forked from Gitlink/gitea-1156
Change constants to UPPERCASE_WITH_UNDERSCORE style
This commit is contained in:
parent
4e79adf6b5
commit
0d158e569b
14
cmd/serve.go
14
cmd/serve.go
|
@ -59,14 +59,14 @@ func parseCmd(cmd string) (string, string) {
|
||||||
|
|
||||||
var (
|
var (
|
||||||
COMMANDS_READONLY = map[string]models.AccessMode{
|
COMMANDS_READONLY = map[string]models.AccessMode{
|
||||||
"git-upload-pack": models.WriteAccess,
|
"git-upload-pack": models.ACCESS_MODE_WRITE,
|
||||||
"git upload-pack": models.WriteAccess,
|
"git upload-pack": models.ACCESS_MODE_WRITE,
|
||||||
"git-upload-archive": models.WriteAccess,
|
"git-upload-archive": models.ACCESS_MODE_WRITE,
|
||||||
}
|
}
|
||||||
|
|
||||||
COMMANDS_WRITE = map[string]models.AccessMode{
|
COMMANDS_WRITE = map[string]models.AccessMode{
|
||||||
"git-receive-pack": models.ReadAccess,
|
"git-receive-pack": models.ACCESS_MODE_READ,
|
||||||
"git receive-pack": models.ReadAccess,
|
"git receive-pack": models.ACCESS_MODE_READ,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -141,7 +141,7 @@ func runServ(k *cli.Context) {
|
||||||
|
|
||||||
switch {
|
switch {
|
||||||
case isWrite:
|
case isWrite:
|
||||||
has, err := models.HasAccess(user, repo, models.WriteAccess)
|
has, err := models.HasAccess(user, repo, models.ACCESS_MODE_WRITE)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
println("Gogs: internal error:", err.Error())
|
println("Gogs: internal error:", err.Error())
|
||||||
log.GitLogger.Fatal(2, "Fail to check write access:", err)
|
log.GitLogger.Fatal(2, "Fail to check write access:", err)
|
||||||
|
@ -154,7 +154,7 @@ func runServ(k *cli.Context) {
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|
||||||
has, err := models.HasAccess(user, repo, models.ReadAccess)
|
has, err := models.HasAccess(user, repo, models.ACCESS_MODE_READ)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
println("Gogs: internal error:", err.Error())
|
println("Gogs: internal error:", err.Error())
|
||||||
log.GitLogger.Fatal(2, "Fail to check read access:", err)
|
log.GitLogger.Fatal(2, "Fail to check read access:", err)
|
||||||
|
|
|
@ -11,15 +11,15 @@ package models
|
||||||
type AccessMode int
|
type AccessMode int
|
||||||
|
|
||||||
const (
|
const (
|
||||||
NoAccess AccessMode = iota
|
ACCESS_MODE_NONE AccessMode = iota
|
||||||
ReadAccess
|
ACCESS_MODE_READ
|
||||||
WriteAccess
|
ACCESS_MODE_WRITE
|
||||||
AdminAccess
|
ACCESS_MODE_ADMIN
|
||||||
OwnerAccess
|
ACCESS_MODE_OWNER
|
||||||
)
|
)
|
||||||
|
|
||||||
func maxAccessMode(modes ...AccessMode) AccessMode {
|
func maxAccessMode(modes ...AccessMode) AccessMode {
|
||||||
max := NoAccess
|
max := ACCESS_MODE_NONE
|
||||||
for _, mode := range modes {
|
for _, mode := range modes {
|
||||||
if mode > max {
|
if mode > max {
|
||||||
max = mode
|
max = mode
|
||||||
|
@ -47,14 +47,14 @@ func HasAccess(u *User, r *Repository, testMode AccessMode) (bool, error) {
|
||||||
// Return the Access a user has to a repository. Will return NoneAccess if the
|
// Return the Access a user has to a repository. Will return NoneAccess if the
|
||||||
// user does not have access. User can be nil!
|
// user does not have access. User can be nil!
|
||||||
func AccessLevel(u *User, r *Repository) (AccessMode, error) {
|
func AccessLevel(u *User, r *Repository) (AccessMode, error) {
|
||||||
mode := NoAccess
|
mode := ACCESS_MODE_NONE
|
||||||
if !r.IsPrivate {
|
if !r.IsPrivate {
|
||||||
mode = ReadAccess
|
mode = ACCESS_MODE_READ
|
||||||
}
|
}
|
||||||
|
|
||||||
if u != nil {
|
if u != nil {
|
||||||
if u.Id == r.OwnerId {
|
if u.Id == r.OwnerId {
|
||||||
return OwnerAccess, nil
|
return ACCESS_MODE_OWNER, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
a := &Access{UserID: u.Id, RepoID: r.Id}
|
a := &Access{UserID: u.Id, RepoID: r.Id}
|
||||||
|
@ -101,7 +101,7 @@ func (r *Repository) RecalcAccessSess() error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
for _, c := range collaborators {
|
for _, c := range collaborators {
|
||||||
accessMap[c.Id] = WriteAccess
|
accessMap[c.Id] = ACCESS_MODE_WRITE
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := r.GetOwner(); err != nil {
|
if err := r.GetOwner(); err != nil {
|
||||||
|
@ -126,9 +126,9 @@ func (r *Repository) RecalcAccessSess() error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
minMode := ReadAccess
|
minMode := ACCESS_MODE_READ
|
||||||
if !r.IsPrivate {
|
if !r.IsPrivate {
|
||||||
minMode = WriteAccess
|
minMode = ACCESS_MODE_WRITE
|
||||||
}
|
}
|
||||||
|
|
||||||
newAccesses := make([]Access, 0, len(accessMap))
|
newAccesses := make([]Access, 0, len(accessMap))
|
||||||
|
|
|
@ -135,7 +135,7 @@ func CreateOrganization(org, owner *User) (*User, error) {
|
||||||
OrgId: org.Id,
|
OrgId: org.Id,
|
||||||
LowerName: strings.ToLower(OWNER_TEAM),
|
LowerName: strings.ToLower(OWNER_TEAM),
|
||||||
Name: OWNER_TEAM,
|
Name: OWNER_TEAM,
|
||||||
Authorize: OwnerAccess,
|
Authorize: ACCESS_MODE_OWNER,
|
||||||
NumMembers: 1,
|
NumMembers: 1,
|
||||||
}
|
}
|
||||||
if _, err = sess.Insert(t); err != nil {
|
if _, err = sess.Insert(t); err != nil {
|
||||||
|
|
|
@ -87,7 +87,7 @@ func OrgAssignment(redirect bool, args ...bool) macaron.Handler {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ctx.Data["Team"] = ctx.Org.Team
|
ctx.Data["Team"] = ctx.Org.Team
|
||||||
ctx.Org.IsAdminTeam = ctx.Org.Team.IsOwnerTeam() || ctx.Org.Team.Authorize >= models.AdminAccess
|
ctx.Org.IsAdminTeam = ctx.Org.Team.IsOwnerTeam() || ctx.Org.Team.Authorize >= models.ACCESS_MODE_ADMIN
|
||||||
}
|
}
|
||||||
ctx.Data["IsAdminTeam"] = ctx.Org.IsAdminTeam
|
ctx.Data["IsAdminTeam"] = ctx.Org.IsAdminTeam
|
||||||
if requireAdminTeam && !ctx.Org.IsAdminTeam {
|
if requireAdminTeam && !ctx.Org.IsAdminTeam {
|
||||||
|
|
|
@ -64,9 +64,9 @@ func ApiRepoAssignment() macaron.Handler {
|
||||||
ctx.JSON(500, &base.ApiJsonErr{"AccessLevel: " + err.Error(), base.DOC_URL})
|
ctx.JSON(500, &base.ApiJsonErr{"AccessLevel: " + err.Error(), base.DOC_URL})
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ctx.Repo.IsOwner = mode >= models.WriteAccess
|
ctx.Repo.IsOwner = mode >= models.ACCESS_MODE_WRITE
|
||||||
ctx.Repo.IsAdmin = mode >= models.ReadAccess
|
ctx.Repo.IsAdmin = mode >= models.ACCESS_MODE_READ
|
||||||
ctx.Repo.IsTrueOwner = mode >= models.OwnerAccess
|
ctx.Repo.IsTrueOwner = mode >= models.ACCESS_MODE_OWNER
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check access.
|
// Check access.
|
||||||
|
@ -244,9 +244,9 @@ func RepoAssignment(redirect bool, args ...bool) macaron.Handler {
|
||||||
ctx.JSON(500, &base.ApiJsonErr{"AccessLevel: " + err.Error(), base.DOC_URL})
|
ctx.JSON(500, &base.ApiJsonErr{"AccessLevel: " + err.Error(), base.DOC_URL})
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ctx.Repo.IsOwner = mode >= models.WriteAccess
|
ctx.Repo.IsOwner = mode >= models.ACCESS_MODE_WRITE
|
||||||
ctx.Repo.IsAdmin = mode >= models.ReadAccess
|
ctx.Repo.IsAdmin = mode >= models.ACCESS_MODE_READ
|
||||||
ctx.Repo.IsTrueOwner = mode >= models.OwnerAccess
|
ctx.Repo.IsTrueOwner = mode >= models.ACCESS_MODE_OWNER
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check access.
|
// Check access.
|
||||||
|
|
|
@ -255,7 +255,7 @@ func ListMyRepos(ctx *middleware.Context) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
repos[i] = ToApiRepository(repo.Owner, repo, api.Permission{false, access >= models.WriteAccess, true})
|
repos[i] = ToApiRepository(repo.Owner, repo, api.Permission{false, access >= models.ACCESS_MODE_WRITE, true})
|
||||||
|
|
||||||
// FIXME: cache result to reduce DB query?
|
// FIXME: cache result to reduce DB query?
|
||||||
if repo.Owner.IsOrganization() && repo.Owner.IsOwnedBy(ctx.User.Id) {
|
if repo.Owner.IsOrganization() && repo.Owner.IsOwnedBy(ctx.User.Id) {
|
||||||
|
|
|
@ -171,11 +171,11 @@ func NewTeamPost(ctx *middleware.Context, form auth.CreateTeamForm) {
|
||||||
var auth models.AccessMode
|
var auth models.AccessMode
|
||||||
switch form.Permission {
|
switch form.Permission {
|
||||||
case "read":
|
case "read":
|
||||||
auth = models.ReadAccess
|
auth = models.ACCESS_MODE_READ
|
||||||
case "write":
|
case "write":
|
||||||
auth = models.WriteAccess
|
auth = models.ACCESS_MODE_WRITE
|
||||||
case "admin":
|
case "admin":
|
||||||
auth = models.AdminAccess
|
auth = models.ACCESS_MODE_ADMIN
|
||||||
default:
|
default:
|
||||||
ctx.Error(401)
|
ctx.Error(401)
|
||||||
return
|
return
|
||||||
|
@ -252,11 +252,11 @@ func EditTeamPost(ctx *middleware.Context, form auth.CreateTeamForm) {
|
||||||
var auth models.AccessMode
|
var auth models.AccessMode
|
||||||
switch form.Permission {
|
switch form.Permission {
|
||||||
case "read":
|
case "read":
|
||||||
auth = models.ReadAccess
|
auth = models.ACCESS_MODE_READ
|
||||||
case "write":
|
case "write":
|
||||||
auth = models.WriteAccess
|
auth = models.ACCESS_MODE_WRITE
|
||||||
case "admin":
|
case "admin":
|
||||||
auth = models.AdminAccess
|
auth = models.ACCESS_MODE_ADMIN
|
||||||
default:
|
default:
|
||||||
ctx.Error(401)
|
ctx.Error(401)
|
||||||
return
|
return
|
||||||
|
|
|
@ -115,9 +115,9 @@ func Http(ctx *middleware.Context) {
|
||||||
}
|
}
|
||||||
|
|
||||||
if !isPublicPull {
|
if !isPublicPull {
|
||||||
var tp = models.WriteAccess
|
var tp = models.ACCESS_MODE_WRITE
|
||||||
if isPull {
|
if isPull {
|
||||||
tp = models.ReadAccess
|
tp = models.ACCESS_MODE_READ
|
||||||
}
|
}
|
||||||
|
|
||||||
has, err := models.HasAccess(authUser, repo, tp)
|
has, err := models.HasAccess(authUser, repo, tp)
|
||||||
|
@ -125,8 +125,8 @@ func Http(ctx *middleware.Context) {
|
||||||
ctx.Handle(401, "no basic auth and digit auth", nil)
|
ctx.Handle(401, "no basic auth and digit auth", nil)
|
||||||
return
|
return
|
||||||
} else if !has {
|
} else if !has {
|
||||||
if tp == models.ReadAccess {
|
if tp == models.ACCESS_MODE_READ {
|
||||||
has, err = models.HasAccess(authUser, repo, models.WriteAccess)
|
has, err = models.HasAccess(authUser, repo, models.ACCESS_MODE_WRITE)
|
||||||
if err != nil || !has {
|
if err != nil || !has {
|
||||||
ctx.Handle(401, "no basic auth and digit auth", nil)
|
ctx.Handle(401, "no basic auth and digit auth", nil)
|
||||||
return
|
return
|
||||||
|
@ -268,7 +268,7 @@ func serviceRpc(rpc string, hr handler) {
|
||||||
|
|
||||||
access := hasAccess(r, hr.Config, dir, rpc, true)
|
access := hasAccess(r, hr.Config, dir, rpc, true)
|
||||||
if access == false {
|
if access == false {
|
||||||
renderNoAccess(w)
|
renderACCESS_MODE_NONE(w)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -495,7 +495,7 @@ func renderNotFound(w http.ResponseWriter) {
|
||||||
w.Write([]byte("Not Found"))
|
w.Write([]byte("Not Found"))
|
||||||
}
|
}
|
||||||
|
|
||||||
func renderNoAccess(w http.ResponseWriter) {
|
func renderACCESS_MODE_NONE(w http.ResponseWriter) {
|
||||||
w.WriteHeader(http.StatusForbidden)
|
w.WriteHeader(http.StatusForbidden)
|
||||||
w.Write([]byte("Forbidden"))
|
w.Write([]byte("Forbidden"))
|
||||||
}
|
}
|
||||||
|
|
|
@ -103,7 +103,7 @@ func Dashboard(ctx *middleware.Context) {
|
||||||
feeds := make([]*models.Action, 0, len(actions))
|
feeds := make([]*models.Action, 0, len(actions))
|
||||||
for _, act := range actions {
|
for _, act := range actions {
|
||||||
if act.IsPrivate {
|
if act.IsPrivate {
|
||||||
if has, _ := models.HasAccess(ctx.User, &models.Repository{Id: act.RepoId, IsPrivate: true}, models.ReadAccess); !has {
|
if has, _ := models.HasAccess(ctx.User, &models.Repository{Id: act.RepoId, IsPrivate: true}, models.ACCESS_MODE_READ); !has {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -211,7 +211,7 @@ func Profile(ctx *middleware.Context) {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if has, _ := models.HasAccess(ctx.User, &models.Repository{Id: act.RepoId, IsPrivate: true},
|
if has, _ := models.HasAccess(ctx.User, &models.Repository{Id: act.RepoId, IsPrivate: true},
|
||||||
models.ReadAccess); !has {
|
models.ACCESS_MODE_READ); !has {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue