mirror of https://github.com/go-gitea/gitea
Supports wildcard protected branch (#20825)
This PR introduce glob match for protected branch name. The separator is `/` and you can use `*` matching non-separator chars and use `**` across separator. It also supports input an exist or non-exist branch name as matching condition and branch name condition has high priority than glob rule. Should fix #2529 and #15705 screenshots <img width="1160" alt="image" src="https://user-images.githubusercontent.com/81045/205651179-ebb5492a-4ade-4bb4-a13c-965e8c927063.png"> Co-authored-by: zeripath <art27@cantab.net>pull/22453/head^2
parent
cc1f8cbe96
commit
2782c14396
@ -0,0 +1,501 @@ |
|||||||
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package git |
||||||
|
|
||||||
|
import ( |
||||||
|
"context" |
||||||
|
"errors" |
||||||
|
"fmt" |
||||||
|
"strings" |
||||||
|
|
||||||
|
"code.gitea.io/gitea/models/db" |
||||||
|
"code.gitea.io/gitea/models/organization" |
||||||
|
"code.gitea.io/gitea/models/perm" |
||||||
|
access_model "code.gitea.io/gitea/models/perm/access" |
||||||
|
repo_model "code.gitea.io/gitea/models/repo" |
||||||
|
"code.gitea.io/gitea/models/unit" |
||||||
|
user_model "code.gitea.io/gitea/models/user" |
||||||
|
"code.gitea.io/gitea/modules/base" |
||||||
|
"code.gitea.io/gitea/modules/log" |
||||||
|
"code.gitea.io/gitea/modules/timeutil" |
||||||
|
"code.gitea.io/gitea/modules/util" |
||||||
|
|
||||||
|
"github.com/gobwas/glob" |
||||||
|
"github.com/gobwas/glob/syntax" |
||||||
|
) |
||||||
|
|
||||||
|
var ErrBranchIsProtected = errors.New("branch is protected") |
||||||
|
|
||||||
|
// ProtectedBranch struct
|
||||||
|
type ProtectedBranch struct { |
||||||
|
ID int64 `xorm:"pk autoincr"` |
||||||
|
RepoID int64 `xorm:"UNIQUE(s)"` |
||||||
|
Repo *repo_model.Repository `xorm:"-"` |
||||||
|
RuleName string `xorm:"'branch_name' UNIQUE(s)"` // a branch name or a glob match to branch name
|
||||||
|
globRule glob.Glob `xorm:"-"` |
||||||
|
isPlainName bool `xorm:"-"` |
||||||
|
CanPush bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
EnableWhitelist bool |
||||||
|
WhitelistUserIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
WhitelistTeamIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
EnableMergeWhitelist bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
WhitelistDeployKeys bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
MergeWhitelistUserIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
MergeWhitelistTeamIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
EnableStatusCheck bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
StatusCheckContexts []string `xorm:"JSON TEXT"` |
||||||
|
EnableApprovalsWhitelist bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
ApprovalsWhitelistUserIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
ApprovalsWhitelistTeamIDs []int64 `xorm:"JSON TEXT"` |
||||||
|
RequiredApprovals int64 `xorm:"NOT NULL DEFAULT 0"` |
||||||
|
BlockOnRejectedReviews bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
BlockOnOfficialReviewRequests bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
BlockOnOutdatedBranch bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
DismissStaleApprovals bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
RequireSignedCommits bool `xorm:"NOT NULL DEFAULT false"` |
||||||
|
ProtectedFilePatterns string `xorm:"TEXT"` |
||||||
|
UnprotectedFilePatterns string `xorm:"TEXT"` |
||||||
|
|
||||||
|
CreatedUnix timeutil.TimeStamp `xorm:"created"` |
||||||
|
UpdatedUnix timeutil.TimeStamp `xorm:"updated"` |
||||||
|
} |
||||||
|
|
||||||
|
func init() { |
||||||
|
db.RegisterModel(new(ProtectedBranch)) |
||||||
|
} |
||||||
|
|
||||||
|
// IsRuleNameSpecial return true if it contains special character
|
||||||
|
func IsRuleNameSpecial(ruleName string) bool { |
||||||
|
for i := 0; i < len(ruleName); i++ { |
||||||
|
if syntax.Special(ruleName[i]) { |
||||||
|
return true |
||||||
|
} |
||||||
|
} |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
func (protectBranch *ProtectedBranch) loadGlob() { |
||||||
|
if protectBranch.globRule == nil { |
||||||
|
var err error |
||||||
|
protectBranch.globRule, err = glob.Compile(protectBranch.RuleName, '/') |
||||||
|
if err != nil { |
||||||
|
log.Warn("Invalid glob rule for ProtectedBranch[%d]: %s %v", protectBranch.ID, protectBranch.RuleName, err) |
||||||
|
protectBranch.globRule = glob.MustCompile(glob.QuoteMeta(protectBranch.RuleName), '/') |
||||||
|
} |
||||||
|
protectBranch.isPlainName = !IsRuleNameSpecial(protectBranch.RuleName) |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
// Match tests if branchName matches the rule
|
||||||
|
func (protectBranch *ProtectedBranch) Match(branchName string) bool { |
||||||
|
protectBranch.loadGlob() |
||||||
|
if protectBranch.isPlainName { |
||||||
|
return strings.EqualFold(protectBranch.RuleName, branchName) |
||||||
|
} |
||||||
|
|
||||||
|
return protectBranch.globRule.Match(branchName) |
||||||
|
} |
||||||
|
|
||||||
|
func (protectBranch *ProtectedBranch) LoadRepo(ctx context.Context) (err error) { |
||||||
|
if protectBranch.Repo != nil { |
||||||
|
return nil |
||||||
|
} |
||||||
|
protectBranch.Repo, err = repo_model.GetRepositoryByID(ctx, protectBranch.RepoID) |
||||||
|
return err |
||||||
|
} |
||||||
|
|
||||||
|
// CanUserPush returns if some user could push to this protected branch
|
||||||
|
func (protectBranch *ProtectedBranch) CanUserPush(ctx context.Context, user *user_model.User) bool { |
||||||
|
if !protectBranch.CanPush { |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
if !protectBranch.EnableWhitelist { |
||||||
|
if err := protectBranch.LoadRepo(ctx); err != nil { |
||||||
|
log.Error("LoadRepo: %v", err) |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
writeAccess, err := access_model.HasAccessUnit(ctx, user, protectBranch.Repo, unit.TypeCode, perm.AccessModeWrite) |
||||||
|
if err != nil { |
||||||
|
log.Error("HasAccessUnit: %v", err) |
||||||
|
return false |
||||||
|
} |
||||||
|
return writeAccess |
||||||
|
} |
||||||
|
|
||||||
|
if base.Int64sContains(protectBranch.WhitelistUserIDs, user.ID) { |
||||||
|
return true |
||||||
|
} |
||||||
|
|
||||||
|
if len(protectBranch.WhitelistTeamIDs) == 0 { |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
in, err := organization.IsUserInTeams(ctx, user.ID, protectBranch.WhitelistTeamIDs) |
||||||
|
if err != nil { |
||||||
|
log.Error("IsUserInTeams: %v", err) |
||||||
|
return false |
||||||
|
} |
||||||
|
return in |
||||||
|
} |
||||||
|
|
||||||
|
// IsUserMergeWhitelisted checks if some user is whitelisted to merge to this branch
|
||||||
|
func IsUserMergeWhitelisted(ctx context.Context, protectBranch *ProtectedBranch, userID int64, permissionInRepo access_model.Permission) bool { |
||||||
|
if !protectBranch.EnableMergeWhitelist { |
||||||
|
// Then we need to fall back on whether the user has write permission
|
||||||
|
return permissionInRepo.CanWrite(unit.TypeCode) |
||||||
|
} |
||||||
|
|
||||||
|
if base.Int64sContains(protectBranch.MergeWhitelistUserIDs, userID) { |
||||||
|
return true |
||||||
|
} |
||||||
|
|
||||||
|
if len(protectBranch.MergeWhitelistTeamIDs) == 0 { |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
in, err := organization.IsUserInTeams(ctx, userID, protectBranch.MergeWhitelistTeamIDs) |
||||||
|
if err != nil { |
||||||
|
log.Error("IsUserInTeams: %v", err) |
||||||
|
return false |
||||||
|
} |
||||||
|
return in |
||||||
|
} |
||||||
|
|
||||||
|
// IsUserOfficialReviewer check if user is official reviewer for the branch (counts towards required approvals)
|
||||||
|
func IsUserOfficialReviewer(ctx context.Context, protectBranch *ProtectedBranch, user *user_model.User) (bool, error) { |
||||||
|
repo, err := repo_model.GetRepositoryByID(ctx, protectBranch.RepoID) |
||||||
|
if err != nil { |
||||||
|
return false, err |
||||||
|
} |
||||||
|
|
||||||
|
if !protectBranch.EnableApprovalsWhitelist { |
||||||
|
// Anyone with write access is considered official reviewer
|
||||||
|
writeAccess, err := access_model.HasAccessUnit(ctx, user, repo, unit.TypeCode, perm.AccessModeWrite) |
||||||
|
if err != nil { |
||||||
|
return false, err |
||||||
|
} |
||||||
|
return writeAccess, nil |
||||||
|
} |
||||||
|
|
||||||
|
if base.Int64sContains(protectBranch.ApprovalsWhitelistUserIDs, user.ID) { |
||||||
|
return true, nil |
||||||
|
} |
||||||
|
|
||||||
|
inTeam, err := organization.IsUserInTeams(ctx, user.ID, protectBranch.ApprovalsWhitelistTeamIDs) |
||||||
|
if err != nil { |
||||||
|
return false, err |
||||||
|
} |
||||||
|
|
||||||
|
return inTeam, nil |
||||||
|
} |
||||||
|
|
||||||
|
// GetProtectedFilePatterns parses a semicolon separated list of protected file patterns and returns a glob.Glob slice
|
||||||
|
func (protectBranch *ProtectedBranch) GetProtectedFilePatterns() []glob.Glob { |
||||||
|
return getFilePatterns(protectBranch.ProtectedFilePatterns) |
||||||
|
} |
||||||
|
|
||||||
|
// GetUnprotectedFilePatterns parses a semicolon separated list of unprotected file patterns and returns a glob.Glob slice
|
||||||
|
func (protectBranch *ProtectedBranch) GetUnprotectedFilePatterns() []glob.Glob { |
||||||
|
return getFilePatterns(protectBranch.UnprotectedFilePatterns) |
||||||
|
} |
||||||
|
|
||||||
|
func getFilePatterns(filePatterns string) []glob.Glob { |
||||||
|
extarr := make([]glob.Glob, 0, 10) |
||||||
|
for _, expr := range strings.Split(strings.ToLower(filePatterns), ";") { |
||||||
|
expr = strings.TrimSpace(expr) |
||||||
|
if expr != "" { |
||||||
|
if g, err := glob.Compile(expr, '.', '/'); err != nil { |
||||||
|
log.Info("Invalid glob expression '%s' (skipped): %v", expr, err) |
||||||
|
} else { |
||||||
|
extarr = append(extarr, g) |
||||||
|
} |
||||||
|
} |
||||||
|
} |
||||||
|
return extarr |
||||||
|
} |
||||||
|
|
||||||
|
// MergeBlockedByProtectedFiles returns true if merge is blocked by protected files change
|
||||||
|
func (protectBranch *ProtectedBranch) MergeBlockedByProtectedFiles(changedProtectedFiles []string) bool { |
||||||
|
glob := protectBranch.GetProtectedFilePatterns() |
||||||
|
if len(glob) == 0 { |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
return len(changedProtectedFiles) > 0 |
||||||
|
} |
||||||
|
|
||||||
|
// IsProtectedFile return if path is protected
|
||||||
|
func (protectBranch *ProtectedBranch) IsProtectedFile(patterns []glob.Glob, path string) bool { |
||||||
|
if len(patterns) == 0 { |
||||||
|
patterns = protectBranch.GetProtectedFilePatterns() |
||||||
|
if len(patterns) == 0 { |
||||||
|
return false |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
lpath := strings.ToLower(strings.TrimSpace(path)) |
||||||
|
|
||||||
|
r := false |
||||||
|
for _, pat := range patterns { |
||||||
|
if pat.Match(lpath) { |
||||||
|
r = true |
||||||
|
break |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
return r |
||||||
|
} |
||||||
|
|
||||||
|
// IsUnprotectedFile return if path is unprotected
|
||||||
|
func (protectBranch *ProtectedBranch) IsUnprotectedFile(patterns []glob.Glob, path string) bool { |
||||||
|
if len(patterns) == 0 { |
||||||
|
patterns = protectBranch.GetUnprotectedFilePatterns() |
||||||
|
if len(patterns) == 0 { |
||||||
|
return false |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
lpath := strings.ToLower(strings.TrimSpace(path)) |
||||||
|
|
||||||
|
r := false |
||||||
|
for _, pat := range patterns { |
||||||
|
if pat.Match(lpath) { |
||||||
|
r = true |
||||||
|
break |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
return r |
||||||
|
} |
||||||
|
|
||||||
|
// GetProtectedBranchRuleByName getting protected branch rule by name
|
||||||
|
func GetProtectedBranchRuleByName(ctx context.Context, repoID int64, ruleName string) (*ProtectedBranch, error) { |
||||||
|
rel := &ProtectedBranch{RepoID: repoID, RuleName: ruleName} |
||||||
|
has, err := db.GetByBean(ctx, rel) |
||||||
|
if err != nil { |
||||||
|
return nil, err |
||||||
|
} |
||||||
|
if !has { |
||||||
|
return nil, nil |
||||||
|
} |
||||||
|
return rel, nil |
||||||
|
} |
||||||
|
|
||||||
|
// GetProtectedBranchRuleByID getting protected branch rule by rule ID
|
||||||
|
func GetProtectedBranchRuleByID(ctx context.Context, repoID, ruleID int64) (*ProtectedBranch, error) { |
||||||
|
rel := &ProtectedBranch{ID: ruleID, RepoID: repoID} |
||||||
|
has, err := db.GetByBean(ctx, rel) |
||||||
|
if err != nil { |
||||||
|
return nil, err |
||||||
|
} |
||||||
|
if !has { |
||||||
|
return nil, nil |
||||||
|
} |
||||||
|
return rel, nil |
||||||
|
} |
||||||
|
|
||||||
|
// WhitelistOptions represent all sorts of whitelists used for protected branches
|
||||||
|
type WhitelistOptions struct { |
||||||
|
UserIDs []int64 |
||||||
|
TeamIDs []int64 |
||||||
|
|
||||||
|
MergeUserIDs []int64 |
||||||
|
MergeTeamIDs []int64 |
||||||
|
|
||||||
|
ApprovalsUserIDs []int64 |
||||||
|
ApprovalsTeamIDs []int64 |
||||||
|
} |
||||||
|
|
||||||
|
// UpdateProtectBranch saves branch protection options of repository.
|
||||||
|
// If ID is 0, it creates a new record. Otherwise, updates existing record.
|
||||||
|
// This function also performs check if whitelist user and team's IDs have been changed
|
||||||
|
// to avoid unnecessary whitelist delete and regenerate.
|
||||||
|
func UpdateProtectBranch(ctx context.Context, repo *repo_model.Repository, protectBranch *ProtectedBranch, opts WhitelistOptions) (err error) { |
||||||
|
if err = repo.GetOwner(ctx); err != nil { |
||||||
|
return fmt.Errorf("GetOwner: %v", err) |
||||||
|
} |
||||||
|
|
||||||
|
whitelist, err := updateUserWhitelist(ctx, repo, protectBranch.WhitelistUserIDs, opts.UserIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.WhitelistUserIDs = whitelist |
||||||
|
|
||||||
|
whitelist, err = updateUserWhitelist(ctx, repo, protectBranch.MergeWhitelistUserIDs, opts.MergeUserIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.MergeWhitelistUserIDs = whitelist |
||||||
|
|
||||||
|
whitelist, err = updateApprovalWhitelist(ctx, repo, protectBranch.ApprovalsWhitelistUserIDs, opts.ApprovalsUserIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.ApprovalsWhitelistUserIDs = whitelist |
||||||
|
|
||||||
|
// if the repo is in an organization
|
||||||
|
whitelist, err = updateTeamWhitelist(ctx, repo, protectBranch.WhitelistTeamIDs, opts.TeamIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.WhitelistTeamIDs = whitelist |
||||||
|
|
||||||
|
whitelist, err = updateTeamWhitelist(ctx, repo, protectBranch.MergeWhitelistTeamIDs, opts.MergeTeamIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.MergeWhitelistTeamIDs = whitelist |
||||||
|
|
||||||
|
whitelist, err = updateTeamWhitelist(ctx, repo, protectBranch.ApprovalsWhitelistTeamIDs, opts.ApprovalsTeamIDs) |
||||||
|
if err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
protectBranch.ApprovalsWhitelistTeamIDs = whitelist |
||||||
|
|
||||||
|
// Make sure protectBranch.ID is not 0 for whitelists
|
||||||
|
if protectBranch.ID == 0 { |
||||||
|
if _, err = db.GetEngine(ctx).Insert(protectBranch); err != nil { |
||||||
|
return fmt.Errorf("Insert: %v", err) |
||||||
|
} |
||||||
|
return nil |
||||||
|
} |
||||||
|
|
||||||
|
if _, err = db.GetEngine(ctx).ID(protectBranch.ID).AllCols().Update(protectBranch); err != nil { |
||||||
|
return fmt.Errorf("Update: %v", err) |
||||||
|
} |
||||||
|
|
||||||
|
return nil |
||||||
|
} |
||||||
|
|
||||||
|
// updateApprovalWhitelist checks whether the user whitelist changed and returns a whitelist with
|
||||||
|
// the users from newWhitelist which have explicit read or write access to the repo.
|
||||||
|
func updateApprovalWhitelist(ctx context.Context, repo *repo_model.Repository, currentWhitelist, newWhitelist []int64) (whitelist []int64, err error) { |
||||||
|
hasUsersChanged := !util.SliceSortedEqual(currentWhitelist, newWhitelist) |
||||||
|
if !hasUsersChanged { |
||||||
|
return currentWhitelist, nil |
||||||
|
} |
||||||
|
|
||||||
|
whitelist = make([]int64, 0, len(newWhitelist)) |
||||||
|
for _, userID := range newWhitelist { |
||||||
|
if reader, err := access_model.IsRepoReader(ctx, repo, userID); err != nil { |
||||||
|
return nil, err |
||||||
|
} else if !reader { |
||||||
|
continue |
||||||
|
} |
||||||
|
whitelist = append(whitelist, userID) |
||||||
|
} |
||||||
|
|
||||||
|
return whitelist, err |
||||||
|
} |
||||||
|
|
||||||
|
// updateUserWhitelist checks whether the user whitelist changed and returns a whitelist with
|
||||||
|
// the users from newWhitelist which have write access to the repo.
|
||||||
|
func updateUserWhitelist(ctx context.Context, repo *repo_model.Repository, currentWhitelist, newWhitelist []int64) (whitelist []int64, err error) { |
||||||
|
hasUsersChanged := !util.SliceSortedEqual(currentWhitelist, newWhitelist) |
||||||
|
if !hasUsersChanged { |
||||||
|
return currentWhitelist, nil |
||||||
|
} |
||||||
|
|
||||||
|
whitelist = make([]int64, 0, len(newWhitelist)) |
||||||
|
for _, userID := range newWhitelist { |
||||||
|
user, err := user_model.GetUserByID(ctx, userID) |
||||||
|
if err != nil { |
||||||
|
return nil, fmt.Errorf("GetUserByID [user_id: %d, repo_id: %d]: %v", userID, repo.ID, err) |
||||||
|
} |
||||||
|
perm, err := access_model.GetUserRepoPermission(ctx, repo, user) |
||||||
|
if err != nil { |
||||||
|
return nil, fmt.Errorf("GetUserRepoPermission [user_id: %d, repo_id: %d]: %v", userID, repo.ID, err) |
||||||
|
} |
||||||
|
|
||||||
|
if !perm.CanWrite(unit.TypeCode) { |
||||||
|
continue // Drop invalid user ID
|
||||||
|
} |
||||||
|
|
||||||
|
whitelist = append(whitelist, userID) |
||||||
|
} |
||||||
|
|
||||||
|
return whitelist, err |
||||||
|
} |
||||||
|
|
||||||
|
// updateTeamWhitelist checks whether the team whitelist changed and returns a whitelist with
|
||||||
|
// the teams from newWhitelist which have write access to the repo.
|
||||||
|
func updateTeamWhitelist(ctx context.Context, repo *repo_model.Repository, currentWhitelist, newWhitelist []int64) (whitelist []int64, err error) { |
||||||
|
hasTeamsChanged := !util.SliceSortedEqual(currentWhitelist, newWhitelist) |
||||||
|
if !hasTeamsChanged { |
||||||
|
return currentWhitelist, nil |
||||||
|
} |
||||||
|
|
||||||
|
teams, err := organization.GetTeamsWithAccessToRepo(ctx, repo.OwnerID, repo.ID, perm.AccessModeRead) |
||||||
|
if err != nil { |
||||||
|
return nil, fmt.Errorf("GetTeamsWithAccessToRepo [org_id: %d, repo_id: %d]: %v", repo.OwnerID, repo.ID, err) |
||||||
|
} |
||||||
|
|
||||||
|
whitelist = make([]int64, 0, len(teams)) |
||||||
|
for i := range teams { |
||||||
|
if util.SliceContains(newWhitelist, teams[i].ID) { |
||||||
|
whitelist = append(whitelist, teams[i].ID) |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
return whitelist, err |
||||||
|
} |
||||||
|
|
||||||
|
// DeleteProtectedBranch removes ProtectedBranch relation between the user and repository.
|
||||||
|
func DeleteProtectedBranch(ctx context.Context, repoID, id int64) (err error) { |
||||||
|
protectedBranch := &ProtectedBranch{ |
||||||
|
RepoID: repoID, |
||||||
|
ID: id, |
||||||
|
} |
||||||
|
|
||||||
|
if affected, err := db.GetEngine(ctx).Delete(protectedBranch); err != nil { |
||||||
|
return err |
||||||
|
} else if affected != 1 { |
||||||
|
return fmt.Errorf("delete protected branch ID(%v) failed", id) |
||||||
|
} |
||||||
|
|
||||||
|
return nil |
||||||
|
} |
||||||
|
|
||||||
|
// RemoveUserIDFromProtectedBranch remove all user ids from protected branch options
|
||||||
|
func RemoveUserIDFromProtectedBranch(ctx context.Context, p *ProtectedBranch, userID int64) error { |
||||||
|
lenIDs, lenApprovalIDs, lenMergeIDs := len(p.WhitelistUserIDs), len(p.ApprovalsWhitelistUserIDs), len(p.MergeWhitelistUserIDs) |
||||||
|
p.WhitelistUserIDs = util.SliceRemoveAll(p.WhitelistUserIDs, userID) |
||||||
|
p.ApprovalsWhitelistUserIDs = util.SliceRemoveAll(p.ApprovalsWhitelistUserIDs, userID) |
||||||
|
p.MergeWhitelistUserIDs = util.SliceRemoveAll(p.MergeWhitelistUserIDs, userID) |
||||||
|
|
||||||
|
if lenIDs != len(p.WhitelistUserIDs) || lenApprovalIDs != len(p.ApprovalsWhitelistUserIDs) || |
||||||
|
lenMergeIDs != len(p.MergeWhitelistUserIDs) { |
||||||
|
if _, err := db.GetEngine(ctx).ID(p.ID).Cols( |
||||||
|
"whitelist_user_i_ds", |
||||||
|
"merge_whitelist_user_i_ds", |
||||||
|
"approvals_whitelist_user_i_ds", |
||||||
|
).Update(p); err != nil { |
||||||
|
return fmt.Errorf("updateProtectedBranches: %v", err) |
||||||
|
} |
||||||
|
} |
||||||
|
return nil |
||||||
|
} |
||||||
|
|
||||||
|
// RemoveTeamIDFromProtectedBranch remove all team ids from protected branch options
|
||||||
|
func RemoveTeamIDFromProtectedBranch(ctx context.Context, p *ProtectedBranch, teamID int64) error { |
||||||
|
lenIDs, lenApprovalIDs, lenMergeIDs := len(p.WhitelistTeamIDs), len(p.ApprovalsWhitelistTeamIDs), len(p.MergeWhitelistTeamIDs) |
||||||
|
p.WhitelistTeamIDs = util.SliceRemoveAll(p.WhitelistTeamIDs, teamID) |
||||||
|
p.ApprovalsWhitelistTeamIDs = util.SliceRemoveAll(p.ApprovalsWhitelistTeamIDs, teamID) |
||||||
|
p.MergeWhitelistTeamIDs = util.SliceRemoveAll(p.MergeWhitelistTeamIDs, teamID) |
||||||
|
|
||||||
|
if lenIDs != len(p.WhitelistTeamIDs) || |
||||||
|
lenApprovalIDs != len(p.ApprovalsWhitelistTeamIDs) || |
||||||
|
lenMergeIDs != len(p.MergeWhitelistTeamIDs) { |
||||||
|
if _, err := db.GetEngine(ctx).ID(p.ID).Cols( |
||||||
|
"whitelist_team_i_ds", |
||||||
|
"merge_whitelist_team_i_ds", |
||||||
|
"approvals_whitelist_team_i_ds", |
||||||
|
).Update(p); err != nil { |
||||||
|
return fmt.Errorf("updateProtectedBranches: %v", err) |
||||||
|
} |
||||||
|
} |
||||||
|
return nil |
||||||
|
} |
@ -0,0 +1,86 @@ |
|||||||
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package git |
||||||
|
|
||||||
|
import ( |
||||||
|
"context" |
||||||
|
"sort" |
||||||
|
|
||||||
|
"code.gitea.io/gitea/models/db" |
||||||
|
"code.gitea.io/gitea/modules/git" |
||||||
|
|
||||||
|
"github.com/gobwas/glob" |
||||||
|
) |
||||||
|
|
||||||
|
type ProtectedBranchRules []*ProtectedBranch |
||||||
|
|
||||||
|
func (rules ProtectedBranchRules) GetFirstMatched(branchName string) *ProtectedBranch { |
||||||
|
for _, rule := range rules { |
||||||
|
if rule.Match(branchName) { |
||||||
|
return rule |
||||||
|
} |
||||||
|
} |
||||||
|
return nil |
||||||
|
} |
||||||
|
|
||||||
|
func (rules ProtectedBranchRules) sort() { |
||||||
|
sort.Slice(rules, func(i, j int) bool { |
||||||
|
rules[i].loadGlob() |
||||||
|
rules[j].loadGlob() |
||||||
|
if rules[i].isPlainName { |
||||||
|
if !rules[j].isPlainName { |
||||||
|
return true |
||||||
|
} |
||||||
|
} else if rules[j].isPlainName { |
||||||
|
return true |
||||||
|
} |
||||||
|
return rules[i].CreatedUnix < rules[j].CreatedUnix |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
// FindRepoProtectedBranchRules load all repository's protected rules
|
||||||
|
func FindRepoProtectedBranchRules(ctx context.Context, repoID int64) (ProtectedBranchRules, error) { |
||||||
|
var rules ProtectedBranchRules |
||||||
|
err := db.GetEngine(ctx).Where("repo_id = ?", repoID).Asc("created_unix").Find(&rules) |
||||||
|
if err != nil { |
||||||
|
return nil, err |
||||||
|
} |
||||||
|
rules.sort() |
||||||
|
return rules, nil |
||||||
|
} |
||||||
|
|
||||||
|
// FindAllMatchedBranches find all matched branches
|
||||||
|
func FindAllMatchedBranches(ctx context.Context, gitRepo *git.Repository, ruleName string) ([]string, error) { |
||||||
|
// FIXME: how many should we get?
|
||||||
|
branches, _, err := gitRepo.GetBranchNames(0, 9999999) |
||||||
|
if err != nil { |
||||||
|
return nil, err |
||||||
|
} |
||||||
|
rule := glob.MustCompile(ruleName) |
||||||
|
results := make([]string, 0, len(branches)) |
||||||
|
for _, branch := range branches { |
||||||
|
if rule.Match(branch) { |
||||||
|
results = append(results, branch) |
||||||
|
} |
||||||
|
} |
||||||
|
return results, nil |
||||||
|
} |
||||||
|
|
||||||
|
// GetFirstMatchProtectedBranchRule returns the first matched rules
|
||||||
|
func GetFirstMatchProtectedBranchRule(ctx context.Context, repoID int64, branchName string) (*ProtectedBranch, error) { |
||||||
|
rules, err := FindRepoProtectedBranchRules(ctx, repoID) |
||||||
|
if err != nil { |
||||||
|
return nil, err |
||||||
|
} |
||||||
|
return rules.GetFirstMatched(branchName), nil |
||||||
|
} |
||||||
|
|
||||||
|
// IsBranchProtected checks if branch is protected
|
||||||
|
func IsBranchProtected(ctx context.Context, repoID int64, branchName string) (bool, error) { |
||||||
|
rule, err := GetFirstMatchProtectedBranchRule(ctx, repoID, branchName) |
||||||
|
if err != nil { |
||||||
|
return false, err |
||||||
|
} |
||||||
|
return rule != nil, nil |
||||||
|
} |
@ -0,0 +1,78 @@ |
|||||||
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package git |
||||||
|
|
||||||
|
import ( |
||||||
|
"fmt" |
||||||
|
"testing" |
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert" |
||||||
|
) |
||||||
|
|
||||||
|
func TestBranchRuleMatch(t *testing.T) { |
||||||
|
kases := []struct { |
||||||
|
Rule string |
||||||
|
BranchName string |
||||||
|
ExpectedMatch bool |
||||||
|
}{ |
||||||
|
{ |
||||||
|
Rule: "release/*", |
||||||
|
BranchName: "release/v1.17", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "release/**/v1.17", |
||||||
|
BranchName: "release/test/v1.17", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "release/**/v1.17", |
||||||
|
BranchName: "release/test/1/v1.17", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "release/*/v1.17", |
||||||
|
BranchName: "release/test/1/v1.17", |
||||||
|
ExpectedMatch: false, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "release/v*", |
||||||
|
BranchName: "release/v1.16", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "*", |
||||||
|
BranchName: "release/v1.16", |
||||||
|
ExpectedMatch: false, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "**", |
||||||
|
BranchName: "release/v1.16", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "main", |
||||||
|
BranchName: "main", |
||||||
|
ExpectedMatch: true, |
||||||
|
}, |
||||||
|
{ |
||||||
|
Rule: "master", |
||||||
|
BranchName: "main", |
||||||
|
ExpectedMatch: false, |
||||||
|
}, |
||||||
|
} |
||||||
|
|
||||||
|
for _, kase := range kases { |
||||||
|
pb := ProtectedBranch{RuleName: kase.Rule} |
||||||
|
var should, infact string |
||||||
|
if !kase.ExpectedMatch { |
||||||
|
should = " not" |
||||||
|
} else { |
||||||
|
infact = " not" |
||||||
|
} |
||||||
|
assert.EqualValues(t, kase.ExpectedMatch, pb.Match(kase.BranchName), |
||||||
|
fmt.Sprintf("%s should%s match %s but it is%s", kase.BranchName, should, kase.Rule, infact), |
||||||
|
) |
||||||
|
} |
||||||
|
} |
Loading…
Reference in new issue