James Moger
2014-05-16 17e2d3407065a7433c7512c37a7cf7e7df63f337
src/main/java/com/gitblit/servlet/GitFilter.java
@@ -17,7 +17,7 @@
import java.text.MessageFormat;
import javax.inject.Inject;
import javax.servlet.FilterConfig;
import javax.servlet.http.HttpServletRequest;
import com.gitblit.Constants.AccessRestrictionType;
@@ -25,14 +25,12 @@
import com.gitblit.GitBlitException;
import com.gitblit.IStoredSettings;
import com.gitblit.Keys;
import com.gitblit.manager.IAuthenticationManager;
import com.gitblit.manager.IFederationManager;
import com.gitblit.manager.IRepositoryManager;
import com.gitblit.manager.IRuntimeManager;
import com.gitblit.manager.IUserManager;
import com.gitblit.models.RepositoryModel;
import com.gitblit.models.UserModel;
import com.gitblit.utils.StringUtils;
import dagger.ObjectGraph;
/**
 * The GitFilter is an AccessRestrictionFilter which ensures that Git client
@@ -51,24 +49,15 @@
   protected static final String[] suffixes = { gitReceivePack, gitUploadPack, "/info/refs", "/HEAD",
         "/objects" };
   private final IStoredSettings settings;
   private IStoredSettings settings;
   private final IUserManager userManager;
   private IFederationManager federationManager;
   private final IFederationManager federationManager;
   @Inject
   public GitFilter(
         IRuntimeManager runtimeManager,
         IUserManager userManager,
         IAuthenticationManager authenticationManager,
         IRepositoryManager repositoryManager,
         IFederationManager federationManager) {
      super(runtimeManager, authenticationManager, repositoryManager);
      this.settings = runtimeManager.getSettings();
      this.userManager = userManager;
      this.federationManager = federationManager;
   @Override
   protected void inject(ObjectGraph dagger, FilterConfig filterConfig) {
      super.inject(dagger, filterConfig);
      this.settings = dagger.get(IStoredSettings.class);
      this.federationManager = dagger.get(IFederationManager.class);
   }
   /**
@@ -203,15 +192,8 @@
         return false;
      }
      if (action.equals(gitReceivePack)) {
         // Push request
         if (user.canPush(repository)) {
            return true;
         } else {
            // user is unauthorized to push to this repository
            logger.warn(MessageFormat.format("user {0} is not authorized to push to {1}",
                  user.username, repository));
            return false;
         }
         // push permissions are enforced in the receive pack
         return true;
      } else if (action.equals(gitUploadPack)) {
         // Clone request
         if (user.canClone(repository)) {