gitea源码

assignee.go 9.6KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package issue
  4. import (
  5. "context"
  6. issues_model "code.gitea.io/gitea/models/issues"
  7. "code.gitea.io/gitea/models/organization"
  8. "code.gitea.io/gitea/models/perm"
  9. access_model "code.gitea.io/gitea/models/perm/access"
  10. repo_model "code.gitea.io/gitea/models/repo"
  11. "code.gitea.io/gitea/models/unit"
  12. user_model "code.gitea.io/gitea/models/user"
  13. "code.gitea.io/gitea/modules/log"
  14. notify_service "code.gitea.io/gitea/services/notify"
  15. )
  16. // DeleteNotPassedAssignee deletes all assignees who aren't passed via the "assignees" array
  17. func DeleteNotPassedAssignee(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, assignees []*user_model.User) (err error) {
  18. var found bool
  19. oriAssignes := make([]*user_model.User, len(issue.Assignees))
  20. _ = copy(oriAssignes, issue.Assignees)
  21. for _, assignee := range oriAssignes {
  22. found = false
  23. for _, alreadyAssignee := range assignees {
  24. if assignee.ID == alreadyAssignee.ID {
  25. found = true
  26. break
  27. }
  28. }
  29. if !found {
  30. // This function also does comments and hooks, which is why we call it separately instead of directly removing the assignees here
  31. if _, _, err := ToggleAssigneeWithNotify(ctx, issue, doer, assignee.ID); err != nil {
  32. return err
  33. }
  34. }
  35. }
  36. return nil
  37. }
  38. // ToggleAssigneeWithNoNotify changes a user between assigned and not assigned for this issue, and make issue comment for it.
  39. func ToggleAssigneeWithNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, assigneeID int64) (removed bool, comment *issues_model.Comment, err error) {
  40. removed, comment, err = issues_model.ToggleIssueAssignee(ctx, issue, doer, assigneeID)
  41. if err != nil {
  42. return false, nil, err
  43. }
  44. assignee, err := user_model.GetUserByID(ctx, assigneeID)
  45. if err != nil {
  46. return false, nil, err
  47. }
  48. issue.AssigneeID = assigneeID
  49. issue.Assignee = assignee
  50. notify_service.IssueChangeAssignee(ctx, doer, issue, assignee, removed, comment)
  51. return removed, comment, err
  52. }
  53. // ReviewRequest add or remove a review request from a user for this PR, and make comment for it.
  54. func ReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, permDoer *access_model.Permission, reviewer *user_model.User, isAdd bool) (comment *issues_model.Comment, err error) {
  55. err = isValidReviewRequest(ctx, reviewer, doer, isAdd, issue, permDoer)
  56. if err != nil {
  57. return nil, err
  58. }
  59. if isAdd {
  60. comment, err = issues_model.AddReviewRequest(ctx, issue, reviewer, doer)
  61. } else {
  62. comment, err = issues_model.RemoveReviewRequest(ctx, issue, reviewer, doer)
  63. }
  64. if err != nil {
  65. return nil, err
  66. }
  67. if comment != nil {
  68. notify_service.PullRequestReviewRequest(ctx, doer, issue, reviewer, isAdd, comment)
  69. }
  70. return comment, err
  71. }
  72. // isValidReviewRequest Check permission for ReviewRequest
  73. func isValidReviewRequest(ctx context.Context, reviewer, doer *user_model.User, isAdd bool, issue *issues_model.Issue, permDoer *access_model.Permission) error {
  74. if reviewer.IsOrganization() {
  75. return issues_model.ErrNotValidReviewRequest{
  76. Reason: "Organization can't be added as reviewer",
  77. UserID: doer.ID,
  78. RepoID: issue.Repo.ID,
  79. }
  80. }
  81. if doer.IsOrganization() {
  82. return issues_model.ErrNotValidReviewRequest{
  83. Reason: "Organization can't be doer to add reviewer",
  84. UserID: doer.ID,
  85. RepoID: issue.Repo.ID,
  86. }
  87. }
  88. permReviewer, err := access_model.GetUserRepoPermission(ctx, issue.Repo, reviewer)
  89. if err != nil {
  90. return err
  91. }
  92. if permDoer == nil {
  93. permDoer = new(access_model.Permission)
  94. *permDoer, err = access_model.GetUserRepoPermission(ctx, issue.Repo, doer)
  95. if err != nil {
  96. return err
  97. }
  98. }
  99. lastReview, err := issues_model.GetReviewByIssueIDAndUserID(ctx, issue.ID, reviewer.ID)
  100. if err != nil && !issues_model.IsErrReviewNotExist(err) {
  101. return err
  102. }
  103. canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
  104. if isAdd {
  105. if !permReviewer.CanAccessAny(perm.AccessModeRead, unit.TypePullRequests) {
  106. return issues_model.ErrNotValidReviewRequest{
  107. Reason: "Reviewer can't read",
  108. UserID: doer.ID,
  109. RepoID: issue.Repo.ID,
  110. }
  111. }
  112. if reviewer.ID == issue.PosterID && issue.OriginalAuthorID == 0 {
  113. return issues_model.ErrNotValidReviewRequest{
  114. Reason: "poster of pr can't be reviewer",
  115. UserID: doer.ID,
  116. RepoID: issue.Repo.ID,
  117. }
  118. }
  119. if canDoerChangeReviewRequests {
  120. return nil
  121. }
  122. if doer.ID == issue.PosterID && issue.OriginalAuthorID == 0 && lastReview != nil && lastReview.Type != issues_model.ReviewTypeRequest {
  123. return nil
  124. }
  125. return issues_model.ErrNotValidReviewRequest{
  126. Reason: "Doer can't choose reviewer",
  127. UserID: doer.ID,
  128. RepoID: issue.Repo.ID,
  129. }
  130. }
  131. if canDoerChangeReviewRequests {
  132. return nil
  133. }
  134. if lastReview != nil && lastReview.Type == issues_model.ReviewTypeRequest && lastReview.ReviewerID == doer.ID {
  135. return nil
  136. }
  137. return issues_model.ErrNotValidReviewRequest{
  138. Reason: "Doer can't remove reviewer",
  139. UserID: doer.ID,
  140. RepoID: issue.Repo.ID,
  141. }
  142. }
  143. // isValidTeamReviewRequest Check permission for ReviewRequest Team
  144. func isValidTeamReviewRequest(ctx context.Context, reviewer *organization.Team, doer *user_model.User, isAdd bool, issue *issues_model.Issue) error {
  145. if doer.IsOrganization() {
  146. return issues_model.ErrNotValidReviewRequest{
  147. Reason: "Organization can't be doer to add reviewer",
  148. UserID: doer.ID,
  149. RepoID: issue.Repo.ID,
  150. }
  151. }
  152. canDoerChangeReviewRequests := CanDoerChangeReviewRequests(ctx, doer, issue.Repo, issue.PosterID)
  153. if isAdd {
  154. if issue.Repo.IsPrivate {
  155. hasTeam := organization.HasTeamRepo(ctx, reviewer.OrgID, reviewer.ID, issue.RepoID)
  156. if !hasTeam {
  157. return issues_model.ErrNotValidReviewRequest{
  158. Reason: "Reviewing team can't read repo",
  159. UserID: doer.ID,
  160. RepoID: issue.Repo.ID,
  161. }
  162. }
  163. }
  164. if canDoerChangeReviewRequests {
  165. return nil
  166. }
  167. return issues_model.ErrNotValidReviewRequest{
  168. Reason: "Doer can't choose reviewer",
  169. UserID: doer.ID,
  170. RepoID: issue.Repo.ID,
  171. }
  172. }
  173. if canDoerChangeReviewRequests {
  174. return nil
  175. }
  176. return issues_model.ErrNotValidReviewRequest{
  177. Reason: "Doer can't remove reviewer",
  178. UserID: doer.ID,
  179. RepoID: issue.Repo.ID,
  180. }
  181. }
  182. // TeamReviewRequest add or remove a review request from a team for this PR, and make comment for it.
  183. func TeamReviewRequest(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *organization.Team, isAdd bool) (comment *issues_model.Comment, err error) {
  184. err = isValidTeamReviewRequest(ctx, reviewer, doer, isAdd, issue)
  185. if err != nil {
  186. return nil, err
  187. }
  188. if isAdd {
  189. comment, err = issues_model.AddTeamReviewRequest(ctx, issue, reviewer, doer)
  190. } else {
  191. comment, err = issues_model.RemoveTeamReviewRequest(ctx, issue, reviewer, doer)
  192. }
  193. if err != nil {
  194. return nil, err
  195. }
  196. if comment == nil || !isAdd {
  197. return nil, nil
  198. }
  199. return comment, teamReviewRequestNotify(ctx, issue, doer, reviewer, isAdd, comment)
  200. }
  201. func ReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewNotifiers []*ReviewRequestNotifier) {
  202. for _, reviewNotifier := range reviewNotifiers {
  203. if reviewNotifier.Reviewer != nil {
  204. notify_service.PullRequestReviewRequest(ctx, issue.Poster, issue, reviewNotifier.Reviewer, reviewNotifier.IsAdd, reviewNotifier.Comment)
  205. } else if reviewNotifier.ReviewTeam != nil {
  206. if err := teamReviewRequestNotify(ctx, issue, issue.Poster, reviewNotifier.ReviewTeam, reviewNotifier.IsAdd, reviewNotifier.Comment); err != nil {
  207. log.Error("teamReviewRequestNotify: %v", err)
  208. }
  209. }
  210. }
  211. }
  212. // teamReviewRequestNotify notify all user in this team
  213. func teamReviewRequestNotify(ctx context.Context, issue *issues_model.Issue, doer *user_model.User, reviewer *organization.Team, isAdd bool, comment *issues_model.Comment) error {
  214. // notify all user in this team
  215. if err := comment.LoadIssue(ctx); err != nil {
  216. return err
  217. }
  218. members, err := organization.GetTeamMembers(ctx, &organization.SearchMembersOptions{
  219. TeamID: reviewer.ID,
  220. })
  221. if err != nil {
  222. return err
  223. }
  224. for _, member := range members {
  225. if member.ID == comment.Issue.PosterID {
  226. continue
  227. }
  228. comment.AssigneeID = member.ID
  229. notify_service.PullRequestReviewRequest(ctx, doer, issue, member, isAdd, comment)
  230. }
  231. return err
  232. }
  233. // CanDoerChangeReviewRequests returns if the doer can add/remove review requests of a PR
  234. func CanDoerChangeReviewRequests(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, posterID int64) bool {
  235. if repo.IsArchived {
  236. return false
  237. }
  238. // The poster of the PR can change the reviewers
  239. if doer.ID == posterID {
  240. return true
  241. }
  242. // The owner of the repo can change the reviewers
  243. if doer.ID == repo.OwnerID {
  244. return true
  245. }
  246. // Collaborators of the repo can change the reviewers
  247. isCollaborator, err := repo_model.IsCollaborator(ctx, repo.ID, doer.ID)
  248. if err != nil {
  249. log.Error("IsCollaborator: %v", err)
  250. return false
  251. }
  252. if isCollaborator {
  253. return true
  254. }
  255. // If the repo's owner is an organization, members of teams with read permission on pull requests can change reviewers
  256. if repo.Owner.IsOrganization() {
  257. teams, err := organization.GetTeamsWithAccessToAnyRepoUnit(ctx, repo.OwnerID, repo.ID, perm.AccessModeRead, unit.TypePullRequests)
  258. if err != nil {
  259. log.Error("GetTeamsWithAccessToRepo: %v", err)
  260. return false
  261. }
  262. for _, team := range teams {
  263. if !team.UnitEnabled(ctx, unit.TypePullRequests) {
  264. continue
  265. }
  266. isMember, err := organization.IsTeamMember(ctx, repo.OwnerID, team.ID, doer.ID)
  267. if err != nil {
  268. log.Error("IsTeamMember: %v", err)
  269. continue
  270. }
  271. if isMember {
  272. return true
  273. }
  274. }
  275. }
  276. return false
  277. }