Browse Source

The problem of branch protection#5342

pull/5343/head
zhangsp 7 years ago
parent
commit
5c2ea5b377
  1. 5
      models/org_team.go
  2. 118
      models/repo_branch.go

5
models/org_team.go

@ -413,8 +413,13 @@ type TeamUser struct {
} }
func isTeamMember(e Engine, orgID, teamID, uid int64) bool { func isTeamMember(e Engine, orgID, teamID, uid int64) bool {
if orgID < 0 {
has, _ := e.Where("team_id=?", teamID).And("uid=?", uid).Get(new(TeamUser))
return has
} else {
has, _ := e.Where("org_id=?", orgID).And("team_id=?", teamID).And("uid=?", uid).Get(new(TeamUser)) has, _ := e.Where("org_id=?", orgID).And("team_id=?", teamID).And("uid=?", uid).Get(new(TeamUser))
return has return has
}
} }
// IsTeamMember returns true if given user is a member of team. // IsTeamMember returns true if given user is a member of team.

118
models/repo_branch.go

@ -8,11 +8,12 @@ import (
"fmt" "fmt"
"strings" "strings"
"github.com/Unknwon/com"
"github.com/gogs/git-module" "github.com/gogs/git-module"
"github.com/gogs/gogs/models/errors" "github.com/gogs/gogs/models/errors"
"github.com/gogs/gogs/pkg/tool" "github.com/gogs/gogs/pkg/tool"
"strconv"
"github.com/Unknwon/com"
) )
type Branch struct { type Branch struct {
@ -76,8 +77,31 @@ type ProtectBranchWhitelist struct {
// IsUserInProtectBranchWhitelist returns true if given user is in the whitelist of a branch in a repository. // IsUserInProtectBranchWhitelist returns true if given user is in the whitelist of a branch in a repository.
func IsUserInProtectBranchWhitelist(repoID, userID int64, branch string) bool { func IsUserInProtectBranchWhitelist(repoID, userID int64, branch string) bool {
has, err := x.Where("repo_id = ?", repoID).And("user_id = ?", userID).And("name = ?", branch).Get(new(ProtectBranchWhitelist)) //has, err := x.Where("repo_id = ?", repoID).And("user_id = ?", userID).And("name = ?", branch).Get(new(ProtectBranchWhitelist))
return has && err == nil //return has && err == nil
protectBranch, err := GetProtectBranchOfRepoByName(repoID, branch)
if err != nil {
return false
}
//userIDs contain userID
userIDs := strings.Join([]string{",",protectBranch.WhitelistUserIDs},",")
i := strings.Index(userIDs, strings.Join([]string{",",strconv.FormatInt(userID,10)},","))
if i > -1 {
return true
}
//teams contain userID
teamIDs := tool.StringsToInt64s(strings.Split(protectBranch.WhitelistTeamIDs, ","))
for _, teamID := range teamIDs {
if IsTeamMember(-1, teamID, userID) {
return true
}
}
//default
return false
} }
// ProtectBranch contains options of a protected branch. // ProtectBranch contains options of a protected branch.
@ -149,10 +173,10 @@ func UpdateOrgProtectBranch(repo *Repository, protectBranch *ProtectBranch, whit
return fmt.Errorf("expect repository owner to be an organization") return fmt.Errorf("expect repository owner to be an organization")
} }
hasUsersChanged := false //hasUsersChanged := false
validUserIDs := tool.StringsToInt64s(strings.Split(protectBranch.WhitelistUserIDs, ",")) validUserIDs := tool.StringsToInt64s(strings.Split(protectBranch.WhitelistUserIDs, ","))
if protectBranch.WhitelistUserIDs != whitelistUserIDs { if protectBranch.WhitelistUserIDs != whitelistUserIDs {
hasUsersChanged = true //hasUsersChanged = true
userIDs := tool.StringsToInt64s(strings.Split(whitelistUserIDs, ",")) userIDs := tool.StringsToInt64s(strings.Split(whitelistUserIDs, ","))
validUserIDs = make([]int64, 0, len(userIDs)) validUserIDs = make([]int64, 0, len(userIDs))
for _, userID := range userIDs { for _, userID := range userIDs {
@ -169,10 +193,10 @@ func UpdateOrgProtectBranch(repo *Repository, protectBranch *ProtectBranch, whit
protectBranch.WhitelistUserIDs = strings.Join(tool.Int64sToStrings(validUserIDs), ",") protectBranch.WhitelistUserIDs = strings.Join(tool.Int64sToStrings(validUserIDs), ",")
} }
hasTeamsChanged := false //hasTeamsChanged := false
validTeamIDs := tool.StringsToInt64s(strings.Split(protectBranch.WhitelistTeamIDs, ",")) validTeamIDs := tool.StringsToInt64s(strings.Split(protectBranch.WhitelistTeamIDs, ","))
if protectBranch.WhitelistTeamIDs != whitelistTeamIDs { if protectBranch.WhitelistTeamIDs != whitelistTeamIDs {
hasTeamsChanged = true //hasTeamsChanged = true
teamIDs := tool.StringsToInt64s(strings.Split(whitelistTeamIDs, ",")) teamIDs := tool.StringsToInt64s(strings.Split(whitelistTeamIDs, ","))
teams, err := GetTeamsHaveAccessToRepo(repo.OwnerID, repo.ID, ACCESS_MODE_WRITE) teams, err := GetTeamsHaveAccessToRepo(repo.OwnerID, repo.ID, ACCESS_MODE_WRITE)
if err != nil { if err != nil {
@ -195,38 +219,38 @@ func UpdateOrgProtectBranch(repo *Repository, protectBranch *ProtectBranch, whit
} }
} }
// Merge users and members of teams //// Merge users and members of teams
var whitelists []*ProtectBranchWhitelist //var whitelists []*ProtectBranchWhitelist
if hasUsersChanged || hasTeamsChanged { //if hasUsersChanged || hasTeamsChanged {
mergedUserIDs := make(map[int64]bool) // mergedUserIDs := make(map[int64]bool)
for _, userID := range validUserIDs { // for _, userID := range validUserIDs {
// Empty whitelist users can cause an ID with 0 // // Empty whitelist users can cause an ID with 0
if userID != 0 { // if userID != 0 {
mergedUserIDs[userID] = true // mergedUserIDs[userID] = true
} // }
} // }
//
for _, teamID := range validTeamIDs { // for _, teamID := range validTeamIDs {
members, err := GetTeamMembers(teamID) // members, err := GetTeamMembers(teamID)
if err != nil { // if err != nil {
return fmt.Errorf("GetTeamMembers [team_id: %d]: %v", teamID, err) // return fmt.Errorf("GetTeamMembers [team_id: %d]: %v", teamID, err)
} // }
//
for i := range members { // for i := range members {
mergedUserIDs[members[i].ID] = true // mergedUserIDs[members[i].ID] = true
} // }
} // }
//
whitelists = make([]*ProtectBranchWhitelist, 0, len(mergedUserIDs)) // whitelists = make([]*ProtectBranchWhitelist, 0, len(mergedUserIDs))
for userID := range mergedUserIDs { // for userID := range mergedUserIDs {
whitelists = append(whitelists, &ProtectBranchWhitelist{ // whitelists = append(whitelists, &ProtectBranchWhitelist{
ProtectBranchID: protectBranch.ID, // ProtectBranchID: protectBranch.ID,
RepoID: repo.ID, // RepoID: repo.ID,
Name: protectBranch.Name, // Name: protectBranch.Name,
UserID: userID, // UserID: userID,
}) // })
} // }
} //}
sess := x.NewSession() sess := x.NewSession()
defer sess.Close() defer sess.Close()
@ -238,14 +262,14 @@ func UpdateOrgProtectBranch(repo *Repository, protectBranch *ProtectBranch, whit
return fmt.Errorf("Update: %v", err) return fmt.Errorf("Update: %v", err)
} }
// Refresh whitelists //// Refresh whitelists
if hasUsersChanged || hasTeamsChanged { //if hasUsersChanged || hasTeamsChanged {
if _, err = sess.Delete(&ProtectBranchWhitelist{ProtectBranchID: protectBranch.ID}); err != nil { // if _, err = sess.Delete(&ProtectBranchWhitelist{ProtectBranchID: protectBranch.ID}); err != nil {
return fmt.Errorf("delete old protect branch whitelists: %v", err) // return fmt.Errorf("delete old protect branch whitelists: %v", err)
} else if _, err = sess.Insert(whitelists); err != nil { // } else if _, err = sess.Insert(whitelists); err != nil {
return fmt.Errorf("insert new protect branch whitelists: %v", err) // return fmt.Errorf("insert new protect branch whitelists: %v", err)
} // }
} //}
return sess.Commit() return sess.Commit()
} }

Loading…
Cancel
Save