| | |
| | |
|
| | | import java.text.MessageFormat;
|
| | |
|
| | | import javax.servlet.FilterConfig;
|
| | | import javax.servlet.http.HttpServletRequest;
|
| | |
|
| | | import com.gitblit.Constants.AccessRestrictionType;
|
| | |
| | | private IFederationManager federationManager;
|
| | |
|
| | | @Override
|
| | | protected void inject(ObjectGraph dagger) {
|
| | | super.inject(dagger);
|
| | | protected void inject(ObjectGraph dagger, FilterConfig filterConfig) {
|
| | | super.inject(dagger, filterConfig);
|
| | | this.settings = dagger.get(IStoredSettings.class);
|
| | | this.federationManager = dagger.get(IFederationManager.class);
|
| | | }
|
| | |
| | | return false;
|
| | | }
|
| | | if (action.equals(gitReceivePack)) {
|
| | | // Push request
|
| | | if (user.canPush(repository)) {
|
| | | return true;
|
| | | } else {
|
| | | // user is unauthorized to push to this repository
|
| | | logger.warn(MessageFormat.format("user {0} is not authorized to push to {1}",
|
| | | user.username, repository));
|
| | | return false;
|
| | | }
|
| | | // push permissions are enforced in the receive pack
|
| | | return true;
|
| | | } else if (action.equals(gitUploadPack)) {
|
| | | // Clone request
|
| | | if (user.canClone(repository)) {
|