Merge "Remove CapabilityControl from CurrentUser"
This commit is contained in:
commit
f80e91155b
@ -20,6 +20,7 @@ import static java.util.concurrent.TimeUnit.MINUTES;
|
|||||||
import static javax.servlet.http.HttpServletResponse.SC_SERVICE_UNAVAILABLE;
|
import static javax.servlet.http.HttpServletResponse.SC_SERVICE_UNAVAILABLE;
|
||||||
|
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.config.GerritServerConfig;
|
import com.google.gerrit.server.config.GerritServerConfig;
|
||||||
import com.google.gerrit.server.git.QueueProvider;
|
import com.google.gerrit.server.git.QueueProvider;
|
||||||
import com.google.gerrit.server.git.WorkQueue.CancelableRunnable;
|
import com.google.gerrit.server.git.WorkQueue.CancelableRunnable;
|
||||||
@ -69,7 +70,6 @@ public class ProjectQoSFilter implements Filter {
|
|||||||
private static final Pattern URI_PATTERN = Pattern.compile(FILTER_RE);
|
private static final Pattern URI_PATTERN = Pattern.compile(FILTER_RE);
|
||||||
|
|
||||||
public static class Module extends ServletModule {
|
public static class Module extends ServletModule {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected void configureServlets() {
|
protected void configureServlets() {
|
||||||
bind(QueueProvider.class).to(CommandExecutorQueueProvider.class).in(SINGLETON);
|
bind(QueueProvider.class).to(CommandExecutorQueueProvider.class).in(SINGLETON);
|
||||||
@ -77,18 +77,20 @@ public class ProjectQoSFilter implements Filter {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
private final Provider<CurrentUser> user;
|
private final Provider<CurrentUser> user;
|
||||||
private final QueueProvider queue;
|
private final QueueProvider queue;
|
||||||
|
|
||||||
private final ServletContext context;
|
private final ServletContext context;
|
||||||
private final long maxWait;
|
private final long maxWait;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
ProjectQoSFilter(
|
ProjectQoSFilter(
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Provider<CurrentUser> user,
|
Provider<CurrentUser> user,
|
||||||
QueueProvider queue,
|
QueueProvider queue,
|
||||||
ServletContext context,
|
ServletContext context,
|
||||||
@GerritServerConfig Config cfg) {
|
@GerritServerConfig Config cfg) {
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
this.user = user;
|
this.user = user;
|
||||||
this.queue = queue;
|
this.queue = queue;
|
||||||
this.context = context;
|
this.context = context;
|
||||||
@ -137,7 +139,8 @@ public class ProjectQoSFilter implements Filter {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private ScheduledThreadPoolExecutor getExecutor() {
|
private ScheduledThreadPoolExecutor getExecutor() {
|
||||||
return queue.getQueue(user.get().getCapabilities().getQueueType());
|
QueueProvider.QueueType qt = capabilityFactory.create(user.get()).getQueueType();
|
||||||
|
return queue.getQueue(qt);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -32,7 +32,6 @@ import com.google.gerrit.server.account.AccountCacheImpl;
|
|||||||
import com.google.gerrit.server.account.AccountVisibility;
|
import com.google.gerrit.server.account.AccountVisibility;
|
||||||
import com.google.gerrit.server.account.AccountVisibilityProvider;
|
import com.google.gerrit.server.account.AccountVisibilityProvider;
|
||||||
import com.google.gerrit.server.account.CapabilityCollection;
|
import com.google.gerrit.server.account.CapabilityCollection;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.FakeRealm;
|
import com.google.gerrit.server.account.FakeRealm;
|
||||||
import com.google.gerrit.server.account.GroupCacheImpl;
|
import com.google.gerrit.server.account.GroupCacheImpl;
|
||||||
import com.google.gerrit.server.account.GroupIncludeCacheImpl;
|
import com.google.gerrit.server.account.GroupIncludeCacheImpl;
|
||||||
@ -164,7 +163,6 @@ public class BatchProgramModule extends FactoryModule {
|
|||||||
install(MergeabilityCacheImpl.module());
|
install(MergeabilityCacheImpl.module());
|
||||||
install(TagCache.module());
|
install(TagCache.module());
|
||||||
factory(CapabilityCollection.Factory.class);
|
factory(CapabilityCollection.Factory.class);
|
||||||
factory(CapabilityControl.Factory.class);
|
|
||||||
factory(ChangeData.Factory.class);
|
factory(ChangeData.Factory.class);
|
||||||
factory(ProjectState.Factory.class);
|
factory(ProjectState.Factory.class);
|
||||||
|
|
||||||
|
@ -14,20 +14,13 @@
|
|||||||
|
|
||||||
package com.google.gerrit.server;
|
package com.google.gerrit.server;
|
||||||
|
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.gerrit.server.account.ListGroupMembership;
|
import com.google.gerrit.server.account.ListGroupMembership;
|
||||||
import com.google.gerrit.server.group.SystemGroupBackend;
|
import com.google.gerrit.server.group.SystemGroupBackend;
|
||||||
import com.google.inject.Inject;
|
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
|
|
||||||
/** An anonymous user who has not yet authenticated. */
|
/** An anonymous user who has not yet authenticated. */
|
||||||
public class AnonymousUser extends CurrentUser {
|
public class AnonymousUser extends CurrentUser {
|
||||||
@Inject
|
|
||||||
AnonymousUser(CapabilityControl.Factory capabilityControlFactory) {
|
|
||||||
super(capabilityControlFactory);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public GroupMembership getEffectiveGroups() {
|
public GroupMembership getEffectiveGroups() {
|
||||||
return new ListGroupMembership(Collections.singleton(SystemGroupBackend.ANONYMOUS_USERS));
|
return new ListGroupMembership(Collections.singleton(SystemGroupBackend.ANONYMOUS_USERS));
|
||||||
|
@ -16,7 +16,6 @@ package com.google.gerrit.server;
|
|||||||
|
|
||||||
import com.google.gerrit.common.Nullable;
|
import com.google.gerrit.common.Nullable;
|
||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.gerrit.server.account.externalids.ExternalId;
|
import com.google.gerrit.server.account.externalids.ExternalId;
|
||||||
import com.google.inject.servlet.RequestScoped;
|
import com.google.inject.servlet.RequestScoped;
|
||||||
@ -40,16 +39,9 @@ public abstract class CurrentUser {
|
|||||||
private PropertyKey() {}
|
private PropertyKey() {}
|
||||||
}
|
}
|
||||||
|
|
||||||
private final CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
private AccessPath accessPath = AccessPath.UNKNOWN;
|
private AccessPath accessPath = AccessPath.UNKNOWN;
|
||||||
|
|
||||||
private CapabilityControl capabilities;
|
|
||||||
private PropertyKey<ExternalId.Key> lastLoginExternalIdPropertyKey = PropertyKey.create();
|
private PropertyKey<ExternalId.Key> lastLoginExternalIdPropertyKey = PropertyKey.create();
|
||||||
|
|
||||||
protected CurrentUser(CapabilityControl.Factory capabilityControlFactory) {
|
|
||||||
this.capabilityControlFactory = capabilityControlFactory;
|
|
||||||
}
|
|
||||||
|
|
||||||
/** How this user is accessing the Gerrit Code Review application. */
|
/** How this user is accessing the Gerrit Code Review application. */
|
||||||
public final AccessPath getAccessPath() {
|
public final AccessPath getAccessPath() {
|
||||||
return accessPath;
|
return accessPath;
|
||||||
@ -98,14 +90,6 @@ public abstract class CurrentUser {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Capabilities available to this user account. */
|
|
||||||
public CapabilityControl getCapabilities() {
|
|
||||||
if (capabilities == null) {
|
|
||||||
capabilities = capabilityControlFactory.create(this);
|
|
||||||
}
|
|
||||||
return capabilities;
|
|
||||||
}
|
|
||||||
|
|
||||||
/** Check if user is the IdentifiedUser */
|
/** Check if user is the IdentifiedUser */
|
||||||
public boolean isIdentifiedUser() {
|
public boolean isIdentifiedUser() {
|
||||||
return false;
|
return false;
|
||||||
|
@ -21,7 +21,6 @@ import com.google.gerrit.common.Nullable;
|
|||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.server.account.AccountCache;
|
import com.google.gerrit.server.account.AccountCache;
|
||||||
import com.google.gerrit.server.account.AccountState;
|
import com.google.gerrit.server.account.AccountState;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupBackend;
|
import com.google.gerrit.server.account.GroupBackend;
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.gerrit.server.account.ListGroupMembership;
|
import com.google.gerrit.server.account.ListGroupMembership;
|
||||||
@ -55,7 +54,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
/** Create an IdentifiedUser, ignoring any per-request state. */
|
/** Create an IdentifiedUser, ignoring any per-request state. */
|
||||||
@Singleton
|
@Singleton
|
||||||
public static class GenericFactory {
|
public static class GenericFactory {
|
||||||
private final CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
private final AuthConfig authConfig;
|
private final AuthConfig authConfig;
|
||||||
private final Realm realm;
|
private final Realm realm;
|
||||||
private final String anonymousCowardName;
|
private final String anonymousCowardName;
|
||||||
@ -66,7 +64,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
public GenericFactory(
|
public GenericFactory(
|
||||||
@Nullable CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
AuthConfig authConfig,
|
AuthConfig authConfig,
|
||||||
Realm realm,
|
Realm realm,
|
||||||
@AnonymousCowardName String anonymousCowardName,
|
@AnonymousCowardName String anonymousCowardName,
|
||||||
@ -74,7 +71,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
@DisableReverseDnsLookup Boolean disableReverseDnsLookup,
|
@DisableReverseDnsLookup Boolean disableReverseDnsLookup,
|
||||||
AccountCache accountCache,
|
AccountCache accountCache,
|
||||||
GroupBackend groupBackend) {
|
GroupBackend groupBackend) {
|
||||||
this.capabilityControlFactory = capabilityControlFactory;
|
|
||||||
this.authConfig = authConfig;
|
this.authConfig = authConfig;
|
||||||
this.realm = realm;
|
this.realm = realm;
|
||||||
this.anonymousCowardName = anonymousCowardName;
|
this.anonymousCowardName = anonymousCowardName;
|
||||||
@ -86,7 +82,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
|
|
||||||
public IdentifiedUser create(AccountState state) {
|
public IdentifiedUser create(AccountState state) {
|
||||||
return new IdentifiedUser(
|
return new IdentifiedUser(
|
||||||
capabilityControlFactory,
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
@ -110,7 +105,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
public IdentifiedUser runAs(
|
public IdentifiedUser runAs(
|
||||||
SocketAddress remotePeer, Account.Id id, @Nullable CurrentUser caller) {
|
SocketAddress remotePeer, Account.Id id, @Nullable CurrentUser caller) {
|
||||||
return new IdentifiedUser(
|
return new IdentifiedUser(
|
||||||
capabilityControlFactory,
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
@ -132,7 +126,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
*/
|
*/
|
||||||
@Singleton
|
@Singleton
|
||||||
public static class RequestFactory {
|
public static class RequestFactory {
|
||||||
private final CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
private final AuthConfig authConfig;
|
private final AuthConfig authConfig;
|
||||||
private final Realm realm;
|
private final Realm realm;
|
||||||
private final String anonymousCowardName;
|
private final String anonymousCowardName;
|
||||||
@ -144,7 +137,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
RequestFactory(
|
RequestFactory(
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
AuthConfig authConfig,
|
AuthConfig authConfig,
|
||||||
Realm realm,
|
Realm realm,
|
||||||
@AnonymousCowardName String anonymousCowardName,
|
@AnonymousCowardName String anonymousCowardName,
|
||||||
@ -153,7 +145,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
GroupBackend groupBackend,
|
GroupBackend groupBackend,
|
||||||
@DisableReverseDnsLookup Boolean disableReverseDnsLookup,
|
@DisableReverseDnsLookup Boolean disableReverseDnsLookup,
|
||||||
@RemotePeer Provider<SocketAddress> remotePeerProvider) {
|
@RemotePeer Provider<SocketAddress> remotePeerProvider) {
|
||||||
this.capabilityControlFactory = capabilityControlFactory;
|
|
||||||
this.authConfig = authConfig;
|
this.authConfig = authConfig;
|
||||||
this.realm = realm;
|
this.realm = realm;
|
||||||
this.anonymousCowardName = anonymousCowardName;
|
this.anonymousCowardName = anonymousCowardName;
|
||||||
@ -166,7 +157,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
|
|
||||||
public IdentifiedUser create(Account.Id id) {
|
public IdentifiedUser create(Account.Id id) {
|
||||||
return new IdentifiedUser(
|
return new IdentifiedUser(
|
||||||
capabilityControlFactory,
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
@ -181,7 +171,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
|
|
||||||
public IdentifiedUser runAs(Account.Id id, CurrentUser caller) {
|
public IdentifiedUser runAs(Account.Id id, CurrentUser caller) {
|
||||||
return new IdentifiedUser(
|
return new IdentifiedUser(
|
||||||
capabilityControlFactory,
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
@ -219,7 +208,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
private Map<PropertyKey<Object>, Object> properties;
|
private Map<PropertyKey<Object>, Object> properties;
|
||||||
|
|
||||||
private IdentifiedUser(
|
private IdentifiedUser(
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
AuthConfig authConfig,
|
AuthConfig authConfig,
|
||||||
Realm realm,
|
Realm realm,
|
||||||
String anonymousCowardName,
|
String anonymousCowardName,
|
||||||
@ -231,7 +219,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
AccountState state,
|
AccountState state,
|
||||||
@Nullable CurrentUser realUser) {
|
@Nullable CurrentUser realUser) {
|
||||||
this(
|
this(
|
||||||
capabilityControlFactory,
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
@ -246,7 +233,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private IdentifiedUser(
|
private IdentifiedUser(
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
AuthConfig authConfig,
|
AuthConfig authConfig,
|
||||||
Realm realm,
|
Realm realm,
|
||||||
String anonymousCowardName,
|
String anonymousCowardName,
|
||||||
@ -257,7 +243,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
@Nullable Provider<SocketAddress> remotePeerProvider,
|
@Nullable Provider<SocketAddress> remotePeerProvider,
|
||||||
Account.Id id,
|
Account.Id id,
|
||||||
@Nullable CurrentUser realUser) {
|
@Nullable CurrentUser realUser) {
|
||||||
super(capabilityControlFactory);
|
|
||||||
this.canonicalUrl = canonicalUrl;
|
this.canonicalUrl = canonicalUrl;
|
||||||
this.accountCache = accountCache;
|
this.accountCache = accountCache;
|
||||||
this.groupBackend = groupBackend;
|
this.groupBackend = groupBackend;
|
||||||
@ -465,7 +450,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
* @return copy of the identified user
|
* @return copy of the identified user
|
||||||
*/
|
*/
|
||||||
public IdentifiedUser materializedCopy() {
|
public IdentifiedUser materializedCopy() {
|
||||||
CapabilityControl capabilities = getCapabilities();
|
|
||||||
Provider<SocketAddress> remotePeer;
|
Provider<SocketAddress> remotePeer;
|
||||||
try {
|
try {
|
||||||
remotePeer = Providers.of(remotePeerProvider.get());
|
remotePeer = Providers.of(remotePeerProvider.get());
|
||||||
@ -479,13 +463,6 @@ public class IdentifiedUser extends CurrentUser {
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
return new IdentifiedUser(
|
return new IdentifiedUser(
|
||||||
new CapabilityControl.Factory() {
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public CapabilityControl create(CurrentUser user) {
|
|
||||||
return capabilities;
|
|
||||||
}
|
|
||||||
},
|
|
||||||
authConfig,
|
authConfig,
|
||||||
realm,
|
realm,
|
||||||
anonymousCowardName,
|
anonymousCowardName,
|
||||||
|
@ -14,10 +14,7 @@
|
|||||||
|
|
||||||
package com.google.gerrit.server;
|
package com.google.gerrit.server;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.inject.Inject;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* User identity for plugin code that needs an identity.
|
* User identity for plugin code that needs an identity.
|
||||||
@ -33,12 +30,6 @@ public class InternalUser extends CurrentUser {
|
|||||||
InternalUser create();
|
InternalUser create();
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting
|
|
||||||
@Inject
|
|
||||||
public InternalUser(CapabilityControl.Factory capabilityControlFactory) {
|
|
||||||
super(capabilityControlFactory);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public GroupMembership getEffectiveGroups() {
|
public GroupMembership getEffectiveGroups() {
|
||||||
return GroupMembership.EMPTY;
|
return GroupMembership.EMPTY;
|
||||||
|
@ -14,7 +14,6 @@
|
|||||||
|
|
||||||
package com.google.gerrit.server;
|
package com.google.gerrit.server;
|
||||||
|
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.assistedinject.Assisted;
|
import com.google.inject.assistedinject.Assisted;
|
||||||
@ -32,9 +31,7 @@ public class PeerDaemonUser extends CurrentUser {
|
|||||||
private final SocketAddress peer;
|
private final SocketAddress peer;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
protected PeerDaemonUser(
|
protected PeerDaemonUser(@Assisted SocketAddress peer) {
|
||||||
CapabilityControl.Factory capabilityControlFactory, @Assisted SocketAddress peer) {
|
|
||||||
super(capabilityControlFactory);
|
|
||||||
this.peer = peer;
|
this.peer = peer;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -14,7 +14,6 @@
|
|||||||
|
|
||||||
package com.google.gerrit.server;
|
package com.google.gerrit.server;
|
||||||
|
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.assistedinject.Assisted;
|
import com.google.inject.assistedinject.Assisted;
|
||||||
|
|
||||||
@ -27,9 +26,7 @@ public class PluginUser extends InternalUser {
|
|||||||
private final String pluginName;
|
private final String pluginName;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
protected PluginUser(
|
protected PluginUser(@Assisted String pluginName) {
|
||||||
CapabilityControl.Factory capabilityControlFactory, @Assisted String pluginName) {
|
|
||||||
super(capabilityControlFactory);
|
|
||||||
this.pluginName = pluginName;
|
this.pluginName = pluginName;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -18,12 +18,16 @@ import static java.util.stream.Collectors.toSet;
|
|||||||
|
|
||||||
import com.google.gerrit.common.data.PermissionRule;
|
import com.google.gerrit.common.data.PermissionRule;
|
||||||
import com.google.gerrit.common.errors.NoSuchGroupException;
|
import com.google.gerrit.common.errors.NoSuchGroupException;
|
||||||
|
import com.google.gerrit.extensions.restapi.AuthException;
|
||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.reviewdb.client.AccountGroup;
|
import com.google.gerrit.reviewdb.client.AccountGroup;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
import com.google.gerrit.server.IdentifiedUser;
|
import com.google.gerrit.server.IdentifiedUser;
|
||||||
import com.google.gerrit.server.git.AccountsSection;
|
import com.google.gerrit.server.git.AccountsSection;
|
||||||
import com.google.gerrit.server.group.SystemGroupBackend;
|
import com.google.gerrit.server.group.SystemGroupBackend;
|
||||||
|
import com.google.gerrit.server.permissions.GlobalPermission;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackendException;
|
||||||
import com.google.gerrit.server.project.ProjectCache;
|
import com.google.gerrit.server.project.ProjectCache;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
@ -32,6 +36,7 @@ import java.util.Set;
|
|||||||
/** Access control management for one account's access to other accounts. */
|
/** Access control management for one account's access to other accounts. */
|
||||||
public class AccountControl {
|
public class AccountControl {
|
||||||
public static class Factory {
|
public static class Factory {
|
||||||
|
private final PermissionBackend permissionBackend;
|
||||||
private final ProjectCache projectCache;
|
private final ProjectCache projectCache;
|
||||||
private final GroupControl.Factory groupControlFactory;
|
private final GroupControl.Factory groupControlFactory;
|
||||||
private final Provider<CurrentUser> user;
|
private final Provider<CurrentUser> user;
|
||||||
@ -40,11 +45,13 @@ public class AccountControl {
|
|||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
Factory(
|
Factory(
|
||||||
final ProjectCache projectCache,
|
PermissionBackend permissionBackend,
|
||||||
final GroupControl.Factory groupControlFactory,
|
ProjectCache projectCache,
|
||||||
final Provider<CurrentUser> user,
|
GroupControl.Factory groupControlFactory,
|
||||||
final IdentifiedUser.GenericFactory userFactory,
|
Provider<CurrentUser> user,
|
||||||
final AccountVisibility accountVisibility) {
|
IdentifiedUser.GenericFactory userFactory,
|
||||||
|
AccountVisibility accountVisibility) {
|
||||||
|
this.permissionBackend = permissionBackend;
|
||||||
this.projectCache = projectCache;
|
this.projectCache = projectCache;
|
||||||
this.groupControlFactory = groupControlFactory;
|
this.groupControlFactory = groupControlFactory;
|
||||||
this.user = user;
|
this.user = user;
|
||||||
@ -54,24 +61,34 @@ public class AccountControl {
|
|||||||
|
|
||||||
public AccountControl get() {
|
public AccountControl get() {
|
||||||
return new AccountControl(
|
return new AccountControl(
|
||||||
projectCache, groupControlFactory, user.get(), userFactory, accountVisibility);
|
permissionBackend,
|
||||||
|
projectCache,
|
||||||
|
groupControlFactory,
|
||||||
|
user.get(),
|
||||||
|
userFactory,
|
||||||
|
accountVisibility);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private final AccountsSection accountsSection;
|
private final AccountsSection accountsSection;
|
||||||
private final GroupControl.Factory groupControlFactory;
|
private final GroupControl.Factory groupControlFactory;
|
||||||
|
private final PermissionBackend.WithUser perm;
|
||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
private final IdentifiedUser.GenericFactory userFactory;
|
private final IdentifiedUser.GenericFactory userFactory;
|
||||||
private final AccountVisibility accountVisibility;
|
private final AccountVisibility accountVisibility;
|
||||||
|
|
||||||
|
private Boolean viewAll;
|
||||||
|
|
||||||
AccountControl(
|
AccountControl(
|
||||||
final ProjectCache projectCache,
|
PermissionBackend permissionBackend,
|
||||||
final GroupControl.Factory groupControlFactory,
|
ProjectCache projectCache,
|
||||||
final CurrentUser user,
|
GroupControl.Factory groupControlFactory,
|
||||||
final IdentifiedUser.GenericFactory userFactory,
|
CurrentUser user,
|
||||||
final AccountVisibility accountVisibility) {
|
IdentifiedUser.GenericFactory userFactory,
|
||||||
|
AccountVisibility accountVisibility) {
|
||||||
this.accountsSection = projectCache.getAllProjects().getConfig().getAccountsSection();
|
this.accountsSection = projectCache.getAllProjects().getConfig().getAccountsSection();
|
||||||
this.groupControlFactory = groupControlFactory;
|
this.groupControlFactory = groupControlFactory;
|
||||||
|
this.perm = permissionBackend.user(user);
|
||||||
this.user = user;
|
this.user = user;
|
||||||
this.userFactory = userFactory;
|
this.userFactory = userFactory;
|
||||||
this.accountVisibility = accountVisibility;
|
this.accountVisibility = accountVisibility;
|
||||||
@ -137,17 +154,16 @@ public class AccountControl {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private boolean canSee(OtherUser otherUser) {
|
private boolean canSee(OtherUser otherUser) {
|
||||||
// Special case: I can always see myself.
|
if (accountVisibility == AccountVisibility.ALL) {
|
||||||
if (user.isIdentifiedUser() && user.getAccountId().equals(otherUser.getId())) {
|
|
||||||
return true;
|
return true;
|
||||||
}
|
} else if (user.isIdentifiedUser() && user.getAccountId().equals(otherUser.getId())) {
|
||||||
if (user.getCapabilities().canViewAllAccounts()) {
|
// I can always see myself.
|
||||||
|
return true;
|
||||||
|
} else if (viewAll()) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
switch (accountVisibility) {
|
switch (accountVisibility) {
|
||||||
case ALL:
|
|
||||||
return true;
|
|
||||||
case SAME_GROUP:
|
case SAME_GROUP:
|
||||||
{
|
{
|
||||||
Set<AccountGroup.UUID> usersGroups = groupsOf(otherUser.getUser());
|
Set<AccountGroup.UUID> usersGroups = groupsOf(otherUser.getUser());
|
||||||
@ -178,12 +194,25 @@ public class AccountControl {
|
|||||||
}
|
}
|
||||||
case NONE:
|
case NONE:
|
||||||
break;
|
break;
|
||||||
|
case ALL:
|
||||||
default:
|
default:
|
||||||
throw new IllegalStateException("Bad AccountVisibility " + accountVisibility);
|
throw new IllegalStateException("Bad AccountVisibility " + accountVisibility);
|
||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private boolean viewAll() {
|
||||||
|
if (viewAll == null) {
|
||||||
|
try {
|
||||||
|
perm.check(GlobalPermission.VIEW_ALL_ACCOUNTS);
|
||||||
|
viewAll = true;
|
||||||
|
} catch (AuthException | PermissionBackendException e) {
|
||||||
|
viewAll = false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return viewAll;
|
||||||
|
}
|
||||||
|
|
||||||
private Set<AccountGroup.UUID> groupsOf(IdentifiedUser user) {
|
private Set<AccountGroup.UUID> groupsOf(IdentifiedUser user) {
|
||||||
return user.getEffectiveGroups()
|
return user.getEffectiveGroups()
|
||||||
.getKnownGroups()
|
.getKnownGroups()
|
||||||
|
@ -30,12 +30,9 @@ import com.google.gerrit.server.git.QueueProvider;
|
|||||||
import com.google.gerrit.server.group.SystemGroupBackend;
|
import com.google.gerrit.server.group.SystemGroupBackend;
|
||||||
import com.google.gerrit.server.permissions.GlobalPermission;
|
import com.google.gerrit.server.permissions.GlobalPermission;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackendException;
|
import com.google.gerrit.server.permissions.PermissionBackendException;
|
||||||
import com.google.gerrit.server.project.ChangeControl;
|
|
||||||
import com.google.gerrit.server.project.ProjectCache;
|
import com.google.gerrit.server.project.ProjectCache;
|
||||||
import com.google.gerrit.server.project.ProjectControl;
|
|
||||||
import com.google.gerrit.server.project.RefControl;
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.assistedinject.Assisted;
|
import com.google.inject.Singleton;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
@ -45,41 +42,40 @@ import java.util.Map;
|
|||||||
|
|
||||||
/** Access control management for server-wide capabilities. */
|
/** Access control management for server-wide capabilities. */
|
||||||
public class CapabilityControl {
|
public class CapabilityControl {
|
||||||
public interface Factory {
|
private static final CurrentUser.PropertyKey<CapabilityControl> SELF =
|
||||||
CapabilityControl create(CurrentUser user);
|
CurrentUser.PropertyKey.create();
|
||||||
|
|
||||||
|
@Singleton
|
||||||
|
public static class Factory {
|
||||||
|
private final ProjectCache projectCache;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
Factory(ProjectCache projectCache) {
|
||||||
|
this.projectCache = projectCache;
|
||||||
|
}
|
||||||
|
|
||||||
|
public CapabilityControl create(CurrentUser user) {
|
||||||
|
CapabilityControl ctl = user.get(SELF);
|
||||||
|
if (ctl == null) {
|
||||||
|
ctl = new CapabilityControl(projectCache, user);
|
||||||
|
user.put(SELF, ctl);
|
||||||
|
}
|
||||||
|
return ctl;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private final CapabilityCollection capabilities;
|
private final CapabilityCollection capabilities;
|
||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
private final Map<String, List<PermissionRule>> effective;
|
private final Map<String, List<PermissionRule>> effective;
|
||||||
|
|
||||||
private Boolean canAdministrateServer;
|
private Boolean canAdministrateServer;
|
||||||
private Boolean canEmailReviewers;
|
|
||||||
|
|
||||||
@Inject
|
private CapabilityControl(ProjectCache projectCache, CurrentUser currentUser) {
|
||||||
CapabilityControl(ProjectCache projectCache, @Assisted CurrentUser currentUser) {
|
|
||||||
capabilities = projectCache.getAllProjects().getCapabilityCollection();
|
capabilities = projectCache.getAllProjects().getCapabilityCollection();
|
||||||
user = currentUser;
|
user = currentUser;
|
||||||
effective = new HashMap<>();
|
effective = new HashMap<>();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
private boolean isAdmin() {
|
||||||
* <b>Do not use.</b> Determine if the user can administer this server.
|
|
||||||
*
|
|
||||||
* <p>This method is visible only for the benefit of the following transitional classes:
|
|
||||||
*
|
|
||||||
* <ul>
|
|
||||||
* <li>{@link ProjectControl}
|
|
||||||
* <li>{@link RefControl}
|
|
||||||
* <li>{@link ChangeControl}
|
|
||||||
* <li>{@link GroupControl}
|
|
||||||
* </ul>
|
|
||||||
*
|
|
||||||
* Other callers should not use this method, as it is slated to go away.
|
|
||||||
*
|
|
||||||
* @return true if the user can administer this server.
|
|
||||||
*/
|
|
||||||
public boolean isAdmin_DoNotUse() {
|
|
||||||
if (canAdministrateServer == null) {
|
if (canAdministrateServer == null) {
|
||||||
if (user.getRealUser() != user) {
|
if (user.getRealUser() != user) {
|
||||||
canAdministrateServer = false;
|
canAdministrateServer = false;
|
||||||
@ -93,18 +89,9 @@ public class CapabilityControl {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/** @return true if the user can email reviewers. */
|
/** @return true if the user can email reviewers. */
|
||||||
public boolean canEmailReviewers() {
|
private boolean canEmailReviewers() {
|
||||||
if (canEmailReviewers == null) {
|
return matchAny(capabilities.emailReviewers, ALLOWED_RULE)
|
||||||
canEmailReviewers =
|
|| !matchAny(capabilities.emailReviewers, not(ALLOWED_RULE));
|
||||||
matchAny(capabilities.emailReviewers, ALLOWED_RULE)
|
|
||||||
|| !matchAny(capabilities.emailReviewers, not(ALLOWED_RULE));
|
|
||||||
}
|
|
||||||
return canEmailReviewers;
|
|
||||||
}
|
|
||||||
|
|
||||||
/** @return true if the user can view all accounts. */
|
|
||||||
public boolean canViewAllAccounts() {
|
|
||||||
return canPerform(GlobalCapability.VIEW_ALL_ACCOUNTS) || isAdmin_DoNotUse();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** @return which priority queue the user's tasks should be submitted to. */
|
/** @return which priority queue the user's tasks should be submitted to. */
|
||||||
@ -226,7 +213,7 @@ public class CapabilityControl {
|
|||||||
} else if (perm instanceof PluginPermission) {
|
} else if (perm instanceof PluginPermission) {
|
||||||
PluginPermission pluginPermission = (PluginPermission) perm;
|
PluginPermission pluginPermission = (PluginPermission) perm;
|
||||||
return canPerform(pluginPermission.permissionName())
|
return canPerform(pluginPermission.permissionName())
|
||||||
|| (pluginPermission.fallBackToAdmin() && isAdmin_DoNotUse());
|
|| (pluginPermission.fallBackToAdmin() && isAdmin());
|
||||||
}
|
}
|
||||||
throw new PermissionBackendException(perm + " unsupported");
|
throw new PermissionBackendException(perm + " unsupported");
|
||||||
}
|
}
|
||||||
@ -234,11 +221,9 @@ public class CapabilityControl {
|
|||||||
private boolean can(GlobalPermission perm) throws PermissionBackendException {
|
private boolean can(GlobalPermission perm) throws PermissionBackendException {
|
||||||
switch (perm) {
|
switch (perm) {
|
||||||
case ADMINISTRATE_SERVER:
|
case ADMINISTRATE_SERVER:
|
||||||
return isAdmin_DoNotUse();
|
return isAdmin();
|
||||||
case EMAIL_REVIEWERS:
|
case EMAIL_REVIEWERS:
|
||||||
return canEmailReviewers();
|
return canEmailReviewers();
|
||||||
case VIEW_ALL_ACCOUNTS:
|
|
||||||
return canViewAllAccounts();
|
|
||||||
|
|
||||||
case FLUSH_CACHES:
|
case FLUSH_CACHES:
|
||||||
case KILL_TASK:
|
case KILL_TASK:
|
||||||
@ -247,7 +232,7 @@ public class CapabilityControl {
|
|||||||
case VIEW_QUEUE:
|
case VIEW_QUEUE:
|
||||||
return canPerform(perm.permissionName())
|
return canPerform(perm.permissionName())
|
||||||
|| canPerform(GlobalCapability.MAINTAIN_SERVER)
|
|| canPerform(GlobalCapability.MAINTAIN_SERVER)
|
||||||
|| isAdmin_DoNotUse();
|
|| isAdmin();
|
||||||
|
|
||||||
case CREATE_ACCOUNT:
|
case CREATE_ACCOUNT:
|
||||||
case CREATE_GROUP:
|
case CREATE_GROUP:
|
||||||
@ -255,9 +240,10 @@ public class CapabilityControl {
|
|||||||
case MAINTAIN_SERVER:
|
case MAINTAIN_SERVER:
|
||||||
case MODIFY_ACCOUNT:
|
case MODIFY_ACCOUNT:
|
||||||
case STREAM_EVENTS:
|
case STREAM_EVENTS:
|
||||||
|
case VIEW_ALL_ACCOUNTS:
|
||||||
case VIEW_CONNECTIONS:
|
case VIEW_CONNECTIONS:
|
||||||
case VIEW_PLUGINS:
|
case VIEW_PLUGINS:
|
||||||
return canPerform(perm.permissionName()) || isAdmin_DoNotUse();
|
return canPerform(perm.permissionName()) || isAdmin();
|
||||||
|
|
||||||
case ACCESS_DATABASE:
|
case ACCESS_DATABASE:
|
||||||
case RUN_AS:
|
case RUN_AS:
|
||||||
|
@ -56,15 +56,18 @@ class GetCapabilities implements RestReadView<AccountResource> {
|
|||||||
private Set<String> query;
|
private Set<String> query;
|
||||||
|
|
||||||
private final PermissionBackend permissionBackend;
|
private final PermissionBackend permissionBackend;
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
private final Provider<CurrentUser> self;
|
private final Provider<CurrentUser> self;
|
||||||
private final DynamicMap<CapabilityDefinition> pluginCapabilities;
|
private final DynamicMap<CapabilityDefinition> pluginCapabilities;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
GetCapabilities(
|
GetCapabilities(
|
||||||
PermissionBackend permissionBackend,
|
PermissionBackend permissionBackend,
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Provider<CurrentUser> self,
|
Provider<CurrentUser> self,
|
||||||
DynamicMap<CapabilityDefinition> pluginCapabilities) {
|
DynamicMap<CapabilityDefinition> pluginCapabilities) {
|
||||||
this.permissionBackend = permissionBackend;
|
this.permissionBackend = permissionBackend;
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
this.self = self;
|
this.self = self;
|
||||||
this.pluginCapabilities = pluginCapabilities;
|
this.pluginCapabilities = pluginCapabilities;
|
||||||
}
|
}
|
||||||
@ -81,8 +84,10 @@ class GetCapabilities implements RestReadView<AccountResource> {
|
|||||||
for (GlobalOrPluginPermission p : perm.test(permissionsToTest())) {
|
for (GlobalOrPluginPermission p : perm.test(permissionsToTest())) {
|
||||||
have.put(p.permissionName(), true);
|
have.put(p.permissionName(), true);
|
||||||
}
|
}
|
||||||
addRanges(have, rsrc);
|
|
||||||
addPriority(have, rsrc);
|
CapabilityControl cc = capabilityFactory.create(rsrc.getUser());
|
||||||
|
addRanges(have, cc);
|
||||||
|
addPriority(have, cc);
|
||||||
|
|
||||||
return OutputFormat.JSON
|
return OutputFormat.JSON
|
||||||
.newGson()
|
.newGson()
|
||||||
@ -112,8 +117,7 @@ class GetCapabilities implements RestReadView<AccountResource> {
|
|||||||
return query == null || query.contains(name.toLowerCase());
|
return query == null || query.contains(name.toLowerCase());
|
||||||
}
|
}
|
||||||
|
|
||||||
private void addRanges(Map<String, Object> have, AccountResource rsrc) {
|
private void addRanges(Map<String, Object> have, CapabilityControl cc) {
|
||||||
CapabilityControl cc = rsrc.getUser().getCapabilities();
|
|
||||||
for (String name : GlobalCapability.getRangeNames()) {
|
for (String name : GlobalCapability.getRangeNames()) {
|
||||||
if (want(name) && cc.hasExplicitRange(name)) {
|
if (want(name) && cc.hasExplicitRange(name)) {
|
||||||
have.put(name, new Range(cc.getRange(name)));
|
have.put(name, new Range(cc.getRange(name)));
|
||||||
@ -121,8 +125,8 @@ class GetCapabilities implements RestReadView<AccountResource> {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void addPriority(Map<String, Object> have, AccountResource rsrc) {
|
private void addPriority(Map<String, Object> have, CapabilityControl cc) {
|
||||||
QueueProvider.QueueType queue = rsrc.getUser().getCapabilities().getQueueType();
|
QueueProvider.QueueType queue = cc.getQueueType();
|
||||||
if (queue != QueueProvider.QueueType.INTERACTIVE
|
if (queue != QueueProvider.QueueType.INTERACTIVE
|
||||||
|| (query != null && query.contains(PRIORITY))) {
|
|| (query != null && query.contains(PRIORITY))) {
|
||||||
have.put(PRIORITY, queue);
|
have.put(PRIORITY, queue);
|
||||||
|
@ -17,9 +17,13 @@ package com.google.gerrit.server.account;
|
|||||||
import com.google.gerrit.common.data.GroupDescription;
|
import com.google.gerrit.common.data.GroupDescription;
|
||||||
import com.google.gerrit.common.data.GroupDescriptions;
|
import com.google.gerrit.common.data.GroupDescriptions;
|
||||||
import com.google.gerrit.common.errors.NoSuchGroupException;
|
import com.google.gerrit.common.errors.NoSuchGroupException;
|
||||||
|
import com.google.gerrit.extensions.restapi.AuthException;
|
||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.reviewdb.client.AccountGroup;
|
import com.google.gerrit.reviewdb.client.AccountGroup;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.permissions.GlobalPermission;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackendException;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
import com.google.inject.Singleton;
|
import com.google.inject.Singleton;
|
||||||
@ -29,30 +33,38 @@ public class GroupControl {
|
|||||||
|
|
||||||
@Singleton
|
@Singleton
|
||||||
public static class GenericFactory {
|
public static class GenericFactory {
|
||||||
|
private final PermissionBackend permissionBackend;
|
||||||
private final GroupBackend groupBackend;
|
private final GroupBackend groupBackend;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
GenericFactory(GroupBackend gb) {
|
GenericFactory(PermissionBackend permissionBackend, GroupBackend gb) {
|
||||||
|
this.permissionBackend = permissionBackend;
|
||||||
groupBackend = gb;
|
groupBackend = gb;
|
||||||
}
|
}
|
||||||
|
|
||||||
public GroupControl controlFor(CurrentUser who, AccountGroup.UUID groupId)
|
public GroupControl controlFor(CurrentUser who, AccountGroup.UUID groupId)
|
||||||
throws NoSuchGroupException {
|
throws NoSuchGroupException {
|
||||||
final GroupDescription.Basic group = groupBackend.get(groupId);
|
GroupDescription.Basic group = groupBackend.get(groupId);
|
||||||
if (group == null) {
|
if (group == null) {
|
||||||
throw new NoSuchGroupException(groupId);
|
throw new NoSuchGroupException(groupId);
|
||||||
}
|
}
|
||||||
return new GroupControl(who, group, groupBackend);
|
return new GroupControl(who, group, permissionBackend, groupBackend);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static class Factory {
|
public static class Factory {
|
||||||
|
private final PermissionBackend permissionBackend;
|
||||||
private final GroupCache groupCache;
|
private final GroupCache groupCache;
|
||||||
private final Provider<CurrentUser> user;
|
private final Provider<CurrentUser> user;
|
||||||
private final GroupBackend groupBackend;
|
private final GroupBackend groupBackend;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
Factory(GroupCache gc, Provider<CurrentUser> cu, GroupBackend gb) {
|
Factory(
|
||||||
|
PermissionBackend permissionBackend,
|
||||||
|
GroupCache gc,
|
||||||
|
Provider<CurrentUser> cu,
|
||||||
|
GroupBackend gb) {
|
||||||
|
this.permissionBackend = permissionBackend;
|
||||||
groupCache = gc;
|
groupCache = gc;
|
||||||
user = cu;
|
user = cu;
|
||||||
groupBackend = gb;
|
groupBackend = gb;
|
||||||
@ -79,7 +91,7 @@ public class GroupControl {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public GroupControl controlFor(GroupDescription.Basic group) {
|
public GroupControl controlFor(GroupDescription.Basic group) {
|
||||||
return new GroupControl(user.get(), group, groupBackend);
|
return new GroupControl(user.get(), group, permissionBackend, groupBackend);
|
||||||
}
|
}
|
||||||
|
|
||||||
public GroupControl validateFor(AccountGroup.Id groupId) throws NoSuchGroupException {
|
public GroupControl validateFor(AccountGroup.Id groupId) throws NoSuchGroupException {
|
||||||
@ -102,11 +114,17 @@ public class GroupControl {
|
|||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
private final GroupDescription.Basic group;
|
private final GroupDescription.Basic group;
|
||||||
private Boolean isOwner;
|
private Boolean isOwner;
|
||||||
|
private final PermissionBackend.WithUser perm;
|
||||||
private final GroupBackend groupBackend;
|
private final GroupBackend groupBackend;
|
||||||
|
|
||||||
GroupControl(CurrentUser who, GroupDescription.Basic gd, GroupBackend gb) {
|
GroupControl(
|
||||||
|
CurrentUser who,
|
||||||
|
GroupDescription.Basic gd,
|
||||||
|
PermissionBackend permissionBackend,
|
||||||
|
GroupBackend gb) {
|
||||||
user = who;
|
user = who;
|
||||||
group = gd;
|
group = gd;
|
||||||
|
this.perm = permissionBackend.user(user);
|
||||||
groupBackend = gb;
|
groupBackend = gb;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -127,8 +145,8 @@ public class GroupControl {
|
|||||||
return user.isInternalUser()
|
return user.isInternalUser()
|
||||||
|| groupBackend.isVisibleToAll(group.getGroupUUID())
|
|| groupBackend.isVisibleToAll(group.getGroupUUID())
|
||||||
|| user.getEffectiveGroups().contains(group.getGroupUUID())
|
|| user.getEffectiveGroups().contains(group.getGroupUUID())
|
||||||
|| user.getCapabilities().isAdmin_DoNotUse()
|
|| isOwner()
|
||||||
|| isOwner();
|
|| canAdministrateServer();
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isOwner() {
|
public boolean isOwner() {
|
||||||
@ -137,13 +155,20 @@ public class GroupControl {
|
|||||||
isOwner = false;
|
isOwner = false;
|
||||||
} else if (isOwner == null) {
|
} else if (isOwner == null) {
|
||||||
AccountGroup.UUID ownerUUID = accountGroup.getOwnerGroupUUID();
|
AccountGroup.UUID ownerUUID = accountGroup.getOwnerGroupUUID();
|
||||||
isOwner =
|
isOwner = getUser().getEffectiveGroups().contains(ownerUUID) || canAdministrateServer();
|
||||||
getUser().getEffectiveGroups().contains(ownerUUID)
|
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse();
|
|
||||||
}
|
}
|
||||||
return isOwner;
|
return isOwner;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private boolean canAdministrateServer() {
|
||||||
|
try {
|
||||||
|
perm.check(GlobalPermission.ADMINISTRATE_SERVER);
|
||||||
|
return true;
|
||||||
|
} catch (AuthException | PermissionBackendException denied) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public boolean canAddMember() {
|
public boolean canAddMember() {
|
||||||
return isOwner();
|
return isOwner();
|
||||||
}
|
}
|
||||||
|
@ -85,7 +85,6 @@ import com.google.gerrit.server.account.AccountResolver;
|
|||||||
import com.google.gerrit.server.account.AccountVisibility;
|
import com.google.gerrit.server.account.AccountVisibility;
|
||||||
import com.google.gerrit.server.account.AccountVisibilityProvider;
|
import com.google.gerrit.server.account.AccountVisibilityProvider;
|
||||||
import com.google.gerrit.server.account.CapabilityCollection;
|
import com.google.gerrit.server.account.CapabilityCollection;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.ChangeUserName;
|
import com.google.gerrit.server.account.ChangeUserName;
|
||||||
import com.google.gerrit.server.account.EmailExpander;
|
import com.google.gerrit.server.account.EmailExpander;
|
||||||
import com.google.gerrit.server.account.GroupCacheImpl;
|
import com.google.gerrit.server.account.GroupCacheImpl;
|
||||||
@ -245,7 +244,6 @@ public class GerritGlobalModule extends FactoryModule {
|
|||||||
factory(DeleteReviewerSender.Factory.class);
|
factory(DeleteReviewerSender.Factory.class);
|
||||||
factory(AddKeySender.Factory.class);
|
factory(AddKeySender.Factory.class);
|
||||||
factory(CapabilityCollection.Factory.class);
|
factory(CapabilityCollection.Factory.class);
|
||||||
factory(CapabilityControl.Factory.class);
|
|
||||||
factory(ChangeData.Factory.class);
|
factory(ChangeData.Factory.class);
|
||||||
factory(ChangeJson.AssistedFactory.class);
|
factory(ChangeJson.AssistedFactory.class);
|
||||||
factory(CreateChangeSender.Factory.class);
|
factory(CreateChangeSender.Factory.class);
|
||||||
|
@ -29,18 +29,20 @@ class ReceiveConfig {
|
|||||||
final boolean checkReferencedObjectsAreReachable;
|
final boolean checkReferencedObjectsAreReachable;
|
||||||
final boolean allowDrafts;
|
final boolean allowDrafts;
|
||||||
private final int systemMaxBatchChanges;
|
private final int systemMaxBatchChanges;
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
ReceiveConfig(@GerritServerConfig Config config) {
|
ReceiveConfig(@GerritServerConfig Config config, CapabilityControl.Factory capabilityFactory) {
|
||||||
checkMagicRefs = config.getBoolean("receive", null, "checkMagicRefs", true);
|
checkMagicRefs = config.getBoolean("receive", null, "checkMagicRefs", true);
|
||||||
checkReferencedObjectsAreReachable =
|
checkReferencedObjectsAreReachable =
|
||||||
config.getBoolean("receive", null, "checkReferencedObjectsAreReachable", true);
|
config.getBoolean("receive", null, "checkReferencedObjectsAreReachable", true);
|
||||||
allowDrafts = config.getBoolean("change", null, "allowDrafts", true);
|
allowDrafts = config.getBoolean("change", null, "allowDrafts", true);
|
||||||
systemMaxBatchChanges = config.getInt("receive", "maxBatchChanges", 0);
|
systemMaxBatchChanges = config.getInt("receive", "maxBatchChanges", 0);
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
}
|
}
|
||||||
|
|
||||||
public int getEffectiveMaxBatchChangesLimit(CurrentUser user) {
|
public int getEffectiveMaxBatchChangesLimit(CurrentUser user) {
|
||||||
CapabilityControl cap = user.getCapabilities();
|
CapabilityControl cap = capabilityFactory.create(user);
|
||||||
if (cap.hasExplicitRange(BATCH_CHANGES_LIMIT)) {
|
if (cap.hasExplicitRange(BATCH_CHANGES_LIMIT)) {
|
||||||
return cap.getRange(BATCH_CHANGES_LIMIT).getMax();
|
return cap.getRange(BATCH_CHANGES_LIMIT).getMax();
|
||||||
}
|
}
|
||||||
|
@ -19,6 +19,7 @@ import com.google.common.collect.ListMultimap;
|
|||||||
import com.google.gerrit.common.errors.EmailException;
|
import com.google.gerrit.common.errors.EmailException;
|
||||||
import com.google.gerrit.extensions.api.changes.NotifyHandling;
|
import com.google.gerrit.extensions.api.changes.NotifyHandling;
|
||||||
import com.google.gerrit.extensions.api.changes.RecipientType;
|
import com.google.gerrit.extensions.api.changes.RecipientType;
|
||||||
|
import com.google.gerrit.extensions.restapi.AuthException;
|
||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.reviewdb.client.AccountGroup;
|
import com.google.gerrit.reviewdb.client.AccountGroup;
|
||||||
import com.google.gerrit.reviewdb.client.Change;
|
import com.google.gerrit.reviewdb.client.Change;
|
||||||
@ -37,6 +38,8 @@ import com.google.gerrit.server.patch.PatchList;
|
|||||||
import com.google.gerrit.server.patch.PatchListEntry;
|
import com.google.gerrit.server.patch.PatchListEntry;
|
||||||
import com.google.gerrit.server.patch.PatchListNotAvailableException;
|
import com.google.gerrit.server.patch.PatchListNotAvailableException;
|
||||||
import com.google.gerrit.server.patch.PatchSetInfoNotAvailableException;
|
import com.google.gerrit.server.patch.PatchSetInfoNotAvailableException;
|
||||||
|
import com.google.gerrit.server.permissions.GlobalPermission;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackendException;
|
||||||
import com.google.gerrit.server.project.ProjectState;
|
import com.google.gerrit.server.project.ProjectState;
|
||||||
import com.google.gerrit.server.query.change.ChangeData;
|
import com.google.gerrit.server.query.change.ChangeData;
|
||||||
import com.google.gwtorm.server.OrmException;
|
import com.google.gwtorm.server.OrmException;
|
||||||
@ -94,8 +97,12 @@ public abstract class ChangeEmail extends NotificationEmail {
|
|||||||
super.setFrom(id);
|
super.setFrom(id);
|
||||||
|
|
||||||
/** Is the from user in an email squelching group? */
|
/** Is the from user in an email squelching group? */
|
||||||
final IdentifiedUser user = args.identifiedUserFactory.create(id);
|
try {
|
||||||
emailOnlyAuthors = !user.getCapabilities().canEmailReviewers();
|
IdentifiedUser user = args.identifiedUserFactory.create(id);
|
||||||
|
args.permissionBackend.user(user).check(GlobalPermission.EMAIL_REVIEWERS);
|
||||||
|
} catch (AuthException | PermissionBackendException e) {
|
||||||
|
emailOnlyAuthors = true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setPatchSet(PatchSet ps) {
|
public void setPatchSet(PatchSet ps) {
|
||||||
|
@ -24,7 +24,6 @@ import com.google.gerrit.server.IdentifiedUser;
|
|||||||
import com.google.gerrit.server.IdentifiedUser.GenericFactory;
|
import com.google.gerrit.server.IdentifiedUser.GenericFactory;
|
||||||
import com.google.gerrit.server.StarredChangesUtil;
|
import com.google.gerrit.server.StarredChangesUtil;
|
||||||
import com.google.gerrit.server.account.AccountCache;
|
import com.google.gerrit.server.account.AccountCache;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupBackend;
|
import com.google.gerrit.server.account.GroupBackend;
|
||||||
import com.google.gerrit.server.account.GroupIncludeCache;
|
import com.google.gerrit.server.account.GroupIncludeCache;
|
||||||
import com.google.gerrit.server.config.AllProjectsName;
|
import com.google.gerrit.server.config.AllProjectsName;
|
||||||
@ -36,6 +35,7 @@ import com.google.gerrit.server.mail.EmailSettings;
|
|||||||
import com.google.gerrit.server.notedb.ChangeNotes;
|
import com.google.gerrit.server.notedb.ChangeNotes;
|
||||||
import com.google.gerrit.server.patch.PatchListCache;
|
import com.google.gerrit.server.patch.PatchListCache;
|
||||||
import com.google.gerrit.server.patch.PatchSetInfoFactory;
|
import com.google.gerrit.server.patch.PatchSetInfoFactory;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
import com.google.gerrit.server.project.ProjectCache;
|
import com.google.gerrit.server.project.ProjectCache;
|
||||||
import com.google.gerrit.server.query.account.InternalAccountQuery;
|
import com.google.gerrit.server.query.account.InternalAccountQuery;
|
||||||
import com.google.gerrit.server.query.change.ChangeData;
|
import com.google.gerrit.server.query.change.ChangeData;
|
||||||
@ -52,6 +52,7 @@ import org.eclipse.jgit.lib.PersonIdent;
|
|||||||
public class EmailArguments {
|
public class EmailArguments {
|
||||||
final GitRepositoryManager server;
|
final GitRepositoryManager server;
|
||||||
final ProjectCache projectCache;
|
final ProjectCache projectCache;
|
||||||
|
final PermissionBackend permissionBackend;
|
||||||
final GroupBackend groupBackend;
|
final GroupBackend groupBackend;
|
||||||
final GroupIncludeCache groupIncludes;
|
final GroupIncludeCache groupIncludes;
|
||||||
final AccountCache accountCache;
|
final AccountCache accountCache;
|
||||||
@ -61,7 +62,6 @@ public class EmailArguments {
|
|||||||
final EmailSender emailSender;
|
final EmailSender emailSender;
|
||||||
final PatchSetInfoFactory patchSetInfoFactory;
|
final PatchSetInfoFactory patchSetInfoFactory;
|
||||||
final IdentifiedUser.GenericFactory identifiedUserFactory;
|
final IdentifiedUser.GenericFactory identifiedUserFactory;
|
||||||
final CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
final ChangeNotes.Factory changeNotesFactory;
|
final ChangeNotes.Factory changeNotesFactory;
|
||||||
final AnonymousUser anonymousUser;
|
final AnonymousUser anonymousUser;
|
||||||
final String anonymousCowardName;
|
final String anonymousCowardName;
|
||||||
@ -86,6 +86,7 @@ public class EmailArguments {
|
|||||||
EmailArguments(
|
EmailArguments(
|
||||||
GitRepositoryManager server,
|
GitRepositoryManager server,
|
||||||
ProjectCache projectCache,
|
ProjectCache projectCache,
|
||||||
|
PermissionBackend permissionBackend,
|
||||||
GroupBackend groupBackend,
|
GroupBackend groupBackend,
|
||||||
GroupIncludeCache groupIncludes,
|
GroupIncludeCache groupIncludes,
|
||||||
AccountCache accountCache,
|
AccountCache accountCache,
|
||||||
@ -95,7 +96,6 @@ public class EmailArguments {
|
|||||||
EmailSender emailSender,
|
EmailSender emailSender,
|
||||||
PatchSetInfoFactory patchSetInfoFactory,
|
PatchSetInfoFactory patchSetInfoFactory,
|
||||||
GenericFactory identifiedUserFactory,
|
GenericFactory identifiedUserFactory,
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
ChangeNotes.Factory changeNotesFactory,
|
ChangeNotes.Factory changeNotesFactory,
|
||||||
AnonymousUser anonymousUser,
|
AnonymousUser anonymousUser,
|
||||||
@AnonymousCowardName String anonymousCowardName,
|
@AnonymousCowardName String anonymousCowardName,
|
||||||
@ -116,6 +116,7 @@ public class EmailArguments {
|
|||||||
OutgoingEmailValidator validator) {
|
OutgoingEmailValidator validator) {
|
||||||
this.server = server;
|
this.server = server;
|
||||||
this.projectCache = projectCache;
|
this.projectCache = projectCache;
|
||||||
|
this.permissionBackend = permissionBackend;
|
||||||
this.groupBackend = groupBackend;
|
this.groupBackend = groupBackend;
|
||||||
this.groupIncludes = groupIncludes;
|
this.groupIncludes = groupIncludes;
|
||||||
this.accountCache = accountCache;
|
this.accountCache = accountCache;
|
||||||
@ -125,7 +126,6 @@ public class EmailArguments {
|
|||||||
this.emailSender = emailSender;
|
this.emailSender = emailSender;
|
||||||
this.patchSetInfoFactory = patchSetInfoFactory;
|
this.patchSetInfoFactory = patchSetInfoFactory;
|
||||||
this.identifiedUserFactory = identifiedUserFactory;
|
this.identifiedUserFactory = identifiedUserFactory;
|
||||||
this.capabilityControlFactory = capabilityControlFactory;
|
|
||||||
this.changeNotesFactory = changeNotesFactory;
|
this.changeNotesFactory = changeNotesFactory;
|
||||||
this.anonymousUser = anonymousUser;
|
this.anonymousUser = anonymousUser;
|
||||||
this.anonymousCowardName = anonymousCowardName;
|
this.anonymousCowardName = anonymousCowardName;
|
||||||
|
@ -141,7 +141,7 @@ public class ProjectWatch {
|
|||||||
|
|
||||||
private void add(Watchers matching, NotifyConfig nc) throws OrmException, QueryParseException {
|
private void add(Watchers matching, NotifyConfig nc) throws OrmException, QueryParseException {
|
||||||
for (GroupReference ref : nc.getGroups()) {
|
for (GroupReference ref : nc.getGroups()) {
|
||||||
CurrentUser user = new SingleGroupUser(args.capabilityControlFactory, ref.getUUID());
|
CurrentUser user = new SingleGroupUser(ref.getUUID());
|
||||||
if (filterMatch(user, nc.getFilter())) {
|
if (filterMatch(user, nc.getFilter())) {
|
||||||
deliverToMembers(matching.list(nc.getHeader()), ref.getUUID());
|
deliverToMembers(matching.list(nc.getHeader()), ref.getUUID());
|
||||||
}
|
}
|
||||||
|
@ -247,9 +247,8 @@ public class ChangeControl {
|
|||||||
return (isOwner() // owner (aka creator) of the change can abandon
|
return (isOwner() // owner (aka creator) of the change can abandon
|
||||||
|| getRefControl().isOwner() // branch owner can abandon
|
|| getRefControl().isOwner() // branch owner can abandon
|
||||||
|| getProjectControl().isOwner() // project owner can abandon
|
|| getProjectControl().isOwner() // project owner can abandon
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse() // site administers are god
|
|
||||||
|| getRefControl().canAbandon() // user can abandon a specific ref
|
|| getRefControl().canAbandon() // user can abandon a specific ref
|
||||||
)
|
|| getProjectControl().isAdmin())
|
||||||
&& !isPatchSetLocked(db);
|
&& !isPatchSetLocked(db);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -266,13 +265,11 @@ public class ChangeControl {
|
|||||||
|
|
||||||
switch (status) {
|
switch (status) {
|
||||||
case DRAFT:
|
case DRAFT:
|
||||||
return isOwner()
|
return isOwner() || getRefControl().canDeleteDrafts() || getProjectControl().isAdmin();
|
||||||
|| getRefControl().canDeleteDrafts()
|
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse();
|
|
||||||
case NEW:
|
case NEW:
|
||||||
case ABANDONED:
|
case ABANDONED:
|
||||||
return (isOwner() && getRefControl().canDeleteOwnChanges())
|
return (isOwner() && getRefControl().canDeleteOwnChanges())
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse();
|
|| getProjectControl().isAdmin();
|
||||||
case MERGED:
|
case MERGED:
|
||||||
default:
|
default:
|
||||||
return false;
|
return false;
|
||||||
@ -410,7 +407,7 @@ public class ChangeControl {
|
|||||||
if (getRefControl().canRemoveReviewer() // has removal permissions
|
if (getRefControl().canRemoveReviewer() // has removal permissions
|
||||||
|| getRefControl().isOwner() // branch owner
|
|| getRefControl().isOwner() // branch owner
|
||||||
|| getProjectControl().isOwner() // project owner
|
|| getProjectControl().isOwner() // project owner
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse()) {
|
|| getProjectControl().isAdmin()) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -424,9 +421,8 @@ public class ChangeControl {
|
|||||||
return isOwner() // owner (aka creator) of the change can edit topic
|
return isOwner() // owner (aka creator) of the change can edit topic
|
||||||
|| getRefControl().isOwner() // branch owner can edit topic
|
|| getRefControl().isOwner() // branch owner can edit topic
|
||||||
|| getProjectControl().isOwner() // project owner can edit topic
|
|| getProjectControl().isOwner() // project owner can edit topic
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse() // site administers are god
|
|
||||||
|| getRefControl().canEditTopicName() // user can edit topic on a specific ref
|
|| getRefControl().canEditTopicName() // user can edit topic on a specific ref
|
||||||
;
|
|| getProjectControl().isAdmin();
|
||||||
}
|
}
|
||||||
return getRefControl().canForceEditTopicName();
|
return getRefControl().canForceEditTopicName();
|
||||||
}
|
}
|
||||||
@ -437,8 +433,7 @@ public class ChangeControl {
|
|||||||
return isOwner() // owner (aka creator) of the change can edit desc
|
return isOwner() // owner (aka creator) of the change can edit desc
|
||||||
|| getRefControl().isOwner() // branch owner can edit desc
|
|| getRefControl().isOwner() // branch owner can edit desc
|
||||||
|| getProjectControl().isOwner() // project owner can edit desc
|
|| getProjectControl().isOwner() // project owner can edit desc
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse() // site administers are god
|
|| getProjectControl().isAdmin();
|
||||||
;
|
|
||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@ -455,8 +450,8 @@ public class ChangeControl {
|
|||||||
return isOwner() // owner (aka creator) of the change can edit hashtags
|
return isOwner() // owner (aka creator) of the change can edit hashtags
|
||||||
|| getRefControl().isOwner() // branch owner can edit hashtags
|
|| getRefControl().isOwner() // branch owner can edit hashtags
|
||||||
|| getProjectControl().isOwner() // project owner can edit hashtags
|
|| getProjectControl().isOwner() // project owner can edit hashtags
|
||||||
|| getUser().getCapabilities().isAdmin_DoNotUse() // site administers are god
|
|| getRefControl().canEditHashtags() // user can edit hashtag on a specific ref
|
||||||
|| getRefControl().canEditHashtags(); // user can edit hashtag on a specific ref
|
|| getProjectControl().isAdmin();
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean match(String destBranch, String refPattern) {
|
private boolean match(String destBranch, String refPattern) {
|
||||||
|
@ -21,6 +21,7 @@ import com.google.gerrit.extensions.api.access.GlobalOrPluginPermission;
|
|||||||
import com.google.gerrit.extensions.restapi.AuthException;
|
import com.google.gerrit.extensions.restapi.AuthException;
|
||||||
import com.google.gerrit.reviewdb.client.Project;
|
import com.google.gerrit.reviewdb.client.Project;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.permissions.FailedPermissionBackend;
|
import com.google.gerrit.server.permissions.FailedPermissionBackend;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackend;
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackendException;
|
import com.google.gerrit.server.permissions.PermissionBackendException;
|
||||||
@ -34,10 +35,12 @@ import java.util.Set;
|
|||||||
@Singleton
|
@Singleton
|
||||||
public class DefaultPermissionBackend extends PermissionBackend {
|
public class DefaultPermissionBackend extends PermissionBackend {
|
||||||
private final ProjectCache projectCache;
|
private final ProjectCache projectCache;
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
DefaultPermissionBackend(ProjectCache projectCache) {
|
DefaultPermissionBackend(ProjectCache projectCache, CapabilityControl.Factory capabilityFactory) {
|
||||||
this.projectCache = projectCache;
|
this.projectCache = projectCache;
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -47,6 +50,7 @@ public class DefaultPermissionBackend extends PermissionBackend {
|
|||||||
|
|
||||||
class WithUserImpl extends WithUser {
|
class WithUserImpl extends WithUser {
|
||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
|
private CapabilityControl cap;
|
||||||
|
|
||||||
WithUserImpl(CurrentUser user) {
|
WithUserImpl(CurrentUser user) {
|
||||||
this.user = checkNotNull(user, "user");
|
this.user = checkNotNull(user, "user");
|
||||||
@ -86,7 +90,10 @@ public class DefaultPermissionBackend extends PermissionBackend {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private boolean can(GlobalOrPluginPermission perm) throws PermissionBackendException {
|
private boolean can(GlobalOrPluginPermission perm) throws PermissionBackendException {
|
||||||
return user.getCapabilities().doCanForDefaultPermissionBackend(perm);
|
if (cap == null) {
|
||||||
|
cap = capabilityFactory.create(user);
|
||||||
|
}
|
||||||
|
return cap.doCanForDefaultPermissionBackend(perm);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -47,6 +47,8 @@ import com.google.gerrit.server.git.VisibleRefFilter;
|
|||||||
import com.google.gerrit.server.group.SystemGroupBackend;
|
import com.google.gerrit.server.group.SystemGroupBackend;
|
||||||
import com.google.gerrit.server.notedb.ChangeNotes;
|
import com.google.gerrit.server.notedb.ChangeNotes;
|
||||||
import com.google.gerrit.server.permissions.FailedPermissionBackend;
|
import com.google.gerrit.server.permissions.FailedPermissionBackend;
|
||||||
|
import com.google.gerrit.server.permissions.GlobalPermission;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackend.ForChange;
|
import com.google.gerrit.server.permissions.PermissionBackend.ForChange;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackend.ForProject;
|
import com.google.gerrit.server.permissions.PermissionBackend.ForProject;
|
||||||
import com.google.gerrit.server.permissions.PermissionBackend.ForRef;
|
import com.google.gerrit.server.permissions.PermissionBackend.ForRef;
|
||||||
@ -132,6 +134,7 @@ public class ProjectControl {
|
|||||||
private final Set<AccountGroup.UUID> receiveGroups;
|
private final Set<AccountGroup.UUID> receiveGroups;
|
||||||
|
|
||||||
private final String canonicalWebUrl;
|
private final String canonicalWebUrl;
|
||||||
|
private final PermissionBackend.WithUser perm;
|
||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
private final ProjectState state;
|
private final ProjectState state;
|
||||||
private final ChangeControl.Factory changeControlFactory;
|
private final ChangeControl.Factory changeControlFactory;
|
||||||
@ -157,6 +160,7 @@ public class ProjectControl {
|
|||||||
VisibleRefFilter.Factory refFilter,
|
VisibleRefFilter.Factory refFilter,
|
||||||
Provider<InternalChangeQuery> queryProvider,
|
Provider<InternalChangeQuery> queryProvider,
|
||||||
@CanonicalWebUrl @Nullable String canonicalWebUrl,
|
@CanonicalWebUrl @Nullable String canonicalWebUrl,
|
||||||
|
PermissionBackend permissionBackend,
|
||||||
@Assisted CurrentUser who,
|
@Assisted CurrentUser who,
|
||||||
@Assisted ProjectState ps,
|
@Assisted ProjectState ps,
|
||||||
Metrics metrics) {
|
Metrics metrics) {
|
||||||
@ -169,6 +173,7 @@ public class ProjectControl {
|
|||||||
this.canonicalWebUrl = canonicalWebUrl;
|
this.canonicalWebUrl = canonicalWebUrl;
|
||||||
this.queryProvider = queryProvider;
|
this.queryProvider = queryProvider;
|
||||||
this.metrics = metrics;
|
this.metrics = metrics;
|
||||||
|
this.perm = permissionBackend.user(who);
|
||||||
user = who;
|
user = who;
|
||||||
state = ps;
|
state = ps;
|
||||||
}
|
}
|
||||||
@ -264,8 +269,16 @@ public class ProjectControl {
|
|||||||
|
|
||||||
/** Is this user a project owner? */
|
/** Is this user a project owner? */
|
||||||
public boolean isOwner() {
|
public boolean isOwner() {
|
||||||
return (isDeclaredOwner() && !controlForRef("refs/*").isBlocked(Permission.OWNER))
|
return (isDeclaredOwner() && !controlForRef("refs/*").isBlocked(Permission.OWNER)) || isAdmin();
|
||||||
|| user.getCapabilities().isAdmin_DoNotUse();
|
}
|
||||||
|
|
||||||
|
boolean isAdmin() {
|
||||||
|
try {
|
||||||
|
perm.check(GlobalPermission.ADMINISTRATE_SERVER);
|
||||||
|
return true;
|
||||||
|
} catch (AuthException | PermissionBackendException e) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean isDeclaredOwner() {
|
private boolean isDeclaredOwner() {
|
||||||
@ -278,7 +291,7 @@ public class ProjectControl {
|
|||||||
|
|
||||||
/** Does this user have ownership on at least one reference name? */
|
/** Does this user have ownership on at least one reference name? */
|
||||||
public boolean isOwnerAnyRef() {
|
public boolean isOwnerAnyRef() {
|
||||||
return canPerformOnAnyRef(Permission.OWNER) || user.getCapabilities().isAdmin_DoNotUse();
|
return canPerformOnAnyRef(Permission.OWNER) || isAdmin();
|
||||||
}
|
}
|
||||||
|
|
||||||
/** @return true if the user can upload to at least one reference */
|
/** @return true if the user can upload to at least one reference */
|
||||||
|
@ -201,8 +201,7 @@ public class RefControl {
|
|||||||
// On the AllProjects project the owner access right cannot be assigned,
|
// On the AllProjects project the owner access right cannot be assigned,
|
||||||
// this why for the AllProjects project we allow administrators to push
|
// this why for the AllProjects project we allow administrators to push
|
||||||
// configuration changes if they have push without being project owner.
|
// configuration changes if they have push without being project owner.
|
||||||
if (!(projectControl.getProjectState().isAllProjects()
|
if (!(projectControl.getProjectState().isAllProjects() && projectControl.isAdmin())) {
|
||||||
&& getUser().getCapabilities().isAdmin_DoNotUse())) {
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -229,8 +228,7 @@ public class RefControl {
|
|||||||
case UNKNOWN:
|
case UNKNOWN:
|
||||||
case WEB_BROWSER:
|
case WEB_BROWSER:
|
||||||
default:
|
default:
|
||||||
return getUser().getCapabilities().isAdmin_DoNotUse()
|
return (isOwner() && !isForceBlocked(Permission.PUSH)) || projectControl.isAdmin();
|
||||||
|| (isOwner() && !isForceBlocked(Permission.PUSH));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -376,10 +374,10 @@ public class RefControl {
|
|||||||
case UNKNOWN:
|
case UNKNOWN:
|
||||||
case WEB_BROWSER:
|
case WEB_BROWSER:
|
||||||
default:
|
default:
|
||||||
return getUser().getCapabilities().isAdmin_DoNotUse()
|
return (isOwner() && !isForceBlocked(Permission.PUSH))
|
||||||
|| (isOwner() && !isForceBlocked(Permission.PUSH))
|
|
||||||
|| canPushWithForce()
|
|| canPushWithForce()
|
||||||
|| canPerform(Permission.DELETE);
|
|| canPerform(Permission.DELETE)
|
||||||
|
|| projectControl.isAdmin();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -24,6 +24,7 @@ import com.google.gerrit.metrics.Field;
|
|||||||
import com.google.gerrit.metrics.MetricMaker;
|
import com.google.gerrit.metrics.MetricMaker;
|
||||||
import com.google.gerrit.metrics.Timer1;
|
import com.google.gerrit.metrics.Timer1;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.index.Index;
|
import com.google.gerrit.server.index.Index;
|
||||||
import com.google.gerrit.server.index.IndexCollection;
|
import com.google.gerrit.server.index.IndexCollection;
|
||||||
import com.google.gerrit.server.index.IndexConfig;
|
import com.google.gerrit.server.index.IndexConfig;
|
||||||
@ -61,6 +62,7 @@ public abstract class QueryProcessor<T> {
|
|||||||
|
|
||||||
protected final Provider<CurrentUser> userProvider;
|
protected final Provider<CurrentUser> userProvider;
|
||||||
|
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
private final Metrics metrics;
|
private final Metrics metrics;
|
||||||
private final SchemaDefinitions<T> schemaDef;
|
private final SchemaDefinitions<T> schemaDef;
|
||||||
private final IndexConfig indexConfig;
|
private final IndexConfig indexConfig;
|
||||||
@ -76,6 +78,7 @@ public abstract class QueryProcessor<T> {
|
|||||||
|
|
||||||
protected QueryProcessor(
|
protected QueryProcessor(
|
||||||
Provider<CurrentUser> userProvider,
|
Provider<CurrentUser> userProvider,
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Metrics metrics,
|
Metrics metrics,
|
||||||
SchemaDefinitions<T> schemaDef,
|
SchemaDefinitions<T> schemaDef,
|
||||||
IndexConfig indexConfig,
|
IndexConfig indexConfig,
|
||||||
@ -83,6 +86,7 @@ public abstract class QueryProcessor<T> {
|
|||||||
IndexRewriter<T> rewriter,
|
IndexRewriter<T> rewriter,
|
||||||
String limitField) {
|
String limitField) {
|
||||||
this.userProvider = userProvider;
|
this.userProvider = userProvider;
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
this.metrics = metrics;
|
this.metrics = metrics;
|
||||||
this.schemaDef = schemaDef;
|
this.schemaDef = schemaDef;
|
||||||
this.indexConfig = indexConfig;
|
this.indexConfig = indexConfig;
|
||||||
@ -231,7 +235,10 @@ public abstract class QueryProcessor<T> {
|
|||||||
|
|
||||||
private int getPermittedLimit() {
|
private int getPermittedLimit() {
|
||||||
if (enforceVisibility) {
|
if (enforceVisibility) {
|
||||||
return userProvider.get().getCapabilities().getRange(GlobalCapability.QUERY_LIMIT).getMax();
|
return capabilityFactory
|
||||||
|
.create(userProvider.get())
|
||||||
|
.getRange(GlobalCapability.QUERY_LIMIT)
|
||||||
|
.getMax();
|
||||||
}
|
}
|
||||||
return Integer.MAX_VALUE;
|
return Integer.MAX_VALUE;
|
||||||
}
|
}
|
||||||
|
@ -20,6 +20,7 @@ import static com.google.gerrit.server.query.account.AccountQueryBuilder.FIELD_L
|
|||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
import com.google.gerrit.server.account.AccountControl;
|
import com.google.gerrit.server.account.AccountControl;
|
||||||
import com.google.gerrit.server.account.AccountState;
|
import com.google.gerrit.server.account.AccountState;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.index.IndexConfig;
|
import com.google.gerrit.server.index.IndexConfig;
|
||||||
import com.google.gerrit.server.index.IndexPredicate;
|
import com.google.gerrit.server.index.IndexPredicate;
|
||||||
import com.google.gerrit.server.index.account.AccountIndexCollection;
|
import com.google.gerrit.server.index.account.AccountIndexCollection;
|
||||||
@ -44,6 +45,7 @@ public class AccountQueryProcessor extends QueryProcessor<AccountState> {
|
|||||||
@Inject
|
@Inject
|
||||||
protected AccountQueryProcessor(
|
protected AccountQueryProcessor(
|
||||||
Provider<CurrentUser> userProvider,
|
Provider<CurrentUser> userProvider,
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Metrics metrics,
|
Metrics metrics,
|
||||||
IndexConfig indexConfig,
|
IndexConfig indexConfig,
|
||||||
AccountIndexCollection indexes,
|
AccountIndexCollection indexes,
|
||||||
@ -51,6 +53,7 @@ public class AccountQueryProcessor extends QueryProcessor<AccountState> {
|
|||||||
AccountControl.Factory accountControlFactory) {
|
AccountControl.Factory accountControlFactory) {
|
||||||
super(
|
super(
|
||||||
userProvider,
|
userProvider,
|
||||||
|
capabilityFactory,
|
||||||
metrics,
|
metrics,
|
||||||
AccountSchemaDefinitions.INSTANCE,
|
AccountSchemaDefinitions.INSTANCE,
|
||||||
indexConfig,
|
indexConfig,
|
||||||
|
@ -41,7 +41,6 @@ import com.google.gerrit.server.IdentifiedUser;
|
|||||||
import com.google.gerrit.server.StarredChangesUtil;
|
import com.google.gerrit.server.StarredChangesUtil;
|
||||||
import com.google.gerrit.server.account.AccountCache;
|
import com.google.gerrit.server.account.AccountCache;
|
||||||
import com.google.gerrit.server.account.AccountResolver;
|
import com.google.gerrit.server.account.AccountResolver;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupBackend;
|
import com.google.gerrit.server.account.GroupBackend;
|
||||||
import com.google.gerrit.server.account.GroupBackends;
|
import com.google.gerrit.server.account.GroupBackends;
|
||||||
import com.google.gerrit.server.account.VersionedAccountDestinations;
|
import com.google.gerrit.server.account.VersionedAccountDestinations;
|
||||||
@ -196,7 +195,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
final AllProjectsName allProjectsName;
|
final AllProjectsName allProjectsName;
|
||||||
final AllUsersName allUsersName;
|
final AllUsersName allUsersName;
|
||||||
final PermissionBackend permissionBackend;
|
final PermissionBackend permissionBackend;
|
||||||
final CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
final ChangeControl.GenericFactory changeControlGenericFactory;
|
final ChangeControl.GenericFactory changeControlGenericFactory;
|
||||||
final ChangeData.Factory changeDataFactory;
|
final ChangeData.Factory changeDataFactory;
|
||||||
final ChangeIndex index;
|
final ChangeIndex index;
|
||||||
@ -236,7 +234,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
IdentifiedUser.GenericFactory userFactory,
|
IdentifiedUser.GenericFactory userFactory,
|
||||||
Provider<CurrentUser> self,
|
Provider<CurrentUser> self,
|
||||||
PermissionBackend permissionBackend,
|
PermissionBackend permissionBackend,
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
ChangeControl.GenericFactory changeControlGenericFactory,
|
ChangeControl.GenericFactory changeControlGenericFactory,
|
||||||
ChangeNotes.Factory notesFactory,
|
ChangeNotes.Factory notesFactory,
|
||||||
ChangeData.Factory changeDataFactory,
|
ChangeData.Factory changeDataFactory,
|
||||||
@ -269,7 +266,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
userFactory,
|
userFactory,
|
||||||
self,
|
self,
|
||||||
permissionBackend,
|
permissionBackend,
|
||||||
capabilityControlFactory,
|
|
||||||
changeControlGenericFactory,
|
changeControlGenericFactory,
|
||||||
notesFactory,
|
notesFactory,
|
||||||
changeDataFactory,
|
changeDataFactory,
|
||||||
@ -304,7 +300,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
IdentifiedUser.GenericFactory userFactory,
|
IdentifiedUser.GenericFactory userFactory,
|
||||||
Provider<CurrentUser> self,
|
Provider<CurrentUser> self,
|
||||||
PermissionBackend permissionBackend,
|
PermissionBackend permissionBackend,
|
||||||
CapabilityControl.Factory capabilityControlFactory,
|
|
||||||
ChangeControl.GenericFactory changeControlGenericFactory,
|
ChangeControl.GenericFactory changeControlGenericFactory,
|
||||||
ChangeNotes.Factory notesFactory,
|
ChangeNotes.Factory notesFactory,
|
||||||
ChangeData.Factory changeDataFactory,
|
ChangeData.Factory changeDataFactory,
|
||||||
@ -335,7 +330,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
this.userFactory = userFactory;
|
this.userFactory = userFactory;
|
||||||
this.self = self;
|
this.self = self;
|
||||||
this.permissionBackend = permissionBackend;
|
this.permissionBackend = permissionBackend;
|
||||||
this.capabilityControlFactory = capabilityControlFactory;
|
|
||||||
this.notesFactory = notesFactory;
|
this.notesFactory = notesFactory;
|
||||||
this.changeControlGenericFactory = changeControlGenericFactory;
|
this.changeControlGenericFactory = changeControlGenericFactory;
|
||||||
this.changeDataFactory = changeDataFactory;
|
this.changeDataFactory = changeDataFactory;
|
||||||
@ -372,7 +366,6 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
userFactory,
|
userFactory,
|
||||||
Providers.of(otherUser),
|
Providers.of(otherUser),
|
||||||
permissionBackend,
|
permissionBackend,
|
||||||
capabilityControlFactory,
|
|
||||||
changeControlGenericFactory,
|
changeControlGenericFactory,
|
||||||
notesFactory,
|
notesFactory,
|
||||||
changeDataFactory,
|
changeDataFactory,
|
||||||
@ -933,7 +926,7 @@ public class ChangeQueryBuilder extends QueryBuilder<ChangeData> {
|
|||||||
for (GroupReference ref : suggestions) {
|
for (GroupReference ref : suggestions) {
|
||||||
ids.add(ref.getUUID());
|
ids.add(ref.getUUID());
|
||||||
}
|
}
|
||||||
return visibleto(new SingleGroupUser(args.capabilityControlFactory, ids));
|
return visibleto(new SingleGroupUser(ids));
|
||||||
}
|
}
|
||||||
|
|
||||||
throw error("No user or group matches \"" + who + "\".");
|
throw error("No user or group matches \"" + who + "\".");
|
||||||
|
@ -21,6 +21,7 @@ import com.google.gerrit.extensions.common.PluginDefinedInfo;
|
|||||||
import com.google.gerrit.extensions.registration.DynamicMap;
|
import com.google.gerrit.extensions.registration.DynamicMap;
|
||||||
import com.google.gerrit.reviewdb.server.ReviewDb;
|
import com.google.gerrit.reviewdb.server.ReviewDb;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.index.IndexConfig;
|
import com.google.gerrit.server.index.IndexConfig;
|
||||||
import com.google.gerrit.server.index.IndexPredicate;
|
import com.google.gerrit.server.index.IndexPredicate;
|
||||||
import com.google.gerrit.server.index.QueryOptions;
|
import com.google.gerrit.server.index.QueryOptions;
|
||||||
@ -65,6 +66,7 @@ public class ChangeQueryProcessor extends QueryProcessor<ChangeData>
|
|||||||
@Inject
|
@Inject
|
||||||
ChangeQueryProcessor(
|
ChangeQueryProcessor(
|
||||||
Provider<CurrentUser> userProvider,
|
Provider<CurrentUser> userProvider,
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Metrics metrics,
|
Metrics metrics,
|
||||||
IndexConfig indexConfig,
|
IndexConfig indexConfig,
|
||||||
ChangeIndexCollection indexes,
|
ChangeIndexCollection indexes,
|
||||||
@ -75,6 +77,7 @@ public class ChangeQueryProcessor extends QueryProcessor<ChangeData>
|
|||||||
DynamicMap<ChangeAttributeFactory> attributeFactories) {
|
DynamicMap<ChangeAttributeFactory> attributeFactories) {
|
||||||
super(
|
super(
|
||||||
userProvider,
|
userProvider,
|
||||||
|
capabilityFactory,
|
||||||
metrics,
|
metrics,
|
||||||
ChangeSchemaDefinitions.INSTANCE,
|
ChangeSchemaDefinitions.INSTANCE,
|
||||||
indexConfig,
|
indexConfig,
|
||||||
|
@ -14,25 +14,21 @@
|
|||||||
|
|
||||||
package com.google.gerrit.server.query.change;
|
package com.google.gerrit.server.query.change;
|
||||||
|
|
||||||
|
import com.google.common.collect.ImmutableSet;
|
||||||
import com.google.gerrit.reviewdb.client.AccountGroup;
|
import com.google.gerrit.reviewdb.client.AccountGroup;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.gerrit.server.account.ListGroupMembership;
|
import com.google.gerrit.server.account.ListGroupMembership;
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
public final class SingleGroupUser extends CurrentUser {
|
public final class SingleGroupUser extends CurrentUser {
|
||||||
private final GroupMembership groups;
|
private final GroupMembership groups;
|
||||||
|
|
||||||
public SingleGroupUser(
|
public SingleGroupUser(AccountGroup.UUID groupId) {
|
||||||
CapabilityControl.Factory capabilityControlFactory, AccountGroup.UUID groupId) {
|
this(ImmutableSet.of(groupId));
|
||||||
this(capabilityControlFactory, Collections.singleton(groupId));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public SingleGroupUser(
|
public SingleGroupUser(Set<AccountGroup.UUID> groups) {
|
||||||
CapabilityControl.Factory capabilityControlFactory, Set<AccountGroup.UUID> groups) {
|
|
||||||
super(capabilityControlFactory);
|
|
||||||
this.groups = new ListGroupMembership(groups);
|
this.groups = new ListGroupMembership(groups);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -19,6 +19,7 @@ import static com.google.gerrit.server.query.group.GroupQueryBuilder.FIELD_LIMIT
|
|||||||
|
|
||||||
import com.google.gerrit.reviewdb.client.AccountGroup;
|
import com.google.gerrit.reviewdb.client.AccountGroup;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.account.GroupControl;
|
import com.google.gerrit.server.account.GroupControl;
|
||||||
import com.google.gerrit.server.index.IndexConfig;
|
import com.google.gerrit.server.index.IndexConfig;
|
||||||
import com.google.gerrit.server.index.IndexPredicate;
|
import com.google.gerrit.server.index.IndexPredicate;
|
||||||
@ -44,6 +45,7 @@ public class GroupQueryProcessor extends QueryProcessor<AccountGroup> {
|
|||||||
@Inject
|
@Inject
|
||||||
protected GroupQueryProcessor(
|
protected GroupQueryProcessor(
|
||||||
Provider<CurrentUser> userProvider,
|
Provider<CurrentUser> userProvider,
|
||||||
|
CapabilityControl.Factory capabilityFactory,
|
||||||
Metrics metrics,
|
Metrics metrics,
|
||||||
IndexConfig indexConfig,
|
IndexConfig indexConfig,
|
||||||
GroupIndexCollection indexes,
|
GroupIndexCollection indexes,
|
||||||
@ -51,6 +53,7 @@ public class GroupQueryProcessor extends QueryProcessor<AccountGroup> {
|
|||||||
GroupControl.GenericFactory groupControlFactory) {
|
GroupControl.GenericFactory groupControlFactory) {
|
||||||
super(
|
super(
|
||||||
userProvider,
|
userProvider,
|
||||||
|
capabilityFactory,
|
||||||
metrics,
|
metrics,
|
||||||
GroupSchemaDefinitions.INSTANCE,
|
GroupSchemaDefinitions.INSTANCE,
|
||||||
indexConfig,
|
indexConfig,
|
||||||
|
@ -20,7 +20,6 @@ import static com.google.inject.Scopes.SINGLETON;
|
|||||||
import com.google.gerrit.common.TimeUtil;
|
import com.google.gerrit.common.TimeUtil;
|
||||||
import com.google.gerrit.reviewdb.client.Account;
|
import com.google.gerrit.reviewdb.client.Account;
|
||||||
import com.google.gerrit.server.account.AccountCache;
|
import com.google.gerrit.server.account.AccountCache;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.FakeRealm;
|
import com.google.gerrit.server.account.FakeRealm;
|
||||||
import com.google.gerrit.server.account.GroupBackend;
|
import com.google.gerrit.server.account.GroupBackend;
|
||||||
import com.google.gerrit.server.account.Realm;
|
import com.google.gerrit.server.account.Realm;
|
||||||
@ -36,7 +35,6 @@ import com.google.inject.AbstractModule;
|
|||||||
import com.google.inject.Guice;
|
import com.google.inject.Guice;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Injector;
|
import com.google.inject.Injector;
|
||||||
import com.google.inject.util.Providers;
|
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
@ -93,8 +91,6 @@ public class IdentifiedUserTest {
|
|||||||
.toInstance("http://localhost:8080/");
|
.toInstance("http://localhost:8080/");
|
||||||
bind(AccountCache.class).toInstance(accountCache);
|
bind(AccountCache.class).toInstance(accountCache);
|
||||||
bind(GroupBackend.class).to(SystemGroupBackend.class).in(SINGLETON);
|
bind(GroupBackend.class).to(SystemGroupBackend.class).in(SINGLETON);
|
||||||
bind(CapabilityControl.Factory.class)
|
|
||||||
.toProvider(Providers.<CapabilityControl.Factory>of(null));
|
|
||||||
bind(Realm.class).toInstance(mockRealm);
|
bind(Realm.class).toInstance(mockRealm);
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -27,8 +27,8 @@ public class FakeQueryBuilder extends ChangeQueryBuilder {
|
|||||||
new FakeQueryBuilder.Definition<>(FakeQueryBuilder.class),
|
new FakeQueryBuilder.Definition<>(FakeQueryBuilder.class),
|
||||||
new ChangeQueryBuilder.Arguments(
|
new ChangeQueryBuilder.Arguments(
|
||||||
null, null, null, null, null, null, null, null, null, null, null, null, null, null,
|
null, null, null, null, null, null, null, null, null, null, null, null, null, null,
|
||||||
null, null, null, null, null, null, null, null, indexes, null, null, null, null, null,
|
null, null, null, null, null, null, null, indexes, null, null, null, null, null, null,
|
||||||
null, null, null, null));
|
null, null, null));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Operator
|
@Operator
|
||||||
|
@ -35,7 +35,6 @@ import com.google.gerrit.server.GerritPersonIdent;
|
|||||||
import com.google.gerrit.server.IdentifiedUser;
|
import com.google.gerrit.server.IdentifiedUser;
|
||||||
import com.google.gerrit.server.InternalUser;
|
import com.google.gerrit.server.InternalUser;
|
||||||
import com.google.gerrit.server.account.AccountCache;
|
import com.google.gerrit.server.account.AccountCache;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.FakeRealm;
|
import com.google.gerrit.server.account.FakeRealm;
|
||||||
import com.google.gerrit.server.account.GroupBackend;
|
import com.google.gerrit.server.account.GroupBackend;
|
||||||
import com.google.gerrit.server.account.Realm;
|
import com.google.gerrit.server.account.Realm;
|
||||||
@ -158,8 +157,6 @@ public abstract class AbstractChangeNotesTest extends GerritBaseTests {
|
|||||||
bind(NotesMigration.class).toInstance(MIGRATION);
|
bind(NotesMigration.class).toInstance(MIGRATION);
|
||||||
bind(GitRepositoryManager.class).toInstance(repoManager);
|
bind(GitRepositoryManager.class).toInstance(repoManager);
|
||||||
bind(ProjectCache.class).toProvider(Providers.<ProjectCache>of(null));
|
bind(ProjectCache.class).toProvider(Providers.<ProjectCache>of(null));
|
||||||
bind(CapabilityControl.Factory.class)
|
|
||||||
.toProvider(Providers.<CapabilityControl.Factory>of(null));
|
|
||||||
bind(Config.class).annotatedWith(GerritServerConfig.class).toInstance(testConfig);
|
bind(Config.class).annotatedWith(GerritServerConfig.class).toInstance(testConfig);
|
||||||
bind(String.class)
|
bind(String.class)
|
||||||
.annotatedWith(AnonymousCowardName.class)
|
.annotatedWith(AnonymousCowardName.class)
|
||||||
@ -199,7 +196,7 @@ public abstract class AbstractChangeNotesTest extends GerritBaseTests {
|
|||||||
changeOwner = userFactory.create(co.getId());
|
changeOwner = userFactory.create(co.getId());
|
||||||
otherUser = userFactory.create(ou.getId());
|
otherUser = userFactory.create(ou.getId());
|
||||||
otherUserId = otherUser.getAccountId();
|
otherUserId = otherUser.getAccountId();
|
||||||
internalUser = new InternalUser(null);
|
internalUser = new InternalUser();
|
||||||
}
|
}
|
||||||
|
|
||||||
private void setTimeForTesting() {
|
private void setTimeForTesting() {
|
||||||
|
@ -48,7 +48,6 @@ import com.google.gerrit.rules.PrologEnvironment;
|
|||||||
import com.google.gerrit.rules.RulesCache;
|
import com.google.gerrit.rules.RulesCache;
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
import com.google.gerrit.server.account.CapabilityCollection;
|
import com.google.gerrit.server.account.CapabilityCollection;
|
||||||
import com.google.gerrit.server.account.CapabilityControl;
|
|
||||||
import com.google.gerrit.server.account.GroupMembership;
|
import com.google.gerrit.server.account.GroupMembership;
|
||||||
import com.google.gerrit.server.account.ListGroupMembership;
|
import com.google.gerrit.server.account.ListGroupMembership;
|
||||||
import com.google.gerrit.server.config.AllProjectsName;
|
import com.google.gerrit.server.config.AllProjectsName;
|
||||||
@ -58,6 +57,7 @@ import com.google.gerrit.server.config.AllUsersNameProvider;
|
|||||||
import com.google.gerrit.server.config.SitePaths;
|
import com.google.gerrit.server.config.SitePaths;
|
||||||
import com.google.gerrit.server.git.ProjectConfig;
|
import com.google.gerrit.server.git.ProjectConfig;
|
||||||
import com.google.gerrit.server.index.SingleVersionModule.SingleVersionListener;
|
import com.google.gerrit.server.index.SingleVersionModule.SingleVersionListener;
|
||||||
|
import com.google.gerrit.server.permissions.PermissionBackend;
|
||||||
import com.google.gerrit.server.permissions.ProjectPermission;
|
import com.google.gerrit.server.permissions.ProjectPermission;
|
||||||
import com.google.gerrit.server.permissions.RefPermission;
|
import com.google.gerrit.server.permissions.RefPermission;
|
||||||
import com.google.gerrit.server.query.change.InternalChangeQuery;
|
import com.google.gerrit.server.query.change.InternalChangeQuery;
|
||||||
@ -206,8 +206,8 @@ public class RefControlTest {
|
|||||||
private ChangeControl.Factory changeControlFactory;
|
private ChangeControl.Factory changeControlFactory;
|
||||||
private ReviewDb db;
|
private ReviewDb db;
|
||||||
|
|
||||||
|
@Inject private PermissionBackend permissionBackend;
|
||||||
@Inject private CapabilityCollection.Factory capabilityCollectionFactory;
|
@Inject private CapabilityCollection.Factory capabilityCollectionFactory;
|
||||||
@Inject private CapabilityControl.Factory capabilityControlFactory;
|
|
||||||
@Inject private SchemaCreator schemaCreator;
|
@Inject private SchemaCreator schemaCreator;
|
||||||
@Inject private SingleVersionListener singleVersionListener;
|
@Inject private SingleVersionListener singleVersionListener;
|
||||||
@Inject private InMemoryDatabase schemaFactory;
|
@Inject private InMemoryDatabase schemaFactory;
|
||||||
@ -910,6 +910,7 @@ public class RefControlTest {
|
|||||||
null, // refFilter
|
null, // refFilter
|
||||||
queryProvider,
|
queryProvider,
|
||||||
canonicalWebUrl,
|
canonicalWebUrl,
|
||||||
|
permissionBackend,
|
||||||
new MockUser(name, memberOf),
|
new MockUser(name, memberOf),
|
||||||
newProjectState(local),
|
newProjectState(local),
|
||||||
metrics);
|
metrics);
|
||||||
@ -925,7 +926,6 @@ public class RefControlTest {
|
|||||||
private final GroupMembership groups;
|
private final GroupMembership groups;
|
||||||
|
|
||||||
MockUser(String name, AccountGroup.UUID[] groupId) {
|
MockUser(String name, AccountGroup.UUID[] groupId) {
|
||||||
super(capabilityControlFactory);
|
|
||||||
username = name;
|
username = name;
|
||||||
ArrayList<AccountGroup.UUID> groupIds = Lists.newArrayList(groupId);
|
ArrayList<AccountGroup.UUID> groupIds = Lists.newArrayList(groupId);
|
||||||
groupIds.add(REGISTERED_USERS);
|
groupIds.add(REGISTERED_USERS);
|
||||||
|
@ -15,24 +15,27 @@
|
|||||||
package com.google.gerrit.sshd;
|
package com.google.gerrit.sshd;
|
||||||
|
|
||||||
import com.google.gerrit.server.CurrentUser;
|
import com.google.gerrit.server.CurrentUser;
|
||||||
|
import com.google.gerrit.server.account.CapabilityControl;
|
||||||
import com.google.gerrit.server.git.QueueProvider;
|
import com.google.gerrit.server.git.QueueProvider;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
import java.util.concurrent.ScheduledThreadPoolExecutor;
|
import java.util.concurrent.ScheduledThreadPoolExecutor;
|
||||||
|
|
||||||
class CommandExecutorProvider implements Provider<ScheduledThreadPoolExecutor> {
|
class CommandExecutorProvider implements Provider<ScheduledThreadPoolExecutor> {
|
||||||
|
private final CapabilityControl.Factory capabilityFactory;
|
||||||
private final QueueProvider queues;
|
private final QueueProvider queues;
|
||||||
private final CurrentUser user;
|
private final CurrentUser user;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
CommandExecutorProvider(QueueProvider queues, CurrentUser user) {
|
CommandExecutorProvider(
|
||||||
|
CapabilityControl.Factory capabilityFactory, QueueProvider queues, CurrentUser user) {
|
||||||
|
this.capabilityFactory = capabilityFactory;
|
||||||
this.queues = queues;
|
this.queues = queues;
|
||||||
this.user = user;
|
this.user = user;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ScheduledThreadPoolExecutor get() {
|
public ScheduledThreadPoolExecutor get() {
|
||||||
return queues.getQueue(user.getCapabilities().getQueueType());
|
return queues.getQueue(capabilityFactory.create(user).getQueueType());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1 +1 @@
|
|||||||
Subproject commit 2a4d0bfe10c63c79ca0d47be21756377703e46c0
|
Subproject commit 1085b453039b0fe230c3584e0024a7965cc1e323
|
Loading…
Reference in New Issue
Block a user