| | |
| | | import java.security.Principal;
|
| | | import java.util.ArrayList;
|
| | | import java.util.Collections;
|
| | | import java.util.HashMap;
|
| | | import java.util.HashSet;
|
| | | import java.util.LinkedHashMap;
|
| | | import java.util.List;
|
| | | import java.util.Map;
|
| | | import java.util.Set;
|
| | |
| | | // retained for backwards-compatibility with RPC clients
|
| | | @Deprecated
|
| | | public final Set<String> repositories = new HashSet<String>();
|
| | | public final Map<String, AccessPermission> permissions = new HashMap<String, AccessPermission>();
|
| | | public final Map<String, AccessPermission> permissions = new LinkedHashMap<String, AccessPermission>();
|
| | | public final Set<TeamModel> teams = new HashSet<TeamModel>();
|
| | |
|
| | | // non-persisted fields
|
| | |
| | | public List<RegistrantAccessPermission> getRepositoryPermissions() {
|
| | | List<RegistrantAccessPermission> list = new ArrayList<RegistrantAccessPermission>();
|
| | | for (Map.Entry<String, AccessPermission> entry : permissions.entrySet()) {
|
| | | list.add(new RegistrantAccessPermission(entry.getKey(), entry.getValue(), RegistrantType.REPOSITORY));
|
| | | list.add(new RegistrantAccessPermission(entry.getKey(), entry.getValue(), true, RegistrantType.REPOSITORY));
|
| | | }
|
| | | Collections.sort(list);
|
| | | return list;
|
| | |
| | | }
|
| | | }
|
| | | return false;
|
| | | }
|
| | | |
| | | /**
|
| | | * Returns true if the user has an explicitly specified access permission for
|
| | | * this repository.
|
| | | * |
| | | * @param name
|
| | | * @return if the user has an explicitly specified access permission
|
| | | */
|
| | | public boolean hasExplicitRepositoryPermission(String name) {
|
| | | String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
|
| | | return permissions.containsKey(repository);
|
| | | }
|
| | |
|
| | | /**
|
| | |
| | | return AccessPermission.REWIND;
|
| | | }
|
| | |
|
| | | // determine best permission available based on user's personal permissions
|
| | | // and the permissions of teams of which the user belongs
|
| | | // explicit user permission OR user regex match is used
|
| | | // if that fails, then the best team permission is used
|
| | | AccessPermission permission = AccessPermission.NONE;
|
| | | if (permissions.containsKey(repository.name.toLowerCase())) {
|
| | | // exact repository permission specified, use it
|
| | |
| | | return p;
|
| | | }
|
| | | } else {
|
| | | // search for regex permission match
|
| | | // search for case-insensitive regex permission match
|
| | | for (String key : permissions.keySet()) {
|
| | | if (repository.name.matches(key)) {
|
| | | if (StringUtils.matchesIgnoreCase(repository.name, key)) {
|
| | | AccessPermission p = permissions.get(key);
|
| | | if (p != null) {
|
| | | // take first match
|
| | | permission = p;
|
| | | break;
|
| | | }
|
| | | }
|
| | | }
|
| | | }
|
| | |
|
| | | for (TeamModel team : teams) {
|
| | | AccessPermission p = team.getRepositoryPermission(repository);
|
| | | if (permission == null || p.exceeds(permission)) {
|
| | | // use team permission
|
| | | permission = p;
|
| | | if (AccessPermission.NONE.equals(permission)) {
|
| | | for (TeamModel team : teams) {
|
| | | AccessPermission p = team.getRepositoryPermission(repository);
|
| | | if (p.exceeds(permission)) {
|
| | | // use highest team permission
|
| | | permission = p;
|
| | | }
|
| | | }
|
| | | }
|
| | | return permission;
|