mirror of
https://github.com/go-gitea/gitea.git
synced 2024-11-30 13:14:39 +08:00
eabbddcd98
* fix units permission problems * fix some bugs and merge LoadUnits to repoAssignment * refactor permission struct and add some copyright heads * remove unused codes * fix routes units check * improve permission check * add unit tests for permission * fix typo * fix tests * fix some routes * fix api permission check * improve permission check * fix some permission check * fix tests * fix tests * improve some permission check * fix some permission check * refactor AccessLevel * fix bug * fix tests * fix tests * fix tests * fix AccessLevel * rename CanAccess * fix tests * fix comment * fix bug * add missing unit for test repos * fix bug * rename some functions * fix routes check
98 lines
2.6 KiB
Go
98 lines
2.6 KiB
Go
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package private
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
|
|
"code.gitea.io/gitea/models"
|
|
"code.gitea.io/gitea/modules/httplib"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
)
|
|
|
|
func newRequest(url, method string) *httplib.Request {
|
|
return httplib.NewRequest(url, method).Header("Authorization",
|
|
fmt.Sprintf("Bearer %s", setting.InternalToken))
|
|
}
|
|
|
|
// Response internal request response
|
|
type Response struct {
|
|
Err string `json:"err"`
|
|
}
|
|
|
|
func decodeJSONError(resp *http.Response) *Response {
|
|
var res Response
|
|
err := json.NewDecoder(resp.Body).Decode(&res)
|
|
if err != nil {
|
|
res.Err = err.Error()
|
|
}
|
|
return &res
|
|
}
|
|
|
|
func newInternalRequest(url, method string) *httplib.Request {
|
|
req := newRequest(url, method).SetTLSClientConfig(&tls.Config{
|
|
InsecureSkipVerify: true,
|
|
})
|
|
if setting.Protocol == setting.UnixSocket {
|
|
req.SetTransport(&http.Transport{
|
|
Dial: func(_, _ string) (net.Conn, error) {
|
|
return net.Dial("unix", setting.HTTPAddr)
|
|
},
|
|
})
|
|
}
|
|
return req
|
|
}
|
|
|
|
// CheckUnitUser check whether user could visit the unit of this repository
|
|
func CheckUnitUser(userID, repoID int64, isAdmin bool, unitType models.UnitType) (*models.AccessMode, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repositories/%d/user/%d/checkunituser?isAdmin=%t&unitType=%d", repoID, userID, isAdmin, unitType)
|
|
log.GitLogger.Trace("CheckUnitUser: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("Failed to CheckUnitUser: %s", decodeJSONError(resp).Err)
|
|
}
|
|
|
|
var a models.AccessMode
|
|
if err := json.NewDecoder(resp.Body).Decode(&a); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &a, nil
|
|
}
|
|
|
|
// GetRepositoryByOwnerAndName returns the repository by given ownername and reponame.
|
|
func GetRepositoryByOwnerAndName(ownerName, repoName string) (*models.Repository, error) {
|
|
reqURL := setting.LocalURL + fmt.Sprintf("api/internal/repo/%s/%s", ownerName, repoName)
|
|
log.GitLogger.Trace("GetRepositoryByOwnerAndName: %s", reqURL)
|
|
|
|
resp, err := newInternalRequest(reqURL, "GET").Response()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("Failed to get repository: %s", decodeJSONError(resp).Err)
|
|
}
|
|
|
|
var repo models.Repository
|
|
if err := json.NewDecoder(resp.Body).Decode(&repo); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &repo, nil
|
|
}
|