea.io/gitea/modules/container"
|
||||||
"code.gitea.io/gitea/modules/git"
|
"code.gitea.io/gitea/modules/git"
|
||||||
"code.gitea.io/gitea/modules/gitrepo"
|
"code.gitea.io/gitea/modules/gitrepo"
|
||||||
"code.gitea.io/gitea/modules/log"
|
"code.gitea.io/gitea/modules/log"
|
||||||
@ -71,7 +72,10 @@ func InvalidateCodeComments(ctx context.Context, prs issues_model.PullRequestLis
|
|||||||
if len(prs) == 0 {
|
if len(prs) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
issueIDs := prs.GetIssueIDs()
|
|
||||||
|
issueIDs := container.FilterSlice(prs, func(pr *issues_model.PullRequest) (int64, bool) {
|
||||||
|
return pr.IssueID, true
|
||||||
|
})
|
||||||
|
|
||||||
codeComments, err := db.Find[issues_model.Comment](ctx, issues_model.FindCommentsOptions{
|
codeComments, err := db.Find[issues_model.Comment](ctx, issues_model.FindCommentsOptions{
|
||||||
ListOptions: db.ListOptionsAll,
|
ListOptions: db.ListOptionsAll,
|
||||||
|
Loading…
Reference in New Issue
Block a user