@@ -376,7 +376,7 @@ func IsUserRepoAdmin(ctx context.Context, repo *repo_model.Repository, user *use
376376	}
377377
378378	for  _ , team  :=  range  teams  {
379- 		if  team .AccessMode   >=   perm_model . AccessModeAdmin  {
379+ 		if  team .HasAdminAccess ()  {
380380			return  true , nil 
381381		}
382382	}
@@ -385,13 +385,13 @@ func IsUserRepoAdmin(ctx context.Context, repo *repo_model.Repository, user *use
385385
386386// AccessLevel returns the Access a user has to a repository. Will return NoneAccess if the 
387387// user does not have access. 
388- func  AccessLevel (ctx  context.Context , user  * user_model.User , repo  * repo_model.Repository ) (perm_model.AccessMode , error ) { //nolint 
388+ func  AccessLevel (ctx  context.Context , user  * user_model.User , repo  * repo_model.Repository ) (perm_model.AccessMode , error ) { //nolint:revive // export stutter  
389389	return  AccessLevelUnit (ctx , user , repo , unit .TypeCode )
390390}
391391
392392// AccessLevelUnit returns the Access a user has to a repository's. Will return NoneAccess if the 
393393// user does not have access. 
394- func  AccessLevelUnit (ctx  context.Context , user  * user_model.User , repo  * repo_model.Repository , unitType  unit.Type ) (perm_model.AccessMode , error ) { //nolint 
394+ func  AccessLevelUnit (ctx  context.Context , user  * user_model.User , repo  * repo_model.Repository , unitType  unit.Type ) (perm_model.AccessMode , error ) { //nolint:revive // export stutter  
395395	perm , err  :=  GetUserRepoPermission (ctx , repo , user )
396396	if  err  !=  nil  {
397397		return  perm_model .AccessModeNone , err 
@@ -499,3 +499,7 @@ func CheckRepoUnitUser(ctx context.Context, repo *repo_model.Repository, user *u
499499
500500	return  perm .CanRead (unitType )
501501}
502+ 
503+ func  PermissionNoAccess () Permission  {
504+ 	return  Permission {AccessMode : perm_model .AccessModeNone }
505+ }
0 commit comments