517dd4a3f3
Due to different way of handling owners of a project, they were not allowed to fetch CI sources for project.
256 lines
6.1 KiB
Ruby
256 lines
6.1 KiB
Ruby
class ProjectPolicy < BasePolicy
|
|
def rules
|
|
team_access!(user)
|
|
|
|
owner = project.owner == user ||
|
|
(project.group && project.group.has_owner?(user))
|
|
|
|
owner_access! if user.admin? || owner
|
|
team_member_owner_access! if owner
|
|
|
|
if project.public? || (project.internal? && !user.external?)
|
|
guest_access!
|
|
public_access!
|
|
|
|
# Allow to read builds for internal projects
|
|
can! :read_build if project.public_builds?
|
|
|
|
if project.request_access_enabled &&
|
|
!(owner || user.admin? || project.team.member?(user) || project_group_member?(user))
|
|
can! :request_access
|
|
end
|
|
end
|
|
|
|
archived_access! if project.archived?
|
|
|
|
disabled_features!
|
|
end
|
|
|
|
def project
|
|
@subject
|
|
end
|
|
|
|
def guest_access!
|
|
can! :read_project
|
|
can! :read_board
|
|
can! :read_list
|
|
can! :read_wiki
|
|
can! :read_issue
|
|
can! :read_label
|
|
can! :read_milestone
|
|
can! :read_project_snippet
|
|
can! :read_project_member
|
|
can! :read_note
|
|
can! :create_project
|
|
can! :create_issue
|
|
can! :create_note
|
|
can! :upload_file
|
|
can! :read_cycle_analytics
|
|
end
|
|
|
|
def reporter_access!
|
|
can! :download_code
|
|
can! :fork_project
|
|
can! :create_project_snippet
|
|
can! :update_issue
|
|
can! :admin_issue
|
|
can! :admin_label
|
|
can! :admin_list
|
|
can! :read_commit_status
|
|
can! :read_build
|
|
can! :read_container_image
|
|
can! :read_pipeline
|
|
can! :read_environment
|
|
can! :read_deployment
|
|
can! :read_merge_request
|
|
end
|
|
|
|
# Permissions given when an user is team member of a project
|
|
def team_member_reporter_access!
|
|
can! :build_download_code
|
|
can! :build_read_container_image
|
|
end
|
|
|
|
def developer_access!
|
|
can! :admin_merge_request
|
|
can! :update_merge_request
|
|
can! :create_commit_status
|
|
can! :update_commit_status
|
|
can! :create_build
|
|
can! :update_build
|
|
can! :create_pipeline
|
|
can! :update_pipeline
|
|
can! :create_merge_request
|
|
can! :create_wiki
|
|
can! :push_code
|
|
can! :resolve_note
|
|
can! :create_container_image
|
|
can! :update_container_image
|
|
can! :create_environment
|
|
can! :create_deployment
|
|
end
|
|
|
|
def master_access!
|
|
can! :push_code_to_protected_branches
|
|
can! :update_project_snippet
|
|
can! :update_environment
|
|
can! :update_deployment
|
|
can! :admin_milestone
|
|
can! :admin_project_snippet
|
|
can! :admin_project_member
|
|
can! :admin_note
|
|
can! :admin_wiki
|
|
can! :admin_project
|
|
can! :admin_commit_status
|
|
can! :admin_build
|
|
can! :admin_container_image
|
|
can! :admin_pipeline
|
|
can! :admin_environment
|
|
can! :admin_deployment
|
|
end
|
|
|
|
def public_access!
|
|
can! :download_code
|
|
can! :fork_project
|
|
can! :read_commit_status
|
|
can! :read_pipeline
|
|
can! :read_container_image
|
|
can! :build_download_code
|
|
can! :build_read_container_image
|
|
can! :read_merge_request
|
|
end
|
|
|
|
def owner_access!
|
|
guest_access!
|
|
reporter_access!
|
|
developer_access!
|
|
master_access!
|
|
can! :change_namespace
|
|
can! :change_visibility_level
|
|
can! :rename_project
|
|
can! :remove_project
|
|
can! :archive_project
|
|
can! :remove_fork_project
|
|
can! :destroy_merge_request
|
|
can! :destroy_issue
|
|
end
|
|
|
|
def team_member_owner_access!
|
|
team_member_reporter_access!
|
|
end
|
|
|
|
# Push abilities on the users team role
|
|
def team_access!(user)
|
|
access = project.team.max_member_access(user.id)
|
|
|
|
return if access < Gitlab::Access::GUEST
|
|
guest_access!
|
|
|
|
return if access < Gitlab::Access::REPORTER
|
|
reporter_access!
|
|
team_member_reporter_access!
|
|
|
|
return if access < Gitlab::Access::DEVELOPER
|
|
developer_access!
|
|
|
|
return if access < Gitlab::Access::MASTER
|
|
master_access!
|
|
end
|
|
|
|
def archived_access!
|
|
cannot! :create_merge_request
|
|
cannot! :push_code
|
|
cannot! :push_code_to_protected_branches
|
|
cannot! :update_merge_request
|
|
cannot! :admin_merge_request
|
|
end
|
|
|
|
def disabled_features!
|
|
repository_enabled = project.feature_available?(:repository, user)
|
|
|
|
unless project.feature_available?(:issues, user)
|
|
cannot!(*named_abilities(:issue))
|
|
end
|
|
|
|
unless project.feature_available?(:merge_requests, user) && repository_enabled
|
|
cannot!(*named_abilities(:merge_request))
|
|
end
|
|
|
|
unless project.feature_available?(:issues, user) || project.feature_available?(:merge_requests, user)
|
|
cannot!(*named_abilities(:label))
|
|
cannot!(*named_abilities(:milestone))
|
|
end
|
|
|
|
unless project.feature_available?(:snippets, user)
|
|
cannot!(*named_abilities(:project_snippet))
|
|
end
|
|
|
|
unless project.feature_available?(:wiki, user) || project.has_external_wiki?
|
|
cannot!(*named_abilities(:wiki))
|
|
end
|
|
|
|
unless project.feature_available?(:builds, user) && repository_enabled
|
|
cannot!(*named_abilities(:build))
|
|
cannot!(*named_abilities(:pipeline))
|
|
cannot!(*named_abilities(:environment))
|
|
cannot!(*named_abilities(:deployment))
|
|
end
|
|
|
|
unless repository_enabled
|
|
cannot! :push_code
|
|
cannot! :push_code_to_protected_branches
|
|
cannot! :download_code
|
|
cannot! :fork_project
|
|
cannot! :read_commit_status
|
|
end
|
|
|
|
unless project.container_registry_enabled
|
|
cannot!(*named_abilities(:container_image))
|
|
end
|
|
end
|
|
|
|
def anonymous_rules
|
|
return unless project.public?
|
|
|
|
can! :read_project
|
|
can! :read_board
|
|
can! :read_list
|
|
can! :read_wiki
|
|
can! :read_label
|
|
can! :read_milestone
|
|
can! :read_project_snippet
|
|
can! :read_project_member
|
|
can! :read_merge_request
|
|
can! :read_note
|
|
can! :read_pipeline
|
|
can! :read_commit_status
|
|
can! :read_container_image
|
|
can! :download_code
|
|
can! :read_cycle_analytics
|
|
|
|
# NOTE: may be overridden by IssuePolicy
|
|
can! :read_issue
|
|
|
|
# Allow to read builds by anonymous user if guests are allowed
|
|
can! :read_build if project.public_builds?
|
|
|
|
disabled_features!
|
|
end
|
|
|
|
def project_group_member?(user)
|
|
project.group &&
|
|
(
|
|
project.group.members.exists?(user_id: user.id) ||
|
|
project.group.requesters.exists?(user_id: user.id)
|
|
)
|
|
end
|
|
|
|
def named_abilities(name)
|
|
[
|
|
:"read_#{name}",
|
|
:"create_#{name}",
|
|
:"update_#{name}",
|
|
:"admin_#{name}"
|
|
]
|
|
end
|
|
end
|