diff options
Diffstat (limited to 'java/com/google/gerrit/common/data/GlobalCapability.java')
-rw-r--r-- | java/com/google/gerrit/common/data/GlobalCapability.java | 201 |
1 files changed, 201 insertions, 0 deletions
diff --git a/java/com/google/gerrit/common/data/GlobalCapability.java b/java/com/google/gerrit/common/data/GlobalCapability.java new file mode 100644 index 0000000000..3e112568da --- /dev/null +++ b/java/com/google/gerrit/common/data/GlobalCapability.java @@ -0,0 +1,201 @@ +// Copyright (C) 2011 The Android Open Source Project +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package com.google.gerrit.common.data; + +import java.util.ArrayList; +import java.util.Arrays; +import java.util.Collection; +import java.util.Collections; +import java.util.List; + +/** Server wide capabilities. Represented as {@link Permission} objects. */ +public class GlobalCapability { + /** Ability to access the database (with gsql). */ + public static final String ACCESS_DATABASE = "accessDatabase"; + + /** + * Denotes the server's administrators. + * + * <p>This is similar to UNIX root, or Windows SYSTEM account. Any user that has this capability + * can perform almost any other action, or can grant themselves the power to perform any other + * action on the site. Most of the other capabilities and permissions fall-back to the predicate + * "OR user has capability ADMINISTRATE_SERVER". + */ + public static final String ADMINISTRATE_SERVER = "administrateServer"; + + /** Maximum number of changes that may be pushed in a batch. */ + public static final String BATCH_CHANGES_LIMIT = "batchChangesLimit"; + + /** + * Default maximum number of changes that may be pushed in a batch, 0 means no limit. This is just + * used as a suggestion for prepopulating the field in the access UI. + */ + public static final int DEFAULT_MAX_BATCH_CHANGES_LIMIT = 0; + + /** Can create any account on the server. */ + public static final String CREATE_ACCOUNT = "createAccount"; + + /** Can create any group on the server. */ + public static final String CREATE_GROUP = "createGroup"; + + /** Can create any project on the server. */ + public static final String CREATE_PROJECT = "createProject"; + + /** + * Denotes who may email change reviewers and watchers. + * + * <p>This can be used to deny build bots from emailing reviewers and people who watch the change. + * Instead, only the authors of the change and those who starred it will be emailed. The allow + * rules are evaluated before deny rules, however the default is to allow emailing, if no explicit + * rule is matched. + */ + public static final String EMAIL_REVIEWERS = "emailReviewers"; + + /** Can flush any cache except the active web_sessions cache. */ + public static final String FLUSH_CACHES = "flushCaches"; + + /** Can terminate any task using the kill command. */ + public static final String KILL_TASK = "killTask"; + + /** + * Can perform limited server maintenance. + * + * <p>Includes tasks such as reindexing changes and flushing caches that may need to be performed + * regularly. Does <strong>not</strong> grant arbitrary read/write/ACL management permissions as + * does {@link #ADMINISTRATE_SERVER}. + */ + public static final String MAINTAIN_SERVER = "maintainServer"; + + /** Can modify any account on the server. */ + public static final String MODIFY_ACCOUNT = "modifyAccount"; + + /** Queue a user can access to submit their tasks to. */ + public static final String PRIORITY = "priority"; + + /** Maximum result limit per executed query. */ + public static final String QUERY_LIMIT = "queryLimit"; + + /** Default result limit per executed query. */ + public static final int DEFAULT_MAX_QUERY_LIMIT = 500; + + /** Can impersonate any user to see which refs they can read. */ + public static final String READ_AS = "readAs"; + + /** Ability to impersonate another user. */ + public static final String RUN_AS = "runAs"; + + /** Can run the Git garbage collection. */ + public static final String RUN_GC = "runGC"; + + /** Can perform streaming of Gerrit events. */ + public static final String STREAM_EVENTS = "streamEvents"; + + /** Can view all accounts, regardless of {@code accounts.visibility}. */ + public static final String VIEW_ALL_ACCOUNTS = "viewAllAccounts"; + + /** Can view the server's current cache states. */ + public static final String VIEW_CACHES = "viewCaches"; + + /** Can view open connections to the server's SSH port. */ + public static final String VIEW_CONNECTIONS = "viewConnections"; + + /** Can view all installed plugins. */ + public static final String VIEW_PLUGINS = "viewPlugins"; + + /** Can view all pending tasks in the queue (not just the filtered set). */ + public static final String VIEW_QUEUE = "viewQueue"; + + /** Can query permissions for any (project, user) pair */ + public static final String VIEW_ACCESS = "viewAccess"; + + private static final List<String> NAMES_ALL; + private static final List<String> NAMES_LC; + private static final String[] RANGE_NAMES = { + QUERY_LIMIT, BATCH_CHANGES_LIMIT, + }; + + static { + NAMES_ALL = new ArrayList<>(); + NAMES_ALL.add(ACCESS_DATABASE); + NAMES_ALL.add(ADMINISTRATE_SERVER); + NAMES_ALL.add(BATCH_CHANGES_LIMIT); + NAMES_ALL.add(CREATE_ACCOUNT); + NAMES_ALL.add(CREATE_GROUP); + NAMES_ALL.add(CREATE_PROJECT); + NAMES_ALL.add(EMAIL_REVIEWERS); + NAMES_ALL.add(FLUSH_CACHES); + NAMES_ALL.add(KILL_TASK); + NAMES_ALL.add(MAINTAIN_SERVER); + NAMES_ALL.add(MODIFY_ACCOUNT); + NAMES_ALL.add(PRIORITY); + NAMES_ALL.add(QUERY_LIMIT); + NAMES_ALL.add(READ_AS); + NAMES_ALL.add(RUN_AS); + NAMES_ALL.add(RUN_GC); + NAMES_ALL.add(STREAM_EVENTS); + NAMES_ALL.add(VIEW_ALL_ACCOUNTS); + NAMES_ALL.add(VIEW_CACHES); + NAMES_ALL.add(VIEW_CONNECTIONS); + NAMES_ALL.add(VIEW_PLUGINS); + NAMES_ALL.add(VIEW_QUEUE); + NAMES_ALL.add(VIEW_ACCESS); + + NAMES_LC = new ArrayList<>(NAMES_ALL.size()); + for (String name : NAMES_ALL) { + NAMES_LC.add(name.toLowerCase()); + } + } + + /** @return all valid capability names. */ + public static Collection<String> getAllNames() { + return Collections.unmodifiableList(NAMES_ALL); + } + + /** @return true if the name is recognized as a capability name. */ + public static boolean isGlobalCapability(String varName) { + return NAMES_LC.contains(varName.toLowerCase()); + } + + /** @return true if the capability should have a range attached. */ + public static boolean hasRange(String varName) { + for (String n : RANGE_NAMES) { + if (n.equalsIgnoreCase(varName)) { + return true; + } + } + return false; + } + + public static List<String> getRangeNames() { + return Collections.unmodifiableList(Arrays.asList(RANGE_NAMES)); + } + + /** @return the valid range for the capability if it has one, otherwise null. */ + public static PermissionRange.WithDefaults getRange(String varName) { + if (QUERY_LIMIT.equalsIgnoreCase(varName)) { + return new PermissionRange.WithDefaults( + varName, 0, Integer.MAX_VALUE, 0, DEFAULT_MAX_QUERY_LIMIT); + } + if (BATCH_CHANGES_LIMIT.equalsIgnoreCase(varName)) { + return new PermissionRange.WithDefaults( + varName, 0, Integer.MAX_VALUE, 0, DEFAULT_MAX_BATCH_CHANGES_LIMIT); + } + return null; + } + + private GlobalCapability() { + // Utility class, do not create instances. + } +} |