gitlab-org--gitlab-foss/lib/gitlab/user_access.rb

132 lines
3.1 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
module Gitlab
class UserAccess
2017-07-18 09:48:48 +00:00
extend Gitlab::Cache::RequestCache
request_cache_key do
[user&.id, project&.id]
end
attr_reader :user
attr_accessor :project
def initialize(user, project: nil)
@user = user
@project = project
end
def can_do_action?(action)
return false unless can_access_git?
permission_cache[action] =
permission_cache.fetch(action) do
user.can?(action, project)
end
end
def cannot_do_action?(action)
!can_do_action?(action)
end
def allowed?
return false unless can_access_git?
2016-03-10 11:37:14 +00:00
if user.requires_ldap_check? && user.try_obtain_ldap_lease
return false unless Gitlab::Auth::LDAP::Access.allowed?(user)
end
true
end
request_cache def can_create_tag?(ref)
2017-03-31 16:57:29 +00:00
return false unless can_access_git?
if protected?(ProtectedTag, project, ref)
protected_tag_accessible_to?(ref, action: :create)
2017-03-31 16:57:29 +00:00
else
user.can?(:admin_tag, project)
2017-03-31 16:57:29 +00:00
end
end
request_cache def can_delete_branch?(ref)
return false unless can_access_git?
if protected?(ProtectedBranch, project, ref)
user.can?(:push_to_delete_protected_branch, project)
else
user.can?(:push_code, project)
end
end
def can_update_branch?(ref)
can_push_to_branch?(ref) || can_merge_to_branch?(ref)
end
request_cache def can_push_to_branch?(ref)
return false unless can_access_git?
2018-04-18 13:52:55 +00:00
return false unless project
# Checking for an internal project to prevent an infinite loop:
# https://gitlab.com/gitlab-org/gitlab/issues/36805
if project.internal?
return false unless user.can?(:push_code, project)
else
return false if !user.can?(:push_code, project) && !project.branch_allows_collaboration?(user, ref)
end
if protected?(ProtectedBranch, project, ref)
2018-04-18 13:52:55 +00:00
protected_branch_accessible_to?(ref, action: :push)
else
true
end
end
request_cache def can_merge_to_branch?(ref)
return false unless can_access_git?
if protected?(ProtectedBranch, project, ref)
protected_branch_accessible_to?(ref, action: :merge)
else
user.can?(:push_code, project)
end
end
def can_read_project?
return false unless can_access_git?
user.can?(:read_project, project)
end
private
def permission_cache
@permission_cache ||= {}
end
request_cache def can_access_git?
user && user.can?(:access_git)
end
def protected_branch_accessible_to?(ref, action:)
ProtectedBranch.protected_ref_accessible_to?(
ref, user,
2018-04-18 13:52:55 +00:00
project: project,
action: action,
protected_refs: project.protected_branches)
end
def protected_tag_accessible_to?(ref, action:)
ProtectedTag.protected_ref_accessible_to?(
ref, user,
2018-04-18 13:52:55 +00:00
project: project,
action: action,
protected_refs: project.protected_tags)
end
request_cache def protected?(kind, project, refs)
kind.protected?(project, refs)
end
end
end