Package com.gitblit.models

Examples of com.gitblit.models.UserModel.canView()


    repository.accessRestriction = AccessRestrictionType.VIEW;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.REWIND);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN NOT push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertTrue("named CAN NOT delete ref!", user.canDeleteRef(repository));
View Full Code Here


    TeamModel team = new TeamModel("test");
    UserModel user = new UserModel("test");
    user.teams.add(team);

    assertTrue("team member CAN NOT view!", user.canView(repository));
    assertTrue("team member CAN NOT clone!", user.canClone(repository));
    assertTrue("team member CAN NOT push!", user.canPush(repository));

    assertTrue("team member CAN NOT create ref!", user.canCreateRef(repository));
    assertTrue("team member CAN NOT delete ref!", user.canDeleteRef(repository));
View Full Code Here

    repository.accessRestriction = AccessRestrictionType.PUSH;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.CREATE);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN NOT push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertFalse("named CAN delete ref!", user.canDeleteRef(repository));
View Full Code Here

    repository.accessRestriction = AccessRestrictionType.CLONE;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.CREATE);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN NOT push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertFalse("named CAN delete red!", user.canDeleteRef(repository));
View Full Code Here

          httpResponse.setHeader("WWW-Authenticate", CHALLENGE);
          httpResponse.sendError(HttpServletResponse.SC_UNAUTHORIZED);
          return;
        } else {
          // check user access for request
          if (user.canView(model)) {
            // authenticated request permitted.
            // pass processing to the restricted servlet.
            newSession(authenticatedRequest, httpResponse);
            logger.info(MessageFormat.format("ARF: {0} ({1}) authenticated", fullUrl,
                HttpServletResponse.SC_CONTINUE));
View Full Code Here

    repository.accessRestriction = AccessRestrictionType.VIEW;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.CREATE);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN not push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertFalse("named CAN delete ref!", user.canDeleteRef(repository));
View Full Code Here

    repository.accessRestriction = AccessRestrictionType.NONE;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.DELETE);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN NOT push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertTrue("named CAN NOT delete ref!", user.canDeleteRef(repository));
View Full Code Here

    repository.accessRestriction = AccessRestrictionType.PUSH;

    UserModel user = new UserModel("test");
    user.setRepositoryPermission(repository.name, AccessPermission.DELETE);

    assertTrue("named CAN NOT view!", user.canView(repository));
    assertTrue("named CAN NOT clone!", user.canClone(repository));
    assertTrue("named CAN NOT push!", user.canPush(repository));

    assertTrue("named CAN NOT create ref!", user.canCreateRef(repository));
    assertTrue("named CAN NOT delete ref!", user.canDeleteRef(repository));
View Full Code Here

        UserModel user = GitBlitWebSession.get().getUser();
        if (user == null) {
          // workaround until get().getUser() is reviewed throughout the app
          user = UserModel.ANONYMOUS;
        }
        boolean canAccess = user.canView(getRepositoryModel(),
                branch.reference.getName());
        if (!canAccess) {
          error(getString("gb.accessDenied"), true);
        }
      }
View Full Code Here

    } else {
      RepositoryModel origin = app().repositories().getRepositoryModel(model.originRepository);
      if (origin == null) {
        // no origin repository
        add(new Label("originRepository").setVisible(false));
      } else if (!user.canView(origin)) {
        // show origin repository without link
        Fragment forkFrag = new Fragment("originRepository", "originFragment", this);
        forkFrag.add(new Label("originRepository", StringUtils.stripDotGit(model.originRepository)));
        add(forkFrag);
      } else {
View Full Code Here

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.