10 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/Messages.properties:
--------------------------------------------------------------------------------
1 | InheritGlobalStrategy.DisplayName=Inherit globally defined permissions
2 | InheritParentStrategy.DisplayName=Inherit permissions from parent ACL
3 | NonInheritingStrategy.DisplayName=Do not inherit permission grants from other ACLs
4 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritGlobalStrategy/config.properties:
--------------------------------------------------------------------------------
1 | blurb = This object will inherit the global security settings \
2 | directly, but not any permissions granted in ancestor items, if any.
3 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/ProjectMatrixAuthorizationStrategy/help_zh_TW.html:
--------------------------------------------------------------------------------
1 |
11 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritParentStrategy/config.properties:
--------------------------------------------------------------------------------
1 | blurb = This item will inherit its parent item''s permissions (in addition to any permissions granted here). \
2 | If this item is at the top level in Jenkins, it will inherit the global security security settings.
3 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/help-user-group.jelly:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | Different security realm has different conventions about group names.
5 | The best way to go about it is to login and see what group names you belong to,
6 | by going to this diagnostics page.
7 |
3 | This attribute only exists for compatibility for Configuration as Code YAML files before Matrix Authorization Strategy Plugin 1.4.
4 | Use permissions instead.
5 | Setting both is unsupported and the result undefined.
6 |
14 | 權限會累加。也就是說,如果 X 使用者在 A, B, C 三個群組中,則該使用者實際的權限會是 X, A, B, C 及匿名使用者權限的聯集。
15 |
16 |
--------------------------------------------------------------------------------
/src/main/resources/images/symbols/unselect-all.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xDeletion/users/users.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 1
4 |
5 |
6 | admin
7 | admin_7258660542409517449
8 |
9 |
10 | user
11 | user_5543844453642095256
12 |
13 |
14 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xReconfiguration/users/users.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 1
4 |
5 |
6 | admin
7 | admin_7258660542409517449
8 |
9 |
10 | user
11 | user_5543844453642095256
12 |
13 |
14 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/NonInheritingStrategy/config.properties:
--------------------------------------------------------------------------------
1 | blurb = This object will not inherit the global security settings, or any permissions from its ancestors. \
2 | Only permissions explicitly enabled here will be granted. \
3 | To ensure that users are not inadvertently locked out from Jenkins, an exception is made for the Overall/Administer permission: \
4 | Administrators of Jenkins will still have access to this object even if not explicitly granted here.
5 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/ProjectMatrixAuthorizationStrategy/help.html:
--------------------------------------------------------------------------------
1 |
2 | This mode is an extension to "Matrix-based security" that allows additional ACL matrix to be defined
3 | for each project separately (which is done on the job configuration screen.)
4 |
5 |
6 | This allows you to say things like "Joe can access project A, B, and C but he can't see D."
7 | See the help of "Matrix-based security" for the concept of matrix-based security in general.
8 |
9 |
10 | ACLs are additive, so the access rights granted below will be effective for all the projects.
11 |
4 | This attribute only exists for compatibility for Configuration as Code YAML files before Matrix Authorization Strategy Plugin 1.4.
5 | Use permissions instead.
6 | Setting both is unsupported and the result undefined.
7 |
4 | A list of strings with the following format: "PermissionGroup/PermissionName:UserOrGroup".
5 | Examples for list entries:
6 |
7 |
"Overall/Read:anonymous"
8 |
"Job/Build:joe.chin"
9 |
10 |
11 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AmbiguityMonitor/index.properties:
--------------------------------------------------------------------------------
1 |
2 | blurb = The list below lists configurations with ambiguous permission assignments. \
3 | This means that permissions would be granted both to users with the specified ID, and groups with the specified name. \
4 | If the current security realm does not distinguish between user IDs and group names unambiguously, and if users can either choose their own user ID or create new groups, this configuration may allow them to obtain greater permissions. \
5 | It is recommended that you replace all ambiguous entries with ones that are either explicitly a user or group.
6 | title = Objects with ambiguous permission assignments:
7 |
--------------------------------------------------------------------------------
/src/main/resources/images/symbols/select-all.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AuthorizationMatrixNodeProperty/config.groovy:
--------------------------------------------------------------------------------
1 | package org.jenkinsci.plugins.matrixauth.AuthorizationMatrixNodeProperty
2 |
3 | import lib.FormTagLib
4 | import org.jenkinsci.plugins.matrixauth.inheritance.InheritanceStrategyDescriptor
5 |
6 | def f = namespace(FormTagLib)
7 | def st = namespace("jelly:stapler")
8 |
9 | f.nested {
10 | div {
11 | f.dropdownDescriptorSelector(title: _("Inheritance Strategy"), descriptors: InheritanceStrategyDescriptor.getApplicableDescriptors(my?.class?:hudson.model.Node.class), field: 'inheritanceStrategy')
12 | st.include(class: "hudson.security.GlobalMatrixAuthorizationStrategy", page: "config")
13 | }
14 | }
15 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/integrations/casc/ExportTest/ExportTest-exportTest-global.yml:
--------------------------------------------------------------------------------
1 | entries:
2 | - group:
3 | name: "authenticated"
4 | permissions:
5 | - "Agent/Build"
6 | - "Agent/Connect"
7 | - "Agent/Create"
8 | - "Agent/Delete"
9 | - "Agent/Disconnect"
10 | - "Credentials/Create"
11 | - "Credentials/ManageDomains"
12 | - "Credentials/View"
13 | - "Job/Build"
14 | - "Job/Cancel"
15 | - "Job/Configure"
16 | - "Job/Read"
17 | - "Overall/Administer"
18 | - "Run/Delete"
19 | - "Run/Update"
20 | - "View/Configure"
21 | - "View/Delete"
22 | - user:
23 | name: "anonymous"
24 | permissions:
25 | - "Overall/Administer"
26 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/integrations/casc/ExportTest/ExportTest-exportTestLegacy-global.yml:
--------------------------------------------------------------------------------
1 | entries:
2 | - userOrGroup:
3 | name: "anonymous"
4 | permissions:
5 | - "Overall/Administer"
6 | - userOrGroup:
7 | name: "authenticated"
8 | permissions:
9 | - "Agent/Build"
10 | - "Agent/Connect"
11 | - "Agent/Create"
12 | - "Agent/Delete"
13 | - "Agent/Disconnect"
14 | - "Credentials/Create"
15 | - "Credentials/ManageDomains"
16 | - "Credentials/View"
17 | - "Job/Build"
18 | - "Job/Cancel"
19 | - "Job/Configure"
20 | - "Job/Read"
21 | - "Overall/Administer"
22 | - "Run/Delete"
23 | - "Run/Update"
24 | - "View/Configure"
25 | - "View/Delete"
26 |
--------------------------------------------------------------------------------
/.github/dependabot.yml:
--------------------------------------------------------------------------------
1 | # https://docs.github.com/en/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file
2 | ---
3 | version: 2
4 | updates:
5 | - package-ecosystem: "maven"
6 | directory: "/"
7 | schedule:
8 | interval: "weekly"
9 | day: "friday"
10 | ignore:
11 | # BOM and build dependencies are excluded, they are released far too often and matter too little
12 | - dependency-name: "io.jenkins.tools.bom:bom-2.*.x"
13 | - dependency-name: "io.jenkins.tools.incrementals:git-changelist-maven-extension"
14 | - dependency-name: "org.jenkins-ci.plugins:plugin"
15 | - package-ecosystem: "github-actions"
16 | directory: "/"
17 | schedule:
18 | interval: "weekly"
19 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/ProjectMatrixAuthorizationStrategy/help_de.html:
--------------------------------------------------------------------------------
1 |
2 | Dieser Modus erweitert die "Matrix-basierte Sicherheit" um eine zusätzliche ACL-Rechtematrix,
3 | die für jedes Projekt individuell festgelegt werden kann (in der Konfigurationsmaske des jeweiligen Jobs).
4 |
5 |
6 | Dies erlaubt Ihnen eine Rechtevergabe wie z.B. "Joe darf auf Projekt A, B und C zugreifen - er
7 | soll aber Projekt D nicht sehen dürfen". Lesen Sie den Hilfetext bei "Matrix-basierte Sicherheit",
8 | um mehr über das Konzept der matrix-basierten Sicherheit im Allgemeinen zu erfahren.
9 |
10 |
11 | ACL-Rechte sind additiv. Dies bedeutet, dass die untenstehend erteilten Rechte für alle
12 | Projekte als erteilt gelten.
13 |
2 | In this scheme, you can configure who can do what by using a big table.
3 |
4 |
5 | Each column represents a permission. Hover the mouse over the permission names to get
6 | more information about what they represent.
7 |
8 |
9 | Each row represents a user or a group (often called 'role', depending on the security realm.)
10 | This includes a special user 'anonymous', which represents unauthenticated users, as well
11 | as 'authenticated', which represents all authenticated users (IOW, everyone except anonymous users.)
12 | Use the text box below the table to add new users/groups/roles to the table, and click the
13 | [x] icon to remove it from the table.
14 |
15 |
16 | Permissions are additive. That is, if an user X is in group A, B, and C, then
17 | the permissions that this user actually has are the union of all permissions given to
18 | X, A, B, C, and anonymous.
19 |
20 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config.groovy:
--------------------------------------------------------------------------------
1 | package hudson.security.AuthorizationMatrixProperty
2 |
3 | import hudson.model.Item
4 | import lib.FormTagLib
5 | import org.jenkinsci.plugins.matrixauth.inheritance.InheritanceStrategyDescriptor
6 |
7 | def f = namespace(FormTagLib)
8 | def st = namespace("jelly:stapler")
9 |
10 | f.optionalBlock(name: 'useProjectSecurity', checked: instance != null, title: _("Enable project-based security")) {
11 | f.nested {
12 | div {
13 | // It is unclear whether we can expect every Item to be an AbstractItem. While I've been unsuccessful finding one in a quick search, better be safe here and just offer fewer options if necessary.
14 | f.dropdownDescriptorSelector(title: _("Inheritance Strategy"), descriptors: InheritanceStrategyDescriptor.getApplicableDescriptors(my?.class?: Item.class), field: 'inheritanceStrategy')
15 | st.include(class: "hudson.security.GlobalMatrixAuthorizationStrategy", page: "config")
16 | }
17 | }
18 | }
--------------------------------------------------------------------------------
/LICENSE.md:
--------------------------------------------------------------------------------
1 | The MIT License
2 |
3 | Copyright 2004-2025
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
6 |
7 | The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
8 |
9 | THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
10 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/help_ru.html:
--------------------------------------------------------------------------------
1 |
2 |
3 | В этом режиме вы можете явно указать допустимые операции, используя матрицу привилегий.
4 |
5 |
6 | Каждая колонка представляет собой привилегию. Наведите курсор мыши на имя привелегии
7 | для получения большей информации о её предназначении.
8 |
9 |
10 | Каждая строка представляет собой пользователя или группу (обычно называемая "ролью", в
11 | зависимости от используемого модуля безопасности). Список включает также специального
12 | пользователя Аноним, который представляет собой неаутентифицированного пользователя.
13 | Чтобы добавить нового пользователя/группу/роль в таблицу, используйте поле ввода под таблицей.
14 | Чтобы удалить пользователя/группу/роль нажмите кнопку [x] в правой колонке.
15 |
16 |
17 | Привилегии аддитивны, то есть если пользователь X состоит в группах A, B и C, тогда
18 | реальные привилегии пользователя - объединение всех привилегий данных конкретно пользователю,
19 | группам A, B и C и анонимному пользователю.
20 |
2 | In dieser Tabelle können Sie angeben, wer zu welchen Aktionen berechtigt ist.
3 |
4 | Jede Spalte entspricht einer Berechtigung. Fahren Sie mit der Maus über die
5 | Namen der Berechtigungen, um mehr Informationen darüber zu erhalten, was sie
6 | bedeuten.
7 |
8 | Jede Zeile entspricht einem Benutzer oder einer Benutzergruppe (je nach
9 | Benutzerverzeichnis oft auch als "Rolle" bezeichnet). Die Zeilen beinhalten
10 | auch die besonderen Benutzer 'anonymous' bzw. 'authenticated', welche
11 | nichtangemeldete bzw. angemeldete Benutzer repräsentieren,
12 |
13 | Verwenden Sie das untenstehende Textfeld, um neue Benutzer/Gruppen/Rollen zur Tabelle
14 | hinzuzufügen und klicken Sie auf das [x]-Symbol, um sie wieder von der
15 | Tabelle zu entfernen.
16 |
17 | Berechtigungen sind additiv. Dies bedeutet, dass ein Benutzer X, der Mitglied
18 | in den Gruppen A, B und C ist, die Vereinigungsmenge aller Berechtigungen
19 | besitzt, die X, A, B, C und dem Benutzer 'anonymous' erteilt wurden.
20 |
2 |
3 | Neste esquema, você pode configurar quem pode fazer o quê usando uma grande tabela.
4 |
5 |
6 | Cada coluna representa uma permissão. Passe o mouse sobre os nomes das permissões para
7 | obter mais informação sobre o que elas representam.
8 |
9 |
10 | Cada linha representa um usuário ou grupo (frequentemente chamado de 'papel',
11 | dependendo do domínio de segurança.)
12 | Isto inclui um usuário especial chamado 'anonymous', que representa os usuários não autenticados.
13 | Use a caixa de texto abaixo da tabela para adicionar novos usuários/grupos/papéis na tabela, e clique
14 | no ícone [x] para remover da tabela.
15 |
16 |
17 | Permissões são cumulativas. Ou seja, se um usuário X está nos grupos A, B, e C, então
18 | as permissões que este usuário na verdade tem é a únião de todas as permissões dadas para
19 | X, A, B, C, e anônimos.
20 |
21 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config.properties:
--------------------------------------------------------------------------------
1 | selectall=Grant all permissions to {0}
2 | unselectall=Remove all permissions from {0}
3 | remove=Remove entries for {0}
4 | migrate_user=Migrate ambiguous permissions assignment to user {0}
5 | migrate_group=Migrate ambiguous permissions assignment to group {0}
6 | tooltip_enabled={0}/{1} for {2} {3}
7 | tooltip_disabled={0}/{1} for {2} {3} is granted through another permission
8 |
9 | groupPrompt=Group name:
10 | groupError=An entry for this group already exists
11 |
12 | userPrompt=User ID:
13 | userError=An entry for this user already exists
14 |
15 | ambiguous=This table contains rows with ambiguous entries. This means that they apply both to users with the specified ID, and groups with the specified name. \
16 | If the current security realm does not distinguish between user IDs and group names unambiguously, and if users can either choose their own user ID or create new groups, this configuration may allow them to obtain greater permissions. \
17 | It is recommended that all ambiguous entries are replaced with ones that are either explicitly a user or group.
18 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/help_tr.html:
--------------------------------------------------------------------------------
1 |
2 |
3 | Bu şemada, tabloyu kullanarak kimin ne yapabileceğini belirleyebilirsiniz.
4 |
5 |
6 | Her kolon bir yetkiyi temsil eder. Mouse ile yetki isimlerinin üzerine
7 | gelerek, daha fazla bilgi alabilirsiniz.
8 |
9 |
10 | Her satır bir kullanıcı veya grubu temsil eder (Güvenlik alanına bağlı olarak, "rol" olarak da
11 | adlandırılabilir). Bu satırların içerisinde yetkisiz kullanıcıları temsilen bilinmeyen (anonymous)
12 | kullanıcı da yer almaktadır. Aşağıdaki metin kutusunu kullanarak, tabloya kullanıcı/grup/rol ekleyebilir,
13 | [x] ikonuna tıklayarak bunları silebilirsiniz.
14 |
15 |
16 | Yetkilendirme, kullanıcı ve ait olduğu grupların yetkilerinin birleşim kümesi ile hesaplanır.
17 | Yani X kullanıcısı, A, B ve C gruplarına dahilse, yetkileri X, A, B, C ve bilinmeyen kullanıcıya
18 | verilen yetkilerinin birleşim kümesidir.
19 |
2 |
3 | Cette option vous permet de configurer qui fait quoi dans un grand tableau.
4 |
5 |
6 | Chaque colonne représente une autorisation. Faites glisser la souris au
7 | dessus du nom d'une autorisation pour obtenir plus d'information sur
8 | ce qu'elle représente.
9 |
10 |
11 | Chaque ligne représente un utilisateur ou un groupe (souvent appelé
12 | 'rôle', selon les royaumes -realms- de sécurité).
13 | On y trouve un utilisateur spécial 'anonymous' qui représente
14 | les utilisateurs non authentifiés, ainsi qu'un utilisateur 'authenticated',
15 | qui représente les utilisateurs authentifiés (c-à-d, tout le monde, à
16 | l'exception des utilisateurs anonymes).
17 | Utilisez le texte sous la table pour ajouter des nouveaux
18 | utilisateurs/groupes/rôles à la table et cliquez sur l'icône
19 | [x] pour les supprimer.
20 |
21 |
22 | Les autorisations s'ajoutent les unes aux autres. En clair, si un
23 | utilisateur X est présent dans les groupes A, B et C, alors les
24 | autorisations associées à cet utilisateur sont l'union de toutes les
25 | autorisations accordées à X, A, B, C et anonymous.
26 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_tr.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=Matris-temelli G\u00fcvenlik
24 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_nl.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=Matrix-gebaseerde beveiliging
24 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xDeletion/nodes/a1/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | a1
4 |
5 | /tmp/a1
6 | 1
7 | NORMAL
8 |
9 |
10 |
11 | false
12 | remoting
13 | false
14 |
15 | true
16 |
17 |
18 |
19 |
20 |
21 | hudson.model.Computer.Build:anonymous
22 | hudson.model.Computer.Configure:authenticated
23 | hudson.model.Computer.Connect:authenticated
24 | hudson.model.Computer.Disconnect:authenticated
25 |
26 |
27 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_nb_NO.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Anonymous=Anonym
24 | User/group=Bruker/gruppe
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_pt_BR.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=Seguran\u00e7a baseada em matriz
24 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xReconfiguration/nodes/a1/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | a1
4 |
5 | /tmp/a1
6 | 1
7 | NORMAL
8 |
9 |
10 |
11 | false
12 | remoting
13 | false
14 |
15 | true
16 |
17 |
18 |
19 |
20 |
21 | hudson.model.Computer.Build:anonymous
22 | hudson.model.Computer.Configure:authenticated
23 | hudson.model.Computer.Connect:authenticated
24 | hudson.model.Computer.Disconnect:authenticated
25 |
26 |
27 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_es.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=Habilitar seguridad en el projecto
24 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_fi.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=Poista k\u00E4ytt\u00E4j\u00E4/ryhm\u00E4
24 |
--------------------------------------------------------------------------------
/src/test/java/hudson/security/Security410Test.java:
--------------------------------------------------------------------------------
1 | package hudson.security;
2 |
3 | import static org.junit.jupiter.api.Assertions.assertFalse;
4 |
5 | import hudson.PluginManager;
6 | import jenkins.model.Jenkins;
7 | import org.junit.jupiter.api.BeforeEach;
8 | import org.junit.jupiter.api.Test;
9 | import org.jvnet.hudson.test.Issue;
10 | import org.jvnet.hudson.test.JenkinsRule;
11 | import org.jvnet.hudson.test.junit.jupiter.WithJenkins;
12 |
13 | @WithJenkins
14 | class Security410Test {
15 |
16 | private JenkinsRule j;
17 |
18 | @BeforeEach
19 | void setUp(JenkinsRule rule) {
20 | j = rule;
21 | }
22 |
23 | @Issue("SECURITY-410")
24 | @Test
25 | @SuppressWarnings("deprecation")
26 | void dangerousPermissions1() {
27 | ProjectMatrixAuthorizationStrategy as = new ProjectMatrixAuthorizationStrategy();
28 | assertFalse(((GlobalMatrixAuthorizationStrategy.DescriptorImpl) as.getDescriptor())
29 | .showPermission(Jenkins.RUN_SCRIPTS));
30 | assertFalse(((GlobalMatrixAuthorizationStrategy.DescriptorImpl) as.getDescriptor())
31 | .showPermission(PluginManager.CONFIGURE_UPDATECENTER));
32 | assertFalse(((GlobalMatrixAuthorizationStrategy.DescriptorImpl) as.getDescriptor())
33 | .showPermission(PluginManager.UPLOAD_PLUGINS));
34 | }
35 | }
36 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_tr.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Oguz Dag
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | User/group=Kullan\u0131c\u0131/grup
24 | Anonymous=Bilinmeyen
25 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_es.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | User/group=Usuario/Grupo
24 | Remove\ user/group=Borrar usuario/grupo
25 | Toggle\ all=Cambiar todo
26 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_da.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc. Kohsuke Kawaguchi. Knud Poulsen.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=Sl\u00e5 projektbaseret adgangskontrol til
24 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_zh_TW.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2013, Chunghwa Telecom Co., Ltd., Pei-Tang Huang
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=\u555f\u7528\u5c08\u6848\u578b\u5b89\u5168\u6027\u8a2d\u5b9a
24 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceStrategy/config.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 |
28 |
29 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/integrations/casc/ExportTest/exportTestLegacy/nodes/agent1/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | agent1
4 | 1
5 | NORMAL
6 |
7 |
8 |
9 | false
10 | remoting
11 | false
12 |
13 |
14 |
15 |
16 |
17 |
18 | hudson.model.Computer.Build:anonymous
19 | hudson.model.Computer.Build:authenticated
20 | hudson.model.Computer.Configure:authenticated
21 | hudson.model.Computer.Connect:authenticated
22 | hudson.model.Computer.Delete:authenticated
23 | hudson.model.Computer.Disconnect:authenticated
24 |
25 |
26 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceMigrationTest/users/bob/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | Bob
4 |
5 |
6 | {AQAAABAAAAAwjQ/AtGDcImIkLDhq69pgnztzZq5jDwcRsZjwRnH+M/GunPrOxaLbCjBU1Xn1fRq1FHbmZXZV6klo0181L8HnSg==}
7 |
8 |
9 |
10 |
11 |
12 | all
13 | false
14 | false
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 | true
24 |
25 |
26 | #jbcrypt:$2a$10$Q/.u9U7mphJ4q6Mfifa.Oufm6w4iUCs5TRHVLY/1m..kAqw0qGn.O
27 |
28 |
29 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceMigrationTest/users/admin/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | admin
4 |
5 |
6 | {AQAAABAAAAAwGlr2GmbKMnWJDyTmXdB/J1yPDUj/A8tAFk8Sl7g7ZZIdEzMcatUYTgFQx2DqaKpGkQEV3V9vvLcGRIFkKLcbHg==}
7 |
8 |
9 |
10 |
11 |
12 | all
13 | false
14 | false
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 | true
24 |
25 |
26 | #jbcrypt:$2a$10$8ikKOpe48MnWcKt4nIct6eY.DKVQhRqrlYx.fa.Mt7Ya1X9tFxMtS
27 |
28 |
29 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceMigrationTest/users/alice/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | Alice
4 |
5 |
6 | {AQAAABAAAAAw++0Gifydu+kMl6DwWZxMyXeka/KVmOYbv6ljP7ljepmP4r7Q2oa04Z5Wp7WaOTEKxPfEgg2/v3ALLHn6J9SDKw==}
7 |
8 |
9 |
10 |
11 |
12 | all
13 | false
14 | false
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 | true
24 |
25 |
26 | #jbcrypt:$2a$10$gcruH6YoDS/Sr0Yd9uSDdeqqZ9GidPEBPCKdzWCpDsdrNbQJwTAwC
27 |
28 |
29 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_tr.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Oguz Dag
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=Proje tabanl\u0131 g\u00fcvenlik ayarlar\u0131n\u0131 devreye al
24 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_da.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc. Kohsuke Kawaguchi. Knud Poulsen.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Anonymous=Anonym
24 | Remove\ user/group=Fjern user/gruppe
25 | User/group=Bruger/gruppe
26 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_pt_BR.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Reginaldo L. Russinholi, Cleiber Silva
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | User/group=Usu\u00E1rios/Grupo
24 | Anonymous=An\u00f4nimo
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_da.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | ProjectMatrixAuthorizationStrategy.DisplayName=Projektbaseret matriceauthentificering
24 | GlobalMatrixAuthorizationStrategy.DisplayName=Matricebaseret sikkerhed
25 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_nl.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, id:sorokh
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=Verwijder gebruiker/groep
24 | User/group=Gebruiker/groep
25 | Anonymous=Anoniem
26 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_de.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=Matrix-basierte Sicherheit
24 | ProjectMatrixAuthorizationStrategy.DisplayName=Projektbasierte Matrix-Zugriffssteuerung
25 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_pt_BR.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Reginaldo L. Russinholi, Cleiber Silva
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=Habilitar seguran\u00e7a baseada em projeto
24 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_es.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=Configuraci\u00f3n de seguridad
24 | ProjectMatrixAuthorizationStrategy.DisplayName=Estrategia de seguridad para el proyecto
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_zh_CN.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=\u5b89\u5168\u77e9\u9635
24 | ProjectMatrixAuthorizationStrategy.DisplayName=\u9879\u76ee\u77e9\u9635\u6388\u6743\u7b56\u7565
25 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/integrations/casc/ExportTest/exportTest/nodes/agent1/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | agent1
4 | 1
5 | NORMAL
6 |
7 |
8 |
9 | false
10 | remoting
11 | false
12 |
13 |
14 |
15 |
16 |
17 |
18 | USER:hudson.model.Computer.Build:anonymous
19 | GROUP:hudson.model.Computer.Build:authenticated
20 | GROUP:hudson.model.Computer.Configure:authenticated
21 | GROUP:hudson.model.Computer.Connect:authenticated
22 | GROUP:hudson.model.Computer.Delete:authenticated
23 | GROUP:hudson.model.Computer.Disconnect:authenticated
24 |
25 |
26 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_sv_SE.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Anonymous=Anonym
24 | Remove\ user/group=Ta bort anv\u00E4ndare/grupp
25 | Toggle\ all=V\u00E4xla alla
26 | User/group=Anv\u00E4ndare/grupp
27 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_fr.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Eric Lefevre-Ardant
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=Supprimer utilisateur/groupe
24 | User/group=Utilisateur/groupe
25 | Anonymous=Anonyme
26 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_zh_TW.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=\u77e9\u9663\u578b\u5b89\u5168\u6027
24 | ProjectMatrixAuthorizationStrategy.DisplayName=\u5c08\u6848\u578b\u77e9\u9663\u6388\u6b0a\u7b56\u7565
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritGlobalStrategy/config.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 | ${%blurb(rootURL)}
28 |
29 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritParentStrategy/config.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 | ${%blurb(rootURL)}
28 |
29 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/inheritance/NonInheritingStrategy/config.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 | ${%blurb(rootURL)}
28 |
29 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/AuthorizationMatrixProperty/config_ja.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc., Kohsuke Kawaguchi, Seiji Sogabe
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Enable\ project-based\ security=\u6A29\u9650\u8A2D\u5B9A(\u30D7\u30ED\u30B8\u30A7\u30AF\u30C8\u5358\u4F4D)\u306E\u6709\u52B9\u5316
24 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_ru.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=\u041c\u0430\u0442\u0440\u0438\u0447\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432
24 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_de.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Simon Wiest
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=Nutzer/Gruppe entfernen
24 | Toggle\ all=Alles ausw\u00E4hlen
25 | User/group=Benutzer/Gruppe
26 | Anonymous=Anonym
27 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_zh_CN.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2010, Sun Microsystems, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=\u79FB\u9664\u7528\u6237/\u7EC4
24 | Toggle\ all=\u5C55\u5F00\u5168\u90E8
25 | User/group=\u7528\u6237/\u7ec4
26 | Anonymous=\u533f\u540d\u7528\u6237
27 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_fr.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=S\u00e9curit\u00e9 bas\u00e9e sur une matrice
24 | ProjectMatrixAuthorizationStrategy.DisplayName=Strat\u00e9gie d''autorisation matricielle bas\u00e9e sur les projets
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/Messages_ja.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2013 Jesse Glick.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | GlobalMatrixAuthorizationStrategy.DisplayName=\u884c\u5217\u306b\u3088\u308b\u6a29\u9650\u8a2d\u5b9a
24 | ProjectMatrixAuthorizationStrategy.DisplayName=\u884c\u5217\u306b\u3088\u308b\u6a29\u9650\u8a2d\u5b9a(\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u5358\u4f4d)
25 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AmbiguityMonitor/GlobalConfigurationContributor/entries.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 |
32 |
33 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_zh_TW.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2013, Sun Microsystems, Inc., Chunghwa Telecom Co., Ltd.,
4 | # and Pei-Tang Huang
5 | #
6 | # Permission is hereby granted, free of charge, to any person obtaining a copy
7 | # of this software and associated documentation files (the "Software"), to deal
8 | # in the Software without restriction, including without limitation the rights
9 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 | # copies of the Software, and to permit persons to whom the Software is
11 | # furnished to do so, subject to the following conditions:
12 | #
13 | # The above copyright notice and this permission notice shall be included in
14 | # all copies or substantial portions of the Software.
15 | #
16 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 | # THE SOFTWARE.
23 |
24 | Toggle\ all=\u53cd\u5411\u9078\u53d6
25 | Remove\ user/group=\u79fb\u9664\u4f7f\u7528\u8005\u6216\u7fa4\u7d44
26 |
27 | User/group=\u4f7f\u7528\u8005\u6216\u7fa4\u7d44
28 | Anonymous=\u533f\u540d\u4f7f\u7528\u8005
29 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AmbiguityMonitor/message.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright 2021 CloudBees, Inc.
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | blurb = Some permission assignments are ambiguous. It is recommended to update affected configurations to be unambiguous. \
24 | See this overview page for a list of affected configurations.
25 |
26 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xDeletion/jobs/F/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | hudson.model.View.Configure:authenticated
8 | hudson.model.View.Create:authenticated
9 | hudson.model.View.Delete:authenticated
10 | hudson.model.View.Read:authenticated
11 |
12 |
13 |
14 |
15 |
16 |
17 | All
18 | false
19 | false
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_ja.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2012, Sun Microsystems, Inc., Kohsuke Kawaguchi, Seiji Sogabe
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Anonymous=\u533f\u540d\u30e6\u30fc\u30b6\u30fc
24 | User/group=\u30e6\u30fc\u30b6\u30fc/\u30b0\u30eb\u30fc\u30d7
25 |
26 | Toggle\ all=\u3059\u3079\u3066\u53cd\u8ee2
27 | Remove\ user/group=\u30e6\u30fc\u30b6/\u30b0\u30eb\u30fc\u30d7\u3092\u524a\u9664
28 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xReconfiguration/jobs/F/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | hudson.model.View.Configure:authenticated
8 | hudson.model.View.Create:authenticated
9 | hudson.model.View.Delete:authenticated
10 | hudson.model.View.Read:authenticated
11 |
12 |
13 |
14 |
15 |
16 |
17 | All
18 | false
19 | false
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/integrations/casc/configuration-as-code-v1.yml:
--------------------------------------------------------------------------------
1 | jenkins:
2 | authorizationStrategy:
3 | projectMatrix:
4 | grantedPermissions:
5 | - "Agent/Build:authenticated"
6 | - "Agent/Configure:authenticated"
7 | - "Agent/Connect:authenticated"
8 | - "Agent/Create:authenticated"
9 | - "Agent/Delete:authenticated"
10 | - "Agent/Disconnect:authenticated"
11 | - "Credentials/Create:authenticated"
12 | - "Credentials/Delete:authenticated"
13 | - "Credentials/ManageDomains:authenticated"
14 | - "Credentials/Update:authenticated"
15 | - "Credentials/View:authenticated"
16 | - "Job/Build:authenticated"
17 | - "Job/Cancel:authenticated"
18 | - "Job/Configure:authenticated"
19 | - "Job/Create:authenticated"
20 | - "Job/Delete:authenticated"
21 | - "Job/Discover:authenticated"
22 | - "Job/Move:authenticated"
23 | - "Job/Read:authenticated"
24 | - "Job/Workspace:authenticated"
25 | - "Overall/Read:anonymous"
26 | - "Overall/Administer:authenticated"
27 | - "Overall/Read:authenticated"
28 | - "Run/Delete:authenticated"
29 | - "Run/Replay:authenticated"
30 | - "Run/Update:authenticated"
31 | - "View/Configure:authenticated"
32 | - "View/Create:authenticated"
33 | - "View/Delete:authenticated"
34 | - "View/Read:authenticated"
35 | securityRealm:
36 | local:
37 | allowsSignup: true
38 | enableCaptcha: false
39 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xDeletion/users/user_5543844453642095256/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 10
4 | user
5 | user
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 | all
17 | false
18 | false
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | fada94384ea465e4
28 |
29 |
30 | true
31 |
32 |
33 |
34 | #jbcrypt:$2a$10$pWGP08hcS.cSnk1cUNvIF.92wo0jM3qmccDGXWz..Bd1Lth8lrlvq
35 |
36 |
37 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xDeletion/users/admin_7258660542409517449/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 10
4 | admin
5 | admin
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 | all
17 | false
18 | false
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | 6c0c4a93275a666c
28 |
29 |
30 | true
31 |
32 |
33 |
34 | #jbcrypt:$2a$10$eERHsRE.4OYQ3Mv4fsU6berDmtoQ3BFSRuBwmqbEyUvt.Uo/3ERyS
35 |
36 |
37 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AmbiguityMonitor/message.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 |
28 |
31 | ${%blurb(rootURL)}
32 |
33 |
34 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xReconfiguration/users/admin_7258660542409517449/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 10
4 | admin
5 | admin
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 | all
17 | false
18 | false
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | 6c0c4a93275a666c
28 |
29 |
30 | true
31 |
32 |
33 |
34 | #jbcrypt:$2a$10$eERHsRE.4OYQ3Mv4fsU6berDmtoQ3BFSRuBwmqbEyUvt.Uo/3ERyS
35 |
36 |
37 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/AmbiguityTest/testDataFrom2xReconfiguration/users/user_5543844453642095256/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 10
4 | user
5 | user
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 | all
17 | false
18 | false
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | fada94384ea465e4
28 |
29 |
30 | true
31 |
32 |
33 |
34 | #jbcrypt:$2a$10$pWGP08hcS.cSnk1cUNvIF.92wo0jM3qmccDGXWz..Bd1Lth8lrlvq
35 |
36 |
37 |
--------------------------------------------------------------------------------
/src/test/resources/hudson/security/ProjectMatrixAuthorizationStrategyTest/loadEmptyAuthorizationStrategy/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 1.0
5 | 2
6 | NORMAL
7 | true
8 |
9 |
10 | false
11 |
12 | ${JENKINS_HOME}/workspace/${ITEM_FULLNAME}
13 | ${ITEM_ROOTDIR}/builds
14 |
15 |
16 |
17 |
18 |
19 | 0
20 |
21 |
22 |
23 | all
24 | false
25 | false
26 |
27 |
28 |
29 | all
30 | 0
31 |
32 |
33 |
34 |
--------------------------------------------------------------------------------
/src/test/java/org/jenkinsci/plugins/matrixauth/Jenkins57313Test.java:
--------------------------------------------------------------------------------
1 | package org.jenkinsci.plugins.matrixauth;
2 |
3 | import static org.junit.jupiter.api.Assertions.assertEquals;
4 | import static org.junit.jupiter.api.Assertions.assertTrue;
5 |
6 | import hudson.security.GlobalMatrixAuthorizationStrategy;
7 | import jenkins.model.Jenkins;
8 | import org.htmlunit.html.HtmlPage;
9 | import org.junit.jupiter.api.BeforeEach;
10 | import org.junit.jupiter.api.Test;
11 | import org.jvnet.hudson.test.Issue;
12 | import org.jvnet.hudson.test.JenkinsRule;
13 | import org.jvnet.hudson.test.junit.jupiter.WithJenkins;
14 |
15 | @WithJenkins
16 | class Jenkins57313Test {
17 |
18 | private JenkinsRule j;
19 |
20 | @BeforeEach
21 | void setUp(JenkinsRule rule) {
22 | j = rule;
23 | }
24 |
25 | @Test
26 | @Issue("JENKINS-57313")
27 | void testFormValidation() throws Exception {
28 | j.jenkins.setSecurityRealm(j.createDummySecurityRealm());
29 | GlobalMatrixAuthorizationStrategy authorizationStrategy = new GlobalMatrixAuthorizationStrategy();
30 | authorizationStrategy.add(Jenkins.ADMINISTER, "anonymous");
31 | j.jenkins.setAuthorizationStrategy(authorizationStrategy);
32 | HtmlPage page = j.createWebClient()
33 | .goTo(authorizationStrategy.getDescriptor().getDescriptorUrl() + "/checkName?value=[USER:alice]");
34 | assertEquals(200, page.getWebResponse().getStatusCode());
35 | String responseText = page.getWebResponse().getContentAsString();
36 | assertTrue(responseText.contains("alice"));
37 | assertTrue(responseText.contains("User"));
38 | }
39 | }
40 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceMigrationTest/jobs/folder/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | true
8 | hudson.model.Item.Read:admin
9 | hudson.model.Item.Create:admin
10 | hudson.model.Item.Configure:admin
11 |
12 |
13 |
14 |
15 |
16 |
17 | All
18 | false
19 | false
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | false
28 |
29 |
30 |
31 |
--------------------------------------------------------------------------------
/src/test/resources/org/jenkinsci/plugins/matrixauth/inheritance/InheritanceMigrationTest/jobs/folder1/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | true
8 | hudson.model.Item.Configure:alice
9 | hudson.model.Item.Configure:admin
10 | hudson.model.Item.Read:alice
11 |
12 |
13 |
14 |
15 |
16 |
17 | All
18 | false
19 | false
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 | false
28 |
29 |
30 |
31 |
--------------------------------------------------------------------------------
/src/main/java/com/cloudbees/hudson/plugins/folder/properties/OptionalMarker.java:
--------------------------------------------------------------------------------
1 | /*
2 | * The MIT License
3 | *
4 | * Copyright (c) 2021, CloudBees, Inc.
5 | *
6 | * Permission is hereby granted, free of charge, to any person obtaining a copy
7 | * of this software and associated documentation files (the "Software"), to deal
8 | * in the Software without restriction, including without limitation the rights
9 | * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 | * copies of the Software, and to permit persons to whom the Software is
11 | * furnished to do so, subject to the following conditions:
12 | *
13 | * The above copyright notice and this permission notice shall be included in
14 | * all copies or substantial portions of the Software.
15 | *
16 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 | * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 | * THE SOFTWARE.
23 | */
24 | package com.cloudbees.hudson.plugins.folder.properties;
25 |
26 | import org.kohsuke.accmod.Restricted;
27 | import org.kohsuke.accmod.restrictions.NoExternalUse;
28 |
29 | /**
30 | * Just to enforce the optional extension to fail loading when the desired class is not available.
31 | * @param The class coming from the optional plugin
32 | */
33 | @Restricted(NoExternalUse.class)
34 | public interface OptionalMarker {}
35 |
--------------------------------------------------------------------------------
/src/test/resources/hudson/security/ProjectMatrixAuthorizationStrategyTest/loadFilledAuthorizationStrategy/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 1.0
5 | 2
6 | NORMAL
7 | true
8 |
9 | hudson.model.Hudson.Administer:alice
10 |
11 |
12 | false
13 |
14 | ${JENKINS_HOME}/workspace/${ITEM_FULLNAME}
15 | ${ITEM_ROOTDIR}/builds
16 |
17 |
18 |
19 |
20 |
21 | 0
22 |
23 |
24 |
25 | all
26 | false
27 | false
28 |
29 |
30 |
31 | all
32 | 0
33 |
34 |
35 |
36 |
--------------------------------------------------------------------------------
/src/main/resources/hudson/security/GlobalMatrixAuthorizationStrategy/config_ru.properties:
--------------------------------------------------------------------------------
1 | # The MIT License
2 | #
3 | # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi, Mike Salnikov
4 | #
5 | # Permission is hereby granted, free of charge, to any person obtaining a copy
6 | # of this software and associated documentation files (the "Software"), to deal
7 | # in the Software without restriction, including without limitation the rights
8 | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | # copies of the Software, and to permit persons to whom the Software is
10 | # furnished to do so, subject to the following conditions:
11 | #
12 | # The above copyright notice and this permission notice shall be included in
13 | # all copies or substantial portions of the Software.
14 | #
15 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21 | # THE SOFTWARE.
22 |
23 | Remove\ user/group=\u0423\u0434\u0430\u043B\u0438\u0442\u044C \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F/\u0433\u0440\u0443\u043F\u043F\u0443
24 | Toggle\ all=\u041F\u0435\u0440\u0435\u043A\u043B\u044E\u0447\u0438\u0442\u044C \u0432\u0441\u0451
25 | User/group=\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c/\u0433\u0440\u0443\u043f\u043f\u0430
26 | Anonymous=\u0410\u043d\u043e\u043d\u0438\u043c
27 |
--------------------------------------------------------------------------------
/src/main/java/org/jenkinsci/plugins/matrixauth/AuthorizationType.java:
--------------------------------------------------------------------------------
1 | /*
2 | * The MIT License
3 | *
4 | * Copyright (c) 2021 CloudBees, Inc.
5 | *
6 | * Permission is hereby granted, free of charge, to any person obtaining a copy
7 | * of this software and associated documentation files (the "Software"), to deal
8 | * in the Software without restriction, including without limitation the rights
9 | * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 | * copies of the Software, and to permit persons to whom the Software is
11 | * furnished to do so, subject to the following conditions:
12 | *
13 | * The above copyright notice and this permission notice shall be included in
14 | * all copies or substantial portions of the Software.
15 | *
16 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 | * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 | * THE SOFTWARE.
23 | */
24 | package org.jenkinsci.plugins.matrixauth;
25 |
26 | /**
27 | * The type of object being granted authorization.
28 | *
29 | * @since 3.0
30 | */
31 | public enum AuthorizationType {
32 | /**
33 | * Either type is being granted permissions.
34 | * This is the legacy default.
35 | */
36 | EITHER,
37 | GROUP,
38 | USER;
39 |
40 | public String toPrefix() {
41 | if (this == AuthorizationType.EITHER) {
42 | return ""; // Same as legacy format
43 | }
44 | return this + ":";
45 | }
46 | }
47 |
--------------------------------------------------------------------------------
/src/main/resources/org/jenkinsci/plugins/matrixauth/AmbiguityMonitor/JobContributor/entries.jelly:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 |
27 |
28 |