James Moger
2012-10-10 58e7ec808177e53981792b1489695a51d2c91fe5
Add regex permission matching to hasRepositoryPermission check (issue-36)
3 files modified
36 ■■■■■ changed files
src/com/gitblit/models/TeamModel.java 16 ●●●●● patch | view | raw | blame | history
src/com/gitblit/models/UserModel.java 16 ●●●●● patch | view | raw | blame | history
tests/com/gitblit/tests/PermissionsTest.java 4 ●●●● patch | view | raw | blame | history
src/com/gitblit/models/TeamModel.java
@@ -92,7 +92,21 @@
     */
    public boolean hasRepositoryPermission(String name) {
        String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
        return permissions.containsKey(repository) || repositories.contains(repository);
        if (permissions.containsKey(repository)) {
            // exact repository permission specified
            return true;
        } else {
            // search for regex permission match
            for (String key : permissions.keySet()) {
                if (name.matches(key)) {
                    AccessPermission p = permissions.get(key);
                    if (p != null) {
                        return true;
                    }
                }
            }
        }
        return false;
    }
    
    /**
src/com/gitblit/models/UserModel.java
@@ -132,7 +132,21 @@
     */
    public boolean hasRepositoryPermission(String name) {
        String repository = AccessPermission.repositoryFromRole(name).toLowerCase();
        return permissions.containsKey(repository) || repositories.contains(repository);
        if (permissions.containsKey(repository)) {
            // exact repository permission specified
            return true;
        } else {
            // search for regex permission match
            for (String key : permissions.keySet()) {
                if (name.matches(key)) {
                    AccessPermission p = permissions.get(key);
                    if (p != null) {
                        return true;
                    }
                }
            }
        }
        return false;
    }
    
    /**
tests/com/gitblit/tests/PermissionsTest.java
@@ -2329,6 +2329,7 @@
        UserModel user = new UserModel("test");
        repository.owner = user.username;
        assertFalse("user SHOULD NOT HAVE a repository permission!", user.hasRepositoryPermission(repository.name));
        assertTrue("owner CAN NOT view!", user.canView(repository));
        assertTrue("owner CAN NOT clone!", user.canClone(repository));
        assertTrue("owner CAN NOT push!", user.canPush(repository));
@@ -2352,6 +2353,7 @@
        UserModel user = new UserModel("test");
        repository.owner = user.username;
        assertFalse("user SHOULD NOT HAVE a repository permission!", user.hasRepositoryPermission(repository.name));
        assertTrue("user CAN NOT view!", user.canView(repository));
        assertTrue("user CAN NOT clone!", user.canClone(repository));
        assertTrue("user CAN NOT push!", user.canPush(repository));
@@ -2375,6 +2377,7 @@
        UserModel user = new UserModel("visitor");
        repository.owner = "test";
        assertFalse("user HAS a repository permission!", user.hasRepositoryPermission(repository.name));
        assertFalse("user CAN view!", user.canView(repository));
        assertFalse("user CAN clone!", user.canClone(repository));
        assertFalse("user CAN push!", user.canPush(repository));
@@ -2398,6 +2401,7 @@
        UserModel user = new UserModel("test");
        user.setRepositoryPermission("ubercool/[A-Za-z0-9-~_\\./]+", AccessPermission.CLONE);
        assertTrue("user DOES NOT HAVE a repository permission!", user.hasRepositoryPermission(repository.name));
        assertTrue("user CAN NOT view!", user.canView(repository));
        assertTrue("user CAN NOT clone!", user.canClone(repository));
        assertFalse("user CAN push!", user.canPush(repository));