diff options
Diffstat (limited to 'gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java')
-rw-r--r-- | gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java | 331 |
1 files changed, 0 insertions, 331 deletions
diff --git a/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java b/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java deleted file mode 100644 index 9fbb3551db..0000000000 --- a/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java +++ /dev/null @@ -1,331 +0,0 @@ -// Copyright (C) 2016 The Android Open Source Project -// -// Licensed under the Apache License, Version 2.0 (the "License"); -// you may not use this file except in compliance with the License. -// You may obtain a copy of the License at -// -// http://www.apache.org/licenses/LICENSE-2.0 -// -// Unless required by applicable law or agreed to in writing, software -// distributed under the License is distributed on an "AS IS" BASIS, -// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -// See the License for the specific language governing permissions and -// limitations under the License. - -package com.google.gerrit.server.project; - -import static com.google.gerrit.server.permissions.GlobalPermission.ADMINISTRATE_SERVER; -import static com.google.gerrit.server.permissions.ProjectPermission.CREATE_REF; -import static com.google.gerrit.server.permissions.ProjectPermission.CREATE_TAG_REF; -import static com.google.gerrit.server.permissions.RefPermission.CREATE_CHANGE; -import static com.google.gerrit.server.permissions.RefPermission.READ; -import static java.util.stream.Collectors.toMap; - -import com.google.common.collect.ImmutableBiMap; -import com.google.common.collect.Iterables; -import com.google.gerrit.common.data.AccessSection; -import com.google.gerrit.common.data.Permission; -import com.google.gerrit.common.data.PermissionRule; -import com.google.gerrit.common.data.RefConfigSection; -import com.google.gerrit.common.errors.NoSuchGroupException; -import com.google.gerrit.extensions.api.access.AccessSectionInfo; -import com.google.gerrit.extensions.api.access.PermissionInfo; -import com.google.gerrit.extensions.api.access.PermissionRuleInfo; -import com.google.gerrit.extensions.api.access.ProjectAccessInfo; -import com.google.gerrit.extensions.common.GroupInfo; -import com.google.gerrit.extensions.restapi.AuthException; -import com.google.gerrit.extensions.restapi.ResourceConflictException; -import com.google.gerrit.extensions.restapi.ResourceNotFoundException; -import com.google.gerrit.extensions.restapi.RestReadView; -import com.google.gerrit.reviewdb.client.AccountGroup; -import com.google.gerrit.reviewdb.client.Project; -import com.google.gerrit.reviewdb.client.RefNames; -import com.google.gerrit.server.CurrentUser; -import com.google.gerrit.server.account.GroupBackend; -import com.google.gerrit.server.account.GroupControl; -import com.google.gerrit.server.config.AllProjectsName; -import com.google.gerrit.server.git.MetaDataUpdate; -import com.google.gerrit.server.git.ProjectConfig; -import com.google.gerrit.server.group.GroupJson; -import com.google.gerrit.server.permissions.GlobalPermission; -import com.google.gerrit.server.permissions.PermissionBackend; -import com.google.gerrit.server.permissions.PermissionBackendException; -import com.google.gerrit.server.permissions.RefPermission; -import com.google.gwtorm.server.OrmException; -import com.google.inject.Inject; -import com.google.inject.Provider; -import com.google.inject.Singleton; -import java.io.IOException; -import java.util.HashMap; -import java.util.HashSet; -import java.util.Map; -import org.eclipse.jgit.errors.ConfigInvalidException; -import org.eclipse.jgit.errors.RepositoryNotFoundException; -import org.slf4j.Logger; -import org.slf4j.LoggerFactory; - -@Singleton -public class GetAccess implements RestReadView<ProjectResource> { - private static final Logger LOG = LoggerFactory.getLogger(GetAccess.class); - - /** Marker value used in {@code Map<?, GroupInfo>} for groups not visible to current user. */ - private static final GroupInfo INVISIBLE_SENTINEL = new GroupInfo(); - - public static final ImmutableBiMap<PermissionRule.Action, PermissionRuleInfo.Action> ACTION_TYPE = - ImmutableBiMap.of( - PermissionRule.Action.ALLOW, - PermissionRuleInfo.Action.ALLOW, - PermissionRule.Action.BATCH, - PermissionRuleInfo.Action.BATCH, - PermissionRule.Action.BLOCK, - PermissionRuleInfo.Action.BLOCK, - PermissionRule.Action.DENY, - PermissionRuleInfo.Action.DENY, - PermissionRule.Action.INTERACTIVE, - PermissionRuleInfo.Action.INTERACTIVE); - - private final Provider<CurrentUser> user; - private final PermissionBackend permissionBackend; - private final GroupControl.Factory groupControlFactory; - private final AllProjectsName allProjectsName; - private final ProjectJson projectJson; - private final ProjectCache projectCache; - private final MetaDataUpdate.Server metaDataUpdateFactory; - private final ProjectControl.GenericFactory projectControlFactory; - private final GroupBackend groupBackend; - private final GroupJson groupJson; - - @Inject - public GetAccess( - Provider<CurrentUser> self, - PermissionBackend permissionBackend, - GroupControl.Factory groupControlFactory, - AllProjectsName allProjectsName, - ProjectCache projectCache, - MetaDataUpdate.Server metaDataUpdateFactory, - ProjectJson projectJson, - ProjectControl.GenericFactory projectControlFactory, - GroupBackend groupBackend, - GroupJson groupJson) { - this.user = self; - this.permissionBackend = permissionBackend; - this.groupControlFactory = groupControlFactory; - this.allProjectsName = allProjectsName; - this.projectJson = projectJson; - this.projectCache = projectCache; - this.projectControlFactory = projectControlFactory; - this.metaDataUpdateFactory = metaDataUpdateFactory; - this.groupBackend = groupBackend; - this.groupJson = groupJson; - } - - public ProjectAccessInfo apply(Project.NameKey nameKey) - throws ResourceNotFoundException, ResourceConflictException, IOException, - PermissionBackendException, OrmException { - try { - return apply(new ProjectResource(projectControlFactory.controlFor(nameKey, user.get()))); - } catch (NoSuchProjectException e) { - throw new ResourceNotFoundException(nameKey.get()); - } - } - - @Override - public ProjectAccessInfo apply(ProjectResource rsrc) - throws ResourceNotFoundException, ResourceConflictException, IOException, - PermissionBackendException, OrmException { - // Load the current configuration from the repository, ensuring it's the most - // recent version available. If it differs from what was in the project - // state, force a cache flush now. - - Project.NameKey projectName = rsrc.getNameKey(); - ProjectAccessInfo info = new ProjectAccessInfo(); - ProjectControl pc = createProjectControl(projectName); - PermissionBackend.ForProject perm = permissionBackend.user(user).project(projectName); - - ProjectConfig config; - try (MetaDataUpdate md = metaDataUpdateFactory.create(projectName)) { - config = ProjectConfig.read(md); - - if (config.updateGroupNames(groupBackend)) { - md.setMessage("Update group names\n"); - config.commit(md); - projectCache.evict(config.getProject()); - pc = createProjectControl(projectName); - perm = permissionBackend.user(user).project(projectName); - } else if (config.getRevision() != null - && !config.getRevision().equals(pc.getProjectState().getConfig().getRevision())) { - projectCache.evict(config.getProject()); - pc = createProjectControl(projectName); - perm = permissionBackend.user(user).project(projectName); - } - } catch (ConfigInvalidException e) { - throw new ResourceConflictException(e.getMessage()); - } catch (RepositoryNotFoundException e) { - throw new ResourceNotFoundException(rsrc.getName()); - } - - info.local = new HashMap<>(); - info.ownerOf = new HashSet<>(); - Map<AccountGroup.UUID, GroupInfo> visibleGroups = new HashMap<>(); - boolean checkReadConfig = check(perm, RefNames.REFS_CONFIG, READ); - - for (AccessSection section : config.getAccessSections()) { - String name = section.getName(); - if (AccessSection.GLOBAL_CAPABILITIES.equals(name)) { - if (pc.isOwner()) { - info.local.put(name, createAccessSection(visibleGroups, section)); - info.ownerOf.add(name); - - } else if (checkReadConfig) { - info.local.put(section.getName(), createAccessSection(visibleGroups, section)); - } - - } else if (RefConfigSection.isValid(name)) { - if (pc.controlForRef(name).isOwner()) { - info.local.put(name, createAccessSection(visibleGroups, section)); - info.ownerOf.add(name); - - } else if (checkReadConfig) { - info.local.put(name, createAccessSection(visibleGroups, section)); - - } else if (check(perm, name, READ)) { - // Filter the section to only add rules describing groups that - // are visible to the current-user. This includes any group the - // user is a member of, as well as groups they own or that - // are visible to all users. - - AccessSection dst = null; - for (Permission srcPerm : section.getPermissions()) { - Permission dstPerm = null; - - for (PermissionRule srcRule : srcPerm.getRules()) { - AccountGroup.UUID groupId = srcRule.getGroup().getUUID(); - if (groupId == null) { - continue; - } - - GroupInfo group = loadGroup(visibleGroups, groupId); - - if (group != INVISIBLE_SENTINEL) { - if (dstPerm == null) { - if (dst == null) { - dst = new AccessSection(name); - info.local.put(name, createAccessSection(visibleGroups, dst)); - } - dstPerm = dst.getPermission(srcPerm.getName(), true); - } - dstPerm.add(srcRule); - } - } - } - } - } - } - - if (info.ownerOf.isEmpty() - && permissionBackend.user(user).test(GlobalPermission.ADMINISTRATE_SERVER)) { - // Special case: If the section list is empty, this project has no current - // access control information. Fall back to site administrators. - info.ownerOf.add(AccessSection.ALL); - } - - if (config.getRevision() != null) { - info.revision = config.getRevision().name(); - } - - ProjectState parent = Iterables.getFirst(pc.getProjectState().parents(), null); - if (parent != null) { - info.inheritsFrom = projectJson.format(parent.getProject()); - } - - if (projectName.equals(allProjectsName) - && permissionBackend.user(user).testOrFalse(ADMINISTRATE_SERVER)) { - info.ownerOf.add(AccessSection.GLOBAL_CAPABILITIES); - } - - info.isOwner = toBoolean(pc.isOwner()); - info.canUpload = - toBoolean( - pc.isOwner() - || (checkReadConfig && perm.ref(RefNames.REFS_CONFIG).testOrFalse(CREATE_CHANGE))); - info.canAdd = toBoolean(perm.testOrFalse(CREATE_REF)); - info.canAddTags = toBoolean(perm.testOrFalse(CREATE_TAG_REF)); - info.configVisible = checkReadConfig || pc.isOwner(); - - info.groups = - visibleGroups.entrySet().stream() - .filter(e -> e.getValue() != INVISIBLE_SENTINEL) - .collect(toMap(e -> e.getKey().get(), e -> e.getValue())); - - return info; - } - - private GroupInfo loadGroup(Map<AccountGroup.UUID, GroupInfo> visibleGroups, AccountGroup.UUID id) - throws OrmException { - GroupInfo group = visibleGroups.get(id); - if (group == null) { - try { - GroupControl control = groupControlFactory.controlFor(id); - group = INVISIBLE_SENTINEL; - if (control.isVisible()) { - group = groupJson.format(control.getGroup()); - group.id = null; - } - } catch (NoSuchGroupException e) { - LOG.warn("NoSuchGroupException; ignoring group " + id, e); - group = INVISIBLE_SENTINEL; - } - visibleGroups.put(id, group); - } - - return group; - } - - private static boolean check(PermissionBackend.ForProject ctx, String ref, RefPermission perm) - throws PermissionBackendException { - try { - ctx.ref(ref).check(perm); - return true; - } catch (AuthException denied) { - return false; - } - } - - private AccessSectionInfo createAccessSection( - Map<AccountGroup.UUID, GroupInfo> groups, AccessSection section) throws OrmException { - AccessSectionInfo accessSectionInfo = new AccessSectionInfo(); - accessSectionInfo.permissions = new HashMap<>(); - for (Permission p : section.getPermissions()) { - PermissionInfo pInfo = new PermissionInfo(p.getLabel(), p.getExclusiveGroup() ? true : null); - pInfo.rules = new HashMap<>(); - for (PermissionRule r : p.getRules()) { - PermissionRuleInfo info = - new PermissionRuleInfo(ACTION_TYPE.get(r.getAction()), r.getForce()); - if (r.hasRange()) { - info.max = r.getMax(); - info.min = r.getMin(); - } - AccountGroup.UUID group = r.getGroup().getUUID(); - if (group != null) { - pInfo.rules.put(group.get(), info); - loadGroup(groups, group); - } - } - accessSectionInfo.permissions.put(p.getName(), pInfo); - } - return accessSectionInfo; - } - - private ProjectControl createProjectControl(Project.NameKey projectName) - throws IOException, ResourceNotFoundException { - try { - return projectControlFactory.controlFor(projectName, user.get()); - } catch (NoSuchProjectException e) { - throw new ResourceNotFoundException(projectName.get()); - } - } - - private static Boolean toBoolean(boolean value) { - return value ? true : null; - } -} |