module Gitlab class UserAccess attr_reader :user, :project def initialize(user, project: nil) @user = user @project = project end def can_do_action?(action) return false if no_user_or_blocked? @permission_cache ||= {} @permission_cache[action] ||= user.can?(action, project) end def cannot_do_action?(action) !can_do_action?(action) end def allowed? return false if no_user_or_blocked? if user.requires_ldap_check? && user.try_obtain_ldap_lease return false unless Gitlab::LDAP::Access.allowed?(user) end true end def can_push_to_branch?(ref) return false if no_user_or_blocked? if project.protected_branch?(ref) return true if project.empty_repo? && project.user_can_push_to_empty_repo?(user) access_levels = project.protected_branches.matching(ref).map(&:push_access_levels).flatten has_access = access_levels.any? { |access_level| access_level.check_access(user) } has_access || !project.repository.branch_exists?(ref) && can_merge_to_branch?(ref) else user.can?(:push_code, project) end end def can_merge_to_branch?(ref) return false if no_user_or_blocked? if project.protected_branch?(ref) access_levels = project.protected_branches.matching(ref).map(&:merge_access_levels).flatten access_levels.any? { |access_level| access_level.check_access(user) } else user.can?(:push_code, project) end end def can_read_project? return false if no_user_or_blocked? user.can?(:read_project, project) end private def no_user_or_blocked? user.nil? || user.blocked? end end end