From 1370d424a794ec191966b81f4f975161a38895dc Mon Sep 17 00:00:00 2001 From: Marcin Floryan <marcin.floryan@gmail.com> Date: Fri, 02 Nov 2012 17:03:49 -0400 Subject: [PATCH] A failure to download dependencies fails the build. Otherwise we proceed with lots of errors anyway. --- src/com/gitblit/GitBlit.java | 122 +++++++++++++++++++++++++--------------- 1 files changed, 77 insertions(+), 45 deletions(-) diff --git a/src/com/gitblit/GitBlit.java b/src/com/gitblit/GitBlit.java index 35451f6..0d37b44 100644 --- a/src/com/gitblit/GitBlit.java +++ b/src/com/gitblit/GitBlit.java @@ -660,46 +660,76 @@ * @return a user object or null */ public UserModel getUserModel(String username) { - UserModel user = userService.getUserModel(username); + UserModel user = userService.getUserModel(username); return user; + } + + /** + * Returns the effective list of permissions for this user, taking into account + * team memberships, ownerships. + * + * @param user + * @return the effective list of permissions for the user + */ + public List<RegistrantAccessPermission> getUserAccessPermissions(UserModel user) { + Set<RegistrantAccessPermission> set = new LinkedHashSet<RegistrantAccessPermission>(); + set.addAll(user.getRepositoryPermissions()); + // Flag missing repositories + for (RegistrantAccessPermission permission : set) { + if (permission.mutable && PermissionType.EXPLICIT.equals(permission.permissionType)) { + RepositoryModel rm = GitBlit.self().getRepositoryModel(permission.registrant); + if (rm == null) { + permission.permissionType = PermissionType.MISSING; + permission.mutable = false; + continue; + } + } + } + + // TODO reconsider ownership as a user property + // manually specify personal repository ownerships + for (RepositoryModel rm : repositoryListCache.values()) { + if (rm.isUsersPersonalRepository(user.username) || rm.isOwner(user.username)) { + RegistrantAccessPermission rp = new RegistrantAccessPermission(rm.name, AccessPermission.REWIND, + PermissionType.OWNER, RegistrantType.REPOSITORY, null, false); + // user may be owner of a repository to which they've inherited + // a team permission, replace any existing perm with owner perm + set.remove(rp); + set.add(rp); + } + } + + List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>(set); + Collections.sort(list); + return list; } /** - * Returns the list of users and their access permissions for the specified repository. + * Returns the list of users and their access permissions for the specified + * repository including permission source information such as the team or + * regular expression which sets the permission. * * @param repository - * @return a list of User-AccessPermission tuples + * @return a list of RegistrantAccessPermissions */ public List<RegistrantAccessPermission> getUserAccessPermissions(RepositoryModel repository) { - Set<RegistrantAccessPermission> permissions = new LinkedHashSet<RegistrantAccessPermission>(); - if (!StringUtils.isEmpty(repository.owner)) { - UserModel owner = userService.getUserModel(repository.owner); - if (owner != null) { - permissions.add(new RegistrantAccessPermission(owner.username, AccessPermission.REWIND, PermissionType.OWNER, RegistrantType.USER, false)); + List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>(); + if (AccessRestrictionType.NONE.equals(repository.accessRestriction)) { + // no permissions needed, REWIND for everyone! + return list; + } + if (AuthorizationControl.AUTHENTICATED.equals(repository.authorizationControl)) { + // no permissions needed, REWIND for authenticated! + return list; + } + // NAMED users and teams + for (UserModel user : userService.getAllUsers()) { + RegistrantAccessPermission ap = user.getRepositoryPermission(repository); + if (ap.permission.exceeds(AccessPermission.NONE)) { + list.add(ap); } } - if (repository.isPersonalRepository()) { - UserModel owner = userService.getUserModel(repository.projectPath.substring(1)); - if (owner != null) { - permissions.add(new RegistrantAccessPermission(owner.username, AccessPermission.REWIND, PermissionType.OWNER, RegistrantType.USER, false)); - } - } - for (String user : userService.getUsernamesForRepositoryRole(repository.name)) { - UserModel model = userService.getUserModel(user); - AccessPermission ap = model.getRepositoryPermission(repository); - PermissionType pType = PermissionType.REGEX; - boolean editable = false; - if (repository.isOwner(model.username)) { - pType = PermissionType.OWNER; - } else if (repository.isUsersPersonalRepository(model.username)) { - pType = PermissionType.OWNER; - } else if (model.hasExplicitRepositoryPermission(repository.name)) { - pType = PermissionType.EXPLICIT; - editable = true; - } - permissions.add(new RegistrantAccessPermission(user, ap, pType, RegistrantType.USER, editable)); - } - return new ArrayList<RegistrantAccessPermission>(permissions); + return list; } /** @@ -712,7 +742,7 @@ public boolean setUserAccessPermissions(RepositoryModel repository, Collection<RegistrantAccessPermission> permissions) { List<UserModel> users = new ArrayList<UserModel>(); for (RegistrantAccessPermission up : permissions) { - if (up.isEditable) { + if (up.mutable) { // only set editable defined permissions UserModel user = userService.getUserModel(up.registrant); user.setRepositoryPermission(repository.name, up.permission); @@ -823,25 +853,23 @@ } /** - * Returns the list of teams and their access permissions for the specified repository. + * Returns the list of teams and their access permissions for the specified + * repository including the source of the permission such as the admin flag + * or a regular expression. * * @param repository - * @return a list of Team-AccessPermission tuples + * @return a list of RegistrantAccessPermissions */ public List<RegistrantAccessPermission> getTeamAccessPermissions(RepositoryModel repository) { - List<RegistrantAccessPermission> permissions = new ArrayList<RegistrantAccessPermission>(); - for (String team : userService.getTeamnamesForRepositoryRole(repository.name)) { - TeamModel model = userService.getTeamModel(team); - AccessPermission ap = model.getRepositoryPermission(repository); - PermissionType pType = PermissionType.REGEX; - boolean editable = false; - if (model.hasExplicitRepositoryPermission(repository.name)) { - pType = PermissionType.EXPLICIT; - editable = true; + List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>(); + for (TeamModel team : userService.getAllTeams()) { + RegistrantAccessPermission ap = team.getRepositoryPermission(repository); + if (ap.permission.exceeds(AccessPermission.NONE)) { + list.add(ap); } - permissions.add(new RegistrantAccessPermission(team, ap, pType, RegistrantType.TEAM, editable)); } - return permissions; + Collections.sort(list); + return list; } /** @@ -854,7 +882,7 @@ public boolean setTeamAccessPermissions(RepositoryModel repository, Collection<RegistrantAccessPermission> permissions) { List<TeamModel> teams = new ArrayList<TeamModel>(); for (RegistrantAccessPermission tp : permissions) { - if (tp.isEditable) { + if (tp.mutable) { // only set explicitly defined access permissions TeamModel team = userService.getTeamModel(tp.registrant); team.setRepositoryPermission(repository.name, tp.permission); @@ -2226,6 +2254,8 @@ case PULL_SETTINGS: case PULL_SCRIPTS: return token.equals(all); + default: + break; } return false; } @@ -2369,6 +2399,8 @@ url = model.origin; } break; + default: + break; } if (federationSets.containsKey(token)) { -- Gitblit v1.9.1