| /* | |
| * Copyright 2012 Philip L. McMahon. | |
| * | |
| * Derived from blockpush.groovy, copyright 2011 gitblit.com. | |
| * | |
| * Licensed under the Apache License, Version 2.0 (the "License"); | |
| * you may not use this file except in compliance with the License. | |
| * You may obtain a copy of the License at | |
| * | |
| * http://www.apache.org/licenses/LICENSE-2.0 | |
| * | |
| * Unless required by applicable law or agreed to in writing, software | |
| * distributed under the License is distributed on an "AS IS" BASIS, | |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| * See the License for the specific language governing permissions and | |
| * limitations under the License. | |
| */ | |
| import com.gitblit.GitBlit | |
| import com.gitblit.models.RepositoryModel | |
| import com.gitblit.models.UserModel | |
| import org.eclipse.jgit.transport.ReceiveCommand | |
| import org.eclipse.jgit.transport.ReceiveCommand.Result | |
| import org.slf4j.Logger | |
| /** | |
| * Sample Gitblit Pre-Receive Hook: protect-refs | |
| * | |
| * This script provides basic authorization of receive command types for a list | |
| * of known ref patterns. Command types and unmatched ref patterns will be | |
| * ignored, meaning this script has an "allow by default" policy. | |
| * | |
| * This script works best when a repository requires authentication on push, but | |
| * can be used to enforce fast-forward commits or prohibit ref deletion by | |
| * setting the *authorizedTeams* variable to an empty list and adding a ".+" | |
| * entry to the *protectedRefs* list. | |
| * | |
| * The Pre-Receive hook is executed after an incoming push has been parsed, | |
| * validated, and objects have been written but BEFORE the refs are updated. | |
| * This is the appropriate point to block a push for some reason. | |
| * | |
| * This script is only executed when pushing to *Gitblit*, not to other Git | |
| * tooling you may be using. | |
| * | |
| * If this script is specified in *groovy.preReceiveScripts* of gitblit.properties | |
| * or web.xml then it will be executed by any repository when it receives a | |
| * push. If you choose to share your script then you may have to consider | |
| * tailoring control-flow based on repository access restrictions. | |
| * | |
| * Scripts may also be specified per-repository in the repository settings page. | |
| * Shared scripts will be excluded from this list of available scripts. | |
| * | |
| * This script is dynamically reloaded and it is executed within it's own | |
| * exception handler so it will not crash another script nor crash Gitblit. | |
| * | |
| * This script may reject one or more commands, but will never return false. | |
| * Subsequent scripts, if any, will always be invoked. | |
| * | |
| * Bound Variables: | |
| * gitblit Gitblit Server com.gitblit.GitBlit | |
| * repository Gitblit Repository com.gitblit.models.RepositoryModel | |
| * receivePack JGit Receive Pack org.eclipse.jgit.transport.ReceivePack | |
| * user Gitblit User com.gitblit.models.UserModel | |
| * commands JGit commands Collection<org.eclipse.jgit.transport.ReceiveCommand> | |
| * url Base url for Gitblit String | |
| * logger Logs messages to Gitblit org.slf4j.Logger | |
| * clientLogger Logs messages to Git client com.gitblit.utils.ClientLogger | |
| * | |
| * Accessing Gitblit Custom Fields: | |
| * def myCustomField = repository.customFields.myCustomField | |
| * | |
| */ | |
| // map of protected command types to returned results type | |
| // commands not included will skip authz check | |
| def protectedCmds = [ | |
| UPDATE_NONFASTFORWARD: Result.REJECTED_NONFASTFORWARD, | |
| DELETE: Result.REJECTED_NODELETE | |
| ] | |
| // list of regex patterns for protected refs | |
| def protectedRefs = [ | |
| "refs/heads/master", | |
| "refs/tags/.+" | |
| ] | |
| // teams which are authorized to perform protected commands on protected refs | |
| def authorizedTeams = [ "admins" ] | |
| for (ReceiveCommand command : commands) { | |
| def updateType = command.type | |
| def updatedRef = command.refName | |
| // find first regex which matches updated ref, if any | |
| def refPattern = protectedRefs.find { updatedRef.matches ~it } | |
| // find rejection result for update type, if any | |
| def result = protectedCmds[updateType.name()] | |
| // command requires authz if ref is protected and has a mapped rejection result | |
| if (refPattern && result) { | |
| // verify user is a member of any authorized team | |
| def team = authorizedTeams.find { user.isTeamMember it } | |
| if (team) { | |
| // don't adjust command result | |
| logger.info "${user.username} authorized for ${updateType} of protected ref ${repository.name}:${updatedRef} (${command.oldId.name} -> ${command.newId.name})" | |
| } else { | |
| // mark command result as rejected | |
| command.setResult(result, "${user.username} cannot ${updateType} protected ref ${repository.name}:${updatedRef} matching pattern ${refPattern}") | |
| } | |
| } | |
| } |