Merge branch 'stable-2.15'

* stable-2.15:
  GitOverHttpModule: Bind REST auth filter in its own module
  Ensure user authentication in AllRequestFilter filters
  InitSshd: Use correct flag to set empty passphrase
  SshSession: Specify charset in constructor of Scanner
  Specify charset in constructors of InputStreamReader
  Update JGit dependencies to fix building from source
  PolyGerrit: Correctly detect the ACL for SetReadyForReview endpoint

Change-Id: I0e54a3d5a43e1898b1e4e36193b1dc5e2d69bef1
This commit is contained in:
David Ostrovsky
2018-09-01 07:25:16 +02:00
9 changed files with 94 additions and 48 deletions

View File

@@ -14,6 +14,8 @@
package com.google.gerrit.acceptance; package com.google.gerrit.acceptance;
import static java.nio.charset.StandardCharsets.UTF_8;
import com.google.common.base.Preconditions; import com.google.common.base.Preconditions;
import java.io.IOException; import java.io.IOException;
import java.io.InputStreamReader; import java.io.InputStreamReader;
@@ -34,7 +36,7 @@ public class HttpResponse {
public Reader getReader() throws IllegalStateException, IOException { public Reader getReader() throws IllegalStateException, IOException {
if (reader == null && response.getEntity() != null) { if (reader == null && response.getEntity() != null) {
reader = new InputStreamReader(response.getEntity().getContent()); reader = new InputStreamReader(response.getEntity().getContent(), UTF_8);
} }
return reader; return reader;
} }

View File

@@ -17,6 +17,7 @@ package com.google.gerrit.acceptance;
import static com.google.common.base.Preconditions.checkState; import static com.google.common.base.Preconditions.checkState;
import static com.google.common.truth.Truth.assertThat; import static com.google.common.truth.Truth.assertThat;
import static com.google.common.truth.Truth.assertWithMessage; import static com.google.common.truth.Truth.assertWithMessage;
import static java.nio.charset.StandardCharsets.UTF_8;
import com.google.gerrit.acceptance.testsuite.account.TestSshKeys; import com.google.gerrit.acceptance.testsuite.account.TestSshKeys;
import com.jcraft.jsch.ChannelExec; import com.jcraft.jsch.ChannelExec;
@@ -54,10 +55,10 @@ public class SshSession {
InputStream err = channel.getErrStream(); InputStream err = channel.getErrStream();
channel.connect(); channel.connect();
Scanner s = new Scanner(err).useDelimiter("\\A"); Scanner s = new Scanner(err, UTF_8.name()).useDelimiter("\\A");
error = s.hasNext() ? s.next() : null; error = s.hasNext() ? s.next() : null;
s = new Scanner(in).useDelimiter("\\A"); s = new Scanner(in, UTF_8.name()).useDelimiter("\\A");
return s.hasNext() ? s.next() : ""; return s.hasNext() ? s.next() : "";
} finally { } finally {
channel.disconnect(); channel.disconnect();

View File

@@ -0,0 +1,55 @@
// Copyright (C) 2018 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.gerrit.httpd;
import static com.google.gerrit.extensions.api.lfs.LfsDefinitions.LFS_URL_WO_AUTH_REGEX;
import com.google.gerrit.extensions.client.GitBasicAuthPolicy;
import com.google.gerrit.server.config.AuthConfig;
import com.google.inject.Inject;
import com.google.inject.servlet.ServletModule;
import javax.servlet.Filter;
/** Configures filter for authenticating REST requests. */
public class GerritAuthModule extends ServletModule {
private static final String NOT_AUTHORIZED_LFS_URL_REGEX = "^(?:(?!/a/))" + LFS_URL_WO_AUTH_REGEX;
private final AuthConfig authConfig;
@Inject
GerritAuthModule(AuthConfig authConfig) {
this.authConfig = authConfig;
}
@Override
protected void configureServlets() {
Class<? extends Filter> authFilter = retreiveAuthFilterFromConfig(authConfig);
filterRegex(NOT_AUTHORIZED_LFS_URL_REGEX).through(authFilter);
filter("/a/*").through(authFilter);
}
static Class<? extends Filter> retreiveAuthFilterFromConfig(AuthConfig authConfig) {
Class<? extends Filter> authFilter;
if (authConfig.isTrustContainerAuth()) {
authFilter = ContainerAuthFilter.class;
} else {
authFilter =
authConfig.getGitBasicAuthPolicy() == GitBasicAuthPolicy.OAUTH
? ProjectOAuthFilter.class
: ProjectBasicAuthFilter.class;
}
return authFilter;
}
}

View File

@@ -14,20 +14,16 @@
package com.google.gerrit.httpd; package com.google.gerrit.httpd;
import static com.google.gerrit.extensions.api.lfs.LfsDefinitions.LFS_URL_WO_AUTH_REGEX; import static com.google.gerrit.httpd.GitOverHttpServlet.URL_REGEX;
import com.google.gerrit.extensions.client.GitBasicAuthPolicy;
import com.google.gerrit.reviewdb.client.CoreDownloadSchemes; import com.google.gerrit.reviewdb.client.CoreDownloadSchemes;
import com.google.gerrit.server.config.AuthConfig; import com.google.gerrit.server.config.AuthConfig;
import com.google.gerrit.server.config.DownloadConfig; import com.google.gerrit.server.config.DownloadConfig;
import com.google.inject.Inject; import com.google.inject.Inject;
import com.google.inject.servlet.ServletModule; import com.google.inject.servlet.ServletModule;
import javax.servlet.Filter;
/** Configures Git access over HTTP with authentication. */ /** Configures Git access over HTTP with authentication. */
public class GitOverHttpModule extends ServletModule { public class GitOverHttpModule extends ServletModule {
private static final String NOT_AUTHORIZED_LFS_URL_REGEX = "^(?:(?!/a/))" + LFS_URL_WO_AUTH_REGEX;
private final AuthConfig authConfig; private final AuthConfig authConfig;
private final DownloadConfig downloadConfig; private final DownloadConfig downloadConfig;
@@ -39,28 +35,10 @@ public class GitOverHttpModule extends ServletModule {
@Override @Override
protected void configureServlets() { protected void configureServlets() {
Class<? extends Filter> authFilter; if (downloadConfig.getDownloadSchemes().contains(CoreDownloadSchemes.ANON_HTTP)
if (authConfig.isTrustContainerAuth()) { || downloadConfig.getDownloadSchemes().contains(CoreDownloadSchemes.HTTP)) {
authFilter = ContainerAuthFilter.class; filterRegex(URL_REGEX).through(GerritAuthModule.retreiveAuthFilterFromConfig(authConfig));
} else { serveRegex(URL_REGEX).with(GitOverHttpServlet.class);
authFilter =
authConfig.getGitBasicAuthPolicy() == GitBasicAuthPolicy.OAUTH
? ProjectOAuthFilter.class
: ProjectBasicAuthFilter.class;
} }
if (isHttpEnabled()) {
String git = GitOverHttpServlet.URL_REGEX;
filterRegex(git).through(authFilter);
serveRegex(git).with(GitOverHttpServlet.class);
}
filterRegex(NOT_AUTHORIZED_LFS_URL_REGEX).through(authFilter);
filter("/a/*").through(authFilter);
}
private boolean isHttpEnabled() {
return downloadConfig.getDownloadSchemes().contains(CoreDownloadSchemes.ANON_HTTP)
|| downloadConfig.getDownloadSchemes().contains(CoreDownloadSchemes.HTTP);
} }
} }

View File

@@ -23,6 +23,7 @@ import com.google.gerrit.elasticsearch.ElasticIndexModule;
import com.google.gerrit.extensions.client.AuthType; import com.google.gerrit.extensions.client.AuthType;
import com.google.gerrit.gpg.GpgModule; import com.google.gerrit.gpg.GpgModule;
import com.google.gerrit.httpd.AllRequestFilter; import com.google.gerrit.httpd.AllRequestFilter;
import com.google.gerrit.httpd.GerritAuthModule;
import com.google.gerrit.httpd.GetUserFilter; import com.google.gerrit.httpd.GetUserFilter;
import com.google.gerrit.httpd.GitOverHttpModule; import com.google.gerrit.httpd.GitOverHttpModule;
import com.google.gerrit.httpd.H2CacheBasedWebSession; import com.google.gerrit.httpd.H2CacheBasedWebSession;
@@ -422,9 +423,10 @@ public class WebAppInitializer extends GuiceServletContextListener implements Fi
private Injector createWebInjector() { private Injector createWebInjector() {
final List<Module> modules = new ArrayList<>(); final List<Module> modules = new ArrayList<>();
modules.add(RequestContextFilter.module()); modules.add(RequestContextFilter.module());
modules.add(AllRequestFilter.module());
modules.add(RequestMetricsFilter.module()); modules.add(RequestMetricsFilter.module());
modules.add(sysInjector.getInstance(GerritAuthModule.class));
modules.add(sysInjector.getInstance(GitOverHttpModule.class)); modules.add(sysInjector.getInstance(GitOverHttpModule.class));
modules.add(AllRequestFilter.module());
modules.add(sysInjector.getInstance(WebModule.class)); modules.add(sysInjector.getInstance(WebModule.class));
modules.add(sysInjector.getInstance(RequireSslFilter.Module.class)); modules.add(sysInjector.getInstance(RequireSslFilter.Module.class));
if (sshInjector != null) { if (sshInjector != null) {

View File

@@ -26,6 +26,7 @@ import com.google.gerrit.elasticsearch.ElasticIndexModule;
import com.google.gerrit.extensions.client.AuthType; import com.google.gerrit.extensions.client.AuthType;
import com.google.gerrit.gpg.GpgModule; import com.google.gerrit.gpg.GpgModule;
import com.google.gerrit.httpd.AllRequestFilter; import com.google.gerrit.httpd.AllRequestFilter;
import com.google.gerrit.httpd.GerritAuthModule;
import com.google.gerrit.httpd.GetUserFilter; import com.google.gerrit.httpd.GetUserFilter;
import com.google.gerrit.httpd.GitOverHttpModule; import com.google.gerrit.httpd.GitOverHttpModule;
import com.google.gerrit.httpd.H2CacheBasedWebSession; import com.google.gerrit.httpd.H2CacheBasedWebSession;
@@ -575,10 +576,11 @@ public class Daemon extends SiteProgram {
modules.add(new ProjectQoSFilter.Module()); modules.add(new ProjectQoSFilter.Module());
} }
modules.add(RequestContextFilter.module()); modules.add(RequestContextFilter.module());
modules.add(AllRequestFilter.module());
modules.add(RequestMetricsFilter.module()); modules.add(RequestMetricsFilter.module());
modules.add(H2CacheBasedWebSession.module()); modules.add(H2CacheBasedWebSession.module());
modules.add(sysInjector.getInstance(GerritAuthModule.class));
modules.add(sysInjector.getInstance(GitOverHttpModule.class)); modules.add(sysInjector.getInstance(GitOverHttpModule.class));
modules.add(AllRequestFilter.module());
modules.add(sysInjector.getInstance(WebModule.class)); modules.add(sysInjector.getInstance(WebModule.class));
modules.add(sysInjector.getInstance(RequireSslFilter.Module.class)); modules.add(sysInjector.getInstance(RequireSslFilter.Module.class));
modules.add(new HttpPluginModule()); modules.add(new HttpPluginModule());

View File

@@ -184,7 +184,7 @@ public class PushCertificateCheckerTest {
} }
String cert = payload + new String(bout.toByteArray(), UTF_8); String cert = payload + new String(bout.toByteArray(), UTF_8);
Reader reader = new InputStreamReader(new ByteArrayInputStream(cert.getBytes(UTF_8))); Reader reader = new InputStreamReader(new ByteArrayInputStream(cert.getBytes(UTF_8)), UTF_8);
PushCertificateParser parser = new PushCertificateParser(repo, signedPushConfig); PushCertificateParser parser = new PushCertificateParser(repo, signedPushConfig);
return parser.parse(reader); return parser.parse(reader);
} }

View File

@@ -122,7 +122,7 @@
_changeComments: Object, _changeComments: Object,
_canStartReview: { _canStartReview: {
type: Boolean, type: Boolean,
computed: '_computeCanStartReview(_loggedIn, _change, _account)', computed: '_computeCanStartReview(_change)',
}, },
_comments: Object, _comments: Object,
/** @type {?} */ /** @type {?} */
@@ -1341,9 +1341,9 @@
}); });
}, },
_computeCanStartReview(loggedIn, change, account) { _computeCanStartReview(change) {
return !!(loggedIn && change.work_in_progress && return !!(change.actions && change.actions.ready &&
change.owner._account_id === account._account_id); change.actions.ready.enabled);
}, },
_computeReplyDisabled() { return false; }, _computeReplyDisabled() { return false; },

View File

@@ -1411,18 +1411,24 @@ limitations under the License.
}); });
test('canStartReview computation', () => { test('canStartReview computation', () => {
const account1 = {_account_id: 1}; const change1 = {};
const account2 = {_account_id: 2}; const change2 = {
const change = { actions: {
owner: {_account_id: 1}, ready: {
enabled: true,
},
},
}; };
assert.isFalse(element._computeCanStartReview(true, change, account1)); const change3 = {
change.work_in_progress = false; actions: {
assert.isFalse(element._computeCanStartReview(true, change, account1)); ready: {
change.work_in_progress = true; label: 'Ready for Review',
assert.isTrue(element._computeCanStartReview(true, change, account1)); },
assert.isFalse(element._computeCanStartReview(false, change, account1)); },
assert.isFalse(element._computeCanStartReview(true, change, account2)); };
assert.isFalse(element._computeCanStartReview(change1));
assert.isTrue(element._computeCanStartReview(change2));
assert.isFalse(element._computeCanStartReview(change3));
}); });
}); });