| | |
| | | import org.apache.wicket.PageParameters;
|
| | | import org.apache.wicket.ajax.AjaxRequestTarget;
|
| | | import org.apache.wicket.ajax.form.AjaxFormChoiceComponentUpdatingBehavior;
|
| | | import org.apache.wicket.ajax.form.AjaxFormComponentUpdatingBehavior;
|
| | | import org.apache.wicket.behavior.SimpleAttributeModifier;
|
| | | import org.apache.wicket.extensions.markup.html.form.palette.Palette;
|
| | | import org.apache.wicket.markup.html.WebMarkupContainer;
|
| | |
| | | import org.apache.wicket.markup.html.form.DropDownChoice;
|
| | | import org.apache.wicket.markup.html.form.Form;
|
| | | import org.apache.wicket.markup.html.form.IChoiceRenderer;
|
| | | import org.apache.wicket.markup.html.form.RadioChoice;
|
| | | import org.apache.wicket.markup.html.form.TextField;
|
| | | import org.apache.wicket.markup.html.link.Link;
|
| | | import org.apache.wicket.markup.html.list.ListItem;
|
| | | import org.apache.wicket.markup.html.list.ListView;
|
| | | import org.apache.wicket.model.CompoundPropertyModel;
|
| | |
| | | import com.gitblit.wicket.GitBlitWebSession;
|
| | | import com.gitblit.wicket.StringChoiceRenderer;
|
| | | import com.gitblit.wicket.WicketUtils;
|
| | | import com.gitblit.wicket.panels.AccessPolicyPanel;
|
| | | import com.gitblit.wicket.panels.BasePanel.JavascriptEventConfirmation;
|
| | | import com.gitblit.wicket.panels.BulletListPanel;
|
| | | import com.gitblit.wicket.panels.RegistrantPermissionsPanel;
|
| | | import com.gitblit.wicket.panels.RepositoryNamePanel;
|
| | |
|
| | | public class EditRepositoryPage extends RootSubPage {
|
| | |
|
| | | private final boolean isCreate;
|
| | |
|
| | | RepositoryNamePanel namePanel;
|
| | |
|
| | | AccessPolicyPanel accessPolicyPanel;
|
| | |
|
| | | private boolean isAdmin;
|
| | |
|
| | |
| | | @Override
|
| | | protected void onSubmit() {
|
| | | try {
|
| | | // confirm a repository name was entered
|
| | | if (repositoryModel.name == null && StringUtils.isEmpty(repositoryModel.name)) {
|
| | | error(getString("gb.pleaseSetRepositoryName"));
|
| | | if (!namePanel.updateModel(repositoryModel)) {
|
| | | return;
|
| | | }
|
| | |
|
| | | // ensure name is trimmed
|
| | | repositoryModel.name = repositoryModel.name.trim();
|
| | |
|
| | | // automatically convert backslashes to forward slashes
|
| | | repositoryModel.name = repositoryModel.name.replace('\\', '/');
|
| | | // Automatically replace // with /
|
| | | repositoryModel.name = repositoryModel.name.replace("//", "/");
|
| | |
|
| | | // prohibit folder paths
|
| | | if (repositoryModel.name.startsWith("/")) {
|
| | | error(getString("gb.illegalLeadingSlash"));
|
| | | return;
|
| | | }
|
| | | if (repositoryModel.name.startsWith("../")) {
|
| | | error(getString("gb.illegalRelativeSlash"));
|
| | | return;
|
| | | }
|
| | | if (repositoryModel.name.contains("/../")) {
|
| | | error(getString("gb.illegalRelativeSlash"));
|
| | | return;
|
| | | }
|
| | | if (repositoryModel.name.endsWith("/")) {
|
| | | repositoryModel.name = repositoryModel.name.substring(0, repositoryModel.name.length() - 1);
|
| | | }
|
| | |
|
| | | // confirm valid characters in repository name
|
| | | Character c = StringUtils.findInvalidCharacter(repositoryModel.name);
|
| | | if (c != null) {
|
| | | error(MessageFormat.format(getString("gb.illegalCharacterRepositoryName"),
|
| | | c));
|
| | | return;
|
| | | }
|
| | |
|
| | | if (user.canCreate() && !user.canAdmin() && allowEditName) {
|
| | | // ensure repository name begins with the user's path
|
| | | if (!repositoryModel.name.startsWith(user.getPersonalPath())) {
|
| | | error(MessageFormat.format(getString("gb.illegalPersonalRepositoryLocation"),
|
| | | user.getPersonalPath()));
|
| | | return;
|
| | | }
|
| | |
|
| | | if (repositoryModel.name.equals(user.getPersonalPath())) {
|
| | | // reset path prefix and show error
|
| | | repositoryModel.name = user.getPersonalPath() + "/";
|
| | | error(getString("gb.pleaseSetRepositoryName"));
|
| | | return;
|
| | | }
|
| | | }
|
| | |
|
| | | // confirm access restriction selection
|
| | |
| | | }
|
| | | } catch (GitBlitException e) {
|
| | | error(e.getMessage());
|
| | | namePanel.resetModel(repositoryModel);
|
| | | return;
|
| | | }
|
| | | setRedirect(false);
|
| | | if (isCreate) {
|
| | | setResponsePage(RepositoriesPage.class);
|
| | | } else {
|
| | | setResponsePage(SummaryPage.class, WicketUtils.newRepositoryParameter(repositoryModel.name));
|
| | | }
|
| | | setResponsePage(SummaryPage.class, WicketUtils.newRepositoryParameter(repositoryModel.name));
|
| | | }
|
| | | };
|
| | |
|
| | |
| | | form.add(new SimpleAttributeModifier("autocomplete", "off"));
|
| | |
|
| | | // field names reflective match RepositoryModel fields
|
| | | form.add(new TextField<String>("name").setEnabled(allowEditName));
|
| | | form.add(new TextField<String>("description"));
|
| | | namePanel = new RepositoryNamePanel("namePanel", repositoryModel);
|
| | | namePanel.setEditable(allowEditName);
|
| | | form.add(namePanel);
|
| | |
|
| | | form.add(ownersPalette);
|
| | | form.add(new CheckBox("allowForks").setEnabled(app().settings().getBoolean(Keys.web.allowForking, true)));
|
| | | DropDownChoice<AccessRestrictionType> accessRestriction = new DropDownChoice<AccessRestrictionType>("accessRestriction",
|
| | | AccessRestrictionType.choices(app().settings().getBoolean(Keys.git.allowAnonymousPushes, false)), new AccessRestrictionRenderer());
|
| | | form.add(accessRestriction);
|
| | | form.add(new CheckBox("isFrozen"));
|
| | | // TODO enable origin definition
|
| | | form.add(new TextField<String>("origin").setEnabled(false/* isCreate */));
|
| | |
| | | form.add(new TextField<String>("mailingLists", mailingLists));
|
| | | form.add(indexedBranchesPalette);
|
| | |
|
| | | List<AuthorizationControl> acList = Arrays.asList(AuthorizationControl.values());
|
| | | final RadioChoice<AuthorizationControl> authorizationControl = new RadioChoice<Constants.AuthorizationControl>(
|
| | | "authorizationControl", acList, new AuthorizationControlRenderer());
|
| | | form.add(authorizationControl);
|
| | |
|
| | | final CheckBox verifyCommitter = new CheckBox("verifyCommitter");
|
| | | verifyCommitter.setOutputMarkupId(true);
|
| | | form.add(verifyCommitter);
|
| | |
| | | // anonymous everything, disable all controls
|
| | | usersPalette.setEnabled(false);
|
| | | teamsPalette.setEnabled(false);
|
| | | authorizationControl.setEnabled(false);
|
| | | verifyCommitter.setEnabled(false);
|
| | | } else {
|
| | | // authenticated something
|
| | | // enable authorization controls
|
| | | authorizationControl.setEnabled(true);
|
| | | verifyCommitter.setEnabled(true);
|
| | |
|
| | | boolean allowFineGrainedControls = repositoryModel.authorizationControl.equals(AuthorizationControl.NAMED);
|
| | |
| | | teamsPalette.setEnabled(allowFineGrainedControls);
|
| | | }
|
| | |
|
| | | accessRestriction.add(new AjaxFormComponentUpdatingBehavior("onchange") {
|
| | | AjaxFormChoiceComponentUpdatingBehavior callback = new AjaxFormChoiceComponentUpdatingBehavior() {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
|
| | | @Override
|
| | | protected void onUpdate(AjaxRequestTarget target) {
|
| | | // enable/disable permissions panel based on access restriction
|
| | | accessPolicyPanel.updateModel(repositoryModel);
|
| | |
|
| | | boolean allowAuthorizationControl = repositoryModel.accessRestriction.exceeds(AccessRestrictionType.NONE);
|
| | | authorizationControl.setEnabled(allowAuthorizationControl);
|
| | | verifyCommitter.setEnabled(allowAuthorizationControl);
|
| | |
|
| | | boolean allowFineGrainedControls = allowAuthorizationControl && repositoryModel.authorizationControl.equals(AuthorizationControl.NAMED);
|
| | |
| | | repositoryModel.authorizationControl = AuthorizationControl.NAMED;
|
| | | }
|
| | |
|
| | | target.addComponent(authorizationControl);
|
| | | target.addComponent(verifyCommitter);
|
| | | target.addComponent(usersPalette);
|
| | | target.addComponent(teamsPalette);
|
| | | }
|
| | | });
|
| | | };
|
| | |
|
| | | authorizationControl.add(new AjaxFormChoiceComponentUpdatingBehavior() {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
|
| | | @Override
|
| | | protected void onUpdate(AjaxRequestTarget target) {
|
| | | // enable/disable permissions panel based on access restriction
|
| | | boolean allowAuthorizationControl = repositoryModel.accessRestriction.exceeds(AccessRestrictionType.NONE);
|
| | | authorizationControl.setEnabled(allowAuthorizationControl);
|
| | |
|
| | | boolean allowFineGrainedControls = allowAuthorizationControl && repositoryModel.authorizationControl.equals(AuthorizationControl.NAMED);
|
| | | usersPalette.setEnabled(allowFineGrainedControls);
|
| | | teamsPalette.setEnabled(allowFineGrainedControls);
|
| | |
|
| | | if (allowFineGrainedControls) {
|
| | | repositoryModel.authorizationControl = AuthorizationControl.NAMED;
|
| | | }
|
| | |
|
| | | target.addComponent(authorizationControl);
|
| | | target.addComponent(usersPalette);
|
| | | target.addComponent(teamsPalette);
|
| | | }
|
| | | });
|
| | | accessPolicyPanel = new AccessPolicyPanel("accessPolicyPanel", repositoryModel, callback);
|
| | | form.add(accessPolicyPanel);
|
| | |
|
| | | List<CommitMessageRenderer> renderers = Arrays.asList(CommitMessageRenderer.values());
|
| | | DropDownChoice<CommitMessageRenderer> messageRendererChoice = new DropDownChoice<CommitMessageRenderer>("commitMessageRenderer", renderers);
|
| | |
| | |
|
| | | @Override
|
| | | public void onSubmit() {
|
| | | setResponsePage(RepositoriesPage.class);
|
| | | if (isCreate) {
|
| | | setResponsePage(RepositoriesPage.class);
|
| | | } else {
|
| | | setResponsePage(SummaryPage.class, WicketUtils.newRepositoryParameter(repositoryModel.name));
|
| | | }
|
| | | }
|
| | | };
|
| | | cancel.setDefaultFormProcessing(false);
|
| | | form.add(cancel);
|
| | |
|
| | | // the user can delete if deletions are allowed AND the user is an admin or the personal owner
|
| | | // assigned ownership is not sufficient to allow deletion
|
| | | boolean canDelete = !isCreate && app().repositories().canDelete(repositoryModel)
|
| | | && (user.canAdmin() || user.isMyPersonalRepository(repositoryModel.name));
|
| | |
|
| | | Link<Void> delete = new Link<Void>("delete") {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
|
| | | @Override
|
| | | public void onClick() {
|
| | | RepositoryModel latestModel = app().repositories().getRepositoryModel(repositoryModel.name);
|
| | | boolean canDelete = app().repositories().canDelete(latestModel);
|
| | | if (canDelete) {
|
| | | if (app().repositories().deleteRepositoryModel(latestModel)) {
|
| | | info(MessageFormat.format(getString("gb.repositoryDeleted"), latestModel));
|
| | | if (latestModel.isPersonalRepository()) {
|
| | | // redirect to user's profile page
|
| | | String prefix = app().settings().getString(Keys.git.userRepositoryPrefix, "~");
|
| | | String username = latestModel.projectPath.substring(prefix.length());
|
| | | setResponsePage(UserPage.class, WicketUtils.newUsernameParameter(username));
|
| | | } else {
|
| | | // redirect to server repositories page
|
| | | setResponsePage(RepositoriesPage.class);
|
| | | }
|
| | | } else {
|
| | | error(MessageFormat.format(getString("gb.repositoryDeleteFailed"), latestModel));
|
| | | }
|
| | | } else {
|
| | | error(MessageFormat.format(getString("gb.repositoryDeleteFailed"), latestModel));
|
| | | }
|
| | | }
|
| | | };
|
| | |
|
| | | if (canDelete) {
|
| | | delete.add(new JavascriptEventConfirmation("onclick", MessageFormat.format(
|
| | | getString("gb.deleteRepository"), repositoryModel)));
|
| | | }
|
| | | form.add(delete.setVisible(canDelete));
|
| | |
|
| | | add(form);
|
| | | }
|
| | |
| | | }
|
| | | }
|
| | |
|
| | | private class AccessRestrictionRenderer implements IChoiceRenderer<AccessRestrictionType> {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
|
| | | private final Map<AccessRestrictionType, String> map;
|
| | |
|
| | | public AccessRestrictionRenderer() {
|
| | | map = getAccessRestrictions();
|
| | | }
|
| | |
|
| | | @Override
|
| | | public String getDisplayValue(AccessRestrictionType type) {
|
| | | return map.get(type);
|
| | | }
|
| | |
|
| | | @Override
|
| | | public String getIdValue(AccessRestrictionType type, int index) {
|
| | | return Integer.toString(index);
|
| | | }
|
| | | }
|
| | |
|
| | | private class FederationTypeRenderer implements IChoiceRenderer<FederationStrategy> {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
| | |
|
| | | @Override
|
| | | public String getIdValue(FederationStrategy type, int index) {
|
| | | return Integer.toString(index);
|
| | | }
|
| | | }
|
| | |
|
| | | private class AuthorizationControlRenderer implements IChoiceRenderer<AuthorizationControl> {
|
| | |
|
| | | private static final long serialVersionUID = 1L;
|
| | |
|
| | | private final Map<AuthorizationControl, String> map;
|
| | |
|
| | | public AuthorizationControlRenderer() {
|
| | | map = getAuthorizationControls();
|
| | | }
|
| | |
|
| | | @Override
|
| | | public String getDisplayValue(AuthorizationControl type) {
|
| | | return map.get(type);
|
| | | }
|
| | |
|
| | | @Override
|
| | | public String getIdValue(AuthorizationControl type, int index) {
|
| | | return Integer.toString(index);
|
| | | }
|
| | | }
|