| | |
| | | import com.gitblit.manager.IGitblit;
|
| | | import com.gitblit.models.RepositoryModel;
|
| | | import com.gitblit.models.UserModel;
|
| | | import com.gitblit.tickets.BranchTicketService;
|
| | | import com.gitblit.utils.ArrayUtils;
|
| | | import com.gitblit.utils.ClientLogger;
|
| | | import com.gitblit.utils.CommitCache;
|
| | |
| | | }
|
| | |
|
| | | /**
|
| | | * Returns true if the user is permitted to apply the receive commands to
|
| | | * the repository.
|
| | | *
|
| | | * @param commands
|
| | | * @return true if the user may push these commands
|
| | | */
|
| | | protected boolean canPush(Collection<ReceiveCommand> commands) {
|
| | | // TODO Consider supporting branch permissions here (issue-36)
|
| | | // Not sure if that should be Gerrit-style, refs/meta/config, or
|
| | | // gitolite-style, permissions in users.conf
|
| | | //
|
| | | // How could commands be empty?
|
| | | //
|
| | | // Because a subclass, like PatchsetReceivePack, filters receive
|
| | | // commands before this method is called. This makes it possible for
|
| | | // this method to test an empty list. In this case, we assume that the
|
| | | // subclass receive pack properly enforces push restrictions. for the
|
| | | // ref.
|
| | | //
|
| | | // The empty test is not explicitly required, it's written here to
|
| | | // clarify special-case behavior.
|
| | |
|
| | | return commands.isEmpty() ? true : user.canPush(repository);
|
| | | }
|
| | |
|
| | | /**
|
| | | * Instrumentation point where the incoming push event has been parsed,
|
| | | * validated, objects created BUT refs have not been updated. You might
|
| | | * use this to enforce a branch-write permissions model.
|
| | |
| | | return;
|
| | | }
|
| | |
|
| | | if (!user.canPush(repository)) {
|
| | | if (!canPush(commands)) {
|
| | | // user does not have push permissions
|
| | | for (ReceiveCommand cmd : commands) {
|
| | | sendRejection(cmd, "User \"{0}\" does not have push permissions for \"{1}\"!", user.username, repository.name);
|
| | |
| | | default:
|
| | | break;
|
| | | }
|
| | | } else if (ref.equals(BranchTicketService.BRANCH)) {
|
| | | // ensure pushing user is an administrator OR an owner
|
| | | // i.e. prevent ticket tampering
|
| | | boolean permitted = user.canAdmin() || repository.isOwner(user.username);
|
| | | if (!permitted) {
|
| | | sendRejection(cmd, "{0} is not permitted to push to {1}", user.username, ref);
|
| | | }
|
| | | } else if (ref.startsWith(Constants.R_FOR)) {
|
| | | // prevent accidental push to refs/for
|
| | | sendRejection(cmd, "{0} is not configured to receive patchsets", repository.name);
|
| | | }
|
| | | }
|
| | |
|
| | |
| | | LOGGER.error(MessageFormat.format("Failed to update {0} pushlog", repository.name), e);
|
| | | }
|
| | |
|
| | | // check for updates pushed to the BranchTicketService branch
|
| | | // if the BranchTicketService is active it will reindex, as appropriate
|
| | | for (ReceiveCommand cmd : commands) {
|
| | | if (Result.OK.equals(cmd.getResult())
|
| | | && BranchTicketService.BRANCH.equals(cmd.getRefName())) {
|
| | | rp.getRepository().fireEvent(new ReceiveCommandEvent(repository, cmd));
|
| | | }
|
| | | }
|
| | |
|
| | | // run Groovy hook scripts
|
| | | Set<String> scripts = new LinkedHashSet<String>();
|
| | | scripts.addAll(gitblit.getPostReceiveScriptsInherited(repository));
|