summaryrefslogtreecommitdiffstats
path: root/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java
diff options
context:
space:
mode:
Diffstat (limited to 'gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java')
-rw-r--r--gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java331
1 files changed, 0 insertions, 331 deletions
diff --git a/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java b/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java
deleted file mode 100644
index 9fbb3551db..0000000000
--- a/gerrit-server/src/main/java/com/google/gerrit/server/project/GetAccess.java
+++ /dev/null
@@ -1,331 +0,0 @@
-// Copyright (C) 2016 The Android Open Source Project
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-package com.google.gerrit.server.project;
-
-import static com.google.gerrit.server.permissions.GlobalPermission.ADMINISTRATE_SERVER;
-import static com.google.gerrit.server.permissions.ProjectPermission.CREATE_REF;
-import static com.google.gerrit.server.permissions.ProjectPermission.CREATE_TAG_REF;
-import static com.google.gerrit.server.permissions.RefPermission.CREATE_CHANGE;
-import static com.google.gerrit.server.permissions.RefPermission.READ;
-import static java.util.stream.Collectors.toMap;
-
-import com.google.common.collect.ImmutableBiMap;
-import com.google.common.collect.Iterables;
-import com.google.gerrit.common.data.AccessSection;
-import com.google.gerrit.common.data.Permission;
-import com.google.gerrit.common.data.PermissionRule;
-import com.google.gerrit.common.data.RefConfigSection;
-import com.google.gerrit.common.errors.NoSuchGroupException;
-import com.google.gerrit.extensions.api.access.AccessSectionInfo;
-import com.google.gerrit.extensions.api.access.PermissionInfo;
-import com.google.gerrit.extensions.api.access.PermissionRuleInfo;
-import com.google.gerrit.extensions.api.access.ProjectAccessInfo;
-import com.google.gerrit.extensions.common.GroupInfo;
-import com.google.gerrit.extensions.restapi.AuthException;
-import com.google.gerrit.extensions.restapi.ResourceConflictException;
-import com.google.gerrit.extensions.restapi.ResourceNotFoundException;
-import com.google.gerrit.extensions.restapi.RestReadView;
-import com.google.gerrit.reviewdb.client.AccountGroup;
-import com.google.gerrit.reviewdb.client.Project;
-import com.google.gerrit.reviewdb.client.RefNames;
-import com.google.gerrit.server.CurrentUser;
-import com.google.gerrit.server.account.GroupBackend;
-import com.google.gerrit.server.account.GroupControl;
-import com.google.gerrit.server.config.AllProjectsName;
-import com.google.gerrit.server.git.MetaDataUpdate;
-import com.google.gerrit.server.git.ProjectConfig;
-import com.google.gerrit.server.group.GroupJson;
-import com.google.gerrit.server.permissions.GlobalPermission;
-import com.google.gerrit.server.permissions.PermissionBackend;
-import com.google.gerrit.server.permissions.PermissionBackendException;
-import com.google.gerrit.server.permissions.RefPermission;
-import com.google.gwtorm.server.OrmException;
-import com.google.inject.Inject;
-import com.google.inject.Provider;
-import com.google.inject.Singleton;
-import java.io.IOException;
-import java.util.HashMap;
-import java.util.HashSet;
-import java.util.Map;
-import org.eclipse.jgit.errors.ConfigInvalidException;
-import org.eclipse.jgit.errors.RepositoryNotFoundException;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-@Singleton
-public class GetAccess implements RestReadView<ProjectResource> {
- private static final Logger LOG = LoggerFactory.getLogger(GetAccess.class);
-
- /** Marker value used in {@code Map<?, GroupInfo>} for groups not visible to current user. */
- private static final GroupInfo INVISIBLE_SENTINEL = new GroupInfo();
-
- public static final ImmutableBiMap<PermissionRule.Action, PermissionRuleInfo.Action> ACTION_TYPE =
- ImmutableBiMap.of(
- PermissionRule.Action.ALLOW,
- PermissionRuleInfo.Action.ALLOW,
- PermissionRule.Action.BATCH,
- PermissionRuleInfo.Action.BATCH,
- PermissionRule.Action.BLOCK,
- PermissionRuleInfo.Action.BLOCK,
- PermissionRule.Action.DENY,
- PermissionRuleInfo.Action.DENY,
- PermissionRule.Action.INTERACTIVE,
- PermissionRuleInfo.Action.INTERACTIVE);
-
- private final Provider<CurrentUser> user;
- private final PermissionBackend permissionBackend;
- private final GroupControl.Factory groupControlFactory;
- private final AllProjectsName allProjectsName;
- private final ProjectJson projectJson;
- private final ProjectCache projectCache;
- private final MetaDataUpdate.Server metaDataUpdateFactory;
- private final ProjectControl.GenericFactory projectControlFactory;
- private final GroupBackend groupBackend;
- private final GroupJson groupJson;
-
- @Inject
- public GetAccess(
- Provider<CurrentUser> self,
- PermissionBackend permissionBackend,
- GroupControl.Factory groupControlFactory,
- AllProjectsName allProjectsName,
- ProjectCache projectCache,
- MetaDataUpdate.Server metaDataUpdateFactory,
- ProjectJson projectJson,
- ProjectControl.GenericFactory projectControlFactory,
- GroupBackend groupBackend,
- GroupJson groupJson) {
- this.user = self;
- this.permissionBackend = permissionBackend;
- this.groupControlFactory = groupControlFactory;
- this.allProjectsName = allProjectsName;
- this.projectJson = projectJson;
- this.projectCache = projectCache;
- this.projectControlFactory = projectControlFactory;
- this.metaDataUpdateFactory = metaDataUpdateFactory;
- this.groupBackend = groupBackend;
- this.groupJson = groupJson;
- }
-
- public ProjectAccessInfo apply(Project.NameKey nameKey)
- throws ResourceNotFoundException, ResourceConflictException, IOException,
- PermissionBackendException, OrmException {
- try {
- return apply(new ProjectResource(projectControlFactory.controlFor(nameKey, user.get())));
- } catch (NoSuchProjectException e) {
- throw new ResourceNotFoundException(nameKey.get());
- }
- }
-
- @Override
- public ProjectAccessInfo apply(ProjectResource rsrc)
- throws ResourceNotFoundException, ResourceConflictException, IOException,
- PermissionBackendException, OrmException {
- // Load the current configuration from the repository, ensuring it's the most
- // recent version available. If it differs from what was in the project
- // state, force a cache flush now.
-
- Project.NameKey projectName = rsrc.getNameKey();
- ProjectAccessInfo info = new ProjectAccessInfo();
- ProjectControl pc = createProjectControl(projectName);
- PermissionBackend.ForProject perm = permissionBackend.user(user).project(projectName);
-
- ProjectConfig config;
- try (MetaDataUpdate md = metaDataUpdateFactory.create(projectName)) {
- config = ProjectConfig.read(md);
-
- if (config.updateGroupNames(groupBackend)) {
- md.setMessage("Update group names\n");
- config.commit(md);
- projectCache.evict(config.getProject());
- pc = createProjectControl(projectName);
- perm = permissionBackend.user(user).project(projectName);
- } else if (config.getRevision() != null
- && !config.getRevision().equals(pc.getProjectState().getConfig().getRevision())) {
- projectCache.evict(config.getProject());
- pc = createProjectControl(projectName);
- perm = permissionBackend.user(user).project(projectName);
- }
- } catch (ConfigInvalidException e) {
- throw new ResourceConflictException(e.getMessage());
- } catch (RepositoryNotFoundException e) {
- throw new ResourceNotFoundException(rsrc.getName());
- }
-
- info.local = new HashMap<>();
- info.ownerOf = new HashSet<>();
- Map<AccountGroup.UUID, GroupInfo> visibleGroups = new HashMap<>();
- boolean checkReadConfig = check(perm, RefNames.REFS_CONFIG, READ);
-
- for (AccessSection section : config.getAccessSections()) {
- String name = section.getName();
- if (AccessSection.GLOBAL_CAPABILITIES.equals(name)) {
- if (pc.isOwner()) {
- info.local.put(name, createAccessSection(visibleGroups, section));
- info.ownerOf.add(name);
-
- } else if (checkReadConfig) {
- info.local.put(section.getName(), createAccessSection(visibleGroups, section));
- }
-
- } else if (RefConfigSection.isValid(name)) {
- if (pc.controlForRef(name).isOwner()) {
- info.local.put(name, createAccessSection(visibleGroups, section));
- info.ownerOf.add(name);
-
- } else if (checkReadConfig) {
- info.local.put(name, createAccessSection(visibleGroups, section));
-
- } else if (check(perm, name, READ)) {
- // Filter the section to only add rules describing groups that
- // are visible to the current-user. This includes any group the
- // user is a member of, as well as groups they own or that
- // are visible to all users.
-
- AccessSection dst = null;
- for (Permission srcPerm : section.getPermissions()) {
- Permission dstPerm = null;
-
- for (PermissionRule srcRule : srcPerm.getRules()) {
- AccountGroup.UUID groupId = srcRule.getGroup().getUUID();
- if (groupId == null) {
- continue;
- }
-
- GroupInfo group = loadGroup(visibleGroups, groupId);
-
- if (group != INVISIBLE_SENTINEL) {
- if (dstPerm == null) {
- if (dst == null) {
- dst = new AccessSection(name);
- info.local.put(name, createAccessSection(visibleGroups, dst));
- }
- dstPerm = dst.getPermission(srcPerm.getName(), true);
- }
- dstPerm.add(srcRule);
- }
- }
- }
- }
- }
- }
-
- if (info.ownerOf.isEmpty()
- && permissionBackend.user(user).test(GlobalPermission.ADMINISTRATE_SERVER)) {
- // Special case: If the section list is empty, this project has no current
- // access control information. Fall back to site administrators.
- info.ownerOf.add(AccessSection.ALL);
- }
-
- if (config.getRevision() != null) {
- info.revision = config.getRevision().name();
- }
-
- ProjectState parent = Iterables.getFirst(pc.getProjectState().parents(), null);
- if (parent != null) {
- info.inheritsFrom = projectJson.format(parent.getProject());
- }
-
- if (projectName.equals(allProjectsName)
- && permissionBackend.user(user).testOrFalse(ADMINISTRATE_SERVER)) {
- info.ownerOf.add(AccessSection.GLOBAL_CAPABILITIES);
- }
-
- info.isOwner = toBoolean(pc.isOwner());
- info.canUpload =
- toBoolean(
- pc.isOwner()
- || (checkReadConfig && perm.ref(RefNames.REFS_CONFIG).testOrFalse(CREATE_CHANGE)));
- info.canAdd = toBoolean(perm.testOrFalse(CREATE_REF));
- info.canAddTags = toBoolean(perm.testOrFalse(CREATE_TAG_REF));
- info.configVisible = checkReadConfig || pc.isOwner();
-
- info.groups =
- visibleGroups.entrySet().stream()
- .filter(e -> e.getValue() != INVISIBLE_SENTINEL)
- .collect(toMap(e -> e.getKey().get(), e -> e.getValue()));
-
- return info;
- }
-
- private GroupInfo loadGroup(Map<AccountGroup.UUID, GroupInfo> visibleGroups, AccountGroup.UUID id)
- throws OrmException {
- GroupInfo group = visibleGroups.get(id);
- if (group == null) {
- try {
- GroupControl control = groupControlFactory.controlFor(id);
- group = INVISIBLE_SENTINEL;
- if (control.isVisible()) {
- group = groupJson.format(control.getGroup());
- group.id = null;
- }
- } catch (NoSuchGroupException e) {
- LOG.warn("NoSuchGroupException; ignoring group " + id, e);
- group = INVISIBLE_SENTINEL;
- }
- visibleGroups.put(id, group);
- }
-
- return group;
- }
-
- private static boolean check(PermissionBackend.ForProject ctx, String ref, RefPermission perm)
- throws PermissionBackendException {
- try {
- ctx.ref(ref).check(perm);
- return true;
- } catch (AuthException denied) {
- return false;
- }
- }
-
- private AccessSectionInfo createAccessSection(
- Map<AccountGroup.UUID, GroupInfo> groups, AccessSection section) throws OrmException {
- AccessSectionInfo accessSectionInfo = new AccessSectionInfo();
- accessSectionInfo.permissions = new HashMap<>();
- for (Permission p : section.getPermissions()) {
- PermissionInfo pInfo = new PermissionInfo(p.getLabel(), p.getExclusiveGroup() ? true : null);
- pInfo.rules = new HashMap<>();
- for (PermissionRule r : p.getRules()) {
- PermissionRuleInfo info =
- new PermissionRuleInfo(ACTION_TYPE.get(r.getAction()), r.getForce());
- if (r.hasRange()) {
- info.max = r.getMax();
- info.min = r.getMin();
- }
- AccountGroup.UUID group = r.getGroup().getUUID();
- if (group != null) {
- pInfo.rules.put(group.get(), info);
- loadGroup(groups, group);
- }
- }
- accessSectionInfo.permissions.put(p.getName(), pInfo);
- }
- return accessSectionInfo;
- }
-
- private ProjectControl createProjectControl(Project.NameKey projectName)
- throws IOException, ResourceNotFoundException {
- try {
- return projectControlFactory.controlFor(projectName, user.get());
- } catch (NoSuchProjectException e) {
- throw new ResourceNotFoundException(projectName.get());
- }
- }
-
- private static Boolean toBoolean(boolean value) {
- return value ? true : null;
- }
-}