You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TeamModel.java 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377
  1. /*
  2. * Copyright 2011 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.models;
  17. import java.io.Serializable;
  18. import java.util.ArrayList;
  19. import java.util.Collection;
  20. import java.util.Collections;
  21. import java.util.HashSet;
  22. import java.util.LinkedHashMap;
  23. import java.util.List;
  24. import java.util.Map;
  25. import java.util.Set;
  26. import com.gitblit.Constants.AccessPermission;
  27. import com.gitblit.Constants.AccessRestrictionType;
  28. import com.gitblit.Constants.AccountType;
  29. import com.gitblit.Constants.PermissionType;
  30. import com.gitblit.Constants.RegistrantType;
  31. import com.gitblit.Constants.Unused;
  32. import com.gitblit.utils.StringUtils;
  33. /**
  34. * TeamModel is a serializable model class that represents a group of users and
  35. * a list of accessible repositories.
  36. *
  37. * @author James Moger
  38. *
  39. */
  40. public class TeamModel implements Serializable, Comparable<TeamModel> {
  41. private static final long serialVersionUID = 1L;
  42. // field names are reflectively mapped in EditTeam page
  43. public String name;
  44. public boolean canAdmin;
  45. public boolean canFork;
  46. public boolean canCreate;
  47. public AccountType accountType;
  48. public final Set<String> users = new HashSet<String>();
  49. // retained for backwards-compatibility with RPC clients
  50. @Deprecated
  51. public final Set<String> repositories = new HashSet<String>();
  52. public final Map<String, AccessPermission> permissions = new LinkedHashMap<String, AccessPermission>();
  53. public final Set<String> mailingLists = new HashSet<String>();
  54. public final List<String> preReceiveScripts = new ArrayList<String>();
  55. public final List<String> postReceiveScripts = new ArrayList<String>();
  56. public TeamModel(String name) {
  57. this.name = name;
  58. this.accountType = AccountType.LOCAL;
  59. }
  60. /**
  61. * @use hasRepositoryPermission
  62. * @param name
  63. * @return
  64. */
  65. @Deprecated
  66. @Unused
  67. public boolean hasRepository(String name) {
  68. return hasRepositoryPermission(name);
  69. }
  70. @Deprecated
  71. @Unused
  72. public void addRepository(String name) {
  73. addRepositoryPermission(name);
  74. }
  75. @Deprecated
  76. @Unused
  77. public void addRepositories(Collection<String> names) {
  78. addRepositoryPermissions(names);
  79. }
  80. @Deprecated
  81. @Unused
  82. public void removeRepository(String name) {
  83. removeRepositoryPermission(name);
  84. }
  85. /**
  86. * Returns a list of repository permissions for this team.
  87. *
  88. * @return the team's list of permissions
  89. */
  90. public List<RegistrantAccessPermission> getRepositoryPermissions() {
  91. List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>();
  92. if (canAdmin) {
  93. // team has REWIND access to all repositories
  94. return list;
  95. }
  96. for (Map.Entry<String, AccessPermission> entry : permissions.entrySet()) {
  97. String registrant = entry.getKey();
  98. String source = null;
  99. boolean editable = true;
  100. PermissionType pType = PermissionType.EXPLICIT;
  101. if (StringUtils.findInvalidCharacter(registrant) != null) {
  102. // a regex will have at least 1 invalid character
  103. pType = PermissionType.REGEX;
  104. source = registrant;
  105. }
  106. list.add(new RegistrantAccessPermission(registrant, entry.getValue(), pType, RegistrantType.REPOSITORY, source, editable));
  107. }
  108. Collections.sort(list);
  109. return list;
  110. }
  111. /**
  112. * Returns true if the team has any type of specified access permission for
  113. * this repository.
  114. *
  115. * @param name
  116. * @return true if team has a specified access permission for the repository
  117. */
  118. public boolean hasRepositoryPermission(String name) {
  119. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  120. if (permissions.containsKey(repository)) {
  121. // exact repository permission specified
  122. return true;
  123. } else {
  124. // search for regex permission match
  125. for (String key : permissions.keySet()) {
  126. if (name.matches(key)) {
  127. AccessPermission p = permissions.get(key);
  128. if (p != null) {
  129. return true;
  130. }
  131. }
  132. }
  133. }
  134. return false;
  135. }
  136. /**
  137. * Returns true if the team has an explicitly specified access permission for
  138. * this repository.
  139. *
  140. * @param name
  141. * @return if the team has an explicitly specified access permission
  142. */
  143. public boolean hasExplicitRepositoryPermission(String name) {
  144. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  145. return permissions.containsKey(repository);
  146. }
  147. /**
  148. * Adds a repository permission to the team.
  149. * <p>
  150. * Role may be formatted as:
  151. * <ul>
  152. * <li> myrepo.git <i>(this is implicitly RW+)</i>
  153. * <li> RW+:myrepo.git
  154. * </ul>
  155. * @param role
  156. */
  157. public void addRepositoryPermission(String role) {
  158. AccessPermission permission = AccessPermission.permissionFromRole(role);
  159. String repository = AccessPermission.repositoryFromRole(role).toLowerCase();
  160. repositories.add(repository);
  161. permissions.put(repository, permission);
  162. }
  163. public void addRepositoryPermissions(Collection<String> roles) {
  164. for (String role:roles) {
  165. addRepositoryPermission(role);
  166. }
  167. }
  168. public AccessPermission removeRepositoryPermission(String name) {
  169. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  170. repositories.remove(repository);
  171. return permissions.remove(repository);
  172. }
  173. public void setRepositoryPermission(String repository, AccessPermission permission) {
  174. if (permission == null) {
  175. // remove the permission
  176. permissions.remove(repository.toLowerCase());
  177. repositories.remove(repository.toLowerCase());
  178. } else {
  179. // set the new permission
  180. permissions.put(repository.toLowerCase(), permission);
  181. repositories.add(repository.toLowerCase());
  182. }
  183. }
  184. public RegistrantAccessPermission getRepositoryPermission(RepositoryModel repository) {
  185. RegistrantAccessPermission ap = new RegistrantAccessPermission();
  186. ap.registrant = name;
  187. ap.registrantType = RegistrantType.TEAM;
  188. ap.permission = AccessPermission.NONE;
  189. ap.mutable = false;
  190. // determine maximum permission for the repository
  191. final AccessPermission maxPermission =
  192. (repository.isFrozen || !repository.isBare || repository.isMirror) ?
  193. AccessPermission.CLONE : AccessPermission.REWIND;
  194. if (AccessRestrictionType.NONE.equals(repository.accessRestriction)) {
  195. // anonymous rewind
  196. ap.permissionType = PermissionType.ANONYMOUS;
  197. if (AccessPermission.REWIND.atMost(maxPermission)) {
  198. ap.permission = AccessPermission.REWIND;
  199. } else {
  200. ap.permission = maxPermission;
  201. }
  202. return ap;
  203. }
  204. if (canAdmin) {
  205. ap.permissionType = PermissionType.ADMINISTRATOR;
  206. if (AccessPermission.REWIND.atMost(maxPermission)) {
  207. ap.permission = AccessPermission.REWIND;
  208. } else {
  209. ap.permission = maxPermission;
  210. }
  211. return ap;
  212. }
  213. if (permissions.containsKey(repository.name.toLowerCase())) {
  214. // exact repository permission specified
  215. AccessPermission p = permissions.get(repository.name.toLowerCase());
  216. if (p != null && repository.accessRestriction.isValidPermission(p)) {
  217. ap.permissionType = PermissionType.EXPLICIT;
  218. if (p.atMost(maxPermission)) {
  219. ap.permission = p;
  220. } else {
  221. ap.permission = maxPermission;
  222. }
  223. ap.mutable = true;
  224. return ap;
  225. }
  226. } else {
  227. // search for case-insensitive regex permission match
  228. for (String key : permissions.keySet()) {
  229. if (StringUtils.matchesIgnoreCase(repository.name, key)) {
  230. AccessPermission p = permissions.get(key);
  231. if (p != null && repository.accessRestriction.isValidPermission(p)) {
  232. // take first match
  233. ap.permissionType = PermissionType.REGEX;
  234. if (p.atMost(maxPermission)) {
  235. ap.permission = p;
  236. } else {
  237. ap.permission = maxPermission;
  238. }
  239. ap.source = key;
  240. return ap;
  241. }
  242. }
  243. }
  244. }
  245. // still no explicit or regex, check for implicit permissions
  246. if (AccessPermission.NONE == ap.permission) {
  247. switch (repository.accessRestriction) {
  248. case VIEW:
  249. // no implicit permissions possible
  250. break;
  251. case CLONE:
  252. // implied view permission
  253. ap.permission = AccessPermission.VIEW;
  254. ap.permissionType = PermissionType.ANONYMOUS;
  255. break;
  256. case PUSH:
  257. // implied clone permission
  258. ap.permission = AccessPermission.CLONE;
  259. ap.permissionType = PermissionType.ANONYMOUS;
  260. break;
  261. case NONE:
  262. // implied REWIND or CLONE
  263. ap.permission = maxPermission;
  264. ap.permissionType = PermissionType.ANONYMOUS;
  265. break;
  266. }
  267. }
  268. return ap;
  269. }
  270. protected boolean canAccess(RepositoryModel repository, AccessRestrictionType ifRestriction, AccessPermission requirePermission) {
  271. if (repository.accessRestriction.atLeast(ifRestriction)) {
  272. RegistrantAccessPermission ap = getRepositoryPermission(repository);
  273. return ap.permission.atLeast(requirePermission);
  274. }
  275. return true;
  276. }
  277. public boolean canView(RepositoryModel repository) {
  278. return canAccess(repository, AccessRestrictionType.VIEW, AccessPermission.VIEW);
  279. }
  280. public boolean canClone(RepositoryModel repository) {
  281. return canAccess(repository, AccessRestrictionType.CLONE, AccessPermission.CLONE);
  282. }
  283. public boolean canPush(RepositoryModel repository) {
  284. if (repository.isFrozen) {
  285. return false;
  286. }
  287. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.PUSH);
  288. }
  289. public boolean canCreateRef(RepositoryModel repository) {
  290. if (repository.isFrozen) {
  291. return false;
  292. }
  293. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.CREATE);
  294. }
  295. public boolean canDeleteRef(RepositoryModel repository) {
  296. if (repository.isFrozen) {
  297. return false;
  298. }
  299. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.DELETE);
  300. }
  301. public boolean canRewindRef(RepositoryModel repository) {
  302. if (repository.isFrozen) {
  303. return false;
  304. }
  305. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.REWIND);
  306. }
  307. public boolean hasUser(String name) {
  308. return users.contains(name.toLowerCase());
  309. }
  310. public void addUser(String name) {
  311. users.add(name.toLowerCase());
  312. }
  313. public void addUsers(Collection<String> names) {
  314. for (String name:names) {
  315. users.add(name.toLowerCase());
  316. }
  317. }
  318. public void removeUser(String name) {
  319. users.remove(name.toLowerCase());
  320. }
  321. public void addMailingLists(Collection<String> addresses) {
  322. for (String address:addresses) {
  323. mailingLists.add(address.toLowerCase());
  324. }
  325. }
  326. public boolean isLocalTeam() {
  327. return accountType.isLocal();
  328. }
  329. @Override
  330. public String toString() {
  331. return name;
  332. }
  333. @Override
  334. public int compareTo(TeamModel o) {
  335. return name.compareTo(o.name);
  336. }
  337. }