trac-gitolite-plugin / trac_gitolite /

Full commit
from trac.core import *
from trac.config import Option, BoolOption
from trac.perm import IPermissionPolicy

from trac_gitolite import utils

class GitolitePermissionPolicy(Component):

    gitolite_admin_reponame = Option('trac-gitolite', 'admin_reponame',
    default_to_private = BoolOption('trac-gitolite', 'default_private',
        doc=("If this flag is set to True, then repositories will be private by default, "
             "causing all permissions to be denied to all users if the repository "
             "is not mentioned in the gitolite conf file."))
    all_includes_anonymous = BoolOption('trac-gitolite', 'all_includes_anonymous',
        doc=("If this flag is set to True, then anonymous users will be granted permissions "
             "on repositories that specify ``@all = R``.  By default, the ``@all`` token "
             "is considered to mean all logged-in users only."))
    ## Helper methods

    def parent_repository(self, resource):
        while True:
            if resource is None:
                return None
            if resource.realm == 'repository':
                return resource
            resource = resource.parent

    def read_config(self):
        node = utils.get_repo_node(self.env, self.gitolite_admin_reponame,
        fp = node.get_content()
        return utils.read_config(fp)

    def check_repository_permission(self, action, username, repository, resource, perm):
        repos = self.read_config()

        ## If the repo is not known in the config, we defer to the supersystem's decisions,
        ## unless our configuration says otherwise.
        if not in repos:
            if self.default_to_private:
                return False
                return None

        perms = repos[]

        if username == 'anonymous':
            if self.all_includes_anonymous:
                if '@all' in perms.get('R', []):
                    return True
            ## If the repo is known in the config then we assume that anonymous users can't see it
            ## unless the @all-check in the previous stanza was triggered.
            return False

        if username in perms.get('R', []):
            return True

        if '@all' in perms.get('R', []):
            return True

        ## If the repo is known in the config but the user isn't explicitly granted access there,
        ## then the user does not have access.
        return False

    ## IPermissionPolicy methods
    def check_permission(self, action, username, resource, perm):
        ## This policy only covers entities that live within a repository
        ## so we'll decline to state any permission if it's not a repository subresource
        repository = self.parent_repository(resource)
        if repository is None:
            return None

        return self.check_repository_permission(action, username, repository, resource, perm)