2014-02-25 12:15:08 -05:00
|
|
|
# Finders::Issues class
|
|
|
|
#
|
|
|
|
# Used to filter Issues collections by set of params
|
|
|
|
#
|
|
|
|
# Arguments:
|
|
|
|
# current_user - which user use
|
|
|
|
# params:
|
|
|
|
# scope: 'created-by-me' or 'assigned-to-me' or 'all'
|
|
|
|
# state: 'open' or 'closed' or 'all'
|
|
|
|
# group_id: integer
|
|
|
|
# project_id: integer
|
2017-03-31 05:38:40 -04:00
|
|
|
# milestone_title: string
|
2014-02-25 12:15:08 -05:00
|
|
|
# assignee_id: integer
|
|
|
|
# search: string
|
|
|
|
# label_name: string
|
|
|
|
# sort: string
|
2017-09-03 03:34:50 -04:00
|
|
|
# my_reaction_emoji: string
|
2018-01-23 06:03:15 -05:00
|
|
|
# public_only: boolean
|
2014-02-25 12:15:08 -05:00
|
|
|
#
|
2014-09-02 08:28:27 -04:00
|
|
|
class IssuesFinder < IssuableFinder
|
2017-06-20 11:38:14 -04:00
|
|
|
CONFIDENTIAL_ACCESS_LEVEL = Gitlab::Access::REPORTER
|
|
|
|
|
2014-02-25 12:15:08 -05:00
|
|
|
def klass
|
|
|
|
Issue
|
|
|
|
end
|
2016-03-17 15:38:51 -04:00
|
|
|
|
2017-06-29 07:43:56 -04:00
|
|
|
def with_confidentiality_access_check
|
2017-06-20 11:38:14 -04:00
|
|
|
return Issue.all if user_can_see_all_confidential_issues?
|
2017-06-23 07:50:33 -04:00
|
|
|
return Issue.where('issues.confidential IS NOT TRUE') if user_cannot_see_confidential_issues?
|
2017-06-20 11:38:14 -04:00
|
|
|
|
|
|
|
Issue.where('
|
|
|
|
issues.confidential IS NOT TRUE
|
|
|
|
OR (issues.confidential = TRUE
|
|
|
|
AND (issues.author_id = :user_id
|
|
|
|
OR EXISTS (SELECT TRUE FROM issue_assignees WHERE user_id = :user_id AND issue_id = issues.id)
|
|
|
|
OR issues.project_id IN(:project_ids)))',
|
|
|
|
user_id: current_user.id,
|
|
|
|
project_ids: current_user.authorized_projects(CONFIDENTIAL_ACCESS_LEVEL).select(:id))
|
|
|
|
end
|
|
|
|
|
2017-06-29 07:43:56 -04:00
|
|
|
private
|
|
|
|
|
|
|
|
def init_collection
|
2018-01-23 06:03:15 -05:00
|
|
|
if public_only?
|
|
|
|
Issue.public_only
|
|
|
|
else
|
|
|
|
with_confidentiality_access_check
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def public_only?
|
|
|
|
params.fetch(:public_only, false)
|
2017-06-29 07:43:56 -04:00
|
|
|
end
|
|
|
|
|
2017-06-22 15:58:20 -04:00
|
|
|
def user_can_see_all_confidential_issues?
|
2017-06-29 07:43:56 -04:00
|
|
|
return @user_can_see_all_confidential_issues if defined?(@user_can_see_all_confidential_issues)
|
|
|
|
|
2017-06-23 07:50:33 -04:00
|
|
|
return @user_can_see_all_confidential_issues = false if current_user.blank?
|
|
|
|
return @user_can_see_all_confidential_issues = true if current_user.full_private_access?
|
2017-06-22 15:58:20 -04:00
|
|
|
|
2017-06-23 07:50:33 -04:00
|
|
|
@user_can_see_all_confidential_issues =
|
|
|
|
project? &&
|
2017-06-22 15:58:20 -04:00
|
|
|
project &&
|
|
|
|
project.team.max_member_access(current_user.id) >= CONFIDENTIAL_ACCESS_LEVEL
|
|
|
|
end
|
|
|
|
|
2017-08-31 07:21:39 -04:00
|
|
|
def user_cannot_see_confidential_issues?
|
2017-06-23 07:50:33 -04:00
|
|
|
return false if user_can_see_all_confidential_issues?
|
|
|
|
|
2017-08-31 07:21:39 -04:00
|
|
|
current_user.blank?
|
2017-07-11 12:12:33 -04:00
|
|
|
end
|
|
|
|
|
2017-05-04 08:11:15 -04:00
|
|
|
def by_assignee(items)
|
|
|
|
if assignee
|
|
|
|
items.assigned_to(assignee)
|
|
|
|
elsif no_assignee?
|
|
|
|
items.unassigned
|
|
|
|
elsif assignee_id? || assignee_username? # assignee not found
|
|
|
|
items.none
|
|
|
|
else
|
|
|
|
items
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-20 11:38:14 -04:00
|
|
|
def item_project_ids(items)
|
|
|
|
items&.reorder(nil)&.select(:project_id)
|
|
|
|
end
|
2014-02-25 12:15:08 -05:00
|
|
|
end
|