mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	At first, we have one unified team unit permission which is called `Team.Authorize` in DB. But since https://github.com/go-gitea/gitea/pull/17811, we allowed different units to have different permission. The old code is only designed for the old version. So after #17811, if org users have write permission of other units, but have no permission of packages, they can also get write permission of packages. Co-authored-by: delvh <dev.lh@web.de>
		
			
				
	
	
		
			150 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			150 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package context
 | 
						|
 | 
						|
import (
 | 
						|
	gocontext "context"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models/organization"
 | 
						|
	packages_model "code.gitea.io/gitea/models/packages"
 | 
						|
	"code.gitea.io/gitea/models/perm"
 | 
						|
	"code.gitea.io/gitea/models/unit"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/modules/structs"
 | 
						|
	"code.gitea.io/gitea/modules/templates"
 | 
						|
)
 | 
						|
 | 
						|
// Package contains owner, access mode and optional the package descriptor
 | 
						|
type Package struct {
 | 
						|
	Owner      *user_model.User
 | 
						|
	AccessMode perm.AccessMode
 | 
						|
	Descriptor *packages_model.PackageDescriptor
 | 
						|
}
 | 
						|
 | 
						|
// PackageAssignment returns a middleware to handle Context.Package assignment
 | 
						|
func PackageAssignment() func(ctx *Context) {
 | 
						|
	return func(ctx *Context) {
 | 
						|
		packageAssignment(ctx, func(status int, title string, obj interface{}) {
 | 
						|
			err, ok := obj.(error)
 | 
						|
			if !ok {
 | 
						|
				err = fmt.Errorf("%s", obj)
 | 
						|
			}
 | 
						|
			if status == http.StatusNotFound {
 | 
						|
				ctx.NotFound(title, err)
 | 
						|
			} else {
 | 
						|
				ctx.ServerError(title, err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// PackageAssignmentAPI returns a middleware to handle Context.Package assignment
 | 
						|
func PackageAssignmentAPI() func(ctx *APIContext) {
 | 
						|
	return func(ctx *APIContext) {
 | 
						|
		packageAssignment(ctx.Context, ctx.Error)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func packageAssignment(ctx *Context, errCb func(int, string, interface{})) {
 | 
						|
	ctx.Package = &Package{
 | 
						|
		Owner: ctx.ContextUser,
 | 
						|
	}
 | 
						|
 | 
						|
	var err error
 | 
						|
	ctx.Package.AccessMode, err = determineAccessMode(ctx)
 | 
						|
	if err != nil {
 | 
						|
		errCb(http.StatusInternalServerError, "determineAccessMode", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	packageType := ctx.Params("type")
 | 
						|
	name := ctx.Params("name")
 | 
						|
	version := ctx.Params("version")
 | 
						|
	if packageType != "" && name != "" && version != "" {
 | 
						|
		pv, err := packages_model.GetVersionByNameAndVersion(ctx, ctx.Package.Owner.ID, packages_model.Type(packageType), name, version)
 | 
						|
		if err != nil {
 | 
						|
			if err == packages_model.ErrPackageNotExist {
 | 
						|
				errCb(http.StatusNotFound, "GetVersionByNameAndVersion", err)
 | 
						|
			} else {
 | 
						|
				errCb(http.StatusInternalServerError, "GetVersionByNameAndVersion", err)
 | 
						|
			}
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		ctx.Package.Descriptor, err = packages_model.GetPackageDescriptor(ctx, pv)
 | 
						|
		if err != nil {
 | 
						|
			errCb(http.StatusInternalServerError, "GetPackageDescriptor", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func determineAccessMode(ctx *Context) (perm.AccessMode, error) {
 | 
						|
	if setting.Service.RequireSignInView && ctx.Doer == nil {
 | 
						|
		return perm.AccessModeNone, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if ctx.Doer != nil && !ctx.Doer.IsGhost() && (!ctx.Doer.IsActive || ctx.Doer.ProhibitLogin) {
 | 
						|
		return perm.AccessModeNone, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// TODO: ActionUser permission check
 | 
						|
	accessMode := perm.AccessModeNone
 | 
						|
	if ctx.Package.Owner.IsOrganization() {
 | 
						|
		org := organization.OrgFromUser(ctx.Package.Owner)
 | 
						|
 | 
						|
		if ctx.Doer != nil && !ctx.Doer.IsGhost() {
 | 
						|
			// 1. If user is logged in, check all team packages permissions
 | 
						|
			teams, err := organization.GetUserOrgTeams(ctx, org.ID, ctx.Doer.ID)
 | 
						|
			if err != nil {
 | 
						|
				return accessMode, err
 | 
						|
			}
 | 
						|
			for _, t := range teams {
 | 
						|
				perm := t.UnitAccessMode(ctx, unit.TypePackages)
 | 
						|
				if accessMode < perm {
 | 
						|
					accessMode = perm
 | 
						|
				}
 | 
						|
			}
 | 
						|
		} else if organization.HasOrgOrUserVisible(ctx, ctx.Package.Owner, ctx.Doer) {
 | 
						|
			// 2. If user is non-login, check if org is visible to non-login user
 | 
						|
			accessMode = perm.AccessModeRead
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		if ctx.Doer != nil && !ctx.Doer.IsGhost() {
 | 
						|
			// 1. Check if user is package owner
 | 
						|
			if ctx.Doer.ID == ctx.Package.Owner.ID {
 | 
						|
				accessMode = perm.AccessModeOwner
 | 
						|
			} else if ctx.Package.Owner.Visibility == structs.VisibleTypePublic || ctx.Package.Owner.Visibility == structs.VisibleTypeLimited { // 2. Check if package owner is public or limited
 | 
						|
				accessMode = perm.AccessModeRead
 | 
						|
			}
 | 
						|
		} else if ctx.Package.Owner.Visibility == structs.VisibleTypePublic { // 3. Check if package owner is public
 | 
						|
			accessMode = perm.AccessModeRead
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return accessMode, nil
 | 
						|
}
 | 
						|
 | 
						|
// PackageContexter initializes a package context for a request.
 | 
						|
func PackageContexter(ctx gocontext.Context) func(next http.Handler) http.Handler {
 | 
						|
	_, rnd := templates.HTMLRenderer(ctx)
 | 
						|
	return func(next http.Handler) http.Handler {
 | 
						|
		return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
 | 
						|
			ctx := Context{
 | 
						|
				Resp:   NewResponse(resp),
 | 
						|
				Data:   map[string]interface{}{},
 | 
						|
				Render: rnd,
 | 
						|
			}
 | 
						|
			defer ctx.Close()
 | 
						|
 | 
						|
			ctx.Req = WithContext(req, &ctx)
 | 
						|
 | 
						|
			next.ServeHTTP(ctx.Resp, ctx.Req)
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |