Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Store read access in access for team repositories #20275

Merged
merged 6 commits into from
Jul 11, 2022

Conversation

Gusted
Copy link
Contributor

@Gusted Gusted commented Jul 6, 2022

  • Currently when a Team has read access to a organization's non-private repository, their access(in the access table) won't be stored in the database. This cause issues for code that rely on read access being stored, like retrieving all users who have read permission to that repository(even though this is confusing as this doesn't include all registered users). So from now-on if we see that the repository is owned by a organization don't increase the minMode to write permission.
  • Resolves Branch protection user/team dropdowns do not list everyone #20083

- Currently when a Team has read access to a organization's non-private
repository, their access won't be stored in the database. This caused
issue for code that rely on read access being stored. So from now-on if
we see that the repository is owned by a organization don't increase the
minMode to write permission.
- Resolves go-gitea#20083
@Gusted Gusted added this to the 1.18.0 milestone Jul 6, 2022
Gusted pushed a commit to Gusted/gitea that referenced this pull request Jul 6, 2022
- Backport go-gitea#20275
  - Currently when a Team has read access to a organization's non-private repository, their access(in the `access` table) won't be stored in the database. This cause issues for code that rely on read access being stored, like retrieving all users who have read permission to that repository(even though this is confusing as this doesn't include all registered users). So from now-on if we see that the repository is owned by a organization don't increase the `minMode` to write permission.
  - Resolves go-gitea#20083
@Gusted Gusted added the backport/done All backports for this PR have been created label Jul 6, 2022
@GiteaBot GiteaBot added the lgtm/need 1 This PR needs approval from one additional maintainer to be merged. label Jul 7, 2022
@zeripath zeripath changed the title Store read access in access for team repo's Store read access in access for team repositories Jul 9, 2022
@GiteaBot GiteaBot added lgtm/done This PR has enough approvals to get merged. There are no important open reservations anymore. and removed lgtm/need 1 This PR needs approval from one additional maintainer to be merged. labels Jul 9, 2022
6543 pushed a commit that referenced this pull request Jul 9, 2022
Backport #20275

Currently when a Team has read access to a organization's non-private repository, their access(in the `access` table) won't be stored in the database. This cause issues for code that rely on read access being stored, like retrieving all users who have read permission to that repository(even though this is confusing as this doesn't include all registered users). So from now-on if we see that the repository is owned by a organization don't increase the `minMode` to write permission.

Resolves #20083
@codecov-commenter
Copy link

Codecov Report

Merging #20275 (1ddf8bb) into main (9f3906b) will increase coverage by 0.20%.
The diff coverage is 25.00%.

@@            Coverage Diff             @@
##             main   #20275      +/-   ##
==========================================
+ Coverage   46.73%   46.94%   +0.20%     
==========================================
  Files         976      976              
  Lines      135007   135010       +3     
==========================================
+ Hits        63101    63381     +280     
+ Misses      64208    63864     -344     
- Partials     7698     7765      +67     
Impacted Files Coverage Δ
models/perm/access/access.go 62.66% <25.00%> (-1.28%) ⬇️
modules/indexer/stats/indexer.go 51.06% <0.00%> (-6.39%) ⬇️
services/pull/pull.go 40.18% <0.00%> (-0.16%) ⬇️
routers/api/v1/repo/pull.go 47.17% <0.00%> (+0.17%) ⬆️
modules/queue/workerpool.go 55.95% <0.00%> (+1.03%) ⬆️
services/pull/check.go 29.13% <0.00%> (+1.18%) ⬆️
modules/log/event.go 60.27% <0.00%> (+2.09%) ⬆️
modules/queue/queue_disk.go 63.33% <0.00%> (+3.33%) ⬆️
modules/queue/queue_bytefifo.go 53.06% <0.00%> (+5.77%) ⬆️
routers/web/repo/setting.go 16.92% <0.00%> (+6.11%) ⬆️
... and 1 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 9f3906b...1ddf8bb. Read the comment docs.

@6543
Copy link
Member

6543 commented Jul 11, 2022

true

@6543 6543 merged commit 8a7d1a3 into go-gitea:main Jul 11, 2022
zjjhot added a commit to zjjhot/gitea that referenced this pull request Jul 12, 2022
* giteaofficial/main:
  [skip ci] Updated translations via Crowdin
  Add spectral linter for Swagger (go-gitea#20321)
  Store read access in access for team repo's (go-gitea#20275)
vsysoev pushed a commit to IntegraSDL/gitea that referenced this pull request Aug 10, 2022
- Currently when a Team has read access to a organization's non-private
repository, their access won't be stored in the database. This caused
issue for code that rely on read access being stored. So from now-on if
we see that the repository is owned by a organization don't increase the
minMode to write permission.
- Resolves go-gitea#20083
@go-gitea go-gitea locked and limited conversation to collaborators May 3, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
backport/done All backports for this PR have been created lgtm/done This PR has enough approvals to get merged. There are no important open reservations anymore. type/bug
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Branch protection user/team dropdowns do not list everyone
5 participants