blob: 1759cf057e401bc19809db2a11e13c2f42b49298 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
|
# frozen_string_literal: true
class MergeRequestPolicy < IssuablePolicy
condition(:can_approve) { can_approve? }
rule { locked }.policy do
prevent :reopen_merge_request
end
# Only users who can read the merge request can comment.
# Although :read_merge_request is computed in the policy context,
# it would not be safe to prevent :create_note there, since
# note permissions are shared, and this would apply too broadly.
rule { ~can?(:read_merge_request) }.policy do
prevent :create_note
prevent :accept_merge_request
end
rule { can_approve }.policy do
enable :approve_merge_request
end
rule { can?(:approve_merge_request) & bot }.policy do
enable :reset_merge_request_approvals
end
rule { ~anonymous & can?(:read_merge_request) }.policy do
enable :create_todo
enable :update_subscription
end
condition(:can_merge) { @subject.can_be_merged_by?(@user) }
rule { can_merge }.policy do
enable :accept_merge_request
end
rule { can?(:admin_merge_request) }.policy do
enable :set_merge_request_metadata
end
private
def can_approve?
can?(:update_merge_request) && is_project_member?
end
end
MergeRequestPolicy.prepend_mod_with('MergeRequestPolicy')
|