Add "Allow edits from maintainer" feature (#18002)
Adds a feature [like GitHub has](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/creating-a-pull-request-from-a-fork) (step 7). If you create a new PR from a forked repo, you can select (and change later, but only if you are the PR creator/poster) the "Allow edits from maintainers" option. Then users with write access to the base branch get more permissions on this branch: * use the update pull request button * push directly from the command line (`git push`) * edit/delete/upload files via web UI * use related API endpoints You can't merge PRs to this branch with this enabled, you'll need "full" code write permissions. This feature has a pretty big impact on the permission system. I might forgot changing some things or didn't find security vulnerabilities. In this case, please leave a review or comment on this PR. Closes #17728 Co-authored-by: 6543 <6543@obermui.de>
This commit is contained in:
parent
92dfbada37
commit
8eb1cd9264
29 changed files with 359 additions and 60 deletions
|
@ -61,6 +61,7 @@ type Version struct {
|
||||||
// update minDBVersion accordingly
|
// update minDBVersion accordingly
|
||||||
var migrations = []Migration{
|
var migrations = []Migration{
|
||||||
// Gitea 1.5.0 ends at v69
|
// Gitea 1.5.0 ends at v69
|
||||||
|
|
||||||
// v70 -> v71
|
// v70 -> v71
|
||||||
NewMigration("add issue_dependencies", addIssueDependencies),
|
NewMigration("add issue_dependencies", addIssueDependencies),
|
||||||
// v71 -> v72
|
// v71 -> v72
|
||||||
|
@ -380,6 +381,8 @@ var migrations = []Migration{
|
||||||
NewMigration("Create ForeignReference table", createForeignReferenceTable),
|
NewMigration("Create ForeignReference table", createForeignReferenceTable),
|
||||||
// v212 -> v213
|
// v212 -> v213
|
||||||
NewMigration("Add package tables", addPackageTables),
|
NewMigration("Add package tables", addPackageTables),
|
||||||
|
// v213 -> v214
|
||||||
|
NewMigration("Add allow edits from maintainers to PullRequest table", addAllowMaintainerEdit),
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetCurrentDBVersion returns the current db version
|
// GetCurrentDBVersion returns the current db version
|
||||||
|
|
18
models/migrations/v213.go
Normal file
18
models/migrations/v213.go
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package migrations
|
||||||
|
|
||||||
|
import (
|
||||||
|
"xorm.io/xorm"
|
||||||
|
)
|
||||||
|
|
||||||
|
func addAllowMaintainerEdit(x *xorm.Engine) error {
|
||||||
|
// PullRequest represents relation between pull request and repositories.
|
||||||
|
type PullRequest struct {
|
||||||
|
AllowMaintainerEdit bool `xorm:"NOT NULL DEFAULT false"`
|
||||||
|
}
|
||||||
|
|
||||||
|
return x.Sync2(new(PullRequest))
|
||||||
|
}
|
|
@ -78,6 +78,7 @@ type PullRequest struct {
|
||||||
BaseBranch string
|
BaseBranch string
|
||||||
ProtectedBranch *ProtectedBranch `xorm:"-"`
|
ProtectedBranch *ProtectedBranch `xorm:"-"`
|
||||||
MergeBase string `xorm:"VARCHAR(40)"`
|
MergeBase string `xorm:"VARCHAR(40)"`
|
||||||
|
AllowMaintainerEdit bool `xorm:"NOT NULL DEFAULT false"`
|
||||||
|
|
||||||
HasMerged bool `xorm:"INDEX"`
|
HasMerged bool `xorm:"INDEX"`
|
||||||
MergedCommitID string `xorm:"VARCHAR(40)"`
|
MergedCommitID string `xorm:"VARCHAR(40)"`
|
||||||
|
@ -711,6 +712,14 @@ func (pr *PullRequest) GetHeadBranchHTMLURL() string {
|
||||||
return pr.HeadRepo.HTMLURL() + "/src/branch/" + util.PathEscapeSegments(pr.HeadBranch)
|
return pr.HeadRepo.HTMLURL() + "/src/branch/" + util.PathEscapeSegments(pr.HeadBranch)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UpdateAllowEdits update if PR can be edited from maintainers
|
||||||
|
func UpdateAllowEdits(ctx context.Context, pr *PullRequest) error {
|
||||||
|
if _, err := db.GetEngine(ctx).ID(pr.ID).Cols("allow_maintainer_edit").Update(pr); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// Mergeable returns if the pullrequest is mergeable.
|
// Mergeable returns if the pullrequest is mergeable.
|
||||||
func (pr *PullRequest) Mergeable() bool {
|
func (pr *PullRequest) Mergeable() bool {
|
||||||
// If a pull request isn't mergable if it's:
|
// If a pull request isn't mergable if it's:
|
||||||
|
|
|
@ -103,6 +103,39 @@ func (p *Permission) CanWriteIssuesOrPulls(isPull bool) bool {
|
||||||
return p.CanWrite(unit.TypeIssues)
|
return p.CanWrite(unit.TypeIssues)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CanWriteToBranch checks if the branch is writable by the user
|
||||||
|
func (p *Permission) CanWriteToBranch(user *user_model.User, branch string) bool {
|
||||||
|
if p.CanWrite(unit.TypeCode) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(p.Units) < 1 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
prs, err := GetUnmergedPullRequestsByHeadInfo(p.Units[0].RepoID, branch)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, pr := range prs {
|
||||||
|
if pr.AllowMaintainerEdit {
|
||||||
|
err = pr.LoadBaseRepo()
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
prPerm, err := GetUserRepoPermission(db.DefaultContext, pr.BaseRepo, user)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if prPerm.CanWrite(unit.TypeCode) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// ColorFormat writes a colored string for these Permissions
|
// ColorFormat writes a colored string for these Permissions
|
||||||
func (p *Permission) ColorFormat(s fmt.State) {
|
func (p *Permission) ColorFormat(s fmt.State) {
|
||||||
noColor := log.ColorBytes(log.Reset)
|
noColor := log.ColorBytes(log.Reset)
|
||||||
|
@ -160,6 +193,7 @@ func GetUserRepoPermission(ctx context.Context, repo *repo_model.Repository, use
|
||||||
perm)
|
perm)
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
// anonymous user visit private repo.
|
// anonymous user visit private repo.
|
||||||
// TODO: anonymous user visit public unit of private repo???
|
// TODO: anonymous user visit public unit of private repo???
|
||||||
if user == nil && repo.IsPrivate {
|
if user == nil && repo.IsPrivate {
|
||||||
|
|
|
@ -29,6 +29,16 @@ func RequireRepoWriter(unitType unit.Type) func(ctx *Context) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CanEnableEditor checks if the user is allowed to write to the branch of the repo
|
||||||
|
func CanEnableEditor() func(ctx *Context) {
|
||||||
|
return func(ctx *Context) {
|
||||||
|
if !ctx.Repo.Permission.CanWriteToBranch(ctx.Doer, ctx.Repo.BranchName) {
|
||||||
|
ctx.NotFound("CanWriteToBranch denies permission", nil)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// RequireRepoWriterOr returns a middleware for requiring repository write to one of the unit permission
|
// RequireRepoWriterOr returns a middleware for requiring repository write to one of the unit permission
|
||||||
func RequireRepoWriterOr(unitTypes ...unit.Type) func(ctx *Context) {
|
func RequireRepoWriterOr(unitTypes ...unit.Type) func(ctx *Context) {
|
||||||
return func(ctx *Context) {
|
return func(ctx *Context) {
|
||||||
|
|
|
@ -78,8 +78,8 @@ type Repository struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// CanEnableEditor returns true if repository is editable and user has proper access level.
|
// CanEnableEditor returns true if repository is editable and user has proper access level.
|
||||||
func (r *Repository) CanEnableEditor() bool {
|
func (r *Repository) CanEnableEditor(user *user_model.User) bool {
|
||||||
return r.Permission.CanWrite(unit_model.TypeCode) && r.Repository.CanEnableEditor() && r.IsViewBranch && !r.Repository.IsArchived
|
return r.IsViewBranch && r.Permission.CanWriteToBranch(user, r.BranchName) && r.Repository.CanEnableEditor() && !r.Repository.IsArchived
|
||||||
}
|
}
|
||||||
|
|
||||||
// CanCreateBranch returns true if repository is editable and user has proper access level.
|
// CanCreateBranch returns true if repository is editable and user has proper access level.
|
||||||
|
@ -123,7 +123,7 @@ func (r *Repository) CanCommitToBranch(ctx context.Context, doer *user_model.Use
|
||||||
|
|
||||||
sign, keyID, _, err := asymkey_service.SignCRUDAction(ctx, r.Repository.RepoPath(), doer, r.Repository.RepoPath(), git.BranchPrefix+r.BranchName)
|
sign, keyID, _, err := asymkey_service.SignCRUDAction(ctx, r.Repository.RepoPath(), doer, r.Repository.RepoPath(), git.BranchPrefix+r.BranchName)
|
||||||
|
|
||||||
canCommit := r.CanEnableEditor() && userCanPush
|
canCommit := r.CanEnableEditor(doer) && userCanPush
|
||||||
if requireSigned {
|
if requireSigned {
|
||||||
canCommit = canCommit && sign
|
canCommit = canCommit && sign
|
||||||
}
|
}
|
||||||
|
@ -139,7 +139,7 @@ func (r *Repository) CanCommitToBranch(ctx context.Context, doer *user_model.Use
|
||||||
|
|
||||||
return CanCommitToBranchResults{
|
return CanCommitToBranchResults{
|
||||||
CanCommitToBranch: canCommit,
|
CanCommitToBranch: canCommit,
|
||||||
EditorEnabled: r.CanEnableEditor(),
|
EditorEnabled: r.CanEnableEditor(doer),
|
||||||
UserCanPush: userCanPush,
|
UserCanPush: userCanPush,
|
||||||
RequireSigned: requireSigned,
|
RequireSigned: requireSigned,
|
||||||
WillSign: sign,
|
WillSign: sign,
|
||||||
|
|
|
@ -41,12 +41,19 @@ func ToEmail(email *user_model.EmailAddress) *api.Email {
|
||||||
func ToBranch(repo *repo_model.Repository, b *git.Branch, c *git.Commit, bp *models.ProtectedBranch, user *user_model.User, isRepoAdmin bool) (*api.Branch, error) {
|
func ToBranch(repo *repo_model.Repository, b *git.Branch, c *git.Commit, bp *models.ProtectedBranch, user *user_model.User, isRepoAdmin bool) (*api.Branch, error) {
|
||||||
if bp == nil {
|
if bp == nil {
|
||||||
var hasPerm bool
|
var hasPerm bool
|
||||||
|
var canPush bool
|
||||||
var err error
|
var err error
|
||||||
if user != nil {
|
if user != nil {
|
||||||
hasPerm, err = models.HasAccessUnit(user, repo, unit.TypeCode, perm.AccessModeWrite)
|
hasPerm, err = models.HasAccessUnit(user, repo, unit.TypeCode, perm.AccessModeWrite)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
perms, err := models.GetUserRepoPermission(db.DefaultContext, repo, user)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
canPush = perms.CanWriteToBranch(user, b.Name)
|
||||||
}
|
}
|
||||||
|
|
||||||
return &api.Branch{
|
return &api.Branch{
|
||||||
|
@ -56,7 +63,7 @@ func ToBranch(repo *repo_model.Repository, b *git.Branch, c *git.Commit, bp *mod
|
||||||
RequiredApprovals: 0,
|
RequiredApprovals: 0,
|
||||||
EnableStatusCheck: false,
|
EnableStatusCheck: false,
|
||||||
StatusCheckContexts: []string{},
|
StatusCheckContexts: []string{},
|
||||||
UserCanPush: hasPerm,
|
UserCanPush: canPush,
|
||||||
UserCanMerge: hasPerm,
|
UserCanMerge: hasPerm,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -73,6 +73,8 @@ func ToAPIPullRequest(ctx context.Context, pr *models.PullRequest, doer *user_mo
|
||||||
Created: pr.Issue.CreatedUnix.AsTimePtr(),
|
Created: pr.Issue.CreatedUnix.AsTimePtr(),
|
||||||
Updated: pr.Issue.UpdatedUnix.AsTimePtr(),
|
Updated: pr.Issue.UpdatedUnix.AsTimePtr(),
|
||||||
|
|
||||||
|
AllowMaintainerEdit: pr.AllowMaintainerEdit,
|
||||||
|
|
||||||
Base: &api.PRBranchInfo{
|
Base: &api.PRBranchInfo{
|
||||||
Name: pr.BaseBranch,
|
Name: pr.BaseBranch,
|
||||||
Ref: pr.BaseBranch,
|
Ref: pr.BaseBranch,
|
||||||
|
|
|
@ -34,6 +34,7 @@ type PullRequest struct {
|
||||||
Merged *time.Time `json:"merged_at"`
|
Merged *time.Time `json:"merged_at"`
|
||||||
MergedCommitID *string `json:"merge_commit_sha"`
|
MergedCommitID *string `json:"merge_commit_sha"`
|
||||||
MergedBy *User `json:"merged_by"`
|
MergedBy *User `json:"merged_by"`
|
||||||
|
AllowMaintainerEdit bool `json:"allow_maintainer_edit"`
|
||||||
|
|
||||||
Base *PRBranchInfo `json:"base"`
|
Base *PRBranchInfo `json:"base"`
|
||||||
Head *PRBranchInfo `json:"head"`
|
Head *PRBranchInfo `json:"head"`
|
||||||
|
@ -92,4 +93,5 @@ type EditPullRequestOption struct {
|
||||||
// swagger:strfmt date-time
|
// swagger:strfmt date-time
|
||||||
Deadline *time.Time `json:"due_date"`
|
Deadline *time.Time `json:"due_date"`
|
||||||
RemoveDeadline *bool `json:"unset_due_date"`
|
RemoveDeadline *bool `json:"unset_due_date"`
|
||||||
|
AllowMaintainerEdit *bool `json:"allow_maintainer_edit"`
|
||||||
}
|
}
|
||||||
|
|
|
@ -30,6 +30,11 @@ type CreateFileOptions struct {
|
||||||
Content string `json:"content"`
|
Content string `json:"content"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Branch returns branch name
|
||||||
|
func (o *CreateFileOptions) Branch() string {
|
||||||
|
return o.FileOptions.BranchName
|
||||||
|
}
|
||||||
|
|
||||||
// DeleteFileOptions options for deleting files (used for other File structs below)
|
// DeleteFileOptions options for deleting files (used for other File structs below)
|
||||||
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
||||||
type DeleteFileOptions struct {
|
type DeleteFileOptions struct {
|
||||||
|
@ -39,6 +44,11 @@ type DeleteFileOptions struct {
|
||||||
SHA string `json:"sha" binding:"Required"`
|
SHA string `json:"sha" binding:"Required"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Branch returns branch name
|
||||||
|
func (o *DeleteFileOptions) Branch() string {
|
||||||
|
return o.FileOptions.BranchName
|
||||||
|
}
|
||||||
|
|
||||||
// UpdateFileOptions options for updating files
|
// UpdateFileOptions options for updating files
|
||||||
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
||||||
type UpdateFileOptions struct {
|
type UpdateFileOptions struct {
|
||||||
|
@ -50,6 +60,16 @@ type UpdateFileOptions struct {
|
||||||
FromPath string `json:"from_path" binding:"MaxSize(500)"`
|
FromPath string `json:"from_path" binding:"MaxSize(500)"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Branch returns branch name
|
||||||
|
func (o *UpdateFileOptions) Branch() string {
|
||||||
|
return o.FileOptions.BranchName
|
||||||
|
}
|
||||||
|
|
||||||
|
// FileOptionInterface provides a unified interface for the different file options
|
||||||
|
type FileOptionInterface interface {
|
||||||
|
Branch() string
|
||||||
|
}
|
||||||
|
|
||||||
// ApplyDiffPatchFileOptions options for applying a diff patch
|
// ApplyDiffPatchFileOptions options for applying a diff patch
|
||||||
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
// Note: `author` and `committer` are optional (if only one is given, it will be used for the other, otherwise the authenticated user will be used)
|
||||||
type ApplyDiffPatchFileOptions struct {
|
type ApplyDiffPatchFileOptions struct {
|
||||||
|
|
|
@ -1488,6 +1488,9 @@ pulls.desc = Enable pull requests and code reviews.
|
||||||
pulls.new = New Pull Request
|
pulls.new = New Pull Request
|
||||||
pulls.view = View Pull Request
|
pulls.view = View Pull Request
|
||||||
pulls.compare_changes = New Pull Request
|
pulls.compare_changes = New Pull Request
|
||||||
|
pulls.allow_edits_from_maintainers = Allow edits from maintainers
|
||||||
|
pulls.allow_edits_from_maintainers_desc = Users with write access to the base branch can also push to this branch
|
||||||
|
pulls.allow_edits_from_maintainers_err = Updating failed
|
||||||
pulls.compare_changes_desc = Select the branch to merge into and the branch to pull from.
|
pulls.compare_changes_desc = Select the branch to merge into and the branch to pull from.
|
||||||
pulls.compare_base = merge into
|
pulls.compare_base = merge into
|
||||||
pulls.compare_compare = pull from
|
pulls.compare_compare = pull from
|
||||||
|
|
|
@ -283,6 +283,15 @@ func reqRepoWriter(unitTypes ...unit.Type) func(ctx *context.APIContext) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// reqRepoBranchWriter user should have a permission to write to a branch, or be a site admin
|
||||||
|
func reqRepoBranchWriter(ctx *context.APIContext) {
|
||||||
|
options, ok := web.GetForm(ctx).(api.FileOptionInterface)
|
||||||
|
if !ok || (!ctx.Repo.CanWriteToBranch(ctx.Doer, options.Branch()) && !ctx.IsUserSiteAdmin()) {
|
||||||
|
ctx.Error(http.StatusForbidden, "reqRepoBranchWriter", "user should have a permission to write to this branch")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// reqRepoReader user should have specific read permission or be a repo admin or a site admin
|
// reqRepoReader user should have specific read permission or be a repo admin or a site admin
|
||||||
func reqRepoReader(unitType unit.Type) func(ctx *context.APIContext) {
|
func reqRepoReader(unitType unit.Type) func(ctx *context.APIContext) {
|
||||||
return func(ctx *context.APIContext) {
|
return func(ctx *context.APIContext) {
|
||||||
|
@ -1021,10 +1030,10 @@ func Routes() *web.Route {
|
||||||
m.Get("", repo.GetContentsList)
|
m.Get("", repo.GetContentsList)
|
||||||
m.Get("/*", repo.GetContents)
|
m.Get("/*", repo.GetContents)
|
||||||
m.Group("/*", func() {
|
m.Group("/*", func() {
|
||||||
m.Post("", bind(api.CreateFileOptions{}), repo.CreateFile)
|
m.Post("", bind(api.CreateFileOptions{}), reqRepoBranchWriter, repo.CreateFile)
|
||||||
m.Put("", bind(api.UpdateFileOptions{}), repo.UpdateFile)
|
m.Put("", bind(api.UpdateFileOptions{}), reqRepoBranchWriter, repo.UpdateFile)
|
||||||
m.Delete("", bind(api.DeleteFileOptions{}), repo.DeleteFile)
|
m.Delete("", bind(api.DeleteFileOptions{}), reqRepoBranchWriter, repo.DeleteFile)
|
||||||
}, reqRepoWriter(unit.TypeCode), reqToken())
|
}, reqToken())
|
||||||
}, reqRepoReader(unit.TypeCode))
|
}, reqRepoReader(unit.TypeCode))
|
||||||
m.Get("/signing-key.gpg", misc.SigningKey)
|
m.Get("/signing-key.gpg", misc.SigningKey)
|
||||||
m.Group("/topics", func() {
|
m.Group("/topics", func() {
|
||||||
|
|
|
@ -173,8 +173,10 @@ func GetEditorconfig(ctx *context.APIContext) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// canWriteFiles returns true if repository is editable and user has proper access level.
|
// canWriteFiles returns true if repository is editable and user has proper access level.
|
||||||
func canWriteFiles(r *context.Repository) bool {
|
func canWriteFiles(ctx *context.APIContext, branch string) bool {
|
||||||
return r.Permission.CanWrite(unit.TypeCode) && !r.Repository.IsMirror && !r.Repository.IsArchived
|
return ctx.Repo.Permission.CanWriteToBranch(ctx.Doer, branch) &&
|
||||||
|
!ctx.Repo.Repository.IsMirror &&
|
||||||
|
!ctx.Repo.Repository.IsArchived
|
||||||
}
|
}
|
||||||
|
|
||||||
// canReadFiles returns true if repository is readable and user has proper access level.
|
// canReadFiles returns true if repository is readable and user has proper access level.
|
||||||
|
@ -376,7 +378,7 @@ func handleCreateOrUpdateFileError(ctx *context.APIContext, err error) {
|
||||||
|
|
||||||
// Called from both CreateFile or UpdateFile to handle both
|
// Called from both CreateFile or UpdateFile to handle both
|
||||||
func createOrUpdateFile(ctx *context.APIContext, opts *files_service.UpdateRepoFileOptions) (*api.FileResponse, error) {
|
func createOrUpdateFile(ctx *context.APIContext, opts *files_service.UpdateRepoFileOptions) (*api.FileResponse, error) {
|
||||||
if !canWriteFiles(ctx.Repo) {
|
if !canWriteFiles(ctx, opts.OldBranch) {
|
||||||
return nil, models.ErrUserDoesNotHaveAccessToRepo{
|
return nil, models.ErrUserDoesNotHaveAccessToRepo{
|
||||||
UserID: ctx.Doer.ID,
|
UserID: ctx.Doer.ID,
|
||||||
RepoName: ctx.Repo.Repository.LowerName,
|
RepoName: ctx.Repo.Repository.LowerName,
|
||||||
|
@ -433,7 +435,7 @@ func DeleteFile(ctx *context.APIContext) {
|
||||||
// "$ref": "#/responses/error"
|
// "$ref": "#/responses/error"
|
||||||
|
|
||||||
apiOpts := web.GetForm(ctx).(*api.DeleteFileOptions)
|
apiOpts := web.GetForm(ctx).(*api.DeleteFileOptions)
|
||||||
if !canWriteFiles(ctx.Repo) {
|
if !canWriteFiles(ctx, apiOpts.BranchName) {
|
||||||
ctx.Error(http.StatusForbidden, "DeleteFile", models.ErrUserDoesNotHaveAccessToRepo{
|
ctx.Error(http.StatusForbidden, "DeleteFile", models.ErrUserDoesNotHaveAccessToRepo{
|
||||||
UserID: ctx.Doer.ID,
|
UserID: ctx.Doer.ID,
|
||||||
RepoName: ctx.Repo.Repository.LowerName,
|
RepoName: ctx.Repo.Repository.LowerName,
|
||||||
|
|
|
@ -77,7 +77,7 @@ func ApplyDiffPatch(ctx *context.APIContext) {
|
||||||
opts.Message = "apply-patch"
|
opts.Message = "apply-patch"
|
||||||
}
|
}
|
||||||
|
|
||||||
if !canWriteFiles(ctx.Repo) {
|
if !canWriteFiles(ctx, apiOpts.BranchName) {
|
||||||
ctx.Error(http.StatusInternalServerError, "ApplyPatch", models.ErrUserDoesNotHaveAccessToRepo{
|
ctx.Error(http.StatusInternalServerError, "ApplyPatch", models.ErrUserDoesNotHaveAccessToRepo{
|
||||||
UserID: ctx.Doer.ID,
|
UserID: ctx.Doer.ID,
|
||||||
RepoName: ctx.Repo.Repository.LowerName,
|
RepoName: ctx.Repo.Repository.LowerName,
|
||||||
|
|
|
@ -616,6 +616,18 @@ func EditPullRequest(ctx *context.APIContext) {
|
||||||
notification.NotifyPullRequestChangeTargetBranch(ctx.Doer, pr, form.Base)
|
notification.NotifyPullRequestChangeTargetBranch(ctx.Doer, pr, form.Base)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// update allow edits
|
||||||
|
if form.AllowMaintainerEdit != nil {
|
||||||
|
if err := pull_service.SetAllowEdits(ctx, ctx.Doer, pr, *form.AllowMaintainerEdit); err != nil {
|
||||||
|
if errors.Is(pull_service.ErrUserHasNoPermissionForAction, err) {
|
||||||
|
ctx.Error(http.StatusForbidden, "SetAllowEdits", fmt.Sprintf("SetAllowEdits: %s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ctx.ServerError("SetAllowEdits", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Refetch from database
|
// Refetch from database
|
||||||
pr, err = models.GetPullRequestByIndex(ctx.Repo.Repository.ID, pr.Index)
|
pr, err = models.GetPullRequestByIndex(ctx.Repo.Repository.ID, pr.Index)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -45,6 +45,8 @@ type preReceiveContext struct {
|
||||||
env []string
|
env []string
|
||||||
|
|
||||||
opts *private.HookOptions
|
opts *private.HookOptions
|
||||||
|
|
||||||
|
branchName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// CanWriteCode returns true if pusher can write code
|
// CanWriteCode returns true if pusher can write code
|
||||||
|
@ -53,7 +55,7 @@ func (ctx *preReceiveContext) CanWriteCode() bool {
|
||||||
if !ctx.loadPusherAndPermission() {
|
if !ctx.loadPusherAndPermission() {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
ctx.canWriteCode = ctx.userPerm.CanWrite(unit.TypeCode) || ctx.deployKeyAccessMode >= perm_model.AccessModeWrite
|
ctx.canWriteCode = ctx.userPerm.CanWriteToBranch(ctx.user, ctx.branchName) || ctx.deployKeyAccessMode >= perm_model.AccessModeWrite
|
||||||
ctx.checkedCanWriteCode = true
|
ctx.checkedCanWriteCode = true
|
||||||
}
|
}
|
||||||
return ctx.canWriteCode
|
return ctx.canWriteCode
|
||||||
|
@ -134,13 +136,15 @@ func HookPreReceive(ctx *gitea_context.PrivateContext) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func preReceiveBranch(ctx *preReceiveContext, oldCommitID, newCommitID, refFullName string) {
|
func preReceiveBranch(ctx *preReceiveContext, oldCommitID, newCommitID, refFullName string) {
|
||||||
|
branchName := strings.TrimPrefix(refFullName, git.BranchPrefix)
|
||||||
|
ctx.branchName = branchName
|
||||||
|
|
||||||
if !ctx.AssertCanWriteCode() {
|
if !ctx.AssertCanWriteCode() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
repo := ctx.Repo.Repository
|
repo := ctx.Repo.Repository
|
||||||
gitRepo := ctx.Repo.GitRepo
|
gitRepo := ctx.Repo.GitRepo
|
||||||
branchName := strings.TrimPrefix(refFullName, git.BranchPrefix)
|
|
||||||
|
|
||||||
if branchName == repo.DefaultBranch && newCommitID == git.EmptySHA {
|
if branchName == repo.DefaultBranch && newCommitID == git.EmptySHA {
|
||||||
log.Warn("Forbidden: Branch: %s is the default branch in %-v and cannot be deleted", branchName, repo)
|
log.Warn("Forbidden: Branch: %s is the default branch in %-v and cannot be deleted", branchName, repo)
|
||||||
|
|
|
@ -398,6 +398,7 @@ func ParseCompareInfo(ctx *context.Context) *CompareInfo {
|
||||||
}
|
}
|
||||||
|
|
||||||
ctx.Data["HeadRepo"] = ci.HeadRepo
|
ctx.Data["HeadRepo"] = ci.HeadRepo
|
||||||
|
ctx.Data["BaseCompareRepo"] = ctx.Repo.Repository
|
||||||
|
|
||||||
// Now we need to assert that the ctx.Doer has permission to read
|
// Now we need to assert that the ctx.Doer has permission to read
|
||||||
// the baseRepo's code and pulls
|
// the baseRepo's code and pulls
|
||||||
|
@ -436,6 +437,7 @@ func ParseCompareInfo(ctx *context.Context) *CompareInfo {
|
||||||
ctx.NotFound("ParseCompareInfo", nil)
|
ctx.NotFound("ParseCompareInfo", nil)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
ctx.Data["CanWriteToHeadRepo"] = permHead.CanWrite(unit.TypeCode)
|
||||||
}
|
}
|
||||||
|
|
||||||
// If we have a rootRepo and it's different from:
|
// If we have a rootRepo and it's different from:
|
||||||
|
|
|
@ -1529,7 +1529,7 @@ func ViewIssue(ctx *context.Context) {
|
||||||
if ctx.IsSigned {
|
if ctx.IsSigned {
|
||||||
if err := pull.LoadHeadRepoCtx(ctx); err != nil {
|
if err := pull.LoadHeadRepoCtx(ctx); err != nil {
|
||||||
log.Error("LoadHeadRepo: %v", err)
|
log.Error("LoadHeadRepo: %v", err)
|
||||||
} else if pull.HeadRepo != nil && pull.HeadBranch != pull.HeadRepo.DefaultBranch {
|
} else if pull.HeadRepo != nil {
|
||||||
perm, err := models.GetUserRepoPermission(ctx, pull.HeadRepo, ctx.Doer)
|
perm, err := models.GetUserRepoPermission(ctx, pull.HeadRepo, ctx.Doer)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ctx.ServerError("GetUserRepoPermission", err)
|
ctx.ServerError("GetUserRepoPermission", err)
|
||||||
|
@ -1537,6 +1537,7 @@ func ViewIssue(ctx *context.Context) {
|
||||||
}
|
}
|
||||||
if perm.CanWrite(unit.TypeCode) {
|
if perm.CanWrite(unit.TypeCode) {
|
||||||
// Check if branch is not protected
|
// Check if branch is not protected
|
||||||
|
if pull.HeadBranch != pull.HeadRepo.DefaultBranch {
|
||||||
if protected, err := models.IsProtectedBranch(pull.HeadRepo.ID, pull.HeadBranch); err != nil {
|
if protected, err := models.IsProtectedBranch(pull.HeadRepo.ID, pull.HeadBranch); err != nil {
|
||||||
log.Error("IsProtectedBranch: %v", err)
|
log.Error("IsProtectedBranch: %v", err)
|
||||||
} else if !protected {
|
} else if !protected {
|
||||||
|
@ -1544,6 +1545,8 @@ func ViewIssue(ctx *context.Context) {
|
||||||
ctx.Data["DeleteBranchLink"] = issue.Link() + "/cleanup"
|
ctx.Data["DeleteBranchLink"] = issue.Link() + "/cleanup"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
ctx.Data["CanWriteToHeadRepo"] = true
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := pull.LoadBaseRepoCtx(ctx); err != nil {
|
if err := pull.LoadBaseRepoCtx(ctx); err != nil {
|
||||||
|
|
|
@ -1140,6 +1140,7 @@ func CompareAndPullRequestPost(ctx *context.Context) {
|
||||||
BaseRepo: repo,
|
BaseRepo: repo,
|
||||||
MergeBase: ci.CompareInfo.MergeBase,
|
MergeBase: ci.CompareInfo.MergeBase,
|
||||||
Type: models.PullRequestGitea,
|
Type: models.PullRequestGitea,
|
||||||
|
AllowMaintainerEdit: form.AllowMaintainerEdit,
|
||||||
}
|
}
|
||||||
// FIXME: check error in the case two people send pull request at almost same time, give nice error prompt
|
// FIXME: check error in the case two people send pull request at almost same time, give nice error prompt
|
||||||
// instead of 500.
|
// instead of 500.
|
||||||
|
@ -1411,3 +1412,31 @@ func UpdatePullRequestTarget(ctx *context.Context) {
|
||||||
"base_branch": pr.BaseBranch,
|
"base_branch": pr.BaseBranch,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SetAllowEdits allow edits from maintainers to PRs
|
||||||
|
func SetAllowEdits(ctx *context.Context) {
|
||||||
|
form := web.GetForm(ctx).(*forms.UpdateAllowEditsForm)
|
||||||
|
|
||||||
|
pr, err := models.GetPullRequestByIndex(ctx.Repo.Repository.ID, ctx.ParamsInt64(":index"))
|
||||||
|
if err != nil {
|
||||||
|
if models.IsErrPullRequestNotExist(err) {
|
||||||
|
ctx.NotFound("GetPullRequestByIndex", err)
|
||||||
|
} else {
|
||||||
|
ctx.ServerError("GetPullRequestByIndex", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := pull_service.SetAllowEdits(ctx, ctx.Doer, pr, form.AllowMaintainerEdit); err != nil {
|
||||||
|
if errors.Is(pull_service.ErrUserHasNoPermissionForAction, err) {
|
||||||
|
ctx.Error(http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ctx.ServerError("SetAllowEdits", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
||||||
|
"allow_maintainer_edit": pr.AllowMaintainerEdit,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
|
@ -579,7 +579,7 @@ func renderFile(ctx *context.Context, entry *git.TreeEntry, treeLink, rawLink st
|
||||||
ctx.Data["LineEscapeStatus"] = statuses
|
ctx.Data["LineEscapeStatus"] = statuses
|
||||||
}
|
}
|
||||||
if !isLFSFile {
|
if !isLFSFile {
|
||||||
if ctx.Repo.CanEnableEditor() {
|
if ctx.Repo.CanEnableEditor(ctx.Doer) {
|
||||||
if lfsLock != nil && lfsLock.OwnerID != ctx.Doer.ID {
|
if lfsLock != nil && lfsLock.OwnerID != ctx.Doer.ID {
|
||||||
ctx.Data["CanEditFile"] = false
|
ctx.Data["CanEditFile"] = false
|
||||||
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.this_file_locked")
|
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.this_file_locked")
|
||||||
|
@ -589,7 +589,7 @@ func renderFile(ctx *context.Context, entry *git.TreeEntry, treeLink, rawLink st
|
||||||
}
|
}
|
||||||
} else if !ctx.Repo.IsViewBranch {
|
} else if !ctx.Repo.IsViewBranch {
|
||||||
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.must_be_on_a_branch")
|
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.must_be_on_a_branch")
|
||||||
} else if !ctx.Repo.CanWrite(unit_model.TypeCode) {
|
} else if !ctx.Repo.CanWriteToBranch(ctx.Doer, ctx.Repo.BranchName) {
|
||||||
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.fork_before_edit")
|
ctx.Data["EditFileTooltip"] = ctx.Tr("repo.editor.fork_before_edit")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -629,7 +629,7 @@ func renderFile(ctx *context.Context, entry *git.TreeEntry, treeLink, rawLink st
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if ctx.Repo.CanEnableEditor() {
|
if ctx.Repo.CanEnableEditor(ctx.Doer) {
|
||||||
if lfsLock != nil && lfsLock.OwnerID != ctx.Doer.ID {
|
if lfsLock != nil && lfsLock.OwnerID != ctx.Doer.ID {
|
||||||
ctx.Data["CanDeleteFile"] = false
|
ctx.Data["CanDeleteFile"] = false
|
||||||
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.this_file_locked")
|
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.this_file_locked")
|
||||||
|
@ -639,7 +639,7 @@ func renderFile(ctx *context.Context, entry *git.TreeEntry, treeLink, rawLink st
|
||||||
}
|
}
|
||||||
} else if !ctx.Repo.IsViewBranch {
|
} else if !ctx.Repo.IsViewBranch {
|
||||||
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.must_be_on_a_branch")
|
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.must_be_on_a_branch")
|
||||||
} else if !ctx.Repo.CanWrite(unit_model.TypeCode) {
|
} else if !ctx.Repo.CanWriteToBranch(ctx.Doer, ctx.Repo.BranchName) {
|
||||||
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.must_have_write_access")
|
ctx.Data["DeleteFileTooltip"] = ctx.Tr("repo.editor.must_have_write_access")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -574,6 +574,7 @@ func RegisterRoutes(m *web.Route) {
|
||||||
|
|
||||||
reqRepoAdmin := context.RequireRepoAdmin()
|
reqRepoAdmin := context.RequireRepoAdmin()
|
||||||
reqRepoCodeWriter := context.RequireRepoWriter(unit.TypeCode)
|
reqRepoCodeWriter := context.RequireRepoWriter(unit.TypeCode)
|
||||||
|
canEnableEditor := context.CanEnableEditor()
|
||||||
reqRepoCodeReader := context.RequireRepoReader(unit.TypeCode)
|
reqRepoCodeReader := context.RequireRepoReader(unit.TypeCode)
|
||||||
reqRepoReleaseWriter := context.RequireRepoWriter(unit.TypeReleases)
|
reqRepoReleaseWriter := context.RequireRepoWriter(unit.TypeReleases)
|
||||||
reqRepoReleaseReader := context.RequireRepoReader(unit.TypeReleases)
|
reqRepoReleaseReader := context.RequireRepoReader(unit.TypeReleases)
|
||||||
|
@ -925,12 +926,12 @@ func RegisterRoutes(m *web.Route) {
|
||||||
Post(bindIgnErr(forms.EditRepoFileForm{}), repo.NewDiffPatchPost)
|
Post(bindIgnErr(forms.EditRepoFileForm{}), repo.NewDiffPatchPost)
|
||||||
m.Combo("/_cherrypick/{sha:([a-f0-9]{7,40})}/*").Get(repo.CherryPick).
|
m.Combo("/_cherrypick/{sha:([a-f0-9]{7,40})}/*").Get(repo.CherryPick).
|
||||||
Post(bindIgnErr(forms.CherryPickForm{}), repo.CherryPickPost)
|
Post(bindIgnErr(forms.CherryPickForm{}), repo.CherryPickPost)
|
||||||
}, context.RepoRefByType(context.RepoRefBranch), repo.MustBeEditable)
|
}, repo.MustBeEditable)
|
||||||
m.Group("", func() {
|
m.Group("", func() {
|
||||||
m.Post("/upload-file", repo.UploadFileToServer)
|
m.Post("/upload-file", repo.UploadFileToServer)
|
||||||
m.Post("/upload-remove", bindIgnErr(forms.RemoveUploadFileForm{}), repo.RemoveUploadFileFromServer)
|
m.Post("/upload-remove", bindIgnErr(forms.RemoveUploadFileForm{}), repo.RemoveUploadFileFromServer)
|
||||||
}, context.RepoRef(), repo.MustBeEditable, repo.MustBeAbleToUpload)
|
}, repo.MustBeEditable, repo.MustBeAbleToUpload)
|
||||||
}, context.RepoMustNotBeArchived(), reqRepoCodeWriter, repo.MustBeNotEmpty)
|
}, context.RepoRef(), canEnableEditor, context.RepoMustNotBeArchived(), repo.MustBeNotEmpty)
|
||||||
|
|
||||||
m.Group("/branches", func() {
|
m.Group("/branches", func() {
|
||||||
m.Group("/_new", func() {
|
m.Group("/_new", func() {
|
||||||
|
@ -1105,6 +1106,7 @@ func RegisterRoutes(m *web.Route) {
|
||||||
m.Get("/commits", context.RepoRef(), repo.ViewPullCommits)
|
m.Get("/commits", context.RepoRef(), repo.ViewPullCommits)
|
||||||
m.Post("/merge", context.RepoMustNotBeArchived(), bindIgnErr(forms.MergePullRequestForm{}), repo.MergePullRequest)
|
m.Post("/merge", context.RepoMustNotBeArchived(), bindIgnErr(forms.MergePullRequestForm{}), repo.MergePullRequest)
|
||||||
m.Post("/update", repo.UpdatePullRequest)
|
m.Post("/update", repo.UpdatePullRequest)
|
||||||
|
m.Post("/set_allow_maintainer_edit", bindIgnErr(forms.UpdateAllowEditsForm{}), repo.SetAllowEdits)
|
||||||
m.Post("/cleanup", context.RepoMustNotBeArchived(), context.RepoRef(), repo.CleanUpPullRequest)
|
m.Post("/cleanup", context.RepoMustNotBeArchived(), context.RepoRef(), repo.CleanUpPullRequest)
|
||||||
m.Group("/files", func() {
|
m.Group("/files", func() {
|
||||||
m.Get("", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.ViewPullFiles)
|
m.Get("", context.RepoRef(), repo.SetEditorconfigIfExists, repo.SetDiffViewStyle, repo.SetWhitespaceBehavior, repo.ViewPullFiles)
|
||||||
|
|
|
@ -431,6 +431,7 @@ type CreateIssueForm struct {
|
||||||
AssigneeID int64
|
AssigneeID int64
|
||||||
Content string
|
Content string
|
||||||
Files []string
|
Files []string
|
||||||
|
AllowMaintainerEdit bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate validates the fields
|
// Validate validates the fields
|
||||||
|
@ -684,6 +685,11 @@ type DismissReviewForm struct {
|
||||||
Message string
|
Message string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UpdateAllowEditsForm form for changing if PR allows edits from maintainers
|
||||||
|
type UpdateAllowEditsForm struct {
|
||||||
|
AllowMaintainerEdit bool
|
||||||
|
}
|
||||||
|
|
||||||
// __________ .__
|
// __________ .__
|
||||||
// \______ \ ____ | | ____ _____ ______ ____
|
// \______ \ ____ | | ____ _____ ______ ____
|
||||||
// | _// __ \| | _/ __ \\__ \ / ___// __ \
|
// | _// __ \| | _/ __ \\__ \ / ___// __ \
|
||||||
|
|
40
services/pull/edits.go
Normal file
40
services/pull/edits.go
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
// Copyright 2022 The Gitea Authors.
|
||||||
|
// All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package pull
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/models"
|
||||||
|
unit_model "code.gitea.io/gitea/models/unit"
|
||||||
|
user_model "code.gitea.io/gitea/models/user"
|
||||||
|
)
|
||||||
|
|
||||||
|
var ErrUserHasNoPermissionForAction = errors.New("user not allowed to do this action")
|
||||||
|
|
||||||
|
// SetAllowEdits allow edits from maintainers to PRs
|
||||||
|
func SetAllowEdits(ctx context.Context, doer *user_model.User, pr *models.PullRequest, allow bool) error {
|
||||||
|
if doer == nil || !pr.Issue.IsPoster(doer.ID) {
|
||||||
|
return ErrUserHasNoPermissionForAction
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := pr.LoadHeadRepo(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
permission, err := models.GetUserRepoPermission(ctx, pr.HeadRepo, doer)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !permission.CanWrite(unit_model.TypeCode) {
|
||||||
|
return ErrUserHasNoPermissionForAction
|
||||||
|
}
|
||||||
|
|
||||||
|
pr.AllowMaintainerEdit = allow
|
||||||
|
return models.UpdateAllowEdits(ctx, pr)
|
||||||
|
}
|
|
@ -111,11 +111,25 @@ func IsUserAllowedToUpdate(ctx context.Context, pull *models.PullRequest, user *
|
||||||
return false, false, nil
|
return false, false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
baseRepoPerm, err := models.GetUserRepoPermission(ctx, pull.BaseRepo, user)
|
||||||
|
if err != nil {
|
||||||
|
return false, false, err
|
||||||
|
}
|
||||||
|
|
||||||
mergeAllowed, err = IsUserAllowedToMerge(pr, headRepoPerm, user)
|
mergeAllowed, err = IsUserAllowedToMerge(pr, headRepoPerm, user)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, false, err
|
return false, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if pull.AllowMaintainerEdit {
|
||||||
|
mergeAllowedMaintainer, err := IsUserAllowedToMerge(pr, baseRepoPerm, user)
|
||||||
|
if err != nil {
|
||||||
|
return false, false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
mergeAllowed = mergeAllowed || mergeAllowedMaintainer
|
||||||
|
}
|
||||||
|
|
||||||
return mergeAllowed, rebaseAllowed, nil
|
return mergeAllowed, rebaseAllowed, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -235,6 +235,15 @@
|
||||||
</a>
|
</a>
|
||||||
{{end}}
|
{{end}}
|
||||||
</div>
|
</div>
|
||||||
|
{{if and .PageIsComparePull (not (eq .HeadRepo.FullName .BaseCompareRepo.FullName)) .CanWriteToHeadRepo}}
|
||||||
|
<div class="ui divider"></div>
|
||||||
|
<div class="inline field">
|
||||||
|
<div class="ui checkbox">
|
||||||
|
<label class="tooltip" data-content="{{.i18n.Tr "repo.pulls.allow_edits_from_maintainers_desc"}}"><strong>{{.i18n.Tr "repo.pulls.allow_edits_from_maintainers"}}</strong></label>
|
||||||
|
<input name="allow_maintainer_edit" type="checkbox">
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{{end}}
|
||||||
</div>
|
</div>
|
||||||
<input type="hidden" name="redirect_after_creation" value="{{.redirect_after_creation}}">
|
<input type="hidden" name="redirect_after_creation" value="{{.redirect_after_creation}}">
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -667,5 +667,21 @@
|
||||||
</form>
|
</form>
|
||||||
</div>
|
</div>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
|
{{if and .Issue.IsPull .IsIssuePoster (not .Issue.IsClosed)}}
|
||||||
|
{{if and (not (eq .Issue.PullRequest.HeadRepo.FullName .Issue.PullRequest.BaseRepo.FullName)) .CanWriteToHeadRepo}}
|
||||||
|
<div class="ui divider"></div>
|
||||||
|
<div class="inline field">
|
||||||
|
<div class="ui checkbox" id="allow-edits-from-maintainers"
|
||||||
|
data-url="{{.Issue.Link}}"
|
||||||
|
data-prompt-tip="{{.i18n.Tr "repo.pulls.allow_edits_from_maintainers_desc"}}"
|
||||||
|
data-prompt-error="{{.i18n.Tr "repo.pulls.allow_edits_from_maintainers_err"}}"
|
||||||
|
>
|
||||||
|
<label><strong>{{.i18n.Tr "repo.pulls.allow_edits_from_maintainers"}}</strong></label>
|
||||||
|
<input type="checkbox" {{if .Issue.PullRequest.AllowMaintainerEdit}}checked{{end}}>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -14938,6 +14938,10 @@
|
||||||
"description": "EditPullRequestOption options when modify pull request",
|
"description": "EditPullRequestOption options when modify pull request",
|
||||||
"type": "object",
|
"type": "object",
|
||||||
"properties": {
|
"properties": {
|
||||||
|
"allow_maintainer_edit": {
|
||||||
|
"type": "boolean",
|
||||||
|
"x-go-name": "AllowMaintainerEdit"
|
||||||
|
},
|
||||||
"assignee": {
|
"assignee": {
|
||||||
"type": "string",
|
"type": "string",
|
||||||
"x-go-name": "Assignee"
|
"x-go-name": "Assignee"
|
||||||
|
@ -17045,6 +17049,10 @@
|
||||||
"description": "PullRequest represents a pull request",
|
"description": "PullRequest represents a pull request",
|
||||||
"type": "object",
|
"type": "object",
|
||||||
"properties": {
|
"properties": {
|
||||||
|
"allow_maintainer_edit": {
|
||||||
|
"type": "boolean",
|
||||||
|
"x-go-name": "AllowMaintainerEdit"
|
||||||
|
},
|
||||||
"assignee": {
|
"assignee": {
|
||||||
"$ref": "#/definitions/User"
|
"$ref": "#/definitions/User"
|
||||||
},
|
},
|
||||||
|
|
|
@ -288,6 +288,39 @@ export function initRepoPullRequestMergeInstruction() {
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export function initRepoPullRequestAllowMaintainerEdit() {
|
||||||
|
const $checkbox = $('#allow-edits-from-maintainers');
|
||||||
|
if (!$checkbox.length) return;
|
||||||
|
|
||||||
|
const promptTip = $checkbox.attr('data-prompt-tip');
|
||||||
|
const promptError = $checkbox.attr('data-prompt-error');
|
||||||
|
$checkbox.popup({content: promptTip});
|
||||||
|
$checkbox.checkbox({
|
||||||
|
'onChange': () => {
|
||||||
|
const checked = $checkbox.checkbox('is checked');
|
||||||
|
let url = $checkbox.attr('data-url');
|
||||||
|
url += '/set_allow_maintainer_edit';
|
||||||
|
$checkbox.checkbox('set disabled');
|
||||||
|
$.ajax({url, type: 'POST',
|
||||||
|
data: {_csrf: csrfToken, allow_maintainer_edit: checked},
|
||||||
|
error: () => {
|
||||||
|
$checkbox.popup({
|
||||||
|
content: promptError,
|
||||||
|
onHidden: () => {
|
||||||
|
// the error popup should be shown only once, then we restore the popup to the default message
|
||||||
|
$checkbox.popup({content: promptTip});
|
||||||
|
},
|
||||||
|
});
|
||||||
|
$checkbox.popup('show');
|
||||||
|
},
|
||||||
|
complete: () => {
|
||||||
|
$checkbox.checkbox('set enabled');
|
||||||
|
},
|
||||||
|
});
|
||||||
|
},
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
export function initRepoIssueReferenceRepositorySearch() {
|
export function initRepoIssueReferenceRepositorySearch() {
|
||||||
$('.issue_reference_repository_search')
|
$('.issue_reference_repository_search')
|
||||||
.dropdown({
|
.dropdown({
|
||||||
|
|
|
@ -36,6 +36,7 @@ import {
|
||||||
initRepoIssueTimeTracking,
|
initRepoIssueTimeTracking,
|
||||||
initRepoIssueWipTitle,
|
initRepoIssueWipTitle,
|
||||||
initRepoPullRequestMergeInstruction,
|
initRepoPullRequestMergeInstruction,
|
||||||
|
initRepoPullRequestAllowMaintainerEdit,
|
||||||
initRepoPullRequestReview,
|
initRepoPullRequestReview,
|
||||||
} from './features/repo-issue.js';
|
} from './features/repo-issue.js';
|
||||||
import {
|
import {
|
||||||
|
@ -158,6 +159,7 @@ $(document).ready(() => {
|
||||||
initRepoMigrationStatusChecker();
|
initRepoMigrationStatusChecker();
|
||||||
initRepoProject();
|
initRepoProject();
|
||||||
initRepoPullRequestMergeInstruction();
|
initRepoPullRequestMergeInstruction();
|
||||||
|
initRepoPullRequestAllowMaintainerEdit();
|
||||||
initRepoPullRequestReview();
|
initRepoPullRequestReview();
|
||||||
initRepoRelease();
|
initRepoRelease();
|
||||||
initRepoReleaseEditor();
|
initRepoReleaseEditor();
|
||||||
|
|
Reference in a new issue