mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-11-24 10:46:10 +01:00
Backport #26200 by @lunny
Fix #25951
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
(cherry picked from commit 499c5594c3
)
This commit is contained in:
parent
751028549d
commit
268569b462
|
@ -188,15 +188,33 @@ func loadServiceFrom(rootCfg ConfigProvider) {
|
||||||
Service.EnableUserHeatmap = sec.Key("ENABLE_USER_HEATMAP").MustBool(true)
|
Service.EnableUserHeatmap = sec.Key("ENABLE_USER_HEATMAP").MustBool(true)
|
||||||
Service.AutoWatchNewRepos = sec.Key("AUTO_WATCH_NEW_REPOS").MustBool(true)
|
Service.AutoWatchNewRepos = sec.Key("AUTO_WATCH_NEW_REPOS").MustBool(true)
|
||||||
Service.AutoWatchOnChanges = sec.Key("AUTO_WATCH_ON_CHANGES").MustBool(false)
|
Service.AutoWatchOnChanges = sec.Key("AUTO_WATCH_ON_CHANGES").MustBool(false)
|
||||||
Service.DefaultUserVisibility = sec.Key("DEFAULT_USER_VISIBILITY").In("public", structs.ExtractKeysFromMapString(structs.VisibilityModes))
|
modes := sec.Key("ALLOWED_USER_VISIBILITY_MODES").Strings(",")
|
||||||
Service.DefaultUserVisibilityMode = structs.VisibilityModes[Service.DefaultUserVisibility]
|
if len(modes) != 0 {
|
||||||
Service.AllowedUserVisibilityModes = sec.Key("ALLOWED_USER_VISIBILITY_MODES").Strings(",")
|
Service.AllowedUserVisibilityModes = []string{}
|
||||||
if len(Service.AllowedUserVisibilityModes) != 0 {
|
|
||||||
Service.AllowedUserVisibilityModesSlice = []bool{false, false, false}
|
Service.AllowedUserVisibilityModesSlice = []bool{false, false, false}
|
||||||
for _, sMode := range Service.AllowedUserVisibilityModes {
|
for _, sMode := range modes {
|
||||||
Service.AllowedUserVisibilityModesSlice[structs.VisibilityModes[sMode]] = true
|
if tp, ok := structs.VisibilityModes[sMode]; ok { // remove unsupported modes
|
||||||
|
Service.AllowedUserVisibilityModes = append(Service.AllowedUserVisibilityModes, sMode)
|
||||||
|
Service.AllowedUserVisibilityModesSlice[tp] = true
|
||||||
|
} else {
|
||||||
|
log.Warn("ALLOWED_USER_VISIBILITY_MODES %s is unsupported", sMode)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if len(Service.AllowedUserVisibilityModes) == 0 {
|
||||||
|
Service.AllowedUserVisibilityModes = []string{"public", "limited", "private"}
|
||||||
|
Service.AllowedUserVisibilityModesSlice = []bool{true, true, true}
|
||||||
|
}
|
||||||
|
|
||||||
|
Service.DefaultUserVisibility = sec.Key("DEFAULT_USER_VISIBILITY").String()
|
||||||
|
if Service.DefaultUserVisibility == "" {
|
||||||
|
Service.DefaultUserVisibility = Service.AllowedUserVisibilityModes[0]
|
||||||
|
} else if !Service.AllowedUserVisibilityModesSlice[structs.VisibilityModes[Service.DefaultUserVisibility]] {
|
||||||
|
log.Warn("DEFAULT_USER_VISIBILITY %s is wrong or not in ALLOWED_USER_VISIBILITY_MODES, using first allowed", Service.DefaultUserVisibility)
|
||||||
|
Service.DefaultUserVisibility = Service.AllowedUserVisibilityModes[0]
|
||||||
|
}
|
||||||
|
Service.DefaultUserVisibilityMode = structs.VisibilityModes[Service.DefaultUserVisibility]
|
||||||
Service.DefaultOrgVisibility = sec.Key("DEFAULT_ORG_VISIBILITY").In("public", structs.ExtractKeysFromMapString(structs.VisibilityModes))
|
Service.DefaultOrgVisibility = sec.Key("DEFAULT_ORG_VISIBILITY").In("public", structs.ExtractKeysFromMapString(structs.VisibilityModes))
|
||||||
Service.DefaultOrgVisibilityMode = structs.VisibilityModes[Service.DefaultOrgVisibility]
|
Service.DefaultOrgVisibilityMode = structs.VisibilityModes[Service.DefaultOrgVisibility]
|
||||||
Service.DefaultOrgMemberVisible = sec.Key("DEFAULT_ORG_MEMBER_VISIBLE").MustBool()
|
Service.DefaultOrgMemberVisible = sec.Key("DEFAULT_ORG_MEMBER_VISIBLE").MustBool()
|
||||||
|
|
|
@ -6,6 +6,8 @@ package setting
|
||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/modules/structs"
|
||||||
|
|
||||||
"github.com/gobwas/glob"
|
"github.com/gobwas/glob"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
)
|
)
|
||||||
|
@ -44,3 +46,87 @@ EMAIL_DOMAIN_BLOCKLIST = d3, *.b
|
||||||
assert.True(t, match(Service.EmailDomainBlockList, "foo.b"))
|
assert.True(t, match(Service.EmailDomainBlockList, "foo.b"))
|
||||||
assert.False(t, match(Service.EmailDomainBlockList, "d1"))
|
assert.False(t, match(Service.EmailDomainBlockList, "d1"))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestLoadServiceVisibilityModes(t *testing.T) {
|
||||||
|
oldService := Service
|
||||||
|
defer func() {
|
||||||
|
Service = oldService
|
||||||
|
}()
|
||||||
|
|
||||||
|
kases := map[string]func(){
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = public
|
||||||
|
ALLOWED_USER_VISIBILITY_MODES = public,limited,private
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = public
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = limited
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
ALLOWED_USER_VISIBILITY_MODES = public,limited,private
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = public
|
||||||
|
ALLOWED_USER_VISIBILITY_MODES = limited,private
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = my_type
|
||||||
|
ALLOWED_USER_VISIBILITY_MODES = limited,private
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"limited", "private"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
`
|
||||||
|
[service]
|
||||||
|
DEFAULT_USER_VISIBILITY = public
|
||||||
|
ALLOWED_USER_VISIBILITY_MODES = public, limit, privated
|
||||||
|
`: func() {
|
||||||
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
||||||
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
||||||
|
assert.Equal(t, []string{"public"}, Service.AllowedUserVisibilityModes)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for kase, fun := range kases {
|
||||||
|
t.Run(kase, func(t *testing.T) {
|
||||||
|
cfg, err := NewConfigProviderFromData(kase)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
loadServiceFrom(cfg)
|
||||||
|
fun()
|
||||||
|
// reset
|
||||||
|
Service.AllowedUserVisibilityModesSlice = []bool{true, true, true}
|
||||||
|
Service.AllowedUserVisibilityModes = []string{}
|
||||||
|
Service.DefaultUserVisibility = ""
|
||||||
|
Service.DefaultUserVisibilityMode = structs.VisibleTypePublic
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue