You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370
  1. /*
  2. * Copyright 2011 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.models;
  17. import java.io.Serializable;
  18. import java.util.ArrayList;
  19. import java.util.Collection;
  20. import java.util.Collections;
  21. import java.util.HashSet;
  22. import java.util.LinkedHashMap;
  23. import java.util.List;
  24. import java.util.Map;
  25. import java.util.Set;
  26. import com.gitblit.Constants.AccessPermission;
  27. import com.gitblit.Constants.AccessRestrictionType;
  28. import com.gitblit.Constants.PermissionType;
  29. import com.gitblit.Constants.RegistrantType;
  30. import com.gitblit.Constants.Unused;
  31. import com.gitblit.utils.StringUtils;
  32. /**
  33. * TeamModel is a serializable model class that represents a group of users and
  34. * a list of accessible repositories.
  35. *
  36. * @author James Moger
  37. *
  38. */
  39. public class TeamModel implements Serializable, Comparable<TeamModel> {
  40. private static final long serialVersionUID = 1L;
  41. // field names are reflectively mapped in EditTeam page
  42. public String name;
  43. public boolean canAdmin;
  44. public boolean canFork;
  45. public boolean canCreate;
  46. public final Set<String> users = new HashSet<String>();
  47. // retained for backwards-compatibility with RPC clients
  48. @Deprecated
  49. public final Set<String> repositories = new HashSet<String>();
  50. public final Map<String, AccessPermission> permissions = new LinkedHashMap<String, AccessPermission>();
  51. public final Set<String> mailingLists = new HashSet<String>();
  52. public final List<String> preReceiveScripts = new ArrayList<String>();
  53. public final List<String> postReceiveScripts = new ArrayList<String>();
  54. public TeamModel(String name) {
  55. this.name = name;
  56. }
  57. /**
  58. * @use hasRepositoryPermission
  59. * @param name
  60. * @return
  61. */
  62. @Deprecated
  63. @Unused
  64. public boolean hasRepository(String name) {
  65. return hasRepositoryPermission(name);
  66. }
  67. @Deprecated
  68. @Unused
  69. public void addRepository(String name) {
  70. addRepositoryPermission(name);
  71. }
  72. @Deprecated
  73. @Unused
  74. public void addRepositories(Collection<String> names) {
  75. addRepositoryPermissions(names);
  76. }
  77. @Deprecated
  78. @Unused
  79. public void removeRepository(String name) {
  80. removeRepositoryPermission(name);
  81. }
  82. /**
  83. * Returns a list of repository permissions for this team.
  84. *
  85. * @return the team's list of permissions
  86. */
  87. public List<RegistrantAccessPermission> getRepositoryPermissions() {
  88. List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>();
  89. if (canAdmin) {
  90. // team has REWIND access to all repositories
  91. return list;
  92. }
  93. for (Map.Entry<String, AccessPermission> entry : permissions.entrySet()) {
  94. String registrant = entry.getKey();
  95. String source = null;
  96. boolean editable = true;
  97. PermissionType pType = PermissionType.EXPLICIT;
  98. if (StringUtils.findInvalidCharacter(registrant) != null) {
  99. // a regex will have at least 1 invalid character
  100. pType = PermissionType.REGEX;
  101. source = registrant;
  102. }
  103. list.add(new RegistrantAccessPermission(registrant, entry.getValue(), pType, RegistrantType.REPOSITORY, source, editable));
  104. }
  105. Collections.sort(list);
  106. return list;
  107. }
  108. /**
  109. * Returns true if the team has any type of specified access permission for
  110. * this repository.
  111. *
  112. * @param name
  113. * @return true if team has a specified access permission for the repository
  114. */
  115. public boolean hasRepositoryPermission(String name) {
  116. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  117. if (permissions.containsKey(repository)) {
  118. // exact repository permission specified
  119. return true;
  120. } else {
  121. // search for regex permission match
  122. for (String key : permissions.keySet()) {
  123. if (name.matches(key)) {
  124. AccessPermission p = permissions.get(key);
  125. if (p != null) {
  126. return true;
  127. }
  128. }
  129. }
  130. }
  131. return false;
  132. }
  133. /**
  134. * Returns true if the team has an explicitly specified access permission for
  135. * this repository.
  136. *
  137. * @param name
  138. * @return if the team has an explicitly specified access permission
  139. */
  140. public boolean hasExplicitRepositoryPermission(String name) {
  141. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  142. return permissions.containsKey(repository);
  143. }
  144. /**
  145. * Adds a repository permission to the team.
  146. * <p>
  147. * Role may be formatted as:
  148. * <ul>
  149. * <li> myrepo.git <i>(this is implicitly RW+)</i>
  150. * <li> RW+:myrepo.git
  151. * </ul>
  152. * @param role
  153. */
  154. public void addRepositoryPermission(String role) {
  155. AccessPermission permission = AccessPermission.permissionFromRole(role);
  156. String repository = AccessPermission.repositoryFromRole(role).toLowerCase();
  157. repositories.add(repository);
  158. permissions.put(repository, permission);
  159. }
  160. public void addRepositoryPermissions(Collection<String> roles) {
  161. for (String role:roles) {
  162. addRepositoryPermission(role);
  163. }
  164. }
  165. public AccessPermission removeRepositoryPermission(String name) {
  166. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  167. repositories.remove(repository);
  168. return permissions.remove(repository);
  169. }
  170. public void setRepositoryPermission(String repository, AccessPermission permission) {
  171. if (permission == null) {
  172. // remove the permission
  173. permissions.remove(repository.toLowerCase());
  174. repositories.remove(repository.toLowerCase());
  175. } else {
  176. // set the new permission
  177. permissions.put(repository.toLowerCase(), permission);
  178. repositories.add(repository.toLowerCase());
  179. }
  180. }
  181. public RegistrantAccessPermission getRepositoryPermission(RepositoryModel repository) {
  182. RegistrantAccessPermission ap = new RegistrantAccessPermission();
  183. ap.registrant = name;
  184. ap.registrantType = RegistrantType.TEAM;
  185. ap.permission = AccessPermission.NONE;
  186. ap.mutable = false;
  187. // determine maximum permission for the repository
  188. final AccessPermission maxPermission =
  189. (repository.isFrozen || !repository.isBare || repository.isMirror) ?
  190. AccessPermission.CLONE : AccessPermission.REWIND;
  191. if (AccessRestrictionType.NONE.equals(repository.accessRestriction)) {
  192. // anonymous rewind
  193. ap.permissionType = PermissionType.ANONYMOUS;
  194. if (AccessPermission.REWIND.atMost(maxPermission)) {
  195. ap.permission = AccessPermission.REWIND;
  196. } else {
  197. ap.permission = maxPermission;
  198. }
  199. return ap;
  200. }
  201. if (canAdmin) {
  202. ap.permissionType = PermissionType.ADMINISTRATOR;
  203. if (AccessPermission.REWIND.atMost(maxPermission)) {
  204. ap.permission = AccessPermission.REWIND;
  205. } else {
  206. ap.permission = maxPermission;
  207. }
  208. return ap;
  209. }
  210. if (permissions.containsKey(repository.name.toLowerCase())) {
  211. // exact repository permission specified
  212. AccessPermission p = permissions.get(repository.name.toLowerCase());
  213. if (p != null && repository.accessRestriction.isValidPermission(p)) {
  214. ap.permissionType = PermissionType.EXPLICIT;
  215. if (p.atMost(maxPermission)) {
  216. ap.permission = p;
  217. } else {
  218. ap.permission = maxPermission;
  219. }
  220. ap.mutable = true;
  221. return ap;
  222. }
  223. } else {
  224. // search for case-insensitive regex permission match
  225. for (String key : permissions.keySet()) {
  226. if (StringUtils.matchesIgnoreCase(repository.name, key)) {
  227. AccessPermission p = permissions.get(key);
  228. if (p != null && repository.accessRestriction.isValidPermission(p)) {
  229. // take first match
  230. ap.permissionType = PermissionType.REGEX;
  231. if (p.atMost(maxPermission)) {
  232. ap.permission = p;
  233. } else {
  234. ap.permission = maxPermission;
  235. }
  236. ap.source = key;
  237. return ap;
  238. }
  239. }
  240. }
  241. }
  242. // still no explicit or regex, check for implicit permissions
  243. if (AccessPermission.NONE == ap.permission) {
  244. switch (repository.accessRestriction) {
  245. case VIEW:
  246. // no implicit permissions possible
  247. break;
  248. case CLONE:
  249. // implied view permission
  250. ap.permission = AccessPermission.VIEW;
  251. ap.permissionType = PermissionType.ANONYMOUS;
  252. break;
  253. case PUSH:
  254. // implied clone permission
  255. ap.permission = AccessPermission.CLONE;
  256. ap.permissionType = PermissionType.ANONYMOUS;
  257. break;
  258. case NONE:
  259. // implied REWIND or CLONE
  260. ap.permission = maxPermission;
  261. ap.permissionType = PermissionType.ANONYMOUS;
  262. break;
  263. }
  264. }
  265. return ap;
  266. }
  267. protected boolean canAccess(RepositoryModel repository, AccessRestrictionType ifRestriction, AccessPermission requirePermission) {
  268. if (repository.accessRestriction.atLeast(ifRestriction)) {
  269. RegistrantAccessPermission ap = getRepositoryPermission(repository);
  270. return ap.permission.atLeast(requirePermission);
  271. }
  272. return true;
  273. }
  274. public boolean canView(RepositoryModel repository) {
  275. return canAccess(repository, AccessRestrictionType.VIEW, AccessPermission.VIEW);
  276. }
  277. public boolean canClone(RepositoryModel repository) {
  278. return canAccess(repository, AccessRestrictionType.CLONE, AccessPermission.CLONE);
  279. }
  280. public boolean canPush(RepositoryModel repository) {
  281. if (repository.isFrozen) {
  282. return false;
  283. }
  284. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.PUSH);
  285. }
  286. public boolean canCreateRef(RepositoryModel repository) {
  287. if (repository.isFrozen) {
  288. return false;
  289. }
  290. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.CREATE);
  291. }
  292. public boolean canDeleteRef(RepositoryModel repository) {
  293. if (repository.isFrozen) {
  294. return false;
  295. }
  296. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.DELETE);
  297. }
  298. public boolean canRewindRef(RepositoryModel repository) {
  299. if (repository.isFrozen) {
  300. return false;
  301. }
  302. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.REWIND);
  303. }
  304. public boolean hasUser(String name) {
  305. return users.contains(name.toLowerCase());
  306. }
  307. public void addUser(String name) {
  308. users.add(name.toLowerCase());
  309. }
  310. public void addUsers(Collection<String> names) {
  311. for (String name:names) {
  312. users.add(name.toLowerCase());
  313. }
  314. }
  315. public void removeUser(String name) {
  316. users.remove(name.toLowerCase());
  317. }
  318. public void addMailingLists(Collection<String> addresses) {
  319. for (String address:addresses) {
  320. mailingLists.add(address.toLowerCase());
  321. }
  322. }
  323. @Override
  324. public String toString() {
  325. return name;
  326. }
  327. @Override
  328. public int compareTo(TeamModel o) {
  329. return name.compareTo(o.name);
  330. }
  331. }