@@ -13,6 +13,7 @@ import (
1313 "code.gitea.io/gitea/models/db"
1414 "code.gitea.io/gitea/models/organization"
1515 "code.gitea.io/gitea/models/perm"
16+ access_model "code.gitea.io/gitea/models/perm/access"
1617 repo_model "code.gitea.io/gitea/models/repo"
1718 "code.gitea.io/gitea/models/unit"
1819 user_model "code.gitea.io/gitea/models/user"
@@ -79,7 +80,7 @@ func (protectBranch *ProtectedBranch) CanUserPush(userID int64) bool {
7980 } else if repo , err := repo_model .GetRepositoryByID (protectBranch .RepoID ); err != nil {
8081 log .Error ("repo_model.GetRepositoryByID: %v" , err )
8182 return false
82- } else if writeAccess , err := HasAccessUnit (user , repo , unit .TypeCode , perm .AccessModeWrite ); err != nil {
83+ } else if writeAccess , err := access_model . HasAccessUnit (db . DefaultContext , user , repo , unit .TypeCode , perm .AccessModeWrite ); err != nil {
8384 log .Error ("HasAccessUnit: %v" , err )
8485 return false
8586 } else {
@@ -104,7 +105,7 @@ func (protectBranch *ProtectedBranch) CanUserPush(userID int64) bool {
104105}
105106
106107// IsUserMergeWhitelisted checks if some user is whitelisted to merge to this branch
107- func IsUserMergeWhitelisted (ctx context.Context , protectBranch * ProtectedBranch , userID int64 , permissionInRepo Permission ) bool {
108+ func IsUserMergeWhitelisted (ctx context.Context , protectBranch * ProtectedBranch , userID int64 , permissionInRepo access_model. Permission ) bool {
108109 if ! protectBranch .EnableMergeWhitelist {
109110 // Then we need to fall back on whether the user has write permission
110111 return permissionInRepo .CanWrite (unit .TypeCode )
@@ -139,7 +140,7 @@ func isUserOfficialReviewer(ctx context.Context, protectBranch *ProtectedBranch,
139140
140141 if ! protectBranch .EnableApprovalsWhitelist {
141142 // Anyone with write access is considered official reviewer
142- writeAccess , err := hasAccessUnit (ctx , user , repo , unit .TypeCode , perm .AccessModeWrite )
143+ writeAccess , err := access_model . HasAccessUnit (ctx , user , repo , unit .TypeCode , perm .AccessModeWrite )
143144 if err != nil {
144145 return false , err
145146 }
@@ -424,7 +425,7 @@ func updateApprovalWhitelist(ctx context.Context, repo *repo_model.Repository, c
424425
425426 whitelist = make ([]int64 , 0 , len (newWhitelist ))
426427 for _ , userID := range newWhitelist {
427- if reader , err := IsRepoReader (ctx , repo , userID ); err != nil {
428+ if reader , err := access_model . IsRepoReader (ctx , repo , userID ); err != nil {
428429 return nil , err
429430 } else if ! reader {
430431 continue
@@ -449,7 +450,7 @@ func updateUserWhitelist(ctx context.Context, repo *repo_model.Repository, curre
449450 if err != nil {
450451 return nil , fmt .Errorf ("GetUserByID [user_id: %d, repo_id: %d]: %v" , userID , repo .ID , err )
451452 }
452- perm , err := GetUserRepoPermission (ctx , repo , user )
453+ perm , err := access_model . GetUserRepoPermission (ctx , repo , user )
453454 if err != nil {
454455 return nil , fmt .Errorf ("GetUserRepoPermission [user_id: %d, repo_id: %d]: %v" , userID , repo .ID , err )
455456 }
0 commit comments