You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TeamModel.java 8.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. /*
  2. * Copyright 2011 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.models;
  17. import java.io.Serializable;
  18. import java.util.ArrayList;
  19. import java.util.Collection;
  20. import java.util.Collections;
  21. import java.util.HashMap;
  22. import java.util.HashSet;
  23. import java.util.List;
  24. import java.util.Map;
  25. import java.util.Set;
  26. import com.gitblit.Constants.AccessPermission;
  27. import com.gitblit.Constants.AccessRestrictionType;
  28. import com.gitblit.Constants.RegistrantType;
  29. import com.gitblit.Constants.Unused;
  30. import com.gitblit.utils.StringUtils;
  31. /**
  32. * TeamModel is a serializable model class that represents a group of users and
  33. * a list of accessible repositories.
  34. *
  35. * @author James Moger
  36. *
  37. */
  38. public class TeamModel implements Serializable, Comparable<TeamModel> {
  39. private static final long serialVersionUID = 1L;
  40. // field names are reflectively mapped in EditTeam page
  41. public String name;
  42. public boolean canAdmin;
  43. public boolean canFork;
  44. public boolean canCreate;
  45. public final Set<String> users = new HashSet<String>();
  46. // retained for backwards-compatibility with RPC clients
  47. @Deprecated
  48. public final Set<String> repositories = new HashSet<String>();
  49. public final Map<String, AccessPermission> permissions = new HashMap<String, AccessPermission>();
  50. public final Set<String> mailingLists = new HashSet<String>();
  51. public final List<String> preReceiveScripts = new ArrayList<String>();
  52. public final List<String> postReceiveScripts = new ArrayList<String>();
  53. public TeamModel(String name) {
  54. this.name = name;
  55. }
  56. /**
  57. * @use hasRepositoryPermission
  58. * @param name
  59. * @return
  60. */
  61. @Deprecated
  62. @Unused
  63. public boolean hasRepository(String name) {
  64. return hasRepositoryPermission(name);
  65. }
  66. @Deprecated
  67. @Unused
  68. public void addRepository(String name) {
  69. addRepositoryPermission(name);
  70. }
  71. @Deprecated
  72. @Unused
  73. public void addRepositories(Collection<String> names) {
  74. addRepositoryPermissions(names);
  75. }
  76. @Deprecated
  77. @Unused
  78. public void removeRepository(String name) {
  79. removeRepositoryPermission(name);
  80. }
  81. /**
  82. * Returns a list of repository permissions for this team.
  83. *
  84. * @return the team's list of permissions
  85. */
  86. public List<RegistrantAccessPermission> getRepositoryPermissions() {
  87. List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>();
  88. for (Map.Entry<String, AccessPermission> entry : permissions.entrySet()) {
  89. list.add(new RegistrantAccessPermission(entry.getKey(), entry.getValue(), true, RegistrantType.REPOSITORY));
  90. }
  91. Collections.sort(list);
  92. return list;
  93. }
  94. /**
  95. * Returns true if the team has any type of specified access permission for
  96. * this repository.
  97. *
  98. * @param name
  99. * @return true if team has a specified access permission for the repository
  100. */
  101. public boolean hasRepositoryPermission(String name) {
  102. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  103. if (permissions.containsKey(repository)) {
  104. // exact repository permission specified
  105. return true;
  106. } else {
  107. // search for regex permission match
  108. for (String key : permissions.keySet()) {
  109. if (name.matches(key)) {
  110. AccessPermission p = permissions.get(key);
  111. if (p != null) {
  112. return true;
  113. }
  114. }
  115. }
  116. }
  117. return false;
  118. }
  119. /**
  120. * Returns true if the team has an explicitly specified access permission for
  121. * this repository.
  122. *
  123. * @param name
  124. * @return if the team has an explicitly specified access permission
  125. */
  126. public boolean hasExplicitRepositoryPermission(String name) {
  127. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  128. return permissions.containsKey(repository);
  129. }
  130. /**
  131. * Adds a repository permission to the team.
  132. * <p>
  133. * Role may be formatted as:
  134. * <ul>
  135. * <li> myrepo.git <i>(this is implicitly RW+)</i>
  136. * <li> RW+:myrepo.git
  137. * </ul>
  138. * @param role
  139. */
  140. public void addRepositoryPermission(String role) {
  141. AccessPermission permission = AccessPermission.permissionFromRole(role);
  142. String repository = AccessPermission.repositoryFromRole(role).toLowerCase();
  143. repositories.add(repository);
  144. permissions.put(repository, permission);
  145. }
  146. public void addRepositoryPermissions(Collection<String> roles) {
  147. for (String role:roles) {
  148. addRepositoryPermission(role);
  149. }
  150. }
  151. public AccessPermission removeRepositoryPermission(String name) {
  152. String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
  153. repositories.remove(repository);
  154. return permissions.remove(repository);
  155. }
  156. public void setRepositoryPermission(String repository, AccessPermission permission) {
  157. permissions.put(repository.toLowerCase(), permission);
  158. repositories.add(repository.toLowerCase());
  159. }
  160. public AccessPermission getRepositoryPermission(RepositoryModel repository) {
  161. AccessPermission permission = AccessPermission.NONE;
  162. if (permissions.containsKey(repository.name.toLowerCase())) {
  163. // exact repository permission specified
  164. AccessPermission p = permissions.get(repository.name.toLowerCase());
  165. if (p != null) {
  166. permission = p;
  167. }
  168. } else {
  169. // search for case-insensitive regex permission match
  170. for (String key : permissions.keySet()) {
  171. if (StringUtils.matchesIgnoreCase(repository.name, key)) {
  172. AccessPermission p = permissions.get(key);
  173. if (p != null) {
  174. permission = p;
  175. }
  176. }
  177. }
  178. }
  179. return permission;
  180. }
  181. private boolean canAccess(RepositoryModel repository, AccessRestrictionType ifRestriction, AccessPermission requirePermission) {
  182. if (repository.accessRestriction.atLeast(ifRestriction)) {
  183. AccessPermission permission = getRepositoryPermission(repository);
  184. return permission.atLeast(requirePermission);
  185. }
  186. return true;
  187. }
  188. public boolean canView(RepositoryModel repository) {
  189. return canAccess(repository, AccessRestrictionType.VIEW, AccessPermission.VIEW);
  190. }
  191. public boolean canClone(RepositoryModel repository) {
  192. return canAccess(repository, AccessRestrictionType.CLONE, AccessPermission.CLONE);
  193. }
  194. public boolean canPush(RepositoryModel repository) {
  195. if (repository.isFrozen) {
  196. return false;
  197. }
  198. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.PUSH);
  199. }
  200. public boolean canCreateRef(RepositoryModel repository) {
  201. if (repository.isFrozen) {
  202. return false;
  203. }
  204. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.CREATE);
  205. }
  206. public boolean canDeleteRef(RepositoryModel repository) {
  207. if (repository.isFrozen) {
  208. return false;
  209. }
  210. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.DELETE);
  211. }
  212. public boolean canRewindRef(RepositoryModel repository) {
  213. if (repository.isFrozen) {
  214. return false;
  215. }
  216. return canAccess(repository, AccessRestrictionType.PUSH, AccessPermission.REWIND);
  217. }
  218. public boolean hasUser(String name) {
  219. return users.contains(name.toLowerCase());
  220. }
  221. public void addUser(String name) {
  222. users.add(name.toLowerCase());
  223. }
  224. public void addUsers(Collection<String> names) {
  225. for (String name:names) {
  226. users.add(name.toLowerCase());
  227. }
  228. }
  229. public void removeUser(String name) {
  230. users.remove(name.toLowerCase());
  231. }
  232. public void addMailingLists(Collection<String> addresses) {
  233. for (String address:addresses) {
  234. mailingLists.add(address.toLowerCase());
  235. }
  236. }
  237. @Override
  238. public String toString() {
  239. return name;
  240. }
  241. @Override
  242. public int compareTo(TeamModel o) {
  243. return name.compareTo(o.name);
  244. }
  245. }