Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

GitblitUserService.java 8.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317
  1. /*
  2. * Copyright 2011 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit;
  17. import java.io.File;
  18. import java.io.IOException;
  19. import java.text.MessageFormat;
  20. import java.util.Collection;
  21. import java.util.List;
  22. import org.slf4j.Logger;
  23. import org.slf4j.LoggerFactory;
  24. import com.gitblit.Constants.AccountType;
  25. import com.gitblit.models.TeamModel;
  26. import com.gitblit.models.UserModel;
  27. import com.gitblit.utils.DeepCopier;
  28. import com.gitblit.utils.StringUtils;
  29. /**
  30. * This class wraps the default user service and is recommended as the starting
  31. * point for custom user service implementations.
  32. *
  33. * This does seem a little convoluted, but the idea is to allow IUserService to
  34. * evolve with new methods and implementations without breaking custom
  35. * authentication implementations.
  36. *
  37. * The most common implementation of a custom IUserService is to only override
  38. * authentication and then delegate all other functionality to one of Gitblit's
  39. * user services. This class optimizes that use-case.
  40. *
  41. * Extending GitblitUserService allows for authentication customization without
  42. * having to keep-up-with IUSerService API changes.
  43. *
  44. * @author James Moger
  45. *
  46. */
  47. public class GitblitUserService implements IUserService {
  48. protected IUserService serviceImpl;
  49. private final Logger logger = LoggerFactory.getLogger(GitblitUserService.class);
  50. public GitblitUserService() {
  51. }
  52. @Override
  53. public void setup(IStoredSettings settings) {
  54. File realmFile = GitBlit.getFileOrFolder(Keys.realm.userService, "${baseFolder}/users.conf");
  55. serviceImpl = createUserService(realmFile);
  56. logger.info("GUS delegating to " + serviceImpl.toString());
  57. }
  58. protected IUserService createUserService(File realmFile) {
  59. IUserService service = null;
  60. if (realmFile.getName().toLowerCase().endsWith(".conf")) {
  61. // v0.8.0+ config-based realm file
  62. service = new ConfigUserService(realmFile);
  63. }
  64. assert service != null;
  65. if (!realmFile.exists()) {
  66. // Create the Administrator account for a new realm file
  67. try {
  68. realmFile.createNewFile();
  69. } catch (IOException x) {
  70. logger.error(MessageFormat.format("COULD NOT CREATE REALM FILE {0}!", realmFile), x);
  71. }
  72. UserModel admin = new UserModel("admin");
  73. admin.password = "admin";
  74. admin.canAdmin = true;
  75. admin.excludeFromFederation = true;
  76. service.updateUserModel(admin);
  77. }
  78. return service;
  79. }
  80. @Override
  81. public String toString() {
  82. return getClass().getSimpleName();
  83. }
  84. @Override
  85. public boolean supportsCredentialChanges() {
  86. return serviceImpl.supportsCredentialChanges();
  87. }
  88. @Override
  89. public boolean supportsDisplayNameChanges() {
  90. return serviceImpl.supportsDisplayNameChanges();
  91. }
  92. @Override
  93. public boolean supportsEmailAddressChanges() {
  94. return serviceImpl.supportsEmailAddressChanges();
  95. }
  96. @Override
  97. public boolean supportsTeamMembershipChanges() {
  98. return serviceImpl.supportsTeamMembershipChanges();
  99. }
  100. @Override
  101. public boolean supportsCookies() {
  102. return serviceImpl.supportsCookies();
  103. }
  104. @Override
  105. public String getCookie(UserModel model) {
  106. return serviceImpl.getCookie(model);
  107. }
  108. @Override
  109. public UserModel authenticate(char[] cookie) {
  110. UserModel user = serviceImpl.authenticate(cookie);
  111. setAccountType(user);
  112. return user;
  113. }
  114. @Override
  115. public UserModel authenticate(String username, char[] password) {
  116. UserModel user = serviceImpl.authenticate(username, password);
  117. setAccountType(user);
  118. return user;
  119. }
  120. @Override
  121. public void logout(UserModel user) {
  122. serviceImpl.logout(user);
  123. }
  124. @Override
  125. public UserModel getUserModel(String username) {
  126. UserModel user = serviceImpl.getUserModel(username);
  127. setAccountType(user);
  128. return user;
  129. }
  130. @Override
  131. public boolean updateUserModel(UserModel model) {
  132. return serviceImpl.updateUserModel(model);
  133. }
  134. @Override
  135. public boolean updateUserModels(Collection<UserModel> models) {
  136. return serviceImpl.updateUserModels(models);
  137. }
  138. @Override
  139. public boolean updateUserModel(String username, UserModel model) {
  140. if (model.isLocalAccount() || supportsCredentialChanges()) {
  141. if (!model.isLocalAccount() && !supportsTeamMembershipChanges()) {
  142. // teams are externally controlled - copy from original model
  143. UserModel existingModel = getUserModel(username);
  144. model = DeepCopier.copy(model);
  145. model.teams.clear();
  146. model.teams.addAll(existingModel.teams);
  147. }
  148. return serviceImpl.updateUserModel(username, model);
  149. }
  150. if (model.username.equals(username)) {
  151. // passwords are not persisted by the backing user service
  152. model.password = null;
  153. if (!model.isLocalAccount() && !supportsTeamMembershipChanges()) {
  154. // teams are externally controlled- copy from original model
  155. UserModel existingModel = getUserModel(username);
  156. model = DeepCopier.copy(model);
  157. model.teams.clear();
  158. model.teams.addAll(existingModel.teams);
  159. }
  160. return serviceImpl.updateUserModel(username, model);
  161. }
  162. logger.error("Users can not be renamed!");
  163. return false;
  164. }
  165. @Override
  166. public boolean deleteUserModel(UserModel model) {
  167. return serviceImpl.deleteUserModel(model);
  168. }
  169. @Override
  170. public boolean deleteUser(String username) {
  171. return serviceImpl.deleteUser(username);
  172. }
  173. @Override
  174. public List<String> getAllUsernames() {
  175. return serviceImpl.getAllUsernames();
  176. }
  177. @Override
  178. public List<UserModel> getAllUsers() {
  179. List<UserModel> users = serviceImpl.getAllUsers();
  180. for (UserModel user : users) {
  181. setAccountType(user);
  182. }
  183. return users;
  184. }
  185. @Override
  186. public List<String> getAllTeamNames() {
  187. return serviceImpl.getAllTeamNames();
  188. }
  189. @Override
  190. public List<TeamModel> getAllTeams() {
  191. return serviceImpl.getAllTeams();
  192. }
  193. @Override
  194. public List<String> getTeamnamesForRepositoryRole(String role) {
  195. return serviceImpl.getTeamnamesForRepositoryRole(role);
  196. }
  197. @Override
  198. @Deprecated
  199. public boolean setTeamnamesForRepositoryRole(String role, List<String> teamnames) {
  200. return serviceImpl.setTeamnamesForRepositoryRole(role, teamnames);
  201. }
  202. @Override
  203. public TeamModel getTeamModel(String teamname) {
  204. return serviceImpl.getTeamModel(teamname);
  205. }
  206. @Override
  207. public boolean updateTeamModel(TeamModel model) {
  208. return serviceImpl.updateTeamModel(model);
  209. }
  210. @Override
  211. public boolean updateTeamModels(Collection<TeamModel> models) {
  212. return serviceImpl.updateTeamModels(models);
  213. }
  214. @Override
  215. public boolean updateTeamModel(String teamname, TeamModel model) {
  216. if (!supportsTeamMembershipChanges()) {
  217. // teams are externally controlled - copy from original model
  218. TeamModel existingModel = getTeamModel(teamname);
  219. model = DeepCopier.copy(model);
  220. model.users.clear();
  221. model.users.addAll(existingModel.users);
  222. }
  223. return serviceImpl.updateTeamModel(teamname, model);
  224. }
  225. @Override
  226. public boolean deleteTeamModel(TeamModel model) {
  227. return serviceImpl.deleteTeamModel(model);
  228. }
  229. @Override
  230. public boolean deleteTeam(String teamname) {
  231. return serviceImpl.deleteTeam(teamname);
  232. }
  233. @Override
  234. public List<String> getUsernamesForRepositoryRole(String role) {
  235. return serviceImpl.getUsernamesForRepositoryRole(role);
  236. }
  237. @Override
  238. @Deprecated
  239. public boolean setUsernamesForRepositoryRole(String role, List<String> usernames) {
  240. return serviceImpl.setUsernamesForRepositoryRole(role, usernames);
  241. }
  242. @Override
  243. public boolean renameRepositoryRole(String oldRole, String newRole) {
  244. return serviceImpl.renameRepositoryRole(oldRole, newRole);
  245. }
  246. @Override
  247. public boolean deleteRepositoryRole(String role) {
  248. return serviceImpl.deleteRepositoryRole(role);
  249. }
  250. protected boolean isLocalAccount(String username) {
  251. UserModel user = getUserModel(username);
  252. return user != null && user.isLocalAccount();
  253. }
  254. protected void setAccountType(UserModel user) {
  255. if (user != null) {
  256. if (!StringUtils.isEmpty(user.password)
  257. && !Constants.EXTERNAL_ACCOUNT.equalsIgnoreCase(user.password)
  258. && !"StoredInLDAP".equalsIgnoreCase(user.password)) {
  259. user.accountType = AccountType.LOCAL;
  260. } else {
  261. user.accountType = getAccountType();
  262. }
  263. }
  264. }
  265. protected AccountType getAccountType() {
  266. return AccountType.LOCAL;
  267. }
  268. }