summaryrefslogtreecommitdiffstats
path: root/src/com/gitblit/ConfigUserService.java
Commit message (Collapse)AuthorAgeFilesLines
* Support Team canAdmin, canCreate, and canFork (issue 36)James Moger2012-10-101-0/+24
|
* Finer-grained repository access permissions (issue 36)James Moger2012-10-101-26/+122
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implemented discrete repository access permissions to replace the really primitive course-grained permissions used to this point. This implementation allows for finer-grained access control, but still falls short of integrated, branch-based permissions sought by some. Access permissions follow the conventions established by Gitosis and Gitolite so they should feel immediately comfortable to experienced users. This permissions infrastructure is complete and works exactly as expected. Unfortunately, there is no ui in this commit to change permissions, that will be forthcoming. In the meantime, Gitblit hot-reloads users.conf so the permissions can be manipulated at runtime with a text editor. The following per-repository permissions are now supported: - V (view in web ui, RSS feeds, download zip) - R (clone) - RW (clone and push) - RWC (clone and push with ref creation) - RWD (clone and push with ref creation, deletion) - RW+ (clone and push with ref creation, deletion, rewind) And a users.conf entry looks something like this: [user "hannibal"] password = bossman repository = RWD:topsecret.git
* Implemented New Repository for personal repositoriesJames Moger2012-10-051-0/+4
|
* Preliminary implementation of server-side forking (issue 137)James Moger2012-09-291-0/+4
| | | | | | | | | | | | | | | | | | The fork mechanism clones the repository , access restrictions, and other config options. The app has been updated throughout to handle personal repositories and to properly display origin/fork links. In order to fork a repository the user account must have the #fork role, the origin repository must permit forking, and the user account must have standard clone permissions to the repository. Because forking introduces a new user role no existing user accounts can automatically begin forking a repository. This is both a pro and a con. Since the fork has the same access restrictions as the origin repository, those who can access the origin may also access the fork. This is intentional to facilitate integration-manager workflow. The fork owner does have the power to completely change the access restrictions of his/her fork.
* Drop failed attempt to add user or team (issue 118)James Moger2012-08-061-2/+8
|
* Restore original team or user object on failure to update (issue 118)James Moger2012-08-061-4/+14
|
* Fixed bug in ConfigUserService when user has nothing other than an account nameJames Moger2012-07-111-0/+6
|
* Persist cookies in ConfigUserService. Update LDAPUserService to generate ↵James Moger2012-07-111-4/+17
| | | | cookies.
* Allow user services to control editing of display name and email addressJames Moger2012-04-251-1/+23
|
* Displayname and email address persistence for ConfigUserServiceJames Moger2012-04-251-1/+13
|
* Added a logout hook to IUserServiceJames Moger2012-04-251-0/+9
|
* Skeleton LdapUserService based on John Cryiger's implementationJames Moger2012-04-061-1/+24
|
* Workaround 1 sec resolution of File.lastModified on Linux (issue-55)James Moger2012-02-201-1/+7
| | | | | | | Shockingly, File.lastModified() does not always support millisecond resolution on all platforms even if the underlying filesystem supports it. Added a forceReload flag (in addition to last modified checks) to ensure that user backends and configuration properties are properly reloaded.
* Fixed username case-sensitivity bugs (issue 43)James Moger2012-01-161-3/+3
|
* Using ArrayUtils.isEmpty to test arrays and collectionsJames Moger2012-01-051-6/+7
|
* Show additional columns in users and teams tablesJames Moger2011-12-281-0/+29
|
* Implemented Team hook scriptsJames Moger2011-12-271-4/+29
|
* Support mailing lists for TeamsJames Moger2011-12-211-1/+12
|
* Teams support.James Moger2011-12-071-18/+289
| | | | | | Teams simplify the management of user-repository access permissions. Teams have a list of restricted repositories. Users are also added to teams and that grants them access to those repositories. Federation and RPC support are still in-progress.
* Implemented ConfigUserService. Fixed and deprecated FileUserService.James Moger2011-12-041-0/+471