@@ -376,7 +376,7 @@ func IsUserRepoAdmin(ctx context.Context, repo *repo_model.Repository, user *use
376376 }
377377
378378 for _ , team := range teams {
379- if team .AccessMode >= perm_model . AccessModeAdmin {
379+ if team .HasAdminAccess () {
380380 return true , nil
381381 }
382382 }
@@ -385,13 +385,13 @@ func IsUserRepoAdmin(ctx context.Context, repo *repo_model.Repository, user *use
385385
386386// AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the
387387// user does not have access.
388- func AccessLevel (ctx context.Context , user * user_model.User , repo * repo_model.Repository ) (perm_model.AccessMode , error ) { //nolint
388+ func AccessLevel (ctx context.Context , user * user_model.User , repo * repo_model.Repository ) (perm_model.AccessMode , error ) { //nolint:revive // export stutter
389389 return AccessLevelUnit (ctx , user , repo , unit .TypeCode )
390390}
391391
392392// AccessLevelUnit returns the Access a user has to a repository's. Will return NoneAccess if the
393393// user does not have access.
394- func AccessLevelUnit (ctx context.Context , user * user_model.User , repo * repo_model.Repository , unitType unit.Type ) (perm_model.AccessMode , error ) { //nolint
394+ func AccessLevelUnit (ctx context.Context , user * user_model.User , repo * repo_model.Repository , unitType unit.Type ) (perm_model.AccessMode , error ) { //nolint:revive // export stutter
395395 perm , err := GetUserRepoPermission (ctx , repo , user )
396396 if err != nil {
397397 return perm_model .AccessModeNone , err
@@ -499,3 +499,7 @@ func CheckRepoUnitUser(ctx context.Context, repo *repo_model.Repository, user *u
499499
500500 return perm .CanRead (unitType )
501501}
502+
503+ func PermissionNoAccess () Permission {
504+ return Permission {AccessMode : perm_model .AccessModeNone }
505+ }
0 commit comments