2018-11-28 19:26:14 +08:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package context
|
|
|
|
|
|
|
|
import (
|
2021-11-10 03:57:58 +08:00
|
|
|
"code.gitea.io/gitea/models/unit"
|
2019-04-23 04:40:51 +08:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2018-11-28 19:26:14 +08:00
|
|
|
)
|
|
|
|
|
2021-01-29 23:35:30 +08:00
|
|
|
// RequireRepoAdmin returns a middleware for requiring repository admin permission
|
2021-01-26 23:36:53 +08:00
|
|
|
func RequireRepoAdmin() func(ctx *Context) {
|
2018-11-28 19:26:14 +08:00
|
|
|
return func(ctx *Context) {
|
|
|
|
if !ctx.IsSigned || !ctx.Repo.IsAdmin() {
|
2019-12-24 08:11:12 +08:00
|
|
|
ctx.NotFound(ctx.Req.URL.RequestURI(), nil)
|
2018-11-28 19:26:14 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 23:35:30 +08:00
|
|
|
// RequireRepoWriter returns a middleware for requiring repository write to the specify unitType
|
2021-11-10 03:57:58 +08:00
|
|
|
func RequireRepoWriter(unitType unit.Type) func(ctx *Context) {
|
2018-11-28 19:26:14 +08:00
|
|
|
return func(ctx *Context) {
|
|
|
|
if !ctx.Repo.CanWrite(unitType) {
|
2019-12-24 08:11:12 +08:00
|
|
|
ctx.NotFound(ctx.Req.URL.RequestURI(), nil)
|
2022-04-28 23:45:33 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// CanEnableEditor checks if the user is allowed to write to the branch of the repo
|
|
|
|
func CanEnableEditor() func(ctx *Context) {
|
|
|
|
return func(ctx *Context) {
|
2022-05-11 18:09:36 +08:00
|
|
|
if !ctx.Repo.CanWriteToBranch(ctx.Doer, ctx.Repo.BranchName) {
|
2022-04-28 23:45:33 +08:00
|
|
|
ctx.NotFound("CanWriteToBranch denies permission", nil)
|
2018-11-28 19:26:14 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 23:35:30 +08:00
|
|
|
// RequireRepoWriterOr returns a middleware for requiring repository write to one of the unit permission
|
2021-11-10 03:57:58 +08:00
|
|
|
func RequireRepoWriterOr(unitTypes ...unit.Type) func(ctx *Context) {
|
2018-11-28 19:26:14 +08:00
|
|
|
return func(ctx *Context) {
|
|
|
|
for _, unitType := range unitTypes {
|
|
|
|
if ctx.Repo.CanWrite(unitType) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2019-12-24 08:11:12 +08:00
|
|
|
ctx.NotFound(ctx.Req.URL.RequestURI(), nil)
|
2018-11-28 19:26:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 23:35:30 +08:00
|
|
|
// RequireRepoReader returns a middleware for requiring repository read to the specify unitType
|
2021-11-10 03:57:58 +08:00
|
|
|
func RequireRepoReader(unitType unit.Type) func(ctx *Context) {
|
2018-11-28 19:26:14 +08:00
|
|
|
return func(ctx *Context) {
|
|
|
|
if !ctx.Repo.CanRead(unitType) {
|
2019-04-23 04:40:51 +08:00
|
|
|
if log.IsTrace() {
|
|
|
|
if ctx.IsSigned {
|
|
|
|
log.Trace("Permission Denied: User %-v cannot read %-v in Repo %-v\n"+
|
|
|
|
"User in Repo has Permissions: %-+v",
|
2022-03-22 15:03:22 +08:00
|
|
|
ctx.Doer,
|
2019-04-23 04:40:51 +08:00
|
|
|
unitType,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
} else {
|
|
|
|
log.Trace("Permission Denied: Anonymous user cannot read %-v in Repo %-v\n"+
|
|
|
|
"Anonymous user in Repo has Permissions: %-+v",
|
|
|
|
unitType,
|
|
|
|
ctx.Repo.Repository,
|
|
|
|
ctx.Repo.Permission)
|
|
|
|
}
|
|
|
|
}
|
2019-12-24 08:11:12 +08:00
|
|
|
ctx.NotFound(ctx.Req.URL.RequestURI(), nil)
|
2018-11-28 19:26:14 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 23:35:30 +08:00
|
|
|
// RequireRepoReaderOr returns a middleware for requiring repository write to one of the unit permission
|
2021-11-10 03:57:58 +08:00
|
|
|
func RequireRepoReaderOr(unitTypes ...unit.Type) func(ctx *Context) {
|
2018-11-28 19:26:14 +08:00
|
|
|
return func(ctx *Context) {
|
|
|
|
for _, unitType := range unitTypes {
|
|
|
|
if ctx.Repo.CanRead(unitType) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2019-04-23 04:40:51 +08:00
|
|
|
if log.IsTrace() {
|
|
|
|
var format string
|
|
|
|
var args []interface{}
|
|
|
|
if ctx.IsSigned {
|
|
|
|
format = "Permission Denied: User %-v cannot read ["
|
2022-03-22 15:03:22 +08:00
|
|
|
args = append(args, ctx.Doer)
|
2019-04-23 04:40:51 +08:00
|
|
|
} else {
|
|
|
|
format = "Permission Denied: Anonymous user cannot read ["
|
|
|
|
}
|
|
|
|
for _, unit := range unitTypes {
|
|
|
|
format += "%-v, "
|
|
|
|
args = append(args, unit)
|
|
|
|
}
|
|
|
|
|
|
|
|
format = format[:len(format)-2] + "] in Repo %-v\n" +
|
|
|
|
"User in Repo has Permissions: %-+v"
|
|
|
|
args = append(args, ctx.Repo.Repository, ctx.Repo.Permission)
|
|
|
|
log.Trace(format, args...)
|
|
|
|
}
|
2019-12-24 08:11:12 +08:00
|
|
|
ctx.NotFound(ctx.Req.URL.RequestURI(), nil)
|
2018-11-28 19:26:14 +08:00
|
|
|
}
|
|
|
|
}
|