From a502d96a860456ec5e8c96761db70f7cabb74751 Mon Sep 17 00:00:00 2001 From: Paul Martin <paul@paulsputer.com> Date: Sat, 30 Apr 2016 04:19:14 -0400 Subject: [PATCH] Merge pull request #1073 from gitblit/1062-DocEditorUpdates --- src/main/java/com/gitblit/models/UserModel.java | 100 ++++++++++++++++++++----------------------------- 1 files changed, 41 insertions(+), 59 deletions(-) diff --git a/src/main/java/com/gitblit/models/UserModel.java b/src/main/java/com/gitblit/models/UserModel.java index 3c33bd3..e152274 100644 --- a/src/main/java/com/gitblit/models/UserModel.java +++ b/src/main/java/com/gitblit/models/UserModel.java @@ -34,7 +34,6 @@ import com.gitblit.Constants.AuthorizationControl; import com.gitblit.Constants.PermissionType; import com.gitblit.Constants.RegistrantType; -import com.gitblit.Constants.Unused; import com.gitblit.utils.ArrayUtils; import com.gitblit.utils.ModelUtils; import com.gitblit.utils.StringUtils; @@ -68,6 +67,7 @@ public boolean canFork; public boolean canCreate; public boolean excludeFromFederation; + public boolean disabled; // retained for backwards-compatibility with RPC clients @Deprecated public final Set<String> repositories = new HashSet<String>(); @@ -98,57 +98,6 @@ return !Constants.EXTERNAL_ACCOUNT.equals(password) || accountType == null || accountType.isLocal(); - } - - /** - * This method does not take into consideration Ownership where the - * administrator has not explicitly granted access to the owner. - * - * @param repositoryName - * @return - */ - @Deprecated - public boolean canAccessRepository(String repositoryName) { - return canAdmin() || repositories.contains(repositoryName.toLowerCase()) - || hasTeamAccess(repositoryName); - } - - @Deprecated - @Unused - public boolean canAccessRepository(RepositoryModel repository) { - boolean isOwner = repository.isOwner(username); - boolean allowAuthenticated = isAuthenticated && AuthorizationControl.AUTHENTICATED.equals(repository.authorizationControl); - return canAdmin() || isOwner || repositories.contains(repository.name.toLowerCase()) - || hasTeamAccess(repository.name) || allowAuthenticated; - } - - @Deprecated - @Unused - public boolean hasTeamAccess(String repositoryName) { - for (TeamModel team : teams) { - if (team.hasRepositoryPermission(repositoryName)) { - return true; - } - } - return false; - } - - @Deprecated - @Unused - public boolean hasRepository(String name) { - return hasRepositoryPermission(name); - } - - @Deprecated - @Unused - public void addRepository(String name) { - addRepositoryPermission(name); - } - - @Deprecated - @Unused - public void removeRepository(String name) { - removeRepositoryPermission(name); } /** @@ -498,6 +447,31 @@ return canAdmin() || model.isUsersPersonalRepository(username) || model.isOwner(username); } + public boolean canEdit(TicketModel ticket, RepositoryModel repository) { + return isAuthenticated() && + (canPush(repository) + || (ticket != null && username.equals(ticket.responsible)) + || (ticket != null && username.equals(ticket.createdBy))); + } + + public boolean canAdmin(TicketModel ticket, RepositoryModel repository) { + return isAuthenticated() && + (canPush(repository) + || ticket != null && username.equals(ticket.responsible)); + } + + public boolean canReviewPatchset(RepositoryModel model) { + return isAuthenticated() && canClone(model); + } + + public boolean canApprovePatchset(RepositoryModel model) { + return isAuthenticated() && canPush(model); + } + + public boolean canVetoPatchset(RepositoryModel model) { + return isAuthenticated() && canPush(model); + } + /** * This returns true if the user has fork privileges or the user has fork * privileges because of a team membership. @@ -569,7 +543,7 @@ // admins can create any repository return true; } - if (canCreate) { + if (canCreate()) { String projectPath = StringUtils.getFirstPathElement(repository); if (!StringUtils.isEmpty(projectPath) && projectPath.equalsIgnoreCase(getPersonalPath())) { // personal repository @@ -577,6 +551,20 @@ } } return false; + } + + /** + * Returns true if the user is allowed to administer the specified repository + * + * @param repo + * @return true if the user can administer the repository + */ + public boolean canAdmin(RepositoryModel repo) { + return canAdmin() || repo.isOwner(username) || isMyPersonalRepository(repo.name); + } + + public boolean isAuthenticated() { + return !UserModel.ANONYMOUS.equals(this) && isAuthenticated; } public boolean isTeamMember(String teamname) { @@ -666,12 +654,6 @@ emailVerified = email.equalsIgnoreCase(emailAddress); } return nameVerified && emailVerified; - } - - @Deprecated - public boolean hasBranchPermission(String repositoryName, String branch) { - // Default UserModel doesn't implement branch-level security. Other Realms (i.e. Gerrit) may override this method. - return hasRepositoryPermission(repositoryName) || hasTeamRepositoryPermission(repositoryName); } public boolean isMyPersonalRepository(String repository) { -- Gitblit v1.9.1