2018-07-25 05:30:33 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-01-19 13:52:55 -05:00
|
|
|
class ProjectTeam
|
2013-01-03 14:09:18 -05:00
|
|
|
attr_accessor :project
|
|
|
|
|
|
|
|
def initialize(project)
|
|
|
|
@project = project
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|
|
|
|
|
2016-11-18 07:52:39 -05:00
|
|
|
def add_guest(user, current_user: nil)
|
2022-07-05 14:08:43 -04:00
|
|
|
add_member(user, :guest, current_user: current_user)
|
2016-11-18 07:52:39 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def add_reporter(user, current_user: nil)
|
2022-07-05 14:08:43 -04:00
|
|
|
add_member(user, :reporter, current_user: current_user)
|
2016-11-18 07:52:39 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def add_developer(user, current_user: nil)
|
2022-07-05 14:08:43 -04:00
|
|
|
add_member(user, :developer, current_user: current_user)
|
2016-11-18 07:52:39 -05:00
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
def add_maintainer(user, current_user: nil)
|
2022-07-05 14:08:43 -04:00
|
|
|
add_member(user, :maintainer, current_user: current_user)
|
2017-12-22 03:18:28 -05:00
|
|
|
end
|
|
|
|
|
2022-02-23 01:18:49 -05:00
|
|
|
def add_owner(user, current_user: nil)
|
2022-07-05 14:08:43 -04:00
|
|
|
add_member(user, :owner, current_user: current_user)
|
2022-02-23 01:18:49 -05:00
|
|
|
end
|
|
|
|
|
2017-12-22 03:18:28 -05:00
|
|
|
def add_role(user, role, current_user: nil)
|
2018-06-25 14:58:41 -04:00
|
|
|
public_send(:"add_#{role}", user, current_user: current_user) # rubocop:disable GitlabSecurity/PublicSend
|
2016-11-18 07:52:39 -05:00
|
|
|
end
|
|
|
|
|
2015-03-13 11:23:45 -04:00
|
|
|
def find_member(user_id)
|
2016-06-27 10:20:57 -04:00
|
|
|
member = project.members.find_by(user_id: user_id)
|
2013-08-27 14:35:41 -04:00
|
|
|
|
|
|
|
# If user is not in project members
|
|
|
|
# we should check for group membership
|
2015-03-13 11:23:45 -04:00
|
|
|
if group && !member
|
2016-06-27 10:20:57 -04:00
|
|
|
member = group.members.find_by(user_id: user_id)
|
2013-08-27 14:35:41 -04:00
|
|
|
end
|
|
|
|
|
2015-03-13 11:23:45 -04:00
|
|
|
member
|
2013-01-22 12:45:13 -05:00
|
|
|
end
|
|
|
|
|
2022-07-05 14:08:43 -04:00
|
|
|
def add_members(users, access_level, current_user: nil, expires_at: nil, tasks_to_be_done: [], tasks_project_id: nil)
|
|
|
|
Members::Projects::CreatorService.add_members( # rubocop:disable CodeReuse/ServiceClass
|
2017-04-21 10:07:42 -04:00
|
|
|
project,
|
2015-04-10 08:46:09 -04:00
|
|
|
users,
|
2016-09-16 11:54:21 -04:00
|
|
|
access_level,
|
2016-08-02 14:37:22 -04:00
|
|
|
current_user: current_user,
|
2021-10-25 08:10:19 -04:00
|
|
|
expires_at: expires_at,
|
|
|
|
tasks_to_be_done: tasks_to_be_done,
|
|
|
|
tasks_project_id: tasks_project_id
|
2013-01-03 14:09:18 -05:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2022-07-05 14:08:43 -04:00
|
|
|
def add_member(user, access_level, current_user: nil, expires_at: nil)
|
|
|
|
Members::Projects::CreatorService.add_member( # rubocop:disable CodeReuse/ServiceClass
|
2022-06-16 05:09:15 -04:00
|
|
|
project,
|
|
|
|
user,
|
|
|
|
access_level,
|
|
|
|
current_user: current_user,
|
|
|
|
expires_at: expires_at)
|
2015-04-10 08:46:09 -04:00
|
|
|
end
|
|
|
|
|
2013-01-03 14:09:18 -05:00
|
|
|
# Remove all users from project team
|
|
|
|
def truncate
|
2014-09-14 12:32:51 -04:00
|
|
|
ProjectMember.truncate_team(project)
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def members
|
2013-06-22 05:57:05 -04:00
|
|
|
@members ||= fetch_members
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
2016-04-18 12:53:32 -04:00
|
|
|
alias_method :users, :members
|
2013-01-03 14:09:18 -05:00
|
|
|
|
2019-01-14 16:53:37 -05:00
|
|
|
# `members` method uses project_authorizations table which
|
|
|
|
# is updated asynchronously, on project move it still contains
|
|
|
|
# old members who may not have access to the new location,
|
|
|
|
# so we filter out only members of project or project's group
|
|
|
|
def members_in_project_and_ancestors
|
|
|
|
members.where(id: member_user_ids)
|
|
|
|
end
|
|
|
|
|
2021-08-13 11:11:15 -04:00
|
|
|
def members_with_access_levels(access_levels = [])
|
|
|
|
fetch_members(access_levels)
|
|
|
|
end
|
|
|
|
|
2013-01-03 14:09:18 -05:00
|
|
|
def guests
|
2016-11-21 09:26:12 -05:00
|
|
|
@guests ||= fetch_members(Gitlab::Access::GUEST)
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def reporters
|
2016-11-21 09:26:12 -05:00
|
|
|
@reporters ||= fetch_members(Gitlab::Access::REPORTER)
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def developers
|
2016-11-21 09:26:12 -05:00
|
|
|
@developers ||= fetch_members(Gitlab::Access::DEVELOPER)
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
def maintainers
|
|
|
|
@maintainers ||= fetch_members(Gitlab::Access::MAINTAINER)
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
2013-01-04 01:43:25 -05:00
|
|
|
|
2018-03-07 12:01:32 -05:00
|
|
|
def owners
|
|
|
|
@owners ||=
|
|
|
|
if group
|
|
|
|
group.owners
|
|
|
|
else
|
2022-02-23 01:18:49 -05:00
|
|
|
# workaround until we migrate Project#owners to have membership with
|
|
|
|
# OWNER access level
|
|
|
|
Array.wrap(fetch_members(Gitlab::Access::OWNER)) | Array.wrap(project.owner)
|
2018-03-07 12:01:32 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-01-20 04:11:11 -05:00
|
|
|
def owner?(user)
|
|
|
|
owners.include?(user)
|
|
|
|
end
|
|
|
|
|
2015-04-10 08:46:09 -04:00
|
|
|
def import(source_project, current_user = nil)
|
2013-01-04 01:43:25 -05:00
|
|
|
target_project = project
|
|
|
|
|
2015-03-13 11:23:45 -04:00
|
|
|
source_members = source_project.project_members.to_a
|
2014-09-14 12:32:51 -04:00
|
|
|
target_user_ids = target_project.project_members.pluck(:user_id)
|
2013-01-04 01:43:25 -05:00
|
|
|
|
2015-03-13 11:23:45 -04:00
|
|
|
source_members.reject! do |member|
|
2013-01-04 01:43:25 -05:00
|
|
|
# Skip if user already present in team
|
2015-04-10 09:26:53 -04:00
|
|
|
!member.invite? && target_user_ids.include?(member.user_id)
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|
|
|
|
|
2015-03-13 11:23:45 -04:00
|
|
|
source_members.map! do |member|
|
|
|
|
new_member = member.dup
|
|
|
|
new_member.id = nil
|
|
|
|
new_member.source = target_project
|
2015-04-10 08:46:09 -04:00
|
|
|
new_member.created_by = current_user
|
2015-03-13 11:23:45 -04:00
|
|
|
new_member
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|
|
|
|
|
2014-09-14 12:32:51 -04:00
|
|
|
ProjectMember.transaction do
|
2015-03-13 11:23:45 -04:00
|
|
|
source_members.each do |member|
|
|
|
|
member.save
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
true
|
2021-04-26 08:09:44 -04:00
|
|
|
rescue StandardError
|
2013-01-04 01:43:25 -05:00
|
|
|
false
|
|
|
|
end
|
2013-06-17 07:17:32 -04:00
|
|
|
|
2014-06-04 04:52:17 -04:00
|
|
|
def guest?(user)
|
2015-03-13 11:23:45 -04:00
|
|
|
max_member_access(user.id) == Gitlab::Access::GUEST
|
2014-06-04 04:52:17 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def reporter?(user)
|
2015-03-13 11:23:45 -04:00
|
|
|
max_member_access(user.id) == Gitlab::Access::REPORTER
|
2014-06-04 04:52:17 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def developer?(user)
|
2015-03-13 11:23:45 -04:00
|
|
|
max_member_access(user.id) == Gitlab::Access::DEVELOPER
|
2014-06-04 04:52:17 -04:00
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
def maintainer?(user)
|
|
|
|
max_member_access(user.id) == Gitlab::Access::MAINTAINER
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
|
|
|
|
2016-11-18 12:15:47 -05:00
|
|
|
# Checks if `user` is authorized for this project, with at least the
|
|
|
|
# `min_access_level` (if given).
|
|
|
|
def member?(user, min_access_level = Gitlab::Access::GUEST)
|
|
|
|
return false unless user
|
|
|
|
|
2017-09-17 02:25:34 -04:00
|
|
|
max_member_access(user.id) >= min_access_level
|
2014-10-08 09:44:25 -04:00
|
|
|
end
|
|
|
|
|
2016-06-02 12:05:06 -04:00
|
|
|
def human_max_access(user_id)
|
2017-07-29 11:04:42 -04:00
|
|
|
Gitlab::Access.human_access(max_member_access(user_id))
|
2016-06-02 12:05:06 -04:00
|
|
|
end
|
|
|
|
|
2016-07-20 00:52:31 -04:00
|
|
|
# Determine the maximum access level for a group of users in bulk.
|
|
|
|
#
|
2016-07-26 20:07:51 -04:00
|
|
|
# Returns a Hash mapping user ID -> maximum access level.
|
2016-07-20 00:52:31 -04:00
|
|
|
def max_member_access_for_user_ids(user_ids)
|
2022-03-14 14:07:46 -04:00
|
|
|
Gitlab::SafeRequestLoader.execute(resource_key: project.max_member_access_for_resource_key(User),
|
|
|
|
resource_ids: user_ids,
|
|
|
|
default_value: Gitlab::Access::NO_ACCESS) do |user_ids|
|
2017-12-07 04:11:41 -05:00
|
|
|
project.project_authorizations
|
|
|
|
.where(user: user_ids)
|
|
|
|
.group(:user_id)
|
|
|
|
.maximum(:access_level)
|
2016-08-01 16:11:45 -04:00
|
|
|
end
|
2016-07-20 00:52:31 -04:00
|
|
|
end
|
|
|
|
|
2021-04-13 14:11:28 -04:00
|
|
|
def write_member_access_for_user_id(user_id, project_access_level)
|
2021-12-06 22:12:22 -05:00
|
|
|
project.merge_value_to_request_store(User, user_id, project_access_level)
|
2021-04-13 14:11:28 -04:00
|
|
|
end
|
|
|
|
|
2022-05-11 23:08:58 -04:00
|
|
|
def purge_member_access_cache_for_user_id(user_id)
|
|
|
|
project.purge_resource_id_from_request_store(User, user_id)
|
|
|
|
end
|
|
|
|
|
2016-07-20 00:52:31 -04:00
|
|
|
def max_member_access(user_id)
|
2017-12-07 04:11:41 -05:00
|
|
|
max_member_access_for_user_ids([user_id])[user_id]
|
2016-03-11 12:46:01 -05:00
|
|
|
end
|
|
|
|
|
2020-09-16 11:09:32 -04:00
|
|
|
def contribution_check_for_user_ids(user_ids)
|
2022-03-15 08:07:44 -04:00
|
|
|
Gitlab::SafeRequestLoader.execute(resource_key: "contribution_check_for_users:#{project.id}",
|
|
|
|
resource_ids: user_ids,
|
|
|
|
default_value: false) do |user_ids|
|
|
|
|
project.merge_requests
|
|
|
|
.merged
|
|
|
|
.where(author_id: user_ids, target_branch: project.default_branch.to_s)
|
|
|
|
.pluck(:author_id)
|
|
|
|
.product([true]).to_h
|
2020-09-16 11:09:32 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def contributor?(user_id)
|
|
|
|
return false if max_member_access(user_id) >= Gitlab::Access::GUEST
|
|
|
|
|
|
|
|
contribution_check_for_user_ids([user_id])[user_id]
|
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
private
|
2016-03-11 12:46:01 -05:00
|
|
|
|
2013-06-17 07:17:32 -04:00
|
|
|
def fetch_members(level = nil)
|
2016-11-21 09:26:12 -05:00
|
|
|
members = project.authorized_users
|
|
|
|
members = members.where(project_authorizations: { access_level: level }) if level
|
2013-06-17 07:17:32 -04:00
|
|
|
|
2016-11-21 09:26:12 -05:00
|
|
|
members
|
2013-06-17 07:17:32 -04:00
|
|
|
end
|
2013-06-17 08:38:19 -04:00
|
|
|
|
|
|
|
def group
|
|
|
|
project.group
|
|
|
|
end
|
2019-01-14 16:53:37 -05:00
|
|
|
|
|
|
|
def member_user_ids
|
|
|
|
Member.on_project_and_ancestors(project).select(:user_id)
|
|
|
|
end
|
2013-01-03 14:09:18 -05:00
|
|
|
end
|
2019-09-13 09:26:31 -04:00
|
|
|
|
2021-05-11 17:10:21 -04:00
|
|
|
ProjectTeam.prepend_mod_with('ProjectTeam')
|