38 lines
		
	
	
		
			838 B
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			38 lines
		
	
	
		
			838 B
		
	
	
	
		
			Ruby
		
	
	
	
# frozen_string_literal: true
 | 
						|
 | 
						|
module Gitlab
 | 
						|
  class DeployKeyAccess < UserAccess
 | 
						|
    def initialize(deploy_key, container: nil)
 | 
						|
      @deploy_key = deploy_key
 | 
						|
      @user = deploy_key.user
 | 
						|
      @container = container
 | 
						|
    end
 | 
						|
 | 
						|
    def can_push_for_ref?(ref)
 | 
						|
      can_push_to_branch?(ref)
 | 
						|
    end
 | 
						|
 | 
						|
    private
 | 
						|
 | 
						|
    attr_reader :deploy_key
 | 
						|
 | 
						|
    def protected_tag_accessible_to?(ref, action:)
 | 
						|
      assert_project!
 | 
						|
 | 
						|
      # a deploy key can always push a protected tag
 | 
						|
      # (which is not always the case when pushing to a protected branch)
 | 
						|
      true
 | 
						|
    end
 | 
						|
 | 
						|
    def can_collaborate?(_ref)
 | 
						|
      assert_project!
 | 
						|
 | 
						|
      project_has_active_user_keys?
 | 
						|
    end
 | 
						|
 | 
						|
    def project_has_active_user_keys?
 | 
						|
      user.can?(:read_project, project) && DeployKey.with_write_access_for_project(project).id_in(deploy_key.id).exists?
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |