Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
c595b418
Commit
c595b418
authored
Dec 29, 2016
by
Dmitriy Zaporozhets
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'dz-nested-group-access' into 'master'
Inherit permissions from parent group See merge request !8071
parents
7d0e63fa
9f39953e
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
93 additions
and
6 deletions
+93
-6
app/models/group.rb
app/models/group.rb
+14
-4
app/policies/group_policy.rb
app/policies/group_policy.rb
+1
-1
app/policies/project_policy.rb
app/policies/project_policy.rb
+1
-1
spec/models/group_spec.rb
spec/models/group_spec.rb
+11
-0
spec/policies/group_policy_spec.rb
spec/policies/group_policy_spec.rb
+66
-0
No files found.
app/models/group.rb
View file @
c595b418
...
@@ -161,15 +161,17 @@ class Group < Namespace
...
@@ -161,15 +161,17 @@ class Group < Namespace
end
end
def
has_owner?
(
user
)
def
has_owner?
(
user
)
owners
.
include?
(
user
)
members_with_parents
.
owners
.
where
(
user_id:
user
).
any?
end
end
def
has_master?
(
user
)
def
has_master?
(
user
)
members
.
masters
.
where
(
user_id:
user
).
any?
members
_with_parents
.
masters
.
where
(
user_id:
user
).
any?
end
end
# Check if user is a last owner of the group.
# Parent owners are ignored for nested groups.
def
last_owner?
(
user
)
def
last_owner?
(
user
)
has_owner
?
(
user
)
&&
owners
.
size
==
1
owners
.
include
?
(
user
)
&&
owners
.
size
==
1
end
end
def
avatar_type
def
avatar_type
...
@@ -195,6 +197,14 @@ class Group < Namespace
...
@@ -195,6 +197,14 @@ class Group < Namespace
end
end
def
refresh_members_authorized_projects
def
refresh_members_authorized_projects
UserProjectAccessChangedService
.
new
(
users
.
pluck
(
:id
)).
execute
UserProjectAccessChangedService
.
new
(
users_with_parents
.
pluck
(
:id
)).
execute
end
def
members_with_parents
GroupMember
.
where
(
requested_at:
nil
,
source_id:
parents
.
map
(
&
:id
).
push
(
id
))
end
def
users_with_parents
User
.
where
(
id:
members_with_parents
.
select
(
:user_id
))
end
end
end
end
app/policies/group_policy.rb
View file @
c595b418
...
@@ -4,7 +4,7 @@ class GroupPolicy < BasePolicy
...
@@ -4,7 +4,7 @@ class GroupPolicy < BasePolicy
return
unless
@user
return
unless
@user
globally_viewable
=
@subject
.
public?
||
(
@subject
.
internal?
&&
!
@user
.
external?
)
globally_viewable
=
@subject
.
public?
||
(
@subject
.
internal?
&&
!
@user
.
external?
)
member
=
@subject
.
users
.
include?
(
@user
)
member
=
@subject
.
users
_with_parents
.
include?
(
@user
)
owner
=
@user
.
admin?
||
@subject
.
has_owner?
(
@user
)
owner
=
@user
.
admin?
||
@subject
.
has_owner?
(
@user
)
master
=
owner
||
@subject
.
has_master?
(
@user
)
master
=
owner
||
@subject
.
has_master?
(
@user
)
...
...
app/policies/project_policy.rb
View file @
c595b418
...
@@ -245,7 +245,7 @@ class ProjectPolicy < BasePolicy
...
@@ -245,7 +245,7 @@ class ProjectPolicy < BasePolicy
def
project_group_member?
(
user
)
def
project_group_member?
(
user
)
project
.
group
&&
project
.
group
&&
(
(
project
.
group
.
members
.
exists?
(
user_id:
user
.
id
)
||
project
.
group
.
members
_with_parents
.
exists?
(
user_id:
user
.
id
)
||
project
.
group
.
requesters
.
exists?
(
user_id:
user
.
id
)
project
.
group
.
requesters
.
exists?
(
user_id:
user
.
id
)
)
)
end
end
...
...
spec/models/group_spec.rb
View file @
c595b418
...
@@ -277,4 +277,15 @@ describe Group, models: true do
...
@@ -277,4 +277,15 @@ describe Group, models: true do
it
{
is_expected
.
to
be_valid
}
it
{
is_expected
.
to
be_valid
}
it
{
expect
(
subject
.
parent
).
to
be_kind_of
(
Group
)
}
it
{
expect
(
subject
.
parent
).
to
be_kind_of
(
Group
)
}
end
end
describe
'#members_with_parents'
do
let!
(
:group
)
{
create
(
:group
,
:nested
)
}
let!
(
:master
)
{
group
.
parent
.
add_user
(
create
(
:user
),
GroupMember
::
MASTER
)
}
let!
(
:developer
)
{
group
.
add_user
(
create
(
:user
),
GroupMember
::
DEVELOPER
)
}
it
'returns parents members'
do
expect
(
group
.
members_with_parents
).
to
include
(
developer
)
expect
(
group
.
members_with_parents
).
to
include
(
master
)
end
end
end
end
spec/policies/group_policy_spec.rb
View file @
c595b418
...
@@ -105,4 +105,70 @@ describe GroupPolicy, models: true do
...
@@ -105,4 +105,70 @@ describe GroupPolicy, models: true do
is_expected
.
to
include
(
*
owner_permissions
)
is_expected
.
to
include
(
*
owner_permissions
)
end
end
end
end
describe
'private nested group inherit permissions'
do
let
(
:nested_group
)
{
create
(
:group
,
:private
,
parent:
group
)
}
subject
{
described_class
.
abilities
(
current_user
,
nested_group
).
to_set
}
context
'with no user'
do
let
(
:current_user
)
{
nil
}
it
do
is_expected
.
not_to
include
(
:read_group
)
is_expected
.
not_to
include
(
*
master_permissions
)
is_expected
.
not_to
include
(
*
owner_permissions
)
end
end
context
'guests'
do
let
(
:current_user
)
{
guest
}
it
do
is_expected
.
to
include
(
:read_group
)
is_expected
.
not_to
include
(
*
master_permissions
)
is_expected
.
not_to
include
(
*
owner_permissions
)
end
end
context
'reporter'
do
let
(
:current_user
)
{
reporter
}
it
do
is_expected
.
to
include
(
:read_group
)
is_expected
.
not_to
include
(
*
master_permissions
)
is_expected
.
not_to
include
(
*
owner_permissions
)
end
end
context
'developer'
do
let
(
:current_user
)
{
developer
}
it
do
is_expected
.
to
include
(
:read_group
)
is_expected
.
not_to
include
(
*
master_permissions
)
is_expected
.
not_to
include
(
*
owner_permissions
)
end
end
context
'master'
do
let
(
:current_user
)
{
master
}
it
do
is_expected
.
to
include
(
:read_group
)
is_expected
.
to
include
(
*
master_permissions
)
is_expected
.
not_to
include
(
*
owner_permissions
)
end
end
context
'owner'
do
let
(
:current_user
)
{
owner
}
it
do
is_expected
.
to
include
(
:read_group
)
is_expected
.
to
include
(
*
master_permissions
)
is_expected
.
to
include
(
*
owner_permissions
)
end
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment