blob: c935adf0790eacb20d73f0d7fe49101feff0d392 [file] [log] [blame]
// Copyright (C) 2017 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.gerrit.server.project;
import com.google.common.collect.ImmutableList;
import com.google.common.flogger.FluentLogger;
import com.google.gerrit.entities.Project;
import com.google.gerrit.server.CurrentUser;
import com.google.gerrit.server.logging.Metadata;
import com.google.gerrit.server.logging.TraceContext;
import com.google.gerrit.server.logging.TraceContext.TraceTimer;
import com.google.gerrit.server.permissions.PermissionBackend;
import com.google.gerrit.server.permissions.PermissionBackend.RefFilterOptions;
import com.google.gerrit.server.permissions.PermissionBackendException;
import com.google.inject.Inject;
import com.google.inject.Singleton;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Collection;
import java.util.List;
import java.util.Optional;
import org.eclipse.jgit.errors.IncorrectObjectTypeException;
import org.eclipse.jgit.errors.MissingObjectException;
import org.eclipse.jgit.lib.Ref;
import org.eclipse.jgit.lib.Repository;
import org.eclipse.jgit.revwalk.ReachabilityChecker;
import org.eclipse.jgit.revwalk.RevCommit;
import org.eclipse.jgit.revwalk.RevWalk;
/**
* Report whether a commit is reachable from a set of commits. This is used for checking if a user
* has read permissions on a commit.
*/
@Singleton
public class Reachable {
private static final FluentLogger logger = FluentLogger.forEnclosingClass();
private final PermissionBackend permissionBackend;
@Inject
Reachable(PermissionBackend permissionBackend) {
this.permissionBackend = permissionBackend;
}
/**
* Returns true if a commit is reachable from a given set of refs. This method enforces
* permissions on the given set of refs and performs a reachability check. Tags are not filtered
* separately and will only be returned if reachable by a provided ref.
*/
public boolean fromRefs(
Project.NameKey project, Repository repo, RevCommit commit, List<Ref> refs) {
return fromRefs(project, repo, commit, refs, Optional.empty());
}
boolean fromRefs(
Project.NameKey project,
Repository repo,
RevCommit commit,
List<Ref> refs,
Optional<CurrentUser> optionalUserProvider) {
try (RevWalk rw = new RevWalk(repo)) {
Collection<Ref> filtered =
optionalUserProvider
.map(permissionBackend::user)
.orElseGet(() -> permissionBackend.currentUser())
.project(project)
.filter(refs, repo, RefFilterOptions.defaults());
Collection<RevCommit> visible = new ArrayList<>();
for (Ref r : filtered) {
try {
visible.add(rw.parseCommit(r.getObjectId()));
} catch (IncorrectObjectTypeException notCommit) {
// Its OK for a tag reference to point to a blob or a tree, this
// is common in the Linux kernel or git.git repository.
continue;
} catch (MissingObjectException notHere) {
// Log the problem with this branch, but keep processing.
logger.atWarning().log(
"Reference %s in %s points to dangling object %s",
r.getName(), repo.getDirectory(), r.getObjectId());
continue;
}
}
// The filtering above already produces a voluminous trace. To separate the permission check
// from the reachability check, do the trace here:
try (TraceTimer timer =
TraceContext.newTimer(
"ReachabilityChecker.areAllReachable",
Metadata.builder().projectName(project.get()).resourceCount(refs.size()).build())) {
ReachabilityChecker checker = rw.getObjectReader().createReachabilityChecker(rw);
Optional<RevCommit> unreachable =
checker.areAllReachable(ImmutableList.of(rw.parseCommit(commit)), visible.stream());
return !unreachable.isPresent();
}
} catch (IOException | PermissionBackendException e) {
logger.atSevere().withCause(e).log(
"Cannot verify permissions to commit object %s in repository %s", commit.name(), project);
return false;
}
}
}