mirror of
				https://github.com/go-gitea/gitea
				synced 2025-11-04 13:28:25 +00:00 
			
		
		
		
	Fixes #17453 This PR adds the abbility to block a user from a personal account or organization to restrict how the blocked user can interact with the blocker. The docs explain what's the consequence of blocking a user. Screenshots:    --------- Co-authored-by: Lauris BH <lauris@nix.lv>
		
			
				
	
	
		
			217 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			217 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2022 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package repo
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	"code.gitea.io/gitea/models/perm"
 | 
						|
	"code.gitea.io/gitea/models/unit"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/container"
 | 
						|
	api "code.gitea.io/gitea/modules/structs"
 | 
						|
 | 
						|
	"xorm.io/builder"
 | 
						|
)
 | 
						|
 | 
						|
type StarredReposOptions struct {
 | 
						|
	db.ListOptions
 | 
						|
	StarrerID      int64
 | 
						|
	RepoOwnerID    int64
 | 
						|
	IncludePrivate bool
 | 
						|
}
 | 
						|
 | 
						|
func (opts *StarredReposOptions) ToConds() builder.Cond {
 | 
						|
	var cond builder.Cond = builder.Eq{
 | 
						|
		"star.uid": opts.StarrerID,
 | 
						|
	}
 | 
						|
	if opts.RepoOwnerID != 0 {
 | 
						|
		cond = cond.And(builder.Eq{
 | 
						|
			"repository.owner_id": opts.RepoOwnerID,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	if !opts.IncludePrivate {
 | 
						|
		cond = cond.And(builder.Eq{
 | 
						|
			"repository.is_private": false,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	return cond
 | 
						|
}
 | 
						|
 | 
						|
func (opts *StarredReposOptions) ToJoins() []db.JoinFunc {
 | 
						|
	return []db.JoinFunc{
 | 
						|
		func(e db.Engine) error {
 | 
						|
			e.Join("INNER", "star", "`repository`.id=`star`.repo_id")
 | 
						|
			return nil
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GetStarredRepos returns the repos starred by a particular user
 | 
						|
func GetStarredRepos(ctx context.Context, opts *StarredReposOptions) ([]*Repository, error) {
 | 
						|
	return db.Find[Repository](ctx, opts)
 | 
						|
}
 | 
						|
 | 
						|
type WatchedReposOptions struct {
 | 
						|
	db.ListOptions
 | 
						|
	WatcherID      int64
 | 
						|
	RepoOwnerID    int64
 | 
						|
	IncludePrivate bool
 | 
						|
}
 | 
						|
 | 
						|
func (opts *WatchedReposOptions) ToConds() builder.Cond {
 | 
						|
	var cond builder.Cond = builder.Eq{
 | 
						|
		"watch.user_id": opts.WatcherID,
 | 
						|
	}
 | 
						|
	if opts.RepoOwnerID != 0 {
 | 
						|
		cond = cond.And(builder.Eq{
 | 
						|
			"repository.owner_id": opts.RepoOwnerID,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	if !opts.IncludePrivate {
 | 
						|
		cond = cond.And(builder.Eq{
 | 
						|
			"repository.is_private": false,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	return cond.And(builder.Neq{
 | 
						|
		"watch.mode": WatchModeDont,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func (opts *WatchedReposOptions) ToJoins() []db.JoinFunc {
 | 
						|
	return []db.JoinFunc{
 | 
						|
		func(e db.Engine) error {
 | 
						|
			e.Join("INNER", "watch", "`repository`.id=`watch`.repo_id")
 | 
						|
			return nil
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GetWatchedRepos returns the repos watched by a particular user
 | 
						|
func GetWatchedRepos(ctx context.Context, opts *WatchedReposOptions) ([]*Repository, int64, error) {
 | 
						|
	return db.FindAndCount[Repository](ctx, opts)
 | 
						|
}
 | 
						|
 | 
						|
// GetRepoAssignees returns all users that have write access and can be assigned to issues
 | 
						|
// of the repository,
 | 
						|
func GetRepoAssignees(ctx context.Context, repo *Repository) (_ []*user_model.User, err error) {
 | 
						|
	if err = repo.LoadOwner(ctx); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	e := db.GetEngine(ctx)
 | 
						|
	userIDs := make([]int64, 0, 10)
 | 
						|
	if err = e.Table("access").
 | 
						|
		Where("repo_id = ? AND mode >= ?", repo.ID, perm.AccessModeWrite).
 | 
						|
		Select("user_id").
 | 
						|
		Find(&userIDs); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	additionalUserIDs := make([]int64, 0, 10)
 | 
						|
	if err = e.Table("team_user").
 | 
						|
		Join("INNER", "team_repo", "`team_repo`.team_id = `team_user`.team_id").
 | 
						|
		Join("INNER", "team_unit", "`team_unit`.team_id = `team_user`.team_id").
 | 
						|
		Where("`team_repo`.repo_id = ? AND (`team_unit`.access_mode >= ? OR (`team_unit`.access_mode = ? AND `team_unit`.`type` = ?))",
 | 
						|
			repo.ID, perm.AccessModeWrite, perm.AccessModeRead, unit.TypePullRequests).
 | 
						|
		Distinct("`team_user`.uid").
 | 
						|
		Select("`team_user`.uid").
 | 
						|
		Find(&additionalUserIDs); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	uniqueUserIDs := make(container.Set[int64])
 | 
						|
	uniqueUserIDs.AddMultiple(userIDs...)
 | 
						|
	uniqueUserIDs.AddMultiple(additionalUserIDs...)
 | 
						|
 | 
						|
	// Leave a seat for owner itself to append later, but if owner is an organization
 | 
						|
	// and just waste 1 unit is cheaper than re-allocate memory once.
 | 
						|
	users := make([]*user_model.User, 0, len(uniqueUserIDs)+1)
 | 
						|
	if len(userIDs) > 0 {
 | 
						|
		if err = e.In("id", uniqueUserIDs.Values()).OrderBy(user_model.GetOrderByName()).Find(&users); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if !repo.Owner.IsOrganization() && !uniqueUserIDs.Contains(repo.OwnerID) {
 | 
						|
		users = append(users, repo.Owner)
 | 
						|
	}
 | 
						|
 | 
						|
	return users, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetReviewers get all users can be requested to review:
 | 
						|
// * for private repositories this returns all users that have read access or higher to the repository.
 | 
						|
// * for public repositories this returns all users that have read access or higher to the repository,
 | 
						|
// all repo watchers and all organization members.
 | 
						|
// TODO: may be we should have a busy choice for users to block review request to them.
 | 
						|
func GetReviewers(ctx context.Context, repo *Repository, doerID, posterID int64) ([]*user_model.User, error) {
 | 
						|
	// Get the owner of the repository - this often already pre-cached and if so saves complexity for the following queries
 | 
						|
	if err := repo.LoadOwner(ctx); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	cond := builder.And(builder.Neq{"`user`.id": posterID})
 | 
						|
 | 
						|
	if repo.IsPrivate || repo.Owner.Visibility == api.VisibleTypePrivate {
 | 
						|
		// This a private repository:
 | 
						|
		// Anyone who can read the repository is a requestable reviewer
 | 
						|
 | 
						|
		cond = cond.And(builder.In("`user`.id",
 | 
						|
			builder.Select("user_id").From("access").Where(
 | 
						|
				builder.Eq{"repo_id": repo.ID}.
 | 
						|
					And(builder.Gte{"mode": perm.AccessModeRead}),
 | 
						|
			),
 | 
						|
		))
 | 
						|
 | 
						|
		if repo.Owner.Type == user_model.UserTypeIndividual && repo.Owner.ID != posterID {
 | 
						|
			// as private *user* repos don't generate an entry in the `access` table,
 | 
						|
			// the owner of a private repo needs to be explicitly added.
 | 
						|
			cond = cond.Or(builder.Eq{"`user`.id": repo.Owner.ID})
 | 
						|
		}
 | 
						|
 | 
						|
	} else {
 | 
						|
		// This is a "public" repository:
 | 
						|
		// Any user that has read access, is a watcher or organization member can be requested to review
 | 
						|
		cond = cond.And(builder.And(builder.In("`user`.id",
 | 
						|
			builder.Select("user_id").From("access").
 | 
						|
				Where(builder.Eq{"repo_id": repo.ID}.
 | 
						|
					And(builder.Gte{"mode": perm.AccessModeRead})),
 | 
						|
		).Or(builder.In("`user`.id",
 | 
						|
			builder.Select("user_id").From("watch").
 | 
						|
				Where(builder.Eq{"repo_id": repo.ID}.
 | 
						|
					And(builder.In("mode", WatchModeNormal, WatchModeAuto))),
 | 
						|
		).Or(builder.In("`user`.id",
 | 
						|
			builder.Select("uid").From("org_user").
 | 
						|
				Where(builder.Eq{"org_id": repo.OwnerID}),
 | 
						|
		)))))
 | 
						|
	}
 | 
						|
 | 
						|
	users := make([]*user_model.User, 0, 8)
 | 
						|
	return users, db.GetEngine(ctx).Where(cond).OrderBy(user_model.GetOrderByName()).Find(&users)
 | 
						|
}
 | 
						|
 | 
						|
// GetIssuePostersWithSearch returns users with limit of 30 whose username started with prefix that have authored an issue/pull request for the given repository
 | 
						|
// If isShowFullName is set to true, also include full name prefix search
 | 
						|
func GetIssuePostersWithSearch(ctx context.Context, repo *Repository, isPull bool, search string, isShowFullName bool) ([]*user_model.User, error) {
 | 
						|
	users := make([]*user_model.User, 0, 30)
 | 
						|
	var prefixCond builder.Cond = builder.Like{"name", search + "%"}
 | 
						|
	if isShowFullName {
 | 
						|
		prefixCond = prefixCond.Or(builder.Like{"full_name", "%" + search + "%"})
 | 
						|
	}
 | 
						|
 | 
						|
	cond := builder.In("`user`.id",
 | 
						|
		builder.Select("poster_id").From("issue").Where(
 | 
						|
			builder.Eq{"repo_id": repo.ID}.
 | 
						|
				And(builder.Eq{"is_pull": isPull}),
 | 
						|
		).GroupBy("poster_id")).And(prefixCond)
 | 
						|
 | 
						|
	return users, db.GetEngine(ctx).
 | 
						|
		Where(cond).
 | 
						|
		Cols("id", "name", "full_name", "avatar", "avatar_email", "use_custom_avatar").
 | 
						|
		OrderBy("name").
 | 
						|
		Limit(30).
 | 
						|
		Find(&users)
 | 
						|
}
 |